840 标准查询与下载



共找到 83 条与 相关的标准,共 6

This International Standard describes fault isolation procedures using test loops and applies to DTEs which are connected to DCEs with the automatic test loop facility, standardized in the V-series or X-series CCITT1) Recommendations. In the V-series, the means for DTE control of test loops via interchange circuits in the DTE/DCE interface are specified in CCITT Recommendations V.24 and V.54. In the X-series, the means for DTE control of test loops via interchange circuits or signals in the DTE/DCE interface are specified in CCITT Recommendations X.24, X.150 and the individual DTE/DCE Interface CCITT Recommendations X.20, X.20 bis, X.21, X.21 bis and X.22.

Information processing systems. Data communication. Automatic fault isolation procedures using test loops

ICS
840
CCS
发布
1991
实施

1 This International Standard specifies signal quality requirements for serial data transmission at the interface between synchronous transmission Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE). The interface referred to in this International Standard conforms to CCITT Recommendations V.24 (telephone networks), X.24 (data net-works) as specified in DCEs of CCITT Recommendations: V.22, V.22bis, V.23, V.26. V.26bis, V.26ter, V.27, V.27bis, V.27ter, V.29, V.32, V.33, or X.21 bis together with V.28, electrical characteristics; or V.35 together with V.28/V.35 electrical characteristics; or V.36, V.37 or X.21 together with V.107V.11, electrical characteristics; or X.22 together with V.11, electrical characteristics. It is also recognized and considered that during the evolution of ISDN there will exist V.-series and X.-series type interfaces at ISDN Reference point R, as specified in CCITT Recommen-dations V. 110, X.30 andX.31. The speed limitation is determined by the referenced CCITT DCE Recommendations in the X. (e.g. X.10) and V. (e.g. V.5, V.6) series. The signal quality requirement is limited to synchronous transmission at the interface with synchronous DCEs. Signal quality pertaining to asynchronous DTEs is not part of this International Standard. 2 This International Standard recognizes the need to have performance categories of signal quality depending on the type of interchange circuits used at the interface for signal element timing. Two classes of timing, codirectional timing and con-tradirectional timing, are considered. The signal quality is categorized by measurements of timing displacement between data and timing signals, of jitter, duty cycle, and accuracy of the timing signals. Application to ISDN Reference point S/T is excluded. 3 This International Standard is of particular importance when the interconnected equipment is furnished by different organizations. It does not attempt to indicate what action, if any, is to be taken if the limits are not met, but it is intended to provide a basis for agreement between parties involved. 4 This International Standard does not describe the signal quality of the DCE or the line associated with it. Neither does it describe any requirement for an acceptable bit error rate. 5 This International Standard may also be used for DTE to DTE direct connections when the referenced CCITT Interfaces are applied.

Information processing systems. Information exchange between systems. Synchronous transmission signal quality at DTE/DCE interfaces

ICS
840
CCS
发布
1991
实施

1 The Directory provides the directory capabilities required by OSI applications, OSI management processes, other OSI layer entities, and telecommunications services. Among the capabilities which it provides are those of 'user-friendly naming', whereby objects can be referred to by names which are suitable for citing by human users (though not all objects need have user-friendly names); and 'name-to-address mapping' which allows the binding between objects and their locations to be dynamic. The latter capability allows OSI networks, for example, to be 'self-configuring' in the sense that addition, removal and the changes of object location do not affect OSI network operation. 1 The Directory is not intended to be a general-purpose database system, although it may be built on such systems. It is assumed, for instance, that, as is typical with Communications directories, there is a considerably higher frequency of 'queries' than of updates. The rate of updates is expected to be governed by the dynamics of people and organizations, rather than, for example, the dynamics of networks. There is also no need for instantaneous global commitment of updates: transient conditions where both old and new versions of the same information are available, are quite acceptable. 1 It is a characteristic of the Directory that, except as a consequence of differing access rights or unpropagated updates, the results of directory queries will not be dependent on the identity or location of the enquirer. This characteristic renders the Directory unsuitable for some telecommunications applications, for example some types of routing.

Information technology. Open Systems Interconnection. The Directory. Part 1: Overview of Concepts, Models and Service

ICS
840
CCS
发布
1991
实施

This International Standard specifies multilink procedures where a multiplicity of parallel data links at the data link layer are used to provide a variable bandwidth data link between network layer entities. The multilink procedures (MLP) exist as a new upper sublayer of the data link layer, operating between the network layer and a multiplicity of single data link protocol functions (SLPs) in the data link layer (see figure 1). This International Standard does not specify the way in which the SLPs indicate to the MLP that the transmission of a multilink frame has successfully been completed. These multilink procedures do not preclude the use of different single link procedures, each with differing delay characteristics and/or line speeds to form one multilink group. When the procedures defined by this International Standard are to be used on one or more parallel data links, both ends of the data link must know that these procedures are to be used before the first multilink frame is sent. This could be achieved by a prior agreement that all communications on this data link will use these procedures, or by one of the SLPs negotiating the use of these procedures, or by some other means. The method by which both ends achieve a common understanding as to the use or non-use of these multilink procedures is not defined in this International Standard.

Information processing systems. Data communication. Multilink procedures

ICS
840
CCS
发布
1991
实施

This part of ISO/IEC 8880 specifies the protocol combinations to be used to support the OSI Network Service defined in ISO 8348 and its Addendum 1. The field of application of this part of ISO/IEC 8880 is that of the environments defined in the other parts of ISO/IEC 8880. The field of application may be extended by the incorporation of a new environment as specified herein. This part of ISO/IEC 8880 a) provides a general introduction; b) refers to those International Standards which define the architectural principles governing the provision of the Network Service; c) defines terms which may be used in specifying the environments in which protocol combinations operate; d) specifies principles and a framework for describing the support of the OSI Network Service; e) defines the conformance principles to be followed in the other parts of ISO/IEC 8880 which specify the requirements for equipment claiming conformance to ISO/IEC 8880; f) considers the rationale for the inclusion of protocol combinations in the other parts of ISO/IEC 8880 and the subsequent addition of protocol combinations to those parts; and g) specifies the format and content of the other parts ISO/IEC 8880 and subsequent additions to those parts. Where an environment does not support the OSI Network Service of the appropriate mode, it lies outside the field of application of ISO/IEC 8880.

Information processing systems. Protocol combinations to provide and support the OSI network service. Part 1: General principles

ICS
840
CCS
发布
1991
实施

This part of ISO/IEC 8880 describes is the provision and support of the Connectionless-mode Network Service defined in ISO 8348. The field of application of ISO/IEC 8880-2 is the environments defined in 1.5.

Information processing systems. Protocol combinations to provide and support the OSI network service. Part 3: Provision and support of the connectionless-mode network service

ICS
840
CCS
发布
1991
实施

1 The models defined in this part of ISO/IEC 9594 provide a conceptual and terminological framework for the other parts of ISO/IEC 9594 which define various aspects of the Directory. 2 The functional and organizational models define ways in which the Directory can be distributed, both functionally and administratively. 3 The security model defines the framework within which security features, such as access control, are provided in the Directory. 4 The information model describes the logicai structure of the DIB. From this viewpoint, the faet that the Directory is distributed, rather than centralized, is not visible. The other parts of ISO/IEC 9594 make use of the concepts of the information framework. Specifically: a) the service provided by the Directory is described (in ISO/IEC 9594-3) in terms of the concepts of the information framework: this allows the service provided to be somewhat independent of the physical distribution of the DIB; b) the distributed operation of the Directory is specified (in ISO/IEC 9594-4) so as to provide that service, and therefore maintain that logicai information structure, given that the DIB is in fact highly distributed.

Information technology. Open Systems Interconnection. The Directory. Part 2: Models

ICS
840
CCS
发布
1991
实施

This International Standard is applicable to data stations employing HDLC balanced classes of procedures which provide the XID command/response capability with the two specific parameter fields, identified below. It is used to select a pair of operational link addresses when preassigned, system designated addresses are not known on an apriori basis; e.g., switched circuit data links. Additional XID frame functions (including the exchange of operational parameters, command/response support, higher layer information, etc.) may be accomplished in conjunction with data link layer address determination or following address determination, with additional XID frame exchanges. NOTE ? Address resolution procedures for situations where the remote DTE does not have XID frame, "all-station" address, or complete address support capabilities as defined in clause 4 below are not within the scope of this International Standard.

Information processing systems. Data communications. High-level data link control balanced classes of procedures. Data-link layer address resolution/negotiation in switched environments

ICS
840
CCS
发布
1991
实施

flis part of ISO/IEC 9318 describes the Logicai Level 3 (generic level) Interface for tape drives. See clause 6 of the 〓O/IEC 9318-1 for an explanation of the levels. The physical, electrical, and configuration characteristics and the transmission protoeol of this interface are in accordance with ISO/IEC 9318-1. The interface is capable of handling data rates from 0 to at least 10 Moctets/s per second, depending on driver and receiver classes. The purpose of this part of ISO/IEC 9318 is to facilitate the development and utilization of an intelligent interface which permits the interconnection of multiple peripheral types such as disk, tape, communications, to a controller. This part of ISO/IEC 9318 does not replace any existing standard, but it does complement other Intelligent Peripheral Interface (IPI) standards (see clause 2). This part of ISO/IEC 9318 provides a definition of the device-generic portion of a family of standards cailed the Intelligent Peripheral Interface (IPI), a high performance, general-purpose parallel peripheral interface. The intent of the IPI is to isolate the host (CPU), both hardware and software, from changes in peripherals by providing a "function-generic" command set to allow the connection of multiple types of peripherals (disks, printers, tapes, communications). To smooth the transition from the current methods to the generic approach, the IPI supports device-specific command sets to aid in bridging the gap between the two approaches. 〓 accomplish this set of goals, the design of the IPI includes device-specific and device-generic command sets, both utilizing a common physical bus. The device-specific command set provides - devicc-oriented control; - physical data addressing; - timing critical operations; - lower device cost. The device-generic command set provides a higher level of functionality and portability. It includes - host/device independence; - logicai data addressing; - timing independence; - command queuing capability. A system is not restricted to the use of one level of command set or the other. It is possible that both levels of command sets will be utilized with a given system's architecture to balance such parameters as system performance, cost, and peripheral availability. It is also possible for the host to provide for the migration from device-specific to device-generic levels while still retaining the same physical interface.

Information processing. Intelligent Peripheral Interface. Device generic command set for magnetic tape drives

ICS
840
CCS
发布
1991
实施

1 This part of ISO/IEC 9594: specifies the form of authentication information held by the Directory; describes how authentication information may be obtained from the Directory; states the assumptions made about how authentication information is formed and placed in the Directory; defines three ways in which applications may use this authentication information to perform authentication and describes how other security services may be supported by authentication. 1.2 This part of ISO/IEC 9594 describes two levels of authentication: simple authentication, using a password as a verification of claimed identity; and strong authentication, involving credentials formed using cryptographic techniques. While simple authentication offers some limited protection against unauthorized access, only strong authentication should be used as the basis for providing secure services. It is not intended to establish this as a general framework for authentication, but it can be of general use for applications which consider these techniques adequate. 1.3 Authentication (and other security services) can only be provided within the context of a defined security policy. It is a matter for users of an application to define their own security policy which may be constrained by the services provided by a standard. 1.4 It is a matter for standards defining applications which use the authentication framework to specify the protocol exchanges which need to be performed in order to achieve authentication based upon the authentication information obtained from the Directory. The protocol used by applications to obtain credentials from the Directory is the Directory Access Protocol (DAP), specified in ISO/IEC 9594-5. 1.5 The strong authentication method specified in this part of ISO/IEC 9594 is based upon public-key cryptosystems. It is a major advantage of such systems that user certificates may be held within the Directory as attributes, and may be freely communicated within the Directory System and obtained by users of the Directory in the same manner as other Directory information. The user certificates are assumed to be formed by 'off-line' means, and placed in the Directory by their creator. The generation of user certificates is performed by some offline Certification Authority which is completely separate from the DSAs in the Directory. In particular, no special requirements are placed upon Directory providers to store or communicate user certificates in a secure manner. A brief introduction to public-key cryptography can be found in annex B. 1.6 In general, the authentication framework is not dependent on the use of a particular cryptographic algorithm, provided it has the properties described in 6.1. Potentially a number of different algorithms may be used. However, two users wishing to authenticate shall support the same cryptographic algorithm for authentication to be performed correctly. Thus, within the context of a set of related applications, the choice of a single algorithm will serve to maximize the community of users able to authenticate and communicate securely. One example of a public key cryptographic algorithm can be found in Annex C. 1.7 Similarly, two users wishing to authenticate shall support the same hash function (see 3.3f) (used in forming credentials and authentication tokens). Again, in principle, a number of alternative hash functions could be used, at the cost of narrowing the communities of users able to authenticate. A brief introduction to hash functions together with one example hash function can be found in annex D.

Information technology. Open Systems Interconnection. The Directory. Part 8: Authentication Framework

ICS
840
CCS
发布
1991
实施

This International Standard specifies a set of basic encoding rules that may be used to derive the specification of a transfer syntax for values of types defined using the notation specified in ISO/IEC 8824. These basic encoding rules are also to be applied for decoding such a transfer syntax in order to identify the data values being transferred. These basic encoding rules are used at the time of communi-cation (by the presentation service provider when required by a presentation context).

Information technology. Open Systems Interconnection. Specification of Basic Encoding Rules for Abstract Syntax Notation One (ASN.1)

ICS
840
CCS
发布
1991
实施

This International Standard specifies the method of providing the OSI Connection-mode Network Service (CONS) by packet mode terminal equipment connected to an Integrated Services Digital Network (ISDN) in accordance with the procedures described in CCITT Recommendation X.31. This is done by specifying the mapping of the CONS primitives and parameters to and from the elements of the protocols used by two types of packet mode terminal equipment: a) an X.25 DTE (TE2) connected to an R reference point and accessing an ISDN; and b) a packet mode ISDN terminal (TE1) operating ISO 8208 packet layer protocol (PLP) and connected to an ISDN at either the S or T reference point. NOTE - The definitions of TE1, TE2 and TA equipment, and R, S, and T reference points are given in CCITT Recommendation 1.411. This International Standard applies to a TE 1 or TE2/TA (i.e., an OSI End System) regardless of whether it is a physically separate system or embedded in other equipment such as a PBX. This International Standard addresses the provision of the CONS using Virtual Calls as described in CCITT Recommendation X.25, it does not address the use of X.25 Permanent Virtual Circuits. NOTE - This International Standard uses numbers to identify layers, rather than their names. This is done to align the terminology of this document with the terminology of the related CCITT Recommendations for ISDN, and does not imply any change in the functionality of the layers from that defined in the Basic Reference Model for Open Systems Interconnection.

