0% found this document useful (0 votes)
99 views13 pages

0912 0599 PDF

1) The document discusses conceptual models for communication, beginning with Shannon's model and progressing to more advanced forms including the OSI model. 2) It proposes a new flow-based conceptual model for communication that views the communication process as divided into spheres (sources, channels, destinations) with five internal stages: receiving, processing, creating, releasing, and transferring information. 3) This new model distinguishes between the flow of information and physical signals. It also treats communication participants and channels as active with interior stages rather than just send/receive systems.

Uploaded by

ronald
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views13 pages

0912 0599 PDF

1) The document discusses conceptual models for communication, beginning with Shannon's model and progressing to more advanced forms including the OSI model. 2) It proposes a new flow-based conceptual model for communication that views the communication process as divided into spheres (sources, channels, destinations) with five internal stages: receiving, processing, creating, releasing, and transferring information. 3) This new model distinguishes between the flow of information and physical signals. It also treats communication participants and channels as active with interior stages rather than just send/receive systems.

Uploaded by

ronald
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

(IJCSIS) International Journal of Computer Science and Information Security,

Vol. 6, No. 2, 2009

Conceptual Model for Communication


Sabah Al-Fedaghi Ala'a Alsaqa
Computer Engineering Department Computer Engineering Department
Kuwait University Kuwait University
P.O. Box 5969 Safat 13060 Kuwait P.O. Box 5969 Safat 13060 Kuwait
[email protected] [email protected]

Zahra'a Fadel
Computer Engineering Department
Kuwait University
P.O. Box 5969 Safat 13060 Kuwait
[email protected]

Abstract—A variety of idealized models of communication 2) furnish order and structure to multifaceted
systems exist, and all may have something in common. Starting communication events, and
with Shannon’s communication model and ending with the OSI 3) lead to insights into hypothetical ideas and relationships
model, this paper presents progressively more advanced forms of involved in communication.
modeling of communication systems by tying communication
models together based on the notion of flow. The basic A variety of communication systems models exist, and
communication process is divided into different spheres (sources, “perhaps they all [have] something in common” [12].
channels, and destinations), each with its own five interior stages: Shannon’s model of communication and its variations are the
receiving, processing, creating, releasing, and transferring of
most common models adopted in many fields. The seven-layer
information. The flow of information is ontologically
distinguished from the flow of physical signals; accordingly,
OSI model is well known as a reference model for describing
Shannon’s model, network-based OSI models, and TCP/IP are networks and network applications. It is a reference model for
redesigned. the five-layer TCP/IP model. The OSI model can also be
extended to include a human perspective, as will be described
in this paper.

Keywords-conceptual model, information communication, The need for a general communication model can be seen
communication systems in the evolution of the original Shannon’s model based on
efforts of engineers to find the most efficient way of
I. INTRODUCTION transmitting electrical signals. Nevertheless, the model has
been enhanced to interpret all instances of communication,
Communication is typically defined as a process of sending that is, to organize biological communication systems along
and receiving. Such a communication process can be found in the same lines as telecommunications systems, with the notion
many disciplines, ranging from psychology and sociology to of interactivity overcoming the linearity of the original model.
engineering, technology, and artificial intelligence.
Consequently, great interest has been shown in finding an Modeling communication is an evolutionary process in
idealized communication model that provides “both general which new concepts enhance and complement earlier
perspective and particular vantage points from which to ask communication models. This paper presents one more step in
questions and to interpret the raw stuff of observation” [8]. the evolutionary process of models with a proposal to base
modeling of communication on the notion of flow. It ties
A communication model is an idealized systematic communication models together through a flow model of
representation of the communication process. Such models communication that focuses on abstract description without
serve as standardization tools, and they provide the means to involving details of the communication environment. This
1) question and interpret actual communication systems that flow-based model contributes to building an idealized
are diverse in their nature and purpose, communication model through enhancing and integrating

29 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 6, No. 2, 2009
different conceptualizations of the communication process. It II. MODELS OF COMMUNICATION
is different from other models in three main aspects: Hartley [6] was the first to quantify “signals as means to
• Most current communication models treat participants convey information'” through the equation I = N log S, where I
(e.g., nodes) in the communicative act as a is the amount of information each message contains, N is the
send/receive system. In the flow-based model, the number of signs in a message, and S is the number of different
interior anatomy of the participants in the signs in the vocabulary. Shannon formalized information as
communication process includes stages of receiving, reduction of uncertainty: I = log2 C, where I is the amount of
processing, creating, release, and transfer of information each message contains, and C is the number of
information. This provides many advantages, such as possible choices. Shannon and Weaver [11] point out that
the ability to identify the participant’s role in transmission in such a model conveys physical codes. The
communication acts. For example, the sender may be "meaning" is taken out prior to transmission and reinstated after
just a mere receive-and-send agent (e.g., dumb reception through encoding and decoding, respectively.
terminal), or a source (creator) of the transferred Shannon’s model (Figure 1) has influenced all
information, and so forth. communication models. Shannon also introduced a mechanism
• Most current communication models do not explicitly that accounts for differences between the transmitted and
distinguish among different types of flow (e.g., received signals; this has evolved into the current feedback
information, messages, and signals). Such a concept.
conceptualization is analogous to representing the gas, If such a model were applied to human communication,
water, and electricity lines in the design of a building “effectively, the model proposes a speaker consisting only of a
by one type of arrow in the design blueprint. In the mind (the source) and a mouth (the transmitter), and a listener
flow-based model, each type of thing that flows has its consisting only of ears (the receiver) and a mind (the
own map of flow that can trigger other types of flow. destination). It therefore totally fails to reflect the many
• Most current idealized communication models do not intermediate cognitive processing stages” [12]. Accordingly,
grant the channel of communication full status as a cognitive communication models have expanded Shannon’s
participant in the communication process. In contrast, model to incorporate some of these intermediate cognitive
in our model, the channel incorporates full processing stages. Smith [12], as shown in Figure 2, illustrates
functionality equal to that of other participants; that is, how at least some of this intermediate processing can be
it receives, processes, creates, releases, and transfers represented. The model now includes three intermediate layers
information, as will be described. at either end of the transmission channel.

Information Transmitter Channel Receiver


source (Encoder) (Decoder) Destination

Noise
source

Figure 1. Shannon’s model of communication.

Node A Node B

Messages
Semantic Output Encode message Encode message Output Semantic
system A syntax and monitor and monitor syntax system B
feedback Feedback feedback

Figure 2. Idealized communication system (modified from Smith [12] after Osgood and Sebeok [9]).

30 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 6, No. 2, 2009
In our flow-based perspective, Shannon’s model reflects a III. OSI MODEL
limited view of states of entities being communicated, because The evolution of idealized communication models evolved
in such a model information is observed in either sent or with the seven-layered Open Systems Interconnection (OSI)
received states. Implicitly, the model indicates that information that includes many details such as authentication, routing
passes, or is transferred, through the presence of a channel in identification, governing, data compression and
the model. Such a view is analogous to conceptualizing the decompression, and detection of errors in transmission and
notion of travel as transfer from one point and arrival at arranging for their correction. In this paper, we concentrate on
another point. In a more comprehensive view, the process of its main feature as a model of communication.
(air) travel includes the notions of being received at the travel
station (airport), processed (e.g., luggage and passports), The seven layers of the OSI model were established in 1977
released to boarding (waiting for boarding), and actual transfer by the International Organization for Standardization. It is a
onto the plane. On the other end, after being transferred, reference tool for understanding data communications. It
passengers arrive, are processed, released, and then transfer represents the entire process of transmitting data from one
(leave for hotels). Similarly, information in the communication computer to another. It divides the communications process
stream is not just sent and received, but also has repeated into seven layers, as follows:
lifecycle states: received, processed (changing its form), Layer 7—Application layer: This is the "end-user" level of
created (generating information from information), released communication. It is the level of pragmatic exchange between
(e.g., waiting for channel to be available), and transferred. minds [12]. It is the point of origin of the message intended to
A basic claim in our communication model is that the life be communicated by a sender, and the point of final arrival of
cycle of information in any communication system consists of the message as interpreted by a receiver.
iterations of stages according to a state diagram that will be Layer 6—Presentation layer: This is the stage where surface
described later. The five stages are receiving, processing, syntactic structure is created in outgoing messages and
creation, release, and transfer. Life cycle refers to the “birth” interpreted in incoming ones. In computer networks, this is the
of a communicative act through initiation of a flow of level at which data encryption and compression take place.
information directed to a certain destination and the “decay” Layer 5—Session layer: This layer sets up, manages, and
of such an act through the seizure of flow of information. The terminates, when necessary, the lower layers of the
seizure or stoppage of flow of information can occur at any communication link. It identifies and authenticates the
point in the flow stream of information regardless of whether a recipients and controls the passing of Layer 6 information
destination is reached. The flow stream is successive stages of downward and upward. It also synchronizes the activities of
the stages described previously across different participants’ transmitting and receiving so that stations do not end up all
boundaries. talking at once.
Layer 4—Transport layer: This is where information from
In addition, in our flow-based perspective, Shannon’s layers 5–7 is translated into a format compatible with the
model does not reflect conceptually the ontological nature of physical link. This process includes error checking and peer-
communication. For example, it is very well known that a to-peer transmission acknowledgment. It begins the process of
communication act involves information, a message (symbolic message fragmentation into “packets,” manages the transfer
representation), and signals (e.g., physical or electronic session, and, in an analogy to human communication,
signals). The flow of these three types of things is represented frequently uses “facial expressions” and “gestures” to
by a single arrow between the sender and receiver. Such a exchange its Transport layer messages [12]. A receiving
conceptualization is analogous to representing the gas, water, Transport layer assembles incoming messages from its
and electricity lines in the design of a building by one type of transmission packets back into units that can be processed,
arrow in the design blueprint. Information is usually created such as words and phrases.
by the sender, while noise is created in the channel. The noise Layer 3—Network layer: This is where the transmission path
is physical signals. Conceptually, this noise ought not be is decided. This layer is needed only in large networks where
mixed with randomness (entropy) created at the source in there are optional routes between nodes.
some applications. Entropy is a “type of information,” while Layer 2—Data Link layer: This is where the information is
noise generated in the channel comprises physical signals. Of formed into transmittable signal strings utilizing such
course, noise interweaves with messages while being instruments as hubs and switches.
converted to signals for transmission purposes. Layer 1—Physical layer: This is the bit-level transmission
In the flow-based model, the thing that flows has its own layer. It transmits the signals in a particular format
map of flow that can trigger other types of flow. The criticisms characterized by connector types, cable types, voltages, and
outlined above can be applied to the next major development pin-outs.
in modeling of communication: the OSI model.

