To see the other types of publications on this topic, follow the link: OSI protocol.

Journal articles on the topic 'OSI protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'OSI protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Swain, Leigh. "The OSI ILL Protocol:." Journal of Interlibrary Loan & Information Supply 1, no. 3 (1991): 11–15. http://dx.doi.org/10.1300/j472v01n03_03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bochmann, Gregor V. "Protocol specification for OSI." Computer Networks and ISDN Systems 18, no. 3 (1990): 167–84. http://dx.doi.org/10.1016/0169-7552(90)90132-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pehrson, Björn. "Protocol verification for OSI." Computer Networks and ISDN Systems 18, no. 3 (1990): 185–201. http://dx.doi.org/10.1016/0169-7552(90)90133-d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yusheng Liu and Doan B Hoang. "OSI RPC model and protocol." Computer Communications 17, no. 1 (1994): 53–66. http://dx.doi.org/10.1016/0140-3664(94)90018-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Poo, Gee Swee, and Wilson Ang. "OSI protocol choices for LAN environments." Computer Communications 13, no. 1 (1990): 17–26. http://dx.doi.org/10.1016/0140-3664(90)90032-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Annu, ., and Anil Dudy Dr. "Review of the OSI Model and TCP/IP Protocol Suite on Modern Network Communication." International Journal of Current Science Research and Review 07, no. 02 (2024): 1230–39. https://doi.org/10.5281/zenodo.10673276.

Full text
Abstract:
Abstract : Layered approaches to networking are possible. Network architects categorize protocols in order to simplify their designs. Each layer has its own protocol for talking to the outside world. Every component of the network implements some of the nth layer. Messages are sent back and forth between these parts. Layer n protocol data units [n-PDU] are the official name for these transmissions. All the steps necessary for efficient conversation are covered and these steps are organized into layers for easy comprehension. Layered architecture describes this kind of planning for a communications system. The OSI model is a framework for developing and implementing network-based software applications. It also serves as a basis for the development of new networking protocol hardware, and architectures. This document compares and contrasts the OSI Reference Model seven layers with those of the TCP/IP Model four. There are distinct roles at each successive level. All Internet communication duties may be traced back to the TCP/IP reference model.
APA, Harvard, Vancouver, ISO, and other styles
7

Ei, Ei Khaing. "Comparison of DOD and OSI Model in the Internet Communication." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 2574–79. https://doi.org/10.5281/zenodo.3591741.

Full text
Abstract:
The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP IP, because it's most important protocols, the Transmission Control Protocol TCP and the Internet Protocol IP , were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense. TCP IP provides end to end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. This functionality is organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved. From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment link the internet layer, connecting hosts across independent networks, thus establishing internetworking the transport layer handling host to host communication and the application layer, which provides process to process application data exchange. Our aim is describe operation and models of TCP IP suite in data communication networking. Ei Ei Khaing "Comparison of DOD and OSI Model in the Internet Communication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27834.pdf
APA, Harvard, Vancouver, ISO, and other styles
8

Fong, K., and J. Reinstedler. "Development of an OSI application layer protocol interface." ACM SIGCOMM Computer Communication Review 19, no. 3 (1989): 21–57. http://dx.doi.org/10.1145/74674.74676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

De Prycker, M., R. Peschi, and T. Van Landegem. "B-ISDN and the OSI protocol reference model." IEEE Network 7, no. 2 (1993): 10–18. http://dx.doi.org/10.1109/65.216906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

West, Colin H. "A validation of the OSI session layer protocol." Computer Networks and ISDN Systems 11, no. 3 (1986): 173–82. http://dx.doi.org/10.1016/0169-7552(86)90033-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Syihabuddin, Muhammad, and Jenih Jenih. "Implementasi Redundant Switch Menggunakan CISCO Catalyst Di PT. Citra Solusi Pratama." Jurnal Teknologi Informasi 7, no. 2 (2021): 77–85. http://dx.doi.org/10.52643/jti.v7i2.1900.

Full text
Abstract:
Spanning Tree protocol atau yang sering disingkat dengan STP adalah metode pada jaringan yang menjamin tidak adanya loop dalam jaringan. Dengan model jaringan OSI untuk jaringan komputer, STP ada di layer 2 OSI. Spanning tree protocol memperbolehkan desain jaringan memiliki redundant link untuk membuat jalur backup otomatis. Dengan menggunakan metode spanning tree protocol maka apabila perangkat switch cisco catalyst tersebut down maka akan berimbas pada jaringan tersebut karena sudah ada backup link. Apabila main link down atau terputus, maka port yang tadi terblok akan terbuka oleh switch, sehingga data dari komputer pengirim akan melewati redundant.Kata Kunci: Jaringan, Komputer, Spanning
APA, Harvard, Vancouver, ISO, and other styles
12

Revelli, Alberto, Gianluca Gennarelli, Valentina Biasoni, et al. "The Ovarian Sensitivity Index (OSI) Significantly Correlates with Ovarian Reserve Biomarkers, Is More Predictive of Clinical Pregnancy than the Total Number of Oocytes, and Is Consistent in Consecutive IVF Cycles." Journal of Clinical Medicine 9, no. 6 (2020): 1914. http://dx.doi.org/10.3390/jcm9061914.

Full text
Abstract:
Background and Objectives: Some biomarkers of ovarian responsiveness to gonadotropins and the total number of retrieved oocytes are known to affect the success rate after controlled ovarian stimulation (COS) and in vitro fertilization (IVF). The aim of this study was to study another putative marker, the Ovarian Sensitivity Index (OSI: (number of retrieved oocytes/total gonadotropin dose) × 1000), assessing whether (a) it correlates with ovarian responsiveness biomarkers, (b) it is an independent predictor of clinical pregnancy, (c) it predicts clinical pregnancy comparably to the number of retrieved oocytes, and (d) it is consistent in the repeated COS cycles of the same woman. Design: retrospective analysis. Setting: public IVF Unit in University Hospital. Cases and Measurements: 1612 patients submitted to 3353 IVF cycles were included, their OSI was calculated and it was correlated with the ovarian responsiveness biomarkers (age, BMI, anti-Mullerian hormone, antral follicle count). The OSI and the total number of oocytes were compared for their value in predicting clinical pregnancy. The inter-cycle consistency of the OSI was estimated in 209 patients who underwent two consecutive cycles in which the ovarian stimulation regimen was changed from the Gonadotropin-releasing Hormone (GnRH)-agonist long protocol to the GnRH-antagonist protocol or vice-versa. Results: The OSI turned out to be significantly related to age and BMI (inversely), the anti-Mullerian hormone (AMH) and the antral follicle count (AFC) (directly), to be an independent predictor of clinical pregnancy, and to correlate with clinical pregnancy better than the total number of oocytes (p < 0.0001 vs. <0.002). In patients who underwent two consecutive COS cycles changing stimulation regimen, the OSI showed 82% consistency. Conclusion(s): The OSI significantly correlates to the currently used biomarkers of ovarian responsiveness; it is an independent predictor of clinical pregnancy; it is more predictive of clinical pregnancy than the total number of oocytes, and is highly consistent in repeated IVF cycles even when the COS protocol changes. These characteristics make the OSI quite suitable to be incorporated into more complex prediction models of IVF outcome.
APA, Harvard, Vancouver, ISO, and other styles
13

Sija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.

Full text
Abstract:
A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches’ outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers’ OSI (Open Systems Interconnection) model.
APA, Harvard, Vancouver, ISO, and other styles
14

Zhang, Hao, Guo Huan Lou, Jiong Zhao Yang, and Zheng Yao. "Development and Research on Embedded Fieldbus Protocol Conversion Gateway." Advanced Materials Research 121-122 (June 2010): 228–31. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.228.

Full text
Abstract:
Profibus and CAN bus are two kinds of widely used field bus in the industrial control field. However, this two bus protocol conversion devices are not introduced on the market, it can not meet the needs of users. Therefore, the design of a Profibus and CAN protocol translation ngateway is very important. By comparing the OSI reference model, the same points of Profibus and CAN bus can be found, their communication model structure is streamlined by the OSI model, they are only three layers, which makes it possible to interconnect them. This paper designs an embedded protocol conversion gateway, S3C2410 processor is used as main controller, SPC3 and SJA1000 are selected as Profibus and CAN protocol chips. The design has realized Profibus and CAN bus protocol conversion, using this gateway in industrial field can bring certain economic benefits for the enterprise.
APA, Harvard, Vancouver, ISO, and other styles
15

Huitema, C., and A. Doghri. "Defining faster transfer syntaxes for the OSI presentation protocol." ACM SIGCOMM Computer Communication Review 19, no. 5 (1989): 44–55. http://dx.doi.org/10.1145/74681.74685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Poo, Gee-Swee, and Wilson Ang. "Cut-through buffer management technique for OSI protocol stack." Computer Communications 14, no. 3 (1991): 166–77. http://dx.doi.org/10.1016/0140-3664(91)90068-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Callon, Ross W. "Integrated routing for multi-protocol TCP/IP-OSI environments." Computer Networks and ISDN Systems 23, no. 1-3 (1991): 185–90. http://dx.doi.org/10.1016/0169-7552(91)90105-l.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Ciminiera, L., C. Demartini, and A. Valenzano. "A practical study of semi-automatic OSI protocol implementation." Software: Practice and Experience 18, no. 3 (1988): 255–77. http://dx.doi.org/10.1002/spe.4380180306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Tuma, T., I. Fajfar, M. Perko, F. Bratkovič, and J. Puhan. "A Hands-On Approach to Teaching the Basic OSI Reference Model." International Journal of Electrical Engineering & Education 37, no. 2 (2000): 157–66. http://dx.doi.org/10.7227/ijeee.37.2.5.

Full text
Abstract:
A new local area network (LAN) concept designed for educational purposes is proposed based upon the standard RS232 protocol. The concept enables students to gain hands-on experience of all seven open system interconnection (OSI) layers. The proposed approach to teaching computer networks has proved very popular with students. At the same time students' comprehension of basic OSI concepts has improved considerably.
APA, Harvard, Vancouver, ISO, and other styles
20

Permana, Eka Ramdan, Fajar Nugraha Wahyu, Handri Taufik, and Thoyyibah T. "The OSI and TCP/ IP Reference Models in the Era of Industry 4.0." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 3 (2024): 936–42. http://dx.doi.org/10.57152/malcom.v4i3.1324.

Full text
Abstract:
The research aims to evaluate the integration and relevance of the Open Systems Interconnection (OSI) and TCP/IP (Transmission Control Protocol/Internet Protocol) Reference Models in the context of Industry 4.0. This study seeks to analyze the suitability of these models with the complex and dynamic networking environment of the present era and to propose modifications or strategies to enhance their performance and security within the context of Industry 4.0. The research method employed is descriptive research with a literature study design. This descriptive research method with a literature study design will aid in depicting and analyzing the OSI and TCP/IP reference models in the Industry 4.0 era. Primary data sources are derived from scholarly journals, reference books, and other relevant publications. Data analysis is conducted using a qualitative approach, wherein information from various sources will be thoroughly analyzed to identify patterns, trends, and relationships among the studied concepts. The research findings indicate that the difference between the OSI and TCP/IP models lies in their approaches and characteristics in regulating the process of data communication within networks. OSI emphasizes reliability at each layer, while TCP/IP views reliability as an end-to-end issue.
APA, Harvard, Vancouver, ISO, and other styles
21

Jakobs, Kai. "Why Then Did the X.400 E-mail Standard Fail? Reasons and Lessons to be Learned." Journal of Information Technology 28, no. 1 (2013): 63–73. http://dx.doi.org/10.1057/jit.2012.35.

Full text
Abstract:
The X.400-series of recommendations specifies the elements, protocols, and services of the e-mail system associated with the Open Systems Interconnection (OSI) protocol stack. The paper looks at the various reasons that led to X.400's failure to gain the widely expected level of market acceptance. A brief literature review suggests that common explanations for success in a standards battle cannot explain the demise of X.400. The same holds for two popular explanations for the victory of Internet over OSI. Therefore, alternative reasons are proposed and discussed, including poor timing of the standardisation activity, inadequate first implementations, and an ill-advised paradigm shift that occurred in the cause of events. Finally, some lessons to be learned for the future are identified.
APA, Harvard, Vancouver, ISO, and other styles
22

Jafri, Syed Talib Abbas, Irfan Ahmed, Sundus Ali, Jamaiah Yahaya, Faizan Qamar, and Zuriani Hayati Abdullah. "Split Hop Penalty for Transmission Quality Metrics in a Better Approach to Mobile Ad Hoc Networking (BATMAN) for IoT-Based MANET." Symmetry 15, no. 5 (2023): 969. http://dx.doi.org/10.3390/sym15050969.

