Analysis of Seven Layered Architecture of Osi Model

2019 ◽  
Author(s):  
Brima Turay
Micromachines ◽  
2021 ◽  
Vol 12 (2) ◽  
pp. 183
Author(s):  
Jose Ricardo Gomez-Rodriguez ◽  
Remberto Sandoval-Arechiga ◽  
Salvador Ibarra-Delgado ◽  
Viktor Ivan Rodriguez-Abdala ◽  
Jose Luis Vazquez-Avila ◽  
...  

Current computing platforms encourage the integration of thousands of processing cores, and their interconnections, into a single chip. Mobile smartphones, IoT, embedded devices, desktops, and data centers use Many-Core Systems-on-Chip (SoCs) to exploit their compute power and parallelism to meet the dynamic workload requirements. Networks-on-Chip (NoCs) lead to scalable connectivity for diverse applications with distinct traffic patterns and data dependencies. However, when the system executes various applications in traditional NoCs—optimized and fixed at synthesis time—the interconnection nonconformity with the different applications’ requirements generates limitations in the performance. In the literature, NoC designs embraced the Software-Defined Networking (SDN) strategy to evolve into an adaptable interconnection solution for future chips. However, the works surveyed implement a partial Software-Defined Network-on-Chip (SDNoC) approach, leaving aside the SDN layered architecture that brings interoperability in conventional networking. This paper explores the SDNoC literature and classifies it regarding the desired SDN features that each work presents. Then, we described the challenges and opportunities detected from the literature survey. Moreover, we explain the motivation for an SDNoC approach, and we expose both SDN and SDNoC concepts and architectures. We observe that works in the literature employed an uncomplete layered SDNoC approach. This fact creates various fertile areas in the SDNoC architecture where researchers may contribute to Many-Core SoCs designs.


2021 ◽  
Vol 54 (7) ◽  
pp. 1-39
Author(s):  
Ankur Lohachab ◽  
Saurabh Garg ◽  
Byeong Kang ◽  
Muhammad Bilal Amin ◽  
Junmin Lee ◽  
...  

Unprecedented attention towards blockchain technology is serving as a game-changer in fostering the development of blockchain-enabled distinctive frameworks. However, fragmentation unleashed by its underlying concepts hinders different stakeholders from effectively utilizing blockchain-supported services, resulting in the obstruction of its wide-scale adoption. To explore synergies among the isolated frameworks requires comprehensively studying inter-blockchain communication approaches. These approaches broadly come under the umbrella of Blockchain Interoperability (BI) notion, as it can facilitate a novel paradigm of an integrated blockchain ecosystem that connects state-of-the-art disparate blockchains. Currently, there is a lack of studies that comprehensively review BI, which works as a stumbling block in its development. Therefore, this article aims to articulate potential of BI by reviewing it from diverse perspectives. Beginning with a glance of blockchain architecture fundamentals, this article discusses its associated platforms, taxonomy, and consensus mechanisms. Subsequently, it argues about BI’s requirement by exemplifying its potential opportunities and application areas. Concerning BI, an architecture seems to be a missing link. Hence, this article introduces a layered architecture for the effective development of protocols and methods for interoperable blockchains. Furthermore, this article proposes an in-depth BI research taxonomy and provides an insight into the state-of-the-art projects. Finally, it determines possible open challenges and future research in the domain.


2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
I Patias ◽  
V Georgiev

Abstract Issue Given the importance, of cloud environments for mobile telemedicine information systems, focus is given in this paper on the challenges rising. We discuss the pros of the access to computing services and resources on demand without having own infrastructures, and the need of advanced interoperability data formats and application program interfaces (APIs) to facilitate the usage of the infrastructure. Description of the problem Cloud-Oriented Architecture (COA) describes the architecture, where applications act as services and serve other applications in the cloud environment. The aim is IT infrastructure and software applications to be optimized for their use in cloud computing environments. But what happens in the specific field of health as data interoperability for mobile telemedicine information systems? Results Two architectures were presented using a patient's compliance and engagement solution. A simple Representational State Transfer (REST) based architectural style was implemented in a three-layered architecture first and then compared to a cloud federation model. In the second the interaction goes through the federation via a middleware layer. Internal operations of cloud providers in the federation are still transparent to the cloud users. The middleware layer aims to coordinate the interaction with cloud users and providers in the federation. But, to avoid delays in those interactions interoperability of data formats and APIs. Lessons A Fast Healthcare Interoperability Resources (FHIR) based application was developed. Mobile telemedicine information systems are a strong instrument in patients' compliance. Many systems have proved that the used resources combined can solve clinical and administrative problems in a secure environment. Key messages The use of cloud is wide spread in the health sector. The challenge is to combine this infrastructure into one federated platform and maximize the added value by using advanced interoperability data formats and APIs.


Author(s):  
Yunping Wu ◽  
Wei Wei ◽  
Tianyi Ding ◽  
Sheng Chen ◽  
Rui Zhai ◽  
...  

Two-dimensional (2D) heterostructures combine the advantageous features of different 2D materials and represent advanced electrode architectures for development of efficient energy storage devices. However, the common 2D heterostructures made by...


2011 ◽  
Vol 60 (4) ◽  
pp. 1788-1798 ◽  
Author(s):  
Marco Moretti ◽  
Alfredo Todini ◽  
Andrea Baiocchi ◽  
Giulio Dainelli

2018 ◽  
Vol 60 (5-6) ◽  
pp. 253-261
Author(s):  
Uwe Roth ◽  
Theophane Ngne Djoua

Abstract In this article, we propose an architecture that allows to exchange messages or data via a blockchain solution, while keeping the business process independent from the concrete blockchain. The project is the consequence of a need to have fast development of a blockchain based proof of concept that shows the feasibility of a business process, while knowing that in a future step the underlying blockchain solution has to be replaced for reasons of licensing or maximal data throughput. This is done by providing an architecture on base of layers, similar to the OSI-model, and encapsulates the used blockchain within a wrapper layer that covers all blockchain specific properties and only provides a transparent view on the reading or writing from and to the blockchain. The higher layers re-implement point-to-point communication and introduce confidentiality by the use of encryption techniques. The architecture has been tested and proven by implementing two different blockchain solutions that are shielded by specific wrapper layer implementations. This wrapper layer is responsible for the fragmentation of the sent data and their encapsulation into the concrete blockchain solution. The reconstruction of the data takes care of the data fragments being sent potentially out of order or being incomplete. A payload layer is introduced to provide point-to-point communication and to embed the main message inside a message structure. In collaboration with underlying layer it identifies for which message one is not the addressee and allow the underling layer to stop collecting unnecessary data. A crypto-layer finally provides ways of encrypting messages for one or many recipients. Having fixed layers not only allows to replace the underlying blockchain solution but also to extend or replace the other layers in case new security features or optimized protocols need to embedded. The proposed solution does not allow to use specific features like smart contracts and only provides undeniable tamper-proofed existence of a sent message.


Author(s):  
Yang Li ◽  
Yunlong Zhao ◽  
Bin Guo ◽  
Zhenhua Zhang ◽  
Qian Geng ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document