Model-based Prototyping of an Interoperability Protocol for Mobile Ad-hoc Networks

Size: px
Start display at page:

Download "Model-based Prototyping of an Interoperability Protocol for Mobile Ad-hoc Networks"

Transcription

1 Model-based Prototyping of an Interoperability Protocol for Mobile Ad-hoc s L.M. Kristensen, M. Westergaard, and P.C. Nørgaard 2 Department of Computer Science, University of Aarhus, Denmark 2Ericsson Danmark A/S, Telebit, Denmark

2 Motivation Validate Domain expert Core Core `("3ffe:00:3:40::3","3ffe:00:3:4 05::","3ffe:00:3:405::") `(ROUTING,{src="3ffe:00:3:40::2 ",dest="3ffe:00:3:40::",cont=dns _REQ("AHN(3)")}) Core `("3ffe:00:3:40::4","3ffe:00:3:4 06::","3ffe:00:3:406::") Gateway Gateway Config Gateway Gateway2 Config2 AdHoc Formal model `(RECEIVE("AHN(4)"),{src="3ffe:00 :3:405::",dest="all-nodes multicast",cont=gw_adv(("3ffe:00:3:40::"," 3ffe:00:3:405::"))})++ 3`(FLOODING("3ffe:00:3:405::"),{ src="3ffe:00:3:405::",dest="all-no des multicast",cont=gw_adv(("3ffe: 00:3:40::","3ffe:00:3:405::"))}) 4 AdHoc AdHoc FM expert Modeling Figure 2 shows the approach taken to use CPN models to develop a prototype of the interoperability protocol. A CPN model (lower left of Fig. 2) has been developed by modelling the natural language protocol specification [22] (lower right) of the interoperability protocol. The modelling activity transforms the natural language specification into a formal executable specification represented by the CPN model. The CPN model captures the network architecture depicted in Fig. and the protocol mechanisms of the interoperability protocol, e.g., the periodic transmission of advertisements, the dynamic updates of the DNS database, and traffic flows between hosts in the core network and nodes in the ad-hoc network. The Specification

3 Methodology Explore and interact Core Core `("3ffe:00:3:40::3","3ffe:00:3:4 05::","3ffe:00:3:405::") `(ROUTING,{src="3ffe:00:3:40::2 ",dest="3ffe:00:3:40::",cont=dns _REQ("AHN(3)")}) Core `("3ffe:00:3:40::4","3ffe:00:3:4 06::","3ffe:00:3:406::") Gateway Gateway Animation Config Gateway Gateway2 Config2 AdHoc Formal model `(RECEIVE("AHN(4)"),{src="3ffe:00 :3:405::",dest="all-nodes multicast",cont=gw_adv(("3ffe:00:3:40::"," 3ffe:00:3:405::"))})++ 3`(FLOODING("3ffe:00:3:405::"),{ src="3ffe:00:3:405::",dest="all-no des multicast",cont=gw_adv(("3ffe: 00:3:40::","3ffe:00:3:405::"))}) 4 AdHoc AdHoc FM expert Modeling Domain expert Figure 2 shows the approach taken to use CPN models to develop a prototype of the interoperability protocol. A CPN model (lower left of Fig. 2) has been developed by modelling the natural language protocol specification [22] (lower right) of the interoperability protocol. The modelling activity transforms the natural language specification into a formal executable specification represented by the CPN model. The CPN model captures the network architecture depicted in Fig. and the protocol mechanisms of the interoperability protocol, e.g., the periodic transmission of advertisements, the dynamic updates of the DNS database, and traffic flows between hosts in the core network and nodes in the ad-hoc network. The Specification

4 Overview The project A solution: dynamic DNS and renumbering A formal model prototype Visualizing the formal model prototype Lessons learned

5 The Project Gateways A B C MN MN MN MN MN MN Core network Ad-hoc network Possible solutions Mobile IP Mobile host routes injected by gateways into the core network Dynamic DNS and renumbering

6 Scenario

7 Router Advertisements

8 Mobility & DNS Update

9 Mobility & DNS Update

10 Coloured Petri Nets Bi-partite directed labeled graph (places and transitions) Places can contain tokens (e.g 2, token, or ) Transitions can occur, thereby moving tokens from input-places to output-places

11 Coloured Petri Nets Example Transition Tokens which can occur ipadr `"3ffe:00:3:40::" DNSAdr IPAdr `("AHN(3)","3ffe:00:3:405::3")++ `("AHN(4)","3ffe:00:3:405::4")++ `("AHN(5)","3ffe:00:3:406::5") PlacesTransitions ipadr DNSRequest (symname,resipadr) 3 DNS Database SymNamexIPAdr (ROUTING, (RECEIVE ipadr, {src = ipadr, {src = srcipadr, dest = srcipadr, dest = ipadr, cont = DNS_REP (symname,resipadr)}) cont = DNS_REQ symname}) (symname,newipadr) DNSUpdate (symname,resipadr) (RECEIVE ipadr, {src = newipadr, dest = ipadr, cont = DNS_UPD (symname,newipadr)}) I/O Core `(ROUTING,{src="3ffe:00:3:40:: `(RECEIVE("3ffe:00:3:40::"),{src CmdxPacket ",dest="3ffe:00:3:40::2",cont=dns ="3ffe:00:3:40::2",dest="3ffe:00: _REP(("AHN(3)","3ffe:00:3:405::3")) 3:40::",cont=DNS_REQ("AHN(3)")}) })

12 Model `("3ffe:00:3:40::3","3ffe:00:3:4 05::","3ffe:00:3:405::") `(ROUTING,{src="3ffe:00:3:40::2 ",dest="3ffe:00:3:40::",cont=dns _REQ("AHN(3)")}) Gateway Config Gateway `(RECEIVE("AHN(4)"),{src="3ffe:00 :3:405::",dest="all-nodes multicast",cont=gw_adv(("3ffe:00:3:40::"," 3ffe:00:3:405::"))})++ 3`(FLOODING("3ffe:00:3:405::"),{ src="3ffe:00:3:405::",dest="all-no des multicast",cont=gw_adv(("3ffe: 00:3:40::","3ffe:00:3:405::"))}) 4 Core Core AdHoc AdHoc Core Gateway Gateway2 AdHoc `("3ffe:00:3:40::4","3ffe:00:3:4 06::","3ffe:00:3:406::") Config2

13 Tying the Model to the Animation input (srcipadr, nhipadr, content); output (); We are able to annotate transitions with codesegments, which are executed whenever the action show_flow(srcipadr, nhipadr, content) transition occurs I/O `(ROUTING,{src="3ffe:00:3:40:: ",dest="3ffe:00:3:40::2",cont=dns _REP(("AHN(3)","3ffe:00:3:405::3")) }) Core CmdxPacket input (srcipadr, nhipadr, content); output (); action (ROUTING, { src = srcipadr, show_flow(srcipadr, nhipadr, content) dest = destipadr, cont = content}) routinginformation Route (RECEIVE nhipadr, [nhipadr = FindNextHop routinginformation destipadr] {src = srcipadr,dest=destipadr,cont=content}) `[("3ffe:00:3:405::","3ffe:00:3:40 ::3"),("3ffe:00:3:406::","3ffe:00:3 :40::4")] RoutingInformation RoutingInformation

14 Advantages of Model-based Prototypes Easier to control and reproduce scenarios Implementation details can be abstracted away Setup of physical network equipment is not required Larger scenarios can be investigated

15 Advantages of Integration of Formal Models with Informal Animation Behavior is as defined by the formal model Knowledge of the formal modeling language is not required Presentation for military leaders is possible Validation that the implemented prototype corresponds to the specification

16 Future Work Enhancements of the modeling language to automatically trigger events in the visualization Synchronous events: the current presentation is quite verbose Asynchronous events: not really possible - in this project we use polling, which clutters the formal model

17 Sending Data

18 Sending Data and Mobility

Distributed Algorithms. The Leader Election Problem. 1.2 The Network Model. Applications. 1 The Problem and the Model. Lesson two Leader Election

Distributed Algorithms. The Leader Election Problem. 1.2 The Network Model. Applications. 1 The Problem and the Model. Lesson two Leader Election The Problem and the Model Distributed Algorithms Lesson two Leader Election. The problem What is a leader A leader is a member that all other nodes acknowledge as being distinguished to perform some special

More information

Specification and Testing of Banknote Processing Systems with Coloured Petri Nets

Specification and Testing of Banknote Processing Systems with Coloured Petri Nets Specification and Testing of Banknote Processing Systems with Coloured Petri Nets Munich, 06/17/2010 30th TAV Agenda Automated testing in the software development process Motivation for system specifications

More information

EE249 Discussion Petri Nets: Properties, Analysis and Applications - T. Murata. Chang-Ching Wu 10/9/2007

EE249 Discussion Petri Nets: Properties, Analysis and Applications - T. Murata. Chang-Ching Wu 10/9/2007 EE249 Discussion Petri Nets: Properties, Analysis and Applications - T. Murata Chang-Ching Wu 10/9/2007 What are Petri Nets A graphical & modeling tool. Describe systems that are concurrent, asynchronous,

More information

CODING TCPN MODELS INTO THE SIMIO SIMULATION ENVIRONMENT

CODING TCPN MODELS INTO THE SIMIO SIMULATION ENVIRONMENT CODING TCPN MODELS INTO THE SIMIO SIMULATION ENVIRONMENT Miguel Mujica (a), Miquel Angel Piera (b) (a,b) Autonomous University of Barcelona, Faculty of Telecommunications and Systems Engineering, 08193,

More information

Coloured Petri Nets Modelling and Validation of Concurrent Systems. Chapter 1: Modelling and Validation

Coloured Petri Nets Modelling and Validation of Concurrent Systems. Chapter 1: Modelling and Validation Coloured Petri Nets Modelling and Validation of Concurrent Systems Chapter 1: Modelling and Validation Lars M. Kristensen Department of Computing Bergen University College, NORWAY Email: lmkr@hib.no /

More information

Databases Lesson 03 Data Cache Consistency Maintenance in Mobile and Web Environments

Databases Lesson 03 Data Cache Consistency Maintenance in Mobile and Web Environments Databases Lesson 03 Data Cache Consistency Maintenance in Mobile and Web Environments Oxford University Press 2007. All rights reserved. 1 Access Latency in mobile environment A device needs a data-record

More information

COLORED PETRI NETS IN THE SIMULATION OF ETL STANDARD TASKS THE SURROGATE KEY PIPELINING CASE

COLORED PETRI NETS IN THE SIMULATION OF ETL STANDARD TASKS THE SURROGATE KEY PIPELINING CASE COLORED PETRI NETS IN THE SIMULATION OF ETL STANDARD TASKS THE SURROGATE KEY PIPELINING CASE Diogo Silva Orlando Belo João M. Fernandes ALGORITMI R&D Centre University of Minho Portugal E-mail: diogosantossilva@gmail.com,

More information

CPN Tools for Editing, Simulating, and Analysing. Coloured Petri Nets.

CPN Tools for Editing, Simulating, and Analysing. Coloured Petri Nets. CPN Tools for Editing, Simulating, and Analysing Coloured Petri Nets Anne Vinter Ratzer, Lisa Wells, Henry Michael Lassen, Mads Laursen, Jacob Frank Qvortrup, Martin Stig Stissing, Michael Westergaard,

More information

Management Science Letters

Management Science Letters Management Science Letters 4 (2014) 111 116 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl A new method for converting extended version of petri

More information

Supporting the Workflow Management System Development Process with YAWL

Supporting the Workflow Management System Development Process with YAWL Supporting the Workflow Management System Development Process with YAWL R.S. Mans 1, W.M.P. van der Aalst 1 Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. ox 513,

More information

Tool Demonstrations. Organized by Eric Verbeek. 24th International Conference on Application and Theory of Petri Nets

Tool Demonstrations. Organized by Eric Verbeek. 24th International Conference on Application and Theory of Petri Nets June 2003 Tool Demonstrations Organized by Eric Verbeek 24th International Conference on Application and Theory of Petri Nets International Conference on Business Process Management Eindhoven, The Netherlands,

More information

CPN Tools 4: Multi-formalism and Extensibility

CPN Tools 4: Multi-formalism and Extensibility 4: Multi-formalism and Extensibility Michael Westergaard 1,2, 1 Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands m.westergaard@tue.nl 2 National Research

More information

A Brief Introduction to Coloured Petri Nets

A Brief Introduction to Coloured Petri Nets A Brief Introduction to Coloured Petri Nets Kurt Jensen Computer Science Department, University of Aarhus NyMunkegade, Bldg. 540, DK-8000 AarhusC, Denmark E-mml: kjensen9 WWV~: http://www.daimi.aau.dk/~kjensen/

More information

Expressing Environment Assumptions and Real-time Requirements for a Distributed Embedded System with Shared Variables

Expressing Environment Assumptions and Real-time Requirements for a Distributed Embedded System with Shared Variables Expressing Environment Assumptions and Real-time Requirements for a Distributed Embedded System with Shared Variables Simon Tjell and João M. Fernandes Abstract In a distributed embedded system, it is

More information

Different Layers Lecture 20

Different Layers Lecture 20 Different Layers Lecture 20 10/15/2003 Jian Ren 1 The Network Layer 10/15/2003 Jian Ren 2 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host,

More information

Pragmatics Annotated Coloured Petri Nets for Protocol Software Generation and Verification

Pragmatics Annotated Coloured Petri Nets for Protocol Software Generation and Verification Pragmatics Annotated Coloured Petri Nets for Protocol Software Generation and Verification Kent I.F. Simonsen 1, 2 Lars M. Kristensen 1 Ekkart Kindler 2 Department of Computing 1 Bergen University College

More information

Efficient Implementation of Prioritized Transitions for High-level Petri Nets

Efficient Implementation of Prioritized Transitions for High-level Petri Nets Efficient Implementation of Prioritized Transitions for High-level Petri Nets Michael Westergaard and H.M.W. (Eric) Verbeek Department of Mathematics and Computer Science, Eindhoven University of Technology,

More information

Colored Petri Net Evaluation Tool. Stephen Rojcewicz CS 2310

Colored Petri Net Evaluation Tool. Stephen Rojcewicz CS 2310 Colored Petri Net Evaluation Tool Stephen Rojcewicz CS 2310 Motivating Example (Colored Petri Nets) Consider a gesture-driven application interface. The system must detect three kinds of gestures and respond

More information

Simulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University

Simulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University Simulation with NS-2 and CPN tools Ying-Dar Lin Department of Computer Science, National Chiao Tung University Outline NS-2 simulator NS-2 basics Basic syntax Tracing a simple network Mini and term projects

More information

Petri Nets. Petri Nets. Petri Net Example. Systems are specified as a directed bipartite graph. The two kinds of nodes in the graph:

Petri Nets. Petri Nets. Petri Net Example. Systems are specified as a directed bipartite graph. The two kinds of nodes in the graph: System Design&Methodologies Fö - 1 System Design&Methodologies Fö - 2 Petri Nets 1. Basic Petri Net Model 2. Properties and Analysis of Petri Nets 3. Extended Petri Net Models Petri Nets Systems are specified

More information

ON-LINE QUALITATIVE MODEL-BASED DIAGNOSIS OF TECHNOLOGICAL SYSTEMS USING COLORED PETRI NETS

ON-LINE QUALITATIVE MODEL-BASED DIAGNOSIS OF TECHNOLOGICAL SYSTEMS USING COLORED PETRI NETS ON-LINE QUALITATIVE MODEL-BASED DIAGNOSIS OF TECHNOLOGICAL SYSTEMS USING COLORED PETRI NETS Adrien Leitold 1 Miklós Gerzson 2 Anna I. Pózna 2 and Katalin M. Hangos 2,3 1 Department of Mathematics 3 Process

More information

A Simulator for high level Petri Nets: Model based design and implementation

A Simulator for high level Petri Nets: Model based design and implementation A Simulator for high level Petri Nets: Model based design and implementation Mindaugas Laganeckas Kongens Lyngby 2012 IMM-M.Sc.-2012-101 Technical University of Denmark Informatics and Mathematical Modelling

More information

Techological Advantages of Mobile IPv6

Techological Advantages of Mobile IPv6 Techological Advantages of Mobile IPv6 Nokia Research Center Mountain View, CA USA Charles E. Perkins http://people.nokia.net/charliep charliep@iprg.nokia.com 1 NOKIA NERD2000.PPT/ 11/20/00 / HFl Outline

More information

Analysis of Broadcast Authentication Mechanism in Selected Network Topologies

Analysis of Broadcast Authentication Mechanism in Selected Network Topologies RADIOENGINEERING, VOL. 20, NO. 1, APRIL 2011 167 Analysis of Broadcast Authentication Mechanism in Selected Network Topologies Tomas VANEK, Matej ROHLIK Dept. of Telecommunication Engineering, Czech Technical

More information

Slide 1. Slide 2. Slide 3. Technological Advantages of Mobile IPv6. Outline of Presentation. Earth with 2 Billion Mobile devices

Slide 1. Slide 2. Slide 3. Technological Advantages of Mobile IPv6. Outline of Presentation. Earth with 2 Billion Mobile devices Slide 1 Technological Advantages of Mobile IPv6 Nokia Research Center Mountain View, CA USA Charles E. Perkins http://people.nokia.net/charliep charliep@iprg.nokia.com 1 NOKIA NERD2000.PPT/ 11/20/00 /

More information

3D-Visualization of Petri Net Models: Concept and Realization

3D-Visualization of Petri Net Models: Concept and Realization 3D-Visualization of Petri Net Models: Concept and Realization Ekkart Kindler and Csaba Páles Department of Computer Science, University of Paderborn {kindler,cpales}@upb.de Abstract. We present a simple

More information

Cisco IOS DECnet Commands

Cisco IOS DECnet Commands Cisco IOS DECnet Commands Digital Equipment Corporation developed the DECnet protocol to provide a way for its computers to communicate with one another. Currently in its fifth major product release, DECnet

More information

INF672 Protocol Safety and Verification. Karthik Bhargavan Xavier Rival Thomas Clausen

INF672 Protocol Safety and Verification. Karthik Bhargavan Xavier Rival Thomas Clausen INF672 Protocol Safety and Verication Karthik Bhargavan Xavier Rival Thomas Clausen 1 Course Outline Lecture 1 [Today, Sep 15] Introduction, Motivating Examples Lectures 2-4 [Sep 22,29, Oct 6] Network

More information

L3VPN Configuration. L3VPN Overview. Introduction to L3VPN

L3VPN Configuration. L3VPN Overview. Introduction to L3VPN Table of Contents L3VPN Configuration 1 L3VPN Overview 1 Introduction to L3VPN 1 L3VPN Concepts 2 L3VPN Networking Schemes 3 OSPF VPN Extension 6 L3VPN Configuration Task List 8 Configuring VPN Instances

More information

Modeling and Analysis of General Internet Signaling Transport Protocol (GIST) using Coloured Petri Nets

Modeling and Analysis of General Internet Signaling Transport Protocol (GIST) using Coloured Petri Nets Modeling and Analysis of General Internet Signaling Transport Protocol (GIST) using Coloured Petri Nets Atul Kumar Lecturer(CSE & IT Dept.) Baba Banda Singh Bahadur Polytechnic College Fatehgarh Sahib(Punjab),

More information

Embedding Java Types in CPN Tools

Embedding Java Types in CPN Tools Embedding Java Types in CPN Tools K.B. Lassen and M. Westergaard Department of Computer Science, University of Aarhus, IT-parken, Aabogade 34, DK-8200 Aarhus N, Denmark, Email: {k.b.lassen,mw}@daimi.au.dk

More information

Instructions to use PIPE+

Instructions to use PIPE+ Instructions to use PIPE+ PIPE+ is implemented under the environment of Eclipse. User can import it into eclipse to view source code as well as run the program. The user can choose RunGUI to run the tool.

