Show simple item record

dc.contributor.authorShmeleva, T.R.
dc.contributor.authorШмельова, Т.Р.
dc.contributor.authorШмелёва, Т.Р.
dc.date.accessioned2019-03-06T12:01:59Z
dc.date.available2019-03-06T12:01:59Z
dc.date.issued2017
dc.identifier.issn2307-6410
dc.identifier.urihttp://biblio.onat.edu.ua:443/xmlui/handle/123456789/2124
dc.descriptionShmeleva T.R. Security of Grid Structures with Cut-through Switching Nodes / T.R. Shmeleva // System Informatics. – 2017. – №10. – Р. 23-32en_US
dc.description.abstractStore-and-forward buffering of packets is traditionally used in modern network devices such as switches and routers. But sometimes it is a significant obstacle to the quality of service improvement because the minimal packet delivery time is limited by the multiplier of the number of intermediate nodes by the packet transmission time in the channel. The cut-through transmission of packets removes this limitation, because it uses only the head of packet, which contains the destination address, for the forwarding decision. Thus, the cut-through technology of packets transmission has considerable opportunities for the quality of service improving. Models for the computing grid with the cut-through forwarding have been developed in the form of colored Petri nets. The model is composed of packet switching nodes and generators of traffic; it can be supplied with malefactor models in the form of traffic guns disguised under regular multimedia traffic. The present work is the further development of methods of the rectangular communication grids analysis for nodes performing the cut-through switching. The methods are intended for application in the design of computing grids, in the development of new telecommunications devices, and in intelligent defense systems. Preliminary estimations show that the cut-through technology inherits some of the negative effects, which are associated with the traditional store-and-forward delivery of packets. A series of simulations revealed conditions of blocking a grid with its regular traffic. The results are applicable in the intellectual detection of intrusions and counter-measures planning.en_US
dc.language.isoenen_US
dc.publisherИнститут систем информатики им. А.П. Ершоваen_US
dc.subjectComputing grid securityen_US
dc.subjectCut-through switchingen_US
dc.subjectTraffic attack defenceen_US
dc.subjectPerformance evaluationen_US
dc.subjectColored Petri neten_US
dc.subjectDeadlocken_US
dc.titleSECURITY OF GRID STRUCTURES WITH CUT-THROUGH SWITCHING NODESen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

  • Статьи
    Статті з телекомунікаційних систем та мереж, антен та пристроїв мікрохвильової техніки, радіотехнічних пристроїв та засобів телекомунікацій, радіотехнічних та телевізійних систем, оптоелектронних систем, твердотільної електроніки, економіки та управління підприємствами (економіка зв'язку)

Show simple item record