Full text
Abstract:
Various routing protocols have been developed for wireless ad hoc networks to shift from infrastructure-based networks to self-controlling and self-configurable networks. These ad hoc networks are easy to implement and have plenty of application in the fields of healthcare, transportation, smart cities, etc. Although almost all of the routing protocols work on the Open Systems Interconnection (OSI) model’s network layer, a few routing protocols support routing on the data link layer of the OSI model rather than the conventional one. One of these routing protocols include the Better Approach To Mobile Ad Hoc Networking (BATMAN). Though BATMAN is a comparably new routing protocol and included in the Linux kernel, it suffers from performance deterioration and latency issues that need to be addressed especially in the Internet of Things (IoT). This paper presents a symmetry-based split hop penalty for BATMAN version 4 to improve the network’s performance in multi-hop scenarios. Split hop penalty defines two different sets of penalties to accommodate the routing protocol metric based on the interface media type. The experiments were conducted within the campus building of the university with physical nodes, and the obtained results highlight that overall performance is improved in terms of throughput, latency, and jitter while no performance gain is measured in packet loss and routing loops that are still present.
APA, Harvard, Vancouver, ISO, and other styles
23

Mustafa, Dülger. "DETEL SERIAL DATA TRANSMISSION PROTOCOL FOR THE COMMUNICATION OF AN IBM-PC WITH THE MDxx SERIES OF PROGRAMMABLE LOGIC CONTROLLERS." Global Journal of Engineering Science and Research Management 6, no. 5 (2019): 105–15. https://doi.org/10.5281/zenodo.3235361.

Full text
Abstract:
In this paper a new serial transmission protocol, <em>DETEL</em>, is designed and presented. <em>DETEL</em> protocol is developed to provide a reliable communication between an <em>IBM-PC</em> and a <em>Programmable Logic Controller, PLC, </em>of type <em>MDxx</em> series. Here the <em>IBM-PC</em> acts as a master (programmer) device and the <em>PLC</em> acts as a slave device. The integrity of the data to be transferred is discussed. OSI model of the <em>DETEL</em> protocol is presented.&nbsp; Link-layer and application-layer protocols are implemented. <em>DETEL</em> Protocol is implemented on both master and server side devices. A software driver is developed for the master device in C++. A micro-controller board, on which a virtual <em>PLC</em> machine of type <em>MDxx </em>series is installed, is used as a slave device. A driver for the slave device is developed in <em>avr-assembler</em> language.In this paper a new serial transmission protocol, <em>DETEL</em>, is designed and presented. <em>DETEL</em> protocol is developed to provide a reliable communication between an <em>IBM-PC</em> and a <em>Programmable Logic Controller, PLC, </em>of type <em>MDxx</em> series. Here the <em>IBM-PC</em> acts as a master (programmer) device and the <em>PLC</em> acts as a slave device. The integrity of the data to be transferred is discussed. OSI model of the <em>DETEL</em> protocol is presented.&nbsp; Link-layer and application-layer protocols are implemented. <em>DETEL</em> Protocol is implemented on both master and server side devices. A software driver is developed for the master device in C++. A micro-controller board, on which a virtual <em>PLC</em> machine of type <em>MDxx </em>series is installed, is used as a slave device. A driver for the slave device is developed in <em>avr-assembler</em> language.
APA, Harvard, Vancouver, ISO, and other styles
24

Turner, Fay. "The interlibrary loan protocol: AN OSI solution to ill messaging." Library Hi Tech 8, no. 4 (1990): 73–82. http://dx.doi.org/10.1108/eb047809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Halsall, F., and N. Modiri. "Protocol analyser for the monitoring and analysis of OSI networks." Computer Communications 13, no. 9 (1990): 533–41. http://dx.doi.org/10.1016/0140-3664(90)90004-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Abdulameer Abdulmonim, Dhafer, and Zainab Hassan Muhamad. "Comparative Study Between the OSI Model and the TCP/IP Model: Architecture and Protocols in Computer Networking Systems." International Journal of Engineering and Computer Science 13, no. 08 (2024): 26358–72. http://dx.doi.org/10.18535/ijecs/v13i08.4880.

Full text
Abstract:
In the world of computing and networking, it is critical to understand the theoretical framework that underlies data communication to ensure the best performance and compatibility between various systems. Both the Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models offer a comprehensive perspective on how the entire communication operation is separated into various layers, with each layer assigned particular roles and functions. This paper compares the OSI and TCP/IP models in terms of the functionalities and responsibilities of the various layers in each model, with an emphasis on how these layers work together to ensure effective and robust network communications. The paper covers encapsulating and decapsulating processes, managing sessions, and ensuring reliable data transmission. The TCP/IP model focuses on practical application with four main layers, while the OSI model has seven detailed layers that provide a theoretical and structured approach. The goal of both models is reliable and standardized communication, which in turn promotes interoperability in a variety of network environments.
APA, Harvard, Vancouver, ISO, and other styles
27

Venkatesh, Thamarai Kannan, and Chakravarthi Rekha. "Efficient addressing schemes for internet of things." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (2022): 4415–29. https://doi.org/10.11591/ijece.v12i4.pp4415-4429.

Full text
Abstract:
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with constrained application protocol (CoAP-DPMIP) and PMIPv6 with constrained application protocol (CoAP-PMIP). It also provides the optimized transmission path to reduce the delay handover in IoT network. The PMIPv6 described the IPv6 address of mobile sensor device for efficient mobility management. The network architecture explains three protocol layers of open systems interconnection model (OSI model). The OSI layers are data link layer, network layer and transport layer. We have proposed the distance estimation algorithm for efficient data frames transmission. This paper mainly focuses the secure data transmission with minimum loss of error. The evaluation result proved that proposed technique performance with delay, energy, throughput and packet delivery ratio (PDR). Also, it measures the computational time very effectively.
APA, Harvard, Vancouver, ISO, and other styles
28

Peacemark, Kipkorir, Ephantus Mwangi, and Jotham Wasike. "A Machine Learning-Based Packet Sniffer for Detection and Classification of the Denial-Of-Service Attack Packets at the Network Layer." International Journal of Research and Innovation in Applied Science X, no. V (2025): 568–82. https://doi.org/10.51584/ijrias.2025.100500051.

