Analyzing interoperability of protocols using model checking

被引:0
|
作者
Wu, P [1 ]
机构
[1] Chinese Acad Sci, Grad Sch, Comp Sci Lab, Inst Software, Beijing 100080, Peoples R China
来源
CHINESE JOURNAL OF ELECTRONICS | 2005年 / 14卷 / 03期
关键词
interoperability analysis and testing; model checking; conformance testing; protocol;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In practical terms, protocol interoperability testing is still laborious and error-prone with little effect, even for those products that have passed conformance testing. Deadlock and unsymmetrical data communication are familiar in interoperability testing, and it is always very hard to trace their causes. The previous work has not provided a coherent way to analyze why the interoperability was broken among protocol implementations under test. In this paper, an alternative approach is presented to analyzing these problems from a viewpoint of implementation structures. Sequential and concurrent structures are both representative implementation structures, especially in event-driven development model. Our research mainly discusses the influence of sequential and concurrent structures on interoperability, with two instructive conclusions: (a) a sequential structure may lead to deadlock; (b) a concurrent structure may lead to unsymmetrical data communication. Therefore, implementation structures carry weight on interoperability, which may not gain much attention before. To some extent, they are decisive on the result of interoperability testing. Moreover, a concurrent structure with a sound task-scheduling strategy may contribute to the interoperability of a protocol implementation. Herein model checking technique is introduced into interoperability analysis for the first time. As the paper shows, it is an effective way to validate developers' selections on implementation structures or strategies.
引用
收藏
页码:453 / 457
页数:5
相关论文
共 50 条
  • [1] Symbolic Model Checking Commitment Protocols Using Reduction
    El-Menshawy, Mohamed
    Bentahar, Jamal
    Dssouli, Rachida
    DECLARATIVE AGENT LANGUAGES AND TECHNOLOGIES VIII (DALT), 2011, 6619 : 185 - 203
  • [2] Model checking security protocols using a logic of belief
    Benerecetti, M
    Giunchiglia, F
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2000, 1785 : 519 - 534
  • [3] Analyzing cleaning robots using probabilistic model checking
    Araújo R.
    Mota A.
    Nogueira S.
    Advances in Intelligent Systems and Computing, 2019, 838 : 23 - 51
  • [4] Analyzing a Formal Specification of Mondex Using Model Checking
    Zeng, Reng
    He, Xudong
    THEORETICAL ASPECTS OF COMPUTING, 2010, 6255 : 214 - 229
  • [5] Analyzing Internet Routing Security Using Model Checking
    Sosnovich, Adi
    Grumberg, Orna
    Nakibly, Gabi
    LOGIC FOR PROGRAMMING, ARTIFICIAL INTELLIGENCE, AND REASONING, (LPAR-20 2015), 2015, 9450 : 112 - 129
  • [6] Model checking contractual protocols
    Daskalopulu, A
    LEGAL KNOWLEDGE AND INFORMATION SYSTEMS, 2000, 64 : 35 - 47
  • [7] Model checking of authentication protocols
    Xu, Wei-Wen
    Lu, Xin-Da
    Jisuanji Xuebao/Chinese Journal of Computers, 2003, 26 (02): : 195 - 201
  • [8] Model checking guarded protocols
    Emerson, EA
    Kahlon, V
    18TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2003, : 361 - 370
  • [9] Efficient Verification of Distributed Protocols Using Stateful Model Checking
    Saissi, Habib
    Bokor, Peter
    Muftuoglu, Can Arda
    Suri, Neeraj
    Serafini, Marco
    2013 IEEE 32ND INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2013), 2013, : 133 - 142
  • [10] Automated Analysis of Commitment Protocols Using Probabilistic Model Checking
    Gunay, Akin
    Song Songzheng
    Liu, Yang
    Zhang, Jie
    PROCEEDINGS OF THE TWENTY-NINTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2015, : 2060 - 2066