Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

Experience with formal methods in protocol development

Published: 01 April 1991 Publication History

Abstract

Communication protocols are complex software systems and key components of computer networks. They must be specified completely and implemented correctly. The development of a protocol typically involves several tedious steps. Experience has shown that the use of informal techniques in these steps of protocol development generally produces systems with errors and undesirable behaviors. Formal methods permit the development of highly reliable and easily maintainable communication protocols. This paper presents our experience with using formal methods in the specification, verification, implementation, and conformance testing of OSI protocols.

References

[1]
[ADLU88] A. V. Aho, A. T. Dahbura, D. Lee, and M. U. Uyar. An optimization technique for protocol conformance test generation based on UIO sequences and rural Chinese Postman Tours. In A. Aggarwal and K. Sabnani, editors, Protocol specification, testing, and verification, VIII, 1988.
[2]
[And88] D. P. Anderson. Automated protocol implementation with RTAG. IEEE Transaction on Software Engineering, SE-14(3):291-300, March 1988.
[3]
[BPS83] M. Breslin, R. Pollack, and D. P. Sidhu. Formalization of the DoD protocol specification technique. Unpublished Report, 1983.
[4]
[Bri88] E. Brinksma. A theory for the derivation of tests. In A. Aggarwal and K. Sabnani, editors, Protocol specification, testing, and verification, VIII, 1988.
[5]
[BS84] T. P. Blumer and D. P. Sidhu. Some problems with the specification of the military standard Transmission Control Protocol. In et al Y. Yemini, editor, Proc. Protocol Specification, Testing and Verification IV. North-Holland, 1984. Also appeared as Network Working Group, RFC No. 964 (November 1985).
[6]
[BS86] T. P. Blumer and D. P. Sidhu. Mechanical verification and automatic implementation of communication protocols. IEEE Transaction on Software Engineering, TSE-12:827-843, August 1986.
[7]
[BS87] T. P. Blumer and D. P. Sidhu. Automated verification of the connection management aspects of the IEEE 802.2 logical link control protocol. IEEE Transactions on Communications, Com-35, 1987.
[8]
[BT82] T. P. Blumer and R. L. Tenney. A formal specification technique and implementation method for protocols. Computer Networks, 6:201-217, 1982.
[9]
[BU90] S. Boyd and H. Ural. On the complexity of generating optimal test sequences. Submitted for publication, 1990.
[10]
[BZ80] D. Brand and P. Zafiropulo. Synthesis of protocols for unlimited number of processes. In Proc. Trends and Application: 1980 Computer Network Protocols, Gaithersberg, MD, 1980. NBS.
[11]
[CCK90] M.-S. Chen, Y. Choi, and A. Kershenbaum. Approaches utilizing segment overlap to minimize test sequences. In Proc. 10th International IFIP Symposium on Protocol Specification, Testing and Verification, Ottawa, Canada, June 1990.
[12]
[Cho78] T. Chow. Testing software design modeled by finite-state machines. IEEE Trans. Software Eng., SE-4:178-187, March 1978.
[13]
[CLR88] T. Claes, J. Lenotre, and J. Richard. User guide for the Bull Estelle-to-C compiler. Tech. report, February 1988.
[14]
[CM86] T. Y. Choi and R. E. Miller. Protocol analysis and synthesis by structured partitions. Computer Networks and ISDN Systems, 11:367-381, 1986.
[15]
[CS89] A. Chung and D. P. Sidhu. On conditions for defining a closed cover to verify progress for communicating finite state machines. IEEE Transaction on Software Engineering, 15(11), November 1989.
[16]
[CS90] A. Chung and D. P. Sidhu. Fault coverage of probabilistic test sequences. In Proc. 3rd International Workshop on Protocol Test Systems, McLean, Virginia, Oct. 30 - Nov. 1 1990.
[17]
[CSB87] A. Chung, D. P. Sidhu, and T. P. Blumer. A tutorial introduction to the FSM analyzer of the Estelle Development System. Technical Report, 1987.
[18]
[CSB88] A. Chung, D. P. Sidhu, and T. P. Blumer. Automated validation of protocols using EDS. In S. Aggarwal and K. Sabnani, editors, Protocol, Specification, Testing, and Verification, VIII. North-Holland, 1988.
[19]
[CVI89] W. Y. L. Chan, S. T. Vuong, and M. R. Ito. An improved protocol test generation procedure based on UIO's. In Proc. ACM SIGCOMM '89 Symposium: Communication Architectures and Protocols, 1989.
[20]
[Dia82] M. Diaz. Modelling and analysis of communication and cooperation protocols using Petri net based models. Computer Networks, 6(6), 1982.
[21]
[DS88] A. Dahbura and K. K. Sabnani. An experience in estimating fault coverage of a protocol test. In Proc. IEEE INFOCOM'88, pages 71-79, 1988.
[22]
[DSU90] A. T. Dahbura, K. Sabnani, and M. U. Uyar. Formal methods for generating protocol conformance test sequences. In Proc. IEEE, August 1990.
[23]
[EDS86] Phoenix Technologies Ltd., 675 Mass. Ave., Cambridge, MA 02139. EDS User's Manual, September 1986.
[24]
[Gau90] P. Gaudette. A tutorial on ASN.1. Computer Networks & ISDN System, 1990. To appear.
[25]
[GC85] M. G. Gouda and C. K. Chang. Proving liveness for networks of communicating finite state machines. ACM Transaction on Programming Languages and Systems, 8(1), January 1985.
[26]
[GH85] M. G. Gouda and J. Y. Han. Protocol validation by fair progress state exploration. Computer Networks & ISDN System, 9:353-361, 1985.
[27]
[Gon70] G. Gonenc. A method for the design of fault detection experiments. IEEE Trans., Comput., C-19:551-558, June 1970.
[28]
[Gou84] M. G. Gouda. Closed covers: To verify progress for communicating finite state machines. IEEE Transaction on Software Engineering, SE-10:846-855, 1984.
[29]
[GvB86] R. Gotzhein and G. v. Bochmann. Deriving protocol specifications from service specifications: An extended algorithm. Technical report, Depart DIRO, Universite de Montreal, 1986.
[30]
[GY84a] M. G. Gouda and Y. T. Yu. Protocol validation by maximal progress state exploration. IEEE Transactions on Communications, COM-32(1), 1984.
[31]
[GY84b] M. G. Gouda and Y. T. Yu. Synthesis of communicating finite-state machines with guaranteed progress. IEEE Transactions on Communications, COM- 32(7):pp. 779-788, July 1984.
[32]
[Hai80] B. T. Hailpern. Verifying network protocols using temporal logic. In Proc. NBS Trends and Applications Conf., 1980.
[33]
[Hoa78] C. A. R. Hoare. Communicating sequential processes. Communications of ACM, 21(8), 1978.
[34]
[HU79] J. E. Hopcroft and J. D. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 1979.
[35]
[II83] M. Itoh and H. Ichikawa. Protocol verification algorithm using reduced reachability analysis. Transaction of IECE of Japan, E66(2), 1983.
[36]
[Int88a] International Organization for Standardization (ISO). Information processing systems - open systems interconnections - LOTOS - a formal description technique based on the temporal ordering of observational bebaviour. ISO 8807, 1988.
[37]
[Int88b] International Organization for Standardization (ISO). OSI conformance testing methodology and framework, part 1: General concepts. ISO/IEC JTC 1/SC 21 N DIS 9646-1, July 1988.
[38]
[Int89] International Organization for Standardization (ISO). Information processing systems - open systems interconnections - Estelle - a formal description technique based on an extended state transition model. ISO 9074, 1989.
[39]
[Int90] International Organization for Standardization (ISO). OSI conformance testing methodology and framework, part 3: The Tree and Tabular Combined Notation (TTCN). ISO/IEC DIS 9646-3, 1990.
[40]
[Kua62] M.-K. Kuan. Graphic programming using odd or even points. Chinese Math., 1:273-277, 1962.
[41]
[LFGI88] R. J. Lin, J.-P. Favreau, L. Gebase, and A. Iwabuchi. An application of formal description techniques to the specification of multi-layered test systems. In Proc. IEEE INFOCOM, 1988.
[42]
[Lin88] H. J. Linn, Jr. Conformance evaluation methodology and protocol testing. IEEE Journal on Selected Areas in communications, 1988.
[43]
[LLC84] American National Standard. IEEE standards for local area networks: Logical Link Control, 1984. ANSI/IEEE Std 802.2-1985 ISO/DIS 8802/2.