More information

Formal Support for QVT-Relations with Coloured Petri Nets

Formal Support for QVT-Relations with Coloured Petri Nets Formal Support for QVT-Relations with Coloured Petri Nets Juan de Lara Univ. Autónoma de Madrid (Spain) MODELS 2009 Denver, Colorado, USA Esther Guerra 1 Univ. Carlos III de Madrid (Spain) Motivation Model-to-Model

More information

Basic Low Level Concepts

Basic Low Level Concepts Course Outline Basic Low Level Concepts Case Studies Operation through multiple switches: Topologies & Routing v Direct, indirect, regular, irregular Formal models and analysis for deadlock and livelock

More information

Simulation of Routing Protocol with CoS/QoS Enhancements in Heterogeneous Communication Network

Simulation of Routing Protocol with CoS/QoS Enhancements in Heterogeneous Communication Network Enhancements in Heterogeneous Communication Network M. Sc. Eng. Emil Kubera M. Sc. Eng. Joanna Sliwa M. Sc. Eng. Krzysztof Zubel Eng. Adrian Mroczko Military Communication Institute 05-130 Zegrze Poland

More information

ISP Border Definition. Alexander Azimov

ISP Border Definition. Alexander Azimov ISP Border Definition Alexander Azimov ISP goal (one ASN) BGP Decision Process Step Attribute Transit 1 Highest Local Preference value Non-transit 2 Lowest AS Path length Transit 3 Lowest

More information

Unicast Routing. TCP/IP class

Unicast Routing. TCP/IP class Unicast Routing TCP/IP class Routing Protocols intro RIP and son of RIP OSPF BGP odd bodkins NAT TCP/IP Internetworking Protocols 2 divide routing world into 3 parts topology IETF ISO/OSI same link or

More information

Towards A High-Level Petri Net Type Definition

Towards A High-Level Petri Net Type Definition Towards A High-Level Petri Net Type Definition Michael Westergaard Department of Computer Science, University of Aarhus, IT-parken, Aabogade 34, DK-8200 Aarhus N, Denmark, Email: mw@daimi.au.dk Abstract.

More information

Chapter 9 RIP Commands

Chapter 9 RIP Commands Chapter 9 RIP Commands default-metric Defines the global default-metric value that will be assigned to all external routes imported into RIP for redistribution. RIP must be active on the routing switch

More information

Obtaining Memory-Efficient Reachability Graph Representations Using the Sweep-Line Method

Obtaining Memory-Efficient Reachability Graph Representations Using the Sweep-Line Method Obtaining Memory-Efficient Reachability Graph Representations Using the Sweep-Line Method Thomas Mailund and Michael Westergaard Department of Computer Science, University of Aarhus, IT-parken, Aabogade

More information

A Practical Approach for a Workflow Management System

A Practical Approach for a Workflow Management System A Practical Approach for a Workflow Management System Simone Pellegrini, Francesco Giacomini, Antonia Ghiselli INFN Cnaf Viale B. Pichat, 6/2 40127 Bologna {simone.pellegrini francesco.giacomini antonia.ghiselli}@cnaf.infn.it

More information

Validation of enterprise architecture through colored Petri nets

Validation of enterprise architecture through colored Petri nets Management Science Letters 5 (2015) 311 320 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl Validation of enterprise architecture through colored

More information

Operation Manual BFD-GR H3C S3610&S5510 Series Ethernet Switches. Table of Contents

Operation Manual BFD-GR H3C S3610&S5510 Series Ethernet Switches. Table of Contents Table of Contents Table of Contents... 1-1 1.1 Introduction to BFD... 1-1 1.1.1 How BFD Works... 1-1 1.1.2 BFD Packet Format... 1-3 1.1.3 Protocols and Standards... 1-5 1.2 BFD Configuration Task List...

More information

TOWARDS COSIMULATING SYSTEMC AND COLOURED PETRI NET MODELS FOR SOC FUNCTIONAL AND PERFORMANCE EVALUATION

TOWARDS COSIMULATING SYSTEMC AND COLOURED PETRI NET MODELS FOR SOC FUNCTIONAL AND PERFORMANCE EVALUATION TOWARDS COSIMULATING SYSTEMC AND COLOURED PETRI NET MODELS FOR SOC FUNCTIONAL AND PERFORMANCE EVALUATION M. Westergaard (a), L.M. Kristensen (b), M. Kuusela (c) (a) Department of Computer Science, Aarhus

More information

Modelling Functionality of Train Control Systems using Petri Nets

Modelling Functionality of Train Control Systems using Petri Nets Modelling Functionality of Train Control Systems using Petri Nets Michael Meyer zu Hörste and Hardi Hungar German Aerospace Centre (DLR) Institute of Transportation Systems Lilienthaplatz 7, 38108 Braunschweig,

More information

Configuration Guide. For Managing EAPs via EAP Controller

Configuration Guide. For Managing EAPs via EAP Controller Guide For Managing EAPs via EAP Controller 1910012313 REV1.0.0 December 2017 CONTENTS 1 Overview... 1 2 Configuration... 2 2.1 Managing EAPs in the Same Subnet... 2 2.2 Managing EAPs in Different Subnets...

More information

CS4514 Real-Time Systems and Modeling

CS4514 Real-Time Systems and Modeling CS4514 Real-Time Systems and Modeling Fall 2015 José M. Garrido Department of Computer Science College of Computing and Software Engineering Kennesaw State University Real-Time Systems RTS are computer

More information

Routing. Routing. Overview. Overview. Routing vs. Forwarding. Why Routing

Routing. Routing. Overview. Overview. Routing vs. Forwarding. Why Routing Routing Dr. Arjan Durresi Department of Computer Science Louisiana State University Overview Routing vs. Forwarding Routing Algorithms, Distance Vector, Link State Dijkstra s Algorithm ARPAnet Routing

More information

ACL and ABF Commands

ACL and ABF Commands This module describes the Cisco IOS XR software commands used to configure the ACL and ABF commands for Broadband Network Gateway (BNG) on the Cisco ASR 9000 Series Router. For details regarding the related

More information

A Low-Overhead DVR Based Multicast Routing Protocol for Clustered MANET

A Low-Overhead DVR Based Multicast Routing Protocol for Clustered MANET A Low-Overhead DVR Based Multicast Routing Protocol for Clustered MANET B. Gupta, S. Rahimi, R. Jandhyala, and V. Doraiswamy Department of Computer Science, Southern Illinois University, Carbondale, IL

More information

WEEK 5 - APPLICATION OF PETRI NETS. 4.4 Producers-consumers problem with priority

WEEK 5 - APPLICATION OF PETRI NETS. 4.4 Producers-consumers problem with priority 4.4 Producers-consumers problem with priority The net shown in Fig. 27 represents a producers-consumers system with priority, i.e., consumer A has priority over consumer B in the sense that A can consume

More information

Representation of Action Spaces in Multiple Levels of Detail

Representation of Action Spaces in Multiple Levels of Detail Representation of Action Spaces in Multiple Levels of Detail Andreas Hasselberg Dirk Söffker Institute of Flight Guidance, German Aerospace Center, Braunschweig, Germany (e-mail: andreas.hasselberg@dlr.de)

More information

CMPSCI 521/621 HW6 Solutions

CMPSCI 521/621 HW6 Solutions CMPSCI 521/621 HW6 Solutions Problem 1 (based on Xiang Zhao s solution). The node labels are an ordered pair that indicates the location of the program counter in the two different tasks. The first element

More information

Wireless and Mobile Networks

Wireless and Mobile Networks Wireless and Mobile Networks Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

Exercise 1 INTERNET. x.x.x.254. net /24. net /24. x.x.x.33. x.x.x.254. x.x.x.52. x.x.x.254. x.x.x.254. x.x.x.

Exercise 1 INTERNET. x.x.x.254. net /24. net /24. x.x.x.33. x.x.x.254. x.x.x.52. x.x.x.254. x.x.x.254. x.x.x. Exercise 1 Given the IP network below: Assign feasible IP addresses to the interfaces and write down a feasible routing table for routers A and B guaranteeing full connectivity x.x.x.33 x.x.x.254 net 131.175.16.0/24

More information

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:

More information

PROTECT NETWORK EDGE WITH BGP, URPF AND S/RTBH. by John Brown, CityLink Telecommunications, LLC

PROTECT NETWORK EDGE WITH BGP, URPF AND S/RTBH. by John Brown, CityLink Telecommunications, LLC PROTECT NETWORK EDGE WITH BGP, URPF AND S/RTBH by John Brown, CityLink Telecommunications, LLC About Me Based in Albuquerque, NM US Will travel for packet$, food, and good Scotch.! MikroTik Trainer CityLink

More information

Modelling and Simulation of a Network Management System using Hierarchical Coloured Petri Nets. Extended version

Modelling and Simulation of a Network Management System using Hierarchical Coloured Petri Nets. Extended version Modelling and Simulation of a Network Management System using Hierarchical Coloured Petri Nets. Extended version Søren Christensen Computer Science Department Aarhus University Ny Munkegade, Bldg. 540

More information

Composability Test of BOM based models using Petri Nets

Composability Test of BOM based models using Petri Nets I. Mahmood, R. Ayani, V. Vlassov and F. Moradi 7 Composability Test of BOM based models using Petri Nets Imran Mahmood 1, Rassul Ayani 1, Vladimir Vlassov 1, and Farshad Moradi 2 1 Royal Institute of Technology

More information

TVOICE: Troubleshooting Cisco Unified Communications v8

TVOICE: Troubleshooting Cisco Unified Communications v8 Course Objectives Describe a systematic methodology to troubleshoot Cisco Unified Communications solutions Isolate and troubleshoot reported issues that relate to Cisco Unified Communications Manager.

More information

Introduction to Networking

Introduction to Networking Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block

More information

HP0-Y49. Applying HP FlexNetwork Fundamentals.

HP0-Y49. Applying HP FlexNetwork Fundamentals. HP HP0-Y49 Applying HP FlexNetwork Fundamentals http://killexams.com/exam-detail/hp0-y49 QUESTION: 54 Refer to the Exhibit. Exhibit: HP Comware switch configuration. [Comware] vlan 100 [Comware-vlan100]

More information

HP 5920 & 5900 Switch Series

HP 5920 & 5900 Switch Series HP 5920 & 5900 Switch Series MCE Configuration Guide Part number: 5998-2896 Software version: Release2207 Document version: 6W100-20121130 Legal and notice information Copyright 2012 Hewlett-Packard Development

More information

System Design and Methodology/ Embedded Systems Design (Modeling and Design of Embedded Systems)

System Design and Methodology/ Embedded Systems Design (Modeling and Design of Embedded Systems) Design&Methodologies Fö 1&2-1 Design&Methodologies Fö 1&2-2 Course Information Design and Methodology/ Embedded s Design (Modeling and Design of Embedded s) TDTS07/TDDI08 Web page: http://www.ida.liu.se/~tdts07

More information

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011 Lecture 4: Intradomain Routing CS 598: Advanced Internetworking Matthew Caesar February 1, 011 1 Robert. How can routers find paths? Robert s local DNS server 10.1.8.7 A 10.1.0.0/16 10.1.0.1 Routing Table

More information

A framework to evaluate 5G networks for smart and fail-safe communications

A framework to evaluate 5G networks for smart and fail-safe communications A framework to evaluate 5G networks for smart and fail-safe communications in ERTMS/ETCS Roberto Canonico (*), Stefano Marrone (**), Roberto Nardone (*), and Valeria Vittorini (*) (*) Università degli

More information

Secondary Address Support

Secondary Address Support Secondary Address Support Peter Jones July 21, 2003 7/21/2003 3:19 PM pj_sec_addr_02.ppt 1 Secondary Addresses Allows for more efficient support of protocols like RFC 2338 Virtual Router Redundancy Protocol.

More information

SDL. Jian-Jia Chen (slides are based on Peter Marwedel) TU Dortmund, Informatik 年 10 月 18 日. technische universität dortmund

SDL. Jian-Jia Chen (slides are based on Peter Marwedel) TU Dortmund, Informatik 年 10 月 18 日. technische universität dortmund 12 SDL Jian-Jia Chen (slides are based on Peter Marwedel) TU Dortmund, Informatik 12 2017 年 10 月 18 日 Springer, 2010 These slides use Microsoft clip arts. Microsoft copyright restrictions apply. Models

More information

WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH

WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH Mesh networking is a powerful way to route data. This methodology

More information

Module 16 An Internet Exchange Point

Module 16 An Internet Exchange Point ISP Workshop Lab Module 16 An Internet Exchange Point Objective: To investigate methods for connecting to an Internet Exchange Point. Prerequisites: Modules 12 and 13, and the Exchange Points Presentation

More information

Modeling Behavioral Design Patterns of Concurrent Objects

Modeling Behavioral Design Patterns of Concurrent Objects Modeling Behavioral Design Patterns of Concurrent Objects Robert G. Pettit IV The Aerospace Corporation 15049 Conference Center Dr Chantilly, Virginia (USA) +1-703-324-8937 rob.pettit@aero.org Hassan Gomaa

More information

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they

More information

Network Gateway Services John Enck

Network Gateway Services John Enck 51-20-39 Network Gateway Services John Enck Payoff In a TCP/IP network, a gateway has a specific purpose. The TCP/IP architecture even includes formal protocols that apply only to TCP/IP gateways. In a

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized

More information

Introduction to Software Specifications and Data Flow Diagrams. Neelam Gupta The University of Arizona

Introduction to Software Specifications and Data Flow Diagrams. Neelam Gupta The University of Arizona Introduction to Software Specifications and Data Flow Diagrams Neelam Gupta The University of Arizona Specification A broad term that means definition Used at different stages of software development for

More information

Discrete-event simulation of railway systems with hybrid models

Discrete-event simulation of railway systems with hybrid models Discrete-event simulation of railway systems with hybrid models G. Decknatel & E. Schnieder Imtitutfur Regelungs- undautomatisierungstechnik, Technische Universitat Braunschweig, Braunschweig, Germany.

More information

Configuring CDP. Understanding CDP CHAPTER. This chapter describes how to configure Cisco Discovery Protocol (CDP) on the Catalyst 3560 switch.

Configuring CDP. Understanding CDP CHAPTER. This chapter describes how to configure Cisco Discovery Protocol (CDP) on the Catalyst 3560 switch. 21 CHAPTER This chapter describes how to configure Cisco Discovery Protocol (CDP) on the Catalyst 3560 switch. Note For complete syntax and usage information for the commands used in this chapter, refer

More information

Implementing the WebSocket Protocol based on Formal Modelling and Automated Code Generation

Implementing the WebSocket Protocol based on Formal Modelling and Automated Code Generation Implementing the WebSocket Protocol based on Formal Modelling and Automated Code Generation Lars M. Kristensen Kent I.F. Simonsen 1,2 Bergen University College 1 Technical University of Denmark 2 Norway

More information

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui

More information

ISO/IEC INTERNATIONAL STANDARD. Software and system engineering High-level Petri nets Part 1: Concepts, definitions and graphical notation

ISO/IEC INTERNATIONAL STANDARD. Software and system engineering High-level Petri nets Part 1: Concepts, definitions and graphical notation INTERNATIONAL STANDARD ISO/IEC 15909-1 First edition 2004-12-01 Software and system engineering High-level Petri nets Part 1: Concepts, definitions and graphical notation Ingénierie du logiciel et du système

More information

Coverability Graph and Fairness

Coverability Graph and Fairness Coverability Graph and Fairness prof.dr.ir. Wil van der Aalst www.vdaalst.com Recall reachability analysis or1 x r1 rg1 g1 go1 o1 r2 rg2 g2 go2 o2 or2 Petri net standard properties Boundedness Terminating

More information

BISS 2013: Simulation for Decision Support

BISS 2013: Simulation for Decision Support BISS 2013: Simulation for Decision Support Lecture 06 Conceptual Modelling Concepts and Techniques Peer-Olaf Siebers (Nottingham University) Stephan Onggo (Lancaster University) pos@cs.nott.ac.uk Motivation

More information

The BITX M2M ecosystem. Detailed product sheet

The BITX M2M ecosystem. Detailed product sheet The BITX M2M ecosystem Detailed product sheet Stop wasting energy! Finally an M2M application development platform that doesn t have you running in circles. Why building it all from scratch every time?

More information

Persiform: Performance Engineering Based on

Persiform: Performance Engineering Based on Persiform: Performance Engineering Based on Simulation of Formal Functional Models Olivier Constant, Marius Bozga, Susanne Graf -- Verimag, Grenoble Nicolas Moteau, Wei Monin -- France Telecom R&D 2007

More information

FEATURE DISAMBIGUATION

FEATURE DISAMBIGUATION FEATURE DISAMBIGUATION "Call Forwarding is a mechanism, not a feature." Pamela Zave AT&T Laboratories Research Florham Park, New Jersey, USA pamela@research.att.com FEATURE AMBIGUITY A and B are addresses

More information

Computer Networks Technologies and Services January 31 st, Question 11

Computer Networks Technologies and Services January 31 st, Question 11 Computer Networks Technologies and Services January 31 st, 2014 First and last name... Student ID...... Answers to multiple choice questions 1 2 3 4 5 6 7 8 9 10 Answers to essay questions Question 11

More information

IMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS

IMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS IMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS Leontyev Denis Vasilevich, Kharitonov Dmitry Ivanovich and Tarasov Georgiy Vitalievich ABSTRACT Institute of Automation and

More information

Modeling and Performance Evaluation of ATM Switches

Modeling and Performance Evaluation of ATM Switches Modeling and Performance Evaluation of ATM Switches KHALIL SHIHAB Department of Computer Science, Sultan Qaboos University, P.O. Box 36, Al-Khod 123, Oman Abstract: - In this work, we present a Colored

More information

CNPE Communications and Networks Lab Book: Data Transmission Over Digital Networks

CNPE Communications and Networks Lab Book: Data Transmission Over Digital Networks Lab Book: Data Transmission Over Digital Networks Contents Data Transmission Over Digital Networks... 3 Lab Objectives... 3 Lab Resources... 3 Task 1 Build the Home Network... 3 Task 2 Configure IP Addresses...

More information

CN [Network Devices]

CN [Network Devices] Q`.1 Explain Repeater. A repeater is a device that operates only at the PHYSICAL layer. A repeater can be used to increase the length of the network by put the effect on the signal. It connects two segments

More information

Online Conformance Checking for Petri Nets and Event Streams

Online Conformance Checking for Petri Nets and Event Streams Downloaded from orbit.dtu.dk on: Apr 30, 2018 Online Conformance Checking for Petri Nets and Event Streams Burattin, Andrea Published in: Online Proceedings of the BPM Demo Track 2017 Publication date:

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

REPRESENTATION, SIMULATION AND CONTROL OF MANUFACTURING PROCESS WITH DIFFERENT FORMS OF UNCERTAINTIES. Hyunsoo Lee Hongsuk Park Amarnath Banerjee

REPRESENTATION, SIMULATION AND CONTROL OF MANUFACTURING PROCESS WITH DIFFERENT FORMS OF UNCERTAINTIES. Hyunsoo Lee Hongsuk Park Amarnath Banerjee Proceedings of the 2009 Winter Simulation Conference M. D. Rossetti, R. R. Hill, B. Johansson, A. Dunkin and R. G. Ingalls, eds. ABSTRACT REPRESENTATION, SIMULATION AND CONTROL OF MANUFACTURING PROCESS

More information

A model-based functional test approach to verify system requirements

A model-based functional test approach to verify system requirements A model-based functional test approach to verify system requirements Stefan Miller 1, Ralf Bogusch 2 1 CASSIDIAN, Wörthstraße 85, 89077 Ulm 2 CASSIDIAN, Claude-Dornier-Straße, 88090 Immenstaad {stefan.miller

More information

Share Count Analysis HEADERS

Share Count Analysis HEADERS Measuring Network Privacy with It s 11PM. DO YOU KNOW WHERE YOUR Share Count Analysis HEADERS ARE? David Naylor Peter Steenkiste GOAL measure how private a network architecture or protocol is GOAL measure

More information

Validation of UML Models for Interactive Systems with CPN and SPIN. Parne Balu Laxman

Validation of UML Models for Interactive Systems with CPN and SPIN. Parne Balu Laxman Validation of UML Models for Interactive Systems with CPN and SPIN Parne Balu Laxman Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela-769 008, Odisha, India

More information

By: Chaitanya Settaluri Devendra Kalia

By: Chaitanya Settaluri Devendra Kalia By: Chaitanya Settaluri Devendra Kalia What is an embedded system? An embedded system Uses a controller to perform some function Is not perceived as a computer Software is used for features and flexibility

More information

BGP. Internal and External BGP 2005/03/11. (C) Herbert Haas

BGP. Internal and External BGP 2005/03/11. (C) Herbert Haas BGP Internal and External BGP (C) Herbert Haas 2005/03/11 and 2 Internal and External BGP messages are exchanged between peers of different ASs peers should be directly connected Inside an AS this information

More information

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP 4.5 routing algorithms link state

More information

Computation of enabled transition instances for colored Petri nets

Computation of enabled transition instances for colored Petri nets Computation of enabled transition instances for colored Petri nets Fei Liu and Monika Heiner Department of Computer Science, Brandenburg University of Technology Postbox 10 13 44, 03013 Cottbus, Germany

More information