Sie sind auf Seite 1von 10

146 Conference Reports

the business aspect of this problem, namely, what dangers that computers pose on our privacy. And,
are the cost benefits of such an integration, and in a fourth invited lecture of this program area, G.
how wide a market is there for such integrated Gupta talked about the impact of computers on
systems? developing countries. There were Panel Discus-
These are the questions that the panelists ad- sions on computer induced unemployment and on
dressed in this panel, focusing on the issues that computer education. There were also discussions
they thought are the most critical. on what intelligent machines may do to us and
how vulnerable society is to dangers from full
scale introduction of computers.
8. Microprocessor Applications

Microprocessors find applications everywhere 10. Computers in Everyday Life


from cars to houses to factories. There were talks
in this conference area on microprocessor design Computers are slowly and visibly influencing
and technology, notably by G.E. Moore on the many aspects of our everyday life. In their Invited
evolution of microprocessors, by C. Mead on ultra Lecture, S. Hiltz and M. Turoff talked about this
parallel designs, by T. Matsumura on future trends, effect. A. Bisseret discussed how we can live with
and by J. Nicoud by standardization issues. There computers.
were Panel Discussions held on aspects of Robotics Panel Discussions were held on personal com-
and how it will change factories. Discussions were puters and citizen participation in the informatics
also held on the VLSI chip and how they should revolution. There was also a panel on computer
be designed into systems. literacy for the average person. Finally, after wit-
nessing the art of programming, the audience was
able to see computers generate art.
9. Social and Economic Implications
The proceedings of IFIP'83 - the 9th World Com-
Are we better off with the computer and the puter Congress have been edited by K.E.A. Mason
information revolution, or not? D. Dennett dis- and published by North-Holland under the title In-
cussed how computers should fit people's needs. formation Processing 83. 1983. xvi + 964 pages.
N. Longworth discussed how to educate people for ISBN: 0-444-86729-5. price: US $98.00 (USA/
the use of computers. A. Westin presented the Canada), Dfl.260.00 (rest of the world).

Protocol Specification, Testing and


Verification
The need for standards in computer communica- the third in a series of workshops organized under
tion systems and the growing complexity of func- the auspices of IFIP Working Group 6.1 devoted to
tions covered by these standards have created a this theme. As the meeting was a workshop, the
burgeoning demand for carefully conceived tech- requirement for attendance was submission and
niques to specify, design, verify, implement and test presentation of a paper. The participants came from
computer communication protocols. The Workshop a wide variety of institutions, including universities,
at the IBM Zurich Research Laboratory in Ruschli- government laboratories and computer manufac-
kon (Switzerland) from May 31 to June 2, 1983 was turers in ten different countries. This workshop has
Conference Reports 147

made an important contribution to the exchange of selection/resolution model for concurrent


