Creating Correct Network Protocols

نویسنده

  • Oskar Wibling
چکیده

List of Papers This thesis is based on the following papers, which are referred to in the text by their Roman numerals. The methodology used in this paper was previously presented in [99]. Reprints are made with permission from the publishers. My Contribution Paper I. In the work related to Paper I, I participated in developing the Windows version of LUNAR. I also performed initial verifications of LUNAR using SPIN; results of which are included in the paper. I co-authored the sections about the Windows version and the formal validation. of abstracting the flooding operation in order to reduce the state space explosion. Furthermore, I constructed the UPPAAL LUNAR model and executed the verifications for different parameter settings. Paper IV. In the work related to Paper IV, I participated in all parts: design of scenarios, implementation of analysis scripts, conducting experiments, and performing the analysis. I participated in the writing of the paper as a co-author. Paper V. I am one of the main authors of Paper V. The authors collaborated closely on all the work presented in this paper. We developed the theory and proofs together. I did most of the protocol modeling and led the work on implementing and optimizing our verification tool. Paper VI. I am one of the main authors of Paper VI. The authors collaborated closely on all the work presented in this paper. We developed the theory and proofs together. I did most of the program modeling and all the implementation work. Other Publications In addition to the papers included in this thesis, the following papers represent work that I have participated in and co-authored. Acknowledgments I would like to begin by thanking my main supervisor, Joachim Parrow, for giving me the opportunity to pursue a Ph.D. I appreciate our discussions and your careful reading and commenting of my writings. Your great enthusiasm is matched by few! Thanks also to my assistant supervisors through the years, Björn Victor, Arnold Pears, and Parosh Abdulla, for interesting conversations. A special thanks to Arnold for his recent effort in proofreading the thesis. I enjoyed very much working with the GBT project, in which Bengt Jonsson has acted as an unofficial supervisor. During this project I also had the pleasure of working with Mayank Saksena and Jörg Kreiker. Our collaboration was very fruitful and I think the outcome is excellent! Thanks for all our pleasant and constructive discussions. …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Source routing in Mobile Ad hoc NETworks (MANETs)

Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and selfadministrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover a...

متن کامل

Visualizing the Internet protocol TCP

Protocols are designed to ensure correct transmission of data when communicating over error-prone media. Understanding exactly how a protocol functions over time can be greatly enhanced if the protocol is visualized. This article discusses the Transmission Control Protocol used in the Internet, and presents an application that visualizes it. Future work aims at extending the application to show...

متن کامل

Survey of Secure Routing Protocols for MANETs (MOBILE ADHOC NETWORKS)

Many academic papers evaluate protocols and their abilities, assuming varying degrees of mobility within a bounded space, usually with all nodes within a few hops of each other. Different protocols are then evaluated based on measure such as the packet drop rate, the overhead introduced by the routing protocol, end-to-end packet delays, network throughput etc. Network sizes and occurrences incr...

متن کامل

Computer Network Protocols by Aggregate Approach

The aggregate approach to the formal description, verification and simulation of computer network protocols is considered in the paper. With this approach, the offered design stages can be performed using a single mathematical scheme. The reachability analysis m~thod and the program proof technique are viewed as methods for correctness analysis. The proposed approach for correctness analysis an...

متن کامل

Network Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment

Abstract- Efficient message delivery in city environment is required to ensure driver’s safety and passenger’s comfortability. In cities of developed nations, routing of data in vehicular Ad hoc Network (VANET) faces many challenges such as radio obstacles, mobility constraints and uneven nodes distribution. These factors primarily makes communication between vehicles complex. To overcome and t...

متن کامل

Modeling of VANET Technology & Ad-Hoc Routing Protocols Based on High Performance Random Waypoint Models

Today, one of the new technologies in the modern era is Vehicular Ad-hoc Network which has takenenormous attention in the recent years. Because of rapid topology changing and frequent disconnectionmakes it difficult to design an efficient routing protocol for routing data between vehicles, called V2V orvehicle to vehicle communication and vehicle to roadside infrastructure, called V2I. Designin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008