EP1413114A1 - Verfahren zur unterstützung mehrerer prüfsummenalgorithmen in einem netzknoten - Google Patents

Verfahren zur unterstützung mehrerer prüfsummenalgorithmen in einem netzknoten

Info

Publication number
EP1413114A1
EP1413114A1 EP02726087A EP02726087A EP1413114A1 EP 1413114 A1 EP1413114 A1 EP 1413114A1 EP 02726087 A EP02726087 A EP 02726087A EP 02726087 A EP02726087 A EP 02726087A EP 1413114 A1 EP1413114 A1 EP 1413114A1
Authority
EP
European Patent Office
Prior art keywords
network node
checksum algorithm
checksum
algorithm
initialization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP02726087A
Other languages
German (de)
English (en)
French (fr)
Inventor
Hans Jürgen SCHWARZBAUER
Michael TÜXEN
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Solutions and Networks GmbH and Co KG
Original Assignee
Siemens AG
Nokia Siemens Networks GmbH and Co KG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG, Nokia Siemens Networks GmbH and Co KG filed Critical Siemens AG
Publication of EP1413114A1 publication Critical patent/EP1413114A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0061Error detection codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0075Transmission of coding parameters to receiver
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/40Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/24Negotiation of communication capabilities

Definitions

  • Connection-oriented communication protocols are considered, in which each packet contains a checksum.
  • the algorithm used to form the checksum is not relevant here. However, if this algorithm is changed and replaced by one or more new ones, then during a transition period it can be expected that both the old and the new algorithm will be used within a communication network. Furthermore, since a packet with an incorrect checksum is normally discarded by the receiver, it must be determined for each traffic relationship which algorithm is used to form the checksum.
  • the first solution is not acceptable in a transition phase.
  • the second solution requires the manufacturer of the switching systems or network nodes, on the one hand, additional development effort for the administration of the selection of the algorithm for forming the checksum, but on the other hand the network operator must make and configure this selection for each traffic relationship. This can be very time-consuming and costly and is highly prone to errors.
  • the object on which the present invention is based is to specify a method for supporting a plurality of checksum algorithms in a network node which avoids the disadvantages of the prior art. This object is achieved by a method for supporting a number of checksum algorithms in a network node in accordance with the features of claims 1 or 2.
  • a method for supporting a plurality of checksum algorithms is provided in a first network node A, according to which a communication relationship is established between the first network node A and a second network node B, the initialization of which is carried out by the first network node A, in a first step a first checksum algorithm is selected by the first network node A, in a second step the selected checksum algorithm is signaled by the first network node A to the second network node B, in a third step the communication relationship is established using the selected checksum algorithm if the initialization of the communication relationship with the selected checksum algorithm is accepted by the second network node B or, in the third step, a further checksum algorithm is selected by the first network node A, if by the second network node B the initialization of the communication relationship with the selected checksum algorithm is rejected or ignored, the second and third steps then being repeated with the newly selected checksum algorithm.
  • a method for supporting a plurality of checksum algorithms in a first network node (A) for an existing communication relationship between the first network node (A) and a second is also implemented Network node (B), for which a first checksum algorithm is used, is provided, accordingly in a first step a second checksum algorithm is selected by the first network node (A), in a second step the selected checksum algorithm by the first network node (A) to the second Network node (B) is signaled, in a third step the selected checksum algorithm for the communication relationship is determined if the use of the selected checksum algorithm is accepted by the second network node (B) or in the third step another checksum algorithm is selected by the first network node (A) If the selected checksum algorithm is rejected or ignored by the second network node (B), the second and third steps are then repeated with the newly selected checksum algorithm.
  • the selected checksum algorithm is signaled indirectly from the first network node A to the second network node B by sending an initialization message which is coded by means of the checksum algorithm to be signaled.
  • An important advantage of the method according to the invention is that the administrative configuration or the administrative specification of the checksum algorithm is dispensed with. This eliminates, for example, the disadvantages mentioned for the network operator when introducing a new algorithm for forming the checksum.
  • the manufacturer of the switching centers or network nodes implements a method that allows to work with all implemented algorithms in a transparent manner. The development effort is no greater than the provision of the administration option.
  • An end point or network node which uses the method according to the invention can advantageously communicate with other end points or network nodes which either master the method according to the invention or only the old checksum algorithm or only the new checksum algorithm.
  • Both communication partners or network nodes use the same algorithm for forming the checksum for a connection in both directions.
  • the active end point or network node selects a checksum algorithm and starts the normal procedure for establishing a connection.
  • the checksum algorithm once selected for a connection to a specific communication partner or network node is also used when receiving packets or messages from this partner or network node.
  • the passive end point or network node uses all the checksum algorithms known to it to check whether the message or the packet has been transmitted correctly. If this test was only successful with a checksum, the corresponding checksum algorithm is selected for this connection.
  • connection request is not answered even after repeated repetition, the active end point or network node waits for a certain amount of time, depending on the coincidence, and starts the connection request again, but with a different checksum algorithm.
  • FIG. 1 shows schematically the process of initializing a connection between two nodes, both of which are based on conventional only support the previous checksum algorithm ADLER32
  • FIG. 2 shows schematically the procedure for initializing a connection between two nodes, both of which only support the new checksum algorithm CRC32 in a conventional manner
  • FIG. 3 shows schematically the procedure for initializing a connection between a node , which uses the method according to the invention and supports two checksum algorithms ADLER32 and CRC32 and a node which in the conventional manner only supports the previous checksum algorithm ADLER32
  • FIG. 1 shows schematically the process of initializing a connection between two nodes, both of which are based on conventional only support the previous checksum algorithm ADLER32
  • FIG. 2 shows schematically the procedure for initializing a connection between two nodes, both of which only support the new checksum algorithm CRC32 in a conventional manner
  • FIG. 3 shows schematically the procedure for initializing a connection between a node , which uses the method according to the invention and supports two checksum
  • FIG. 4 shows schematically the sequence of the initialization of a connection between two nodes, both of which are methods according to the invention use and support two checksum algorithms ADLER32 and CRC32, one node preferably using ADLER32 and the other node preferably using CRC32 and a collision of the connection requests occurs.
  • the Stream Control Transmission Protocol which is defined in RFC 2960, is considered as the transport protocol.
  • SCTP Stream Control Transmission Protocol
  • ADLER32 an algorithm for the creation of the checksum
  • CRC32 a new algorithm for the creation of the checksum
  • the method according to the invention can also be used to introduce several new algorithms for forming the checksum, which are intended to replace the previous algorithm ADLER32.
  • FIG. 1 shows the connection setup with the conventional method, in which both the first network node A and the second network node B each only have the new algorithm. Support CRC32 to create the checksum. This means that two endpoints that use different algorithms to generate the checksum cannot communicate with each other.
  • connection setup for SCTP is briefly explained at this point with reference to FIGS. 1 and 2. For the sake of simplicity, it is assumed that the connection requests originate from the first network node A.
  • an SCTP packet with an INIT chunk is sent from the first network node A to the other network node B.
  • the checksum for this SCTP packet is formed with the checksum algorithm implemented in the first network node A, ie ADLER32 in FIG. 1 and CRC32 in FIG.
  • the second network node B which uses the same checksum algorithm as the first network node A due to administrative requirements, recognizes the received SCTP packets as valid or corrupted on the basis of the checksum.
