首页 > 最新文献

Computer Networks (1976)最新文献

英文 中文
Inhouse versus public videotex systems 内部视频系统和公共视频系统
Pub Date : 1983-10-01 DOI: 10.1016/0376-5075(83)90044-2
H.A Maurer, I Sebestyen

The aim of this paper is to analyse the relation between inhouse and public videotex systems and show that these systems are and should not be independent of each other and that they can and should complement each other rather than complete.

本文的目的是分析内部和公共视频系统之间的关系,并表明这些系统是相互独立的,也不应该是相互独立的,它们可以也应该是相互补充的,而不是完整的。
{"title":"Inhouse versus public videotex systems","authors":"H.A Maurer,&nbsp;I Sebestyen","doi":"10.1016/0376-5075(83)90044-2","DOIUrl":"10.1016/0376-5075(83)90044-2","url":null,"abstract":"<div><p>The aim of this paper is to analyse the relation between inhouse and public videotex systems and show that these systems are and should not be independent of each other and that they can and should complement each other rather than complete.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 5","pages":"Pages 329-342"},"PeriodicalIF":0.0,"publicationDate":"1983-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90044-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75128862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PTC'83 — Pacific telecommunications conference 太平洋电信会议
Pub Date : 1983-10-01 DOI: 10.1016/0376-5075(83)90048-X
{"title":"PTC'83 — Pacific telecommunications conference","authors":"","doi":"10.1016/0376-5075(83)90048-X","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90048-X","url":null,"abstract":"","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 5","pages":"Pages 359-368"},"PeriodicalIF":0.0,"publicationDate":"1983-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90048-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137441284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The DoD internet architecture model 国防部互联网架构模型
Pub Date : 1983-10-01 DOI: 10.1016/0376-5075(83)90042-9
Vinton G Cerf, Edward Cain

This paper outlines the principles on which the U.S. Department of Defense packet internet architecture is based and characterizes some of the protocols which implement the architecture. Major factors which influenced the development of this architectural model include experimental and operational experience with a large number of interconnected packet networks, assessments and evaluations of military requirements for national and international interoperability and multiple jurisdiction operation, and specific concerns regarding security, survivability and operation under crisis conditions.

本文概述了美国国防部分组互联网体系结构所基于的原则,并对实现该体系结构的一些协议进行了描述。影响这一架构模型发展的主要因素包括大量互连分组网络的实验和操作经验,对国家和国际互操作性和多管辖操作的军事要求的评估和评估,以及对安全、生存能力和危机条件下操作的具体关注。
{"title":"The DoD internet architecture model","authors":"Vinton G Cerf,&nbsp;Edward Cain","doi":"10.1016/0376-5075(83)90042-9","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90042-9","url":null,"abstract":"<div><p>This paper outlines the principles on which the U.S. Department of Defense packet internet architecture is based and characterizes some of the protocols which implement the architecture. Major factors which influenced the development of this architectural model include experimental and operational experience with a large number of interconnected packet networks, assessments and evaluations of military requirements for national and international interoperability and multiple jurisdiction operation, and specific concerns regarding security, survivability and operation under crisis conditions.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 5","pages":"Pages 307-318"},"PeriodicalIF":0.0,"publicationDate":"1983-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90042-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91636258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Military requirements for packet-switched networks and their implications for protocol standardization 分组交换网络的军事要求及其对协议标准化的影响
Pub Date : 1983-10-01 DOI: 10.1016/0376-5075(83)90041-7
Vinton G Cerf, Robert E Lyons

This paper outlines the nature of the military requirements for packet-switched data communications and contrasts these requirements with those of commercial, industrial and private users served by common carrier public packet-switched data networks. Current US Department of Defense policy on the use of commercial standards in defense systems is reviewed. Deficiencies in existing standards for military applications are identified and implications for the development of a suitable military data communications architecture are drawn. A strategy of military standardization is outlined which adopts commercial standards where they apply and supplements these with special military standards as needed to satisfy unique military requirements. The thesis of this paper is illustrated by a discussion of the applicability of the CCITT X.25 protocol standard to military communications.

