10.01.2015 Views

CCSDS File Delivery Protocol (CFDP)—Part 1: Introduction and ...

CCSDS File Delivery Protocol (CFDP)—Part 1: Introduction and ...

CCSDS File Delivery Protocol (CFDP)—Part 1: Introduction and ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>CCSDS</strong> REPORT CONCERNING THE <strong>CCSDS</strong> FILE DELIVERY PROTOCOL (<strong>CFDP</strong>)<br />

Proximity-1<br />

Proximity-1<br />

<strong>CCSDS</strong> AOS<br />

VCDU Service<br />

<strong>CFDP</strong> Procedures<br />

<strong>CCSDS</strong> Packet<br />

Service<br />

<strong>CCSDS</strong> TM/TC<br />

Frames<br />

Physical Channel<br />

SCPS Transport<br />

<strong>Protocol</strong><br />

SCPS Network<br />

<strong>Protocol</strong><br />

TCP<br />

Ethernet<br />

IP<br />

UDP<br />

PPP<br />

Figure 2-2: The <strong>CFDP</strong> Operates over a Wide Range of Underlying <strong>Protocol</strong>s<br />

2.3 DESIGN CONCEPT<br />

As depicted in figure 2-3, the protocol consists of Core procedures <strong>and</strong> Extended procedures.<br />

The Core procedures constitute the interaction between two protocol entities with a direct<br />

network path between them. The sending entity is the entity from which the file is copied in<br />

a file copy operation. The receiving entity is the entity to which the file is copied in a file<br />

copy operation.<br />

<strong>CFDP</strong><br />

User<br />

Extended<br />

(Store <strong>and</strong> Forward)<br />

Procedures<br />

<strong>CFDP</strong><br />

User<br />

<strong>Protocol</strong><br />

Entity<br />

Core Copy<br />

Procedures<br />

<strong>Protocol</strong><br />

Entity<br />

Core Copy<br />

Procedures<br />

<strong>Protocol</strong><br />

Entity<br />

Network<br />

Figure 2-3: Core <strong>and</strong> Extended Interactions<br />

Where direct network connectivity between the source <strong>and</strong> destination is impossible, the<br />

Extended procedures automatically build an end-to-end file copy transaction by executing<br />

multiple file copy operations, as follows: one file copy operation between the source <strong>and</strong> the<br />

first waypoint; others between successive waypoints as necessary; <strong>and</strong> a final file copy<br />

operation between the last waypoint <strong>and</strong> the destination. Each of these is simply another<br />

instance of the Core file copy operation. The reliability of a transaction is determined by<br />

whether the transaction is chosen to operate in unacknowledged mode or in one of the<br />

<strong>CCSDS</strong> 720.1-G-3 Page 2-5 April 2007

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!