EP1413114A1 - Method for supporting a number of checksum algorithms in a network node - Google Patents
Method for supporting a number of checksum algorithms in a network nodeInfo
- Publication number
- EP1413114A1 EP1413114A1 EP02726087A EP02726087A EP1413114A1 EP 1413114 A1 EP1413114 A1 EP 1413114A1 EP 02726087 A EP02726087 A EP 02726087A EP 02726087 A EP02726087 A EP 02726087A EP 1413114 A1 EP1413114 A1 EP 1413114A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- network node
- checksum algorithm
- checksum
- algorithm
- initialization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0061—Error detection codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0075—Transmission of coding parameters to receiver
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/40—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/24—Negotiation of communication capabilities
Definitions
- Connection-oriented communication protocols are considered, in which each packet contains a checksum.
- the algorithm used to form the checksum is not relevant here. However, if this algorithm is changed and replaced by one or more new ones, then during a transition period it can be expected that both the old and the new algorithm will be used within a communication network. Furthermore, since a packet with an incorrect checksum is normally discarded by the receiver, it must be determined for each traffic relationship which algorithm is used to form the checksum.
- the first solution is not acceptable in a transition phase.
- the second solution requires the manufacturer of the switching systems or network nodes, on the one hand, additional development effort for the administration of the selection of the algorithm for forming the checksum, but on the other hand the network operator must make and configure this selection for each traffic relationship. This can be very time-consuming and costly and is highly prone to errors.
- the object on which the present invention is based is to specify a method for supporting a plurality of checksum algorithms in a network node which avoids the disadvantages of the prior art. This object is achieved by a method for supporting a number of checksum algorithms in a network node in accordance with the features of claims 1 or 2.
- a method for supporting a plurality of checksum algorithms is provided in a first network node A, according to which a communication relationship is established between the first network node A and a second network node B, the initialization of which is carried out by the first network node A, in a first step a first checksum algorithm is selected by the first network node A, in a second step the selected checksum algorithm is signaled by the first network node A to the second network node B, in a third step the communication relationship is established using the selected checksum algorithm if the initialization of the communication relationship with the selected checksum algorithm is accepted by the second network node B or, in the third step, a further checksum algorithm is selected by the first network node A, if by the second network node B the initialization of the communication relationship with the selected checksum algorithm is rejected or ignored, the second and third steps then being repeated with the newly selected checksum algorithm.
- a method for supporting a plurality of checksum algorithms in a first network node (A) for an existing communication relationship between the first network node (A) and a second is also implemented Network node (B), for which a first checksum algorithm is used, is provided, accordingly in a first step a second checksum algorithm is selected by the first network node (A), in a second step the selected checksum algorithm by the first network node (A) to the second Network node (B) is signaled, in a third step the selected checksum algorithm for the communication relationship is determined if the use of the selected checksum algorithm is accepted by the second network node (B) or in the third step another checksum algorithm is selected by the first network node (A) If the selected checksum algorithm is rejected or ignored by the second network node (B), the second and third steps are then repeated with the newly selected checksum algorithm.
- the selected checksum algorithm is signaled indirectly from the first network node A to the second network node B by sending an initialization message which is coded by means of the checksum algorithm to be signaled.
- An important advantage of the method according to the invention is that the administrative configuration or the administrative specification of the checksum algorithm is dispensed with. This eliminates, for example, the disadvantages mentioned for the network operator when introducing a new algorithm for forming the checksum.
- the manufacturer of the switching centers or network nodes implements a method that allows to work with all implemented algorithms in a transparent manner. The development effort is no greater than the provision of the administration option.
- An end point or network node which uses the method according to the invention can advantageously communicate with other end points or network nodes which either master the method according to the invention or only the old checksum algorithm or only the new checksum algorithm.
- Both communication partners or network nodes use the same algorithm for forming the checksum for a connection in both directions.
- the active end point or network node selects a checksum algorithm and starts the normal procedure for establishing a connection.
- the checksum algorithm once selected for a connection to a specific communication partner or network node is also used when receiving packets or messages from this partner or network node.
- the passive end point or network node uses all the checksum algorithms known to it to check whether the message or the packet has been transmitted correctly. If this test was only successful with a checksum, the corresponding checksum algorithm is selected for this connection.
- connection request is not answered even after repeated repetition, the active end point or network node waits for a certain amount of time, depending on the coincidence, and starts the connection request again, but with a different checksum algorithm.
- FIG. 1 shows schematically the process of initializing a connection between two nodes, both of which are based on conventional only support the previous checksum algorithm ADLER32
- FIG. 2 shows schematically the procedure for initializing a connection between two nodes, both of which only support the new checksum algorithm CRC32 in a conventional manner
- FIG. 3 shows schematically the procedure for initializing a connection between a node , which uses the method according to the invention and supports two checksum algorithms ADLER32 and CRC32 and a node which in the conventional manner only supports the previous checksum algorithm ADLER32
- FIG. 1 shows schematically the process of initializing a connection between two nodes, both of which are based on conventional only support the previous checksum algorithm ADLER32
- FIG. 2 shows schematically the procedure for initializing a connection between two nodes, both of which only support the new checksum algorithm CRC32 in a conventional manner
- FIG. 3 shows schematically the procedure for initializing a connection between a node , which uses the method according to the invention and supports two checksum
- FIG. 4 shows schematically the sequence of the initialization of a connection between two nodes, both of which are methods according to the invention use and support two checksum algorithms ADLER32 and CRC32, one node preferably using ADLER32 and the other node preferably using CRC32 and a collision of the connection requests occurs.
- the Stream Control Transmission Protocol which is defined in RFC 2960, is considered as the transport protocol.
- SCTP Stream Control Transmission Protocol
- ADLER32 an algorithm for the creation of the checksum
- CRC32 a new algorithm for the creation of the checksum
- the method according to the invention can also be used to introduce several new algorithms for forming the checksum, which are intended to replace the previous algorithm ADLER32.
- FIG. 1 shows the connection setup with the conventional method, in which both the first network node A and the second network node B each only have the new algorithm. Support CRC32 to create the checksum. This means that two endpoints that use different algorithms to generate the checksum cannot communicate with each other.
- connection setup for SCTP is briefly explained at this point with reference to FIGS. 1 and 2. For the sake of simplicity, it is assumed that the connection requests originate from the first network node A.
- an SCTP packet with an INIT chunk is sent from the first network node A to the other network node B.
- the checksum for this SCTP packet is formed with the checksum algorithm implemented in the first network node A, ie ADLER32 in FIG. 1 and CRC32 in FIG.
- the second network node B which uses the same checksum algorithm as the first network node A due to administrative requirements, recognizes the received SCTP packets as valid or corrupted on the basis of the checksum.
- Transmission errors are indicated by a discrepancy between the checksum formed in accordance with the respective checksum algorithm and the content of the SCTP packet over which the checksum was formed. If such a corrupted SCTP packet is recognized by the second network node B, it is discarded by the second network node. If there is no response from the second network node B after a retransmit with timer T1, the first network node A will repeat the transmission of the corresponding SCTP packet. If the SCTP packet received by the second network node B is recognized as valid, which in principle can only occur if there are no transmission errors and the same checksum algorithm ADLER32, CRC32 is used in both network nodes A, B, an SCTP packet is also used by the second network node B. an INIT ACK chunk.
- This INIT ACK chunk contains a cookie parameter which is sent back from the first network node A in a COOKIE ECHO chunk in a further SCTP packet to the second network node B.
- the second network node B confirms receipt of this COOKIE ECHO chunk by sending a COOKIE ACK chunk in an SCTP packet, and the
- the connection between the network nodes A, B is established using the checksum algorithm ADLER32 (FIG. 1) or CRC32 (FIG. 2) and can be used to transmit the useful information.
- connection data block in which all connection-specific data of a connection is stored and which is stored in a network node A, is expanded by a field in which information about the checksum algorithm used can be stored, for example one
- Checksum_algorithm This always has a value. If a network node A working with the method according to the invention receives an SCTP packet, a search for the connection data block is initiated. If the connection data block is found, the one specified in the "checksum_algorithm" field
- Algorithm used to verify the packet Further treatment is carried out as provided in the standard. However, if no connection data block is found, all available algorithms are used. In the event that only one algorithm recognizes the packet as valid, it is assumed that this algorithm was used, otherwise the packet is discarded. A response that is sent on the basis of this packet is provided with the checksum of the algorithm found. Furthermore, a connection data block is generated whose field "checksum_algorithm" is set to a value representing this algorithm.
- connection data block is also called the Transmission Control Block (TCB).
- TCP Transmission Control Block
- a connection establishment with a first checksum method CRC32 is unsuccessful, the initiating first network node A must wait a random time (random delay) and can then try again with another checksum method ADLER32.
- the second end point or network node B only has implemented the ADLER32 checksum algorithm.
- the first end point or network node A has implemented the method according to the invention.
- the first network node A attempts to establish the connection using the checksum algorithm CRC32.
- the connection establishment is initiated with the checksum algorithm ADLER32, whereupon the second network node B answers as described above, and the communication relationship can be established using the checksum algorithm.
- SCTP is a peer to peer protocol, i.e. both
- Pages can be active at the same time, and collisions of the initialization messages can occur.
- the random distance (random delay) between the connection attempts of the two endpoints which is very likely to be different for neighboring network nodes A and B because it is random, serves to avoid synchronization (and thus a permanent failure to establish the connection), which would occur, for example, if - the neighboring network nodes A, B both support the method according to the invention, the network nodes A, B have different preferred checksum algorithms (in FIG. 4 the algorithm ADLER32 is preferred by the first network node A and the algorithm by the second network node B) CRC32), and the switchover to the other algorithm would take place at the same times both in the first network node A and in the second network node B.
- network node network elements which Have connections with several other network elements
- end point network element
- end point network element
- end point network node
- end point network node
- protocols can certainly communicate across these SCTP endpoints and thus an SCTP endpoint for a higher-level protocol can be a network node.
- the present invention is not limited to the exemplary embodiment.
- communication networks that are based on other connection-oriented communication protocols, several checksum methods can be operated in parallel using the teaching of the present invention.
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10137218 | 2001-07-30 | ||
DE10137218 | 2001-07-30 | ||
PCT/DE2002/001626 WO2003013098A1 (en) | 2001-07-30 | 2002-05-06 | Method for supporting a number of checksum algorithms in a network node |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1413114A1 true EP1413114A1 (en) | 2004-04-28 |
Family
ID=7693677
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP02726087A Withdrawn EP1413114A1 (en) | 2001-07-30 | 2002-05-06 | Method for supporting a number of checksum algorithms in a network node |
Country Status (8)
Country | Link |
---|---|
US (1) | US20030162541A1 (en) |
EP (1) | EP1413114A1 (en) |
JP (1) | JP2004537241A (en) |
KR (1) | KR20040017364A (en) |
CN (1) | CN1561623A (en) |
BR (1) | BR0211568A (en) |
CA (1) | CA2455122A1 (en) |
WO (1) | WO2003013098A1 (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI239175B (en) * | 2003-04-28 | 2005-09-01 | Ind Tech Res Inst | Apparatus, system and method of signaling gateway |
US7451167B2 (en) * | 2003-10-24 | 2008-11-11 | Network Appliance, Inc. | Verification of file system log data using per-entry checksums |
US8977859B2 (en) * | 2004-05-04 | 2015-03-10 | Elsevier, Inc. | Systems and methods for data compression and decompression |
US8230042B2 (en) * | 2005-04-19 | 2012-07-24 | International Business Machines Corporation | Policy based auditing of workflows |
JP4759389B2 (en) * | 2006-01-10 | 2011-08-31 | アラクサラネットワークス株式会社 | Packet communication device |
US8111634B2 (en) * | 2006-08-15 | 2012-02-07 | Cisco Technology, Inc. | System and method for integrating ring-protocol-compatible devices into network configurations that also include non-ring-protocol compatible devices |
CN101668020B (en) * | 2009-09-24 | 2013-06-05 | 中兴通讯股份有限公司 | Validation method of stream control transmission protocol, system, server side and client side |
CN103166843A (en) * | 2011-12-14 | 2013-06-19 | 中国科学院沈阳计算技术研究所有限公司 | Packet switching network efficient real-time data interaction protocol and communication method |
CN113872732B (en) * | 2021-09-27 | 2024-05-07 | 中国电子科技集团公司第五十四研究所 | Satellite channel reliable data transmission method based on self-adaptive checksum algorithm |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS59158140A (en) * | 1983-02-28 | 1984-09-07 | Oki Electric Ind Co Ltd | Data transmission system |
JPH0787480B2 (en) * | 1987-11-11 | 1995-09-20 | 松下電器産業株式会社 | Multi-protocol processor |
JPH0520510A (en) * | 1991-07-09 | 1993-01-29 | Mitsubishi Electric Corp | Ic card device |
US5524250A (en) * | 1991-08-23 | 1996-06-04 | Silicon Graphics, Inc. | Central processing unit for processing a plurality of threads using dedicated general purpose registers and masque register for providing access to the registers |
JPH05122163A (en) * | 1991-10-28 | 1993-05-18 | Toshiba Corp | Signal receiving equipment and signal receiving method using said equipment |
JPH05183531A (en) * | 1991-12-27 | 1993-07-23 | Toshiba Corp | Receiver |
US5430842A (en) * | 1992-05-29 | 1995-07-04 | Hewlett-Packard Company | Insertion of network data checksums by a network adapter |
JP3321265B2 (en) * | 1993-10-22 | 2002-09-03 | 株式会社日立製作所 | Communication processing apparatus and debugging method thereof |
JP3425821B2 (en) * | 1995-04-24 | 2003-07-14 | 富士通株式会社 | Communication control device and communication device connection method |
US5784566A (en) * | 1996-01-11 | 1998-07-21 | Oracle Corporation | System and method for negotiating security services and algorithms for communication across a computer network |
US6115357A (en) * | 1997-07-01 | 2000-09-05 | Packeteer, Inc. | Method for pacing data flow in a packet-based network |
US6212160B1 (en) * | 1998-03-24 | 2001-04-03 | Avaya Technlogy Corp. | Automated selection of a protocol by a communicating entity to match the protocol of a communications network |
JP2000003323A (en) * | 1998-06-15 | 2000-01-07 | Toshiba Corp | Data communication equipment in which communication speed or the like is automatically set, and data communication method therefor |
US7002992B1 (en) * | 2001-03-07 | 2006-02-21 | Cisco Technology, Inc. | Codec selection to improve media communication |
-
2002
- 2002-05-06 CA CA002455122A patent/CA2455122A1/en not_active Abandoned
- 2002-05-06 BR BR0211568-9A patent/BR0211568A/en not_active IP Right Cessation
- 2002-05-06 CN CNA028192893A patent/CN1561623A/en active Pending
- 2002-05-06 EP EP02726087A patent/EP1413114A1/en not_active Withdrawn
- 2002-05-06 JP JP2003518148A patent/JP2004537241A/en active Pending
- 2002-05-06 KR KR10-2004-7001468A patent/KR20040017364A/en not_active Application Discontinuation
- 2002-05-06 US US10/343,153 patent/US20030162541A1/en not_active Abandoned
- 2002-05-06 WO PCT/DE2002/001626 patent/WO2003013098A1/en active Application Filing
Non-Patent Citations (1)
Title |
---|
See references of WO03013098A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO2003013098A9 (en) | 2003-04-10 |
CN1561623A (en) | 2005-01-05 |
US20030162541A1 (en) | 2003-08-28 |
WO2003013098A1 (en) | 2003-02-13 |
JP2004537241A (en) | 2004-12-09 |
BR0211568A (en) | 2004-07-13 |
KR20040017364A (en) | 2004-02-26 |
CA2455122A1 (en) | 2003-02-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60108927T2 (en) | Computer systems, in particular virtual private networks | |
DE69920634T2 (en) | Method for contention resolution in a mobile transmission system | |
EP1252787A1 (en) | Method for operating a mobile radiotelephone network | |
DE3217261C2 (en) | Method for transmitting encrypted data | |
DE19605223A1 (en) | Method for operating a broadband connection between a mobile radio terminal and a network-side mobile radio device and a mobile radio terminal, network-side mobile radio device and mobile radio system | |
DE60026006T2 (en) | System for receiving multiple data | |
EP0701346A2 (en) | Method for consistent data transmission | |
EP1413114A1 (en) | Method for supporting a number of checksum algorithms in a network node | |
DE102004050416A1 (en) | Method for synchronization in a redundant communication system | |
DE10027456A1 (en) | Improving the performance of master and slave communications systems involves exchanging combined message frames representing first and second slave-specific frame groups | |
DE102004047371A1 (en) | Method for distributing software and configuration data and corresponding data network | |
EP2309797A2 (en) | Method for operating a mobile radio network | |
DE2245805C3 (en) | Circuit arrangement for a terminal system for the transmission of directed query messages | |
EP3744021B1 (en) | Subscriber station for a serial communication network, and method for correcting individual errors in a message of a serial communication network | |
EP3744047B1 (en) | Subscriber station for a bus system, and method for transmitting a message at different bit rates in a bus system | |
EP1287716B1 (en) | Device and method for setting up a subsequent connection for data transmission via a mobile telecommunications system, after the termination of the first connection | |
WO2020088999A1 (en) | Subscriber station for a serial bus system and method for transmitting a message in a serial bus system | |
DE102010023299B4 (en) | Method for transmitting data | |
DE102008016720A1 (en) | A method and communication system for determining the quality of at least one IP connection between a mobile device and a server connected to a public IP-based communication network | |
WO2002067487A1 (en) | Method for transmitting data packets | |
EP1189383A2 (en) | Method and arrangement for assignment of node number to nodes of a network | |
DE102011003656B4 (en) | A method of performing a change of a transmission channel shared by a group of multiple subscribers | |
DE102021114033A1 (en) | Establishment of a communication link in a wide area network | |
DE102022001845A1 (en) | Method for error handling in an information exchange between a control device and a backend service of a vehicle | |
EP1216551B1 (en) | Method for tunnelling in networks that are not sequence-protected |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20021206 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
17Q | First examination report despatched |
Effective date: 20050406 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA SIEMENS NETWORKS GMBH & CO. KG |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA SIEMENS NETWORKS S.P.A. |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: NOKIA SIEMENS NETWORKS GMBH & CO. KG |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20081202 |