SPIN vs. VIS: A Case Study on the Formal Verification of the ATMR Protocol
نویسندگان
چکیده
Nowadays, there exists a wide variety of verification tools. Some, like SPIN, are designed and mainly used for the verification of interleaving software systems, such as communications protocols. Others, like VIS, are designed and used for synchronous hardware systems verification. In this paper, we compare and contrast SPIN and VIS. In particular, we devote a special attention to the efficiency of these tools for the verification of communications protocols that can be implemented either in software or hardware. As a basis of our comparison, we formally describe and verify the ATMR (Asynchronous Transfer Mode Ring) medium access protocol using SPIN and its hardware implementation using VIS. We believe that this study is of particular interest as more and more protocols, like the ATM protocol stack, are implemented in hardware to match the high speed requirements. However, this is not a formal comparison of SPIN and VIS.
منابع مشابه
Comparison of SPIN and VIS for ProtocolVeri
Nowadays, there exists a wide variety of veriication tools. Some, like SPIN, are designed and mainly used for the veriication of software systems, such as communications protocols. Others, like VIS, are designed and used for hardware systems veriication. In this paper, we compare and contrast SPIN and VIS. In particular, we devote a special attention to the eeciency of these tools for the verii...
متن کاملWeb Service Choreography Verification Using Z Formal Specification
Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملSpecification and Verification of the ATMR Protocol Using Unity. Part 1: Modeling and Specification of the Protocol
We propose a complete description and validation of the ATMR protocol within the UNITY formalism. An operational description using the UNITY programming notation is given as well as a specification of the main correctness properties in the UNITY temporal logic. This formal description helps to understand precisely the mechanisms this protocol involves. In particular, we have noted the use of a ...
متن کاملGendered Language: Men’s vs Women’s Uses of Address Terms within New Interchange Series
This study set out to check the addressing behavior within men’s and women’s talk in the written conversations in English language textbook series titled ‘New Interchange book’ by Richards, Hull and Proctor, (1998) from Cambridge University Press. In line with this aim, the present researchers initially prepared descriptive tables for both formal and informal contexts in three theme categories ...
متن کامل