• There are no items in your cart

BS ISO/IEC 14765:1997

Current

Current

The latest, up-to-date edition.

Information technology. Framework for protocol identification and encapsulation

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

12-15-1997

1 Scope
2 Normative references
    2.1 Identical Recommendations/International
          Standards
    2.2 Additional references
3 Abbreviations
4 Definitions and concepts
    4.1 Basic Reference Model concepts
    4.2 Additional definitions and concepts
5 Overview
    5.1 General
    5.2 Interworking and encapsulation
6 Principles of protocol identification
    6.1 Need for protocol identification
    6.2 Protocol identifier registries and values
    6.3 Protocol identification methods
    6.4 Protocol identifiers
7 Principles of protocol encapsulation
    7.1 Encapsulation function
    7.2 Protocol encapsulation methods
    7.3 Relationships among EFs, EdPs and EgPs
Annex A Current Recommendations/International Standards
          supporting PIE principles
Annex B Examples of protocol identification and
          encapsulation methods

Supplies a framework for explicit protocol identification and encapsulation, but does not include implicit protocol identification.

In a layered approach to protocol architecture, protocols have a relationship to one another such that a protocol at layer (n) uses the services of the layer below it — the (n − 1) services — which, in turn, are provided by a layer (n − 1) protocol. One of the services used by a layer (n) protocol is the encapsulation of its (n) Protocol Data Units (PDUs) in a way which is transparent to it. Such encapsulation is realized by the carriage of the (n) PDUs as user data in an (n−1) Service Data Unit (SDU).

In a limited case, the operation of a particular protocol at layer (n−1) implies the operation, above layer (n−1), of a single layer (n) protocol or single set of related (n)/(n+1)... protocols. However, in a more general case, there may be more than one protocol (or set of related protocols starting) at layer (n) that can operate above layer (n−1) in a given environment. In such cases, there is a need for explicit identification of the protocol (or set of protocols starting) at layer (n).

There also may be a need to manipulate the (n−1) protocol (i.e. the encapsulating protocol) in certain ways specific to the layer (n) protocol (i.e. the encapsulated protocol). Such manipulations form the basis of a set of procedures that must be specified for the layer (n) protocol.

The above observations regarding protocol identification and encapsulation are also applicable in cases where an (n) layer is further divided into sublayers.

Cases in which an (n) protocol operates for the purpose of establishing a parallel universe of protocols (regardless of the layered structure of that universe) also give rise to a need for the (n) protocol to be able to identify the protocol(s) in the parallel universe. In these cases, however, there is no encapsulating/encapsulated relationship between the (n) protocol and the parallel universe set of protocols.

The above principles lead to a need to establish a framework for protocol identification and encapsulation. These principles apply to the relationship between two protocols (recognizing that one of them may be a set of related protocols) and can be applied recursively. This Recommendation | International Standard provides a framework for explicit protocol identification and for protocol encapsulation. Implicit protocol identification (see 4.2) is beyond the scope of this Recommendation | International Standard.

Committee
IST/6
DevelopmentNote
Supersedes 96/642695 DC. (08/2005)
DocumentType
Standard
Pages
28
PublisherName
British Standards Institution
Status
Current
Supersedes

Standards Relationship
ISO/IEC 14765:1997 Identical

ISO/IEC 7498-1:1994 Information technology Open Systems Interconnection Basic Reference Model: The Basic Model

View more information
US$237.18
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.