Towards a formal representation of EMS

Towards a formal representation of EMS

Towards a formal representation of EMS Richard H. Miller and Jacques F. VaUee In spite of a growing interest in message systems electronic (EMS), th...

2MB Sizes 2 Downloads 56 Views

Towards a formal representation of EMS

Richard H. Miller and Jacques F. VaUee

In spite of a growing interest in message systems electronic (EMS), there has, until now, been little effort to prssont a formal description or a consistent set of definitions of the functions and interactions of such systems. The elements of a theory of EMS are identified here, in a project aimed at the development of a common language in which various systems can be conceived, characterized, compared and evaluated. Potential users of such a theory are expected to be found among architects of future telecommunications networks and services, commercial entities that offer computer-based EMS, regulatory agencies, and the users of these services in the public and private sector. The

authors

lnfomedia Avenue,

are

cofounders

Corporation,

530

Palo Alto, CA 94301,

of the Lytton USA.

The work described in this article is being grant conducted under a research awarded to the lnfomedia Corporation by Mathematical and the Division of Computer Sciences of the National Science Foundation.

The problems of unifying the design, implementation and eventually the regulation of electronic message systems (EMS) depend for their solution on the existence of a theoretical framework. At the moment, we understand EMS to mean the use of teleprocessing technology and services to facilitate the movement and management of information among people. EMS is an industry that has come of age, since it encompasses telex and TWX as well as telefacsimile, messageswitching, computer conferencing, electronic mail, mailgram, telegram, communicating word processors and such computer-based services as online Delphi systems and some forms of computer-aided instruction. So rapid is the growth of this industry, which ten years ago existed only in very primitive forms (telex, telegram, and facsimile), that a great deal of confusion exists not only for the prospective user, but for the designer and the regulator as well. The latter, in particular, must live with the recurring problem of deciding how the industry will best be nurtured by the competitive climate and how it will best service the market place. A theory of EMS, even in an elementary stage, would provide a common framework for users, implementors and evaluators to develop models of their activities. It could lead to formal representations that might be as useful in this field as compiler theory was in the 1950s when it encouraged the development of higher-level languages like ALGOL, FORTRAN and COBOL, making it possible to speak of optimization strategies, of compatibility of programs and machines, and systematic testing. Finally, such a theory could lead to the creation of realistic simulations of future networks.

An overview The proliferating number of electronic message systems and services have emerged from a variety of sources. While some have been commercial replacements for traditional telegraph and postal services, others have developed with the widespread usage of time-shared computer systems. Still others are the products of research in such fields as education, forecasting, scientific and technical communication, and management science. Among the latest entries are services operated by the relatively new commercial switchedmessage services (including packet-switched networks based on the ARPANET technology). The office automation industry has recently

0308-5961/80/020079-17

$02.00

Q 1980

IPC Business

Press

79

Towards a formal representation of EMS

recognized the potential value of electronic messaging with the introduction of products such as communicating word processors. The coming decade appears to hold a future of explosive growth in this market place, which in 1979 will see revenues estimated at $712 million.’ The ultimate future of individual systems and services, however, rests in the ability of designers and implementors to match the capability of EMS to the requirements of users. Under umbrella terms such as electronic mail and electronic message systems, one may now purchase systems and services such as: Telex and TWX Telefacsimile Packet switched networks Private and public message switching Communicating word processors (CWP) Mailgram, telegram and faxgram Electronic computer originated mail (ECOM) Electronic fund transfer (EFT) Computer conferencing Structured question-response systems (CAI, Delphi) A description of telex and TWX would be unnecessary, but a brief review of some of the newer services will help to place them in perspective. Facsimile

Although telefacsimile devices were developed over a century ago, this concept continues to be the most prevalent answer to corporate communication demands for faster delivery of certain documents. The reasons are many. FAX is very accurate, since an exact duplicate of the original document is produced. There is no need for rekeyboarding or retyping. The use is not limited to written messages, and the machines are simple to install and operate. The cost of FAX has decreased over the past few years and is substantially less than any other form of EMS. The disadvantages are those of any paperbased medium of communication: security is non-existent, the message is not manipulable, takes physical space in a manual file, and is not readily retrievable. Recently, a number of companies have offered new services to allow users to overcome some of the logistical problems of using FAX. Since there has been no standardization of telefacsimile equipment, however, one is still limited in the number of sites with which one can communicate. A number of common carrier services have developed to permit users of incompatible telefacsimile units to communicate with one another. These services provide the code conversion and speed conversion necessary to link the various units. Other offerings include the ability to send FAX messages to a central distribution centre in major cities, where the messages are sorted and packaged for next-day delivery through the US Postal Service. Communicating word processors



Electronic

Mail

and Message

Systems.

International Resource Development Inc. New Canaan, CT, Vol3, No 2,15 January 1979.

80

Communicating word processors represent an attempt by equipment vendors to merge computer and communication technologies into an office product. At the moment, however, the communication capabilities of many of these devices are limited to relatively lowspeed communication with other devices of the same manufacture. TELECOMMUNICATIONS

POLICY June 1980

Towards a formal representation of EMS

Some systems being developed and marketed by manufacturers of traditional data processing equipment incorporate hardware and software that enable them to act as either stand-alone or communicating word processors. These systems generally adhere to the standards now applied to remote data entry stations, interactive terminals, and standard computer equipment. Cost and logistics remain a barrier, since the average purchase price remains in the $10 to $15 thousand range. Despite these problems, more word processing systems are now incorporating communications with similar machines as an option. While most installations have no definite plans for communication of documents captured, the capability is now considered a prerequisite for the creation of ‘office of the future’ environments. Message switching Message switching provides a more sophisticated means of implementing an EMS than the technologies previously discussed. These systems require that the user subscribe to a ‘network’ and have on-premises a terminal capable of being ‘polled’ for messages waiting in a buffer. The terminal is ‘called’ so that messages can be delivered either on a regular basis or only when messages are waiting to be delivered. These message switch services require expensive terminals, and are used primarily for intraorganizational communications. Several carriers engaging in computer network services and packet switching are now implementing message switch services that are based on network processors (computers that are integral parts of the network) for the storage and forwarding of messages. These systems may be accessed by customers with remote terminals when they wish to ‘check their mailboxes’, or can be set up to automatically deliver the messages to a user’s terminal if the customer has an automatic answer device. The electronic mail services, based on the relay nodes comprising a value-added network, suffer from two major problems. First, the relay nodes generally have enough storage to maintain a user’s ‘mail’ for only a short period of time. Archival storage on a network node is prohibitively expensive in the cost of equipment, and in the processing power required of what is essentially a mini-computer dedicated to the control and routing of digital transmission. The second problem is one of intelligence. The active relay nodes comprising a value-added network rarely have the processing power to allow a fully human engineered system to coexist with the network control functions.

2 For a representative scenario of computer mail use, see Raymond R. Panko, “The outlook for computer mail’, Telecommunications Policy. Vol 1, No 3. June 1977, pp 242-253.

TELECOMMUNICATIONS

Computer and network mail Computer mail emerged from the ‘mailbox’ programs which allowed users of a single computer system to exchange short messages. As computer networks became more prevalent in the late 1960s and 197Os, these mailbox systems began proliferating, allowing users of one computer on the network to send messages to any user on any of the other computers within that network. This is accomplished by creating a ‘message’ as a distinct file on one computer and transmitting that file to another computer, where a program will recognize the recipient’s name and will place it in that user’s collection of files. Typically, the computer mail program will announce to the recipient that a new message is waiting to be read.2 An important point to be noted here is that computer mail is based

POLICY June 1980

Towards a formal

representation

of EMS

on the creation of individual messages that are transferred to an ‘in basket’ at the recipient’s computer. Thus, a user of computer mail might log-in to the computer and find messages waiting from someone in the local work group, or colleagues asking for information, or reminders from a staff secretary. All of these messages are presented one after the other, in the order in which they were received, as would a series of telegrams originating from unrelated sources. Any organization of the messages into topic or task-oriented collections must then be performed under the explicit directions of the recipient. Computer mail systems often offer a means by which a user can send the same message to a number of people, either by listing the individual names or codes of the recipients, or by sending the message to a previously specified group. In this case, one copy of each message (file) must be sent to each recipient on the list. Once again, the messages are saved for the recipient in a general ‘in basket’ along with all the other messages that have been received. Computer or network mail can thus be defined as the use of shared computer systems via computer networks to exchange messages as individual text files. Management of the received messages is performed by the individual recipient and is not content-sensitive unless the user explicitly organizes his messages on this basis, which requires him to implement a filtering and sorting program tailored to his personal needs. Computer conferencing

3 Rudy Bretz, quoted in James H. Carlisle, A Selected Bibliography on Computerbased Teleconferencing, Science Applications Inc. SAI-75-560-WA, Arlington, VA, August 1975. ’ L.H. Day. Computer Conferencing: An Overview, Bell Canada, Montreal, Canada, April 1975. (Prepared for a book edited by N. Macon, based on the 1974 Stockholm International Conference on Computer Communication.)

