7 research outputs found

    Pemodelan dan Verifikasi Formal Protokol EE-OLSR dengan UPPAAL CORA

    Get PDF
    Information and Communication Technology systems is a most important part of society.  These systems are becoming more and more complex and are massively encroaching on daily life via the Internet and all kinds of embedded systems. Communication protocols are one of the ICT systems used by Internet users. OLSR protocol is a wireless network communication protocol with proactive, and based on link-state algorithm. EE-OLSR protocol is a variant of OLSR that is able to prolong the network lifetime without losses of performance.Protocol verification process generally be done by simulation and testing. However, these processes unable to verify there are no subtle error or design flaw in protocol. Model Checking is an algorithmic method runs in fully automatic to verify a system. UPPAAL is a model checker tool to model, verify, and simulate a system in Timed Automata.UPPAAL CORA is model checker tool to verify EE-OLSR protocol modelled in Linearly Priced Timed Automata, if the protocol satisfy the energy efficient property formulated by formal specification language in Weighted Computation Tree Logic syntax. Model Checking Technique to verify the protocols results in the protocol is satisfy the energy efficient property only when the packet transmission traffic happens

    Pemodelan dan Verifikasi Formal Protokol EE-OLSR dengan UPPAAL CORA

    Get PDF
    Information and Communication Technology systems is a most important part of society.  These systems are becoming more and more complex and are massively encroaching on daily life via the Internet and all kinds of embedded systems. Communication protocols are one of the ICT systems used by Internet users. OLSR protocol is a wireless network communication protocol with proactive, and based on link-state algorithm. EE-OLSR protocol is a variant of OLSR that is able to prolong the network lifetime without losses of performance. Protocol verification process generally be done by simulation and testing. However, these processes unable to verify there are no subtle error or design flaw in protocol. Model Checking is an algorithmic method runs in fully automatic to verify a system. UPPAAL is a model checker tool to model, verify, and simulate a system in Timed Automata. UPPAAL CORA is model checker tool to verify EE-OLSR protocol modelled in Linearly Priced Timed Automata, if the protocol satisfy the energy efficient property formulated by formal specification language in Weighted Computation Tree Logic syntax. Model Checking Technique to verify the protocols results in the protocol is satisfy the energy efficient property only when the packet transmission traffic happens

    Delay-bounded medium access for unidirectional wireless links

    Get PDF
    Consider a wireless network where links may be unidirectional, that is, a computer node A can broadcast a message and computer node B will receive this message but if B broadcasts then A will not receive it. Assume that messages have deadlines. We propose a medium access control (MAC) protocol which replicates a message in time with carefully selected pauses between replicas, and in this way it guarantees that for every message at least one replica of that message is transmitted without collision. The protocol ensures this with no knowledge of the network topology and it requires neither synchronized clocks nor carrier sensing capabilities. We believe this result is significant because it is the only MAC protocol that offers an upper bound on the message queuing delay for unidirectional links without relying on synchronized clocks

    The k-Neigh Protocol for Symmetric Topology Control in Ad Hoc Networks

    Get PDF
    We propose an approach to topology control based on the principle of maintaining the number of neighbors of every node equal to or slightly below a specific value k. The approach enforces symmetry on the resulting communication graph, thereby easing the operation of higher layer protocols. To evaluate the performance of our approach, we estimate the value of k that guarantees connectivity of the communication graph with high probability. We then define k-Neigh, a fully distributed, asynchronous, and localized protocol that follows the above approach and uses distance estimation. We prove that k-Neigh terminates at every node after a total of 2n messages have been exchanged (with n nodes in the network) and within strictly bounded time. Finally, we present simulations results which show that our approach is about 20% more energy-efficient than a widelystudied existing protocol

    Initialization algorithms for wireless ad-hoc networks

    Get PDF
    The aim of this master thesis is the implementation of simulation models and the simulation of energy-efficient network initialization algorithms. First of all, it is presented a survey of state-of-the-art strategies for network initialization and exploration in wireless ad-hoc networks. Among the routing approaches presented in the survey it has been chosen the clustering-based approach due to it is the most suitable for ad-hoc sensor networks. Following are explained the features and properties of the clustering-based routing algorithms that have been selected for their implementation on this work. These implemented routing protocols are LEACH, LEACH-C, the solaraware extensions of both, HEED and a protocol based on direct transmission just as a reference in the comparison among the rest of them. On the other hand, all these routing protocols have been implemented and simulated using the OMNeT++ 4.0, which is a freeware discrete simulation environment. Subsequently, all the protocols have been simulated with different parameters and conditions to prove their functionality and to find out their behaviour in different sorts of sensor networks. Next, the simulations of the algorithms are compared among each other especially in terms of communication and energy efficiency. There are presented different comparisons such as LEACH and LEACH-C with their respective solar-aware extensions of both, a comparison between HEED with optimized parameters and non-optimized parameters, and finally a general comparison among One-hop, LEACH, LEACH-C and HEED. To sum up, some conclusions are drawn about the performance of the different protocols and some key points are given for future work. Furthermore, it is presented a brief study of the environmental impact this work may have

    A Quantitative Analysis of Performance in a Multi-Protocol Ad Hoc 802.11b-based Wireless Local Network

    Get PDF
    The popularity of the Internet and the growing demand for ubiquitous connectivity accelerate the need for viable wireless local area network (WLAN) solutions. As a consequence, increasing number of manufacturers have adopted the Institute of Electrical and Electronic Engineers (IEEE) 802.11a/b/g set of WLAN standards and produced inexpensive wireless products to expand capabilities of existing LANs. IEEE 802.11 b wireless products are widely accepted. Mobile ad hoc networks, a variant of the 802.11 standards, exist without the requirement for a wired infrastructure or host to provide routing, connectivity, and maintenance services. Because of the high variability of environments in which ad hoc networks operate, numerous routing protocols are proposed. Research indicates that these protocols are unsuited for efficient operation in multiple environments. In this investigation, the author examined the effect of multiple protocols on throughput and end-to-end delay in simulated ad hoc networks. The author selected the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR) routing protocols for this research. The outcomes from the simulations conducted indicated increased end-to-end delay and reduced packet throughput as a result of the mixed populations of the AODV and DSR ad hoc routing protocols. The results also indicated that increasing node density and velocity improved packet throughput and reduced end-to-end delay
    corecore