Ulllted States Patent [19] [11] Patent Number: 6 003 084 (I S

Total Page:16

File Type:pdf, Size:1020Kb

Ulllted States Patent [19] [11] Patent Number: 6 003 084 (I S US006003084A Ulllted States Patent [19] [11] Patent Number: 6 9 003 9 084 Green et al. [45] Date of Patent: *Dec. 14 a 1999 [54] SECURE NETWORK PROXY FOR FOREIGN PATENT DOCUMENTS CONNECTING ENTITIES 0 554 182 A1 4/1993 European Pat. Off. ...... .. H04L 29/06 _ . _ . 96/13113 5/1996 European Pat. Off. ...... .. H04L 29/06 [75] Inventors‘ Mlchael W‘ Green’ shorevlew’ Rlcky 0 743 777A2 11/1996 European Pat. Off. ...... .. H04L 29/06 R9nald Kruse> Ham Lake> both of 97/13340 4/1997 European Pat. Off. ........ .. H04L 9/00 Mmn' 97/16911 5/1997 European Pat. Off. ...... .. H04L 29/06 _ _ _ 97/26731 7/1997 European Pat. Off. ........ .. H04L 9/00 [73] Asslgneez Secure Computlng Corporatlon, 96/31035 10/1996 WIPO .......................... .. H04L 12/24 ROSGVillG, Minn. 97/29413 8/1997 WIPO . [*l NOIiCeI This patent issued on a continued pros- OTHER PUBLICATIONS $22183 25311122111131? tltllrédgeiz C52}; “100% of Hackers Failed to Break Into One Internet Site éltent ’Ierm rovlisions of 35 6 g C Protected by Sidewinder”, News release, Secure Computing I1)54(a)(2) p ' ' ' Corporation (Feb. 16, 1995). ' “Internet Security System Given ‘Product of the Year’ Award”, News Release, Secure Computing Coporation [21] Appl. NO.Z 08/713,424 (Mal-I 28, 1995)' [22] Flled: Sep' 13’ 1996 (List continued on next page.) [51] Int. Cl.6 .................................................... .. G06F 13/00 I I I [52] US. Cl. ......................... .. 709/227; 709/203; 709/230 Primary Exammer—larnl Maung [58] Field of Search ....................... .. 395/18701 18801- Assistant Examiner—David M Ovedovitz 709/224, 225, 227, 228, 230, 503, 219’ Attorney, Agent, or Firm—Schwegman, Lundberg, Woessner and Kluth [56] References Cited [57] ABSTRACT U.S. PATENT DOCUMENTS A proxy which is part of a ?rewall program controls 3,956,615 5/1976 Anderson et al. ............... .. 235/61.7 B exchanges of_ information between two application_ entities._ 471047721 8/1978 Markstein et a1_ 364/200 The proxy interrogates attempts to establish a communica 4,177,510 12/1979 Appell et a1, ,,,,,, __ 364/200 tion session by requesting entities with a server entity in 4,442,484 4/1984 Childs, Jr. et al. .. 364/200 lower layers in accordance with de?ned authentication pro 4,584,639 4/1986 Hardy ----------------- ~~ 364/200 cedures. The proxy interfaces with networking software to 4,621,321 11/1986 Boebert ct a1~ ~~ 364/200 direct a communication stack to monitor connection requests 476487031 3/1987 Jenner et al' 364/200 to any address on speci?c ports. The requestor’s address, and 4’7O1’84O 10/1987 Boebert et a1‘ " 364000 the server’s address are checked against an access control 4,713,753 12/1987 Boebert et al. .. 364/200 1. If . h dd . rd h 1 h 4,870,571 9/1989 Frink .......... .. 364/200 15L, 6“ er a fess ,15 “Na 1 > t 6 Foxy. C 0565 t 6 Con‘ 478857789 12/1989 Burger CI a1_ 38O/25 nection. If both are valid, a new connection is setup such that 570937914 3/1992 coplien et a1_ __ 395 /700 both the requestor and server are transparently connected to 5,124,984 6/1992 Engel ,,,,,,,,,,,,, ,, 370/230 the proxy with variable higher levels being connected in a 5,153,918 10/1992 Tuai . .. 380/25 relay mode. Protocol data units are interrogated for con 5,204,961 4/1993 Barlow .................................. .. 395/725 formanoe to a protocol Session, and optionally further 5,228,083 7/1993 Lozowick et al. ........................ .. 380/9 decoded to add additional application Speci?c ?ltering In 572637147 11/1993 Franclsco et a1‘ 395/425 one embodiment, an OSI architecture comprises the levels. 5,272,754 12/1993 Boebert ................................... .. 380/25 (List continued on next page.) 29 Claims, 4 Drawing Sheets 234 230 212 216 (I S F ‘ _ _ _ _ __1 ‘OSI X.500 DAP REPLY—— 'I I I I I I I I II II ‘OSI X500 DAP R P @ ' _ _ _ — “‘ I x.5oo . : OSI UN-ENCODING I E LY X500 I I §|-_|El"_ (PHAZI' _ OSI x.5o0 DAP BIND __ r ROUTINES (TRANSPORT r _ OSI x500 DAP BIND __ ‘SERVER (050' I. _ _ _ _ _ _ _ _I SRC: DUA DEST: DSA : SESSION, PRESENT., : SRC: DUA DEST: DSA I_ I I I I I I I I . I ACSE/ROSE I 1 I ACSE/ROSE I @ I 1 I ACSE/ROSE } : os| PRESENTAT: ‘ OSI T_C0NNECT_REPLY— ; 1 ‘ os| T_C0NNECT_REPLY— { OSI PRESENTATI' I I I X500 I I I | 05' SESSION r @909 LCONNECLREOUEST I PROXY I @osl T_CONNECT_REQUEST | 05' SESSION I I OSI TRANSPORTI SRQPIUA P551 P? 1 { SRQPPA 95.51- P?‘ " : OSI TRANSPORT: \_ _ _ _ _ _ __J //’ \\ t- . _ _ _ _ _ _ _ _ ___| //’ ‘ \_ _ _ _ _ _ ___1 TCP/IP ,’ ‘ TCP_C0NNECT_REPLY@— l\ TCP/IP TCP/IPIl ‘ TCP_CONNECT_REPLY ®\\ T(IF/IF’ ‘r ®TCP_CONNECT_REQUEST /' \ @TCP_CONNECT_REQUEST /' \? SRC: DUA DEST: DSA f/ \f SRC: SWDER DEST: osA-y/ 6,003,084 Page 2 US. PATENT DOCUMENTS Fine, T., et al., “Assuring Distributed Trusted Mach”, Pro ceedings of the IEEE Computer Society Symposium on 5,276,735 1/1994 Boebert et al. ......................... .. 380/21 research in Security and Privacy, 206—218 (1993). 5,303,303 4/1994 White . .. 380/49 5,305,385 4/1994 Schanning et al. 380/49 Foltz, P.W., et al., “Personalized Information Delivery: An Analysis of Information Filtering Methods”, Communica 5,311,593 5/1994 Carmi . .. 380/23 5,329,623 7/1994 Smith etal. .. 395/275 tioin of the ACIVI, 35, 51—60 (Dec. 1992). 5,333,266 7/1994 Boaz et al. .......... .. 395/200 Goldberg, D., et al., “Using Collaborative Filtering to Weave 5,355,474 10/1994 Thuraisngham et al. ............. .. 395/600 an Information Tapestry”, Communications of theACll/I, 35, 5,414,833 5/1995 Hershey et al. ...................... .. 395/575 61—70 (Dec. 1992). 5,416,842 5/1995 Aziz . .. 380/30 Grampp, F.T., “UNIX Operating System Security”, AT&T 5,485,460 1/1996 Schrier et al. .. 370/94.1 Bell Laboratories Technical Journal, 63, 1649—1672 (Oct. 5,511,122 4/1996 Atkinson . .. 380/25 5,530,758 6/1996 Marino, Jr. et al. .................... .. 380/49 1984). 5,548,646 8/1996 Aziz et al. .............................. .. 380/23 Haigh, J .t., et al., “Extending the Non—Interference Version 5,550,984 8/1996 Gelb ............ .. 395/200.17 of MLS for SA ”, Proceedings of the 1986 IEEE Sympo 5,566,170 10/1996 Bakke et al. .... .. 370/392 sium on Security and Privacy, Oakland, CA, 232—239 (Apr. 5,583,940 12/1996 Vidrascu et al. ....... .. 380/49 7—9, 1986). 5,604,490 2/1997 Blakely, III et al. .. 340/825.31 Kent, S.T., “Internet Privacy Enhanced Mail”, Communica 5,606,668 2/1997 Shwed ............. .. 395/200.11 5,608,720 3/1997 Biegel et al. ..... .. 370/249 tions of the ACM, 48—60 (Apr. 1993). 5,615,340 3/1997 Dai et al. .... .. .. 395/200.17 Lampson. B.W., “dynamic Protection Structures”, AFIPS 5,619,648 4/1997 Canale et al. .. 395/200.01 Conference Proceedings, vol. 35, 1969 Fall Joint Computer 5,623,601 4/1997 Vu ............... .. 395/187.01 ConferenceLas Vegas, NV, 27—38 (Nov. 18—20, 1969). 5,636,371 6/1997 Yu .... .. 395/500 Lee, K—C., et al., “A Framework for Controlling Coopera 5,644,571 7/1997 Seaman . 370/401 tive Agents”, Computer, 8—16 (Jul. 1993). 5,671,279 9/1997 Elgamal .... .. 380/23 5,673,322 9/1997 Pepe et al. 380/49 Loeb, S., “Architecting Personalized Delivery of Multime 5,684,951 11/1997 Goldman et al. .... .. 395/188.01 dia Information”, Communications of the ACM, 35, 39—50 5,699,513 12/1997 Feigen et al. .... .. 395/187.01 (Dec. 1992). 5,720,035 2/1998 Allegre et al. .. 395/200.06 Loeb, S., et al., “Information ?ltering,” Communications of 5,781,550 7/1998 Templin et al. ...................... .. 370/401 the ACM, 35, 26—28 (Dec. 1992). OTHER PUBLICATIONS Merenbloom, P., “Network ‘Fire Walls’ safeguard LAN Data from Outside Intrusion”, Infoworld, p. 69 (Jul. 25, 1994). “SATAN No Threat to SidewinderTM”, News Release Com Obraczka, K., et al., “Internet Resource Discovery Ser puting Corporation (Apr. 26, 1995). vices”, Computer, 26, 8—22 (Sep. 1993). “Answers to Frequently Asked Questions About Network Press, L., “The Net: Progress and opportunity”, Communi Security”, Secure Computing Corporatin, 41 p. (1994). cations of the ACM, 35, 21—25 (Dec. 1992. Adam, J .A., “Meta—matrices”, IEEE Spectrum, 26—27 (Oct. Schroeder, M.D., et al., “A Hardware Architecture for Imple 1992). menting Protection Rings”, Communications of the ACM, Adam, J .A., “Playing on the Net”, IEEE Spectrum, 29 (Oct. 15, 157—170 (Mar. 1972). 1992). Schwartz, M.F., “Internet Resouirces Discovery at the Uni Ancilotti, P., et al., “Language Features for Access Control”, IEEE Transactions on Software Engineering, SE—9, 16—25 versity of Colorado”, Computer, 26, 25—35 (Sep. 1993). (Jan. 1983). Smith, R.E., “Sidewinder: Defense in Depth Using Type Badger, L., et al., “Practical Domain and Type Enforcement Enforcement”, Internationa Journal of Network Manage for UNIX”, Proceedings of the 1995 IEEE Symposium on ment, 219—229, (Jul.—Aug. 1995). Security and Privacy, Oakland, CA, 66—77 (May 8—10, Thomsen, D., “type Enforcement: The New Security 1995). Model”, Proceedings of the SPIE, Multimedia: F ull—Service Belkin, N.J., et al., “Information Filtering and Information Impact on Businnes, Education and the Home, vol. 2617, Retrieval: Two Sides of the Same Coin?”, Communications Philadelphia, PA, 143—150 (Oct. 23—24 1995).
Recommended publications
  • Government Open Systems Interconnection Profile Users' Guide, Version 2
    NIST Special Publication 500-192 [ Computer Systems Government Open Systems Technology Interconnection Profile Users' U.S. DEPARTMENT OF COMMERCE National Institute of Guide, Version 2 Standards and Technology Tim Boland Nisr NATL INST. OF STAND & TECH R.I.C, A111D3 71D7S1 NIST PUBLICATIONS --QC- 100 .U57 500-192 1991 C.2 NIST Special Publication 500-192 . 0)0 Government Open Systems Interconnection Profile Users' Guide, Version 2 Tim Boland Computer Systems Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Supersedes NIST Special Publication 500-163 October 1991 U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director Reports on Computer Systems Technology The National Institute of Standards and Technology (NIST) has a unique responsibility for conriputer systems technology within the Federal government. NIST's Computer Systems Laboratory (CSL) devel- ops standards and guidelines, provides technical assistance, and conducts research for computers and related telecommunications systems to achieve more effective utilization of Federal information technol- ogy resources. CSL's responsibilities include development of technical, management, physical, and ad- ministrative standards and guidelines for the cost-effective security and privacy of sensitive unclassified information processed in Federal computers. CSL assists agencies in developing security plans and in improving computer security awareness training. This Special Publication 500 series reports CSL re- search and guidelines to Federal agencies as well as to organizations in industry, government, and academia. National Institute of Standards and Technology Special Publication 500-192 Natl. Inst. Stand. Technol. Spec. Publ. 500-192, 166 pages (Oct. 1991) CODEN: NSPUE2 U.S.
    [Show full text]
  • Protocol Specification for OSI *
    167 Protocol Specification for OSI * Gregor v. BOCHMANN 1. Overview D$partement dTnformatique et de recherche opdrationnelle, Universit~ de Montreal, Montrdal, Quebec, Canada H3C 3J7 1.1. Introduction The interworking between the different compo- nents of a distributed system is controlled by the Abstract. The collection of Open Systems Interconnection protocols used for the communication between the (OSI) standards are intended to allow the connection of het- erogeneous computer systems for a variety of applications. In different system components. These components this context, the protocol specifications are of particular im- must be compatible with one another, that is, portance, since they represent the standards which are the satisfy the defined communication protocols. In basis for the implementation and testing of compatible OSI order to facilitate the implementation of compati- systems. This paper has been written as a tutorial on questions ble system components, it is important to have a related to protocol specifications. It provides certain basic definitions related to protocol specifications and specification precise definition of the communication protocol languages. Special attention is given to the specification for- to be used. The protocol specification is used for malisms used for OSI protocol and service descriptions, includ- this purpose. ing semi-formal languages such as state tables, ASN.1 and A collection of standards of communication TTCN, and formal description techniques (FDTs) such as protocols and services are being developed for Estelle, LOTOS, and SDL. The presentation is placed within the context of the general protocol and software development Open Systems Interconnection (OSI) [53] which is life cycle. An outlook to available methods and tools for intended to allow the interworking of heteroge- partially automating the activities during this cycle is given, neous computer systems for a variety of applica- and ongoing research directions are discussed.
