Elsevier

Computer Networks (1976)

Volume 2, Issues 4–5, September–October 1978, Pages 346-350
Computer Networks (1976)

Survey of protocol definition and verification techniques

https://doi.org/10.1016/0376-5075(78)90013-2Get rights and content

Abstract

Techniques for definition and verification of computer network protocols have progressed significantly in the past two years to the point where complex real world protocols such as HDLC, X.25, and Cyclades TS can now be analyzed. This success is largely due to the combination of two apparently divergent approaches — state transitions, and assertion proofs — and to the greater automation of the verification process. This paper summarizes and compares some of the more recent work in this field, emphasizing the common underlying principals of different techniques.

References (20)

There are more references available in the full text version of this article.

Cited by (20)

  • An improved protocol validation technique

    1982, Computer Networks (1976)
  • Bounds on the size and transmission rate of communications protocols

    1982, Computers and Mathematics with Applications
  • Equivalence Checking 40 Years After: A Review of Bisimulation Tools

    2022, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
View all citing articles on Scopus
View full text