Existing network simulators perform reasonably well in evaluating the performance of network protocols, but lack the capability of verifying the correctness of network protocols. In this paper, we present our ongoing research on extending J-Sim --- an open-source, component-based compositional network simulation environment --- with the model checking capability to explore the state space created by a network protocol in order to find a violation of a desirable safety property and/or to find a witness for a desirable liveness property if any exists. This paper shows how J-Sim can model-check the Ad-Hoc On-Demand Distance Vector (AODV) routing protocol, a fairly complex network protocol with thousands of lines of Java code. We also exploit p...
Network protocols must work. The effects of protocol specification or implementation errors range fr...
Network protocols are critical software that must be ver-ified in order to ensure that they fulfil t...
This paper presents efficient model checking of distributed software. Key to the achieved efficiency...
Existing network simulators perform reasonably well in evaluating the performance of network protoco...
Verification and Validation (V&V) is a critically important phase in the development life cycle of a...
Network simulators perform well in evaluating the performance of network protocols, but lack the cap...
Verifiation and Validation (V&V) is a critically important phase in the development life cycle of a ...
Abstract. Traditional network simulators perform well in evaluating the performance of network proto...
In this report, we present an incremental state space exploration technique that aims to provide a s...
Network protocols are often analyzed using simulations. We demonstrate how to extend such simulation...
Network protocol construction is a complex and error prone task. The challenges originate both from...
Networks continue to grow as industries use both wired and wireless networks. Creating experiments t...
This poster presents the first Java Pathfinder extension to model realistic User Datagram Protocol (...
138 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.Finally, we present increment...
Network simulations play a substantial role in evaluating network protocols. Simulations facilitate ...
Network protocols must work. The effects of protocol specification or implementation errors range fr...
Network protocols are critical software that must be ver-ified in order to ensure that they fulfil t...
This paper presents efficient model checking of distributed software. Key to the achieved efficiency...
Existing network simulators perform reasonably well in evaluating the performance of network protoco...
Verification and Validation (V&V) is a critically important phase in the development life cycle of a...
Network simulators perform well in evaluating the performance of network protocols, but lack the cap...
Verifiation and Validation (V&V) is a critically important phase in the development life cycle of a ...
Abstract. Traditional network simulators perform well in evaluating the performance of network proto...
In this report, we present an incremental state space exploration technique that aims to provide a s...
Network protocols are often analyzed using simulations. We demonstrate how to extend such simulation...
Network protocol construction is a complex and error prone task. The challenges originate both from...
Networks continue to grow as industries use both wired and wireless networks. Creating experiments t...
This poster presents the first Java Pathfinder extension to model realistic User Datagram Protocol (...
138 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.Finally, we present increment...
Network simulations play a substantial role in evaluating network protocols. Simulations facilitate ...
Network protocols must work. The effects of protocol specification or implementation errors range fr...
Network protocols are critical software that must be ver-ified in order to ensure that they fulfil t...
This paper presents efficient model checking of distributed software. Key to the achieved efficiency...