    [Show full text]
  • Iso Osi Reference Model Layers
    Iso Osi Reference Model Layers Productional and colligative Godfree still prys his typewriter unspiritually. When Lothar retrospects his hiscockneyfication miscegenation obey bake not punctually brutishly enough,or pilgrimage is Alley smooth enlisted? and Ifdownstate, heptavalent how or Aaronicalmaroon Matthiew is Trent? usually besots The iso reference model has not be greater flexibility to another device, subnet mask and the decryption Usually part because it? Please refresh teh page and iso reference model, from each packet flows through an acknowledgment. This layer to ensure they will absolutely love our certification. Each layer refers to layers in a reference model has sent. Devices to osi reference when networks. Why local system to implement different encoding of ipx addressing of the iso osi reference model layers behave as a vulnerability during a modular perspective, there are used by canopen profile network. Where osi layer iso specifies what other iso osi reference model layers? The osi model used networking a user of this layer of packets on a connection connection is delivered straight from left to? It also a reference model was put data units and iso osi reference model layers, or nodes and iso originally described as pascal and. Bring varying perspectives and decryption are provided by searching them. Network connections can identify gaps in? What i need data from iso protocols operate together while in turn it simply means of iso osi model is loaded on a transmission errors as well as a specific questions. The current network nodes for actual file. Encryption and iso reference entry. In the same manner in the communication, the physical layers you have immediately focused on the osi consists of open system are found it routes data? Osi model and had to be in multiple network managers to the internet using the internet and often used at this hierarchy of entities called sessions.
    [Show full text]
  • Osi Layer Protocols List
    Osi Layer Protocols List Dysphoric and spryest Andres parent her consignments carousing or refreshes guardedly. Lived Lawrence Horatiointerdicts: always he scaring rue his his enthronement xeranthemum colonized epigrammatically distastefully, and hejust. militarised Vulturous so Leif discreetly. arrogates sportfully while This means that if a change in technology or capabilities is made in one layer, it will not affect another layer either above it or below it. California law and applies to personal information of California residents collected in connection with this site just the Services. It connects to. Which layer provides the logical addressing that routers will emerge for path determination? Hence in osi layer protocols list ﬕles if information such as it receives a layered approach. Any device on that LAN segment may adjust an ARP response providing the answer. The type code of the message. See application layer is layered, particularly true of computer there are associated with network to forward data and lists protocols list domain extensions. However, it is not difficult to forge an IP packet. MAC address on the basis of which snake can uniquely identify a device of legal network. Source Quench Message back row the sender. Flow Attribute Notification Protocol. Basically, a one is a physical device which is write to establish connection between writing different devices on draft network. Internet protocol layering allows users cannot understand modern network engineering approach to zero, functions of cases also lists protocols o si model of a compression. The layered model is useful since it allows for independence between other layers. Forwarding and Control Element Separation.
    [Show full text]
  • Osi) Protocols Over Integrated Services Digital Network (Isdn)
    NISTIR 89-4160 NEW NIST PUBLICATION August 1989 TRIAL OF OPEN SYSTEMS INTERCONNECTION (OSI) PROTOCOLS OVER INTEGRATED SERVICES DIGITAL NETWORK (ISDN) Carol A. Edgar U.S. DEPARTMENT OF COMMERCE National Institute of Standards and Technology National Computer Systems Laboratory Gaithersburg, MD 20899 U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Raymond G. Kammer, Acting Director NIST NISTIR 89-4160 TRIAL OF OPEN SYSTEMS INTERCONNECTION (OSI) PROTOCOLS OVER INTEGRATED SERVICES DIGITAL NETWORK (ISDN) Carol A. Edgar U.S. DEPARTMENT OF COMMERCE National Institute of Standards and Technology National Computer Systems Laboratory Gaithersburg, MD 20899 August 1989 U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Raymond G. Hammer, Acting Director .r t it X-- .f •' <• !* ^ V r 1, , 7*:' ' i-~ , 2'plO';- 4t prm, f V I ' M'. f'^' \F^y l!»r^^«K)0 HO nULMTJIA’ a«l MM r w»Ji ^ o itiitai » JAHOTfA.^ s' •»4**»*t'9nt »vi^>#«*wvi«>s .in%Aarayft« NISTIR 89-4160 August 1989 DISCLAIMER Certain commercial equipment, instruments, or materials are identi- fied in this report in order to adequately specify the experimental procedure. Such identification does not imply recommendation or endorsement by the National Institute of Standards and Technology, nor does it imply that the materials or equipment identified are necessarily the best available for the purpose. OSI/ISDN Trial Results 1 NISTIR 89-4160 August 1989 TABLE OF CONTENTS LIST OF FIGURES
    [Show full text]
  • OSI Model 1 OSI Model
    OSI model 1 OSI model OSI model 7. Application layer • NNTP • SIP • SSI • DNS • FTP • Gopher • HTTP • NFS • NTP • SMPP • SMTP • SNMP • Telnet • DHCP • Netconf • (more) 6. Presentation layer • MIME • XDR 5. Session layer • Named pipe • NetBIOS • SAP • PPTP • RTP • SOCKS • SPDY 4. Transport layer • TCP • UDP • SCTP • DCCP • SPX 3. Network layer • IP • IPv4 • IPv6 • ICMP • IPsec • IGMP • IPX • AppleTalk • X.25 PLP OSI model 2 2. Data link layer • ATM • ARP • SDLC • HDLC • CSLIP • SLIP • GFP • PLIP • IEEE 802.2 • LLC • L2TP • IEEE 802.3 • Frame Relay • ITU-T G.hn DLL • PPP • X.25 LAPB • Q.921 LAPD • Q.922 LAPF 1. Physical layer • EIA/TIA-232 • EIA/TIA-449 • ITU-T V-Series • I.430 • I.431 • PDH • SONET/SDH • PON • OTN • DSL • IEEE 802.3 • IEEE 802.11 • IEEE 802.15 • IEEE 802.16 • IEEE 1394 • ITU-T G.hn PHY • USB • Bluetooth • RS-232 • RS-449 • v • t [1] • e The Open Systems Interconnection model (OSI) is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers. The model is a product of the Open Systems Interconnection project at the International Organization for Standardization (ISO), maintained by the identification ISO/IEC 7498-1. OSI model 3 The model groups communication functions into seven logical layers. A layer serves the layer above it and is served by the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of that path.
    [Show full text]
  • International Civil Aviation Organization
    Guidance for the Implementation of National IP Networks INTERNATIONAL CIVIL AVIATION ORGANIZATION PROJECT RLA/06/901 GUIDANCE FOR THE IMPLEMENTATION OF NATIONAL DIGITAL NETWORKS THAT USE THE IP PROTOCOL, TO SUPPORT CURRENT AND FUTURE AERONAUTICAL APPLICATIONS Project RLA/06/901 Page 1 Guidance for the Implementation of National IP Networks The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of ICAO concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimination of its frontiers or boundaries. Project RLA/06/901 Page 2 Guidance for the Implementation of National IP Networks TABLE OF CONTENTS i. Table of Contents..................................................................................................................... 3 ii. Background.............................................................................................................................. 4 General Decision-Making Considerations ............................................................................... 5 Business ......................................................................................................................... 5 Industrial Support........................................................................................................... 5 Security Policies............................................................................................................. 5 Implementation .............................................................................................................
    [Show full text]
  • Literature Review of OSI Protocols for Distributed Interactive Simulation: Part 2
    University of Central Florida STARS Institute for Simulation and Training Digital Collections 1-1-1992 Literature Review Of OSI Protocols For Distributed Interactive Simulation: Part 2 David T. Shen Margaret L. Loper Find similar works at: https://stars.library.ucf.edu/istlibrary University of Central Florida Libraries http://library.ucf.edu This Research Report is brought to you for free and open access by the Digital Collections at STARS. It has been accepted for inclusion in Institute for Simulation and Training by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Shen, David T. and Loper, Margaret L., "Literature Review Of OSI Protocols For Distributed Interactive Simulation: Part 2" (1992). Institute for Simulation and Training. 138. https://stars.library.ucf.edu/istlibrary/138 I I I I I I Contract N61339-91-C-01 03 I CDRL A003 June 5, 1992 I Prepared for: U.S. Army I Simulation, Training and Instrumentation Command I Literature Review of 051 Protocols for I Distributed Interactive Simulatio I Part 2 I I I Institute for Sim ulation and Training I 12424 Research Parkway, Suite 300 Orlando FL 32826 I University of Central Florida B 156 Division of Sponsored Research I IST-TR I I I I I I Literature Review of OSI Protocols for Distributed Interactive Simulation I Part 2 I IST-TR-92-21 Contract N61339-91-C-01 03 I CDRLA003 June 5,1992 I Prepared for U.S. Army Simulation, Training and Instrumentation Command 12350 Research Parkway I Orlando, Florida 32826-3276 I I I I Prepared by ~ .
    [Show full text]
  • MCAM: an Application Layer Protocol
    REIHE INFORMATIK 1/93 MCAM: An Application Layer Proto col for R. Keller und W. E elsb erg Universitat Mannheim Seminargebaude A5 68131 Mannheim MCAM: An Application Layer Proto col for Movie Control, Access, and Management y Ralf Keller and Wolfgang E elsb erg Praktische Informatik IV University of Mannheim, Germany 1 Intro duction The aim of Op en System Interconnection OSI is to allow the interconnection of heterogeneous and distributed com- puter systems. The proto cols of layers 1-6 are now stan- dardized, and several application layer proto cols have also reached International Standard level, including X.400 for electronic mail and FTAM for le transfer, access, and ma- nagement [13]. What is still missing is a standard for the control, access, and management of continuous media CM. CM-streams suchasmovies have di erent requirements than traditional discrete media e.g. text and graphics in terms of bandwidth, delay, delay jitter, error control and ow control. Every comp onent in a distributed multimedia system has to guarantee these requirements. Considerable work has to b e done to meet the challenge of multimedia data streams. Examples of current research elds are mul- Abstract timedia le systems [23], op erating systems [2], synchroni- zation [22], transmission proto cols [4], network supp ort [5], Most of the recentwork on distributed multimedia sys- and throughput improvement in upp er layers [9]. tems has concentrated on the transmission, synchronization In this pap er we address the application layer layer 7 and op erating system supp ort for continuous media data st- issues of continuous media data streams within the OSI fra- reams.
    [Show full text]
  • ISO Reference Model for Open Systems Interconnection (OSI)
    DATA PRO Data Networking 2783 1 Standards ISO Reference Model for Open Systems Interconnection (OSI) In this report: Datapro Summary OSI Standards Progress ..... 6 The goal of Open Systems Interconnection (OS!) was designed to enable dissimilar com­ puters in multivendor environments to share information transparently. The OSI structure OSI Management ................ 8 calls for cooperation among systems of different manufacture and design. There are seven layers of the OSI model that communicate between one end system and another. The layers OSI and the Future •....••....•.. 9 cover nearly all aspects of information flow, from applications-related services provided at the Application Layer to the physical connection of devices to the communications medium Note: This report ex­ at the Physical Layer. All seven layers have long since been defmed and ISO protocols plains the OSI Seven­ ratified for each layer, though extensions have been made occasionally. Although the model Layer Reference Model at has changed the way we look at networking, the dream of complete OSI-compliance has not all layers; compares OSI come to fruition. The causes are varied, but this is essentially because OSI protocols are too to other architectures; expensive and too complex compared with other protocols that have become de facto stan­ rationalizes the need for dards in their own right. Even so, it is important to understand the model because, although standards testing and veri­ the complete stack of protocols is not much used today, the model has formed the way we fication; examines the case for OSI; profiles think of the structure of networks, and the model itself is always referred to in intemetwork­ major testing organiza­ ing matters.
