Explore chapters and articles related to this topic
Linking Factory Floor and the Internet
Published in Richard Zurawski, Industrial Communication Technology Handbook, 2017
Simple Network Management Protocol (SNMP) is a comparatively old protocol and has been designed for remote administration of networked devices. Data are represented in a tree structure called management information base (MIB) where each branch and each leaf have a unique identifier, called object identifier (OID). SNMP managers (i.e., the client that connects to an SNMP-enabled device) use this MIB to get extended information about the managed agent (i.e., the device that allows SNMP access, in the present case the gateway). The MIB is a static representation of all the objects available at the managed agent. As SNMP does not provide mechanisms to download the MIB from the agent, the information which OID stands for which data point needs to be transferred to the manager over mechanisms that are out of scope of SNMP (usually this is done by the administrator of the system during setup). SNMP is based on the connectionless UDP running on top of IP. This is rather efficient because of the low overhead, but unlike TCP, UDP does not guarantee delivery of packets, so packets can be lost on the network without being noticed by the sender.
Application Uncertainty Propagation
Published in Bin Jia, Ming Xin, Grid-based Nonlinear Estimation and Its Applications, 2019
For example, the input was split into multiple parts, e.g., four parts. If 20 space objects are propagated and each object has Np points to represent the uncertainty, each part contains 5Np points. Each part of the data is consumed by a mapper. The mapper implements the orbit propagation algorithm. Specifically, each point is propagated via Eq. (7.1). The output is the key-value pairs. The Key Value is represented by the space object identifier. In the shuffling phase, the output of mappers is consolidated into relevant data according to the key value. Finally, in the reducing phase, the output of the shuffling phase is aggregated for each space object. The uncertainty for each space object is obtained as the output.
How Far Has the Development for Industrial Internet of Things (IoT) in Microalgae?
Published in Pau Loke Show, Wai Siong Chai, Tau Chuan Ling, Microalgae for Environmental Biotechnology, 2023
Vimal Angela Thiviyanathan, Hooi Ren Lim, Pei En Tham, Pau Loke Show
There are a few key elements that are required to deliver the functionality of the IoT system. These include identification, sensing, communication, computation, services, and schematics. Identification provides detailed information of the objects within a network. The identifiers can be categorised into three major groups that are object identifier, communication identifier, and application identifier. Object identifiers are physical or virtual objects. Communication identifiers differentiate nodes in a network that has communication abilities. Application identifiers are objects and local entities such as Uniform Resource Identifier (URI) and Uniform Resource Locator (URL) (Aftab et al., 2020).
Grounding data governance motivations: a review of the literature
Published in Journal of Decision Systems, 2022
Michael Joseph Walsh, John McAvoy, David Sammon
The revised search criteria resulted in 239 publications from Web of Science, 219 from Scopus, and 276 from EBSCO (see, Table 1). Duplicates were removed, using matches on the digital object identifier (DOI) reference. Comparisons was also used to remove additional duplicates based on the combination of title, author and source. The next phase (select) refined the collection using the sampling process from WOLFSWINKEL et al. (2013). A first pass removed any publications that did not relate to the theory or practice of DG implementation based on the title and a reading of the abstract. The remaining publications were further reduced following a reading of the full text. At the end of the second pass, 50 publications remained for analysis (see, Table 1).
Earth observations for sustainable development goals monitoring based on essential variables and driver-pressure-state-impact-response indicators
Published in International Journal of Digital Earth, 2020
Joan Masó, Ivette Serral, Cristina Domingo-Marimon, Alaitz Zabala
The graph is also distributed in turtle, one of the formats used in the Resource Description Framework (RDF) that can be integrated into the Linked Open Data (LOD). LOD is used as a mechanism of linking publicly available data ‘silos’ on the Internet by means of semantic methods and networks. By linking data, all of the objects (e.g. networks) become related to each other. By determining a number of rules about these relationships such inter-linked data can be ‘understood’ by machines and algorithms, which enables global data mining approaches and the discovery of truly new associations, patterns and knowledge (Lausch, Schmidt, and Tischendorf 2015). LOD relies on a RDF data model that is a list of triples composed by an object identifier, a relation and another object identifier. Identifiers are conceived to be global and should be unique in the Internet. Initially, the ENEON graph only presented networks (e.g. Ocean Biogeographic Information System (OBIS) or Global Forest Observations Initiative (GFOI)) of different types that were related in terms of collaboration or dependency between them (see Figure 5).
A paradigm for secure object access and unrestricted mobility in distributed systems
Published in International Journal of Parallel, Emergent and Distributed Systems, 2022
The sm-table of node N features an entry for each object that is active in N, irrespective of the node storing the pm-image of the object. The entry for object B includes: (i) object identifier B; (ii) the address of the sm-image of B in the secondary memory devices of node N; and (iii) node name . The sm-table of node N is accessed when an operation is executed on a given object whose sm-server is N. The object identifier is used to determine the address of the sm-image of the object in the secondary memory of N, and the location of the pm-image in the distributed primary memory.