scispace - formally typeset
Search or ask a question

Showing papers on "Protocol (object-oriented programming) published in 2002"


Journal ArticleDOI
TL;DR: A new protocol, flexible time-triggered communication on controller area network, is presented, which fulfills both requirements: it supports time- Triggered Communication in a flexible way as well as being an efficient combination of both time- and event- triggered traffic with temporal isolation.
Abstract: The requirement for flexible operation is becoming increasingly important in modern industrial systems. This requirement has to be supported at all system levels, including the field level in process industry, as well as the cell and machine control levels in manufacturing industry, where fieldbus-based communication systems are commonly found. Furthermore, typical applications at these levels require both time- and event-triggered communication services, in most cases under stringent timing constraints, to convey state data in the former case and alarms and management data in the latter. However, neither the requirement for flexible operation under guaranteed timeliness nor for joint support of time and event-triggered traffic are efficiently fulfilled by most of existing fieldbus systems. This paper presents a new protocol, flexible time-triggered communication on controller area network, which fulfills both requirements: it supports time-triggered communication in a flexible way as well as being an efficient combination of both time- and event-triggered traffic with temporal isolation. These types of traffic are handled by two complementary subsystems, the synchronous and the asynchronous messaging systems, respectively. The paper includes a justification for the new protocol as well as its description and worst case temporal analysis for both subsystems. This analysis shows the capability of the protocol to convey real-time traffic of either type.

311 citations


Proceedings ArticleDOI
17 May 2002
TL;DR: A new type system that reduces restrictions on aliasing with the adoption and focus constructs is proposed, which safely allows a programmer to alias objects on which she is checking protocols, and focus allows the reverse.
Abstract: A type system with linearity is useful for checking software protocols andresource management at compile time. Linearity provides powerful reasoning about state changes, but at the price of restrictions on aliasing. The hard division between linear and nonlinear types forces the programmer to make a trade-off between checking a protocol on an object and aliasing the object. Most onerous is the restriction that any type with a linear component must itself be linear. Because of this, checking a protocol on an object imposes aliasing restrictions on any data structure that directly or indirectly points to the object. We propose a new type system that reduces these restrictions with the adoption and focus constructs. Adoption safely allows a programmer to alias objects on which she is checking protocols, and focus allows the reverse. A programmer can alias data structures that point to linear objects and use focus for safe access to those objects. We discuss how we implemented these ideas in the Vault programming language.

300 citations


Proceedings ArticleDOI
10 Dec 2002
TL;DR: This paper proposes a novel distributed service discovery protocol for mobile ad hoc networks based on the concept of peer-to-peer caching of service advertisements and group-based intelligent forwarding of service requests and exploits the semantic class/subclass hierarchy of DAML to describe service groups.
Abstract: This paper proposes a novel distributed service discovery protocol for mobile ad hoc networks. The protocol is based on the concept of peer-to-peer caching of service advertisements and group-based intelligent forwarding of service requests. It does not require a service to register to a registry or lookup server. Services are described using an ontology based on the DARPA agent markup language (DAML+OIL). We exploit the semantic class/subclass hierarchy of DAML to describe service groups and use this semantic information to selectively forward service requests to respective nodes. DAML-based service description helps us in achieving increased flexibility in service matching. We also present simulation results of our protocol and show that our protocol achieves increased efficiency in discovering services by efficiently utilizing bandwidth by controlling forwarding of service requests.

261 citations


Patent
22 May 2002
TL;DR: In this article, client computing devices utilize protocol components that may be obtained from a server computing device via a network to communicate with medical devices in a communications protocol supported by the medical device.
Abstract: Systems, client computing devices, server computing devices, and methods are disclosed for accessing medical devices, providing remote access to medical devices and/or remotely accessing medical devices. In one exemplary embodiment, client computing devices utilize protocol components that may be obtained from a server computing device via a network to communicate with medical devices in a communications protocol supported by the medical device.

245 citations


Patent
09 Aug 2002
TL;DR: An application programming interface as mentioned in this paper implements a method for transparently switching from one communication protocol to another and for restoring the state of a previous connection on a local, client computer, as well as remote computers.
Abstract: An application programming interface implements a method for transparently switching from one communication protocol to another and for restoring the state of a previous connection. The application programming interface executes on a local, client computer, as well as remote computers. It includes functions that multi-user application programs can call to communicate in a device independent manner with other applications executing on remote computers. To support communication on a variety of different computer communication protocols, the application programming interface accesses programs called service providers that implement the communication protocols and support the message passing model of the interface. The application programming interface can transparently switch the protocol on a remote computer by sending a system message to a compatible version of the interface on the remote computer that includes an identifier of the service provider for the new protocol. In response to the message, the application programming interface loads the new service provider and takes steps to set-up a new connection. The application programming interface can also restore the state of previous connection on a remote computer by sending a system message. In response to this message, the application programming interface on the remote computer retrieves the previous connection state from an MRU stack and loads the service provider for the previous connection.

221 citations


01 May 2002
TL;DR: This document provides a high level introduction to the capabilities supported by the Stream Control Transmission Protocol (SCTP).
Abstract: This document provides a high level introduction to the capabilities supported by the Stream Control Transmission Protocol (SCTP). It is intended as a guide for potential users of SCTP as a general purpose transport protocol.

189 citations


Patent
13 Mar 2002
TL;DR: A data structure defining a presence protocol, a device, a server, a system and method to provide management of presence information as a standalone service as well as part of the instant messaging service of a communication system is presented in this article.
Abstract: A data structure defining a presence protocol, a device, a server (27), a system and method to provide management of presence information (33) as a standalone service as well as part of the instant messaging service (32) of a communication system.

171 citations


Patent
04 Oct 2002
TL;DR: In this article, a modularized approach is provided for implementing an online psychological service, which is made up of modules consisting of specific techniques, procedures, tests, or skills, and the parameters associated with the modules are customizable to accommodate appropriate needs of a client.
Abstract: A modularized approach is provided for implementing an online psychological service. The service is made up of modules consisting of specific techniques, procedures, tests, or skills. The parameters associated with the modules are customizable to accommodate appropriate needs of a client. Furthermore, clients are able to assimilate more than one module into protocols to fit their needs. For example, clients are able to put together a set of modules to come up with a protocol for treating a specific disorder.

154 citations


Proceedings ArticleDOI
19 Jun 2002
TL;DR: An overview about the work previously done towards real-time communication on Ethernet is presented and a new protocol, FTT-Ethernet, which relies on common network adapters and on a new transmission control named master/multi-slave that efficiently supports hard-real-time operation in a flexible way is presented.
Abstract: Despite having been designed to interconnect office equipment such as computers and printers, since its early daysEthernet has also been considered for use in the industrial domain. However, it was not originally developed to meet the requirements of real-time industrial automation systems and it was commonly considered unsuited for applications at the field level, i.e.to interconnect sensors, actuators and controllers. Therefore, along its 30 years of existence, several proposals have been presented to make this protocol exhibit real-timebehaviour. Nevertheless, these proposals either require specialised hardware, or are suited to soft-real-time operation only, or are bandwidth or response-time inefficient. This paper presents an overview about the work previously done towards real-time communication on Ethernet. Then, it presents a new protocol, FTT-Ethernet, which relies on common network adapters and on a new transmission control named master/multi-slave that efficiently supports hard-real-time operation in a flexible way.

142 citations



Journal ArticleDOI
TL;DR: This work develops a specification methodology that documents and specifies a cache coherence protocol in eight tables: the states, events, actions, and transitions of the cache and memory controllers, and demonstrates the utility of the table-based specification methodology.
Abstract: We develop a specification methodology that documents and specifies a cache coherence protocol in eight tables: the states, events, actions, and transitions of the cache and memory controllers. We then use this methodology to specify a detailed, modern three-state broadcast snooping protocol with an unordered data network and an ordered address network that allows arbitrary skew. We also present a detailed specification of a new protocol called multicast snooping (Bilir et al., 1999) and, in doing so, we better illustrate the utility of the table-based specification methodology. Finally, we demonstrate a technique for verification of the multicast snooping protocol, through the sketch of a manual proof that the specification satisfies a sequentially consistent memory model.

Patent
Maurice N. Ransom1
06 Mar 2002
TL;DR: In this paper, a method and a tool that bring about a user interface consistent for telephones of a plurality of manufacturers is proposed. But the tool is limited to the case of mobile phones.
Abstract: PROBLEM TO BE SOLVED: To provide a method and a tool that bring about a user interface consistent for telephones of a plurality of manufacturers. SOLUTION: A telecommunications network (30) includes a plurality of devices that communicate using a certain protocol, such as SIP. Packet phones (32) communicate with the network devices using GPSs (34). The GPSs (34) provide a GUI (graphical user interface) for the packet phones (32). As the user operates the GUI to perform functions, event data is sent to the GPS (34) associated with the phone. The GPS (34) interprets the event data and generates SIP (or other protocol) commands to start, modify and terminate communication sessions as desired by the user. COPYRIGHT: (C)2010,JPO&INPIT

Patent
08 Jul 2002
TL;DR: Point-to-point protocols as discussed by the authors provide communication exchange between a first device and a second device by negotiating an exchange rate and establishing a connection for the communication between the first and second devices.
Abstract: A Point-to-point protocol configured to provide communication exchange between a first device and a second device. The point-to-point protocol is configured to negotiate an exchange rate and establish a connection for the communication exchange between the first and second device. As system dynamics change, the point-to-point protocol is also configured to permit application programs in the first device and the second device to request renegotiation of the exchange rate at any time. The point-to-point protocol is also configured to provide confirmation to a sending application program that information was delivered to a receiving application program.

Proceedings ArticleDOI
15 Jul 2002
TL;DR: A secure dynamic programming protocol that utilizes homomorphic encryption is presented that can solve the winner determination problem, while the information of bids that are not part of the optimal solution is kept secret even from the auction servers.
Abstract: This paper presents a secure dynamic programming protocol that utilizes homomorphic encryption. By using this method, multiple agents can solve a combinatorial optimization problem among them without leaking their private information. More specifically, in this method, multiple servers cooperatively perform dynamic programming procedures for solving a combinatorial optimization problem by using the private information sent from agents as inputs. Although the severs can compute the optimal solution correctly, the inputs are kept secret even from the servers.Such a secure protocol is important when a fully trusted agent is not available, e.g., an auctioneer cannot be fully trusted in a combinatorial auction. By utilizing the proposed protocol, multiple auction servers can solve the winner determination problem, while the information of bids that are not part of the optimal solution is kept secret even from the auction servers. We discuss the application of this protocol to various types of combinatorial auctions, i.e., multi-unit auctions, linear-good auctions, and general combinatorial auctions.

Journal ArticleDOI
01 Mar 2002
TL;DR: This paper shows the placement and functionality of B2B engines in semantic B 2B integration architectures that implement a generic framework for modeling and executing any B2 B protocol.
Abstract: Semantic B2B Integration architectures must enable enterprises to communicate standards-based B2B events like purchase orders with any potential trading partner. This requires not only back end application integration capabilities to integrate with e.g. enterprise resource planning (ERP) systems as the company-internal source and destination of B2B events, but also a capability to implement every necessary B2B protocol like Electronic Data Interchange (EDI), RosettaNet as well as more generic capabilities like web services (WS). This paper shows the placement and functionality of B2B engines in semantic B2B integration architectures that implement a generic framework for modeling and executing any B2B protocol. A detailed discussion shows how a B2B engine can provide the necessary abstractions to implement any standard-based B2B protocol or any trading partner specific specialization.

Patent
05 Apr 2002
TL;DR: In this article, a real-time protocol for network programming applications is described, where changes in these variables are encapsulated in variable change messages which are propagated in the network using communication objects.
Abstract: A real-time protocol for real-time network programming applications is disclosed. The protocol is executable on a computer network having a plurality of nodes that include applications, a network stack, an operating system, and middleware capable of executing real-time operations. The protocol can use group objects to model physical and logical devices connected to the network wherein each group object comprises at least one variable. Changes in these variables are encapsulated in variable change messages which are propagated in the network using communication objects. Also described is a real-time messaging format useful for implementing the protocol.

Patent
16 Apr 2002
TL;DR: In this paper, a system and method for virtual networking (100) is described, in which Switched Ethernet local area network semantics are provided over an underlying point-to-point mesh.
Abstract: A system and method for virtual networking (100). Switched Ethernet local area network semantics are provided over an underlying point to point mesh. Computer processor nodes may directly communicate via virtual interfaces over a switch fabric or they may communicate via an ethernet switch emulator (115a, 115b). ARP (adress resolution protocol) logic (135) is used to associate IP adresses with virtual interfaces while allowing computer processors to reply to ARP requests with virtual MAC addresses.

