Formal Verification of Ad hoc On-demand Distance Vector (AODV) Protocol using Cadence SMV

Size: px
Start display at page:

Download "Formal Verification of Ad hoc On-demand Distance Vector (AODV) Protocol using Cadence SMV"

Transcription

1 Formal Verification of Ad hoc On-demand Distance Vector (AODV) Protocol using Cadence SMV Xin Liu and Jun Wang Department of Computer Science, University of British Columbia 2366 Main Mall, Vancouver, BC, Canada, V6T 1Z4 {liu, ABSTRACT Routing protocols usually consist a huge state space (exponentially increase with the number of entities involved in the protocol) because of the concurrency and data-centric properties. The naïve approaches which directly use traditional verification techniques like explicit state exploration (e.g. Murphy [9]) or symbolic model checking (e.g. SMV [3]) often cannot make much progress due to the state explosion problem. Wireless routing protocol poses additional challenges, that is, the nature of the unstable environment requires wireless communication protocol to maintain extra information to keep a certain level of availability and fault tolerance. Also, the network topology changes require a more complex model. This makes the originally serious state explosion problem even worse. This paper studies a well-known routing protocol AODV (ad-hoc on demand distance vector routing). We propose an approach to decompose the whole problem into relatively small problems and describe techniques to handle specific properties of communication protocols. KEYWORDS: model checking, node, network topology, state explosion 1. INTRODUCTION With the mature of various wireless communication technologies, people put lots of attention to develop efficient and reliable wireless routing protocols. It is a great opportunity for verification community to get involved in a new, important and promising application domain. However, it also poses a big challenge to traditional verification techniques because unlike combinational logic and other simple interacting finite state machine, wireless routing protocol does not only involve concurrency, but also need to keep large amount of local data which depend on each other s state and network topology. Moreover, the network topology in wireless computing environment is not fixed and therefore the way those concurrent finite state machines (or nodes in terms of application domain) interact should also vary. Some previous works have been done on the verification of wired routing protocols and even wireless routing protocols. [4] verifies RIP using SPIN [13] and HOL. [7] uses SPIN [13] and PROMELA to verify ATM Routing Protocol PNNI(Private Network-Network Interface). At the wireless side, [4] also uses SPIN to verify AODV. [8] also verifies AODV, but through a timed automata approach. However, these approaches only handle very small number of nodes (typically two or three nodes) and extremely simple and fixed network topology (even for wireless protocol). We argue that although their models can provide a relatively accurate representation of a single node s behaviour, they do not provide satisfactory solution to state explosion problem and therefore cannot be extended to handle even slightly more complicated network topology. Also, 1

2 fixed network topology is definitely an unreasonable assumption for wireless protocol since in real environment nodes tend to be very dynamic and can move around without any restriction. This property therefore suggests a dynamic network topology. However, we are not claiming that there must exist a way to use existing tools to verify arbitrarily large networks. Since each entity in the network must keep some minimum local information which depends on the current network state, these mutually dependent local data suggest that the state space has to be huge no matter how we build the model. Moreover, the dynamic property of wireless networking environment implies that more state variables must be used to keep track of the network topology from the global point of view. In this paper we propose a method to decompose the dynamic networks into representative categories and use a step by step approach to verify big networks. We also provide a simple yet general approach to handle the modeling of timeout, sequence number and message channels. We argue that due to some special properties of routing protocols, the modeling of timeout, sequence number, and message channels can be greatly simplified and abstracted without losing generality. The remainder of this paper is organized as follows. Section 2 gives an introduction to Symbol Model Checking. Section 3 gives a brief introduction of AODV algorithm and describes some terminology which we will use later. In section 4, we give details about our approach to break the problem set and how to model them. The bug we found during the verification, along with some thoughts about the protocol specification is described in section 5. Section 6 generalizes the way we deal with each specific challenge to the verification of wireless routing protocol. Section 7 concludes the paper. 2. SYMBOLIC MODEL CHECKING In this section we briefly describe the concept of symbolic model checking and the Cadence SMV tool. Symbolic Model Checking [3] is a formal verification technique. Instead of explicitly representing state space using tables or lists, symbolic model checking makes use of Binary Decision Diagram (BDD) [5] to give a symbolic representation of state space. Therefore, in terms of verification, instead of explicitly exploring the whole state space by using some graph searching algorithms (such as depth first search and breadth first search), symbolic model checking uses image computation to derive the state space represented in BDD form. People claim that in many cases the complexity of state space is much less than the number of states [3]. The most well-known tool that makes use of symbolic model checking is SMV series. In this paper we use Cadence SMV [6], which is designed in Cadence Berkeley Lab. The properties to be verified are specified in LTL (Linear Temporal Logic). Although originally it is designed mainly as a verification system for hardware design, many people started to apply it to more general and software-based verification tasks. As powerful as Cadence SMV is, users still need to do compositional verification [6]. Cadence SMV provides various approaches, such as Refinement Mapping, to classify and decompose complex problem domain. Cadence SMV has a very efficient way of verifying properties of combinational logic and interacting finite state machines, but it does not have an efficient way of handling real numbers or integers. 2

