Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
From state machines to temporal logic: specification methods for protocol standards
Schwartz R., Melliar-Smith P.  The analysis of concurrent systems (, Cambridge,651985.Type:Proceedings
Date Reviewed: Aug 1 1986

This paper characterizes and compares five techniques of formal specification of computer network protocols. As the basis of the discussion, each of the five techniques is used to specify one (and the same) so-called alternating bit protocol, a protocol providing reliable communication over an unreliable transmission line by repeated transmission. The five techniques differ with respect to what part of the requirements on the protocol is expressed as restrictions on the current state, and what part is expressed as restrictions on the history of states. At one extreme, the protocol can be specified purely by state transitions. At the other extreme, the procotol is specified purely in terms of allowable sequences of events. The remaining three techniques comprise various mixtures of state and event history descriptions in their requirement formulations. Wherever event history is described, it is expressed in the notation of temporal logic, which is briefly reviewed. Each of the five specifications is supposed to express system requirements described informally by three safety and three liveness properties, and is given as a set of diagrams or formulas accompanied by explanations and comments.

In a final comparison, it is concluded that none of the five techniques are completely satisfying; even for the simple protocol considered, it is difficult to achieve certainty that the specification correctly reflects the abstract requirements. It is stated that “the state transitions diagram form seems to be the easiest to understand.” This statement implies a recognition that the psychological issue of understandability is a significant question in judging specification techniques. However, this question is dealt with no further, which indicates the limitation of the perspective of the study. Clearly, more work on formal specification techniques, dealing also with their psychological aspects, is needed.

The presentation is admirably clear, but in its concentration requires careful study. Unfortunately, the formulas are set in such small print they are partly unreadable. As a whole, the study contrasts very favorably with the all-too-common presentations which make the unwarranted assumption that any form of formalization is a blessing.

Reviewer:  P. Naur Review #: CR110400
Bookmark and Share
 
Network Protocols (C.2.2 )
 
 
Specification Techniques (F.3.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Network Protocols": Date
An implementation of an automated protocol synthesizer (APS) and its application to the X.21 protocol
Ramamoorthy C. (ed), Dong S., Usuda Y. IEEE Transactions on Software Engineering SE-11(9): 886-908, 1985. Type: Article
Apr 1 1986
Reaching approximate agreement in the presence of faults
Dolev D., Lynch N., Pinter S., Stark E., Weihl W. Journal of the ACM 33(3): 499-516, 1986. Type: Article
Aug 1 1988
Performance analysis of multiple access protocols
Tasaka S., MIT Press, Cambridge, MA, 1986. Type: Book (9789780262200585)
Apr 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy