Information technology - Telecommunications and information exchange between systems - End System Ro...
Cancels and replaces the first edition (1990). Defines a protocol for the exchange of routeing information between an End System and a Subnetwork Address Resolution Entity, and between an Intermediate System and a Subnetwork Address Resolution Entity. Applicable to: End Systems which operate according to the main body of ISO/IEC 8878 to provide and support the OSI Connection-mode Network Service…
Information technology - Remote Operations: OSI realizations - Remote Operations Service Element (RO...
Specifies the protocol and procedures for the Remote Operation Service Element. The ROSE procedures are defined in terms of the interactions between peer ROSE protocol machines through the use of RTSE services or the Presentation service and the interactions between the ROSE protocol machine and its service-user. Specifies conformance requirements for systems implementing these procedures.
Information technology — Telecommunications and information exchange between systems — Transport lay...
Defines the transport layer security protocol. Does not specify the management functions and protocols needed to support this security protocol. Defines a protocol which may be used for Security Association establishment. Specifies one algorithm for authentification and key distribution which is based on public key crypto systems.
Technologies de l'information — Télécommunications et échange d'information entre systèmes...
Les procédures spécifiées dans la présente Recommandation | Norme internationale représentent des extensions des procédures définies par la Rec. UIT-T X.224 | ISO/CEI 8073 et la Rec. UIT-T X.234 |ISO 8602; elles n'interdisent en rien la communication d'informations non protégées entre des entités de transport mettant en oeuvre les dispositions de la Rec. UIT-T X.224 | ISO/CEI 8073 ou de…
Information technology - Telecommunications and information exchange between systems - Transport lay...
Defines the transport layer security protocol. Does not specify the management functions and protocols needed to support this security protocol. Defines a protocol which may be used for Security Association establishment. Specifies one algorithm for authentification and key distribution which is based on public key crypto systems.
Information technology - Protocol for providing the OSI connectionless-mode transport service
Cancels and replaces the first edition (1987). Specifies procedures for the connectionless-mode transmission of data and protocol control information; procedures for the correct interpretation of transport protocol control information; the functional requirements for implementations claiming conformance to this standard; the encoding of the transport-protocol-data-units used for the transmission…