亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專(zhuān)輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? rfc3385.txt

?? 一個(gè)學(xué)習(xí)iSCSI協(xié)議的文檔
?? TXT
?? 第 1 頁(yè) / 共 4 頁(yè)
字號(hào):
   endfunction

8.3 Some Hardware Implementation Comments

   The iSCSI spec specifies that the most significant 32 bits of the
   data be complemented prior to performing the CRC computation.  For
   most implementations of the CRC algorithm, such as the ones described
   here, which perform simultaneous multiplication by x^32 and division
   by the CRC polynomial, this is equivalent to initializing the CRC
   register to ones regardless of the CRC polynomial.  For other
   implementations, in particular one that only performs division by the
   CRC polynomial (and for which the prescribed multiplication by x^32
   is performed externally) initializing the CRC register to ones does
   not have the same effect as complementing the most significant 32
   bits of the message.  With such implementations, for the CRC32c
   polynomial, initializing the CRC register to 0x2a26f826 has the same
   effect as complementing the most significant 32 bits of the data.
   See reference [Tuikov&Cavanna] for more details.

8.4 Fast Hardware Implementation References

   Fast hardware implementations start from a canonic scheme (as the one
   presented in 7.2) and optimize it based on different criteria.  Two
   classic papers on this subject are [Albertengo1990] and [Glaise1997].
   A more modern (and systematic) approach can be found in [Shie2001]
   and [Sprachman2001].

9. Summary and Conclusions

   The following table is a summary of the error detection capabilities
   of the different codes analyzed.  In the table, d is the minimal
   distance at block length block (in bits), i/byte - software
   instructions/byte, Table size (if table lookup needed), T-look number
   of lookups/byte, Pudb - Pud burst and Puds - Pud sporadic:





Sheinwald, et. al.           Informational                     [Page 18]

RFC 3385                iSCSI CRC Considerations          September 2002


   +-----------------------------------------------------------+
   | Code      |d| Block |i/Byte|Tsize|T-look| Pudb   | Puds   |
   +-----------------------------------------------------------+
   | Fletcher32|3| 2^19  | 2    |  -  | -    | 10^-37 | 10^-36 |
   +-----------------------------------------------------------+
   | Adler32   |3| 2^19  | 3    |  -  | -    | 10^-36 | 10^-35 |
   +-----------------------------------------------------------+
   | IEEE-802  |3| 2^16  | 2.75 | 2^18| 0.5/b| 10^-41 | 10^-40 |
   +-----------------------------------------------------------+
   | CRC32C    |3| 2^31-1| 2.75 | 2^18| 0.5/b| 10^-41 | 10^-40 |
   +-----------------------------------------------------------+

   The probabilities for undetected errors in the above table are
   computed assuming uniformly distributed data.  For real data - that
   can be biased - [Stone98], checksums behave substantially worse than
   CRCs.

   Considering the protection level it offers, the lack of sensitivity
   for biased data and the large block it can protect, we think that
   CRC32C is a good choice as a basic error detection mechanism for
   iSCSI.

   Please observe also that burst errors characterized by a fixed
   average time will have a higher impact on error detection capability
   as the speed of the channels (machines and networks) increases.  The
   only way to keep the Pud within bounds for the long-term is to reduce
   the BER by using better coding of lower levels of the channel.

10. Security Considerations

   These codes detect unintentional changes to data such as those caused
   by noise. In an environment where an attacker can change the data, it
   can also change the error-detection code to match the new data.
   Therefore, the error-detection codes overviewed here do not provide
   protection against attacks.  Indeed, these codes are not intended for
   security purposes; they are meant to be used within some application,
   and the application's threat model and security design control the
   security considerations for the use of the CRC.

11. References and Bibliography

   [Albertengo1990] G. Albertengo, R. Sisto, "Parallel CRC Generation
                    IEEE Micro", Vol. 10, No. 5, October 1990, pp. 63-
                    71.

   [Arazi]          B Arazi, "A commonsense Approach to the Theory of
                    Error Correcting codes".




Sheinwald, et. al.           Informational                     [Page 19]

RFC 3385                iSCSI CRC Considerations          September 2002


   [Baicheva]       T Baicheva, S Dodunekov and P Kazakov, "Undetected
                    error probability performance of cyclic redundancy-
                    check codes of 16-bit redundancy", IEEE Proceedings
                    on Communications, 147:253-256, October 2000.

