Current Search: info:fedora/islandora:personCModel (x) » info:fedora/fau:williamsphotos (x) » Florida Atlantic University (x) » Fernandez, Eduardo B. (x)
View All Items
Pages
- Title
- A REFERENCE ARCHITECTURE FOR NETWORK FUNCTION VIRTUALIZATION.
- Creator
- Alwakeel, Ahmed M., Fernandez, Eduardo B., Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Cloud computing has provided many services to potential consumers, one of these services being the provision of network functions using virtualization. Network Function Virtualization is a new technology that aims to improve the way we consume network services. Legacy networking solutions are different because consumers must buy and install various hardware equipment. In NFV, networks are provided to users as a software as a service (SaaS). Implementing NFV comes with many benefits, including...
Show moreCloud computing has provided many services to potential consumers, one of these services being the provision of network functions using virtualization. Network Function Virtualization is a new technology that aims to improve the way we consume network services. Legacy networking solutions are different because consumers must buy and install various hardware equipment. In NFV, networks are provided to users as a software as a service (SaaS). Implementing NFV comes with many benefits, including faster module development for network functions, more rapid deployment, enhancement of the network on cloud infrastructures, and lowering the overall cost of having a network system. All these benefits can be achieved in NFV by turning physical network functions into Virtual Network Functions (VNFs). However, since this technology is still a new network paradigm, integrating this virtual environment into a legacy environment or even moving all together into NFV reflects on the complexity of adopting the NFV system. Also, a network service could be composed of several components that are provided by different service providers; this also increases the complexity and heterogeneity of the system. We apply abstract architectural modeling to describe and analyze the NFV architecture. We use architectural patterns to build a flexible NFV architecture to build a Reference Architecture (RA) for NFV that describe the system and how it works. RAs are proven to be a powerful solution to abstract complex systems that lacks semantics. Having an RA for NFV helps us understand the system and how it functions. It also helps us to expose the possible vulnerabilities that may lead to threats toward the system. In the future, this RA could be enhanced into SRA by adding misuse and security patterns for it to cover potential threats and vulnerabilities in the system. Our audiences are system designers, system architects, and security professionals who are interested in building a secure NFV system.
Show less - Date Issued
- 2020
- PURL
- http://purl.flvc.org/fau/fd/FA00013434
- Subject Headings
- Virtual computer systems, Cloud computing, Computer network architectures, Computer networks
- Format
- Document (PDF)
- Title
- An architectural and performance characterization of distributed real-time systems.
- Creator
- Huynh, Khoa Dang., Florida Atlantic University, Fernandez, Eduardo B.
- Abstract/Description
-
We propose a methodology to effectively characterize the architecture and system performance of distributed systems designed to operate in frame-based real-time environments. Important characteristics that define the real-time performance of a distributed system are identified and classified at the hardware, operating system, and user application levels. A synthetic workload model, called the Distributed Real-Time Workload (DRTW), is designed to fully characterize a broad range of real-time...
Show moreWe propose a methodology to effectively characterize the architecture and system performance of distributed systems designed to operate in frame-based real-time environments. Important characteristics that define the real-time performance of a distributed system are identified and classified at the hardware, operating system, and user application levels. A synthetic workload model, called the Distributed Real-Time Workload (DRTW), is designed to fully characterize a broad range of real-time applications and to exercise a single- or multiple-node distributed system under measurement. A set of data collection tools to obtain empirical performance data at different levels of a distributed system is also proposed. For the purpose of illustration, these tools are used to obtain data on several real-time systems from Encore Computer Corporation.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/14665
- Subject Headings
- Electronic data processing--Distributed processing, Real-time data processing
- Format
- Document (PDF)
- Title
- An authorization model for object-oriented and semantic databases.
- Creator
- Song, Haiyan., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The incorporation of object-oriented and semantic modeling concepts to databases is one of the most significant advances in the evolution of database systems. Among the many issues brought along by this integration, one that becomes important is the protection of the information. This thesis presents an authorization model that applies two basic aspects: control of users' access to data values, and control of administrators' access to data definitions and authorization rules. The model...
