5 . 6 Compressed Data Packet ( Tag 8 ) 5 . 7 Symmetrically Encrypted Data Packet ( Tag 9 ) 5 . 8 Marker Packet

نویسندگان

  • Jon Callas
  • Lutz Donnerhacke
  • Hal Finney
  • Rodney Thayer
چکیده

This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OP format. It is not a step-by-step cookbook for writing an application, it describes only the format and methods needed to read, check, generate and write conforming packets crossing any network. It does not deal with storing and implementation questions albeit it is necessary to avoid security flaws.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

5 . 5 . 3 Secret Key Packet Formats 5 . 6 Compressed Data Packet ( Tag 8 ) 5 . 7

This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OP format. It is not a step-by-step cookbook for writing an application, it describes only the format and methods needed to read, check, generate and write conforming packets crossing any network. It does not deal with storing and implementation questions albeit it...

متن کامل

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

Circuit Emulation over Packet Switched Networks (CESoP) - White Paper

.......................................................................................................................... 2 Carrying TDM Services over a Packet Network .............................................................. 2 An Evolutionary Approach ........................................................................................... 3 Standards .....................................

متن کامل

Structured Stream Transport Preliminary Protocol Specification

3 Channel Protocol 5 3.1 Protocol Organization . . . . . . . . . . . 5 3.2 Packet Layout . . . . . . . . . . . . . . . 5 3.3 Channel Identification . . . . . . . . . . . 6 3.4 Sequencing Layer . . . . . . . . . . . . . 6 3.4.1 Sequencing Barriers . . . . . . . 6 3.4.2 Extrapolating Sequence Numbers 6 3.5 Encoding Layer . . . . . . . . . . . . . . 7 3.6 Integrity Layer . . . . . . . . . . . . . ...

متن کامل

Network Working Group Request for Comments: 2032 Category

1. Abstract ............................................. 1 2. Purpose of this document ............................. 2 3. Structure of the packet stream ....................... 2 3.1 Overview of the ITU-T recommendation H.261 .......... 2 3.2 Considerations for packetization .................... 3 4. Specification of the packetization scheme ............ 4 4.1 Usage of RTP .......................

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998