By Topic

A design method for communications software evolution

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Okuyama, H. ; NTT Software Labs., Musashino, Japan ; Moriyasu, K. ; Hirakawa, Y.

This paper discusses a verification method for communication services on a network in which new service functions are added to only some of the network nodes. Communication networks are becoming larger, and new functions are constantly required for communication services. In a large-scale network, however it as very difficult to update all node functions simultaneously. In this case, in a single network there will be nodes that have both new and existing functions and other nodes having only existing functions. This situation might result in illegal actions in communications between functionally updated nodes and non-updated nodes. We clarify the fundamental properties of illegal actions, present an algorithm for detecting them and show that the algorithm is practical enough from the viewpoint of the order of complexity

Published in:

Network Protocols, 1994. Proceedings., 1994 International Conference on

Date of Conference:

25-28 Oct 1994