Validate methods evaluation matrix traffic simulation on based high-secure networks

Authors

  • Сергей Леонидович Волков Одесская государственная академия технического регулирования и качества ул. Ковальская, 15, г. Одесса, Украина, 65029, Ukraine
  • Александр Арсеньевич Сыропятов Одесский национальный политехнический университет пр. Шевченка, 1, г. Одесса, Украина, 65110, Ukraine

DOI:

https://doi.org/10.15587/1729-4061.2011.1180

Keywords:

Simulator, the traffic, network, traffic matrix

Abstract

On the basis of simulator of traffic highly to the speed protected network possibility of generating of traffic is rotined with the necessary level of working out in detail. Possibility of the use of simulator is indicated for the analysis and testing of both algorithms of calculation of matrices of traffic and decision of other scientific and technical tasks

Author Biographies

Сергей Леонидович Волков, Одесская государственная академия технического регулирования и качества ул. Ковальская, 15, г. Одесса, Украина, 65029

Кандидат технических наук

Кафедра информационно-измерительных технологий

Александр Арсеньевич Сыропятов, Одесский национальный политехнический университет пр. Шевченка, 1, г. Одесса, Украина, 65110

Инженер

References

  1. Vardi Y. Estimating Source-Destination Traffic Intensities from Link Da-ta. Journal of the American Statistical Association, 91(433), March, 1996.
  2. Tebaldi C., M.West. Bayesian Inference of Network Traffic Using Link Count Data. Journal of the American Statistical Association, 93(442), June, 1998.
  3. Cao Jin, Davis D., Vander S. Weil, Yu B. Time-Varying Network Tomo-graphy: Router Link Data. Journal of the American Statistical Association, 95(452), 2000.
  4. Fowler, Leland W. Local Area Network Traffic Characteristics, with Im-plications for Broadband Network Congestion Management. IEEE JSAC, 9(7), pp. 1139-1149, September, 1991.
  5. Morris R., Lin D. Variance of aggregated web traffic. In INFOCOM, pages 360-366, 2000.
  6. Willinger G. W., Feldmann A. Scaling Analysis of Conservative Cascades, with Applications to Network Traffic. IEEE Transactions on Information Theory, Vol.45, No.3, pp.971-992, Apr., 1999.

How to Cite

Волков, С. Л., & Сыропятов, А. А. (2011). Validate methods evaluation matrix traffic simulation on based high-secure networks. Eastern-European Journal of Enterprise Technologies, 5(2(53), 57–61. https://doi.org/10.15587/1729-4061.2011.1180

Issue

Section

Information technology