35.100.40 传输层 标准查询与下载



共找到 163 条与 传输层 相关的标准,共 11

Characteristics of MPLS-TP equipment functional blocks supporting ITU-T G.8113.2/Y.1372.2 OAM mechanisms

ICS
35.100.40
CCS
发布
2016-04-01
实施

Characteristics of MPLS-TP equipment functional blocks

ICS
35.100.40
CCS
发布
2016-04-01
实施

Characteristics of MPLS-TP equipment functional blocks supporting ITU-T G.8113.1/Y.1372.1 OAM mechanisms

ICS
35.100.40
CCS
发布
2016-04-01
实施

Amendment 1 - Industrial communication networks - Profiles - Part 5-15: Installation of fieldbuses - Installation profiles for CPF 15

ICS
35.100.40
CCS
发布
2015-06-18
实施

Industrial communication networks - Profiles - Part 5-10: Installation of fieldbuses - Installation profiles for CPF 10

ICS
35.100.40
CCS
发布
2015-06-18
实施

Amendment 1 - Industrial communication networks - Profiles - Part 5-10: Installation of fieldbuses - Installation profiles for CPF 10

ICS
35.100.40
CCS
发布
2015-06-18
实施

Industrial communication networks - Profiles - Part 5-15: Installation of fieldbuses - Installation profiles for CPF 15

ICS
35.100.40
CCS
发布
2015-06-18
实施

Industrial communication networks - Profiles - Part 5-12: Installation of fieldbuses - Installation profiles for CPF 12

ICS
35.100.40
CCS
发布
2015-06-17
实施

Amendment 1 - Industrial communication networks - Profiles - Part 5-12: Installation of fieldbuses - Installation profiles for CPF 12

ICS
35.100.40
CCS
发布
2015-06-17
实施

Industrial communication networks - Profiles - Part 5-4: Installation of fieldbuses - Installation profiles for CPF 4

ICS
35.100.40
CCS
发布
2015-06-16
实施

Amendment 1 - Industrial communication networks - Profiles - Part 5-4: Installation of fieldbuses - Installation profiles for CPF 4

ICS
35.100.40
CCS
发布
2015-06-16
实施

Information technology — Enhanced communications transport protocol — Part 1: Specification of simplex multicast transport

ICS
35.100.40
CCS
发布
2014-12-31
实施

Information technology — Enhanced communications transport protocol — Part 1: Specification of simplex multicast transport

ICS
35.100.40
CCS
M11
发布
2014-12-31
实施
2014/12/31

Information technology — Enhanced communications transport protocol — Part 3: Specification of duplex multicast transport

ICS
35.100.40
CCS
发布
2014-12-31
实施

Information technology — Enhanced communications transport protocol — Part 5: Spcification of N-plex multicast transport

ICS
35.100.40
CCS
发布
2014-12-31
实施

Information technology — Enhanced communications transport protocol — Part 3: Specification of duplex multicast transport

ICS
35.100.40
CCS
L79
发布
2014-12-31
实施
2014/12/31

Information technology — Enhanced communications transport protocol — Part 5: Spcification of N-plex multicast transport

ICS
35.100.40
CCS
L79
发布
2014-12-31
实施
2014/12/31

Transport protocols supporting cybersecurity information exchange

ICS
35.100.40
CCS
发布
2014-01
实施

The procedures specified in this Recommendation | International Standard operate as extensions to those defined in ITU-T Rec. X.224 | ISO/IEC 8073 and ITU-T Rec. X.234 | ISO/IEC 8602 and do not preclude unprotected communication between transport entities implementing ITU-T Rec. X.224 | ISO/IEC 8073 or ITU-T Rec. X.234 | ISO 8602. The protection achieved by the security protocol defined in this Recommendation | International Standard depends on the proper operation of security management including key management. However, this Recommendation | International Standard does not specify the management functions and protocols needed to support this security protocol. This protocol can support all the integrity, confidentiality, authentication and access control services identified in CCITT Rec. X.800 I ISO 7498-2 as relevant to the transport layer. The protocol supports these services through use of cryptographic mechanisms, security labelling and attributes, such as keys and authenticated identities, pre-established by security management or established through the use of the Security Association — Protocol (SA-P). Protection can be provided only within the context of a security policy. This protocol supports peer-entity authentication at the time of connection establishment. In addition, rekeying is supported within the protocol through the use of SA-P or through means outside the protocol. Security associations can only be established within the context of a security policy. It is a matter for the users to establish their own security policy, which may be constrained by the procedures specified in this Recommendation | International Standard. The following items could be included in a Security Policy: a) the method of SA establishment/release, the lifetime of SA; b) Authentication/Access Control mechanisms; c) Label mechanism; d) the procedure of the receiving an invalid TPDU during SA establishment procedure or transmission of protected PDU; e) the lifetime of Key; f) the interval of the rekey procedure in order to update key and security control information (SCI) exchange procedure; g) the time out of SCI exchange and rekey procedure; h) the number of retries of sci exchange and rekey procedure. this Recommendation | International Standard defines a protocol which may be used for Security Association establishment. Entities wishing to establish an SA must share common mechanisms for authentication and key distribution. this Recommendation | International Standard specifies one algorithm for authentication and key distribution which is based on public key crypto systems. The implementation of this algorithm is not mandatory; however, when an alternative mechanism is used, it shall satisfy the following conditions: a) All SA attributes defined in 5.2 are derived. b) Derived keys are authenticated.

Information technology -- Telecommunications and information exchange between systems -- Transport layer security protocol

ICS
35.100.40
CCS
发布
2013-12-31
实施

This Recommendation | International Standard specifies: a) Two modes of procedures when operating over the connection oriented network service: 1) mode 0: acts on network signalled errors; 2) mode 4: ignores network signalled errors, for the connection oriented transfer of data and control information from one transport entity to a peer transport entity. b) The means of selecting the mode of procedures to be used by the transport entities. c) The structure and encoding of the TPDUs used for the transfer of data and control information. The procedures are defined in terms of: a) the interactions between peer transport entities through the exchange of TPDUs; b) the interactions between a transport entity and the transport service user in the same system through the exchange of transport service primitives; c) the interactions between a transport entity and the network service provider through the exchange of network service primitives. These procedures are applicable to instances of communication between systems which support the Transport Layer of the OSI Reference Model and wish to interconnect in the open systems environment using the Transport Fast Byte Protocol. This Recommendation | International Standard specifies, in clause 8, conformance requirements for systems implementing these procedures and provides the PICS proforma in compliance with the relevant requirements, and in accordance with the relevant guidance, given in ITU-T Rec. X.296 and ISO/IEC 9646-7. It does not contain tests which can be used to demonstrate this conformance.

Information technology -- Open Systems Interconnection -- Transport Fast Byte Protocol

ICS
35.100.40
CCS
发布
2013-12-31
实施



Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号