Explore chapters and articles related to this topic
Energy Management/For Going Green
Published in Dale R. Patrick, Stephen W. Fardo, Ray E. Richardson, Brian W. Fardo, Energy Conservation Guidebook, 2020
Dale R. Patrick, Stephen W. Fardo, Ray E. Richardson, Brian W. Fardo
In order to operate on computer networks, each system needs to be compatible with existing standards for computer networking. TCP/IP, which stands for Transmission Control Protocol / Internet Protocol is one of the standard protocols for communication via the Internet. Also, consideration must be made for formatting that is compatible with the World Wide Web (WWW). Any automation system that desires remote connectivity must be compatible with the languages that format WWW page layout, tags, links, and other types of tools available to authors and designers of WWW pages. These standards exist to ensure text and graphics can exist on a page that is viewable in a web browser. The first language was HTML, HyperText Markup Language, and most web pages are now authored with XML, or Extensible Markup Language. Other computer network considerations include the assigning of a unique address within a network, error checking, and ultimately a compatibility with existing Ethernet architecture for data transfer. Without compatibility with such standards, no HVAC automation system will be compatible with computer networks of today.
A Quick Perspective on the Current State of IoT Security
Published in Mahmoud Elkhodr, Qusay F. Hassan, Seyed Shahrestani, Networks of the Future, 2017
Musa G. Samaila, João B. F. Sequeiros, Acácio F. P. P. Correia, Mário M. Freire, Pedro R. M. Inácio
TLS is the successor of Secure Sockets Layer (SSL), a cryptographic protocol for providing secure Internet connection between a client and a server using TCP transport. The key difference between the two is that TLS supports newer cipher suites and provides message authentication. TLS is used to provide end-to-end secure communication for applications that require TCP as the underlying transport protocol, such as MQTT. TLS employs a handshake mechanism to negotiate different parameters to establish a secure connection between the client and the server. The protocol is made up of two layers: a record protocol for providing a secure connection and a handshake protocol for ensuring authentication between devices and negotiating the type of encryption algorithms to be used and cryptographic keys before data exchange.
The World Wide Web
Published in Akshi Kumar, Web Technology, 2018
The first version of the Web was all about building a “web of nodes” storing “hypertext pages” viewed by “browsers” on a network. HTTP and HTML were the primary mechanisms used to make the Web work. HTTP is the simple way by which one computer (the client) asks another system (a server) for web pages. HTML is the way those pages are written so any computer can understand them and display the pages correctly with the help of a web browser. And the URL provides a uniform notation scheme for addressing accessible resources (web pages) over the network, as it provides the “address” of a web page. More formally: HTTP (Hypertext Transfer Protocol): This is an application-layer protocol used to exchange information between a browser and a server. Detailed discussion on this is provided in Chapter 4.HTML (Hypertext Markup Language): This is the language used by the browser to display the text and graphics on a web page. Chapter 8 discusses three client-side technologies for building web pages—HTML, CSS (Cascading Style Sheets), and JavaScript.URL (Uniform Resource Locator): This is the “address” of a web page. When you click on a link in a web page, you are taken to a new location. The link contains the URL for your destination and follows a very specific syntax used in naming the destination. This is discussed in Chapter 1.
Application of the Internet of Things in the textile industry
Published in Textile Progress, 2019
Hitesh Manglani, George L. Hodge, William Oxenham
Using information available in the literature [39–42], application protocols are compared in Table 2. Each of the standards is divided into 4 categories: usage case; how it transports data; mechanism of data request and response; and finally, the mechanism to broadcast data. Prior to the comparison, it is helpful to appreciate HTTP REST, which has existed for a long time now and is quite well-established. The World Wide Web is based on the Hyper Text Transfer Protocol (HTTP). HTTP is a way to communicate data and file transfer. It is similar to hypertext documents, which include hyperlinks to other resources that the user can easily access. In a client-server model, HTTP functions as request-response protocol. For example, our web browsers are the client, and a computer hosting a website acts as a server. When a web browser submits an HTTP request to a server, the servers, in turn, respond with HTML files and other data.
Wireless Transmission and Logging of Measurement Data Through Cellular Networks
Published in NCSLI Measure, 2018
Harsshit Agrawaal, J. E. Thompson
The World Wide Web has been using HTTP (hypertext transfer protocol) for information transfer since 1990, and the version of the protocol is referred to as “HTTP/1.1”. The protocol is generally used for response and request data handling. It is a set of open-ended headers and methods that indicates the purpose of a request. A request is sent by a client to a server in the form of a method (HEAD, GET, POST, PUT, DELETE, etc.) followed by URI (uniform resource identifier), protocol version, request modifier, and client information. The GET method token was used in the code for this article for request, followed by the URI. The transfer of the resources happens using TCP (transmission control protocol). TCP manages the connection between the client and server. The GET method was chosen over POST method since the information content was not sensitive, but the code was tested for the POST and PUT methods also. HTTP request was used over TCP connection to send packets of information from client to server.
Ant Colony Optimization based on Pareto optimality: application to a congested router controlled by PID regulation
Published in Systems Science & Control Engineering, 2018
Samira Chebli, Ahmed Elakkary, Nacer Sefiani
The underlying protocols must take along the dimensions of current networks. The transmission control protocol (TCP)/Internet protocol (IP), which is a standard of network languages, is adopted on the Internet to communicate between machines around the world. This universal language makes working together IP and TCP, so that the IP packets do not get lost or do not arrive in duplicate and to make sure that the packet has arrived at its destination. However, when traffic increases, it may cause the network to become congested; a phenomenon quite common in routing. The routers, therefore, cannot cope and therefore they lose packets because there is no place to store them. Increasing the queue further worsens the phenomenon of congestion since the time taken by a packet to get to the head of the queue becomes too great. In addition to the queue saturation, these factors contribute to an overall slowdown of routers (Chiu & Jain, 1989; Ismail, El-Sayed, Elsaghir, & Morsi, 2014; Jacobson, 1988; Low, Paganini, & Doyle, 2002; Ohsaki, Sugiyama, & Imase, 2009).