Principles of Protocol DesignSpringer, 2008. gada 13. febr. - 402 lappuses This book introduces the reader to the principles used in the construction of a large range of modern data communication protocols. The approach we take is rather a formal one, primarily based on descriptions of protocols in the notation of CSP. This not only enables us to describe protocols in a concise manner, but also to reason about many of their interesting properties and formally to prove certain aspects of their correctness with respect to appropriate speci?cations. Only after considering the main principles do we go on to consider actual protocols where these principles are exploited. This is a completely new edition of a book which was ?rst published in 1994, where the main focus of many international efforts to develop data communication systems was on OSI – Open Systems Interconnection – the standardised archit- ture for communication systems developed within the International Organisation for Standardization, ISO. In the intervening 13 years, many of the speci?c protocols - veloped as part of the OSI initiative have fallen into disuse. However, the terms and concepts introduced in the OSI Reference Model are still essential for a systematic and consistent analysis of data communication systems, and OSI terms are therefore used throughout. There are three signi?cant changes in this second edition of the book which p- ticularly re?ect recent developments in computer networks and distributed systems. |
No grāmatas satura
1.–5. rezultāts no 60.
vi. lappuse
... errors and pointing out the shakier parts of the presentation, where the arguments were weakest or the explanations most difficult to follow, has been invaluable. Finally, I would like to thank my wife Lisbeth and daughter Melissa for ...
... errors and pointing out the shakier parts of the presentation, where the arguments were weakest or the explanations most difficult to follow, has been invaluable. Finally, I would like to thank my wife Lisbeth and daughter Melissa for ...
vii. lappuse
... Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 3.2.5 Service Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 3.2.6 Connection Establishment and Release ...
... Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 3.2.5 Service Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 3.2.6 Connection Establishment and Release ...
viii. lappuse
... Error Control . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 4.1.1 Corruption Control ... Errors . . . . . . . . . . . . . . . . . . . . 97 4.4 Change of Service Mode ...
... Error Control . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 4.1.1 Corruption Control ... Errors . . . . . . . . . . . . . . . . . . . . 97 4.4 Change of Service Mode ...
4. lappuse
... errors. In Chapter 6 we turn our attention to another form of malicious attack to which distributed systems are exposed – attempts by unauthorised persons to read or alter information to which they are not supposed to have access. This ...
... errors. In Chapter 6 we turn our attention to another form of malicious attack to which distributed systems are exposed – attempts by unauthorised persons to read or alter information to which they are not supposed to have access. This ...
55. lappuse
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Saturs
1 | |
Protocols and Services | 45 |
Basic Protocol Mechanisms | 71 |
6 | 114 |
Multipeer Consensus | 121 |
Naming Addressing and Routing | 191 |
Protocol Encoding | 241 |
Protocols in the OSI Lower Layers | 275 |
Application Support Protocols | 291 |
Application Protocols | 321 |
A Notation | 367 |
References | 377 |
Index | 389 |
Citi izdevumi - Skatīt visu
Bieži izmantoti vārdi un frāzes
accept acknowledgment activity actual algorithm application associated assumed attributes authentication basic bits block changes channel Chapter character client clock communication complete connection consider contains corresponding defined definition denoted described distributed document domain element encoding encryption entity error example exchange f f f facilities fact fields Figure final follows function give given header identifier illustrated indicates initial International Standard Internet known layer means mechanism method mode Note object offers operation Organisation original particular parties passed phase possible problem protocol receiver Reference request response result round routing rule secret sender sent sequence server shown simple specification structure synchronisation tokens transaction transfer transmission
Populāri fragmenti
191. lappuse - No, you don't understand," the Knight said, looking a little vexed. "That's what the name is called. The name really is 'The Aged Aged Man.' " "Then I ought to have said 'That's what the song is called?' " Alice corrected herself. "No, you oughtn't: that's quite another thing! The song is called, 'Ways and Means:' but that's only what it's called, you know!" "Well, what is the song, then?" said Alice, who was by this time completely bewildered. "I was coming to that,
191. lappuse - Oh, that's the name of the song, is it?' Alice said, trying to feel interested. "No, you don't understand,' the Knight said, looking a little vexed."That's what the name is CALLED. The name really IS "THE AGED AGED MAN. ' " "Then I ought to have said "That's what the SONG is called"?
191. lappuse - Oh, that's the name of the song, is it?" Alice said, trying to feel interested. "No, you don't understand," the Knight said, looking a little vexed. "That's what the name is called. The name really is 'The Aged Aged Man'." "Then I ought to have said 'That's what the song is called'?" Alice corrected herself. "No, you oughtn't: that's quite another thing! The song is called ' Ways and Means': but that's only what it's called, you know!
121. lappuse - It is like the precious ointment upon the head, that ran down unto the beard, even unto Aaron's beard, and went down to the skirts of his clothing. 3 Like as the dew of Hermon, which fell upon the hill of Sion. 4 For there the Lord promised his blessing, and life for evermore.
155. lappuse - ... astray, Or the Admiralty lose some plans and drawings by the way, There may be a scrap of paper in the hall or on the stair— But it's useless to investigate— Macavity's not there! And when the loss has been disclosed, the Secret Service say: "It must have been Macavity!"— but he's a mile away.
275. lappuse - ... outside the scope of this book. The interested reader is referred to RaifTa, 1968, and Raiffa and Schlaiffer, 1961.) Here we will briefly mention the 'inverse' problem of decision under risk.
155. lappuse - Macavity's not there! And when the Foreign Office find a Treaty's gone astray, Or the Admiralty lose some plans and drawings by the way, There may be a scrap of paper in the hall or on the stair— But it's useless to investigate— Macavity's not there! And when the loss has been disclosed, the Secret Service say: "It must have been Macavity!
71. lappuse - A little clock-work steamer paddling plied And shook the lilies: perched about the knolls A dozen angry models jetted steam: A petty railway ran: a fire-balloon Rose gem-like up before the dusky groves And dropt a fairy parachute and past: And there through twenty posts of telegraph They flashed a saucy message to and fro...
Atsauces uz šo grāmatu
Software Engineering 2: Specification of Systems and Languages Dines Bjørner Ierobežota priekšskatīšana - 2007 |
Software Engineering 2: Specification of Systems and Languages Dines Bjørner Ierobežota priekšskatīšana - 2007 |