3 3. AODV AODV, also known as Ad hoc On-demand Distance Vector protocol, is an IETF standardizing protocol for MANET (Mobile Ad-hoc Network). It is designed by Charles E. Perkins and Elizabeth M. Royer and was first published in The version we are working with is its latest RFC version, also known as RFC3561 [2]. There is a newer draft version of AODV protocol, but since it is incomplete and most discussions about this protocol are based on RFC3561, we decided not to use the new draft. Therefore, we are not responsible for the incompatibility issues raised by the newer version. Like other Ad-hoc networking protocol, it does not rely on the coordination of a Access-Point or Base Station, instead, neighbouring nodes can recognize each other and then build or join small groups. The way AODV works is based on On-Demand approach which uses distance vector to build a path to a destination node whenever it is necessary. The advantage of this approach is that it can adapt to the network topology change quickly and therefore is suitable to be deployed on highly mobile network environment. Also, the on-demand property results in low-processing requirement and low-network utilization. However, like other distance vector based routing protocols, the biggest challenge is to avoid loop condition. Because whenever it is trapped into some loop conditions, it might stay in the loop infinitely without noticing it. The RFC3561 claims that AODV protocol is now loop-free, and our work shows that this is not the case. The protocol itself is relatively simple. There are 3 types of control messages, RREQ stands for route discovery message, RREP stands for reply message and RERR stands for error message. As the name suggested already, RREQ is used to discover a route when current node wants to send a data packet to another node but it does not have a valid path to that node. On the other hand, RREP message is generated to reply the initiator of the RREQ message when a node itself is the destination node or it knows a valid route to the destination node. RERR message is used when a node notices a link-break or in the case some other error conditions appear. More details about this protocol can be found in [1]. 4. MODEL As we stated in the introduction, wireless routing protocol, such as AODV, does not only involve concurrency, but also need lots of local data to store the routing information. It also needs to keep some data to track the network topology. So, simply employing the naïve approaches which directly model the protocol according to its specification will often encounter the state explosion problem, which makes the verification impossible. This is proved by the experience on our first version model, in which we try to give a general and complete model according to the RFC3561 (in this model, every node can initiate a route discovery and can be the destination, and every node maintains the routing table). On our desktop PC with Pentium4 CPU 2.4GHz, 1GB RAM, two nodes model consumes 400 MB memory and runs for 10 minutes, but three nodes model encounters the state explosion and can not run further. To avoid the state explosion, we use an approach which decomposes the whole problem into relatively small problems, in more detail, we enumerate all the possible network topologies, and model each meaningful topology separately. The beauty of this method is that in each model, the 3

4 network topology is known, so we can give specific role (originator, intermediator, or destination) to each node, thus the state space can be reduced significantly. Furthermore, by using this approach, we can minimize the nodes local variables further, for example, the routing table of destination node can be removed. Figure 1 gives the meaningful network topologies for three nodes, which are named linear topology and triangle topology. Figure 2 gives the meaningful network topologies for four nodes, called star topology, umbrella topology, linear topology, diamond topology, camel topology, and complete topology, respectively. (The link between two nodes means that they can communicate with each other) Figure 1. Meaningful network topologies for three nodes Figure 2. Meaningful network topologies for four nodes We should mention that this approach also deals with dynamic network topology changes. Starting from the simplest topology, we can go step by step to verify more complex topologies. The idea is if we know that certain properties held in some simpler topologies and if we can prove that a more complex topology can be scaled-down to those simpler versions with certain changes and these changes will not affect the properties, then we know that these properties will hold in the more complex topology no matter how its topology changes, providing that without changes those 4

