Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

The Protocol versus Document Points of View in Computer Protocols (RFC3930)

IP.com Disclosure Number: IPCOM000032063D
Original Publication Date: 2004-Oct-01
Included in the Prior Art Database: 2004-Oct-22
Document File: 16 page(s) / 37K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

D. Eastlake 3rd: AUTHOR

Abstract

This document contrasts two points of view: the "document" point of view, where digital objects of interest are like pieces of paper written and viewed by people, and the "protocol" point of view where objects of interest are composite dynamic network messages. Although each point of view has a place, adherence to a document point of view can be damaging to protocol design. By understanding both points of view, conflicts between them may be clarified and reduced.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 8% of the total text.

Network Working Group                                    D. Eastlake 3rd

Request for Comments: 3930                         Motorola Laboratories

Category: Informational                                     October 2004

   The Protocol versus Document Points of View in Computer Protocols

Status of this Memo

   This memo provides information for the Internet community.  It does

   not specify an Internet standard of any kind.  Distribution of this

   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2004).

Abstract

   This document contrasts two points of view: the "document" point of

   view, where digital objects of interest are like pieces of paper

   written and viewed by people, and the "protocol" point of view where

   objects of interest are composite dynamic network messages.  Although

   each point of view has a place, adherence to a document point of view

   can be damaging to protocol design.  By understanding both points of

   view, conflicts between them may be clarified and reduced.

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  2

   2.  Points of View . . . . . . . . . . . . . . . . . . . . . . . .  2

       2.1.  The Basic Points of View . . . . . . . . . . . . . . . .  3

       2.2.  Questions of Meaning . . . . . . . . . . . . . . . . . .  3

             2.2.1.  Core Meaning . . . . . . . . . . . . . . . . . .  3

             2.2.2.  Adjunct Meaning. . . . . . . . . . . . . . . . .  4

       2.3.  Processing Models. . . . . . . . . . . . . . . . . . . .  5

             2.3.1.  Amount of Processing . . . . . . . . . . . . . .  5

             2.3.2.  Granularity of Processing. . . . . . . . . . . .  5

             2.3.3.  Extensibility of Processing. . . . . . . . . . .  6

       2.4.  Security and Canonicalization. . . . . . . . . . . . . .  6

             2.4.1.  Canonicalization . . . . . . . . . . . . . . . .  6

             2.4.2.  Digital Authentication . . . . . . . . . . . . .  8

             2.4.3.  Canonicalization and Digital Authentication. . .  8

             2.4.4.  Encryption . . . . . . . . . . . . . . . . . . .  9

       2.5.  Unique Internal Labels . . . . . . . . . . . . . . . . . 10

   3.  Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

   4.  Resolution of the Points of View . . . . . . . . . . . . . . . 11

Eastlake                     Informational                      [Page 1]

RFC 3930          Protocol versus Document Viewpoints   October 2004

   5.  Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 12

   6.  Security Considerations. . . . . . . . . . . ....