Efficiency enhancements |
|
This amendment defines several efficiency options.The fast associate mechanism defines the construction of the User parameter of the S-CONNECT primitives from the semantics of the presentation CP-PPDU fields.This amendment describes a protocol option which defines an alternative header encoding for the user-data of most presentation primitives when this contains only one presentation data value. When used in combination with the session short-encoding option, it minimizes the overhead for this common case, without loss of overall function, as the short encoding can be freely mixed with the non-compressed encodings.The nominated context presentation protocol option allows for the "simple-encoding" CHOICE for the presentation user-data to be used for one of the presentation contexts of the Defined Context Set (DCS) even when there are many elements in the DCS. This allows a significant reduction in the presentation Protocol Control Information (PCI) overhead for any application that sends most of its data in the same presentation context without any loss of functionality.In another efficiency option, the use of the Packed Encoding Rules (PER) for the presentation protocol allows the full range of values for the presentation protocol to be conveyed with a smaller overhead in terms of the bits to be sent. |
|
Citation: |
https://handle.itu.int/11.1002/1000/3992 |
Series title: |
X series: Data networks, open system communications and security X.200-X.299: Open Systems Interconnection X.220-X.229: Connection-mode protocol specifications |
Approval date: |
1997-08-09 |
Identical standard: | ISO/IEC 8823-1:1994/Amd1:1998 (Common) |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
|
|
|
Title |
Approved on |
Download |
OSI Implementers’ Guide - Version 1.1
|
2006-12-16
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
ISDN field trial guidelines
|
1991
|
here
|
|