5 properties held in that topology. For example, in order to verify that with dynamic network changes, the 3-nodes triangle type is always loop-free, we can first verify that this property held in the 3-nodes linear type. Note that when network topology changes in this triangle type, for example, the destination node moves around, the only interesting case is that it cannot talk to originator anymore, which is exactly the same as what 3-nodes linear type looks like. Therefore, if we can verify that loop-free is true in the period after the link originator-destination breaks and before the network becomes a stable linear type again, then we know that the dynamic topology change will not affect the loop-free property in this case. Although this approach is sound but not complete, it does cover lots of interesting cases which cannot be covered by other approaches. In our current work, we have modeled the 3-nodes linear topology and triangle topology. For four nodes, star topology and umbrella topology are modeled. Table 1 gives the running results of these models except for the four nodes umbrella topology. We should mention here that when we run 4-nodes umbrella topology model, the Cadence SMV crash when the model consumes 600 MB memory. We think that there must be some bugs in the current implementation of Cadence SMV to cause this crash. Since the time limit, we cannot find why this is case, but we believe with a more concise and specific model, our approach is able to handle at least this topology. State variables Consumed Memory Running time 3-nodes linear topology MB 4 minutes 3-nodes triangle topology MB 4.5 minutes 4-nodes star topology MB 2 minutes Table 1. Running results of models 5. LOOP CONDITION The models we described above do not consider the data packet. With these models, Cadence SMV does not find counterexamples. However, this does not mean that the specification of AODV (RFC3561) which we work on is loop free. It is very likely that SMV does not find bugs because the models have done too much abstraction, and some of the abstractions hide the bugs. After carefully reviewing RFC3561, we believe that not considering data packet is kind of over abstraction, so we decide to add data packet into the models. As a result, the three nodes triangle model does find a bug which can result in loop. Following section describes this bug in detail Loop Condition Appendix demonstrates the bug we found. Suppose we have 3 nodes: A, B, and C. A is originator, B is intermediator, and C is the destination. Initially, A has a route to C via B, and the destination sequence number is 0. Suddenly the link between B and C break, B find this link break and start repair. It broadcasts a RREQ message with destination sequence number 1, but this message is lost (this is showed in Figure 3(a)). Then the repair at node B timeout, it increase the route entry s destination sequence number to 1 and set the route entry invalid, it also send a RERR message with destination sequence number 0 to A, however this message is lost too (showed as in Figure 3(b)). Later B want to send data to destination C, but it find it does not have a valid route to C, so it initiate a route discovery. It broadcast a RREQ message with destination sequence number 1. Node A receive this message and forward it to C, since destination sequence number in RREQ 5

