亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? rfc3385.txt

?? 一個(gè)學(xué)習(xí)iSCSI協(xié)議的文檔
?? TXT
?? 第 1 頁 / 共 4 頁
字號(hào):





Network Working Group                                       D. Sheinwald
Request for Comments: 3385                                     J. Satran
Category: Informational                                              IBM
                                                               P. Thaler
                                                              V. Cavanna
                                                                 Agilent
                                                          September 2002


       Internet Protocol Small Computer System Interface (iSCSI)
         Cyclic Redundancy Check (CRC)/Checksum Considerations

Status of this Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2002).  All Rights Reserved.

Abstract

   In this memo, we attempt to give some estimates for the probability
   of undetected errors to facilitate the selection of an error
   detection code for the Internet Protocol Small Computer System
   Interface (iSCSI).

   We will also attempt to compare Cyclic Redundancy Checks (CRCs) with
   other checksum forms (e.g., Fletcher, Adler, weighted checksums), as
   permitted by available data.

1. Introduction

   Cyclic Redundancy Check (CRC) codes [Peterson] are shortened cyclic
   codes used for error detection.  A number of CRC codes have been
   adopted in standards: ATM, IEC, IEEE, CCITT, IBM-SDLC, and more
   [Baicheva].  The most important expectation from this kind of code is
   a very low probability for undetected errors.  The probability of
   undetected errors in such codes has been, and still is, subject to
   extensive studies that have included both analytical models and
   simulations.  Those codes have been used extensively in
   communications and magnetic recording as they demonstrate good "burst
   error" detection capabilities, but are also good at detecting several
   independent bit errors.  Hardware implementations are very simple and
   well known; their simplicity has made them popular with hardware




Sheinwald, et. al.           Informational                      [Page 1]

RFC 3385                iSCSI CRC Considerations          September 2002


   developers for many years.  However, algorithms and software for
   effective implementations of CRC are now also widely available
   [Williams].

   The probability of undetected errors depends on the polynomial
   selected to generate the code, the error distribution (error model),
   and the data length.

2. Error Models and Goals

   We will analyze the code behavior under two conditions:

      - noisy channel - burst errors with an average length of n bits
      - low noise channel - independent single bit errors

   Burst errors are the prevalent natural phenomenon on communication
   lines and recording media.  The numbers quoted for them revolve
   around the BER (bit error rate).  However, those numbers are
   frequently nothing more than a reflection of the Burst Error Rate
   multiplied by the average burst length.  In field engineering tests,
   three numbers are usually quoted together -- BER, error-free-seconds
   and severely-error-seconds; this illustrates our point.

   Even beyond communication and recording media, the effects of errors
   will be bursty.  An example of this is a memory error that will
   affect more than a single bit and the total effect will not be very
   different from the communication error, or software errors that occur
   while manipulating packets will have a burst effect.  Software errors
   also result in burst errors.  In addition, serial internal
   interconnects will make this type of error the most common within
   machines as well.

   We also analyze the effects of single independent bit errors, since
   these may be caused by certain defects.

   On burst, we assume an average burst error duration of bd, which at a
   given transmission rate s, will result in an average burst of a =
   bd*s bits.  (E.g., an average burst duration of 3 ns at 1Gbs gives an
   average burst of 3 bits.)

   For the burst error rate, we will take 10^-10.  The numbers quoted
   for BER on wired communication channels are between 10^-10 to 10^-12
   and we consider the BER as burst-error-rate*average-burst-length.
   Nevertheless, please keep in mind that if the channel includes
   wireless links, the error rates may be substantially higher.

   For independent single bit errors, we assume a 10^-11 error rate.




Sheinwald, et. al.           Informational                      [Page 2]

RFC 3385                iSCSI CRC Considerations          September 2002


   Because the error detection mechanisms will have to transport large
   amounts of data (petabytes=10^16 bits) without errors, we will target
   very low probabilities for undetected errors for all block lengths
   (at 10Gb/s that much data can be sent in less than 2 weeks on a
   single link).

