Foundations of Protocol Engineering
LeMay Research Division
LeMay Publishing
EDUCATION
Foundations of Protocol Engineering
University Textbook15,017 words80 chapters
Published by LeMay Publishing. 15,017 words across 80 chapters.
About This Publication
University-level textbook on protocol design, transaction systems, and the mathematics of digital infrastructure.
Published by LeMay Publishing, a division of LeMay. Massachusetts.
ISBN: 979-8-0000-5148-1
Chapters
1FOUNDATIONS OF PROTOCOL ENGINEERING
2Design, Transaction Systems, and the Mathematics of Digital Infrastructure
3PREFACE
4TABLE OF CONTENTS
5CHAPTER 1
6The Nature and Necessity of Protocols
71.1 What Is a Protocol?
81.2 Historical Development
91.3 The Protocol Design Space
101.4 Layers, Interfaces, and Composition
111.5 Exercises
12CHAPTER 2
13Formal Foundations — Automata, Languages, and State Machines
142.1 Why Formalism?
152.2 Finite-State Machines
162.3 Extended State Machines
172.4 Communicating Finite-State Machines
182.5 Process Algebras
192.6 Petri Nets and Protocol Modeling
202.7 Temporal Logic and Protocol Properties
212.8 Exercises
22CHAPTER 3
23The Mathematics of Trust and Commitment
243.1 The Problem of Trust
253.2 Cryptographic Primitives
263.3 Commitments and Zero-Knowledge
273.4 Game Theory and Mechanism Design
283.5 Information-Theoretic Foundations
293.6 The Dolev-Yao Model
303.7 Exercises
31CHAPTER 4
32Transaction Systems — Models, Properties, and Guarantees
334.1 The Transaction Concept
344.2 Serializability and Isolation Levels
354.3 Concurrency Control Protocols
364.4 Distributed Transactions and the Two-Phase Commit Protocol
374.5 The Saga Pattern and Compensating Transactions
384.6 ACID versus BASE
394.7 Exercises
40CHAPTER 5
41Consensus and Coordination in Distributed Systems
425.1 The Consensus Problem
435.2 The FLP Impossibility Theorem
445.3 Paxos
455.4 Raft
465.5 Byzantine Fault Tolerance
475.6 Consensus in Open Systems: Nakamoto Consensus
485.7 Exercises
49CHAPTER 6
50Security Protocols — Authentication, Integrity, and Confidentiality
516.1 The Three Pillars
526.2 The Needham-Schroeder Protocol and Its Attack
536.3 Transport Layer Security (TLS)
546.4 Authentication Protocols and Identity
556.5 Key Management
566.6 Exercises
57CHAPTER 7
58Performance Analysis and Protocol Optimization
597.1 Why Performance Matters
607.2 Latency Analysis
617.3 Throughput Analysis
627.4 Queuing Theory
637.5 Protocol Optimization Techniques
647.6 Benchmarking and Measurement
657.7 Exercises
66CHAPTER 8
67Verification, Testing, and the Engineering Discipline
688.1 The Verification Imperative
698.2 Model Checking
708.3 Theorem Proving
718.4 Automated Protocol Analysis Tools
728.5 Testing Protocols
738.6 The Engineering Discipline
748.7 Exercises
75APPENDIX A
76Notation and Mathematical Conventions
77APPENDIX B
78Selected Proofs
79BIBLIOGRAPHY
80INDEX