Search results

1 – 10 of over 25000
Article
Publication date: 1 April 1990

Ray Denenberg

The upper three OSI layers support the communication requirements of applications, while the lower four layers provide reliable transmission of data. This article describes the…

Abstract

The upper three OSI layers support the communication requirements of applications, while the lower four layers provide reliable transmission of data. This article describes the lower four layers. First, though, a brief overview of the layered model is presented including a summary of the upper three layers. Then a description of the lower three layers is followed by a discussion of data communication standards associated with specific layers. Architectural concepts are then explored: hierarchy and abstraction within the layers, levels of dialogue, internetworking, end‐to‐end communication, analysis of layer four, and a discussion of connection‐oriented, connectionless, and message‐oriented protocols and applications. The article concludes with a comparison of OSI and the de facto industry protocols, TCP/IP, which are currently used within the Internet.

Details

Library Hi Tech, vol. 8 no. 4
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 January 1985

Ray Denenberg

The need for standards allowing computer‐to‐computer communication, and examples of technical issues are discussed. The framework of the Open Systems Interconnection Reference…

Abstract

The need for standards allowing computer‐to‐computer communication, and examples of technical issues are discussed. The framework of the Open Systems Interconnection Reference Model, consisting of seven layers, each performing a distinct and defined function, is explained and illustrated. Sidebars feature: 1) public data networks and X.25, 2) OSI standards, and 3) the OSI layer functions. A glossary is included.

Details

Library Hi Tech, vol. 3 no. 1
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 June 2000

George K. Chako

Briefly reviews previous literature by the author before presenting an original 12 step system integration protocol designed to ensure the success of companies or countries in…

7259

Abstract

Briefly reviews previous literature by the author before presenting an original 12 step system integration protocol designed to ensure the success of companies or countries in their efforts to develop and market new products. Looks at the issues from different strategic levels such as corporate, international, military and economic. Presents 31 case studies, including the success of Japan in microchips to the failure of Xerox to sell its invention of the Alto personal computer 3 years before Apple: from the success in DNA and Superconductor research to the success of Sunbeam in inventing and marketing food processors: and from the daring invention and production of atomic energy for survival to the successes of sewing machine inventor Howe in co‐operating on patents to compete in markets. Includes 306 questions and answers in order to qualify concepts introduced.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 12 no. 2/3
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 4 April 2016

Shancang Li, Theo Tryfonas and Honglei Li

The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various…

9951

Abstract

Purpose

The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications.

Design/methodology/approach

Security requirements and solutions are analysed based on a four-layer framework of IoT on sensing layer, network layer, service layer, and application layer. The cross-layer threats are analysed followed by the security discussion for the enabling technologies including identification and tracking technologies, WSN and RFID, communication, networks, and service management.

Findings

IoT calls for new security infrastructure based on the new technical standards. As a consequence, new security design for IoT shall pay attention to these new standards. Security at both the physical devices and service-applications is critical to the operation of IoT, which is indispensable for the success of IoT. Open problems remain in a number of areas, such as security and privacy protection, network protocols, standardization, identity management, trusted architecture, etc.

Practical implications

The implications to various applications including supervisory control and data acquisition, enterprise systems, social IoT are discussed. The paper will serve as a starting point for future IoT security design and management. The security strategies for IoT should be carefully designed by managing the tradeoffs among security, privacy, and utility to provide security in multi-layer architecture of IoT.

Originality/value

The paper synthesizes the current security requirements for IoT and provides a clear framework of security infrastructure based on four layers. Accordingly, the security requirements and potential threats in the four-layer architecture are provided in terms of general devices security, communication security, network security, and application security.

