70 likes | 194 Views
Use of ACSE to carry table data. By Dr. Martin J. Burns, Hypertek Inc. ANSI C12.22 Meeting, Montreal PQ July 23, 1998 burnsmarty@aol.com (301)216-9836. Requirements for C12.22. Source and destination application identification Authentication / Encryption parameters Invocation Ids
E N D
Use of ACSE to carry table data By Dr. Martin J. Burns, Hypertek Inc. ANSI C12.22 Meeting, Montreal PQ July 23, 1998 burnsmarty@aol.com(301)216-9836
Requirements for C12.22 • Source and destination application identification • Authentication / Encryption parameters • Invocation Ids • Optionality supported / collapsability • Use of existing standards - ITU-T X.237
Advantages of using ACSE • Bindings to UCA protocols including TCP/IP and UDP/IP, reduced stacks, and OSI protocols • Interoperability with other application layer messaging • Optionality of various fields is built in • Role based access control supported in UCA authentication values
A-UNIT-DATA: Subset • [ 2] called-AP-title • [ 5] called-AE-invocation-id • [ 6] calling-AP-title • [ 9] calling-AE-invocation-id • [12] calling-authentication-value • [30] user-data
Comparison to C12.22 Working Document Datagram Format • called-AP-title • called-AE-invocation-id • calling-AP-title • calling-authentication-value • user-data A-UNIT-DATA C12.22 Datagram • Destination • Session ID • Source • Authentication • Services