Full text
Abstract:
Cyber threats attacks have continued to evolve in complexity and sophistication, posing significant risks to an organization’s network infrastructure and sensitive data's availability, confidentiality, and integrity. Therefore, there is a great need to create a defense mechanism to counteract this problem. This study therefore was focused on modeling a packet sniffer utilizing machine learning techniques to identify denial of service (DOS) attack packets at the network layer of the OSI model. The overall purpose of the study was to capture and interpret packets transmitted over a local area network to detect and capture the DOS threats within the Open Systems Interconnection Model (OSI) network layer. This layer is prone to several attacks for instance, denial-of-service, routing protocol attacks, Port scanning and enumeration, and fragmentation-based attacks. This study, delved into detecting and capturing the denial of service threats at the third layer of the OSI model in a local area network. Some examples of DOS attacks are UDP flood which sends a significant quantity UDP (User Datagram Protocol) packets to the targeted systems and thereby exhausting network resources, ICMP flood which transmits a significant quantity of Internet Control Message Protocol (ICMP) packets to overwhelm network devices, SYN flood which takes advantage of the TCP three-way hand-shake procedure by sending a lot of SYN requests without carrying out the necessary handshake, using server resources and blocking valid connections.
APA, Harvard, Vancouver, ISO, and other styles
29

Clark, Robert G., and Valerie M. Jones. "Use of LOTOS in the formal development of an OSI protocol." Computer Communications 15, no. 2 (1992): 86–92. http://dx.doi.org/10.1016/0140-3664(92)90128-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Martynenkov, I. V. "THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec." Prikladnaya Diskretnaya Matematika, no. 51 (2021): 31–67. http://dx.doi.org/10.17223/20710410/51/2.

Full text
Abstract:
The paper discusses the main stages of development of cryptographic protocols from SSL 2.0 (Secure Socket Layer) to TLS 1.3 (Transport Layer Security), which ensure the protection of transport layer data in the OSI model. A brief description of the modification of the RuTLS protocol based on TLS 1.3 and their main differences is given. The development of IPsec, which provides cryptographic protection of communications at the network level of the OSI model, is considered using examples of the development of the three most commonly used protocols. These include IKE (Internet Key Exchange), AH (Authentication Header), and ESP (Encapsulation Security Payload). For the SSL/TLS and IPsec specifications, the basic handshake protocols and the main stages of their development are considered. The described handshakes include primary cryptographic information exchange cycles in the form of identifiers of interaction participants, one-time numbers, lists of supported cryptographic combinations. Authentication of participants based on certificates, shared symmetric keys, data exchange for establishing a shared Diffie — Hellman secret, development of key material for secret keys of communication sessions, message authentication, and other cryptographic parameters are presented. For different versions of SSL/TLS and IPsec, the logical structures of application data cryptographic protection functions are described.
APA, Harvard, Vancouver, ISO, and other styles
31

Yuliia, KOSTIUK, and SHESTAK Yaroslav. "THE TRANSPORT LAYER OF THE ISO/OSI MODEL IN COM­PUTER NETWORKS." INTERNATIONAL SCIENTIFIC-PRACTICAL JOURNAL "COMMODITIES AND MARKETS" 40, no. 4 (2021): 49–58. http://dx.doi.org/10.31617/tr.knute.2021(40)05.

Full text
Abstract:
Background. The transport layer is designed to deliver data without errors, losses and duplication in the order in which they were transmitted. It provides data transfer between two applications with the required level of reliability. Transport layer protocols, which guarantee reliable data delivery, establish a virtual connection before data exchange and resend segments in case of loss or damage. The aim of the study was to determine the role of transport security protocols in computer networks. Materials and methods. To achieve the goal, the study used statistical analysis and a systematic approach. Results. TCP provides reliable message transmission through the formation of logical connections, while allowing peers on the sending computer and the receiving computer to support data exchange in duplex mode. It also has the ability to seamlessly send a byte stream generated on one of the computers to any other computer connected to the network.In addition, TCP controls the connection load, UDP does not control anything but the integrity of the received datagrams. Conclusion. The difference between TCP and UDP is the so-called "delivery guarantee". TCP requires a response from the client to whom the data packet is delivered, confirmation of delivery, and for this he needs a pre-established connection. TCP is also considered reliable, unlike UDP, which is called "unreliable datagram protocol". TCP eliminates data loss, duplication and shuffling of packets, delays, UDP allows all this, and it does not need a connection to work., as a result of which the data is transferred on UDP, should manage received, even with losses.
APA, Harvard, Vancouver, ISO, and other styles
32

Ivanov, Valeriy, and Maxim Tereshonok. "Cross-Layer Methods for Ad Hoc Networks—Review and Classification." Future Internet 16, no. 1 (2024): 29. http://dx.doi.org/10.3390/fi16010029.

Full text
Abstract:
The OSI model used to be a common network model for years. In the case of ad hoc networks with dynamic topology and difficult radio communications conditions, gradual departure is happening from the classical kind of OSI network model with a clear delineation of layers (physical, channel, network, transport, application) to the cross-layer approach. The layers of the network model in ad hoc networks strongly influence each other. Thus, the cross-layer approach can improve the performance of an ad hoc network by jointly developing protocols using interaction and collaborative optimization of multiple layers. The existing cross-layer methods classification is too complicated because it is based on the whole manifold of network model layer combinations, regardless of their importance. In this work, we review ad hoc network cross-layer methods, propose a new useful classification of cross-layer methods, and show future research directions in the development of ad hoc network cross-layer methods. The proposed classification can help to simplify the goal-oriented cross-layer protocol development.
APA, Harvard, Vancouver, ISO, and other styles
33

R, Gautam, Suyog P, and G. S. Nagaraja. "Analysis of SNMP Based Protocols in IoT and Real- World Scenarios." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 1867–71. http://dx.doi.org/10.22214/ijraset.2022.47293.

Full text
Abstract:
bstract: In the scenario of large organizations device management and maintenance plays an important role in proper functioning of network connected devices. SNMP (Simple NetworkManagement Protocol) is an internet Protocol running in the application layer of the OSI modelthat governs the functioning of the network devices such as routers, switches and access points. The implementation of SNMP is done mainly using UDP (User Datagram Protocol) which is best effort protocol leaving the responsibility of error correction to the application layer. Whatcan be gathered from the local device and what may be modified and set are specified by SNMPManagement Information Bases, or MIBs for short.
APA, Harvard, Vancouver, ISO, and other styles
34

Ramadass, Parthasarathy, Manjula Sankar, and Shanmugapriyan J. "A Collective and Comparative Study of Various Routing Protocols and the Threats in MANET." International Journal of Knowledge and Systems Science 12, no. 1 (2021): 37–47. http://dx.doi.org/10.4018/ijkss.2021010103.

