Verisim: Formal Analysis of Network Simulations
dc.contributor.author | Bhargavan, Karthikeyan | |
dc.contributor.author | Lee, Insup | |
dc.contributor.author | Kim, Moonjoo | |
dc.contributor.author | Sokolsky, Oleg | |
dc.contributor.author | Obradovic, Davor | |
dc.contributor.author | Sokolsky, Oleg | |
dc.contributor.author | Viswanathan, Mahesh | |
dc.date | 2023-05-16T22:24:28.000 | |
dc.date.accessioned | 2023-05-22T12:51:41Z | |
dc.date.available | 2023-05-22T12:51:41Z | |
dc.date.issued | 2002-02-01 | |
dc.date.submitted | 2005-03-17T10:58:35-08:00 | |
dc.description.abstract | Network protocols are often analyzed using simulations. We demonstrate how to extend such simulations to check propositions expressing safety properties of network event traces in an extended form of linear temporal logic. Our technique uses the NS simulator together with a component of the MaC system to provide a uniform framework. We demonstrate its effectiveness by analyzing simulations of the Ad Hoc On-Demand Distance Vector (AODV) routing protocol for packet radio networks. Our analysis finds violations of significant properties and we discuss the faults that cause them. Novel aspects of our approach include modest integration costs with other simulation objectives such as performance evaluation, greatly increased flexibility in specifying properties to be checked and techniques for analyzing complex traces of alarms raised by the monitoring software. | |
dc.description.comments | Copyright 2002 IEEE. Reprinted from <i>IEEE Transactions on Software Engineering</i>, Volume 28, Issue 2, February 2002, pages 129-145.<br> Publisher URL: <a href="http://ieeexplore.ieee.org/xpl/tocresult.jsp?isNumber=21282&puNumber=32" >http://ieeexplore.ieee.org/xpl/tocresult.jsp?isNumber=21282&puNumber=32</a> <br><br> This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Pennsylvania's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.<br><br> An earlier, conference version of this paper may be found at <a href="http://repository.upenn.edu/cis_papers/84/" >http://repository.upenn.edu/cis_papers/84/</a>. | |
dc.description.comments | <br>Copyright 2002 IEEE. Reprinted from <i>IEEE Transactions on Software Engineering</i>, Volume 28, Issue 2, February 2002, pages 129-145.<br> Publisher URL: http://ieeexplore.ieee.org/xpl/tocresult.jsp?isNumber=21282&puNumber=32 <br><br> This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Pennsylvania's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.<br><br> An earlier, conference version of this paper may be found at http://repository.upenn.edu/cis_papers/84/. <br><p> | |
dc.identifier.uri | https://repository.upenn.edu/handle/20.500.14332/6930 | |
dc.legacy.articleid | 1092 | |
dc.legacy.fulltexturl | https://repository.upenn.edu/cgi/viewcontent.cgi?article=1092&context=cis_papers&unstamped=1 | |
dc.source.issue | 85 | |
dc.source.journal | Departmental Papers (CIS) | |
dc.source.peerreviewed | true | |
dc.source.status | published | |
dc.subject.other | Verisim | |
dc.subject.other | formal analysis | |
dc.subject.other | network | |
dc.subject.other | simulation | |
dc.subject.other | testing | |
dc.subject.other | routing | |
dc.subject.other | NS | |
dc.subject.other | MaC | |
dc.subject.other | AODV | |
dc.subject.other | temporal logic | |
dc.subject.other | ad hoc networks | |
dc.subject.other | packet radio | |
dc.subject.other | tuning | |
dc.subject.other | population abstraction | |
dc.subject.other | packet-type abstraction | |
dc.title | Verisim: Formal Analysis of Network Simulations | |
dc.type | Article | |
digcom.contributor.author | Bhargavan, Karthikeyan | |
digcom.contributor.author | Gunter, Carl A. | |
digcom.contributor.author | Kim, Moonjoo | |
digcom.contributor.author | isAuthorOfPublication|email:lee@cis.upenn.edu|institution:University of Pennsylvania|Lee, Insup | |
digcom.contributor.author | Obradovic, Davor | |
digcom.contributor.author | isAuthorOfPublication|email:sokolsky@cis.upenn.edu|institution:University of Pennsylvania|Sokolsky, Oleg | |
digcom.contributor.author | Viswanathan, Mahesh | |
digcom.identifier | cis_papers/85 | |
digcom.identifier.contextkey | 51323 | |
digcom.identifier.submissionpath | cis_papers/85 | |
digcom.type | article | |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | 45a9eed5-3211-4c36-b40d-6394302dfdce | |
relation.isAuthorOfPublication | 45a9eed5-3211-4c36-b40d-6394302dfdce | |
relation.isAuthorOfPublication | 35e1b18e-15fe-4438-be3b-84593f70a40a | |
relation.isAuthorOfPublication.latestForDiscovery | 45a9eed5-3211-4c36-b40d-6394302dfdce | |
upenn.schoolDepartmentCenter | Departmental Papers (CIS) |
Files
Original bundle
1 - 1 of 1