End user data stream syntax
First Claim
1. In a computer network having a plurality of nodes with one or more host computers controlling resources associated with a node, an apparatus for generating an improved variable length message for carrying either user data or control information between network addressable units connected to said nodes comprising:
- means at each network addressable unit for generating a variable length message including a first field of M data bytes, and a remainder second field concatenated to the first field, said first field having a data value equal to the summation of the number of bytes in said first and second fields which lies within a range of data for identifying said second field as user data, and having a data value outside of said range for identifying said second field as containing control information.
0 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a communication transport message format for carrying control information, relevant only to a transport system and end user data. The end user data is prefixed by a length field. The length field is set to a value representing the number of bytes of user data plus the size of the length field. A bit in the length field is used as a "continuation" or more-to-come indicator. Length field values that are less than the number of bytes of the length field are used to prefix control information.
110 Citations
16 Claims
-
1. In a computer network having a plurality of nodes with one or more host computers controlling resources associated with a node, an apparatus for generating an improved variable length message for carrying either user data or control information between network addressable units connected to said nodes comprising:
means at each network addressable unit for generating a variable length message including a first field of M data bytes, and a remainder second field concatenated to the first field, said first field having a data value equal to the summation of the number of bytes in said first and second fields which lies within a range of data for identifying said second field as user data, and having a data value outside of said range for identifying said second field as containing control information. - View Dependent Claims (2, 3, 9)
-
4. In a computer network having a plurality of nodes with one or more host computers controlling resources associated with a node, a method for transporting information between network addressable units connected to said nodes comprising the steps of:
-
(a) transmitting from one of said addressable units a variable length message including a first field of a known number of data bytes M, and a second field concatenated to the first field containing user data or control information data, said first field of data having a first or second value for identifying whether said second field comprises user data or control information data, said first value lying within a range of data and containing the summation of the number of bytes in said first and the number of bytes in said second field, and said second value lying outside of said range of data; (b) receiving the message at another of the network addressable units; (c) examining the message to determine whether said first or second value is present in said first field; and (d) identifying the information immediately following the first field as user data if said first value is present, and identifying said information following said first field as control information data if said second value is present. - View Dependent Claims (5, 6, 7)
-
-
8. In a computer network having a plurality of nodes with one or more host computers controlling the resources associated with a node, an apparatus for generating an improved variable length message for carrying user data and control information between network addressable units connected to said nodes comprising:
means at each network addressable unit for generating a variable length message including a header, a first field of M data bytes having a value A equal to the summation of the number of bytes in said first field and a following second field, said value lying within a predetermined range of data identifying said second field concatenated to the first field as user data, a third field having a value outside of said range identifying a following fourth field of data concatenated with said third field as containing control information.
-
10. In a computer network having a plurality of nodes with one or more host computers controlling the resources associated with a node, a method for transporting user data and control information between network addressable units connected to said nodes comprising the steps of:
-
(a) transmitting from one of said addressable units a variable length message including a first field of a known number of data bytes M, followed by a second field concatenated to the first field, a third field following said second field and a fourth field concatenated with said third field, said first and third fields including data having either a first value which contains the summation of the number of bytes in said first and a respective concatenated subsequent field within a predetermined range identifying an immediately following field as user data, or a second value outside of said range to identify a following field as containing control information data; (b) receiving the message at another of the network addressable units; (c) examining the message to determine whether said first or second value is present in said first and third fields; and (d) indentifying the information immediately following the first and third fields as user data if said first value is present, and identifying said information following said first and third fields as control information data if said second value is present. - View Dependent Claims (11, 12)
-
-
13. In a computer network having a plurality of nodes with one or more host computers controlling the resources associated with a node;
- a method for transporting user data and control information between network addressable units comprising the steps of;
(a) transmitting from one of said network addressable units a variable length message, said message if containing user data only includes a first field M bytes long having a value which is the summation M+k of the number of bytes M in said first field and a number of user data bytes k, and which lies within a permissible range of values, followed by a k byte second field concatenated to the first field and carrying the user data; if containing control information only, a value falling outside the range of values which includes said summation M+k in the first field followed by control information in the second field; if containing both user data and control information, a value of said summation M+k is coded in the first field, followed by k bytes of user data in the second field, followed by a third field with a value falling outside the range of values which includes M+k followed by a fourth field containing control information; (b) receiving the variable length message at another network addressable unit; (c) decoding and examining the first field of M bytes, if the value is this field falls outside of a first range of values which includes said summation M+k, identify the immediately following information field as control and terminate receiving this message;
if the value in the first field falls within the range of values including said summation M+k, identify the following information field as user data and determine the value k from the length of said user data;
thereafter,examine and decode the third field having a length M which immediately follows the k byte user data field to determine if the value encoded falls outside of the range of values which includes said summation M+k, and, if so, receiving the information in the fourth field immediately following said third field as control information and terminate receiving this message. - View Dependent Claims (14, 15, 16)
- a method for transporting user data and control information between network addressable units comprising the steps of;
Specification