Information technology. Telecommunications and information exchange between systems. Provision of the OSI connection-mode network service by packet mode terminal equipment connected to an integrated services digital network (ISDN)

ICS
840
CCS
发布
1991
实施

The OSt CONS, as stated above, is defined in terms of a set of primitive actions and events and associated parameters. For a protocol to support this service, there must be a mapping between the abstract primitives and parameters of the CONS and the real elements of the protocol. This International Standard provides such a mapping for the X.25/PLP-1984. It also provides a mapping of the CONS primitives and parameters to the X.25/PLP-1980 plus an SNDCP (Annex A). In addition, the method of selecting the appropriate mapping, if any, for different combinations of end systems and Network Layer relay systems implementing one or more of the mappings is defined (Annex B). This International Standard specifies the conformance requirements for three classes of implementation. These requirements are applicable both to end system operation and to half the operation of a Network Layer relay. Where relay operation is concerned, the two halves of the relay may be the same or different classes of implementation. This International Standard specifies the requirements to be met by a Conforming-1984 implementation. Implementations in this class are designed to operate directly and efficiently with other Conforming-1984 implementations, including cases of operation across an X.25(1984) subnetwork. This International Standard also specifies the requirements to be met by a Conforming-1980 implementation. Implementations in this class are designed to operate directly with other Conforming-1980 implementations, including cases of operation across any form of X.25 subnetwork, but will operate less efficiently than Conforming-1984 implementations. This International Standard also specifies the requirements to be met by a Compatible implementation. Implementations in this class are designed to operate directly with all other implementation classes, including cases of operation across any type of X.25 subnetwork. They make efficient use of X.250984) when placed in this environment.

Information processing systems. Data communications. Use of X.25 to provide the OSI connection-mode network service

ICS
840
CCS
发布
1991
实施

Recognizing the dissimilarity of various language standards, the objective of this Technical Report is to provide guidelines for the preparation of conformity clauses for processors and conformity clauses for programs in language standards, together with an annex containing a checklist to aid in this preparation. It was not considered practical to provide model statements that would be suitable for inclusion in all language standards. Therefore, examples have been given to illustrate the type of issues that should be addressed and it is anticipated that these will be adapted, where appropriate, for inclusion in a particular language standard. It should be borne in mind when reading this document that not all concepts will be applicable to all languages. As examples, language standards do not all specify subsets or permit extensions, and elements that are fully specified by one language standard may be dependent on the processor in another.

Guidelines for the preparation of conformity clauses in programming language standards

ICS
840
CCS
发布
1991
实施

ISO/IEC 9592 specifies a language independent nucleus of a graphics system. For integration into a programming language, PHIGS is embedded in a language dependent layer obeying the particular conventions of that language. This part of ISO/IEC 9593 specifies such a language dependent layer for the Ada computer programming language.

Information technology. Computer graphics. Programmer's Hierarchical Interactive Graphics System (PHIGS) language bindings. Part 3: Ada

ICS
840
CCS
发布
1991
实施

1 This part of ISO/IEC 9594 defines in an abstract way the externally visible service provided by the Directory. 1 This part of ISO/IEC 9594 does not specify individual implementations or products.

Information technology. Open Systems Interconnection. The Directory. Part 3: Abstract Service Definition

ICS
840
CCS
发布
1991
实施

1 This Part of ISO/IEC 9594 specifies the behavior of DSAs taking part in the distributed Directory application. The allowed behavior has been designed so as to ensure a consistent service given a wide distribution of the DIB across many DSAs. 1 The Directory is not intended to be a general purpose database system, although it may be built on such systems. It is assumed that there is a considerably higher frequency of queries than of updates.

Information technology. Open Systems Interconnection. The Directory. Part 4: Procedures for Distributed Operations

ICS
840
CCS
发布
1991
实施

The standard provides a general introduction to the concepts and mechanisms specified in parts 2 to 4 of ISO 8571.

Information processing systems. Open systems interconnection. File transfer, access and management. Part 1: General introduction

ICS
840
CCS
发布
1990
实施

Information processing systems. Data communications. Protocol for providing the connectionless-mode network service

ICS
840
CCS
发布
1990
实施

Infromation on Data Transmission Standards. OSI-layers 1-4. Part 2

ICS
840
CCS
发布
1990
实施



Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号