1980
DOI: 10.1109/tcom.1980.1094702
|View full text |Cite
|
Sign up to set email alerts
|

OSI Reference Model--The ISO Model of Architecture for Open Systems Interconnection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
389
0
16

Year Published

1999
1999
2015
2015

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 1,118 publications
(405 citation statements)
references
References 4 publications
0
389
0
16
Order By: Relevance
“…A loose link between two nodes is still reliable but it does not guarantee the FIFO ordering; rather some messages take more time than others. A wireless link provides synchronous transmission of messages, but simultaneous messages may be lost if they are within reach of each other (message 1 [26], OSI model for short. This is considered as one of the standard models for describing networks and applications.…”
Section: Modeling Of Network Informationmentioning
confidence: 99%
“…A loose link between two nodes is still reliable but it does not guarantee the FIFO ordering; rather some messages take more time than others. A wireless link provides synchronous transmission of messages, but simultaneous messages may be lost if they are within reach of each other (message 1 [26], OSI model for short. This is considered as one of the standard models for describing networks and applications.…”
Section: Modeling Of Network Informationmentioning
confidence: 99%
“…A common model that underlies most networks is called the Open Systems Interconnection Basic Reference model (OSI model) [60]. It defines 7 network abstraction layers (Physical, Data link, Network, Transport, Session, Presentation and Application layer), and also contains a set of protocols.…”
Section: Current Network Technologymentioning
confidence: 99%
“…At the network and transport layers of the Internet [130], port scans are often a precursor to other network-level attacks. A port scan is an automatically-generated sequence of packets sent to a target network in order to probe and enumerate its connected hosts.…”
Section: Repetition-based Automationmentioning
confidence: 99%
“…In brief, the principle states that network and application protocol features are only justified at the lower layers of the network system if they optimize network-wide performance, all other complexity should be in the end hosts. This principle yields the lightweight and stateless Network Layer (Layer 3 in the OSI model [130]) which has allowed the Internet to become the dynamic patchwork of innovative applications that it is today. Unfortunately, the resulting properties of the Internet that make novel network applications possible without reengineering the network are the very same properties that facilitate adversarial automation.…”
Section: Root Causes Of Adversarial Automationmentioning
confidence: 99%