31 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 6, No. 2, 2009
Figure 3 illustrates the OSI communication system between Application (Layer 5): Handles everything else handled in
two nodes. the lower layers.
The OSI model explains networking in general terms. It has Transport (Layer 4): Manages all aspects of data routing and
been used as an educational tool and as an illustration of delivery, including session initiation, error control, and
interactions between communication protocol suites and sequence checking.
devices. Again, as with Shannon’s model, we see that the OSI Internet (Layer 3): Responsible for data addressing,
model is basically a send/receive model. The seven layers are transmission, and packet fragmentation and reassembly.
transformations of different things that flow. To simplify, a Network access (Layer 2): Specifies procedures for
user’s information is transformed to messages that are transmitting data across the network, including how to access
transformed to signals; thus, the thing that flows is different the physical medium.
along the communication chain. These characteristics are Physical (Layer 1): Covers the physical interface between a
conceptually disturbing. data transmission device and a transmission medium or
To complete the picture of important conceptualizations of network.
communication, we next describe the model of Transmission
Control Protocol/Internet Protocol (TCP/IP). V. THE FLOW MODEL
The flow model (FM) was introduced by Al-Fedaghi and
IV. TCP/IP MODEL has been used since 2006 in several applications such as
description of information flow. While this section reviews the
The Internet has given rise to TCP/IP (Transmission
basic seeking, information security, and database access control
Control Protocol/Internet Protocol) communication protocols.
aspects of the model to make the paper self-contained, it also
TCP/IP includes five layers that correspond in general to the presents new illustrations of the model.
OSI model (see Figure 4) and provides a framework for various
protocols such as HTTP (which runs the World Wide Web) and
FTP. The five layers of TCP/IP are described as follows:

Application layer Application layer


Presentation layer Presentation layer
Session layer Session layer
Transport layer Transport layer Node B
Node A
Network layer Network layer
Data link layer Data link layer
Transmission
Physical layer Physical layer
Channel

Figure 3. Seven-layer communication system (modified from Smith [12], simplified from Purser, 1987).

TCP/IP model OSI model

Application layer
Application layer
Presentation layer

Session layer

Transport layer Transport layer

Network layer Network layer

Data link layer Data link layer

Physical layer Physical layer

Figure 4. TCP/IP layers mapped to the OSI layers.