   Alternatively, as iSCSI has to perform efficiently, we will require
   that the error detection capability of a selected protection
   mechanism be very good, at least up to block lengths of 8k bytes
   (64kbits).

   The error detection capability should keep the probability of
   undetected errors at values that would be "next-to-impossible".  We
   recognize, however, that such attributes are hard to quantify and we
   resorted to physics.  The value 10^23 is the Avogadro number while
   10^45 is the number of atoms in the known Universe (or it was many
   years ago when we read about it) and those are the bounds of
   incertitude we could live with.  (10^-23 at worst and 10^-45 if we
   can afford it.)  For 8k blocks, the per/bit equivalent would be
   (10^-28 to 10^-50).

3. Background and Literature Survey

   Each codeword of a binary (n,k) CRC code C consists of n = k+r bits.
   The block of r parity bits is computed from the block of k
   information bits.  The code has a degree r generator polynomial g(x).

   The code is linear in the sense that the bitwise addition of any two
   codewords yields a codeword.

   For the minimal m such that g(x) divides (x^m)-1, either n=m, and the
   code C comprises the set D of all the multiplications of g(x) modulo
   (x^m)-1, or n<m, and C is obtained from D by shortening each word in
   the latter in m-n specific positions.  (This also reduces the number
   of words since all zero words are then discarded and duplicates are
   not maintained.)

   Error detection at the receiving end is made by computing the parity
   bits from the received information block, and comparing them with the
   received parity bits.

   An undetected error occurs when the received word c' is a codeword,
   but is different from the c that is transmitted.

   This is only possible when the error pattern e=c'-c is a codeword by
   itself (because of the linearity of the code).  The performance of a
   CRC code is measured by the probability Pud of undetected channel
   errors.



Sheinwald, et. al.           Informational                      [Page 3]

RFC 3385                iSCSI CRC Considerations          September 2002


   Let Ai denote the number of codewords of weight i, (i.e., with i 1-
   bits).  For a binary symmetric channel (BSC), with sporadic,
   independent bit error ratio of probability 0<=epsilon<=0.5, the
   probability of undetected errors for the code C is thus given by:

Pud(C,epsilon) = Sigma[for i=d to n] (Ai*(epsilon^i)*(1-epsilon)^(n-i))

   where d is the distance of the code:  the minimal weight difference
   between two codewords in C which, by the linearity of the code, is
   also the minimal weight of any codeword in the code.  Pud can also be
   expressed by the weight distribution of the dual code:  the set of
   words each of which is orthogonal (bitwise AND yields an even number
   of 1-bits) to every word of C.  The fact that Pud can be computed
   using the dual code is extremely important; while the number of
   codewords in the code is 2^k, the number of codewords in the dual
   code is 2^r.  k is in the orders of thousands, and r in the order of
   16 or 24 or 32.  If we use Bi to denote the number of codewords in
   the dual code which are of weight i, then ([LinCostello]):

Pud (C,epsilon) = 2^-r Sigma [for i=0 to n] Bi*(1-2*epsilon)^i -
(1-epsilon)^n

   Wolf [Wolf94o] introduced an efficient algorithm for enumerating all
   the codewords of a code and finding their weight distribution.

   Wolf [Wolf82] found that, counter to what was assumed, (1) there
   exist codes for which Pud(C,epsilon)>Pud(C,0.5) for some epsilon
   not=0.5 and (2) Pud is not always increasing for 0<=epsilon<=0.5.
   The value of what was assumed to be the worst Pud is Pud(C,0.5)=(2^-
   r) - (2^-n).  This stems from the fact that with epsilon=0.5, all 2^n
   received words are equally likely and out of them 2^(n-r)-1 will be
   accepted as codewords of no errors, although they are different from
   the codeword transmitted.  Previously Pud had been assumed to equal
   [2^(n-r)-1]/(2^n-1) or the ratio of the number of non-zero multiples
   of the polynomial of degree less than n (each such multiple is
   undetected) and the number of possible error polynomials.  With
   either formula Pud approaches 1/2^r as n approaches infinity, but
   Wolf's formula is more accurate.

   Wolf [Wolf94j] investigated the CCITT code of r=16 parity bits.  This
   code is a member of the family of (shortened codes of) BCH codes of
   length 2^(r-1) -1 (r=16 in the CCITT 16-bit case) generated by a
   polynomial of the form g(x) =(x+1)p(x) with p(x) being a primitive
   polynomial of degree r-1 (=15 in this case).  These codes have a BCH
   design distance of 4.  That is, the minimal distance between any two
   codewords in the code is at least 4 bits (which is earned by the fact





Sheinwald, et. al.           Informational                      [Page 4]

RFC 3385                iSCSI CRC Considerations          September 2002


   that the sequence of powers of alpha, the root of p(x), which are
   roots of g(x), includes three consecutive powers -- alpha^0, alpha^1,
   alpha^2).  Hence, every 3 single bit errors are detectable.

   Wolf found that different shortened versions of a given code, of the
   same codeword length, perform the same (independent of which specific
   indexes are omitted from the original code).  He also found that for
   the unshortened codes, all primitive polynomials yield codes of the
   same performance.  But for the shortened versions, the choice of the
   primitive polynomial does make a difference.  Wolf [Wolf94j] found a
   primitive polynomial which (when multiplied by x+1) yields a
   generating polynomial that outperforms the CCITT one by an order of
   magnitude.  For 32-bit redundancy bits, he found an example of two
   polynomials that differ in their probability of undetected burst of
   length 33 by 4 orders of magnitude.

   It so happens, that for some shortened codes, the minimum distance,
   or the distribution of the weights, is better than for others derived
   from different unshortened codes.

   Baicheva, et. al. [Baicheva] made a comprehensive comparison of
   different generating polynomials of degree 16 of the form g(x) =
   (x+1)p(x), and of other forms.  They computed their Pud for code
   lengths up to 1024 bits.  They measured their "goodness"  -- if
   Pud(C,epsilon)  <= Pud(C,0.5) and being "well-behaved" -- if
   Pud(C,epsilon) increases with epsilon in the range (0,0.5).  The
   paper gives a comprehensive table that lists which of the polynomials
   is good and which is well-behaved for different length ranges.

   For a single burst error, Wolf [Wolf94J] suggested the model of (b:p)
   burst -- the errors only occur within a span of b bits, and within
   that span, the errors occur randomly, with a bit error probability 0
   <= p <= 1.

   For p=0.5, which used to be considered the worst case, it is well
   known [Wolf94J] that the probability of undetected one burst error of
   length b <= r is 0, of length b=r+1 is 2^-(r-1), and of b > r+1, is
   2^-r, independently of the choice of the primitive polynomial.

   With Wolf's definition, where p can be different from 0.5, indeed it
   was found that for a given b there are values of p, different from
   0.5 which maximize the probability of undetected (b:p) burst error.









Sheinwald, et. al.           Informational                      [Page 5]

RFC 3385                iSCSI CRC Considerations          September 2002


   Wolf proved that for a given code, for all b in the range r < b < n,
   the conditional probability of undetected error for the (n, n-r)
   code, given that a (b:p) burst occurred, is equal to the probability
   of undetected errors for the same code (the same generating
   polynomial), shortened to block length b, when this shortened code is
   used with a binary symmetric channel with channel (sporadic,
   independent) bit error probability p.

   For the IEEE-802.3 used CRC32, Fujiwara et al. [Fujiwara89] measured
   the weights of all words of all shortened versions of the IEEE 802.3
   code of 32 check bits.  This code is generated by a primitive
   polynomial of degree 32:

   g(x) = x^32 + x^26 + x^23 + x^22 + x^16 + x^12 + x^11 + x^10 + x^8 +
   x^7 + x^5 + x^4 + x^2 + x + 1 and hence the designed distance of it
   is only 3.  This distance holds for codes as long as 2^32-1.
   However, the frame format of the MAC (Media Access Control) of the
   data link layer in IEEE 802.3, as well as that of the data link layer
   for the Ethernet (1980) forbid lengths exceeding 12,144 bits.  Thus,
   only such bounded lengths are investigated in [Fujiwara89].  For
   shortened versions, the minimum distance was found to be 4 for
   lengths 4096 to 12,144; 5 for lengths 512 to 2048; and even 15 for
   lengths 33 through 42.  A chart of results of calculations of Pud is
   presented in [Fujiwara89] from which we can see that for codes of
   length 12,144 and BSC of epsilon = 10^-5 - 10^-4,
   Pud(12,144,epsilon)= 10^-14 - 10^-13 and for epsilon = 10^-4 - 10^-3,
   Pud(512,epsilon) = 10^-15, Pud(1024,epsilon) = 10^-14,
   Pud(2048,epsilon) = 10^-13, Pud(4096,epsilon) = 10^-12 - 10^-11, and
   Pud(8192,epsilon) = 10^-10 which is rather close to 2^-32.

   Castagnoli, et. al. [Castagnoli93] extended Fujiwara's technique for
   efficiently calculating the minimum distance through the weight
   distribution of the dual code and explored a large number of CRC
   codes with 24 and 32 redundancy bit.  They explored several codes
   built as a multiplication of several lower degree irreducible
   polynomials.

   In the popular class of (x+1)*deg31-irreducible-polynomial they

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
精品毛片乱码1区2区3区| 亚洲电影一区二区三区| 26uuu国产日韩综合| 欧美成人a视频| 欧美一区二区免费观在线| 欧美日韩一区三区| 欧美日韩国产中文| 91精品一区二区三区在线观看| 欧美日韩一区二区三区在线看 | 色诱视频网站一区| 不卡av在线网| 93久久精品日日躁夜夜躁欧美| 99riav久久精品riav| 99久久免费国产| 色综合天天综合色综合av| 91蝌蚪porny九色| 在线国产电影不卡| 欧美高清性hdvideosex| 欧美精品在线一区二区| 日韩欧美资源站| 久久精品视频在线看| 国产精品久久综合| 亚洲图片欧美色图| 日欧美一区二区| 精品一区精品二区高清| 国产呦萝稀缺另类资源| 国产成人午夜片在线观看高清观看| 成人一区二区三区视频 | 日韩一区二区免费高清| 精品国产制服丝袜高跟| 国产欧美日本一区视频| 亚洲精品成人在线| 日本不卡中文字幕| 粉嫩一区二区三区在线看| 99v久久综合狠狠综合久久| 欧美日韩免费高清一区色橹橹 | 欧美成人激情免费网| 久久久一区二区| 亚洲免费观看高清完整| 丝袜美腿一区二区三区| 国产夫妻精品视频| 色视频欧美一区二区三区| 欧美一区永久视频免费观看| 国产欧美在线观看一区| 亚洲一区二区黄色| 国产老女人精品毛片久久| 色乱码一区二区三区88| 久久―日本道色综合久久| 日韩毛片精品高清免费| 麻豆精品久久精品色综合| 国产91露脸合集magnet| 欧美自拍偷拍一区| 久久亚洲一级片| 亚洲一区精品在线| 国产精品一区二区免费不卡| 欧美午夜理伦三级在线观看| xf在线a精品一区二区视频网站| **性色生活片久久毛片| 欧美96一区二区免费视频| caoporen国产精品视频| 日韩一卡二卡三卡四卡| 亚洲婷婷国产精品电影人久久| 日本不卡一区二区三区| 99久久久免费精品国产一区二区| 欧美一级精品大片| 亚洲特黄一级片| 韩国女主播成人在线| 欧美视频在线一区二区三区| 国产三级精品视频| 日韩电影一区二区三区四区| 97久久精品人人做人人爽| 亚洲精品一区二区三区蜜桃下载| 亚洲香肠在线观看| 972aa.com艺术欧美| 久久午夜色播影院免费高清| 丝袜脚交一区二区| 91丨porny丨中文| 国产亚洲一二三区| 免费人成精品欧美精品| 欧美亚洲综合网| 日韩理论片中文av| 成人精品一区二区三区四区 | 欧美喷水一区二区| 亚洲私人黄色宅男| 国产不卡视频在线观看| 精品久久99ma| 日韩av午夜在线观看| 欧美亚洲综合在线| 亚洲色图视频免费播放| 国产二区国产一区在线观看| 欧美成人精品二区三区99精品| 丝袜诱惑制服诱惑色一区在线观看| 一本到一区二区三区| 亚洲日本在线看| 99在线精品观看| 国产精品麻豆久久久| 国产激情一区二区三区| 久久久久久久电影| 国产在线播精品第三| 精品成人a区在线观看| 丝袜亚洲另类丝袜在线| 欧美军同video69gay| 五月天视频一区| 91精品国产一区二区三区香蕉 | 欧美性受xxxx黑人xyx性爽| 亚洲欧洲精品一区二区三区| 不卡一区二区中文字幕| 国产精品国产自产拍在线| 成人18视频在线播放| 国产精品久久久久影院色老大| 国产成人免费av在线| 国产欧美一区二区三区沐欲| 丰满少妇在线播放bd日韩电影| 国产欧美日韩另类一区| www.爱久久.com| 亚洲免费在线视频一区 二区| 91色porny蝌蚪| 亚洲综合无码一区二区| 欧美视频自拍偷拍| 免费看日韩精品| 2020国产精品自拍| 国产精品99久| ㊣最新国产の精品bt伙计久久| 色域天天综合网| 亚洲成人免费电影| 欧美mv和日韩mv的网站| 国产精品一区三区| 国产精品拍天天在线| 一本大道久久a久久综合婷婷| 亚洲一区二区三区国产| 欧美一级片在线看| 国产精一区二区三区| 亚洲欧美日韩久久| 欧美日本一区二区三区四区| 蜜桃av一区二区在线观看| 久久婷婷成人综合色| 99久久久精品| 亚洲国产日韩精品| 精品国产乱码久久久久久老虎| 成人精品小蝌蚪| 亚洲成精国产精品女| 精品日产卡一卡二卡麻豆| 国产91精品露脸国语对白| 亚洲免费三区一区二区| 日韩欧美亚洲一区二区| 国产aⅴ综合色| 亚洲国产sm捆绑调教视频| 日韩精品资源二区在线| 99国产精品久| 久久疯狂做爰流白浆xx| 中文字幕日本乱码精品影院| 欧美三级在线看| 国产精品888| 亚洲高清免费在线| 国产日韩精品久久久| 在线观看不卡视频| 韩国av一区二区三区| 一区二区三区蜜桃| 2023国产精品视频| 欧美日韩视频在线第一区| 国产精品一区二区91| 爽好多水快深点欧美视频| 国产欧美一区二区在线观看| 欧美喷水一区二区| 成人黄色免费短视频| 免费高清在线一区| 亚洲黄色小说网站| 久久午夜色播影院免费高清| 欧美日韩一区不卡| 成人91在线观看| 玖玖九九国产精品| 亚洲资源中文字幕| 中文字幕精品一区| 日韩精品一区二区在线观看| 欧美探花视频资源| 成人aa视频在线观看| 九色|91porny| 亚洲6080在线| 亚洲色图在线播放| 国产农村妇女精品| 精品久久一区二区| 欧美日韩国产一区| 在线亚洲免费视频| av综合在线播放| 国产麻豆精品在线| 久久精品国产一区二区三区免费看| 亚洲午夜激情网页| 亚洲猫色日本管| 国产精品污网站| 国产午夜精品福利| 欧美精品一区二区三区高清aⅴ| 欧美日韩久久久一区| 91麻豆产精品久久久久久 | 精品国产1区2区3区| 在线播放视频一区| 欧美欧美欧美欧美首页| 欧美无乱码久久久免费午夜一区| 色国产精品一区在线观看| 91玉足脚交白嫩脚丫在线播放| 成人高清免费观看|