DATA EXCHANGE EVALUATION IN GLOBAL NETWORKS BASED ON INTEGRATED QUALITY INDICATOR OF SERVICE NETWORK
DOI:
https://doi.org/10.15588/1607-3274-2017-1-14Keywords:
privacy, reliability, quality service indicatorAbstract
Context. Increasing amount of data circulating in computer systems and networks requires new approaches to the protocols and mechanisms to ensure the user experience and security of information.Evaluation of the communication effectiveness in a computer network is performed on the basis of particular criteria and quality of service
indicators in the data exchange protocols in a wide area network (WAN), which does not allow to fully appreciate the quality of service
efficiency, taking into account the economic costs of providing the required values of service indicators quality. An important task in this sense is the study of the complex index of efficiency of data exchange in the global computer networks, taking into account the economic costs.
Objective. Consideration of the criteria of the complex index service quality, efficiency of cryptographic information protection, and
effectiveness of communication in global computer networks in various ways on the basis of the exchange control integrated efficiency
indicator, taking into account the economic costs of providing the required quality of service parameter value.
Method. The complex index of efficiency, taking into account the economic costs to ensure the required quality of service parameter
values in a global computer networks.
Results. It was offered the methodics of evaluating data effectiveness in global computer networks, based on a simple multifactor analysis.
Proposed and justified a comprehensive indicator of the effectiveness of data exchange, which takes into account, as the specifications (baud
rate, probability and packet delivery time, etc.), and economic parameters, such as cost of deployment and network maintenance, and so on.
Conclusions. The method of evaluating the effectiveness of the data on a global computer networks, based on a simple multivariate
analysis is offered. With the proposed method analyzed the data transmission efficiency in networks with different technologies, such as X.25 (v.34), Frame
Relay, Fast Ethernet (0.1Gb, 1Gb, 10Gb, 40 Gb) on the same criteriaIt is shown that today the most effective technology on the set of
parameters a 10Gb Ethernet. The novelty of this approach lies in the possibility of technical and economic parameters combination of the
communication effectiveness, it allows to introduce an integrated performance indicator. The practical use of the proposed complex index will more accurately assess the effectiveness of communication protocols, which are used in global IP-based networks, the economic costs of deployment and maintenance of the network, the cost of providing the required quality of service indicator.
References
Скляр Б. Цифровая связь. Теоретические основы и практическое применение. Изд. 2-е, испр. / Пер. с англ. – М. : Издатель- ский дом «Вильямс», 2003. – 1104 с. 2. Сумцов Д. В. Общий показатель эффективности передачи данных в компьютерной сети / Д. В. Сумцов, Б. П. Томашевский, А. М. Носик // Системи обробки інформації. – 2009. – №7(79). – С. 85–90. 3. Эффективность обмена данными в компьютерной сети при различных способах управления обменом / [С. П. Евсеев, Д. В. Сумцов, О. Г. Король, Б. П. Томашевский] // Збірник наукових праць. Донецький інститут залізничного транспорту. – 2009. – Випуск 17. – С. 33–45. 4. Анализ эффективности передачи данных в компьютерных системах с использованием интегрированных механизмов обеспечения надежности и безопасности / [С. П. Евсеев, Д. В. Сумцов, О. Г. Король, Б. П. Томашевский] // Восточно-европейский журнал передовых технологий. – 2010. – № 2/2(44). – С. 45–49. 5. Ленков С. В. Методы и средства защиты информации: [в 2 т.] / С. В. Ленков, Д. А. Перегудов, В. А. Хорошко ; (под ред. В. А. Хорошко). – К. : Арий, 2008. – Т.1. Несанкционированное получение информации. – 464 с. 6. Ленков С. В. Методы и средства защиты информации: [в 2 т.] / С. В. Ленков, Д. А. Перегудов, В. А. Хорошко ; (под ред. В. А. Хорошко). – К. : Арий, 2008. – Т. 2. Информационная безопасность. – 344 с. 7. Молдовян Н.А. Криптография: от примитивов к синтезу алгоритмов / Н. А. Молдовян, А. А. Молдовян, М. А. Еремеев. – СПб. : БХВ – Петербург, 2004. – 448 с. 8. Остапов С. Э. Технологии защиты информации / С. Э. Остапов, С. П. Евсеев, О. Г. Король. – Черновцы : Издательский дом «РОДОВИД», 2014. – 428 с. 9. Столлингс В. Криптография и защита сетей: принципы и практика / В. Столлингс ; [Пер. с англ.]. – 2-е изд. – М. : ИД «Вильямс», 2001. – 672 с. 10. Концепция создания системы контроля качества предоставления услуг связи в Российской Федерации [Электронный ресурс] : – Режим доступа : http://minsvyaz.ru/ru/documents/4668.
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2017 S. P. Yevseiev, H. N. Rzayev, S. E. Ostapov, V. I. Nikolaenko
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Creative Commons Licensing Notifications in the Copyright Notices
The journal allows the authors to hold the copyright without restrictions and to retain publishing rights without restrictions.
The journal allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles.
The journal allows to reuse and remixing of its content, in accordance with a Creative Commons license СС BY -SA.
Authors who publish with this journal agree to the following terms:
-
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License CC BY-SA that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
-
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
-
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.