Introduction |
|
1 | (1) |
|
|
1 | (2) |
|
|
3 | (1) |
|
Techniques for Actual Protocols |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (2) |
|
CSP Descriptions and Proof Rules |
|
|
7 | (38) |
|
Processes and Process Synchronisation |
|
|
8 | (18) |
|
|
9 | (4) |
|
|
13 | (7) |
|
Processes Expressions for Process Networks |
|
|
20 | (6) |
|
Channel History Semantics |
|
|
26 | (9) |
|
|
26 | (3) |
|
Inference Rules for Specifications Based on Traces |
|
|
29 | (6) |
|
|
35 | (10) |
|
|
45 | (26) |
|
|
48 | (7) |
|
Providing the protocol Correct |
|
|
50 | (4) |
|
|
54 | (1) |
|
|
55 | (9) |
|
|
56 | (1) |
|
Data Unit Synchronisation |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
Connection Establisment and Release |
|
|
58 | (2) |
|
|
60 | (2) |
|
Information about Peer Change of State |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
OSI and Other Layered Architectures |
|
|
64 | (7) |
|
The Internet and Other Layered Architectures |
|
|
66 | (5) |
|
Basic Protocol Mechanisms |
|
|
71 | (50) |
|
Seaquence Control and Error Control |
|
|
73 | (14) |
|
|
73 | (3) |
|
Simple ACK/NACK protocols |
|
|
76 | (1) |
|
|
77 | (1) |
|
ACK/NACK Protocols with Timeout |
|
|
78 | (2) |
|
The Alternating Bit Protocol |
|
|
80 | (2) |
|
The Case of the Floating Corpses |
|
|
82 | (5) |
|
|
87 | (7) |
|
|
88 | (1) |
|
Protocols with Receive Window Size 1 |
|
|
89 | (3) |
|
Protocols with Receive Window Size Greater than 1 |
|
|
92 | (1) |
|
Dynamic Window Systems and the Concept of Credit |
|
|
93 | (1) |
|
Indication of Change of Peer State |
|
|
94 | (6) |
|
|
94 | (2) |
|
|
96 | (1) |
|
Exchanges in the Presence of Errors |
|
|
97 | (3) |
|
|
100 | (2) |
|
Connection-mode and Connectionless-mode |
|
|
100 | (1) |
|
point-to-point and Multi-peer |
|
|
101 | (1) |
|
|
101 | (1) |
|
Multiplexing and Splitting |
|
|
102 | (10) |
|
|
102 | (8) |
|
|
110 | (2) |
|
Segmentation and Reassembly |
|
|
112 | (4) |
|
|
116 | (5) |
|
|
121 | (34) |
|
|
122 | (4) |
|
|
126 | (3) |
|
|
129 | (6) |
|
|
135 | (6) |
|
|
136 | (2) |
|
|
138 | (2) |
|
Other forms of Byzantine agreement |
|
|
140 | (1) |
|
|
141 | (7) |
|
|
142 | (2) |
|
|
144 | (2) |
|
Byzantine Clock Synchronisation |
|
|
146 | (2) |
|
|
148 | (7) |
|
|
155 | (36) |
|
|
155 | (9) |
|
|
156 | (1) |
|
|
157 | (3) |
|
|
160 | (4) |
|
|
164 | (3) |
|
|
167 | (3) |
|
|
170 | (14) |
|
Authentication with Secret Key Cryptosystems |
|
|
171 | (2) |
|
Authentication with Public Key Cryptosystems |
|
|
173 | (2) |
|
Proofs of Authentication Protocols |
|
|
175 | (6) |
|
Certification Authorities |
|
|
181 | (3) |
|
|
184 | (2) |
|
Non-Cryptographic Methods |
|
|
186 | (5) |
|
Naming, Addressing and Routing |
|
|
191 | (50) |
|
General Principles of Naming and Addressing |
|
|
191 | (16) |
|
Naming Strategies in the Upper Layers of the System |
|
|
194 | (3) |
|
|
197 | (2) |
|
|
199 | (4) |
|
Internet Naming and the Internet DNS |
|
|
203 | (4) |
|
|
207 | (8) |
|
|
209 | (1) |
|
|
210 | (4) |
|
|
214 | (1) |
|
|
215 | (14) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
Centralised Adaptive Routing |
|
|
219 | (2) |
|
Isolated Adaptive Routing |
|
|
221 | (2) |
|
Distributed Adaptive Routing |
|
|
223 | (3) |
|
|
226 | (3) |
|
|
229 | (12) |
|
|
231 | (1) |
|
Limiting the Number of PDUs |
|
|
232 | (1) |
|
|
232 | (3) |
|
|
235 | (1) |
|
|
236 | (5) |
|
|
241 | (34) |
|
|
242 | (2) |
|
|
244 | (2) |
|
|
246 | (5) |
|
|
246 | (2) |
|
|
248 | (1) |
|
|
248 | (3) |
|
|
251 | (24) |
|
|
252 | (3) |
|
|
255 | (2) |
|
|
257 | (6) |
|
|
263 | (6) |
|
|
269 | (6) |
|
Protocols in the OSI Lower Layers |
|
|
275 | (16) |
|
|
276 | (4) |
|
|
276 | (2) |
|
|
278 | (2) |
|
|
280 | (4) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
282 | (2) |
|
|
284 | (7) |
|
|
284 | (4) |
|
|
288 | (3) |
|
Application Support Protocols |
|
|
291 | (30) |
|
|
291 | (4) |
|
|
295 | (2) |
|
|
297 | (1) |
|
Basic Application Service Elements |
|
|
298 | (3) |
|
|
298 | (1) |
|
|
299 | (2) |
|
Commitment, Concurrency and Recovery |
|
|
301 | (2) |
|
|
303 | (13) |
|
|
304 | (3) |
|
|
307 | (1) |
|
|
307 | (2) |
|
Object Services and Middleware |
|
|
309 | (2) |
|
|
311 | (5) |
|
|
316 | (5) |
|
|
321 | (46) |
|
|
322 | (7) |
|
ISO File Transfer and Management |
|
|
322 | (4) |
|
|
326 | (2) |
|
|
328 | (1) |
|
Distributed Transaction Processing |
|
|
329 | (3) |
|
|
332 | (8) |
|
The MOTIS Message Transfer Sub-layer |
|
|
333 | (2) |
|
The MOTIS Interpersonal Messaging Service |
|
|
335 | (2) |
|
|
337 | (3) |
|
Hypertext and the World Wide Web |
|
|
340 | (16) |
|
Uniform Resource Identifiers |
|
|
340 | (2) |
|
Hypertext Transfer Protocols |
|
|
342 | (4) |
|
|
346 | (4) |
|
|
350 | (2) |
|
Stateful HTTP and Cookies |
|
|
352 | (2) |
|
|
354 | (2) |
|
|
356 | (11) |
|
Web Service Description Language |
|
|
358 | (3) |
|
Publication and Discovery of Web services |
|
|
361 | (2) |
|
Web Service Architectures |
|
|
363 | (4) |
|
|
367 | (4) |
|
|
367 | (1) |
|
Data Values and Expressions |
|
|
367 | (1) |
|
Processes and Process Expression |
|
|
368 | (1) |
|
Traces, Failures and Transitions |
|
|
369 | (1) |
|
Inference Rules for Process Specifications |
|
|
369 | (1) |
|
|
369 | (2) |
|
Standardisation of Protocols |
|
|
371 | (6) |
|
|
371 | (1) |
|
|
372 | (5) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
374 | (3) |
References |
|
377 | (12) |
Index |
|
389 | |