System Model and Network Model Sample Clauses

System Model and Network Model. Gateway Industrial server Industrial manufacture Awareness nodes/devices Internet Gateway User Gateway Awareness nodes/devices Industrial manufacture Industrial manufacture The system model shown in the fig. 1 is composed of industrial devices, industrial gateways, industrial servers and legitimate users. In an indus- trial environment, the underlying terminal device is used to collect real-time information, detect and monitor the real-time situation of the industry. In- dustrial devices are terminal devices in various IIoT working environments, such as sensor nodes and smart devices. These devices have low computing resources and storage resources. Because these devices are susceptible to physical capture, they are considered semi-trusted entities. The industrial gateway is a cluster head node in a specific IIoT area. The gateway is re- sponsible for controlling network data, network interoperability and security management. The gateway and the terminal device in the area are only func- tionally different. The gateway is also a special terminal device. Industrial servers are fully trusted entities in industrial environments. The server is responsible for managing the relevant information of the devices and users in the entire industrial environment. A legitimate user refers to the man- agement and operation personnel of a specific industrial area. Users are also semi-trusted entities. If a user needs to access a specific industrial device (including gateways and smart industrial devices) to obtain the status and data of the device, the user first needs to register himself as a legitimate user on a trusted industrial server. Similarly, all industrial devices and industrial gateways need to be registered on the industrial server before being deployed to the entire IIoT environment. There are three types of communication in the network model of this scheme: 1) the communication between the user and the server; 2) the com- munication between the server and the device; 3) the communication be- tween the device and the user. To achieve secure communication, secure key management between different devices is required. Only after the key management process has been successfully executed can keys for secure com- munication be established between entities. For example the user and the accessed device should authenticate each other with the help of the server. After the mutual authentication between the user and the device is successful, the two parties will establi...

Related to System Model and Network Model

  • HIV/AIDS Model Workplace Guidelines Grantee will: a. implement the System Agency’s policies based on the Human Immunodeficiency Virus/Acquired Immunodeficiency Syndrome (HIV/AIDS), AIDS Model Workplace Guidelines for Businesses at ▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇▇▇.▇▇.▇▇/hivstd/policy/policies.shtm, State Agencies and State Grantees Policy No. 090.021. b. educate employees and clients concerning HIV and its related conditions, including AIDS, in accordance with the Texas. Health & Safety Code §§ 85.112-114.

  • NON-NETWORK PROVIDER is a provider that has not entered into a contract with us or any other Blue Cross and Blue Shield plan. For pediatric dental care services, non-network provider is a dentist that has not entered into a contract with us or does not participate in the Dental Coast to Coast Network. For pediatric vision hardware services, a non-network provider is a provider that has not entered into a contract with EyeMed, our vision care service manager.

  • Model List your model number of the product you are bidding.

  • System Description The wet detention basin is designed to trap 80% of sediment in runoff and maintain pre-development downstream peak flows. The basin has two forebays (smaller ponds) located at the low end of two grass ▇▇▇▇▇▇. In addition to runoff conveyance, the grass ▇▇▇▇▇▇ also allow infiltration and filtering of pollutants, especially from smaller storms. The forebays are each 4 feet deep. They are connected to the main pool by 18 and 24-inch metal pipes that outlet onto a rock chute. The forebays will trap coarse sediments in runoff, such as road sands, thus reducing maintenance of the main basin. The main pool will trap the finer suspended sediment. To do this, the pond size, water level and outlet structures must be maintained as specified in this Agreement (see Figures 1, 2 and 3). The main basin receives runoff from a 67.1 acre drainage area (41.2 acres within the subdivision and 25.9 acres off- site drainage coming from the east). During high rainfall or snow melt events, the water level will temporarily rise and slowly drain down to the elevation of the control structure. The water level is controlled by a 12-inch concrete pipe extending through the berm in the northwest corner of the basin (see Figures 1 and 3). On the face of the 12- inch pipe, there is metal plate with a 3-inch drilled hole (orifice) with stone in front of it. This orifice controls the water level and causes the pond to temporarily rise during runoff events. Washed stone (1-2” diameter) is placed in front of the orifice to prevent clogging. High flows may enter the grated concrete riser or flow over the rock lined emergency spillway. “As-built” construction drawings of the basin, showing actual dimensions, elevations, outlet structures, etc. will be recorded as an addendum(s) to this agreement within 60 days after Waukesha County accepts verification of construction from the project engineer.

  • Service Description 2.1 General