Patent
23 Aug 2002
TL;DR: In this paper, an enhanced general input/output communication architecture, protocol and related methods are presented, and the authors present an enhanced GIC protocol, protocol, and communication architecture.
Abstract: An enhanced general input/output communication architectue, protocol and related methods are presented.

Patent
Paul E. Reilly1
04 Nov 2002
TL;DR: In this paper, a centralized queue for a network printing system is provided for allowing clients of a network printer to make job requests and enter a spot in a job queue without transmitting the actual print job data to the network.
Abstract: A centralized queue for a network printing system is provided for allowing clients of a network printer to make job requests and enter a spot in a job queue without transmitting the actual print job data to the network. More particularly, an imaging device protocol (IDP) is provided which operates independently of the network layers below and only requires that a transport protocol/port be bidirectional. A wide variety of heterogenous network protocols may be supported by IDP for placing all of the incoming print job information in a print queue regardless of the protocol. Print job information from both IDP and non-IDP protocol/ports may be placed in the print queue by emulating IDP on the non-IDP protocol/ports. As a result, job information for all of the print jobs attempting to access a busy printer may be stored in the print queue so that the print jobs can be printed by the printer with a fair arbitration once the network printer becomes available.

Patent
15 Oct 2002
TL;DR: The J2EE Connector as mentioned in this paper provides a common protocol to allow applications having different protocols to communicate with each other, as well as with components such as enterprise system and integration system components.
Abstract: Functionality can be built upon the J2EE Connector architecture when integrating applications. Bi-directional communication can be added to the system, and a common protocol can be used so that each application does not need to be integrated with every other application. A common protocol can be used, such as by application view components, to allow applications having different protocols to communicate with each other, as well as with components such as enterprise system and integration system components. The applications do not have to know the other protocols, or even that they exist.

Patent
27 Jun 2002
TL;DR: In this paper, the authors describe a remote services communication module which includes a communication protocol and a communication encryption module, which provides support for an application level protocol used in a remote service system.
Abstract: The invention relates to a remote services communication module which includes: a communication protocol and a communication encryption module The communication protocol module provides support for an application level protocol used in a remote services system The communication encryption module supports plug-in encryption modules

Book ChapterDOI
11 Apr 2002
TL;DR: Using the model built, Spin can find a known attack on the protocol, and it correctly validates the fixed version of the protocol.
Abstract: This paper explores the use of Spin for the verification of cryptographic protocol security properties. A general method is proposed to build a Promela model of the protocol and of the intruder capabilities. The method is illustrated showing the modeling of a classical case study, i.e. the Needham-Schroeder Public Key Authentication Protocol. Using the model so built, Spin can find a known attack on the protocol, and it correctly validates the fixed version of the protocol.

Journal ArticleDOI
TL;DR: An overview of different methods for resolving ontology mismatches is presented and the Ontology Negotiation Protocol (ONP) is motivated as a method that addresses some problems with other approaches.
Abstract: This paper describes an approach to ontology negotiation between agents supporting intelligent information management. Ontologies are declarative (data-driven) expressions of an agent's “world”: the objects, operations, facts and rules that constitute the logical space within which an agent performs. Ontology negotiation enables agents to cooperate in performing a task, even if they are based on different ontologies.Our objective is to increase the opportunities for “strange agents” – that is, agents not necessarily developed within the same framework or with the same contextual operating assumptions – to communicate in solving tasks when they encounter each other on the web. In particular, we have focused on information search tasks.We have developed a protocol that allows agents to discover ontology conflicts and then, through incremental interpretation, clarification and explanation, establish a common basis for communicating with each other. We have implemented this protocol in a set of Java classes that can be added to a variety of agents, irrespective of their underlying ontological assumptions. We have demonstrated the use of the protocol, through this implementation, in a test-bed that includes two large scientific archives: NASA's Global Change Master Directory and NOAA's Wind and Sea Index.This paper presents an overview of different methods for resolving ontology mismatches and motivates the Ontology Negotiation Protocol (ONP) as a method that addresses some problems with other approaches. Much remains to be done. The protocol must be tested in larger and less familiar contexts (for example, numerous archives that have not been preselected) and it must be extended to accommodate additional forms of clarification and ontology evolution.

Patent
31 May 2002
TL;DR: In this article, a user interface is developed to guide the user to define a particular type of extension for one or more systems, and a series of generic templates may be used to generate the particular objects to be added to each system.
Abstract: A system may be customized by adding one or more software objects without detailed knowledge of the data model or the programming techniques used in the system. A user interface may be developed to guide the user to define a particular type of extension for one or more systems. The user-entered extension definition and a series of generic templates may be used to generate the particular objects to be added to each system.

Patent
06 Aug 2002
TL;DR: In this paper, an offloading protocol control and conversion system for microprocessor-based systems is described. But it does not specify the offloading of protocol control in the context of a USB-based device.
Abstract: Systems are provided for the offloading of protocol control and conversion information within microprocessor-based systems. A converter controller comprises a first interface and protocol, as well as a second interface and protocol. An intermediate protocol and interface is interconnected to both the first protocol and the second protocol, and forwards or offloads protocol information to the system CPU, which comprises device driver information for protocol conversion and/or control. The CPU acts upon the received protocol information, performs protocol conversion as necessary, and forwards the converted protocol information back to the converter controller through the intermediate interface. Some embodiments of the offloading protocol conversion system comprise a SDIO controller within a USB-based device.

Patent
25 Jul 2002
TL;DR: In this article, a system and method for protocol independent communication between mobile electronic devices is presented, where a multimedia controller in connection with control agents provides the information to establish communications between mobile devices having applications with incompatible communication protocols.
Abstract: A system and method provides protocol independent communication between mobile electronic devices. Multiple users may communicate using different applications running on different mobile electronic devices with different end-to-end protocols. A multimedia controller in connection with control agents provides the information to establish communications between mobile electronic devices having applications with incompatible communication protocols. A session and routing controller controls communication sessions and a Web hyperlink dictionary provides information regarding the location of the multimedia controller and control agents.

Proceedings ArticleDOI
28 Jan 2002
TL;DR: The proposed virtual overlay network is designed to access a variety of appliances on home networks from personal or home appliances on other home networks and thinks that the approach proposed will also be useful for building virtual overlay networks for other applications such as continuous media streaming or peer-to-peer storage systems.
Abstract: Various home appliances and personal appliances are expected to be connected to the Internet in the near future. However, the conventional IP protocol is not expected to be sufficient for connecting these appliances without protocol translation. Since adding new functionalities to the IP protocol is too generic for most applications, we believe that future networks should be customized according to the characteristics of the respective applications. We propose a virtual overlay network for integrating networked home appliances. Virtual overlay networks enable new application-specific networks to be built on existing networks. The proposed virtual overlay network is designed to access a variety of appliances on home networks from personal or home appliances on other home networks. The paper describes the motivation of our work, and the design and the current status of the proposed virtual overlay network. We think that the approach proposed will also be useful for building virtual overlay networks for other applications such as continuous media streaming or peer-to-peer storage systems.

Book ChapterDOI
20 Mar 2002
TL;DR: This paper develops algorithms for the synthesis of adapters, coercing incompatible components into meeting requirements, concentrating on adapters for concurrent systems, where adapters are able to resolve synchronisation problems of concurrent components.
Abstract: In general few components are reused as they are. Often, available components are incompatible with what is required. This necessitates component adaptations or the use of adapters between components. In this paper we develop algorithms for the synthesis of adapters, coercing incompatible components into meeting requirements. We concentrate on adapters for concurrent systems, where adapters are able to resolve synchronisation problems of concurrent components. A new interface model for components, which includes protocol information, allows us to generate these adapters semi-automatically.

Journal Article
TL;DR: AVISS, a tool for security protocol analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction is introduced.
Abstract: We introduce AVISS, a tool for security protocol analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 protocols, including 31 problems in the Clark-Jacob's protocol library and a previously unreported flaw in the Denning-Sacco protocol.

Patent
08 May 2002
TL;DR: In this paper, the authors present a device and related systems and methods to connect a device with a native protocol to an otherwise incompatible system or network, where each device is accessible and controllable through the data network.
Abstract: The present invention provides a device and related systems and methods to connect a device with a native protocol to an otherwise incompatible system or network. The invention provides a computer program product with a network protocol stack that maintains bi-directional communication with a data network according to one or more predetermined protocols; a plurality of device drivers that maintain bi-directional communications with one or more device networks according to one or more device protocols; a control object that contains a plurality of data translation objects, each data translation object storing data for a device such as a network element connected to one of the one or more device networks including at least one of input, output, and control data for the device, the control object updating each translation object preferably in real time, and the control object managing access to the plurality of data translation objects from the data network; whereby each of the devices is accessible and controllable through the data network.