Abstract
Existing approaches to formal protocol specification and verification suffer from great difficulty in constructing correct specifications for practical problems. The objective of this paper is to advocate a top-down step-wise refinement approach in the construction of correct protocol specification, from the given requirement (a service specification). It is aimed at making formal specification a practical means to protocol design. The paper demonstrates the feasibility of the methodology by working on a non-trivial problem using a powerful specification formalism.
Preview
Unable to display preview. Download preview PDF.
References
G. Bochmann. Finite state description of communication protocols. Computer Network, 2:361–372, Oct., 1978. state transition diagram.
G. Bochmann and C. Sunshine. Formal methods in communication protocol design. IEEE Transaction on Communications, COM-28(4):624–637, April, 1980.
Dov M. Gabbay. Investigation in Modal and Tense Logic with Applications to Philosophy and Linguistics. Reidel, 1976.
D. I. Good and R. M. Cohen. Verifiable communication processes. Compconn 78, pages 28–35, 1978.
Goldblatt. Axiomatizing the Logics of Computer Programming, LNCS 130. Springer-Verlag, 1982.
M. Gouda. Constructing communication machines by step-wise refinement, 1983.
B.T. Hailpern. Verifying Current Processes Using Temporal Logic, LNCS 129. Springer-Verlag, Berlin, Heidelberg, New York, 1981.
G. E. Hughes and M. J. Cresswell. An Introduction to Modal Logic. Methuen, 1968.
B.T. Hailpern and S. Owicki. Verifying network protocols using temporal logic. Technical report, June, 1980.
Samit Khosla. Phd thesis in preparation.
J. Kurose. The specification and verification of a connection establishment protocol using temporal logic, May, 1982.
L. Lamport. What it means for correct protocol to satisfy a specification: Why no one has specified priority. 12th Annual ACM Symposium on Principles of Programming Language, 1985.
Da-Hai Li. Top-down and step-wise refinement of protocol specifications. Technical report, Department of Computing, Imperial College of Science and Technology, University of London, October 1986.
N. H. Minsky. Ensuring integrity by adding obligation to privilege. Proceedings of 8th International Conference on Software Engineering, August, 1985. action modal logic.
S. Owicki. Specification and verification of a network mail system. In F. L. Bauer M. Broy, editor, Program Construction, pages 198–234. Springer-Verlag, 1979. history variable.
D. L. Parnas. The use of precise specifications in the development of software. Proceedings of IFIP Congress, pages 861–867, 1977.
V. R. Pratt. Semantic considerations on floyd-hoare logic. Proceedings of 17th Annual IEEE Symposium on Foundations of Computer Science, pages 109–121, 1976.
D. Rudin. Protocol design rules, May, 1982.
V. N. Stenning. A data transfer protocol. Computer Networks, 1:98–110, September, 1976.
Carl Sunshine. Formal techniques for protocol specification and verification. Computer Magazine, 12:20–27, September, 1979.
R. H. Thomason. Some completeness results for modal predicate calculi. In K. Lanbert, editor, Philosophical Problems in Logic, pages 56–76. Reidel, 1970.
F. H. Vogt. Event based temporal logic specifications of services and protocols, May, 1982.
C.A. Visser and M. Raunal. The importance of the service concept in the design of data communication protocols. In M. Diaze, editor, Protocol Specification, Testing, and Verification V. IFIP, North Holland, 1985.
N. Wirth. Program development by step-wise refinement. Communication of ACM, 14(4):221–227, April, 1971.
H. Zimmermann. Osi reference model — the iso model of architecture for open systems interconnection. IEEE Transaction on Communications, COM-28:425–432, April, 1980.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1988 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, DH., Maibaum, T.S.E. (1988). A top-down step-wise refinement methodology for protocol specification. In: Vogt, F.H. (eds) CONCURRENCY 88. CONCURRENCY 1988. Lecture Notes in Computer Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-50403-6_41
Download citation
DOI: https://doi.org/10.1007/3-540-50403-6_41
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-50403-0
Online ISBN: 978-3-540-45999-6
eBook Packages: Springer Book Archive