35.100.30 网络层 标准查询与下载



共找到 460 条与 网络层 相关的标准,共 31

Information technology - Telecommunications and information exchange between systems - XML Schema Definitions for Computer Supported Telecommunications Applications (CSTA) Phase III

ICS
35.100.30
CCS
发布
2014-01-01
实施

Information technology - Telecommunications and information exchange between systems - Services for Computer Supported Telecommunications Applications (CSTA) Phase III

ICS
35.100.30
CCS
发布
2014-01-01
实施

The Session Initiation Protocol (SIP) is a control (signalling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. CSTA standardizes a very powerful and flexible set of application services to observe and control voice and non-voice media calls as well as control and observe non-call related features. This Technical Report describes how CSTA can be used to provide a subset of CSTA call control functionality, called 1st party call control, for SIP user agents. The term uaCSTA (for user agent CSTA) refers to transporting ECMA-323 (CSTA XML) messages over a SIP session. uaCSTA leverages SIP mechanisms to provide a highly featured, robust, and extensible set of features to support applications in the Enterprise environment. uaCSTA can be implemented by several different types of SIP user agents: • directly by a SIP user agent on a SIP phone • uaCSTA can also be implemented by a SIP B2BUA to augment 3PCC functionality • by a proxy server that is front-ending a PBX.

Information technology -- Telecommunications and information exchange between systems -- Using CSTA for SIP phone user agents (uaCSTA)

ICS
35.100.30
CCS
发布
2013-12-31
实施

This Recommendation | International Standard provides the specification of management information within an Open System related to those operations of the OSI Network Layer. Specifics on how Network layer management is accomplished is beyond the scope of this Recommendation | International Standard. Network Layer management information is defined by specifying: — the managed object class definition of Network Layer Managed Objects following guidelines put forth by the Structure of Management Information (see Recommendations X.720-X.724 and ISO/IEC 10165); — the relationship of the Managed Objects and attributes to both the operation of the layer and to other objects and attributes of the layer; and — the action type operations on the attributes of Network Layer Managed Objects that are available to OSI Systems Management. Annexes D, E, F and G, which are integral parts of this Recommendation | International Standard, provide ICS proformas associated with Network Layer management information.

Information technology -- Elements of management information related to the OSI Network Layer

ICS
35.100.30
CCS
发布
2013-12-31
实施

Not available

Information technology -- Telecommunications and information exchange between systems -- Intermediate System to Intermediate System intra-domain routeing information exchange protocol for use in conjunction with the protocol for providing the connectio...

ICS
35.100.30
CCS
发布
2013-12-31
实施

This International Standard defines the abstract operation of the relaying functions of a Network entity in an intermediate system, as needed to support the OSI connection-mode Network service. As the principal means for expressing the definition, the concept of the Network Internal Layer Service is used. This is similar to an OSI layer service, but adapted to expressing the invariants of the information flow within and throughout the layer, rather than just the external functionality of the layer provided between two service access points. The definition includes the invocation of Network routing functions as a necessary element of the Network relaying functions, but it does not specify how those routing functions are to be realized. The definition of Network relaying functions applies both to a subnetwork supporting all elements of the Network Service (as defined in ISO 8648), and to a Network relay system interconnecting two subnetworks according to any of the three approaches defined in ISO 8648. In the case of the hop-by-hop harmonization approach to interconnection, the definition of Network relaying functions applies to the result of harmonizing the subnetwork service(s) to the level of the Network Service. The harmonization functions, which require protocol mechanisms to be specified, are outside the scope of this International Standard. This International Standard is intended for use in guiding the design and application of real interworking units and real subnetworks (eg, local area networks and private packet switched networks) which are to support the OSI NS. It is also intended for use in the development of standards for the Network layer, to ensure that the requirements deriving from the need for Network layer relaying are taken into account. There are no requirements for conformance to this International Standard. NOTE — Conformance requirements relating to Network layer relaying are to be found in the spécifications for mappings between the Network Internal Layer Service and Network protocols.

Information technology -- Telecommunications and information exchange between systems -- Definition of the relaying functions of a Network layer intermediate system

ICS
35.100.30
CCS
发布
2013-12-31
实施

This Recommendation | International Standard specifies: a) procedures when operating over the connection-mode data link service for the connection-mode transfer of data and control information from one network entity to a peer network entity; b) the structure and encoding of the NPDUs used for the transfer of data and control information. The procedures are defined in terms of: a) the interactions between peer network entities through the exchange of NPDUs; b) the interactions between a network entity and the network service user in the same system through the exchange of network service primitives; c) the interactions between a network entity and the data link service provider through the exchange of data link service primitives. These procedures are applicable to instances of communication between systems which support the Network Layer of the OS I Reference Model and wish to interconnect in the open systems environment using the Network Fast Byte Protocol. This Recommendation | International Standard specifies, in clause 8, conformance requirements for systems implementing these procedures and provides the PICS proforma in compliance with the relevant requirements, and in accordance with the relevant guidance, given in ITU-T Rec. X.296 and ISO/IEC 9646-7. It does not contain tests which can be used to demonstrate this conformance.