   [Black]          "Fast CRC32 in Software"  by Richard Black, 1994, at
                    www.cl.cam.ac.uk/Research/SRG/bluebook/21/crc/crc.
                    html.

   [Castagnoli93]   Guy Castagnoli, Stefan Braeuer and Martin Herrman
                    "Optimization of Cyclic Redundancy-Check Codes with
                    24 and 32 Parity Bits", IEEE Transact. on
                    Communications, Vol. 41, No. 6, June 1993.

   [braun01]        Florian Braun and Marcel Waldvogel, "Fast
                    Incremental CRC Updates for IP over ATM Networks",
                    IEEE, High Performance Switching and Routing, 2001,
                    pp. 48-52.

   [FITS]           "NASA FITS documents" at http://heasarc.gsfc.nasa.
                    gov/docs/heasarc/ofwg/docs/general/checksum/node26.
                    html.

   [Fujiwara89]     Toru Fujiwara, Tadao Kasami, and Shu Lin, "Error
                    detecting capabilities of the shortened hamming
                    codes adopted forerror detection in IEEE standard
                    802.3", IEEE Transactions on Communications, COM-
                    37:986989, September 1989.

   [Glaise1997]     Glaise, R. J., "A two-step computation of cyclic
                    redundancy code CRC-32 for ATM networks", IBM
                    Journal of Research and Development, Volume 41,
                    Number 6, 1997.

   [ieee1364]       IEEE Standard Hardware Description Language Based on
                    the Verilog Hardware Description Language, IEEE
                    Standard 1364-1995, December 1995.

   [LinCostello]    S. Lin and D.J. Costello, Jr., "Error Control
                    Coding: Fundamentals and Applications", Englewood
                    Cliffs, NJ: Prentice Hall, 1983.

   [Peterson]       W Wesley Peterson & E J Weldon - Error Correcting
                    Codes - First Edition 1961/Second Edition 1972.







Sheinwald, et. al.           Informational                     [Page 20]

RFC 3385                iSCSI CRC Considerations          September 2002


   [RFC2026]        Bradner, S., "The Internet Standards Process --
                    Revision 3", BCP 9, RFC 2026, October 1996.

   [Ritter]         Ritter, T. 1986. The Great CRC Mystery. Dr. Dobb's
                    Journal of Software Tools. February. 11(2): 26-34,
                    76-83.

   [Polynomials]    "Information on Primitive and Irreducible
                    Polynomials" at http://www.theory.csc.uvic.ca/~cos/
                    inf/neck/PolyInfo.html.

   [RFC1146]        Zweig, J. and C. Partridge, "TCP Alternate Checksum
                    Options", RFC 1146, March 1990.

   [RFC1950]        Deutsch, P. and J. Gailly, "ZLIB Compressed Data
                    Format Specification version 3.3", RFC 1950, May
                    1996.

   [Shie2001]       Ming-Der Shieh, et. al, "A Systematic Approach for
                    Parallel CRC Computations", Journal of Information
                    Science and Engineering, Vol.17 No.3, pp.445-461.

   [Sprachman2001]  Michael Sprachman, "Automatic Generation of Parallel
                    CRC Circuits", IEEE Design & Test May-June 2001.

   [Stone98]        J. Stone et. al., "Performance of Checksums and
                    CRC's over Real Data", IEEE/ACM Transactions on
                    Networking, Vol. 6, No. 5, October 1998.

   [Williams]       Ross Williams - A PAINLESS GUIDE TO CRC ERROR
                    DETECTION ALGORITHMS widely available on the net -
                    (e.g., ftp.adelaide.edu.au/pub/rocksoft/crc_v3.txt)

   [Wolf82]         J.K. Wolf, Arnold Michelson and Allen Levesque, "On
                    the probability of undetected error for linear block
                    codes", IEEE Transactions on Communications, COM-30:
                    317-324, 1982.

   [Wolf88]         J.K. Wolf, R.D. Blackeney, "An Exact Evaluation of
                    the Probability of Undetected Error for Certain
                    Shortened Binary CRC Codes", Proc. MILCOM - IEEE
                    1988.

   [Wolf94J]        J.K. Wolf and Dexter Chun, "The single burst error
                    detection performance of binary cyclic codes", IEEE
                    Transactions on Communications COM-42:11-13, January
                    1994.




Sheinwald, et. al.           Informational                     [Page 21]

RFC 3385                iSCSI CRC Considerations          September 2002


   [Wolf94O]        Dexter Chun and J.K. Wolf, "Special Hardware for
                    computing the probability of undetected error for
                    certain binary crc codes and test results", IEEE
                    Transactions on Communications, COM-42:2769-2772.

   [Tuikov&Cavanna] Luben Tuikov and Vicente Cavanna, "The iSCSI CRC32C
                    Digest and the Simultaneous Multiply and Divide
                    Algorithm", January 30, 2002. White paper
                    distributed to the IETF ips iSCSI reflector.

12. Acknowledgements

   We would like to thank Matt Wakeley for providing us with the
   motivation to co-author this paper and for helpful discussions on the
   subject matter, during his employment with Agilent.

13. Authors' Addresses

   Julian Satran
   IBM, Haifa Research Lab
   MATAM - Advanced Technology Center
   Haifa 31905, Israel
   EMail: julian_satran@il.ibm.com


   Dafna Sheinwald
   IBM, Haifa Research Lab
   MATAM - Advanced Technology Center
   Haifa 31905, Israel
   EMail: Dafna_Sheinwald@il.ibm.com


   Pat Thaler
   Agilent Technologies
   1101 Creekside Ridge Drive
   Suite 100, M/S RH21
   Roseville, CA 95661
   EMail: pat_thaler@agilent.com


   Vicente Cavanna
   Agilent Technologies
   1101 Creekside Ridge Drive
   Suite 100, M/S RH21
   Roseville, CA 95661
   EMail: vince_cavanna@agilent.com





Sheinwald, et. al.           Informational                     [Page 22]

RFC 3385                iSCSI CRC Considerations          September 2002


14.  Full Copyright Statement

   Copyright (C) The Internet Society (2002).  All Rights Reserved.

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works.  However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Acknowledgement

   Funding for the RFC Editor function is currently provided by the
   Internet Society.



















Sheinwald, et. al.           Informational                     [Page 23]


?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美第一区第二区| 日本在线不卡视频| 中文字幕免费不卡| 久久久久青草大香线综合精品| 7777精品伊人久久久大香线蕉完整版 | 成人激情动漫在线观看| 国产一本一道久久香蕉| 国内不卡的二区三区中文字幕 | 成人自拍视频在线| 国产成人av电影在线播放| 国产成人精品影视| 成人高清伦理免费影院在线观看| 国产成人一级电影| 成人高清视频在线| 91蝌蚪porny| 欧美亚洲日本国产| 7777精品伊人久久久大香线蕉超级流畅| 欧美日韩国产美| 精品久久一二三区| 国产精品精品国产色婷婷| 亚洲三级在线免费观看| 亚洲自拍偷拍麻豆| 日本欧美肥老太交大片| 精品一区二区三区av| 成人免费高清视频| 26uuu国产电影一区二区| 337p粉嫩大胆色噜噜噜噜亚洲| 久久久久久久免费视频了| 国产精品卡一卡二| 亚洲一区二区三区四区五区黄| 天天综合天天做天天综合| 国精产品一区一区三区mba视频| 国产69精品久久久久777| 色婷婷综合久久久久中文一区二区| 欧美午夜影院一区| 精品1区2区在线观看| 最新成人av在线| 日韩电影一二三区| 国产成人无遮挡在线视频| 在线观看国产一区二区| 日韩免费观看高清完整版| 中文字幕高清一区| 午夜视频在线观看一区二区| 国产一区二区三区免费播放| 色诱视频网站一区| 日韩精品一区在线观看| 亚洲男人电影天堂| 国产在线播放一区二区三区| 色菇凉天天综合网| 精品免费国产一区二区三区四区| 亚洲视频电影在线| 久久 天天综合| 色欧美88888久久久久久影院| 日韩一区二区电影在线| 欧美国产精品v| 日本欧美肥老太交大片| 欧美zozo另类异族| 一级中文字幕一区二区| 国产一区二区在线视频| 欧美吞精做爰啪啪高潮| 国产欧美日韩综合| 奇米综合一区二区三区精品视频 | 欧美日韩高清在线| 中文字幕成人av| 青青草成人在线观看| 91丝袜美腿高跟国产极品老师| 91精品国产欧美日韩| 亚洲免费观看高清| 国产91丝袜在线18| 欧美r级在线观看| 午夜精品久久久久久久蜜桃app| 国产大陆亚洲精品国产| 日韩视频在线一区二区| 亚洲高清免费视频| 91在线你懂得| 中文欧美字幕免费| 国产一区二区在线观看免费 | 亚洲超碰97人人做人人爱| 北条麻妃国产九九精品视频| 精品av综合导航| 久久精品国产一区二区| 宅男在线国产精品| 亚洲国产欧美在线| 色综合久久久久综合体桃花网| 国产午夜亚洲精品午夜鲁丝片| 色天天综合色天天久久| 国产精品热久久久久夜色精品三区 | 精品国产乱码久久久久久夜甘婷婷 | 精品国一区二区三区| 日本麻豆一区二区三区视频| 欧美精品在线视频| 亚洲一区二区在线视频| 色综合久久综合中文综合网| 国产精品高清亚洲| 国产jizzjizz一区二区| 久久久99精品久久| 国产精品99精品久久免费| 国产亚洲欧洲一区高清在线观看| 精品一区二区三区视频| 日韩精品一区二区三区视频在线观看| 亚洲国产cao| 欧美日韩的一区二区| 午夜精品福利一区二区三区蜜桃| 欧美午夜精品久久久| 亚洲综合在线电影| 欧美日免费三级在线| 亚洲国产中文字幕| 欧美人妖巨大在线| 蜜桃精品在线观看| 26uuu精品一区二区| 69久久夜色精品国产69蝌蚪网| 性久久久久久久久久久久| 欧美日本在线播放| 日本美女一区二区三区| 欧美精品一区二区三区在线 | 在线国产亚洲欧美| 亚洲第一电影网| 欧美一二三四区在线| 久久99精品一区二区三区| 精品日韩成人av| 成人精品一区二区三区四区 | 亚洲美女区一区| 色综合天天综合| 亚洲成人精品在线观看| 日韩午夜激情视频| 国产成人精品免费视频网站| 亚洲欧洲国产专区| 91久久精品午夜一区二区| 五月天激情综合| 欧美精品一区二区精品网| voyeur盗摄精品| 亚洲大片在线观看| 久久综合成人精品亚洲另类欧美| 国产99精品在线观看| 一区二区三区免费网站| 欧美人动与zoxxxx乱| 黄色小说综合网站| 成人欧美一区二区三区1314| 欧美日韩国产不卡| 欧美欧美午夜aⅴ在线观看| 久久精品国产免费| 中文字幕中文字幕一区二区 | 成人免费在线视频| 日韩一级大片在线| www.日韩av| 青青国产91久久久久久| 国产精品乱人伦中文| 在线成人午夜影院| www.亚洲色图| 久久99热狠狠色一区二区| 自拍av一区二区三区| 日韩精品在线网站| 色婷婷国产精品久久包臀| 久久99国产精品麻豆| 一区二区三区四区激情| 久久亚区不卡日本| 欧美日韩一区高清| 成人免费观看男女羞羞视频| 免费av成人在线| 亚洲精品乱码久久久久久日本蜜臀 | 久久久不卡网国产精品一区| 在线免费观看日本欧美| 国产揄拍国内精品对白| 亚洲午夜成aⅴ人片| 日本一区二区三级电影在线观看| 在线不卡一区二区| 91老师片黄在线观看| 国产自产高清不卡| 日韩精品电影在线| 亚洲日本在线观看| 国产视频一区在线观看 | 亚洲成人精品一区二区| 中文字幕一区二区在线观看| 亚洲一卡二卡三卡四卡无卡久久| 久久久久久99精品| 日韩精品中午字幕| 欧美日韩免费在线视频| 色综合亚洲欧洲| 成人一区二区三区在线观看| 久久电影网电视剧免费观看| 亚洲一级二级在线| 亚洲欧洲中文日韩久久av乱码| 久久久久国产精品麻豆ai换脸| 欧美麻豆精品久久久久久| 91福利精品视频| av在线不卡电影| 成人性生交大片免费看中文 | 日韩欧美一区二区在线视频| 在线观看日韩av先锋影音电影院| 97成人超碰视| 成人三级在线视频| 国产成人综合亚洲91猫咪| 久久成人18免费观看| 日日摸夜夜添夜夜添国产精品| 亚洲人被黑人高潮完整版| 亚洲色图一区二区| 国产精品超碰97尤物18| 亚洲三级电影全部在线观看高清| 中文字幕欧美日韩一区| 国产清纯在线一区二区www|