Verisim: Formal Analysis of Network Simulations

Slides:



Advertisements
Similar presentations
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Advertisements

Formal Verification of AODV Protocol using Cadence SMV Xin Liu and Jun Wang (CPSC513 Course.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
Routing Security in Ad Hoc Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Program Checking Sampath Kannan University of Pennsylvania.
Relating Artifacts for Networking Software Carl A. Gunter Verinet Project University of Pennsylvania.
5/24/011 Advanced Tool Integration for Embedded Systems Assurance Insup Lee Department of Computer and Information Science University of Pennsylvania.
Ad Hoc Wireless Routing COS 461: Computer Networks
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Ad Hoc Routing: The AODV and DSR Protocols Jonathan Sevy Geometric and Intelligent Computing Lab Drexel University
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
Dilshad Haleem CST593 summer 2007 Routing In Wireless Mesh Networks CST593 Final Project by Dilshad Haleem Division of Computing Studies, ASU Polytechnic.
5/27/03MDES Supporting Model-Based Validation at Run-time Insup Lee and Oleg Sokolsky Department of Computer and Information Science University of.
Distributed Monitoring of Mesh Networks Elizabeth Belding-Royer Mobility Management and Networking (MOMENT) Lab Dept. of Computer Science University of.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Remote Deployment of Sensor Networks Presentation 3: Providing connectivity between sensor nodes and uplinks.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Fundamentals of Computer Networks ECE 478/578
Jim Parker CMSC691t Spring 2000 “Ad-hoc On-Demand Distance Vector Routing” A dynamic routing algorithm for mobile ad-hoc networks.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Formal verification of distance vector routing protocols.
HoWL: An Efficient Route Discovery Scheme Using Routing History in Mobile Ad Hoc Networks Faculty of Environmental Information Mika Minematsu
Wireless Mesh Networking Nathaniel Wilson 4/13/2007.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
Analysis the performance of vehicles ad hoc network simulation based
Verifying Stability of Network Protocols
The Ad Hoc On-Demand Distance-Vector Protocol (AODV)
Chapter 16 Mobile Networking in ns
SCREEN CAPTURE AND MULTICAST
Routing design goals, challenges,
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
ONR MURI area: High Confidence Real-Time Misuse and Anomaly Detection
Routing/Routed Protocols
Formally Specified Monitoring of Temporal Properties
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
Net 323: NETWORK Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
Ad hoc Routing Protocols
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
ITIS 6010/8010 Wireless Network Security
Routing.
Routing in Mobile Ad-hoc Networks
Lecture 10, Computer Networks (198:552)
Vinay Singh Graduate school of Software Dongseo University
Other Routing Protocols
A Routing Protocol for WLAN Mesh
Computer Networks: Wireless Networks
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Verisim: Formal Analysis of Network Simulations Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim, Insup Lee, Davor Obradovic, Oleg Sokolsky, Mahesh Viswanathan University of Pennsylvania

Internetwork Routing Protocols Internetwork routing protocols enable interoperability between physical networks. Routing protocols for the Internet: RIP, OSPF, and BGP. Routing protocols for packet radio: AODV and DSR. Routing protocols and software have growing importance and complexity.

Current Analysis Techniques Rigorous mathematical models and proofs – limited by complexity. Testing. Testbed – expensive. Operational – risky and inconvenient. Simulation. Performance attributes: throughput, latency, reliability, etc.

Limitations of Performance Analysis of Simulations Flaws may not be detected if no expected performance can be used for comparison. When flaws are suspected, finer means of analysis are useful. Some flaws do not manifest themselves as performance problems (e.g. most security gaps).

Verisim Verisim provides support for “logical” analysis of network simulations. This talk describes its architecture and logic. We provide a series of experiments aimed at assessing the approach.

Monitoring and Checking (MaC) Framework Script Program Monitor Checker Properties Metatrace Trace Data NS MEDL

Meta Event Description Language (MEDL) Expresses properties of traces. Extension of Linear Temporal Logic (LTL) with auxiliary variables. More expressive than LTL. Properties classified into (instantaneous) events and (enduring) conditions. S Kannan, M Kim, I Lee, O Sokolsky, M Viswanathan 98

NS Network Simulator NS Trace P P P VINT Project Instrumented Protocol Code P : C++ P P P Protocol Agents Scenario Configuration Parameters: OTcl N N N Network Model Topology: OTcl Traffic Agents src/sink src/sink src/sink Traffic Model: OTcl NS Trace VINT Project

Verisim Properties: MEDL Instrumented Protocol: C++ NS Checker Trace Metatrace Scenario: OTcl

Ad Hoc Networks Routing for a wireless internetwork without the aid of a central base station. Connections are low-bandwidth, lossy, and highly transient. Unique routing assumptions: Most routes are seldom used. Bandwidth must be protected.

