Chapter I: Introduction

Size: px
Start display at page:

Download "Chapter I: Introduction"

Transcription

1 -1-1. Introduction 1.1 What is a protocol? Chapter I: Introduction Aset of rules that govern the interaction of concurrent processes in a distributed system. The protocol "provides a service", and we judge the protocol based upon how successfully, and how efficiently, itprovides the service. 1.2 Examples of communications protocols 1. In a half-duplex transmission system, the procedures that the user on each end follow to determine who can use the channel next is a protocol. If the protocol that is prescribed is incorrect, both users may transmit at the same time, so that neither is successful, or both users may wait for the other to transmit, so that no data is transmitted. The service that the protocol provides controls both users, on different ends of a channel, so that they can share the channel. In an Ethernet, a protocol determines which users, in a large group of users, may transmit, and when they must retransmit, to share a single channel and successfuly transfer data.. 2. In the telephone network there is a protocol to place a phone call. The caller picks up the telephone, and waits until the network returns a dial tone. The caller then enters the telephone number of the called party. The network waits until a complete phone number is entered, then rings the phone of the called party and returns the ring or a busy signal to the called party. When the called party picks up the phone, the ringing stops and the two partys can talk. 3. In networks with transmission errors there are protocols (ARQ protocols) that determine when a message is received incorrectly, and must be retransmitted. These protocols are typically implemented by sending additional control messages between the transmitter and receiver. The control messages may also be received incorrectly or lost. A condition that was overlooked in some of the early error recovery protocols. The service provided by a protocol may guarantee that a receiver: a) Recovers all of the messages from a source. b) Discards duplicate copies of the received messages. And, c) places the received messages in the same order that they were transmitted. 4. In large networks, the routes that users select, to minimize the interference with other users, is a routing protocol, and the transmission rate that each user sends data, to prevent congestion in the network, and allow afair share of the network capacity to be used by other users is a congestion control protocol. 1.3 Example of how protocols fail Most protocol failures have occurred because of unexpected series of events. Early protocols were designed to protect railroad operations, and the failures are well documented. Clayton tunnel collision, 1841, 21 dead and 176 injured. 4devices used to allow only 1 train in the tunnel at a time - in each direction. 125

2 -2-1. Signal lights on the tracks - to indicate to other trains that a train has passed the entry point to the tunnel, 2. A signal man on each end of the tunnel 3. A buzzer to notify a signal man that the signal light should be set. If the signal fails, the signal man uses flags to stop trains from entering the tunnel. 4. An early version of a telegraph to communicate between the signal men, with three possible messages: i. A train has entered the tunnel from the signal man at the entrance to the tunnel ii. The train has left the tunnel from the signal man at the exit. iii. Query: Has the train left the tunnel? from the sgnal man at the entrance, in case he misses message ii. The signal man at the entrance resets the signal light when the tunnel is clear. Unexpected event: The signal light fails, and a second train enters the tunnel before the signal man arrives with the red flag. The second train sees the red flag and stops in the tunnel. Tw o trains in the tunnel is the unplanned event. Sequence: i. The signal man at the exit sends message ii when the first train leaves the tunnel. ii. After atime, the signal man at the entrance sends message iii He is asking if the second train has left the tunnel, but the signal man at the exit assumes that he missed the first message ii, and resends the message. iii. The signal man at the entrance assumes that the tunnel is clear and lets another train enter iv. The train in the tunnel trys to back up to the tunnel entrance and crashes with the third train. 125

3 Formal Methods When we design a protocol we must guarantee that the protocol performs the services that are needed. 1. Guaranteeing that the protocol performs the intended function is protocol verification. Some protocols have become very complex, and informally reasoning about the operation of the protocol has resulted in unexpected errors. Formal procedures have been developed to help engineers verify the correctness of protocols. 2. The specification of protocols are frequently ambibuous, particularly when the description descriptions are in English. Formal specification languages have been developed to reduce the ambiguity. 3. When we implement a protocol we must guarantee that it will operate with other other implementations of the protocol. There may be many possible sequences of operations. We must test all sequence of operations to guarantee that they have the same result. Guaranteeing that implementations result in the same protocol operations is called conformance testing. 125

4 -4-2. Outline 1. Layered Architectures Architectures for Cyber-Physical Systems 2. ARQ protocols A. Stop and Wait B. Go-back-N C. Selective Repeat ARQ D. Beeforth Protocol 3. Protocol Models A. Finite State Machinee B. Extended Finite State Machines C. Communicating Sequential processes D. Petri Nets E. Flow Chart Languages SDL F. Programming Languages 4. Protocol Verification/Validation A. Composite Finite State Machines B. Probabilitistic Verification 5. Conformance Testing IEEE Tutorial 6. Protocol Analysis 7. Broadcast/Multicast Protocols Steiner Trees 8. Read and discuss A. M. C. Yuang, "Survey of protocol verification techniques based on finite state machine models," Proc. of Computer Networking Symposium, Apr 1988, pp B. T. Elsharnouby, A. U. Shankar, "SeSFJava harness: service and assertion checking for protocol," IEEE JSAC, vol. 22, iss. 10, Dec. 2004, pp C. R. J. Linn, "Conformance evaluation methodology and protocol testing," IEEE JSAC, vol. 7, iss. 7, Sep , pp D. J. W. Palmer, K. Sabnani, "A Survey of Protocol Verification Techniques," IEEE MILCOM 1986, Oct. 5-9, 1986, pp E. F. Babich, L. Deotto, "Formal methods for specification and analysis of communication protocols," IEEE Communications Surveys & Tutorials, vol. 4, iss. 1, First Quarter 2002, pp F. D. Lee, M. Yannakakis, "Principles and methods of testing finite state machines-a survey." Proc. of the IEEE, vol. 84, iss. 8, Aug. 1996, pp

5 -5- G. R. Alur, D.L.Dill, "A Theory of Timed Automata," "Theoretical Computer Science," v. 126 pp (1994). H. R. Alur, "Timed Automata," 11th International Conference on Computer-Aided Verification, LNCS 1633, pp. 8-22, Springer-Verlag, Plan During the course of the semester we will read and discuss several papers. Iwill asign a paper 1 week before we plan on discussing it. All students will be expected to hand in a 1 page summary, before the discussion. Grades will be based on the written summaries as well as exams on the techniques that will be taught. 4. Reading Technical Papers A technical paper is not a novel, it should not be read from cover to cover in a single pass. The objective is to read the paper quickly and to obtain a better understanding of the material. The general idea is to read the paper in several passes and to decompose the paper. Technical papers, like newspaper articles, are written to convey information. Well written papers have a recursive architecture. The first section describes what will be done in the paper, and the final section sums up what has been done. In each section, the first paragraph tells what will be done in the section, and the last paragraph tells what has been done. In each paragraph, the first sentence tells what the paragraph is about. In addition, there is an abstract that summarizes the important contributions of the paper, and figures and tables that summarize the results. Instead of reading a paper from beginning to end, we should use the structure to progessively understand the paper. Weshould read the paper in three passes. 1. Find out what the paper is about and what results are reported. This is done by reading the abstract, introduction, first paragraph of each section, and the conclusion. Then looking at the figures and tables to see what results are summarized. This procedure shouldn t take more than 5-10 minutes. After completing this phase you should write down one or two sentences to describe why the paper is important. You can use this summary after you finish the paper to decide if you were right, and whether or not you spent enough time in this step. At the end of this step you should decide if you are interested in finding out more about the paper. 2. Determine how the results are obtained or how the arguments are supported. The objective is towrite down an outline of the procedures that the author uses in each section. Read the first and last paragraph of each section, then read the first sentence of each paragraph. Write down an outline of how the section supports the claims in the first paragraph. This procedure should take minutes for a typical paper. At the end of this step you should know which sections you are interested in understanding more 118

6 -6- completely. 3. Understand the details of the paper. Read the complete prose and go through the equations in the sections that are interesting. You should be able to read the prose quickly because you already know what is being said. When going through the equations you should realize that most technical papers leave out many steps in developing the equations and you will have to fill in the equations yourself or go to text books to figure out what has been done. This makes it particularly important to decide which equations are of particular interest to you, and which should be accepted without understanding how they are obtained. When you follow this procedure you should cut the amount of time to read a technical paper and have a better understanding of the importance of the paper. Writing down the objective of the paper and the outline is an important part of increasing understanding, and should not be skipped. When you follow this procedure, you will find that some technical writers are not very good at establishing the recursive structure, which will make you do more work to extract the information. Hopefully, by looking for the structure, you will become a better writer. Depending on what we want to get out of a technical paper it is not always useful to perform all three steps. The first step tells us what the paper is about. We must perform the first step in order to determine if the paper is worth looking at in greater detail. Many technical papers are incremental advances over other papers or only tangentially related to the field that we are interested in, and we can stop after this step. The second step is necessary to understand the contributions of the paper. With most papers we can stop after this step. It s only necessary to perform the third step if we want to extend the paper, or if the technique that is used will be useful to solve other problems. In most cases we will find that the techniques are straightforward and that we can accept them as being most likely correct. After all, the papers that we will be reading have been refereed and accepted for publication by a reputable journal. Home Work Due in class February 4th Perform a first level read of papers [1, 2, 3]. All of the papers are available in IEEE xplore, which is available through the Columbia library on-line. Write 1/2 to 3/4 of a page, 12 point font, for each paper. Describe what the paper is about and the most important points. Use your own words. Do not copy text from the paper. Donot include figures from the paper. Please work alone. Do not collaborate. Each paper should take minutes REFERENCES [1] R. Kianfar, B. Augusto, A. Ebadighajari, U. Hakeem, J. Nilsson, A. Raza, R. S. Tabar, N. V. Irukulapati, C. Englund, P. Falcone, S. Papanastasiou, L. Svensson, H. Wymeersch, "Design and Experimental Validation of a Cooperative Driving System in the Grand Cooperative Driving Challenge, "IEEE Transactions on Intelligent Transportation Systems, vol. 13, no. 3, pp , [2] M. Aeberhard, S. Schlichtharle, N. Kaempchen, and T. Bertram, "Track-to-Track Fusion With Asynchronous Sensors Using Information Matrix Fusion for Surround Environment Perception," IEEE Transactions on Intelligent Transportation Systems, vol. 13, no. 4, pp ,

7 -7- [3] R. Horowitz, P. Varaiya, "Control Design of an Automated Highway System," Proceedings of the IEEE, vol. 88, pp ,

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

Information Retrieval

Information Retrieval Information Retrieval Course presentation João Magalhães 1 Relevance vs similarity Multimedia documents Information retrieval application Query Documents Information side User side What is the best [search

More information

Internet Networking recitation #10 TCP New Reno Vs. Reno

Internet Networking recitation #10 TCP New Reno Vs. Reno recitation #0 TCP New Reno Vs. Reno Spring Semester 200, Dept. of Computer Science, Technion 2 Introduction Packet Loss Management TCP Reno (RFC 258) can manage a loss of at most one packet from a single

More information

An Efficient Selective-Repeat ARQ Scheme for Half-duplex Infrared Links under High Bit Error Rate Conditions

An Efficient Selective-Repeat ARQ Scheme for Half-duplex Infrared Links under High Bit Error Rate Conditions This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 26 proceedings. An Efficient Selective-Repeat ARQ Scheme for

More information

ECE 156A - Syllabus. Description

ECE 156A - Syllabus. Description ECE 156A - Syllabus Lecture 0 ECE 156A 1 Description Introduction to HDL (Hardware Description Language) basic elements, HDL simulation concepts, HDL concurrent statements with examples and applications,

More information

2 after reception of a message from the sender, do one of two things: either the message is delivered to the receiver, or it is lost. The loss of a me

2 after reception of a message from the sender, do one of two things: either the message is delivered to the receiver, or it is lost. The loss of a me Protocol Verification using UPPAAL: Exercises? Lab assistant: Alexandre David Department of Computer Systems (room 1237, mailbox 26), Uppsala University, Box 325, S751 05, Uppsala. Phone: 018-18 73 41.

More information

CPSC 441 COMPUTER NETWORKS MIDTERM EXAM

CPSC 441 COMPUTER NETWORKS MIDTERM EXAM CPSC 441 COMPUTER NETWORKS MIDTERM EXAM Department of Computer Science University of Calgary Professor: Carey Williamson March 7, 2018 This is a CLOSED BOOK exam. Textbooks, notes, laptops, personal digital

More information

Outline. CS5984 Mobile Computing

Outline. CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline Review Transmission Control Protocol (TCP) Based on Behrouz Forouzan, Data Communications and Networking,

More information

Analyzation of Automatic Repeat Request (ARQ) Protocols

Analyzation of Automatic Repeat Request (ARQ) Protocols RESEARCH ARTICLE OPEN ACCESS Analyzation of Automatic Repeat Request (ARQ) Protocols 1 Jeshvina.S, 2 Sneha.P, 3 Saraanya.S Final year BCA, Dept of Computer Science New Horizon College Kasturinagar, Bangalore

More information

Using Hybrid Automata for Early Spacecraft Design Evaluation

Using Hybrid Automata for Early Spacecraft Design Evaluation Seminar Operating Systems: Winter Semester 18/19 Using Hybrid Automata for Early Spacecraft Design Evaluation Jafar Akhundov Motivation Motivation: Spacecraft Modelling Gaia - mission to chart a 3d-map

More information

Reliable File Transfer in the Multicast Domain

Reliable File Transfer in the Multicast Domain Reliable File Transfer in the Multicast Domain Winston Dang August 1993 Abstract This paper describes a broadcast file transfer protocol that is suitable for widespread distribution of files from several

More information

Responders Users Guide

Responders Users Guide Volume 1 SPOTTED DOG TECHNOLOGIES RoVER Responders Users Guide R O V E R Responders Users Guide Copyright 2009, 2010 Trumbull Software Associates PO Box 844 Monroe, CT 06468 Table of Contents Introduction...