32 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 6, No. 2, 2009
FM has a number of different components and uses a 4) Information is transferred (disclosed) to another sphere
spatial assembly of these components relative to each other and (e.g., from a customer’s sphere to a retailer’s sphere).
to time, and it shows the links between the components that 5) Information is created (i.e., it is generated as a new
indicate the flow of items. To simplify this review of FM, we piece of information using different methods such as data
introduce flow in terms of information flow. mining).
Information goes through a sequence of states as it moves 6) Information is used (i.e., it is utilized in some action,
through stages of its lifecycle, as follows: analogous to police rushing to a criminal’s hideout after
receiving an informant’s tip). Using information indicates
1) Information is received (i.e., it arrives at a new sphere, directing or diverting the information flow to another type of
similar to passengers arriving at an airport). flow such as actions. We call this point a gateway in the flow.
2) Information is processed (i.e., it is subjected to some 7) Information is stored. Thus, it remains in a stable state
type of process, e.g., compressed, translated, mined). without change until it is brought back to the stream of flow
3) Information is disclosed/released (i.e., it is designated as again.
released information, ready to move outside the current 8) Information is destroyed.
sphere, such as passengers ready to depart from an airport).
The first five states of information form the main stages of
the stream of flow, as illustrated in Figure 5. When
Created
information is stored, it is in a substate because it occurs at
different stages: information that is created (stored created
information), processed (stored processed information), and
received (stored received/row information).
Processed Disclosed Transfer
The five-stage scheme can be applied to humans and to
organizations. It is reusable because a copy of it is assigned to
each agent or entity. Consider an information sphere that
includes a small organization with two departments; it is made
Received
up of three information schemes: one for the organization at
Figure 5. Information states in FM. large, and one for each department. Figure 6 shows the
internal information flow in such a sphere.

Processed

Received Disclosed Created

Transfer

Created Received

Processed Disclosed Transfer Transfer Disclosed Processed

Received Created

Figure 6. Information flow within a company and its two departments.

33 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 6, No. 2, 2009
The five information states are the only possible Source/Transmitter
“existence” patterns in the stream of information. To follow
The source produces messages to be communicated to the
the information as it moves along different paths, we can start
receiving terminal. FM extends this side of communication to
at any point in the stream. Suppose that information enters the
highlight the “origin” of the message, whether received from
processing stage, where it is subjected to some process. The
outside the source, or created within the source; thus, the
following are ultimate possibilities:
source can be described as creator or recipient, in addition to
1) It is stored. being a sender of the message. Such a qualification may be
2) It is destroyed. significant in certain circumstances (e.g., networking where
3) It is disclosed and transferred to another sphere. communication involves a chain of two-party exchanges).
4) It is processed in such a way that it generates new
The transmitter converts the message to a signal suitable
information (e.g., comparing certain statistics generates that
for transmission over the channel. In FM, the source has two
Smith is a risk).
spheres: the messages sphere and the signal sphere. Thus, this
6) It triggers another type of flow. For example, upon
element in Shannon’s model reflects the source as a processor
receiving patient health information, the physician takes some
that triggers the creation of signals that are released and
action such as performing medical treatment. Actions can also
transmitted.
be received, processed, created, released, and communicated.
Notice that the arrows between Release on one hand and the Figure 7 shows the conceptualization of the source in FM.
stage of Received, Processed., and Created are bidirectional. First, this conceptualization distinguishes explicitly between
This flow in opposite directions accounts for the case when it two flowthings: information and signals, thus separating the
is not possible to communicate information, as in the case of a flow of information from the flow of signals.
broken channel. In this case, at the Release stage, the
information can be destroyed after a certain period, stored Shannon’s information theory makes a clear distinction
indefinitely, or returned to the releaser at the receiving, between signals and information. In many communication
processing, or creation stages. systems, a signals transmission is involved only in transferring
data, without the direct intention that data conveys
VI. FLOW-BASED APPROACH TO SHANNON'S MODEL information. In conventional terminology, the notion of data is
introduced as a form of information more suitable for
The flow model assumes that parties involved in the
transmission. Looking at data from the FM point of view, data
communication act are represented by the five components or
is processed (stage in FM) as digitally encoded information.
stages: receiving, processing, creation, release, and transfer.
We thus have two ways to conceptualize the relationship
According to Shannon, the different elements involved in
between information and data. If data is viewed as a different
communication information are source, transmitter, channel,
flowthing from information, then another sphere (besides
receiver, and destination.
information and signal) for data is distinguished in FM;
however, in the communication context, without loss of
generality, we view data as a form of processed information.

Source

Information sphere Signal sphere


Process:
Create information to Create
data
OR

Receive Release Transmit

Figure 7. Conceptualization of the source in the communication process.

