This Article 
 Bibliographic References 
 Add to: 
t An Integrated Approach to Design of Protocol Specifications Using Protocol Validation and Synthesis
April 1991 (vol. 40 no. 4)
pp. 459-467

The authors propose an integrated approach to protocol specification design and a new method of synthesis of protocol specifications with more than one software module for the approach. In this approach, after designers specify protocols without any restrictions, errors included in the protocol specifications are automatically detected by the acyclic-expansion-based protocol validation and efficiently corrected by the component-based protocol synthesis. In the validation, incomplete specification parts consisting of executable state transition sequences to reach errors in each process are obtained. In the synthesis, the incomplete specification parts are completed by applying certain components which are provided as fundamental parts of correct specifications. The proposed approach has been implemented as an integrated system consisting of CAPE (computer-aided protocol engineering) tools for protocol validation and synthesis. The effectiveness of this approach has been confirmed experimentally. The proposed approach is expected to enhance the productivity of protocol specification design.

[1] D. Brand and P. Zafiropulo, "Synthesis of protocols for unlimited number of processes," inProc. Trends Appl. 1980: Computer Network Protocols, NBS, Gaithersberg, MD, May 1980, pp. 29-40.
[2] D. Brand and P. Zafiropulo, "On communicating finite state machines,"J. ACM, vol. 30, no. 2, pp. 323-342, Apr. 1983.
[3] M. G. Gouda and Y. T. Yu, "Synthesis of communicating finite state machines with guaranteed progress,"IEEE Trans. Comput., vol. C-32, no. 7, pp. 779-788, 1984.
[4] G. J. Holzmann, "Automated protocol validation in Argos: Assertion proving and scatter searching,"IEEE Trans. Software Eng., vol. SE-13, no. 6, pp. 683-696, June 1987.
[5] Y. Kakuda, Y. Wakahara, and M. Norigoe, "An acyclic expansion algorithm for fast protocol validation,"IEEE Trans. Software Eng., vol. SE-14, no. 8, pp. 1059-1070, Aug. 1988.
[6] Y. Kakuda and Y. Wakahara, "Component-based synthesis of protocols for unlimited number of processes," inProc. IEEE COMPSAC'87, Oct. 1987, pp. 721-730.
[7] S. S. Lam and A. U. Shankar, "Protocol verification via projections,"IEEE Trans. Software Eng., vol. SE-10, no. 4, pp. 325-342, Apr. 1984.
[8] M. T. Liu, "Protocol engineering,"Advances in Computers, vol. 29, pp. 79-195, 1989.
[9] C. V. Ramamoorthy and S. T. Dong, "Communication protocol synthesis," inProc. COMPSAC'82, Nov. 1982, pp. 217-225.
[10] C. V. Ramamoorthy, S. T. Dong, and Y. Usuda, "An implementation of an automated protocol synthesizer (APS) and its application to the X.21 protocol,"IEEE Trans. Software Eng., vol. SE-11, no. 9, pp. 886-908, Sept. 1985.
[11] C. V. Ramamoorthy, Y. Yaw, R. Aggarwal, and J. Song, "Synthesis of two-party error-recoverable protocols," inProc. ACM SIGCOMM Symp., Aug. 1986, pp. 227-235.
[12] C. V. Ramamoorthy, Y. Yaw, W. T. Tsai, R. Aggarwal, and J. Song, "Synthesis and performance of two-party error-recoverable protocols," inProc. COMPSAC'86, Oct. 1986, pp. 214-220.
[13] D. Sidhu, "Rules for synthesizing correct communications protocols,"ACM SIGCOMM Comput. Commun. Rev., vol. 12, no. 1, pp. 35-51, Jan. 1982.
[14] Y. Wakahara, Y. Kakuda, A. Ito, and E. Utsunomiya, "Escort: An environment for specifying communication requirements,"IEEE Software, pp. 38-43, Mar 1989.
[15] C. H. West, "General technique for communications protocol validation,"IBM J. Res. Develop., vol. 22, no. 4, pp. 394-404, July 1978.
[16] CCITT Recommendation Q764, Melbourne, June 1988.

Index Terms:
protocol synthesis; integrated approach; design; protocol specifications; software module; acyclic-expansion-based protocol validation; state transition sequences; integrated system; CAPE; computer-aided protocol engineering; formal specification; protocols.
Y. Kakuda, H. Saito, "t An Integrated Approach to Design of Protocol Specifications Using Protocol Validation and Synthesis," IEEE Transactions on Computers, vol. 40, no. 4, pp. 459-467, April 1991, doi:10.1109/12.88465
Usage of this product signifies your acceptance of the Terms of Use.