To see the other types of publications on this topic, follow the link: OSI-Open System Interconnection.

Journal articles on the topic 'OSI-Open System Interconnection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 37 journal articles for your research on the topic 'OSI-Open System Interconnection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Tuma, T., I. Fajfar, M. Perko, F. Bratkovič, and J. Puhan. "A Hands-On Approach to Teaching the Basic OSI Reference Model." International Journal of Electrical Engineering & Education 37, no. 2 (2000): 157–66. http://dx.doi.org/10.7227/ijeee.37.2.5.

Full text
Abstract:
A new local area network (LAN) concept designed for educational purposes is proposed based upon the standard RS232 protocol. The concept enables students to gain hands-on experience of all seven open system interconnection (OSI) layers. The proposed approach to teaching computer networks has proved very popular with students. At the same time students' comprehension of basic OSI concepts has improved considerably.
APA, Harvard, Vancouver, ISO, and other styles
2

Susilawati Susilawati, Marcel Ade Satria, Khaila Mardina, Juniwan Juniwan, and Didik Aribowo. "Implementasi Teknologi Komunikasi Data Menggunakan Open System Interconnection (OSI) Untuk Berkirim Pesan Antar Perangkat." Venus: Jurnal Publikasi Rumpun Ilmu Teknik 2, no. 3 (2024): 124–29. http://dx.doi.org/10.61132/venus.v2i3.307.

Full text
Abstract:
Currently, the development of communication networks has influenced how humans communicate and exchange information. Data communications technology reflects the rapid evolution in the way humans communicate and exchange information. Data communication is the process of exchanging information between two or more devices via a transmission medium, such as cables, radio waves, or other network infrastructure. The goal of data communications is to transfer data from one location to another quickly, efficiently, and accurately. The method used is to look for references from several internet sources
APA, Harvard, Vancouver, ISO, and other styles
3

Shi, Yu Qing, and Yue Long Zhu. "A Framework for Development the Open Systems Interconnection of Integrated Intelligent Knowledge for Management of Networks." Applied Mechanics and Materials 411-414 (September 2013): 795–98. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.795.

Full text
Abstract:
In this article, we present a new model for distributed intelligent management networks. This paper presents a approach for the design and implementation of a distributed intelligent system that is designed through the normalization of knowledge management. Our study focuses on a language for formalizing knowledge management descriptions and an intelligent framework and combining them with an existing Open Systems Interconnection (OSI) management model. Further, this work outlines the development of an example based on our proposed standard.
APA, Harvard, Vancouver, ISO, and other styles
4

Jakobs, Kai. "Why Then Did the X.400 E-mail Standard Fail? Reasons and Lessons to be Learned." Journal of Information Technology 28, no. 1 (2013): 63–73. http://dx.doi.org/10.1057/jit.2012.35.

Full text
Abstract:
The X.400-series of recommendations specifies the elements, protocols, and services of the e-mail system associated with the Open Systems Interconnection (OSI) protocol stack. The paper looks at the various reasons that led to X.400's failure to gain the widely expected level of market acceptance. A brief literature review suggests that common explanations for success in a standards battle cannot explain the demise of X.400. The same holds for two popular explanations for the victory of Internet over OSI. Therefore, alternative reasons are proposed and discussed, including poor timing of the s
APA, Harvard, Vancouver, ISO, and other styles
5

Yalgʻashov, Anvar Ikrom oʻgʻli Fayzullayev Ikrom Yusub o'g'li Norqobilov Sobir Hamza o'g'li. "DDOS ATTACKS AND PROTECTION AGAINST THEM." EURASIAN JOURNAL OF ACADEMIC RESEARCH 2, no. 13 (2022): 1009–12. https://doi.org/10.5281/zenodo.7476343.

Full text
Abstract:
A Denial of Service (DoS) attack is an attempt to harm a targeted system, such as a website or application, by making it unavailable to normal end users. Typically, attackers create a large number of packets or requests that overload the target system. An attacker uses many compromised or controlled resources to carry out a distributed denial of service (DDoS) attack. In general, DDoS attacks can be divided into types based on the level at which the attack occurs in the Open Systems Interconnection (OSI) model. Attacks on the network layer (layer 3), transport layer (layer 4), presentation lay
APA, Harvard, Vancouver, ISO, and other styles
6

Sabelkin, Mike, and François Gagnon. "Data Transmission Oriented on the Object, Communication Media, Application, and State of Communication Systems." International Journal of Interdisciplinary Telecommunications and Networking 3, no. 2 (2011): 51–65. http://dx.doi.org/10.4018/jitn.2011040104.

Full text
Abstract:
The proposed communication system architecture is called TOMAS, which stands for data Transmission oriented on the Object, communication Media, Application, and state of communication Systems. TOMAS could be considered a Cross-Layer Interface (CLI) proposal, since it refers to multiple layers of the Open Systems Interconnection Basic Reference Model (OSI). Given particular scenarios of image transmission over a wireless LOS channel, the wireless TOMAS system demonstrates superior performance compared to a JPEG2000+OFDM system in restored image quality parameters over a wide range of wireless c
APA, Harvard, Vancouver, ISO, and other styles
7

Cuinas, Inigo. "An Introduction to Cybersecurity at Physical Layer: Obstacles at Radio Channel to Mitigate Hackers’ Chance." Elektronika ir Elektrotechnika 26, no. 6 (2020): 58–65. http://dx.doi.org/10.5755/j01.eie.26.6.28006.

Full text
Abstract:
Cybersecurity commonly focuses on higher layers of Open Systems Interconnection (OSI) model, as it is a discipline associated to Computer Science. However, physical layer is the front line of the defence of a system against external attacks, and Electrical Engineering, concretely Radiofrequency Engineering, can provide tools to reinforce radio networks also in terms of information security. This paper analyses different techniques related to site shielding. From hard traditional shielding, similar to Faraday cages, to different soft shielding solutions as vegetation fences and frequency select
APA, Harvard, Vancouver, ISO, and other styles
8

Venkatesh, Thamarai Kannan, and Chakravarthi Rekha. "Efficient addressing schemes for internet of things." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (2022): 4415–29. https://doi.org/10.11591/ijece.v12i4.pp4415-4429.

Full text
Abstract:
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with
APA, Harvard, Vancouver, ISO, and other styles
9

Кузавков, Василь, В’ячеслав Солодовник та Юлія Болотюк. "ПОБУДОВА ПЕРЕВІРНОЇ ТЕСТОВОЇ ПОСЛІДОВНОСТІ ДЛЯ ОЦІНКИ ТЕХНІЧНОГО СТАНУ ОБ’ЄКТІВ З ВБУДОВАНИМ ПРОГРАМНИМ ЗАБЕЗПЕЧЕННЯМ". Ukrainian Scientific Journal of Information Security 30, № 1 (2024): 29–36. http://dx.doi.org/10.18372/2225-5036.30.18578.

Full text
Abstract:
Сучасні засоби обміну інформації в своїй більшості побудовані як системи з вбудованим програмним забезпеченням. Процес функціонування таких систем полягає у взаємодії програмних та апаратних складових. Архітектура таких систем відповідає моделі взаємодії відкритих систем (Open System Interconnection Basic Reference Model, OSI), яка визначає певні рівні у мережах, дає їм стандартні імена та вказує, які функції має виконувати кожен рівень. Порушення функціонування подібних систем можуть бути спричинені випадковими відмовами та дефектами апаратної складової, помилками та відмовами програмного заб
APA, Harvard, Vancouver, ISO, and other styles
10

Vitria, Rikki, Ratna Dewi, and Ariq Naufal. "ANALYSIS OF DATA COMMUNICATION BETWEEN ANDROID APPLICATIONS AND WEB SERVER." JURNAL INTEGRASI 11, no. 2 (2019): 91–96. http://dx.doi.org/10.30871/ji.v11i2.1654.