ideas between the research workers and those in- processes can be used in theory for design, specifi-
volved with the practicalities of developing com- cation, analysis and implementation of complex
munication systems, according to the Workshop concurrent systems, assuming the availability of
organizers Harry Rudin and Colin West. supporting software. Such software must faithfully
The organization of such a meeting c o n s u m e s represent the model and yet have sufficiently effi-
considerable resources. IBM Zurich Research cient storage structures. To be of practical use, the
Laboratory provided the support which made this lecturer said, it also must have a user interface
c o n f e r e n c e possible. with mechanisms for error control, naming and
Due to the interest that this workshop has system development of hierarchical structures and
created, another workshop will be held in North the ability to compare different versions of compo-
America in the spring of 1984. nents. The speaker described the ongoing effort to
design such a software system. It will be a general
coordination analyzer and specifier (thus named
Section 1. Protocol Theory and Analyses COSPAN) not limited to protocols.
Interval Logic
Modelling Elapsed Time
R.L. Schwartz, P.M. Melliar Smith and F.H.
Vogt (SRI International, Menlo Park, Ca., USA) S. Aggarwal and R.P. Kurshan (Bell Laborato-
presented a new interval-based temporal logic. The ries, N.J.) told the conference that in the analysis
logic, the lecturer said, stems from experience in of communication protocols, it is often useful to
using temporal logic for specifying protocols incorporate timing information that specifies the
standards. The use of intervals to establish a con- elapsed time associated with sequences of opera-
text for temporal assertions provides a high-level tions. The lecturer gave the example that in order
structure for protocol specification. The lecturer to determine proper setting of a timer, one needs
presented an informal introduction to the logic, information on the expected elapsed time between
and illustrated with examples of asynchronous message transmission and acknowledgement. The
queues and the Alternating Bit protocol. speaker went on to describe how timing informa-
tion may be modelled, using the formal selection/
Selection / Calculus Model resolution model for concurrent processes. The
classical alternating bit protocol was used by the
S, Aggarwal, R.P. Kurshan, and K. Sabnami speaker to illustrate the concepts.
(Bell Laboratories, N.J.) described the main fea-
tures of the selection/resolution model. This Communicating Machines by Step Wise-Refinement
classical Alternating Bit protocol, described by the
lecturer in realistic detail is then used to illustrate M.G. Gouda (University of Texas, Austin) con-
specification, analysis and "validation" tech- sidered the problem of constructing two finite-state
niques. The speaker included a description of the machines that communicate by exchanging mes-
protocol. The Alternating Bit protocol was initially sages via two, one-directional, unbounded, FIFO
described in terms of a dozen simple, concurrent, channels. The two machines, the lecturer said,
interacting processes. The lecturer showed how should be constructed such that their communica-
coordinated behavior can be computed. Methods tion is guaranteed to progress indefinitely. A
to analyze the protocol were discussed. The speaker methodology to solve this by succession of refine-
reported that by way of comparison, this specifica- ment steps was discussed. At each step more nodes
tion and analysis of the Alternating Bit protocol and edges are added to the two machines con-
can be related to others which have appeared in structued so far; this continues until the required
literature. two machines are realized. The speaker illustrated
the usefulness of this methodology by using it to
A Specification and Analysis Language
construct two communicating machines which
S. Aggarwal, R.P. Kurshan and D. Sharma (Bell model the call establishment/clear protocol in
Laboratories, N.J.) told the conference that the X.25.
148 Conference Reports

Section 2. Specification and Formal Models formalized a new modelling technique (Structured
Finite State Automata-SFSA) which permits finite
The Power of Formal Models state automata to be structured so that operations
such as direct coupling and projections may be
R. Gustavsson and B. Pehrson (Uppsala Institute easily described and accomplished. The lecturer
of Technology, Sweden) compared two formal then briefly illustrated and commented on how the
techniques for modeling of concurrent systems. techniques may be applied to describe and validate
They were "Communicating State Machines" and distributed communication systems. The speaker
"Calculus Communicating Systems" (CCS). A also gave a simple example of techniques applied
variant of the Alternating Bit protocol was used as to validate the cooperation of Session/Transport
an illustrating example. Implementation specifica- adjacent entities in a local system.
tions are designed from an informal protocol
specification. The behavior of the composed enti- Constructive and Executable Specification
ties is given in each formula and transformed
within each theory. The lecturer went on to say, L. Logrippo (University of Ottawa, Canada),
discussed some of the problems connected with the
that apart from liveness, the implementation
formal specification of protocol services and pro-
specifications are observationally equivalent to the
posed some positive solutions. The lecturer intro-
service specification. The speaker showed in the
duced concepts of "instructive" and "executable"
CCS-based example, how interval temporal logic
specifications presented a model for the construc-
can be used to achieve proofs of total correctness.
tive specification of protocol services that is based
Both techniques support incremental design which
on the combined use of finite-state transducers
is desirable in an interactive design system, accord-
and abstract data types. The speaker also pre-
ing to the speaker.
sented a technique for executable service specifica-
Abstraction by Structural Reduction tions that uses a combination of abstract data
types and finite-state-automata concepts. This
B. Pehrson (Uppsala Institute of Technology, technique, the speaker went on to say, enables the
Sweden) presented a technique to reduce the func- definition of the transport service in a manner that
tional descriptions of a set of connected compo- is precise, terse and abstract. This concept seems
nents into a less complex functional description of to hold great promise for the definition of higher
the composed system. The speaker demonstrated level protocols and services that may involve com-
this technique by verifying the data link service plex data manipulation functions. Similar tech-
provided by the Alternating Bit protocol. The pro- niques, the speaker said in conclusion, have been
tocol specification is reduced into the specification shown elsewhere to be eminently suitable for the
of a queue. The basic idea is to abstract away all purpose of formal verification.
events which do not affect the behavior of the
composed system according to an equivalent crite- A Behavioral Description Language
rion. This technique provides a powerful tool for
G. Karjoth (University of Stuttgart, Fed. Rep.
mechanizing formal synthesis and verification in a
Germany) told the conference that in the behav-
hierarchical manner, Pehrson said. It has so far
ioral description language applied is a process
been used together with abstract machine descrip-
algebra to the specification of protocols in distrib-
tions with a finite number. However, it is a general
uted systems. Individual system components are
method, the speaker told the conference, which
described by their interactions which are observa-
could be used with other specification methods.
ble in the outside world and represent multi-way
The method is implemented in the design system
synchronized communication over explicit interac-
Caddie and has been used to verify some simple
tion points. The semantics of the language are
communication protocols.
defined by temporal logic axioms, using Wolper's
Structured Finite State Automata relativization procedure. The speaker said that they
provide a mathematical framework for the analysis
S. Budkowski and E. Najm (Agence de l'Infor- of protocols and for developing logical systems for
matique, Paris-la-D6fense, France) presented and proving their properties.
Conference Reports 149

