Skip to main content

Tools for protocols driven by formal specifications

  • Chapter
  • First Online:
Embedded Systems

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 284))

Abstract

Formal methods are being used increasingly for computer-communication protocols. The use of a formal description promotes conciseness and avoids dangerous ambiguity. Once a formal description is available, particularly in executable form, partly automated techniques can be used for: 1) examining the protocol specification for certain kinds of errors; 2) estimating its performance; 3) implementing the protocol as part of a product; 4) testing the implementation for architectural conformance; and 5) designing a conversion mechanism to be the bridge between different protocol systems. While there are alternative formal description approaches, this paper concentrates on the formal approach most used, that based on a finite-state-machine definition.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W. L. Bauerfeld, “Protocol performance prediction,” Proc. International Conference on Communications, IEEE, Boston, Mass., June 20–23, 1983, pp. 1311–1315.

    Google Scholar 

  2. G. v. Bochmann and B. Sarikaya, Eds., Proc. Sixth IFIP Workshop on Protocol Specification, Testing, and Verification, VI, Gray Rocks — Montreal, June 10–13 1986, (to be published by North-Holland, Amsterdam).

    Google Scholar 

  3. T. Bolognesi and H. Rudin, “On the analysis of time-constrained protocols by network flow algorithms,” Proc. Fourth Workshop on Protocol Specification, Testing, and Verification, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 491–513.

    Google Scholar 

  4. E. Brinksma, “A tutorial on LOTOS,” Proc. of the Fifth Workshop on Protocol Specification, Testing, and Verification, M. Diaz, Ed., Moissac-Toulouse, June 10–13 1985, (North-Holland, Amsterdam, 1985), pp. 171–194.

    Google Scholar 

  5. C.C.I.T.T., Orange Books, Sixth Plenary Assembly, Vol. VIII.2, Geneva, 1976.

    Google Scholar 

  6. C.C.I.T.T., Yellow Books, Seventh Plenary Assembly, Vol. VIII.2, Geneva, 1981.

    Google Scholar 

  7. C.C.I.T.T., Red Book, Volume VIII — Fascile VIII.3, Data Communication Networks Interfaces Recommendations X.20–X.32, VIIIth Plenary Assembly, Torremolinos, October 8–19, 1984.

    Google Scholar 

  8. C.C.I.T.T., Red Book, Volume VI — Fascile VI.10, Functional Specification and Description Language (SDL), Recommendation Z.101-Z.104, VIIIth Plenary Assembly, Torremolinos, October 8–19, 1984.

    Google Scholar 

  9. R. M. S. Cork, “The testing of protocols in SNA products,” Proc. of the Workshop on Protocol Specification, Testing, and Verification, Ill, Rüschlikon, Switzerland, May 1983, (North-Holland, Amsterdam, 1983) pp. 455–463.

    Google Scholar 

  10. M. Diaz, “Modeling and analysis of communication and cooperation protocols using Petri-net based models,” Computer Networks, Vol. 6, 1982, pp. 419–441.

    Article  Google Scholar 

  11. M. Diaz, “Status of using Petri nets for protocols,” Proc. of the International Conference on Communications, Boston, Mass., June 20–23, 1983, pp. 1301–1305.

    Google Scholar 

  12. M. Diaz, Ed., Proc. of the Fifth International Workshop on Protocol Specification, Testing, and Verification, Moissac-Toulouse, June, 1985, (North Holland, Amsterdam, 1985).

    Google Scholar 

  13. G. J. Dickson and P. J. Chazal, “Status of CCITT description techniques and application to protocol specification,” Special issue of the Proc. of the IEEE on OSI, Vol. 71, No. 12, December, 1983, pp. 1346–1355.

    Google Scholar 

  14. H. C. Folts and R. desJardins, Eds., Special issue of the Proc. of the IEEE on OSI, Vol. 71, No. 12, December, 1983, pp. 1331–1448.

    Google Scholar 

  15. P. E. Green, Ed., IEEE Trans. Commun., April, 1980, Vol. COM-28, No. 4, pp. 409–677. Later republished as Computer Network Architectures and Protocols (Plenum, New York, 1982).

