This Article 
 Bibliographic References 
 Add to: 
The HIDENETS Holistic Approach for the Analysis of Large Critical Mobile Systems
June 2011 (vol. 10 no. 6)
pp. 783-796
Andrea Bondavalli, University of Florence, Florence
Ossama Hamouda, LAAS-CNRS, University of Toulouse, Toulouse
Mohamed Kaâniche, LAAS-CNRS, University of Toulouse, Toulouse
Paolo Lollini, University of Florence, Florence
Istvan Majzik, Budapest University of Technology and Economics, Budapest
Hans-Peter Schwefel, Forschungszentrum Telekommunikation Wien, Austria and Aalborg University, Aalborg
Dealing with large, critical mobile systems and infrastructures where ongoing changes and resilience are paramount leads to very complex and difficult challenges for system evaluation. These challenges call for approaches that are able to integrate several evaluation methods for the quantitative assessment of QoS indicators which have been applied so far only to a limited extent. In this paper, we propose the holistic evaluation framework developed during the recently concluded FP6-HIDENETS project. It is based on abstraction and decomposition, and it exploits the interactions among different evaluation techniques including analytical, simulative, and experimental measurement approaches, to manage system complexity. The feasibility of the holistic approach for the analysis of a complete end-to-end scenario is first illustrated presenting two examples where mobility simulation is used in combination with stochastic analytical modeling, and then through the development and implementation of an evaluation workflow integrating several tools and model transformation steps.

[1] M. Radimirsch et al., "Use-Case Scenarios and Preliminary Reference Model," EU FP6 IST Project HIDENETS, Deliverable D1.1, http://www.hidenets.aau.dkPublic+Deliverables , Sept. 2006.
[2] C. Jones and B. Randell, "Dependable Pervasive Systems," Technical Report CS-TR-839, Univ. of Newcastle Research Report, 2004.
[3] IST-FP6-26979 HIDENETS - HIghly DEpendable IP-Based NETworks and Services, http:/, 2011.
[4] M. Kaâniche, P. Lollini, A. Bondavalli, and K. Kanoun, "Modeling the Resilience of Large and Evolving Systems," Int'l J. Performability Eng., vol. 4, no. 2, pp. 153-168, 2008.
[5] J.-C. Laprie, "From Dependability to Resilience," Proc. 38th IEEE/IFIP Int'l Conf. Dependable Systems and Networks (DSN '08), 2008.
[6] B. Könning et al., "Final Evaluation, Consolidated Results and Guidelines," EU FP6 IST Project HIDENETS, Deliverable D1.3, http://www.hidenets.aau.dkPublic+Deliverables , Jan. 2009.
[7] P. Lollini et al., "Evaluation Methodologies, Techniques and Tools (Final Version)," EU FP6 IST Project HIDENETS, Deliverable D4.1.2, http://www.hidenets.aau.dkPublic+Deliverables , Dec. 2007.
[8] M. Lanus, L. Yin, and K.S. Trivedi, "Hierarchical Composition and Aggregation of State-Based Availability and Performability Models," IEEE Trans. Reliability, vol. 52, no. 1, pp. 44-52, Mar. 2003.
[9] A. Klemm, C. Lindemann, and M. Lohmann, "Traffic Modeling and Characterization for UMTS Networks," Proc. IEEE Global Telecomm. Conf. (GLOBECOM '01), vol. 3, pp. 1741-1746, 2001.
[10] T. Israr, M. Woodside, and G. Franks, "Interaction Tree Algorithms to Extract Effective Architecture and Layered Performance Models from Traces," J. Systems and Software, vol. 80, no. 4, pp. 474-492, 2007.
[11] J. Arlat, A. Costes, Y. Crouzet, J.-C. Laprie, and D. Powell, "Fault Injection and Dependability Evaluation of Fault-Tolerant Systems," IEEE Trans. Computers, vol. 42, no. 8, pp. 913-923, Aug. 1993.
[12] DBench - Project Reports Section, Project Short Final Report, http://www.laas.frDBench, 2011.
[13] D. Miorandi and E. Altman, "Connectivity in One-Dimensional Ad-Hoc Networks: A Queueing Theoretical Approach," Wireless Networks, vol. 12, pp. 573-587, 2006.
[14] Y. Cheng and T.G. Robertazzi, "Critical Connectivity Phenomena in Multihop Radio Models," IEEE Trans. Comm., vol. 37, no. 7, pp. 770-777, July 1989.
[15] T. Spyropoulos, A. Jindal, and K. Psounis, "An Analytical Study of Fundamental Mobility Properties for Encounterbased Protocols," Int'l J. Autonomous and Adaptive Comm. Systems, vol. 1, no. 1, pp. 4-40, 2008.
[16] J. Härri, F. Filali, and C. Bonnet, "Mobility Models for Vehicular Ad Hoc Networks: A Survey and Taxonomy," IEEE Comm. Surveys & Tutorials, vol. 11, no. 4, pp. 19-41, Dec. 2009.
[17] M.-O. Killijian, M. Roy, G. Séverac, and C. Zanon, "Data Backup for Mobile Nodes: A Cooperative Middleware and Experimentation Platform," Proc. Workshop Architecting Dependable Systems, 2009.
[18] L. Courtès, O. Hamouda, M. Kaâniche, M.-O. Killijian, and D. Powell, "Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices," Proc. 13th IEEE Int'l Symp. Pacific Rim Dependable Computing (PRDC '07), 2007.
[19] L. Xu, V. Bohossain, J. Bruck, and D.G. Wagner, "Low Density MDS Codes and Factors of Complete Graphs," IEEE Trans. Information Theory, vol. 45, no. 1, pp. 1817-1826, Nov. 1999.
[20] O. Hamouda, M. Kaâniche, J.-G. Rasmussen, E. Matthiesen Møller, and H-P. Schwefel, "Connectivity Dynamics in Vehicular Freeway Scenarios," Proc. Second Int'l Conf. Global Information Infrastructure Symp. (GIIS '09), 2009.
[21] A. Bondavalli, P. Lollini, and L. Montecchi, "Analysis of User Perceived QoS in Ubiquitous UMTS Environments Subject to Faults," Proc. Int'l Workshop Software Technologies for Embedded and Ubiquitous Systems, pp. 186-197, 2008.
[22] W.H. Sanders and J.F. Meyer, "Stochastic Activity Networks: Formal Definitions and Concepts," Lectures on Formal Methods and Performance Analysis, pp. 315-343, Springer Verlag, 2001.
[23] A. Bondavalli, P. Lollini, and L. Montecchi, "QoS Perceived by Users of Ubiquitous UMTS: Compositional Models and Thorough Analysis," J. Software, Special Issue on Selected Papers of the Sixth IFIP Workshop Software Technologies for Future Embedded and Ubiquitous Systems, vol. 4, no. 7, pp. 675-685, 2009.
[24] D. Daly, D.D. Deavours, J.M. Doyle, P.G. Webster, and W.H. Sanders, "Möbius: An Extensible Tool for Performance and Dependability Modeling," Proc. Computer Performance Evaluation/TOOLS 2000, pp. 332-336, 2000.
[25] M. Nawrocki, H. Aghvami, and M. Dohler, Understanding UMTS Radio Network Modelling, Planning and Automated Optimisation: Theory and Practice, John Wiley & Sons, 2006.
[26] H. Holma and A. Toskala, WCDMA for UMTS: Radio Access for Third Generation Mobile Communications. John Wiley & Sons, 2004.
[27] M. Kovacs, P. Lollini, I. Majzik, and A. Bondavalli, "An Integrated Framework for the Dependability Evaluation of Distributed Mobile Applications," Proc. RISE/EFTS Joint Int'l Workshop Software Eng. for Resilent Systems (SERENE '08), pp. 29-38, Nov. 2008.
[28] A. Nickelsen and H.-P. Schwefel, "Emulation of Wireless Multi-Hop Topologies with Online Mobility Simulations," Int'l J. Advances in Telecomm., vol. 2, no. 1, pp. 27-36, June 2009.
[29] I. Majzik, A. Pataricza, and A. Bondavalli, "Stochastic Dependability Analysis of System Architecture Based on UML Models," Architecting Dependable Systems, R. de Lemos, C. Gacek, and A. Romanovsky, eds., pp. 219-244, Springer Verlag, 2003.
[30] A. Bondavalli, I. Mura, S. Chiaradonna, R. Filippi, S. Poli, and F. Sandrini, "DEEM: A Tool for the Dependability Modeling and Evaluation of Multiple Phased Systems," Proc. Int'l Conf. Dependable Systems and Networks, pp. 231-236, 2000.
[31] I. Majzik, P. Domokos, and M. Magyar, "Tool-Supported Dependability Evaluation of Redundant Architectures in Computer Based Control Systems," Proc. Sixth Symp. Formal Methods for Automation and Safety in Railway and Automotive Systems (FORMS/FORMAT '07), pp. 342-352, 2007.
[32] I. Mura and A. Bondavalli, "Markov Regenerative Stochastic Petri Nets to Model and Evaluate Phased Mission Systems Dependability," IEEE Trans. Computers, vol. 50, no. 12, pp. 1337-1351, Dec. 2001.
[33] A. Balogh and D. Varró, "Advanced Model Transformation Language Constructs in the VIATRA2 Framework," Proc. ACM Symp. Applied Computing (SAC '06), pp. 1280-1287, Apr. 2006.

Index Terms:
Computer systems organization, communication/networking and information technology, mobile computing, mobile communication systems, computing methodologies, simulation, modeling, and visualization, model development, modeling methodologies, computer applications, mobile applications, pervasive computing.
Andrea Bondavalli, Ossama Hamouda, Mohamed Kaâniche, Paolo Lollini, Istvan Majzik, Hans-Peter Schwefel, "The HIDENETS Holistic Approach for the Analysis of Large Critical Mobile Systems," IEEE Transactions on Mobile Computing, vol. 10, no. 6, pp. 783-796, June 2011, doi:10.1109/TMC.2010.222
Usage of this product signifies your acceptance of the Terms of Use.