In conclusion, the speaker said that it is hoped modelling and proving correct concurrent systems
that the first link has been made between abstract in which time appears as a parameter (such as
requirement specifications given in pure temporal communication protocols). Merlin's time Petri Nets
logic and more readable "normal form" specifica- were used for modelling these systems and a re-
tions given in algebraic expressions. cently developed enumerative method was em-
ployed for analyzing their behavior. This method
was applied to the specification and verification of
Session 3. Theory and Applications of Petri Nets a data transfer protocol and a bus allocation pro-
tocol.
Tools and Studies for Formal Techniques Alternative and complementary methods for
analyzing Time Petri Nets are being investigated,
M. Anttila, H. Eriksson, J. Ikonen, R. Kujansuu, the speaker told the conference. These include
L. Ojala and H. Tuominen (Helsinki University of reduction rules for preserving some properties and
Technology, Finland) discussed some experiences structural methods making use of the structure of
of using the place/transition-net analyzer. The the net for deducing properties of its behavior.
lecturer described to the conference the work of Also being investigated is extending the field of
developing tools for a Petri Net laboratory. In the application of the method towards performance
temporal logic domain an approach of using tem- analysis, the lecturer concluded.
poral logic to describe Petri nets was shown. In the
examples that the speaker showed, the formulas The 1SO Transport Service
describing CE-systems are quite long and com-
plicated to carry out manually. One solution, in J. Billington (Telecom Australia Research
the speaker's opinion, would be to mechanize some Laboratories, Australia) presented a formal speci-
decision procedures. There are many open ques- fication of the ISO-Transport System Definition.
tions in this area. The speaker said it might be This specification applies to a single instance of a
more beneficial to use branching time structures to connection. Six phases of the connection are
model nondeterminism in CE-systems. Another specified by simple separate numerical Petri Nets
interesting topic would, the lecturer concluded which may be easily combined to obtain the total
with, be to describe high-level nets using quanti- specification. The invocation of a service primitive,
fied temporal logic. the speaker went on to say, has been associated
with the firing of a transition using a label. The
Timed Petri Nets execution of NPN then describes the allowable
sequence of Transport Service primitives and the
Timed Petri Nets are ordinary Petri Nets with relationship between these at both ends of the
additional elements for modelling time. B. Walter connection.
(University of Stuttgart, Fed. Rep. of Germany) The speaker concluded with the claim that
introduced several types of timed Petri Nets for NPNs are a powerful graphic technique for the
modelling network protocols that make extensive specification of ISO services. The merits of NPNs
use of timers as well as the time behavior of the as a formal description technique are currently
physical system. Three types of net were con- being debated within CCITT and ISO, reported
sidered in the presentation: Condition/Event Nets, Billington.
Place/Transition Nets and Predicate/Transition
Nets. It was shown how to analyze timed Petri
Nets and how to check the validity of the modeled Session 4. Validation and Verification
timers. In particular, the speaker showed how to
model message delayers and timers. VA DILOC

Time Petri Nets O. Rafiq and J.P. Ansart (Agence de l'Informa-


tique, France) presented a methodology for de-
M. Menasche and B. Berthomieu (National scription and implementation of OSI-oriented
Center for Scientific Research, France) spoke about communication protocols. One important step, the
150 Conference Reports

speaker said, is the translation of the informal tool and the structured principles of the ISO refer-
description into a description using extended finite ence model. The main feature of the method is
state automaton using predicates. This automaton that it makes possible to prove that a protocol
describing the behavior of an entity for one con- provides a service and uses an underlying service
nection is first checked for correctness (con- correctly, according to the lecturer. A complete
sistency, state reachability, etc.) before it is used system for the automated verification of protocols
for a description based on programming language has been implemented. The lecturer provided the
and for protocol validation. conference with examples that illustrate both the
After some experiences of VADILOC/BS with specification and verification method.
protocols using simple messages, an extension has
been made, introducing new functions. This exten- Experience With Automated Verification Tech-
sion, called VADILOC/ES (extended system), is niques
more suitable for high level protocols for manipu-
lation variables. Both systems, the speaker con-
cluded with, are written in PASCAL and run on C.A. Sunshine (University of Southern Cali-
the CII-HB Multics system at I N R I A fornia, Marina del Rey) reported to the conference
(Rocquencourt, France). that at his institute four automated verification
systems were applied to a common set of com-
Link Initialization Procedure munication protocols to assess their capabilities.
The systems and their key features were Affirm,
A.E. Baratz and A. Segall (IBM Thomas J. Gypsy, Concurrent State Delta and Formal Devel-
Watson Research Center, New York) told the con- opment Methodology. Each system, the lecturer
ference that it is known that HDLC and other bit told the conference, showed different strengths in
DLC (Data Link Control) procedures ensure data specifying protocols and verifying their correct
transmission reliability on noisy links provided behavior. The presenter's experience showed that
that all transmission errors are detected and the important features of real protocols can be han-
link processes are synchronized at initialization. dled by current automated systems, but a great
The most commonly used DLC procedures are the deal of effort and ingenuity is required and further
bit-oriented DLC procedures such as HDLC, development efforts are needed before real proto-
SDLC, ADCCP or Alternating Bit. In this pre- cols can be fully and routinely verified.
sentation, the speaker showed that the HDLC
initialization procedure does not ensure synchroni- Verification via Executable Logic Specifications
zation and thus allows inadvertent loss of data.
The speaker proposed a new link initialization D.P. Sidhu (SDC, Pennsylvania, USA) dis-
procedure and proved that it does ensure synchro- cussed the uses of logic programming techniques
nization. in the specification and verification of communi-
cation protocols. The protocol specifications dis-
Automated Protocol Verification cussed are formal and directly executable. The
advantages of executable specifications, Sidhu as-
H. Eckert and R. Prinoth (Gesellschaft fi~r serted, are (1) the specification is itself a prototype
Mathematik und Datenverarbeitung, Fed. Rep. of of the specified system, (2) incremental develop-
Germany) first presented a short introduction of a ment of specifications is possible, and (3) behavior
specification tool for communication protocols, in exhibited by the specification when executed can
particular for those protocols having a potentially be used to check conformity of specification with
unbounded set of reachable states. The mathe- requirements. The speaker discussed Horn clause
matical foundation of the specification method is logic, which has a procedural interpretation, and
such that it is possible to compare different speci- the predicate logic programming language, PRO-
fications of the same protocol by means of homo- LOG, to specify and verify the functional correct-
morphisms. ness of protocols. PROLOG possesses a powerful
The speaker also presented a verification pattern-matching feature which is based on unifi-
method. This combines the developed specification cation, Sidhu concluded.
Conference Reports 151

