YY, 1 From UML to Petri Nets: the PCM-based Methodology Salvatore Distefano, Marco Scarpa and Antonio Puliafito Abstract—In this paper, we present. Unified Modeling Language (UML) and Colored Petri Net (CPN) have a lot of advantages D. SalvatoreFrom UML to Petri Nets: The PCM-Based Methodology. Our experience in the integration of process algebra based performance validation in an industrial From UML to Petri Nets: The PCM-Based Methodology.
|Published (Last):||11 January 2013|
|PDF File Size:||4.39 Mb|
|ePub File Size:||18.10 Mb|
|Price:||Free* [*Free Regsitration Required]|
A pending request into a software tion is represented as use case diagram, identifying the passive resource is represented by one token into one of corresponding actors and scenarios.
From UML to Petri Nets: The PCM-Based Methodology
Each component of the deployment diagram these classes are either open or closed. For PCM of Fig.
All the rules to derive pcm-bqsed Petri net from a PCM and the performance measures assessable from the former are carefully detailed. Help Center Find new research papers in: If these transitions are enabled, then the composition is implemented by merging all places charac- resource is busy.
Our example contains two workloads: In order to download music the user must be Moreover, we have also evaluated utilization and through- registered. The access policy of the Website scenario is in the following. The specific access management policy scheduler, buffer policy, CSM is based on the SPT profile and can be mapped into etc. Enter the email address you signed up with and we’ll email you a reset link.
Skip methodologh search form Skip to main content. A limit of such ap- implements the translation from the SPT-annotated UML proach lies in the assumption of infinite resources, namely model to the PN by exploiting an intermediate model, the by disregarding the hardware influence.
PerformanceContext has two at- workloads, PTransitionStep objects are also used to tributes: This paper has 55 citations. Skip to main content. Log In Sign Up. The intermediate model is translated into a performance model subsequently evaluated.
Each scenario is executed by a job class or user elaborating the former is represented by a deployment dia- class with a given load intensity WorkLoad objectand gram step 1. He has been involved in  M. The website application example: In corresponding deployment diagram. The com- the user Sending Banner while processing the incoming position operation we adopt is a simplified version of that request.
There was a problem providing the content you requested
The step 4 is devoted to analyze the performance model. ACM Press,pp. The process is iterated PScenario is realized by a PTransitionStep object methodokogy the performance requirements are satisfied.
If the request is well-formed, the website sends detailed in , exclusively applied on places. This represents the software archi- the software architecture and viceversa, merging different tecture ,ethodology system structure by using deployment workloads into a unique scenario; the capability to de- diagrams, associating software architecture modules to fine specific access policies regulating both the capacity components.
Request through the place labeled ARFork1, into two When the methdology branch terminates its elaboration, the parallel branches outgoing from the PDeciderStep S2a step following the PMergeStep is performed.
Some- model mapping the original UML model, is reported in Fig. The The approach we proposed in ,  splits the pwtri transformation from UML is divided into two sequential from the UML design domain to the performance domain steps: A PTimedStep o is associated to a predecessor is similar to that of the Fig. The BLPN mod- o: In particular, by these we name.
From UML to Petri Nets: The PCM-Based Methodology
The paper is focused on the mapping from the PCM to the performance domain. At most three requests incoming to the Website Petri net Search for additional papers on this topic. At the paper time he is a post doc researcher at the University of Messina. It is very Fig. The link between WorkLoad and with the supervision methodklogy the modeler.
Dif- , , , or simulation . An open workload can be further specified by detailed sub-component dia- OpenWorkload has a stream of requests that arrives grams hierarchically nested. The Access Policy the system. We assume an infinite server semantics only when corresponding processing ners. The elementary steps are: In the following, we rhe use the usual notations P, M and sub-model. His interests include pmc-based http: Performance modelling and analysis of real time systems: In section 6 an type.
Therefore, only steps 1 and 5 need the interaction to characterize specific constructs. The validity of the proposed technique is and cheeper one. The final PN model is obtained The technique developed in the ArgoPerformance tool, exploiting compositional technique.
This 4 b and 4 c respectively, are almost the same, the only characterization has allowed to use the compositional ap- differences are in the attribute of transition DT and in the proach. The from the original UML model.