Quantitative verification of the bounded retransmission protocol

Xu Guo, Ming Xu, Zongyuan Yang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In order to verify the reliability of the bounded retransmission protocol, probabilistic model checking technology is used in this paper. The integer semantics approach is introduced, which allows working directly at the level of the original probabilistic timed automaton (PTA). In such a method, clocks are viewed as counters storing nonnegative integer values, which increase as time passes. The PTA modeling the system can then be seen as a discrete-time Markov chain. Based on this fact, the protocol is modeled directly with DTMC. Properties are described in probabilistic computation tree logic. By making an analysis of the quantitative properties of the protocol, a threshold is obtained. Experimental result shows that no matter how many chunks to be transmitted, if the maximum retransmitted time is greater than or equal to 3, the protocol can be considered reliable. Method in this paper can not only verify the correctness of a system but also make analysis of nonfunctional indices of a system such as reliability or performance.

Original languageEnglish
Title of host publicationComputer Engineering and Networking - Proceedings of the 2013 International Conference on Computer Engineering and Network, CENet 2013
PublisherSpringer Verlag
Pages1245-1252
Number of pages8
ISBN (Print)9783319017655
DOIs
StatePublished - 2014
Event3rd International Conference on Computer Engineering and Network, CENet 2013 - Shanghai, China
Duration: 20 Jul 201321 Jul 2013

Publication series

NameLecture Notes in Electrical Engineering
Volume277 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference3rd International Conference on Computer Engineering and Network, CENet 2013
Country/TerritoryChina
CityShanghai
Period20/07/1321/07/13

Fingerprint

Dive into the research topics of 'Quantitative verification of the bounded retransmission protocol'. Together they form a unique fingerprint.

Cite this