Professional Documents
Culture Documents
CyNEL)
boundedness. Completeness means that the protocol accepts ing protocol entities are shown below:
all possible inputs in each system state. The analyzer checks
completeness by checking that each event present in some
channel of a system state is received by some transition out of p T - A + B
that system state. Deadlock freeness means that the protocol
never gets into a system state where no more transitions or
receptions are possible, and the system stays in that state CHANNEL STATE
indefinitely. The analyzer checks for deadlocks by checking
thatallnonfinal system states have at least one possible This state matrix defines a state of the protocol system
transition out of that system state. Termination means that the completely at any given time. The diagonal entries of each
protocol always reaches the final state when started from the matrix give the states of the protocol entities. The off-diagonal
initial state. If the analyzer completes its analysis and halts, entries give event numbers for messagesthat are in transit
without finding any deadlock states, then termination is from one machine to another. If no message is in transit, then
assured. Boundedness means that the total number of message the matrix entry is an “E.”
events in a channel is always less than some fixed number. Using the reduced automata, the FSM analyzer followed
Again, if the analyzer completes its analysis of the protocol, 406 paths through two communicating LLC entities. A
then boundedness is assured. When the analysis of a protocol diagram of the 45 system states visited during the analysis is
shown in Fig. 2. Each path was found to possess the protocol
Paper approved by the Editor for Networks of the IEEE Communications
properties mentioned in the abstract.
Society. Manuscript received May 2, 1985; revised January 27, 1987. For each protocol path encountered during the analysis, the
T.P. Blumer is with Phoenix Technologies Ltd., Cambridge, MA. analyzer generated a sequence of the events visible at the
D. P. Sidhu is with the Department of Computer Science, Iowa State interface between the protocol user and the corresponding
University, Ames, IA 50010. protocol entity. These user event sequences represent the
IEEE Log Number 8717485. possible protocol interactions as seen by the protocol users,
Bcr Bci
I / \
Acc' ACC Bdr
I \
5 2 U: disconnect-request I N : disc-und
@ U: reset-request1 N =he-und
smaller than the number of protocol paths, as many of the
transitions do not have associated user events, and different
8 -
1 3 N: dm
rsp I U: connect-confirm
1 7 N: sabme-cmd I N : ua-rsp
ON: ua-rsp
1 U: reset-confirm
@ N: sabme-cmd I N: ua-np U: reset-indication
@ N: sabme-und I N: dm-rsp
@ N: disc-cmd IN: ua-rsp U: disconnect-indication
transitions may have the same associated user events. In this
analysis, 110 unique user event sequences were identified,
are shown in Fig. 3. Each path from the top node (Acr*) to a
and
ON: disc-cmd I N: dm-rsp U: reset-confirm
terminal node of the tree represents a setof symmetric paths.
Fig. 1. A simplifiedautomata for LLC.
Each node marked with an (*) is a symmetry point. For any
sequence in the figure, a symmetric sequence may be obtained
Channel
Events
PE ADM]
by reversing the machine labels on a marked node and all of
the nodes below 'it.
Thereareseveralinteresting points that may be noticed
1 = SABME-CMD
2 = DISC-CUD
43 / B from thisdiagram.Several of the paths includeareset
3 = DM-RSP indication to the protocol user, even though the reset request
4 = UA-RSP event was disabled in this analysis. The path (Acr Bcr Acc
Adr Adc Bcc) seems strange because there is not a similar
path with the Ari event before theAdr. Finally, it can be seen
from the diagram that theusercannotissueadisconnect
request at any time during the connection, but only at certain
points.
111. ANALYSIS 2: CONNECTION MANAGEMENT WITH TIMERS
This analysis uses the same automata as the first analysis,
with the addition that several of the transitions triggeredby the
expiration of acknowledgmenttimersareenabled.These
transitions may be traversedat most once,torestrictthe
complexity of the analysis. Enabling these transitions added
the states RESET and ERROR to the analysis as well as 25
additional transitions involvedwith the timers, error recovery,
and resetting the connection.
Even though the timer expiration transitions could only be
traversed once, enabling these transitions increased the com-
plexity of the analysis tremendously. The numberof protocol
paths counted was over two billion,and the number of system
The notation iistands for system state n states visited was 4727. Due to thecomplexity of this analysis,
and its subtree. with the machine labels 0 CONN
A and B interchanged. [:-O
' NN AD4 [E- D-CON:] theusereventsequencescould not be generated with the
2 / 4 / a current FSM analyzer. All paths were found to possess the
protocol properties discussed earlier.
0-CON:] AD;] [;-O
' NN
1 I 1
~~
I I I
no reset request) connection management aspects of the IEEE 802.2 logicallink control
prot@,” #87-10, Iowa State Univ. Tech. Rep.,July 1987. (Available
Analysis 2
BasicLLC > I billion unknown 4727
froG*the apthors upon request.)
plus some timers
(no reset request)
Analysis 3
Basic LLC
plus reset request
I 7551 I 3916 I 69
(no timers)