Skip to main content
LeMay Publishing

United States Protocol Suite: Complete Specification

Travis L. Guckert

LeMay Publishing

STANDARDS

United States Protocol Suite: Complete Specification

by Travis L. Guckert

Industry Standard13,378 words137 chapters

Published by LeMay Publishing. 13,378 words across 137 chapters.

About This Publication

Complete specification of all seven protocols: AIP, CDR, ACP, CTP, MTP, AMP, AGP.

Published by LeMay Publishing, a division of LeMay. Massachusetts.

ISBN: 979-8-0000-5013-2

Chapters

1UNITED STATES PROTOCOL SUITE
2Complete Specification
3Version 1.0 — Final Release
4NOTICE
5DOCUMENT STATUS
6TABLE OF CONTENTS
7LIST OF FIGURES AND TABLES
8FOREWORD
9ACKNOWLEDGMENTS
10CONVENTIONS AND TERMINOLOGY
11Requirement Key Words
12Notational Conventions
13Definitions
14PART I — ARCHITECTURE AND GENERAL PROVISIONS
15CHAPTER 1: INTRODUCTION AND SCOPE
161.1 Purpose
171.2 Scope
181.3 Design Objectives
191.4 Relationship to Existing Standards
201.5 Document Organization
21CHAPTER 2: ARCHITECTURAL OVERVIEW OF THE UNITED STATES PROTOCOL SUITE
222.1 Layer Model
232.2 Protocol Dependency Graph
242.3 Protocol Summary Matrix
252.4 Encapsulation Model
262.5 Governance Hooks
27CHAPTER 3: COMMON DATA STRUCTURES AND ENCODING RULES
283.1 Primitive Data Types
293.2 Tag-Length-Value Encoding
303.3 Cryptographic Primitives
313.4 Common Header Format
32PART II — PROTOCOL SPECIFICATIONS
33CHAPTER 4: ADDRESSING AND IDENTIFICATION PROTOCOL (AIP)
344.1 Purpose
354.2 Address Format
364.3 Address Classes
374.4 Address Records
384.5 Authority Hierarchy
394.6 Address Resolution
404.7 Revocation
414.8 Governance Hooks
42CHAPTER 5: CHANNEL DISCOVERY AND ROUTING PROTOCOL (CDR)
435.1 Purpose
445.2 Design Principles
455.3 Message Types
465.4 Discovery Handshake
475.5 Route Announcement Format
485.6 Path Computation
495.7 Multi-Path and Failover
505.8 Governance Hooks
51CHAPTER 6: AUTHENTICATED CHANNEL PROTOCOL (ACP)
526.1 Purpose
536.2 Channel Establishment
546.3 Auth Frame Format
556.4 Channel State Machine
566.5 Rekeying
576.6 Cipher Suite Negotiation
586.7 Governance Hooks
59CHAPTER 7: CERTIFIED TRANSPORT PROTOCOL (CTP)
607.1 Purpose
617.2 Connection Establishment
627.3 Segment Header Format
637.4 Certified Delivery
647.5 Congestion Control
657.6 Flow Control
667.7 Connection Termination
677.8 Governance Hooks
68CHAPTER 8: MESSAGE TRANSFER PROTOCOL (MTP)
698.1 Purpose
708.2 Envelope Structure
718.3 Priority Levels
728.4 Multiplexing
738.5 Message Acknowledgment
748.6 Message Fragmentation
758.7 Governance Hooks
76CHAPTER 9: ASSET MANAGEMENT PROTOCOL (AMP)
779.1 Purpose
789.2 Asset Registry
799.3 Asset Datum Format
809.4 Asset Lifecycle
819.5 Registry Synchronization
829.6 Access Control
839.7 Governance Hooks
84CHAPTER 10: AUTOMATED GOVERNANCE PROTOCOL (AGP)
8510.1 Purpose
8610.2 Policy Objects
8710.3 Governance Authority
8810.4 Policy Distribution
8910.5 Rule Language
9010.6 Policy Enforcement
9110.7 Audit
9210.8 Emergency Orders
9310.9 Policy Revocation
9410.10 Governance Hooks
95PART III — CONFORMANCE, SECURITY, AND OPERATIONS
96CHAPTER 11: SECURITY ARCHITECTURE AND THREAT MODEL
9711.1 Threat Categories
9811.2 Security Properties by Layer
9911.3 Key Management
10011.4 Cryptographic Agility
101CHAPTER 12: CONFORMANCE REQUIREMENTS AND TESTING
10212.1 Conformance Levels
10312.2 Conformance Testing Framework
10412.3 Error Handling Requirements
10512.4 Performance Requirements
106CHAPTER 13: OPERATIONAL PROFILES AND DEPLOYMENT GUIDANCE
10713.1 Deployment Models
10813.2 Root Authority Deployment
10913.3 Domain Authority Deployment
11013.4 Entity Provisioning
11113.5 Network Monitoring
11213.6 Incident Response
11313.7 Capacity Planning
114BACK MATTER
115APPENDIX A: FORMAL GRAMMAR DEFINITIONS
116A.1 Common Header
117A.2 AIP Address Record
118A.3 CDR Route Announcement
119A.4 ACP Auth Frame
120A.5 CTP Segment
121A.6 MTP Envelope
122A.7 AMP Asset Datum
123A.8 AGP Policy Object
124APPENDIX B: ASSIGNED NUMBERS AND REGISTRIES
125B.1 Protocol Identifiers
126B.2 Cipher Suite Registry
127B.3 TLV Tag Registry
128B.4 MTP Content Type Registry
129B.5 Port Assignment (IP Encapsulation)
130B.6 Error Codes
131APPENDIX C: EXAMPLE MESSAGE FLOWS
132C.1 Entity Registration and First Communication
133C.2 Emergency Policy Distribution
134C.3 Certified Delivery
135REFERENCES
136GLOSSARY
137INDEX OF REQUIREMENTS