Abstract:
The production of error-free protocols or complex process interactions is essential to reliable communications. This paper presents techniques for both the detection of e...Show MoreMetadata
Abstract:
The production of error-free protocols or complex process interactions is essential to reliable communications. This paper presents techniques for both the detection of errors in protocols and for prevention of errors in their design. The methods have been used successfully to detect and correct errors in existing protocols. A technique based on a reachability analysis is described which detects errors m a design. This "perturbation technique" has been implemented and has successfully detected inconsistencies or errors in existing protocol designs including both X.21 and X.25. The types of errors handled are state deadlocks, unspecified receptions, nonexecutable interactions, and state smbiguities. These errors are discussed and their effects considered. An interactive design technique is then described that prevents design errors. The technique is based on a set of production rules which guarantee that complete reception capability is provided in the interacting processes. These rules have been implemented in the form of a tracking algorithm that prevents a designer from creating unspecified receptions and nonexecutable interactions and monitors for the presence of state deadlocks and ambiguities.
Published in: IEEE Transactions on Communications ( Volume: 28, Issue: 4, April 1980)
Citations are not available for this document.
Cites in Papers - |
Cites in Papers - IEEE (75)
Select All
1.
Daniel Spiekermann, Jörg Keller, "Encapcap: Transforming Network Traces to Virtual Networks", 2021 IEEE 7th International Conference on Network Softwarization (NetSoft), pp.437-442, 2021.
2.
Francis Atampore, Juergen Dingel, Karen Rudie, "Automated service composition via supervisory control theory", 2016 13th International Workshop on Discrete Event Systems (WODES), pp.28-35, 2016.
3.
Susanne Graf, "Distributed Implementation of Constrained Systems Based on Knowledge", 2014 IEEE 13th International Symposium on Parallel and Distributed Computing, pp.10-13, 2014.
4.
Soonuk Seol, Myungehul Kim, S.T. Chanson, Sungwon Kang, "Interoperability test generation and minimization for communication protocols based on the multiple stimuli principle", IEEE Journal on Selected Areas in Communications, vol.22, no.10, pp.2062-2074, 2004.
5.
Q. Wu, M.S. Hsiao, "Efficient ATPG for design validation based on partitioned state exploration histories", 22nd IEEE VLSI Test Symposium, 2004. Proceedings., pp.389-394, 2004.
6.
C.N. Ip, "Simulation coverage enhancement using test stimulus transformation", IEEE/ACM International Conference on Computer Aided Design. ICCAD - 2000. IEEE/ACM Digest of Technical Papers (Cat. No.00CH37140), pp.127-133, 2000.
7.
D. Saha, D. Sengupta, "An optical layer protocol for lightpath management in WDM networks", 1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305), pp.412-418, 1999.
8.
H. van der Schoot, H. Ural, "On improving reachability analysis for verifying progress properties of networks of CFSMs", Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183), pp.130-137, 1998.
9.
S. Kleuker, "Reengineering of distributed systems using formal methods", Proceedings of the Second Euromicro Conference on Software Maintenance and Reengineering, pp.189-192, 1998.
10.
Jun-Cheol Park, R.E. Miller, "Synthesizing protocol specifications from service specifications in timed extended finite state machines", Proceedings of 17th International Conference on Distributed Computing Systems, pp.253-260, 1997.
11.
K. Zeroual, M. El Yassini, "A protocol synthesis algorithm: a relational approach", Proceedings of International Conference on Network Protocols, pp.58-65, 1995.
12.
Fong Pong, M. Dubois, "A new approach for the verification of cache coherence protocols", IEEE Transactions on Parallel and Distributed Systems, vol.6, no.8, pp.773-787, 1995.
13.
H. Mountassir, "On conditions to verify progress and finiteness for cyclic communicating machines", Proceedings of IEEE Singapore International Conference on Networks and International Conference on Information Engineering '95, pp.283-288, 1995.
14.
Liang Chen, A. Munro, "Protocol designs based on service specifications", COMPASS '95 Proceedings of the Tenth Annual Conference on Computer Assurance Systems Integrity, Software Safety and Process Security', pp.261-271, 1995.
15.
S. Das, P. Dhar, "Internetworking between TP4 and TCP through protocol complementation", Proceedings 1st International Conference on Algorithms and Architectures for Parallel Processing, vol.1, pp.315-323 vol.1, 1995.
16.
Fong Pong, Michel Dubois, "An Integrated Methodology for the Verification of Directory-Based Cache Protocols", 1994 International Conference on Parallel Processing Vol. 1, vol.1, pp.158-165, 1994.
17.
A. Benslimane, "Deciding boundedness for systems of two communicating finite state machines", Proceedings of 3rd IEEE International Symposium on High Performance Distributed Computing, pp.262-269, 1994.
18.
D.P. Sidhu, A. Chung, Chun-Shi Chang, "Probabilistic testing of OSI protocols", IEEE Transactions on Communications, vol.42, no.7, pp.2432-2440, 1994.
19.
Ye-In Chang, Jui-Hsiang Chen, "Design of correct communication protocols through analysis and synthesis", Proceeding of 13th IEEE Annual International Phoenix Conference on Computers and Communications, pp.127-, 1994.
20.
F. Pong, M. Dubois, "Correctness of a directory-based cache coherence protocol: Early experience", Proceedings of 1993 5th IEEE Symposium on Parallel and Distributed Processing, pp.37-44, 1993.
21.
H. Mountassir, "A note on communicating machines with identical symmetrical and dual processes using rewriting systems", 1993 International Conference on Network Protocols, pp.150-157, 1993.
22.
S.T. Chanson, A.A.F. Loureiro, S.T. Vuong, "On the design for testability of communication software", Proceedings of IEEE International Test Conference - (ITC), pp.190-199, 1993.
23.
C.G. Viho, "A method and a tool for errors recovering in communication protocols", Proceedings of IEEE Systems Man and Cybernetics Conference - SMC, vol.1, pp.379-384 vol.1, 1993.
24.
Chung-Ming Huang, Jenq-Muh Hsu, Huei-Yang Lai, Jao-Chiang Pong, Duen-Tay Huang, "An incremental protocol verification method for ECFSM-based protocols", COMPASS '93: Proceedings of the Eighth Annual Conference on Computer, pp.87-97, 1993.
25.
M.M. Wu, M.C. Loui, "Modeling robust asynchronous communication protocols with finite-state machines", IEEE Transactions on Communications, vol.41, no.3, pp.492-500, 1993.
26.
C. Kant, T. Higashino, G.V. Bochmann, "Deriving protocol specifications from service specifications written in LOTOS", Proceedings of Phoenix Conference on Computers and Communications, pp.310-318, 1993.
27.
H.-A. Lin, C.-L. Tarng, "An improved method for constructing multiphase communications protocols", IEEE Transactions on Computers, vol.42, no.1, pp.15-26, 1993.
28.
K. Rudie, W.M. Wonham, "Protocol verification using discrete-event systems", [1992] Proceedings of the 31st IEEE Conference on Decision and Control, pp.3770-3777 vol.4, 1992.
29.
A. Benslimane, "An algebraic approach to validate communication protocols", Proceedings of the Third Workshop on Future Trends of Distributed Computing Systems, pp.34-40, 1992.
30.
A.A. Jerraya, K. OBrien, Inhag Park, B. Courtois, "Towards System level modeling and synthesis", The Fifth International Conference on VLSI Design, pp.91-96, 1992.
Cites in Papers - Other Publishers (102)
1.
Francis Atampore, Juergen Dingel, Karen Rudie, "A controller synthesis framework for automated service composition", Discrete Event Dynamic Systems, 2019.
2.
Alexandre Petrenko, Florent Avellaneda, "Learning Communicating State Machines", Tests and Proofs, vol.11823, pp.112, 2019.
3.
Francis Atampore, Juergen Dingel, Karen Rudie, "Supervisor Aware Service Composition Framework: An Implementation and Evaluation", IFAC-PapersOnLine, vol.51, no.7, pp.277, 2018.
4.
Susanne Graf, Sophie Quinton, "Knowledge-based construction of distributed constrained systems", Software & Systems Modeling, vol.15, no.4, pp.1163, 2016.
