INTERNET - DRAFT Expires : 28
نویسندگان
چکیده
The Datagram Congestion Control Protocol (DCCP) is a transport protocol that provides bidirectional unicast connections of congestion-controlled unreliable datagrams. DCCP is suitable for applications that transfer fairly large amounts of data, but can benefit from control over the tradeoff between timeliness and reliability. Kohler/Handley/Floyd [Page 1] INTERNET-DRAFT Expires: 28 May 2006 November 2005 TO BE DELETED BY THE RFC EDITOR UPON PUBLICATION: Changes since draft-ietf-dccp-spec-08.txt: * Added minimum Sequence Window. * Init Cookie implementation sketch. * Include reasoning for ignoring options on DCCP-Data. * More Aggression Penalty explanation. * More explanation on Ack Vectors that report information on packets that haven’t been sent. Changes since draft-ietf-dccp-spec-07.txt: * Many changes, not listed here, for WGLC. * The more stringent Sequence Number checks on DCCP-Sync and DCCPSyncAck packets become SHOULD, not MAY. Changes since draft-ietf-dccp-spec-06.txt: * Change extended sequence numbers. Now 48-bit sequence numbers are MANDATORY, and all packet types except Data, Ack, and DataAck always use 48-bit sequence numbers. This change improves DCCP’s robustness against blind attacks. * Removed empty Change options. * Allow preference list changes during feature negotiations (this seems easier to implement than the alternative). This required a new feature negotiation state, UNSTABLE. * Add Minimum Checksum Coverage feature. * Add Reset Congestion State option. * Simplify the implementation of CCID-specific option processing: no need to check whether the CCID feature is being negotiated. * Many more minor changes. Changes since draft-ietf-dccp-spec-05.txt: * Organization overhaul. Kohler/Handley/Floyd [Page 2] INTERNET-DRAFT Expires: 28 May 2006 November 2005 * Add pseudocode for event processing. * Remove # NDP; replace with Ack Count. * Remove Identification, Challenge, ID Regime, and Connection Nonce. * Data Checksum (formerly Payload Checksum) uses a 32-bit CRC. * Switch location of non-negotiable features to clarify presentation; now the feature location controls its value. * Rename "value type" to "reconciliation rule". * Rename "Reset Reason" to "Reset Code". * Mobility ID becomes 128 bits long. * Add probabilities to Mobility ID discussion.
منابع مشابه
Internet - Draft Service URN August 2006
The content of many communication services depends on the context, such as the user’s location. We describe a ’service’ URN that allows to identify context-dependent services that can be resolved in a distributed manner. Schulzrinne Expires February 28, 2007 [Page 1] Internet-Draft Service URN August 2006 Table of
متن کاملInternet - Draft Replaces April 2002
This document proposes a new header for use with the SIP call control architecture. The Replaces header is used in peer-to-peer call control to logically replace an existing SIP dialog with a new SIP dialog. This primitive can be used to enable a variety of features, for example: "Attended Transfer" and "Retrieve from Call Park". Note that definition of these example features is non-normative. ...
متن کاملInternet Draft DHCP for IPv 6 22 November 2000
The Dynamic Host Configuration Protocol for IPv6 (DHCP) enables DHCP servers to pass configuration parameters such as IPv6 network addresses to IPv6 nodes. It offers the capability of automatic allocation of reusable network addresses and additional configuration flexibility. This protocol is a stateful counterpart to ‘‘IPv6 Stateless Address Autoconfiguration’’ [14], and can be used Bound, Car...
متن کاملINTERNET - DRAFT UCLA draft -
The Datagram Congestion Control Protocol (DCCP) is a transport protocol that provides bidirectional unicast connections of congestion-controlled unreliable datagrams. DCCP is suitable for applications that transfer fairly large amounts of data, but can benefit from control over the tradeoff between timeliness and reliability. Kohler/Handley/Floyd [Page 1] INTERNET-DRAFT Expires: 28 May 2006 Nov...
متن کاملInternet - Draft C . Jennings Expires : September 7 , 2006
Spam, defined as the transmission of bulk unsolicited messages, has plagued Internet email. Unfortunately, spam is not limited to email. It can affect any system that enables user to user communications. The Session Initiation Protocol (SIP) defines a system for user to user multimedia communications. Therefore, it is susceptible to spam, just as email is. In this document, we analyze the probl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006