A design method for communications software evolution

H. Okuyama, K. Moriyasu, Y. Hirakawa
{"title":"A design method for communications software evolution","authors":"H. Okuyama, K. Moriyasu, Y. Hirakawa","doi":"10.1109/ICNP.1994.344364","DOIUrl":null,"url":null,"abstract":"This paper discusses a verification method for communication services on a network in which new service functions are added to only some of the network nodes. Communication networks are becoming larger, and new functions are constantly required for communication services. In a large-scale network, however it as very difficult to update all node functions simultaneously. In this case, in a single network there will be nodes that have both new and existing functions and other nodes having only existing functions. This situation might result in illegal actions in communications between functionally updated nodes and non-updated nodes. We clarify the fundamental properties of illegal actions, present an algorithm for detecting them and show that the algorithm is practical enough from the viewpoint of the order of complexity.<<ETX>>","PeriodicalId":275870,"journal":{"name":"Proceedings of ICNP - 1994 International Conference on Network Protocols","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1994-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of ICNP - 1994 International Conference on Network Protocols","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNP.1994.344364","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This paper discusses a verification method for communication services on a network in which new service functions are added to only some of the network nodes. Communication networks are becoming larger, and new functions are constantly required for communication services. In a large-scale network, however it as very difficult to update all node functions simultaneously. In this case, in a single network there will be nodes that have both new and existing functions and other nodes having only existing functions. This situation might result in illegal actions in communications between functionally updated nodes and non-updated nodes. We clarify the fundamental properties of illegal actions, present an algorithm for detecting them and show that the algorithm is practical enough from the viewpoint of the order of complexity.<>
通信软件进化的设计方法
本文讨论了一种仅在部分网络节点上添加新业务功能的网络通信业务验证方法。通信网络规模不断扩大,通信业务不断需要新的功能。然而,在大规模网络中,同时更新所有节点功能是非常困难的。在这种情况下,在单个网络中,将存在既具有新功能又具有现有功能的节点,而其他节点仅具有现有功能。这种情况可能导致功能更新节点和未更新节点之间的通信发生非法操作。我们阐明了非法行为的基本性质,提出了一种检测非法行为的算法,并从复杂度的角度证明了该算法是足够实用的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信