On the existence and construction of robust communication protocols for unreliable channels

Saumya K. Debray, Ariel J. Frank, Scott A. Smolka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A simple necessary and sufficient condition for the existence of robust communication protocols for arbitrary alphabets and a large class of transmission errors is presented. This class of errors, called transformation errors, consists of those errors where symbols (messages) may be lost or corrupted to other symbols. The proof is used as the basis of a procedure for automatically constructing robust protocols for transformation errors. The protocols generated are small in size, despite not being custom-designed. The results presented generalize and expand upon those of Aho et al. [AUY79]. Two protocols are constructed to illustrate our technique, and are contrasted with those of Aho et al.

Original languageEnglish (US)
Title of host publicationFoundations of Software Technology and Theoretical Computer Science - 4th Conference, Proceedings
EditorsMathai Joseph, Rudrapatna Shyamasundar
PublisherSpringer-Verlag
Pages136-151
Number of pages16
ISBN (Print)9783540138839
DOIs
StatePublished - 1984
Externally publishedYes
Event4th Conference on Foundations of Software Technology and Theoretical Computer Science, FST and TCS 1984 - Bangalore, India
Duration: Dec 13 1984Dec 15 1984

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume181 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th Conference on Foundations of Software Technology and Theoretical Computer Science, FST and TCS 1984
Country/TerritoryIndia
CityBangalore
Period12/13/8412/15/84

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'On the existence and construction of robust communication protocols for unreliable channels'. Together they form a unique fingerprint.

Cite this