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

UNIVERSITY OF BOLTON WEB PUBLISHER GUIDE JUNE 2016 / VERSION 1.0

UNIVERSITY OF BOLTON WEB PUBLISHER GUIDE  JUNE 2016 / VERSION 1.0 UNIVERSITY OF BOLTON WEB PUBLISHER GUIDE WWW.BOLTON.AC.UK/DIA JUNE 2016 / VERSION 1.0 This guide is for staff who have responsibility for webpages on the university website. All Web Publishers must adhere

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Guidelines for Seminar Papers and Final Papers (BA/MA Theses) at the Chair of Public Finance

Guidelines for Seminar Papers and Final Papers (BA/MA Theses) at the Chair of Public Finance Guidelines for Seminar Papers and Final Papers (BA/MA Theses) at the Chair of Public Finance Version February 7, 2018 1 General Requirements 1.1 Supervision If you have any questions during your writing

More information

A model for of understanding the structure and function of paragraphs a tool for smashing through the barrier of writer s block!

A model for of understanding the structure and function of paragraphs a tool for smashing through the barrier of writer s block! The Paragraph Buster! A model for of understanding the structure and function of paragraphs a tool for smashing through the barrier of writer s block! The Paragraph Buster aim: To identify the different

More information

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit) CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 21: Network Protocols (and 2 Phase Commit) 21.0 Main Point Protocol: agreement between two parties as to

More information

Analysis of Broadcast Authentication Mechanism in Selected Network Topologies

Analysis of Broadcast Authentication Mechanism in Selected Network Topologies RADIOENGINEERING, VOL. 20, NO. 1, APRIL 2011 167 Analysis of Broadcast Authentication Mechanism in Selected Network Topologies Tomas VANEK, Matej ROHLIK Dept. of Telecommunication Engineering, Czech Technical

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

Advanced Network Design

Advanced Network Design Advanced Network Design Organization Whoami, Book, Wikipedia www.cs.uchicago.edu/~nugent/cspp54015 Grading Homework/project: 60% Midterm: 15% Final: 20% Class participation: 5% Interdisciplinary Course

More information

EXTENDED DISTRIBUTED UML-BASED PROTOCOL SYNTHESIS METHOD

EXTENDED DISTRIBUTED UML-BASED PROTOCOL SYNTHESIS METHOD EXTENDED DISTRIBUTED UML-BASED PROTOCOL SYNTHESIS METHOD Jehad Al Dallal Department of Information Science, Kuwait University, Kuwait ABSTRACT Synthesizing specifications for real time applications that

More information

The Importance of Sliding Window Protocol Generalisation in a Communication Protocols Course

The Importance of Sliding Window Protocol Generalisation in a Communication Protocols Course The Importance of Sliding Window Protocol Generalisation in a Communication Protocols Course Author: Drago Hercog, University of Ljubljana / Faculty of Electrical Engineering, Ljubljana, Slovenia, Drago.Hercog@fe.uni-lj.si

More information

DATA COMMUNICATION. Part TWO Data Transmission

DATA COMMUNICATION. Part TWO Data Transmission DATA COMMUNICATION Part TWO Data Transmission This Chapter intends to create basic concepts of Data communication. We will be covering some basic definitions and details Q: What are the basics Communication

More information

Spectrum Business Voice Features

Spectrum Business Voice Features Spectrum Business Voice Features Caller ID When you receive a call, the name and telephone number of the person calling you is showing in your Caller ID display screen. To use Caller ID: 1. When you receive

More information

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain

ERROR AND FLOW CONTROL. Lecture: 10 Instructor Mazhar Hussain ERROR AND FLOW CONTROL Lecture: 10 Instructor Mazhar Hussain 1 FLOW CONTROL Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most important

More information

Petri Nets ~------~ R-ES-O---N-A-N-C-E-I--se-p-te-m--be-r Applications.

Petri Nets ~------~ R-ES-O---N-A-N-C-E-I--se-p-te-m--be-r Applications. Petri Nets 2. Applications Y Narahari Y Narahari is currently an Associate Professor of Computer Science and Automation at the Indian Institute of Science, Bangalore. His research interests are broadly

More information

Composability Test of BOM based models using Petri Nets

Composability Test of BOM based models using Petri Nets I. Mahmood, R. Ayani, V. Vlassov and F. Moradi 7 Composability Test of BOM based models using Petri Nets Imran Mahmood 1, Rassul Ayani 1, Vladimir Vlassov 1, and Farshad Moradi 2 1 Royal Institute of Technology

More information

Fault Detection of Reachability Testing with Game Theoretic Approach

Fault Detection of Reachability Testing with Game Theoretic Approach Fault Detection of Reachability Testing with Game Theoretic Approach S. Preetha Dr.M. Punithavalli Research Scholar, Karpagam University, Coimbatore. Director, Sri Ramakrishna Engineering College, Coimbatore.

More information

Tool Support for Design Inspection: Automatic Generation of Questions

Tool Support for Design Inspection: Automatic Generation of Questions Tool Support for Design Inspection: Automatic Generation of Questions Tim Heyer Department of Computer and Information Science, Linköping University, S-581 83 Linköping, Email: Tim.Heyer@ida.liu.se Contents

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

Announcements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades

Announcements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades Announcements 15-441 Computer Networking Lecture 16 Transport Protocols Mid-semester grades Based on project1 + midterm + HW1 + HW2 42.5% of class If you got a D+,D, D- or F! must meet with Dave or me

More information

Algorithms. Chapter 8. Objectives After studying this chapter, students should be able to:

Algorithms. Chapter 8. Objectives After studying this chapter, students should be able to: Objectives After studying this chapter, students should be able to: Chapter 8 Algorithms Define an algorithm and relate it to problem solving. Define three construct and describe their use in algorithms.

More information

Routability-Driven Bump Assignment for Chip-Package Co-Design

Routability-Driven Bump Assignment for Chip-Package Co-Design 1 Routability-Driven Bump Assignment for Chip-Package Co-Design Presenter: Hung-Ming Chen Outline 2 Introduction Motivation Previous works Our contributions Preliminary Problem formulation Bump assignment

More information

CS Final Exam. Stanford University Computer Science Department. June 5, 2012 !!!!! SKIP 15 POINTS WORTH OF QUESTIONS.!!!!!

CS Final Exam. Stanford University Computer Science Department. June 5, 2012 !!!!! SKIP 15 POINTS WORTH OF QUESTIONS.!!!!! CS 240 - Final Exam Stanford University Computer Science Department June 5, 2012!!!!! SKIP 15 POINTS WORTH OF QUESTIONS.!!!!! This is an open-book (but closed-laptop) exam. You have 75 minutes. Cross out

More information

A Messaging-Based Integration Architecture for Print Production Workflow Systems

A Messaging-Based Integration Architecture for Print Production Workflow Systems A Messaging-Based Integration Architecture for Print Production Workflow Systems Claes Buckwalter Digital Media, ITN, Linköping University, Sweden Abstract A print production workflow consists of a number

More information

Simulation and Verification of Timed and Hybrid Systems

Simulation and Verification of Timed and Hybrid Systems Simulation and Verification of Timed and Hybrid Systems Bert van Beek and Koos Rooda Systems Engineering Group Eindhoven University of Technology ISC 2007 Delft 11 June 2007 Bert van Beek and Koos Rooda

More information

Updated Guidelines for Writing Reports for The Electrical Engineering Program Pending Approved by EE Faculty

Updated Guidelines for Writing Reports for The Electrical Engineering Program Pending Approved by EE Faculty EE xxxl LABORATORY REPORT Laboratory Experiment No. Updated Guidelines for Writing Reports for The Electrical Engineering Program Pending Approved by EE Faculty Written by: Joe Student Date Performed:

More information

Title of Report. Note: If you have a very long title, it should be. centered and spaced in such a fashion. that it forms a V-shape

Title of Report. Note: If you have a very long title, it should be. centered and spaced in such a fashion. that it forms a V-shape Title of Report Note: If you have a very long title, it should be centered and spaced in such a fashion that it forms a V-shape Name of sponsor Title Company Submitted by Your Name/Team Member Names Date

More information

A Safety Mechanism Using Software Patterns

A Safety Mechanism Using Software Patterns URL: http://www.elsevier.nl/locate/entcs/volume82.html 11 pages A Safety Mechanism Using Software Patterns Kiyohito Itoh, Hiromi Kobayashi 1 Department of Management Engineering Tokai University Hiratsuka,

More information

Software Engineering: Integration Requirements

Software Engineering: Integration Requirements Software Engineering: Integration Requirements AYAZ ISAZADEH Department of Computer Science Tabriz University Tabriz, IRAN Abstract: - This paper presents a discussion of software integration requirements,

More information

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points Next Steps Have: digital point-to-point We ve worked on link signaling, reliability, sharing Want: many interconnected points 6.02 Spring 2011 Lecture #18 multi-hop networks: design criteria network topologies

More information

CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks Do not write in this box MCQ 9: /10 10: /10 11: /20 12: /20 13: /20 14: /20 Total: Name: Student ID #: CS244a Winter 2003 Professor McKeown Campus/SITN-Local/SITN-Remote? CS244a: An Introduction to Computer

More information

SIR C R REDDY COLLEGE OF ENGINEERING

SIR C R REDDY COLLEGE OF ENGINEERING SIR C R REDDY COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY Course Outcomes II YEAR 1 st SEMESTER Subject: Data Structures (CSE 2.1.1) 1. Describe how arrays, records, linked structures,

More information

TCP-Peach and FACK/SACK Options: Putting The Pieces Together

TCP-Peach and FACK/SACK Options: Putting The Pieces Together TCP-Peach and FACK/SACK Options: Putting The Pieces Together Giacomo Morabito, Renato Narcisi, Sergio Palazzo, Antonio Pantò Dipartimento di Ingegneria Informatica e delle Telecomunicazioni University

More information

Reliable Mobile IP Multicast Based on Hierarchical Local Registration

Reliable Mobile IP Multicast Based on Hierarchical Local Registration Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Reliable Mobile IP Multicast Based on Hierarchical Local Registration Huanming ZHANG, * Quanlong GUAN, Zi Zhao ZHU, Weiqi

More information

Objective: Find areas by decomposing into rectangles or completing composite figures to form rectangles.

