scholarly journals An Approach to Data Transmission Process Modelling in Automated Power Accounting Systems

2021 ◽  
Vol 1791 (1) ◽  
pp. 012054
Author(s):  
A A Lyubchenko ◽  
E Y Kopytov ◽  
A G Malyutin ◽  
A A Bogdanov
T-Comm ◽  
2020 ◽  
Vol 14 (6) ◽  
pp. 4-12
Author(s):  
А.А. Lyubchenko ◽  
◽  
E.Yu. Kopytov ◽  
A.A. Bogdanov ◽  
◽  
...  

2016 ◽  
Vol 37 (1) ◽  
pp. 231-252
Author(s):  
Marcin Bednarek ◽  
Tadeusz Dąbrowski ◽  
Tomasz Wawer

Abstract Communication between the process stations of the distributed control system is carried out. By the supervision and therapeutic systems of the stations communication process diagnosis is performed. Supervision and therapeutic systems are responsible for the security of transmitted data. The security is considered in this article mainly in the aspect of resistance to external destructive factors on the data transmission process. It is assumed that the transmission security can be provided by mechanisms protecting the integrity of the transmitted data. Correctness of the data is controlled by using one-way hash function calculated on the basis of the transmitted value variable and also is attached to the transmitted data. This allows to maintain the integrity of the transmitted process data. A solutions using one-way hash function to protection of the transmission before changing message contents (caused by eg. intruder interference) are proposed in the article.


Author(s):  
M. Nisha ◽  
S. Poongavanam

<p>There has been an increasing attentiveness in the uses of sensor networks. Because sensors are normally controlled in on-board power supply, proficient supervision of the network is essential in improving the life of the sensor.<strong> </strong>The majority research protocols objective at offering link breakage reducing and mitigating from the same. Yet, selecting the well-organized communication do all the beneficial to the transmission process thus demonstrating better improvement in the network performance. In this article, we propose Best Communication Node Election for well-organized Path in Flat Topology The main goal of this<strong> </strong>work is to choose the best data transmission node in flat topology for improve the multi hop routing. This scheme, the best communication node selection based on Path Metric and this Path Metric is measured by the packet obtained rate, dropped rate, latency rate and node energy. This scheme provide guarantees quality of Service in the network.</p>


2018 ◽  
Vol 7 (3.2) ◽  
pp. 783
Author(s):  
Ida Bagus Ary Indra Iswara ◽  
I Ketut Sudarsana ◽  
Nurlaidy Joice Simamora ◽  
Vivi Novalia Sitinjak ◽  
Nurhayati Purba ◽  
...  

The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly  


2013 ◽  
Vol 462-463 ◽  
pp. 984-988
Author(s):  
Ze Ming Ren ◽  
Ling Yun Xu ◽  
Qian Liu ◽  
An Dong Fan

In order to reduce the amount of data exchange in E-mail transmission process, a non-repudiation E-mail transmission protocol was proposed based on the digital signature technology. By using the formal analysis based on the extended strand space method, strict authentication and analysis were conducted for the security of data transmission and the identity of both the transmitter and receiver. Furthermore, the safety and effectiveness of this protocol were verified.


2015 ◽  
Vol 738-739 ◽  
pp. 1213-1216 ◽  
Author(s):  
Zhi Yong He ◽  
Yue Liang

The paper firstly analyzes security and stability existed in the DDS network, and then finds that present DDS regulations cannot guarantee information’s confidentiality and integrity when facing an attack. Based on this, the paper puts forward a core thought of data analysis. According to the draft of DDS information security regulation, the paper analyzes information security threats that the DDS system must face, provides corresponding information security strategies in accordance with data granularity and operation means, and designs and realizes an information security model based on DDS. The security model there into is divided into three levels: boundary security, transmission security and data application security of fine granularity. At the same time, the paper also analyzes several important elements which influence DDS network security in detail, and then designs again the data-centered publication/subscription model. Finally, through the model testing by a lot of experiments, the experimental results show that: the model not only largely improves security of DDS network information, but also has already promoted stability and reliability of data transmission process.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan ◽  
Robbi Rahim

The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.


2021 ◽  
pp. 52-62
Author(s):  
Tatyana Lebedkina ◽  
◽  
Sergey Sokolovsky ◽  

The purpose of this work: to develop a model that allows to assess the security of the information system of file exchange, to ensure the efficiency of servicing the maximum number of requests of authorized customers with a simultaneous decrease in the quality of service of requests from the attacker’s means. Methods used: formalization of service processes in the form of Markov random processes, as well as numerical methods. The result of the study: a criterion evaluation base for the effectiveness of the functioning of the information system of file exchange has been developed. The problem of dynamic management of the resource capabilities of the information system of file exchange by managing the parameters of data transmission has been solved. An assessment of the asymptotic stability and robustness of the model relative to the perturbations of the values of the initial parameters is solved in order to increase the adequacy of the model when choosing control modes for the data transmission process. Probabilistic and temporal characteristics and the process of functioning of the information system of file exchange in the conditions of unauthorized influences in various situations of interaction of the parties to the conflict, as well as in the managementand computational and time resource of the means of network intelligence of the attacker are obtained. The optimal modes of functioning of information systemsand file exchange, ensuring its compliance withthe established security requirements of critical information infrastructure objects, aresubstantiated.


Author(s):  
Syaifuddin Syaifuddin ◽  
Muhamad Fathul Azis ◽  
Fauzi Dwi Setiawan Sumadi

Multipath routing is a path search method used as a data transmission process utilizing more than one available path on a network. The multipath routing concept is directed to substitute the single path routing concept for reducing network traffic congestion by distributing data transmission through several available paths. It can be implemented in the Software Defined Network (SDN) environment that separates the control plane and the data plane, which provides flexibility by deploying application-based solutions to resolve the problem. This paper is directed to implement the modified Deep First Search (DFS) multipath routing algorithm and compare the proposed method with Dijkstra and normal DFS multipath algorithm. The contribution was designed by combining the node, edge, path, and bucket weight using port statistics available in OpenFlow standard and manual calculation. The results of the system’s emulation showed that the overall algorithm could determine more than one path for the data transmission process. The average execution time on all algorithms produced 0.0903 ms for the modified DFS multipath algorithm, 0.0858 ms for DFS multipath algorithm, and 0.901 ms Dijkstra multipath algorithm, respectively. The QoS parameter testing results illustrated that the proposed method was better than another multipath routing algorithm in terms of throughput and jitter. However, based on packet loss percentage, the modified method was placed after normal DFS but still generated better results than Dijkstra. Overall, the implement multipath routing concept in SDN with all algorithms could be deployed to provide more than one data transmission path.


Sign in / Sign up

Export Citation Format

Share Document