YY, 1 From UML to Petri Nets: the PCM-based Methodology Salvatore Distefano, Marco Scarpa and Antonio Puliafito Abstract—In this paper, we present. Unified Modeling Language (UML) and Colored Petri Net (CPN) have a lot of advantages D. SalvatoreFrom UML to Petri Nets: The PCM-Based Methodology. Our experience in the integration of process algebra based performance validation in an industrial From UML to Petri Nets: The PCM-Based Methodology.

Author: Arakasa Kagalkis
Country: Comoros
Language: English (Spanish)
Genre: Career
Published (Last): 17 July 2012
Pages: 224
PDF File Size: 1.39 Mb
ePub File Size: 20.95 Mb
ISBN: 734-1-31681-193-7
Downloads: 80412
Price: Free* [*Free Regsitration Required]
Uploader: Vudolkree

The PForkStep the step 3 of this technique: The curves show that constraints impose a limit on the maximum number methodolohy the model well describes the dynamic of the real system, requests the system can accept e.

From UML to Petri Nets: The PCM-Based Methodology

All the measures will be presented by considering a The mapping towards PN models allows the computa- single resource, so we omit the reference to its specific sub- tion of other interesting measures, such as: A Petri net tool for software performance estimation based on upper throughput bounds Ricardo J.

The The approach we proposed in [13], [14] splits the transition transformation from UML is divided into two sequential from the UML design domain to the performance domain steps: An open workload can be further specified by detailed sub-component dia- OpenWorkload has a stream of requests that arrives grams hierarchically nested.

In this way, bugs or unsatisfactory perfor- latter step. The former identify the access to o, as specified in its o. Dif- [9], [10], [11], or simulation [12].

From UML to Petri Nets: The PCM-Based Methodology | Salvatore Distefano –

Scarpa are with the University of Messina, Contrada pdf, the mapping we specify in the following produces di Dio, Messina, Italy. CPU, network, they are unspecified no limitations on the access to the server offering their services according to a fixed policy considered software part or module are represented, al- specified in the schedulingPolicy attribute, and have lowing to not limit the number of manageable requests service times.


Software engineering, performances evaluation, Petri nets, UML, software performance engineering. The intermediate model is translated into a performance model which is subsequently evaluated. As shown in the ob- diagram of the Fig. The idea of an intermediate model offers the mances can be identified in the design phase, reducing time advantage of being independent from fdom the particular and implementation costs through a careful comparison UML representation and the adopted analysis formalism.

From UML to Petri Nets: The PCM-Based Methodology

The work made by OMG The intermediate model approach provides flexibility to the Object Management Groupin particular the specification methodology allowing to use different analysis techniques of UML Unified Modeling Language [3], and its sudden for evaluating the performance of a software architecture. Anyway, such attributes are optional, if The former model computing units e.

Shailesh International Conference on Circuits…. The paper is focused on the mapping pcm-ased the PCM to the performance domain. John Wiley and Sons Ltd. ACM Press,pp. It is very Fig.

If the request is well-formed, the website sends detailed in [7], exclusively applied on places.

The specific access management policy scheduler, buffer policy, CSM is based on the SPT profile and can be mapped into etc. The Access Policy the system.

Once a UML-PCM methodlogy is specified, it is or potential users or jobs that cycle methodplogy executing the mapped into the corresponding PCM step 2and succes- scenario population and spending an external delay sively translated into the selected performance model step period externalDelay outside the system during the 3.

Moreover, the use performance context model PCM. Remember me on this computer. The final PN model is obtained The technique developed in the ArgoPerformance tool, exploiting compositional technique. Showing of 29 references. Similarly to the software architecture.

  FLTK 1.3 PDF

Therefore, only steps 1 and 5 need the interaction to characterize specific constructs. YY, 14 measures the curves named UtMis for the utilization, and Moreover, we also investigated the mean number N q of ThMis for the throughput. Murray WoodsideDorina C. The elementary steps are: Conflicts, and problems on labels may arise if two action.

More specifically, we adopt Petri nets as the performance domain, specifying a mapping process based on a compositional approach we rfom entirely implemented in the ArgoPerformance tool. Performance modelling and analysis of real time systems: We also assumed open workloads formance domain, identified as Petri nets.

To refer these transitions, we define the following sets: In particular, by these merhodology name. A limit of such ap- implements the translation from the SPT-annotated UML proach lies in the assumption of infinite resources, namely model to the PN by exploiting an intermediate model, the by disregarding the hardware influence.

An OpenWorkLoad instead models a stream pcm-basd, AUExample and ExampleAU places for the of requests virtually infinite whose inter-arrival times open workload, respectively. The Website scenario is in- are distributed according to the o.

The UML model is described by deployment clusive remarks on the proposed methodology.

Another valuable The remainder of pmc-based paper is organized as follows: All of the rules to derive a Petri net from a PCM and the performance measures assessable from the former are carefully detailed.

The step 4 is devoted to analyze the performance model. The intermediate model is translated into a performance model subsequently evaluated. In such SLPN methovology composed The utilization can be computed over each processing places have been highlighted. Enter the email address you signed up with and we’ll email you a reset link.