Deriving protocol specifications from service specifications written as Predicate/Transition-nets
نویسندگان
چکیده
We consider the derivation of a protocol specification from a service specification written in Predicate/Transition-nets (Pr/T-nets). The service specification describes the global behavior of a system and includes the allocation of the Pr/T-net places to N distributed sites. The paper presents a new algorithm for deriving a protocol specification that defines the behavior of N communicating entities that execute on the N sites and coordinate their actions in order to conform to the global behavior defined by the service specification. Our algorithm decomposes each transition of the service specification into a set of communicating Pr/T-subnets running on the N entities. Moreover, for efficiently controlling the conflict for shared resources, we present a timestamp-based contention control algorithm and incorporate it into the derivation algorithm. A tool has been developed that implements our algorithm and works together with other existing tools for the graphical representation of the service and derived protocol specifications. Two application examples are discussed. 2006 Elsevier B.V. All rights reserved.
منابع مشابه
Testing from Formal Specifications, a Generic Approach
Deriving test cases from specifications is now recognised as a major application of formal methods to software development. Several methods have been proposed for various formalisms: behavioural descriptions such as transition systems, model-based specifications, algebraic specifications, etc. This article presents a general framework for test data selection from formal specifications. A notion...
متن کاملFormal Specifications of Traceback Marking Protocols
Denial-of-Service attacks and Distributed Denial-of-Service attacks are serious security problems over the Internet due to their nature. They are easy to implement, hard to prevent, and very difficult to trace. This paper describes Denial-of-Service attacks and Distributed Denial-of-Service attacks and presents various traceback that are proposed to identify the sources of theses attackers in t...
متن کاملTesting Processes from Formal Specifications with Inputs, Outputs and Data Types
Deriving test cases from formal specifications of communicating processes has been studied for a while. Several methods have been proposed for specifications based on FSM (Finite State Machines), LTS (Labelled Transition Systems), IOTS (Input Output Transition Systems), etc. However, most approaches are limited to a finite set of actions, excluding the possibility of communicating typed values ...
متن کاملSpecifiying and Validating Requirements: The VENUS System
Requirements specification and validation is recognized as a crucial part of the information systems Υ development process. This paper presents the VENUS integrated environment for requirements engineering. The underlying conceptual framework of VENUS combines the entity-relationship, object-oriented and rule-based paradigms for data and behaviour modelling. VENUS tools enable systems analysts ...
متن کاملAutomatic Synthesis of Timed Protocol Specifications from Service Specifications
Several methods have been proposed for synthesizing computer communication protocol specifications from service specifications. In real time applications, the time required to execute the events can be crucial and has to be considered. Some of the protocol synthesis methods do not consider timing constraints and, therefore, cannot be used in real time applications. In this paper, the assignment...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computer Networks
دوره 51 شماره
صفحات -
تاریخ انتشار 2007