Toward automated abstraction for protocols on branching networks

نویسندگان

  • Michael D. Jones
  • Ganesh Gopalakrishnan
چکیده

We have used various manual abstraction techniques to formally verify a transaction ordering property for an IO protocol over bus/bridge networks. In the context of network protocol verification, an abstraction is needed to reduce the unbounded number of network configurations to a small number of representative networks that can be checked using algorithmic methods. The manually derived abstraction was both brittle and difficult to validate. In this report, we discuss the need for abstraction techniques in the formal verification of protocols over networks and present our recent efforts to create an automatic abstraction technique for network protocols using predicate abstraction as a starting point. KeywordsFormal verification methods, parameterized systems, predicate abstraction We address the problem of abstraction in the formal verification of safety properties at the bus/bridge level for protocols defined over acyclic branching networks. Abstraction is needed in this context because formal methods applied directly to protocols over networks are either not applicable, or at best difficult and time-consuming. The main source of difficulty is the unbounded nature of branching networks. Because there are an unbounded number of configurations that must be checked, tt is not possible to apply algorithmic methods, such as model checking, to all possible network configurations. We have found [MHJGOO] that it is prohibitively difficult to apply interactive theorem proving in the context of protocols on branching networks. In this report, we discuss our recent efforts to increase the amount of automation available for creating and reasoning about abstractions of protocols defined over branching networks. The problem with manually derived abstractions is that they need to be validated. Validating an abstraction is the process of showing which properties are preserved by the abstract model. We have found [JGOO] that building a validation proof for a manually derived abstraction for protocols over networks is also difficult. The significance of this work is that it will provide a technique for creating abstractions of protocols over branching networks such that certain properties of the protocol can be checked with minimal manual effort. The novel feature of this work is a predicate abstraction technique suitable for use on protocols which are defined over networks in which the states and connectivity of intermediate nodes affect the property being checked. We begin by reviewing relevant results from predicate abstraction and parameterized system verification. Section I1 contains a detailed presentation of the abstraction scheme. The formal presentation in section I1 is closely patterned after the presentation in [GS97]. Section 111 gives an example, and we close with our thoughts on abstractions for networks in the final section.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Abstraction, desalination and recharge method to control seawater intrusion into unconfined coastal aquifers

In this study, abstraction, desalination and recharge method and SEAWAT numerical model are used to investigate seawater intrusion repulsion in a hypothetical two-dimensional coastal aquifer to understand the relation of seawater intrusion with abstraction, desalination and recharge parameters (i.e. abstraction/recharge rate, wells distance and depth). Abstraction, desalination and recharge con...

متن کامل

Multi-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

متن کامل

Multi-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

متن کامل

Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks

Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...

متن کامل

Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks

Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000