【文件属性】:
文件名称:Principles of Protocol Design
文件大小:5.68MB
文件格式:ZIP
更新时间:2015-04-18 18:04:20
formal method protocol design
This book introduces the reader to the principles used in the construction of a large
range of modern data communication protocols. The approach we take is rather
a formal one, primarily based on descriptions of protocols in the notation of CSP.
This not only enables us to describe protocols in a concise manner, but also to reason
about many of their interesting properties and formally to prove certain aspects of
their correctness with respect to appropriate specifications. Only after considering
the main principles do we go on to consider actual protocols where these principles
are exploited.
This is a completely new edition of a book which was first published in 1994,
where the main focus of many international efforts to develop data communication
systems was on OSI – Open Systems Interconnection – the standardised architecture
for communication systems developed within the International Organisation for
Standardization, ISO. In the intervening 13 years, many of the specific protocols developed
as part of the OSI initiative have fallen into disuse. However, the terms and
concepts introduced in the OSI Reference Model are still essential for a systematic
and consistent analysis of data communication systems, and OSI terms are therefore
used throughout.
There are three significant changes in this second edition of the book which particularly
reflect recent developments in computer networks and distributed systems.
Firstly, the rise of the Internet has led to the development of large numbers of new
protocols, particularly in the Application Layer, and a new chapter has been introduced
focussing on some of the most important of these. These new protocols
typically use new styles of encoding, particularly ASCII encodings such as MIME
and XML, and rely on middleware solutions based on a variety of support protocols.
Chapters 8 and 10 have therefore been extended to deal with these topics. Finally,
there is today much more focus on security issues in networks. Chapter 6, which
deals with the general concepts of security, has been heavily revised and brought
up to date, while Chapters 8, 9, 10 and 11 now include sections discussing specific
technologies such as IPsec, SSL/TLS, and secure protocols for e-mail and webbased
applications.
The book has arisen from material used for teaching a course on Distributed Systems
at the Technical University of Denmark. The exercises at the ends of Chapters
2 to 8 also originate in this course, either as weekly assignments or, in some cases,
as examination questions. I hope you find them as interesting—and maybe even as
challenging—as my students have done.
This text was originally written for third or fourth year students in Computer
Science or Electrical Engineering, and is intended to be suitable for most final-year
undergraduate or postgraduate courses on advanced data communications or computer
networks. The reader is expected to have a software background, in particular
including a basic knowledge of functional programming and parallel programming,
combined with some knowledge of computer systems architecture and data transmission.
Knowledge of formal methods, for example based on languages such as
VDM or Z, is not essential, but to get the most out of the book you should know
about the sort of discrete mathematics which is used in computer science, and be
aware of the basic concepts of mathematical proof.
Many people deserve thanks for helping me in the task of preparing this text,
and especially for reading and commenting on the various drafts which have seen
the light of day. I would particularly like to thank my colleagues Hans-Henrik
Løvengreen of this department, Arne Skou of Aalborg University, Klaus Hansen
of the University of Copenhagen and Henrik Reif Andersen of the IT University in
Copenhagen for their comments on important parts of the text. I also owe a great
debt of thanks to my many students, who have been exposed to several provisional
versions of this book, a fate which they have borne stoically. Their help in finding
errors and pointing out the shakier parts of the presentation, where the arguments
were weakest or the explanations most difficult to follow, has been invaluable.
Finally, I would like to thank my wife Lisbeth and daughter Melissa for continuing
to be so tolerant about having an author in the house. The competition for the
PC at home has at times been intense – and they have been really sweet about letting
me win. . . .
Technical University of Denmark, Robin Sharp
October 2007.
【文件预览】:
7-Naming, Addressing and Routing.pdf
10-Application Support Protocols.pdf
9-Protocols in the OSI Lower Layers.pdf
back-matter.pdf
11-Application Protocols.pdf
front-matter.pdf
5-Multi-peer Consensus.pdf
2-CSP Descriptions and Proof Rules.pdf
4-Basic Protocol Mechanisms.pdf
8-Protocol Encoding.pdf
3-Protocols and Services.pdf
1-Introduction.pdf
6-Security.pdf
网友评论
- 找了半天找到的好东西,不错。就是英文看起来比较老火。
- 相当尿性的材料。国内好像还没有写这方面的书,这个资料非常有价值。
- 协议设计方面很好的书籍,值得下载。