    Google Scholar 

  16. P. E. Green, “Protocol conversion,” IEEE Trans. Commun., March, 1986, Vol. COM-34, No. 3, pp. 257–268.

    Article  Google Scholar 

  17. R. Groz, C. Jard, and C. Lassudrie, “Attacking a complex distributed algorithm from different sides: an experience with complementary validation tools,” Proc. of the Workshop on Protocol Specification, Testing, and Verification, IV, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 3–17.

    Google Scholar 

  18. B. T. Hailpern, “Tools for verifying network protocols,” Logics and Models of Concurrent Systems, K. R. Apt, Ed., NATO ASI Series, Vol. F13, (Springer Verlag, Berlin, 1985), pp. 57–76.

    Google Scholar 

  19. P. Kritzinger, “Analyzing the time efficiency of a communication protocol,” Proc. Fourth Workshop on Protocol Specification, Testing, and Verification, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 527–539.

    Google Scholar 

  20. P. Kritzinger, “A performance model of the OSI communication architecture,” IBM Zurich Research Laboratory Research Report RZ 1346, Rüschlikon, Switzerland, Dec. 11, 1984.

    Google Scholar 

  21. H. Krumm and O. Drobnik, “Interactive verification on the basis of CIL,” Proc. of the ACM SIGCOMM Symposium on Communications Architectures and Protocols, Montreal, June 6–8, 1984, pp. 92–99.

    Google Scholar 

  22. S. S. Lam and A. U. Shankar, “An illustration of protocol projections,” C. A. Sunshine, Ed., Proc. Second International Workshop on Protocol Specification, Testing, and Verification, Idylwild, May 17–20, 1982, (North Holland, Amsterdam, 1982), pp. 343–360.

    Google Scholar 

  23. S. S. Lam, “Protocol conversion — correctness problems,” ACM SIGCOMM '86 Symposium, Stowe, Vermont, Aug. 5–7, 1986, pp. 19–29.

    Google Scholar 

  24. J. Linn, “An evaluation of the ICST test architecture after testing Class-4 Transport,” Proc. of the Workshop on Protocol Specification, Testing, and Verification, IV, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 611–621.

    Google Scholar 

  25. K. L. Mills, “Testing OSI protocols: NBS advances the state of the art,” Data Communications, Vol. 13, No. 3, June, 1984, pp. 277–285.

    Google Scholar 

  26. R. Milner, “A calculus of communicating systems,” Lecture Notes in Computer Science, (Springer Verlag, Berlin, 1980.)

    Google Scholar 

  27. M. K. Molloy, “Performance analysis using stochastic Petri nets,” IEEE Trans. Computers, Vol. C-31, No. 9, pp. 913–917, Sept. 1982.

    Google Scholar 

  28. S. Nash, “Automated implementation of SNA communication protocols,” Proc. of the International Conference on Communications, Boston, Mass., June 20–23, 1983, pp. 1316–1322.

    Google Scholar 

  29. K. Okumura, “A formal protocol conversion method,” ACM SIGCOMM '86 Symposium, Stowe, Vermont, Aug. 5–7, 1986, pp. 30–37.

    Google Scholar 

  30. Protocol Development Corporation, “Estelle development system: functional specification,” Brookline, Mass., 1985.

    Google Scholar 

  31. J. L. Peterson, “Petri nets,” Computing Surveys, Vol. 9, September 1977, pp. 223–252.

    Article  Google Scholar 

  32. T. Piatkowski, “An engineering discipline for distributed protocol systems,” Protocol Testing — Towards Proof? (an INWG/NPL Workshop) National Physical Laboratory, Teddington, U. K., May 27–29, 1981, pp. 177–215.

    Google Scholar 

  33. T. Piatkowski, “Protocol engineering,” Proc. of the International Conference on Communications, Boston, Mass., June 20–23, 1983, pp. 1328–1332.

