DSMCC P
ROTOCOLS
AND
I
NTERFACES
As revised 2006.05.04
Bionic Buffalo Tech Note #55
Security:
Unrestricted
protocols. It may be used to configure both service providers and service consumers. Configuration may
be requested by the user, or it may be sent without request by the network.
The usernetwork configuration protocol is based on any lower level protocol supporting datagrams.
Depending on how it is used, it may employ a oneway connection (from network to user), or a twoway
connection.
DSMCC does not define specific configuration parameters. However, the kinds of parameters
envisioned for use include such things as client or server network addresses, session parameters (such as
timeout parameters and retry count limits), protocol or interface version identifiers, and service profile
identifiers.
Note that a user device might be connected at one time or another to more than one physical network, or
there might be multiple logical networks accessible from a single physical network connection. For
example, a video on demand server might support the useruser protocol over TCP/IP at one address,
while download services might be offered either at some different IP address or within an MPEG data
stream. The usernetwork configuration protocol allows a user device (server or client) to select the
parameters (including, perhaps, the network and protocol) needed to establish sessions with other
devices.
4. UserNetwork Session Protocol
The usernetwork session protocol allows the network to establish sessions among users, and to assign
resources to sessions. The establishment of sessions and the assignment of resources may be done at the
behest of the network, or they may be requested by users.
The usernetwork configuration protocol is based on any lower level protocol supporting datagrams or
stream connections. Depending on how it is used, it may employ a oneway datagram connection (from
network to user), or a twoway datagram or stream connection. The oneway mechanism severely limits
the functionality. A twoway connection is almost invariably used.
Sessions are asymmetric, each having a client and a server. Within the network, the session is identified
by a session identifier. Each user (client or server) is identified by an identifier, the server identifier or
client identifier. User identifiers are open systems interconnection (OSI) network service point (NSAP)
addresses.
The session protocol includes message sequences to set up new sessions, release sessions, inquire about
or report on session status, and to transfer a session from one server to another server. The sequences
may be initiated by the network, or by the user.
Copyright 2006 Bionic Buffalo. All rights reserved.
File tn0055; Modified 20060505 12:45:42
http://www.tatanka.com/doc/technote/index.html
Email: query@tatanka.com
Page 6 of 20