34 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 6, No. 2, 2009
Receiver/Destination The point here is that the basic flowthing at source and
destination is ontologically different (e.g., a different species)
Shannon’s model abstracts transmission as a component of
from the flowthing in the channel. Figure 8 illustrates this
the source and receiving as a component of the destination.
concept through the FM’s three spheres: sources, channels,
This is a reasonable way to look at the communication
and destinations. Note that the “signal” sphere on both sides
process, because “transmission” requires a deliberate act of
has the five stages as described in Figure 7.
message releasing, and “receiving” requires another deliberate
act of accepting the message. Even if “transmission” is The stages of the physical sphere are darkened to
conceptualized as being in the channel proper, the notions of emphasize that these are stages of flow of physical signals,
“transmission” and “receiving” are still decisions to be made whereas in the other two information spheres, the stages are in
at the source and destination, respectively. For example, it is a flow of pieces of information. The channel is a flow system
possible that a message (e.g., an e-mail) arrives at its just as the source and the destination are. The channel
destination; however, the communication process is not certainly receives, communicates, releases, processes, and
completed if the receiver deletes it without reading it. creates physical signals (e.g., noise). The difference is that the
channel is solely a physical sphere; therefore, Shannon’s
One objection to Shannon’s model is that “the receiver is
model is really a flat (with no internal structure) partial
constantly being fed pieces of information with no choice in
conceptual view of the channel. Implicitly, we can deduce the
the matter—willingly or unwillingly” [7]. FM is a more
following from Shannon’s model:
suitable conceptual representation since it divides
communication into two types: one under the control of the • Creation stage exists, deduced through the concept of
sender or receiver and one in the channel. noise.
Channel • The channel’s receiving/releasing/transfer stages are
implied by the links to source and destination.
If the “transmission channel” carries the signal from its • The processing stage of the channel can be deduced by
“transmitter” to a “receiver” (e.g., device), then this physical its mere act of carrying signals.
activity is different from the abstract pre/post transfer stages of
“releasing” and “receiving” the message at the source and The FM conceptualization of different spheres, each with
destination spheres. Furthermore, the nature of the channel is its own stages, clarifies the conceptual picture of the flow
different from the “nature” of the source and the destination. from source to destination across the channel. The flow of
Clearly, the source and the destination deal first with information in the source never crosses between the transfer
information, whereas the channel is a “physical sphere” that stages of the source and the channel, because information flow
deals (in this case) with physical signals. Therefore, the basic is ontologically distinct from physical signal flow. Note that
thing that is flowing (“transmitted” and “received” in the the arrows between the source and the channel and between
source and destination, respectively) is information, while the the channel and the destination are dotted arrows. They are
thing that flows in the channel is only a physical signal. The triggering or transformation arrows and not flow arrows. The
message has informational form when it is released by the abstract entity “information” cannot simply flow to or from
source and prior to channel transmission, and it returns to such the physical infosphere; rather, information triggers coded
a form again after channel transmission, when it is received in events in the physical sphere and is triggered by events in that
the destination. sphere. Thus, in Figure 8, the flow of information leads to the
emergence of physical signals at the channel. On the other
hand, flow is possible if the things that flow are of the same
kind.

Creation Creation Creation

Processing Releasing Processing Releasing Processing


Releasin
Signals

Signals

Receiving
Receiving Receiving
Transfer

Transfer

Transfer

Transfer

Channel
Receiver/
Sender/ destination
Source Transfer

Figure 8. FM version of Shannon's model of communication.

35 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 6, No. 2, 2009
Consider Figure 9, which shows channel-less VII. HUMAN-MACHINE COMMUNICATION
communication. The two spheres can be two coupled electrical Consider the relationship involved in the triggering
systems with current running between them. If “things that mechanism between different information spheres. Figure 10
flow” were all of the same kind, we would not need channels. shows an FM description of information flow between two
On the other hand, it is difficult to see such channel-less persons. First, information in the abstract information sphere
coupling between information spheres. Information is an of the person triggers electrical signals in the person’s
abstract entity, so observable movement from one information physiological sphere that flow from the mind/brain down the
sphere to another needs some type of channel. nervous system into muscles to, say, the mouth. This
physiological (body) sphere can also be modeled as a five-
stage sphere.

Creation Creation

Transfer
Transfer
Processing Releasing Releasing Processing

Receiving Receiving

Figure 9. FM version of direct communication between two spheres with the same types of flowing elements.

Creation Creation

Processing Releasing Processing Releasing

Receiving
Receiving
Transfer

Transfer

Sender’s abstract Sender’s physiological Creation


(Mental) infosphere Person 1
(Body) sphere
Releasing Processing

Receiving
Creation Creation
Transfer

Processing Releasing Processing Releasing Physical


(signal) sphere
Receiving
Receiving
Transfer

Transfer
Receiver’s abstract Receiver’s
(mental) infosphere physiological
Person 2 (body) sphere

Figure 10. FM modeling of transfer of information from one person to another.

36 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 6, No. 2, 2009
Notice that the model can be applied to “things that flow” or Layer 4: The Transport layer includes such functions as
flowthings. Flowthings are things that can be received, converting address forms (e.g., eng.ku.edu into 110.10.88),
processed, created, released, and transferred. They include checking errors, acknowledging, confirming the arrival of the
information, electrical signals, materials (as in supply chains), entire message/signal, etc. Some of these, also, seem to be
abstract things (e.g., customer orders), and even physiological operations that can (possibly) be performed by the sender (on
“things” (e.g., thoughts), and physical actions. Thus, the the message) and by the channel. This layer is said to be
physiological system can be viewed as a communication comparable to “human communication [that] frequently uses
system where electrical signals flow from the brain to, say, the facial expression and gesture to exchange its Transport Layer
mouth. The (electrical) signal in the physiological sphere messages. A receiving station's Transport Layer has the task of
triggers a sound wave signal in the physical sphere through concatenating incoming messages back from their
movement of the mouth. This signal in the physical sphere transmission packets into semantically ‘processable’ units
reaches the ear of the receiver and triggers an electrical signal such as words and phrases” [12].
in the physiological sphere of that receiver. This physiological Layers 1–3: These layers seem to be in the domain of the
signal in turn reaches the information sphere in the receiver's channel. Note that in developing a conceptual idealized
brain. communication system, we are not concerned with a particular
means or technology, for example, e-mail, telephone,
In this scenario, three elements can be identified: the two
conversation sound, address of physical lot, 32-bit IP address,
persons and the (physical) environment. Each person has two
multiplexing using ports, ZIP codes, envelopes, datagrams,
sub-spheres: the physiological sphere (flow of electrical
routers, and so on.
signals), and the informational sphere (flow of “abstract
things” called information). The emergence of triggered flow • Layer 1: This layer is the carrier of physical (electrical
appears in any stage of the sphere. For example, the and mechanical) “data” stream between the sender and
information sphere may trigger the physiological sphere to receiver. It is the bits flow layer. Logically, it is a single
create a signal (creation stage), or it may trigger a signal that platform that links them.
is already stored (in one of the stages) in the physiological
sphere (reflexes). • Layer 2: The data link provides synchronization for the
physical level. It is the packet flow layer. Logically, it
Osgood and Sebeok’s [9] idealized communication model, is split into two parts: the sending end and the receiving
shown in Figure 1, mixes the ontologies or spheres of flow end.
between the sender and the receiver. The arrows further
confuse the conceptual picture. Inside nodes (see Figure 1), the • Layer 3: The network layer translates the destination
arrows seem to indicate transformation of different forms of into a network address and selects a route for messages.
information (semantic, syntax, encoded); however, between It is the packet preparing, assembling, and sequencing
nodes, the arrows seem to denote flow of signals. The notations layer. In our case, we concentrate only on
are not clear in comparison with Figure 10. The figure has five sender/receiver communication.
spheres with precisely declared transformations and semantics In the OSI model, the information starts at the application
of flow. layer that flows down the stack with some extra information as
the message flows, until it reaches the channel. It makes
VIII. NETWORK MODEL distinctions between lower-level data-link and transport layers
Where does the network communication model fit into this and the higher-level application layers (levels 5–7).
framework of communication of information? Again, Information is to be situated at these higher levels of the
examining the ISO model, we notice the following: model. Again, if we consider data as a form of information,
information is encoded in digital data that can be processed
Layer 7: The application is not the application itself, although (e.g., compressed, encoded Ethernet→fiber-optic) and
some applications may perform some of its functions. transmitted as signals. The precise points of switching from
Layer 6: The Presentation layer mixes the functions of information to data and then to signals are not precise in the
spheres (sender’s and receiver’s) with those of channels. The OSI model.
sender (by implication also applied to the receiver) may
prepare the message for communication, but this is different Additionally, the model does not give a precise point of
from channels processing the signal. For example, the sender crossing from the sources/sender to the channel since some
may compress or encrypt the message, but such processes are functions in the lower layers are mixed sender and channel
different from compression and encryption of the channel. functions. Adding communication information, stripping
Layer 5: The Session (data flow control) layer manages the information, compression/decompression,
lower layers of the communication link. It seems also to encryption/decryption, error checking, etc. can be performed
include functions that can be located in the sender’s and by the sender/receiver and/or by the channel in preparation for
channel’s domains. For example, terminating the and at the end of transmission.
communication can be performed by the channel or by the
sender.