    Google Scholar 

  34. Pozefsky, D. P. and F. D. Smith, “A meta-implementation for Systems Network Architecture,” IEEE Trans. Commun., Vol. COM-30, No. 6, June, 1982, pp. 1348–1355.

    Article  Google Scholar 

  35. D. Rayner and R. W. S. Hale, Eds., Protocol Testing — Towards Proof? (an INWG/NPL Workshop), Vol. 1: Specification and Validation, and Vol. 2: Testing and Certification, National Physical Laboratory, Teddington, U. K., May 27–29, 1981.

    Google Scholar 

  36. D. Rayner, “Progress in testing protocol implementations,” Proc. International Conference on Communications, Boston, Mass., June 20–23, 1983, pp. 1323–1327.

    Google Scholar 

  37. D. Rayner, “Towards standardized OSI conformance tests,” Proc. of the Fifth Workshop on Protocol Specification, Testing, and Verification, M. Diaz, Ed., Moissac-Toulouse, June 10–13, 1985, (North-Holland, Amsterdam, 1985), pp. 441–460.

    Google Scholar 

  38. R. R. Razouk and C. V. Phelps, “Performance analysis using timed Petri nets,” Proc. Fourth Workshop on Protocol Specification, Testing, and Verification, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 561–576.

    Google Scholar 

  39. J. Rubin, “Testing communication protocols using random legal inputs,” Proc. COMNET'85, Budapest, October 1–4, 1985, pp. 7-50–7-67.

    Google Scholar 

  40. H. Rudin and C. H. West, “A validation technique for tightly-coupled protocols,” IEEE Trans. Computers, Vol. C-31, No. 7, July, 1982, pp. 630–636.

    Google Scholar 

  41. H. Rudin, “Validation of a token-ring protocol,” in Proc. of the International Symposium on Local Computer Networks, Florence, April, 1982, (North-Holland, Amsterdam, 1982) pp. 373–387.

    Google Scholar 

  42. H. Rudin, “Automated protocol validation: some practical examples,” Proc. Sixth International Conference on Computer Communication, London, September 1982, pp. 919–924.

    Google Scholar 

  43. H. Rudin and C. H. West, Eds., Proc. of the Third International Workshop on Protocol Specification, Testing, and Verification, Rüschlikon, May 31–June 2, 1983, (North Holland, Amsterdam, 1983).

    Google Scholar 

  44. H. Rudin, “An improved algorithm for estimating protocol performance,” Proc. Fourth Workshop on Protocol Specification, Testing, and Verification, Skytop, Pennsylvania, June 1984, (North-Holland, Amsterdam, 1985), pp. 515–525.

    Google Scholar 

  45. H. Rudin, “Protocols and Complexity in Computer communications”, Proc. of the 1986 International Zurich Seminar on Digital Communications, Zurich, 11–13 March, 1986, (Verlag der Fachvereine an den Schweizerischen Hochschulen und Techniken, Zurich, 1986), pp. 155–161.

    Google Scholar 

  46. H. Rudin, “The dimension of time in protocol specification,” Proc. of the IBM Europe Institute 1986: Networking in Open Systems, Oberlech, Austria, August 18–22, 1986, (to be published by Springer Verlag.)

    Google Scholar 

  47. K. Sabnani, P. Wolper, and A. Lapone, “An algorithmic technique for protocol verification,” Proc. GLOBECOM85, New Orleans, La., Dec. 2–5, 1985, pp. 3.7.1–3.7.7.

    Google Scholar 

  48. G. D. Schultz, D. B. Rose, C. H. West, and J. P. Gray, “Executable description and validation of SNA,” IEEE Trans. Commun., Vol. COM-28, Apr. 1980, pp. 661–677, also reprinted in P. E. Green, Ed., Computer Network Architectures and Protocols, (Plenum, New York, 1982), pp. 671–705.

    Article  Google Scholar 

  49. A. U. Shankar and S. S. Lam, “On time-dependent communication protocols and their projections,” C. A. Sunshine, Ed., Proc. Second International Workshop on Protocol Specification, Testing, and Verification, Idylwild, May 17–20, 1982, (North Holland, Amsterdam, 1982), pp. 215–235.

    Google Scholar 

  50. M. Sherman and H. Rudin, “Using automated validation techniques to detect lockups in packet-switched networks,” IEEE Trans. Commun., Vol. COM-30, No. 7, July, 1982, pp. 1762–1767.

    Article  Google Scholar 

  51. F. D. Smith and C. H. West, “Technologies for network architecture and implementation,” IBM J. Res. Develop., Vol 27, No. 1, January 1983, pp. 68–78.

    Google Scholar 

  52. C. A. Sunshine, Ed., Communication Protocol Modeling, (Artech House, Dedham, Mass., 1981).

    Google Scholar 

  53. C. A. Sunshine, Ed., Proc. of the Second International Workshop on Protocol Specification, Testing, and Verification, Idylwild, May 17–20, 1982, (North Holland, Amsterdam, 1982).

    Google Scholar 

  54. C. A. Sunshine, “Experience with automated protocol verification,” Proc. of the International Conference on Communications, Boston, Mass., June 20–23, 1983, pp. 1306–1310.

    Google Scholar 

  55. R. Tenney, “Status of the ISO ad hoc Subgroup B on formal description techniques,” Proc. of the International Conference on Communications, Boston, Mass., June 20–23, 1983, pp. 1296–1300.

    Google Scholar 

  56. R. C. Venkatraman and T. F. Piatkowski, “A formal comparison of formal protocol specification techniques,” Proc. of the Fifth Workshop on Protocol Specification, Testing, and Verification, M. Diaz, Ed., Moissac-Toulouse, June 10–13, 1985, (North-Holland, Amsterdam, 1985), pp. 401–420.

    Google Scholar 

  57. C. A. Vissers, R. L. Tenney, and G. V. Bochmann, “Formal description techniques,” special issue on OSI, Proc. IEEE, Vol. 71, No. 12, December 1983, pp. 1356–1364.

    Google Scholar 

  58. C. H. West and P. Zafiropulo, “Automated validation of a communications protocol: the CCITT X.21 recommendation,” IBM J. Res. Develop., Vol. 22, Jan. 1978, pp. 60–71.

    Google Scholar 

  59. C. H. West, “General technique for communications protocol validation,” IBM J. Res. Develop., Vol. 22, July 1978, pp. 393–404.

    Google Scholar 

  60. C. H. West, “Protocol validation by random state exploration,” Proc. Workshop on Protocol Specification, Testing, and Verification, VI, Gray Rocks, Quebec, June 10–13, 1986, (to be published by North-Holland, Amsterdam.)

    Google Scholar 

  61. Y. Yemini, Ed., Proc. of the Fourth International Workshop on Protocol Specification, Testing, and Verification, Skytop, June, 1984, (North Holland, Amsterdam, 1985).

    Google Scholar 

  62. P. Zafiropulo, C. H. West, H. Rudin, D. D. Cowan, and D. Brand, “Towards analyzing and synthesizing protocols,” IEEE Trans. Commun., Vol. COM-28, April, 1980, pp. 651–660. Also reprinted in P. E. Green, Ed., Computer Network Architectures and Protocols (Plenum, New York, 1982), pp. 645–669.

    Article  Google Scholar 

  63. H. Zimmermann, “OSI Reference Model— the ISO model of architecture for Open Systems Interconnection,” IEEE Trans. Commun., Vol. COM-28, April, 1980, pp. 425–432. Also reprinted in P. E. Green, Ed., Computer Network Architectures and Protocols, (Plenum, New York, 1982), pp. 33–54.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

A. Kündig R. E. Bührer J. Dähler

Rights and permissions

Reprints and permissions

Copyright information

© 1987 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Rudin, H. (1987). Tools for protocols driven by formal specifications. In: Kündig, A., Bührer, R.E., Dähler, J. (eds) Embedded Systems. Lecture Notes in Computer Science, vol 284. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0016350

Download citation

  • DOI: https://doi.org/10.1007/BFb0016350

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-18581-9

  • Online ISBN: 978-3-540-48021-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics