Abstract:
The production of error-free protocols or complex process interactions is essential to reliable communications. This paper presents techniques for both the detection of e...Show MoreMetadata
Abstract:
The production of error-free protocols or complex process interactions is essential to reliable communications. This paper presents techniques for both the detection of errors in protocols and for prevention of errors in their design. The methods have been used successfully to detect and correct errors in existing protocols. A technique based on a reachability analysis is described which detects errors m a design. This "perturbation technique" has been implemented and has successfully detected inconsistencies or errors in existing protocol designs including both X.21 and X.25. The types of errors handled are state deadlocks, unspecified receptions, nonexecutable interactions, and state smbiguities. These errors are discussed and their effects considered. An interactive design technique is then described that prevents design errors. The technique is based on a set of production rules which guarantee that complete reception capability is provided in the interacting processes. These rules have been implemented in the form of a tracking algorithm that prevents a designer from creating unspecified receptions and nonexecutable interactions and monitors for the presence of state deadlocks and ambiguities.
Published in: IEEE Transactions on Communications ( Volume: 28, Issue: 4, April 1980)
References is not available for this document.
Select All
1.
J. Postel, A graph model analysis of computer communication protocols, Jan. 1974.
2.
T. Piatkowski, Finite-state architecture, Aug. 1975.
3.
C. A. Sunshine, Interprocess communication protocols for computer networks, 1975.
4.
Systems network architecture format and protocol reference manual: Architectural logic, 1976.
5.
J. Hajek, "Automatically verified data transfer protocols", Proc. Int. Conf. Comput. Commun., pp. 749-756, 1978-Sept.
6.
G. V. Bochmann, "A general transition model for protocols and services," this issue, pp. 643-650.
7.
A. Danthine, "Protocol representation: finite state architecture," this issue, pp. 632-643.
8.
G. D. Schultz, D. B. Rose, C. H. West, and J. P. Gray, "Executable, description and validation of SNA," this issue, pp. 661-677.
9.
G. V. Bochmann and C, A. Sunshine, "Formal methods in communication protocol design," this issue, pp. 624-631.
10.
C. A. Sunshine, "Survey of protocol definition and verification techniques", Proc. Comput. Network Protocols Symp., 1978-Feb.
11.
P. M. Merlin, "Specification and validation of protocols", IEEE Trans. Commun., vol. COM-27, pp. 1761-1680, Nov. 1979.
12.
Proc. Comput. Network Protocols Symp., 1978-Feb.
13.
Computer Network Protocols Comput. Networks, vol. 2, Oct. 1978.
14.
P. Zafiropulo, "Protocol validation by duologue-matrix analysis", IEEE Trans. Commun., vol. COM-26, pp. 1187-1194, Aug. 1978.
15.
P. Zafiropulo, Protocol validation by duologue-matrix analysis, Feb. 1977.
16.
G. V. Bochmann, "Finite state description of communication protocols", Proc. Comput. Network Protocols Symp., 1978-Feb.
17.
C. H. West, "General technique for communications protocol validation", IBM J. Res. Develop., vol. 22, pp. 393-404, July 1978.
18.
C. H. West, Computer-aided validation of communications protocols, Feb. 1977.
19.
J. Hajek, "Protocols verified by APPROVER", ACM SIGCOMM Comput. Commun. Rev., vol. 9, Jan. 1979.
20.
C. H. West and P. Zafiropulo, "Automated validation of a communications protocol: The CCITT X.21 recommendation", IBM J. Res. Develop., vol. 22, pp. 60-71, Jan. 1978.
21.
Technical improvements to CCITT recommendation X.25, Oct. 1978.
22.
P. Zafiropulo, "Design rules for producing logically complete two-process interactions and communications protocols", Proc. 2nd Int. Conf. Comput. Software and Applications, pp. 680-685, 1978-Nov.
23.
K. A. Bartlett, R. A. Scantelbury and P. T. Wilkinson, "A note on reliable full-duplex transmission over half-duplex links", Commun. Ass. Comput. Mach., vol. 12, pp. 2260-2261, May 1969.
24.
C. H. West, "An automated technique of communications protocol validation", IEEE Trans. Commun., vol. COM-26, pp. 1271-1275, Aug. 1978.
25.
H. Rudin, C. H. West and P. Zafiropulo, "Automated protocol validation: One chain of development", Proc. Comput. Network Protocols Symp., 1978-Feb.
26.
D. D. Cowan and C. J. P. Lucena, "Some thoughts on the construction of programs—A data-directed approach", Proc. 3rd Jerusalem Conf. Inform. Technol., 1978-Aug.
27.
D. D. Cowan, J. W. Graham, J. W. Welch and C. J. P. Lucena, "A data-directed approach to program construction", Software Practice and Experience.
28.
D. Belsnes and E. Lynning, "Some problems with the X.25 packet level protocol", ACM SIGCOMM Comput. Commun. Rev., vol. 7, pp. 41-51, Oct. 1977.
29.
Comput. Commun. Rev., Ass. Comput. Mach. Special Interest Gronup on Data Communications, vol. 7, Oct. 1977.