|
1
|
- September 20-22, 2011
- San Jose, CA
- Day 1
- Systems Engineering Team
- connected vehicle Core System
Architecture/Requirements
- Workshop #2
|
|
2
|
- Welcome, Program Overview
- Introduction – Needs, Architecture, Requirements
- Architecture Viewpoints Discussions
- Enterprise
- Functional
- Connectivity
- Communications
- Information
- Core System Deployment
- Core System Risks
- Next Steps
|
|
3
|
|
|
4
|
|
|
5
|
|
|
6
|
- Welcome, Program Overview
|
|
7
|
- Who we are, how we got here
- Purpose for this week
- Present the Core System Requirements and Architecture
- Open discussion, questions/comments captured
|
|
8
|
- Speakers/Facilitators
- Walt Fehr, US DOT
- David Binkley, Lockheed Martin
- Kevin Hunter, Lockheed Martin
- Tom Lusco, Iteris
- Logistics
- Breaks, Lunch – see agenda
- Comments/Questions on Web – please use “chat” box
|
|
9
|
|
|
10
|
|
|
11
|
|
|
12
|
- Background, Overview of the overall environment, Core System and its
components
|
|
13
|
- Safety
- 32,788 deaths in ‘10
- 5.5M crashes/year
- Leading cause of death for ages 4-34
- Mobility
- 4.8 billion hours of travel delay
- $115 billion cost of urban congestion
- Environment
- 3.9 billion gallons of wasted fuel
- Emissions
|
|
14
|
- Drivers, Passengers, System Operators
- Using wireless communications technologies and applications
- Realize
- Safety, Mobility, Environmental benefits
|
|
15
|
|
|
16
|
- Since VII, additional communications media available
- Expanding of both mobile platforms (all vehicle types, plus pedestrians
and other road users) and potential users of data, providers of data
(not just traditional transportation players)
- Applications development expanding
- Data capture and usage decoupled from a single large system
|
|
17
|
- The connected vehicle environment needs some enabling system that
- Provides common services and interfaces
- Provides trusted environment for the applications and users
- Supports diversity
- Applications, communications media, deployment models
- Supports the future
- Future technologies, extensible architecture
|
|
18
|
- Enable data transfers between system users
- Are in a secure, trusted environment
- Enabling trust between parties that have no direct relationship
- Enabling secure data exchange between parties that have no direct
relationship
- Enabling the exchange of data between parties that have data and
parties that want data
|
|
19
|
- What the Core System Does NOT do…
- Store data for long periods of time
- Host applications
- Sit in a single location
- Require any particular communications or hardware technologies (other
than what will be needed to support the requirements)
- Provide 1609.2 CA/RA functionality
|
|
20
|
|
|
21
|
|
|
22
|
|
|
23
|
|
|
24
|
- Give me the data – current traffic, all roads, all the time
- Standardize it
- Support multiple modes – include Cyclists, Pedestrians, other vulnerable
users
- Set driver’s expectations: inform them when safety or mobility services
are available
- Support targeted broadcasts to sets of vehicles by location, type,
individual
- Support multiple uses of data sets via standardized interfaces, services
- Support roaming for users devices
- Provide authentication, ensuring users that messages are from legitimate
sources
|
|
25
|
- Characterizes the Current System
- Identifies users’ needs
- Defines concepts of the proposed system
- Shows operational scenarios of the proposed system
- Summarizes impacts, provided supporting analysis
|
|
26
|
- Collection of services
- Heterogeneous community of systems, agencies, locations
- (Don’t think control center) – not a physical plant, it’s a collection
of services
- Different Deployment Considerations
- Standalone
- Collocated
- Distributed
|
|
27
|
|
|
28
|
|
|
29
|
- Review the Needs, how they’ve evolved
- Introduce System Architecture
- Introduce System Requirements
- Discuss Architecture Views
- Include requirements supporting each area, alternatives that were
explored
- Discuss Deployment Options, Overall Risks
|
|
30
|
- What’s driving the Core System
|
|
31
|
- 2 Types of Needs Addressed:
- User needs – capability required for that user to accomplish their goal
- System needs – capability required in order to meet the operational
goals
- In a nutshell:
- Provide trust/security
- Enable data exchanges
- Take care of itself
- Work with other cores
|
|
32
|
- Data protection
- Facilitate secure exchange of data
- Facilitate trust
- With and between System Users
- Revoke trust credentials when necessary
- Authorization
- Manage who can do what
- Verify
- Identify misbehavior and allow System Users to provide misbehavior
input
|
|
33
|
- Time
- Operate on a common time base (for components of the Core System)
- Network Services
- Support users accessing Core System over variety of communications
mechanisms
- Support connections to a private network (in addition to the Internet)
- Route communications between Cores and System Users if using a private
network
|
|
34
|
- Facilitate the provision of data
- Match data providers with data requesters/consumers
- Forward (or redistribute) data (publish-subscribe, aggregation,
anonymization, etc.)
