Using the Strategy Design Pattern to Compose Reliable Distributed Protocols

نویسندگان

  • Benoît Garbinato
  • Rachid Guerraoui
چکیده

Reliable distributed systems involve many complex protocols. In this context, protocol composition is a central concept, because it allows the reuse of robust protocol implementations. In this paper, we describe how the Strategy pattern has been recursively used to support protocol composition in the BAST framework. We also discuss design alternatives that have been applied in other existing frameworks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Strategy Pattern for Composing Reliable Distributed Protocols

Reliable distributed systems involve many complex protocols. In this context, protocol compositions is a central concept, because it allows to reuse robust protocol implementations. In this paper, we describe how the Strategy pattern has been recur-sively used to support protocol composition in the Bast framework. We also discuss some design alternatives , some of which have been applied in oth...

متن کامل

A 28-36 GHz Optimized CMOS Distributed Doherty Power Amplifier with A New Wideband Power Divider Structure

Background and Objectives: In this paper, a new design strategy was proposed in order to enhance bandwidth and efficiency of power amplifier. Methods: To realize the introduced design strategy, a power amplifier was designed using TSMC CMOS 0.18um technology for operating in the Ka band, i.e. the frequency range of 26.5-40GHz. To design the power amplifier, first a power divider (PD) with a ver...

متن کامل

A Composition Methodology for Designing Proactive Distributed Protocols

The development of methodologies for the design of distributed protocols is essential to reducing the complexity and difficulty of creating distributed systems, as well as for maturing the field. This paper presents a composition methodology for designing a range of proactive distributed protocols, with applicability to large-scale distributed systems in both the Internet (e.g., peer to peer sy...

متن کامل

Transforming Password Protocols to Compose

Formal, symbolic techniques are extremely useful for modelling and analysing security protocols. They improved our understanding of security protocols, allowed to discover aws, and also provide support for protocol design. However, such analyses usually consider that the protocol is executed in isolation or assume a bounded number of protocol sessions. Hence, no security guarantee is provided w...

متن کامل

Personalized Information Delivery in Dynamic Museum Environment by Implicit Organizations of Agents

Today’s complex distributed systems call for novel methods for modeling, design and implementation. The “active museum” being developed within the PEACH project is an example of such a system. In order to model the system, a new pattern called Implicit Organization was defined that supports the coordination requirements of the agents that compose the system. This pattern was applied within the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997