Show moreThe incorporation of object-oriented and semantic modeling concepts to databases is one of the most significant advances in the evolution of database systems. Among the many issues brought along by this integration, one that becomes important is the protection of the information. This thesis presents an authorization model that applies two basic aspects: control of users' access to data values, and control of administrators' access to data definitions and authorization rules. The model consists of a set of policies, a structure for authorization rules, algorithms for access request validation and procedures for administrative functions. Even though this model is developed in the context of a particular data model, the discussion is sufficiently general and can be applied to similar environments.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/14592
- Subject Headings
- Object-oriented databases, Data base security, Computers--Access control
- Format
- Document (PDF)
- Title
- Complexity metrics in parallel computing.
- Creator
- Larrondo-Petrie, Maria M., Florida Atlantic University, Fernandez, Eduardo B., Coulter, Neal S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Accompanying the potential increase in power offered by parallel computers is an increase in the complexity of program design, implementation, testing and maintenance. It is important to understand the logical complexity of parallel programs in order to support the development of concurrent software. Measures are needed to quantify the components of parallel software complexity and to establish a basis for comparison and analysis of parallel algorithms at various stages of development and...
Show moreAccompanying the potential increase in power offered by parallel computers is an increase in the complexity of program design, implementation, testing and maintenance. It is important to understand the logical complexity of parallel programs in order to support the development of concurrent software. Measures are needed to quantify the components of parallel software complexity and to establish a basis for comparison and analysis of parallel algorithms at various stages of development and implementation. A set of primitive complexity measures is proposed that collectively describe the total complexity of parallel programs. The total complexity is separated into four dimensions or components: requirements, sequential, parallel and communication. Each proposed primitive measure is classified under one of these four areas. Two additional possible dimensions, fault-tolerance and real-time, are discussed. The total complexity measure is expressed as a vector of dimensions; each component is defined as a vector of primitive metrics. The method of quantifying each primitive metric is explained in detail. Those primitive metrics that contribute to the parallel and communications complexity are exercised against ten published summation algorithms and programs, illustrating that architecture has a significant effect on the complexity of parallel programs--even if the same programming language is used. The memory organization and the processor interconnection scheme had no effect on the parallel component, but did affect the communication component. Programming style and language did not have a noticeable effect on either component. The proposed metrics are quantifiable, consistent, and useful in comparing parallel algorithms. Unlike existing parallel metrics, they are general and applicable to different languages, architectures, algorithms, paradigms, programming styles and stages of software development.
Show less - Date Issued
- 1992
- PURL
- http://purl.flvc.org/fcla/dt/12296
- Subject Headings
- Parallel programming (Computer Science), Computer algorithms
- Format
- Document (PDF)
- Title
- Compliance Issues In Cloud Computing Systems.
- Creator
- Yimam, Dereje, Fernandez, Eduardo B., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Appealing features of cloud services such as elasticity, scalability, universal access, low entry cost, and flexible billing motivate consumers to migrate their core businesses into the cloud. However, there are challenges about security, privacy, and compliance. Building compliant systems is difficult because of the complex nature of regulations and cloud systems. In addition, the lack of complete, precise, vendor neutral, and platform independent software architectures makes compliance even...
Show moreAppealing features of cloud services such as elasticity, scalability, universal access, low entry cost, and flexible billing motivate consumers to migrate their core businesses into the cloud. However, there are challenges about security, privacy, and compliance. Building compliant systems is difficult because of the complex nature of regulations and cloud systems. In addition, the lack of complete, precise, vendor neutral, and platform independent software architectures makes compliance even harder. We have attempted to make regulations clearer and more precise with patterns and reference architectures (RAs). We have analyzed regulation policies, identified overlaps, and abstracted them as patterns to build compliant RAs. RAs should be complete, precise, abstract, vendor neutral, platform independent, and with no implementation details; however, their levels of detail and abstraction are still debatable and there is no commonly accepted definition about what an RA should contain. Existing approaches to build RAs lack structured templates and systematic procedures. In addition, most approaches do not take full advantage of patterns and best practices that promote architectural quality. We have developed a five-step approach by analyzing features from available approaches but refined and combined them in a new way. We consider an RA as a big compound pattern that can improve the quality of the concrete architectures derived from it and from which we can derive more specialized RAs for cloud systems. We have built an RA for HIPAA, a compliance RA (CRA), and a specialized compliance and security RA (CSRA) for cloud systems. These RAs take advantage of patterns and best practices that promote software quality. We evaluated the architecture by creating profiles. The proposed approach can be used to build RAs from scratch or to build new RAs by abstracting real RAs for a given context. We have also described an RA itself as a compound pattern by using a modified POSA template. Finally, we have built a concrete deployment and availability architecture derived from CSRA that can be used as a foundation to build compliance systems in the cloud.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004559, http://purl.flvc.org/fau/fd/FA00004559
- Subject Headings
- Biometric identification, Client/server computing -- Security measures, Cloud computing -- Security measures, Computational intelligence, Computer software -- Quality control, Electronic information resources -- Access control
- Format
- Document (PDF)
- Title
- Controlling access to physical locations.
- Creator
- Desouza-Doucet, Ana C., Florida Atlantic University, Fernandez, Eduardo B.
- Abstract/Description
-
The need to secure and control access to rooms in premises has shifted from allowing some people to enter a room to giving permission to specific persons to access a room and recording who entered the room and the time they spent in it. With such need for higher security in mind, we design an access control system for controlling physical access of people to locations or to specific units in these locations. Our study gives emphasis to the organization of physical locations, including nested...
Show moreThe need to secure and control access to rooms in premises has shifted from allowing some people to enter a room to giving permission to specific persons to access a room and recording who entered the room and the time they spent in it. With such need for higher security in mind, we design an access control system for controlling physical access of people to locations or to specific units in these locations. Our study gives emphasis to the organization of physical locations, including nested rooms, and the approach used to assign permission to people to access such locations. We also define some security policies to be used in such model as well as appropriate user interfaces. Finally, we develop two patterns based on our model.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/13328
- Subject Headings
- Software architecture, Computer networks--Access control, Computer security, Object-oriented programming (Computer science), Smart cards--Security measures
- Format
- Document (PDF)
- Title
- A critical comparison of three user interface architectures in object-oriented design.
- Creator
- Walls, David Paul., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Frameworks for the development of object-oriented, user interactive applications have been examined. Three alternate approaches have been explored; the Model-View-Controller (MVC) approach, the MVC++ approach and the Presentation-Abstraction-Control (PAC) approach. For the purpose of assessing the approaches, a simple engineering application was selected for object-oriented analysis using the three techniques. The utility of each technique was compared on the basis of complexity,...
Show moreFrameworks for the development of object-oriented, user interactive applications have been examined. Three alternate approaches have been explored; the Model-View-Controller (MVC) approach, the MVC++ approach and the Presentation-Abstraction-Control (PAC) approach. For the purpose of assessing the approaches, a simple engineering application was selected for object-oriented analysis using the three techniques. The utility of each technique was compared on the basis of complexity, extensibility and reusability. While the approaches aim to provide reusable user interface components and extensibility through incorporation of an additional class, only MVC++ and PAC truly achieve this goal, although at the expense of introducing additional messaging complexity. It was also noted that, in general, decoupling of the GUI classes, while providing increased extensibility and reusability, increases the inter-object messaging requirement.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15747
- Subject Headings
- User interfaces (Computer systems), Object-oriented methods (Computer science)
- Format
- Document (PDF)
- Title
- CYBER-PHYSICAL SYSTEMS: BUILDING A SECURITY REFERENCE ARCHITECTURE FOR CARGO PORTS.
- Creator
- Romero, Virginia Mendiola, Fernandez, Eduardo B., Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Cyber-Physical Systems (CPS) are physical entities whose operations are monitored, coordinated, and controlled by a computing and communication core. These systems are highly heterogeneous and complex. Their numerous components and cross domain complexity make attacks easy to propagate and security difficult to implement. Consequently, to secure these systems, they need to be built in a systematic and holistic way, where security is an integral part of the development lifecycle and not just...
Show moreCyber-Physical Systems (CPS) are physical entities whose operations are monitored, coordinated, and controlled by a computing and communication core. These systems are highly heterogeneous and complex. Their numerous components and cross domain complexity make attacks easy to propagate and security difficult to implement. Consequently, to secure these systems, they need to be built in a systematic and holistic way, where security is an integral part of the development lifecycle and not just an activity after development. These systems present a multitude of implementation details in their component units, so it is fundamental to use abstraction in the analysis and construction of their architecture. In particular, we can apply abstraction through the use of patterns. Pattern-based architectural modeling is a powerful way to describe the system and analyze its security and the other non-functional aspects. Patterns also have the potential to unify the design of their computational, communication, and control aspects. Architectural modeling can be performed through UML diagrams to show the interactions and dependencies between different components and its stakeholders. Also, it can be used to analyze security threats and describe the possible countermeasures to mitigate these threats. An important type of CPS is a maritime container terminal, a facility where cargo containers are transported between ships and land vehicles; for example, trains or trucks, for onward transportation, and vice versa. Every cargo port performs four basic functions: receiving, storing, staging and loading for both, import and export containers. We present here a set of patterns that describe the elements and functions of a cargo port system, and a Reference Architecture (RA) built using these patterns. We analyze and systematically enumerate the possible security threats to a container terminal in a cargo port using activity diagrams derived from selected use cases of the system. We describe these threats using misuse patterns, and from them select security patterns as defenses. The RA provides a framework to determine where to add these security mechanisms to stop or mitigate these threats and build a Security Reference Architecture (SRA) for CPS. An SRA is an abstract architecture describing a conceptual model of security that provides a way to specify security requirements for a wide range of concrete architectures. The analysis and design are given using a cargo port as our example, but the approach can be used in other domains as well. This is the first work we know where patterns and RAs are used to represent cargo ports and analyze their security.
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013737
- Subject Headings
- Cyber-physical systems, Cooperating objects (Computer systems), Container terminals
- Format
- Document (PDF)
- Title
- THE DESIGN AND IMPLEMENTATION OF A DECENTRALIZED SECURITY ADMINISTRATION SYSTEM.
- Creator
- KANG, SHYHJER., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Modern computer systems have strong requirements for security. The decentralization of the security functions is becoming necessary due to the complexity and physical distribution of many systems. This study uses a previous model of authorization for decentralized security administration. The concept of file classes is proposed and used for the entire system design as a main motive. Algorithms for delegation of administrative access rights with revocation are designed and implemented. For...
Show moreModern computer systems have strong requirements for security. The decentralization of the security functions is becoming necessary due to the complexity and physical distribution of many systems. This study uses a previous model of authorization for decentralized security administration. The concept of file classes is proposed and used for the entire system design as a main motive. Algorithms for delegation of administrative access rights with revocation are designed and implemented. For development of software, top-down and bottom-up methods are adopted. The strategy for design is borrowed from the object-oriented approach. The special "unit" feature of the implementation language--Meridian-Pascal, serves as a window to observe the interaction and coordination of the fundamental data representations. Four basic table structures are defined to control the authorization system. For the delegation and revocation of the administrative access rights, two graph structures are used and implemented to illustrate the logical view of the operations.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/14394
- Subject Headings
- File organization (Computer science), Decentralization in management
- Format
- Document (PDF)
- Title
- The design of reliable decentralized computer systems.
- Creator
- Wu, Jie., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
With the increase in the applications of computer technology, there are more and more demands for the use of computer systems in the area of real-time applications and critical systems. Reliability and performance are fundamental design requirements for these applications. In this dissertation, we develop some specific aspects of a fault-tolerant decentralized system architecture. This system can execute concurrent processes and it is composed of processing elements that have only local...
Show moreWith the increase in the applications of computer technology, there are more and more demands for the use of computer systems in the area of real-time applications and critical systems. Reliability and performance are fundamental design requirements for these applications. In this dissertation, we develop some specific aspects of a fault-tolerant decentralized system architecture. This system can execute concurrent processes and it is composed of processing elements that have only local memories with point-to-point communication. A model using hierarchical layers describes this system. Fault tolerance techniques are discussed for the applications, software, operating system, and hardware layers of the model. Scheduling of communicating tasks to increase performance is also addressed. Some special problems such as the Byzantine Generals problem are considered. We have shown that, by combining reliable techniques on different layers and with consideration of system performance, one can provide a system with a very high level reliability as well as performance.
Show less - Date Issued
- 1989
- PURL
- http://purl.flvc.org/fcla/dt/12237
- Subject Headings
- Electronic digital computers--Reliability, Fault-tolerant computing, System design, Computer software--Reliability
- Format
- Document (PDF)
- Title
- Diagnosis of microprocessors using self-test and its application to multiprocessing.
- Creator
- Yazdani, Hamid R., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A great deal of research in the area of VLSI built-in testability is under way. This approach increases the reliability of the hardware system at the gate or circuit level. However, in many cases we cannot modify an existing hardware, and diagnostic software is a possible way to increase reliability. We use here a strategy to apply diagnostic tests that consist of starting of single units and instructions, to include progressively more complex instructions and units. After a complete...
Show moreA great deal of research in the area of VLSI built-in testability is under way. This approach increases the reliability of the hardware system at the gate or circuit level. However, in many cases we cannot modify an existing hardware, and diagnostic software is a possible way to increase reliability. We use here a strategy to apply diagnostic tests that consist of starting of single units and instructions, to include progressively more complex instructions and units. After a complete processor is shown to be correct, it can be used to test other processors in a multiprocessing system. We present here details of this approach, including self-test software and its application to the Intel 8086 microprocessor.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/14426
- Subject Headings
- Microprocessors--Testing
- Format
- Document (PDF)
- Title
- An efficient test strategy for microprogrammable minicomputers.
- Creator
- Franklin, William Allen., Florida Atlantic University, Fernandez, Eduardo B.
- Abstract/Description
-
A strategy for software and firmware testing for minicomputers is presented in this thesis. This test approach provides effective hardware fault detection and isolation. The test approach is embodied in a set of test procedures and is meant for use by field and factory personnel. This thesis discusses several alternative diagnostic approaches, and combines some of the features of these approaches to produce an efficient and complete test approach.
- Date Issued
- 1988
- PURL
- http://purl.flvc.org/fcla/dt/14465
- Subject Headings
- Minicomputers--Testing
- Format
- Document (PDF)
- Title
- Extending use cases and interaction diagrams to develop distributed system architecture requirements.
- Creator
- Hawkins, John C., Florida Atlantic University, Fernandez, Eduardo B.
- Abstract/Description
-
Current object-oriented development methodologies do not introduce distributed system architectural aspects early enough in the system development cycle. A development partitioning scheme that includes the system level, in addition to the problem and application levels, will encourage analysis that includes elicitation of non-functional system requirements. These requirements include response time with respect to system communication load, fault tolerance, safety, security, and real-time...
Show moreCurrent object-oriented development methodologies do not introduce distributed system architectural aspects early enough in the system development cycle. A development partitioning scheme that includes the system level, in addition to the problem and application levels, will encourage analysis that includes elicitation of non-functional system requirements. These requirements include response time with respect to system communication load, fault tolerance, safety, security, and real-time deadlines, among others. They can be documented with an extended form of Jacobson's use cases. Where use cases describe how a system will work from a user's point of view, extended use cases add the capability to describe how well it should work. System level analysis information can be graphically depicted on extended forms of Unified Modeling Language (UML) interaction diagrams and on multilevel architecture diagrams.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15406
- Subject Headings
- Object-oriented methods (Computer science), UML (Computer science), Electronic data processing--Distributed processing
- Format
- Document (PDF)
- Title
- Extensions to real-time object-oriented software design methodologies.
- Creator
- Woodcock, Timothy G., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Real-time systems are systems where time is considered a system resource that needs to be managed. Time is usually represented in these systems as a deadline to complete a task. Unfortunately, by adding timing to even simple algorithms, it complicates them greatly. Real-time systems are by nature difficult and complex to understand. Object-oriented methodologies have attributes that allow real-time systems to be designed and implemented with less error and some control over the resultant...
Show moreReal-time systems are systems where time is considered a system resource that needs to be managed. Time is usually represented in these systems as a deadline to complete a task. Unfortunately, by adding timing to even simple algorithms, it complicates them greatly. Real-time systems are by nature difficult and complex to understand. Object-oriented methodologies have attributes that allow real-time systems to be designed and implemented with less error and some control over the resultant complexity. With object-oriented design, the system is modeled in the environment that it will be used in. Objects themselves, are partitions of the system, into logical, understandable units. In this dissertation, we start by surveying the current real-time object-oriented design methodologies. By comparing these methodologies and developing a set of criteria for evaluating them, we discover that certain aspects of these methodologies still need some work. The most important aspects of the methodologies are understanding the effects of deadlines on statechart behavioral models and understanding the effects of deadlines when object models are inherited or undergo aggregation. The effects of deadlines on statecharts are then explored in detail. There are two basic ways that deadlines are added to statecharts. The first, and most popular, is adding timing as a condition on a state transition. The second is adding a count down timer to a state and forcing a transition if the timer reaches zero. We show that these are equivalent and can be used interchangeably to simplify designs. Next, the effects of deadlines on behavior models when the corresponding object models undergo inheritance or aggregation are studied. We will first analyze the effects on the behavior model when object inheritance is encountered. We found eight ways that the behavior model can be modified and still maintain the properties of inheritance. Finally, deadlines are added and the analysis is repeated.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/12493
- Subject Headings
- Real-time data processing, Computer software--Development, Object-oriented programming (Computer science)
- Format
- Document (PDF)
- Title
- Formal specification of authorization and user group models for object-oriented databases.
- Creator
- Wei, Dong., Florida Atlantic University, Fernandez, Eduardo B., France, Robert B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The use of formal methods has become increasingly important for software development. In this thesis, we present the formal specifications for a method-based authorization model for object-oriented databases. We also formalize a proposed user group structuring. We start from an existing OMT (Object Modeling Technique) description and we use Z as language for formal specification. This specification gives a precise definition of the policies and functions of this authorization system. This can...
Show moreThe use of formal methods has become increasingly important for software development. In this thesis, we present the formal specifications for a method-based authorization model for object-oriented databases. We also formalize a proposed user group structuring. We start from an existing OMT (Object Modeling Technique) description and we use Z as language for formal specification. This specification gives a precise definition of the policies and functions of this authorization system. This can be used as a basis for implementation and possible verification in those cases where a high level of security is required.
Show less - Date Issued
- 1995
- PURL
- http://purl.flvc.org/fcla/dt/15175
- Subject Headings
- Object-oriented databases, Computer software--Development, Database security
- Format
- Document (PDF)
- Title
- GENERIC NETWORK EXECUTIVE.
- Creator
- SARMIENTO, JESUS LEOPOLDO., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A Generic Network Executive (GNE) package is presented in this thesis. It encompasses the strategy and methodology to follow when implementing data communication software. GNE was designed for portability and high utilization of available resources (efficiency). It does not impose implementation constraints because it does not include features specific to any system (hardware or operating system}. It uses a highly concurrent process model with a pipelined structure . It is not protocol...
Show moreA Generic Network Executive (GNE) package is presented in this thesis. It encompasses the strategy and methodology to follow when implementing data communication software. GNE was designed for portability and high utilization of available resources (efficiency). It does not impose implementation constraints because it does not include features specific to any system (hardware or operating system}. It uses a highly concurrent process model with a pipelined structure . It is not protocol dependent, rather it is meant to be used to implement low level services for higher level communic ation protocols. It is intended to provide interprocess communication in distributed systems by coupling application programs with a general purpose packet delivery system, i.e., a datagram service.
Show less - Date Issued
- 1986
- PURL
- http://purl.flvc.org/fcla/dt/14321
- Subject Headings
- Computer networks, Data transmission systems
- Format
- Document (PDF)
- Title
- A heterogeneous multiprocessor architecture for workstations.
- Creator
- Bealkowski, Richard., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Providing multiprocessor capability to the class of computers commonly referred to as personal workstations is the next evolutionary step in their development. Uniprocessor workstations limit the user in throughput, reliability, functionality, and architecture. Multiprocessor workstations have the potential of increasing system throughput. A multiprocessor system with expanded architecture derived from a set of heterogeneous processors gives the user a diverse application base within a single...
Show moreProviding multiprocessor capability to the class of computers commonly referred to as personal workstations is the next evolutionary step in their development. Uniprocessor workstations limit the user in throughput, reliability, functionality, and architecture. Multiprocessor workstations have the potential of increasing system throughput. A multiprocessor system with expanded architecture derived from a set of heterogeneous processors gives the user a diverse application base within a single system. The replication and diversity offered in systems of this design, when coupled with fault-tolerant design techniques, enhances system reliability. A heterogeneous multiprocessor architecture is presented which combines loosely- and tightly-coupled configurations (multicomputer and multiprocessor). This architecture provides for incremental growth of the system, either by static or dynamic reconfiguration. The software view of the system is that of an object-oriented environment. The object-oriented approach is used to unify the heterogeneous nature of the system. The process is the unit of concurrency in the system and cooperating concurrent processes are supported. A set of system primitives are provided to support the requirements of a heterogeneous multiprocessing environment. A virtual machine layer controls the distribution of processes and allocation of resources in the system. A virtual network is used to provide communication paths and resource sharing. The virtual network is designed to be bridged to an external physical network. The system requirements for a secure and reliable operating environment are incorporated into the design. This system utilizes "hardware porting" as a means to overcome the lag of software support for hardware advances. Rather than software port an entire application base to a new system architecture, hardware porting brings the required instruction set architecture to the applications. This heterogeneous multiprocessor architecture builds on a popular system architecture, the scIBM PS/2 with the Micro Channel system bus. Incorporating a second bus, the scSCSI bus, as a system extension is explored.
Show less - Date Issued
- 1989
- PURL
- http://purl.flvc.org/fcla/dt/12242
- Subject Headings
- Microcomputer workstations, Multiprocessors, Object-oriented programming (Computer science), Computer architecture
- Format
- Document (PDF)
- Title
- THE IMPLEMENTATION OF SOFTWARE FAULT TOLERANCE IN THE INTEL 80286 PROCESSOR.
- Creator
- OZAKI, BRENDA., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis analyzes how the architecture of the Intel 80286 microprocessor may be used to implement fault tolerant software structures. The Multi-Micro Programming Line, MML, and the Intel 80286 kernel, K286, are used as tools to illustrate the implementation of software fault tolerance in an 80286 environment. The recovery metaprogram approach is supported by software layers which use the privilege levels in the 80286. Implementation of recovery blocks, N-version programming, exceptions,...
Show moreThis thesis analyzes how the architecture of the Intel 80286 microprocessor may be used to implement fault tolerant software structures. The Multi-Micro Programming Line, MML, and the Intel 80286 kernel, K286, are used as tools to illustrate the implementation of software fault tolerance in an 80286 environment. The recovery metaprogram approach is supported by software layers which use the privilege levels in the 80286. Implementation of recovery blocks, N-version programming, exceptions, and conversations using a recovery metaprogram are covered. While the details are specific to the 80286 architecture, the general results apply to any architecture with three or more rings of privilege and a segmented virtual memory using descriptors.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/14399
- Subject Headings
- Fault-tolerant computing, Intel 80286 (Microprocessor)
- Format
- Document (PDF)
- Title
- A MAINTENANCE PROCESSOR FOR THE IBM SERIES/1 (SERVICE, DIAGNOSTIC).
- Creator
- MURPHY, DAVID JAMES, III., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
As the Series/1 is used in more complex, unattended, or critical applications, users of the product cannot tolerate the mean time to repair of the current field service support. Long waits for technicians to arrive, troubleshoot the system, and repair or replace parts are no longer acceptable. This thesis presents the system architecture and functional capabilities of a maintenance processor for the Series/1. The maintenance processor designed herein can be used as the focal point of most...
Show moreAs the Series/1 is used in more complex, unattended, or critical applications, users of the product cannot tolerate the mean time to repair of the current field service support. Long waits for technicians to arrive, troubleshoot the system, and repair or replace parts are no longer acceptable. This thesis presents the system architecture and functional capabilities of a maintenance processor for the Series/1. The maintenance processor designed herein can be used as the focal point of most system support activities. This approach has been used in mainframe systems for some time but has not, in the past, been deemed feasible for smaller systerns such as the Series/1. This effort demonstrates the feasibility of a maintenance processor in such systems, resulting in a simplification of hardware and software while providing a significant improvement in total system reliability, availability, and serviceability.
Show less - Date Issued
- 1985
- PURL
- http://purl.flvc.org/fcla/dt/14248
- Subject Headings
- IBM Series/1 (Computer), Software maintenance
- Format
- Document (PDF)
- Title
- MEMORY LOADER SYSTEM FOR AN AUTOMATIC TEST SET.
- Creator
- MASKASKY, ROBERT JAY., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The STS 6003500 computerized automatic teat set is used to support the AH/ASN-91 computer used in the Navy's A-7 attack aircraft. The teat set currently loads teat programs from an IBM 2415 Magnetic tape unit which is obsolete. A new memory loader system is needed to load test programs into the teat set. Using modern Personal Computer technology, this can be accomplished economically with a personal computer and a hard disk drive. The personal computer will act as an intelligent interface...
Show moreThe STS 6003500 computerized automatic teat set is used to support the AH/ASN-91 computer used in the Navy's A-7 attack aircraft. The teat set currently loads teat programs from an IBM 2415 Magnetic tape unit which is obsolete. A new memory loader system is needed to load test programs into the teat set. Using modern Personal Computer technology, this can be accomplished economically with a personal computer and a hard disk drive. The personal computer will act as an intelligent interface between the bard disk drive and the teat set. The personal computer can also provide numerous functions for the convenience of the teat set operator. The flexibility of the personal computer allows easy adaptation to other computerized automatic test sets which are faced with similar problems.
Show less - Date Issued
- 1986
- PURL
- http://purl.flvc.org/fcla/dt/14345
- Subject Headings
- Computer interfaces, Microcomputers
- Format
- Document (PDF)