82

Computer conferencing refers to the use of online computer systems as a medium of information management among groups of individuals who are separated by time or space. Conceptually, computer conferencing belongs to a field of study known as teleconferencing, a term referring not only to computer media, but to any electronically mediated communication (including telephone and television) among more than two people who are separated by time or distance.3 The concept of a ‘conference’, a situation in which a specified group of people have the opportunity to interact with one another collectively, is crucial to the distinction between computer mail and computer conferencing. Unlike computer mail, computer conference systems store only one copy of each entry. It is kept in a centralized computer system, and ‘shared’ by all the participants in that conference. The telecommunications network is not used to transfer messages from computer to computer, but rather to allow remote terminals to access a shared file of messages on a designated computer. In addition, the shared file of entries is only accessible to a specified group of users. Unauthorized people cannot read the contents or be aware of the existence of other groups. Some computer conference systems further protect the contents of these shared files by encrypting the text of the conferences. Computer conference systems often provide ‘mail’ capabilities (or private messages) as a feature, but this is secondary to the main goal: the ability to submit entries to and read entries from a specified group of individuals engaged in a specific task. Unlike the single ‘in basket’ approach of computer mail, the entries shared via a computer conference system are automatically sorted into specific project files. Expanding slightly on a definition proposed by Day’ we might define computer conferencing as the use of shared computer files, remote TELECOMMUNICATIONS

POLICY June 1980

Towards a formal representationof EMS

terminal equipment, and telecommunications networks to facilitate symmetric, interactive group communication where face-to-face contact is either not possible or not desirable. In the course of computer conferences, entries are automatically saved according to the different tasks or topic areas, represented by distinct ‘conferences’.

The problems The increasingly rapid evolution of electronic message systems presents today’s designer and user with an entirely new set of problems. The traditional approach to organizational telecommunications has treated it as a peripheral subset of the central data processing or word processing system. This view is an increasingly frequent cause of high system cost, lack of flexibility and growth potential, degraded system performance, and lack of appropriate functionality to meet the organizational requirements. This approach has typically been one of a ‘bottom-up’ look at design, where the smallest elements are identified first and an attempt is made to tie existing equipment or services together in an upward direction. The experience of the last decade gives little hope for a system that will be ‘all things to all people’, permitting users to perform all the human communication functions they might desire within one efficient and effective structure. Each existing electronic message system may excel in supporting one form of human communication, but not others. This difficulty stems, in part, from the lack of a commonly held understanding of human communication structures, and a unified theory of electronic interpersonal communication. The goal of systems engineering is the application of a disciplined, process-oriented approach to the construction of systems. There exist no discipline nor process-oriented approaches to the development of electronic message systems because three essential prerequisites are missing: a common descriptive language; a uniform set of metrics; and a set of performance measurement and testing methods. In this article we are primarily concerned with the first of these prerequisites. A common descriptive language for EMS must be usable to specify the user’s requirements and to describe the functions of various electronic message systems in terms of the requirements. In other words, it tries to answer the question: What is it? A uniform set of metrics is predicated on the existence of such a common descriptive language. It provides a basis for answering the question: What does it do? Finally, using the common language and the set of metrics, the designer and the user may assess the performance of an EMS. The preliminary task of this study has been the explication of the domains of the EMS or ‘levels of description’, thus characterizing interpersonal and group communication networks. The next task of this study has been to identify and define a set of operations whose joint performance describes communication by EMS. In concert with the identification of generic operations, a means of describing the data types, roles and the control or management structure of EMS systems has also been developed.

Building blocks of EMS theory The electronic message systems we have just reviewed do not exist in

TELECOMMUNICATIONS

POLICY June 1980

83

Towards a formal representation of EMS

a ‘pure’ technological context. Instead, they are found to consist of overlapping levels of computer systems, telecommunications networks and information exchange structures serving the goals of a human activity. As noted in the previous section, no theory of EMS can be confined to the definition of automata. It must take into account the various levels of description and prescription that constitute the support of group interaction. The first requirement of a descriptive language for EMS is that it should allow one to express the purpose of the desired program directly. Furthermore, it should be easy for the system developer and other people to read and understand the specifications and to see that they are correct. For this reason, it is necessary that the descriptive/specification language contain very high-level constructions, which correspond to the concepts we use in thinking about the problem; and which are endemic to the domain of the target system. Such constructions are typically not included in a conventional programming language, because it may be impossible to find a uniform way of computing them or because they may not be amenable to efficient implementation. In the following subsections, we have attempted to identify the constructions of human communication networks that must be represented formally in a theory of EMS. In a previous report,5 one of the authors has determined that the concepts required fall into six classes: 0 0 l

0 0 0

Channels Networks Messages Nodes Operations Protocols

Channels

A communication channel is the medium utilized to convey a message. It is the means by which a message travels between a communicating ‘process’ and the recipient. In more technical vocabulary, communication channels are the effective links interconnecting the source and sink nodes in a communication structure. The channel is found here to be a fertile concept as the combination of telecommunications, data processing, storage, and control structures. From the user’s point of view, the channel is the totahty of function by which he can manage the flow of information to and from himself. In representing a channel, we have found the five dimensions summarized in Table 1. Networks ’ R.H. Miller, Theoretical Foundations of Electronic Message Systems, A Report of the lnfomedia Corporation, November 1979. A. Bavelas, ‘A mathematical model for group structures, Applied Anthropology. Vol 7, pp 16-30, 1948.

a

Human communication networks are purposive systems; ie there are goals, objectives, and constraints that must be met in any group communication situation. The idea of restricting the ability of group members in their ability to communicate with others originally stemmed from the thinking of Bavelas, and led to the notion of a communication network. Perhaps because of the forma1 theoretical tone of the original work6 many researchers in the social sciences TELECOMMUNICATIONS

POLICY June 1980

Towards a formal

Table 1.

representation

of EMS

The five channel dimensions in an EMS.

1. Channel fwdback The opportunity a channel provides for the recipient immediately and to affect the source of the message.

of a message

to respond

2. Channel permanence The durability of a communication channel over time. This might be called the ability of the channel to preserve the message. 3. Channel multipliutive power The channel’s relative potential for covering a geographical or organizational ‘distance’ with speed and timeliness, such that (if it is the intention of the messages source) the channel can multiply the message and make it available to numbers of people simultaneously. 4. Source and sink identificetion The channel’s provision to the source and sink of a means by which to identify (authenticate) the source of a message or its recipient. 5. Channel control flexibility The degree to which a channel’s use is characterized by stable sets of rules and procedures, This is reflected by the extent to which users of the channel are free from codes or technically imposed protocols.

have been disappointed that the research on communication networks has not led to a strong theory of group structure.’ However, for behavioural research, the notion of communication networks has been a methodological advance. The results of a Leavitt, Bavelas, and Bavelas and Barrett indicate that communication structure makes a difference in group performance, social process, and personal relations.* More recent studies of the effects of media on group communication have determined that, while some effects are not specific to the medium used, the network imposed upon a group by the medium itself can produce effects in participation, and social processes9 Thus, the use of EMS has brought the real life imposition of communication networks by virtue of the operation of the EMS and the interconnections it provides a group. The formal representation of human communication structures must include the nine network dimensions of Table 2 in a manner that is eventually manipulable in a systematic set of procedures. ‘See remarks by M. Glanzer. and R. Glaser, Techniques for the study of group structure and behavior: II. Empirical studies of the effects of structure in small groups’, Psychological Bulletin, Vol 58. pp l-27, 1961. s H.J. Leavitt, ‘Some effects of certain patterns on group performance’, Journal of Abnormal and Social Psychology, Vol 1951; A. Bavelas, 46, pp 38-50. ‘Communication patterns in task-oriented groups’, Journal of the Acoustical Society of America, Vol 22, pp 725-730, 1950; A. Bavelas and D. Barrett. ‘An experimental approach to organizational communication’, Personnel, Vol 27, pp 367-371, 1951. s R. Johansen, J. Vallee, and K. Spangler, Technical Electronic Meetings: Alternatives end Social Choices, AddisonWesley Publishing, MA, Reading, 1979. lo H.8. Becker, Functional Analysis of Information Networks, Wiley, New York, 1973.

TELECOMMUNICATIONS

Nodes

An examination of the functions to be performed within any information network, which includes electronic message systems, reveals that any point or node within the network falls under one or more of the following three node definitions:iO 0 0 0

information source (input node) relay point (transmission node) information destination (output node)

Information sources are those nodes at which the information is first entered into the network. Relay nodes are those points within the network where information is received from a source, possibly altered in form and/or content, and sent on to a destination. Information destination nodes are those points to which the information is delivered. A destination node may be intermediate in that the information will be sent on to another destination, as in a relay node, or may be final, where the information effectively leaves the network by being presented in an appropriate form to a destination device.

POLICY June 1980

85

Towards a formal representation of EMS Table 2. The nine network dimensions in an EMS. 1. Network contwctivity The degree to which a participant has communication (human and computer processes) in the network.

access to other participants

2. Network formation and permeability a. Emergent networks occur in interpersonal communication consciously assigns or enforces the use of specific contact: or

in which

no one

b. Prescribed networks are deliberately designed networks, in which status or roles are major considerations, as are the rules and procedures associated with the channels used. Network permeability refers to the degree to which the EMS permits ready access to network membership. It is reflected by the existence or absence of entrance requirements, the existence or absence of a membership ‘authority’, and the degree to which membership is solicited. 3. Autonomy The degree to which a network can function independently of other networks (groups). It is reflected by the degree to which a group determines its own activities. 4. control The degree to which the EMS regulates the behaviour of individuals while they are functioning as members of a network. 5. Flexibility The degree to which the EMS demands adherence to established procedures or allows informal procedures. 6. Homogeneity The degree to which members are similar with respect to terminal equipment, or even the degree to which the EMS allows computer processes to act as participants. 7. Participation The degree to which members of an EMS network must apply time and effort to communication activities. It is reflected in the number and kinds of duties the participant must perform, and by the number and kinds of duties the EMS performs for the participant. 8. Stability The degree to which an EMS network persists over a period of time with essentially the same characteristics. It is reflected by the rate of membership change, the frequency of reorganization, and the locus of control. 9. Stratification The degree to which an EMS orders its particpants into status or privilege hierarchies. It is reflected by differential distribution of power, privileges, obligations, and duties, and bv patterns of differential behaviour amonq members of the qroup.

Information flowing through an information network takes a variety of forms. There are two essential forms of information which we must take into consideration. The most important of these, from the users’ point of view, is that form required for them to enter at their locations (the sources) a message which is to be delivered to the appropriate locations in the network (the destinations). The message to be delivered is the text that the user wishes to be conveyed to the destination. The second form of information is also a message, but one which conveys control information between a user and the automated process, which mediates the exchange of the first type of message. An ‘agent’ is a special type of node, defined as a controlling process. That is, an agent makes decisions on some basis and thus directs the operation of a system or subsystem. Among the agents that are of relevance to this study are not only human users of EMS, but also computer programs that adapt to or respond to their environment in an autonomous or semi-autonomous manner. An example of such a program might be. the process that determines the

86

TELECOMMUNICATIONS

POLICY June 1980

Towards a formal representation of EMS

most efficient route for a message through a computer network, based on a determination of traffic flow. A node that has autonomy (ie decision making power) must be represented in a formal description as having ‘control privileges’ or capabilities within the various networks (human communication structures) of which it is a member. The most direct means of representing capabilities or privileges in a formal description is a table of ‘attributes’ detailing the choices or privileges available and the circumstances under which these capabilities can and cannot be invoked. Operations The definition of a set of mutually exclusive and exhaustive processes and functions is an essential part of the EMS analysis. A ‘function’ is the manner or mode of transforming inputs into outputs. A function may be considered as either a mode of transformation of inputs into outputs or the rule by which the elements of the set of inputs are associated with the elements of the set of outputs. A function is specified by the inputs, the transformation ‘rule’ and the outputs. A ‘procedure’ is a set of fundamental operations with an invariant structure. Functions are a form of procedure that take inputs and transform them into outputs in a consistent way. However, not all procedures transform inputs into outputs, as do functions. For example, a procedure may be used to change the state or the structure of a system. The EMS processing function breaks down into classes of basic operations. Within each class of operations, the functions and procedures evident in an EMS are organized hierarchically. It will be apparent that not all electronic message systems include each class of operations. Rather, the inclusion or exclusion of a major class of operations is one means of distinguishing one EMS from another. The major classes of operations identified are, however, a representative set of operations applicable to nearly all forms of telemediated message communication. These generic operations are broadly defined to avoid restriction in definition or concept by current EMS practices. The operations which suggest themselves from theories of communication and our familiarity with existing EMS fall into six classes shown in Table 3.

” See P. Zafiropoulo, by duologue-matrix

‘Protocol validation analysis’, IEEE TIensections on Communicetions, Vol COM-26. No 8, Aug 1978, pp 11871194.

TELECOMMUNICATIONS

Protocols A protocol is a set of rules governing the interaction between separate processes. Because an EMS consists of multiple agents, the problem of representing it becomes one of describing the various controlling agents, the ‘decision rules’ used by each agent, and the rules governing the interaction of these mutliple loci of control. Recently, the engineering of communication protocols for computer networks has been the subject of some attention. The representation of such protocols between autonomous processes and the testing of these sets of rules has led to the interesting discovery that protocols can be modelled as pairs of interacting graphs (one for each process). l1 While this approach is amenable to automatic testing and modelling, one notes that the processes which are represented are all finite, deterministic, and the result of a computer program. This is not the case when modelling the interaction of human users and EMS.

POLICY June 1980

a7

Towards a formal representation of EMS Table 3. The six classes of operations in an EMS. 1. Origination Comprises all the operations involved in the capture of information, the in-process correction or modification of information, and, in some cases, the enciphering or coding of information to be communicated. 2. Redaction Involves all the functions permitted human users and programs to edit. format, and order captured information into an organized form. 3. Transmission Includes all the procedures and functions involved in the transfer of information from a source to a recipient. The source and recipient need not be humans at input/output devices. They may also include stored collections of data, and processing programs. 4. Archival operations Imply that a message will be ‘remembered’ in some form such that it may be held for re-transmission and used at a later time. The storage and retrieval of information implies a scheme of organization such that the user can find the desired information according to some specification. 5. Utilization Perhaps the most difficult class of operations to organize in a formal representation. Obviously, utilization of messages involves the human reading or viewing, as well as the use of information as data to be processed by another progam. However, one needs to delve deeper into the intent or input functions defined by the user, the user’s environment, and the network of people and processes with which an individual communicates. 6. Control functions and procedures Consist of permissible decision operations, means of directing the operation of an EMS, means of altering the structure of the communication channel, and such ‘managerial’ chores as maintaining security. Possibly the most difficult aspect of control operations to formalize is the user interface, the conceptual boundary between the user and the previously enumerated classes of operations. In this case, the process representing the human is not finite, nor can it be considered completely deterministic. One of the objects of this research is the representation of protocols between processes that are, on the one hand finite and deterministic, and on the other hand nondeterministic.

Messages A message is an ordered selection of symbols intended to convey information. By ordered, we mean that they follow a deliberate arrangement. By selection, we mean the making of a discrimination from a larger set of alternatives. Although not all EMS systems impinge upon the content of a message, a number of the EMS currently in existence do offer a means of selecting part of the content of a message or intent of a message transmitted from a source to a recipient. For example, the more structured systems ‘institutionalize’ the ‘question’, and the ‘response’ in such a way that they allow a user to send a message which bears a particular kind of intent, usually reflected by the command used to create or transmit the message. For these reasons, the content and intent of messages sent by any agent in an EMS (ie a human user or a machine process) is a necessary element in the representation of EMS.

Tools for representation The development of a formal representation of electronic message systems begins with the identification of generic entities, generic relationships between entities, and generic operations, a subset of which will exist or be performed in any electronic message system.

88

TELECOMMUNICATIONS

POLICY June 1980

Towards a formal representation of EMS

Since generabilizability is the goal, we have chosen to begin with the user’s view of an EMS, rather than the technology in which. it is implemented. The choice of this as a frame of reference is novel. It stems from the observation that the operations, networks, and forms of human communication through the use of EMS all belong to a finite, describable set of variables. In this section, the methodological tools from three disciplines needed to represent an EMS are reviewed. They include the metalinguistic approach to describing EMS operations, the use of graph and network theory to describe human and technological communication structures, and a form of interaction process analysis to describe the communication behaviour of groups using an EMS. Development of a metalanguage

