skip to main content
article
Free access

End-to-end arguments in system design

Published: 01 November 1984 Publication History
  • Get Citation Alerts
  • First page of PDF

    References

    [1]
    BOLT BERANEK AND NEWMAN INC. Specifications for the interconnection of a host and an IMP. Tech. Rep. 1822. Bolt Beranek and Newman Inc. Cambridge, Mass. Dec. 1981.
    [2]
    BRANSTAD, D.K. Security aspects of computer networks. AAIA Paper 73-427, AIAA Computer Network Systems Conference, Huntsville, Ala. Apr. 1973.
    [3]
    CORBATO, F.J., DAGGETT, M.M., DALE~, R.C., CREASY, R.J., HELLIWIG, J.D., ORENSTEIN, R.H., AND KORN, L.K. The Compatible Time-Sharing System, A Programmer's Guide. Massachusetts institute of Technology Press, Cambridge, Mass. 1963, p. 10.
    [4]
    DIFFIE, W., AND HELLMAN, M.E. New directions in cryptography. IEEE Trans. Inf. Theory IT-22, 6 (Nov. 1976), 644-654.
    [5]
    GRAY, J.N. Notes on database operating systems. Operating Systems: An Advanced Course. Lecture Notes on Computer Science, vol. 60. Springer-Verlag, New York. 1978. 393-481.
    [6]
    GREENWALD, M. Remote virtual disk protocol specifications. Tech. Memo. Massachusetts institute ~)f Technology Laboratory for Computer Science, Cambridge, Mass. In preparation.
    [7]
    KEISTER, W., KETCHLEDGE, R.W., AND VAUGHAN, H.E. No. 1 ESS: System organization and objectives. Bell Syst. Tech. J. 53, 5, Pt 1, (Sept. 1964), 1841.
    [8]
    KENT, S.T. Encryption-based protection protocols for interactive user-computer communication. S.M. thesis, Dept. of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, Mass., May 1976. Also available as Tech. Rep. TR-162. Massachusetts Institute of Technology Laboratory for Computer Science, May 1976.
    [9]
    LAMPSON, B.W., AND SPROULL, R.F. An open operating system for a single-user machine. In Proceedings of the 7th Symposium on Operating Systems Principles, (Pacific Grove, Calif. Dec. 10- 12). ACM, New York, 1979, pp. 98-105.
    [10]
    LAMPSON, B., AND STURGIS, H. Crash recovery in a distributed data storage system. Working paper, Xerox PARC, Palo Alto, Calif. Nov. 1976 and Apr. 1979. Submitted for publication.
    [11]
    NEEDHAM, R.M., AND SCHROEDER, M.D. Using encryption for authentication in large networks of computers. Commun. ACM 21, 12 (Dec. 1978), 993-999.
    [12]
    POPEK, G.J., et al. UCLA data secure unix. In Proceedings of the 1979 National Computer Conference, vol. AFIPS Press, Reston, Va., pp. 355-364.
    [13]
    REED, D.P. Implementing atomic actions on decentralized data. ACM Trans. Comput. Syst. 1, 1 (Feb. 1983), 3-23.
    [14]
    REED, D.P. Naming and synchronization in a decentralized computer system. Ph.D. dissertation, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, Cambridge, Mass. September 1978. Also available as Massachusetts Institute of Technology Laboratory for Computer Science Tech. Rep. TR-205, Sept., 1978.
    [15]
    REED, D.P., AND SVOBODOVA, L. SWALLOW. A distributed data storage system for a local network. A. West, and P. Janson, Eds. In Local Networks for Computer Communications, Proceedings of the IFIP Working Group 6.4 International Workshop on Local Networks (Zurich, Aug 27-29 1980), North-Holland, Amsterdam, 1981, pp. 355-373.
    [16]
    SCHROEDER, M.D., CLARK, D.D., AND SALTZER, J.H. The multics kernel design project. In Proceedings 6th Symposium on Operating Systems Principles. Oper. Syst. Rev. 11, 5 (Nov. 1977), 43-56.
    [17]
    STERN, J.A. Backup and recovery of on-line information in a computer utility. S.M. thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, Mass. Aug. 1973. Available as Project MAC Tech. Rep. TR-116, Massachusetts Institute of Technology, Jan. 1974.

    Cited By

    View all
    • (2024)An Architecture For Edge Networking ServicesProceedings of the ACM SIGCOMM 2024 Conference10.1145/3651890.3672261(645-660)Online publication date: 4-Aug-2024
    • (2024)Designing, Constructing, and Operating an IPv6 Network at SC23: A case study in implementing the IPv6 protocol on a heterogenous network that supports the SC23 conferencePractice and Experience in Advanced Research Computing 2024: Human Powered Computing10.1145/3626203.3670531(1-8)Online publication date: 17-Jul-2024
    • (2024)Mental Models, Expectations and Implications of Client-Side Scanning: An Interview Study with ExpertsProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642310(1-24)Online publication date: 11-May-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Computer Systems
    ACM Transactions on Computer Systems  Volume 2, Issue 4
    Nov. 1984
    83 pages
    ISSN:0734-2071
    EISSN:1557-7333
    DOI:10.1145/357401
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 November 1984
    Published in TOCS Volume 2, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. data communication
    2. design principles
    3. protocol design

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2,587
    • Downloads (Last 6 weeks)146
    Reflects downloads up to 29 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)An Architecture For Edge Networking ServicesProceedings of the ACM SIGCOMM 2024 Conference10.1145/3651890.3672261(645-660)Online publication date: 4-Aug-2024
    • (2024)Designing, Constructing, and Operating an IPv6 Network at SC23: A case study in implementing the IPv6 protocol on a heterogenous network that supports the SC23 conferencePractice and Experience in Advanced Research Computing 2024: Human Powered Computing10.1145/3626203.3670531(1-8)Online publication date: 17-Jul-2024
    • (2024)Mental Models, Expectations and Implications of Client-Side Scanning: An Interview Study with ExpertsProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642310(1-24)Online publication date: 11-May-2024
    • (2024)Katoptron: Efficient State Mirroring for Middlebox ResilienceNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575815(1-9)Online publication date: 6-May-2024
    • (2024)Safety automotive sensors and actuators with end-to-end protection (E2E) in the context of AUTOSAR embedded applicationsModeling, Identification, and Control for Cyber- Physical Systems Towards Industry 4.010.1016/B978-0-32-395207-1.00021-4(215-242)Online publication date: 2024
    • (2024)enCloud: Aspect‐oriented trusted service migration on SGX‐enabled cloud VMSoftware: Practice and Experience10.1002/spe.3357Online publication date: 18-Jun-2024
    • (2024)1The Future of Business Management with the Power of Distributed Systems and ComputingMeta Heuristic Algorithms for Advanced Distributed Systems10.1002/9781394188093.ch1(1-20)Online publication date: 8-Mar-2024
    • (2023)Communication Meaning: Foundations and Directions for Systems ResearchProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3598840(1786-1791)Online publication date: 30-May-2023
    • (2023)Mandrake: Multiagent Systems as a Basis for Programming Fault-Tolerant Decentralized ApplicationsProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3598765(1218-1220)Online publication date: 30-May-2023
    • (2023)Kiko: Programming Agents to Enact Interaction ModelsProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3598758(1154-1163)Online publication date: 30-May-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media