37 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 6, No. 2, 2009
We propose to completely separate these spheres, as shown Layer 3— Human Needs: This layer “captures the essence of
in Figure 11. The sender, channel, and receiver each has five why a user would interact with technology; to get something
stages in the FM. The dotted arrows in the figure are done to satisfy a need” [5]. Needs include communication,
recognition that information/data flow is distinguished from acquisition of goods and knowledge, entertainment, etc.
signal flow. Layer 2— Human Performance: This layer captures the
information processing features and limitations of
Adding different stages to the channel invites different
users. "Many [human performance capacities] are direct
possibilities to be explored. For example, the channel is not an
results of the properties of the sensory organs and the brain . . .
implicit participant in the communication act; rather, it is fully
Audio and video codices take advantage of the spatial and
represented as a communication sphere of signals flow. It
acoustic band pass nature of human perception" [5].
receives, processes, creates, releases, and communicates
Layer 1— Display: This layer “represents that aspect of the
signals. Receiving and communication are the standard
hardware, software, and interfaces that a user
functions of channels in current communication models.
experiences. Here at the lowest HCI layer a representation of
Creation in the channel is manifested by noise (a type of
the data is created out of signals that the human cannot
“signal”) generated in the channel. Noise is explicitly
understand directly (packets, bits, etc.) and that representation
recognized in the channel. The channel may “delay”
is displayed on a device of some sort (printer, force-feedback
delivering the signal (e.g., traffic congestion), thus putting it in
pointer, etc.) and used as input to Layer 9. It also works in the
the released state.
opposite direction to translate user output into a form that the
IX. OSI MODEL EXTENSION OSI layers can understand" [5].
For humans, three additional layers are introduced in the The three HCI layers are conceived as representing three
research literature [5]. To show the applicability of the flow- distinct aspects of HCI that can be summarized as follows:
based approach to different generalizations of current
1) What a user wants to do in the abstract sense (i.e.,
communication models, we concentrate on the HCI (Human
needs).
Computer Interaction) model as an extension of the seven-
2) How those needs are acted upon by the human.
layer OSI. It is proposed as a way to facilitate discussions
3) The artifacts that the user employs (hardware, software,
between HCI practitioners on one hand, and application and
etc.).
network developers on the other. It extends the OSI model
upward in a fashion consistent with the original OSI vision. “This common conceptual ground can be used to link
applications to human needs as a function of network
The HCI model consists of three layers representing
capabilities. The framework also helps in the discovery and
people’s experience with the devices and services offered by
localization of application performance problems and
technology [5]. These layers are as follows:
optimization opportunities" [5].

Creation Sender Creation Channel Creation Receiver

Receivin Processing Receiving Processing Receiving Processin

Disclose Disclose Disclose

Transfer Transfer Transfer


Application Presentation Presentation
Application
Presentation Session Session
Presentation
Transport Transport
Session Network Network Session
Transport Datalink Datalink Transport
Physical

Figure 11. Idealized FM communication model.

38 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 6, No. 2, 2009
Figure 12 shows a possible flow representation that These actions are applied to peripherals; thus, actions flow in,
involves needs, signals, actions, and information. In the FM say, a keyboard (e.g., movement of keys) that trigger the
scheme, a human being engages with several spheres creation of signals that flow from the keyboard to the
according to discrete “things that flow.” Similar to our use of computer. This process reaches the relevant layers in the OSI
pieces of information, we also view a need as a discrete model and hence proceeds in the communication stream. In
psychological unit; thus, a sphere of needs can be assembled, such a communication scheme, we find the FM model applied
as in the case of an informational sphere. Needs can be uniformly at different levels: psychological, cognitive,
received, processed, created, released, and transferred. physical signal, physical actions, etc.
Received needs (desires) can be conceptualized as “planting”
needs in the sense of “importing” a desire, as in the case of X. FLOW-BASED MODEL FOR TCP/IP MODEL
commercials that make a person feel a need for something
Similar to the OSI model, the flow-based approach can be
(e.g., drinking a soft drink). The flow of needs is initiated in
applied to conceptualize the TCP/IP layers. Figure 13 shows
two ways:
the FM that corresponds to the five layers of TCP/IP. Similar
1) Internal creation of needs that flow to the release and to the process in the flow-based OSI model,
transfer stages and are manifested as desire for something. information/signals flow from the sender through the channel
2) Implanting (receiving) of needs that may proceed in the to the recipient. Each receiver, recepient, and channel has five
needs flow model. stages of flow. The channel receives, processes, creates,
releases, and transfers signals.
In Figure 12, we assume created needs that trigger creation
of (cognitive) information (e.g., a request) that triggers
creation of signals that trigger user’s actions (e.g., clicking on
the mouse or pressing on the keyboard).

