Automatic Timeliness Verification of a Public Mobile Network

نویسندگان

  • Ester Ciancamerla
  • Michele Minichino
  • S. Serro
  • Enrico Tronci
چکیده

This paper deals with the automatic verification of the timeliness of Public Mobile Network (PMN), consisting of Mobile Nodes (MNs) and Base Stations (BSs). We use the Murphi Model Checker to verify that the waiting access time of each MN, under different PMN configurations and loads, and different inter arrival times of MNs in a BS cell, is always below a preassigned threshold. Our experimental results show that Model Checking can be successfully used to generate worst case scenarios and nicely complements probabilistic methods and simulation which are typically used for performance evaluation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and implementation of an automatic car turning system

In this paper, a control system is designed for automatic car turning. At first, the necessary information of car turning that were collected from the traffic bylaw, car driving training centers and traffic police are explained. Then, car turning is studied experimentally on several streets with different widths. Afterward, a proper path is designed for the automatic car turning system consider...

متن کامل

Financial Reporting Delay and Investors Behavior: Evidence From Tunisia

This study empirically investigates the relationship between the timeliness of the financial reporting and the corporate governance proxies for companies listed on the Tunisian stock exchange during 2009.It investigates the role of the corporate governance mechanisms on the timeliness of corporate financial reporting besides; it investigates the relationship between the company size, leverage, ...

متن کامل

The effect of timeliness of benefits and costs on mobile coupon sharing: a moderating role of use of length in social network sites

Timeliness of benefits and costs have some unusual effects on m-coupon sharing. Length of use was considered as a moderating variable between the relationship of long-term factors and sharing intention. This paper provides a new perspective for retailers and SNSs generating a strategy of mobile marketing and the spreading of eWOMs.

متن کامل

A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment

With fast evolution of mobile devices and mobile network, the need of protecting user sensitive information locally and performing secure user authentication remotely become evermore increasing. Bio-cryptography is emerging as a powerful solution which can combine the advantages of conventional cryptography and biometric security. In this paper, we present an efficient bio-cryptographic securit...

متن کامل

A Note on Certificate Path Verification in Next Generation Mobile Communications

Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in advance for authentication. This is especially valuable for roaming scenarios in mobile communications. When dealing with certificates, one must cope with the verification of complete certificate paths for security reasons. In mo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003