5.
Jan Midtgaard, Flemming Nielson, Hanne Riis Nielson, Static Analysis, vol.9837, pp.338, 2016.
6.
Roland Groz, Keqin Li, Alexandre Petrenko, "Integration testing of communicating systems with unknown components", annals of telecommunications - annales des telecommunications, vol.70, no.3-4, pp.107, 2015.
7.
Susanne Graf, Sophie Quinton, Integrated Formal Methods, vol.7940, pp.77, 2013.
8.
Hartmut König, "10 Design", Protocol Engineering, pp.289, 2012.
9.
Roman Vaculín, Roman Neruda, Katia Sycara, Electronic Business Interoperability, pp.77, 2011.
10.
Gregor v. Bochmann, Dave Rayner, Colin H. West, "Some notes on the history of protocol engineering", Computer Networks, vol.54, no.18, pp.3197, 2010.
11.
Lihua Duan, Jessica Chen, "Error-preserving reductions on communication protocols", Software Testing, Verification and Reliability, vol.18, no.1, pp.51, 2008.
12.
Victor V. Kuliamin, Alexander K. Petrenko, Nick V. Pakoulin, Alexander S. Kossatchev, Igor B. Bourdonov, Perspectives of System Informatics, vol.2890, pp.450, 2004.
13.
Hasan Ural, Hüsnü Yenigün, Formal Techniques for Networked and Distributed Systems – FORTE 2004, vol.3235, pp.133, 2004.
14.
Gregor v. Bochmann, "Submodule Construction for Specifications with Input Assumptions and Output Guarantees", Formal Techniques for Networked and Distributed Sytems ? FORTE 2002, vol.2529, pp.17, 2002.
15.
Soonuk Seol, Myungchul Kim, Samuel T. Chanson, Testing of Communicating Systems XIV, vol.82, pp.151, 2002.
16.
Ph. Schnoebelen, Theoretical Aspects of Computer Software, vol.2215, pp.385, 2001.
17.
Fong Pong, Michel Dubois, "Formal verification of complex coherence protocols using symbolic state models", Journal of the ACM, vol.45, no.4, pp.557, 1998.
18.
Richard Lai, Ajin Jirachiefpattana, Communication Protocol Specification and Verification, pp.259, 1998.
19.
C. Norris Ip, Formal Methods in Computer-Aided Design, vol.1522, pp.403, 1998.
20.
O. Henniger, Testing of Communicating Systems, pp.255, 1997.
21.
Stephan Kleuker, Tools and Algorithms for the Construction and Analysis of Systems, vol.1217, pp.306, 1997.
22.
Ahmed Khoumsi, Kassem Saleh, "Two formal methods for the synthesis of discrete event systems", Computer Networks and ISDN Systems, vol.29, no.7, pp.759, 1997.
23.
Subir Das, P. Dhar, "Design of simplified protocol converters through protocol complementation", Computer Communications, vol.20, no.7, pp.528, 1997.
24.
C. Norris IP, David L. Dill, "Better verification through symmetry", Formal Methods in System Design, vol.9, no.1-2, pp.41, 1996.
25.
Stephan Kleuker, Hermann Tjabben, FME'96: Industrial Benefit and Advances in Formal Methods, vol.1051, pp.479, 1996.
26.
Abderrahim Benslimane, Computer Aided Systems Theory — CAST '94, vol.1105, pp.108, 1996.
27.
Ye‐In Chang, Jui‐Hsiang Chen, "A hybrid approach to design correct communication protocols", Journal of the Chinese Institute of Engineers, vol.19, no.1, pp.81, 1996.
28.
Stephan Kleuker, "A gentle introduction to specification engineering using a case study in telecommunications", TAPSOFT '95: Theory and Practice of Software Development, vol.915, pp.636, 1995.
29.
Debashis Saha, "Verifying the progress properties of a heterogeneous protocol system in an internetworking environment", Computer Communications, vol.18, no.5, pp.384, 1995.
30.
Daniel Y. Chao, David T. Wang, "An interactive tool for design, simulation, verification, and synthesis of protocols", Software: Practice and Experience, vol.24, no.8, pp.747, 1994.