Details

Internet Research, vol. 26 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 19 October 2010

Usama Abdulazim Mohamed, Galal H. Galal‐Edeen and Adel A. El‐Zoghbi

The previous generations of implemented B2B e‐commerce hub solutions (e‐Marketplaces) did not successfully fulfil the requirements of buyers and suppliers (“Participants”) in…

2221

Abstract

Purpose

The previous generations of implemented B2B e‐commerce hub solutions (e‐Marketplaces) did not successfully fulfil the requirements of buyers and suppliers (“Participants”) in different business domains to carry out their daily business and online commercial transactions with one another because of their inappropriateness, and lack of flexibility. The limitations of these provided solutions came from a lot of architectural and technological challenges in the provided technical architectures that were used to build these solutions. This research aims to provide a proposed architecture to build integrated B2B e‐Commerce hub solutions. It also aims to make use of bottom‐up/top‐down approaches to building an integrated solution and to resolve the reasons for the failure of previous generations of B2B e‐commerce hubs.

Design/methodology/approach

The research uses the EDI reference model, which is provided by the ISO organization to survey and analyze the challenges of previous generations of B2B e‐Commerce hubs solutions and their architectures. The study develops a proposed solution architecture based on the recent approaches to building IOSs to build a B2B e‐commerce hub solution architecture that can be used to implement vertical B2B e‐commerce hubs (vertical e‐Marketplaces). The paper assesses the capabilities of the proposed solution architecture for building vertical B2B e‐Marketplaces by applying the proposed architecture to the building of a vertical B2B e‐Marketplace for the oil and gas sector in Egypt.

Findings

Previous B2B e‐Commerce hub initiatives failed to extend their products and services to their “Participants”, and required substantial investment and effort from each “Participant” to join such a B2B e‐Commerce hub. The failure of these IOS projects lies in their inability to integrate B2B e‐Commerce networks based on IOS and consequently, they supported very few partners and “Participants”. These IOS approaches did not resolve the existing challenges of B2B e‐Commerce hubs, especially in the realm of interoperability.

Originality/value

The main contribution of the proposed architecture comes from the creation of a clear automatic path between a business requirements layer and a technology layer by combining both Service Oriented Architecture and management requirements in a single framework to provide dynamic products and flexible services. It provides a complete Multi Channel Framework to resolve the interoperability challenges.

Details

Journal of Enterprise Information Management, vol. 23 no. 6
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 1 June 2005

John B. Meisel and Michael Needles

In the context of a current regulatory proceeding in the USA, the purpose of the paper is to argue for utilization of a new analytical framework to govern the regulation of the

2003

Abstract

Purpose

In the context of a current regulatory proceeding in the USA, the purpose of the paper is to argue for utilization of a new analytical framework to govern the regulation of the rapidly growing voice over internet protocol (VoIP) technology. Specifically, the paper recommends replacement of the Federal Communications Commission's (FCC) existing vertical regulatory structure with a new conceptual paradigm, a layered or horizontal model that more closely mirrors the structure of internet communications.

Design/methodology/approach

The paper briefly traces the evolution of the FCC's current regulatory structure and its previous treatment of internet telephony. Current petitions by individual telecommunications companies before the FCC and the agency's notice of proposed rulemaking on VoIP are analyzed and business and economic implications of VoIP are discussed.

Findings

The paper finds that utilization of a layered model enables policy makers to target regulation to specific sources of market power in the access layer and to attainment of social objectives such as wiretapping, while allowing free market competition to govern competitive layers of internet communications.

Practical implications

Regulatory policy in a world of VoIP technology must change. The FCC's old way of regulating in a world where individual communication services are linked to specific technologies must be replaced in the new internet world of converging services.

Originality/value

The paper builds on previous research outlining the layered model and applies this new conceptual framework to the current issues raised in the FCC rulemaking. The paper intends to provide guidance to telecommunications regulators.

Details

info, vol. 7 no. 3
Type: Research Article
ISSN: 1463-6697

Keywords

Open Access
Article
Publication date: 27 December 2021

Hristo Trifonov and Donal Heffernan

The purpose of this paper is to describe how emerging open standards are replacing traditional industrial networks. Current industrial Ethernet networks are not interoperable;…

3216

Abstract

Purpose

The purpose of this paper is to describe how emerging open standards are replacing traditional industrial networks. Current industrial Ethernet networks are not interoperable; thus, limiting the potential capabilities for the Industrial Internet of Things (IIoT). There is no forthcoming new generation fieldbus standard to integrate into the IIoT and Industry 4.0 revolution. The open platform communications unified architecture (OPC UA) time-sensitive networking (TSN) is a potential vendor-independent successor technology for the factory network. The OPC UA is a data exchange standard for industrial communication, and TSN is an Institute of Electrical and Electronics Engineers standard for Ethernet that supports real-time behaviour. The merging of these open standard solutions can facilitate cross-vendor interoperability for Industry 4.0 and IIoT products.

