Skip to main content

5 Protocol functions

  • Chapter
  • First Online:
Protocol Engineering
  • 1595 Accesses

Abstract

After introducing the basic concepts of services, protocols, and layered architectures in previous chapters we return once more to the protocol as the main concept to have a closer look at it. Communication protocols typically contain a number of procedures and mechanisms which appear in many protocols. These procedures are usually called protocol functions. Many of these protocol functions in turn use other protocol functions. Which protocol functions are applied in a protocol depends on the purpose of the protocol. Protocols in higher layers usually apply other functions than those in lower layers. There are, however, many functions that are applied in many protocols, such as connection management, flow control, error control, or synchronization. These and other protocol functions are introduced in this chapter. With this introduction, we want to give the reader a deeper insight into the most important protocol mechanisms, the diversity of their procedures, and the complexity resulting from this.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Note that the XDT protocol actually does not require a 3-way handshake because it only supports unidirectional transmission.

  2. 2.

    For flow control, see Section 5.8.

References

  1. Holzmann, G.J.: Design and Validation of Computer Protocols. Prentice Hall, Englewood Cliffs, 1991.

    Google Scholar 

  2. Kurose, J. F.; Ross, K. W.: Computer Networking. Pearson Education, 2008.

    Google Scholar 

  3. Peterson, L.L., Davie, B. S.: Computer Networks. A Systems Approach (Morgan Kaufmann Series in Networking), Elsevier, 2007.

    Google Scholar 

  4. RFC 2205: Resource ReSerVation Protocol (RSVP) - Version 1 Functional Specification. 1997.

    Google Scholar 

  5. Sharp, R.: Principles of Protocol Design. Springer, 2008.

    Google Scholar 

  6. Stallings, W.: Data and Computer Communications (8th edition). Prentice Hall, Upper Saddle River, 2008.

    Google Scholar 

  7. Tanenbaum, A. S.: Computer Networks (4th ed.). Pearson Education, Upper Saddle River, 2003.

    Google Scholar 

  8. Tanenbaum, A. S.; Wetherall, D.J.: Computer Networks (5th ed.). Pearson Education, Upper Saddle River, 2010.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hartmut König .

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

König, H. (2012). 5 Protocol functions. In: Protocol Engineering. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29145-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29145-6_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29144-9

  • Online ISBN: 978-3-642-29145-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics