scispace - formally typeset
Search or ask a question

Showing papers on "Communications protocol published in 1978"


Journal ArticleDOI
TL;DR: In this article, a finite state model for the specification and validation of communication protocols is considered, and the concept of direct coupling between interactiing finite state components is used to describe a hierarchical structure of protocol layers.

311 citations


Journal ArticleDOI
C. H. West1
TL;DR: The validation exhaustively exercises the interaction domain of a system and identifies all occurrences of a number of well-defined error conditions that can detect when individual processes have no predefined response to incoming messages.
Abstract: A technique for the validation of protocols in communications systems is described. It can be used for systems composed of processes that can be modeled as finite directed graphs. The validation exhaustively exercises the interaction domain of a system and identifies all occurrences of a number of well-defined error conditions. The method can detect when individual processes have no predefined response to incoming messages, as well as system deadlocks and potential loss of messages due to overflow conditions.

146 citations


Journal ArticleDOI
C. H. West1, P. Zafiropulo1
TL;DR: The X.21 interface recommended by the International Telegraph and Telephone Consultative Committee (CCITT) has been validated as a test of a recently developed theory and of an implemented system for automated communications protocol validation.
Abstract: The call establishment procedure of the X.21 interface recommended by the International Telegraph and Telephone Consultative Committee (CCITT) has been validated as a test of a recently developed theory and of an implemented system for automated communications protocol validation. The test demonstrated the applicability of the validation technique and identified a number of points where the interface state diagram does not completely define the interface behavior.

94 citations


Journal ArticleDOI
Daniel Brand1, William H. Joyner1
TL;DR: This part describes how this method works for communication protocols involving timing assumptions, state changes depending on message contents, unreliable medium, an arbitrary number of communicating processes, etc.

66 citations


Journal ArticleDOI
Colin H. West1
TL;DR: An implementation of a recent theory of Zafiropulo is described, which defines protocols in terms of the interaction between two directed graphs, and uses set theory and predicate logic to determine all error conditions that can arise.
Abstract: An interaction between two communicating processes can be defined in terms of a protocol or set of rules governing the exchange of messages between them. For any given protocol, it is a significant problem to determine whether or not errors can occur when the processes interact. In this paper, we describe an implementation of a recent theory of Zafiropulo, which defines protocols in terms of the interaction between two directed graphs, and uses set theory and predicate logic to determine all error conditions that can arise. The overall structure of the theory is used, but the determination of the error conditions is based on a graphical representation of the interaction, and particular emphasis is placed on the state of the channel between the two processes. The technique is currently limited to the validation of two-process protocols in which the processes return to an initial state after a finite number Of interaction steps. The implementation demonstrates that a completely automated procedure can be defined which finds a significant class of errors in communications protocols.

59 citations


Journal ArticleDOI
Pitro Alois Zafiropulo1
TL;DR: A technique is described which identifies design errors in protocols based on modeling a protocol as a pair of interacting graphs whereby interaction sequences are represented by path pairs (one path in each graph).
Abstract: A protocol is a set of rules which governs the interaction between processes. It is difficult to design protocols without errors because there are usually more interactions possible than anticipated. We are concerned with two-process protocols. A technique is described which identifies design errors in protocols. The technique is based on modeling a protocol as a pair of interacting graphs whereby interaction sequences are represented by path pairs (one path in each graph). The technique is currently limited to protocols that must revert to an initial or quiescent state after a finite number of interaction steps. The work represents a theory that can be automated on a digital computer.

57 citations


Book
01 Jan 1978
TL;DR: This book introduces the reader to the principles used in a broad selection of modern data communication protocols and basic algorithms for use in distributed applications, including not only simple point-to-point data transfer protocols but also multi-party protocols and protocols for ensuring data security.
Abstract: This book introduces the reader to the principles used in a broad selection of modern data communication protocols and basic algorithms for use in distributed applications, including not only simple point-to-point data transfer protocols but also multi-party protocols and protocols for ensuring data security. The presentation uses CSP notation to give a concise description of the protocols considered and to provide a basis for analysis of their properties. Relating theory to practice, with a strong focus on currently important Internet protocols, the book clearly explains how the principles are exploited in real-life protocol designs. Principles of Protocol Design is aimed at third-year students and graduates who are studying computer networks/distributed systems or data communications, as well as professional system designers who are looking for the broad view of the area.

47 citations



Journal ArticleDOI
TL;DR: Heuristic techniques have been used also to evaluate performances of various flow control mechanisms intended for internode protocols and transport protocols as well as performances as seen by users of computer networks.

16 citations


Proceedings ArticleDOI
13 Nov 1978
TL;DR: This paper presents a formal model using the context-free grammar (CFG) for the design and implementation of communication protocols, similar to the Backus-Naur Form that has been used to define the syntax of programming languages.
Abstract: This paper presents a formal model using the context-free grammar (CFG) for the design and implementation of communication protocols. It is similar to the Backus-Naur Form that has been used to define the syntax of programming languages. The transmission grammar (TG) is used to define the protocol for the communication entities of a computer network. For the hierarchical protocol design, the communication entity of each level is decomposed into more detailed inner-layered components and/or logically independent parts. The local approach is first used to define the TG for each of the decomposed components and logical parts. The shuffle and substitution operations are then applied to integrate the TGs of the logical parts and the TGs of the components, respectively. Examples are given to illustrate the grammatical properties of protocols and the design methodologies of TGs.

12 citations


Patent
25 Apr 1978
TL;DR: In this article, the authors propose a data communication bus structure where all module-to-module control information is grouped into two sets of lines, defined as sub-buses, wherein signal contents of the subbuses change only at well-defined times, under the control of two other lines which themselves simply govern the transfer of control information relative to the communication.
Abstract: A data communication bus structure where all module-to-module control information is grouped into two sets of lines, defined as sub-buses, wherein signal contents of the sub-buses change only at well-defined times, under the control of two other lines which themselves simply govern the transfer of control information relative to the communication. The bus structure is symmetrical with one type of each line driven by each of the two modules involved in the communication. Arbitrary standard error detecting/correcting encodings may be used on the bus to overcome possible bus failures with no change to the basic bus communications protocol.

Book
01 Jan 1978