[44]
[LM88] G. M. Lundy and R. E. Miller. A variable window protocol specification and analysis. In S. Aggarwal and K. Sabnani, editors, Protocol, Specification, Testing, and Verification, VIII. North-Holland, 1988.
[45]
[LS82] S. S. Lam and A. U. Shankar. Verification of communication protocols via protocol projections. In Proc. IEEE INFOCO, 1982.
[46]
[LS84] S. S. Lam and A. U. Shankar. Protocol verification via projections. IEEE Transaction on Software Engineering, SE-10(4):325-361, July 1984.
[47]
[Mil80] R. Milner. A Calculus of Communicating System. Springer-Verla, Berlin, West Germany, 1980.
[48]
[Mil83a] Military Standard Transmission Control Protocol, August 1983. MIL-STD-1778.
[49]
[Mil83b] Military Standard Internet Protocol, August 1983. MIL-STD-1778.
[50]
[Mil90] R. E. Miller. Protocol verification: The first ten years, the next ten years; some personal observations. In Proc. 10th International IFIP Symposium on Protocol Specification, Testing and Verification, Ottawa, Canada, June 1990.
[51]
[MP90a] R. E. Miller and S. Paul. Generating minimal length test sequences for conformance testing of communication protocols. Submitted for publication, 1990.
[52]
[MP90b] R. E. Miller and S. Paul. Two techniques for generating test sequences for communications protocols. In Proc. 3rd International Workshop on Protocol Test Systems, McLean, Virginia, Oct. 30 - Nov. 1 1990.
[53]
[MS87] N. F. Maxemchuk and K. Sabnani. Probabilistic verification of communication protocols. In H. Rudin and C. H. West, editors, Protocol, Specification, Testing, and Verification, VII. North-Holland, 1987.
[54]
[MvB83] P. M. Merlin and G. v. Bochmann. On the construction of submodule specifications and communication protocols. ACM Transactions on Programming Language and Systems, 5(1): pp. 1-25, January 1983.
[55]
[Nas83] S. C. Nash. Automated implementation of SNA communication protocols. In Proc. IEEE International Conference on Communication, pages 1316-1322, June 19-22 1983.
[56]
[NBS83a] National Bureau Standards, Washington, DC. Specification of a transport protocol for computer communications, Volume 1: Overview and services, January 1983. Rep. ICST/HLNP-83-1.
[57]
[NBS83b] National Bureau Standards, Washington, DC. Specification of a transport protocol for computer communications, Volume 3: Class 4 protocol, January 1983. Rep. ICST/HLNP-83-1.
[58]
[NBS83c] National Bureau Standards, Washington, DC. Specification of a transport protocol for computer communications, Volume 4: Service specifications, January 1983. Rep. ICST/HLNP-83-1.
[59]
[NBS87] NBS. User guide for the NBS prototype compiler for Estelle. NBS Report No. ICST/SNA-87/3, October 1987.
[60]
[NT81] S. Naito and M. Tsunoyama. Fault detection for sequential machines by transition tours. In Proc. IEEE Fault Tolerant Comput. Conf., 1981.
[61]
[Pet81] I. L. Peterson. Petri Net Theory and the Modeling of Systems. Prentice Hall, Englewood Cliffs, N. J. 07632, 1981.
[62]
[PF90] D. H. Pitt and D. Freestone. The derivation of conformance tests from LOTOS specifications. IEEE Transaction on Software Engineering, December 1990.
[63]
[PS82] D. P. Pozefsky and F. D. Smith. A meta-implementation for system network architecture. IEEE Transactions on Communications, COM-30:1348-1355, Jun 1982.
[64]
[PUH88] R. L. Probert, H. Ural, and M. W. A. Hornbeek. A comprehensive software environment for developing standardized conformance test suites. Computer Networks & ISDN System, May 1988.
[65]
[Ray87] D. Rayner. OSI conformance testing. Computer Networks & ISDN Systems, 14:79-98, 1987.
[66]
[RDU85] C. V. Ramamoorthy, S. T. Dong, and Y. Usuda. An implementation of an automated protocol synthesizer(APS) and its application to the x.21 protocol. IEEE Transaction on Software Engineering, SE-11(9):pp. 886-908, September 1985.
