scholarly journals Synthesis of the topological structure of a self-healing and scalable data network segment

Author(s):  
I. M. Sribna ◽  
◽  
H. A. Kuchuk ◽  
O. H. Lebedyev ◽  
Frhat Ali Alnaeri ◽  
...  

An approach is proposed to reduce the load on the backbone channels of the data network. The scientific novelty lies in the improvement of the method for reducing the load of backbone channels by synthesizing the topological structure of its segments, which have the properties of local self-healing and scalability, and segment recovery and scaling occur without access to the backbone channels of the main network. The following tasks were solved: the structure of the primary regular communication network was formed, assuming the possibility of self-recovery; an algorithm for the formation of a secondary communication network of a local segment based on the existing primary regular network has been developed; the principles of local scaling are formulated; a method for local scaling of the topological structure of data transmission network segments is proposed; the comparative analysis of the load of the main channels of the data transmission network was carried out using the standard and the proposed variants of the synthesis of its local components. A regular graph with a given connectivity is used as the initial structure. Further transformations were carried out using a modified combinatorial optimization method. The topological features of the "grid" type graph are used to scale the segment. With a large number of segment switching nodes, the additional load on the trunk channels increases with the proposed approach more slowly than with the standard one. The main computational difficulties arise when applying the method of indefinite Lagrange multipliers. Therefore, the development of this study may consist in reducing the computational complexity of the algorithm for forming a secondary communication network of the segment under consideration.

Author(s):  
С.Р. РОМАНОВ

Рассмотрен принцип управления сетью передачи данных (СПД)с помощью искусственной нейронной сети. Предложена концепция проведения вычислений при решении задачи оптимальной маршрутизации трафика данных. Приведен алгоритм управления сетью СПД на базе нейронной сети Хэмминга. The principle of data transmission network control using an artificial neural network is considered. The concept of carrying out calculations when solving the problem of optimal routing of data traffic is proposed. The algorithm for controlling the data transmission network based on the Hamming neural network is presented.


Vestnik NSUEM ◽  
2021 ◽  
pp. 31-36
Author(s):  
S. A. Khrustalyev

The publication deals with the design and modeling of fault tolerance for secured software-defined data transmission networks. A technique for evaluating the parameters of fault tolerance of a software-defined data transmission network is proposed. An organizational model for building a software-configurable data transmission network based on the design of a configuration based on the principle of dynamic protection with the use of selective transformation, taking into account the probability of failures and allowing to ensure high specified parameters of fault tolerance.


2021 ◽  
Vol 3 (11) ◽  
pp. 73-84
Author(s):  
Viktor Semko ◽  
Oleksiy Semko

This paper proposes a method of synthesis of data transmission routes in conflicting heterogeneous self-organized wireless data networks under external and internal influences. In this case, routing is understood as the process of determining in a data transmission network one or a set of routes (pathspaths) , that are optimal within the selected criteria between a given pair or set of network nodes. Thus, a route is a sequence of network nodes and data transmission paths that connect a pair of network nodes for communication. The method is based on a mathematical model of the data network operation in a virtual multidimensional parameter space. The model of operation is based on a graph-model of information interaction of network nodes in the process of data transmission between receptor nodes and acceptors in the transmission of data streams. Based on the problem statement, the price function is formally defined as the value of the virtual distance between the nodes of a heterogeneous data network. In contrast to the Floyd-Warshall and Dijkstra algorithms, the synthesis of the data transmission route takes into account both the load of the computing environment of network nodes and the state of information interaction channels of network nodes, as well as possible changes in network parameters during data transmission. The data transmission network is self-organized, has no dedicated nodes, which ensures its reliability under external and internal influences, conflicts in data transmission, as well as variable topology. The proposed method for synthesizing data transmission routes when controlling the routing of data flows in heterogeneous networks is focused on the possibility of implementing the basic model of open systems interaction within the framework of existing protocols - the OSI model, which is a reference network model for communications and the development of network protocols.


Author(s):  
М.А. БАСАРАБ ◽  
Р.А. БЕЛЬФЕР ◽  
А.В. КРАВЦОВ

Представлены процедуры выполнения одних из основных функций централизованного управления учебным имитатором сети передачи данных категории специального назначения: маршрутизации, информационной безопасности и управления неисправностями. Процедуры рассматриваются на примере конфигурации имитатора сети, представляющей собой часть сети передачи данных специального назначения страны (нижний уровень, зоновые сети). Показана возможность упростить решение задачи управления имитатором зоновой сети передачи данных категории специального назначения в сравнении с управлением сетями связи с помощью TMN и управлением виртуальной частной маршрутизируемой сетью ( VPRN) благодаря использованию принудительной маршрутизации («от источника»). Результаты работы планируется использовать для решения задачи управления имитатором сети, представляющей собой полную конфигурацию всей сети передачи данных страны, частью которой являются зоновые сети. The procedures for performing the main functions of centralized control of a training simulator of a special-purpose data transmission network (routing, information security, and fault management) are proposed. The procedures are discussed using an example of the configuration of a network simulator representing part of a country's special-purpose data network (lower level, zonal networks). It is shown that it is possible to simplify the solution of the complex task of managing a special-purpose data transmission network simulator in comparison with the management of communication networks using Telecommunication Management Network (TMN) and management of virtual private routed network, using forced routing “from the source”. The results of this work will be used to solve the problem of managing a network simulator, which is a complete configuration of the entire data network of a country.


2014 ◽  
Vol 977 ◽  
pp. 330-333
Author(s):  
Qi Lin Hao ◽  
Ping Xian Yang ◽  
Ming Jie Wang ◽  
Rui Ma

In this paper, in order to achieve real-time remote monitoring of fire site, we designed a intelligent remote fire monitoring system based on ZigBee network and GPRS network. This system, used ZigBee and sensor to build data acquisition and short distance transmission network and combined with GPRS wireless data transmission and SMS alarm ,cooperates with the server and PC to build a remote monitoring scheme based on GRPS.


2014 ◽  
Vol 565 ◽  
pp. 179-182 ◽  
Author(s):  
Yue Tao Ge ◽  
Xiao Ming Liu ◽  
Xiao Tong Yin

In order to realize wireless remoter not only securely but also quickly data transmission in the public communication network, the Tiny Encryption Algorithm (TEA) encryption and decryption algorithm is studied in this paper and the properties of TEA are analyzed. According to communication protocol of remoter, encryption and decryption program process are designed. Because of TEA encryption, remoter transmitter and receiver can communicate strongly in the public communication network.


Author(s):  
Xiaoling Li ◽  
Xinwei Zhou

Data security is very important in the multi-path transmission networks (MTN). Efficient data security measurement in MTN is crucial so as to ensure the reliability of data transmission. To this end, this paper presents an improved algorithm using single-single minimal path based back-up path (SSMP-BP), which is designed to ensure the data transmission when the second path is out of work. From the simulation study, the proposed algorithm has the better network reliability compared with existing double minimal path based backup path (DMP-BP) approach. It could be found that, the proposed algorithm uses less back-up paths compared with DMP-BP so that less network resources like nodes are achieved.


2020 ◽  
Vol 12 (4) ◽  
pp. 68 ◽  
Author(s):  
Vasiliy Elagin ◽  
Anastasia Spirkina ◽  
Andrei Levakov ◽  
Ilya Belozertsev

The present article describes the behavioral model of blockchain services; their reliability is confirmed on the basis of experimental data. The authors identify the main technical characteristics and features associated with data transmission through the network. The authors determine the network scheme, working with blockchain transactions and the dependence of network characteristics on application parameters. They analyze the application of this model for the detection of the blockchain service and the possibility of the existing security mechanisms of this technology being evaded. Furthermore, the article offers recommendations for hiding the blockchain traffic profile to significantly complicate its identification in the data network.


Sign in / Sign up

Export Citation Format

Share Document