Systematic Verification of Safety Properties of Arbitrary Network Protocol Compositions Using CHAIN

نویسندگان

  • Adam Bradley
  • Azer Bestavros
  • Assaf J. Kfoury
چکیده

Formal correctness of complex multi-party network protocols can be difficult to verify. While models of specific fixed compositions of agents can be checked against design constraints, protocols which lend themselves to arbitrarily many compositions of agents–such as the chaining of proxies or the peering of routers–are more difficult to verify because they represent potentially infinite state spaces and may exhibit emergent behaviors which may not materialize under particular fixed compositions. We address this challenge by developing an algebraic approach that enables us to reduce arbitrary compositions of network agents into a behaviorally-equivalent (with respect to some correctness property) compact, canonical representation, which is amenable to mechanical verification. Our approach consists of an algebra and a set of property-preserving rewrite rules for the Canonical Homomorphic Abstraction of Infinite Network protocol compositions (CHAIN). Using CHAIN, an expression over our algebra (i.e., a set of configurations of network protocol agents) can be reduced to another behaviorally-equivalent expression (i.e., a smaller set of configurations). Repeated applications of such rewrite rules produces a canonical expression which can be checked mechanically. We demonstrate our approach by characterizing deadlock-prone configurations of HTTP agents, as well as establishing useful properties of an overlay protocol for scheduling MPEG frames, and of a protocol for Web intracache consistency.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Validating Arbitrarily Large Network Protocol Compositions with Finite Computation

Formal tools like finite-state model checkers have proven useful in verifying the correctness of systems of bounded size and for hardening single system components against arbitrary inputs. However, conventional applications of these techniques are not well suited to characterizing emergent behaviors of large compositions of processes. In this paper, we present a methodology by which arbitraril...

متن کامل

Verification of an Evolutionary-based Wavelet Neural Network Model for Nonlinear Function Approximation

Nonlinear function approximation is one of the most important tasks in system analysis and identification. Several models have been presented to achieve an accurate approximation on nonlinear mathematics functions. However, the majority of the models are specific to certain problems and systems. In this paper, an evolutionary-based wavelet neural network model is proposed for structure definiti...

متن کامل

Verifying Networks of Timed Processes

Over the last years there has been an increasing research eeort directed towards the automatic veriication of innnite state systems, such as timed automata, hybrid automata, data-independent systems, rela-tional automata, Petri nets, and lossy channel systems. We present a method for deciding reachability properties of networks of timed processes. Such a network consists of an arbitrary set of ...

متن کامل

Sustainable Supply Chain Network Design: A Review on Quantitative Models Using Content Analysis

The purpose of this paper is to develop a systematic literature review on the subject of sustainable supply chain network design during 1990-2016, through a review of 261 papers. In this study, qualitative technique for conducting a systematic literature review was used. To systematize and make the literature review more accurate, content analysis method was used that include data collect...

متن کامل

Improving Lifetime of Strategic Information Network in Oil Supply Chain

Today, information networks play an important role in supply chain management. Therefore, in this article, clustering-based routing protocols, which are one of the most important ways to reduce energy consumption in wireless sensor networks, are used to optimize the supply chain informational cloud network. Accordingly, first, a clustering protocol is presented using self-organizing map neu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003