分享
 
 
 

RFC3072 - Structured Data Exchange Format (SDXF)

王朝other·作者佚名  2008-05-31
窄屏简体版  字體: |||超大  

Network Working Group M. Wildgrube

Request for Comments: 3072 March 2001

Category: Informational

StrUCtured Data Exchange Format (SDXF)

Status of this Memo

This memo provides information for the Internet community. It does

not specify an Internet standard of any kind. Distribution of this

memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (2001). All Rights Reserved.

IESG Note

This document specifies a data exchange format and, partially, an API

that can be used for creating and parsing such a format. The IESG

notes that the same problem space can be addressed using formats that

the IETF normally uses including ASN.1 and XML. The document reader

is strongly encouraged to carefully read section 13 before choosing

SDXF over ASN.1 or XML. Further, when storing text in SDXF, the user

is encourage to use the datatype for UTF-8, specified in section 2.5.

Abstract

This specification describes an all-purpose interchange format for

use as a file format or for net-working. Data is organized in chunks

which can be ordered in hierarchical structures. This format is

self-describing and CPU-independent.

Table of Contents

1. Introduction ................................................. 2

2. Description of the SDXF data format .......................... 3

3. Introduction to the SDXF functions ........................... 5

3.1 General remarks .............................................. 5

3.2 Writing a SDXF buffer ........................................ 5

3.3 Reading a SDXF buffer ........................................ 6

3.4 Example ...................................................... 6

4. Platform independence ........................................ 8

5. Compression .................................................. 9

6. Encryption ...................................................11

7. Arrays........................................................11

8. Description of the SDXF functions ............................12

8.1 Introduction .................................................12

8.2 Basic definitions ............................................13

8.3 Definitions for C++ ..........................................15

8.4 Common Definitions ...........................................16

8.5 Special functions ............................................17

9. 'Support' of UTF-8 ...........................................19

10. Security Considerations .....................................19

11. Some general hints ..........................................20

12. IANA Considerations .........................................20

13. Discussion ..................................................21

13.1 SDXF vs. ASN.1 ..............................................21

13.2 SDXF vs. XML ................................................22

14. Author's Address ............................................24

15. Acknowledgements ............................................24

16. References ..................................................24

17. Full Copyright Statement ....................................26

1. Introduction

The purpose of the Structured Data eXchange Format (SDXF) is to

permit the interchange of an arbitrary structured data block with

different kinds of data (numerical, text, bitstrings). Because data

is normalized to an abstract computer architecture independent

"network format", SDXF is usable as a network interchange data

format.

This data format is not limited to any application, the demand for

this format is that it is usable as a text format for Word-

processing, as a picture format, a sound format, for remote procedure

calls with complex parameters, suitable for document formats, for

interchanging business data, etc.

SDXF is self-describing, every program can unpack every SDXF-data

without knowing the meaning of the individual data elements.

Together with the description of the data format a set of functions

will be introduced. With the help of these functions one can create

and Access the data elements of SDXF. The idea is that a programmer

should only use these functions instead of maintaining the structure

by himself on the level of bits and bytes. (In the speech of

object-oriented programming these functions are methods of an object

which works as a handle for a given SDXF data block.)

SDXF is not limited to a specific platform, along with a correct

preparation of the SDXF functions the SDXF data can be interchanged

(via network or data carrier) across the boundaries of different

architectures (specified by the character code like ASCII, ANSI or

EBCDIC and the byte order for binary data).

SDXF is also prepared to compress and encrypt parts or the whole

block of SDXF data.

2. Description of SDXF data format.

2.1 First we introduce the term "chunk". A chunk is a data structure

with a fixed set of components. A chunk may be "elementary" or

"structured". The latter one contains itself one or more other

chunks.

A chunk consists of a header and the data body (content):

+----------+-----+-------+-----------------------------------+

Name Pos. Length Description

+----------+-----+-------+-----------------------------------+

chunk-ID 1 2 ID of the chunk (unsigned short)

flags 3 1 type and properties of this chunk

length 4 3 length of the following data

content 7 *) net data or a list of of chunks

+----------+-----+-------+-----------------------------------+

(* as stated in "length". total length of chunk is length+6. The

chunk ID is a non-zero positive number.

or more visually:

+----+----+----+----+----+----+----+----+----+-...

chunkID fl length content

+----+----+----+----+----+----+----+----+----+-...

or in ASN.1 syntax:

chunk ::= SEQUENCE

{

chunkID INTEGER (1..65535),

flags BIT STRING,

length OCTET STRING SIZE 3, -- or: INTEGER (0..16777215)

content OCTET STRING

}

2.2 Structured chunk.

A structured chunk is marked as such by the flag byte (see 2.5).

Opposed to an elementary chunk its content consists of a list of

chunks (elementary or structured):

+----+-+---+-------+-------+-------+-----+-------+

id flen chunk chunk chunk ... chunk

+----+-+---+-------+-------+-------+-----+-------+

With the help of this concept you can reproduce every hierarchically

structured data into a SDXF chunk.

2.3 Some Remarks about the internal representation of the chunk's

elements:

Binary values are always in high-order-first (big endian) format,

like the binary values in the IP header (network format). A length

of 300 (=256 + 32 + 12) is stored as

+----+----+----+----+----+----+----+----+----+--

00 01 2C content

+----+----+----+----+----+----+----+----+----+--

in hexadecimal notation.

This is also valid for the chunk-ID.

2.4 Character values in the content portion are also an object of

adaptation: see chapter 4.

2.5 Meaning of the flag-bits: Let us represent the flag byte in this

manner:

+-+-+-+-+-+-+-+-+

01234567

+-+-+-+-+-+-+-+-+

+-- reserved

+---- array

+------ short chunk

+-------- encrypted chunk

+---------- compressed chunk

+-+-+------------ data type (0..7)

data types are:

0 -- pending structure (chunk is inconsistent, see also 11.1)

1 -- structure

2 -- bit string

3 -- numeric

4 -- character

5 -- float (ANSI/IEEE 754-1985)

6 -- UTF-8

7 -- reserved

2.6 A short chunk has no data body. The 3 byte Length field is used as

data bytes instead. This is used in order to save space when there

are many small chunks.

2.7 Compressed and encrypted chunks are eXPlained in chapter 5 and 6.

2.8 Arrays are explained in chapter 7.

2.9 Handling of UTF-8 is explained in chapter 9.

2.10 Not all combinations of bits are allowed or reasonable:

- the flags 'array' and 'short' are mutually exclusive.

- 'short' is not applicable for data type 'structure' and 'float'.

- 'array' is not applicable for data type 'structure'.

3. Introduction to the SDXF functions

3.1 General remarks

The functionality of the SDXF concept is not bounded to any

programming language, but of course the functions themselves must be

coded in a particular language. I discuss these functions in C and

C++, because in the meanwhile these languages are available on almost

all platforms.

All these functions for reading and writing SDXF chunks uses only one

parameter, a parameter structure. In C++ this parameter structure is

part of the "SDXF class" and the SDXF functions are methods of this

class.

An exact description of the interface is given in chapter 8.

3.2 Writing a SDXF buffer

For to write SDXF chunks, there are following functions:

init -- initialize the parameter structure

create -- create a new chunk

leave -- "close" a structured chunk

3.3 Reading a SDXF buffer

For to read SDXF chunks, there are following functions:

init -- initialize the parameter structure

enter -- "go into" a structured chunk

next -- "go to" the next chunk inside a structured chunk

extract -- extract the content of an elementary chunk into

user's data area

leave -- "go out" off a structured chunk

3.4 Example:

3.4.1 Writing:

For demonstration we use a reduced (outlined) C++ Form of these

functions with polymorph definitions:

void create (short chunkID); // opens a new structure,

void create (short chunkID, char *string);

// creates a new chunk with dataType character, etc.)

The sequence:

SDXF x(new); // create the SDXF object "x" for a new chunk

// includes the "init"

x.create (3301); // opens a new structure

x.create (3302, "first chunk");

x.create (3303, "second chunk");

x.create (3304); // opens a new structure

x.create (3305, "chunk in a structure");

x.create (3306, "next chunk in a structure");

x.leave (); // closes the inner structure

x.create (3307, "third chunk");

x.leave (); // closes the outer structure

creates a chunk which we can show graphically like:

3301

+--- 3302 = "first chunk"

+--- 3303 = "second chunk"

+--- 3304

+--- 3305 = "chunk in a structure"

+--- 3306 = "next chunk in a structure"

+--- 3307 = "last chunk"

3.4.2 Reading

A typically access to a structured SDXF chunk is a selection inside

a loop:

SDXF x(old); // defines a SDXF object "x" for an old chunk

x.enter (); // enters the structure

while (x.rc == 0) // 0 == ok, rc will set by the SDXF functions

{

switch (x.chunkID)

{

case 3302:

x.extract (data1, maxLength1);

// extr. 1st chunk into data1

break;

case 3303:

x.extract (data2, maxLength2);

// extr. 2nd chunk into data2

break;

case 3304: // we know this is a structure

x.enter (); // enters the inner structure

while (x.rc == 0) // inner loop

{

switch (x.chunkID)

{

case 3305:

x.extract (data3, maxLength3);

// extr. the chunk inside struct.

break;

case 3306:

x.extract (data4, maxLength4);

// extr. 2nd chunk inside struct.

break;

}

x.next (); // returns x.rc == 1 at end of structure

} // end-while

break;

case 3307:

x.extract (data5, maxLength5);

// extract last chunk into data

break;

// default: none - ignore unknown chunks !!!

} // end-switch

x.next (); // returns x.rc = 1 at end of structure

} // end-while

4. Platform independence

The very most of the computer platforms today have a 8-Bits-in-a-Byte

architecture, which enables data exchange between these platforms.

But there are two significant points in which platforms may be

different:

a) The representation of binary numerical (the short and long int and

floats).

b) The representation of characters (ASCII/ANSI vs. EBCDIC)

Point (a) is the phenomenon of "byte swapping": How is a short int

value 259 = 0x0103 = X'0103' be stored at address 4402?

The two flavours are:

4402 4403

01 03 the big-endian, and

03 01 the little-endian.

Point (b) is represented by a table of the assignment of the 256

possible values of a Byte to printable or control characters. (In

ASCII the letter "A" is assigned to value (or position) 0x41 = 65, in

EBCDIC it is 0xC1 = 193.)

The solution of these problems is to normalize the data:

We fix:

(a) The internal representation of binary numerals are 2-complements

in big-endian order.

(b) The internal representation of characters is ISO 8859-1 (also

known as Latin 1).

The fixing of point (b) should be regarded as a first strike. In

some environment 8859-1 seems not to be the best choice, in a greek

or russian environment 8859-5 or 8859-7 are appropriate.

Nevertheless, in a specific group (or world) of applications, that is

to say all the applications which wants to interchange data with a

defined protocol (via networking or diskette or something else), this

internal character table must be unique.

So a possibility to define a translation table (and his inversion)

should be given.

Important: You construct a SDXF chunk not for a specific addressee,

but you adapt your data into a normalized format (or network format).

This adaption is not done by the programmer, it will be done by the

create and extract function. An administrator has take care of

defining the correct translation tables.

5. Compression

As stated in 2.5 there is a flag bit which declares that the

following data (elementary or structured) are compressed. This data

is not further interpretable until it is decompressed. Compression

is transparently done by the SDXF functions: "create" does the

compression for elementary chunks, "leave" for structured chunks,

"extract" does the decompression for elementary chunks, "enter" for

structured chunks.

Transparently means that the programmer has only to tell the SDXF

functions that he want compress the following chunk(s).

For choosing between different compression methods and for

controlling the decompressed (original) length, there is an

additional definition:

After the chunk header for a compressed chunk, a compression header

is following:

+-----------------------+---------------+---------------->

chunk header compr. header compressed data

+---+---+---+---+---+---+---+---+---+---+---------------->

chunkIDflg length md orglength

+---+---+---+---+---+---+---+---+---+---+---------------->

- 'orglength' is the original (decompressed) length of the data.

- 'md' is the "compression method": Two methods are described here:

# method 01 for a simple (fast but not very effective)

"Run Length 1" or "Byte Run 1" algorithm. (More then two

consecutive identical characters are replaced by the number of

these characters and the character itself.)

more precisely:

The compressed data consists of several sections of various

length. Every section starts with a "counter" byte, a signed

"tiny" (8 bit) integer, which contains a length information.

If this byte contains the value "n",

with n >= 0 (and n <128), the next n+1 bytes will be taken

unchanged;

with n < 0 (and n > -128), the next byte will be replicated

-n+1 times;

n = -128 will be ignored.

Appending blanks will be cutted in general. If these are

necessary, they can be reconstructed while "extract"ing with

the parameter field "filler" (see 8.2.1) set to space

character.

# method 02 for the wonderful "deflate" algorithm which comes

from the "zip"-people.

The authors are:

Jean-loup Gailly (deflate routine),

Mark Adler (inflate routine), and others.

