Search results

1 – 10 of over 10000
To view the access options for this content please click here
Article
Publication date: 1 April 1994

R.E. Leon

In this article we review the Internet's protocols and mainstream services. Section I provides an overview of the Internet's history and its bodies. Section 2 looks at the…

Abstract

In this article we review the Internet's protocols and mainstream services. Section I provides an overview of the Internet's history and its bodies. Section 2 looks at the Internet's overall architecture and goals. The IP protocol which deals with data encapsulation and host addressing is reviewed in Section 3, whilst transport control protocols are discussed in Section 4. Section 5 looks at the mainstream services based on TCP/IP protocols, i.e. telnet, ftp, electronic mail, newsgroups and finger.

Details

Online and CD-Rom Review, vol. 18 no. 4
Type: Research Article
ISSN: 1353-2642

To view the access options for this content please click here
Article
Publication date: 1 December 1997

Dirk De Maeyer

Examines the Internet’s potential for becoming an information highway. Defines the information highway and the Internet. Describes the characteristics of an information…

Abstract

Examines the Internet’s potential for becoming an information highway. Defines the information highway and the Internet. Describes the characteristics of an information highway. The concept of an information highway puts some requirements on the infrastructure. The users of an information highway, who are located in the residential and business environment, have their share of requirements as well, but they focus on the requirements put forward by the services or applications they will use on an information highway. Checks whether the Internet has implemented these properties and how, or if work is going on to develop them. The framework for this discussion is the TCP/IP reference model. Places some emphasis on the IP next generation protocol, IP version 6 (IPv6). Provides an overview showing all the properties with an indication of how well the posed requirements are met. Concludes that the Internet certainly has potential for becoming an information highway.

Details

Internet Research, vol. 7 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 9 October 2019

Elham Ali Shammar and Ammar Thabit Zahary

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this…

Abstract

Purpose

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.

Design/methodology/approach

A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.

Findings

Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.

Originality/value

This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

To view the access options for this content please click here
Article
Publication date: 1 June 2002

George K. Chacko

Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade…

Abstract

Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange for Auto Parts procurement by GM, Ford, Daimler‐Chrysler and Renault‐Nissan. Provides many case studies with regards to the adoption of technology and describes seven chief technology officer characteristics. Discusses common errors when companies invest in technology and considers the probabilities of success. Provides 175 questions and answers to reinforce the concepts introduced. States that this substantial journal is aimed primarily at the present and potential chief technology officer to assist their survival and success in national and international markets.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 14 no. 2/3
Type: Research Article
ISSN: 1355-5855

Keywords

To view the access options for this content please click here
Article
Publication date: 1 February 1989

Clifford A. Lynch

Over the past eight years, the MELVYL catalog has become one of the largest public access catalogs in the world, and now plays a central role in providing access to the…

Abstract

Over the past eight years, the MELVYL catalog has become one of the largest public access catalogs in the world, and now plays a central role in providing access to the library resources of the University of California. Currently, under heavy load, the MELVYL catalog supports many hundreds of simultaneous terminal connections, servicing over a quarter of a million queries a week and displaying more than two million records a week to its user community. This article discusses the history of the network that has supported the MELVYL catalog from the early days of its prototype to the present. It also describes both the current technical and policy issues that must be addressed as the network moves into the 1990s, and the roles that the network is coming to play in integrating local automation, the union catalog, access to resource databases, and other initiatives. Sidebars discuss the TCP/IP protocol suite, internet protocol gateways, and Telenet and related inter‐operability problems.

Details

Library Hi Tech, vol. 7 no. 2
Type: Research Article
ISSN: 0737-8831

To view the access options for this content please click here
Article
Publication date: 6 November 2020

Brenden Kuerbis and Milton Mueller

The data communications protocol supporting the internet protocol version 4 (IPv4) is almost 40 years old, and its 32-bit address space is too small for the internet. A…

Abstract

Purpose

The data communications protocol supporting the internet protocol version 4 (IPv4) is almost 40 years old, and its 32-bit address space is too small for the internet. A “next-generation” internet protocol version 6 (IPv6), has a much larger, 128-bit address space. However, IPv6 is not backward compatible with the existing internet. For 20 years, the internet technical community has attempted to migrate the entire internet to the new standard. This study aims to address important but overlooked questions about the internet’s technical evolution: will the world converge on IPv6? Will IPv6 die out? or will we live in a mixed world for the foreseeable future?

Design/methodology/approach

The research offers an economically-grounded study of IPv6’s progress and prospects. Many promoters of IPv6 sincerely believe that the new standard must succeed if the internet is to grow, and assume that the transition is inevitable because of the presumed depletion of the IPv4 address resources. However, by examining the associated network effects, developing the economic parameters for transition, and modeling the underlying economic forces, which impact network operator decisions, the study paints a more complex, nuanced picture.

Findings

The report concludes that legacy IPv4 will coexist with IPv6 indefinitely. IPv6 is unlikely to become an orphan. For some network operators that need to grow, particularly mobile networks where the software and hardware ecosystem is mostly converted, IPv6 deployment can make economic sense. However, the lack of backward compatibility with non-deployers eliminates many network effects that would create pressure to convert to IPv6. A variety of conversion technologies, and more efficient use of IPv4 addresses using network address translation, will support a “mixed world” of the two standards for the foreseeable future.

Originality/value

The authors’ conceptualization and observations provide a clearer understanding of the economic factors affecting the transition to IPv6.

Details

Digital Policy, Regulation and Governance, vol. 22 no. 4
Type: Research Article
ISSN: 2398-5038

Keywords

To view the access options for this content please click here
Article
Publication date: 1 April 1990

Ray Denenberg

The upper three OSI layers support the communication requirements of applications, while the lower four layers provide reliable transmission of data. This article…

Abstract

The upper three OSI layers support the communication requirements of applications, while the lower four layers provide reliable transmission of data. This article describes the lower four layers. First, though, a brief overview of the layered model is presented including a summary of the upper three layers. Then a description of the lower three layers is followed by a discussion of data communication standards associated with specific layers. Architectural concepts are then explored: hierarchy and abstraction within the layers, levels of dialogue, internetworking, end‐to‐end communication, analysis of layer four, and a discussion of connection‐oriented, connectionless, and message‐oriented protocols and applications. The article concludes with a comparison of OSI and the de facto industry protocols, TCP/IP, which are currently used within the Internet.

Details

Library Hi Tech, vol. 8 no. 4
Type: Research Article
ISSN: 0737-8831

To view the access options for this content please click here
Article
Publication date: 11 September 2017

Bradley Fidler

The purpose of this paper is to understand the emerging challenges of cybersecurity governance by analyzing the internet’s early history.

Abstract

Purpose

The purpose of this paper is to understand the emerging challenges of cybersecurity governance by analyzing the internet’s early history.

Design/methodology/approach

Tracing the design and management of early internet and network security technologies in the USA in the 1970s and 1980s.

Findings

The US Department of Defense separated the research and management regimes for networks and network security, with the latter restricted to military networks. As such, the absence of cybersecurity technologies on the early internet was not an oversight, but a necessary compromise. This ordering of networks and security had enduring technological, political and even cultural consequences, which are breaking down today.

Social implications

Political, technological and metaphoric distinctions between networks and security should be challenged; cybersecurity will transform internet governance.

Originality/value

New historical sources and analysis provide a novel perspective on contemporary challenges of cybersecurity governance.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

To view the access options for this content please click here
Article
Publication date: 1 July 2004

Stefanos Gritzalis

This paper presents a state‐of‐the‐art review of the Web privacy and anonymity enhancing security mechanisms, tools, applications and services, with respect to their…

Abstract

This paper presents a state‐of‐the‐art review of the Web privacy and anonymity enhancing security mechanisms, tools, applications and services, with respect to their architecture, operational principles and vulnerabilities. Furthermore, to facilitate a detailed comparative analysis, the appropriate parameters have been selected and grouped in classes of comparison criteria, in the form of an integrated comparison framework. The main concern during the design of this framework was to cover the confronted security threats, applied technological issues and users' demands satisfaction. GNUnet's Anonymity Protocol (GAP), Freedom, Hordes, Crowds, Onion Routing, Platform for Privacy Preferences (P3P), TRUSTe, Lucent Personalized Web Assistant (LPWA), and Anonymizer have been reviewed and compared. The comparative review has clearly highlighted that the pros and cons of each system do not coincide, mainly due to the fact that each one exhibits different design goals and thus adopts dissimilar techniques for protecting privacy and anonymity.

Details

Information Management & Computer Security, vol. 12 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

To view the access options for this content please click here
Article
Publication date: 1 March 1998

Barbara Shuh

The article traces the history of the ISO Interlibrary Loan Protocol, starting with the early implementation work in Canada and Europe to its current renaissance, driven…

Abstract

The article traces the history of the ISO Interlibrary Loan Protocol, starting with the early implementation work in Canada and Europe to its current renaissance, driven by the commitment of an international group of implementors and easy access to Internet communications network.

Details

Interlending & Document Supply, vol. 26 no. 1
Type: Research Article
ISSN: 0264-1615

Keywords

1 – 10 of over 10000