Session 5. Protocol Performance Transport Service-Transport Protocol couples. The


combination of Service and Protocol is em-
Industrial Ethernet Local Networks phasized because the design of a protocol is closely
related to the service it must provide. A three-level
G. Florin (CERCI, France), S. Natkin, A. Woog model which provides insight on the design speci-
and J. Attal (CNAM, France) told the conference fication and a method to specify well designed
that local networks have to be built using low cost couples were presented. The speaker told the con-
interfaces. Integrated circuits for CSMA-CD pro- ference that an important result of this is the
tocol are not available and would be very useful specification of the conditions under which proto-
for such applications. The major problem which cols (either with a two way or with a three way
arises with CSMA-CD is the non-deterministic handshake scheme) have to be used. The lecturer
bound of the response time. Whether CSMA-CD also presented a Petri Net model of a couple which
techniques are adequate for control process appli- uses a three way handshake scheme. The speaker
cations can be validated only by probabilistic tech- went on to say, that this model enables to view the
niques. The speaker presented general methods to relations between the service and the protocol and
validate CSMA-CD industrial networks response to verify the logic of their interactions.
time characteristics. These methods were applied
to a highly constrained application (the control of Transport Layer Protocol for Special Purpose LA N
an energy power plant). The main topics in this
lecture were: (a) Characteristics of control process C. Boccalini (I&O, Genova, Italy), W. Ansaldi,
applications, (b) The probabilistic assumptions to M. Olobardi and A.M. Traverso (Ansaldo S.p.A.,
be validated and the statistical tests to check such Genova, Italy) spoke about the system named
assumptions, (c) Simulation of the transient behav- MODIAC which is a local area network whose
ior of Ethernet. stations can be configured as mono- or multi-pro-
Lastly, the lecturer presented the main cessor nodes based on the Z-8000 microprocessor.
numerical results. They allow the definition of The environment in which the automation system
conditions to be fulfilled for accepting CSMA-CD works, the lecturer said, is usually characterized by
control process networks. strong, electromagnetic noise affecting message
correctness. The speaker went on to say that the
Automated Performance Prediction message transmission delay is often critical for the
controlled plant safety. This led to the design of a
H. Rudin (IBM Zurich Research Laboratory, communication subsystem where transmission in-
Switzerland) described some first steps in using a terfaces are connected to a serial bus with a token
formal definition as the basis for the automated passing policy. The four lower protocol layers
prediction of protocol performance. Rudin con- reside on the interface boards and the higher ones
sidered a simple example, and presented a tech- on the CPU boards. The lecturer described the
nique for predicting protocol performance directly choices made for the transport layer design and
and automatically from the kind of formal ma- the considerations which led to the decision mak-
chine-readable definition now often being used for ing.
concise protocol specification. As time goes on
techniques for predicting protocol performance di- Implementation of Assembl) Language
rect from a protocol's formal specification will be
increasingly in demand, according to Rudin. F.M. Restorick (Plessey Office Systems, Not-
tingham, UK) described a method used to imple-
ment a transport layer protocol in the 8086 assem-
Session 6. Protocol Design and Implementation bly language. The protocol implementation works
under a multi-tasking executive. This method con-
Design of a Couple Service-Protocol sists of a funnel stepper, a state table and a
collection of action modules. This approach, as
G. Juanole and B. Algayres (Laboratoire d'Au- well as reducing the processing time necessary to
tomatique, France) elaborated on the design of interpret the protocol, allows easy implementation
152 Conference Reports

of a trace facility to be included in the system at cally by an NIL compiler, which limits the extent
debug time, and allows coding and programming to which unvalidated programs can corrupt vali-
of the action modules to be pooled between many dated ones through dangerous side effects.
programmers at the design stage. The lecturer also discussed experience in using
Restorick described in detail the method used NIL as both a design and an implementation
to realize the state tables in 8086 and the function language for SNA.
funnel stepper. He also explained to the con-
ference the methods used to test the systems. The LC / 1 Language

J.M. Ayache and J.P. Courtiat (Laboratoire


Session 7. Integrated Systems d'Automatique, France) described the basic fea-
tures of the communication language LC/1. It
Development of Services with CIL supports a global approach including the protocol
specification, validation and implementation. It is
H. Krumm and O. Drobnik (Institut fiar Infor- essentially based on the use of the ISO reference
matik III, Karlsruhe, F.R. Germany) presented an model and Petri Nets. The lecturer told the con-
introduction to the language CIL (Communication ference that the overriding concern during its de-
Service Implementation Language) and also pre- sign was to validate in the most complete way the
sented the theory and its application to specifica- specifications by means of existing tools, like
tion and verification purposes. The CIL approach OGIVE/OVIDE and to minimize any designer's
for the development of communication services is intervention between specification and implemen-
based on the CIL language and a CIL-compatible tation stages. The language compiler is being de-
theory of the program execution. The program- veloped, while the simulator kernel has already
ming language provides for structuring concepts to been tested, and (the speaker concluded with) an
support the design and the implementation of implementation of the RHIN transport protocol is
services. The theory contains a logical language to also being developed along the same line.
express specifications and axioms of program
semantics, an event oriented-model of program CUPID
execution, and a first-order predicate calculus to
perform verification by means of deduction in the Y. Yemini and N. Nounou (Columbia Univer-
calculus. sity, New York) described research conducted to-
wards Columbia's United Protocol Information
Secure Communications Systems and Design (CUPID) environment. CUPID re-
search aims at the integration and automation of
R.E. Strom and S. Yemini (IBM T.J. Watson protocol design and implementation tools. CUPID
Research Center, New York) discussed those fea- uses algebraic representation of protocols based in
tures in the NIL language which make valuable part, upon a variant of Milner's calculus of com-
during the design, implementation, validation and municating systems (CCS). Communication behav-
testing phases of communication systems. These iors are represented in terms of expressions of a
features were: (a) a process model in which shared universal algebra. A key notion to the automation
and global data does not exist, thereby supporting of protocol development functions is that of a
concurrency and modularity in a single construct; valuation over the algebra of communication be-
(b) queued communication which results in a high haviors. A valuation maps communication behav-
degree of uncoupling between modules and per- iors to expressions in other algebras (e.g., an alge-
mits truly modular verification of NIL systems; (c) bra of delay distribution used for performance
run-time operations for loading processes and analysis). This allows, explained the lecturer, one
binding communications channels; (d) full specifi- to proceed and compute attributes of communica-
cation of inter-module interfaces and complete tion behaviors over the respective algebras using a
compile-time checking of the consistency between formal valuation process.
code and interfaces; (e) typestate checking, a sub- A brief introduction to CCS in the context of
set of program verification performed automati- modelling protocol behaviors was provided by the
Conference Reports 153

speaker. This was followed by a summary of how The lecturer went on to explain that the formal
the algebraic valuation mechanism may be used to description in PDIL should (a) be able to describe
support the different functions of the protocol the protocol clearly and completely without en-
design environment. forcing over-specification, (b) serve for verifying
the correctness of the protocol, and (c) be able to
PA ND ORA derive an implementation in as much possible
automated way.
G.J. Holzmann and R.A. Beukers (Delft Univer-
sity of Technology, The Netherlands) told the
conference that the protocol design and analysis
Session 7. Protocol Testing
system named "PANDORA", a joint developing
project with the Netherlands PTT and the Delft
Layer-Independent Architecture
University of Technology, provides its users with a
controlled environment for protocol synthesis and
S. Palazzo, P. Fogliata and G. LeMoli (CREI,
formal analysis. PANDORA also offers both
Milano, Italy) introduced to the conference an
software and hardware tools for protocol assess-
architecture for a system performing the testing of
ment. PANDORA can assist the user in documen-
a generic OSI layer. It was shown that the system
tation of protocol designs by autonomously ex-
proposed can be used to test the protocol imple-
tracting SDL-diagrams, and has a set of tools for
mentations in terms of both protocol testing and
the generation of executable protocol implementa-
service testing, either in debugging or in certifica-
tions from abstract specifications.
tion phase. The structure of the system, the speaker
told the conference, is designed in such a way as to
Automated Protocol Development System
point out what is independent from the layer in
P.T. Blumer and D.P. Sidhu (SDC, Penn- which the protocol being tested lies. Finally the
sylvania, USA) gave an overview to the conference functional specification of the modules composing
of a formal specification technique and implemen- the system was described.
tation method for computer communication proto-
cols. The technique that the lecturer described was Testing and Diagnosis Aids"
developed at Bolt Beranek and Newman. A collec-
tion of useful software tools was also discussed. A. Giebler (Institut fi~r Datenfernverarbeitung,
The speaker focussed on a tool called the finite Fed. Rep. of Germany) gave an overview of a
state machine (FSM) analyzer, which can be used special protocol tester which has been developed
with this technique to verify certain protocol prop- by the GMD (Gesellschaft fgr Mathematik und
erties. The speaker described the application of the Datenverarbeitung) within the TESDI project
analyzer to an authentication protocol and gave (TESting and Diagnosis aid for higher protocols).
some interesting results. The lecturer discussed the following subjects: (a)
the concept of the protocol tester; (b) the applied
From Formal Description to A utomated Implemen- testing method; (c) the different testing functions;
tation (d) the used implementation concepts; and (e) an
example of a telex (transport layer) test.
J.P. Ansart, V. Chari and D. Simon (Agence de
l'Informatique, France) gave a brief overview of User Guided Test Sequence Generation
the basic concepts of the PDIL language (Protocol
Description and Implementation Language) H. Ural and R.L. Probert (University of Ottawa,
through an example of a description. The basic Canada) presented a computer-assisted approach
ideas underlying the PDIL translator were out- for generating test sequences from specifications
lined by the speaker. This translator is now availa- of communications protocols and services. The
ble, the conference was told, on a Multics system. approach is based on using attributed context free
The lecturer also explained how to pass from a grammars and is directly applicable in a logic
PDIL formal description to implementation by programming environment. The speaker said that
dealing with all the choices. the approach involves constructing test sequence
154 Conference Reports

specifications in attributed context free grammars, which have been developed to exploit the advances
implementing these specifications in logic pro- in specification and the impact these tools have
gramming as generators, and executing the genera- had on the testing and implementation of SNA
tors in a controlled fashion to generate test se- products. At the present time, the speaker told the
quences. conference, a Format And Protocol Language
The lecturer illustrated the approach on trans- (FAPL) is used for SNA specification. This lan-
port service and protocol specifications. Benefits guage is used not only in IBM's external publica-
include improvements in test design, specification, tions which describe the architecture, but also in
documentation and management. the production of a machine-readable, executable
description of SNA. After consideration of a theo-
Requirements for a Test Specification Language retical approach to product protocol testing in-
volving this executable definition, the speaker went
R.L. Probert and H: Ural (University of Ottawa, on to describe some of the techniques which have
Canada) examined the application of the notion of been applied in the real world of IBM products.
a test specification language to various issues in The lecturer concluded with a look to the future
the testing of protocol implementations. Sources both within IBM and in non-SNA-related projects.
of language design constraints, such as limitations
imposed by the test session architecture, were dis- The Routing Certification System
cussed. Also the speaker discussed the effects of
relationships among language features, degree of G.A. Harvey (Digital Equipment Corporation,
distribution of test control, the design of proper- Massachusetts, USA) described the design and
ties of test support tools and test initialization and construction of Routing Certification System of
reporting requirements. The speaker concluded (RCS) for testing conformance of a node to selected
with a progress report on a prototype test specifi- aspects of the Routing Layer protocol, as specified
cation language for specification-based testing of by the Digital Network Architecture (DNA) of
protocol implementations. Digital Equipment Corporation.