  • Transmission errors are indicated by a discrepancy between the checksum formed in accordance with the respective checksum algorithm and the content of the SCTP packet over which the checksum was formed. If such a corrupted SCTP packet is recognized by the second network node B, it is discarded by the second network node. If there is no response from the second network node B after a retransmit with timer T1, the first network node A will repeat the transmission of the corresponding SCTP packet. If the SCTP packet received by the second network node B is recognized as valid, which in principle can only occur if there are no transmission errors and the same checksum algorithm ADLER32, CRC32 is used in both network nodes A, B, an SCTP packet is also used by the second network node B. an INIT ACK chunk.
  • This INIT ACK chunk contains a cookie parameter which is sent back from the first network node A in a COOKIE ECHO chunk in a further SCTP packet to the second network node B.
  • the second network node B confirms receipt of this COOKIE ECHO chunk by sending a COOKIE ACK chunk in an SCTP packet, and the
  • the connection between the network nodes A, B is established using the checksum algorithm ADLER32 (FIG. 1) or CRC32 (FIG. 2) and can be used to transmit the useful information.
  • connection data block in which all connection-specific data of a connection is stored and which is stored in a network node A, is expanded by a field in which information about the checksum algorithm used can be stored, for example one
  • Checksum_algorithm This always has a value. If a network node A working with the method according to the invention receives an SCTP packet, a search for the connection data block is initiated. If the connection data block is found, the one specified in the "checksum_algorithm" field
  • Algorithm used to verify the packet Further treatment is carried out as provided in the standard. However, if no connection data block is found, all available algorithms are used. In the event that only one algorithm recognizes the packet as valid, it is assumed that this algorithm was used, otherwise the packet is discarded. A response that is sent on the basis of this packet is provided with the checksum of the algorithm found. Furthermore, a connection data block is generated whose field "checksum_algorithm" is set to a value representing this algorithm.
  • connection data block is also called the Transmission Control Block (TCB).
  • TCP Transmission Control Block
  • a connection establishment with a first checksum method CRC32 is unsuccessful, the initiating first network node A must wait a random time (random delay) and can then try again with another checksum method ADLER32.
  • the second end point or network node B only has implemented the ADLER32 checksum algorithm.
  • the first end point or network node A has implemented the method according to the invention.
  • the first network node A attempts to establish the connection using the checksum algorithm CRC32.
  • the connection establishment is initiated with the checksum algorithm ADLER32, whereupon the second network node B answers as described above, and the communication relationship can be established using the checksum algorithm.
  • SCTP is a peer to peer protocol, i.e. both
  • Pages can be active at the same time, and collisions of the initialization messages can occur.
  • the random distance (random delay) between the connection attempts of the two endpoints which is very likely to be different for neighboring network nodes A and B because it is random, serves to avoid synchronization (and thus a permanent failure to establish the connection), which would occur, for example, if - the neighboring network nodes A, B both support the method according to the invention, the network nodes A, B have different preferred checksum algorithms (in FIG. 4 the algorithm ADLER32 is preferred by the first network node A and the algorithm by the second network node B) CRC32), and the switchover to the other algorithm would take place at the same times both in the first network node A and in the second network node B.
  • network node network elements which Have connections with several other network elements
  • end point network element
  • end point network element
  • end point network node
  • end point network node
  • protocols can certainly communicate across these SCTP endpoints and thus an SCTP endpoint for a higher-level protocol can be a network node.
  • the present invention is not limited to the exemplary embodiment.
  • communication networks that are based on other connection-oriented communication protocols, several checksum methods can be operated in parallel using the teaching of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Error Detection And Correction (AREA)
  • Mobile Radio Communication Systems (AREA)
EP02726087A 2001-07-30 2002-05-06 Verfahren zur unterstützung mehrerer prüfsummenalgorithmen in einem netzknoten Withdrawn EP1413114A1 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE10137218 2001-07-30
DE10137218 2001-07-30
PCT/DE2002/001626 WO2003013098A1 (de) 2001-07-30 2002-05-06 Verfahren zur unterstützung mehrerer prüfsummenalgorithmen in einem netzknoten

Publications (1)

Publication Number Publication Date
EP1413114A1 true EP1413114A1 (de) 2004-04-28

Family

ID=7693677

Family Applications (1)

Application Number Title Priority Date Filing Date
EP02726087A Withdrawn EP1413114A1 (de) 2001-07-30 2002-05-06 Verfahren zur unterstützung mehrerer prüfsummenalgorithmen in einem netzknoten

Country Status (8)

Country Link
US (1) US20030162541A1 (ko)
EP (1) EP1413114A1 (ko)
JP (1) JP2004537241A (ko)
KR (1) KR20040017364A (ko)
CN (1) CN1561623A (ko)
BR (1) BR0211568A (ko)
CA (1) CA2455122A1 (ko)
WO (1) WO2003013098A1 (ko)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI239175B (en) * 2003-04-28 2005-09-01 Ind Tech Res Inst Apparatus, system and method of signaling gateway
US7451167B2 (en) * 2003-10-24 2008-11-11 Network Appliance, Inc. Verification of file system log data using per-entry checksums
US8977859B2 (en) * 2004-05-04 2015-03-10 Elsevier, Inc. Systems and methods for data compression and decompression
US8230042B2 (en) * 2005-04-19 2012-07-24 International Business Machines Corporation Policy based auditing of workflows
JP4759389B2 (ja) * 2006-01-10 2011-08-31 アラクサラネットワークス株式会社 パケット通信装置
US8111634B2 (en) * 2006-08-15 2012-02-07 Cisco Technology, Inc. System and method for integrating ring-protocol-compatible devices into network configurations that also include non-ring-protocol compatible devices
CN101668020B (zh) * 2009-09-24 2013-06-05 中兴通讯股份有限公司 一种流控制传输协议的校验方法、系统、服务端与客户端
CN103166843A (zh) * 2011-12-14 2013-06-19 中国科学院沈阳计算技术研究所有限公司 一种分组交换网络高效实时数据交互协议及通信方法
CN113872732B (zh) * 2021-09-27 2024-05-07 中国电子科技集团公司第五十四研究所 一种基于自适应校验和算法的卫星信道可靠数据传输方法

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS59158140A (ja) * 1983-02-28 1984-09-07 Oki Electric Ind Co Ltd デ−タ伝送方式
JPH0787480B2 (ja) * 1987-11-11 1995-09-20 松下電器産業株式会社 マルチプロトコル処理装置
JPH0520510A (ja) * 1991-07-09 1993-01-29 Mitsubishi Electric Corp Icカード装置
US5524250A (en) * 1991-08-23 1996-06-04 Silicon Graphics, Inc. Central processing unit for processing a plurality of threads using dedicated general purpose registers and masque register for providing access to the registers
JPH05122163A (ja) * 1991-10-28 1993-05-18 Toshiba Corp 信号受信装置及びこれを用いた信号受信方法
JPH05183531A (ja) * 1991-12-27 1993-07-23 Toshiba Corp 受信装置
US5430842A (en) * 1992-05-29 1995-07-04 Hewlett-Packard Company Insertion of network data checksums by a network adapter
JP3321265B2 (ja) * 1993-10-22 2002-09-03 株式会社日立製作所 通信処理装置およびそのデバッグ方法
JP3425821B2 (ja) * 1995-04-24 2003-07-14 富士通株式会社 通信制御装置及び通信装置接続方式
US5784566A (en) * 1996-01-11 1998-07-21 Oracle Corporation System and method for negotiating security services and algorithms for communication across a computer network
US6115357A (en) * 1997-07-01 2000-09-05 Packeteer, Inc. Method for pacing data flow in a packet-based network
US6212160B1 (en) * 1998-03-24 2001-04-03 Avaya Technlogy Corp. Automated selection of a protocol by a communicating entity to match the protocol of a communications network
JP2000003323A (ja) * 1998-06-15 2000-01-07 Toshiba Corp 通信速度等が自動設定されるデータ通信装置とこのデータ通信方法
US7002992B1 (en) * 2001-03-07 2006-02-21 Cisco Technology, Inc. Codec selection to improve media communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO03013098A1 *

Also Published As

Publication number Publication date
WO2003013098A1 (de) 2003-02-13
WO2003013098A9 (de) 2003-04-10
BR0211568A (pt) 2004-07-13
CN1561623A (zh) 2005-01-05
US20030162541A1 (en) 2003-08-28
JP2004537241A (ja) 2004-12-09
KR20040017364A (ko) 2004-02-26
CA2455122A1 (en) 2003-02-13