Human

Create Create Process


Needs Information

Action Create Signals


Create

Release Transfer

Receive Transfer Signal Release


Action Transfer
Process Create Create

Peripherals (e.g., keyboard, mouse)

Computer Transfer
Signal Process

Figure 12. Possible flows present in human-computer interaction.

39 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 6, No. 2, 2009

Creation Channel Creation Creation

Receiving Processing Receiving Processing Receivi Processing

Disclose Disclose Disclose

Transfer Transfer
Transfer
Application Application
Application Application
Transport Transport

Transport Internet Internet Transport


Network Network
Sender
Physical Recipient

Figure 13. FM version of TCP-IP model of communication.

[4] S. Al-Fedaghi. “Some aspects of personal information theory.” 7th


X. CONCLUSION Annual IEEE Information Assurance Workshop, United States Military
Academy, West Point, NY, 2006.
The flow model enhances conceptualization of the [5] B. Bauer and A. S. Patrick. “A human factors extension to the seven-
communication process. It introduces two main points: layer OSI reference model.” 2004. Retrieved from
http://www.andrewpatrick.ca/OSI/10layer.html
1) Instead of modeling communication spheres as closed [6] R. V. L. Hartley. “Transmission of information.” Bell System Technical
boxes, the interior anatomy of different spheres includes five Journal, 7, 535-563, 1928.
standard stages. [7] M. McLuhan. Understanding Media: The Extensions of Man. New
2) The communication process is modeled as the York: The New American Library, 1964. Excerpt: “Interpretations with
Limitations: A Critical Essay on the Mathematical Theory of
movement of “things that flow,” such as information and Communication” at http://www.uweb.ucsb.edu/~andreabautista/
physical signals. [8] C. D. Mortensen. Communication: The Study of Human
Communication. New York: McGraw-Hill, 1972.
These features greatly improve idealized models of
[9] C. E. Osgood and T. A. Sebeok (Eds.). Psycholinguistics: A Survey of
communication utilized in diverse areas of application. For Theory and Research Problems. Bloomington: Indiana University Press,
example, in psychology, a human information system may be 1965.
modeled as a five-stage system with its own “things that flow” [10] C. E. Shannon. “The mathematical theory of communication.” Bell
(e.g., thought) during participation in the communicative act. Telephone System Journal, 27, 379-423, 1948. http://cm.bell-
labs.com/cm/ms/what/shannonday/shannon1948.pdf
REFERENCES [11] C. E. Shannon and W. Weaver. The Mathematical Theory of
Communication. Urbana: University of Illinois Press, 1949.
[1] S. Al-Fedaghi. “Conceptualizing effects and uses of information.”
Information Seeking in Context conference (ISIC 2008), Vilnius, [12] D. J. Smith. “Shannonian communication theory and biological
Lithuania, September 17–20, 2008. communication.” 2003. Retrieved March 2008 from
http://www.smithsrisca.demon.co.uk/shannonian-theory.html
[2] S. Al-Fedaghi, K. Al-Saqabi and B. Thalheim. “Information stream
based model for organizing security.” Symposium on Requirements [13] J. Bowers. “A communication model.” 2006. Retrieved from
Engineering for Information Security, Barcelona, Spain, March 4–7, http://www.jerf.org/writings/communicationEthics/node4.html
2008.
[3] S. Al-Fedaghi. “Beyond purpose-based privacy access control.” The
18th Australasian Database Conference, Ballarat, Australia, January 29–
February 2, 2007.

40 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 6, No. 2, 2009
AUTHORS PROFILE Ala'a Al-Sakka: Bachelor in Computer Engineering, Kuwait University,
Cisco CCNA-1&2. She is Member of the Association for Computer
Sabah Al-Fedaghi holds an MS and a PhD in computer science from Machinery (ACM). Her research interests include computer network, and
Northwestern University, Evanston, Illinois, and a BS in computer science computer and architecture.
from Arizona State University, Tempe. He has published papers in journals
and contributed to conferences on topics in database systems, natural language Zahra'a Fadel: Bachelor in Computer Engineering, Kuwait University. She
processing, information systems, information privacy, information security, is a member of the Association for Computer Machinery (ACM). Her research
and information ethics. He is an associate professor in the Computer interests include database systems, Computer network, and information
Engineering Department, Kuwait University. He previously worked as a security.
programmer at the Kuwait Oil Company and headed the Electrical and
Computer Engineering Department (1991–1994) and the Computer
Engineering Department (2000–2007).

41 http://sites.google.com/site/ijcsis/
ISSN 1947-5500

You might also like