Model-based Prototyping of an Interoperability Protocol for Mobile Ad-hoc Networks
|
|
- Eleanor Clarke
- 6 years ago
- Views:
Transcription
1 Model-based Prototyping of an Interoperability Protocol for Mobile Ad-hoc s L.M. Kristensen, M. Westergaard, and P.C. Nørgaard 2 Department of Computer Science, University of Aarhus, Denmark 2Ericsson Danmark A/S, Telebit, Denmark
2 Motivation Validate Domain expert Core Core `("3ffe:00:3:40::3","3ffe:00:3:4 05::","3ffe:00:3:405::") `(ROUTING,{src="3ffe:00:3:40::2 ",dest="3ffe:00:3:40::",cont=dns _REQ("AHN(3)")}) Core `("3ffe:00:3:40::4","3ffe:00:3:4 06::","3ffe:00:3:406::") Gateway Gateway Config Gateway Gateway2 Config2 AdHoc Formal model `(RECEIVE("AHN(4)"),{src="3ffe:00 :3:405::",dest="all-nodes multicast",cont=gw_adv(("3ffe:00:3:40::"," 3ffe:00:3:405::"))})++ 3`(FLOODING("3ffe:00:3:405::"),{ src="3ffe:00:3:405::",dest="all-no des multicast",cont=gw_adv(("3ffe: 00:3:40::","3ffe:00:3:405::"))}) 4 AdHoc AdHoc FM expert Modeling Figure 2 shows the approach taken to use CPN models to develop a prototype of the interoperability protocol. A CPN model (lower left of Fig. 2) has been developed by modelling the natural language protocol specification [22] (lower right) of the interoperability protocol. The modelling activity transforms the natural language specification into a formal executable specification represented by the CPN model. The CPN model captures the network architecture depicted in Fig. and the protocol mechanisms of the interoperability protocol, e.g., the periodic transmission of advertisements, the dynamic updates of the DNS database, and traffic flows between hosts in the core network and nodes in the ad-hoc network. The Specification
3 Methodology Explore and interact Core Core `("3ffe:00:3:40::3","3ffe:00:3:4 05::","3ffe:00:3:405::") `(ROUTING,{src="3ffe:00:3:40::2 ",dest="3ffe:00:3:40::",cont=dns _REQ("AHN(3)")}) Core `("3ffe:00:3:40::4","3ffe:00:3:4 06::","3ffe:00:3:406::") Gateway Gateway Animation Config Gateway Gateway2 Config2 AdHoc Formal model `(RECEIVE("AHN(4)"),{src="3ffe:00 :3:405::",dest="all-nodes multicast",cont=gw_adv(("3ffe:00:3:40::"," 3ffe:00:3:405::"))})++ 3`(FLOODING("3ffe:00:3:405::"),{ src="3ffe:00:3:405::",dest="all-no des multicast",cont=gw_adv(("3ffe: 00:3:40::","3ffe:00:3:405::"))}) 4 AdHoc AdHoc FM expert Modeling Domain expert Figure 2 shows the approach taken to use CPN models to develop a prototype of the interoperability protocol. A CPN model (lower left of Fig. 2) has been developed by modelling the natural language protocol specification [22] (lower right) of the interoperability protocol. The modelling activity transforms the natural language specification into a formal executable specification represented by the CPN model. The CPN model captures the network architecture depicted in Fig. and the protocol mechanisms of the interoperability protocol, e.g., the periodic transmission of advertisements, the dynamic updates of the DNS database, and traffic flows between hosts in the core network and nodes in the ad-hoc network. The Specification
4 Overview The project A solution: dynamic DNS and renumbering A formal model prototype Visualizing the formal model prototype Lessons learned
5 The Project Gateways A B C MN MN MN MN MN MN Core network Ad-hoc network Possible solutions Mobile IP Mobile host routes injected by gateways into the core network Dynamic DNS and renumbering
6 Scenario
7 Router Advertisements
8 Mobility & DNS Update
9 Mobility & DNS Update
10 Coloured Petri Nets Bi-partite directed labeled graph (places and transitions) Places can contain tokens (e.g 2, token, or ) Transitions can occur, thereby moving tokens from input-places to output-places
