Recovery of communications protocol design from protocol execution traces

K Saleh, R Probert, I Manonmani - Proceedings of ICECCS'96 …, 1996 - ieeexplore.ieee.org
… for the synthesis of protocol design from execution protocol traces. The recovered design is
… for defining the behaviour of communication services and protocols, and distributed systems …

Recovery of CFSM-based protocol and service design from protocol execution traces

K Saleh, R Probert, K Al-Saqabi - Information and Software Technology, 1999 - Elsevier
… In a real time communication protocol, different combinations of events may occur concurrently.
But only some particular combinations of concurrent events may have an adverse effect …

[PDF][PDF] Maranello: Practical Partial Packet Recovery for 802.11.

B Han, A Schulman, F Gringoli, N Spring… - NSDI, 2010 - usenix.org
… We compare Maranello to alternative recovery protocols using a trace-… recovery mechanisms
including partial packet recovery schemes and those that rely on wire- less communication

Let it recover: multiparty protocol-induced recovery

R Neykova, N Yoshida - … of the 26th International Conference on …, 2017 - dl.acm.org
recovery algorithm incurs less communication cost (only affected processes are notified) and
overall execution time … After reconfiguration, new monitors are created by deleting all traces

Protocol design for scalable and reliable group rekeying

XB Zhang, SS Lam, DY Lee… - IEEE/ACM Transactions …, 2003 - ieeexplore.ieee.org
… benefit from using a secure group communications model [9]. In … for each user who cannot
recover its new keys during the … 17 and 18 plot the traces of the number of NACKs for the first …

PPR: Partial packet recovery for wireless networks

K Jamieson, H Balakrishnan - … SIGCOMM Computer Communication …, 2007 - dl.acm.org
… PP-ARQ protocol as described in Section 6. Our results in this section are from trace-driven
simulation of PP-ARQ, using traces from the testbed of Figure 8. Using trace-driven simulation…

[PDF][PDF] NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.

Y Ye, Z Zhang, F Wang, X Zhang, D Xu - NDSS, 2021 - cs.purdue.edu
… Network Protocol 3 (DNP3), which is a communication protocol … The trace records information
about sent time, IP addresses … network traces (acquired by Tencent Habo [10]) and recover

The HOP protocol: Reliable latency-bounded end-to-end multipath communication

F Chiariotti, A Zanella, S Kucera… - IEEE/ACM …, 2021 - ieeexplore.ieee.org
… of-the-art multipath protocols in ns-3 simulations using both synthetic and live network traces,
and … has not been tested in these kinds of scenarios, we expect SKIP to be able to recover

Automatic retrieval and analysis of high availability scenarios from system execution traces: A case study on hot standby router protocol

M Sheghdara, J Hassine - Journal of Systems and Software, 2020 - Elsevier
… , such as networking and communications, that cannot afford … and produce huge amounts
of execution trace data, where … run-time behavior of a system based on its execution traces. …

[BOOK][B] Principles of protocol design

R Sharp - 2008 - Springer
… consider communication protocols, and in particular those which regulate communication
the set of all possible traces – sequences of elementary communications in which the process …