• Articles • Previous Articles     Next Articles

A Formal Approach to Protocol Interoperability Testing

Hao Ruibing; Wu Jianping;   

  1. Department of Computer Science; Tsinghua University; Beijing 100084; P.R. China E-mail: hrb@csnetl.cs.tsinghua.edu.cn; jianping@cernet.edu.cn;
  • Online:1998-01-10 Published:1998-01-10

Protocol Interoperability testing is an important means to ensure the interconnection and interoperation between protocol products. In this paper, we proposed a formal approach to protocol interoperability testing based on the operational semantics of Concurrent TTCN. We define Concurrent TTCN's operational semantics by using Labeled transition System, and describe the interoperability test execution and test verdict based on Concurrent TTCN. This approach is very helpful for the formation of formal intero…

Key words: sensor network; sensor node; communication protocol; middleware; network simulation; network monitor;



[1] Hogrefe D. Status report on FMCT project. In International Workshop of Protocol Test System, IFIP, 1994, pp.165-180.

[2] Tretmans, Gerrit Jan. A Formal Approach to Conformance Testing. Ph.D. Thesis, University of Twente, Neither Land, 1992.

[3] Huang C M, Lin Y C, Jang M Y. An executable protocol test sequence generation method for EFSM-specified protocols. In International Workshop of Protocol Test System, 1995. ……….
[1] Sven Pullwitt, Robert Hartung, Ulf Kulau, Lars Wolf. Towards Accurate Bit Error Simulation in Wireless Sensor Networks Including Environmental Influences [J]. Journal of Computer Science and Technology, 2020, 35(4): 809-824.
[2] Xing-Gang Fan, Zhi-Cong Che, Feng-Dan Hu, Tao Liu, Jin-Shan Xu, Xiao-Long Zhou. Deploy Efficiency Driven k-Barrier Construction Scheme Based on Target Circle in Directional Sensor Network [J]. Journal of Computer Science and Technology, 2020, 35(3): 647-664.
[3] Yu-Qi Li, Li-Quan Xiao, Jing-Hua Feng, Bin Xu, Jian Zhang. AquaSee: Predict Load and Cooling System Faults of Supercomputers Using Chilled Water Data [J]. Journal of Computer Science and Technology, 2020, 35(1): 221-230.
[4] Jinoh Kim, Alex Sim. A New Approach to Multivariate Network Traffic Analysis [J]. Journal of Computer Science and Technology, 2019, 34(2): 388-402.
[5] Shou-Wan Gao, Peng-Peng Chen, Xu Yang, Qiang Niu. Multi-Sensor Estimation for Unreliable Wireless Networks with Contention-Based Protocols [J]. Journal of Computer Science and Technology, 2018, 33(5): 1072-1085.
[6] Yawar Abbas Bangash, Ling-Fang Zeng, Dan Feng. MimiBS:Mimicking Base-Station to Provide Location Privacy Protection in Wireless Sensor Networks [J]. , 2017, 32(5): 991-1007.
[7] Hai-Ming Chen, Li Cui, Gang Zhou. A Light-Weight Opportunistic Forwarding Protocol with Optimized Preamble Length for Low-Duty-Cycle Wireless Sensor Networks [J]. , 2017, 32(1): 168-180.
[8] Sheng-Li Pan, Zhi-Yong Zhang, Ying-Jie Zhou, Feng Qian, Guang-Min Hu. Identify Congested Links Based on Enlarged State Space [J]. , 2016, 31(2): 350-358.
[9] Seyed Mehdi Tabatabaei, Vesal Hakami, Mehdi Dehghan. Cognitive Power Management in Wireless Sensor Networks [J]. , 2015, 30(6): 1306-1317.
[10] Rui Li, Ke-Bin Liu, Xiangyang Li, Yuan He, Wei Xi, Zhi Wang, Ji-Zhong Zhao, Meng Wan. Assessing Diagnosis Approaches for Wireless Sensor Networks: Concepts and Analysis [J]. , 2014, 29(5): 887-900.
[11] Xiao-Long Zheng and Meng Wan. A Survey on Data Dissemination in Wireless Sensor Networks [J]. , 2014, 29(3): 470-486.
[12] Hai-Long Shi, Dong Li, Jie-Fan Qiu, Chen-Da Hou, Li Cui. A Task Execution Framework for Cloud-Assisted Sensor Networks [J]. , 2014, 29(2): 216-226.
[13] Zheng Gong, Pieter Hartel, Svetla Nikova, Shao-Hua Tang, and Bo Zhu. TuLP:A Family of Lightweight Message Authentication Codes for Body Sensor Networks [J]. , 2014, 29(1): 53-68.
[14] Jin-Tao Meng, Jian-Rui Yuan, Sheng-Zhong Feng, and Yan-Jie Wei. An Energy Efficient Clustering Scheme for Data Aggregation in Wireless Sensor Networks [J]. , 2013, 28(3): 564-573.
[15] Mo Chen, (陈默), Student Member, CCF, ACM Ge Yu, (于戈), Senior Member, CCF, Member, ACM, IEEE, Yu Gu (谷峪), Member, CCF, ACM. An Efficient Method for Cleaning Dirty-Events over Uncertain Data in WSNs [J]. , 2011, 26(6): 942-953.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Chen Shihua;. On the Structure of Finite Automata of Which M Is an(Weak)Inverse with Delay τ[J]. , 1986, 1(2): 54 -59 .
[2] Liu Mingye; Hong Enyu;. Some Covering Problems and Their Solutions in Automatic Logic Synthesis Systems[J]. , 1986, 1(2): 83 -92 .
[3] Chen Shihua;. On the Structure of (Weak) Inverses of an (Weakly) Invertible Finite Automaton[J]. , 1986, 1(3): 92 -100 .
[4] Gao Qingshi; Zhang Xiang; Yang Shufan; Chen Shuqing;. Vector Computer 757[J]. , 1986, 1(3): 1 -14 .
[5] Chen Zhaoxiong; Gao Qingshi;. A Substitution Based Model for the Implementation of PROLOG——The Design and Implementation of LPROLOG[J]. , 1986, 1(4): 17 -26 .
[6] Huang Heyan;. A Parallel Implementation Model of HPARLOG[J]. , 1986, 1(4): 27 -38 .
[7] Min Yinghua; Han Zhide;. A Built-in Test Pattern Generator[J]. , 1986, 1(4): 62 -74 .
[8] Tang Tonggao; Zhao Zhaokeng;. Stack Method in Program Semantics[J]. , 1987, 2(1): 51 -63 .
[9] Min Yinghua;. Easy Test Generation PLAs[J]. , 1987, 2(1): 72 -80 .
[10] Zhu Hong;. Some Mathematical Properties of the Functional Programming Language FP[J]. , 1987, 2(3): 202 -216 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved