Muutke küpsiste eelistusi

E-raamat: Principles of Protocol Design

  • Formaat: PDF+DRM
  • Ilmumisaeg: 13-Feb-2008
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540775416
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 172,28 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 13-Feb-2008
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540775416
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book introduces the reader to the principles used in the construction of a large range of modern data communication protocols. The approach we take is rather a formal one, primarily based on descriptions of protocols in the notation of CSP. This not only enables us to describe protocols in a concise manner, but also to reason about many of their interesting properties and formally to prove certain aspects of their correctness with respect to appropriate speci cations. Only after considering the main principles do we go on to consider actual protocols where these principles are exploited. This is a completely new edition of a book which was ?rst published in 1994, where the main focus of many international efforts to develop data communication systems was on OSI Open Systems Interconnection the standardised archit- ture for communication systems developed within the International Organisation for Standardization, ISO. In the intervening 13 years, many of the speci c protocols - veloped as part of the OSI initiative have fallen into disuse. However, the terms and concepts introduced in the OSI Reference Model are still essential for a systematic and consistent analysis of data communication systems, and OSI terms are therefore used throughout. There are three signi cant changes in this second edition of the book which p- ticularly re ect recent developments in computer networks and distributed systems.

Arvustused

From the reviews:









"This book takes an unusual path to describe computer network protocols. Robin Sharp starts from formal description techniques. More precisely, he chooses the Communicating Sequential Processes (CSP) notation proposed by Hoare. could be of interest to readers who are more interested in the application of formal description techniques to network protocols." (IEEE Network, September/October, 2008)



"The book particularly reflects the recent developments in computer networks and distributed systems with special reference to applications. A number of new protocols are introduced with a focus on their current application, what is good stuff for students and researchers in the area. The book could be used for undergraduate third and fourth year courses in computer science and the network area. I am sure that this book will be a valuable asset in the educational and scientific community at large." (Aniket Mahanti, Zentralblatt MATH, Vol. 1142, 2008)

Introduction 1(1)
What is a Protocol?
1(2)
Protocol as Processes
3(1)
Techniques for Actual Protocols
4(1)
Real Protocols
4(1)
Reader's Guide
5(2)
CSP Descriptions and Proof Rules
7(38)
Processes and Process Synchronisation
8(18)
Processes Expressions
9(4)
Processes Algebra
13(7)
Processes Expressions for Process Networks
20(6)
Channel History Semantics
26(9)
Transitions and Traces
26(3)
Inference Rules for Specifications Based on Traces
29(6)
Failure Semantics
35(10)
Protocols and Sevices
45(26)
Providing a Service
48(7)
Providing the protocol Correct
50(4)
Stucturing your Proof
54(1)
Service Features
55(9)
Sequence Preservation
56(1)
Data Unit Synchronisation
56(1)
Flow Control
56(1)
Freedom from Error
57(1)
Service Reset
58(1)
Connection Establisment and Release
58(2)
Change of Mode
60(2)
Information about Peer Change of State
62(1)
Expedited Data
63(1)
Security
63(1)
OSI and Other Layered Architectures
64(7)
The Internet and Other Layered Architectures
66(5)
Basic Protocol Mechanisms
71(50)
Seaquence Control and Error Control
73(14)
Corruption Control
73(3)
Simple ACK/NACK protocols
76(1)
Simple Polling Protocols
77(1)
ACK/NACK Protocols with Timeout
78(2)
The Alternating Bit Protocol
80(2)
The Case of the Floating Corpses
82(5)
Flow Control
87(7)
Fixed Window Protocols
88(1)
Protocols with Receive Window Size 1
89(3)
Protocols with Receive Window Size Greater than 1
92(1)
Dynamic Window Systems and the Concept of Credit
93(1)
Indication of Change of Peer State
94(6)
Two-way Exchanges
94(2)
Atomic Two-way Exchanges
96(1)
Exchanges in the Presence of Errors
97(3)
Change of Service Mode
100(2)
Connection-mode and Connectionless-mode
100(1)
point-to-point and Multi-peer
101(1)
Simplex and Duplex
101(1)
Multiplexing and Splitting
102(10)
Multiplexing
102(8)
Splitting
110(2)
Segmentation and Reassembly
112(4)
Prioritisation
116(5)
Multi-peer Consensus
121(34)
Reliable Broadcasts
122(4)
Election
126(3)
Commitment
129(6)
Byzantine Agreement
135(6)
Using Unsigned Messages
136(2)
Using Signed Messages
138(2)
Other forms of Byzantine agreement
140(1)
Clock Sybchronisation
141(7)
Logical Clocks
142(2)
Real time clocks
144(2)
Byzantine Clock Synchronisation
146(2)
Finding the Global State
148(7)
Security
155(36)
Cryptographic Methods
155(9)
Encipherment
156(1)
Secret Key Cryptosystems
157(3)
Public Key Cryptosystems
160(4)
Integrity
164(3)
Digital Signatures
167(3)
Entity Authentication
170(14)
Authentication with Secret Key Cryptosystems
171(2)
Authentication with Public Key Cryptosystems
173(2)
Proofs of Authentication Protocols
175(6)
Certification Authorities
181(3)
Key Exchange
184(2)
Non-Cryptographic Methods
186(5)
Naming, Addressing and Routing
191(50)
General Principles of Naming and Addressing
191(16)
Naming Strategies in the Upper Layers of the System
194(3)
Directories and Servers
197(2)
Distributed Directories
199(4)
Internet Naming and the Internet DNS
203(4)
Addressing Structures
207(8)
OSI Addressing
209(1)
Internet Addressing
210(4)
MOTIS/MHS Addressing
214(1)
Routing
215(14)
Flooding
216(1)
Static Routing
217(1)
Tree Routing
218(1)
Centralised Adaptive Routing
219(2)
Isolated Adaptive Routing
221(2)
Distributed Adaptive Routing
223(3)
Exploratory Routing
226(3)
Congestion
229(12)
Discarding
231(1)
Limiting the Number of PDUs
232(1)
Timeout-based control
232(3)
Explicit feedback
235(1)
Deadlock
236(5)
Protocol Encoding
241(34)
Simple Binary Encoding
242(2)
TLV Encoding
244(2)
ASN.1 Encoding
246(5)
ASN.1 Types
246(2)
ASN.1 Values
248(1)
ASN.1 Encoding Rules
248(3)
ASCII Encodings
251(24)
MIME Encoding
252(3)
S/MIME Encoding
255(2)
XML Encoding
257(6)
XML Types
263(6)
XML Security
269(6)
Protocols in the OSI Lower Layers
275(16)
Data Link Layer
276(4)
Connection-mode
276(2)
Connectionless-mode
278(2)
Network Layer
280(4)
Connection-mode
280(1)
Connectionless-mode
281(1)
Network Layer Security
282(2)
Transport Layer
284(7)
Connection-mode
284(4)
Connectionless-mode
288(3)
Application Support Protocols
291(30)
Session Layer
291(4)
Presentation Layer
295(2)
Application Layer
297(1)
Basic Application Service Elements
298(3)
Association Control
298(1)
Remote Operations
299(2)
Commitment, Concurrency and Recovery
301(2)
Client-server Systems
303(13)
Remote Procedure Call
304(3)
Binding
307(1)
Asynchornous RPC
307(2)
Object Services and Middleware
309(2)
Soap
311(5)
Security Middleware
316(5)
Application Protocols
321(46)
File Transfer
322(7)
ISO File Transfer and Management
322(4)
Internet FTP
326(2)
Network File System
328(1)
Distributed Transaction Processing
329(3)
Message Handling
332(8)
The MOTIS Message Transfer Sub-layer
333(2)
The MOTIS Interpersonal Messaging Service
335(2)
Internet Mail Protocols
337(3)
Hypertext and the World Wide Web
340(16)
Uniform Resource Identifiers
340(2)
Hypertext Transfer Protocols
342(4)
Web Caching
346(4)
HTTP Authentication
350(2)
Stateful HTTP and Cookies
352(2)
Secure HTTP
354(2)
Web Services
356(11)
Web Service Description Language
358(3)
Publication and Discovery of Web services
361(2)
Web Service Architectures
363(4)
Notation
367(4)
Data Types and Variables
367(1)
Data Values and Expressions
367(1)
Processes and Process Expression
368(1)
Traces, Failures and Transitions
369(1)
Inference Rules for Process Specifications
369(1)
Security
369(2)
Standardisation of Protocols
371(6)
Standards Organisations
371(1)
Standards Documents
372(5)
ISO standards
372(1)
ITU-T Recommendations
373(1)
Internet Standards
374(3)
References 377(12)
Index 389