rfc8681.txt | rfc8681.txt | |||
---|---|---|---|---|
skipping to change at line 74 ¶ | skipping to change at line 74 ¶ | |||
3. Common Procedures | 3. Common Procedures | |||
3.1. Codec Parameters | 3.1. Codec Parameters | |||
3.2. ADU, ADUI, and Source Symbols Mappings | 3.2. ADU, ADUI, and Source Symbols Mappings | |||
3.3. Encoding Window Management | 3.3. Encoding Window Management | |||
3.4. Source Symbol Identification | 3.4. Source Symbol Identification | |||
3.5. Pseudorandom Number Generator (PRNG) | 3.5. Pseudorandom Number Generator (PRNG) | |||
3.6. Coding Coefficients Generation Function | 3.6. Coding Coefficients Generation Function | |||
3.7. Finite Field Operations | 3.7. Finite Field Operations | |||
3.7.1. Finite Field Definitions | 3.7.1. Finite Field Definitions | |||
3.7.2. Linear Combination of Source Symbol Computation | 3.7.2. Linear Combination of Source Symbol Computation | |||
4. Sliding Window RLC FEC Scheme over GF(2^(8)) for Arbitrary | 4. Sliding Window RLC FEC Scheme over GF(28) for Arbitrary Packet | |||
Packet Flows | Flows | |||
4.1. Formats and Codes | 4.1. Formats and Codes | |||
4.1.1. FEC Framework Configuration Information | 4.1.1. FEC Framework Configuration Information | |||
4.1.2. Explicit Source FEC Payload ID | 4.1.2. Explicit Source FEC Payload ID | |||
4.1.3. Repair FEC Payload ID | 4.1.3. Repair FEC Payload ID | |||
4.2. Procedures | 4.2. Procedures | |||
5. Sliding Window RLC FEC Scheme over GF(2) for Arbitrary Packet | 5. Sliding Window RLC FEC Scheme over GF(2) for Arbitrary Packet | |||
Flows | Flows | |||
5.1. Formats and Codes | 5.1. Formats and Codes | |||
5.1.1. FEC Framework Configuration Information | 5.1.1. FEC Framework Configuration Information | |||
5.1.2. Explicit Source FEC Payload ID | 5.1.2. Explicit Source FEC Payload ID | |||
skipping to change at line 102 ¶ | skipping to change at line 102 ¶ | |||
7.1. Attacks Against the Data Flow | 7.1. Attacks Against the Data Flow | |||
7.1.1. Access to Confidential Content | 7.1.1. Access to Confidential Content | |||
7.1.2. Content Corruption | 7.1.2. Content Corruption | |||
7.2. Attacks Against the FEC Parameters | 7.2. Attacks Against the FEC Parameters | |||
7.3. When Several Source Flows are to be Protected Together | 7.3. When Several Source Flows are to be Protected Together | |||
7.4. Baseline Secure FEC Framework Operation | 7.4. Baseline Secure FEC Framework Operation | |||
7.5. Additional Security Considerations for Numerical | 7.5. Additional Security Considerations for Numerical | |||
Computations | Computations | |||
8. Operations and Management Considerations | 8. Operations and Management Considerations | |||
8.1. Operational Recommendations: Finite Field GF(2) Versus | 8.1. Operational Recommendations: Finite Field GF(2) Versus | |||
GF(2^(8)) | GF(28) | |||
8.2. Operational Recommendations: Coding Coefficients Density | 8.2. Operational Recommendations: Coding Coefficients Density | |||
Threshold | Threshold | |||
9. IANA Considerations | 9. IANA Considerations | |||
10. References | 10. References | |||
10.1. Normative References | 10.1. Normative References | |||
10.2. Informative References | 10.2. Informative References | |||
Appendix A. TinyMT32 Validation Criteria (Normative) | Appendix A. TinyMT32 Validation Criteria (Normative) | |||
Appendix B. Assessing the PRNG Adequacy (Informational) | Appendix B. Assessing the PRNG Adequacy (Informational) | |||
Appendix C. Possible Parameter Derivation (Informational) | Appendix C. Possible Parameter Derivation (Informational) | |||
C.1. Case of a CBR Real-Time Flow | C.1. Case of a CBR Real-Time Flow | |||
End of changes. 2 change blocks. | ||||
3 lines changed or deleted | 3 lines changed or added | |||
This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |