As we already argued, a comprehensive security system could provide one management console that interacts with many security systems that are different in nature, like network security, computer security and physical security. It would therefore be unrealistic to try and define a single interface that defines all possible interactions between all possible peripheral systems. A different approach would be to set systems up according to a two-tier model, with back-end processors that plug into the central management system and front-end processors that handle communication with the peripheral application or device.
The
back-end
processors
that
are
known
to
the
KBS
can
be
listed
in
a
functionality
table.
They
contain
information
about
the
functionality
of
the
peripheral
device
or
application
they
serve.
They
know
the
format
of
the
messages
(order
of
fields,
contents
of
fields,
data
types,
etc.)
they
use
to
communicate
with
their
associated
front-end
processors.
The
communication
between
the
central
management
system
(i.e. the
KBS)
and
the
peripheral
applications
via
the
back-
and
front-end
processors
can
be
bidirectional
and
involve
processors
from
various
applications.
We
will
refer
to
these
applications
as
peripheral
applications
because
they
are
addressed
indirectly
through
the
API
and
the
processors
and
because
we
located
them
at
the
periphery
of
our
drawing
of
an
adaptive
security
system
(figure
2.1
on
p. ).
Typically
a
monitor
application
would
use
its
front-end
processor
to
send
a
message
to
the
central
management
system
via
its
associated
back-end
processor.
Under
certain
circumstances
the
inference
engine
of
the
expert
system
might
require
additional
information
-- depending
on
the
rule
that
is
being
fired
from
the
rule
base --
in
order
to
take
a
decision.
It
will
scan
the
functionality
table
for
the
back-end
processor
it
should
contact
and
inform
it
about
the
type
of
data
it
needs.
The
selected
processor
will
translate
the
request
into
a
message
to
be
sent
to
the
front-end
processor
of
the
peripheral
application.
The
communication
subsystem
forwards
the
message.
At
the
other
side,
the
requested
information
is
gathered
and
sent
back
to
the
back-end
processor.
This
is
shown
in
figure
2.6.
![]()
|
The KBS might also want to indicate the quality of service (QOS) required in terms of maximum response time or confidentiality for instance, thereby indirectly specifying a communication medium to be used like a network or a direct cable connection. The QOS field can be ignored by the back-end processor but it is of value to the communication handler. The front-end processor remembers what channel was used for the request and send its response using the same channel2.10.
Other communication issues include: