Standard ML Signatures for a Protocol Stack
نویسندگان
چکیده
This paper describes the design of a protocol stack implemented in Standard ML. Standard ML's signatures are a language construct which can be used to specify or constrain the interface of a module. The design includes both a generic signature which generalizes all the protocol modules, and individual signatures speci c to each protocol module. The speci c signatures all inherit from the generic signature. The implementation of each protocol is parametrized, so protocols can be composed into custom protocol stacks. The parameter to each protocol is constrained only by the generic signature, and this lets any protocol instance satisfying a speci c signature be used as the parameter to any other protocol. As a result, the design and implementation are highly modular, and syntactic compatibility between modules is checked by the compiler. To provide some context for the discussion of the signatures, some of the details of the implementation are also presented. Authors' electronic mail addresses are: [email protected], [email protected], and [email protected],
منابع مشابه
Signatures for a Network Protocol Stack : A Systems Application of Standard ML Edoardo Biagioni
متن کامل
A Network Protocol Stack in Standard ML
The FoxNet is an implementation of the standard TCP/IP networking protocol stack using the Standard ML (SML) language. SML is a type-safe programming language with garbage collection, a unique and advanced module system, and machineindependent semantics. The FoxNet is a user-space implementation of TCP/IP that is built in SML by composing modular protocol elements; each element independently im...
متن کاملA traceable optimistic fair exchange protocol in the standard model
An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, which involves in the protocol if it is necessary. But there is a security problem when a...
متن کاملUsing Machine Learning Techniques for Advanced Passive Operating System Fingerprinting
TCP/IP fingerprinting is the active or passive collection of information usually extracted from a remote computer’s network stack. The combination of such information can be then used to infer the remote operating system (OS fingerprinting). OS fingerprinting is traditionally based on a database of “signatures”. A signature comprises several features (i.e., pairs attribute/value) extracted from...
متن کاملAn Information-sharing Architecture for Wireless Sensor Networks
Recent work on cross-layer schemes have demonstrated the need for a unifying wireless sensor networks architecture that provides more integration than the standard layered OSI protocol stack yet is flexible enough to support different applications. In this paper, we propose a new informationsharing architecture for sensor networks that can support existing protocols while simultaneously providi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1993