To see the other types of publications on this topic, follow the link: OSI protocol.

Journal articles on the topic 'OSI protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'OSI protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Swain, Leigh. "The OSI ILL Protocol:." Journal of Interlibrary Loan & Information Supply 1, no. 3 (1991): 11–15. http://dx.doi.org/10.1300/j472v01n03_03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bochmann, Gregor V. "Protocol specification for OSI." Computer Networks and ISDN Systems 18, no. 3 (1990): 167–84. http://dx.doi.org/10.1016/0169-7552(90)90132-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pehrson, Björn. "Protocol verification for OSI." Computer Networks and ISDN Systems 18, no. 3 (1990): 185–201. http://dx.doi.org/10.1016/0169-7552(90)90133-d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yusheng Liu and Doan B Hoang. "OSI RPC model and protocol." Computer Communications 17, no. 1 (1994): 53–66. http://dx.doi.org/10.1016/0140-3664(94)90018-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Poo, Gee Swee, and Wilson Ang. "OSI protocol choices for LAN environments." Computer Communications 13, no. 1 (1990): 17–26. http://dx.doi.org/10.1016/0140-3664(90)90032-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Annu, ., and Anil Dudy Dr. "Review of the OSI Model and TCP/IP Protocol Suite on Modern Network Communication." International Journal of Current Science Research and Review 07, no. 02 (2024): 1230–39. https://doi.org/10.5281/zenodo.10673276.

Full text
Abstract:
Abstract : Layered approaches to networking are possible. Network architects categorize protocols in order to simplify their designs. Each layer has its own protocol for talking to the outside world. Every component of the network implements some of the nth layer. Messages are sent back and forth between these parts. Layer n protocol data units [n-PDU] are the official name for these transmissions. All the steps necessary for efficient conversation are covered and these steps are organized into layers for easy comprehension. Layered architecture describes this kind of planning for a communicat
APA, Harvard, Vancouver, ISO, and other styles
7

Ei, Ei Khaing. "Comparison of DOD and OSI Model in the Internet Communication." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 2574–79. https://doi.org/10.5281/zenodo.3591741.

Full text
Abstract:
The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP IP, because it's most important protocols, the Transmission Control Protocol TCP and the Internet Protocol IP , were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense. TCP IP provides end to end connectivi
APA, Harvard, Vancouver, ISO, and other styles
8

Fong, K., and J. Reinstedler. "Development of an OSI application layer protocol interface." ACM SIGCOMM Computer Communication Review 19, no. 3 (1989): 21–57. http://dx.doi.org/10.1145/74674.74676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

De Prycker, M., R. Peschi, and T. Van Landegem. "B-ISDN and the OSI protocol reference model." IEEE Network 7, no. 2 (1993): 10–18. http://dx.doi.org/10.1109/65.216906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

West, Colin H. "A validation of the OSI session layer protocol." Computer Networks and ISDN Systems 11, no. 3 (1986): 173–82. http://dx.doi.org/10.1016/0169-7552(86)90033-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Syihabuddin, Muhammad, and Jenih Jenih. "Implementasi Redundant Switch Menggunakan CISCO Catalyst Di PT. Citra Solusi Pratama." Jurnal Teknologi Informasi 7, no. 2 (2021): 77–85. http://dx.doi.org/10.52643/jti.v7i2.1900.

Full text
Abstract:
Spanning Tree protocol atau yang sering disingkat dengan STP adalah metode pada jaringan yang menjamin tidak adanya loop dalam jaringan. Dengan model jaringan OSI untuk jaringan komputer, STP ada di layer 2 OSI. Spanning tree protocol memperbolehkan desain jaringan memiliki redundant link untuk membuat jalur backup otomatis. Dengan menggunakan metode spanning tree protocol maka apabila perangkat switch cisco catalyst tersebut down maka akan berimbas pada jaringan tersebut karena sudah ada backup link. Apabila main link down atau terputus, maka port yang tadi terblok akan terbuka oleh switch, s
APA, Harvard, Vancouver, ISO, and other styles
12

Revelli, Alberto, Gianluca Gennarelli, Valentina Biasoni, et al. "The Ovarian Sensitivity Index (OSI) Significantly Correlates with Ovarian Reserve Biomarkers, Is More Predictive of Clinical Pregnancy than the Total Number of Oocytes, and Is Consistent in Consecutive IVF Cycles." Journal of Clinical Medicine 9, no. 6 (2020): 1914. http://dx.doi.org/10.3390/jcm9061914.

Full text
Abstract:
Background and Objectives: Some biomarkers of ovarian responsiveness to gonadotropins and the total number of retrieved oocytes are known to affect the success rate after controlled ovarian stimulation (COS) and in vitro fertilization (IVF). The aim of this study was to study another putative marker, the Ovarian Sensitivity Index (OSI: (number of retrieved oocytes/total gonadotropin dose) × 1000), assessing whether (a) it correlates with ovarian responsiveness biomarkers, (b) it is an independent predictor of clinical pregnancy, (c) it predicts clinical pregnancy comparably to the number of re
APA, Harvard, Vancouver, ISO, and other styles
13

Sija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.

Full text
Abstract:
A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse eng
APA, Harvard, Vancouver, ISO, and other styles
14

Zhang, Hao, Guo Huan Lou, Jiong Zhao Yang, and Zheng Yao. "Development and Research on Embedded Fieldbus Protocol Conversion Gateway." Advanced Materials Research 121-122 (June 2010): 228–31. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.228.

Full text
Abstract:
Profibus and CAN bus are two kinds of widely used field bus in the industrial control field. However, this two bus protocol conversion devices are not introduced on the market, it can not meet the needs of users. Therefore, the design of a Profibus and CAN protocol translation ngateway is very important. By comparing the OSI reference model, the same points of Profibus and CAN bus can be found, their communication model structure is streamlined by the OSI model, they are only three layers, which makes it possible to interconnect them. This paper designs an embedded protocol conversion gateway,
APA, Harvard, Vancouver, ISO, and other styles
15

Huitema, C., and A. Doghri. "Defining faster transfer syntaxes for the OSI presentation protocol." ACM SIGCOMM Computer Communication Review 19, no. 5 (1989): 44–55. http://dx.doi.org/10.1145/74681.74685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Poo, Gee-Swee, and Wilson Ang. "Cut-through buffer management technique for OSI protocol stack." Computer Communications 14, no. 3 (1991): 166–77. http://dx.doi.org/10.1016/0140-3664(91)90068-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Callon, Ross W. "Integrated routing for multi-protocol TCP/IP-OSI environments." Computer Networks and ISDN Systems 23, no. 1-3 (1991): 185–90. http://dx.doi.org/10.1016/0169-7552(91)90105-l.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Ciminiera, L., C. Demartini, and A. Valenzano. "A practical study of semi-automatic OSI protocol implementation." Software: Practice and Experience 18, no. 3 (1988): 255–77. http://dx.doi.org/10.1002/spe.4380180306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Tuma, T., I. Fajfar, M. Perko, F. Bratkovič, and J. Puhan. "A Hands-On Approach to Teaching the Basic OSI Reference Model." International Journal of Electrical Engineering & Education 37, no. 2 (2000): 157–66. http://dx.doi.org/10.7227/ijeee.37.2.5.

Full text
Abstract:
A new local area network (LAN) concept designed for educational purposes is proposed based upon the standard RS232 protocol. The concept enables students to gain hands-on experience of all seven open system interconnection (OSI) layers. The proposed approach to teaching computer networks has proved very popular with students. At the same time students' comprehension of basic OSI concepts has improved considerably.
APA, Harvard, Vancouver, ISO, and other styles
20

Permana, Eka Ramdan, Fajar Nugraha Wahyu, Handri Taufik, and Thoyyibah T. "The OSI and TCP/ IP Reference Models in the Era of Industry 4.0." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 3 (2024): 936–42. http://dx.doi.org/10.57152/malcom.v4i3.1324.

Full text
Abstract:
The research aims to evaluate the integration and relevance of the Open Systems Interconnection (OSI) and TCP/IP (Transmission Control Protocol/Internet Protocol) Reference Models in the context of Industry 4.0. This study seeks to analyze the suitability of these models with the complex and dynamic networking environment of the present era and to propose modifications or strategies to enhance their performance and security within the context of Industry 4.0. The research method employed is descriptive research with a literature study design. This descriptive research method with a literature
APA, Harvard, Vancouver, ISO, and other styles
21

Jakobs, Kai. "Why Then Did the X.400 E-mail Standard Fail? Reasons and Lessons to be Learned." Journal of Information Technology 28, no. 1 (2013): 63–73. http://dx.doi.org/10.1057/jit.2012.35.

Full text
Abstract:
The X.400-series of recommendations specifies the elements, protocols, and services of the e-mail system associated with the Open Systems Interconnection (OSI) protocol stack. The paper looks at the various reasons that led to X.400's failure to gain the widely expected level of market acceptance. A brief literature review suggests that common explanations for success in a standards battle cannot explain the demise of X.400. The same holds for two popular explanations for the victory of Internet over OSI. Therefore, alternative reasons are proposed and discussed, including poor timing of the s
APA, Harvard, Vancouver, ISO, and other styles
22

Jafri, Syed Talib Abbas, Irfan Ahmed, Sundus Ali, Jamaiah Yahaya, Faizan Qamar, and Zuriani Hayati Abdullah. "Split Hop Penalty for Transmission Quality Metrics in a Better Approach to Mobile Ad Hoc Networking (BATMAN) for IoT-Based MANET." Symmetry 15, no. 5 (2023): 969. http://dx.doi.org/10.3390/sym15050969.

Full text
Abstract:
Various routing protocols have been developed for wireless ad hoc networks to shift from infrastructure-based networks to self-controlling and self-configurable networks. These ad hoc networks are easy to implement and have plenty of application in the fields of healthcare, transportation, smart cities, etc. Although almost all of the routing protocols work on the Open Systems Interconnection (OSI) model’s network layer, a few routing protocols support routing on the data link layer of the OSI model rather than the conventional one. One of these routing protocols include the Better Approach To
APA, Harvard, Vancouver, ISO, and other styles
23

Mustafa, Dülger. "DETEL SERIAL DATA TRANSMISSION PROTOCOL FOR THE COMMUNICATION OF AN IBM-PC WITH THE MDxx SERIES OF PROGRAMMABLE LOGIC CONTROLLERS." Global Journal of Engineering Science and Research Management 6, no. 5 (2019): 105–15. https://doi.org/10.5281/zenodo.3235361.

Full text
Abstract:
In this paper a new serial transmission protocol, <em>DETEL</em>, is designed and presented. <em>DETEL</em> protocol is developed to provide a reliable communication between an <em>IBM-PC</em> and a <em>Programmable Logic Controller, PLC, </em>of type <em>MDxx</em> series. Here the <em>IBM-PC</em> acts as a master (programmer) device and the <em>PLC</em> acts as a slave device. The integrity of the data to be transferred is discussed. OSI model of the <em>DETEL</em> protocol is presented.&nbsp; Link-layer and application-layer protocols are implemented. <em>DETEL</em> Protocol is implemented o
APA, Harvard, Vancouver, ISO, and other styles
24

Turner, Fay. "The interlibrary loan protocol: AN OSI solution to ill messaging." Library Hi Tech 8, no. 4 (1990): 73–82. http://dx.doi.org/10.1108/eb047809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Halsall, F., and N. Modiri. "Protocol analyser for the monitoring and analysis of OSI networks." Computer Communications 13, no. 9 (1990): 533–41. http://dx.doi.org/10.1016/0140-3664(90)90004-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Abdulameer Abdulmonim, Dhafer, and Zainab Hassan Muhamad. "Comparative Study Between the OSI Model and the TCP/IP Model: Architecture and Protocols in Computer Networking Systems." International Journal of Engineering and Computer Science 13, no. 08 (2024): 26358–72. http://dx.doi.org/10.18535/ijecs/v13i08.4880.

Full text
Abstract:
In the world of computing and networking, it is critical to understand the theoretical framework that underlies data communication to ensure the best performance and compatibility between various systems. Both the Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models offer a comprehensive perspective on how the entire communication operation is separated into various layers, with each layer assigned particular roles and functions. This paper compares the OSI and TCP/IP models in terms of the functionalities and responsibilities of the various la
APA, Harvard, Vancouver, ISO, and other styles
27

Venkatesh, Thamarai Kannan, and Chakravarthi Rekha. "Efficient addressing schemes for internet of things." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (2022): 4415–29. https://doi.org/10.11591/ijece.v12i4.pp4415-4429.

Full text
Abstract:
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with
APA, Harvard, Vancouver, ISO, and other styles
28

Peacemark, Kipkorir, Ephantus Mwangi, and Jotham Wasike. "A Machine Learning-Based Packet Sniffer for Detection and Classification of the Denial-Of-Service Attack Packets at the Network Layer." International Journal of Research and Innovation in Applied Science X, no. V (2025): 568–82. https://doi.org/10.51584/ijrias.2025.100500051.

Full text
Abstract:
Cyber threats attacks have continued to evolve in complexity and sophistication, posing significant risks to an organization’s network infrastructure and sensitive data's availability, confidentiality, and integrity. Therefore, there is a great need to create a defense mechanism to counteract this problem. This study therefore was focused on modeling a packet sniffer utilizing machine learning techniques to identify denial of service (DOS) attack packets at the network layer of the OSI model. The overall purpose of the study was to capture and interpret packets transmitted over a local area ne
APA, Harvard, Vancouver, ISO, and other styles
29

Clark, Robert G., and Valerie M. Jones. "Use of LOTOS in the formal development of an OSI protocol." Computer Communications 15, no. 2 (1992): 86–92. http://dx.doi.org/10.1016/0140-3664(92)90128-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Martynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.

Full text
Abstract:
The paper discusses the main stages of development of cryptographic protocols from SSL 2.0 (Secure Socket Layer) to TLS 1.3 (Transport Layer Security), which ensure the protection of transport layer data in the OSI model. A brief description of the modification of the RuTLS protocol based on TLS 1.3 and their main differences is given. The development of IPsec, which provides cryptographic protection of communications at the network level of the OSI model, is considered using examples of the development of the three most commonly used protocols. These include IKE (Internet Key Exchange), AH (A
APA, Harvard, Vancouver, ISO, and other styles
31

Yuliia, KOSTIUK, and SHESTAK Yaroslav. "THE TRANSPORT LAYER OF THE ISO/OSI MODEL IN COM­PUTER NETWORKS." INTERNATIONAL SCIENTIFIC-PRACTICAL JOURNAL "COMMODITIES AND MARKETS" 40, no. 4 (2021): 49–58. http://dx.doi.org/10.31617/tr.knute.2021(40)05.

Full text
Abstract:
Background. The transport layer is designed to deliver data without errors, losses and duplication in the order in which they were transmitted. It provides data transfer between two applications with the required level of reliability. Transport layer protocols, which guarantee reliable data delivery, establish a virtual connection before data exchange and resend segments in case of loss or damage. The aim of the study was to determine the role of transport security protocols in computer networks. Materials and methods. To achieve the goal, the study used statistical analysis and a systematic a
APA, Harvard, Vancouver, ISO, and other styles
32

Ivanov, Valeriy, and Maxim Tereshonok. "Cross-Layer Methods for Ad Hoc Networks—Review and Classification." Future Internet 16, no. 1 (2024): 29. http://dx.doi.org/10.3390/fi16010029.

Full text
Abstract:
The OSI model used to be a common network model for years. In the case of ad hoc networks with dynamic topology and difficult radio communications conditions, gradual departure is happening from the classical kind of OSI network model with a clear delineation of layers (physical, channel, network, transport, application) to the cross-layer approach. The layers of the network model in ad hoc networks strongly influence each other. Thus, the cross-layer approach can improve the performance of an ad hoc network by jointly developing protocols using interaction and collaborative optimization of mu
APA, Harvard, Vancouver, ISO, and other styles
33

R, Gautam, Suyog P, and G. S. Nagaraja. "Analysis of SNMP Based Protocols in IoT and Real- World Scenarios." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 1867–71. http://dx.doi.org/10.22214/ijraset.2022.47293.

Full text
Abstract:
bstract: In the scenario of large organizations device management and maintenance plays an important role in proper functioning of network connected devices. SNMP (Simple NetworkManagement Protocol) is an internet Protocol running in the application layer of the OSI modelthat governs the functioning of the network devices such as routers, switches and access points. The implementation of SNMP is done mainly using UDP (User Datagram Protocol) which is best effort protocol leaving the responsibility of error correction to the application layer. Whatcan be gathered from the local device and what
APA, Harvard, Vancouver, ISO, and other styles
34

Ramadass, Parthasarathy, Manjula Sankar, and Shanmugapriyan J. "A Collective and Comparative Study of Various Routing Protocols and the Threats in MANET." International Journal of Knowledge and Systems Science 12, no. 1 (2021): 37–47. http://dx.doi.org/10.4018/ijkss.2021010103.

Full text
Abstract:
A collection of mobile nodes deployed with a temporary intention is called mobile ad hoc network (MANET). Every deployed node has the capable of connecting the network communication, and every node has the capable of configuring network communication. There are many routing procedures to discover the proper route from source to destination. The routing protocol helps to channelize the route from one point to other for establishment of the communication. This paper discusses the detailed and the elaborated study of the MANET security issues and the various routing protocols. Moreover, it descri
APA, Harvard, Vancouver, ISO, and other styles
35

Ryndin, A. V. "Method of priority multipath multimodal messages transmission." Sovremennaya nauka i innovatsii, no. 3 (39) (2022): 62–69. http://dx.doi.org/10.37493/2307-910x.2022.3.6.

Full text
Abstract:
The paper presents a method that allows to allocate protocol data units of multimodal messages at the transport layer of the OSI model, considering their priority. Its implementation in the AnyLogic simulation environment is developed, the results of simulation modeling are obtained with the developed method and without it.
APA, Harvard, Vancouver, ISO, and other styles
36

Elamin, Yasir Y., Marcelo Vailati Negrao, Frank V. Fossella, et al. "Results of a phase 1b study of osimertinib plus sapanisertib or alisertib for osimertinib-resistant, EGFR-mutant non–small cell lung cancer (NSCLC)." Journal of Clinical Oncology 40, no. 16_suppl (2022): 9105. http://dx.doi.org/10.1200/jco.2022.40.16_suppl.9105.

Full text
Abstract:
9105 Background: The aurora kinase and mTOR pathways are implicated in resistance to EGFR inhibitor osimertinib. Here, we investigated the safety and efficacy of the aurora kinase inhibitor alisertib and the mTOR inhibitor sapanisertib in combination with osimertinib. Methods: This is a phase 1b study with dose finding and expansion portions (NCT04479306). The dose finding portion used a Bayesian optimal interval (BOIN) design to assess two arms: osimertinib 80 mg daily in combination with alisertib 20 mg, 30 mg, and 40 mg daily day 1-21 of 28-day cycle (osi-ali arm) and osimertinib 80 mg dail
APA, Harvard, Vancouver, ISO, and other styles
37

Dudykevych, V. B., H. V. Mykytyn, and T. Y. Murak. "COMPLEX SECURITY SYSTEM OF A REGIONAL CORPORATE NETWORK BASED ON THE OSI MODEL AND THE "DEFENSE-IN-DEPTH" MODEL." Computer systems and network 7, no. 1 (2025): 119–30. https://doi.org/10.23939/csn2025.01.119.

Full text
Abstract:
The strategy of the EU Agency for Cybersecurity (ENISA) and Ukraine's Cybersecurity Strategy aims to develop and implement new approaches, methodologies, and technologies for addressing cybersecurity challenges in critical infrastructure sectors, particularly in ensuring data confidentiality within corporate networks. An analytical review of well-known corporate network security methods and technologies has been conducted in secure data exchange and storage; enhancement of security models, tools, and information protection systems; and the application of machine learning methods and neural net
APA, Harvard, Vancouver, ISO, and other styles
38

Wijaya, Liva, Nadia Shafira, Boy Abidin, Ayang Halim, Tri Bowo Hasmoro, and Budi Wiweko. "#162 : Effect of r-LH Supplementation in Controlled Ovarian Stimulation in Antagonist Protocol of IVF." Fertility & Reproduction 05, no. 04 (2023): 674. http://dx.doi.org/10.1142/s2661318223743916.

Full text
Abstract:
Background and Aims: Adding LH to FSH can increase the mean of retrieved oocytes and cumulative embryos. LH stimulates the theca cells to secrete androgens, which are converted to estrogens during folliculogenesis. Women with long GnRH agonist downregulation, GnRH antagonist protocol, poor ovarian reserve, and patients with hypogonadotropic hypogonadism may have advantages in using exogenous LH. Here we show our experience using r-LH in our clinic concerning oocyte retrieval and maturity rates. Methods: We retrospectively took data from patients who underwent antagonist protocol from January 2
APA, Harvard, Vancouver, ISO, and other styles
39

Shivaji Bhagat, Omkar. "Design and Implementation of Unified Diagnostic Service Protocol." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–7. https://doi.org/10.55041/isjem03373.

Full text
Abstract:
Abstract- Modern vehicles use the Electronics Control Unit (ECU) to control and monitor all the activities within the vehicle. The number of ECUs are increasing as the complexity of vehicles increases. All the ECUs present in the vehicles are communicated with each other via CAN protocol. Any malfunction in the ECU or abnormal behaviour of ECU is detected or understood by diagnostic services. CAN Protocol does not have advanced features like Diagnostic. The CAN protocol covers only the Physical and Data link layer of the OSI model. There is a need for a standardised diagnostic protocol which c
APA, Harvard, Vancouver, ISO, and other styles
40

Gu, Yong Hong, Wei Huang, and Qiao Li Yang. "Design and Implementation of a Multi-Channel HDLC Protocol Controller Based on FPGA." Advanced Materials Research 383-390 (November 2011): 6840–45. http://dx.doi.org/10.4028/www.scientific.net/amr.383-390.6840.

Full text
Abstract:
To transmit and receive data over any network successfully, a protocol is required to manage the flow. High-level Data Link Control (HDLC) protocol is defined in Layer 2 of OSI model and is one of the most commonly used Layer 2 protocol. HDLC supports both full-duplex and half-duplex data transfer. In addition, it offers error control and flow control. Currently on the market there are many dedicated HDLC chips, but these chips are neither of control complexity nor of limited number of channels. This paper presents a new method for implementing a multi-channel HDLC protocol controller using Al
APA, Harvard, Vancouver, ISO, and other styles
41

Cesarano, Sara, Paul Pirtea, Achraf Benammar, et al. "Are There Ovarian Responsive Indexes That Predict Cumulative Live Birth Rates in Women over 39 Years?" Journal of Clinical Medicine 11, no. 8 (2022): 2099. http://dx.doi.org/10.3390/jcm11082099.

Full text
Abstract:
Objective: Ovarian response indexes have been proposed in assisted reproductive technology (ART) in order to optimize live birth rates (LBR), adjusting ovarian stimulation (OS), and minimizing risks. Gonadotropin doses are commonly adjusted according to ovarian reserve parameters, including antral follicle count (AFC), anti-Mullerian hormone (AMH), and basal follicle stimulating hormone (FSH) levels. The retrospective assessment of ovarian responses allows one to identify three primary indexes: (i) follicular output rate (FORT), the ratio of the number of pre-ovulatory follicles obtained at OS
APA, Harvard, Vancouver, ISO, and other styles
42

Permana, Eka Ramdan, Fajar Nugraha Wahyu, Handri Taufik, and Thoyyibah T. "OSI AND TCP/IP REFERENCE MODELS IN ISLAMIC DEVELOPMENT AND THOUGHT AND THE HISTORY OF DISCOVERY IN THE HEYDAY OF ISLAM." Al-Risalah 15, no. 2 (2024): 477–90. https://doi.org/10.34005/alrisalah.v15i2.3687.

Full text
Abstract:
In the development of information technology, the reference model of OSI (Open Systems Interconnection) and TCP / IP (Transmission Control Protocol / Internet Protocol) has become the main foundation in the design and implementation of computer networks. However, the relationship between these models and Islamic thought and the history of discovery in the heyday of Islam has not been discussed in much depth. In this journal, we examine both reference models and relate them to Islamic thought and the history of discovery in the heyday of Islam. We highlight concepts in the OSI and TCP/IP models
APA, Harvard, Vancouver, ISO, and other styles
43

Hagawane, Priti Dattaray. "Design and Development of Automotive On-Board Diagnostic Protocol System." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–7. https://doi.org/10.55041/isjem03371.

Full text
Abstract:
Abstract- The increasing complexity of modern vehicles necessitates the use of multiple Electronics Control Units (ECUs) to manage and monitor various functions. Communication between these ECUs is facilitated by the Controller Area Network (CAN) protocol, which handles the Physical and Data Link layers of the OSI model but lacks advanced diagnostic capabilities. To address this, standardized diagnostic protocols such as On-Board Diagnostics (OBD2) have been developed, providing a comprehensive framework for fault detection and in-vehicle communication. This paper presents the design and imple
APA, Harvard, Vancouver, ISO, and other styles
44

Arinze, Echegu Darlington, and Chukwuemeka Odi Agwu. "A comprehensive examination of network protocols, including their fundamental principles, significance, and potential security ramifications in Uganda." INOSR EXPERIMENTAL SCIENCES 13, no. 12 (2020): 8–14. http://dx.doi.org/10.59298/inosres/2024/133814.000.

Full text
Abstract:
The fundamental protocols of networks provide the indispensable basis for communication networks in our digital era. They enable these systems and devices to exchange data seamlessly, even though they are diverse by nature. Technological development in Uganda happens at a fast pace, which requires the bare minimum of basic information, knowledge, and relevance of the Internet Protocols to support socioeconomic Darwinism. This article will delve into the intricacies of Ugandan network protocols, highlighting their role in safeguarding various technical services. This article aims to examine var
APA, Harvard, Vancouver, ISO, and other styles
45

Vinay, Nagarad Dasavandi Krishnamurthy. "Unified Diagnostic Services (UDS) in Automotive: A technical Study." European Journal of Advances in Engineering and Technology 8, no. 6 (2021): 70–73. https://doi.org/10.5281/zenodo.12737230.

Full text
Abstract:
The Engine Control Unit (ECU) stands as a cornerstone in the automotive sector, yet its design and diagnostic requirements vary widely among manufacturers. This lack of standardization poses challenges in calibration and maintenance, as only developers possess the expertise needed to navigate the intricacies of their respective ECUs. While each manufacturer implements its own diagnostic system within the ECU, adherence to common diagnostic standards is essential to ensure uniform behavior and interfaces across all ECUs. Consequently, a comprehensive diagnostic system must incorporate protocols
APA, Harvard, Vancouver, ISO, and other styles
46

Cockburn, A. "Efficient implementation of the OSI transport protocol checksum algorithm using 8/16-bit arithmetic." ACM SIGCOMM Computer Communication Review 17, no. 3 (1987): 13–20. http://dx.doi.org/10.1145/36727.36730.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Staalhagen, L. "A comparison between the OSI reference model and the B-ISDN protocol reference model." IEEE Network 10, no. 1 (1996): 24–33. http://dx.doi.org/10.1109/65.484229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Mitra, N., and S. D. Usiskin. "Relationship of the Signaling System No.7 protocol architecture to the OSI reference model." IEEE Network 5, no. 1 (1991): 26–37. http://dx.doi.org/10.1109/65.67857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Чистов, В. І., С. В. Осієвський, О. Ю. Несміян, А. В. Самокіш, Є. А. Толкаченко та С. М. Балакірєва. "Покращення показників ефективності з прихованості управління при передачі даних в інформаційно-телекомунікаційних мережах за допомогою методу генерації початкових номерів послідовності TCP-з'єднань". Системи обробки інформації, № 3 (170) (22 грудня 2022): 67–77. http://dx.doi.org/10.30748/soi.2022.170.09.

Full text
Abstract:
Аналіз відомих методів побудови мережевих стеганографічних каналів передачі даних показав, що технічна можливість використання особливостей протоколів моделі OSI з метою прихованої передачі даних існує в багатьох випадках. Найбільш ефективними методами, є методи, які засновані на протоколах моделі OSI від транспортного рівня і вище, що обумовлюється високою ресурсоємністю їх стегоаналізу. При розробці методу стеганографічної передачі даних основними вимогами стали: висока скритність процесу передачі повідомлень; достовірність доставки переданих повідомлень; достатня стеганографічна надмірність
APA, Harvard, Vancouver, ISO, and other styles
50

Aminu, Aminu Muazu, and Ismaila Audi Umar. "Network Configuration by Utilizing Cisco Technologies with Proper Segmentation of Broadcast Domain in FNAS-UMYUK Nigeria." Journal of Network Security and Data Mining 4, no. 1 (2021): 1–13. https://doi.org/10.5281/zenodo.4776375.

Full text
Abstract:
This research work will provide the needs for the Faculty of Natural &amp; and Applied Sciences of Umaru Musa Yar&rsquo;adua University Katsina Nigeria (FNAS-UMYUK) departments to communicate among themselves, in order to share and search on vital and useful information&rsquo;s which will enhance and promote research and learning. This work is strictly based on the movement of data in the seven layers of the Open System Interconnection (OSI) Model and IPv4 is the protocol used in this work. The design variation are based on primarily layer 2 and layer 3 to the access switches with different va
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!