期刊文献+

CSMA/CD协议的形式化描述与验证 被引量:1

Formal description and validation of CSMA/CD
在线阅读 下载PDF
导出
摘要 模型检测是协议验证的技术之一。在CSMA/CD协议的验证过程中对该协议进行了简化,忽略了通道时延、退避算法等细节,运用Promela语言进行建模实现。最后,使用模型检测工具SPIN对协议实现的正确性、状态可达性以及可能存在的不可推进循环进行了分析和检验,并从结果的有效性和正确性方面得出了相应验证输出图。 Model checking is one of the technologies of protocol validation. In the process of validation, a CSMA/CD ( Carrier sense Multiple Access with Collision Detection) protocol was simplified by ignoring channel delay, backoff and so on. And then it was realized and simulated with Premela language. And further more, making use of model checking tool SPIN, this paper gives the analyses and validation results of the correctness, states and cycles of the protocol, and the corresponding verification output charts of the correct and effective results were obtained.
机构地区 [
出处 《计算机应用》 CSCD 北大核心 2013年第A02期235-237,268,共4页 journal of Computer Applications
关键词 PROMELA SPIN 协议验证 载波监听多路访问 冲突检测机制 形式化 Promela SPIN (Simple Promela INtepreter) protocol validation Carrier sense Multiple Access with Collision Detection (CSMA/CD) formalization
  • 相关文献

参考文献11

  • 1Netlib library [ DB/OL]. [2013 -03 -01]. http://netlib. bell-labs. com/netlib/spin.
  • 2KALIAPPAN P S, KOENIG H, KALIAPPAN V K. Designing andverifying communication protocols using model driven architectureand spin model checker[ C]// Proceedings of the 2008 InternationalConference on Computer Science and Software Engineering. Wash-ington, DC: IEEE Computer Society, 2008, 2: 227 -230.
  • 3HUTH M , RYAN M . Logic in computer science modelling and reasoning about systems [ M ]. Cambridge: Cambridge University Press, 2004.
  • 4BEN-ARI M. Principles of the Spin model checker[ M]. London: Springer-Verlag, 2008.
  • 5BALER C, KATOEN J. Principles of model checking[ M]. London: The MIT Press, 2008.
  • 6KUROSE J F, ROSS K W. Computer networking: a top-down approach featuring the Interact [ M]. 4th ed. Upper Saddle River: Addison- Wesley, 2008.
  • 7HOLZMANN J G. Spin model checker: Primer and reference manual [ M]. Upper Saddle River: Addison-Wesley Professional, 2003.
  • 8BERARD B, BIDOIT M, FINKEL A. System and softwm~ verification: Model checking techniques and tools[ M]. Berlin: Springer-Verlag, 2001.
  • 9龙士工,王巧丽,李祥.密码协议的Promela语言建模及分析[J].计算机应用,2005,25(7):1548-1550. 被引量:11
  • 10古天龙,蔡国永.网络协议的形式化分析与设汁[M].北京:电子工业出版社,2003.

二级参考文献5

  • 1HOLZMANN GJ. Design and Validation of Computer Protocols[M].Englewood Cliffs, New JerSey: Prentice-Hall, 1991.
  • 2PNUELI A. The Temporal Logic of Programs[A]. Proceedings of 18th IEEE Symposium on Foundations of Computer Science[C],1977.46 -57.
  • 3LOWE G. An attack on the Needham-Schroeder public-key authentication protocol[J]. Information Processing Letters, 1995, 56:131- 133, 1995.
  • 4LOWE G. Breaking and fixing the Needham-Schroeder public key protocol using FDR[A]. Tools and Algorithms for the Construction and Analysis of Systems ( TACAS'96), Lecture Notes in Computer Science 1055[C]. Springer-Verlag, 1996.147 - 166.
  • 5MERZ S. Model Checking: A Tutorial Overview[ EB/OL]. http://spinroot. com/spin/Doc/course/mc-tutorial.pdf, 2003 - 10.

共引文献10

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部