The Austin Protocol Compiler
Seiten
2010
|
Softcover reprint of hardcover 1st ed. 2005
Springer-Verlag New York Inc.
978-1-4419-3588-5 (ISBN)
Springer-Verlag New York Inc.
978-1-4419-3588-5 (ISBN)
There are two groups of researchers who are interested in designing network protocols and who cannot (yet) effectively communicate with one another c- cerning these protocols. The first is the group of protocol verifiers, and the second is the group of protocol implementors. The main reason for the lack of effective communication between these two groups is that these groups use languages with quite different semantics to specify network protocols. On one hand, the protocol verifiers use specification languages whose semantics are abstract, coarse-grained, and with large atom- ity. Clearly, protocol specifications that are developed based on such semantics are easier to prove correct. On the other hand, the protocol implementors use specification languages whose semantics are concrete, fine-grained, and with small atomicity. Protocol specifications that are developed based on such - mantics are easier to implement using system programming languages such as C, C++, and Java. To help in closing this communication gap between the group of protocol verifiers and the group of protocol implementors, we present in this monograph a protocol specification language called the Timed Abstract Protocol (or TAP, for short) notation. This notation is greatly influenced by the Abstract Protocol Notation in the textbook Elements of Network Protocol Design, written by the second author, Mohamed G. Gouda. The TAP notation has two types of sem- tics: an abstract semantics that appeals to the protocol verifiers and a concrete semantics thatappeals to the protocol implementors group.
Network Protocols.- The Timed Abstract Protocol Notation.- Execution Models of Network Protocols.- Equivalence of Execution Models.- Preserving Fairness.- The Austin Protocol Compiler.- Two Examples.- A DNS Server.- Concluding Remarks.
Erscheint lt. Verlag | 29.11.2010 |
---|---|
Reihe/Serie | Advances in Information Security ; 13 |
Zusatzinfo | XIII, 141 p. |
Verlagsort | New York, NY |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Mathematik / Informatik ► Informatik ► Datenbanken |
Mathematik / Informatik ► Informatik ► Netzwerke | |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 1-4419-3588-6 / 1441935886 |
ISBN-13 | 978-1-4419-3588-5 / 9781441935885 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Interlingua zur Gewährleistung semantischer Interoperabilität in der …
Buch | Softcover (2023)
Springer Fachmedien (Verlag)
32,99 €
Eine Einführung mit Java
Buch | Hardcover (2020)
dpunkt (Verlag)
44,90 €
Praktische Übungen für die Vorlesungen und Praktika
Buch (2022)
Hanser, Carl (Verlag)
49,99 €