ECMA 393-2012 proxZZZ for sleeping hosts (2nd Edition).pdf
《ECMA 393-2012 proxZZZ for sleeping hosts (2nd Edition).pdf》由会员分享,可在线阅读,更多相关《ECMA 393-2012 proxZZZ for sleeping hosts (2nd Edition).pdf(36页珍藏版)》请在麦多课文档分享上搜索。
1、 Reference numberECMA-123:2009Ecma International 2009ECMA-393 2ndEdition / June 2012 proxZZZy for sleeping hosts proxZzzyis the registered Community Trade Mark of Ecma International (No 008849606). COPYRIGHT PROTECTED DOCUMENT Ecma International 2012 Ecma International 2012 iContents Page 1 Scope 1
2、2 Conformance . 1 3 Normative references 2 4 Terms and definitions . 3 5 Proxy Usage of Protocols (informative) 3 5.1 Basic Architecture . 3 5.2 Ethernet (IEEE 802.3) 3 5.3 Wireless LAN (IEEE 802.11) 4 5.4 Dynamic Host Configuration Protocol (DHCP). 4 5.5 Internet Protocol v4 Basic Framework (IPv4)
3、. 4 5.5.1 ARP Address Resolution Protocol . 4 5.5.2 Link Local Auto-IP Address Allocation . 5 5.5.3 IPv4 Address Conflict Detection 5 5.5.4 IGMP Internet Group Management Protocol 5 5.5.5 UDP User Datagram Protocol 5 5.5.6 TCP Transmission Control Protocol 5 5.5.7 DNS Domain Name System . 5 5.6 Inte
4、rnet Protocol v6 Basic Framework (IPv6) . 5 5.6.1 MLD Multicast Listener Discovery 6 5.7 Remote Access using SIP and IPv4 6 5.8 Remote Access using Teredo for IPv6 7 5.9 SNMP 7 5.10 Service Discovery using mDNS . 7 5.11 Name Resolution with LLMNR . 7 5.12 Wake Packets . 7 6 Basic Framework Protocols
5、 . 8 6.1 Ethernet 802.3 (Option) . 8 6.1.1 Configuration Data 8 6.1.2 Behavioural Requirements . 8 6.2 WiFi 802.11 (Option) 8 6.2.1 Configuration Data 8 6.2.2 Behavioural Requirements . 9 6.3 ARP . 10 6.3.1 Configuration Data 10 6.3.2 Behavioural Requirements . 11 6.4 Neighbour Discovery 11 6.4.1 Co
6、nfiguration Data 11 6.4.2 Behavioural Requirements . 11 6.5 Wake Packets . 12 6.5.1 Configuration Data 12 6.5.2 Behavioural Requirements . 12 7 Proxy Configuration and Management . 12 7.1 Configuration Data 13 7.2 Behavioural Requirements . 13 7.2.1 Returned Data (Option) . 13 8 Options . 14 8.1 IGM
7、P Multicast (Option) 14 8.1.1 Configuration Data 14 ii Ecma International 20128.1.2 Behavioural Requirements .14 8.2 DHCP Address Allocation (Option) 14 8.2.1 Configuration Data.14 8.2.2 Behavioural Requirements .15 8.3 Remote Access using SIP and IPv4 (Option) 15 8.3.1 Behavioural Requirements .16
8、8.4 Remote Access using Teredo for IPv6 16 8.4.1 Data Configuration.17 8.4.2 Behavioural Requirements .17 8.5 Simple Network Management Protocol (SNMP) .17 8.5.1 Configuration Data.17 8.5.2 Behavioural Requirements .18 8.6 Service Discovery using mDNS .18 8.6.1 Configuration Data.18 8.6.2 Behavioura
9、l Requirements .18 8.7 Name Resolution with LLMNR 21 8.7.1 Configuration Data.21 8.7.2 Behavioural Requirements .21 Annex A (normative) System Considerations 23 A.1 AC and DC Power Mode 23 A.2 Security Considerations .23 Annex B (informative) Protocols Considered but not included .25 B.1 SNMPv3 .25
10、B.2 UPnP .25 Bibliography 27 Ecma International 2012 iiiIntroduction Large amounts of electricity are used by electronic devices that are on solely for the purpose of maintaining network connectivity while they might otherwise be asleep. The computation required to stay connected is small, but these
11、 devices have large power differences between their on and sleep modes; thus, most of this energy use is wasted. Billions of dollars per year of electricity (and consequent carbon emissions) could be saved by widespread use of a “network proxy” for devices like PCs, printers, game consoles and set-t
12、op boxes. A low-power proxy handles key network tasks for a high-power device, thus allowing the high-power device to sleep when not in active use. In 2008, the Energy Star program identified preying in its Computer Specification, version 5.0, as a technology with substantial energy saving potential
13、. The standard designates that a “platform-independent industry standard” will specify the behaviour of a qualifying proxy. It is expected that this document will be that standard. This Standard provides an overall architecture for a proxy and key requirements for preying select protocols. Handling
14、of incoming traffic can require generating a reply packet, causing a system wakeup, or ignoring it. Proxies also do some routine packet generation on their own, and data are exchanged between a host and a proxy when the host goes to sleep and when it wakes up. Existing technologies require other ent
15、ities on the network to know that the host is asleep and alter their behaviour appropriately. A key goal of a proxy is to save energy, while simultaneously keeping the device accessible to the rest of the network. The operations of the proxy are best-effort, both in attempting to extend sleep time,
16、as well as maintaining network access. There are many possible ways to implement proxy functionality, and this Standard seeks to avoid unduly restricting choices in those designs. In particular, it does not specify the location of the proxy, within the host itself or in attached network devices. Thi
17、s 2ndedition is fully aligned with the 1stedition of ISO/IEC 16317:2011. This Ecma Standard has been adopted by the General Assembly of June 2012. iv Ecma International 2012“COPYRIGHT NOTICE This document may be copied, published and distributed to others, and certain derivative works of it may be p
18、repared, copied, published, and distributed, in whole or in part, provided that the above copyright notice and this Copyright License and Disclaimer are included on all such copies and derivative works. The only derivative works that are permissible under this Copyright License and Disclaimer are: (
19、i) works which incorporate all or portion of this document for the purpose of providing commentary or explanation (such as an annotated version of the document), (ii) works which incorporate all or portion of this document for the purpose of incorporating features that provide accessibility, (iii) t
20、ranslations of this document into languages other than English and into different formats and (iv) works by making use of this specification in standard conformant products by implementing (e.g. by copy and paste wholly or partly) the functionality therein. However, the content of this document itse
21、lf may not be modified in any way, including by removing the copyright notice or references to Ecma International, except as required to translate it into languages other than English or into a different format. The official version of an Ecma International document is the English language version o
22、n the Ecma International website. In the event of discrepancies between a translated version and the official version, the official version shall govern. The limited permissions granted above are perpetual and will not be revoked by Ecma International or its successors or assigns. This document and
23、the information contained herein is provided on an “AS IS“ basis and ECMA INTERNATIONAL DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY O
24、R FITNESS FOR A PARTICULAR PURPOSE.“ proxZzzy for sleeping hosts 1 Scope This Standard specifies maintenance of network connectivity and presence by proxies to extend the sleep duration of hosts. This Standard specifies: Capabilities that a proxy may expose to a host. Information that must be exchan
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ECMA3932012PROXZZZFORSLEEPINGHOSTS2NDEDITIONPDF

链接地址:http://www.mydoc123.com/p-704826.html