Verification and Validation of a Reliable Multicast Protocol
نویسندگان
چکیده
This paper describes the methods used to specify and implement a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally by two complementary teams using a combination of formal and informal techniques in an attempt to ensure the correctness of the protocol implementation. The first team, called the Design team, initially specified protocol requirements using a variant of SCH requirements tables and implemented a prototype solution. The second team, called die V&V team, developed a state model based on die requirements tables and derived test cases from these tables to exercise the implementation. In a series of iterative steps, the Design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation through testing. Test cases derived from state transition paths hi the formal model formed the dialogue between teams during development and served as the vehicles for keeping die model and implementation in fidelity with each other. This paper describes our experiences hi developing our process model, details of our approach, and some example problems found during die development of RMP.
منابع مشابه
The Specification-based Validation of Reliable Multicast Protocol
Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP multicasting. In this report, we develop formal models for RMP using existing automated verification systems, and perform validation on the formal RMP specifications. The validation analysis help identifies some minor specification and design...
متن کاملReliability in Multicast Services and Protocols ; A Survey
Multipoint communication allows information transfer within a group of peer entities and is becoming more and more relevant in distributed environments. For distributed or replicated data, it ensures an efficient communication without overloading the network. Multicast is defined as a subset of multipoint where a single sender transmits data to a group of receivers. Several classes of multicast...
متن کاملSpecifying and Verifying a Broadcast and a Multicast Snooping Cache Coherence Protocol
ÐIn this paper, we develop a specification methodology that documents and specifies a cache coherence protocol in eight tables: the states, events, actions, and transitions of the cache and memory controllers. We then use this methodology to specify a detailed, modern three-state broadcast snooping protocol with an unordered data network and an ordered address network that allows arbitrary skew...
متن کاملFighting Fire with Fire: Using Randomized Gossip to Combat Stochastic Scalability Limits
ly, let M be the number of copies of a single multicast that a member receives from the lower dissemination layer. For the Pbcast implementation, since each member gossips a given multicast for O(log(n)) gossip rounds and to randomly chosen targets, we have M = O(log(n)). To maximize the throughput, one would want to minimize the number of copies M of a multicast that a member receives from the...
متن کاملUse of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols
This document details the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) packet source authentication and packet integrity verification protocol and its integration within the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) content delivery protocols. This document only considers the authentication/integrity verification of the packets generated by the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008