- Facilitate situational-relevant distribution
|
|
35
|
- Take care of itself
- Service status
- Integrity protection
- System availability
- Performance monitoring
- System data security
- Preserve System User’s anonymity
|
|
36
|
- Coordinate activities with other Core Systems
- Support multiple, independent deployments
- While providing interoperable services across Cores
- And coordinating activities together to deliver information
consistently
|
|
37
|
- VII Privacy Policies Framework still applies
- IEEE 1609.x family used for DSRC
- X.509 based certificates except for DSRC-specific apps
- SAE J2735 basis for mobile user messages
- Standards may need to be developed or modified for Core System
interfaces
- Core System interfaces based on IPv6
|
|
38
|
- Comm will be provided by System Users
- Data (probe, basic safety) provided anonymously by mobile users
- Some vehicle based safety applications
may be mandatory (beyond scope of this effort)
- Other mobility applications will be opt-in
- Deployment of Cores may be evolutionary, regional
|
|
39
|
- 5 viewpoints and how they tell the story
|
|
40
|
- Architecture: The fundamental organization of a system, embodied in its
components, their relationships to each other and the environment, and
the principles governing its design and evolution. (IEEE
1471)
- Viewpoint: a framework of rules for developing architecture views based
on a related set of concerns
- View: a representation of the system from the perspective of a set of
concerns
|
|
41
|
|
|
42
|
- Stakeholders and their Concerns
- Viewpoint Specifications
- Views defined in accordance with those Viewpoints, each of which
addresses specific stakeholder concerns
- Traceability between objects in architecture to requirements in the SyRS
|
|
43
|
- Operators/Users of the Core System
- Transportation users
- Transportation system operators
- Core System admin personnel
- Along with
- Developers, Maintainers, Testers
- Managers, Acquirers
- Application and Device Developers
- Service Providers
- Policy Setters
|
|
44
|
|
|
45
|
- Provide framework to address all concerns
- Describe the system from different perspectives
- Describe the Core System as a set of Objects and interactions among them
- Expose a different set of design concerns and issues
- Provide the means for reasoning about aspects of the system
- Trace to requirements (in SyRS)
|
|
46
|
- Enterprise:
- Organizational entities and their relationships. Focuses on scope and
policy
|
|
47
|
- Functional:
- System as a collection of abstract objects that interact at interfaces
|
|
48
|
- Connectivity:
- System as a set of components that interact across links
|
|
49
|
- Communications:
- Mechanisms required to communicate between system components
|
|
50
|
- Information:
- Kinds of information handled by the system
|
|
51
|
|
|
52
|
- What is in each view?
- How do I read a view?
- Definitions
- Description
- Diagram
- Alternatives
|
|
53
|
- Addresses the relationships between organizations
- Roles those organizations play that involve various resources
|
|
54
|
|
|
55
|
- Focuses on the behavior, structure, and interaction of the functions
performed by the system
- Shows functions for each subsystem
- Traceable to functional requirements
- Color coding:
- Subsystems each represented by a different color
- Information Objects are the same color as the source Function object
|
|
56
|
|
|
57
|
|
|
58
|
- Composition of the physical elements (nodes) and their connections and
interactions
- Links are traceable to interface requirements
|
|
59
|
|
|
60
|
- Layered communications protocols between nodes
- Links are traceable to interface requirements
|
|
61
|
|
|
62
|
- Defines the Data objects: structure, relationships, metadata, and
constraints
- Traceable to interface, data requirements
|
|
63
|
|
|
64
|
- June 13 draft, reviewed at DC Workshop
- Views at varying levels of completeness
- Alternatives for evaluation/discussion
- Sep 6, reviewed here
- All views are complete, traced to requirements
- Alternatives evaluated - resulting choices documented in section 4,
rationale and dissenting alternatives in section 6
|
|
65
|
|
|
66
|
- Connectivity Viewpoint:
- High Level
- Core System Function Allocation
- State and Mode Transitions
- Communications Viewpoint:
- Mobile DSRC Device and Core
- Mobile Wide-Area Wireless User and Core
- Fixed Point Center/Field User and Core, Core2Core
- Core Routing
- Information Viewpoint
- Top Level External Objects
- Top Level Internal Objects
|
|
67
|
- Introduction, organization, definitions
|
|
68
|
- “Something that governs what, how well, and under what conditions a
product will achieve a given purpose”
|
|
69
|
- Key activities
- Elicit User Needs
- Analyze User Needs
- Derived Requirements
- Validate Requirements
- Manage Requirements
|
|
70
|
- Levels of Requirements
- System
- Subsystem
- With sub-requirements as needed
- Types of Requirements
- Functional Requirements
- Performance Requirements
- Interface Requirements
- Non-Functional System Requirements
- Constraints
|
|
71
|
- Requirements specify what the system “shall” do to satisfy the needs of
the users
- Traceable to both Needs and Architecture components
|
|
72
|
- Look for structure/grammar of requirements
- [ID] [Actor] [Action] [Target] [Constraint] [Localization]
- Identifier
- Actor/Subject
- Action Verb
- Target/Object
- Constraint, Localization
- 3.1.1.1.11 The Core System shall transmit the 4.5.1.3.1.3 Complete CRL
to other Core Systems.
|
|
73
|
- 3.1.1.1.11 The Core System shall transmit the 4.5.1.3.1.3 Complete CRL
to other Core Systems.
|
|
74
|
- Necessary
- Concise
- Attainable
- Standalone
- Consistent
- Unambiguous
- Verifiable
|
|
75
|
- Higher Level requirements, Related to Needs
- Not necessarily related to any one part of the system
- Includes types of requirements that will be decomposed to subsystem
level later
- Functional
- Performance
- Interface
- Includes some types of requirements not found in subsystem requirements
- Non-functional, ‘ilities’
- Constraints
|
|
76
|
- Core System Requirements go from the System level down to a subsystem
level
- What shall the ___ subsystem do?
- To satisfy the overall system requirements and needs of the system
- Subsystem Requirements Divided by Type
- Functional
- Performance
- Interface
|
|
77
|
- Will review along with the Architecture Views
- Data Distribution
- Security Credentials Configuration, Distribution, Management, including
Misbehavior Management
- Core2Core interactions
- Core Decryption, Networking
|