Abstract
Formal methods are being used increasingly for computer-communication protocols. The use of a formal description promotes conciseness and avoids dangerous ambiguity. Once a formal description is available, particularly in executable form, partly automated techniques can be used for: 1) examining the protocol specification for certain kinds of errors; 2) estimating its performance; 3) implementing the protocol as part of a product; 4) testing the implementation for architectural conformance; and 5) designing a conversion mechanism to be the bridge between different protocol systems. While there are alternative formal description approaches, this paper concentrates on the formal approach most used, that based on a finite-state-machine definition.
Preview
Unable to display preview. Download preview PDF.
References
W. L. Bauerfeld, “Protocol performance prediction,” Proc. International Conference on Communications, IEEE, Boston, Mass., June 20–23, 1983, pp. 1311–1315.
G. v. Bochmann and B. Sarikaya, Eds., Proc. Sixth IFIP Workshop on Protocol Specification, Testing, and Verification, VI, Gray Rocks — Montreal, June 10–13 1986, (to be published by North-Holland, Amsterdam).
T. Bolognesi and H. Rudin, “On the analysis of time-constrained protocols by network flow algorithms,” Proc. Fourth Workshop on Protocol Specification, Testing, and Verification, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 491–513.
E. Brinksma, “A tutorial on LOTOS,” Proc. of the Fifth Workshop on Protocol Specification, Testing, and Verification, M. Diaz, Ed., Moissac-Toulouse, June 10–13 1985, (North-Holland, Amsterdam, 1985), pp. 171–194.
C.C.I.T.T., Orange Books, Sixth Plenary Assembly, Vol. VIII.2, Geneva, 1976.
C.C.I.T.T., Yellow Books, Seventh Plenary Assembly, Vol. VIII.2, Geneva, 1981.
C.C.I.T.T., Red Book, Volume VIII — Fascile VIII.3, Data Communication Networks Interfaces Recommendations X.20–X.32, VIIIth Plenary Assembly, Torremolinos, October 8–19, 1984.
C.C.I.T.T., Red Book, Volume VI — Fascile VI.10, Functional Specification and Description Language (SDL), Recommendation Z.101-Z.104, VIIIth Plenary Assembly, Torremolinos, October 8–19, 1984.
R. M. S. Cork, “The testing of protocols in SNA products,” Proc. of the Workshop on Protocol Specification, Testing, and Verification, Ill, Rüschlikon, Switzerland, May 1983, (North-Holland, Amsterdam, 1983) pp. 455–463.
M. Diaz, “Modeling and analysis of communication and cooperation protocols using Petri-net based models,” Computer Networks, Vol. 6, 1982, pp. 419–441.
M. Diaz, “Status of using Petri nets for protocols,” Proc. of the International Conference on Communications, Boston, Mass., June 20–23, 1983, pp. 1301–1305.
M. Diaz, Ed., Proc. of the Fifth International Workshop on Protocol Specification, Testing, and Verification, Moissac-Toulouse, June, 1985, (North Holland, Amsterdam, 1985).
G. J. Dickson and P. J. Chazal, “Status of CCITT description techniques and application to protocol specification,” Special issue of the Proc. of the IEEE on OSI, Vol. 71, No. 12, December, 1983, pp. 1346–1355.
H. C. Folts and R. desJardins, Eds., Special issue of the Proc. of the IEEE on OSI, Vol. 71, No. 12, December, 1983, pp. 1331–1448.
P. E. Green, Ed., IEEE Trans. Commun., April, 1980, Vol. COM-28, No. 4, pp. 409–677. Later republished as Computer Network Architectures and Protocols (Plenum, New York, 1982).
P. E. Green, “Protocol conversion,” IEEE Trans. Commun., March, 1986, Vol. COM-34, No. 3, pp. 257–268.
R. Groz, C. Jard, and C. Lassudrie, “Attacking a complex distributed algorithm from different sides: an experience with complementary validation tools,” Proc. of the Workshop on Protocol Specification, Testing, and Verification, IV, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 3–17.
B. T. Hailpern, “Tools for verifying network protocols,” Logics and Models of Concurrent Systems, K. R. Apt, Ed., NATO ASI Series, Vol. F13, (Springer Verlag, Berlin, 1985), pp. 57–76.
P. Kritzinger, “Analyzing the time efficiency of a communication protocol,” Proc. Fourth Workshop on Protocol Specification, Testing, and Verification, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 527–539.
P. Kritzinger, “A performance model of the OSI communication architecture,” IBM Zurich Research Laboratory Research Report RZ 1346, Rüschlikon, Switzerland, Dec. 11, 1984.
H. Krumm and O. Drobnik, “Interactive verification on the basis of CIL,” Proc. of the ACM SIGCOMM Symposium on Communications Architectures and Protocols, Montreal, June 6–8, 1984, pp. 92–99.
S. S. Lam and A. U. Shankar, “An illustration of protocol projections,” C. A. Sunshine, Ed., Proc. Second International Workshop on Protocol Specification, Testing, and Verification, Idylwild, May 17–20, 1982, (North Holland, Amsterdam, 1982), pp. 343–360.
S. S. Lam, “Protocol conversion — correctness problems,” ACM SIGCOMM '86 Symposium, Stowe, Vermont, Aug. 5–7, 1986, pp. 19–29.
J. Linn, “An evaluation of the ICST test architecture after testing Class-4 Transport,” Proc. of the Workshop on Protocol Specification, Testing, and Verification, IV, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 611–621.
K. L. Mills, “Testing OSI protocols: NBS advances the state of the art,” Data Communications, Vol. 13, No. 3, June, 1984, pp. 277–285.
R. Milner, “A calculus of communicating systems,” Lecture Notes in Computer Science, (Springer Verlag, Berlin, 1980.)
M. K. Molloy, “Performance analysis using stochastic Petri nets,” IEEE Trans. Computers, Vol. C-31, No. 9, pp. 913–917, Sept. 1982.
S. Nash, “Automated implementation of SNA communication protocols,” Proc. of the International Conference on Communications, Boston, Mass., June 20–23, 1983, pp. 1316–1322.
K. Okumura, “A formal protocol conversion method,” ACM SIGCOMM '86 Symposium, Stowe, Vermont, Aug. 5–7, 1986, pp. 30–37.
Protocol Development Corporation, “Estelle development system: functional specification,” Brookline, Mass., 1985.
J. L. Peterson, “Petri nets,” Computing Surveys, Vol. 9, September 1977, pp. 223–252.
T. Piatkowski, “An engineering discipline for distributed protocol systems,” Protocol Testing — Towards Proof? (an INWG/NPL Workshop) National Physical Laboratory, Teddington, U. K., May 27–29, 1981, pp. 177–215.
T. Piatkowski, “Protocol engineering,” Proc. of the International Conference on Communications, Boston, Mass., June 20–23, 1983, pp. 1328–1332.
Pozefsky, D. P. and F. D. Smith, “A meta-implementation for Systems Network Architecture,” IEEE Trans. Commun., Vol. COM-30, No. 6, June, 1982, pp. 1348–1355.
D. Rayner and R. W. S. Hale, Eds., Protocol Testing — Towards Proof? (an INWG/NPL Workshop), Vol. 1: Specification and Validation, and Vol. 2: Testing and Certification, National Physical Laboratory, Teddington, U. K., May 27–29, 1981.
D. Rayner, “Progress in testing protocol implementations,” Proc. International Conference on Communications, Boston, Mass., June 20–23, 1983, pp. 1323–1327.
D. Rayner, “Towards standardized OSI conformance tests,” Proc. of the Fifth Workshop on Protocol Specification, Testing, and Verification, M. Diaz, Ed., Moissac-Toulouse, June 10–13, 1985, (North-Holland, Amsterdam, 1985), pp. 441–460.
R. R. Razouk and C. V. Phelps, “Performance analysis using timed Petri nets,” Proc. Fourth Workshop on Protocol Specification, Testing, and Verification, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 561–576.
J. Rubin, “Testing communication protocols using random legal inputs,” Proc. COMNET'85, Budapest, October 1–4, 1985, pp. 7-50–7-67.
H. Rudin and C. H. West, “A validation technique for tightly-coupled protocols,” IEEE Trans. Computers, Vol. C-31, No. 7, July, 1982, pp. 630–636.
H. Rudin, “Validation of a token-ring protocol,” in Proc. of the International Symposium on Local Computer Networks, Florence, April, 1982, (North-Holland, Amsterdam, 1982) pp. 373–387.
H. Rudin, “Automated protocol validation: some practical examples,” Proc. Sixth International Conference on Computer Communication, London, September 1982, pp. 919–924.
H. Rudin and C. H. West, Eds., Proc. of the Third International Workshop on Protocol Specification, Testing, and Verification, Rüschlikon, May 31–June 2, 1983, (North Holland, Amsterdam, 1983).
H. Rudin, “An improved algorithm for estimating protocol performance,” Proc. Fourth Workshop on Protocol Specification, Testing, and Verification, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 515–525.
H. Rudin, “Protocols and Complexity in Computer communications”, Proc. of the 1986 International Zurich Seminar on Digital Communications, Zurich, 11–13 March, 1986, (Verlag der Fachvereine an den Schweizerischen Hochschulen und Techniken, Zurich, 1986), pp. 155–161.
H. Rudin, “The dimension of time in protocol specification,” Proc. of the IBM Europe Institute 1986: Networking in Open Systems, Oberlech, Austria, August 18–22, 1986, (to be published by Springer Verlag.)
K. Sabnani, P. Wolper, and A. Lapone, “An algorithmic technique for protocol verification,” Proc. GLOBECOM85, New Orleans, La., Dec. 2–5, 1985, pp. 3.7.1–3.7.7.
G. D. Schultz, D. B. Rose, C. H. West, and J. P. Gray, “Executable description and validation of SNA,” IEEE Trans. Commun., Vol. COM-28, Apr. 1980, pp. 661–677, also reprinted in P. E. Green, Ed., Computer Network Architectures and Protocols, (Plenum, New York, 1982), pp. 671–705.
A. U. Shankar and S. S. Lam, “On time-dependent communication protocols and their projections,” C. A. Sunshine, Ed., Proc. Second International Workshop on Protocol Specification, Testing, and Verification, Idylwild, May 17–20, 1982, (North Holland, Amsterdam, 1982), pp. 215–235.
M. Sherman and H. Rudin, “Using automated validation techniques to detect lockups in packet-switched networks,” IEEE Trans. Commun., Vol. COM-30, No. 7, July, 1982, pp. 1762–1767.
F. D. Smith and C. H. West, “Technologies for network architecture and implementation,” IBM J. Res. Develop., Vol 27, No. 1, January 1983, pp. 68–78.
C. A. Sunshine, Ed., Communication Protocol Modeling, (Artech House, Dedham, Mass., 1981).
C. A. Sunshine, Ed., Proc. of the Second International Workshop on Protocol Specification, Testing, and Verification, Idylwild, May 17–20, 1982, (North Holland, Amsterdam, 1982).
C. A. Sunshine, “Experience with automated protocol verification,” Proc. of the International Conference on Communications, Boston, Mass., June 20–23, 1983, pp. 1306–1310.
R. Tenney, “Status of the ISO ad hoc Subgroup B on formal description techniques,” Proc. of the International Conference on Communications, Boston, Mass., June 20–23, 1983, pp. 1296–1300.
R. C. Venkatraman and T. F. Piatkowski, “A formal comparison of formal protocol specification techniques,” Proc. of the Fifth Workshop on Protocol Specification, Testing, and Verification, M. Diaz, Ed., Moissac-Toulouse, June 10–13, 1985, (North-Holland, Amsterdam, 1985), pp. 401–420.
C. A. Vissers, R. L. Tenney, and G. V. Bochmann, “Formal description techniques,” special issue on OSI, Proc. IEEE, Vol. 71, No. 12, December 1983, pp. 1356–1364.
C. H. West and P. Zafiropulo, “Automated validation of a communications protocol: the CCITT X.21 recommendation,” IBM J. Res. Develop., Vol. 22, Jan. 1978, pp. 60–71.
C. H. West, “General technique for communications protocol validation,” IBM J. Res. Develop., Vol. 22, July 1978, pp. 393–404.
C. H. West, “Protocol validation by random state exploration,” Proc. Workshop on Protocol Specification, Testing, and Verification, VI, Gray Rocks, Quebec, June 10–13, 1986, (to be published by North-Holland, Amsterdam.)
Y. Yemini, Ed., Proc. of the Fourth International Workshop on Protocol Specification, Testing, and Verification, Skytop, June, 1984, (North Holland, Amsterdam, 1985).
P. Zafiropulo, C. H. West, H. Rudin, D. D. Cowan, and D. Brand, “Towards analyzing and synthesizing protocols,” IEEE Trans. Commun., Vol. COM-28, April, 1980, pp. 651–660. Also reprinted in P. E. Green, Ed., Computer Network Architectures and Protocols (Plenum, New York, 1982), pp. 645–669.
H. Zimmermann, “OSI Reference Model— the ISO model of architecture for Open Systems Interconnection,” IEEE Trans. Commun., Vol. COM-28, April, 1980, pp. 425–432. Also reprinted in P. E. Green, Ed., Computer Network Architectures and Protocols, (Plenum, New York, 1982), pp. 33–54.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1987 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Rudin, H. (1987). Tools for protocols driven by formal specifications. In: Kündig, A., Bührer, R.E., Dähler, J. (eds) Embedded Systems. Lecture Notes in Computer Science, vol 284. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0016350
Download citation
DOI: https://doi.org/10.1007/BFb0016350
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-18581-9
Online ISBN: 978-3-540-48021-1
eBook Packages: Springer Book Archive