An Approach for Testing Real Time Protocol Entities
نویسندگان
چکیده
We propose a two step method and an architecture for testing real time protocol entities In the rst step the timed speci cation of the implementation under test is transformed into an equivalent untimed speci cation Then in the second step test methods for non real time systems may be used In comparison with other test methods using sim ilar approaches our method avoids state explosion A transformation algorithm of the rst step and a test architecture are proposed
منابع مشابه
An Adaptive Congestion Alleviating Protocol for Healthcare Applications in Wireless Body Sensor Networks: Learning Automata Approach
Wireless Body Sensor Networks (WBSNs) involve a convergence of biosensors, wireless communication and networks technologies. WBSN enables real-time healthcare services to users. Wireless sensors can be used to monitor patients’ physical conditions and transfer real time vital signs to the emergency center or individual doctors. Wireless networks are subject to more packet loss and congestion. T...
متن کاملDistance protection closed-loop testing using RTDS
This paper presents a distance protection test procedure by applying the Real-Time Digital Simulator (RTDS) of a power system. RTDS is a tool to design, develop, and test power-system protection. The RTDS enables real-time computation of electromagnetic phenomena with a calculation time step of even 50μs. The hardware allows the import and export of many signals from the simulator to an ext...
متن کاملReal-Time Kinematic Network of Tehran, from Design to Application
Following the request of the Tehran municipality and in order to provide the spatial information required in their various projects, a real-time kinematic network has been designed for Tehran. Based on the existing measures such as the dilution of precision at the network point positions, two different designs have been proposed. A minimum number of six GNSS stations are used in both of the pro...
متن کاملارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا
The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases, the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...
متن کاملAssessment of BAM with ANP Approach; Case Study: Bank Sepah
In today's business environment in which coordination and adaptation with constant changes are the only ways of survival, real-time monitoring of activities and making the decisions accordingly are necessary. Since performance measurement cannot be managed independent of business processes, Business Activity Monitoring (BAM) systems should monitor performance metrics based on business processes...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000