An Implementation of the OSI Upper Layers and Applications

نویسندگان

  • David C. Robinson
  • Larwence N. Friedman
  • Scott A. Wattum
چکیده

1 Abstract Above the transport layer, the open systems interconnection (OSI) basic reference model describes several application standards supported by a common upper layer protocol stack. Digital's high-performance implementation of the upper layers of the protocol stack concentrates on maximizing data throughput while minimizing connection establishment delay. An additional benefit derived from the implementation is that, for normal data exchanges, the delivery delay is also minimized. The implementation features of Digital's two OSI applications-file transfer, access, and management (FTAM) and virtual terminal (VT)-include the use of common code to facilitate portability and efficient buffer management to improve performance. The open systems interconnection (OSI) basic reference model defined in the International Organization for Standardization standard ISO 7498-1 specifies a layered protocol model consisting of seven layers.[1] By convention, the first four layers-physical, data link, network, and transport-are referred to as the lower layers.[2] These layers provide a basic communication service by reliably transferring unstructured user data through one or more networks. The remaining layers-session, presentation, and application-build on the lower layers to provide services that structure data exchanges and maintain information in data exchanges to support distributed applications. These three layers are known collectively as the upper layers. This paper first gives an overview of the OSI upper layers and of two application standards-file transfer, access, and management (FTAM) and virtual terminal (VT). The discussion that follows concentrates on the features of Digital's implementation of the upper layers and the two applications, with emphasis on novel implementation approaches. 2 Summary of OSI Upper Layer Standards The application-independent parts of the OSI upper layers are defined in the following standards:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Octet Sequences for Upper-Layer OSI to Support Basic Communications Applications

This document states particular octet sequences that comprise the OSI upper-layer protocols (Session, Presentation and ACSE) when used to support applications with "basic communications requirements". These include OSI application protocols such as X.400 P7 and Directory Access Protocol, and "migrant" protocols, originally defined for use over other transports. As well as the octet sequences wh...

متن کامل

A programming environment for distributed applications based on OSI application services

However, the practical use of the OSI protocols for distributed applications is complicated today by the numerous design choices left to an application developer by the OSI upper-layer standards. Development tools for OSI upper layers existing today do not address this issue. Thus, the developer of a distributed application has to be an expert on the OSI upper layer standard documents to be abl...

متن کامل

Lower Layer Design of Narrowband PLC Node for AMR and AMM Applications and Network Layer Protocol Verification

This paper describes design of a network node, which uses narrowband powerline communication for data exchange in AMR and AMM networks. Also an implementation of first two ISO/OSI layers is described in this paper. Data reception synchronization and some indicators for upper layer functions as the capabilities of physical layer are detailed. A passage about data link layer is focused on the fra...

متن کامل

Eecient Implementation of Estelle Speciications Eecient Implementation of Estelle Speciications

E cient implementation of communication software is of critical importance for highspeed networks. We analyze performance bottlenecks in existing implementations and propose two techniques for improvements: The rst exploits parallelism not only in the actions of the FSMs, but also in the runtime system of the protocol stack. The second integrates adjacent layers leading to considerable savings ...

متن کامل

Network Layer Security

INTRODUCTION Modern computer networks are characterized by layered protocol architectures, allowing network designs to accommodate unlimited applications and interconnection techniques. This layered approach allows protocols to become modularized; that is, developed independently and put together with other protocols in such a way as to create one complete protocol. The recognized basis of prot...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Digital Technical Journal

دوره 5  شماره 

صفحات  -

تاریخ انتشار 1993