Objective: Find areas by decomposing into rectangles or completing composite figures to form rectangles. Lesson 13 3 4 Lesson 13 Objective: Find areas by decomposing into rectangles or completing composite Suggested Lesson Structure Fluency Practice Application Problem Concept Development Student Debrief

More information

Quantitative Verification and Synthesis of Systems

Quantitative Verification and Synthesis of Systems Quantitative Verification and Synthesis of Systems Sanjit A. Seshia Assistant Professor EECS, UC Berkeley Software-at-Scale Workshop August 2010 Quantitative Analysis / Verification Does the brake-by-wire

More information

MASTER OF ENGINEERING PROGRAM IN INFORMATION

MASTER OF ENGINEERING PROGRAM IN INFORMATION MASTER OF ENGINEERING PROGRAM IN INFORMATION AND COMMUNICATION TECHNOLOGY FOR EMBEDDED SYSTEMS (INTERNATIONAL PROGRAM) Curriculum Title Master of Engineering in Information and Communication Technology

More information

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I Lecture (04) Network Access layer fundamentals I By: Dr. Ahmed ElShafee Typical LAN Features for Physical layer Typical LAN Features for Data link layer Standards Overview 10BASE2 and 10BASE5 10BASE T

More information

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I Lecture (04) Network Access layer fundamentals I By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Typical LAN Features for Physical layer Typical LAN Features for Data

More information

TE Teacher s Edition PE Pupil Edition Page 1

TE Teacher s Edition PE Pupil Edition Page 1 Standard 4 WRITING: Writing Process Students discuss, list, and graphically organize writing ideas. They write clear, coherent, and focused essays. Students progress through the stages of the writing process

More information

Modeling and Verification of Marine Equipment Systems Using a Model Checker

Modeling and Verification of Marine Equipment Systems Using a Model Checker Modeling and Verification of Marine Equipment Systems Using a Model Checker Shunsuke YAO Hiroaki AWANO Yasushi HIRAOKA Kazuko TAKAHASHI Abstract We discuss the modeling and verification of marine equipment

More information

Predicting and Learning Executability of Composite Web Services

Predicting and Learning Executability of Composite Web Services Predicting and Learning Executability of Composite Web Services Masahiro Tanaka and Toru Ishida Department of Social Informatics, Kyoto University Kyoto 606-8501 Japan mtanaka@ai.soc.i.kyoto-u.ac.jp, ishida@i.kyoto-u.ac.jp

More information

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Chapter3: OSI Reference Model: Network Software: Network

More information

COMP 763. Eugene Syriani. Ph.D. Student in the Modelling, Simulation and Design Lab School of Computer Science. McGill University

COMP 763. Eugene Syriani. Ph.D. Student in the Modelling, Simulation and Design Lab School of Computer Science. McGill University Eugene Syriani Ph.D. Student in the Modelling, Simulation and Design Lab School of Computer Science McGill University 1 OVERVIEW In the context In Theory: Timed Automata The language: Definitions and Semantics

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

Lecture (04 & 05) Data link layer fundamental

Lecture (04 & 05) Data link layer fundamental Lecture (04 & 05) Data link layer fundamental Dr. Ahmed M. ElShafee ١ Agenda Foundation Topics Typical LAN Features for OSI Layer 1 Typical LAN Features for OSI Layer 2 Standards Overview 10BASE2 and 10BASE5

More information

Formal Validation of DNA Database Using Theorem Proving Technique

Formal Validation of DNA Database Using Theorem Proving Technique Formal Validation of DNA Database Using Theorem Proving Technique Julaily Aida Jusoh, Md Yazid Mohd Saman, and Mustafa Man Jabatan Sains Komputer, Fakulti Sains Dan Teknologi, Universiti Malaysia Terengganu,

More information

Advanced Codes Settings for the H650IVN

Advanced Codes Settings for the H650IVN Advanced Codes Settings for the H650IVN Special Notes: Voice Mail- 30 minutes of record time. When the voice mail becomes full with recorded messages, new messages will not overwrite or erase stored messages.

More information

PROTOCOL ENGINEERING BY HARTMUT KöNIG

PROTOCOL ENGINEERING BY HARTMUT KöNIG Read Online and Download Ebook PROTOCOL ENGINEERING BY HARTMUT KöNIG DOWNLOAD EBOOK : PROTOCOL ENGINEERING BY HARTMUT KöNIG PDF Click link bellow and free register to download ebook: PROTOCOL ENGINEERING

More information

Formal Validation of DNA Database Using Theorem Proving Technique

Formal Validation of DNA Database Using Theorem Proving Technique Formal Validation of DNA Database Using Theorem Proving Technique Julaily Aida Jusoh, Md Yazid Mohd Saman, and Mustafa Man Jabatan Sains Komputer, Fakulti Sains Dan Teknologi, Universiti Malaysia Terengganu,

More information

Week - 01 Lecture - 03 Euclid's Algorithm for gcd. Let us continue with our running example of gcd to explore more issues involved with program.

