Journal articles on the topic 'Computer network protocols – Specifications'

To see the other types of publications on this topic, follow the link: Computer network protocols – Specifications.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer network protocols – Specifications.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ayyagari, A., and A. Ray. "A Fiber-Optic Network Protocol for Computer Integrated Manufacturing." Journal of Engineering for Industry 114, no. 3 (August 1, 1992): 345–51. http://dx.doi.org/10.1115/1.2899802.

Full text
Abstract:
This paper presents the architecture and performance analysis of a fiber-optic-based network protocol for computer integrated manufacturing (CIM). Its adaptation as the common medium access control (MAC) layer protocol in the fiber-optic-based version of the Manufacturing Automation Protocol (MAP) and Technical and Office Protocols (TOP) will make their specifications identical up to the presentation layer; only the application layer which is user specific could be different.
APA, Harvard, Vancouver, ISO, and other styles
2

EL-GENDY, HAZEM, and NABIL EL-KADHI. "FORMAL METHOD FOR AUTOMATED TRANSFORMATION OF LOTOS SPECIFICATIONS TO ESTELLE SPECIFICATIONS." International Journal of Software Engineering and Knowledge Engineering 15, no. 05 (October 2005): 873–91. http://dx.doi.org/10.1142/s0218194005002567.

Full text
Abstract:
ISO and IEC have jointly developed two Formal Description Techniques (FDTs) for specifying distributed real time systems such as computer/telecommunications protocols. These are Lotos and Estelle. In this paper, a formal method for automated transformation of a Lotos specification to an Estelle specification is presented. The method is applicable to various Lotos specification styles and to various communications protocols of ISO OSI layers. Our method has applications in conformance testing of such systems and building common semantic model for the various FDTs. In this paper, we develop an algorithm for constructing a 'Data Oriented'-Restricted Behavior Tree T that represent both the control flow aspects and the data flow aspects of the system. Then, we develop an algorithm for constructing the Estelle specifications from T. A minimization rule is also developed to optimize the size of the Estelle specification by reducing both the number of states and the number of transitions.
APA, Harvard, Vancouver, ISO, and other styles
3

Sija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.

Full text
Abstract:
A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches’ outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers’ OSI (Open Systems Interconnection) model.
APA, Harvard, Vancouver, ISO, and other styles
4

CHEN, BO, and SAMIRA SADAOUI. "A GENERIC FORMAL FRAMEWORK FOR CONSTRUCTING AGENT INTERACTION PROTOCOLS." International Journal of Software Engineering and Knowledge Engineering 15, no. 01 (February 2005): 61–85. http://dx.doi.org/10.1142/s0218194005001884.

Full text
Abstract:
Agent interaction protocols (AIP) design is one of the principal issues for building multi-agent systems. Indeed, the construction of AIP should integrate theories, methodologies and tools. We propose in this paper a unifying framework that provides a generic agent architecture to be reused as well as a methodology to construct and refine AIP specifications in an incremental way. This framework is based on the highly expressive formal language Lotos and its related technologies, such as finite state machines and temporal logics. Hence, the proposed framework also facilitates formal validation and verification of AIP specifications using rigorous tools. We argue that there are three layers of semantics of Lotos specifications that can improve Lotos expressivity in describing agent interaction. Therefore, this framework can describe almost all aspects of agent interaction and at different abstraction levels. In addition, we demonstrate how to generate an online auction protocol from the generic framework, and how to validate and verify this protocol.
APA, Harvard, Vancouver, ISO, and other styles
5

Tightiz, Lilia, and Hyosik Yang. "A Comprehensive Review on IoT Protocols’ Features in Smart Grid Communication." Energies 13, no. 11 (June 1, 2020): 2762. http://dx.doi.org/10.3390/en13112762.

Full text
Abstract:
Since the smart grid deals with a large mass of data and critical missions, it requires ubiquitous, reliable, and real-time communication. The Internet of Things (IoT) technology, which has the potential of connecting all objects over the globe through the Internet, excels in providing robust information transmission infrastructure in the smart grid. There are a multitude of possible protocols, standards, and configurations for communication in the smart grid. A commonly applied communication standard IEC 61850 recommends the use of Manufacturing Message Specification (MMS) protocol for communication in Local Area Network (LAN) and eXtensible Messaging and Presence Protocol (XMPP) in Wide Area Network (WAN). However, a plethora of research on this topic compares the behavior of other IoT protocols and standard recommendations in the smart grid. On the other hand, the sky-rocketing penetration of Renewable Energy Sources (RES), especially in the form of micro grid, transformed the central control structure of the smart grid into a distributed style called Multi-Agent Systems (MAS). This new approach defined new communication requirements and more particular IoT protocol characteristic requirements. However, a limited number of the existing studies have considered IoT protocol characteristic requirements of the smart grid and its new control structures. In this paper, we initially investigate the communication requirements of the smart grid and introduce all IoT protocols and their specifications. We analyze IoT protocol characteristics and performances in the smart grid through literature review based on the smart grid communication requirements. In this approach, we highlight weak points of these practices making them fail to acquire the holistic guidelines in utilizing proper IoT protocol that can meet the smart grid environment interaction requirements. Using the existing facilities, the public Internet, we follow the arrangement of cost-effective high penetration communication requirements for new structures of the smart grid, i.e., the MAS and multi-micro grid. In this case, we consider IoT protocol Quality of Services (QoS) requirements, especially in the case of security and reliability, to satisfy stakeholders, namely utilities and prosumers. Addressing effective elements in applying IoT in the smart grid’s future trends is another contribution to this paper.
APA, Harvard, Vancouver, ISO, and other styles
6

Ayyagari, A., and A. Ray. "A Fiber-Optic-Based Protocol for Manufacturing System Networks: Part I—Conceptual Development and Architecture." Journal of Dynamic Systems, Measurement, and Control 114, no. 1 (March 1, 1992): 113–20. http://dx.doi.org/10.1115/1.2896492.

Full text
Abstract:
The goal of Computer Integrated Manufacturing (CIM) is to put together the diverse areas of engineering, design and production processes, material inventory, sales and purchasing, and accounting and administration into a single interactive closed loop control system [1]. Essential to this distributed total manufacturing system is the integrated communications network over which the information leading to process interactions, and plant management and control will flow. Such a network must be capable of handling heterogeneous real-time (e.g., data packets for inter-machine communications at the factory floor) and non-real-time (e.g., Computer Aided Design (CAD) drawings, design specifications, and administrative information) traffic. This sequence of papers in two parts presents the development and analysis of a novel fiber-optic-based medium access control (MAC) protocol for integrated factory and office communications. Its adaptation as the common MAC layer protocol in the fiber-optic-based version of Manufacturing Automation Protocol (MAP) [2] and Technical and Office Protocols (TOP) [3], will make their specifications identical up to the presentation layer; only the application layer which is user-specific could be different. This first part provides the necessary background for the reported work and details of the protocol which is represented by a finite-state-machine model. Part II [4] presents the performance analysis of the protocol using a statistical model, and a comparison of the simulation and analytical results.
APA, Harvard, Vancouver, ISO, and other styles
7

Jmaiel, Mohamed, and Peter Pepper. "Development of communication protocols using algebraic and temporal specifications." Computer Networks 42, no. 6 (August 2003): 737–64. http://dx.doi.org/10.1016/s1389-1286(03)00215-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mayouf, Mabroka Ali, and Zarina Shukur. "Animation of Natural Language Specifications of Authentication Protocols." Journal of Computer Science 4, no. 7 (July 1, 2008): 503–8. http://dx.doi.org/10.3844/jcssp.2008.503.508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Letichevsky, A., J. Kapitonova, A. Letichevsky, V. Volkov, S. Baranov, and T. Weigert. "Basic protocols, message sequence charts, and the verification of requirements specifications." Computer Networks 49, no. 5 (December 2005): 661–75. http://dx.doi.org/10.1016/j.comnet.2005.05.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Wonsoo, Kumaran Vijayasankar, Mickael Chouteau, and Jianwei Zhou. "An Experimental Study of Sub-1 GHz Frequency-Hopping-Based 6LoWPAN Mesh Networking for Smart-Grid Applications." Journal of Computer Networks and Communications 2019 (May 16, 2019): 1–11. http://dx.doi.org/10.1155/2019/5787653.

Full text
Abstract:
This paper presents an experimental study of a multihop Internet Protocol Version 6 over Low-Power Wireless Personal Area Networks (6LoWPAN)-based mesh system that uses un-slotted channel hopping (USCH) medium access control (MAC). Designers of wireless smart-grid networks are using (or looking to use) the Sub-1 GHz spectrum, given its longer radio range compared to the traditional 2.4 GHz spectrum used in Wi-Fi® or Bluetooth® low energy. The frequency-hopping (FH) technique is attractive in this area, as it provides improved robustness and longer range owing to the higher transmission power that regulatory requirements allow. Although Sub-1 GHz allows for a longer range, smart-grid networks deployed over a large geographic area still require multiple hops to provide the required coverage. Many proprietary and standards-based solutions have been proposed to implement such a networking protocol. Notable specifications in this area include the Field Area Networks (FAN) specification from the Wi-SUN (smart utility networks) Alliance and the JupiterMesh specification from the Zigbee Alliance. Little is known about the performance of FH systems over a multihop network, however. This paper presents an implementation of an FH-based multihop networking protocol based on the Texas Instruments (TI) SimpleLink™ TI 15.4-stack, with an experimental study of such a system over multiple hops compared to a non-frequency-hopping (non-FH) system. Results show that the proposed FH-based 6LoWPAN mesh system significantly improves network coverage, network capacity, and communication robustness to interference while demonstrating coexistence capabilities.
APA, Harvard, Vancouver, ISO, and other styles
11

Nakahara, Akiko, Hitoshi Aida, and Tadao Saito. "Performance evaluation of communication networks based on FSM specifications of protocols." Systems and Computers in Japan 23, no. 13 (1992): 1–14. http://dx.doi.org/10.1002/scj.4690231301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Herzberg, Amir, and Igal Yoffe. "The layered games framework for specifications and analysis of security protocols." International Journal of Applied Cryptography 1, no. 2 (2008): 144. http://dx.doi.org/10.1504/ijact.2008.021087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Unger, Nik, and Ian Goldberg. "Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging." Proceedings on Privacy Enhancing Technologies 2018, no. 1 (January 1, 2018): 21–66. http://dx.doi.org/10.1515/popets-2018-0003.

Full text
Abstract:
AbstractA deniable authenticated key exchange (DAKE) protocol establishes a secure channel without producing cryptographic evidence of communication. A DAKE offersstrong deniabilityif transcripts provide no evidence even if long-term key material is compromised (offline deniability) and no outsider can obtain evidence even when interactively colluding with an insider (online deniability). Unfortunately, existing strongly deniable DAKEs have not been adopted by secure messaging tools due to security and deployability weaknesses.In this work, we propose three new strongly deniable key exchange protocols—DAKEZ, ZDH, and XZDH—that are designed to be used in modern secure messaging applications while eliminating the weaknesses of previous approaches. DAKEZ offers strong deniability in synchronous network environments, while ZDH and XZDH can be used to construct asynchronous secure messaging systems with offline and partial online deniability. DAKEZ and XZDH provide forward secrecy against active adversaries, and all three protocols can provide forward secrecy against future quantum adversaries while remaining classically secure if attacks against quantum-resistant cryptosystems are found.We seek to reduce barriers to adoption by describing our protocols from a practitioner’s perspective, including complete algebraic specifications, cryptographic primitive recommendations, and prototype implementations. We evaluate concrete instantiations of our DAKEs and show that they are the most efficient strongly deniable schemes; with all of our classical security guarantees, our exchanges require only 1 ms of CPU time on a typical desktop computer and at most 464 bytes of data transmission. Our constructions are nearly as efficient as key exchanges with weaker deniability, such as the ones used by the popular OTR and Signal protocols.
APA, Harvard, Vancouver, ISO, and other styles
14

LI, YONGJIAN, and RUI XUE. "DESIGN OF A CIL CONNECTOR TO SPIN." International Journal of Software Engineering and Knowledge Engineering 18, no. 01 (February 2008): 65–91. http://dx.doi.org/10.1142/s0218194008003568.

Full text
Abstract:
The CAPSL Integrated Protocol Environment effort aims at providing an intuitive and expressive language for specifying cryptographic authentication and key distribution protocols and supporting interfaces to various analysis tools. The CAPSL Intermediate Language (CIL) has been designed with the emphasis on simplifying translators from CIL to other analysis tools. In this paper we describe the design of a CIL-to-Spin connector. We describe how CIL concepts are translated into Spin and propose a general method to model the behaviors of honest principals and the intruder. Based on the method, a prototype connector has been implemented in Gentle, which automatically translates CIL specifications to Promela codes and LTL formulae, thus greatly simplifying the modeling and analysis process.
APA, Harvard, Vancouver, ISO, and other styles
15

Martynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.

Full text
Abstract:
The paper discusses the main stages of development of cryptographic protocols from SSL 2.0 (Secure Socket Layer) to TLS 1.3 (Transport Layer Security), which ensure the protection of transport layer data in the OSI model. A brief description of the modification of the RuTLS protocol based on TLS 1.3 and their main differences is given. The development of IPsec, which provides cryptographic protection of communications at the network level of the OSI model, is considered using examples of the development of the three most commonly used protocols. These include IKE (Internet Key Exchange), AH (Authentication Header), and ESP (Encapsulation Security Payload). For the SSL/TLS and IPsec specifications, the basic handshake protocols and the main stages of their development are considered. The described handshakes include primary cryptographic information exchange cycles in the form of identifiers of interaction participants, one-time numbers, lists of supported cryptographic combinations. Authentication of participants based on certificates, shared symmetric keys, data exchange for establishing a shared Diffie — Hellman secret, development of key material for secret keys of communication sessions, message authentication, and other cryptographic parameters are presented. For different versions of SSL/TLS and IPsec, the logical structures of application data cryptographic protection functions are described.
APA, Harvard, Vancouver, ISO, and other styles
16

Gao, Zhenyu, Jian Cao, Wei Wang, Huayun Zhang, and Zengrong Xu. "Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time." Security and Communication Networks 2021 (September 13, 2021): 1–11. http://dx.doi.org/10.1155/2021/4587862.

Full text
Abstract:
Industry 4.0 focuses on continuous interconnection services, allowing for the continuous and uninterrupted exchange of signals or information between related parties. The application of messaging protocols for transferring data to remote locations must meet specific specifications such as asynchronous communication, compact messaging, operating in conditions of unstable connection of the transmission line of data, limited network bandwidth operation, support multilevel Quality of Service (QoS), and easy integration of new devices. The Message Queue Telemetry Transport (MQTT) protocol is used in software applications that require asynchronous communication. It is a light and simplified protocol based on publish-subscribe messaging and is placed functionally over the TCP/IP protocol. It is designed to minimize the required communication bandwidth and system requirements increasing reliability and probability of successful message transmission, making it ideal for use in Machine-to-Machine (M2M) communication or networks where bandwidth is limited, delays are long, coverage is not reliable, and energy consumption should be as low as possible. Despite the fact that the advantage that MQTT offers its way of operating does not provide a serious level of security in how to achieve its interconnection, as it does not require protocol dependence on one intermediate third entity, the interface is dependent on each application. This paper presents an innovative real-time anomaly detection system to detect MQTT-based attacks in cyber-physical systems. This is an online-semisupervised learning neural system based on a small number of sampled patterns that identify crowd anomalies in the MQTT protocol related to specialized attacks to undermine cyber-physical systems.
APA, Harvard, Vancouver, ISO, and other styles
17

MALLOY, BRIAN A., ERROL L. LLOYD, JASON O. HALLSTROM, and EDWARD B. DUFFY. "CAPTURING INTERFACE PROTOCOLS TO SUPPORT COMPREHENSION AND EVALUATION OF C++ LIBRARIES." International Journal of Software Engineering and Knowledge Engineering 21, no. 08 (December 2011): 1123–46. http://dx.doi.org/10.1142/s0218194011005645.

Full text
Abstract:
Developing and maintaining reliable object-oriented software requires a precise understanding of how individual classes must be used. Unfortunately, for many systems, especially those that are large, the available documentation is inadequate. Developers are left with incomplete information concerning the allowable set of call sequences that each class can accommodate. Techniques for reverse engineering this information and presenting it to developers in an intellectually scalable manner are critical.In this paper, we present four contributions to address this challenge. First, we describe a runtime trace collection system for large C++ applications. Second, we present a methodology for reverse engineering interface protocols from collected trace data. Third, we present a scalable, tunable algorithm for generating compact specifications of these protocols. Finally, we present a detailed case study involving the Mozilla Necko library. We consider popular applications in common use constructed using this library. The results are promising both in terms of the performance of the approach and the utility of the identified protocols.
APA, Harvard, Vancouver, ISO, and other styles
18

Jin, Wenquan, Rongxu Xu, Sunhwan Lim, Dong-Hwan Park, Chanwon Park, and Dohyeun Kim. "Integrated Service Composition Approach Based on Transparent Access to Heterogeneous IoT Networks Using Multiple Service Providers." Mobile Information Systems 2021 (May 28, 2021): 1–19. http://dx.doi.org/10.1155/2021/5590605.

Full text
Abstract:
The Internet of Things (IoT) enables the number of connected devices to be increased rapidly based on heterogeneous technologies such as platforms, frameworks, libraries, protocols, and standard specifications. Based on the connected devices, various applications can be developed by integrating domain-specific contents using the service composition for providing improved services. The management of the information including devices, contents, and composite objects is necessary to represent the physical objects on the Internet for accessing the IoT services transparently. In this paper, we propose an integrated service composition approach based on multiple service providers to provide improved IoT services by combining various service objects in heterogeneous IoT networks. In the proposed IoT architecture, each service provider provides web services based on Representational State Transfer (REST) Application Programming Interface (API) that delivers information to the clients as well as other providers for integrating the information to provide new services. Through the REST APIs, the integration management provider combines the service result of the IoT service provider to other contents to provide improved services. Moreover, the interworking proxy is proposed to bridge heterogeneous IoT networks for enabling transparent access in the integrated services through proving protocol translating on the entry of the device networks. Therefore, the interworking proxy is deployed between the IoT service provider and device networks to enable clients to access heterogeneous IoT devices through the composited services transparently.
APA, Harvard, Vancouver, ISO, and other styles
19

Bishop, Steve, Matthew Fairbairn, Michael Norrish, Peter Sewell, Michael Smith, and Keith Wansbrough. "Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and sockets." ACM SIGCOMM Computer Communication Review 35, no. 4 (October 2005): 265–76. http://dx.doi.org/10.1145/1090191.1080123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Al Dallal, Jehad, and Kassem Saleh. "Service-Oriented Synthesis of Distributed and Concurrent Protocol Specifications." Journal of Computer Systems, Networks, and Communications 2008 (2008): 1–13. http://dx.doi.org/10.1155/2008/794960.

Full text
Abstract:
Several methods have been proposed for synthesizing computer communication protocol specifications from service specifications. Some protocol synthesis methods based on the finite state machine (FSM) model assume that primitives in the service specifications cannot be executed simultaneously. Others either handle only controlled primitive concurrency or have tight restrictions on the applicable FSM topologies. As a result, these synthesis methods are not applicable to an interesting variety of inherently concurrent applications, such as the Internet and mobile communication systems. This paper proposes a concurrent-based protocol synthesis method that eliminates the restrictions imposed by the earlier methods. The proposed method uses a synthesis method to obtain a sequential protocol specification (P-SPEC) from a given service specification (S-SPEC). The resulting P-SPEC is then remodeled to consider the concurrency behavior specified in the S-SPEC, while guaranteeing that P-SPEC provides the specified service.
APA, Harvard, Vancouver, ISO, and other styles
21

CHANG, YI-HSING, and CHING-LUNG YANG. "A HIGH-EFFICIENCY KNOWLEDGE MANAGEMENT SYSTEM BASED ON HABITUAL DOMAINS AND INTELLIGENT AGENTS." International Journal of Software Engineering and Knowledge Engineering 18, no. 08 (December 2008): 1083–114. http://dx.doi.org/10.1142/s0218194008004021.

Full text
Abstract:
In this paper, a high-efficiency knowledge management system, HDIA_KMS, based on habitual domains and intelligent agents is proposed. The design concept of the system is to use an agent community to deal with the activities of knowledge management effectively, that is, knowledge sharing, knowledge classification, knowledge creation, and knowledge recovery. The features of this system are: collecting the surfing habits of each user and finding hidden patterns of departments to recommend articles by data mining; classifying the knowledge articles in accordance with departments and therefore rapidly finding out suitable documents for users; providing personal service through personal profiles; creating new knowledge documents by discussing among users; accepting and reclassifying improperly classified articles found by users; taking the abilities of collaboration, independence and automation of agents to help users use and improve the effects of HDIA_KMS. The PASSI methodology is adopted to analyze and design the system, and agents protocols follow the FIPA specifications.
APA, Harvard, Vancouver, ISO, and other styles
22

Lavric, Alexandru, and Valentin Popa. "Performance Evaluation of LoRaWAN Communication Scalability in Large-Scale Wireless Sensor Networks." Wireless Communications and Mobile Computing 2018 (June 28, 2018): 1–9. http://dx.doi.org/10.1155/2018/6730719.

Full text
Abstract:
The LoRaWAN communication protocol can be used for the implementation of the IoT (Internet of Things) concept. Currently, most of the information regarding the scalability of the LoRa technology is commercial and deals with the best-case scenario. Thus, we need realistic models, enabling the proper assessment of the performance level. Most of the time, the IoT concept entails a large number of nodes distributed over a wide geographical area, therefore forming a high density, large-scale architecture. It is important to determine the number of collisions so that we can assess the network performance. The present paper aims at assessing the performance level of the LoRaWAN technology by analyzing the number of packet collisions that can occur. Thus, this paper determines the maximum number of LoRa nodes that can communicate with a Gateway considering the LoRaWAN protocol specifications. Furthermore, we have proposed a series of solutions for reducing the number of collisions and increasing the capacity of the communication channel.
APA, Harvard, Vancouver, ISO, and other styles
23

Xavereyno, Anselmus. "Comparative Analysis of VoIP Server Performance on Single Board Computers and Conventional CPUs." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 6, no. 1 (May 7, 2018): 23–27. http://dx.doi.org/10.33795/jartel.v6i1.134.

Full text
Abstract:
This journal will briefly explain the comparison of voice over internet protocol server performance on two types of computers, namely single board computer or single board cirucuti (SBC) and conventional CPU. More specifically, it is on three server bases, namelyRaspberry Pi 3, Raspberry Pi 2 and conventional CPU. The background for taking the topic of this thesis is the development of SBC which is claimed to be able to go beyond conventional CPU. Although the specifications and age are able to compensate for or even exceed conventional CPUs, further research is needed in the form of performance comparisons. The performance comparison referred to includes the number of extensions that can be stored, simultaneous calls that can be served, usage of processor capacity, and usage of memory capacity. Tests carried out on the intranet network of State Polytechnic of Malang. The results of the test show that the three servers are able to store at least 100 extensions, can accommodate 60 online clients at the same time, can accommodate at least 30 simultaneous calls. The average use of the processor capacity by the Raspberry Pi 3 is 32%, the Raspberry Pi 2 is 43%, while the conventional CPU is 69%. The average RAM usage by the Raspberry Pi 3 is 296.96 MB, the Raspberry Pi 2 is 215.04 MB, and by the conventional CPU is 365.52 MB.
APA, Harvard, Vancouver, ISO, and other styles
24

von Bochmann, G., and R. Gotzhein. "Deriving protocol specifications from service specifications." ACM SIGCOMM Computer Communication Review 16, no. 3 (August 1986): 148–56. http://dx.doi.org/10.1145/1013812.18190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Sidhu, D. P., and J. Aristizabal. "Constructing submodule specifications and network protocols." IEEE Transactions on Software Engineering 14, no. 11 (1988): 1565–77. http://dx.doi.org/10.1109/32.9045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Khendek, F., G. von Bochmann, and C. Kant. "New results on deriving protocol specifications from service specifications." ACM SIGCOMM Computer Communication Review 19, no. 4 (August 1989): 136–45. http://dx.doi.org/10.1145/75247.75261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

TOGASHI, ATSUSHI, GLENN MANSFIELD, and NORIO SHIRATORI. "ANIMATING LOTOS SPECIFICATIONS USING AMLOG." International Journal of Software Engineering and Knowledge Engineering 06, no. 01 (March 1996): 5–19. http://dx.doi.org/10.1142/s0218194096000028.

Full text
Abstract:
In order to achieve a more convenient and intelligent handling of LOTOS specifications, an approach is proposed wherein specifications are translated into an appropriate equational logic language and interpreted. LOTOS has an excellent formal model for describing communication processes and equational logic languages have the capability of inferencing and data abstraction. Naturally, the marriage of LOTOS and equational logic provides a powerful framework with features that could not be realized in existing technologies. To demonstrate this potential, AMLOG is chosen as the appropriate equational logic language. Apart from rapid prototyping of specifications, some of the exciting possibilities of the new framework that are demonstrated include stepwise refinement and testing for correctness of specifications, facilities for property checking and verification of bisimulation equivalences. Also, the derivation of behavior expressions from trace histories is shown. The approach, extensible to other FDTs as well, is a step towards realizing an intelligent communication protocol specification environment.
APA, Harvard, Vancouver, ISO, and other styles
28

Wu, Xi, Huibiao Zhu, Yongxin Zhao, Zheng Wang, and Liu Si. "Modeling and verifying the Ariadne protocol using process algebra." Computer Science and Information Systems 10, no. 1 (2013): 393–421. http://dx.doi.org/10.2298/csis120601009w.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) are formed dynamically by mobile nodes without the support of prior stationary infrastructures. In such networks, routing protocols, particularly secure ones are always the essential parts. Ariadne, an efficient and well-known on-demand secure protocol of MANETs, mainly concerns about how to prevent a malicious node from compromising the route. In this paper, we apply the method of process algebra Communicating Sequential Processes (CSP) to model and reason about the Ariadne protocol, focusing on the process of its route discovery. In our framework, we consider the communication entities as CSP processes, including the initiator, the intermediate nodes and the target. Moreover, we also propose an intruder model allowing the intruder to learn and deduce much information from the protocol and the environment. Note that the modeling approach is also applicable to other protocols, which are based on the on-demand routing protocols and have the route discovery process. Finally, we use PAT, a model checker for CSP, to verify whether the model caters for the specification and the non-trivial secure properties, e.g. nonexistence of fake path. Three case studies are given and the verification results naturally demonstrate that the fake routing attacks may be present in the Ariadne protocol.
APA, Harvard, Vancouver, ISO, and other styles
29

Yamaguchi, Hirozumi, Khaled El-Fakih, Gregor v. Bochmann, and Teruo Higashino. "Deriving protocol specifications from service specifications written as Predicate/Transition-nets." Computer Networks 51, no. 1 (January 2007): 258–84. http://dx.doi.org/10.1016/j.comnet.2006.03.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Gouda, Mohamed G. "Network protocols between exact specifications and pragmatic implementations." ACM Computing Surveys 28, no. 4es (December 1996): 43. http://dx.doi.org/10.1145/242224.242278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Mordecai, Yaniv. "Model-based protocol specification." Systems Engineering 22, no. 2 (March 2019): 188–210. http://dx.doi.org/10.1002/sys.21480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Terpeny, Janis P., and Robert P. Davis. "Postoptimality analysis for a network protocol feature specification model." Computers & Industrial Engineering 9, no. 4 (January 1985): 327–37. http://dx.doi.org/10.1016/0360-8352(85)90020-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Kant, Christian, Teruo Higashino, and Gregor von Bochmann. "Deriving protocol specifications from service specifications written in LOTOS." Distributed Computing 10, no. 1 (July 27, 1996): 29–47. http://dx.doi.org/10.1007/s004460050022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Welzl, Michael, Stephan Oepen, Cezary Jaskula, Carsten Griwodz, and Safiqul Islam. "Collaboration in the IETF." ACM SIGCOMM Computer Communication Review 51, no. 3 (July 11, 2021): 29–32. http://dx.doi.org/10.1145/3477482.3477488.

Full text
Abstract:
RFC 9000, published in May 2021, marks an important milestone for the Internet's standardization body, the Internet Engineering Task Force (IETF): finally, the specification of the QUIC protocol is available. QUIC is the result of a five-year effort - and it is also the second of two major protocols (the first being SPDY, which later became HTTP/2) that Google LLC first deployed, and then brought to the IETF for standardization. This begs the question: when big players follow such a "shoot first, discuss later" approach, is IETF collaboration still "real", or is the IETF now being (mis-)used to approve protocols for standardization when they are already practically established, without really actively involving anyone but the main proponents?
APA, Harvard, Vancouver, ISO, and other styles
35

Amara Korba, Abdelaziz, Mehdi Nafaa, and Salim Ghanemi. "An efficient intrusion detection and prevention framework for ad hoc networks." Information & Computer Security 24, no. 4 (October 10, 2016): 298–325. http://dx.doi.org/10.1108/ics-08-2015-0034.

Full text
Abstract:
Purpose Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and collaborative routing in such networks makes them vulnerable to various security attacks. This paper aims to design and implement a new efficient intrusion detection and prevention framework, called EIDPF, a host-based framework suitable for mobile ad hoc network’s characteristics such as high node’s mobility, resource-constraints and rapid topology change. EIDPF aims to protect an AODV-based network against routing attacks that could target such network. Design/methodology/approach This detection and prevention framework is composed of three complementary modules: a specification-based intrusion detection system to detect attacks violating the protocol specification, a load balancer to prevent fast-forwarding attacks such as wormhole and rushing and adaptive response mechanism to isolate malicious node from the network. Findings A key advantage of the proposed framework is its capacity to efficiently avoid fast-forwarding attacks and its real-time detection of both known and unknown attacks violating specification. The simulation results show that EIDPF exhibits a high detection rate, low false positive rate and no extra communication overhead compared to other protection mechanisms. Originality/value It is a new intrusion detection and prevention framework to protect ad hoc network against routing attacks. A key strength of the proposed framework is its ability to guarantee a real-time detection of known and unknown attacks that violate the protocol specification, and avoiding wormhole and rushing attacks by providing a load balancing route discovery.
APA, Harvard, Vancouver, ISO, and other styles
36

Bodei, C., P. Degano, R. Focardi, and C. Priami. "Authentication primitives for secure protocol specifications." Future Generation Computer Systems 21, no. 5 (May 2005): 645–53. http://dx.doi.org/10.1016/j.future.2004.05.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Cervesato, Iliano. "Typed Multiset Rewriting Specifications of Security Protocols." Electronic Notes in Theoretical Computer Science 40 (March 2001): 8–51. http://dx.doi.org/10.1016/s1571-0661(05)80035-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Jero, Samuel, Maria Leonor Pacheco, Dan Goldwasser, and Cristina Nita-Rotaru. "Leveraging Textual Specifications for Grammar-Based Fuzzing of Network Protocols." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9478–83. http://dx.doi.org/10.1609/aaai.v33i01.33019478.

Full text
Abstract:
Grammar-based fuzzing is a technique used to find software vulnerabilities by injecting well-formed inputs generated following rules that encode application semantics. Most grammar-based fuzzers for network protocols rely on human experts to manually specify these rules. In this work we study automated learning of protocol rules from textual specifications (i.e. RFCs). We evaluate the automatically extracted protocol rules by applying them to a state-of-the-art fuzzer for transport protocols and show that it leads to a smaller number of test cases while finding the same attacks as the system that uses manually specified rules.
APA, Harvard, Vancouver, ISO, and other styles
39

Kapus-Kolar, Monika. "Comments on deriving protocol specifications from service specifications written in LOTOS." Distributed Computing 12, no. 4 (September 1, 1999): 175–77. http://dx.doi.org/10.1007/s004460050064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Papadimitriou, C. H., V. Rangan, and M. Sideri. "Designing secure communication protocols from trust specifications." Algorithmica 11, no. 5 (May 1994): 485–99. http://dx.doi.org/10.1007/bf01293268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Mariño, Perfecto, Miguel Ángel Domı́nguez, Francisco Poza, and Fernando Vázquez. "Using LOTOS in the specification of industrial bus communication protocols." Computer Networks 45, no. 6 (August 2004): 767–99. http://dx.doi.org/10.1016/j.comnet.2004.03.029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Dabbous, Walid, Sean O'Malley, and Claude Castelluccia. "Generating efficient protocol code from an abstract specification." ACM SIGCOMM Computer Communication Review 26, no. 4 (October 1996): 60–72. http://dx.doi.org/10.1145/248157.248163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Kumar, Rahul, and Eric G. Mercer. "Verifying Communication Protocols Using Live Sequence Chart Specifications." Electronic Notes in Theoretical Computer Science 250, no. 2 (September 2009): 33–48. http://dx.doi.org/10.1016/j.entcs.2009.08.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Baldoni, Matteo, Cristina Baroglio, Elisa Marengo, and Viviana Patti. "Constitutive and regulative specifications of commitment protocols." ACM Transactions on Intelligent Systems and Technology 4, no. 2 (March 2013): 1–25. http://dx.doi.org/10.1145/2438653.2438657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

SLIVA, VLADIMIR P., TADAO MURATA, and SOL M. SHATZ. "PROTOCOL SPECIFICATION DESIGN USING AN OBJECT-BASED PETRI NET FORMALISM." International Journal of Software Engineering and Knowledge Engineering 09, no. 01 (February 1999): 97–125. http://dx.doi.org/10.1142/s0218194099000073.

Full text
Abstract:
This paper presents a method for modeling of communication protocols using G-Nets — an object-based Petri net formalism. Our approach focuses on specification of one entity in one node at one time, with the analysis that allows consideration of other layers and nodes in addition to module analysis. We extend G-Nets by the notion of timers, which aids the construction of protocol software models. Our method prevents some types of potential deadlocks and livelocks from being introduced into the produced net models. We present certain net synthesis rules to prevent some potential design errors by including error cases in the model. Thus, our node (site) interplay modeling includes cases in which a message may arrive corrupted or can be lost entirely before it would get to its destination node. Also, since our models have deadlock-preserving skeletons, the verification of global deadlock non-existence can be performed on the less complex skeleton rather than on the full G-Net model. Our analysis method discovers some deadlocks plus other unacceptable markings, which do not allow restoration of the initial state. Finding potential livelocks or overspecification is also a part of the analysis.
APA, Harvard, Vancouver, ISO, and other styles
46

Rudin, H. "An informal overview of formal protocol specification." IEEE Communications Magazine 23, no. 3 (March 1985): 46–52. http://dx.doi.org/10.1109/mcom.1985.1092527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Takura, Akira, Takafumi Sera, and Tadashi Ohta. "Protocol synthesis from rule-based communications service specifications." Electronics and Communications in Japan (Part I: Communications) 81, no. 3 (March 1998): 22–35. http://dx.doi.org/10.1002/(sici)1520-6424(199803)81:3<22::aid-ecja3>3.0.co;2-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Anand, K. C., and R. K. Shyamasundar. "Formal Verification of Activity-Based Specification of Protocols." Journal of Parallel and Distributed Computing 60, no. 5 (May 2000): 639–76. http://dx.doi.org/10.1006/jpdc.2000.1622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Anderson, David P., and Lawrence H. Landweber. "A grammar-based methodology for protocol specification and implementation." ACM SIGCOMM Computer Communication Review 15, no. 4 (September 1985): 63–70. http://dx.doi.org/10.1145/318951.319006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Murphy, S. L., and A. U. Shankar. "Service specification and protocol construction for the transport layer." ACM SIGCOMM Computer Communication Review 18, no. 4 (August 1988): 88–97. http://dx.doi.org/10.1145/52325.52334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography