5 A novel implementation of an open CNC PC-based and service-oriented architecture-based monitoring system for STEP-NC – a case study

2021 ◽  
pp. 135-154
Author(s):  
Masahide Nakamur ◽  
Hiroshi Igaki ◽  
Takahiro Kimura ◽  
Kenichi Matsumoto

In order to support legacy migration to the service-oriented architecture (SOA), this paper presents a pragmatic method that derives candidates of services from procedural programs. In the SOA, every service is supposed to be a process (procedure) with (1) open interface, (2) self-containedness, and (3) coarse granularity for business. Such services are identified from the source code and its data flow diagram (DFD), by analyzing data and control dependencies among processes. Specifically, first the DFD must be obtained with reverse-engineering techniques. For each layer of the DFD, every data flow is classified into three categories. Using the data category and control among procedures, four types of dependency are categorized. Finally, six rules are applied that aggregate mutually dependent processes and extract them as a service. A case study with a liquor shop inventory control system extracts service candidates with various granularities.


Author(s):  
Tony Clark ◽  
Balbir S. Barn ◽  
Vinay Kulkarni

Component-based approaches generalize basic object-oriented implementations by allowing large collections of objects to be grouped together and externalized in terms of public interfaces. A typical component-based system will include a large number of interacting components. Service-Oriented Architecture (SOA) organizes a system in terms of components that communicate via services. Components publish services that they implement as business processes. Consequently, a change to a single component can have a ripple effect on the service-driven system. Component reconfiguration is motivated by the need to evolve the component architecture and can take a number of forms. The authors define a dynamic architecture as one that supports changing the behavior and topology of existing components without stopping, updating, and redeploying the system. This chapter addresses the problem of dynamic reconfiguration of component-based architectures. It proposes a reification approach that represents key features of a language in data, so that a system can reason and dynamically modify aspects of it. The approach is described in terms of a new language called µLEAP and validated by implementing a simple case study.


Author(s):  
Hany F. EL Yamany ◽  
David S. Allison ◽  
Miriam A.M. Capretz

Security is one of the largest challenges facing the development of a Service-Oriented Architecture (SOA). This is due to the fact that SOA security is the responsibility of both the service consumer and service provider. In recent years, many solutions have been implemented, such as the Web Services Security Standards, including WS-Security and WS-SecurityPolicy. However, those standards are insufficient for the promising new generations of Web 2.0 applications. In this research, we describe an Intelligent SOA Security (ISOAS) framework and introduce four of its services: Authentication and Security Service (NSS), the Authorization Service (AS), the Privacy Service (PS) and the Service of Quality of Security Service (SQoSS). Furthermore, a case study is presented to examine the behavior of the described security services inside a market SOA environment.


Author(s):  
Luís Ferreira Pires ◽  
Arjen van Oostrum ◽  
Fons Wijnhoven

A service registry is a Service-Oriented Architecture (SOA) component that keeps a ‘catalogue’ of available services. It stores service specifications so that these specifications can be found by potential users. Discussions on the design of service registries currently focus on technical issues, while service registries should take into consideration information needs of business domain users. In this regard, the authors consider service registries as information services and develop a comprehensive framework for designing service registries. This framework introduces aspects that determine a design space for service registries. In this design space, the authors identify views, requirements, processes, and means in the design of a service registry that supports the lifecycle information of a service. A vital part of these requirements is further implemented and demonstrated in a prototype built as a ‘proof-of-concept’ for the framework. This paper also discusses a case study used to evaluate the prototype. In this case study, a registry prototype has been populated with realistic services of a large insurance company, and 21 experienced IT and business professionals from a consultancy organization evaluated the prototype for its user satisfaction.


Author(s):  
Wail M. Omar

Web 2.0 is expected to be the next technology in the interaction between the enterprise applications and end users. Such interaction will be utilized in producing self-governance applications that are able to readjacent and reconfigure the operation framework based on users’ feedback. To achieve this, huge numbers of underneath resources (infrastructures and services) are required. Therefore, this work proposes the merge of Web 2.0 technology and grid computing overlay to support Web 2.0 framework. Such merge between technologies is expected to offer mutual benefits for both communities. Through this work, a model for managing the interaction between the two technologies is developed based on the adapting of service oriented architecture (SOA) model, this model is known as SOAW2G. This model manages the interaction between the users at the top level and resources at the bottom layer. As a case study, managing health information based on users’ (doctors, medicine companies, and others) experiences is explored through this chapter.


Author(s):  
Marco Massarelli ◽  
Claudia Raibulet ◽  
Daniele Cammareri ◽  
Nicolò Perino

This chapter gives a solution to design Service Oriented Architectures which defines and manages Service Level Agreements to enforce Quality of Services and achieves adaptivity at runtime. The validation of this proposed approach is performed through an actual case study in the context of the multimedia application domain.


Sign in / Sign up

Export Citation Format

Share Document