Документ взят из кэша поисковой машины. Адрес оригинального документа : http://www.cplire.ru/rus/os/3_6/2.htm
Дата изменения: Tue Dec 21 20:05:09 1999
Дата индексирования: Tue Oct 2 05:37:55 2012
Кодировка: Windows-1251

Поисковые слова: images
GOVERNMENT OPEN SYSTEMS INTERCONNECTION PROFILE (GOSIP)

GOVERNMENT OPEN SYSTEMS INTERCONNECTION PROFILE (GOSIP)
Federal Information Processing Standards Puplication (FIBS PUB 146-1)

Computer Systems Laboratory
National Institute of Standards and Technology
Gaithersburg, MD 20899

USA, WAshington, 1991

This publication is a revision of FIPS 146 and supersedes FIPS 146 in its entirety. PIPS 146 adopted the Government Open Systems Interconnection Profile (GOSIP) which defines a common set of data communication protocols that enable systems developed by different vendors to interoperate and the users of different applications on those systems to exchange information. This revision contains all of the protocols in FIPS 146 plus additional protocols which provide new services useful to Federal agencies and increase the interoperability achievable among end systems of different manufacture. This revision also includes minor technical changes to the protocols in FIPS 146. These changes are detailed in Section 1.7 of the technical specifications document.
Key words: computer communications; Federal Information Processing Standards Publication; GOSIP; information exchange; International Standards Organization; inter-operability; NIST OSI Implementors Workshop; networking; open systems; protocols;
protocol standards.

Federal Information Processing Standards Publication 146-1 1991 April 3
Specifications for
GOVERNMENT OPEN SYSTEMS INTERCONNECTION PROFILE (GOSIP)

TABLE OF CONTENTS

LIST OF FIGURES    iv
LIST OF TABLES    v
FOREWORD   vi
PREFACE    vii
GLOSSARY   viii

1.  I NTRODUCTION   1
        1.1  BACKGROUND  1
        1.2  PURPOSE   1
        1.3  EVOLUTION OF THE GOSIP   1
        1.4  SCOPE   2
        1.5 APPLICABILITY   2
        1.6  GOSIP VERSION 2 FUNCTIONALITY   2
        1.7  GOSIP Version 1 Errata   3
        1.8 SOURCES OF PROTOCOL SPECIFICATIONS   3
                1.8.1  Primary Source  3
                1.8.2  Secondary Sources  3
                1.8.3  Tertiary Sources   4

2.  TESTING OF GOSIP-COMPLIANT PRODUCTS   5
        2.1  CONFORMANCE TESTING   5
        2.2  INTEROPERABILITY TESTING   5
        2.3  PERFORMANCE TESTING   6
        2.4  FUNCTIONAL TESTING   6
        2.5  VENDOR ENHANCEMENTS   6

3.  DESCRIPTIONS OF ARCHITECTURE AND PROTOCOLS   7
        3.1  ARCHITECTURE DESCRIPTION   7
        3.2  PROTOCOL DESCRIPTIONS   10

4.  PROTOCOL SPECIFICATIONS  12
        4.1  USE OF THE LAYERED PROTOCOL SPECIFICATIONS 12
                4.1.1 Protocol Selection  12
                4.1.2 Service Interface Requirements  12
                4.1.3 Performance Requirements  13
        4.2 END SYSTEM SPECIFICATION  13
                4.2.1 Physical Layer  13
                4.2.2 Data Link Layer  13
                4.2.3 Network Layer Service  14
                        4.2.3.1 Connectionless Mode Network Service  14
                        4.2.3.2 Connection-Oriented Network Service  14
                        4.2.3.3 Network Layer Protocol Identification 15
                        4.2.3.4 Special Provisions For Integrated Services Digital Networks 15
                4.2.4 Transport Layer  16
                        4.2.4.1 Connection-Oriented Transport Service  16
                        4.2.4.2 Connectionless Mode Transport Service  16
                4.2.5 Session Layer  16
                4.2.6 Presentation Layer 17
                4.2.7 Application Layer. 17
                        4.2.7.1 Association Control Service Elements  17
                        4.2.7.2 File Transfer, Access, and Management Protocol (FTAM) 17
                        4.2.7.3 Message Handling Systems  17
                        4.2.7.4 Virtual Terminal (VT) Basic Class  18
                4.2.8 Exchange Formats  18
                        4.2.8.1 Office Document Architecture (ODA)  18
        4.3 INTERMEDIATE SYSTEM SPECIFICATION  19

5. ADDRESSING REQUIREMENTS  20
        5.1 NETWORK LAYER ADDRESSING AND ROUTING . 20
                5.1.1 NSAP Address Administration, Routing Structures and NSAP Address Structure  20
                5.1.2 NSAP Address Registration Authorities  22
                        5.1.2.1 Responsibilities Delegated by NIST . 22
                5.1.3 GOSIP Routing Procedures  23
        5.2 UPPER LAYERS ADDRESSING  23
                5.2.1 Address Structure  23
                5.2.2 Address Assignments   24
                5.2.3 Address Registration  24
        5.3 IDENTIFYING APPLICATIONS  24
                5.3.1 FTAM and File Transfer User Interface Identification   24
                5.3.2 MHS and Message User Interface Identification    24

6. SECURITY OPTIONS / 26
        6.1 REASON FOR DISCARD PARAMETERS  26
        6.2 SECURITY PARAMETER FORMAT  27
                6.2.1 Parameter Code  27
                6.2.2 Parameter Length   27
                6.2.3 Parameter Value  27
                        6.2.3.1 Security Format Code  28
                        6.2.3.2 Basic Portion   28
                        6.2.3.3 Extended Portion  28
        6.3 BASIC PORTION OF THE SECURITY OPTION   28
                6.3.1 Basic Type Indicator . 28
                6.3.2 Length of Basic Information   29
                6.3.3 Basic Information   29
                6.3.3.1 Classification Level  29
                6.3.3.2 Protection Authority Flags  29
        6.4 EXTENDED PORTION OF THE SECURITY OPTION  30
                6.4.1 Extended Type Indicator  31
                6.4.2 Length of Extended Information  31
                6.4.3 Extended Information   31
                        6.4.3.1 Additional Security Information Format Code  32
                        6.4.3.2 Length of Additional Security Information 32
                        6.4.3.3 Additional Security Information   32
        6.5 USAGE GUIDELINES  33
                6.5.1 Basic Portion of the Security Option   33
                6.5.2 Extended Portion of the Security Option   33
        6.6 OUT-OF-RANGE PROCEDURE   33
        6.7 TRUSTED INTERMEDIARY PROCEDURE  34

REFERENCES   35

ТЕКСТ:
находится в библиотеке Секции открытых систем Совета РАН "Научные телекоммуникации и
информационная инфраструктура"