DESIGN PROCESSES OF CONTROLLING IN DISSEMINATION OF INFORMATION IN IP-BASED NETWORKS
DOI:
https://doi.org/10.18372/2310-5461.2.5289Keywords:
information, network, process control, Petri nets, data protection, voicemail, simulationAbstract
In this article described a way of the design of processes Сarboy distribution information in ІР-net, which is based on the use utilizing of mathematical vehicle Petrinets, namely Е-net. Thanks to that, which is actually in fact modeling by management algorithm, models which are in researching explore can be used directly imme-diatel during realization the control of system by a process Сarboy distribution of information. Not only is the generation of vocal message communication and procedure proc of routing but also methods of defences dis-played in models, that used. Realization and research work-up of models takes a place by means of the specially developed system of imitation look-alike modeling imagineerimg. The variant analysis of processes Сarboy of management passing the information processes Сarboy is offered in cellular honeycomb communication net-works by means of the system of imitation look-alike design imagineerimg of JESS and management signals in network by the analysis of output information of the system by the use utilizing of feed-back by the use of new firsttime modification of formal vehicle of Е-net — Control Evaluation Net. Which becomes stands a necessary in our case, when vocal information transformation into the speed velocity flow of data information and passing on a communication channel, a few a little times changes the form shape, which results in to unforeseeable re-sults and possible deformation disfigurement of information, the problem of realization of all information trans-formations in real-time, namely in the rate tempo of vocal talk.References
Kazymyr V., Demshevska N. Application of Java-Technologies for Simulation in the Web // Lecture Notes in Informatics (LNI) Proceedings. Series of the German Informatics Society (GI): Bohn. — 2001. — Vol. 2. — Р. 173—184.
Казимир В.В., Кенійз Я.Я., Черних Д.О. Моделювання процесів захисту інформації в мережах стільникового зв’язку // Друга науковопрактична конференція з міжнародною участю«Математичне та імітаційне моделювання систем. МОДС’2007», тези доповідей. — Київ. — 2007. —25—29 червня. — С. 197—199.
Казимир В.В, Гавсиевич И.Б., Чупрынин А.Д., Полікарпов А.И. Моделирование процессов распространения информации в IP сетях //Друга науково-практична конференція з міжнародною участю «Математичне та імітаційне моделювання систем. МОДС’2007», тези доп. — К. — 2007. — 25—29 червня. — С. 200—202.
Литвинов В.В., Казимир В.В. Модельно -ориентированное управление как стратегия функционирования интеллектуальных производственных систем // Математичні машини і системи.— 2004. — № 4. — С. 143—156.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.




