STUDYING OF THE INFORMATION EXCHANGE PROCESS IN OFFICE LOCAL NETWORKS BY USING MATHEMATICAL APPARATUS OF THE QUEUING THEORY
Main Article Content
Abstract
The subject matter of the article is the process of information exchange in the office local networks of institutions on computers with different technical parameters. The goal of the study is to analyze client-server interaction with socket development of an effective and secure communication program іn the local network. The tasks to be solved are: to analyze the client-server interaction in the local network by using sockets, to create a code of communication in the local network for computers with different technical parameters using the mathematical apparatus of the queuing theory, to conduct research of the information exchange process in the system “client-server” in order to increase its effectiveness. General scientific and special methods of scientific knowledge are used. The following results are obtained. Today, the computer park used in the armed forces has a very large dispersion of technical parameters and installed software. Therefore, the organization of office local networks requires solving the scientific and technical task of implementing such an architecture that simultaneously meets the requirements of quality, speed, convenience and level of security of information exchange between computers with different Hardware and Software. It is expedient to use sockets for communication protocols allows simultaneous processing requests from a large number of users. At the same time, the administrator can adjust the settings at any time and redistribute ports on the servers. The use of the mathematical apparatus of the queuing theory enabled to conduct research of the information exchange process of the system "client-server" in order to increase its efficiency. Each server was described as a closed single-channel queuing system (QS) with unlimited idle time. Conclusions. The authors consider the implementation of the “client – server” architecture on the office local network, the successful solution of which will allow an organizations to work optimally and without interruption. The authors developed communication programme on the local network on computers with different technical parameters and tested the code to detect errors. The use of mathematical apparatus of the queuing theory enables to solve the tasks of structural and parametric synthesis of the local network of the institution and to work out the method of detecting distributed attacks on the network at the initial stage.
Article Details
References
Matthew, N. and Stones, R. (2009), Beginning Linux Programming, John Wiley [distributor], Indianapolis, Ind. Wrox, Chichester, the USA.
Lincoln, S. (2001), Network Programming with Perl, Williams, Moscow, 720 p.
Legislation of Ukraine (2013), № 635, On Approval of Methodological Recommendations on Enterprise Accounting Policies and Changes to Certain Orders of the Ministry of Finance of Ukraine, the Ministry of Finance of Ukraine, LIGA:ZAKON, Kyiv, avaiable at: http://search.ligazakon.ua/l_doc2.nsf/link1/MF13052.html.
Legislation of Ukraine (2014), № 25-14/677, Concerning the write-off of budgetary institutions of computer equipment, State Financial Inspection of Ukraine, LIGA:ZAKON, Kyiv, available at: http://search.ligazakon.ua/l_doc2.nsf/link1/FN004233.html.
Legislation of Ukraine (2007), № 2. Methodical recommendations on inventory accounting, approved by the Ministry of Finance Order, the Ministry of Finance of Ukraine, available at: http://search.ligazakon.ua/l_doc2.nsf/link1/MF07002.html.
Polyak-Braginsky, A. (2008), Linux and Windows on the home network, BHV-Petersburg, St. Petersburg.
Bogachev, K. (2003), Basics of parallel programming, BINOM, Moscow.
Date, K. (2001), Introduction to database systems, Williams, Moscow.
Kamer, D. and Stevens, D. (2002), “Development of client-server applications”, TCP/IP networks, Williams, Moscow, Vol. 3.
Captur, V.A., Hulyayev, P.S. and Kravchenko, K.D. (2012), “Basic principles of addressing the practical implementation of variable size network addresses to Ethernet Networks”, Radioelectronic and computer systems, No. 1, pp. 51–54.
Lipaev, V.V. (2001), Software quality assurance. Methods and standards, Sinteg, Moscow.
Ruban, I., Kuchuk, H. and Kovalenko A. (2017), “Redistribution of base stations load in mobile communication networks”, Innovative technologies and scientific solutions for industries, No 1 (1), P. 75–81, DOI : http://doi.org/10.30837/2522-9818.2017.1.075
Kosenko V. (2017) Mathematical model of optimal distribution of applied problems of safety-critical systems over the nodes of the information and telecommunication network, Advanced Information Systems, Vol. 1, No. 2, pp. 4-9, DOI: http://doi.org/10.20998/2522-9052.2017.2.01
Kuchuk, G., Kovalenko, A., Kharchenko, V. and Shamraev, A. (2017), “Resource-oriented approaches to implementation of traffic control technologies in safety-critical I&C systems”, Green IT Engineering: Components Network and Systems Implementation, Springer International Publishing, Vol. 105, pp. 313–338.
Amin Salih M. and Potrus M.Y. (2015), “A Method for Compensation of Tcp Throughput Degrading During Movement Of Mobile Node”, ZANCO Journal of Pure and Applied Sciences, Vol. 27, No 6, pp. 59–68.
Saravana, Balaji B,, Karthikeyan, N.K. and Raj Kumar, R.S., (2018), “Fuzzy service conceptual ontology system for cloud service recommendation”, Computers & Electrical Engineering, Vol. 69, pp. 435–446, DOI:
http://doi.org/10.1016/j.compeleceng.2016.09.013
Amin Salih, M., Yuvaraj, D., Sivaram, M. and Porkodi, V. (2018), “Detection And Removal Of Black Hole Attack In Mobile Ad Hoc Networks Using Grp Protocol”, International Journal of Advanced Research in Computer Science, Vol. 9, No 6, pp. 1–6, doi: http://dx.doi.org/10.26483/ijarcs.v9i6.6335
Olifer, N.A. (2006), Computer networks. Principles, technologies, protocols, Piter, St. Petersburg.
Kaptur, V.A., Gulyaev, K.D., Kravchenko, P.S. and Yanina, O.O. (2011), “Estimation of efficiency of implementation of telecommunication technologies”, Otkrytye ynformatsyonnye y kompʹyuternye yntehryrovannye tekhnolohyy, Nats. aérokosm. un-ta ym. N.E. Zhukovskoho “KHAY.”, No. 52, pp. 77–89.
Pleskach, V.L. and Zatonatskaya, T.G. (2011), Information systems and technologies at enterprises, Znannya, Kyiv.
Gomathi, B, Karthikeyan, N.K. and Saravana, Balaji B., (2018), “Epsilon-Fuzzy Dominance Sort Based Composite Discrete Artificial Bee Colony optimization for Multi-Objective Cloud Task Scheduling Problem”, International Journal of Business Intelligence and Data Mining, Vol. 13, Issue 1-3, pp. 247-266, doi: http://doi.org/10.1504/IJBIDM.2018.088435
Dhivakar, B., Saravanan, S.V., Sivaram, M. and Krishnan R.A. (2012), “Statistical Score Calculation of Information Retrieval Systems using Data Fusion Technique”, Computer Science and Engineering, Vol. 2, Issue 5, pp.43-45, doi: http://doi.org/10.5923/j.computer.20120205.01
Tannenbaum, E. (2007), Computer Architecture, Piter, St. Petersburg.
Tatarchuk, M.I. (2005), Corporate Information Systems, Textbook, Ministry of Education and Science of Ukraine, Kyiv National Economic University, Kyiv, 328 p.
Hart, M. J. (2005), Windows System programming in the Windows environment, Williams, Moscow.
Ivchenko, G.I., Kashtanov, V.A. and Kovalenko, I.N. (1982), Queuing theory, Vyssh. shkola, Moscow.
Douglas, E. (2003), “Principles, Protocols, and Structure“, TCP/IP networks, Williams, Moscow, Vol. 1.
Korn, G.A (1968), Handbook of mathematics for scientists and engineers. Definitions, theorems, formulas, Nauka, Moscow.
Sah, J.J. and Malik, D.L.J. (2013), “Impact of DDOS attacks on cloud environment”, International Journal of Research in Computer, p. 276, available at: http://ijrcct.org/index.php/ojs/article/download/276/pdf.
Department of Special Telecommunication Systems and Information Security of the Security Service of Ukraine (1999), ND TZI 1.1-003-99,Terminology in the field of information protection in computer systems from unauthorized access, the Security Service of Ukraine, normative document, available at: https://tzi.com.ua/downloads/1.1-003-99.pdf.