scholarly journals Model of Functioning Data-Transfer Systems Special Purposes Taking into Account the Influence of Cyber Attack

The article proposes an analytical model of the functioning of the data transmission system, taking into account the influence of short-term interruptions in messages and the recovery of information distorted by cyber-attacks. The model uses the Laplace-Stieltjes transform and the Lagrange multiplier method. This helps determine the performance of switching nodes, the throughput of communication channels and their total cost in a communication system.

2014 ◽  
Vol 29 (1) ◽  
pp. 69-80
Author(s):  
Dariusz Laskowski

Abstract The paper presents the reliability estimate of the data transmission system. In practical communication solutions this type of system is widely used. A data transfer between the sender and the receiver is a complex process taking into account the human, communication system and threats. Between these components there are many relationships and dependencies. Current methods use a selective approach to this issue. Therefore, it was decided to develop and present a comprehensive assessment of the system reliability. This method has been verified in representative conditions using commercial and open source tools


Author(s):  
Sapna Gupta ◽  
Gursharan Kaur ◽  
Ridima Mittal ◽  
Dev Garg

Over the years, the overdependence on Wireless Fidelity (Wi-Fi) for data transmission necessitated the need for an alternate and more reliable means of communication, hence, Light Fidelity (Li-Fi). It involves the use of Light Emitting Diode to transmit data by blinking (i.e. switching them on and off) at a speed not noticeable to the eye. This paper proposed the development of the Li-Fi system using off the shelf electronic components. This would make the system an indispensable means of communication in the nearest future. This data transmission system is different from those in existence because expensive components were not in the design, invariably reducing the overall cost of the implementation. Keywords: Light Fidelity (Li-Fi), Wireless Fidelity (Wi-Fi) Optical communication, Telecommunication


2014 ◽  
Vol 513-517 ◽  
pp. 4458-4461
Author(s):  
Jian Li ◽  
Shuang Zhang

Galvanic coupling method has been observed to be the best method for data transmission in intra-body communication, which is proposed by Zimmerman in 1995. With the increasing transmission requirements and the development of optical fiber communication, a high speed data transmission system is required and it is possible to design an apparatus to realize the electro optic conversion. In this paper, the characteristics of the intra-body communication system are introduced. Principles and structures of the electro-optic modulation methods for intra-body communication are reviewed. Internal and external modulation methods are introduced and discussed. A system of the electro-optic and acousto-optic modulation are recommended for the intra-body communication system and discussed.


2021 ◽  
pp. 219-223
Author(s):  
Konstantin Amelin ◽  
Vladislav Ershov

The construction of an effective intelligent information transmission system in a group of cyber-physical systems is one of the important problems in both practical and theoretical contexts. Such a system for transmitting information for a group is being built for a network consisting of separate robotic complexes. Increasingly, decentralized solutions are used to build effective interaction between group members. As a rule, in networks, decentralization is present in computing software modules, and the data transmission system between nodes is centralized. One of the aspects of such centralization is the need to send data to a specific destination directly or by relaying through other nodes - routing data in the network. In this work, a method of data transmission in a decentralized network between robotic complexes without reference to routing is proposed. The method consists of the exchange of data on the state of the entire network as a whole between the nodes.


2012 ◽  
Vol 220-223 ◽  
pp. 2032-2035 ◽  
Author(s):  
Cai Hong Wang ◽  
Guang Feng Jin

This paper puts forward the design of communication system based on FPGA. USB controller CY7C68013 is widely used for its faster data transmission rate and diverse interface way which provide a simple and seamless connecting interface for the ATA, FPGA and DSP . This paper introduces the basic working principles of the controllers, and uses its affiliate FIFO method in order to produce corresponding control signal in FPGA with VHDL. It realizes fast data transmission between PC and FPGA through USB. Test results shows that the scheme transmission speed fast, data accurate, and can be extended to other need through the USB fast data transmission system.


Author(s):  
Sachin Umrao

This chapter is structured around the concepts of risk analysis due to underwater deployment of the cables for data transfer. Most of the organizations have deployed their networks below the water for shortening the distances between peers and also to reduce the physical destruction cost of cables. Furthermore, some organizations like Google kept their servers below the water because it reduced the cost of getting it cool, which in turn increases the efficiency. However, security consultants around the world in recent past expressed their considerations that a cyber-attack on these servers or cables might result in miserable economic collision. This might be overstated but there are infrequent situations in which cable breakage could be riotous. Although organizations cannot rule the threat of attacks on these apparatuses, there are fewer check measures that could reduce the possible attack chances in underwater communication.


Author(s):  
А.Ю. БАРАБОШИН ◽  
Д.В. ЛУЧИН

Рассматриваются вопросы увеличения скорости передачи данных разнесенным радиоцентром декаметрового диапазона (с помощью поляризационного разнесения). Сделан обзор основных исследований и экспериментов, проводимых в этом направлении. Разработан алгоритм поляризационного пространственного кодирования и способ одновременного формирования волн с левой и правой круговыми поляризациями. Приведены результаты математического моделирования, показывающие работоспособность предложенного алгоритма. The article discusses the issues of increasing the data transfer rate by the spaced HF radio center using polarization diversity. A review of the main research and experiments carried out in this direction is made. An algorithm for polarization spatial coding and a method for the simultaneous formation of waves with left and right circular polarizations has been developed. The results of mathematical modeling showing the efficiency of the proposed algorithms are presented.


2021 ◽  
pp. 81-97
Author(s):  
Sergey Karpov ◽  
◽  
Jurii Ryabinin ◽  
Oleg Finko ◽  
◽  
...  

Annotation A method of ensuring the integrity of data transmitted over communication channels of VPNs of large-scale information systems functioning in the conditions of the destructive influence of the attacker is considered. The proposed method allows to recover data packets subjected to erasure and imitation. The purpose of the research is to increase the stability of data transmission over VPN communication channels by implementing the procedure for recovering erased IP-packets and increasing the level of imitation security of the transmitted data. Research methods: aggregation of methods of cryptographic control of data integrity and methods of redundant coding of data, application of methods of the theory of Markov random processes to determine the probability of providing satisfactory support for applications in conditions of destructive influence of an attacker with various parameters. Research results: analysis of the object of research – VPN of large-scale information systems was carried out. It leads to the conclusion about the need to protect data transmitted through such communication channels for the implementation of national strategies for economic development. A mathematical model of the functioning of a data transmission system over a VPN communication channel under the conditions of a destructive influence of an attacker is presented. A method is proposed to ensure the integrity of transmitted data based on an original scheme for sharing known solutions, generating a synergistic effect. The method allows recovering dmin −1 erased data packets. The proposed solution makes it possible to increase the stability and speed of data transmission over the communication channels of the network in the conditions of the destructive influence of the attacker and the imitation of data by the attacker.


Sign in / Sign up

Export Citation Format

Share Document