11 Coloured Petri Nets Example Transition Tokens which can occur ipadr `"3ffe:00:3:40::" DNSAdr IPAdr `("AHN(3)","3ffe:00:3:405::3")++ `("AHN(4)","3ffe:00:3:405::4")++ `("AHN(5)","3ffe:00:3:406::5") PlacesTransitions ipadr DNSRequest (symname,resipadr) 3 DNS Database SymNamexIPAdr (ROUTING, (RECEIVE ipadr, {src = ipadr, {src = srcipadr, dest = srcipadr, dest = ipadr, cont = DNS_REP (symname,resipadr)}) cont = DNS_REQ symname}) (symname,newipadr) DNSUpdate (symname,resipadr) (RECEIVE ipadr, {src = newipadr, dest = ipadr, cont = DNS_UPD (symname,newipadr)}) I/O Core `(ROUTING,{src="3ffe:00:3:40:: `(RECEIVE("3ffe:00:3:40::"),{src CmdxPacket ",dest="3ffe:00:3:40::2",cont=dns ="3ffe:00:3:40::2",dest="3ffe:00: _REP(("AHN(3)","3ffe:00:3:405::3")) 3:40::",cont=DNS_REQ("AHN(3)")}) })
12 Model `("3ffe:00:3:40::3","3ffe:00:3:4 05::","3ffe:00:3:405::") `(ROUTING,{src="3ffe:00:3:40::2 ",dest="3ffe:00:3:40::",cont=dns _REQ("AHN(3)")}) Gateway Config Gateway `(RECEIVE("AHN(4)"),{src="3ffe:00 :3:405::",dest="all-nodes multicast",cont=gw_adv(("3ffe:00:3:40::"," 3ffe:00:3:405::"))})++ 3`(FLOODING("3ffe:00:3:405::"),{ src="3ffe:00:3:405::",dest="all-no des multicast",cont=gw_adv(("3ffe: 00:3:40::","3ffe:00:3:405::"))}) 4 Core Core AdHoc AdHoc Core Gateway Gateway2 AdHoc `("3ffe:00:3:40::4","3ffe:00:3:4 06::","3ffe:00:3:406::") Config2
13 Tying the Model to the Animation input (srcipadr, nhipadr, content); output (); We are able to annotate transitions with codesegments, which are executed whenever the action show_flow(srcipadr, nhipadr, content) transition occurs I/O `(ROUTING,{src="3ffe:00:3:40:: ",dest="3ffe:00:3:40::2",cont=dns _REP(("AHN(3)","3ffe:00:3:405::3")) }) Core CmdxPacket input (srcipadr, nhipadr, content); output (); action (ROUTING, { src = srcipadr, show_flow(srcipadr, nhipadr, content) dest = destipadr, cont = content}) routinginformation Route (RECEIVE nhipadr, [nhipadr = FindNextHop routinginformation destipadr] {src = srcipadr,dest=destipadr,cont=content}) `[("3ffe:00:3:405::","3ffe:00:3:40 ::3"),("3ffe:00:3:406::","3ffe:00:3 :40::4")] RoutingInformation RoutingInformation
14 Advantages of Model-based Prototypes Easier to control and reproduce scenarios Implementation details can be abstracted away Setup of physical network equipment is not required Larger scenarios can be investigated
15 Advantages of Integration of Formal Models with Informal Animation Behavior is as defined by the formal model Knowledge of the formal modeling language is not required Presentation for military leaders is possible Validation that the implemented prototype corresponds to the specification
16 Future Work Enhancements of the modeling language to automatically trigger events in the visualization Synchronous events: the current presentation is quite verbose Asynchronous events: not really possible - in this project we use polling, which clutters the formal model
17 Sending Data
18 Sending Data and Mobility
Distributed Algorithms. The Leader Election Problem. 1.2 The Network Model. Applications. 1 The Problem and the Model. Lesson two Leader Election
The Problem and the Model Distributed Algorithms Lesson two Leader Election. The problem What is a leader A leader is a member that all other nodes acknowledge as being distinguished to perform some special
More informationSpecification and Testing of Banknote Processing Systems with Coloured Petri Nets
Specification and Testing of Banknote Processing Systems with Coloured Petri Nets Munich, 06/17/2010 30th TAV Agenda Automated testing in the software development process Motivation for system specifications
More informationEE249 Discussion Petri Nets: Properties, Analysis and Applications - T. Murata. Chang-Ching Wu 10/9/2007
EE249 Discussion Petri Nets: Properties, Analysis and Applications - T. Murata Chang-Ching Wu 10/9/2007 What are Petri Nets A graphical & modeling tool. Describe systems that are concurrent, asynchronous,
More informationCODING TCPN MODELS INTO THE SIMIO SIMULATION ENVIRONMENT
CODING TCPN MODELS INTO THE SIMIO SIMULATION ENVIRONMENT Miguel Mujica (a), Miquel Angel Piera (b) (a,b) Autonomous University of Barcelona, Faculty of Telecommunications and Systems Engineering, 08193,
