Automatic Timeliness Verification of a Public Mobile Network
نویسندگان
چکیده
This paper deals with the automatic verification of the timeliness of Public Mobile Network (PMN), consisting of Mobile Nodes (MNs) and Base Stations (BSs). We use the Murphi Model Checker to verify that the waiting access time of each MN, under different PMN configurations and loads, and different inter arrival times of MNs in a BS cell, is always below a preassigned threshold. Our experimental results show that Model Checking can be successfully used to generate worst case scenarios and nicely complements probabilistic methods and simulation which are typically used for performance evaluation.
منابع مشابه
Design and implementation of an automatic car turning system
In this paper, a control system is designed for automatic car turning. At first, the necessary information of car turning that were collected from the traffic bylaw, car driving training centers and traffic police are explained. Then, car turning is studied experimentally on several streets with different widths. Afterward, a proper path is designed for the automatic car turning system consider...
متن کاملFinancial Reporting Delay and Investors Behavior: Evidence From Tunisia
This study empirically investigates the relationship between the timeliness of the financial reporting and the corporate governance proxies for companies listed on the Tunisian stock exchange during 2009.It investigates the role of the corporate governance mechanisms on the timeliness of corporate financial reporting besides; it investigates the relationship between the company size, leverage, ...
متن کاملThe effect of timeliness of benefits and costs on mobile coupon sharing: a moderating role of use of length in social network sites
Timeliness of benefits and costs have some unusual effects on m-coupon sharing. Length of use was considered as a moderating variable between the relationship of long-term factors and sharing intention. This paper provides a new perspective for retailers and SNSs generating a strategy of mobile marketing and the spreading of eWOMs.
متن کاملA fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment
With fast evolution of mobile devices and mobile network, the need of protecting user sensitive information locally and performing secure user authentication remotely become evermore increasing. Bio-cryptography is emerging as a powerful solution which can combine the advantages of conventional cryptography and biometric security. In this paper, we present an efficient bio-cryptographic securit...
متن کاملA Note on Certificate Path Verification in Next Generation Mobile Communications
Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in advance for authentication. This is especially valuable for roaming scenarios in mobile communications. When dealing with certificates, one must cope with the verification of complete certificate paths for security reasons. In mo...
متن کامل