Traditional computer theory, developing in response to the need for a description of artificial languages, has produced the concepts of formal automata and grammars, the structural basis for the representation of computer systems. These structures have a welldefined goal, namely to produce a set of instructions for an automaton or computational device. Although modern automata theory goes back to the work of Alan Turing in the 194Os, the study of formal languages as an area of computer science began shortly after 1956 when Noam Chomsky developed a mathematical model of a grammar while investigating natural languages. Shortly afterward, the programming language ALGOL was defined by use of a formal grammar. This led to the development of syntax-directed ‘compiling’, the translation from a high-level language into a target language on which a computer can operate. In the 196Os, the development of formal languages for the specification of compilers led to the concept of a metacompiler. The concept of a grammar for artificial languages was instrumental in allowing computer scientists to develop generating systems procedures which systematically generate correct ‘sentences’ in some target language, usually the machine language of a particular computer. It is easy to see the applicability of this concept to the definition of an EMS, since the grammar enables a machine to determine if a given sentence is in a given language through recognizing procedures. Such processes are basic to the operations of compilers that allow a user to give instructions to a computer in a formal language using a subset of ordinary English and mathematical terms (IF x = y THEN GO TO . . .) and have them translated into executable code. Backus Normal Form (or BNF) was the formalism used in the original description of ALGOL. It has become generally accepted since its development in 1959. It is a metalinguistic form that permits one to set down the complete set of rules for parsing a sentence, much like the school exercise of diagramming or parsing an English sentence. Example 1 shows the formal procedure used to parse the simple English sentence ‘The general manager spoke loudly.’ One notes that the sentence consists of a noun phrase (‘The general manager’) and a verb phrase (‘spoke loudly’). The noun phrase is further broken down into a singular noun (manager) accompanied by two adjectives. The verb phrase is parsed as a singular verb (spoke) and a modifying adverb (loudly). TELECOMMUNICATIONS

POLICY June 1980

Towards a formal representation of EMS

In much the same way, BNF allows the system designer to specify a program to recognize an object in an electronic message system. The rules of a syntax in BNF are expressed using ‘metasymbols’ belonging to BNF and not to the language described. Example

7. BNF

manager


description

of the structure

of the sentence:

The

general

spoke loudly’.

: : = : := (
)< noun phrase>/

phrase>

(
)
phrase>

: : =

: : = The : : = general : : = manager C-singular verb> : : = spoke : : = loudly




While the BNF grammar illustrated in Example 1 would hardly be sufficient to recognize all sentences in English, or to generate all valid English sentences, it describes a subset of English grammar. The symbol ::= in the example rules indicates that the item to the left can be decomposed into the items to the right. One notes that the names of parts of the sentence such as noun, verb phrase, etc, are enclosed in brackets < > to represent variables whose values are sequences of symbols. The words (or sequences of symbols) are known as ‘terminals’. The relationship that exists between variables and terminals in these rules are called ‘productions’. The symbol / represents the concept OR. For example in the third rule, one might express this as: A noun phase consists of an adjective followed by another noun phrase, OR of an adjective followed by a single noun. The round brackets indicate that a particular symbol is optional. The curly brackets (which were not used in Example 1) can also be used in BNF to denote the possible repetition of the enclosed variable or terminal symbols zero or more times. For example, the syntax for the generation or recognition of an unsigned integer might be as in Example 2. Example

2. BNF representation



integer>

of an unsigned

integer.

: : = < digit > {}

: : = O/I /2/3/4/5/6/7/6/9

One final concept in the specifications of grammars is the ‘start symbol’. This is a variable that is distinguished by the fact that it generates exactly those strings of terminals that are in the language. In the first example, was the start symbol. Formally, we denote a grammar by the variables, terminals, productions, and the start symbol. An example of the use of BNF to describe aspects of a particular EMS may give a flavour for the generalized representation of EMS we have in mind. PLANET, a computer conferencing system offered by Infomedia Corporation, allows two types of entries: the public entry (available to all authorized participants in a conference) and the private entry (available only to the recipient of the message). A BNF representation of the production (rules) governing the structure of a public entry are shown in Example 3. A sample entry generated by these rules is shown in Example 4. TELECOMMUNICATIONS

POLICY June 1980

Towardsa formal representationof EMS Example

3. BNF representation

of a PLANET

entry.

: : =
< text>
: : = : : = [] : : = /(ORG)/ anonymous : : = <,time > : : = - -