Modeling Adaptive Middleware and Its Applications to Military Tactical Datalinks Thesis
نویسنده
چکیده
Open systems solutions and techniques have become the de facto standard for achieving interoperability between disparate, large-scale, legacy software systems. A key technology among open systems solutions and techniques is middleware. Middleware, in general, is used to isolate applications from dependencies introduced by hardware, operating systems, and other low-level aspects of system architectures. While middleware approaches are or will be integrated into operational military systems, many open questions exist about the appropriate areas to applying middleware. Adaptive middleware is middleware that provides an application with a run-time adaptation strategy, based upon system-level interfaces and properties. Adaptive middleware is an example of an active applied research area. Adaptive middleware is being developed and applied to meet the ever-increasing challenges set forth by the next generation of mission-critical distributed real-time and embedded (DRE) systems. The driving force behind many next-generation DRE systems is the establishment of QoS requirements typically associated with workloads that vary dynamically. The Weapon System Open Architecture (WSOA), an adaptive middleware platform developed by Boeing, is modeled as a part of this research to determine the scalability of the architecture. The WSOA adaptive middleware was previously flighttested with one tactical node, and the test results represent the performance baseline the architecture. The WSOA adaptive middleware is modeled with 1, 2, 4, 8 and 16 tactical nodes. The results of the modeling and simulation is that the WSOA adaptive middleware
منابع مشابه
Toward an Adaptive Data Distribution Service for Dynamic Large-Scale Network-Centric Operation and Warfare (NCOW) SystemsTo be sumitted to the 2008 Military Communications Conference
To achieve the goal of information dominance, the DoD has adopted the doctrine of net-centric operations and warfare (NCOW). The Global Information Grid (GIG), Future Combat System (FCS), C2 Constellation, and FORCEnet are examples of net-centric operations where multiple systems-of-systems integrate thousands of platforms, sensors, decision nodes, weapons, and warfighters through heterogeneous...
متن کاملA review of agent-based modeling (ABM) concepts and some of its main applications in management science
We live in a very complex world where we face complex phenomena such as social norms and new technologies. To deal with such phenomena, social scientists often use reductionism approach where they reduce them to some lower-lever variables and model the relationships among them through a scheme of equations. This approach that is called equation based modeling (EBM) has some basic weaknesses in ...
متن کاملSAMProc - a middleware for highly dynamic and heterogeneous environments
Software in mobile and ubiquitous computing scenarios has to cope with a highly dynamic and heterogeneous environment. For tapping the environment’s full potential, software should be able to dynamically adapt on demand in a platformand language-independent manner (e.g., by migration). Current systems have only limited support for the requested dynamics and heterogeneity. Thus, the development ...
متن کاملIn-Stream Data Processing for Tactical Environments
Data dissemination and information management technologies for tactical environments are quickly becoming major areas of research for both military and civilian applications. Critical to the problem is the need for fully distributed information management technologies that are efficient, adaptive and resilient. In this paper, we introduce and discuss a new strategy for tactical data disseminati...
متن کاملCase Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios
This paper presents case studies of attacks aimed at tactical software defined radios based on a classification with the most common sources of vulnerabilities, classes of attacks, and types of intrusions that military radio sets may suffer. Besides that, we also describe how attack mitigation strategies can impact the development of SDR infrastructures. By using such approach, we identify seve...
متن کامل