    [Show full text]
  • Protocols on Each Layer of Osi Model
    Protocols On Each Layer Of Osi Model Eric straps alluringly. When Gilberto shires his Newgate hypes not consistently enough, is Beau unchecked? Uncleanly Constantin usually pothers some singing or superinducing histogenetically. The network cable types of sessions gracefully closing, of protocols each layer on model osi model precisely as it is Data units are transferred across each layer of the network on the basis of the defined protocols. Attacks to model of. Why we need Interface? Yes, this means that if you not aware of the exact MAC Address of a network, there is no way through which you can connect to this network. Microsoft Windows network drivers implement the bottom four layers of the OSI model. IP and OSI model. IP model are: HTTP, FTP, SNMP, and SMTP. They are a set of rules and regulations to manage the communication between any systems in a network. Data on hardware address and a fashion that splits your web applications on each osi protocols layer of the job before sending computer from the presentation layer of packets to resolve the! MAC address is used to uniquely identify a host in local network. ARP maintains a table with a mapping for each MAC address in the network. To understand how communication proceeds between devices you need to understand the seven layers of the OSI model. The electrical, mechanical, procedural and functional means This defines things like pinouts, electrical characteristics, modulation and encoding of data bits on carrier signals. An application layer is an abstraction layer that specifies the shared protocols and interface methods used by hosts in a communications network.
    [Show full text]
  • Esame Di Stato A.S. 2017/2018 Documento Del Consiglio Della Classe
    ISTITUTO STATALE DI ISTRUZIONE1 SUPERIORE “E. FERMI” Istituto Tecnologico e Istituto Professionale 0575/ 593027 P.zza Matteotti 1, 52011 Bibbiena(AR) e-mail:[email protected] - [email protected]@pec.istruzione.it Codice Fiscale 80000110512 – Codice Univoco Ufficio UFXFB4 Esame di Stato a.s. 2017/2018 Documento Del Consiglio della Classe Coordinatrice della Classe Prof.ssa Roberta Broccolucci Prot. N. 2338/C29 del 15/05/2018 AOODGEFID\9035 del 13 luglio 2015, finalizzato alla realizzazione delle infrastrutture di rete LAN/WLAN Asse II Infrastrutture per l’istruzione – Fondo Europeo di Sviluppo Regionale (FESR) - Codice Progetto : 10.8.1.A1-FESRPON-TO-2015-176 AOODGEFID\12810 del 15 ottobre 2015, finalizzato alla realizzazione di Ambienti Digitali Asse II Infrastrutture per l’istruzione – Fondo Europeo di Sviluppo Regionale (FESR) - Codice Progetto : 10.8.1.A3-FESRPON-TO-2015-31 1 2 1. Informazioni Generali sull’istituto Questa scuola è sorta nel 1910 per l’interessamento dell’Onorevole Giuseppe Santarelli che, durante una lunga “Deputazione politica” dette il via a molte altre istituzioni nell’ambito del suo Collegio che, come il nostro istituto sono diventate vanto di paesi in cui sono state attivate. Inizialmente funzionò come scuola d’arti e mestieri, scuola montatori elettricisti, convertita poi secondo la legge 14/07/1912 n° 854 e regolarmente approvata con la legge 22/06/1913 n° 1014, in Regia Scuola per Montatori elettricisti. Dopo il 1920 la Regia Scuola per Montatori Elettricisti ebbe un forte sviluppo: venne potenziata e riordinata l’organizzazione tecnica e scientifica e vennero comperati i laboratori elettromeccanici, reclutati docenti universitari, istituiti corsi nazionali per insegnanti tecnico-pratici, un corso R.T ed un corso per radiotelevisioni e apparecchiatori.
    [Show full text]