Communication Protocol Decomposition and Component-based Protocol Submodule

نویسندگان

  • Tianzhou Chen
  • Quan Gan
  • Wei Hu
  • Jiangwei Huang
چکیده

Due to evolving network technologies as well as increased and varying demands of modern applications on embedded systems, general-purpose protocol stacks are not always adequate. We examine the usefulness of component-based software engineering for the implementation of software communication systems. We present an architecture that allows dividing protocol software into fully de-coupled components. By plugging required components together, that is, loading proper protocol submodules for communication services, we rapidly prototype flexible, robust, and application-tailored communication protocols. The primary goal is the configurability of communication services, that is, the configurability of protocol submodules for each communication service according to application requirements and network capabilities. The achieved communication system supports efficiently and coordinately the multiple communication services customized by the coexisting applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Game Theory based Energy Efficient Hybrid MAC Protocol for Lifetime Enhancement of Wireless Sensor Network

Wireless Sensor Networks (WSNs) comprising of tiny, power-constrained nodes are getting very popular due to their potential uses in wide applications like monitoring of environmental conditions, various military and civilian applications. The critical issue in the node is energy consumption since it is operated using battery, therefore its lifetime should be maximized for effective utilization ...

متن کامل

A mild protocol for the preparation of 2-amino-dihydropyrano[3,2-b] pyran-3-carbonitriles via cobalt nanoparticles-catalyzed multi-component reaction in water

An improved rapid one-pot and green synthesis of substituted pyranopyranes by condensing Kojic acid, malononitrile, and different aldehydes and using a catalytic amount of cobalt nanoparticles as green and reusable catalyst is reported for the first time. The reaction proceeds in aqueous media at ambient temperature. Furthermore, the structural and morphological study of the cobalt nanoparticle...

متن کامل

An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005