Similar Documents

Publication Publication Date Title
DE60108927T2 (de) Komputersysteme, insbesondere virtuelle private Netzwerken
DE69920634T2 (de) Verfahren zur Konkurrenzbetriebsauflösung in einem mobilen Übertragungssystem
EP1252787A1 (de) Verfahren zum betreiben eines mobilfunknetzes
DE3217261C2 (de) Verfahren zum Übertragen von verschlüsselten Daten
DE19605223A1 (de) Verfahren zum Betreiben einer Breitband-Verbindung zwischen einem Mobilfunk-Endgerät und einer netzseitigen Mobilfunkeinrichtung sowie Mobilfunk-Endgerät, netzseitige Mobilfunkeinrichtung und Mobilfunksystem
DE60026006T2 (de) System zum Empfang von Mehrfachdaten
EP0701346A2 (de) Verfahren zur konsistenten Nachrichtenübertragung
EP1413114A1 (de) Verfahren zur unterstützung mehrerer prüfsummenalgorithmen in einem netzknoten
DE102004050416A1 (de) Verfahren zur Synchronisation in einem redundanten Kommunikationssystem
DE10027456A1 (de) Vorrichtung und Verfahren zum Verbessern der Leistung in Master- und Slave-Kommunikationssystemen
DE102004047371A1 (de) Verfahren zum Verteilen von Software und Konfigurationsdaten sowie entsprechendes Datennetz
EP2309797A2 (de) Verfahren zum Betreiben eines Mobilfunknetzes
DE2245805C3 (de) Schaltungsanordnung für eine Endstellenanlage zur Durchgabe gerichteter Abfragenachrichten
EP3744021B1 (de) Teilnehmerstation für ein serielles kommunikationsnetzwerk und verfahren zur korrektur von einzelfehlern in einer nachricht eines seriellen kommunikationsnetzwerks
EP3744047B1 (de) Teilnehmerstation für ein bussystem und verfahren zum senden einer nachricht mit unterschiedlichen bitraten in einem bussystem
EP1287716B1 (de) Vorrichtung und verfahren für einen weiteren verbindungsaufbau zur datenübertragung über ein mobiles telekommunikationssystem nach beendigung einer ersten verbindung
WO2020088999A1 (de) Teilnehmerstation für ein serielles bussystem und verfahren zum senden einer nachricht in einem seriellen bussystem
DE102010023299B4 (de) Verfahren zum Übertragen von Daten
DE102008016720A1 (de) Verfahren und Kommunikationssystem zum Bestimmen der Qualität wenigsten einer IP-Verbindung zwischen einer mobilen Einrichtung und einem mit einem öffentlichen IP-basierten Kommunikationsnetz verbundenen Server
WO2002067487A1 (de) Verfahren zum übertragen von datenpaketen
EP1189383A2 (de) Verfahren und Anordnung für eine Zuweisung von Knotennummern zu Netzknoten eines Netzwerks
DE102011003656B4 (de) Verfahren zur Durchführung eines Wechsels eines von einer Gruppe aus mehreren Teilnehmern gemeinsam genutzten Übertragungskanals
DE102021114033A1 (de) Aufbau einer Kommunikationsverbindung in einem Weitverkehrsnetz
EP1216551B1 (de) Methode zum Tunnel in nicht sequenzgesicherten Netzen
EP2278758B1 (de) Prioritätsbasiertes Kommunikationsnetzwerk und Kommunikationsverfahren

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20021206

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

17Q First examination report despatched

Effective date: 20050406

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: NOKIA SIEMENS NETWORKS GMBH & CO. KG

RAP3 Party data changed (applicant data changed or rights of an application transferred)

Owner name: NOKIA SIEMENS NETWORKS S.P.A.

RAP3 Party data changed (applicant data changed or rights of an application transferred)

Owner name: NOKIA SIEMENS NETWORKS GMBH & CO. KG

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20081202