Full text
Abstract:
A collection of mobile nodes deployed with a temporary intention is called mobile ad hoc network (MANET). Every deployed node has the capable of connecting the network communication, and every node has the capable of configuring network communication. There are many routing procedures to discover the proper route from source to destination. The routing protocol helps to channelize the route from one point to other for establishment of the communication. This paper discusses the detailed and the elaborated study of the MANET security issues and the various routing protocols. Moreover, it describes about the OSI model with the relationship of security systems. The elaborated and the detailed approach of the various protocol helps to build a progressive idea of the MANET security. Various issues and the overcomes help to find the loopholes of the threats, and it clearly explains the analysis of the MANET efficiency. The simulation analysis helps to know the comparison analysis of various protocols.
APA, Harvard, Vancouver, ISO, and other styles
35

Ryndin, A. V. "Method of priority multipath multimodal messages transmission." Sovremennaya nauka i innovatsii, no. 3 (39) (2022): 62–69. http://dx.doi.org/10.37493/2307-910x.2022.3.6.

Full text
Abstract:
The paper presents a method that allows to allocate protocol data units of multimodal messages at the transport layer of the OSI model, considering their priority. Its implementation in the AnyLogic simulation environment is developed, the results of simulation modeling are obtained with the developed method and without it.
APA, Harvard, Vancouver, ISO, and other styles
36

Elamin, Yasir Y., Marcelo Vailati Negrao, Frank V. Fossella, et al. "Results of a phase 1b study of osimertinib plus sapanisertib or alisertib for osimertinib-resistant, EGFR-mutant non–small cell lung cancer (NSCLC)." Journal of Clinical Oncology 40, no. 16_suppl (2022): 9105. http://dx.doi.org/10.1200/jco.2022.40.16_suppl.9105.

Full text
Abstract:
9105 Background: The aurora kinase and mTOR pathways are implicated in resistance to EGFR inhibitor osimertinib. Here, we investigated the safety and efficacy of the aurora kinase inhibitor alisertib and the mTOR inhibitor sapanisertib in combination with osimertinib. Methods: This is a phase 1b study with dose finding and expansion portions (NCT04479306). The dose finding portion used a Bayesian optimal interval (BOIN) design to assess two arms: osimertinib 80 mg daily in combination with alisertib 20 mg, 30 mg, and 40 mg daily day 1-21 of 28-day cycle (osi-ali arm) and osimertinib 80 mg daily in combination with sapanisertib 2 mg and 3 mg daily (osi-sapa arm). Dose limiting toxicities (DLTs) were predefined in the protocol. Patients with EGFR (L858R/exon 19 deletion) mutant NSCLC whose disease have progressed on osi and up to one additional line of systemic therapy were assigned, at investigator discretion, to either study arm. Tumor biopsy was mandatory at study entry and optional upon progression. Results: As of February 1, 2022, 40 patients are enrolled (20 in each arm). One DLT was observed in each arm: grade 3 nausea in ali-osi arm and grade 3 AST elevation in osi-sapa arm. Grade 3 treatment emergent adverse events (TEAEs) occurred in 10% of each arm, and no grade 4 TEAEs were observed. The most common TEAEs in osi-ali arm was leucopenia (45%) and anemia (35%) while in osi-sapa arm, hyperglycemia (45%) and stomatitis (40%). In osi-ali arm (n = 20), median progression free survival (mPFS) was 1.9 months while objective response rate (ORR) and disease control rate (DCR) were 5% (95% CI: 0.1 ̃ 24.9%) and 40% (95% CI: 19.1 ̃ 63.9%), respectively. In osi-sapa arm (n = 16, evaluated for response to date), mPFS was 4.6 months while ORR and DCR were 12.5% (95% CI: 1.6 ̃ 38.3%) and 68.7% (95% CI: 35.7 ̃ 82.7%), respectively. Conclusions: Osimertinib with alisertib or sapanisertib is well tolerated in osimertinib-resistant, EGFR mutant NSCLC. The sapanisertib combination, but not the alisertib combination, demonstrates antitumor activity suggesting that mTOR inhibition warrants further exploration in this population. Biomarker analysis is ongoing to identify the molecular determinants of response and resistance to sapasertib. Clinical trial information: NCT04479306.
APA, Harvard, Vancouver, ISO, and other styles
37

Dudykevych, V. B., H. V. Mykytyn, and T. Y. Murak. "COMPLEX SECURITY SYSTEM OF A REGIONAL CORPORATE NETWORK BASED ON THE OSI MODEL AND THE "DEFENSE-IN-DEPTH" MODEL." Computer systems and network 7, no. 1 (2025): 119–30. https://doi.org/10.23939/csn2025.01.119.

Full text
Abstract:
The strategy of the EU Agency for Cybersecurity (ENISA) and Ukraine's Cybersecurity Strategy aims to develop and implement new approaches, methodologies, and technologies for addressing cybersecurity challenges in critical infrastructure sectors, particularly in ensuring data confidentiality within corporate networks. An analytical review of well-known corporate network security methods and technologies has been conducted in secure data exchange and storage; enhancement of security models, tools, and information protection systems; and the application of machine learning methods and neural network technologies for anomaly detection in corporate networks. A comprehensive security system for a regional corporate network is presented based on the seven-layer OSI model, the "defense-in-depth" model, and the "threat–security technologies" concept, which is universal for different network topologies and enables the design of information protection systems at each OSI layer by regulatory requirements. Software for the cryptographic protection of information at the transport network layer of the OSI model has been developed using the symmetric block cipher AES-256, implemented in Python. This solution is practically realized through the OpenVPN protocol and TLS transport layer technology, ensuring a high level of data confidentiality in regional corporate networks. Keywords: corporate network, OSI reference model, defense-in-depth model, comprehensive security system, random and targeted threats, transport layer, data encryption.
APA, Harvard, Vancouver, ISO, and other styles
38

Wijaya, Liva, Nadia Shafira, Boy Abidin, Ayang Halim, Tri Bowo Hasmoro, and Budi Wiweko. "#162 : Effect of r-LH Supplementation in Controlled Ovarian Stimulation in Antagonist Protocol of IVF." Fertility & Reproduction 05, no. 04 (2023): 674. http://dx.doi.org/10.1142/s2661318223743916.

Full text
Abstract:
Background and Aims: Adding LH to FSH can increase the mean of retrieved oocytes and cumulative embryos. LH stimulates the theca cells to secrete androgens, which are converted to estrogens during folliculogenesis. Women with long GnRH agonist downregulation, GnRH antagonist protocol, poor ovarian reserve, and patients with hypogonadotropic hypogonadism may have advantages in using exogenous LH. Here we show our experience using r-LH in our clinic concerning oocyte retrieval and maturity rates. Methods: We retrospectively took data from patients who underwent antagonist protocol from January 2021- January 2023 in Mbrio IVF Clinic Jakarta. Forty-three patients were stimulated by r-FSH (n=9) and a combination of r-FSH and r-LH (co-treatment) (n = 34) for 9-11 days and triggered by r-HCG or dual trigger (r-HCG and GnRHa). We statistically analyzed the retrieval rate, maturation rate, and OSI (ovarian sensitivity index) by independent-T and Mann-Whitney U tests. The level of significance was set at p &lt; 0.05. Results: The mean age (33 vs. 35 yo), estrogen level, and trigger treatment were similar in both groups. The median AMH level in group r-FSH was higher than the co-treatment group (p 0.012; 4.44 vs. 1.75). The median retrieval and mean maturation rates were equivalent in both groups (100% vs. 90.9%; 78.5% vs. 80%). The OSI was higher in r-FSH than the second group but statistically insignificant. (p 0.20; 5.42 vs. 3.29). Conclusions: Adding LH to FSH in antagonist protocol gives both groups the same retrieval and maturity rate. Although they had comparable OSI, the AMH level in the co-treatment was lower than in the first group. The lower AMH level group gets advantages from the co-treatment in this data. We need larger data and complex analysis to validate the result.
APA, Harvard, Vancouver, ISO, and other styles
39

Shivaji Bhagat, Omkar. "Design and Implementation of Unified Diagnostic Service Protocol." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–7. https://doi.org/10.55041/isjem03373.

Full text
Abstract:
Abstract- Modern vehicles use the Electronics Control Unit (ECU) to control and monitor all the activities within the vehicle. The number of ECUs are increasing as the complexity of vehicles increases. All the ECUs present in the vehicles are communicated with each other via CAN protocol. Any malfunction in the ECU or abnormal behaviour of ECU is detected or understood by diagnostic services. CAN Protocol does not have advanced features like Diagnostic. The CAN protocol covers only the Physical and Data link layer of the OSI model. There is a need for a standardised diagnostic protocol which can use CAN as underlying technology. Standardised diagnostic protocols used in the automotive domain are On Board Diagnostics (OBD) and Unified Diagnostic services (UDS). UDS protocol is defined under the ISO 14229 standard and provides a standardized framework for in-vehicle communication and fault diagnosis. This project focuses on the design and implementation of the UDS protocol on an embedded system using STM32F407 microcontrollers. The project involves developing a diagnostic communication system between Electronic Control Units (ECUs) Light Control Module (LCM) and Tester tool connected over a CAN bus. Keywords- Unified Diagnostic Services (UDS), ISO 14229, Electronic Control Unit (ECU), Body Control Module (BCM), Light Control Module (LCM), Controller Area Network (CAN), Diagnostic Trouble Code (DTC), Routine Control Identifier (RID), Data Identifier (DID), ISO-TP (Transport Protocol)
APA, Harvard, Vancouver, ISO, and other styles
40

Gu, Yong Hong, Wei Huang, and Qiao Li Yang. "Design and Implementation of a Multi-Channel HDLC Protocol Controller Based on FPGA." Advanced Materials Research 383-390 (November 2011): 6840–45. http://dx.doi.org/10.4028/www.scientific.net/amr.383-390.6840.

Full text
Abstract:
To transmit and receive data over any network successfully, a protocol is required to manage the flow. High-level Data Link Control (HDLC) protocol is defined in Layer 2 of OSI model and is one of the most commonly used Layer 2 protocol. HDLC supports both full-duplex and half-duplex data transfer. In addition, it offers error control and flow control. Currently on the market there are many dedicated HDLC chips, but these chips are neither of control complexity nor of limited number of channels. This paper presents a new method for implementing a multi-channel HDLC protocol controller using Altera FPGA and VHDL as the target technology. Implementing a multi-channel HDLC protocol controller in FPGA offers the flexibility, upgradability and customization benefits of programmable logic and also reduces the total cost of every project which involves HDLC protocol controllers.
APA, Harvard, Vancouver, ISO, and other styles
41

Cesarano, Sara, Paul Pirtea, Achraf Benammar, et al. "Are There Ovarian Responsive Indexes That Predict Cumulative Live Birth Rates in Women over 39 Years?" Journal of Clinical Medicine 11, no. 8 (2022): 2099. http://dx.doi.org/10.3390/jcm11082099.

Full text
Abstract:
Objective: Ovarian response indexes have been proposed in assisted reproductive technology (ART) in order to optimize live birth rates (LBR), adjusting ovarian stimulation (OS), and minimizing risks. Gonadotropin doses are commonly adjusted according to ovarian reserve parameters, including antral follicle count (AFC), anti-Mullerian hormone (AMH), and basal follicle stimulating hormone (FSH) levels. The retrospective assessment of ovarian responses allows one to identify three primary indexes: (i) follicular output rate (FORT), the ratio of the number of pre-ovulatory follicles obtained at OS completion over AFC; (ii) follicle oocyte index (FOI), the ratio of oocytes retrieved over AFC; (iii) ovarian sensitivity index (OSI), the ratio of oocytes retrieved over the total gonadotropin dose administered. In recent publications, these indexes were reported to predict ART outcome. In the present study, we assessed the ability of these indexes to predict cumulative ART outcome in women ≥39 years. Materials and Methods: Retrospective cohort study. All patients ≥39 years who performed their first ART cycle with an antagonist protocol in our center between 01/2018 and 04/2020 were included. Patients with basal FSH &gt; 20 IU/l, AMH &lt; 0.1 ng/mL and severe male factors (azoospermia with testicular biopsy) were excluded. All patients received both recombinant FSH and human menopausal gonadotropin (hMG). Cumulative live birth rate (cLBR) was the primary outcome. Secondary outcomes included: the number of MII oocytes, cumulative implantation (cIR), and usable blastulation rates. Logistic regressions were performed to assess the predictive values of FORT, FOI, and OSI in cLBR and embryo culture success. For each parameter, the ability of the logistic regression models to predict embryo culture success was quantified by the area under the ROC curve (AUC). Only the significant findings related to FORT, FOI, and OSI were included in the multiple logistic regression model. Linear regression models were performed between cIR, cLB, FORT, FOI, and OSI. Each statistic model was adjusted for age. Concerning OR for OSI, values were multiplied *100 due to the very low value. Results: 429 patients met the inclusion criteria. There were 298 obtained usable blastocysts after ART treatment. Age-adjusted OSI was significantly associated with cLBR [OR = 17.58 95% CI (5.48–56.40), AUC = 0.707 95% CI (0.651–0.758)) and cIR (beta = 30.22 (SE: 7.88), p &lt; 0.001, R2= 0.060). Both FOI (OR = 6.33 95% CI (3.27–12.25), AUC = 0.725 95% CI (0.675–0.771), R2 = 0.090, p &lt; 0.001) and OSI (OSI*100; OR = 1808.93 95% CI (159.24–19,335.13), AUC = 0.790 95% CI (0.747–0.833), R2 = 0.156, p &lt; 0.001) were independently, when age adjusted, associated with embryo culture success. OSI showed a main performance to explain successful embryo culture than FOI (R2 = 0.156 vs. R2 = 0.090, p &lt; 0.001). In the age-adjusted linear regression model, FOI (R2 = 0.159, p &lt; 0.001), OSI (R2 = 0.606, p &lt; 0.001), and FORT (r2 = 0.030, p &lt; 0.001) were predictive of the number of MII oocytes collected. Furthermore, for OSI (r2 = 0.759, p &lt; 0.001) and FOI (r2 = 0.297, p &lt; 0.001), the correlation with the number of metaphase II oocytes collected was significantly higher in the non-linear regression model. Conclusions: Our findings suggest that the best index, among those analyzed, to predict cIR and cLBR, is OSI. Both OSI and FOI predict embryo culture with success, but OSI is more accurate. OSI, FOI, and FORT are significantly related to the number of MII oocytes obtained.
APA, Harvard, Vancouver, ISO, and other styles
42

Permana, Eka Ramdan, Fajar Nugraha Wahyu, Handri Taufik, and Thoyyibah T. "OSI AND TCP/IP REFERENCE MODELS IN ISLAMIC DEVELOPMENT AND THOUGHT AND THE HISTORY OF DISCOVERY IN THE HEYDAY OF ISLAM." Al-Risalah 15, no. 2 (2024): 477–90. https://doi.org/10.34005/alrisalah.v15i2.3687.

Full text
Abstract:
In the development of information technology, the reference model of OSI (Open Systems Interconnection) and TCP / IP (Transmission Control Protocol / Internet Protocol) has become the main foundation in the design and implementation of computer networks. However, the relationship between these models and Islamic thought and the history of discovery in the heyday of Islam has not been discussed in much depth. In this journal, we examine both reference models and relate them to Islamic thought and the history of discovery in the heyday of Islam. We highlight concepts in the OSI and TCP/IP models that may have relevance to values, principles, or scholarly contributions established by Muslim scholars in the past. also reviews how these models can provide inspiration in developing contemporary Islamic thought, especially in the context of information and communication technology. In addition, we discuss the history of inventions in the heyday of Islam to provide an in-depth historical context related to the development of modern information technology. It is expected to contribute to the understanding of the relationship between Islamic thought and modern information technology, as well as stimulate further discussion and research in this field.
APA, Harvard, Vancouver, ISO, and other styles
43

Hagawane, Priti Dattaray. "Design and Development of Automotive On-Board Diagnostic Protocol System." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–7. https://doi.org/10.55041/isjem03371.

Full text
Abstract:
Abstract- The increasing complexity of modern vehicles necessitates the use of multiple Electronics Control Units (ECUs) to manage and monitor various functions. Communication between these ECUs is facilitated by the Controller Area Network (CAN) protocol, which handles the Physical and Data Link layers of the OSI model but lacks advanced diagnostic capabilities. To address this, standardized diagnostic protocols such as On-Board Diagnostics (OBD2) have been developed, providing a comprehensive framework for fault detection and in-vehicle communication. This paper presents the design and implementation of the OBD2 protocol on an embedded system using STM32F407 microcontrollers. The project aims to establish a diagnostic communication system between ECUs and Tester Tool. Primary function of this ECU is to measure ambient temperature and Throttle Position. ECU and Tester tools are connected via a CAN bus. The implementation leverages the ISO 15031 standard to ensure reliable and standardized diagnostic services. Keywords: On-Board Diagnostics (OBD2), ISO 15031, Electronic Control Unit (ECU), Body Control Module (BCM), Light Control Module (LCM), Controller Area Network (CAN), Diagnostic Trouble Code (DTC), Routine Control Identifier (RID), Data Identifier (DID), ISO-TP (Transport Protocol)
APA, Harvard, Vancouver, ISO, and other styles
44

Arinze, Echegu Darlington, and Chukwuemeka Odi Agwu. "A comprehensive examination of network protocols, including their fundamental principles, significance, and potential security ramifications in Uganda." INOSR EXPERIMENTAL SCIENCES 13, no. 12 (2020): 8–14. http://dx.doi.org/10.59298/inosres/2024/133814.000.

Full text
Abstract:
The fundamental protocols of networks provide the indispensable basis for communication networks in our digital era. They enable these systems and devices to exchange data seamlessly, even though they are diverse by nature. Technological development in Uganda happens at a fast pace, which requires the bare minimum of basic information, knowledge, and relevance of the Internet Protocols to support socioeconomic Darwinism. This article will delve into the intricacies of Ugandan network protocols, highlighting their role in safeguarding various technical services. This article aims to examine various tasks and duties associated with a technology, such as data transmission, its compatibility with other systems, and its broad support for emerging services like audio/video streaming and real-time communication. Furthermore, it frequently entails combining network protocols into protocol suites, either in the form of the TCP/IP (Transmission Control Protocol/Internet Protocol) or OSI (Open Systems Interconnection) model. Network protocols present numerous opportunities and challenges in Uganda. Examples include limited infrastructure, restricted rural connections, and financial constraints. Other than that, the report deals with some security issues caused by protocols and emphasises the importance of strong security measures like encryption, authentication, integrity verification, and access control protocols to protect Uganda’s digital infrastructure. We utilised relevant published data (2004–2014) from diverse, reliable databases. This highlights the significant role that network protocols play in Uganda’s technological progress. They emphasise the need for parties to adopt safe communication tactics in conjunction with the implementation of network security best practices. This will ensure that there is a permanent extension and owner data in a digital context. Keywords: Network Protocols, Fundamentals, Significance, Security, Uganda
APA, Harvard, Vancouver, ISO, and other styles
45

Vinay, Nagarad Dasavandi Krishnamurthy. "Unified Diagnostic Services (UDS) in Automotive: A technical Study." European Journal of Advances in Engineering and Technology 8, no. 6 (2021): 70–73. https://doi.org/10.5281/zenodo.12737230.

Full text
Abstract:
The Engine Control Unit (ECU) stands as a cornerstone in the automotive sector, yet its design and diagnostic requirements vary widely among manufacturers. This lack of standardization poses challenges in calibration and maintenance, as only developers possess the expertise needed to navigate the intricacies of their respective ECUs. While each manufacturer implements its own diagnostic system within the ECU, adherence to common diagnostic standards is essential to ensure uniform behavior and interfaces across all ECUs. Consequently, a comprehensive diagnostic system must incorporate protocols that facilitate seamless communication between diagnostic tools used by developers, testers, and repairers to access the ECU&rsquo;s diagnostic information. However, implementing these protocols for individual diagnostic systems and vehicle components demands considerable effort. ISO and SAE have defined various diagnostic systems tailored to specific requirements and vehicle diagnostics. Recognizing the perpetual challenge of integrating diagnostic systems for specific needs, developers often face prolonged development timelines. To mitigate this, developers can adopt a Unified Diagnostic Services (UDS) protocol, established by either ISO or SAE standards, to support a multitude of diagnostic standards. This study covers the background, general working of UDS, architecture and UDS message format.
APA, Harvard, Vancouver, ISO, and other styles
46

Cockburn, A. "Efficient implementation of the OSI transport protocol checksum algorithm using 8/16-bit arithmetic." ACM SIGCOMM Computer Communication Review 17, no. 3 (1987): 13–20. http://dx.doi.org/10.1145/36727.36730.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Staalhagen, L. "A comparison between the OSI reference model and the B-ISDN protocol reference model." IEEE Network 10, no. 1 (1996): 24–33. http://dx.doi.org/10.1109/65.484229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Mitra, N., and S. D. Usiskin. "Relationship of the Signaling System No.7 protocol architecture to the OSI reference model." IEEE Network 5, no. 1 (1991): 26–37. http://dx.doi.org/10.1109/65.67857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Чистов, В. І., С. В. Осієвський, О. Ю. Несміян, А. В. Самокіш, Є. А. Толкаченко та С. М. Балакірєва. "Покращення показників ефективності з прихованості управління при передачі даних в інформаційно-телекомунікаційних мережах за допомогою методу генерації початкових номерів послідовності TCP-з'єднань". Системи обробки інформації, № 3 (170) (22 грудня 2022): 67–77. http://dx.doi.org/10.30748/soi.2022.170.09.

Full text
Abstract:
Аналіз відомих методів побудови мережевих стеганографічних каналів передачі даних показав, що технічна можливість використання особливостей протоколів моделі OSI з метою прихованої передачі даних існує в багатьох випадках. Найбільш ефективними методами, є методи, які засновані на протоколах моделі OSI від транспортного рівня і вище, що обумовлюється високою ресурсоємністю їх стегоаналізу. При розробці методу стеганографічної передачі даних основними вимогами стали: висока скритність процесу передачі повідомлень; достовірність доставки переданих повідомлень; достатня стеганографічна надмірність використаного базового каналу передачі даних; простота реалізації методу. Таким вимогам відповідає протокол транспортного рівня – TCP (Transmission Control Protocol – протокол управління передачею). При використанні протоколів канального та мережевого рівнів моделі OSI, як технологічної основи для організації прихованого каналу передачі даних, приховування здійснюється за рахунок розміщення даних, факт передачі яких повинен бути прихований, у видимих полях заголовків відповідних протоколів, тобто у відкритому вигляді. У зв’язку із тим, що технологія IP-шифрування охоплює лише корисне навантаження протоколів мережевого рівня, то доцільним є використання протоколів транспортного рівня моделі OSI. На даному рівні найпоширенішим є протокол TCP, при цьому він стандартизований і використовується протиборчими сторонами, в тому числі й у військовій сфері. Достовірність доставки повідомлень досягається за рахунок процедури трьохетапного встановлення з'єднання і звітування факту доставки фрагментів. В основу розробленого методу покладено механізм генерації початкового номера послідовності (ISN – Initial Sequence Number) кожного TCP-з'єднання і кореляції байтів переданих (відкритих) даних і байтів повідомлень. Реалізація отриманих результатів забезпечить покращення показників ефективності заходів щодо прихованості управління при передачі даних в інформаційній телекомунікаційній мережі за рахунок розробки стеганографічного методу передачі даних, що використовує особливості протоколів транспортного рівня моделі мережевої взаємодії.
APA, Harvard, Vancouver, ISO, and other styles
50

Aminu, Aminu Muazu, and Ismaila Audi Umar. "Network Configuration by Utilizing Cisco Technologies with Proper Segmentation of Broadcast Domain in FNAS-UMYUK Nigeria." Journal of Network Security and Data Mining 4, no. 1 (2021): 1–13. https://doi.org/10.5281/zenodo.4776375.

Full text
Abstract:
This research work will provide the needs for the Faculty of Natural &amp; and Applied Sciences of Umaru Musa Yar&rsquo;adua University Katsina Nigeria (FNAS-UMYUK) departments to communicate among themselves, in order to share and search on vital and useful information&rsquo;s which will enhance and promote research and learning. This work is strictly based on the movement of data in the seven layers of the Open System Interconnection (OSI) Model and IPv4 is the protocol used in this work. The design variation are based on primarily layer 2 and layer 3 to the access switches with different variations of design which Spaning Tree Protocol (STP) design used for loop avoidance, Virtual Trucking Protocol (VTP) design used for trucking protocol, RIP for routing protocol and server farm design for resource services. The configuration processes of the various design models are based on the packet tracer simulator, and the simulation is conducted and we obtained the result that we are expected for the all proposed design models. Finally, FNAS-UMYUK proposed network designed results to a Scalable, redundant, fast convergence, resilient and easy troubleshooting as the objectives of the research work defined.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!