scispace - formally typeset
Search or ask a question

Showing papers by "Kenneth L. Calvert published in 1990"


Journal ArticleDOI
01 Jan 1990
TL;DR: Three different methods for finding a protocol converter are described, two of which are bottom up in nature, and involve relating the conversion system to existing protocols, and one which is new, which is top down: the desired global properties of the converted system are used in deriving the converter.
Abstract: Consideration is given to ways of overcoming a protocol mismatch using protocol conversion. Three different methods for finding a protocol converter are described. Two of these are bottom up in nature, and involve relating the conversion system to existing protocols. The third approach, which is new, is top down: the desired global properties of the conversion system are used in deriving the converter. An example is used to illustrate each method. The authors discuss more general forms of the abstract problem in the context of layered network architectures. >

78 citations


Proceedings ArticleDOI
03 Jun 1990
TL;DR: The use of adaptors for protocol conversion in heterogeneous data networks with layered architectures is proposed, a form of protocol converter enabling a peer component of one protocol to simulate a peer of a different protocol.
Abstract: The use of adaptors for protocol conversion in heterogeneous data networks with layered architectures is proposed. An adaptor is a form of protocol converter enabling a peer component of one protocol to simulate a peer of a different protocol. Adaptors have several advantages over other conversion architectures, especially gateway-type converters: they avoid bottlenecks at network boundaries, and a message is translated twice at most on its way from one peer to the other; adaptors are well-suited for conversion among multiple protocols; and the definition of an adaptor as the quotient of known components is simpler than for other converters, making it simpler to compute an adaptor algorithmically or to verify one derived heuristically. The approach is illustrated with an example involving three different connection-management protocols. >

24 citations