The deflate format is described in [DEFLATE].

The values for the compression method number are maintained by

IANA, see chap. 12.1.

6. Encryption

As stated in 2.5 there is a flag bit which declares that the

following data (elementary or structured) is encrypted. This data is

not interpretable until it is decrypted. En/Decryption is

transparently done by the SDXF functions, "create" does the

encryption for elementary chunks, "leave" for structured chunks,

"extract" does the decryption for elementary chunks, "enter" for

structured chunks. (Yes it sounds very similar to chapter 5.) More

then one encryption method for a given range of applications is not

very reasonable. Some encryption algorithms work with block ciphering

algorithms. That means that the length of the data to encrypt must be

rounded up to the next multiple of this block length. This blocksize

(zero means non-blocking) is reported by the encryption interface

routine (addressed by the option field *encryptProc, see chapter 8.5)

with mode=3. If blocking is used, at least one byte is added, the

last byte of the lengthening data contains the number of added bytes

minus one. With this the decryption interface routine can calculate

the real data length.

If an application (or network connect handshaking protocol) needs to

negotiate an encryption method it should be used a method number

maintained by IANA, see chap. 12.2.

Even the en/decryption is done transparently, an encryption key

(password) must be given to the SDXF functions. Encryption is done

after translating character data into, decryption is done before

translation from the internal ("network-") format.

If both, encryption and compression are applied on the same chunk,

compression is done first - compression on good encrypted data (same

strings appears as different after encryption) tends to zero

compression rates.

7. Arrays

An array is a sequence of chunks with identical chunk-ID, length and

data type.

At first a hint: in principle a special definition in SDXF for such

an array is not really necessary:

It is not forbidden that there are more than one chunk with equal

chunk-ID within the same structured chunk.

Therefore with a sequence of SDX_next / SDX_extract calls one can

fill the destination array step by step.

If there are many occurrences of chunks with the same chunk-ID (and a

comparative small length), the overhead of the chunk-packages may be

significant.

Therefore the array flag is introduced. An array chunk has only one

chunk header for the complete sequence of elementary chunks. After

the chunk header for an array chunk, an array header is following:

This is a short integer (big endian!) which contains the number of

the array elements (CT). Every element has a fixed length (EL), so

the chunklength (CL) is CL = EL * CT + 2.

The data elements follows immediately after the array header.

The complete array will be constructed by SDX_create, the complete

array will be read by SDX_extract.

The parameter fields (see 8.2.1) 'dataLength' and 'count' are used

for the SDXF functions 'extract' and 'create':

Field 'dataLength' is the common length of the array elements,

'count' is the actual dimension of the array for 'create' (input).

For the 'extract' function 'count' acts both as an input and output

parameter:

Input : the maximum dimension

output: the actual array dimension.

(If output count is greater than input count, the 'data cutted'

warning will be responded and the destination array is filled up to

the maximum dimension.)

8. Description of the SDXF functions

8.1 Introduction

Following the principles of Object Oriented Programming, not only the

description of the data is necessary, but also the functions which

manipulate data - the "methods".

For the programmer knowing the methods is more important than knowing

the data structure, the methods has to know the exact specifications

of the data and guarantees the consistence of the data while creating

them.

A SDXF object is an instance of a parameter structure which acts as a

programming interface. Especially it points to an actual SDXF data

chunk, and, while processing on this data, there is a pointer to the

actual inner chunk which will be the focus for the next operation.

The benefit of an exact interface description is the same as using

for example the standard C library functions: By using standard

interfaces your code remains platform independent.

8.2 Basic definitions

8.2.1 The SDXF Parameter structure

All SDXF access functions need only one parameter, a pointer to the

SDXF parameter structure:

First 3 prerequisite definitions:

typedef short int ChunkID;

typedef unsigned char Byte;

typedef struct Chunk

{

ChunkID chunkID;

Byte flags;

char length [3];

Byte data;

} Chunk;

And now the parameter structure:

typedef struct

{

ChunkID chunkID; // name (ID) of Chunk

Byte *container; // pointer to the whole Chunk

long bufferSize; // size of container

Chunk *currChunk; // pointer to actual Chunk

long dataLength; // length of data in Chunk

long maxLength; // max. length of Chunk for SDX_extract

long remainingSize; // rem. size in cont. after SDX_create

long value; // for data type numeric

double fvalue; // for data type float

char *function; // name of the executed SDXF function

Byte *data; // pointer to Data

Byte *cryptkey; // pointer to Crypt Key

short count; // (max.) number of elements in an array

short dataType; // Chunk data type / init open type

short ec; // extended return-code

short rc; // return-code

short level; // level of hierarchy

char filler; // filler char for SDX_extract

Byte encrypt; // Indication if data to encrypt (0 / 1)

Byte compression; // compression method

// (00=none, 01=RL1, 02=zip/deflate)

} SDX_obj, *SDX_handle;

Only the "public" fields of the parameter structure which acts as

input and output for the SDXF functions is described here. A given

implementation may add some "private" fields to this structure.

8.2.2 Basic Functions

All these functions works with a SDX_handle as the only formal

parameter. Every function returns as output ec and rc as a report of

success. For the values for ec, rc and dataType see chap. 8.4.

1. SDX_init : Initialize the parameter structure.

input : container, dataType, bufferSize (for dataType =

SDX_NEW only)

output: currChunk, dataLength (for dataType = SDX_OLD only),

ec, rc,

the other fields of the parameter structure will be

initialized.

2. SDX_enter : Enter a structured chunk.

You can access the first chunk inside this structured chunk.

input : none

output: currChunk, chunkID, dataLength, level, dataType,

ec, rc

3. SDX_leave : Leave the actual entered structured chunk.

input : none

output: currChunk, chunkID, dataLength, level, dataType,

ec, rc

4. SDX_next : Go to the next chunk inside a structured chunk.

input : none

output: currChunk, chunkID, dataLength, dataType, count, ec, rc

At the end of a structured chunk SDX_next returns rc =

SDX_RC_failed and ec = SDX_EC_eoc (end of chunk)

The actual structured chunk is SDX_leave'd automatically.

5. SDX_extract : Extract data of the actual chunk.

(If actual chunk is structured, only a copy is done, elsewhere

the data is converted to host format.)

input / output depends on the dataType:

if dataType is structured, binary or char:

input : data, maxLength, count, filler

output: dataLength, count, ec, rc

if dataType is numeric (float resp.):

input : none

output: value (fvalue resp.), ec, rc

6. SDX_select : Go to the (next) chunk with a given chunkID.

input : chunkID

output: currChunk, dataLength, dataType, ec, rc

7. SDX_create : Creating a new chunk (at the end of the actual

structured chunk).

input : chunkID, dataLength, data, (f)value, dataType,

compression, encrypt, count

update: remainingSize, level

output: currChunk, dataLength, ec, rc

8. SDX_append : Append a complete chunk at the end of the actual

structured chunk).

input : data, maxLength, currChunk

update: remainingSize, level

output: chunkID, chunkLength, maxLength, dataType, ec, rc

8.3 Definitions for C++

This is the specification of the SDXF class in C++: (The type 'Byte'

is defined as "unsigned char" for bitstrings, opposed to "signed

char" for character strings)

class C_SDXF

{

public:

// constructors and destructor:

C_SDXF (); // dummy

C_SDXF (Byte *cont); // old container

C_SDXF (Byte *cont, long size); // new container

C_SDXF (long size); // new container

~C_SDXF ();

// methods:

void init (void); // old container

void init (Byte *cont); // old container

void init (Byte *cont, long size); // new container

void init (long size); // new container

void enter (void);

void leave (void);

void next (void);

long extract (Byte *data, long length); // chars, bits

long extract (void); // numeric data

void create (ChunkID); // structured

void create (ChunkID, long value); // numeric

void create (ChunkID, double fvalue); // float

void create (ChunkID, Byte *data, long length);// binary

void create (ChunkID, char *data); // chars

void set_compression (Byte compression_method);

void set_encryption (Byte *encryption_key);

// interface:

ChunkID id; // see 8.4.1

short dataType; // see 8.4.2

long length; // length of data or chunk

long value;

double fvalue;

short rc; // the raw return code see 8.4.3

short ec; // the extended return code see 8.4.4

protected:

// implementation dependent ...

};

8.4 Common Definitions:

8.4.1 Definition of ChunkID:

typedef short ChunkID;

8.4.2 Values for dataType:

SDX_DT_inconsistent = 0

SDX_DT_structured = 1

SDX_DT_binary = 2

SDX_DT_numeric = 3

SDX_DT_char = 4

SDX_DT_float = 5

SDX_DT_UTF8 = 6

data types for SDX_init:

SDX_OLD = 1

SDX_NEW = 2

8.4.3 Values for rc:

SDX_RC_ok = 0

SDX_RC_failed = 1

SDX_RC_warning = 1

SDX_RC_illegalOperation = 2

SDX_RC_dataError = 3

SDX_RC_parameterError = 4

SDX_RC_programError = 5

SDX_RC_noMemory = 6

8.4.4 Values for ec:

SDX_EC_ok = 0

SDX_EC_eoc = 1 // end of chunk

SDX_EC_notFound = 2

SDX_EC_dataCutted = 3

SDX_EC_overflow = 4

SDX_EC_wrongInitType = 5

SDX_EC_comprerr = 6 // compression error

SDX_EC_forbidden = 7

SDX_EC_unknown = 8

SDX_EC_levelOvflw = 9

SDX_EC_paramMissing = 10

SDX_EC_magicError = 11

SDX_EC_not_consistent = 12

SDX_EC_wrongDataType = 13

SDX_EC_noMemory = 14

SDX_EC_error = 99 // rc is sufficiently

8.5 Special functions

Besides the basic definitions there is a global function

(SDX_getOptions) which returns a pointer to a global table of

options.

With the help of these options you can adapt the behaviour of SDXF.

Especially you can define an alternative pair of translation tables

or an alternative function which reads these tables from an external

resource (p.e. from disk).

Within this table of options there is also a pointer to the function

which is used for encryption / decryption: You can install your own

encryption algorithm by setting this pointer.

The options pointer is received by:

SDX_TOptions *opt = SDX_getOptions ();

With:

typedef struct

{

Byte *toHost; // Trans tab net -> host

Byte *toNet; // Trans tab host -> net

int maxlevel; // highest possible level

int translation; // translation net <-> host

// is in effect=1 or not=0

TEncryptProc *encryptProc; // alternate encryption routine

TGetTablesProc *getTablesProc; // alternate routine defining

// translation Tables

TcvtUTF8Proc *convertUTF8; // routine to convert to/from UTF-8

} SDX_TOptions;

typedef long TencryptProc (

int mode, // 1= to encrypt, 2= to decrypt, 3= encrypted length

Byte *buffer, // data to en/decrypt

long len, // len: length of buffer

char *passw); // Password

// returns length of en/de-crypted data

// (parameter buffer and passw are ignored for mode=3)

// returns blocksize for mode=3 and len=0.

// blocksize is zero for non-blocking algorithms

typedef int TGetTablesProc (Byte **toNet, Byte **toHost);

// toNet, toHost: pointer to output params. Both params

// points to translation tables of 256 Bytes.

// returns success: 1 = ok, 0 = error.

typedef int TcvtUTF8Proc

( int mode, // 1 = to UTF-8, 2 = from UTF-8

Byte *target, int *targetlength, // output

Byte *source, int sourcelength); // input

// targetlength contains maximal size as input param.

// returns success: 1 = ok, 0 = no conversion

9. 'Support' of UTF-8.

Many systems supports [UTF-8] as a character format for transferred

data. The benefit is that no fixing of a specific character set for

an application is needed because the set of 'all' characters is used,

represented by the 'Universal Character Set' UCS-2 [UCS], a double

byte coding for characters.

SDXF does not really deal with UTF-8 by itself, there are many

possibilities to interprete an UTF-8 sequence: The application may:

- reconstruct the UCS-2 sequence,

- accepts only the pure ASCII character and maps non-ASCII to a

special 'non-printable' character.

- target is pure ASCII, non-ASCII is replaced in a senseful manner

(French accented vowels replaced by vowels without accents, etc.).

- target is a specific ANSI character set, the non-ASCII chars are

mapped as possible, other replaced to a 'non-printable'.

- etc.

But SDXF offers an interface for the 'extract' and 'create'

functions:

A function pointer may be specified in the options table to maintain

this possibility (see 8.5). Default for this pointer is NULL: No

further conversions are done by SDXF, the data are copied 'as is', it

is treated as a bit string as for data type 'binary'.

If this function is specified, it is used by the 'create' function

with the 'toUTF8' mode, and by the 'extract' function with the '

fromUTF8' mode. The invoking of these functions is done by SDXF

transparently.

If the function returns zero (no conversion) SDXF copies the data

without conversion.

10. Security Considerations

Any corruption of data in the chunk headers denounce the complete

SDXF structure.

Any corruption of data in a encrypted or compressed SDXF structure

makes this chunk unusable. An integrity check after decryption or

decompression should be done by the "enter" function.

While using TCP/IP (more precisely: IP) as a transmission medium we

can trust on his CRC check on the transport layer.

11. Some general hints

1. A consistent construction of a SDXF structure is done if every

"create" to a structured chunk is closed by a paired "leave".

While a structured chunk is under construction, his data type is

set to zero - that means: this chunk is inconsistent. The

SDX_leave function sets the datatype to "structured".

2. While creating an elementary chunk a platform dependent

transformation to a platform independent format of the data is

performed - at the end of construction the content of the buffer

is ready to transport to another site, without any further

translation.

3. As you see no data definition in your programming language is

needed for to construct a specific SDXF structure. The data is

created dynamically by function calls.

4. With SDXF as a base you can define protocols for client / server

applications. These protocols may be extended in downward

compatibility manner by following two rules:

Rule 1: Ignore unknown chunkIDs.

Rule 2: The sequence of chunks should not be significant.

12. IANA Considerations

The compression and encryption algorithms for SDXF is not fixed, SDXF

is open for various algorithms. Therefore an agreement is necessary

to interprete the compression and encryption algorithm method

numbers. (Encryption methods are not a semantic part of SDXF, but

may be used for a connection protocol to negotiate the encryption

method to use.)

Following two items are registered by IANA:

12.1 COMPRESSION METHODS FOR SDXF

The compressed SDXF chunk starts with a "compression header". This

header contains the compression method as an unsigned 1-Byte integer

(1-255). These numbers are assigned by IANA and listed here:

compression

method Description Hints

--------- ------------------------------- -------------

01 RUN-LENGTH algorithm see chap. 5

02 DEFLATE (ZIP) see [DEFLATE]

03-239 IANA to assign

240-255 private or application specific

12.2 ENCRYPTION METHODS FOR SDXF

An unique encryption method is fixed or negotiated by handshaking.

For the latter one a number for each encryption method is necessary.

These numbers are unsigned 1-Byte integers (1-255). These numbers

are assigned by IANA and listed here:

encryption

method Description

--------- ------------------------------

01-239 IANA to assign

240-255 private or application specific

12.3 Hints for assigning a number:

Developers which want to register a compression or encrypt method for

SDXF should contact IANA for a method number. The ASSIGNED NUMBERS

document should be referred to for a current list of METHOD numbers

and their corresponding protocols, see [IANA]. The new method SHOULD

be a standard published as a RFCor by a established standardization

organization (as OSI).

13. Discussion

There are already some standards for Internet data exchanging, IETF

prefers ASN.1 and XML therefore. So the reasons for establish a new

data format should be discussed.

13.1 SDXF vs. ASN.1

The demand of ASN.1 (see [ASN.1]) is to serve program language

independent means to define data structures. The real data format

which is used to send the data is not defined by ASN.1 but usually

BER or PER (or some derivates of them like CER and DER) are used in

this context, see [BER] and [PER].

The idea behind ASN.1 is: On every platform on which a given

application is to develop descriptions of the used data structures

are available in ASN.1 notation. Out off these notations the real

language dependent definitions are generated with the help of an

ASN.1-compiler.

This compiler generates also transform functions for these data

structures for to pack and unpack to and from the BER (or other)

format.

A direct comparison between ASN.1 and SDXF is somehow inappropriate:

The data format of SDXF is related rather to BER (and relatives).

The use of ASN.1 to define data structures is no contradiction to

SDXF, but: SDXF does not require a complete data structure to build

the message to send, nor a complete data structure will be generated

out off the received message.

The main difference lies in the concept of building and

interpretation of the message, I want to name it the "static" and

"dynamic" concept:

o ASN.1 uses a "static" approach: The whole data structure must

exists before the message can be created.

o SDXF constructs and interpretes the message in a "dynamic" way,

the message will be packed and unpacked step by step by SDXF

functions.

The use of static structures may be appropriate for a series of

applications, but for complex tasks it is often impossible to define

the message as a whole. As an example try to define an ASN.1

description for a complex structured text document which is presented

in XML: There are sections and paragraphs and text elements which

may recursively consist of sections with specific text attributes.

