A Complementary Modularization for Communication Protocols
نویسندگان
چکیده
Current techniques for protocol design focus on modules that encapsulate the protocol engines that execute on different network nodes. While this modularization is invaluable for independent implementation of network elements, we believe it does not adequately support the design, analysis, or evolution of a protocol. In this paper, we propose a complementary modularization that tackles this problem and is driven rather by the “cross-cutting” aspects of protocol engines. In particular, we report on our experiences with the Session Initiation Protocol (SIP), which is the signaling protocol in the IETF suite of IP telephony standards. SIP has attracted great attention in the telecommunications industry, and there are already many commercial products based on SIP. Since the protocol has already reached a high degree of complexity and will continue to evolve, it is an ideal candidate for our studies.
منابع مشابه
Distributed Aspects: better separation of crosscutting concerns in distributed software systems
This thesis shows that abstractions provided by current mainstream Object Oriented (OO) languages are not enough to address the modularization of distributed and concurrent algorithms, protocols, or architectures. In particular, we show that code implementing concurrent and distributed algorithms is scattered and tangled in the main implementation of JBoss Cache, a real industrial middleware ap...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملMessaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers
Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of boot...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002