osi reference model
Recently Published Documents


TOTAL DOCUMENTS

37
(FIVE YEARS 3)

H-INDEX

6
(FIVE YEARS 1)

Author(s):  
Andriy Dudnik ◽  
◽  
Ivan Bakhov ◽  
Oleksandr Makhovych ◽  
Yulia Ryabokin ◽  
...  

The paper discusses models and methods for improving the performance of wireless computer networks built based on the decomposition of the lower levels of the OSI reference model. A method to improve the performance of networks is suggested, which functionally combines the physical and network layers, which improves its efficiency in marginal reception areas almost twice. A model of the block diagram of a device for improving data transmission quality in marginal reception areas or those with insufficient noise immunity is developed based on the so-called communication quality status monitoring, as well as a model of the block diagram of a wireless adaptive capacity reallocation router based on dynamic channels capacity reallocation, which allows adequately reallocating IS resources depending on traffic and user priority. Keywords— Bluetooth, FIFO discipline, IEEE 802.11, OSI/ISO reference model, wireless computer networks.


With the extensive growth of in the size of data transmitted and received in the cloud, there arises the risk of sensitive data prone to different kinds of attacks. The attacks may be in the form of intrusions trying to hack the data or in the form of some fatal attacks. To focus more, after the extensive use of applications and social media apps, there is a rise in Application DDoS (Distributed Denial-of-Service) attacks. These attacks are called as L7 (Layer 7) of the OSI Reference model, as they target the topmost layer – the Application Layer. Various simulations in the Cloud have concluded that the cumulative energy consumption and huge amount of migrations on the VMs are severely affected by the Application DDoS attacks or the EDoS (Economic Denial of Sustainability) attacks. This paper discusses the various forms of Application DDoS attacks, the mitigation mechanisms for the Application DDoS attacks and compares the results in the simulated cloud environment.


Author(s):  
Thanakorn Uiphanit ◽  
Pattarasinee Bhattarakosol ◽  
Kwanrat Suanpong ◽  
Sompoch Iamsupasit

<p class="0abstract">This research aims to develop a game to teach the theoretical concepts of the OSI reference model to students who must learn data communication and networking as a compulsory or an elective subject. The survey was administered to most students at Suan Sunandha Rajabhat University by a questionnaire to assess a suitable game for students of this generation. The result showed that action games are the most popular game for them. Then, a script of the OSI reference model was drawn based on the theoretical contents and the software design and implementation were performed. After finishing this development process, 19 third-year undergraduate students majoring in information sciences at Suan Sunandha Rajabhat University tested this system. The evaluation process was performed using pretest and posttest data analyzed by a paired samples t-test at a 95% confidence level. The result of this study shows that the action game ‘Packet Warrior’ is an efficient tool to help students improve their learning capabilities via fun and good relationships with friends. </p>


2014 ◽  
Vol 7 (4) ◽  
pp. 214-218 ◽  
Author(s):  
Gaurav Bora ◽  
◽  
Saurabh Bora ◽  
Shivendra Singh ◽  
Sheikh Mohamad Arsalan

Author(s):  
Gábor Árpád Németh

This chapter gives a fundamental overview of communication protocol operation. The concept of layering is introduced along with the definitions of communication primitives, protocol and service data units, data encapsulation, and service access points. An example for layering – the OSI Reference Model – is also presented. The service provided by a protocol can be characterized based on the various distributed communication models and operational environments. The model of an operation environment along with its characteristics and the model of a communication node are introduced as well. Various communication problems, trigger conditions, and the purpose of the timer trigger condition are discussed. Protocol interaction scenarios are presented with respect to the number of participants and the reliability of the transmission medium. The characteristics of these dialogues are also introduced and discussed.


2010 ◽  
Vol 121-122 ◽  
pp. 228-231 ◽  
Author(s):  
Hao Zhang ◽  
Guo Huan Lou ◽  
Jiong Zhao Yang ◽  
Zheng Yao

Profibus and CAN bus are two kinds of widely used field bus in the industrial control field. However, this two bus protocol conversion devices are not introduced on the market, it can not meet the needs of users. Therefore, the design of a Profibus and CAN protocol translation ngateway is very important. By comparing the OSI reference model, the same points of Profibus and CAN bus can be found, their communication model structure is streamlined by the OSI model, they are only three layers, which makes it possible to interconnect them. This paper designs an embedded protocol conversion gateway, S3C2410 processor is used as main controller, SPC3 and SJA1000 are selected as Profibus and CAN protocol chips. The design has realized Profibus and CAN bus protocol conversion, using this gateway in industrial field can bring certain economic benefits for the enterprise.


Sign in / Sign up

Export Citation Format

Share Document