Principles of Protocol DesignPrentice Hall, 1994 - 271 lappuses This text describes the principles used in a broad selection of modern data communication protocols, including transfer protocols, multi-peer protocols and protocols for ensuring data security. It uses CSP notation to give a description of the protocols considered. |
No grāmatas satura
1.–3. rezultāts no 65.
48. lappuse
... Connection Establishment and Release Many services require the users to establish a connection by setting up a logical or physical channel before ' real ' exchange of data can take place . The channel is established by the exchange of ...
... Connection Establishment and Release Many services require the users to establish a connection by setting up a logical or physical channel before ' real ' exchange of data can take place . The channel is established by the exchange of ...
49. lappuse
... connection establishment to the final exchange during the release phase1 . In the case of connectionless - mode ... Connection and Connectionless modes . • Point - to - point and Multi - peer modes . • Simplex and Duplex modes ...
... connection establishment to the final exchange during the release phase1 . In the case of connectionless - mode ... Connection and Connectionless modes . • Point - to - point and Multi - peer modes . • Simplex and Duplex modes ...
87. lappuse
... connection establishment phase of the ISO Class 4 Transport Protocol [ 110 ] , a protocol specifically designed for use over relatively unreliable underlying services . In this case , the references are arbitrary values used for ...
... connection establishment phase of the ISO Class 4 Transport Protocol [ 110 ] , a protocol specifically designed for use over relatively unreliable underlying services . In this case , the references are arbitrary values used for ...
Saturs
CSP Descriptions and Proof Rules | 8 |
Protocols and Services | 38 |
Basic Protocol Mechanisms | 59 |
Autortiesības | |
10 citas sadaļas nav parādītas.
Citi izdevumi - Skatīt visu
Bieži izmantoti vārdi un frāzes
acknowledgment ACSE algorithm APDUs Application layer arbitrary atomic action attributes attributeType authentication binary representation bits buffer C. A. R. Hoare cessing Systems channel checksum commitment communication Computer concurrency control Connection-mode connectionless-mode Data Link Data Link layer data-PDU deadlock decryption denotes described destination Disconnection phase distributed system domain encoding encrypted error facilities FTAM function global HDLC identical to ITU-T identifiers illustrated in Figure Information Processing Systems initial integers International Standards Organisation Internet ITU-T Recommendation known local area networks multiplexing nodes notation octets offers Open Systems Interconnection operations Optional OSI Reference Model parties point-to-point protocol entity public key receiver retransmission routing secret key sender sent sequence number service users simple SKAB SKAR specification structure sub-networks synchronisation points timeout tokens TPDU traffic transaction transmission tree Two-way exchange protocol Two-way simultaneous underlying service
Atsauces uz šo grāmatu
Software Engineering 2: Specification of Systems and Languages Dines Bjørner Ierobežota priekšskatīšana - 2007 |
Software Engineering 2: Specification of Systems and Languages Dines Bjørner Ierobežota priekšskatīšana - 2007 |