本文概述了对分组交换数据通信的军事需求的性质,并将这些需求与普通运营商公共分组交换数据网络服务的商业、工业和私人用户的需求进行了对比。对当前美国国防部在国防系统中使用商业标准的政策进行了审查。指出了现有军事应用标准的不足之处,并指出了对发展适当的军事数据通信体系结构的影响。概述了一项军事标准化战略,在商业标准适用时采用商业标准,并根据需要补充特殊军事标准,以满足独特的军事需要。本文通过讨论CCITT X.25协议标准在军事通信中的适用性来说明本文的研究。
{"title":"Military requirements for packet-switched networks and their implications for protocol standardization","authors":"Vinton G Cerf,&nbsp;Robert E Lyons","doi":"10.1016/0376-5075(83)90041-7","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90041-7","url":null,"abstract":"<div><p>This paper outlines the nature of the military requirements for packet-switched data communications and contrasts these requirements with those of commercial, industrial and private users served by common carrier public packet-switched data networks. Current US Department of Defense policy on the use of commercial standards in defense systems is reviewed. Deficiencies in existing standards for military applications are identified and implications for the development of a suitable military data communications architecture are drawn. A strategy of military standardization is outlined which adopts commercial standards where they apply and supplements these with special military standards as needed to satisfy unique military requirements. The thesis of this paper is illustrated by a discussion of the applicability of the CCITT X.25 protocol standard to military communications.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 5","pages":"Pages 293-306"},"PeriodicalIF":0.0,"publicationDate":"1983-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90041-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91636257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The department of defense data protocol standardization program 国防部数据协议标准化计划
Pub Date : 1983-10-01 DOI: 10.1016/0376-5075(83)90043-0
Philip S Selvaggi

The US Department of Defense (DoD) has, for some years now, been pursuing the objective of implementing a new data communications system responsive to its requirements. In consonance with this goal, it has also been heavily involved in developing data communications protocol standards. It has participated in related research, test, and development of a Transmission Control Protocol and an Internet Protocol and has plans for developing other protocols in layers 4–7 of the OSI model.

This paper is essentially structured into two parts. The first part will provide background information for the DoD protocol standardization program, which describes policy issues, status, and problems inherent in the development of such a program. This background description is then followed by an outline of current DoD planning for future work in this area. The point being made here is that the DoD by virtue of its needs, investigations, and accomplishments to date, is eminently qualified to contribute significantly to the development of data protocol standards. The second part of the paper describes the actual current DoD activities for developing data protocol standards, as well as its efforts to coordinate with NATO, the National Bureau of Standards (NBS), and commercial standards groups.

美国国防部(DoD)多年来一直在追求实现一种满足其需求的新型数据通信系统的目标。为了实现这一目标,它还积极参与制定数据通信协议标准。它参与了传输控制协议和互联网协议的相关研究、测试和开发,并计划在OSI模型的4-7层开发其他协议。本文主要分为两部分。第一部分将提供国防部协议标准化计划的背景信息,其中描述了该计划发展中固有的政策问题、状态和问题。这一背景描述之后是当前国防部对该领域未来工作的规划大纲。这里的要点是,国防部凭借其需求、调查和迄今为止的成就,非常有资格为数据协议标准的发展做出重大贡献。本文的第二部分描述了目前国防部开发数据协议标准的实际活动,以及它与北约、国家标准局(NBS)和商业标准组织协调的努力。
{"title":"The department of defense data protocol standardization program","authors":"Philip S Selvaggi","doi":"10.1016/0376-5075(83)90043-0","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90043-0","url":null,"abstract":"<div><p>The US Department of Defense (DoD) has, for some years now, been pursuing the objective of implementing a new data communications system responsive to its requirements. In consonance with this goal, it has also been heavily involved in developing data communications protocol standards. It has participated in related research, test, and development of a Transmission Control Protocol and an Internet Protocol and has plans for developing other protocols in layers 4–7 of the OSI model.</p><p>This paper is essentially structured into two parts. The first part will provide background information for the DoD protocol standardization program, which describes policy issues, status, and problems inherent in the development of such a program. This background description is then followed by an outline of current DoD planning for future work in this area. The point being made here is that the DoD by virtue of its needs, investigations, and accomplishments to date, is eminently qualified to contribute significantly to the development of data protocol standards. The second part of the paper describes the actual current DoD activities for developing data protocol standards, as well as its efforts to coordinate with NATO, the National Bureau of Standards (NBS), and commercial standards groups.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 5","pages":"Pages 319-328"},"PeriodicalIF":0.0,"publicationDate":"1983-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90043-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91636259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Local area networks and the practical aspects of interworking 局域网和互连的实际方面
Pub Date : 1983-10-01 DOI: 10.1016/0376-5075(83)90045-4
Kenneth S Heard

The potential for cost-effective distribution and coordinated sharing of information processing systems is substantially enhanced by the recent emergence of comparatively cheap, very reliable, high speed local area networks (LANs). The lack of common interface specifications is however a major impediment to progress. The benefits to be gained by ensuring that the user accessible interface to a local area network provides identical functionality to that offered over a long haul network argue for a subset of features common to both types. This need for commonality argues against exploitation of some of the more novel features intrinsic to certain styles of technologically advanced systems. By this means, the enormous investment in existing (wide area) networked applications can be applied within a local context and, perhaps even more importantly, applications mounted in a LAN environment will also be accessible from, and be able to communicate with, other more remote systems.

最近出现的相对便宜、非常可靠、高速的局域网络大大提高了具有成本效益的信息处理系统分配和协调共享的潜力。然而,缺乏通用接口规范是进展的主要障碍。通过确保本地网络的用户可访问界面提供与远程网络提供的功能相同的功能所获得的好处,争论了两种类型的共同特性的子集。这种对共同性的需求反对利用某些技术先进系统风格固有的一些更新颖的特性。通过这种方式,对现有(广域)网络应用程序的巨大投资可以应用于本地上下文中,甚至可能更重要的是,安装在LAN环境中的应用程序也可以从其他更远程的系统访问并能够与之通信。
{"title":"Local area networks and the practical aspects of interworking","authors":"Kenneth S Heard","doi":"10.1016/0376-5075(83)90045-4","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90045-4","url":null,"abstract":"<div><p>The potential for cost-effective distribution and coordinated sharing of information processing systems is substantially enhanced by the recent emergence of comparatively cheap, very reliable, high speed local area networks (LANs). The lack of common interface specifications is however a major impediment to progress. The benefits to be gained by ensuring that the user accessible interface to a local area network provides identical functionality to that offered over a long haul network argue for a subset of features common to both types. This need for commonality argues against exploitation of some of the more novel features intrinsic to certain styles of technologically advanced systems. By this means, the enormous investment in existing (wide area) networked applications can be applied within a local context and, perhaps even more importantly, applications mounted in a LAN environment will also be accessible from, and be able to communicate with, other more remote systems.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 5","pages":"Pages 343-348"},"PeriodicalIF":0.0,"publicationDate":"1983-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90045-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91636256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
EUTECO European Teleinformatics Conference 欧洲电信信息学会议
Pub Date : 1983-08-01 DOI: 10.1016/0376-5075(83)90021-1
{"title":"EUTECO European Teleinformatics Conference","authors":"","doi":"10.1016/0376-5075(83)90021-1","DOIUrl":"10.1016/0376-5075(83)90021-1","url":null,"abstract":"","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 4","pages":"Pages 283-286"},"PeriodicalIF":0.0,"publicationDate":"1983-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90021-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"95357806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why a ring? 为什么是戒指?
Pub Date : 1983-08-01 DOI: 10.1016/0376-5075(83)90015-6
J.H Saltzer , K.T Pogran , D.D Clark

In a world increasingly populated with Ethernets and Ethernet-like nets there nevertheless continues to be a strong interest in rings of active repeaters for local data communication. This paper explores some of the engineering problems involved in designing a ring that has no central control. It then compares one ring design with the Ethernet on several different operational and subtle technical points of design, maintainability, and future prospects. On each of these points the ring possesses important or interesting advantages. At the same time, the most commonly cited advantage of a ring, “deterministic access time,” is shown to be illusory. The paper concludes that the data communication ring is a sound idea that will prove its value on operational rather than theoretical issues.

在以太网和类似以太网的网络日益普及的世界中,人们对用于本地数据通信的有源中继器环仍然有着浓厚的兴趣。本文探讨了设计无中心控制环所涉及的一些工程问题。然后,在设计、可维护性和未来前景等几个不同的操作和微妙的技术点上,将一种环形设计与以太网进行比较。在这些方面,戒指都具有重要的或有趣的优点。与此同时,最常被引用的环的优势,“确定性访问时间”,被证明是虚幻的。本文的结论是,数据通信环是一个合理的想法,将证明其在操作而不是理论问题上的价值。
{"title":"Why a ring?","authors":"J.H Saltzer ,&nbsp;K.T Pogran ,&nbsp;D.D Clark","doi":"10.1016/0376-5075(83)90015-6","DOIUrl":"https://doi.org/10.1016/0376-5075(83)90015-6","url":null,"abstract":"<div><p>In a world increasingly populated with Ethernets and Ethernet-like nets there nevertheless continues to be a strong interest in rings of active repeaters for local data communication. This paper explores some of the engineering problems involved in designing a ring that has no central control. It then compares one ring design with the Ethernet on several different operational and subtle technical points of design, maintainability, and future prospects. On each of these points the ring possesses important or interesting advantages. At the same time, the most commonly cited advantage of a ring, “deterministic access time,” is shown to be illusory. The paper concludes that the data communication ring is a sound idea that will prove its value on operational rather than theoretical issues.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 4","pages":"Pages 223-231"},"PeriodicalIF":0.0,"publicationDate":"1983-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90015-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134667647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Access strategies in packet mobile radio data networks 分组移动无线数据网络中的接入策略
Pub Date : 1983-08-01 DOI: 10.1016/0376-5075(83)90014-4
J.S. Riordon, S.A. Mahmoud, S.E. Aidarous, M. Niktash

This paper examines alternative shared channel access procedures for mobile packet radio data/voice systems. Natural pauses in speech allow the possibility of bandwidth savings through interleaving of talkspurts from many sources, as is done in packet data systems. The acceptability of such schemes lies in the resulting performance level; inevitable degradation through delay and blocking should be small. Access procedures are outlined for a two hop virtual circuit in which a fixed base station acts as a relay transmitter. Analysis shows that a reduction of 30–35% in bandwidth requirements can be obtained without serious performance loss.

本文研究了移动分组无线电数据/语音系统的可选共享信道访问程序。语音中的自然停顿允许通过来自许多源的谈话爆发的交错来节省带宽的可能性,就像在分组数据系统中所做的那样。这些方案的可接受性在于所产生的性能水平;延迟和阻塞导致的不可避免的退化应该很小。本文概述了两跳虚拟电路的接入程序,其中固定基站充当中继发射机。分析表明,在不造成严重性能损失的情况下,可以将带宽需求降低30-35%。
{"title":"Access strategies in packet mobile radio data networks","authors":"J.S. Riordon,&nbsp;S.A. Mahmoud,&nbsp;S.E. Aidarous,&nbsp;M. Niktash","doi":"10.1016/0376-5075(83)90014-4","DOIUrl":"10.1016/0376-5075(83)90014-4","url":null,"abstract":"<div><p>This paper examines alternative shared channel access procedures for mobile packet radio data/voice systems. Natural pauses in speech allow the possibility of bandwidth savings through interleaving of talkspurts from many sources, as is done in packet data systems. The acceptability of such schemes lies in the resulting performance level; inevitable degradation through delay and blocking should be small. Access procedures are outlined for a two hop virtual circuit in which a fixed base station acts as a relay transmitter. Analysis shows that a reduction of 30–35% in bandwidth requirements can be obtained without serious performance loss.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 4","pages":"Pages 211-221"},"PeriodicalIF":0.0,"publicationDate":"1983-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90014-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89682670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Protection and synchronisation in a message-switched system 消息交换系统中的保护和同步
Pub Date : 1983-08-01 DOI: 10.1016/0376-5075(83)90017-X
Jon Livesey, Eric Manning

In any computer system it is valuable to have methods for enforcing expected behaviour at runtime. (Capabilities and object-oriented architectures are mechanisms commonly used to address the problem.) In a message-switched system, all inter-process communication is done by the transmission of messages, and the problem of enforcing expected behaviour can be reduced to the problem of enforcing expected patterns of message transmission.

In this paper we give a method, called the Task Graph Language, for expressing expected patterns (policy) of message transmission. Such an expression is quite independent of the actual programs which pass messages, and can be used at runtime to check the validity of observed behaviour. The mechanism we provide to perform the runtime checking of observed vs. expected behaviour is called Token Lists.

This mechanism requires no esoteric hardware support and it can be used in both distributed and centralized systems. From another perspective, the user is provided with two independent, hence mutually redundant, ways to express his intent (the programs which pass messages and the Task Graph Language description), and the two expressions of intent are compared or matched at runtime as a checking mechanism. From still another perspective, the Task Graph Language and Token Lists permit a centralized representation of distributed control.

在任何计算机系统中,具有在运行时强制执行预期行为的方法都是有价值的。(功能和面向对象的体系结构是通常用于解决问题的机制。)在消息交换系统中,所有进程间通信都是通过消息传输完成的,强制执行预期行为的问题可以简化为强制执行消息传输的预期模式的问题。本文给出了一种任务图语言来表达消息传输的预期模式(策略)。这样的表达式完全独立于传递消息的实际程序,并且可以在运行时用于检查观察到的行为的有效性。我们提供的对观察到的行为和预期的行为进行运行时检查的机制称为令牌列表。这种机制不需要深奥的硬件支持,它可以在分布式和集中式系统中使用。从另一个角度来看,为用户提供了两种独立的、相互冗余的表达意图的方式(传递消息的程序和任务图语言描述),并且作为一种检查机制,这两种意图表达在运行时进行比较或匹配。从另一个角度来看,任务图语言和令牌列表允许分布式控制的集中表示。
{"title":"Protection and synchronisation in a message-switched system","authors":"Jon Livesey,&nbsp;Eric Manning","doi":"10.1016/0376-5075(83)90017-X","DOIUrl":"10.1016/0376-5075(83)90017-X","url":null,"abstract":"<div><p>In any computer system it is valuable to have methods for enforcing expected behaviour at runtime. (Capabilities and object-oriented architectures are mechanisms commonly used to address the problem.) In a message-switched system, all inter-process communication is done by the transmission of messages, and the problem of enforcing expected behaviour can be reduced to the problem of enforcing expected patterns of message transmission.</p><p>In this paper we give a method, called the <em>Task Graph Language</em>, for expressing expected patterns (policy) of message transmission. Such an expression is quite independent of the actual programs which pass messages, and can be used at runtime to check the validity of observed behaviour. The <em>mechanism</em> we provide to perform the runtime checking of observed <em>vs.</em> expected behaviour is called <em>Token Lists</em>.</p><p>This mechanism requires no esoteric hardware support and it can be used in both distributed and centralized systems. From another perspective, the user is provided with two independent, hence mutually redundant, ways to express his intent (the programs which pass messages and the Task Graph Language description), and the two expressions of intent are compared or matched at runtime as a checking mechanism. From still another perspective, the Task Graph Language and Token Lists permit a centralized representation of distributed control.</p></div>","PeriodicalId":100316,"journal":{"name":"Computer Networks (1976)","volume":"7 4","pages":"Pages 253-268"},"PeriodicalIF":0.0,"publicationDate":"1983-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0376-5075(83)90017-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117932253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Computer Networks (1976)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1