Abstract
The tier automation is presented as a model for communication protocols. Several advantages of the model are cited, among which are universality of representation and manipulability. A scheme for using the tier automation to model specific distributed architectures and their protocols is described. The scheme is then used on a sample protocol and a transmission session with the sample protocol as exhibited.
- 1 Bartlett, K.A., R.A. Scantlebury, and P.T. Wilkinson, "A Note on Reliable Full-Duplex Transmission over Half-Duplex Lines." Comm. ACM 12,5 (May 1969), 260-261. Google ScholarDigital Library
- 2 Bare{, Z., Introduction to the Theory of Automata, Reston Publishing Company, Inc., Reston, Virginia, 1983.Google Scholar
- 3 Bavel, Z., "Manipulable Computer Architecture; First Annual Report to the System Development Foundation" (May 1985).Google Scholar
- 4 Bochmann, G.V., "Finite State Description of Communication Protocols." Computer Networks 2, 4/5 (Oct. 1978), 361-372.Google Scholar
- 5 Brand, D., and Zafiropulo, P., "On Communicating Finite-State Machines." dr. ACM 30,2 (Apr. 1983), 323-342. Google ScholarDigital Library
- 6 Chang, C.K., Gouda, M.G., and Rosier, L.E., "Deciding Liveness for Special Classes of Communicating Finite State Machines." In Proceedings 22nd Annual Allerton Conference on Communication, Control, and Computing (Oct. 1984), 931-939.Google Scholar
- 7 Gouda, M.G., Manning, E.G., and Yu, Y.T., "On the Progress of Communication between Two Finite State Machines." Inf. Control 63,3 (Dec. 1984). Google ScholarDigital Library
- 8 Lynch, W.C., "Reliable Full-Duplex Transmission over Half-Duplex Telephone Lines." Comm. ACM tl,6 (June 1968), 361-371. Google ScholarDigital Library
- 9 Simpson, William F. and Bavel, Z., "Tag-Automaton Derived Measures of Polysemy on Roger's International Thesaurus." In preparation.Google Scholar
Index Terms
- Tier automation representation of communication protocols
Recommendations
Tier automation representation of communication protocols
SIGCOMM '86: Proceedings of the ACM SIGCOMM conference on Communications architectures & protocolsThe tier automation is presented as a model for communication protocols. Several advantages of the model are cited, among which are universality of representation and manipulability. A scheme for using the tier automation to model specific distributed ...
Two-phase Nonrepudiation Protocols
ICCCNT '16: Proceedings of the 7th International Conference on Computing Communication and Networking TechnologiesA nonrepudiation protocol from party S to party R performs two tasks. First, the protocol enables party S to send to party R some text x along with a proof (that can convince a judge) that x was indeed sent by S. Second, the protocol enables party R to ...
Protocols for Multiparty Coin Toss with a Dishonest Majority
Coin-tossing protocols are protocols that generate a random bit with uniform distribution, although some corrupted parties might try to bias the output. These protocols are used as a building block in many cryptographic protocols. Cleve (Proc. of the ...
Comments