Qualitative Protocols Validation Protocol Product Testing

J.F. Billiard (CAP Sogeti Logiciel, France) pre- G.W. Cowin, R.W.S. Hale and D. Rayner (Na-
sented four basic rules which he has found useful tional Physical Laboratory, UK) introduced the
in obtaining significant validation results. Due to concept of an Assessment Center for Testing Open
the vast number of tests that can be performed, Systems Interconnection (OSI) protocol products.
the speaker proposed a tentative classification Physical architectures for assessment were com-
according to the function. Tests can be divided pared by the lecturer, and the general logical ar-
into two classes: qualitative tests and load accep- chitecture was discussed. The speaker also com-
tance tests. Qualitative tests are designed to con- pared different approaches for the test design of
trol the "communication machine" - node, net- 'Test Responder' and 'Encoder/Decoder' mod-
work, host or gateway - observes its protocol and ules, drawing on practical experience. A compari-
that its supplied facilities such as routing, billing, son was given of the two test definition methods in
statistics, etc. are correct. The speaker told the use of NPL. The speaker concluded that some
conference that load acceptance tests are designed useful lessons have been learned from the earlier
to control the possibilities of the machine in terms experience of using this philosophy and architec-
of data packets per second or maximum number ture. The lecturer felt that much more experience
of simultaneous communications. can be gained from NCC using the testing tools in
the pilot UK Assessment Center.
Testing of Protocols in SNA Products
Objective Understanding of Conformance
R.M.S. Cork (IBM, England) focused his talk
on the evolving specification of IBM's System D. Rayner (National Physical Laboratory, UK)
Network Architecture (SNA), some of the tools told the conference that currently all conformance
Conference Reports 155

testing of protocol implementations is subjective. Testing Tools for OSI Protocol Implementation
Each organization involved, the speaker went on
to say, is likely to have its own interpretation of R.J. Linn and J.S. Nightingale (Institute for
what constitutes conformance to a particular Computer Sciences and Technology, Washington
standard. The problem arises from poorly defined D.C.) described specific tools within the test ar-
standards. The definition of the protocol itself is chitecture which has been developed and refined
often confused with additional procurement re- using a prototype implementation of the ISCT
quirements for implementation of the protocol. Class 4 Transport Protocol. The language used for
The elimination of this and other sources of am- executing the tests, the speaker said, is based on
biguity was discussed by the speaker. A checklist representations of the service primitives of the
was provided at the conference which, the speaker layer under test. All possible combinations of
believed, could assist progress towards an objec- service primitives can potentially be specified using
tive understanding of conformance and therefore this language. Errors are introduced into the pro-
define objective conformance tests. tocol under test in a controlled manner by means
of an Exception Generator which resides between
Testing Implementations of OSI Protocols layers three and four at the Test Center. The
language which drives this tool provides the mech-
R.L. Linn and W.H. McCoy (Institute for Com- anism to edit protocol data units, concluded the
puter Sciences and Technology, Washington D.C.) lecturer.
explored problems associated with protocol test
design, semantics and completeness. A linguistics The proceedings of this conference have been
approach utilizing a generative grammar aug- edited by H. Rudin and C.H. West and published by
mented with probability distributions associated North-Holland under the title Protocol Specification,
with the production rules and random selection Testing, and Verification, II1. xiii + 531 pages. ISBN:
was used to produce test sequences for the 0-444-86769-4. Price: US$65.00 (USA/Canada),
NBS/ICST implementation of ISO Class 4 Trans- Df1.170.00 (rest of the world).
port protocol. The lecturer also presented ad-
vantages and limitations of the methodology.

Das könnte Ihnen auch gefallen