A framework for modeling transfer protocols
نویسندگان
چکیده
The notion of speci®cation frameworks transposes the framework approach from software development to the level of formal modeling and analysis. A speci®cation framework is devoted to a special application domain. It supplies reusable speci®cation modules and guides the construction of speci®cations. Moreover, it provides theorems to be used as building blocks of veri®cations. By means of a suitable framework, speci®cation and veri®cation tasks can be reduced to the selection, parametrization and combination of framework elements resulting in a substantial support which opens formal analysis even for real-sized problems. The transfer protocol framework addressed here is devoted to the design of data transfer protocols. Speci®cations of used and provided communication services as well as protocol speci®cations can be composed from its speci®cation modules. The theorems correspond to the relations between protocol mechanism combinations and those properties of the provided service which are implemented by them. This article centers on the application of this framework which is discussed with the help of the speci®cation of a sliding window protocol. Moreover the structure of its veri®cation is described. The speci®cation and veri®cation technique applied is based on L. Lamport's temporal logic of actions (TLA). We use the variant cTLA which particularly supports the modeling of process systems. Ó 2000 Elsevier Science B.V. All rights reserved.
منابع مشابه
Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols
We present the Time-Bounded Task-PIOA modeling framework, an extension of the Probabilistic I/O Automata (PIOA) framework that is intended to support modeling and verification of security protocols. Time-Bounded Task-PIOAs directly model probabilistic and nondeterministic behavior, partial-information adversarial scheduling, and time-bounded computation. Together, these features are adequate to...
متن کاملAnalyzing Security Protocols Using Time-Bounded Task-PIOAs
This paper presents the Time-Bounded Task-PIOA modeling framework, an extension of the Probabilistic Input/Output Automata (PIOA) framework that can be used for modeling and verifying security protocols. Time-bounded task-PIOAs can describe probabilistic and nondeterministic behavior, as well as time-bounded computation. Together, these features support modeling of important aspects of security...
متن کاملGeneralized stochastic performance models for loss-based congestion control
In this paper, we propose a generalized framework for modeling the behavior of prominent congestioncontrol protocols. Specifically, we define a general class of loss-based congestion-control (LB-CC) mechanisms and demonstrate that many variants of TCP, including those being proposed for high-speed networks, belong to this class. Second, we develop a stochastic model to predict the transfer time...
متن کاملModular specification and verification of XTP
The transfer protocol framework supports the formal specification and verification of data transfer protocols. It consists of generic specification modules and theorems. Compositions of specification module instances result in well-structured specifications which describe a protocol, the medium used, and the service provided by means of TLA formulas. The protocol verification is based on the pr...
متن کاملA Multi-Formalism Modeling Framework: Formal Definitions, Model Composition and Solution Strategies
In this paper, we present a multi-formalism modeling framework (abbreviated by MFMF) for modeling and simulation. The proposed framework is defined based on the concepts of meta-models and uses object-orientation to overcome the complexities and to enhance the extensibility. The framework can be used as a basis for modeling by various formalisms and to support model composition in a unified man...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 34 شماره
صفحات -
تاریخ انتشار 2000