Network Structure Modelling and Traffic Simulation with CO-OPN David Hürzeler SMV Group, Geneva University 5/7/2005.

Slides:



Advertisements
Similar presentations
Policy-based Congestion Management for an SMS Gateway Alberto Gonzalez (KTH) Roberto Cosenza (Infoflex) Rolf Stadler (KTH) June 8, 2004, Policy Workshop.
Advertisements

Crucial Patterns in Service- Oriented Architecture Jaroslav Král, Michal Žemlička Charles University, Prague.
Wireless Communication : LAB 3
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Connecting LANs: Section Figure 15.1 Five categories of connecting devices.
1 Fault-Tolerance Techniques for Mobile Agent Systems Prepared by: Wong Tsz Yeung Date: 11/5/2001.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
M. Risoldi – SMV Group - Université de Genève 1 A 3-level approach for Control Systems GUI modeling with COOPN M. Risoldi.
IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science.
Specifying Workflow using CO- OPN Ang Chen SMV group 11 Mars, 2005.
Ad Hoc Networks Routing
S A B D C T = 0 S gets message from above and sends messages to A, C and D S.
Weaving a Tapestry Distributed Algorithms for Secure Node Integration, Routing and Fault Handling Ben Y. Zhao (John Kubiatowicz, Anthony Joseph) Fault-tolerant.
1 Model-based Software Engineering 師大資工鄭永斌. 2 History While dealing with complex entity, other engineering has learned not to learn it by building it.
Les Diablerets - 07/07/ M.Risoldi - SMV UniGe A 3-Levels approach to GUI development for complex control systems Matteo Risoldi.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Business Process Modeling Workflow Patterns Ang Chen July 8, 2005.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Wireless Sensor Network for Tracking the Traffic in INTERNET Network Routers Supervisor: Mark Shifrin Students: Yuriy Kipnis Nir Bar-Or Networked Software.
Lecture Slide Rizwan Rehman, CCS. Classless and Subnet Address Extensions (CIDR) Topics: –There are problems with the IP addressing scheme we’ve studied.
Copyright 2003 CCNA 1 Chapter 6, part 2 Ethernet Switching By Your Name.
OSPF To route, a router needs to do the following: Know the destination address Identify the sources it can learn from Discover possible.
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
Carnet: Scalable Ad-Hoc Mobile Networking Robert Morris with Kaashoek and Karger.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Fault-Tolerant Design for Mobile IPv6 Networks Jenn-Wei Lin and Ming-Feng Yang Graduate Institute of Applied Science and Engineering Fu Jen Catholic University.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-1 Determining IP Routes Enabling OSPF.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
1 Levi Lúcio © A Test Selection Language for CO-OPN Specifications Levi Lúcio, Luis Pedro and Didier Buchs University of Geneva.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Janne Merilinna, Olli-Pekka Puolitaival, John Menke, Tihamer Levendovszky, Jonathan Sprinkle, Mika Karaila, Edgars Rencis, Hiroshi Kazato, Takashi Kopayashy.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Exploring Office 2003 – Grauer and Barber HTML And Basic Web page.
CS 453 Computer Networks Lecture 18 Introduction to Layer 3 Network Layer.
4BP1 Electronic & Computer Engineering Paul Gildea th Year Interim Project Presentation.
The PHB information treatment in the Differentiated Service network Seiichiro Toda Graduate School of Media and Governance Keio University
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
ECE 764 – Project B.  Why is package needed?  What is package to do?  The verification task.
Last modified After What type of OSPF packets are used to establish neighbor adjacencies? A.Hello B.DBD C.LSR D.LSU E.LSAck 1 of 4.
Intelligent Systems Software Assurance Symposium 2004 Bojan Cukic & Yan Liu, Robyn Lutz & Stacy Nelson, Chris Rouff, Johann Schumann, Margaret Smith July.
Ensure that the right functions are performed Ensure that the these functions are performed right and are reliable.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
Tapestry : An Infrastructure for Fault-tolerant Wide-area Location and Routing Presenter : Lee Youn Do Oct 5, 2005 Ben Y.Zhao, John Kubiatowicz, and Anthony.
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
VLAN Cisco (Router/Switch)
PathChirp Efficient Available Bandwidth Estimation Vinay Ribeiro Rice University Rolf Riedi Rich Baraniuk.
Event Generation Channel Access Process Channel Release Process Traffic Transmission Process Simulation Control Simulation Flowchart - total.
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
Border Gateway Protocol. Intra-AS v.s. Inter-AS Intra-AS Inter-AS.
VLAN Cisco (Router/Switch)
Chapter 5 Network and Transport Layers
Deterministic Communication with SpaceWire
Chapter 6 Delivery & Forwarding of IP Packets
Chapter 9: The Client/Server Database Environment
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
The Client/Server Database Environment
IS3120 Network Communications Infrastructure
Chapter 5: Dynamic Routing
Intradomain Routing Outline Introduction to Routing
The University of Adelaide, School of Computer Science
COMPUTER NETWORKS CS610 Lecture-29 Hammad Khalid Khan.
Classless and Subnet Address Extensions (CIDR)
A Study of On-Off Attack Models for Wireless Ad Hoc Networks
In-network computation
Presentation transcript:

Network Structure Modelling and Traffic Simulation with CO-OPN David Hürzeler SMV Group, Geneva University 5/7/2005

Plan Introducing the problem Introducing the problem The network example The network example A first simple model A first simple model Adding queues to routers Adding queues to routers Detecting model flaws through simulation Detecting model flaws through simulation Future work: extensions and verification. Future work: extensions and verification.

Plan Introducing the problem Introducing the problem The network example The network example A first simple model A first simple model Adding queues to routers Adding queues to routers Detecting model flaws through simulation Detecting model flaws through simulation Future work: extensions and verification. Future work: extensions and verification.

The problem Using Petri nets and formal methods for accident modelling and risk analysis. Using Petri nets and formal methods for accident modelling and risk analysis. Focus on network problems which raise many interesting issues (performance, fault-tolerance, mobility, error propagation, probabilities, etc…) and the results on which can be translated to other risk domains. Focus on network problems which raise many interesting issues (performance, fault-tolerance, mobility, error propagation, probabilities, etc…) and the results on which can be translated to other risk domains.

Plan Introducing the problem Introducing the problem The network example The network example A first simple model A first simple model Adding queues to routers Adding queues to routers Detecting model flaws through simulation Detecting model flaws through simulation Future work: extensions and verification. Future work: extensions and verification.

The network example Router C Router BRouter A Router E Router DRouter F

Plan Introducing the problem Introducing the problem The network example The network example A first simple model A first simple model Adding queues to routers Adding queues to routers Detecting model flaws through simulation Detecting model flaws through simulation Future work: extensions and verification. Future work: extensions and verification.

First CO-OPN model

The network context r1.sendMess m from id to idd via id2 With r2.routerId id2.. r2.receiveMess m from id to idd; Router r1 (id1) routerId _ receiveMess _ from _ to _ sendMess _ from _to _ via _ Router r2 (id2) routerId _ receiveReqMess _ from _ to _ sendMess _ from _to _ via _..

Plan Introducing the problem Introducing the problem The network example The network example A first simple model A first simple model Adding queues to routers Adding queues to routers Detecting model flaws through simulation Detecting model flaws through simulation Future work: extensions and verification. Future work: extensions and verification.

Router with Queues Router r1 Routing Table Queue Receive Send Routing Table Queue Receive Send Router r2

Plan Introducing the problem Introducing the problem The network example The network example A first simple model A first simple model Adding queues to routers Adding queues to routers Detecting model flaws through simulation Detecting model flaws through simulation Future work: extensions and verification. Future work: extensions and verification.

Simulation In fact, the above model is wrong : the « proceedAllrequests » method of the Network context is never firable.

Plan Introducing the problem Introducing the problem The network example The network example A first simple model A first simple model Adding queues to routers Adding queues to routers Detecting model flaws through simulation Detecting model flaws through simulation Future work: extensions and verification. Future work: extensions and verification.

Extensions Bigger systems (more routers, hierarchy of networks), Bigger systems (more routers, hierarchy of networks), Dynamic routing, message lotss, and fault olerance, Dynamic routing, message lotss, and fault olerance, Time, Time, Probabilities, Probabilities, Complex messages. Complex messages.

Verification CoopnBuilder Prototype tool CoopnBuilder Prototype tool GreatSPN GreatSPN SPIN (?) SPIN (?)