skip to main content
article
Free access

Protocol verification using reachability analysis: the state space explosion problem and relief strategies

Published: 01 August 1987 Publication History

Abstract

Reachability analysis has proved to be one of the most effective methods in verifying correctness of communication protocols based on the state transition model. Consequently, many protocol verification tools have been built based on the method of reachability analysis. Nevertheless, it is also well known that state space explosion is the most severe limitation to the applicability of this method. Although researchers in the field have proposed various strategies to relieve this intricate problem when building the tools, a survey and evaluation of these strategies has not been done in the literature. In searching for an appropriate approach to tackling such a problem for a grammar-based validation tool, we have collected and evaluated these relief strategies, and have decided to develop our own from yet another but more systematic approach. The results of our research are now reported in this paper. Essentially, the paper is to serve two purposes: first, to give a survey and evaluation of existing relief strategies; second, to propose a new strategy, called PROVAT (PROtocol VAlidation Testing), which is inspired by the heuristic search techniques in Artificial Intelligence. Preliminary results of incorporating the PROVAT strategy into our validation tool are reviewed in the paper. These results show the empirical evidence of the effectiveness of the PROVAT strategy.

References

[1]
J. -P. Ansart. Issues and Tools for Protocol Specification. The Advanced Course on Distributed Systems- Methods and Tools for Specification. Springer-Verlag, 1985, pages 481-538.
[2]
A. Gardner. Search. The Handbook of Artificial Intelligence. William Kaufman, 1981, Chapter 1I.
[3]
T.P. Blumer and D. P. Sidhu. Mechanical VeriFmation and Automatic Implementation of Communication Protocols. IEEE Trans. on Software Engineering SE-12(8):827-843, August, 1986.
[4]
D. Brand and P. Zafiropulo. On Communicating Finite-State Machines. Journal of A CM 30(2):323-342, April, 1983.
[5]
T.Y. Choi and R. E. Miller. A Decomposition Method for the Analysis and Design of Finite State Protocols. In Proe. Data Communication Symposium, pages 167-176. ACM SIGCOMM, t983.
[6]
C. Chow, M. G. Gouda, and S. S. Larn. A Discipline for Constructing Multiphase Communication Protocols. ACM Trans. on Computer Systems 3(4):315-343. November, 1985.
[7]
M.G. Gouda and Y. T. Yu. Protocol Validation by Maximal Progress State Exploration. IEEE Trans. on Communications COM-32(1):94-97, Janunary, 1984.
[8]
M.G. Gouda and J.-Y. Han. Protocol Validation by Fair Progress State Exploration. Computer Networks and ISDN Systems 9:353-361, 1985.
[9]
G.J. Holzmann. Tracing Protocol. AT~T Technical Journal 64(10):2413-2433, December, 1985.
[10]
G.J. Holzmann. Automatic Protocol Validation in Argos: Assertion Proving and Scatter Searching. IEEE Trans. on Software Enqineerinq SE-13(6):683-696, June, 1987.
[11]
E. Horowitz and S. Sahni. Chapter 6. Fundamentals of Computer Algorithms. Computer Science Press, 1978, pages 318.
[12]
M. I~oh and H. Ichikawa. Protocol Verification Algorithm Using Reduced Reachability Analysis. The Trans. on the IECE of Japan E66(2):88-93, February, 1983.
[13]
Y. Kakuda, Y. Wakahara, and M. Norigoe. A New Algorithm for Fast Protocol Validation. In Proc. COMPSAC, pages 228-236. {EEE, 1986.
[14]
S.S. Lam and A. U. Shanker. Protocol Verification via Projections. IEEEE Trans. on Software Engineering SE-10(4):325-342, July, 1984.
[15]
F.J. Lin, P. M. Chu, and M. T. Liu. Probabilistic Transmission Grammmar. I987 Unpublished Notes.
[16]
c.s. L~. Automated Validation o{ Communication Protocols. PhD thesis, The Ohio State Univ., 1986.
[17]
J. Peral. Heuristics -- Intelligent Search Strategies for Computer Problem Solving. Addison-Wesley, 1984.
[18]
S. Purushotkaman and P. A. Subrahmanyam. Reasoning About Probabilistic Behavior in Concurrent Systems. IEEEE Trans. on Software Engineerino SE-13(6):740-745, June, 1087.
[19]
J. Rubin and C. H. West. An Improved Protocol Validation Technique. Computer Networks 6:65-73, 1982.
[20]
A.Y. Teng and M. T. Liu. The Transmission Grammar Model for Protocol Construction. {n Proc. Trends and Applications Symposium, pages 110-120. NBS~ 1980.
[21]
L.D. Umbaugh. Automated Techniques for Specification and Validation of Communication Protocols. PhD thesis, The Ohio Sate Univ., 1983.
[22]
S.T. Vuong and D. D. Cowan. A Decomposition Method for the Validation of Structured Protocols. In Proc. {NFOCOM, pages 209-220. IEEE, 1982.
[23]
S.T. Vuong, D. D. tiui, and D. D. Cowan. VALIRA- A Tool for Protocol Validation Via Reachability Analysis. Protocol Specification, Testing, and Verificatior~, North-Holland, 1987, pages 35-41.
[24]
C.H. West and P. Zafiropulo. Automated Validation of a Communication Protocol: the CCITT X.21 Recommendation. IBM dourr~al of Research and Development 22(1):60-71, 1978.
[25]
c.H. West. Applications and Limitations of Automated Protocol Validation. Protocol Specification, Testing, and Verification, II. North-Holland, 1982, pages 361-371.
[26]
C.H. West. Protocol Validation by Random State Exploration. Protocol Specification, Testing, and Verification, VI. North-Holland, t987, pages 233-242.
[27]
P. Zafiropulo, C. H. West, ~. Rudin, D. D. Cowan, and D. Brand. Towards Analyzing and Synthesizing Protocols. IEEE Trans. on Communication 28(4):651-660, April, 1980.
[28]
J.-R. Zhao and G. V. Bochmann. Reduced Reachability Analysis of Communicaiton Protocols : A New Approach. Protocol Specification, Testing, and Verification, VI. North-Holland, 1987. pages 243-254.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 17, Issue 5
Oct./Nov. 1987
397 pages
ISSN:0146-4833
DOI:10.1145/55483
Issue’s Table of Contents
  • cover image ACM Conferences
    SIGCOMM '87: Proceedings of the ACM workshop on Frontiers in computer communications technology
    August 1987
    409 pages
    ISBN:0897912454
    DOI:10.1145/55482
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 1987
Published in SIGCOMM-CCR Volume 17, Issue 5

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)130
  • Downloads (Last 6 weeks)21
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media