Communication Protocol Decomposition and Component-based Protocol Submodule
نویسندگان
چکیده
Due to evolving network technologies as well as increased and varying demands of modern applications on embedded systems, general-purpose protocol stacks are not always adequate. We examine the usefulness of component-based software engineering for the implementation of software communication systems. We present an architecture that allows dividing protocol software into fully de-coupled components. By plugging required components together, that is, loading proper protocol submodules for communication services, we rapidly prototype flexible, robust, and application-tailored communication protocols. The primary goal is the configurability of communication services, that is, the configurability of protocol submodules for each communication service according to application requirements and network capabilities. The achieved communication system supports efficiently and coordinately the multiple communication services customized by the coexisting applications.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملGame Theory based Energy Efficient Hybrid MAC Protocol for Lifetime Enhancement of Wireless Sensor Network
Wireless Sensor Networks (WSNs) comprising of tiny, power-constrained nodes are getting very popular due to their potential uses in wide applications like monitoring of environmental conditions, various military and civilian applications. The critical issue in the node is energy consumption since it is operated using battery, therefore its lifetime should be maximized for effective utilization ...
متن کاملA mild protocol for the preparation of 2-amino-dihydropyrano[3,2-b] pyran-3-carbonitriles via cobalt nanoparticles-catalyzed multi-component reaction in water
An improved rapid one-pot and green synthesis of substituted pyranopyranes by condensing Kojic acid, malononitrile, and different aldehydes and using a catalytic amount of cobalt nanoparticles as green and reusable catalyst is reported for the first time. The reaction proceeds in aqueous media at ambient temperature. Furthermore, the structural and morphological study of the cobalt nanoparticle...
متن کاملAn Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks
LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005