A fast method of protocol validation using reduced stable state exploration technique

Abstract Since 1978, when exhaustive reachability analysis technique was proposed the problem of state space explosion came out. Thereafter, in the past decade, many proposals were introduced to solve this problem. Nevertheless, all of them were based on the concept of asynchronous exploration . In this paper we will propose another improved technique — Reduced Stable State Pair (SSP) Exploration , that is based on the concept of synchronous exploration . It uses the responsibility transfer rules to reduce redundant explorations and comparison times which are caused by asynchronous exploration . Thus, we can reach the objective of saving memory storage space and execution time. In this technique, we can separate the whole exploration algorithm into two parts. The first one is synchronous exploration that plays the role of main architecture of the whole algorithm and attempts to explore all stable state pairs . If it meets a collision stable state pair when proceeding with exploration, it will call the second procedure — asynchoronous fair progree exploraton to explore those unstable states . Owing to the independence of both storage and reference of data between each asynchronous fair progress exploration, there will be no problem of state space explosion caused by accumulating of recorded data.

[1]  M.C. Yuang,et al.  Parallel protocol verification using the two-phase algorithm , 1989, [1989] Proceedings of the Thirteenth Annual International Computer Software & Applications Conference.

[2]  A. Udaya Shankar,et al.  Protocol Verification via Projections , 1984, IEEE Transactions on Software Engineering.

[3]  C. Edward Chow,et al.  PROSPEC: An Interactive Programming Environment for Designing and Verifying Communication Protocols , 1988, IEEE Trans. Software Eng..

[4]  Daniel Brand,et al.  Towards Analyzing and Synthesizing Protocols , 1980, IEEE Trans. Commun..

[5]  Ming T. Liu,et al.  Protocol verification using reachability analysis: the state space explosion problem and relief strategies , 1987, Computer Communication Review.

[6]  Mohamed G. Gouda,et al.  Protocol Validation by Fair Progress State Exploration , 1985, Comput. Networks.

[7]  H. Rudin,et al.  An informal overview of formal protocol specification , 1985, IEEE Communications Magazine.

[8]  C. H. West,et al.  Protocol Validation in Complex Systems , 1989, SIGCOMM.

[9]  Krishan K. Sabnani,et al.  An algorithmic procedure for checking safety properties of protocols , 1989, IEEE Trans. Commun..

[10]  Colin H. West,et al.  An Improved Protocol Validation Technique , 1982, Comput. Networks.