6 message is greater than the destination sequence number in node A s route entry (this is showed in Figure 3(c)). When C receives the RREQ message, it increases its sequence number to 1 and sends a RREP message back to A. At the same time, node A sends a data packet destining C to node B. This is reasonable because A has valid route to destination C via B (showed as Figure 3(d)). As the RREP message arrives at node A, A update its route table and send a RREP message to node B. For node B, when it receive the data packet sent by A, it find that it does not have a valid route to destination C, so it send a RERR message with destination sequence number 1 back to A (this is showed in Figure 3(e)). When node B receives the RREP message, it updates its routing table. From now, node B has a valid route to destination C via A. When node A receives the RERR message, it set its route entry invalid, so now it doesn t know how to get destination C (showed as Figure 3(f)). Later link AC break. Following this link break, node A want to send data to C, but it doesn t have a valid route, so it initiate a route discovery. It sends RREQ to node B. Node B receives this RREQ message, sends back a RREP message to A, thus we get loop between A and B, which is showed as Figure 3(g) and Figure 3(h) Other Problems in the Specification Virtually all standard specifications contain ambiguities and omissions, RFC3561 is no exception. After carefully review the standard, we find that the specification doesn t say how to set the destination sequence number of RERR message when generate it (we set the destination sequence number copied from route entry, which we think is reasonable). The specification is also not clear about what to do after receiving RERR message. 6. VERIFICATION CHALLENGES AND SOLUTIONS In this section we list several common challenges that must be dealt with when verifying routing protocols. For each challenge, we also describe the approach we used to solve it and why we believe this is the proper approach.. Lots of these challenges can be handled by nondeterminism. However, we need to distinguish Global order (total order) and Partial order (local order) before we apply nondeterminism technique. Generally speaking, nondeterminism is more suitable to handle partial order rather than total order. Detailed discussion is provided later Timeout Many verification tools (e.g. Murphy, SMV) do not provide direct support for time-related operations, and even if time is built into the tool (e.g. SPIN), the support is still very rudimentary. Therefore, timeout is usually modeled either by nondeterminism or a counter. As long as the property we need to verify is not directly related to real-time, the above two approaches are usually good enough. However, unlike some real time protocols, correctness of routing protocol should not depend completely on some tight and concrete time constraints. The nature of the network, especially wireless network, makes any tight and concrete time constraint unreasonable. Here, by saying tight we mean any bound that is tighter than the possible maximum live time of a message that can stay in network without being discarded. Therefore, the value of timeout should be considered as a suggestion, which can be used to improve the performance of routing protocols. In our work we use nondeterminism approach, which is not only reasonable but also effective in terms of verifying loop-free property. 6

7 However, pure nondeterminism is also not a good solution because certain events should happen in some determined order. This is the concept of global order and partial order. Partial order is a perfect match to nondeterminism, but global order (total order) is not. For example, if event A happens before event B, and both of them start a timer (with same value), then the timeout event of event A should occur before the timeout event of event B. This is a subtle point which is very likely to be missed during the initial modelling. On the other hand, without considering these points, we might get many unrealistic solutions. We use two methods to solve this problem. The first is to add fairness constraint to prune unrealistic paths. However, this will lead to very complicated Temporal Logic statement and may affect the performance. The other approach, which we believe is better, is to plug the order into model. In terms of the example stated above, instead of making two independent processes describing the timeout event, one can pass a common boolean variable as argument to them, which states that if A happens before B, then A should timeout before B Lifetime and TTL These two time-related parameters are widely used in AODV and other routing protocols as well. If it is necessary, then we can use the same approach as described in last section to model them. However, in order to avoid the state explosion, usually they are excluded from the final model unless their values will affect the correctness of the property to be verified Periodical Message This is a common operation in most of the routing protocols. The liveness of a route usually depends on these messages, for example, the HELLO message in AODV is used to determine the liveness of neighbouring nodes. Again, for tools without a built-in concept as TIME, periodical message cannot be model in a straightforward fashion. Some other tools, such as SPIN, Verus might be more suitable in terms of modeling these messages. We think it is not possible to model the exact behaviour in Cadence SMV directly, therefore, we use the reverse approach, which is to model the consequence of receiving or not receiving these messages instead of modeling the message itself. The consequence of receiving or not receiving these periodic messages is modeled to happen nondeterministically. For example, instead of modeling sending HELLO messages, we use a process link_break to represent what happens if no HELLO message is received in a given period. This approach gives an additional abstraction of the actual behaviour, therefore, it is not a perfect solution and may generate more unreasonable counter examples. But with a careful design of the model itself and some fairness constraints, we can get rid of most uninteresting and unrealistic behaviour Sequence Number Sequence number modeling is also a big challenge to verification. Like many other verification tools, Cadence SMV does not have a specific representation of real number or integer. Integer is treated as Enumeration type and therefore is kept in its binary form. However, this enumeration type of representation causes a single variable to have the same number of values as the bits that are used to represent all the integers. For example, if the sequence number is from 0 to 1023, then each state variable will have 1024 choices and each asks for 10 bits to represent. Since SMV checks models by exploring all the possibilities of these values, the state explosion problem is 7

8 very seriously. Without the tool support, there is no perfect way of solving this problem. The approach we use is just to set a very small upper bound on sequence number. In addition, we use an INVALID value indicating the end of the verification task. Whenever any sequence number based variable is assigned a value as INVALID, then it will not change again and thereby the model will converge very fast. Although it is true that by doing this, the verification will not be complete any more, the improvement of performance usually beats the disadvantage. Just like the tradeoff happening here, we would rather use more abstracted model to verify as much as we can instead of using a complete model and thereby cannot verify anything at all. Moreover, the incompleteness can often be minimized or even eliminated by a carefully overall design (e.g. decomposition of problem domain) Channel and Message Buffer This is a challenge because in real protocol, message buffers tend to be huge and a single channel can contain multiple messages at the same time. However, in terms of verification, we cannot afford so many individual states. We argue that setting an arbitrary upper bound on buffer size will not help because no matter which value you choose, it will not be general enough to represent the actual behaviour of channel or message buffer. The good news is, since we model the protocol in terms of nondeterministic finite state machine, as long as it is not necessary to model the case like certain number of k (k > 1) messages must be sent by node A and C before node B can handle one of the messages, then setting buffer size to be 1 should probably be general enough to satisfy the verification requirements (here we are not considering the reordering of messages, which will be discussed next). In terms of verifying Loop-free property, AODV does fall into this category Message Reorder This is not a big problem for routing protocol because it is reasonable to assume that on a single link, message should arrive in order. This property is guaranteed by the underlying network. For details about this property, interested readers can refer to ETHERNET specification for wired network and IEEE802.11b for wireless network. Therefore, when we talk about message reordering in these areas, we actually mean the reordering due to the network congestion, which involves several nodes and channels. Since different node and channel is modelled separately, using size 1 as message buffer or channel capacity is reasonable Message Loss This is common to wireless networking because the unreliable communication environment. It is easy to think of modelling it by using nondeterministic message_loss process. However, there is still one problem. If the property we want to verify is related to reachability, then the verification process will probably return false because from SMV s point of view, it is reasonable that a message can never reach its destination. In order to avoid this, certain fairness constraints should be used to prune corresponding scenarios. However, these constraints can turn out to be very hard to write and even if you can write them, they often tend to be too expensive to compute. 7. CONCLUSION AND FUTURE WORK Routing protocols, especially wireless routing protocols, have some special properties that challenge traditional verification techniques. There is no straightforward approach to verify a 8

9 routing protocol automatically by using existing tools alone. Even with the help from some tools targeting at communication protocols, such as SPIN, the verification can only handle a fairly small network. Cadence SMV is a powerful tool, but based on our experience, we think it is not suitable for verifying routing protocols, although we use it and finally find a bug in current RFC specification of AODV protocol. In this paper, we propose a general approach to decompose a big network into handful pieces and we show how this approach can be used to handle the challenge coming from the dynamic network topology change. However, even with help from this approach, it is still very difficult to solve the state explosion problem. Here is a tradeoff. We can do more abstraction and thereby shrink the state space. Proving the abstract model is correct will automatically imply the correctness of the properties that are included in the abstract model. However, properties that are excluded from the abstract model are still left unproved. Therefore, too much abstraction makes the verification more unrealistic and it is hard to discover bugs. On the other hand, we can do less abstraction and model more details, but by doing this we might not be able to verify anything at all. Therefore, a certain level of abstraction has to be used. The limitation of our current work is that we can not find a proper level of abstraction, which can be used to verify certain properties without losing generality, and can be easily configured to handle more complex network and verify more complicated properties. We leave this as our future work. REFERENCES [1] AODV Homepage. [2] AODV RFC [3] J. R. Burch, E.M. Clarke, K.L. McMillan, D.L. Dill, L.J. Hwang. Symbolic Model Checking: States and Beyond. Information and Computation, Vol. 98, No. 2, June [4] K. Bhargavan, D. Obradovic, C. Gunter. Formal Verification of Standards for Distance Vector Routing Protocol. J. ACM 49(4): (2002) [5] R. Bryant. Symbolic Boolean Manipulation with Ordered Binary Decision Diagrams. CMU CS Tech Report CMU-CS [6] Cadence SMV Documentation [7] D. Cypher, D. Lee, M. Villalba, C. Prins, D. Su. Formal Specification, Verification, and Automatic Test Generation of ATM Routing Protocol: PNNI. In Proceedings of FORTE/PSTV'98, Case Studies in Protocols,1998 [8] S. Chiyangwa, M. Kwiatkowska. Modeling Ad hoc On-demand Distance Vector (AODV) Protocol with Time Automata, in proceedings of Third Workshop on Automated verification of Critical Systems (AVoCS'03), Southampton April 2003 [9] D.L. Dill, A.J. Drexler, A.J. Hu, C.H. Yang. Protocol Verification as a Hardware Design Aid. International Converence on Computer Design, [11] K. Havelund, N. Shankar. Experiments in Theorem Proving and Model Checking for Protocol Verification. In Proceedings of FME 96, LNCS 1051 [12] Davor Obradovic, Formal Analysis of Convergence of Routing Protocols, Ph.D. Thesis Proposal, Department of Computer and Information Science, University of Pennsylvania, November 28, 2000 [13] SPIN Homepage. 9

10 APPENDIX LOOP CONDITION Figure 3. shows the bug we find which can result in loop. Message format: RREQ: dest_seq RREP: dest_seq, hop_count RERR: dest_seq Figure 3(a) Figure 3(b) Figure 3(c) Figure 3(d) 10

11 Figure 3(e) Figure 3(f) Figure 3(g) Figure 3(h) 11

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Ad hoc On Demand Distance Vector (AODV) Routing Protocol Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

Model Checking based Software Verification

Model Checking based Software Verification Model Checking based Software Verification 18.5-2006 Keijo Heljanko Keijo.Heljanko@tkk.fi Department of Computer Science and Engineering Helsinki University of Technology http://www.tcs.tkk.fi/~kepa/ 1/24

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV

More information

An Efficient AODV-Based Algorithm for Small Area MANETS

An Efficient AODV-Based Algorithm for Small Area MANETS An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant

More information

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S ramya_88@yahoo.com, k shobsi@yahoo.co.in,thangam_85@yahoo.com Department of Computer Science,

More information

Study of Network Characteristics Incorporating Different Routing Protocols

Study of Network Characteristics Incorporating Different Routing Protocols Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab

More information

Model Checking: An Introduction

Model Checking: An Introduction Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI

More information

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2 International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1

More information

Formal Languages and Automata Theory - Regular Expressions and Finite Automata -

Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March

More information

T-79.186 Reactive Systems: Introduction and Finite State Automata

T-79.186 Reactive Systems: Introduction and Finite State Automata T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection

More information

Introduction to Formal Methods. Các Phương Pháp Hình Thức Cho Phát Triển Phần Mềm

Introduction to Formal Methods. Các Phương Pháp Hình Thức Cho Phát Triển Phần Mềm Introduction to Formal Methods Các Phương Pháp Hình Thức Cho Phát Triển Phần Mềm Outline Introduction Formal Specification Formal Verification Model Checking Theorem Proving Introduction Good papers to

More information

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Coverability for Parallel Programs

Coverability for Parallel Programs 2015 http://excel.fit.vutbr.cz Coverability for Parallel Programs Lenka Turoňová* Abstract We improve existing method for the automatic verification of systems with parallel running processes. The technique

More information

Chapter 4. Distance Vector Routing Protocols

Chapter 4. Distance Vector Routing Protocols Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.

More information

Keywords: DSDV and AODV Protocol

Keywords: DSDV and AODV Protocol Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison

More information

6.080/6.089 GITCS Feb 12, 2008. Lecture 3

6.080/6.089 GITCS Feb 12, 2008. Lecture 3 6.8/6.89 GITCS Feb 2, 28 Lecturer: Scott Aaronson Lecture 3 Scribe: Adam Rogal Administrivia. Scribe notes The purpose of scribe notes is to transcribe our lectures. Although I have formal notes of my

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

Static Program Transformations for Efficient Software Model Checking

Static Program Transformations for Efficient Software Model Checking Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the

More information

The Model Checker SPIN

The Model Checker SPIN The Model Checker SPIN Author: Gerard J. Holzmann Presented By: Maulik Patel Outline Introduction Structure Foundation Algorithms Memory management Example/Demo SPIN-Introduction Introduction SPIN (Simple(

More information

Testing LTL Formula Translation into Büchi Automata

Testing LTL Formula Translation into Büchi Automata Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Automata-based Verification - I

Automata-based Verification - I CS3172: Advanced Algorithms Automata-based Verification - I Howard Barringer Room KB2.20: email: howard.barringer@manchester.ac.uk March 2006 Supporting and Background Material Copies of key slides (already

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

Managing Variability in Software Architectures 1 Felix Bachmann*

Managing Variability in Software Architectures 1 Felix Bachmann* Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA fb@sei.cmu.edu Len Bass Software Engineering Institute Carnegie

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) SFWR 4C03: Computer Networks & Computer Security Jan 31-Feb 4, 2005 Lecturer: Kartik Krishnan Lecture 13-16 Internet Control Message Protocol (ICMP) The operation of the Internet is closely monitored by

More information

Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification

Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks www.ijcsi.org 118 -Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks Vijayalakshmi P 1, Dr.V.Saravanan 2, Dr. P. Ranjit Jeba Thangiah 3, Abraham Dinakaran.J 4 1 Karunya

More information

Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks

Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Anders Nilsson, Ali Hamidian, Ulf Körner Department of Communication Systems Lund University, Sweden Box118,221Lund

More information

Routing with OSPF. Introduction

Routing with OSPF. Introduction Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption

More information

InfiniBand Clustering

InfiniBand Clustering White Paper InfiniBand Clustering Delivering Better Price/Performance than Ethernet 1.0 Introduction High performance computing clusters typically utilize Clos networks, more commonly known as Fat Tree

More information

Internet Connectivity for Ad hoc Mobile Networks

Internet Connectivity for Ad hoc Mobile Networks Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins

More information

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh Distance Vector Routing Protocols Routing Protocols and Concepts Ola Lundh Objectives The characteristics of distance vector routing protocols. The network discovery process of distance vector routing

More information

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and

More information

Wireless Mesh Networks under FreeBSD

Wireless Mesh Networks under FreeBSD Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much

More information

3. Mathematical Induction

3. Mathematical Induction 3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)

More information

A Strategy for Teaching Finite Element Analysis to Undergraduate Students

A Strategy for Teaching Finite Element Analysis to Undergraduate Students A Strategy for Teaching Finite Element Analysis to Undergraduate Students Gordon Smyrell, School of Computing and Mathematics, University of Teesside The analytical power and design flexibility offered

More information

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks , pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering

More information

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams André Ciré University of Toronto John Hooker Carnegie Mellon University INFORMS 2014 Home Health Care Home health care delivery

More information

A Logic Approach for LTL System Modification

A Logic Approach for LTL System Modification A Logic Approach for LTL System Modification Yulin Ding and Yan Zhang School of Computing & Information Technology University of Western Sydney Kingswood, N.S.W. 1797, Australia email: {yding,yan}@cit.uws.edu.au

More information

Formal Verification of Software

Formal Verification of Software Formal Verification of Software Sabine Broda Department of Computer Science/FCUP 12 de Novembro de 2014 Sabine Broda (DCC-FCUP) Formal Verification of Software 12 de Novembro de 2014 1 / 26 Formal Verification

More information

PERA: Ad-Hoc Routing Protocol for Mobile Robots

PERA: Ad-Hoc Routing Protocol for Mobile Robots PERA: Ad-Hoc Routing Protocol for Mobile Robots Carlos Agüero Vicente Matellán Pedro de-las-heras-quirós José M. Cañas DIET (Departamento de Informática, Estadística y Telemática) Universidad Rey Juan

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Model Checking of Software

Model Checking of Software Model Checking of Software Patrice Godefroid Bell Laboratories, Lucent Technologies SpecNCheck Page 1 August 2001 A Brief History of Model Checking Prehistory: transformational programs and theorem proving

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

A Survey: High Speed TCP Variants in Wireless Networks

A Survey: High Speed TCP Variants in Wireless Networks ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:

More information

CAODV: Routing in Mobile Ad-hoc Cognitive Radio Networks

CAODV: Routing in Mobile Ad-hoc Cognitive Radio Networks : Routing in Mobile Ad-hoc Cognitive Radio Networks Angela Sara Cacciapuoti, Cosimo Calcagno, Marcello Caleffi Department of Biomedical, Electronics and Telecommunications Engineering University of Naples

More information

OPNET - Network Simulator

OPNET - Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET - Network Simulator Jarmo Prokkola Project Manager, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

WRITING PROOFS. Christopher Heil Georgia Institute of Technology

WRITING PROOFS. Christopher Heil Georgia Institute of Technology WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this

More information

Notes on Complexity Theory Last updated: August, 2011. Lecture 1

Notes on Complexity Theory Last updated: August, 2011. Lecture 1 Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look

More information

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund

More information

Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services

Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services Seth Gilbert Nancy Lynch Abstract When designing distributed web services, there are three properties that

More information

A Link-state QoS Routing Protocol for Ad Hoc Networks

A Link-state QoS Routing Protocol for Ad Hoc Networks A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,

More information

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India

More information

Standard for Software Component Testing

Standard for Software Component Testing Standard for Software Component Testing Working Draft 3.4 Date: 27 April 2001 produced by the British Computer Society Specialist Interest Group in Software Testing (BCS SIGIST) Copyright Notice This document

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Neighbour Discovery in IPv6

Neighbour Discovery in IPv6 Neighbour Discovery in IPv6 Andrew Hines Topic No: 17 Email: hines@zitmail.uni-paderborn.de Organiser: Christian Schindelhauer University of Paderborn Immatriculation No: 6225220 August 4, 2004 1 Abstract

More information

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,

More information

Regular Expressions and Automata using Haskell

Regular Expressions and Automata using Haskell Regular Expressions and Automata using Haskell Simon Thompson Computing Laboratory University of Kent at Canterbury January 2000 Contents 1 Introduction 2 2 Regular Expressions 2 3 Matching regular expressions

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

New Implementations into Simulation Software NS-2 for Routing in Wireless Ad-Hoc Networks

New Implementations into Simulation Software NS-2 for Routing in Wireless Ad-Hoc Networks New Implementations into Simulation Software NS-2 for Routing in Wireless Ad-Hoc Networks Matthias Rosenschon 1, Markus Heurung 1, Joachim Habermann (SM IEEE) 1 ABSTRACT 1 Fachhochschule Giessen-Friedberg,

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

The Course. http://www.cse.unsw.edu.au/~cs3153/

The Course. http://www.cse.unsw.edu.au/~cs3153/ The Course http://www.cse.unsw.edu.au/~cs3153/ Lecturers Dr Peter Höfner NICTA L5 building Prof Rob van Glabbeek NICTA L5 building Dr Ralf Huuck NICTA ATP building 2 Plan/Schedule (1) Where and When Tuesday,

More information

tutorial: hardware and software model checking

tutorial: hardware and software model checking tutorial: hardware and software model checking gerard holzmann and anuj puri { gerard anuj } @research.bell-labs.com Bell Labs, USA outline introduction (15 mins) theory and algorithms system modeling

More information

RESOURCE DISCOVERY IN AD HOC NETWORKS

RESOURCE DISCOVERY IN AD HOC NETWORKS RESOURCE DISCOVERY IN AD HOC NETWORKS Diane Tang Chih-Yuan Chang Kei Tanaka Mary Baker Technical Report No.: CSL-TR-98-769 August 1998 This project is in part supported by FX Palo Alto Laboratories and

More information

AUTOMATED TEST GENERATION FOR SOFTWARE COMPONENTS

AUTOMATED TEST GENERATION FOR SOFTWARE COMPONENTS TKK Reports in Information and Computer Science Espoo 2009 TKK-ICS-R26 AUTOMATED TEST GENERATION FOR SOFTWARE COMPONENTS Kari Kähkönen ABTEKNILLINEN KORKEAKOULU TEKNISKA HÖGSKOLAN HELSINKI UNIVERSITY OF

More information

GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT

GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT Why Data Domain Series GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT Why you should take the time to read this paper Speed up backups (Up to 58.7 TB/hr, Data Domain systems are about 1.5 times faster

More information

Internet Protocol Address

Internet Protocol Address SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information