Full text
Abstract:
Aplikasi android sudah banyak diterapkan dalam berbagai bidang, seperti dalam bidang pendidikan, kesehatan, perbankan, transportasi dan yang lainnya. Aplikasi ini banyak digunakan untuk kemudahan untuk mendapatkan informasi. Pada penelitian ini Aplikasi Android digunakan untuk informasi keberadaan dosen. Aplikasi digunakan untuk memudahkan sesorang untuk mengetahui keberadaan dari dosen yang ingin mereka cari. Tujuan dari penelitian ini adalah untuk menganalisa komunikasi data antara aplikasi android dan web server. Analisa komunikasi data ini menggunakan aplikasi wireshark. Hasil penelitian i
APA, Harvard, Vancouver, ISO, and other styles
11

H. Sawalmeh, Ahmad, and Noor Shamsiah Othman. "An Overview of Collision Avoidance Approaches and Network Architecture of Unmanned Aerial Vehicles (UAVs)." International Journal of Engineering & Technology 7, no. 4.35 (2018): 924. http://dx.doi.org/10.14419/ijet.v7i4.35.27395.

Full text
Abstract:
As an autonomous vehicle, Unmanned Aerial Vehicles (UAVs) are subjected to several challenges. One of the challenges is for UAV to be able to avoid collision. Many collision avoidance methods have been proposed to address this issue. Furthermore, in a multi-UAV system, it is also important to address communication issue among UAVs for cooperation and collaboration. This issue can be addressed by setting up an ad-hoc network among UAVs. There is also a need to consider the challenges in the deployment of UAVs, as well as, in the development of collision avoidance methods and the establishment o
APA, Harvard, Vancouver, ISO, and other styles
12

Masue, Wilbard G., Daniel Ngondya, and Tabu S. Kondo. "Quantifying Vulnerabilities: A Systematic Review of the State-of-the-Art Web-Based Systems." Journal of ICT Systems 2, no. 1 (2024): 72–86. http://dx.doi.org/10.56279/jicts.v2i1.51.

Full text
Abstract:
Web-based Systems Vulnerabilities (WSVs) have been existing over a long time in all Open System Interconnection (OSI) layers. WSV tends to affect online business operations by letting attackers to gain unauthorized access. Different researchers have been publishing common WSVs regularly. From the published vulnerabilities, it can be noted that the ranking of vulnerabilities is not static. Prevalence of common vulnerabilities tends to vary with time. Moreover, ranking of vulnerabilities from various practitioners, such as OWASP and CWE, at a particular point in time tends to be different becaus
APA, Harvard, Vancouver, ISO, and other styles
13

Tatarkanov, Aslan A., Аlexander А. Umyskov, Ruslan Kh Tekeev, and Vladimir Zh Kuklin. "Model Development of Universal Hardware and Software Module for Medical Information System." International Journal of Emerging Technology and Advanced Engineering 12, no. 10 (2022): 136–46. http://dx.doi.org/10.46338/ijetae1022_15.

Full text
Abstract:
Medical information systems (MIS) are the object of the research presented. They allow information processing throughout the patient's interaction with medical services - from contacting such institutions to monitoring the patient after rehabilitation. However, for various reasons, during the information process exchange within the framework of MIS, distortions of collected or transmitted data are possible, which leads to wrong medical decisions. Currently, new approaches are being implemented using Software-Defined Networks, but our work proposes an alternative solution designed to work conse
APA, Harvard, Vancouver, ISO, and other styles
14

Oktavianus, Yoppi Lisyadi, Ikhwana Elfitri, and Onno Widodo Purbo. "Perancangan dan Analisis Jaringan FTTB Berbasis Teknologi GPON Pada Bangunan Hotel." INOVTEK Polbeng - Seri Informatika 8, no. 1 (2023): 88. http://dx.doi.org/10.35314/isi.v8i1.3213.

Full text
Abstract:
This paper presents the design and implementation of a Fiber To The Building (FTTB) network infrastructure based on Gigabit Passive Optical Network (GPON) technology in a hotel cluster building located in West Sumatra, Indonesia. GPON technology was selected for its cost-effectiveness and efficiency in the distribution area, particularly when the terminal bandwidth is set at ≤500 Mbps. The waterfall method was utilized in the network's design. The results were tested and analyzed across three Open System Interconnection (OSI) layers: the physical layer, represented by the link power budget; th
APA, Harvard, Vancouver, ISO, and other styles
15

Aminu, Aminu Muazu, and Ismaila Audi Umar. "Network Configuration by Utilizing Cisco Technologies with Proper Segmentation of Broadcast Domain in FNAS-UMYUK Nigeria." Journal of Network Security and Data Mining 4, no. 1 (2021): 1–13. https://doi.org/10.5281/zenodo.4776375.

Full text
Abstract:
This research work will provide the needs for the Faculty of Natural & and Applied Sciences of Umaru Musa Yar’adua University Katsina Nigeria (FNAS-UMYUK) departments to communicate among themselves, in order to share and search on vital and useful information’s which will enhance and promote research and learning. This work is strictly based on the movement of data in the seven layers of the Open System Interconnection (OSI) Model and IPv4 is the protocol used in this work. The design variation are based on primarily layer 2 and layer 3 to the access switches with different va
APA, Harvard, Vancouver, ISO, and other styles
16

Huening, Felix, Holger Heuermann, Franz-Josef Wache, and Rami Audisho Jajo. "A new wireless sensor interface using dual-mode radio." Journal of Sensors and Sensor Systems 7, no. 2 (2018): 507–15. http://dx.doi.org/10.5194/jsss-7-507-2018.

Full text
Abstract:
Abstract. The integration of sensors is one of the major tasks in embedded, control and “internet of things” (IoT) applications. For the integration mainly digital interfaces are used, starting from rather simple pulse-width modulation (PWM) interface to more complex interfaces like CAN (Controller Area Network). Even though these interfaces are tethered by definition, a wireless realization is highly welcome in many applications to reduce cable and connector cost, increase the flexibility and realize new emerging applications like wireless control systems. Currently used wireless solutions li
APA, Harvard, Vancouver, ISO, and other styles
17

Qabalin, Majdi K., Muawya Naser, Wafa M. Hawajreh, and Saja Abu-Zaideh. "GPS Week Number Rollover Timestamp Complement." Sensors 21, no. 23 (2021): 7826. http://dx.doi.org/10.3390/s21237826.

Full text
Abstract:
Global Positioning System (GPS) is a global navigation satellite system and the most common satellite system used in navigation and tracking devices. The phenomenon of week number rollover happened recently—a year ago—due to a design limitation in the week number variable that counting weeks which causes vast losses. As many fleet management systems depend on GPS raw data, such systems stopped working due to inaccurate data provided by GPS receivers. In this paper, we propose a technical and mathematical analysis for the GPS week number rollover phenomenon and suggest a solution to avoid the r
APA, Harvard, Vancouver, ISO, and other styles
18

Obando, Christian Alexander. "Seguridad a nivel de enlace de datos en el modelo de interconexión de sistemas abiertos (OSI)." Ingente Americana 2, no. 2 (2022): 71–78. http://dx.doi.org/10.21803/ingecana.2.2.405.

Full text
Abstract:
Las redes de comunicaciones pueden llegar a prestar una innumerable cantidad de servicios en una organización que van a permitir satisfacer las necesidades más importantes de ésta ayudándola con el cumplimiento de sus objetivos organizacionales con mayor eficiencia, sin embargo, la falta de implementación de seguridad de la información en sus dispositivos informáticos puede causar una gran desventaja para dichos objetivos. La capa dos del modelo OSI se considera una de las más importantes en el flujo de la información ya que de ella prácticamente parte la comunicación con el resto de las capas
APA, Harvard, Vancouver, ISO, and other styles
19

John, Joshua, and Egba Anwaitu Fraser. "DDoS Attacks on Cloud Computing and IoT Devices: Strategies for Mitigation." Kasu Journal of Computer Science 1, no. 4 (2024): 778–95. https://doi.org/10.47514/kjcs/2024.1.4.006.

Full text
Abstract:
This study has the goal of developing security model that detected and prevented the risks of Distributed Denial of Service (DDoS) attacks in cloud computing systems and IoT devices which are gravely potent and on the increase today, especially with the rapid growth of internet during the last one and a half decades. This is more prevalent because of the several benefits that an organization enjoys after adopting cloud computing and Internet of Things (IoT). However, the harm that may result after a DDoS attack on a cloud computing infrastructure or service and IoT devices can be very huge, an
APA, Harvard, Vancouver, ISO, and other styles
20

Alasri, Abbas, and Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool." International Journal of Engineering & Technology 7, no. 4.7 (2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.

Full text
Abstract:
A web service is defined as the method of communication between the web applications and the clients. Web services are very flexible and scalable as they are independent of both the hardware and software infrastructure. The lack of security protection offered by web services creates a gap which attackers can make use of. Web services are offered on the HyperText Transfer Protocol (HTTP) with Simple Object Access Protocol (SOAP) as the underlying infrastructure. Web services rely heavily on the Extended Mark-up Language (XML). Hence, web services are most vulnerable to attacks which use XML as
APA, Harvard, Vancouver, ISO, and other styles
21

Mohammed, Mustafa Khan. "Developing Comprehensive Web Application Firewall (WAF) Policies for Multiple Environments, Enhancing Web Application Security." Journal of Scientific and Engineering Research 11, no. 4 (2024): 358–65. https://doi.org/10.5281/zenodo.13950690.

Full text
Abstract:
Web servers are the engines that drive web applications. Web applications are the critical elements in an organization that need maximum security protection to secure workloads. Therefore, a web application firewall (WAF) is deployed to guard the web server from a plethora of attack vectors, including all the OWASP's top 10 common attacks. WAF focuses on the application layer, which is the seventh layer of the OSI (Open System Interconnection) model, due to the application layer's inherent features, which give the WAF a conducive environment in which to operate. The superiority of WAF in inspe
APA, Harvard, Vancouver, ISO, and other styles
22

Schürmann, Gerd. "The evolution from open systems interconnection (OSI) to open distributed processing (ODP)." Computer Standards & Interfaces 17, no. 1 (1995): 107–13. http://dx.doi.org/10.1016/0920-5489(93)e0065-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Hartmann, Ulrich. "Open systems interconnection (OSI): Status, trends and european information technology manufacturers' activities." Computer Standards & Interfaces 7, no. 1-2 (1988): 119–26. http://dx.doi.org/10.1016/0920-5489(88)90056-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Linn, R. J., and J. S. Nightingale. "Testing OSI (Open Systems Interconnection) protocols at the National Bureau of Standards." Computers & Security 7, no. 5 (1988): 514. http://dx.doi.org/10.1016/0167-4048(88)90234-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

McLean, Neil. "Information Control: Open Systems Interconnection and Networking Strategies." Alexandria: The Journal of National and International Library and Information Issues 1, no. 1 (1989): 43–50. http://dx.doi.org/10.1177/095574908900100104.

Full text
Abstract:
The convergence of communications technology and computer technology has resulted in the development of the Open Systems Interconnection (OSI) Reference Model which permits communication between computers both within and between organizations. There are now national and international library initiatives concerned with developing applications for bibliographic searching and transfer of records and also interlending. In parallel with these initiatives it is important to re-evaluate the role of the library at an institutional level where open systems architecture and distributed processing are ch
APA, Harvard, Vancouver, ISO, and other styles
26

Baumgarten, Bernd, Heinz-Jürgen Burkhardt, Peter Ochsenschläger, and Rainer Prinoth. "PROSIT - An R&D project stimulated by the standardization work on Open Systems Interconnection (OSI)." Computer Standards & Interfaces 17, no. 1 (1995): 45–53. http://dx.doi.org/10.1016/0920-5489(93)e0068-d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Abdulameer Abdulmonim, Dhafer, and Zainab Hassan Muhamad. "Comparative Study Between the OSI Model and the TCP/IP Model: Architecture and Protocols in Computer Networking Systems." International Journal of Engineering and Computer Science 13, no. 08 (2024): 26358–72. http://dx.doi.org/10.18535/ijecs/v13i08.4880.

Full text
Abstract:
In the world of computing and networking, it is critical to understand the theoretical framework that underlies data communication to ensure the best performance and compatibility between various systems. Both the Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models offer a comprehensive perspective on how the entire communication operation is separated into various layers, with each layer assigned particular roles and functions. This paper compares the OSI and TCP/IP models in terms of the functionalities and responsibilities of the various la
APA, Harvard, Vancouver, ISO, and other styles
28

Chandnani, Manali, Mukesh Kumar Khandelwal, and Meeta Sharma. "A Survey on Synchronization Approach in MAC Layer Protocols." International Journal of Business Data Communications and Networking 13, no. 1 (2017): 9–27. http://dx.doi.org/10.4018/ijbdcn.2017010102.

Full text
Abstract:
The Open Systems Interconnection (OSI) model describes the layered approach for communication between two networked systems. The Data link layer of OSI model consists of a sub layer known as MAC layer for achieving coordination among the communicating nodes to access the shared channel. This channel is shared between multiple nodes in a communication network and the packets transmitted at same time by different nodes collide with each other. This situation leads to loss of data and bandwidth gets wasted. To avoid this situation, MAC layer supports various protocols: TDMA, ALOHA, CSMA/CD, CSMA/
APA, Harvard, Vancouver, ISO, and other styles
29

Baranov, Vladimir V., and Alexander A. Shelupanov. "Cognitive Model for Assessing the Security of Information Systems for Various Purposes." Symmetry 14, no. 12 (2022): 2631. http://dx.doi.org/10.3390/sym14122631.

Full text
Abstract:
This article substantiates the relevance of the development of a cognitive model for assessing the security of information systems for various purposes, designed to support decision-making by officials of information security management bodies. The article analyzes scientific papers and research in this area, formulates the requirements for the functional capabilities of the model, and investigates and identifies the most appropriate modeling tools, based on the symmetry property that develops from integrated ontological and neuro-Bayesian models; typical clusters of information systems; tacti
APA, Harvard, Vancouver, ISO, and other styles
30

Kułacz, Łukasz, Paweł Kryszkiewicz, and Adrian Kliks. "Waveform Flexibility for Network Slicing." Wireless Communications and Mobile Computing 2019 (March 27, 2019): 1–15. http://dx.doi.org/10.1155/2019/6250804.

Full text
Abstract:
We discuss the idea of waveform flexibility and resource allocation in future wireless networks as a promising tool for network slicing implementation down to the lowest layers of the OSI (Open Systems Interconnection) models. In particular, we consider the possibility of cognitively adjusting the shape of the waveform to the requirements associated with various network slices. Moreover, such an adjustment of waveform shape is realised jointly with the selection and allocation of the appropriate frequency bands to each slice. In our approach, the definition of the waveform, as well as the assi
APA, Harvard, Vancouver, ISO, and other styles
31

Sija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.

Full text
Abstract:
A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse eng
APA, Harvard, Vancouver, ISO, and other styles
32

Miss.Vinodini, Salvi, and Prasad Bapat Mr. "Mode of Data Flow in the OSI Model." IJIERT - International Journal of Innovations in Engineering Research and Technology 2, no. 3 (2015). https://doi.org/10.5281/zenodo.1471811.

Full text
Abstract:
<strong>As the urgency in the need for standards in differ ent computer networks was more,International Standard Organization (ISO) created a new subcommit tee for �Open System Interconnection� in 1977. The first priority of subcommittee was to de velop architecture for Open System Interconnection which could serve as a frame work f or the definition of standard protocols. In July 1979 the specifications of this architecture,established. That was passed under the name of �OSI Reference Model� to Technical committee .These recommendations were adopted at the end of 1979 as the basis for the fol
APA, Harvard, Vancouver, ISO, and other styles
33

"Analysis and Theoretical Evaluation of Iraqi High Voltage Power Transmission Line." Iraqi Journal of Computer, Communication, Control and System Engineering, September 16, 2018, 63–76. http://dx.doi.org/10.33103/uot.ijccce.18.2.6.

Full text
Abstract:
The Powerline Communications (PLC) technology allows data transmission through electrical wires. Thus the electrical wiring will represent a data transmission channel conformable to the physical layer of the open system interconnection (OSI) model. In this work, the specifications of the Iraqi electrical network were used to model a high-voltage transmission line using a transmission (ABCD) matrix and use it as a communication channel for transmitting data within a narrow band (30-500). The transfer function of the suggested model was derived and its performance analysis was performed to evalu
APA, Harvard, Vancouver, ISO, and other styles
34

Olawoyin, L. A. "Hybridization of OFDMand Physical Layer Techniques for Information Security in Wireless System." SLU Journal of Science and Technology, March 31, 2023, 21–29. http://dx.doi.org/10.56471/slujst.v6i.301.

Full text
Abstract:
Due to quest for high data rate, reliable and secure communication, this has motivated both wired and wireless network access service providers to deploy a next-generation network with ability to meet the required need. The use orthogonal frequency division multiplexing(OFDM) enables reliable transmission of various data traffic by optimizing subcarrier, power, and allocation of bits among different users. Traditionally, securing data in wireless system is always at the upper layer of open system interconnection(OSI) Model by using data encryption techniques. However, such techniques may not b
APA, Harvard, Vancouver, ISO, and other styles
35

Ms., Shubhangi Mohan Ingole. "A STUDY OF CYBER SECURITY THREATS IN THE OSI-REFERENCE MODEL." April 26, 2022. https://doi.org/10.5281/zenodo.7093414.

Full text
Abstract:
In this paper, I review the role of OSI-Model. This paper examines the problem of cybersecurity threats that are implemented on networks . OSI-Model is a 7 layer architecture with each layer having specific functionality to perform. All these 7 layers work collaboratively to transmit the data from one person to another all around the world. networks as being structured in the seven layers of the ISO-OSI model, it makes sense that cybersecurity threats can happen at any layer. We can think of these layers as the &quot;links&quot; in our metaphorical chain. Moving outward from the user, data is
APA, Harvard, Vancouver, ISO, and other styles
36

"Pro-Active and Pre-Emptive Intelligent Network Management Strategies in Internet of Things." International Journal of Recent Technology and Engineering 8, no. 4 (2019): 7174–79. http://dx.doi.org/10.35940/ijrte.d5305.118419.

Full text
Abstract:
Whenever a user browses the internet, the content he sends or receives takes the form a Protocol Data Unit as packets according to the OSI (Open Systems Interconnection) layers. These packets travel from the source to the destination through the path chosen by the routing protocols as OSPF (Open Shortest Path First) and BGP (Border Gateway Protocol). OSPF is used for interior routing within an AS (Autonomous System) and BGP is used for exterior routing between two external AS. Some customers are dual-homed where they have connections to two AS with one as the primary and the other one as secon
APA, Harvard, Vancouver, ISO, and other styles
37

Azevedo, Andrei C., Eder J. Scheid, Muriel F. Franco, Demétrio F. F. Boeira, Luciano Zembruzki, and Lisandro Z. Granville. "The Role of Network Centralization in Shaping Digital Sovereignty: An Analysis Under the DNS Lens." International Journal of Network Management, October 24, 2024. http://dx.doi.org/10.1002/nem.2309.

Full text
Abstract:
ABSTRACTCentralization of Internet‐based services in a few key players has been a topic of study in recent years. One of such services, the domain name system (DNS), is one of the pillars of the Internet, which allows users to access websites on the Internet through easy‐to‐remember domain names rather than complex numeric IP addresses. In this DNS context, the reliance on a small number of large DNS providers can lead to (a) risks of data breaches and disruption of service in the event of failures and (b) concerns about the digital sovereignty of countries regarding DNS hosting. As several es
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!