Information technology -- Open Systems Interconnection -- Network Fast Byte Protocol

ICS
35.100.30
CCS
发布
2013-12-31
实施

This International Standard defines a protocol for the exchange of routeing information between an End System and a Subnetwork Address Resolution Entity, and between an Intermediate System and a Subnetwork Address Resolution Entity. This International Standard is applicable to: a) End Systems which operate according to the main body of ISO/IEC 8878 to provide and support the OSI Connection-mode Network Service using ISO/IEC 8208. b) Subnetwork Address Resolution Entities which operate ISO/IEC 8208. NOTE — The Subnetwork Address Resolution Entity defined in this International Standard may be associated with relay functions as defined in ISO/IEC 10028 and ISO/IEC 10177. c) Intermediate systems which operate ISO/IEC 8208. End Systems which provide and support the OSI CONS using the fast select 1980 procedures or the alternative 1980 procedures in annex A of ISO/IEC 8878 are outside the scope of this International Standard. This International Standard does not specify any protocol elements nor algorithms for facilitating routeing and relaying among SNAREs. Such functions are intentionally outside the scope of this International Standard. To evaluate conformance of a particular implementation, it is necessary to have a statement of which capabilities and options have been implemented. Such a statement is called Protocol Implementation Conformance Statement (PICS), as defined in ISO/IEC 9646-1. This International Standard provides the PICS proforma in compliance with the relevant requirements, and in accordance with the relevant guidance, given in ISO 9646-7.

Information technology -- Telecommunications and information exchange between systems -- End System Routeing Information Exchange Protocol for use in conjunction with ISO/IEC 8878

ICS
35.100.30
CCS
发布
2013-12-31
实施

This ITU-T Recommendation | International Standard specifies a protocol to be used by End Systems and Intermediate Systems in order to provide security services in the Network layer, which is defined by CCITT Rec. X.213 | ISO/IEC 8348, and ISO 8648. The protocol defined in this ITU-T Recommendation | International Standard is called the Network Layer Security Protocol (NLSP). This ITU-T Recommendation | International Standard specifies: 1) Support for the following security services defined in CCITT Rec. X.800 | ISO 7498-2: a) peer entity authentication; b) data origin authentication; c) access control; d) connection confidentiality; e) connectionless confidentiality; f) traffic flow confidentiality; g) connection integrity without recovery (including Data Unit Integrity, in which individual SDUs on a connection are integrity protected); h) connectionless integrity. 2) The functional requirements for implementations that claim conformance to this ITU-T Recommendation | International Standard. The procedures of this protocol are defined in terms of: a) requirements on the cryptographic techniques that can be used in an instance of this protocol; b) requirements on the information carried in the security association used in an instance of communication. Although the degree of protection afforded by some security mechanisms depends on the use of some specific cryptographic techniques, correct operation of this protocol is not dependent on the choice of any particular encipherment or decipherment algorithm. This is a local matter for the communicating systems. Furthermore, neither the choice nor the implementation of a specific security policy are within the scope of this ITU-T Recommendation | International Standard. The choice of a specific security policy, and hence the degree of protection that will be achieved, is left as a local matter among the systems that are using a single instance of secure communications. This ITU-T Recommendation | International Standard does not require that multiple instances of secure communications involving a single open system must use the same security protocol. Annex D provides the PICS proforma for the Network Layer Security Protocol in compliance with the relevant guidance given in ISO/IEC 9646-2.

Information technology -- Open Systems Interconnection -- Network layer security protocol

ICS
35.100.30
CCS
发布
2013-12-31
实施

Information technology-Protocol for providing the connectionless-mode network service-Part 5:Provision of the underlying service by ISDN circuit-switched B-channels

ICS
35.100.30
CCS
发布
20131223
实施
20131223

Information technology-Protocol identification in the network layer

ICS
35.100.30
CCS
发布
20131223
实施
20131223

Information technology-Protocol for providing the connectionless-mode network service-Part 5:Provision of the underlying service by ISDN circuit-switched B-channels

ICS
35.100.30
CCS
发布
2013-12-23
实施

Information technology-Protocol identification in the network layer

ICS
35.100.30
CCS
发布
2013-12-23
实施

Information technology-Telecommunications and information exchange between systems-OSI Routeing Framework

ICS
35.100.30
CCS
发布
2013-12-23
实施

Information processing systems-Open systems interconnection-Internal organization of the network layer

ICS
35.100.30
CCS
发布
2013-12-23
实施

The Input/Output Logical Specification is part of RapidIO’s logical layer specifications that define the interconnect’s overall protocol and packet formats. This layer contains the transaction protocols necessary for end points to process a transaction. Another RapidIO logical layer specification is described in Partition II: Message Passing Logical Specification

Information technology - RapidIO TM interconnect specification

ICS
35.100.30
CCS
发布
2013-04-01
实施

1 Scope This International Standard specifies application protocol data units (APDUs) for the services described in ISO/IEC 18051 (ECMA-269), Services for Computer Supported Telecommunications Applications (CSTA) Phase III. This International Standard describes the concepts underlying the Remote Operations model, notation and service. It contains CSTA-specific protocol details, which form the main part of this International Standard. The protocol in this International Standard operates in the context of an application association.

Information technology — Telecommunications and information exchange between systems — Protocol for Computer Supported Telecommunications Applications (CSTA) Phase III

ICS
35.100.30
CCS
发布
2013-01-01
实施

Information technology - Telecommunications and information exchange between systems - Protocol for Computer Supported Telecommunications Applications (CSTA) Phase III

ICS
35.100.30
CCS
发布
2013-01-01
实施

Information technology-Telecommunications and information exchange between systems-Formal description of ISO 8072 in LOTOS

ICS
35.100.30
CCS
L79
发布
2012-12-28
实施

本标准规定了基于shim6的IPv6站点多归属的技术要求,规定了shim6的特征,设计目标和操作原理,包括消息格式,协议处理规则,以及如何在两个通信节点间检测到失败,同时还规定了一个探测协议。如果一个失败发生了且能找到另一对可操作的接口和(或)地址,使用该探测协议可用于选择相同的节点之间的另一对可操作的接口和(或)地址。本标准适用于支持IPv6站点多归属协议的主机和网络设备。

Technical requirements of multihoming shim protocol for IPv6

ICS
35.100.30
CCS
L79
发布
2012-12-28
实施
2013-03-01



Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号