Week - 01 Lecture - 03 Euclid's Algorithm for gcd. Let us continue with our running example of gcd to explore more issues involved with program. Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 01 Lecture - 03 Euclid's Algorithm

More information

Integrating SysML and OWL

Integrating SysML and OWL Integrating SysML and OWL Henson Graves Lockheed Martin Aeronautics Company Fort Worth Texas, USA henson.graves@lmco.com Abstract. To use OWL2 for modeling a system design one must be able to construct

More information

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Mitigating Malicious Activities by Providing New Acknowledgment Approach Mitigating Malicious Activities by Providing New Acknowledgment Approach G. S. Devi Lakshmi, J. Rajasekaran 2 PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India

More information

Chapter 8 Algorithms 1

Chapter 8 Algorithms 1 Chapter 8 Algorithms 1 Objectives After studying this chapter, the student should be able to: Define an algorithm and relate it to problem solving. Define three construct and describe their use in algorithms.

More information

The GBN sender must respond to three types of events:

The GBN sender must respond to three types of events: Go-Back-N (GBN) In a Go-Back-N (GBN) protocol, the sender is allowed to transmit several packets (when available) without waiting for an acknowledgment, but is constrained to have no more than some maximum

More information

Transport Protocols & TCP TCP

Transport Protocols & TCP TCP Transport Protocols & TCP CSE 3213 Fall 2007 13 November 2007 1 TCP Services Flow control Connection establishment and termination Congestion control 2 1 TCP Services Transmission Control Protocol (RFC

More information

Project Description Introduction Problem Statement

Project Description Introduction Problem Statement Project Description Introduction MarketVCR is a combination of a large multimedia data warehouse containing tick-by-tick quote and trade stock market data, video, audio and news articles, a web application

More information

Visualizing Verification. Adrian A. Marsh April 2004

Visualizing Verification. Adrian A. Marsh April 2004 Visualizing Verification Adrian A. Marsh April 2004 Abstract This paper proposes extending UML modeling to system verification. Changing the utilization of the UML diagrams will increase the quality of

More information

3D Graphics Programming Mira Costa High School - Class Syllabus,

3D Graphics Programming Mira Costa High School - Class Syllabus, 3D Graphics Programming Mira Costa High School - Class Syllabus, 2009-2010 INSTRUCTOR: Mr. M. Williams COURSE GOALS and OBJECTIVES: 1 Learn the fundamentals of the Java language including data types and

More information

Answers to Sample Questions on Transport Layer

Answers to Sample Questions on Transport Layer Answers to Sample Questions on Transport Layer 1) Which protocol Go-Back-N or Selective-Repeat - makes more efficient use of network bandwidth? Why? Answer: Selective repeat makes more efficient use of

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

System development, design & implementation

System development, design & implementation System development, design & implementation Design of software The following are the principle for any software design : Modularity and partitioning : Top down methods are used through out the analysis

More information

DigiPoints Series Volume 1. Leader Guide. Module 9 Network Architectures

DigiPoints Series Volume 1. Leader Guide. Module 9 Network Architectures Network Architectures Page 9.i DigiPoints Series Volume 1 Module 9 Network Architectures Summary This module describes the two primary arrangements by which signals are carried from one location to another:

More information

TCP Congestion Control

TCP Congestion Control TCP Congestion Control What is Congestion The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting

More information

TCP Congestion Control

TCP Congestion Control What is Congestion TCP Congestion Control The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

Trust4All: a Trustworthy Middleware Platform for Component Software

Trust4All: a Trustworthy Middleware Platform for Component Software Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software

More information

A SCHEME UNIT-TESTING FRAMEWORK

A SCHEME UNIT-TESTING FRAMEWORK A SCHEME UNIT-TESTING FRAMEWORK Sara von Mosch Division of Science and Mathematics University of Minnesota, Morris vonmoss@mrs.umn.edu Scott Lewandowski Division of Science and Mathematics University of

More information

Reliable Transport I: Concepts and TCP Protocol

Reliable Transport I: Concepts and TCP Protocol Reliable Transport I: Concepts and TCP Protocol Brad Karp UCL Computer Science CS 3035/GZ01 29 th October 2013 Part I: Transport Concepts Layering context Transport goals Transport mechanisms 2 Context:

More information

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Spring Second Exam.

