Professional Documents
Culture Documents
Heath
Request for Comments: 3051 J. Border
Category: Informational Hughes Network Systems
January 2001
Copyright Notice
Abstract
V.44 Packet Method is based upon the LZJH data compression algorithm.
Throughout the remainder of this document the terms V.44 Packet
Method and LZJH are synonymous.
Table of Contents
1. Introduction...................................................2
1.1 General....................................................2
1.2 Background of LZJH Data Compression........................2
1.3 Intellectual Property Rights...............................3
1.4 Specification of Requirements..............................4
2. Compression Process............................................4
2.1 Encoder Dictionary.........................................4
2.2 Encoder Output.............................................4
2.3 Padding....................................................4
3. Decompression Process..........................................5
3.1 Compressed Datagram........................................5
3.2 Original Uncompressed Datagram.............................5
4. IPComp Association (IPCA) Parameters...........................5
4.1 Transform ID...............................................5
4.2 Security Association Attributes............................5
4.3 Manual configuration.......................................5
4.4 Minimum packet size threshold..............................6
4.5 Compressibility test.......................................6
5. Security Considerations........................................6
6. IANA Considerations............................................6
7. Acknowledgements...............................................6
8. References.....................................................6
9. Authors' Addresses.............................................7
10. Full Copyright Statement.......................................8
1. Introduction
1.1 General
LZJH not only has superior execution times when encoding or decoding
packet data, but the reset of the dictionary between IP datagrams is
trivial. The encoder requires only the initialization of a 256 word
array and a handful of variables while the decoder requires only the
initialization of a handful of variables.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
2. Compression Process
The transmitting entity MUST flush unprocessed encoder data after the
last byte of the datagram has been passed into the encoder such that
the compressed datagram can be transmitted as a unit. The flush
ensures that all data is processed and included in the output, i.e.,
the compressed datagram is complete and no data from the current
datagram will be processed with the next datagram.
2.3 Padding
3. Decompression Process
4.1 Transform ID
5. Security Considerations
6. IANA Considerations
This document does not introduce any new name spaces. The value of
IPCOMP_LZJH is assigned from the IPsec IPCOMP transform identifier
space defined in [RFC2407]. IANA has assigned a value of 4 for this
purpose.
7. Acknowledgements
8. References
[LZ77] Lempel, A., and Ziv, J., "A Universal Algorithm for
Sequential Data Compression", IEEE Transactions On
Information Theory, Vol. IT-23, No. 3, May 1977.
9. Authors' Addresses
Jeff Heath
Hughes Network Systems
10450 Pacific Center Ct.
San Diego, CA 92121
Phone: 858-452-4826
Fax: 858-597-8979
EMail: jheath@hns.com
John Border
Hughes Network Systems
11717 Exploration Lane
Germantown, MD 20876
Phone: 301-601-4099
Fax: 301-601-4275
EMail: border@hns.com
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
Acknowledgement