Developing an Approach for Analyzing and Verifying System Communication

被引:0
|
作者
Stratton, William C. [1 ]
Sibol, Deane E. [1 ]
Lindvall, Mikael [2 ]
Ackermann, Chris [2 ]
Godfrey, Sally [3 ]
机构
[1] Johns Hopkins Univ, Appl Phys Lab, Dept Space, Ground Applicat Grp, 11100 Johns Hopkins Rd,MS 4-118, Laurel, MD 20723 USA
[2] Fraunhofer Ctr Experimental Software Engn, College Pk, MD USA
[3] Goddard Space Flight Ctr, Greenbelt, MD USA
关键词
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Prominent characteristics of systems in the aerospace domain are that they are inherently complex, they must operate under tight resource constraints, and are often parts of a larger system of systems that must be reliable. These systems communicate with each other to exchange data and control information to together fulfill a larger task. In such a setup, the reliability of the communication channel plays a central role in the reliability of the entire system of systems and thus determines the success of fulfilling the larger task. Ensuring such a reliable communication is difficult due to several reasons: (1) the systems are developed independently by different teams at different locations, (2) the specification of the expected communication behavior is ambiguous, and (3) issues in the communication are often subtle and remain uncovered for a long time with the effect that bandwidth and other precious resources are wasted. We are proposing an approach called Dynamic Software Architecture Visualization and Evaluation (DynSAVE) to detect problems in the communication between systems by analyzing their communication behavior. The approach is divided into three main steps. The first step is the non-intrusive monitoring and recording of low level network traffic, the second step converts these raw communication records into meaningful messages, and the third step visualizes this abstracted information in such a way that issues can be detected. In this paper we discuss how the approach was applied to the Consultative Committee for Space Data Systems (CCSDS) File Delivery Protocol (CFDP), which is used for satellite communication by the JHU/APL Common Ground System. The approach has proven to be useful for understanding the communication behavior and uncovering subtle issues due to emerging system behaviors.
引用
收藏
页码:3154 / +
页数:3
相关论文
共 50 条
  • [21] Analyzing Communication Overhead in Linearizing Peer to Peer System
    Muhyiddeen, Abdulfattah
    Nor, Rizal Mohd
    Rahman, M. M. Hafizur
    2016 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR THE MUSLIM WORLD (ICT4M), 2016, : 260 - 263
  • [22] Analyzing relational sources of power at the interorganizational communication system
    Turker, Duygu
    EUROPEAN MANAGEMENT JOURNAL, 2014, 32 (03) : 509 - 517
  • [23] Analyzing and simulation on MANET system on satellite communication constellation
    Xu Jinyong
    Zhao Hangsheng
    Sun Yun
    2008 INTERNATIONAL CONFERENCE ON MICROWAVE AND MILLIMETER WAVE TECHNOLOGY PROCEEDINGS, VOLS 1-4, 2008, : 1942 - 1945
  • [24] TOWARDS VERIFYING COMMUNICATION RESEARCH IN HEALTHCARE
    Vajda, Beata
    REGULATION AND BEST PRACTICES IN PUBLIC AND NONPROFIT MARKETING, 2010, : 340 - 352
  • [25] Analyzing Malaysians' Perception of Risk in Developing Radiological and Nuclear Crisis Communication Framework
    Hamid, A. H. A.
    Hassan, H.
    Ramanathan, B.
    Jumat, A. H.
    Jaafar, N. N. H.
    Abdullah, A.
    ADVANCING OF NUCLEAR SCIENCE AND ENERGY FOR NATIONAL DEVELOPMENT, 2015, 1659
  • [26] A method for formalizing, analyzing, and verifying secure user interfaces
    Beckert, Bernhard
    Beuster, Gerd
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2006, 4260 : 55 - +
  • [27] Verifying rigor: analyzing qualitative research in international marketing
    Singh, Nitish
    Benmamoun, Mamoun
    Meyr, Elizabeth
    Arikan, Ramazan Hamza
    INTERNATIONAL MARKETING REVIEW, 2021, 38 (06) : 1289 - 1307
  • [28] Verifying communication constraints in RSML specifications
    Heimdahl, MPE
    1997 HIGH-ASSURANCE ENGINEERING WORKSHOP - PROCEEDINGS, 1997, : 56 - 61
  • [29] On the Communication Requirements of Verifying the VCG Outcome
    Lahaie, Sebastien
    Parkes, David C.
    EC'08: PROCEEDINGS OF THE 2008 ACM CONFERENCE ON ELECTRONIC COMMERCE, 2008, : 78 - 87
  • [30] A method for formalizing, analyzing, and verifying secure user interfaces
    Beckert, Bernhard
    Beuster, Gerd
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2006, 4260 LNCS : 55 - 73