Utilización de la Recomendación X.25 para proporcionar el servicio de red con conexión OSI para aplicaciones del UIT-T |
|
La Recomendación X.25 se utiliza para muchas aplicaciones diferentes. En esta Recomendación X.223 se muestra cómo utilizar la Recomendación X.25 para una conexión OSI, especificando la correspondencia de los elementos pertinentes de X.25 con el servicio de red en modo conexión OSI definido en la Recomendación X.213, y viceversa. En esta versión revisada de la Recomendación X.223 se corrigen varios errores de poca importancia y se obtiene una capacidad de interfuncionamiento completa con la correspondiente Norma ISO/CEI 8878. |
|
Citation: |
https://handle.itu.int/11.1002/1000/2851 |
Series title: |
X series: Data networks, open system communications and security X.200-X.299: Open Systems Interconnection X.220-X.229: Connection-mode protocol specifications |
Approval date: |
1993-11-16 |
Identical standard: | ISO/IEC 8878:1992 (Twinned) |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
|
|
|
Title |
Approved on |
Download |
OSI Implementers’ Guide - Version 1.1
|
2006-12-16
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
ISDN field trial guidelines
|
1991
|
here
|
|