SDL Section Outline of FORMAL METHODS FOR SPECIFICATION AND ANALYSIS OF COMMUNICATION PROTOCOLS

نویسنده

  • Hang Yin
چکیده

Data Types (ADT) is used to characterize variable and parameter types through inheritance to avoid redundant redefinition of common operators and to define parametric data types. Communication on bidirectional routes between processes is asynchronous in SDL, and synchronous communication is provided by the remote-procedure call instruction. Also a non-ordered signal reception is supported by SDL. An example of SDL is presented to describe the Go-Back-N ARQ protocol which operates on a noisy channel. According to SDL, the system diagram decomposes the GBN system into three basic blocks: transmitter, channel and receiver. Each block is associated with related process represented by an octagonal shape. The process diagrams declare local variables to perform internal data handling. The SDL diagrams of the three protocol entities have specified and summarized their behaviors. The transmitter transmits PDU (Protocol Data Unit) as long as the ACK-based transmission window is below a certain maximum value with a default timer. The receiver checks whether the sequence number of the received PDU matches the expected sequence number, and issues ACK signal if positive judgment is made. In the system diagram, PDU and ACK signals are conveyed to the channel process with non-deterministic behavior of data handling. Being the most exploited formal specification language in the field of telecommunication manufacture, SDL has supported many upper level software packages. There are promising freeware tools such as JADE and SITE, and also there are successful commercial products such as Telelogic Tau SDL Suite (SDT) and Object-Geode. Example of application can be found in the specification and simulation of UMTS Radio Access Network (UTRAN) based on the SDT software suite. The modular approach and the clear distinction between structure and behavior of SDL are very useful features in describing OSI-like protocol architectures. However the lack of adequate freeware tool support for validation leads to alternative solutions to translate SDL into other formal notations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security protocols analysis: A SDL-based approach

Organizations need to develop formally analyzed systems in order to achieve well-known formal method benefits. In order to study the security of communication systems, we have developed a methodology for the application of the formal analysis techniques, commonly used in communication protocols, to the analysis of cryptographic protocols. In particular, we have extended the design and analysis ...

متن کامل

Applying SDL to Formal Analysis of Security Systems

Nowadays, it is widely accepted that critical systems have to be formally analyzed to achieve well-known benefits of formal methods. To study the security of communication systems, we have developed a methodology for the application of the formal analysis techniques commonly used in communication protocols to the analysis of cryptographic ones. In particular, we have extended the design and ana...

متن کامل

High-level specification of security systems

In order to study security systems, we have developed a methodology for application of formal analysis techniques commonly used in communication protocols to the analysis of cryptographic protocols. In particular, we have extended the design and analysis phases of protocol design with security properties. Our proposal uses a specification notation based on HMSC/MSC, which can be automatically t...

متن کامل

Protocol Engineering Applied to Formal Analysis of Security Systems

Every communication system requiring security properties is certainly critical. In order to study the security of communication systems, we have developed a methodology for the application of the formal analysis techniques of communication protocols to the analysis of cryptographic ones. We have extended the design and analysis phases with security properties. Our methodology uses a specificati...

متن کامل

Technischer Bericht Modeling Soft State Protocols with SDL

Soft state enables new services to packet-switching networks by introducing a type of state in the network nodes which is refreshed by periodical messages otherwise expire. System designers build protocols that implement soft state concepts based on intuition or on high-level explanations believe that the design is “better” than hard state and soft state implementations should be robust, reliab...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014