scholarly journals Investigation of random access computer networks operating in a diffusion environment with an increasing number of subscriber stations

Author(s):  
Viacheslav Vavilov

Improving the performance of various types of communication networks in the modern world remains an urgent task, in connection with which research is underway to create hardware that expands the throughput of physical channels, new network protocols are being developed and existing network protocols are being modified, mathematical and computer modeling of data transmission mechanisms in communication networks is being carried out. The speed and reliability of data transmission over networks also depends on a number of factors, the nature of the influence of which is random. The combination of such factors is called a random environment. If the change in the states of the medium is continuous, then we speak of a diffusion medium. The object of the research is communication networks controlled by multiple access protocols and functioning in a random (diffusion) environment. The research tool for multiple access networks is the mathematical apparatus of the theory of finite-difference and differential equations, the theory of random processes and the theory of queuing. The proposed mathematical model of communication networks in a diffusion environment is investigated by an asymptotic method. The scientific novelty of the work lies in the fact that for the first time a mathematical model of a multiple access network operating in a diffusion environment was proposed and an asymptotic study was carried out. The asymptotic average of the normalized number of claims in the orbit (the source of repeated calls) and the deviation from this average are found, and the probability density of the values of the process of changing the number of claims in the orbit is obtained.

Author(s):  
Maksim Peregudov ◽  
Anatoliy Steshkovoy

Currently, centrally reserved access to the medium in the digital radio communication networks of the IEEE 802.11 family standards is an alternative to random multiple access to the environment such as CSMA/CA and is mainly used in the transmission voice and video messages in real time. Centrally reserved access to the environment determines the scope of interest in it from attackers. However, the assessment of effectiveness of centrally reserved access to the environment under the conditions of potentially possible destructive impacts was not carried out and therefore it is impossible to assess the contribution of such impacts to the decrease in the effectiveness of such access. Also, the stage establishing of centrally reserved access to the environment was not previously taken into account. Analytical model development of centrally reserved access to the environment under the conditions of destructive influences in digital radio communication networks of the IEEE 802.11 family standards. A mathematical model of centrally reserved access to the environment has been developed, taking into account not only the stage of its functioning, but also the stage of formation under the conditions of destructive influences by the attacker. Moreover, in the model the stage of establishing centrally reserved access to the medium displays a sequential relationship of such access, synchronization elements in digital radio communication networks and random multiple access to the medium of the CSMA/CA type. It was established that collisions in the data transmission channel caused by destructive influences can eliminate centrally reserved access to the medium even at the stage of its establishment. The model is applicable in the design of digital radio communication networks of the IEEE 802.11 family of standards, the optimization of such networks of the operation, and the detection of potential destructive effects by an attacker.


2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Yali Wu ◽  
Ningbo Zhang ◽  
Guixia Kang

Machine-to-machine (M2M) communication is considered as one of the key enablers for providing of advanced services and applications. Since M2M features a massive number of user equipment (UE) pieces, one of the key issues is the radio access network (RAN) overload problem for massive connections in M2M communications. In order to improve the number of successful accesses (i.e., the M2M UE pieces that successfully transmit data packets) for M2M communications in the current long term evolution (LTE) systems, we propose a new hybrid protocol for random access (RA) and data transmission based on two-phase access class barring (ACB) mechanisms. Furthermore, the joint optimization algorithm of the two-phase ACB factors and the number of resource blocks (RBs) allocated for RA and data transmission is designed to maximize the number of successful accesses. Finally, simulation results demonstrate that our scheme can significantly improve the number of successful accesses and achieve performance improvement in reducing the grant time.


2014 ◽  
Vol 4 (1) ◽  
pp. 45-49 ◽  
Author(s):  
Abdullah A. Alhaj

The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication. With the increasing demand for computer communications the need for security is growing dramatically. The existing research related to security mechanisms focuses on security of the data transmission in the communication networks only. The authors developed specific Secure Data Transmission Mechanism (S SDTM) for cloud outsourced data is a set of technologies and solutions to enforce security policy and bandwidth compliance on all devices seeking to access network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these algorithms are computationally sophisticated, some hardware accelerators are needed to support high throughput. In this paper, the authors compare between secure data transmission mechanism for cloud outsourced data with preemption control algorithm and TLS to improve the properties of the S SDTM and the Virtual Private Networks (VPN) built with both protocols.


Sign in / Sign up

Export Citation Format

Share Document