A Discrete Simulation-Model for the Evaluation of Telecommunication-Networks

Author(s):  
Paul E. Bogerd
Author(s):  
S.V. Lienkov ◽  
V.M. Dzhulij ◽  
A.V. Selyukov ◽  
V.S. Orlenko ◽  
A.V. Atamaniuk

The article proposes an approach to defining a security model for the dissemination of prohibited information in information and telecommunication networks. The most effective prediction of the spread of the prohibited information threat is carried out by modeling this process. Information and telecommunication networks are large-scale networks with an ever-growing number of subscribers. With the rapid growth in the number of ITKS users, there are problems of information security and information protection in them. The analysis of information security problems proved that apart from the problems associated with the use of the global Internet as a distributed information and telecommunication system, it is well known and can be solved, there is a poorly studied problem of prohibited content. Creation of models and algorithms for the spread of the threat of prohibited information is one of the key approaches to solving this problem. The analysis of publications on this topic shows that existing solutions are ineffective. Usually, when modeling the propagation of a threat of prohibited information, the ITKS topology (the network model is a fully connected graph) is not taken into account. When modeling the threat of the spread of prohibited information, it is important to have a topology that reflects the structure of connections in a real network, as well as to use an adequate model of information interaction between nodes. Another important problem is the large-scale ITCS, which makes it difficult to obtain data from the simulation model in a reasonable time. The solution to this problem is to create an analytical model of the threat of the spread of prohibited information in the ITCS. An algorithm has been developed for the implementation of TSPI (threat of the spread of prohibited information) in the ITKS, based on the nature of the processes occurring in real conditions. The simulation model of TSPI in ITKS has been proposed, which takes into account the topological characteristics of the network, as well as the features of information interaction of subscribers as man-machine systems. With its help, experiments have been carried out, the results of which have shown the dependence of the implementation of the RFID on the topological vulnerability of the network. An analytical model of the TSPI has been developed, taking into account the topological vulnerability of the network. The relevance of the results of the analytical solution was confirmed by a series of experiments on the topology of a real network using simulation modeling. In this case, the error for the protection process was no more than 10%, for the attack process - no more than 15%.


Author(s):  
Aura Rusca ◽  
Eugen Rosca ◽  
Florin Rusca ◽  
Mihaela Popa ◽  
Cristina Oprea ◽  
...  

2017 ◽  
Vol 7 (1) ◽  
pp. 31-36 ◽  
Author(s):  
Michal Sedláček

AbstractThis paper focuses on utilization of analysis of different possibilities of merging two production sites with the help of simulation model of company processes. Software SIMUL8 was chosen as a development environment for its possibility of dynamic discrete simulation of company processes. In the first phase, it analyses current status of both production sites. It is followed by suggesting several possible solutions for their potential merger. Each solution is analyzed with the help of simulation models. They have been evaluated and the optimal solution was selected.


SIMULATION ◽  
1985 ◽  
Vol 45 (5) ◽  
pp. 242-250 ◽  
Author(s):  
Marek Malík ◽  
Thomas Cochrane

2002 ◽  
Vol 214 (2) ◽  
pp. 305-319 ◽  
Author(s):  
MARTA GINOVART ◽  
DANIEL LÓPEZ ◽  
JOAQUIM VALLS

2018 ◽  
Vol 9 (5) ◽  
pp. 699
Author(s):  
Márcio Rodrigues Clementino ◽  
Thais Taba da Silva ◽  
Adriano Maniçoba da Silva ◽  
Wilson Yoshio Tanaka ◽  
Eugenio De Felice Zampini

The proper management of the operations is fundamental to the companies' results, and, particularly, the continuous improvement in production processes is extremely important to raise the level of efficiency. The present study aimed to simulate the process of welding of a component called heat exchanger that makes up a gas water heater. Then, this simulation has the objective of optimizing the production process. The data collected were obtained from a company located in Mogi das Cruzes, São Paulo. The results of the simulation model point to opportunities for improvement, mainly in the direction of reducing work shifts.


Sign in / Sign up

Export Citation Format

Share Document