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Spring Second Exam. Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.824 Spring 2005 Second Exam Answers 14 12 Number of students 10 8 6 4 2 0 0 10 20 30 40 50 60 70 80 90

More information

CS 520 Networking in the TCP/IP enviornment

CS 520 Networking in the TCP/IP enviornment CS 520 Networking in the TCP/IP enviornment Instructors: Dr. Esam Alwagait alwagait@ksu.edu.sa Dr. Mishari Almishari mialmishari@ksu.edu.sa Slide Set were original prepared by Dr. Tatsuya Susa Contacts

More information

Panasonic KX-TVS75, KXTVS75, TVS75, KX-TVS100, KXTVS100, TVS100, KX-TVS200, KXTVS200, TVS200

Panasonic KX-TVS75, KXTVS75, TVS75, KX-TVS100, KXTVS100, TVS100, KX-TVS200, KXTVS200, TVS200 POWER KX-TVS75 / KX-TVS100 / KX-TVS200 www.voicesonic.com Phone: 877-289-2829 VOICE PROCESSING SYSTEM Voice Processing System Subscriber s Guide Panasonic KX-TVS75, KXTVS75, TVS75, KX-TVS100, KXTVS100,

More information

DATA LINK LAYER UNIT 7.

DATA LINK LAYER UNIT 7. DATA LINK LAYER UNIT 7 1 Data Link Layer Design Issues: 1. Service provided to network layer. 2. Determining how the bits of the physical layer are grouped into frames (FRAMING). 3. Dealing with transmission

More information

Distributed Systems. Fault Tolerance. Paul Krzyzanowski

Distributed Systems. Fault Tolerance. Paul Krzyzanowski Distributed Systems Fault Tolerance Paul Krzyzanowski Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License. Faults Deviation from expected

More information

CompTIA Network+ Course

CompTIA Network+ Course CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

We give you the edge. Standard. Telephone. Integral TS 13. connected to ISDN Telecommunications Systems Integral. Operating Instructions

We give you the edge. Standard. Telephone. Integral TS 13. connected to ISDN Telecommunications Systems Integral. Operating Instructions We give you the edge. Telephone Standard Integral TS 13 connected to ISDN Telecommunications Systems Integral Operating Instructions Familiarise yourself with your telephone Important notes What you should

More information

Last Time. Introduction to Design Languages. Syntax, Semantics, and Model. This Time. Syntax. Computational Model. Introduction to the class

Last Time. Introduction to Design Languages. Syntax, Semantics, and Model. This Time. Syntax. Computational Model. Introduction to the class Introduction to Design Languages Prof. Stephen A. Edwards Last Time Introduction to the class Embedded systems Role of languages: shape solutions Project proposals due September 26 Do you know what you

More information

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: Fall :20-11:00 Tuesday January 13, 2004

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: Fall :20-11:00 Tuesday January 13, 2004 Final Examination Introduction to Computer Networks Class#: 901 31110 Fall 2003 9:20-11:00 Tuesday January 13, 2004 Prohibited 1. You are not allowed to write down the answers using pencils. Use only black-

More information

Goals for Today s Class. EE 122: Networks & Protocols. What Global (non-digital) Communication Network Do You Use Every Day?

Goals for Today s Class. EE 122: Networks & Protocols. What Global (non-digital) Communication Network Do You Use Every Day? Goals for Today s Class EE 122: & Protocols Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/fa09 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

CMPE 152 Compiler Design

CMPE 152 Compiler Design San José State University Department of Computer Engineering CMPE 152 Compiler Design Section 1 (Class) Sections 2 and 3 (s) Fall 2018 Course and Contact Information Instructor: Ron Mak Office Location:

More information

Abstract. Background. Introduction. Network Development

Abstract. Background. Introduction. Network Development Hybrid Communication Network for Autonomous Agents Joshua P. Bruckmeyer, Dr. Eric M. Schwartz, Dr. A. Antonio Arroyo Machine Intelligence Lab, University of Florida 2000 Florida Conference on Recent Advances

More information

ENM407 System Analysis Chapter 6. Requirement specifications Ress. Assis. Dr. Gülçin Dinç Yalçın

ENM407 System Analysis Chapter 6. Requirement specifications Ress. Assis. Dr. Gülçin Dinç Yalçın ENM407 System Analysis Chapter 6 Requirement specifications Ress. Assis. Dr. Gülçin Dinç Yalçın Required Logical Models Required Logical Models Required DFD Required Entity Model Required Logical Models

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

Modeling Interactions of Web Software

Modeling Interactions of Web Software Modeling Interactions of Web Software Tevfik Bultan Department of Computer Science University of California Santa Barbara, CA 9106 bultan@cs.ucsb.edu Abstract Modeling interactions among software components

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

Time and Place. Course Web Site. Grading Policy. Advanced Computer Networks. Lecture 1: Introduction to Course

Time and Place. Course Web Site. Grading Policy. Advanced Computer Networks. Lecture 1: Introduction to Course Time and Place Advanced Computer Networks Lecture 1: Introduction to Course Lecture: TuTh 10:30-12:00, Fr 9:30-10:30 Discussion: after paper discussion on Tue and/or Thu Room:1690 BBB Instructor: Sugih

More information