13.2 SDXF vs. XML

On the one hand SDXF and XML are similar as they can handle any

recursive complex data stream. The main difference is the kind of

data which are to be maintained:

o XML works with pure text data (though it should be noted that the

character representation is not standardized by XML). And: a XML

document with all his tags is readable by human. Binary data as

graphic is not included directly but may be referenced by an

external link as in Html.

In XML there is no strong separation between informational and

control data, escape characters (like "<" and "&") and the

<![CDATA[...]]> construction are used to distinguish between these

two types of data.

o SDXF maintains machine-readable data, it is not designed to be

readable by human nor to edit SDXF data with a text editor (even

more if compression and encryption is used). With the help of the

SDXF functions you have a quick and easy access to every data

element. The standard parser for a SDXF data structure follows

always a simple template, the "while - switch -case ID -

enter/extract" pattern as outlined in chap. 3.4.2.

Because of the complete different philosophy behind XML and SDXF (and

even ASN.1) a direct comparison may not be very senseful, as XML has

its own right to exist next to ASN.1 (and even SDXF).

Nevertheless there is a chance to convert a XML data stream into a

SDXF structure: As a first strike, every XML tag becomes a SDXF

chunk ID. An elementary sequence <tag>pure text</tag> can be

transformed into an elementary (non-structured) chunk with data type

"character". Tags with attributes and sequences with nested tags are

transformed into structured chunks. Because XML allows a tag

sequence everywhere in a text stream, an artificially "elementary

text" tag must be introduced:

If <t> is the tag for text elements, the sequence:

<t>this is a text <attr value='bold'>with</attr> attributes</t>

is to be "in thought" replaced by:

<t><et>this is a text </et><attr value='bold'><et>with</et></attr>

<et> attributes</et></t>

(With "et" as the "elementary text" tag)

This results in following SDXF structure:

ID_t

+-- ID_et = " this is a text "

+-- ID_attr

+-- ID_value = "bold"

+-- ID_et = "with"

+-- ID_et = " attributes"

ID_t and ID_et may be represented by the same chunk ID, only

distinguished by the data type ("structured" for <t> and "character"

for <et>)

Binary data as pictures can be directly imbedded into a SDXF

structure instead referencing them as an external link like in HTML.

14. Author's Address

Max Wildgrube

Schlossstrasse 120

60486 Frankfurt

Germany

EMail: max@wildgrube.com

15. Acknowledgements

I would like to thank Michael J. Slifcak (mslifcak@iss.net) for the

supporting discussions.

16. References

[ASN.1] Information processing systems - Open Systems

Interconnection, "Specification of Abstract Syntax Notation

One (ASN.1)", International Organization for

Standardization, International Standard 8824, December

1987.

[BER] Information Processing Systems - Open Systems

Interconnection - "Specification of Basic Encoding Rules

for Abstract Notation One (ASN.1)", International

Organization for Standardization, International Standard

8825-1, December 1987.

[DEFLATE] Deutsch, P., "DEFLATE Compressed Data Format Specification

version 1.3", RFC1951, May 1996.

[IANA] Internet Assigned Numbers Authority,

http://www.iana.org/numbers.htm

[PER] Information Processing Systems - Open Systems

Interconnection -"Specification of Packed Encoding Rules

for Abstract Syntax Notation One (ASN.1)", International

Organization for Standardization, International Standard

8825-2.

[UCS] ISO/IEC 10646-1:1993. International Standard -- Information

technology -- Universal Multiple-Octet Coded Character Set

(UCS)

[UTF8] Yergeau, F., "UTF-8, a transformation format of ISO 10646",

RFC2279, January 1998.

17. Full Copyright Statement

Copyright (C) The Internet Society (2001). All Rights Reserved.

This document and translations of it may be copied and furnished to

others, and derivative works that comment on or otherwise explain it

or assist in its implementation may be prepared, copied, published

and distributed, in whole or in part, without restriction of any

kind, provided that the above copyright notice and this paragraph are

included on all such copies and derivative works. However, this

document itself may not be modified in any way, such as by removing

the copyright notice or references to the Internet Society or other

Internet organizations, except as needed for the purpose of

developing Internet standards in which case the procedures for

copyrights defined in the Internet Standards process must be

followed, or as required to translate it into languages other than

English.

The limited permissions granted above are perpetual and will not be

revoked by the Internet Society or its successors or assigns.

This document and the information contained herein is provided on an

"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING

TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING

BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION

HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF

MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Acknowledgement

Funding for the RFCEditor function is currently provided by the

Internet Society.

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有