Abstract:Simulation modelling is carried out, which allows adequate describing the traffic of multiservice networks with the commutation of packets with the characteristic of burstiness. One of the most effective methods for studying the traffic of telecommunications systems is computer simulation modelling. By using the theory of queuing systems (QS), computer simulation modelling of packet flows (traffic) in modern multi-service networks is performed as a random self-similar process. Distribution laws such as exponen… Show more
“…It should be noted that, when we simulate the delivery process, the Hurst index value, close to H ≈ 0.5, is the limiting value for the Pareto flow, because if H ≥ 0.5, dispersion for this distribution is not determined [21] (Figure 9), therefore the simulated results of the delivery process obtained at these H values will be wrong. Analysis of the received results shows that they correspond completely with the data of works published previously by other authors [13,16,17,[19][20][21][22]33] devoted to the development of quality evaluation methods of the functioning of telecommunication networks when self-similar and stationary Poisson traffic is transmitted. This confirms the adequacy of the developed model and the consistency of the received results.…”
Section: Resultssupporting
confidence: 78%
“…In the case of the availability and implementation of an information impact by an attacker on network elements, the probability of the successful delivery of data packets in a given time significantly worsens (Figure 10). Analysis of the received results shows that they correspond completely with the data of works published previously by other authors [13,16,17,[19][20][21][22]33] devoted to the development of quality evaluation methods of the functioning of telecommunication networks when self-similar and stationary Poisson traffic is transmitted. This confirms the adequacy of the developed model and the consistency of the received results.…”
Section: Resultssupporting
confidence: 78%
“…In [10,[13][14][15][16][17], an approach is proposed for the calculation of the packet loss probability, based on the usage of fundamental expressions, obtained for queuing systems M/M/1, taking into account the flow categorization and the claim operation discipline with the introduction of equalizing coefficients, considering the traffic variability [13], the Hurst index [10,14] and related parameters [15][16][17]. These works surely make a noticeable contribution to the development of the methods of teletraffic theory, but they do not take into account the impact of cyberattacks on packets losses.…”
Section: Related Workmentioning
confidence: 99%
“…where α v > 0-shape parameter of the Weibull distribution; Γ(*)-gamma-function [27]; H-Hurst exponent; α-distribution shape parameter, which is numerically equal to: -for Weibull distribution [14,16]:…”
Cyberattacks against the elements of technological data transmission networks represent a rather significant threat of disrupting the management of regional electric power complexes. Therefore, evaluating the functioning quality of data transmission networks in the context of cyberattacks is an important task that helps to make the right decisions on the telecommunication support of electric power systems. The known models and methods for solving this problem have limited application areas determined by the admissible packet distribution laws. The paper proposes a new method for evaluating the quality of the functioning of data transmission networks, based on modeling the process of functioning of data transmission networks in the form of a stochastic network. The proposed method removes restrictions on the form of the initial distributions and makes the assumptions about the exponential distribution of the expected time and packet servicing in modern technological data transmission networks unnecessary. The method gives the possibility to evaluate the quality of the network functioning in the context of cyberattacks for stationary Poisson transmission and self-similar traffic, represented by Pareto and Weibul flows models. The obtained evaluation results are in good agreement with the data represented in previously published papers.
“…It should be noted that, when we simulate the delivery process, the Hurst index value, close to H ≈ 0.5, is the limiting value for the Pareto flow, because if H ≥ 0.5, dispersion for this distribution is not determined [21] (Figure 9), therefore the simulated results of the delivery process obtained at these H values will be wrong. Analysis of the received results shows that they correspond completely with the data of works published previously by other authors [13,16,17,[19][20][21][22]33] devoted to the development of quality evaluation methods of the functioning of telecommunication networks when self-similar and stationary Poisson traffic is transmitted. This confirms the adequacy of the developed model and the consistency of the received results.…”
Section: Resultssupporting
confidence: 78%
“…In the case of the availability and implementation of an information impact by an attacker on network elements, the probability of the successful delivery of data packets in a given time significantly worsens (Figure 10). Analysis of the received results shows that they correspond completely with the data of works published previously by other authors [13,16,17,[19][20][21][22]33] devoted to the development of quality evaluation methods of the functioning of telecommunication networks when self-similar and stationary Poisson traffic is transmitted. This confirms the adequacy of the developed model and the consistency of the received results.…”
Section: Resultssupporting
confidence: 78%
“…In [10,[13][14][15][16][17], an approach is proposed for the calculation of the packet loss probability, based on the usage of fundamental expressions, obtained for queuing systems M/M/1, taking into account the flow categorization and the claim operation discipline with the introduction of equalizing coefficients, considering the traffic variability [13], the Hurst index [10,14] and related parameters [15][16][17]. These works surely make a noticeable contribution to the development of the methods of teletraffic theory, but they do not take into account the impact of cyberattacks on packets losses.…”
Section: Related Workmentioning
confidence: 99%
“…where α v > 0-shape parameter of the Weibull distribution; Γ(*)-gamma-function [27]; H-Hurst exponent; α-distribution shape parameter, which is numerically equal to: -for Weibull distribution [14,16]:…”
Cyberattacks against the elements of technological data transmission networks represent a rather significant threat of disrupting the management of regional electric power complexes. Therefore, evaluating the functioning quality of data transmission networks in the context of cyberattacks is an important task that helps to make the right decisions on the telecommunication support of electric power systems. The known models and methods for solving this problem have limited application areas determined by the admissible packet distribution laws. The paper proposes a new method for evaluating the quality of the functioning of data transmission networks, based on modeling the process of functioning of data transmission networks in the form of a stochastic network. The proposed method removes restrictions on the form of the initial distributions and makes the assumptions about the exponential distribution of the expected time and packet servicing in modern technological data transmission networks unnecessary. The method gives the possibility to evaluate the quality of the network functioning in the context of cyberattacks for stationary Poisson transmission and self-similar traffic, represented by Pareto and Weibul flows models. The obtained evaluation results are in good agreement with the data represented in previously published papers.
“…It is worth mentioning, that the problem of the adequate traffic modeling of mobile networks is not new as well! The related works with the most consistent results can be found in the papers [2,3,[6][7][8][9][10][11][12][13] and the book [14]. For the traffic theory of the networks (see, for example [15,16]) all those works use not only Markov modeling but apply as well the theory of self-similar processes for interpretation of the traffic [17] in wireless communication networks of 5G and beyond.…”
The impressive growth of the demand for wireless services for 5G and beyond, particularly encouraged by the Internet of Things, Internet of Everything, etc., raised up the importance of the problems related to the drastic increase (among others) of spectrum efficiency of the systems. In this regard two opportunistic trends were recently discussed by practical professionals and academicians: non-orthogonal spectrum sharing (NOMA transmission) for user equipment (UE) at physical layer level and decentralized Blockchain-enabled Radio Access (B-RAN) paradigm at network layer label. Both of them promise a significant growth on the transmission rate and the spectrum efficiency with low latency, etc. not only for 5G networks, but further, towards 6G networks and so on.
Moreover, it is a fact that the number of published works for B-RAN (some of them considered hereafter) is very impressive, however, the attention to its modeling aspects is rather limited.
The presented material is dedicated to present an approach for the practical small-scale modeling for the case of high-dimensional B-RAN based on continuous-time Markov processes with discrete set of states (N>>1) and self-similar processes for its traffic modeling.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.