{"id":515871,"date":"2024-11-05T14:37:39","date_gmt":"2024-11-05T14:37:39","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/can-csa-iso-iec-tr-9577-04-r2017\/"},"modified":"2024-11-05T14:37:39","modified_gmt":"2024-11-05T14:37:39","slug":"can-csa-iso-iec-tr-9577-04-r2017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/csa\/can-csa-iso-iec-tr-9577-04-r2017\/","title":{"rendered":"CAN\/CSA-ISO\/IEC TR 9577-04 (R2017)"},"content":{"rendered":"

Scope<\/strong><\/p>\n

This Recommendation | Technical Report provides: <\/p>\n

a) the description of a means to permit a protocol to be identified;
b) a record of the structure and allowable ranges of protocol identifier(s) which can be assigned by ITU-T, ISO\/IEC and other authorities;
c) a record of the values of protocol identifiers used by OSI Network layer protocols and non-OSI protocols occupying a similar position: in particular, protocols with protocol control information commencing in octet 1 of the protocol data unit (header-oriented protocols), and protocols with protocol control information commencing in the final octet of the protocol data unit (trailer-oriented protocols), are covered; and
d) a record of the values that are in use as protocol control information in non-Network layer protocols where they impact on Network layer protocol identification. <\/p>\n

The application of this Recommendation | Technical Report is: <\/p>\n

a) in the identification of internationally standardized Network layer protocols operating directly above the Data Link service;
b) in the identification of protocols used in conjunction with internationally standardized Network layer protocols that operate directly above the Data Link service; and
c) to distinguish between Internationally standardized Network layer protocols, and other internationally standardized protocols used in conjunction with internationally standardized Network layer protocols. <\/p>\n

This Recommendation | Technical Report is for use by ITU-T Study Groups, ISO\/IEC Technical Committees and other authorities in applying the principles contained in clause 4, and in selecting an unused value or values from the range of values permitted in clauses 5 or 6, as appropriate. When a new value is selected, that value and its usage should be brought to the attention of ITU-T Study Group 7 or ISO\/IEC JTC 1 SC6 so that this Recommendation | Technical Report can be amended.<\/p>\n","protected":false},"excerpt":{"rendered":"

Information Technology – Protocol Identification in the Network Layer<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
CSA<\/b><\/a><\/td>\n2004<\/td>\n30<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":515884,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[671,2674],"product_tag":[],"class_list":{"0":"post-515871","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-100-30","7":"product_cat-csa","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/515871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/515884"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=515871"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=515871"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=515871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}