[67]
[RW82] J. Rubin and C. H. West. An improved protocol validation technique. Computer Networks, 6:65-73, 1982.
[68]
[SA86] D. P. Sidhu and J. Aristizabal. Specifying modules for communication protocols. In Proc. IEEE Global Telcomm. Conf., Houston, TX, December 1986.
[69]
[SA88] D. P. Sidhu and J. Aristizabal. Constructing submodule specifications and network protocols. IEEE Transaction on Software Engineering, SE-14, 1988.
[70]
[SB83] D. P. Sidhu and T. P. Blumer. An automated protocol development system. In Proc. IEEE Symposium on Application and Assessment of Automated Tools for Software Development, 1983.
[71]
[SB84] D. P. Sidhu and T. P. Blumer. Automated verification of connection management of NBS class 4 transport protocol,. In Proc. ACM SIGCOMM '84 Symposium on Communication Architectures, Montreal, Canada, 1984.
[72]
[SB86] D. P. Sidhu and T. P. Blumer. Verification of NBS class 4 transport protocol. IEEE Transactions on Communications, COM-34:781-789, Aug. 1986.
[73]
[SB90] D. P. Sidhu and T. P. Blumer. Semi-automatic implementation of OSI protocols. Computer Networks & ISDN System, 18, 1990.
[74]
[SC88] D. P. Sidhu and C. S. Crall. Executable logic specifications for protocol service interfaces. IEEE Transaction on Software Engineering, SE-14(1), January 1988.
[75]
[SC89a] D. P. Sidhu and C. S. Chang. Probabilistic testing of protocols. In Proc. ACM SIGCOMM '89 Symposium: Communication Architectures and Protocols, 1989.
[76]
[SC89b] D. P. Sidhu and A. Chung. On sufficient conditions for an efficient protocol conformance test generation technique based on rural Chinese Postman Problem. Submitted for publication, 1989.
[77]
[SC90] D. P. Sidhu and A. Chung. Applications of sufficient conditions for efficient protocol test generation. Submitted for publication, 1990.
[78]
[SCB89] D. P. Sidhu, A. Chung, and T. P. Blumer. A formal technique for protocol engineering. Accepted for publication in Journal of Internetworking, 1989.
[79]
[SCC90] D. P. Sidhu, A. Chung, and C. S. Chang. Probabilistic testing of OSI protocols. Submitted for publication, 1990.
[80]
[SD88] K. Sabnani and A. Dahbura. A protocol test generation procedure. Computer Networks & ISDN Systems, 15, 1988.
[81]
[SDL85a] CCITT, Geneva. Red book Fascicle Vl. 10 - Functional Specification and Description Language (SDL). Recommendations Z.101-Z.104, 1985.
[82]
[SDL85b] CCITT, Geneva. Red book Fascicle VI. 11 - Functional Specification and Description Language (SDL). annexes to Recommendations Z.101-Z.104, 1985.
[83]
[SHW86] M. H. Sherif, G. L. Hoover, and R. P. Wiederhold. X.25 conformance testing-a tutorial. IEEE Commun. Magazine, 1986.
[84]
[Sid81] D. P. Sidhu. Authentication protocols for general communication channels. In Proc. 6th Conf. on Local Area Networks, Minneapolis, MN, 1981.
[85]
[Sid82a] D. P. Sidhu. Protocol design rules. In C. Sunshine, editor, Protocol Specification, Testing, and Verification, pages pp. 283-300. North-Holland, 1982.
[86]
[Sid82b] D. P. Sidhu. Rules for synthesizing correct communication protocols. ACM SIGCOMM Comp. Comm. Review, 12(1):pp. 35-51, 1982.
[87]
[Sid82c] D. P. Sidhu. Synthesis of communication protocols. In Proc. International Conf. on Communications '82 Conference Record, Philadelphia, PA, June 1982.
[88]
[Sid83] D. P. Sidhu. Protocol verification via executable logic specification. In H. Rudin and C. H. West, editors, Protocol Specification, Testing, and Verification, III, pages 237-248. North-Holland, 1983.
[89]
[Sid85] D. P. Sidhu. Some problems with the specification of the military standard Internet Protocol. Network Working Group, RFC No. 963, November 1985.
[90]
[Sid87] D. P. Sidhu. Protocol verification using Prolog. Submitted for publication, 1987.
[91]
[Sid90] D. P. Sidhu. Protocol testing: The first ten years, the next ten years. In Proc. 10th International IFIP Symposium on Protocol Specification, Testing and Verification, Ottawa, Canada, June 1990.
[92]
[SL88a] D. P. Sidhu and T. K. Leung. Experience with test generation for real protocols. In Proc. ACM SIGCOMM '88 Symposium: Communication Architectures and Protocols, 1988.
[93]
[SL88b] D. P. Sidhu and T. K. Leung. Fault coverage of protocol test methods. In Proc. IEEE INFOCOM '88, 1988.
[94]
[SL89] D. P. Sidhu and T. K. Leung. Formal methods for protocol testing: a detailed study. IEEE Transaction on Software Engineering, 15(4), April 1989.
[95]
[SLD89] Y.-N. Shen, F. Lombardi, and A. T. Dahbura. Protocol conformance testing using multiple UIO sequences. Submitted for publication, 1989.
[96]
[SLD90a] Y.-N. Shen, F. Lombardi, and A. T. Dahbura. Fault coverage of protocol testing. Submitted for publication, 1990.
[97]
[SLD90b] Y.-N. Shen, F. Lombardi, and A. T. Dahbura. On the solution to some open problems for protocol testing by multiple UIO sequences. Submitted for publication, 1990.
[98]
[SRWG80] G. D. Schultz, D. B. Rose, C. H. West, and J. P. Gray. Executable description and validation of SNA. IEEE Transactions on Communications, 28(4):661-677, April 1980.
[99]
[SU89] K. K. Sabnani and M. U. Uyar. An algorithmic procedure for checking safety properties of protocols. To appear in IEEE Transactions on Communications, 1989.
[100]
[SU90] M. H. Sherif and M. U. Uyar. Protocol modeling for conformance testing: Case study for the ISDN LAPD protocol. AT&T Technical Journal, 1990.
[101]
[SV89] D. P. Sidhu and R. Vallurupalli. On arbitrariness in protocol conformance test generation. Submitted for publication, 1989.
[102]
[SV90] D. P. Sidhu and R. Vallurupalli. On testing hierarchies for protocols. Submitted for publication, 1990.
[103]
[SvB84] B. Sarikaya and G. v. Bochmann. Synchronization and specification issues in protocol testing. IEEE Trans. Comm., Com-32:389-395, April 1984.
[104]
[SvBC87] B. Sarikaya, G. v. Bochmann, and E. Cerny. A test design methodology for protocol testing. IEEE Transaction on Software Engineering, May 1987.
[105]
[UD86] M. U. Uyar and A. T. Dahbura. Optimal test sequence generation for protocols: The Chinese Postman Algorithm applied to Q.931. In Proc. IEEE Global Telecomm. Conf., 1986.
[106]
[vB78] G. v. Bochmann. Finite state description of communication protocols. Computer Networks, 2, 1978.
[107]
[vB80] G. v. Bochmann. A general transition model for protocols and communication services. IEEE Transactions on Communications, Com-28(4):643-650, April 1980.
[108]
[vBGS87] G. v. Bochmann, G. W. Gerber, and J. Serre. Semiautomatic implementation of communication protocols. IEEE Transaction on Software Engineering, SE- 13(9):989-1000, September 1987.
[109]
[Vis90] C. A. Vissers. Protocol specification: The first ten years, the next ten years. In Proc. 10th International IFIP Symposium on Protocol Specification, Testing and Verification, Ottawa, Canada, June 1990.
[110]
[VLC88] S. T. Vuong, A. C. Lau, and R. I. Chan. Semiautomatic implementation of protocols using an Estelle-C compiler. IEEE Transaction on Software Engineering, SE-14(3):384-393, March 1988.
[111]
[Wes78] C. H. West. General technique for communication protocol validation. IBM J. Res. Develop. 22, pages 393-404, July 1978.
[112]
[YU90] B. Yang and H. Ural. Protocol conformance test generation using multiple UIO sequences with overlapping. In Pro. ACM SIGCOMM'90 Symposium: Communications Architectures & Protocols, September 1990.
[113]
[ZB86] Z. R. Zhao and G. v. Bochmann. Reduced reachability analysis of communication protocols: A new approach. Technical report, University of Montreal, 1986.
[114]
[ZCS89] H. X. Zeng, S. T. Chanson, and B. R. Smith. On ferry clip approaches in protocol testing. Computer Networks & ISDN System, 1989.
[115]
[Zim80] H. Zimmerman. OSI reference model - the ISO model of architecture for open system interconnection. IEEE Transactions on Communications, Com- 28(4):425-432, April 1980.
[116]
[ZWR+80] P. Zafiropulo, C. H. West, H. Rudin, D. D. Cowan, and D. Brand. Towards analyzing and synthesizing protocols. IEEE Transactions on Communications, COM-28:pp. 651-661, April 1980.

Cited By

View all
  • (2011)Verification of Session Initiation Protocol Using Timed Colored Petri NetInternational Journal of Communications, Network and System Sciences10.4236/ijcns.2011.4302104:03(170-179)Online publication date: 2011
  • (2009)Conformance Testing of Network Simulators Based on Metamorphic Testing TechniqueProceedings of the Joint 11th IFIP WG 6.1 International Conference FMOODS '09 and 29th IFIP WG 6.1 International Conference FORTE '09 on Formal Techniques for Distributed Systems10.1007/978-3-642-02138-1_19(243-248)Online publication date: 15-Jun-2009
  • (2008)Modelling and Analysis of the INVITE Transaction of the Session Initiation Protocol Using Coloured Petri NetsProceedings of the 29th international conference on Applications and Theory of Petri Nets10.1007/978-3-540-68746-7_12(132-151)Online publication date: 23-Jun-2008
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 21, Issue 2
April 1991
91 pages
ISSN:0146-4833
DOI:10.1145/122419
  • Editor:
  • Craig Patridge
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 1991
Published in SIGCOMM-CCR Volume 21, Issue 2

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)41
  • Downloads (Last 6 weeks)12
Reflects downloads up to 24 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2011)Verification of Session Initiation Protocol Using Timed Colored Petri NetInternational Journal of Communications, Network and System Sciences10.4236/ijcns.2011.4302104:03(170-179)Online publication date: 2011
  • (2009)Conformance Testing of Network Simulators Based on Metamorphic Testing TechniqueProceedings of the Joint 11th IFIP WG 6.1 International Conference FMOODS '09 and 29th IFIP WG 6.1 International Conference FORTE '09 on Formal Techniques for Distributed Systems10.1007/978-3-642-02138-1_19(243-248)Online publication date: 15-Jun-2009
  • (2008)Modelling and Analysis of the INVITE Transaction of the Session Initiation Protocol Using Coloured Petri NetsProceedings of the 29th international conference on Applications and Theory of Petri Nets10.1007/978-3-540-68746-7_12(132-151)Online publication date: 23-Jun-2008
  • (1999)On the bound of algorithmic resolvability of correctness problems of automaton interaction through communication channelsCybernetics and Systems Analysis10.1007/BF0273342735:3(385-391)Online publication date: May-1999
  • (1997)The 'Logic Assurance (LA)' system-a tool for testing and controlling real-time systemsProceedings of the Eighth Israeli Conference on Computer Systems and Software Engineering10.1109/ICCSSE.1997.599875(47-55)Online publication date: 1997
  • (1996)Deadlock detection by fair reachability analysis: from cyclic to multi-cyclic protocols (and beyond?)Proceedings of 16th International Conference on Distributed Computing Systems10.1109/ICDCS.1996.508011(605-612)Online publication date: 1996
  • (1996)Generalized fair reachability analysis for cyclic protocolsIEEE/ACM Transactions on Networking10.1109/90.4907474:2(192-204)Online publication date: 1-Apr-1996
  • (1996)An approach to cyclic protocol validationComputer Communications10.1016/S0140-3664(96)01152-819:14(1175-1187)Online publication date: 1-Dec-1996
  • (1995)Generalized fair reachability analysis for cyclic protocols with nondeterministic and internal transitionsProceedings of International Conference on Network Protocols10.1109/ICNP.1995.524813(6-13)Online publication date: 1995
  • (1995)Generalized Fair Reachability Analysis for Cyclic Protocols: Part 1Protocol Specification, Testing and Verification XIV10.1007/978-0-387-34867-4_18(271-286)Online publication date: 1995
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media