Using the Strategy Design Pattern to Compose Reliable Distributed Protocols
نویسندگان
چکیده
Reliable distributed systems involve many complex protocols. In this context, protocol composition is a central concept, because it allows the reuse of robust protocol implementations. In this paper, we describe how the Strategy pattern has been recursively used to support protocol composition in the BAST framework. We also discuss design alternatives that have been applied in other existing frameworks.
منابع مشابه
Strategy Pattern for Composing Reliable Distributed Protocols
Reliable distributed systems involve many complex protocols. In this context, protocol compositions is a central concept, because it allows to reuse robust protocol implementations. In this paper, we describe how the Strategy pattern has been recur-sively used to support protocol composition in the Bast framework. We also discuss some design alternatives , some of which have been applied in oth...
متن کاملA 28-36 GHz Optimized CMOS Distributed Doherty Power Amplifier with A New Wideband Power Divider Structure
Background and Objectives: In this paper, a new design strategy was proposed in order to enhance bandwidth and efficiency of power amplifier. Methods: To realize the introduced design strategy, a power amplifier was designed using TSMC CMOS 0.18um technology for operating in the Ka band, i.e. the frequency range of 26.5-40GHz. To design the power amplifier, first a power divider (PD) with a ver...
متن کاملA Composition Methodology for Designing Proactive Distributed Protocols
The development of methodologies for the design of distributed protocols is essential to reducing the complexity and difficulty of creating distributed systems, as well as for maturing the field. This paper presents a composition methodology for designing a range of proactive distributed protocols, with applicability to large-scale distributed systems in both the Internet (e.g., peer to peer sy...
متن کاملTransforming Password Protocols to Compose
Formal, symbolic techniques are extremely useful for modelling and analysing security protocols. They improved our understanding of security protocols, allowed to discover aws, and also provide support for protocol design. However, such analyses usually consider that the protocol is executed in isolation or assume a bounded number of protocol sessions. Hence, no security guarantee is provided w...
متن کاملPersonalized Information Delivery in Dynamic Museum Environment by Implicit Organizations of Agents
Today’s complex distributed systems call for novel methods for modeling, design and implementation. The “active museum” being developed within the PEACH project is an example of such a system. In order to model the system, a new pattern called Implicit Organization was defined that supports the coordination requirements of the agents that compose the system. This pattern was applied within the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997