Advertisement

Automatic Timeliness Verification of a Public Mobile Network

  • E. Ciancamerla
  • M. Minichino
  • S. Serro
  • E. Tronci
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2788)

Abstract

This paper deals with the automatic verification of the timeliness of Public Mobile Network (PMN), consisting of Mobile Nodes (MNs) and Base Stations (BSs). We use the Murphi Model Checker to verify that the waiting access time of each MN, under different PMN configurations and loads, and different inter arrival times of MNs in a BS cell, is always below a preassigned threshold. Our experimental results show that Model Checking can be successfully used to generate worst case scenarios and nicely complements probabilistic methods and simulation which are typically used for performance evaluation.

Keywords

Mobile Node Model Check Inter Arrival Time Continuous Band Automatic Verification 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    SAFETUNNEL Project (IST – 2000 – 28099) , http://www.crfproject-eu.org/
  2. 2.
    Dill, D.L., Drexler, A.J., Hu, A.J., Yang, C.H.: Protocol Verification as a Hardware Design Tool. In: IEEE International Conference on Computer Aided Design (1992)Google Scholar
  3. 3.
    Bryant, R.: Graph-Based algorithms for Boolean function manipulation. IEEE Trans. On Computers C-35(8) (August 1986)Google Scholar
  4. 4.
    Hu, A.J., York, G., Dill, D.L.: New techniques for efficient verification with implicitily conjoined BDDs. In: 31st IEEE Design Automation Conference (1994)Google Scholar
  5. 5.
    Burch, J.R., Clarke, E.M., McMillan, K.L., Dill, D.L., Hwang, L.J.: Symbolic Model Checking: 1020 states and beyond. Information and Computation (98) (1992)Google Scholar
  6. 6.
  7. 7.
  8. 8.
    Tronci, E., Penna, G.D., Intrigila, B., Venturini-Zilli, M.: Exploiting Transition Locality in Automatic Verification. In: Margaria, T., Melham, T.F. (eds.) CHARME 2001. LNCS, vol. 2144, p. 259. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  9. 9.
  10. 10.
    Bobbio, A., Ciancamerla, E., Franceschinis, G., Gaeta, R., Minichino, M., Portinale, L.: Methods of increasing modelling power for safety analysis. In: Applied to a turbine digital control system - SAFECOMP 2002, Catania, Italy (September 2002)Google Scholar
  11. 11.
    Bobbio, A., Portinale, L., Minichino, M., Ciancamerla, E.: Improving the Analysis of Dependable Systems by Mapping Fault Trees into Bayesian Networks. Reliability Engineering and System Safety Journal 71/3, 249–260 (2001)CrossRefGoogle Scholar
  12. 12.
    Ajmone Marsan, M., Gribaudo, M., Meo, M., Sereno, M.: On Petri Net based modeling paradigms for the performance analysis of wireless internet accesses. In: Petri Net and Performance Model, PNPM 2001, Aachen (September 2001)Google Scholar
  13. 13.
    Sokol, J., Widmer, J.: -USAIA Ubiquitous Services Access Internet Architecture -TR -01- 003 International Computer Science Institute, Berkeley (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • E. Ciancamerla
    • 1
  • M. Minichino
    • 1
  • S. Serro
    • 2
  • E. Tronci
    • 3
  1. 1.ENEA CR CasacciaRomaItaly
  2. 2.TECSIT Telecontrollo e SistemiRomaItaly
  3. 3.Dip. di InformaticaUniversità di Roma “La Sapienza”RomaItaly

Personalised recommendations