A Comparison of Automatic Protocol Generation Techniques

نویسندگان

  • Ranil De Silva
  • Laurent Dairaine
  • Aruna Seneviratne
  • Michael Fry
چکیده

Due to the increasing complexity of applications and the availability of high speed networks, classical protocols have become the main bottleneck in communication systems. Although tailored protocols are able to respond to the needs of a given application, their development is expensive in terms of time and e ort. An automatic protocol generation environment is most desirable. Two approaches currently used are the stub compilation and the runtime adaptive techniques. We have studied these two approaches and the behaviour of the resulting tailored transport protocols. Relative performance, comparisons and discussions about these two approaches are presented in this paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

An Experiment in Automatic Generation of Test Suites for Protocols with Veriication Technology

In this paper we describe an experiment in automatic generation of test suites for protocol testing. We report the results gained with generation of test suites based on advanced veriication techniques applied to a real industrial protocol. In this experiment, several tools have been used : the commercial tool GEODE (VERILOG) was used for the generation of nite state graph models from SDL speci...

متن کامل

An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

متن کامل

Optimizing the AGC system of a three-unequal-area hydrothermal system based on evolutionary algorithms

This paper focuses on expanding and evaluating an automatic generation control (AGC) system of a hydrothermal system by modelling the appropriate generation rate constraints to operate practically in an economic manner. The hydro area is considered with an electric governor and the thermal area is modelled with a reheat turbine. Furthermore, the integral controllers and electri...

متن کامل

An Experiment in Automatic Generation of Test Suites for Protocols with Verification Technology

In this report we describe an experiment in automatic generation of test suites for protocol testing. We report the results gained with generation of test suites based on advanced veriication techniques applied to a real industrial protocol. In this experiment, several tools have been used : the commercial tool GEODE (VERILOG) was used for the generation of nite state graph models from SDL spec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Australian Computer Journal

دوره 28  شماره 

صفحات  -

تاریخ انتشار 1996