Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
7
result(s) for
"OSI reference model"
Sort by:
Wired and Wireless Ethernet
by
Duntemann, Jeff
,
Upton, Eben
in
Computer hardware
,
Linux distributions
,
medium access mechanism
2016
This chapter is primarily about wired and wireless Ethernet (both of which are used a great deal with the Raspberry Pi) and focuses on the bottom four layers, including the transport layer, network layer, data link layer, and physical layer. One way to think of it is that the transport set is about moving data, whereas the top three layers, called the application set, are about processing data via networked applications. These layers are the application layer, presentation layer, and session layer. Wi‐Fi is analogous to Ethernet with wireless media, in that it too spans the data link and physical layers of the open system interconnection (OSI) model, with several variations of the medium access (MAC) mechanism and physical layers. Most models of the Raspberry Pi have a wired Ethernet port that is standard and will work without any tweaking on Linux distributions like Raspbian.
Book Chapter
System Architecture
by
Schroth, Christoph
,
Strassberger, Markus
,
Kosch, Timo
in
AutoNet domain
,
AutoNet, and MOST network layer
,
AutoNets, system architecture
2012
This chapter contains sections titled:
Domain View of AutoNets
ISO/OSI Reference Model View
Profiling
Standardised Architectures
Subsystem Architectures
Summary
References
Book Chapter
Transport Layer
by
Schroth, Christoph
,
Strassberger, Markus
,
Kosch, Timo
in
AutoNet transport
,
AutoNet, protocol stack
,
ISO/OSI reference model
2012
This chapter contains sections titled:
Transport Layer Integration in the AutoNet Generic Reference Protocol Stack
TCP in AutoNets
Summary
References
Book Chapter
Application of Storage Networks
by
Troppens, Ulf
,
Muller-Friedt, Wolfgang
,
Erkens, Rainer
in
adaptability and scalability of IT systems
,
data availability
,
data sharing
2009
This chapter contains sections titled:
- Definition of the Term ‘Storage Network’ Storage Sharing Availability of Data Adaptability and Scalability of IT Systems Summary
Book Chapter
Air Interface – Physical Layer
by
Eberspächer, Jörg
,
Hartmann, Christian
,
Vögel, Hans‐Jörg
in
adaptive frame synchronization
,
air interface and signaling procedure understanding
,
air interface – physical layer
2008
This chapter contains sections titled:
Logical channels
Physical channels
Synchronization
Mapping of logical onto physical channels
Radio subsystem link control
Channel coding, source coding and speech processing
Source coding and speech processing
Channel coding
Power‐up scenario
Book Chapter
Physical layer capture aware MAC for WLANs
by
Jeong, Jiwoong
,
Lee, Suchul
,
Kim, Chong-kwon
in
Access control
,
Access methods and protocols, osi model
,
Algorithms
2013
The physical layer capture (PLC) effect occurs frequently in the real wireless deployment; when two or more nodes transmit simultaneously, a receiver can successfully decode the collided frame if the signal strength of one frame is sufficiently high enough. Although the PLC effect increases the channel utilization, it results in an unfair channel access among the wireless nodes. In this paper, we propose a PLC-aware media access control (MAC) algorithm that employs the average waiting time as a common control reference. It enables the nodes to converge to a fair channel access by changing one of the IEEE 802.11 enhanced distributed channel access parameters: contention window, arbitration interframe space, or transmission opportunity. We then find multiple control references that meet the fair channel access constraint and obtain the near-optimal reference that maximizes the overall throughput. Through ns-2 simulations and real in-door experiments using the universal software radio peripheral platform, we evaluate the fairness and throughput performance of the PLC-aware MAC algorithm.
Journal Article
Toward a secure Kerberos key exchange with smart cards
by
Mavrogiannopoulos, Nikos
,
Pashalidis, Andreas
,
Preneel, Bart
in
Access
,
Access methods and protocols, osi model
,
Applied sciences
2014
Public key Kerberos (PKINIT) is a standard authentication and key establishment protocol. Unfortunately, it suffers from a security flaw when combined with smart cards. In particular, temporary access to a user’s card enables an adversary to impersonate that user for an indefinite period of time, even after the adversary’s access to the card is revoked. In this paper, we extend Shoup’s key exchange security model to the smart card setting and examine PKINIT in this model. Using this formalization, we show that PKINIT is indeed flawed, propose a fix, and provide a proof that this fix leads to a secure protocol.
Journal Article