Abstract
in spite of the theoretical error detecting capability of its CRC, the actual degree of data integrity provided by HDLC is quite low.The paper gives a quantitative assessment of HDLC's deficiencies and of their reasons, paying particular attention to actual applications of the HDLC family of standards.Finally, we look at some strategies that have been suggested to allow the use of HDLC in the most demanding applications.
- {Aglv92} V.K. Agarwal, A. Ivanov, "Computing the Probability of Undetected Error for Shortened Cyclic Codes," IEEE Trans. on Communicatios, Vol. 40, No. 3, Mar. 1992.Google Scholar
- {BBC87} S. Benedetto, E. Biglieri, V. Castellani, "Digital Transmission Theory," Prentice-Hall, 1987. Google ScholarDigital Library
- {Carl80} D.E. Carlson, "Bit-Oriented Data Link Control Procedures," IEEE Trans. on Communications, Vol. COM-28, No. 4, Apr. 1980.Google Scholar
- {CCIT85} CCITT Recommendation X.25, "Interface between data terminal equipment (DIE) and data circuit-terminating equipment (DCE) for terminals operating in the packet mode and connected to public data networks by dedicated circuit," Red Book, Geneva, 1985.Google Scholar
- {CCI88a} CCITT Recommendation Q.920 (I.440), "ISDN user-network interface data link layer - General aspects," Blue Book, Vol. VI(III), Geneva, 1988.Google Scholar
- {CCI88b} CCITT Recommendation Q.921 (I.441), "ISDN user-network interface data link layer specification," Blue Book, Vol. VI(III), Geneva, 1988.Google Scholar
- {ChTr93} M. Chiani, V. Tralli, "Analysis of HDLC error detecting properties, "DEIS University of Bologna Tech. Rep., Jul 1992.Google Scholar
- {Cole} G.B. Cole, "The Use of Enhanced HDLC for Proway," Fisher Controls Ltd., Leicester, England, working paper IEC SC65A WG06 (Cole 3).Google Scholar
- {FiSa92} D. Fiorini, C. Salati, "An assessment of data integrity in HDLC," Alcatel Telettra Tech. Rep., Jul 1992.Google Scholar
- {Flet82} J.G. Fletcher, "An Arithmetic Checksum for Serial Transmission," IEEE Trans. on Communications, Vol. COM-30, No. 1, Jan 1982.Google Scholar
- {Foxb88} The Foxboro Company, "Foxboro Fieldbus Proposal," to ISA SP-50, Draft 1.12, Feb 1988.Google Scholar
- {Fuji85} T. Fujiwara, et Al., "On the Undetected Error Probability for Shortened Hamming Codes," IEEE Trans. on Communications, Vol. COM-33, No. 6, Jun 1985.Google Scholar
- {Funk78} G. Funk, "Insufficiencies of HDLC-Communication in Process Control Systems," Brown, Bovery & Cie., Baden, working paper IEC TC5, IEC SC65A WG96, Oct 1978.Google Scholar
- {Funk82} G. Funk, "Message Error Detecting Properties of HDLC Protocols, "IEEE Trans. on Conununications, Vol. COM-30, No. 1, Jan 1982.Google Scholar
- {HBL75} J.L. Hammond, J.E. Brown, S.S. Liu, " Development of a Transmission Error Model and an Error Control Model," Rome Air Development Center, RADC-TR-75-138, May 1975.Google Scholar
- {IBM79} IBM, "Synchronous Data Link Control - General Information," Mar 1979.Google Scholar
- {IEC89} IEC 870-5-1, "Telecontrol Equipment and Systems - Part 5.1 : Transmission Frame Format," 1989.Google Scholar
- {Inte84} Intel, "Distributed Control Modules Databook," Intel Corp., Santa Clara, Cal., 1984.Google Scholar
- {ISO86} ISO IS-8073, "Information Processing Systems - Open Systems Interconnection - Connection Oriented Transport Protocol Specification," Jul 1986.Google Scholar
- {ISO89a} ISO IS-3309, "Information Processing Systems - Data Communication - High-Level Data Link Control Procedures - Frame Structure, and ite Addenda", 1989.Google Scholar
- {ISO89b} ISO IS-4335, "Information Processing Systems - Data Communication - High-Level Data Link Control Procedures - Elements of Procedures and its Addenda," 1989.Google Scholar
- {ISO90} ISO IS-7809, "Information Processing Systems - Data Communication - High-Level Data Link Control Procedures - Classes of Procedures," 1990.Google Scholar
- {IST92} P. Iaccarino, C. Salati, G. Torresi, "Transmissions and Communications on Distribution Line Carrier Systems to Support Automation Applications," 2nd Int. Congr. "Energy, Environment and Technological Innovation," Roma, Italy, Oct. 1992.Google Scholar
- {MiSa88} G. Micheletti, C. Salati, "A Low-Cost Distributed Architecture for Telecommunication Applications," IEFF Micro, Vol. 7, No. 5, Oct 1988.Google Scholar
- {Naka88} A. Nakassis, "Fletcher's Error Detection Algorithm: how to implement it efficiently and how to avoid the most common pitfalls," Computer Communication Review, Vol. 18, No. 5, Oct. 1988. Google ScholarDigital Library
- {Perk89} D. Perkins, "The Point-to-Point Protocol: A Proposal for Multi-Protocol Transmission of Datagrams Over Point-to-Point Links, " RFC 1134, Nov 1989.Google Scholar
- {SeRi80} J. Selga, J. Rivera, "An analysis of the HDLC Protocol," working paper CIGRE SC35-WG01 TELECONTROL, Sep 1980.Google Scholar
Index Terms
- Can we trust in HDLC?
Recommendations
What Security Can We Achieve Within 4 Rounds?
AbstractKatz and Ostrovsky (Crypto 2004) proved that five rounds are necessary for stand-alone general black-box constructions of secure two-party protocols and at least four rounds are necessary if only one party needs to receive the output. Recently, ...
What Security Can We Achieve Within 4 Rounds?
Proceedings of the 10th International Conference on Security and Cryptography for Networks - Volume 9841Katz and Ostrovsky Crypto 2004 proved that five rounds are necessary for stand-alone general black-box constructions of secure two-party protocols and at least four rounds are necessary if only one party needs to receive the output. Recently, Ostrovsky, ...
Comments