IJCNIS Vol. 13, No. 5, 8 Oct. 2021
Cover page and Table of Contents: PDF (size: 541KB)
Full Text (PDF, 541KB), PP.68-78
Views: 0 Downloads: 0
Bandwidth ability, access node, network performance, telecommunications network, tactical link
The article reflects the views of the authors on the method for the operational calculation of the indicator of the functioning of special-purpose information and telecommunication networks of the tactical level of control according to the criterion of "network availability". Improvement of weapons and military equipment, forms and methods of combat, as well as a change in views on command and control, put forward ever more stringent requirements for the information and telecommunication system in general and for its elements in particular. The problems of development, planning of combat use and operation of information and telecommunication networks of the tactical control level are their heterogeneity, since they use heterogeneous transmission systems (radio and wire) together. The characteristic features of the planning, deployment and operation of information and telecommunication networks of the tactical control level are a high degree of uncertainty in the characteristics of their functioning and the lack of initial data in planning, which necessitates the improvement of the methodological basis for conducting operational calculations. Based on the analysis of ITU-T recommendations, scientific publications and the practice of combat use of the defense forces, it becomes clear that the operational calculation of individual criteria and indicators of the functioning of information and telecommunication systems of the tactical control level needs to be improved, since these systems have their own characteristic features. The material presented in the article makes it possible to develop new approaches to solving the problem of a reasonable calculation of the required bandwidth of the access node of the information and telecommunications network of the tactical control link. The significance and value of this study lies in the fact that in the conditions of continuous improvement of the forms and methods of warfare, high dynamism of changes in the states of information and telecommunication systems of the tactical control level, the correct choice of the apparatus for assessing the decisions made should play a decisive role in shortening the deployment planning cycle and sustainable functioning of the system management.
Leonid Bondarenko, Mykola Masesov, Katerina Buzayeva, Iryna Hurzhii, Oksana Ilienko, Viktor Gnatyuk, "Method of Calculation the Accessibility of the Information and Telecommunication Networks of the Tactical Link of Management", International Journal of Computer Network and Information Security(IJCNIS), Vol.13, No.5, pp.68-78, 2021. DOI: 10.5815/ijcnis.2021.05.06
[1] Recommendation ITU-T Y.1540, ‘Internet Protocol Data Communication Service – IP packet transfer and availability performance parameters’, 2016. [Online]. Available: http://www.itu.int/rec/dologin_pub/id=T-REC-Y.1540-2, [Accessed 10 October 2020].
[2] Yanovsky G.G., ‘Quality of Service in IP Networks’ Communication Herald, №1, 2008, pp 82-98.
[3] Report ITU -R F.2058, "Design Methods Applicable to Fixed Broadband Wireless Access Systems That Transport Internet Protocol Packets or Asynchronous Transfer Mode Cells’, 2006. [Online]. Available: http://www.itu.int › rep › R-REP-F.2058-2006-PDF-R.pdf. [Accessed 10 October 2020].
[4] Pylinsky M.V., ‘To the Assessment of Characteristics that Reflect the Features of the Functioning of the Military Communications System’ Technical science, Edit 12, 2018, pp 384-389.
[5] Kalinin M.G., Pylinsky M.V., ‘Methodology for Assessing the Effectiveness of the Communication System of a Combined-arms Formation according to the Generalized Indicator of Availability’, Bulletin of the Military Academy of the Republic of Belarus, № 1 (54), 2017.
[6] Ageev D.V., ‘Designing an Access Network for a Multiservice Telecommunications System that Maximizes the Network Operator's Profit’ Bulletin of Kharkiv National University of Radio Electronics, №926, pp, 5-10, 2010.
[7] Ageev D.V., ‘Designing an Access Network of a Multiservice Telecommunications System Using a Multilayer Graph’, Information processing systems, Edit.8, 2010, pp 2-8.
[8] Korkin A.G., ‘Estimation of the Throughput of the Radio Access System When Implementing a Hybrid Automatic Netransmission Request’ Science and technology journal Information space, № 1, 2011, pp 30-35.
[9] Golubintsev A.V., ‘Calculation of the Throughput of Special Purpose Wireless Access Systems’, Journal of Science Intensive Technologies in Space Research of the Earth, №3, 2012, pp 4-7.
[10] Military Communications, ‘State standard of Ukraine DSTU–В 3265-95’, (Active from 1997.01.01). [Online]. Available: http://www.nrjetix.com/fileadmin/doc/publications/additional_info/DSTU_V_3265-1995_Military_ communications.pdf. [Accessed 10 October 2020].
[11] Goldstein B.S., Pinchuk A.V., Sukhovitsky A.L. ‘IP Telephony’, М.: Radio and communication, pp 1-336, 2001.
[12] Davydov A.E., Smirnov P.I., Paramonov A.I., ‘Section Switched Communication Networks Calculation of Communication Network Parameters and Traffic Analysis’, Saint Petersburg State University of Information Technologies, Mechanics and Optics, 2016, pp 1-47.
[13] Z. Hu, R. Odarchenko, S. Gnatyuk, M. Zaliskyi, A. Chaplits, S. Bondar, V. Borovik, "Statistical Techniques for Detecting Cyberattacks on Computer Networks Based on an Analysis of Abnormal Traffic Behavior", International Journal of Computer Network and Information Security, Vol.12, No.6, pp. 1-13, 2020.
[14] M. Sakr, W. Atwa, A. Keshk, Genetic-based Summarization for Local Outlier Detection in Data Stream, "International Journal of Intelligent Systems and Applications", Vol.13, No.1, pp. 58-68, 2021.
[15] Z. Hu, I. Tereikovskyi, D. Chernyshev, L. Tereikovska, O. Tereikovskyi, D. Wang, "Procedure for Processing Biometric Parameters Based on Wavelet Transformations", International Journal of Modern Education and Computer Science, Vol.13, No.2, pp. 11-22, 2021.
[16] S. Ndichu, S. McOyowo, H. Okoyo et al, "A Remote Access Security Model based on Vulnerability Management", International Journal of Information Technology and Computer Science , Vol.12, No.5, pp. 38-51, 2020.