23.08.2013 Views

Specification of Reactive Hardware/Software Systems - Electronic ...

Specification of Reactive Hardware/Software Systems - Electronic ...

Specification of Reactive Hardware/Software Systems - Electronic ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.9 Channel Hiding 97<br />

Servant A<br />

Supervisor 1<br />

Cluster X<br />

Servant B<br />

Servant G<br />

Supervisor 2<br />

Cluster Y<br />

Figure 4.24: Supervisors and Servants<br />

Servant H<br />

Servant B is peer independent, because it does not require the other part. Servant A is<br />

not peer independent.<br />

Depending on their communication fashion, cluster X and Y have an inward visibility<br />

that is limited to their internal aggregate objects. In a weakly distributed fashion Supervisor<br />

1 and Supervisor 2 are visible for each other. All parts (Servants) are invisible.<br />

There is no outward visibility for the parts <strong>of</strong> the aggregates. Servant B may have a<br />

subordinate temporal visibility to Supervisor 1. Servant A is invisible for Servant B.<br />

In general it is possible to decompose a system into a hierarchy <strong>of</strong> subsystems. It is<br />

recommended to create a corresponding hierarchy <strong>of</strong> supervisors. Such a structure can<br />

show responsibilities clearly and can lead to reusable and maintainable substructures.<br />

The more independent that subsystems are the better. In Figure 4.25 cluster Y has direct<br />

communication with cluster Z. These clusters become more independent when their<br />

inter-communication is redirected via Supervisor 1. This way they can become peer<br />

independent.<br />

4.9 Channel Hiding<br />

Clusters, aggregates, clustered aggregates, and other composites can hide the channels<br />

that are used for internal communication. Hiding has been described already for clustered<br />

aggregates in Subsection 4.6.4. Hiding can be used to restrict the connection points<br />

to a composite. Only visible channels can be used for connection <strong>of</strong> the composite to<br />

other objects or other composites. The hidden channels cannot be used for this purpose.<br />

The clustered composite in Figure 4.26 can only communicate with its environment via<br />

channels w, x and z. Channels a, b and c are hidden. They are visible only for the objects<br />

inside the cluster. Channels that pass the cluster boundary may have different inner and<br />

outer names. Figure 4.26 shows that Object A has a channel y that crosses the cluster<br />

boundary. The inner name <strong>of</strong> this channel is y, and the outer name <strong>of</strong> this channel is z.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!