The Methods to Improve Quality of Service by Accounting Secure Parameters

04/16/2019
by   Tamara Radivilova, et al.
0

A solution to the problem of ensuring quality of service, providing a greater number of services with higher efficiency taking into account network security is proposed. In this paper, experiments were conducted to analyze the effect of self-similarity and attacks on the quality of service parameters. Method of buffering and control of channel capacity and calculating of routing cost method in the network, which take into account the parameters of traffic multifractality and the probability of detecting attacks in telecommunications networks were proposed. The both proposed methods accounting the given restrictions on the delay time and the number of lost packets for every type quality of service traffic. During simulation the parameters of transmitted traffic (self-similarity, intensity) and the parameters of network (current channel load, node buffer size) were changed and the maximum allowable load of network was determined. The results of analysis show that occurrence of overload when transmitting traffic over a switched channel associated with multifractal traffic characteristics and presence of attack. It was shown that proposed methods can reduce the lost data and improve the efficiency of network resources.

READ FULL TEXT
research
04/10/2019

Development of QoS methods in the information networks with fractal traffic

The paper discusses actual task of ensuring the quality of services in i...
research
04/10/2019

Calculation of routing value in MPLS network according to traffic fractal properties

Method for calculating routing cost of MPLS network is presented in the ...
research
04/16/2019

Calculation of distributed system imbalance in condition of multifractal load

The method of calculating a distributed system imbalance based on the ca...
research
06/24/2020

Anycast Agility: Adaptive Routing to Manage DDoS

IP Anycast is used for services such as DNS and Content Delivery Network...
research
11/11/2020

Empirically Characterizing the Buffer Behaviour of Real Devices

All the routers include a buffer in order to enqueue packets waiting to ...
research
11/05/2021

Adaptive Warden Strategy for Countering Network Covert Storage Channels

The detection and elimination of covert channels are performed by a netw...
research
12/10/2020

An Overview of 5G System Accessibility Control and Differentiation

5G system is characterized by its capability to support a wide range of ...

Please sign up or login with your details

Forgot password? Click here to reset