More informationColoured Petri Nets Modelling and Validation of Concurrent Systems. Chapter 1: Modelling and Validation
Coloured Petri Nets Modelling and Validation of Concurrent Systems Chapter 1: Modelling and Validation Lars M. Kristensen Department of Computing Bergen University College, NORWAY Email: lmkr@hib.no /
More informationDatabases Lesson 03 Data Cache Consistency Maintenance in Mobile and Web Environments
Databases Lesson 03 Data Cache Consistency Maintenance in Mobile and Web Environments Oxford University Press 2007. All rights reserved. 1 Access Latency in mobile environment A device needs a data-record
More informationCOLORED PETRI NETS IN THE SIMULATION OF ETL STANDARD TASKS THE SURROGATE KEY PIPELINING CASE
COLORED PETRI NETS IN THE SIMULATION OF ETL STANDARD TASKS THE SURROGATE KEY PIPELINING CASE Diogo Silva Orlando Belo João M. Fernandes ALGORITMI R&D Centre University of Minho Portugal E-mail: diogosantossilva@gmail.com,
More informationCPN Tools for Editing, Simulating, and Analysing. Coloured Petri Nets.
CPN Tools for Editing, Simulating, and Analysing Coloured Petri Nets Anne Vinter Ratzer, Lisa Wells, Henry Michael Lassen, Mads Laursen, Jacob Frank Qvortrup, Martin Stig Stissing, Michael Westergaard,
More informationManagement Science Letters
Management Science Letters 4 (2014) 111 116 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl A new method for converting extended version of petri
More informationSupporting the Workflow Management System Development Process with YAWL
Supporting the Workflow Management System Development Process with YAWL R.S. Mans 1, W.M.P. van der Aalst 1 Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. ox 513,
More informationTool Demonstrations. Organized by Eric Verbeek. 24th International Conference on Application and Theory of Petri Nets
June 2003 Tool Demonstrations Organized by Eric Verbeek 24th International Conference on Application and Theory of Petri Nets International Conference on Business Process Management Eindhoven, The Netherlands,
More informationCPN Tools 4: Multi-formalism and Extensibility
4: Multi-formalism and Extensibility Michael Westergaard 1,2, 1 Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands m.westergaard@tue.nl 2 National Research
More informationA Brief Introduction to Coloured Petri Nets
A Brief Introduction to Coloured Petri Nets Kurt Jensen Computer Science Department, University of Aarhus NyMunkegade, Bldg. 540, DK-8000 AarhusC, Denmark E-mml: kjensen9 WWV~: http://www.daimi.aau.dk/~kjensen/
More informationExpressing Environment Assumptions and Real-time Requirements for a Distributed Embedded System with Shared Variables
Expressing Environment Assumptions and Real-time Requirements for a Distributed Embedded System with Shared Variables Simon Tjell and João M. Fernandes Abstract In a distributed embedded system, it is
More informationDifferent Layers Lecture 20
Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,
More informationPragmatics Annotated Coloured Petri Nets for Protocol Software Generation and Verification
Pragmatics Annotated Coloured Petri Nets for Protocol Software Generation and Verification Kent I.F. Simonsen 1, 2 Lars M. Kristensen 1 Ekkart Kindler 2 Department of Computing 1 Bergen University College
More informationEfficient Implementation of Prioritized Transitions for High-level Petri Nets
Efficient Implementation of Prioritized Transitions for High-level Petri Nets Michael Westergaard and H.M.W. (Eric) Verbeek Department of Mathematics and Computer Science, Eindhoven University of Technology,
More informationColored Petri Net Evaluation Tool. Stephen Rojcewicz CS 2310
Colored Petri Net Evaluation Tool Stephen Rojcewicz CS 2310 Motivating Example (Colored Petri Nets) Consider a gesture-driven application interface. The system must detect three kinds of gestures and respond
More informationSimulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University
Simulation with NS-2 and CPN tools Ying-Dar Lin Department of Computer Science, National Chiao Tung University Outline NS-2 simulator NS-2 basics Basic syntax Tracing a simple network Mini and term projects
More informationPetri Nets. Petri Nets. Petri Net Example. Systems are specified as a directed bipartite graph. The two kinds of nodes in the graph:
System Design&Methodologies Fö - 1 System Design&Methodologies Fö - 2 Petri Nets 1. Basic Petri Net Model 2. Properties and Analysis of Petri Nets 3. Extended Petri Net Models Petri Nets Systems are specified
More informationON-LINE QUALITATIVE MODEL-BASED DIAGNOSIS OF TECHNOLOGICAL SYSTEMS USING COLORED PETRI NETS
ON-LINE QUALITATIVE MODEL-BASED DIAGNOSIS OF TECHNOLOGICAL SYSTEMS USING COLORED PETRI NETS Adrien Leitold 1 Miklós Gerzson 2 Anna I. Pózna 2 and Katalin M. Hangos 2,3 1 Department of Mathematics 3 Process
More informationA Simulator for high level Petri Nets: Model based design and implementation
A Simulator for high level Petri Nets: Model based design and implementation Mindaugas Laganeckas Kongens Lyngby 2012 IMM-M.Sc.-2012-101 Technical University of Denmark Informatics and Mathematical Modelling
More informationTechological Advantages of Mobile IPv6
Techological Advantages of Mobile IPv6 Nokia Research Center Mountain View, CA USA Charles E. Perkins http://people.nokia.net/charliep charliep@iprg.nokia.com 1 NOKIA NERD2000.PPT/ 11/20/00 / HFl Outline
More informationAnalysis of Broadcast Authentication Mechanism in Selected Network Topologies
RADIOENGINEERING, VOL. 20, NO. 1, APRIL 2011 167 Analysis of Broadcast Authentication Mechanism in Selected Network Topologies Tomas VANEK, Matej ROHLIK Dept. of Telecommunication Engineering, Czech Technical
More informationSlide 1. Slide 2. Slide 3. Technological Advantages of Mobile IPv6. Outline of Presentation. Earth with 2 Billion Mobile devices
Slide 1 Technological Advantages of Mobile IPv6 Nokia Research Center Mountain View, CA USA Charles E. Perkins http://people.nokia.net/charliep charliep@iprg.nokia.com 1 NOKIA NERD2000.PPT/ 11/20/00 /
More information3D-Visualization of Petri Net Models: Concept and Realization
3D-Visualization of Petri Net Models: Concept and Realization Ekkart Kindler and Csaba Páles Department of Computer Science, University of Paderborn {kindler,cpales}@upb.de Abstract. We present a simple
More informationCisco IOS DECnet Commands
Cisco IOS DECnet Commands Digital Equipment Corporation developed the DECnet protocol to provide a way for its computers to communicate with one another. Currently in its fifth major product release, DECnet
More informationINF672 Protocol Safety and Verification. Karthik Bhargavan Xavier Rival Thomas Clausen
INF672 Protocol Safety and Verication Karthik Bhargavan Xavier Rival Thomas Clausen 1 Course Outline Lecture 1 [Today, Sep 15] Introduction, Motivating Examples Lectures 2-4 [Sep 22,29, Oct 6] Network
More informationL3VPN Configuration. L3VPN Overview. Introduction to L3VPN
Table of Contents L3VPN Configuration 1 L3VPN Overview 1 Introduction to L3VPN 1 L3VPN Concepts 2 L3VPN Networking Schemes 3 OSPF VPN Extension 6 L3VPN Configuration Task List 8 Configuring VPN Instances
More informationModeling and Analysis of General Internet Signaling Transport Protocol (GIST) using Coloured Petri Nets
Modeling and Analysis of General Internet Signaling Transport Protocol (GIST) using Coloured Petri Nets Atul Kumar Lecturer(CSE & IT Dept.) Baba Banda Singh Bahadur Polytechnic College Fatehgarh Sahib(Punjab),
More informationEmbedding Java Types in CPN Tools
Embedding Java Types in CPN Tools K.B. Lassen and M. Westergaard Department of Computer Science, University of Aarhus, IT-parken, Aabogade 34, DK-8200 Aarhus N, Denmark, Email: {k.b.lassen,mw}@daimi.au.dk
More informationInstructions to use PIPE+
Instructions to use PIPE+ PIPE+ is implemented under the environment of Eclipse. User can import it into eclipse to view source code as well as run the program. The user can choose RunGUI to run the tool.
More informationFormal Support for QVT-Relations with Coloured Petri Nets
Formal Support for QVT-Relations with Coloured Petri Nets Juan de Lara Univ. Autónoma de Madrid (Spain) MODELS 2009 Denver, Colorado, USA Esther Guerra 1 Univ. Carlos III de Madrid (Spain) Motivation Model-to-Model
More informationBasic Low Level Concepts
Course Outline Basic Low Level Concepts Case Studies Operation through multiple switches: Topologies & Routing v Direct, indirect, regular, irregular Formal models and analysis for deadlock and livelock
More informationSimulation of Routing Protocol with CoS/QoS Enhancements in Heterogeneous Communication Network
Enhancements in Heterogeneous Communication Network M. Sc. Eng. Emil Kubera M. Sc. Eng. Joanna Sliwa M. Sc. Eng. Krzysztof Zubel Eng. Adrian Mroczko Military Communication Institute 05-130 Zegrze Poland
More informationISP Border Definition. Alexander Azimov
ISP Border Definition Alexander Azimov ISP goal (one ASN) BGP Decision Process Step Attribute Transit 1 Highest Local Preference value Non-transit 2 Lowest AS Path length Transit 3 Lowest
More informationUnicast Routing. TCP/IP class
Unicast Routing TCP/IP class Routing Protocols intro RIP and son of RIP OSPF BGP odd bodkins NAT TCP/IP Internetworking Protocols 2 divide routing world into 3 parts topology IETF ISO/OSI same link or
More informationTowards A High-Level Petri Net Type Definition
Towards A High-Level Petri Net Type Definition Michael Westergaard Department of Computer Science, University of Aarhus, IT-parken, Aabogade 34, DK-8200 Aarhus N, Denmark, Email: mw@daimi.au.dk Abstract.
More informationChapter 9 RIP Commands
Chapter 9 RIP Commands default-metric Defines the global default-metric value that will be assigned to all external routes imported into RIP for redistribution. RIP must be active on the routing switch
More informationObtaining Memory-Efficient Reachability Graph Representations Using the Sweep-Line Method
Obtaining Memory-Efficient Reachability Graph Representations Using the Sweep-Line Method Thomas Mailund and Michael Westergaard Department of Computer Science, University of Aarhus, IT-parken, Aabogade
More informationA Practical Approach for a Workflow Management System
A Practical Approach for a Workflow Management System Simone Pellegrini, Francesco Giacomini, Antonia Ghiselli INFN Cnaf Viale B. Pichat, 6/2 40127 Bologna {simone.pellegrini francesco.giacomini antonia.ghiselli}@cnaf.infn.it
More informationValidation of enterprise architecture through colored Petri nets
Management Science Letters 5 (2015) 311 320 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl Validation of enterprise architecture through colored
More informationOperation Manual BFD-GR H3C S3610&S5510 Series Ethernet Switches. Table of Contents
Table of Contents Table of Contents... 1-1 1.1 Introduction to BFD... 1-1 1.1.1 How BFD Works... 1-1 1.1.2 BFD Packet Format... 1-3 1.1.3 Protocols and Standards... 1-5 1.2 BFD Configuration Task List...
More informationTOWARDS COSIMULATING SYSTEMC AND COLOURED PETRI NET MODELS FOR SOC FUNCTIONAL AND PERFORMANCE EVALUATION
TOWARDS COSIMULATING SYSTEMC AND COLOURED PETRI NET MODELS FOR SOC FUNCTIONAL AND PERFORMANCE EVALUATION M. Westergaard (a), L.M. Kristensen (b), M. Kuusela (c) (a) Department of Computer Science, Aarhus
More informationModelling Functionality of Train Control Systems using Petri Nets
Modelling Functionality of Train Control Systems using Petri Nets Michael Meyer zu Hörste and Hardi Hungar German Aerospace Centre (DLR) Institute of Transportation Systems Lilienthaplatz 7, 38108 Braunschweig,
More informationConfiguration Guide. For Managing EAPs via EAP Controller
Guide For Managing EAPs via EAP Controller 1910012313 REV1.0.0 December 2017 CONTENTS 1 Overview... 1 2 Configuration... 2 2.1 Managing EAPs in the Same Subnet... 2 2.2 Managing EAPs in Different Subnets...
More informationCS4514 Real-Time Systems and Modeling
CS4514 Real-Time Systems and Modeling Fall 2015 José M. Garrido Department of Computer Science College of Computing and Software Engineering Kennesaw State University Real-Time Systems RTS are computer
More informationRouting. Routing. Overview. Overview. Routing vs. Forwarding. Why Routing
Routing Dr. Arjan Durresi Department of Computer Science Louisiana State University Overview Routing vs. Forwarding Routing Algorithms, Distance Vector, Link State Dijkstra s Algorithm ARPAnet Routing
More informationACL and ABF Commands
This module describes the Cisco IOS XR software commands used to configure the ACL and ABF commands for Broadband Network Gateway (BNG) on the Cisco ASR 9000 Series Router. For details regarding the related
More informationA Low-Overhead DVR Based Multicast Routing Protocol for Clustered MANET
A Low-Overhead DVR Based Multicast Routing Protocol for Clustered MANET B. Gupta, S. Rahimi, R. Jandhyala, and V. Doraiswamy Department of Computer Science, Southern Illinois University, Carbondale, IL
More informationWEEK 5 - APPLICATION OF PETRI NETS. 4.4 Producers-consumers problem with priority
4.4 Producers-consumers problem with priority The net shown in Fig. 27 represents a producers-consumers system with priority, i.e., consumer A has priority over consumer B in the sense that A can consume
More informationRepresentation of Action Spaces in Multiple Levels of Detail
Representation of Action Spaces in Multiple Levels of Detail Andreas Hasselberg Dirk Söffker Institute of Flight Guidance, German Aerospace Center, Braunschweig, Germany (e-mail: andreas.hasselberg@dlr.de)
More informationCMPSCI 521/621 HW6 Solutions
CMPSCI 521/621 HW6 Solutions Problem 1 (based on Xiang Zhao s solution). The node labels are an ordered pair that indicates the location of the program counter in the two different tasks. The first element
More informationWireless and Mobile Networks
Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationExercise 1 INTERNET. x.x.x.254. net /24. net /24. x.x.x.33. x.x.x.254. x.x.x.52. x.x.x.254. x.x.x.254. x.x.x.
Exercise 1 Given the IP network below: Assign feasible IP addresses to the interfaces and write down a feasible routing table for routers A and B guaranteeing full connectivity x.x.x.33 x.x.x.254 net 131.175.16.0/24
More informationInitial motivation: 32-bit address space soon to be completely allocated. Additional motivation:
IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:
More informationPROTECT NETWORK EDGE WITH BGP, URPF AND S/RTBH. by John Brown, CityLink Telecommunications, LLC
PROTECT NETWORK EDGE WITH BGP, URPF AND S/RTBH by John Brown, CityLink Telecommunications, LLC About Me Based in Albuquerque, NM US Will travel for packet$, food, and good Scotch.! MikroTik Trainer CityLink
More informationModelling and Simulation of a Network Management System using Hierarchical Coloured Petri Nets. Extended version
Modelling and Simulation of a Network Management System using Hierarchical Coloured Petri Nets. Extended version Søren Christensen Computer Science Department Aarhus University Ny Munkegade, Bldg. 540
More informationComposability Test of BOM based models using Petri Nets
I. Mahmood, R. Ayani, V. Vlassov and F. Moradi 7 Composability Test of BOM based models using Petri Nets Imran Mahmood 1, Rassul Ayani 1, Vladimir Vlassov 1, and Farshad Moradi 2 1 Royal Institute of Technology
More informationTVOICE: Troubleshooting Cisco Unified Communications v8
Course Objectives Describe a systematic methodology to troubleshoot Cisco Unified Communications solutions Isolate and troubleshoot reported issues that relate to Cisco Unified Communications Manager.
More informationIntroduction to Networking
Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block
More informationHP0-Y49. Applying HP FlexNetwork Fundamentals.
HP HP0-Y49 Applying HP FlexNetwork Fundamentals http://killexams.com/exam-detail/hp0-y49 QUESTION: 54 Refer to the Exhibit. Exhibit: HP Comware switch configuration. [Comware] vlan 100 [Comware-vlan100]
More informationHP 5920 & 5900 Switch Series
HP 5920 & 5900 Switch Series MCE Configuration Guide Part number: 5998-2896 Software version: Release2207 Document version: 6W100-20121130 Legal and notice information Copyright 2012 Hewlett-Packard Development
More informationSystem Design and Methodology/ Embedded Systems Design (Modeling and Design of Embedded Systems)
Design&Methodologies Fö 1&2-1 Design&Methodologies Fö 1&2-2 Course Information Design and Methodology/ Embedded s Design (Modeling and Design of Embedded s) TDTS07/TDDI08 Web page: http://www.ida.liu.se/~tdts07
More informationLecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011
Lecture 4: Intradomain Routing CS 598: Advanced Internetworking Matthew Caesar February 1, 011 1 Robert. How can routers find paths? Robert s local DNS server 10.1.8.7 A 10.1.0.0/16 10.1.0.1 Routing Table
More informationA framework to evaluate 5G networks for smart and fail-safe communications
A framework to evaluate 5G networks for smart and fail-safe communications in ERTMS/ETCS Roberto Canonico (*), Stefano Marrone (**), Roberto Nardone (*), and Valeria Vittorini (*) (*) Università degli
More informationSecondary Address Support
Secondary Address Support Peter Jones July 21, 2003 7/21/2003 3:19 PM pj_sec_addr_02.ppt 1 Secondary Addresses Allows for more efficient support of protocols like RFC 2338 Virtual Router Redundancy Protocol.
More informationSDL. Jian-Jia Chen (slides are based on Peter Marwedel) TU Dortmund, Informatik 年 10 月 18 日. technische universität dortmund
12 SDL Jian-Jia Chen (slides are based on Peter Marwedel) TU Dortmund, Informatik 12 2017 年 10 月 18 日 Springer, 2010 These slides use Microsoft clip arts. Microsoft copyright restrictions apply. Models
More informationWIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH
WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH Mesh networking is a powerful way to route data. This methodology
More informationModule 16 An Internet Exchange Point
ISP Workshop Lab Module 16 An Internet Exchange Point Objective: To investigate methods for connecting to an Internet Exchange Point. Prerequisites: Modules 12 and 13, and the Exchange Points Presentation
More informationModeling Behavioral Design Patterns of Concurrent Objects
Modeling Behavioral Design Patterns of Concurrent Objects Robert G. Pettit IV The Aerospace Corporation 15049 Conference Center Dr Chantilly, Virginia (USA) +1-703-324-8937 rob.pettit@aero.org Hassan Gomaa
More informationWeek 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols
Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they
More informationNetwork Gateway Services John Enck
51-20-39 Network Gateway Services John Enck Payoff In a TCP/IP network, a gateway has a specific purpose. The TCP/IP architecture even includes formal protocols that apply only to TCP/IP gateways. In a
More informationCSC 4900 Computer Networks: Network Layer
CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized
More informationIntroduction to Software Specifications and Data Flow Diagrams. Neelam Gupta The University of Arizona
Introduction to Software Specifications and Data Flow Diagrams Neelam Gupta The University of Arizona Specification A broad term that means definition Used at different stages of software development for
More informationDiscrete-event simulation of railway systems with hybrid models
Discrete-event simulation of railway systems with hybrid models G. Decknatel & E. Schnieder Imtitutfur Regelungs- undautomatisierungstechnik, Technische Universitat Braunschweig, Braunschweig, Germany.
More informationConfiguring CDP. Understanding CDP CHAPTER. This chapter describes how to configure Cisco Discovery Protocol (CDP) on the Catalyst 3560 switch.
21 CHAPTER This chapter describes how to configure Cisco Discovery Protocol (CDP) on the Catalyst 3560 switch. Note For complete syntax and usage information for the commands used in this chapter, refer
More informationImplementing the WebSocket Protocol based on Formal Modelling and Automated Code Generation
Implementing the WebSocket Protocol based on Formal Modelling and Automated Code Generation Lars M. Kristensen Kent I.F. Simonsen 1,2 Bergen University College 1 Technical University of Denmark 2 Norway
More informationAnnouncements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday
ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui
More informationISO/IEC INTERNATIONAL STANDARD. Software and system engineering High-level Petri nets Part 1: Concepts, definitions and graphical notation
INTERNATIONAL STANDARD ISO/IEC 15909-1 First edition 2004-12-01 Software and system engineering High-level Petri nets Part 1: Concepts, definitions and graphical notation Ingénierie du logiciel et du système
More informationCoverability Graph and Fairness
Coverability Graph and Fairness prof.dr.ir. Wil van der Aalst www.vdaalst.com Recall reachability analysis or1 x r1 rg1 g1 go1 o1 r2 rg2 g2 go2 o2 or2 Petri net standard properties Boundedness Terminating
More informationBISS 2013: Simulation for Decision Support
BISS 2013: Simulation for Decision Support Lecture 06 Conceptual Modelling Concepts and Techniques Peer-Olaf Siebers (Nottingham University) Stephan Onggo (Lancaster University) pos@cs.nott.ac.uk Motivation
More informationThe BITX M2M ecosystem. Detailed product sheet
The BITX M2M ecosystem Detailed product sheet Stop wasting energy! Finally an M2M application development platform that doesn t have you running in circles. Why building it all from scratch every time?
More informationPersiform: Performance Engineering Based on
Persiform: Performance Engineering Based on Simulation of Formal Functional Models Olivier Constant, Marius Bozga, Susanne Graf -- Verimag, Grenoble Nicolas Moteau, Wei Monin -- France Telecom R&D 2007
More informationFEATURE DISAMBIGUATION
FEATURE DISAMBIGUATION "Call Forwarding is a mechanism, not a feature." Pamela Zave AT&T Laboratories Research Florham Park, New Jersey, USA pamela@research.att.com FEATURE AMBIGUITY A and B are addresses
More informationComputer Networks Technologies and Services January 31 st, Question 11
Computer Networks Technologies and Services January 31 st, 2014 First and last name... Student ID...... Answers to multiple choice questions 1 2 3 4 5 6 7 8 9 10 Answers to essay questions Question 11
More informationIMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS
IMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS Leontyev Denis Vasilevich, Kharitonov Dmitry Ivanovich and Tarasov Georgiy Vitalievich ABSTRACT Institute of Automation and
More informationModeling and Performance Evaluation of ATM Switches
Modeling and Performance Evaluation of ATM Switches KHALIL SHIHAB Department of Computer Science, Sultan Qaboos University, P.O. Box 36, Al-Khod 123, Oman Abstract: - In this work, we present a Colored
More informationCNPE Communications and Networks Lab Book: Data Transmission Over Digital Networks
Lab Book: Data Transmission Over Digital Networks Contents Data Transmission Over Digital Networks... 3 Lab Objectives... 3 Lab Resources... 3 Task 1 Build the Home Network... 3 Task 2 Configure IP Addresses...
More informationCN [Network Devices]
Q`.1 Explain Repeater. A repeater is a device that operates only at the PHYSICAL layer. A repeater can be used to increase the length of the network by put the effect on the signal. It connects two segments
More informationOnline Conformance Checking for Petri Nets and Event Streams
Downloaded from orbit.dtu.dk on: Apr 30, 2018 Online Conformance Checking for Petri Nets and Event Streams Burattin, Andrea Published in: Online Proceedings of the BPM Demo Track 2017 Publication date:
More informationPerformance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
More informationREPRESENTATION, SIMULATION AND CONTROL OF MANUFACTURING PROCESS WITH DIFFERENT FORMS OF UNCERTAINTIES. Hyunsoo Lee Hongsuk Park Amarnath Banerjee
Proceedings of the 2009 Winter Simulation Conference M. D. Rossetti, R. R. Hill, B. Johansson, A. Dunkin and R. G. Ingalls, eds. ABSTRACT REPRESENTATION, SIMULATION AND CONTROL OF MANUFACTURING PROCESS
More informationA model-based functional test approach to verify system requirements
A model-based functional test approach to verify system requirements Stefan Miller 1, Ralf Bogusch 2 1 CASSIDIAN, Wörthstraße 85, 89077 Ulm 2 CASSIDIAN, Claude-Dornier-Straße, 88090 Immenstaad {stefan.miller
More informationShare Count Analysis HEADERS
Measuring Network Privacy with It s 11PM. DO YOU KNOW WHERE YOUR Share Count Analysis HEADERS ARE? David Naylor Peter Steenkiste GOAL measure how private a network architecture or protocol is GOAL measure
More informationValidation of UML Models for Interactive Systems with CPN and SPIN. Parne Balu Laxman
Validation of UML Models for Interactive Systems with CPN and SPIN Parne Balu Laxman Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela-769 008, Odisha, India
More informationBy: Chaitanya Settaluri Devendra Kalia
By: Chaitanya Settaluri Devendra Kalia What is an embedded system? An embedded system Uses a controller to perform some function Is not perceived as a computer Software is used for features and flexibility
More informationBGP. Internal and External BGP 2005/03/11. (C) Herbert Haas
BGP Internal and External BGP (C) Herbert Haas 2005/03/11 and 2 Internal and External BGP messages are exchanged between peers of different ASs peers should be directly connected Inside an AS this information
More informationChapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP
Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP 4.5 routing algorithms link state
More informationComputation of enabled transition instances for colored Petri nets
Computation of enabled transition instances for colored Petri nets Fei Liu and Monika Heiner Department of Computer Science, Brandenburg University of Technology Postbox 10 13 44, 03013 Cottbus, Germany
More information