Transactions on Petri Nets and Other Models of Concurrency III : Lecture Notes in Computer Science - Kurt Jensen

Transactions on Petri Nets and Other Models of Concurrency III

By: Kurt Jensen, Jonathan Billington (Editor), Maciej Koutny (Editor)

Paperback | 11 November 2009

At a Glance

Paperback


$111.38

or 4 interest-free payments of $27.84 with

 or 

Aims to ship in 7 to 10 business days

AccordingtoHolzmann [14], protocol speci?cationscomprise ?veelements: the service the protocol provides toits users; the set of messages that are exchanged between protocol entities; the format of each message; the rules governingm- sage exchange (procedures); and the assumptionsabout the environment in which the protocol is intended tooperate. In protocol standards documents, information related to the operatingenvironment isusually writteninformally andmayoccur in several di?erentplaces [37]. This informal speci?cation style canlead to misunderstandings andpossibly incompatible implementations. In contrast,executableformalmodelsrequireprecisespeci?cations oftheoperating environment. Ofparticularsigni?canceisthecommunicationmediumorchannel over which the protocol operates. Channelscan havedi?erent characteristics depending on the physical media (e. g. optical ?bre, copper, cable orunguided media (radio)) they employ. The characteristics also depend on the levelof the protocol inacomputer protocol architecture. Forexample, the link-leveloperates over a singlemedium,whereas the network, transport andapplication levelsmayoperate over a network,or network of networks such as the Internet,which couldemploy several di?erent physical media. Channels (such as satellite links) can be noisy resulting in bit errors in packets. To correct biterrors in packets, many importantprotocols (such the Internet's TransmissionControl Protocol [27]) use CyclicRedundancy Checks (CRCs)[28] to detect errors. On detectingan error,the receiver discards the packet andrelies on the sender to retransmit itforrecovery,known as Au- maticRepeatreQuest(ARQ)[28]. Thisisachievedbythereceiveracknowledging the receipt of good packets, andby the transmitter maintainingatimer. When the timer expires before an acknowledgementhasbeen received, the transmitter retransmits packets that havebeen sent but are as yet notacknowledged. It may also be possibleforpacketsto be lost due to routers in networks discarding packets when congested.

More in Computer Science

2054 : A Novel - Elliot Ackerman

Paperback

RRP $22.99

$20.35

11%
OFF
Windows 11 For Seniors For Dummies, 2nd Edition - Curt Simmons
The Nvidia Way : Jensen Huang and the Making of a Tech Giant - Tae Kim
Robotics Goes MOOC : Interaction - Bruno Siciliano
Information Governance Technologies : A Guide - William Saffady

RRP $270.00

$243.25

10%
OFF
Fuzzy Methods for Assessment and Decision Making - Michael Gr. Voskoglou

RRP $272.95

$242.25

11%
OFF
Python All-in-One For Dummies : 3rd Edition - John C. Shovic

RRP $74.95

$55.50

26%
OFF
Emerging Trends in Computer Science and Its Application - Anurag Tiwari
Life 3.0 : Being Human in the Age of Artificial Intelligence - Max Tegmark
Co-Intelligence : Living and Working with AI - Ethan Mollick

RRP $36.99

$29.75

20%
OFF