The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper is a brief comparison between the Interactions of UML 2.0 as defined by the Final Adopted Specification (OMG ptc/03-07-06) and MSC-2000 as defined by Z.120 (ITU 1999). The comparison investigates whether UML 2.0 has serious shortcomings relative to MSC-2000. The paper also discusses whether MSC-2000 is still needed in the future or should be retired.
When SDL is used for the implementation, different parts of the system may be implemented by different tools. Data communicated between different parts needs to be encoded and decoded in the same way by each part if the information encoded by one part is to be seen as the same value by another part. The ITU-T Recommendation Z.104 ‘Encoding of SDL Data’ that is currently being refined for approval,...
SDL has provided robust and adaptable modelling capabilities through many developments in the world of telecommunications. In recent years, however, that world has undergone deeper and more frequent paradigm shifts than hitherto. This paper briefly summarises the emergence of grid computing, pervasive computing and mobile and ad-hoc communications. It explores developments in modelling, as reflected...
Currently, communication protocols for medical devices are being developed for the IEEE 1073.2 standard. The protocol description in its draft remote control package consists of a collection of intended behaviors in terms of MSCs. We have contributed to actually constructing the protocol, ranging from determining an hMSC for these MSCs, via synthesizing process implementations, to integrating it with...
Over the course of several years working with many diverse projects using SDL for the design of commercial products, we have developed several practical guidelines related to creating SDL models for deployment. This paper discusses the SDL modeling guidelines, covering general recommendations, specific details about using SDL modeling features, performance considerations, platform interface considerations,...
This paper shares our experiences in using SDL to unit test TTCN-2 scripts written for the conformance testing of 3G UMTS protocols. The tool used in this assignment was Telelogic TauTM, which provided a way of bridging SDL and TTCN-2. Telelogic calls this feature “co-simulation”, which allows testing SDL applications using TTCN without the need for writing target adaptation, environment, and encoding...
Message Sequence Charts are widely used for the specification of functional requirements, including timing requirements. These requirements can be validated and used as input for the design stage, and subsequent phases. Deployment constraints are generally taken into account at the implementation stage only. These constraints may conflict and invalidate some of the functional/behavioral requirements...
Discovering faults in requirements specifications for distributed reactive systems is a challenging problem since many issues that need to be uncovered are a result of subtle component interactions that are implied by the requirements, but not explicitly described by them. A further difficulty is caused by the imprecise nature of industrial requirements specifications. This makes it difficult to construct...
Requirement Specification is gaining increasingly attention as a critical phase of software systems development. As requirement descriptions evolve, they quickly become error-prone and difficult to understand. Therefore, the development of techniques and tools to support requirement specification development, understanding, testing, maintenance and reuse becomes an important issue. This...
In order to ease the development and handling of complex software systems, component models and distributed object technologies have been developed that allow the decomposition of systems and the use of software components in a distributed processing environment. While modelling and development of components is well supported, the deployment and configuration of component-based distributed systems...
Today’s software development is component-oriented. We show how well-established techniques like SDL and component development can be combined. This approach will keep the strength of well-founded formal languages to improve the specification of components. Moreover, an abstract model notation (eODL) of component based applications (assemblies) is shown. A first proof of concept is done by a realisation...
This paper presents how eODL, in combination with SDL-patterns, helps to enhance the ITU-T framework for defining CORBA-based TMN systems. This proposal consists in utilizing eODL, instead of CORBA IDL, incorporating behavior using SDL-patterns. This leads to the following advantages: first, eODL models are described from several points of view, giving more information about the system modeled. Second,...
In 1997, the SDL pattern approach, consisting of a specific design process, notation for the definition of generic design fragments, rules for the definition of patterns, and a pattern pool, has been introduced. While the approach is now consolidated and has been applied in industry, a major issue still is the provision of tool support. In this paper, we present SPT, the SDL Pattern Tool, which focuses...
Today the syntax of many languages is defined by using context-free grammars. These syntax definitions suffer from a major drawback: grammars do not allow the definition of abstract, reusable concept definitions. Especially in families of related languages, where multiple languages often share the same concepts, this limitation leads to unnecessary reproduction of concept definitions and a missing...
Structuring and reuse are key approaches to the proper development and maintenance of software systems. System structuring is essential to controlling complexity, and is a prerequisite for the extraction of reuse artifacts. Reuse of solutions is crucial to controlling quality and productivity. In previous work, we have identified and applied the structuring unit micro protocol. We extend these results...
Even though ICT convergence is a well-established and a-dopted concept, there is no consensus about the underlying software engineering approach to convergent ICT systems. Telecom engineers and software engineers traditionally use different approaches when developing services and applications. A main question is whether or not the differences are justified and should be maintained in the context of...
The Abstract Syntax Notation One (ASN.1) can be used to model types of values carried by signals in SDL or MSC but is also directly used by network protocol implementors. In the last few years, the press has reported several alleged vulnerabilities of ASN.1 and the Basic Encoding Rules (BER) related to network protocols like SNMP and, more recently, OpenSSL. In reality it has been shown that the security...
We propose a partial order reduction for model checking security protocols for the secrecy property. Based on this reduction, we develop an automatic tool that can check security protocols for secrecy, given a finite execution scenario. We compare this tool to several other tools.
Covert channels are illegal information flows in systems. Recent research has shown how to detect covert channels in scenario descriptions. This paper recalls these results, and proposes a case study illustrating how scenarios can be used to detect illegal information flows from a scenario description of a protocol. Once a covert information flow is discovered, its bandwidth is computed using the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.