Parameters: algorithm - the desired checksum algorithm. Returns: the Checksum object instance of the requested algorithm. Throws: CryptoException - with the following reason codes: CryptoException. Parameters: bArray - byte array containing algorithm specific initialization information bOff - offset within bArray where the algorithm specific data begins bLen - byte length of algorithm specific parameter data Throws: CryptoException - with the following reason codes: CryptoException. Within each byte the processing proceeds from the least significant bit to the most.

Author:Zull Gardalkree
Language:English (Spanish)
Published (Last):24 April 2008
PDF File Size:20.35 Mb
ePub File Size:5.99 Mb
Price:Free* [*Free Regsitration Required]

NOK 2 ,00 eks. However, the frame as an entirety may be constructed from octet-oriented units e. The mechanisms used to achieve bit pattern independence transparency , where and when required, within the frame are also defined.

In addition, three frame checking sequences FCS are specified; the rules for address field extension are defined; and the addressing conventions available are described. This International Standard does not define any single system and should not be regarded as a specification for a data communication system.

Not all of the commands or responses are required for any particular system implementation. For the balanced class, the data link consists of two combined stations and operates in the asynchronous balanced mode in a point-to-point configuration.

For the unbalanced connectionless class, the data link consists of a control station plus one or more tributary stations and operates in the unbalanced connectionless-mode in a point-to-point or multipoint configuration.

For the balanced connectionless class, the data link consists of two peer stations and operates in the balanced connectionless-mode in a point-to-point configuration.

In each class, a basic repertoire of commands and responses is defined, but the capability of the data link may be modified by the use of optional functions. Operational requirements are covered in accordance with the overall HDLC architecture. This International Standard defines a single-exchange negotiation procedure for establishing operational characteristics when either one or more stations are capable of providing multiple selections.

It describes a general purpose XID frame information field content and format for that purpose. Mechanisms are provided to permit the general purpose XID frame information field to be used to negotiate private parameters in a single XID exchange simultaneously with negotiation of the defined basic parameters. It is used to select a pair of operational link addresses when preassigned, system designated addresses are not known on an a priori basis; e.


Subscribe to RSS

It is called Poll when part of a command set by the primary station to obtain a response from a secondary station , and Final when part of a response set by the secondary station to indicate a response or the end of transmission. In all other cases, the bit is clear. The bit is used as a token that is passed back and forth between the stations. Only one token should exist at a time. The secondary only sends a Final when it has received a Poll from the primary. The primary only sends a Poll when it has received a Final back from the secondary, or after a timeout indicating that the bit has been lost. In NRM, possession of the poll token also grants the addressed secondary permission to transmit.


ISO/IEC 13239:2002


BD P1400 PDF

ISO/IEC 13239:2000



ISO/IEC 13239:2002


Related Articles