Illustration Part 1 of 2 Movement Routing

Illustration Part 2 of 2 New Routing

AODV Protocol If a node S needs a route to a destination D and does not have one, it floods a route-request (RREQ) packet through the network. Each recipient R of this RREQ keeps a return pointer. R broadcasts the request to its neighbors if it is not D and does not have a route to D. If R is D, or has a route to D, it responds with a route-reply (RREP) packet using the return pointers for S. Perkins and Royer 99

Loop Freedom in AODV Routing loops are undesirable. AODV uses sequence numbers to indicate freshness of link information. Key Invariant: If next(n) = n’, then seqno(n)  seqno(n’), and if seqno(n) = seqno(n’), then hops(n) > hops(n’). The invariant ensures that there are no loops.

Outline of Experiment Run a scenario of modest complexity. Analyze it in Verisim using a list of 9 properties of AODV expressed in MEDL. First pass: Repair First Bug (RFB). Second pass: “tune” the MEDL formulas to avoid rerunning the simulation discovering bugs in the metatrace. We instrumented simulation code for AODVv0 supplied by the CMU Monarch Project.

Experiment Scenario 1 2 3 4 5

Experiment Scenario 1 2 3 4 5

Experiment Scenario 1 2 3 4 5

Experiment Scenario 1 2 3 5 4

Experiment Scenario 1 5 2 3 4

Sample MEDL Alarm alarm LoopInv[at][nxt][dst] = sendrout[at][dst] when ((atnxt)  (atdst)  (nxtdst)  (obs_nexthop[at][dst] == nxt)  ((obs_seqno[at][dst] > obs_seqno[nxt][dst])  ((obs_seqno[at][dst] == obs_seqno[nxt][dst])  (obs_hopcont[at][dst] <= obs_hopcnt[at][dst])))) This is the negation of the fundamental invariant ensuring no loops in AODV: If the next hop from node at toward destination dst is node nxt then the sequence number (for dst) of at is less than or equal to that of nxt or they are equal and the hop count (for dest) of at is less than or equal to that of nxt.

Repair First Bug Experiment Let  be the MEDL property set. Run the simulation to get a trace T. Run the checker to get a metatrace T. Repair the first bug in the metatrace to get new protocol code. Rerun the simulation with the new protocol code to get a new trace U. Rerun the checker to get a new metatrace U. Continue until an empty metatrace is obtained.

RFB Experiment Statistics Meta- trace Dest Rep Detect RErr Node Loop Env Total Alarms T 4 54 38 43 220 U 216 V 48 39 44 206 W 1

Tuning Experiment Statistics Meta- trace Dest Rep Detect RErr Node Loop Env Total Alarms T 4 54 38 43 220 T 216 T 50 166 T 21 No new simulation traces.

Analysis of “Off-The-Shelf” (OTS) Simulations The prior experiment involved fewer than 10,000 events, and we designed it to exercise key scenarios. Can we do useful analysis with OTS performance simulations? Aim: Verisim can be added with small modifications, run alongside OTS simulations, and find logical failures in a practical period of time.

Experiment Took largest available OTS simulation for AODV and ran it to create a trace. Simulation from Monarch uses 50 mobile nodes on 1500x300m grid moving 20 m/s. 5220 seconds (1.5 hours) to complete simulation. 6,446,316 events. Naïve effort: ran MEDL with MonSeqNo test on all nodes (2500 relations) using 550Mhz dual processor machine with 1GB of memory. Aborted the experiment after 4 days; estimate 100 days to complete this analysis.

Optimizations For Network Routing Simulations Population Abstraction: test the property for a subset of the routers. Packet Type Abstraction: prune the trace to include only relevant events.

Sample Experiment Results for MonSeqNo Population Abstraction for 5 nodes. Trace size: 6,446,316 events Property size: 14,543 bytes Time: 51,054 seconds Rate: 0.54 micro seconds per event per property. Population and Packet Type Abstractions. Trace size: 6812 events Time: 51 seconds (found failures) Rate: 0.51 micro seconds per event per property.

Sample Experiment Results for LoopInv Population Abstraction for 5 nodes. Trace size: 69,411 events Property size: 75,508 bytes Time: 8064 seconds Rate: 1.54 micro seconds per event per property. Population and Packet Type Abstractions. Trace size: 48,735 events Time: 5912 seconds (found failures) Rate: 1.61 micro seconds per event per property.

Related Work Communication-based test generation systems. STRESS and Verisoft. Test oracles based on formulas or formal operational specifications. GIL and TETRA. Formal instance verification of routing protocols. SPIN/PITHIA for PNNI. Simulations based on logical specifications. MTSim and Maude. Network monitoring systems. Emerald.

Summary Verisim integrates simulation and logical trace analysis. The combination provides a more flexible approach to analyzing network simulations for safety properties. It is able to find bugs in existing simulator studies. Its flexibility can be exploited to improve debugging turn-around time.