STUDYING OF THE INFORMATION EXCHANGE PROCESS IN OFFICE LOCAL NETWORKS BY USING MATHEMATICAL APPARATUS OF THE QUEUING THEORY

Main Article Content

Helen Makogon
https://orcid.org/0000-0003-1112-8707
Ruslan Musaiev
https://orcid.org/0000-0001-8714-5584
Aleksandr Dychko
https://orcid.org/0000-0002-3532-6700
Ivan Krylenko
https://orcid.org/0000-0002-5398-3608
Yehor Dumych
https://orcid.org/0000-0002-4971-8844

Abstract

The subject matter of the article is the process of information exchange in the office local networks of institutions on computers with different technical parameters. The goal of the study is to analyze client-server interaction with socket development of an effective and secure communication program іn the local network. The tasks to be solved are: to analyze the client-server interaction in the local network by using sockets, to create a code of communication in the local network for computers with different technical parameters using the mathematical apparatus of the queuing theory, to conduct research of the information exchange process in the system “client-server” in order to increase its effectiveness. General scientific and special methods of scientific knowledge are used. The following results are obtained. Today, the computer park used in the armed forces has a very large dispersion of technical parameters and installed software. Therefore, the organization of office local networks requires solving the scientific and technical task of implementing such an architecture that simultaneously meets the requirements of quality, speed, convenience and level of security of information exchange between computers with different Hardware and Software. It is expedient to use sockets for communication protocols allows simultaneous processing requests from a large number of users. At the same time, the administrator can adjust the settings at any time and redistribute ports on the servers. The use of the mathematical apparatus of the queuing theory enabled to conduct research of the information exchange process of the system "client-server" in order to increase its efficiency. Each server was described as a closed single-channel queuing system (QS) with unlimited idle time. Conclusions. The authors consider the implementation of the “client – server” architecture on the office local network, the successful solution of which will allow an organizations to work optimally and without interruption. The authors developed communication programme on the local network on computers with different technical parameters and tested the code to detect errors. The use of mathematical apparatus of the queuing theory enables to solve the tasks of structural and parametric synthesis of the local network of the institution and to work out the method of detecting distributed attacks on the network at the initial stage.

Article Details

How to Cite
Makogon, H., Musaiev, R., Dychko, A., Krylenko, I., & Dumych, Y. (2019). STUDYING OF THE INFORMATION EXCHANGE PROCESS IN OFFICE LOCAL NETWORKS BY USING MATHEMATICAL APPARATUS OF THE QUEUING THEORY. Advanced Information Systems, 3(1), 81–90. https://doi.org/10.20998/2522-9052.2019.1.14
Section
Information systems research
Author Biographies

Helen Makogon, Military Institute of Tank Troops NTU "KhPI", Kharkiv

Candidate of Technical Sciences, Senior Lecturer of the Armored Armament and Military Equipment Department

Ruslan Musaiev, Military Institute of Tank Troops NTU "KhPI", Kharkiv

Master Student of the Armored Armament and Military Equipment Department

Aleksandr Dychko, Military Institute of Tank Troops NTU "KhPI", Kharkiv

Candidate of Technical Sciences, Associate Professor, Associate Professor of the Armored Armament and Military Equipment Department

Ivan Krylenko, Military Institute of Tank Troops NTU "KhPI", Kharkiv

Candidate of Historical Sciences, Associate Professor of the Department of Military Training of Reserve Officers

Yehor Dumych, Ukrainian Engineering Pedagogical Academy, Kharkiv

post-graduate student of the Department of Information Computer Technologies and Mathematics

References

Matthew, N. and Stones, R. (2009), Beginning Linux Programming, John Wiley [distributor], Indianapolis, Ind. Wrox, Chichester, the USA.

Lincoln, S. (2001), Network Programming with Perl, Williams, Moscow, 720 p.

Legislation of Ukraine (2013), № 635, On Approval of Methodological Recommendations on Enterprise Accounting Policies and Changes to Certain Orders of the Ministry of Finance of Ukraine, the Ministry of Finance of Ukraine, LIGA:ZAKON, Kyiv, avaiable at: http://search.ligazakon.ua/l_doc2.nsf/link1/MF13052.html.

Legislation of Ukraine (2014), № 25-14/677, Concerning the write-off of budgetary institutions of computer equipment, State Financial Inspection of Ukraine, LIGA:ZAKON, Kyiv, available at: http://search.ligazakon.ua/l_doc2.nsf/link1/FN004233.html.

Legislation of Ukraine (2007), № 2. Methodical recommendations on inventory accounting, approved by the Ministry of Finance Order, the Ministry of Finance of Ukraine, available at: http://search.ligazakon.ua/l_doc2.nsf/link1/MF07002.html.

Polyak-Braginsky, A. (2008), Linux and Windows on the home network, BHV-Petersburg, St. Petersburg.

Bogachev, K. (2003), Basics of parallel programming, BINOM, Moscow.

Date, K. (2001), Introduction to database systems, Williams, Moscow.

Kamer, D. and Stevens, D. (2002), “Development of client-server applications”, TCP/IP networks, Williams, Moscow, Vol. 3.

Captur, V.A., Hulyayev, P.S. and Kravchenko, K.D. (2012), “Basic principles of addressing the practical implementation of variable size network addresses to Ethernet Networks”, Radioelectronic and computer systems, No. 1, pp. 51–54.

Lipaev, V.V. (2001), Software quality assurance. Methods and standards, Sinteg, Moscow.

Ruban, I., Kuchuk, H. and Kovalenko A. (2017), “Redistribution of base stations load in mobile communication networks”, Innovative technologies and scientific solutions for industries, No 1 (1), P. 75–81, DOI : http://doi.org/10.30837/2522-9818.2017.1.075

Kosenko V. (2017) Mathematical model of optimal distribution of applied problems of safety-critical systems over the nodes of the information and telecommunication network, Advanced Information Systems, Vol. 1, No. 2, pp. 4-9, DOI: http://doi.org/10.20998/2522-9052.2017.2.01

Kuchuk, G., Kovalenko, A., Kharchenko, V. and Shamraev, A. (2017), “Resource-oriented approaches to implementation of traffic control technologies in safety-critical I&C systems”, Green IT Engineering: Components Network and Systems Implementation, Springer International Publishing, Vol. 105, pp. 313–338.

Amin Salih M. and Potrus M.Y. (2015), “A Method for Compensation of Tcp Throughput Degrading During Movement Of Mobile Node”, ZANCO Journal of Pure and Applied Sciences, Vol. 27, No 6, pp. 59–68.

Saravana, Balaji B,, Karthikeyan, N.K. and Raj Kumar, R.S., (2018), “Fuzzy service conceptual ontology system for cloud service recommendation”, Computers & Electrical Engineering, Vol. 69, pp. 435–446, DOI:

http://doi.org/10.1016/j.compeleceng.2016.09.013

Amin Salih, M., Yuvaraj, D., Sivaram, M. and Porkodi, V. (2018), “Detection And Removal Of Black Hole Attack In Mobile Ad Hoc Networks Using Grp Protocol”, International Journal of Advanced Research in Computer Science, Vol. 9, No 6, pp. 1–6, doi: http://dx.doi.org/10.26483/ijarcs.v9i6.6335

Olifer, N.A. (2006), Computer networks. Principles, technologies, protocols, Piter, St. Petersburg.

Kaptur, V.A., Gulyaev, K.D., Kravchenko, P.S. and Yanina, O.O. (2011), “Estimation of efficiency of implementation of telecommunication technologies”, Otkrytye ynformatsyonnye y kompʹyuternye yntehryrovannye tekhnolohyy, Nats. aérokosm. un-ta ym. N.E. Zhukovskoho “KHAY.”, No. 52, pp. 77–89.

Pleskach, V.L. and Zatonatskaya, T.G. (2011), Information systems and technologies at enterprises, Znannya, Kyiv.

Gomathi, B, Karthikeyan, N.K. and Saravana, Balaji B., (2018), “Epsilon-Fuzzy Dominance Sort Based Composite Discrete Artificial Bee Colony optimization for Multi-Objective Cloud Task Scheduling Problem”, International Journal of Business Intelligence and Data Mining, Vol. 13, Issue 1-3, pp. 247-266, doi: http://doi.org/10.1504/IJBIDM.2018.088435

Dhivakar, B., Saravanan, S.V., Sivaram, M. and Krishnan R.A. (2012), “Statistical Score Calculation of Information Retrieval Systems using Data Fusion Technique”, Computer Science and Engineering, Vol. 2, Issue 5, pp.43-45, doi: http://doi.org/10.5923/j.computer.20120205.01

Tannenbaum, E. (2007), Computer Architecture, Piter, St. Petersburg.

Tatarchuk, M.I. (2005), Corporate Information Systems, Textbook, Ministry of Education and Science of Ukraine, Kyiv National Economic University, Kyiv, 328 p.

Hart, M. J. (2005), Windows System programming in the Windows environment, Williams, Moscow.

Ivchenko, G.I., Kashtanov, V.A. and Kovalenko, I.N. (1982), Queuing theory, Vyssh. shkola, Moscow.

Douglas, E. (2003), “Principles, Protocols, and Structure“, TCP/IP networks, Williams, Moscow, Vol. 1.

Korn, G.A (1968), Handbook of mathematics for scientists and engineers. Definitions, theorems, formulas, Nauka, Moscow.

Sah, J.J. and Malik, D.L.J. (2013), “Impact of DDOS attacks on cloud environment”, International Journal of Research in Computer, p. 276, available at: http://ijrcct.org/index.php/ojs/article/download/276/pdf.

Department of Special Telecommunication Systems and Information Security of the Security Service of Ukraine (1999), ND TZI 1.1-003-99,Terminology in the field of information protection in computer systems from unauthorized access, the Security Service of Ukraine, normative document, available at: https://tzi.com.ua/downloads/1.1-003-99.pdf.