1 Hyades Command Routing Message flow and data translation.

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

Scenario: EOT/EOT-R/COT Resident admitted March 10th Admitted for PT and OT following knee replacement for patient with CHF, COPD, shortness of breath.
AP STUDY SESSION 2.
1
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 4 Computing Platforms.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
Objectives: Generate and describe sequences. Vocabulary:
UNITED NATIONS Shipment Details Report – January 2006.
RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) Customer Supplier Customer authorizes Enrollment ( )
David Burdett May 11, 2004 Package Binding for WS CDL.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination. Introduction to the Business.
We need a common denominator to add these fractions.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
Local Customization Chapter 2. Local Customization 2-2 Objectives Customization Considerations Types of Data Elements Location for Locally Defined Data.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
Custom Statutory Programs Chapter 3. Customary Statutory Programs and Titles 3-2 Objectives Add Local Statutory Programs Create Customer Application For.
Custom Services and Training Provider Details Chapter 4.
CALENDAR.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt BlendsDigraphsShort.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
1. PHOTO INDEX Bayside: Page 5-7 Other Colour Leon: Page 8-10 Cabrera Page Canaria Page Driftwood Page 16 Florence Florence and Corfu Page.
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Break Time Remaining 10:00.
Turing Machines.
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
PP Test Review Sections 6-1 to 6-6
1 The Blue Café by Chris Rea My world is miles of endless roads.
Bright Futures Guidelines Priorities and Screening Tables
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
Bellwork Do the following problem on a ½ sheet of paper and turn in.
CS 6143 COMPUTER ARCHITECTURE II SPRING 2014 ACM Principles and Practice of Parallel Programming, PPoPP, 2006 Panel Presentations Parallel Processing is.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
Copyright © 2013, 2009, 2006 Pearson Education, Inc. 1 Section 5.5 Dividing Polynomials Copyright © 2013, 2009, 2006 Pearson Education, Inc. 1.
Sample Service Screenshots Enterprise Cloud Service 11.3.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 10 Routing Fundamentals and Subnets.
Adding Up In Chunks.
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
Subtraction: Adding UP
: 3 00.
5 minutes.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Analyzing Genes and Genomes
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Converting a Fraction to %
Clock will move after 1 minute
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
Immunobiology: The Immune System in Health & Disease Sixth Edition
Physics for Scientists & Engineers, 3rd Edition
Energy Generation in Mitochondria and Chlorplasts
Select a time to count down from the clock above
Murach’s OS/390 and z/OS JCLChapter 16, Slide 1 © 2002, Mike Murach & Associates, Inc.
1.step PMIT start + initial project data input Concept Concept.
1 Decidability continued…. 2 Theorem: For a recursively enumerable language it is undecidable to determine whether is finite Proof: We will reduce the.
Presentation transcript:

1 Hyades Command Routing Message flow and data translation

2 Purpose of this Presentation Test the sufficiency of the proposed command header format Demonstrate a possible message routing solution Prove that the solution is capable of handling complex routing –Multiple chained HCEs –Negotiated communication between agents

3 Caveats Connection between HCEs will not be supported in the next release. It is being considered now only to establish the sufficiency of the proposed protocol. Command ID names referenced in this presentation may not match the actual command ID names. The names herein are for discussion purposes only. Names in parentheses are not intended as part of the data being stored/transmitted. These names are used only to indicate to what the IDs refer. The command headers shown are not complete. Only those fields needed to follow the data flow are shown. While last engine ID is shown as if it were a field in the command header, it can actually be inferred from the object sending the message, so it is actually implicit.

4 Message Routing Rules (Part 1) When a client or agent sends a command to an HCE, it will use the IDs by which the HCE knows the components involved. As far as the client or agent knows or cares, these are the actual IDs of the components. When the HCE sends a command to a client or agent, it will use the IDs by which the sending HCE refers to the components involved. When an HCE forwards a command to another HCE, the destination ID will be the ID by which the target HCE refers to the destination component, but the source ID will be the ID by which the sending HCE refers to the source component. The last engine ID will be the ID by which the target HCE knows the sending HCE. When one HCE reveals another HCE to some component, the revealing HCE will give the revealed HCE the ID by which it refers to the component. The revealed HCE will add this component to its component table and its translation table for the revealing HCE.

5 Message Routing Rules (Part 2) When an HCE responds to a forwarded CID_QUERY_HCES command, it will not include the HCE that forwarded the request in the response (because the requester already knows about that HCE). When an HCE forwards the results of a CID_QUERY_HCES command, it will add any HCEs it did not previously know about to its own component table and translate the HCE IDs to the IDs it uses to identify those HCEs. When an HCE forwards the results of any command that requests an agent ID, it will add any agent it did not previously know about to its own component table and translate the agent IDs to the IDs it uses to identify those agents.

6 Example 1 Connections established

7 1. Initial State, no connections

8 2. Client connects to HCE-1

9 3. Agent-1 connects to HCE-2

10 4. Agent-2 connects to HCE-3

11 5. HCE-1 connects to HCE-2

12 6. HCE-2 connects to HCE-3

13 Example 2 Client discovers agents

14 1. Client queries HCE-1 for more HCEs

15 2. HCE-1 notifies HCE-2

16 3. HCE-1 replies to Client

17 4. Client queries HCE-2 for Agent-1

18 5. HCE-1 forwards the message to HCE-2

19 6. HCE-2 replies

20 7. HCE-1 updates tables, forwards the reply

21 8. Client queries HCE-2 for more HCEs

22 9. HCE-2 notifies HCE-3

HCE-2 replies

HCE-1 forwards the reply to the Client

Client requests Agent-2

HCE-3 replies

HCE-2 updates, translates, forwards

HCE-1 updates, translates, forwards

29 Example 3 The Client requests a GUID from Agent-2

30 1. Client send the command to HCE-1

31 2. HCE-1 forwards the command to HCE-2

32 3. HCE-2 forwards the command to HCE-3

33 4. HCE-3 forwards the command to Agent-2

34 5. Agent-2 sends a reply to HCE-3

35 6. HCE-3 forwards the reply to HCE-2

36 7. HCE-2 forwards the reply to HCE-1

37 8. HCE-1 forwards the reply to the client

38 Example 4 Client initiates communication between Agent-1 and Agent-2 using a proprietary interface

39 1. Client sends Agent-2s GUID to Agent-1

40 2. Agent-1 queries HCE-2 for Agent-2 (fails)

41 3. Agent-1 queries HCE-2 for more HCEs

42 4. HCE-2 notifies, replies

43 5. Agent-1 queries HCE-1 for Agent-2 (fails)

44 6. Agent-1 queries HCE-3 for Agent-2

45 7. HCE-3 replies

46 8. Agent-1 sends a command to Agent-2

47 Quod Erat Demonstradum