scholarly journals Ensuring the Integrity of Data Transmitted over the Communication Channels of Virtual Private Networks

2021 ◽  
pp. 81-97
Author(s):  
Sergey Karpov ◽  
◽  
Jurii Ryabinin ◽  
Oleg Finko ◽  
◽  
...  

Annotation A method of ensuring the integrity of data transmitted over communication channels of VPNs of large-scale information systems functioning in the conditions of the destructive influence of the attacker is considered. The proposed method allows to recover data packets subjected to erasure and imitation. The purpose of the research is to increase the stability of data transmission over VPN communication channels by implementing the procedure for recovering erased IP-packets and increasing the level of imitation security of the transmitted data. Research methods: aggregation of methods of cryptographic control of data integrity and methods of redundant coding of data, application of methods of the theory of Markov random processes to determine the probability of providing satisfactory support for applications in conditions of destructive influence of an attacker with various parameters. Research results: analysis of the object of research – VPN of large-scale information systems was carried out. It leads to the conclusion about the need to protect data transmitted through such communication channels for the implementation of national strategies for economic development. A mathematical model of the functioning of a data transmission system over a VPN communication channel under the conditions of a destructive influence of an attacker is presented. A method is proposed to ensure the integrity of transmitted data based on an original scheme for sharing known solutions, generating a synergistic effect. The method allows recovering dmin −1 erased data packets. The proposed solution makes it possible to increase the stability and speed of data transmission over the communication channels of the network in the conditions of the destructive influence of the attacker and the imitation of data by the attacker.

2013 ◽  
Vol 290 ◽  
pp. 133-137 ◽  
Author(s):  
J.T. Zhang ◽  
Y.C. Hou ◽  
Z.G. Yan

This paper has designed data transmission system of logging cable based on CPLD and DSP. This system realizes the function of modulation and demodulation in BPSK with CPLD, in which the application is flexible and the circuit is simple and reliable. The System uses DSP to realize the checking function of software CRC, improving the stability and reliability of data transmission. Practical application shows that the system works normally with stable and reliable performance and can meet the requirements of the transmission of conventional logging.


The article proposes an analytical model of the functioning of the data transmission system, taking into account the influence of short-term interruptions in messages and the recovery of information distorted by cyber-attacks. The model uses the Laplace-Stieltjes transform and the Lagrange multiplier method. This helps determine the performance of switching nodes, the throughput of communication channels and their total cost in a communication system.


2014 ◽  
Vol 687-691 ◽  
pp. 2722-2727
Author(s):  
Cheng Yong Yang ◽  
Zhen Yu Li ◽  
Yue Dong Gu ◽  
Hua Fan

With the enlargement of the test scale, the examination system has become the direction of large-scale. Large-scale examination system has advantage over the calculation in a cloud environment. But more candidates and examinations lead to network congestion. On the solutions of network congestion, there has been a lot of wan processing methods. But they are not suitable for application to run in the LAN's examination system according to actual condition. Therefore, this paper will introduce an improved method of multi-source multipath to alleviate the burden to the public network channel in the process of network data transmission. In order to improve the stability of the system by optimizing software to reduce the dependence on hardware. In the end, this paper will discuss the performance of this strategy.


2013 ◽  
Vol 443 ◽  
pp. 354-358
Author(s):  
Yan Chun Shen

It uses Windows low-level audio API to record and broadcast voice packets, encodes and decodes through G.729A, and groups by TCP/IP protocol, transmits data packets by UDP on the SOCK_DGRAM SOCKET between the client and the server, So as to achieve the function of Internet voice communication. To ensure user friendly interface, the premise here using multi-threaded programming. In addition, the system also in application-layer protocol adds the text chat function which based on TCP transmission. The essence of the design is to realize software to communicate by voice or text which based Windows operating system. The successful debugging of this software will have a positive effect on the PC to PC kind of VoIP communications system.


Author(s):  
Charlotte P. Lee ◽  
Kjeld Schmidt

The study of computing infrastructures has grown significantly due to the rapid proliferation and ubiquity of large-scale IT-based installations. At the same time, recognition has also grown of the usefulness of such studies as a means for understanding computing infrastructures as material complements of practical action. Subsequently the concept of “infrastructure” (or “information infrastructures,” “cyberinfrastructures,” and “infrastructuring”) has gained increasing importance in the area of Computer-Supported Cooperative Work (CSCW) as well as in neighboring areas such as Information Systems research (IS) and Science and Technology Studies (STS). However, as such studies have unfolded, the very concept of “infrastructure” is being applied in different discourses, for different purposes, in myriad different senses. Consequently, the concept of “infrastructure” has become increasingly muddled and needs clarification. The chapter presents a critical investigation of the vicissitudes of the concept of “infrastructure” over the last 35 years.


Sign in / Sign up

Export Citation Format

Share Document