This Article 
 Bibliographic References 
 Add to: 
Constructing Protocols with Alternative Functions
April 1991 (vol. 40 no. 4)
pp. 376-386

The author describes a method for designing communication protocols which can perform several distinct functions, but are limited to the execution of one function at a time. The construction of such a protocol consists of two steps: (1) developing a component protocol for each function to be included, and (2) integrating the components into the target protocol. The integration involves the resolution of potential component competition and process synchronization problems. A sufficient condition for the safety of the integrated protocol is also discussed. This design method is simple to use and promotes reuse of existing protocols. The construction of two protocols-the call setup phase of a data link control protocol and a portion of the CCITT's X.21 Recommendation-is demonstrated.

[1] J. Postel,Transmission Control Protocol, RFC (Request For Comments) 793, Sept. 1981.
[2] D. Comer,Internetworking with TCP/IP: Principles, Protocols, and Architecture, Prentice Hall, Englewood Cliffs, N.J., 1988, pp. 90-91.
[3] S. S. Lam and A. U. Shankar, "Protocol verification via projections,"IEEE Trans. Software Eng., vol. SE-10, pp. 325-342, July 1984.
[4] A. U. Shankar and S. S. Lam, "An HDLC protocol specification and its verification using image protocols,"ACM Trans. Comput. Syst., vol. 1, no. 4, pp. 321-368, Nov. 1983.
[5] C. H. Chow, M. G. Gouda, and S. S. Lam, "A discipline for constructing multi-phase communicating protocols,"ACM Trans. Comput. Syst., vol. 3, no. 4, pp. 315-343, Nov. 1985.
[6] T. Y. Choi and R. E. Miller, "A decomposition method for the analysis and design of finite state protocols," inProc. 8th Data Commun. Symp., Oct. 1983, pp. 167-176.
[7] H. Lin, "A methodology for constructing communication protocols with multiple concurrent functions,"Distributed Comput., vol. 3, pp. 23-40, Dec. 1988.
[8] Fascicle VIII.2 of the Yellow Book of the Consultative Committee for International Telegraph and Telephone, 1985 edition.
[9] M. T. Liu, "Protocol engineering," inAdvances in Computers 29, M. C. Yovits, Ed. New York: Academic, pp. 79-195, 1989.
[10] D. Brand and W. H. Joyner, "Verification of protocols using symbolic execution,"Comput. Networks, vol. 2, pp. 351-360, Oct. 1978.
[11] M. G. Gouda, "Closed covers: To verify progress of communicating finite state machines,"IEEE Trans. Software Eng., vol. SE-10, pp. 846-855, Nov. 1984.
[12] P. Jain and S. S. Lam, "Modeling and verification of real-time protocols for broadcast networks,"IEEE Trans. Software Eng., vol. SE-13, pp. 924-937, Aug. 1987.
[13] P. M. Chu and M. T. Liu, "Synthesizing protocol specifications from service specifications," inProc. IEEE Computer Networking Symp., 1988, pp. 173-182,
[14] B. Sarikaya, V. Koukoulidis, and G. v. Bochmann, "Method of analyzing extended finite-state machine specifications,"Comput. Commun., vol. 13, no. 2, pp. 83-92, Mar. 1990.
[15] G. v. Bochmann, "Finite state decomposition of communication protocols,"Comput. Networks, vol. 2, pp. 361-372, Oct. 1978.
[16] D. Brand and P. Zafiropulo, "On communicating finite state machines,"J. ACM, vol. 30, no. 2, pp. 323-342, Apr. 1983.
[17] M. G. Gouda and Y. T. Yu, "Synthesis of communicating finite state machines with guaranteed progress,"IEEE Trans. Comput., vol. C-32, no. 7, pp. 779-788, 1984.
[18] H. Lin and H. E. Stovall, "Self-synchronizing communication protocols,"IEEE Trans. Comput., vol. 38, no. 5, pp. 609-625, 1989.
[19] R. J. Cypser,Communication Architecture for Distributed Systems. Reading, MA: Addison-Wesley, 1978.

Index Terms:
CCITT; protocols; process synchronization; sufficient condition; safety; call setup phase; data link control protocol; X.21 Recommendation; protocols.
H.-A. Lin, "Constructing Protocols with Alternative Functions," IEEE Transactions on Computers, vol. 40, no. 4, pp. 376-386, April 1991, doi:10.1109/12.88459
Usage of this product signifies your acceptance of the Terms of Use.