Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2015 Second International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T) 2015
DOI: 10.1109/infocommst.2015.7357295
|View full text |Cite
|
Sign up to set email alerts
|

Method for OpenFlow protocol verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…Tkachova and Saad have suggested a formal approach for checking correctness, and it corresponds to the requirement of the control flow in the SDN that manages sending data process so that the result of networking approximately is in accordance with the tasks defined. The main advantage of this approach is their expressive power, but the disadvantage is its inability to verify all boundary service states.…”
Section: Formal Verification Methods In the Sdnmentioning
confidence: 99%
“…Tkachova and Saad have suggested a formal approach for checking correctness, and it corresponds to the requirement of the control flow in the SDN that manages sending data process so that the result of networking approximately is in accordance with the tasks defined. The main advantage of this approach is their expressive power, but the disadvantage is its inability to verify all boundary service states.…”
Section: Formal Verification Methods In the Sdnmentioning
confidence: 99%
“…The existing of management transition MX, MY with management elements x ,x ,...x are the attributes [4,7]. Assume that counter that can be set at any transition is one of this attribute.…”
Section: A Methods Of Reachability Tree Constructionmentioning
confidence: 99%
“…Methods based on reachability tree buildings for existing OpenFlow protocol model [5], matrix methods [2] and methods of reduction [3] are widely used as means for models analysis [7]. However, usage of this method for the analysis of E-net models properties faces with number of difficulties.…”
Section: Introductionmentioning
confidence: 99%