
At a Glance
416 Pages
24.13 x 15.88 x 3.18
Hardcover
$249.00
or 4 interest-free payments of $62.25 with
orShips in 5 to 7 business days
Industry Reviews
From the reviews:
"This book takes an unusual path to describe computer network protocols. ... Robin Sharp starts from formal description techniques. More precisely, he chooses the Communicating Sequential Processes (CSP) notation proposed by Hoare. ... could be of interest to readers who are more interested in the application of formal description techniques to network protocols." (IEEE Network, September/October, 2008)
"The book particularly reflects the recent developments in computer networks and distributed systems with special reference to applications. A number of new protocols are introduced with a focus on their current application, what is good stuff for students and researchers in the area. ... The book could be used for undergraduate third and fourth year courses in computer science and the network area. I am sure that this book will be a valuable asset in the educational and scientific community at large." (Aniket Mahanti, Zentralblatt MATH, Vol. 1142, 2008)
| Introduction | p. 1 |
| What is a Protocol? | p. 1 |
| Protocols as Processes | p. 3 |
| Techniques for Actual Protocols | p. 4 |
| Real Protocols | p. 4 |
| Reader's Guide | p. 5 |
| CSP Descriptions and Proof Rules | p. 7 |
| Processes and Process Synchronisation | p. 8 |
| Process Expressions | p. 9 |
| Process Algebra | p. 13 |
| Process Expressions for Process Networks | p. 20 |
| Channel History Semantics | p. 26 |
| Transitions and Traces | p. 26 |
| Inference Rules for Specifications Based on Traces | p. 29 |
| Failure Semantics | p. 35 |
| Protocols and Services | p. 45 |
| Providing a Service | p. 48 |
| Proving the Protocol Correct | p. 50 |
| Structuring your Proof | p. 54 |
| Service Features | p. 55 |
| Sequence Preservation | p. 56 |
| Data Unit Synchronisation | p. 56 |
| Flow Control | p. 56 |
| Freedom from Error | p. 57 |
| Service Reset | p. 58 |
| Connection Establishment and Release | p. 58 |
| Change of Mode | p. 60 |
| Information about Peer Change of State | p. 62 |
| Expedited Data | p. 63 |
| Security | p. 63 |
| OSI and Other Layered Architectures | p. 64 |
| The Internet and Other Layered Architectures | p. 66 |
| Basic Protocol Mechanisms | p. 71 |
| Sequence Control and Error Control | p. 73 |
| Corruption Control | p. 73 |
| Simple ACK/NACK protocols | p. 76 |
| Simple Polling Protocols | p. 77 |
| ACK/NACK Protocols with Timeout | p. 78 |
| The Alternating Bit Protocol | p. 80 |
| The Case of the Floating Corpses | p. 82 |
| Flow Control | p. 87 |
| Fixed Window Protocols | p. 88 |
| Protocols with Receive Window Size 1 | p. 89 |
| Protocols with Receive Window Size Greater than 1 | p. 92 |
| Dynamic Window Systems and the Concept of Credit | p. 93 |
| Indication of Change of Peer State | p. 94 |
| Two-way Exchanges | p. 94 |
| Atomic Two-way Exchanges | p. 96 |
| Exchanges in the Presence of Errors | p. 97 |
| Change of Service Mode | p. 100 |
| Connection-mode and Connectionless-mode | p. 100 |
| Point-to-point and Multi-peer | p. 101 |
| Simplex and Duplex | p. 101 |
| Multiplexing and Splitting | p. 102 |
| Multiplexing | p. 102 |
| Splitting | p. 110 |
| Segmentation and Reassembly | p. 112 |
| Prioritisation | p. 116 |
| Multi-peer Consensus | p. 121 |
| Reliable Broadcasts | p. 122 |
| Election | p. 126 |
| Commitment | p. 129 |
| Byzantine Agreement | p. 135 |
| Using unsigned messages | p. 136 |
| Using signed messages | p. 138 |
| Other forms of Byzantine agreement | p. 140 |
| Clock Synchronisation | p. 141 |
| Logical Clocks | p. 142 |
| Real time clocks | p. 144 |
| Byzantine Clock Synchronisation | p. 146 |
| Finding the Global State | p. 148 |
| Security | p. 155 |
| Cryptographic Methods | p. 155 |
| Encipherment | p. 156 |
| Secret Key Cryptosystems | p. 157 |
| Public Key Cryptosystems | p. 160 |
| Integrity | p. 164 |
| Digital Signatures | p. 167 |
| Entity Authentication | p. 170 |
| Authentication with Secret Key Cryptosystems | p. 171 |
| Authentication with Public Key Cryptosystems | p. 173 |
| Proofs of Authentication Protocols | p. 175 |
| Certification Authorities | p. 181 |
| Key Exchange | p. 184 |
| Non-cryptographic Methods | p. 186 |
| Naming, Addressing and Routing | p. 191 |
| General Principles of Naming and Addressing | p. 191 |
| Naming Strategies in the Upper Layers of the System | p. 194 |
| Directories and Servers | p. 197 |
| Distributed Directories | p. 199 |
| Internet Naming and the Internet DNS | p. 203 |
| Addressing Structures | p. 207 |
| OSI Addressing | p. 209 |
| Internet addressing | p. 210 |
| MOTIS/MHS Addressing | p. 214 |
| Routing | p. 215 |
| Flooding | p. 216 |
| Static Routing | p. 217 |
| Tree Routing | p. 218 |
| Centralised Adaptive Routing | p. 219 |
| Isolated Adaptive Routing | p. 221 |
| Distributed Adaptive Routing | p. 223 |
| Exploratory Routing | p. 226 |
| Congestion | p. 229 |
| Discarding | p. 231 |
| Limiting the Number of PDUs | p. 232 |
| Timeout-based control | p. 232 |
| Explicit feedback | p. 235 |
| Deadlock | p. 236 |
| Protocol Encoding | p. 241 |
| Simple Binary Encoding | p. 242 |
| TLV Encoding | p. 244 |
| ASN.1 Encoding | p. 246 |
| ASN.1 Types | p. 246 |
| ASN.1 Values | p. 248 |
| ASN.1 Encoding Rules | p. 248 |
| ASCII encodings | p. 251 |
| MIME encoding | p. 252 |
| S/MIME encoding | p. 255 |
| XML encoding | p. 257 |
| XML types | p. 263 |
| XML Security | p. 269 |
| Protocols in the OSI Lower Layers | p. 275 |
| Data Link Layer | p. 276 |
| Connection-mode | p. 276 |
| Connectionless-mode | p. 278 |
| Network Layer | p. 280 |
| Connection-mode | p. 280 |
| Connectionless-mode | p. 281 |
| Network Layer Security | p. 282 |
| Transport Layer | p. 284 |
| Connection-mode | p. 284 |
| Connectionless-mode | p. 288 |
| Application Support Protocols | p. 291 |
| Session Layer | p. 291 |
| Presentation Layer | p. 295 |
| Application Layer | p. 297 |
| Basic Application Service Elements | p. 298 |
| Association Control | p. 298 |
| Remote Operations | p. 299 |
| Commitment, Concurrency and Recovery | p. 301 |
| Client-server Systems | p. 303 |
| Remote Procedure Call | p. 304 |
| Binding | p. 307 |
| Asynchronous RPC | p. 307 |
| Object Services and Middleware | p. 309 |
| SOAP | p. 311 |
| Security Middleware | p. 316 |
| Application Protocols | p. 321 |
| File Transfer | p. 322 |
| ISO File Transfer and Management | p. 322 |
| Internet FTP | p. 326 |
| Network File System | p. 328 |
| Distributed Transaction Processing | p. 329 |
| Message Handling | p. 332 |
| The MOTIS Message Transfer Sub-layer | p. 333 |
| The MOTIS Interpersonal Messaging Service | p. 335 |
| Internet Mail Protocols | p. 337 |
| Hypertext and the World Wide Web | p. 340 |
| Uniform Resource ldentifiers | p. 340 |
| Hypertext Transfer Protocols | p. 342 |
| Web Caching | p. 346 |
| HTTP Authentication | p. 350 |
| Stateful HTTP and Cookies | p. 352 |
| Secure HTTP | p. 354 |
| Web Services | p. 356 |
| Web Service Description Language | p. 358 |
| Publication and Discovery of Web services | p. 361 |
| Web Service Architectures | p. 363 |
| Notation | p. 367 |
| Data Types and Variables | p. 367 |
| Data Values and Expressions | p. 367 |
| Processes and Process Expressions | p. 368 |
| Traces, Failures and Transitions | p. 369 |
| Inference Rules for Process Specifications | p. 369 |
| Security | p. 369 |
| Standardisation of Protocols | p. 371 |
| Standards Organisations | p. 371 |
| Standards Documents | p. 372 |
| ISO standards | p. 372 |
| ITU-T recommendations | p. 373 |
| Internet standards | p. 374 |
| References | p. 377 |
| Index | p. 389 |
| Table of Contents provided by Publisher. All Rights Reserved. |
ISBN: 9783540775409
ISBN-10: 3540775404
Published: 1st February 2008
Format: Hardcover
Language: English
Number of Pages: 416
Audience: Professional and Scholarly
Publisher: Springer Nature B.V.
Country of Publication: DE
Dimensions (cm): 24.13 x 15.88 x 3.18
Weight (kg): 0.76
Shipping
| Standard Shipping | Express Shipping | |
|---|---|---|
| Metro postcodes: | $9.99 | $14.95 |
| Regional postcodes: | $9.99 | $14.95 |
| Rural postcodes: | $9.99 | $14.95 |
Orders over $79.00 qualify for free shipping.
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In

Storytelling with Data
A Data Visualization Guide for Business Professionals, 10th Anniversary Edition
Hardcover
RRP $99.95
$70.99
OFF
























