5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 1 Alerts Rich Moeser.

Slides:



Advertisements
Similar presentations
Web Service Ahmed Gamal Ahmed Nile University Bioinformatics Group
Advertisements

W3C Workshop on Web Services Mark Nottingham
Introduction to Network Analysis and Sniffer Pro
MONITOR AND CONTROL EXECUTOR REAL TIME PROGRAM.
Bill SahrEVLA M&C Transition System Software CDR December 5-6, EVLA Monitor & Control Transition System Software Overview.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
TENA Test and Training Enabling Architecture. TENA TENA is used in range environments, often in the L portion of LVC Slightly different emphasis; small.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
1 3. Implementing Web Services 1.Create SOAP proxy interfaces and WSDL based service descriptions 2.Register/publish services 3.Stores service descriptions.
Chapter 6: Packet Filtering
Grid Computing, B. Wilkinson, 20043b.1 Web Services Part II.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
SEED Infotech Pvt. Ltd. 1 Networking in Java. SEED Infotech Pvt. Ltd. 2 Objectives of This Session Describe issues related to any type of network using.
Chapter 17 - Deploying Java Applications on the Web1 Chapter 17 Deploying Java Applications on the Web.
Event Driven Programming
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 1 User Interfaces Rich Moeser.
Web Server Administration Web Services XML SOAP. Overview What are web services and what do they do? What is XML? What is SOAP? How are they all connected?
Lecture 15 Introduction to Web Services Web Service Applications.
Hichem Ben Frej 5-Dec-2006 EVLA M&C Transition Software CDR CMP: Control Monitor Processor 1 Hichem Ben Frej Kevin Ryan.
June 14, 2004EVLA Software Communications Infrastructure Kevin Ryan 1 EVLA Software Communications Infrastructure.
Event Management & ITIL V3
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
.Net and Web Services Security CS795. Web Services A web application Does not have a user interface (as a traditional web application); instead, it exposes.
Software Project Documentation. Types of Project Documents  Project Charter  Requirements  Mockups and Prototypes  Test Cases  Architecture / Design.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Computer Emergency Notification System (CENS)
1 Some initial Design suggestions… Getting started… where to begin? Find out whether your design architecture will work… as soon as possible. If you need.
Application code Registry 1 Alignment of R-GMA with developments in the Open Grid Services Architecture (OGSA) is advancing. The existing Servlets and.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Bill SahrEVLA Advisory Committee Meeting May 8-9, EVLA Monitor & Control.
Bill Sahr EVLA M&C EVLA Advisory Committee Meeting December 14-15, EVLA Monitor & Control.
Software Status Sonja Vrcic Socorro,
ICN and DTN NetInf over BP using BPQ Elwyn Davies Folly Consulting Ltd/Trinity College Dublin or
R MoeserCorrelator f2f Meeting1 MCAF (Metadata Capture and Formatting) Rich Moeser.
Construction Planning and Prerequisite
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
SIP working group IETF#70 Essential corrections Keith Drage.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
14 June, 2004 EVLA Overall Design Subsystems II Tom Morgan 1 EVLA Overall Software Design Final Internal Review Subsystems II by Tom Morgan.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
James Robnett EVLA M&C Software PDR May EVLA Monitor & Control Software PDR Monitor & Control Network Security.
Configuration Mapper Sonja Vrcic Socorro,
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Interim Data Capture & Format (IDCAF) Walter Brisken 2006 Dec 6.
Rupen/MoeserWIDAR Face-to-Face Meeting December 11-12, Science Data Model Michael P. Rupen & Rich Moeser.
Network Architecture Protocol hierarchies Design Issues for the layers
1. 2 Purpose of This Presentation ◆ To explain how spacecraft can be virtualized by using a standard modeling method; ◆ To introduce the basic concept.
Week1: Introduction to Computer Networks. Copyright © 2012 Cengage Learning. All rights reserved.2 Objectives 2 Describe basic computer components and.
.NET Mobile Application Development XML Web Services.
Requirements storage (in network / backend) simulation of events / algorithms support of a wide variety of technologies synchronization of several data.
© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration.
Software Requirements for the Testing of Prototype Correlator Sonja Vrcic Socorro, December 11, 2007.
Bill SahrNSF Review May , EVLA Monitor & Control.
Author Wayne M. Koski EVLA Monitor & Control Hardware PDR March 13, EVLA Monitor and Control Monitor & Control Transition.
Master Correlator Control Computer (MCCC) Requirements & Status Sonja Vrcic Socorro, December 12, 2007.
DEVELOPING WEB SERVICES WITH JAVA DESIGN WEB SERVICE ENDPOINT.
Configuring MQ Connections and Handlers for MQ adapter 6.5 July 2008.
SOAP, Web Service, WSDL Week 14 Web site:
EVLA M&C CDR EVLA Monitor Data Archive System John Benson, Chunai Cai NRAO Dec 6, 2006.
Ch. 31 Q and A IS 333 Spring 2016 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Software Overview Sonja Vrcic
Software Design and Architecture
VCI Overview Sonja Vrcic
Bryan Butler (for Bill Sahr)
A GJXDM-Based Approach for Federated Information Sharing
EVLA M&C Components Observation Executor, Interim & Final Obs2script
EVLA Monitor & Control Bill Sahr NSF Review May , 2006
Requirements Bryan Butler.
Presentation transcript:

5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 1 Alerts Rich Moeser

5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 2 Place in the System

5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 3 Alerts: Main Components and data flow Alert Server Alert Sources Alert Sources Clients Alert Multicast Group Alerts

5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 4 Alert Sources MIBs, CMIBs: –This is where most of the alerts originate –Located at EVLA antennas The AOC test rack (ATR) Bench and desk tops CMP –Currently, only a subset of its monitor points are enabled. The operators continue to rely on the ‘old’ Checker program for VLA alerts. –All of the required CMP alerts will be enabled when the MODCOMPs are turned off. Other Software Processes –Not many right now –mcwatch It generates an alert when a test executor has been detected on mchost. –In the very near future, Telcal will be creating software generated alerts.

5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 5 Alerts What are alerts? –Alerts are XML messages sent by sources (MIBs, CMIBs, etc) as UDP multicasts –They indicate potential problems in the system that on some occassions require immediate attention –The XML alerts from MIBs conform to the XML schema file, evlamessage.xsd –The XML alerts from the Alert Server to client conform to the XML schema file, alerts.xsd (more on this later)

5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 6 Alerts: Sample alerts

5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 7 Alert Server A: The multicast group receives an alert from the alert multicast group. B: The multicast group uses JAXB to convert the XML message to a JAXB object. C: The JAXB object is packaged into a MulticastGroupEvent and sent to Checker. D: The JAXB object forwarded by the event is then converted to an Alert JAXB object and merged with its description and severity information obtained from the XML file. Then, depending on whether the alert is a new alert or a clear, Checker will add or remove the alert from the active alerts table. E: CheckerServlet requests the list of alerts from Checker and sends the response back as XML. The conversion from JAXB object to XML is handled by Checker. MulticastGroup A B C CheckerServlet E XML Alert Server Incoming alerts clients (rx)(Handle client requests) Checker (bookkeeping) D mcmonitor (running Tomcat)

5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 8 Alert Server: Class Diagram CheckerServletCheckerMulticastGroupAOCFilter > AlertFilter ZeroTimeFilterFlagEventFilterAlertType edu.nrao.evla.commons.net edu.nrao.evla.xml.jaxb 0… 11

5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 9 Alert Server: Alert Description File The information contained in the Alert Description File comes from Excel tech docs maintained by electronics. The document is formatted as XML. The alert attributes are… –devId Device ID –mpId Monitor point ID –severity (5 levels) 0: Immediate: immediate maintenance is required at the equipment “Immediate Action Required” 1: Standard: maintenance is necessary, antenna NOT usable, “Standard Antenna Rule” 2: Minor: maintenance is necessary, antenna may be usable, “Write Maintenance Request” 3: Archive Event: No Maintenance action necessary “Write an Informational Maintenance Report” 4: Flagger Event: No Maintenance or operator action required –description A description of the alert. Something the operators might understand. –action A short message stating what – if any - action should be taken. –flag true or false, if true, indicates the data is not valid when this monitor point is in alert

5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 10 Alert Server: Alert Description File ……..

5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 11 Alert Server: alert.xsd Schema File "

5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 12 Alert Server: Filters Filters are implemented on the server-side to decrease the amount of data sent over the network. Filtering can be done on the client as well, but typically leads to duplicating source code and an increased packet size. Current Filters –aoc Filters alerts that originate from the AOC. –zerotime Filters alerts with a time of “00:00:00”. This is *usually* a result of MIBs sending alerts before time- synchronization –flag Filters alerts that affect data quality. Monitor points that have “flag=true” in the Alert Description File. Others (do not exist yet) –dcs** Filters alerts from the VLA antennas –time Returns active alerts over given time range –severity Returns active alerts for a specified severity

5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 13 Alert Server: Communication The alert server uses HTTP for communication URI construction and parameters – &filter= &id= &filter= &id=<id operation = “alertsinfo” or “alertclear” filter = “aoc”, “zerotime”, or “flag” id = the alert id (e.g., ea13.acu.azposerror) or “all” Examples – –

5-6 Dec, 2006EVLA M&C Critical Design ReviewRich Moeser 14 Alert Clients Operator Alert Screen (more on this in a later talk) Flagger (does not use the alert server, listens to direct alert multicasts) Web Interface –