Design/methodology/approach

A brief review of the history of the fieldbus standards is presented, which highlights the shortcomings for current industrial systems in meeting converged traffic solutions. An experimental system for the OPC UA TSN is described to demonstrate an approach to developing a three-layer factory network system with an emphasis on the field layer.

Findings

From the multitude of existing industrial network schemes, there is a convergence pathway in solutions based on TSN Ethernet and OPC UA. At the field level, basic timing measurements in this paper show that the OPC UA TSN can meet the basic critical timing requirements for a fieldbus network.

Originality/value

This paper uniquely focuses on the specific fieldbus standards elements of industrial networks evolution and traces the developments from the early history to the current developing integration in IIoT context.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 7 June 2019

Shuai Luo, Hongwei Liu and Ershi Qi

The purpose of this paper is to propose a comprehensive framework for integrating big data analytics (BDA) into cyber-physical system (CPS) solutions. This framework provides a…

Abstract

Purpose

The purpose of this paper is to propose a comprehensive framework for integrating big data analytics (BDA) into cyber-physical system (CPS) solutions. This framework provides a wide range of functions, including data collection, smart data preprocessing, smart data mining and smart data visualization.

Design/methodology/approach

The architecture of CPS was designed with cyber layer, physical layer and communication layer from the perspective of big data processing. The BDA model was integrated into a CPS that enables managers to make sound decisions.

Findings

The effectiveness of the proposed BDA model has been demonstrated by two practical cases − the prediction of energy output of the power grid and the estimate of the remaining useful life of the aero-engine. The method can be used to control the power supply system and help engineers to maintain or replace the aero-engine to maintain the safety of the aircraft.

Originality/value

The communication layer, which connects the cyber layer and physical layer, was designed in CPS. From the communication layer, the redundant raw data can be converted into smart data. All the necessary functions of data collection, data preprocessing, data storage, data mining and data visualization can be effectively integrated into the BDA model for CPS applications. These findings show that the proposed BDA model in CPS can be used in different environments and applications.

Details

Industrial Management & Data Systems, vol. 119 no. 5
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 10 July 2020

A.B. Feroz Khan and Anandharaj G

The purpose of the paper is to analyze the layer wise security issues in IoT and to obtain the effective security mechanism for jamming attack .

Abstract

Purpose

The purpose of the paper is to analyze the layer wise security issues in IoT and to obtain the effective security mechanism for jamming attack .

Design/methodology/approach

In this study, the authors proposed a multi layer security approach for the detection of DDoS in IoT environment, which protects the smart devices from DDoS, this scheme also reduces the computational cost in the network under mobility condition.

Findings

Even though many works have been done for the security of wireless sensor network (WSN), all works have focused on encryption which depends on the key management strategy. In this study, the authors proposed a multilayer approach to analyze the layer wise security issues and also proposed a threshold-based countermeasure (TBC) for replay attack in each layer.

Originality/value

The results indicate that the proposed algorithm lowers the computational costs and energy consumption than in modern schemes. Also, the proposed research work improves the scalability of sensor networks using the TBC.

Details

International Journal of Intelligent Unmanned Systems, vol. 9 no. 3
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 1 January 1986

Ray Denenberg

Vendors who are implementing the Standard Network Interconnection (SNI) protocols for computer to computer communications can now test their implementation against the LSP/SNI…

Abstract

Vendors who are implementing the Standard Network Interconnection (SNI) protocols for computer to computer communications can now test their implementation against the LSP/SNI Test Facility, which has been developed by the Library of Congress. The facility is intended to verify the correct functioning of the SNI protocols for the Open System Interconnection (OSI) layers. The development and use of the Test Facility are discussed.

Details

Library Hi Tech, vol. 4 no. 1
Type: Research Article
ISSN: 0737-8831

1 – 10 of over 25000