Analyzing interoperability of protocols using model checking

被引:0
作者
Wu, P [1 ]
机构
[1] Chinese Acad Sci, Grad Sch, Comp Sci Lab, Inst Software, Beijing 100080, Peoples R China
来源
CHINESE JOURNAL OF ELECTRONICS | 2005年 / 14卷 / 03期
关键词
interoperability analysis and testing; model checking; conformance testing; protocol;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In practical terms, protocol interoperability testing is still laborious and error-prone with little effect, even for those products that have passed conformance testing. Deadlock and unsymmetrical data communication are familiar in interoperability testing, and it is always very hard to trace their causes. The previous work has not provided a coherent way to analyze why the interoperability was broken among protocol implementations under test. In this paper, an alternative approach is presented to analyzing these problems from a viewpoint of implementation structures. Sequential and concurrent structures are both representative implementation structures, especially in event-driven development model. Our research mainly discusses the influence of sequential and concurrent structures on interoperability, with two instructive conclusions: (a) a sequential structure may lead to deadlock; (b) a concurrent structure may lead to unsymmetrical data communication. Therefore, implementation structures carry weight on interoperability, which may not gain much attention before. To some extent, they are decisive on the result of interoperability testing. Moreover, a concurrent structure with a sound task-scheduling strategy may contribute to the interoperability of a protocol implementation. Herein model checking technique is introduced into interoperability analysis for the first time. As the paper shows, it is an effective way to validate developers' selections on implementation structures or strategies.
引用
收藏
页码:453 / 457
页数:5
相关论文
共 50 条
  • [31] Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK
    Llanos Tobarra
    Diego Cazorla
    Fernando Cuartero
    Gregorio Díaz
    Emilia Cambronero
    Telecommunication Systems, 2009, 40 : 91 - 99
  • [32] A Model Checking Method for Secure Routing Protocols by SPIN with State Space Reduction
    Kojima, Hideharu
    Yanai, Naoto
    2020 IEEE 34TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW 2020), 2020, : 627 - 635
  • [33] A Partition-Based Model Checking Method for Verifying Communication Protocols with SPIN
    Zhang, Xinchang
    Yang, Meihong
    Li, Xingfeng
    Shi, Huiling
    INFORMATION AND AUTOMATION, 2011, 86 : 71 - +
  • [34] Model Checking using Spin and SpinRCP
    Brezocnik, Zmago
    Vlaovic, Bostjan
    Vreze, Aleksander
    INFORMACIJE MIDEM-JOURNAL OF MICROELECTRONICS ELECTRONIC COMPONENTS AND MATERIALS, 2013, 43 (04): : 235 - 250
  • [35] Model Checking Using Description Logic
    Ben-David, Shoham
    Trefler, Richard
    Weddell, Grant
    JOURNAL OF LOGIC AND COMPUTATION, 2010, 20 (01) : 111 - 131
  • [36] Conformance Testing for OSEK/VDX Operating System Using Model Checking
    Chen, Jiang
    Aoki, Toshiaki
    2011 18TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2011), 2011, : 274 - 281
  • [37] Supporting automated containment checking of software behavioural models using model transformations and model checking
    Muram, Faiz U. L.
    Tran, Huy
    Zdun, Uwe
    SCIENCE OF COMPUTER PROGRAMMING, 2019, 174 : 38 - 71
  • [38] Protocols for Integrity Constraint Checking in Federated Databases
    Paul Grefen
    Jennifer Widom
    Distributed and Parallel Databases, 1997, 5 : 327 - 355
  • [39] Protocols for integrity constraint checking in federated databases
    Grefen, P
    Widom, J
    DISTRIBUTED AND PARALLEL DATABASES, 1997, 5 (04) : 327 - 355
  • [40] EFFICIENT CSL MODEL CHECKING USING STRATIFICATION
    Zhang, Lijun
    Jansen, David N.
    Nielson, Flemming
    Hermanns, Holger
    LOGICAL METHODS IN COMPUTER SCIENCE, 2012, 8 (02)