5,335 Hits in 4.6 sec

TAPAAL: Editor, Simulator and Verifier of Timed-Arc Petri Nets [chapter]

Joakim Byg, Kenneth Yrke Jørgensen, Jiří Srba
2009 Lecture Notes in Computer Science  
TAPAAL is a new platform independent tool for modelling, simulation and verification of timed-arc Petri nets.  ...  TAPAAL provides a stand-alone editor and simulator, while the verification module translates timed-arc Petri net models into networks of timed automata and uses the UPPAAL engine for the automatic analysis  ...  We would like to thank the UPPAAL team at Aalborg University and in particular Alexandre David for numerous discussions on the topic.  ... 
doi:10.1007/978-3-642-04761-9_7 fatcat:klae4cxc6vh4zbpdq4xw365rv4

Systems Modeling for IP-Based Handoff Using Timed Petri Nets

Ashutosh Dutta, Bryan Lyles, Henning Schulzrinne, Jiacun Wang
2009 2009 42nd Hawaii International Conference on System Sciences  
It then uses Deterministic Timed Petri nets to model the mobility event and evaluate the performance under different scheduling schemes.  ...  It provides a systematic and formal approach to analyzing a mobility event.  ...  Petri net model for handoff The mobility event can be viewed as the perturbation to the steady state of a communicating node that may affect different layers in the protocol stack.  ... 
doi:10.1109/hicss.2009.415 dblp:conf/hicss/DuttaLSW09 fatcat:s5izsn5np5gblfc7dzwlwwcbji

Interactive State-Space Analysis of Concurrent Systems

E.T. Morgan, R.R. Razouk
1987 IEEE Transactions on Software Engineering  
The Distributed Systems project at UCI has been developing techniques and tools, based on Petri nets, which support the design and evaluation of concurrent software systems.  ...  This is most evident in the design of communications protocols where concurrency is inherent to the behavior of the system.  ...  ONGOING WORK Timed Petri nets [20] , [21] are extensions to Petri nets which are valuable for modeling communications protocols and for performance analysis.  ... 
doi:10.1109/tse.1987.232850 fatcat:zugzfl7vofgrxifrbvqwvfuu34

Analysis and Evaluation of Real-time and Safety Characteristics of IEEE 802.11p protocol in VANET [article]

Hossein Ahmadvand, Amir Hossein Jahangir, Ataollah Fatahi Baarzi
2016 arXiv   pre-print
In this paper, we analyze the behavior of Vehicular Ad-Hoc Networks by checking the real-time properties of the IEEE 802.11p protocol using a Colored Petri Net model.  ...  The need for safety in transportation systems has increased the popularity and applicability of Vehicular Ad-Hoc Networks (VANETs) in recent years.  ...  Vendor independence: Petri Nets provide a tool-independent framework for modeling and analyzing processes.  ... 
arXiv:1612.01894v1 fatcat:xefazd3n5fbefkemlswal67vmu

Modeling and Analyzing the Software Architecture of a Communication Protocol Using SAM [chapter]

Tianjun Shi, Xudong He
2002 IFIP Advances in Information and Communication Technology  
Acknowledgements This work is support in part by the NSF under grant HDR-9707076 and by the NASA under grant NAG 2-1440.  ...  Researchers in both Petri net community [GMM91] and the temporal logic community [AL94] have shown how to deal with timing issues without explicitly introducing timing features into a formal method  ...  To specify timing related properties, a formal method explicitly dealing with time is often used, for example time Petri nets and real-time temporal logic.  ... 
doi:10.1007/978-0-387-35607-5_4 fatcat:twfw6rp7lvhnjp3ip2xyhu567q

CPN Based Analysis of In-Vehicle Secure Communication Protocol [chapter]

Rustam Rakhimov Igorevich, Daekyo Shin, Dugki Min
2017 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
CPN (Coloured Petri Nets) tool was applied to anlyze and demonstrate the flaw in given secure message exchange protocol.  ...  In this work we have analyzed one of the recently published In-Vehicle Secure protocol. Multiple replay attacks were discovered during analysis of the protocol.  ...  Colored Petri Nets (CPN) is an extended from original Petri Net and represents a well-known formalism for modelling concurrent protocols.  ... 
doi:10.1007/978-3-319-60717-7_2 fatcat:zdooivoruzeszab5k2woh36hzy

Reliability modeling and analysis of communication networks

Waqar Ahmad, Osman Hasan, Usman Pervez, Junaid Qadir
2017 Journal of Network and Computer Applications  
, business, commerce, education---has become critically reliant on communication networks, and particularly on the Internet.  ...  In this paper, we study various modeling and analysis techniques that can aid in the study of reliability of communication networks.  ...  [214] A finite retrial system with unreliable and multi servers, is analyzed through Petri Nets [199] WLAN based data communication systems are presented for CTBC and are analyzed through Petri Nets  ... 
doi:10.1016/j.jnca.2016.11.008 fatcat:3ly4sqppj5hergujxlbqmv3e3q

A Petri net model of distributed control in a holonic Manufacturing Execution System

I. Demongodin, J-C. Hennet
2008 IFAC Proceedings Volumes  
This model is analyzed in view of verifying the required properties of the protocol.  ...  This paper proposes mathematical criteria to represent the agents' goals, a game theoretic approach to analyze the possible outcomes of the negotiation process, and a Petri net model to represent the interaction  ...  The paper contribution in part 4 is to propose a negotiation protocol described as a time Petri Net and analyzed to show that these properties are verified.  ... 
doi:10.3182/20080706-5-kr-1001.02694 fatcat:dzsvp34ebbfcpb65w4mhjzyc4q

Modeling and Verification of 802.16 MAC Protocol using Higher-Order Petri Nets

Ali Mohammed Meligy, Hani Mohammed Ibrahim, Amal Mohammed Aqlan
2014 International Journal of Computer Network and Information Security  
In this paper, we present a new Petri Net (PN) approach to model the IEEE 802.16 MAC Protocol called Higher-Order Stochastic Reward Net (HOSRN) and through the application of the proposed rule.  ...  We apply HOSRN to verify the effectiveness of QoS of the protocol using Reachability graph.  ...  Petri net is a powerful tool for modeling and analyzing communication protocols. Petri nets and communication protocols share many common properties.  ... 
doi:10.5815/ijcnis.2014.04.03 fatcat:vp7nooyfmnfknmgqb7xgdxexzq

Analysis of Broadcast Authentication Mechanism in Selected Network Topologies

T. Vanek, M. Rohlik
2011 Radioengineering  
This paper deals with simulation of the broadcast authentication protocols using Colored Petri Nets and further optimizations in Matlab environment.  ...  Protocol DREAM was taken as an example of broadcast authenticating protocol to show how Color Petri Nets can be used to create a fully functional model of the protocol.  ...  Colored Petri Nets A Petri net is a formalism that can be used to describe systems or protocols. It has some differences to the classical finite state machine.  ... 
doaj:773e62b8538a45ed821d09adbc7e364a fatcat:nex7odwsrjah5h6gf3rvk5ggki

A Survey on Workflow Verifications of Petri Nets based Service Process Management

Xiaoxian Yang, Tao Yu, Huahu Xu
2012 International Journal of Grid and Distributed Computing  
The non-functional verification is to evaluate the performance of Petri Nets based workflow model ranging over timed constraints and probabilistic behaviors.  ...  For consumers, satisfaction relies on their user experiences and on judging the quality of service when invoking a service, such as timing-response, cost and reliability.  ...  In literature [41] , the Petri Nets is employed to simulate and verify WS-CDL and timed Petri Nets is introduced to analyze time characteristics and priority level.  ... 
doi:10.14257/ijgdc.2015.8.6.09 fatcat:4oqtgzjla5azxhnerdv6oz7tq4

Supervisory decision making in emergency response application

Raheleh B. Dilmaghani, Ramesh R. Rao
2013 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
A good choice of communication infrastructure to provide reliable and in-time delivery of information in early stage of an emergency response saves lives and money.  ...  Two main causes of failure in an emergency response scenario are in communication leading to limited or delayed access to the information and delayed or poor decision making.  ...  PETRI NETS Inter-organizational interactions require sharing a lot of information and the communication protocols at organizational level shape the flow of information.  ... 
doi:10.1109/percomw.2013.6529557 dblp:conf/percom/DilmaghaniR13 fatcat:2nr2cl2vtbbv7m6eesamql6a6a

Verification of Energy Efficient Optimized Link State Routing Protocol using Petri net

Radhika D. Joshi, Priti P. Rege
2011 International Journal of Wireless & Mobile Networks  
The work describes modified protocol verification using Petri net for future instances.  ...  Simulation results of OLSR and the modified protocol, show improvement in 'Number of nodes alive' against variation in pause time, speed, node density and simulation time.  ...  In our Petri net representation, we have tried to verify modified protocol.  ... 
doi:10.5121/ijwmn.2011.3413 fatcat:iabknvfrwjffdborkx62qjqugu

Analysis of Authentication Protocol for USB Storage Devices Using Coloured Petri Nets

Suratose Tritilanunt
2016 Journal of Advances in Computer Networks  
By using Coloured Petri Nets as a formal tool for verifying a security of this protocol, the result is able to confirm that a proposed authentication technique satisfies security properties and does not  ...  Index Terms-Coloured Petri nets, CPN tool, secure authentication protocol, one time password, USB storage devices.  ...  Over many years, cryptographic and security protocols have been modeled and verified using Coloured Petri Nets [8] , [10] , [11] .  ... 
doi:10.18178/jacn.2016.4.1.204 fatcat:ix5v7oimo5dypgre33aigexqby

Verifying Reliable Data Transmission over UMTS Radio Interface with High Level Petri Nets [chapter]

Teemu Tynjälä, Sari Leppänen, Vesa Luukkala
2002 Lecture Notes in Computer Science  
We take the SDL description of the protocol as a starting point for our High Level Petri Net model.  ...  Next we describe in detail the verification and modelling task, and derivation of the properties to be verified from the protocol specification.  ...  In the next phase we verified the same property with the lossy channel, which is the relevant one for this property.  ... 
doi:10.1007/3-540-36135-9_12 fatcat:ycyfufye2ffkpncnggcxsktwda
« Previous Showing results 1 — 15 out of 5,335 results