MONITORING OF LINK-LEVEL CONGESTION IN TELECOMMUNICATION SYSTEMS USING INFORMATION CRITERIA
Article Sidebar
Open full text
Issue Vol. 12 No. 4 (2022)
-
SCATTERING BY CIRCULAR VOIDS WITH RIGID BOUNDARY: DIRECT AND INVERSE PROBLEMS FOR OPEN AND CLOSE DOMAINS
Tomasz Rymarczyk, Jan Sikora4-10
-
FINITE ELEMENT MODEL FOR ANALYSIS OF CHARACTERISTICS OF SHROUDED ROTOR BLADE VIBRATIONS
Anatoliy Zinkovskii, Kyrylo Savchenko, Yevheniia Onyshchenko, Leonid Polishchuk, Abilkaiyr Nazerke, Bagashar Zhumazhanov11-16
-
EFFICIENTLY PROCESSING DATA IN TABLE WITH BILLIONS OF RECORDS
Piotr Bednarczuk, Adam Borsuk17-20
-
GENERALIZED MODEL OF INFORMATION PROTECTION PROCESS IN AUDIOVISUAL CONTENT DISTRIBUTION NETWORKS
Heorhii Rozorinov, Oleksandr Hres, Volodymyr Rusyn21-25
-
MONITORING OF LINK-LEVEL CONGESTION IN TELECOMMUNICATION SYSTEMS USING INFORMATION CRITERIA
Natalia Yakymchuk, Yosyp Selepyna, Mykola Yevsiuk, Stanislav Prystupa, Serhii Moroz26-30
-
POLARIZATION TOMOGRAPHY OF THE POLYCRYSTALINNE STRUCTURE OF HISTOLOGICAL SECTIONS OF HUMAN ORGANS IN DETERMINATION OF THE OLD DAMAGE
Olexandra Litvinenko, Victor Paliy, Olena Vуsotska, Inna Vishtak, Saule Kumargazhanova31-34
-
ANALYSIS OF UPPER RESPIRATORY TRACT SEGMENTATION FEATURES TO DETERMINE NASAL CONDUCTANCE
Oleg Avrunin, Yana Nosova, Nataliia Shushliapina, Ibrahim Younouss Abdelhamid, Oleksandr Avrunin, Svetlana Kyrylashchuk, Olha Moskovchuk, Orken Mamyrbayev35-40
-
THE USE OF Q-PREPARATION FOR AMPLITUDE FILTERING OF DISCRETED IMAGE
Leonid Timchenko, Natalia Kokriatskaia, Mykhailo Rozvodiuk, Volodymyr Tverdomed, Yuri Kutaev, Saule Smailova, Vladyslav Plisenko, Liudmyla Semenova, Dmytro Zhuk41-46
-
INFORMATION MODEL OF THE ASSESSMENT OF TOURISM SECTOR COMPETITIVENESS IN THE CONTEXT OF EUROPEAN INTEGRATION POLICY
Iryna Prychepa, Oksana Adler, Liliia Ruda, Olexander Lesko, Zlata Bondarenko, Lee Yanan, Dinara Mussayeva47-52
-
FORECASTING BUSINESS PROCESSES IN THE MANAGEMENT SYSTEM OF THE CORPORATION
Svitlana A. Yaremko, Elena M. Kuzmina, Nataliia B. Savina, Iryna Yu. Yepifanova, Halyna B. Gordiichuk, Dinara Mussayeva53-59
-
ELABORATION AND RESEARCH OF A MODEL OF OPTIMAL PRODUCTION AND DEVELOPMENT OF INDUSTRIAL SYSTEMS TAKING INTO ACCOUNT THE USE OF THE EXTERNAL RESOURCES
Dmytro Hryshyn, Taisa Borovska, Aliya Kalizhanova60-66
-
MODELING THE DEVELOPMENT PROCESS OF INCLUSIVE EDUCATION IN UKRAINE
Mariana M. Kovtoniuk, Olena P. Kosovets, Olena M. Soia, Olga Yu. Pinaieva, Vira G. Ovcharuk, Kuralay Mukhsina67-73
-
FREQUENCY-TO-CODE CONVERTER WITH DIRECT DATA TRANSMISSION
Piotr Warda74-77
-
DIGITAL APPROACH TO THERMIONIC EMISSION CURRENT TO VOLTAGE CONVERSION FOR HIGH-VOLTAGE SOURCES OF ELECTRONS
Bartosz Kania78-81
-
[Retracted]: SYSTEM SOFTWARE AT LABORATORY STAND „LIGHTS CONTROL ON THE BASIS OF PROGRAMMABLE LOGIC CONROLLER”
The article has been retracted due to a breach of ethical standards. The editorial board received a report that this work infringes on the copyrights of others. An investigation confirmed the validity of the report, resulting in the decision to retract the work. The evidence in the case is in the possession of the editorial board. The editorial board of the journal also declares that it has followed all procedures for checking the article for unethical practices before its publication in 2022.Laura Yesmakhanova, Raushan Dzhanuzakova, Bauyrzhan Myrkalykov82-86 -
FLAME ANALYSIS BY SELECTED METHODS IN THE FREQUENCY DOMAIN
Żaklin Grądz, Jacek Klimek, Czesław Kozak87-89
Archives
-
Vol. 14 No. 4
2024-12-21 25
-
Vol. 14 No. 3
2024-09-30 24
-
Vol. 14 No. 2
2024-06-30 24
-
Vol. 14 No. 1
2024-03-31 23
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 11 No. 4
2021-12-20 15
-
Vol. 11 No. 3
2021-09-30 10
-
Vol. 11 No. 2
2021-06-30 11
-
Vol. 11 No. 1
2021-03-31 14
-
Vol. 10 No. 4
2020-12-20 16
-
Vol. 10 No. 3
2020-09-30 22
-
Vol. 10 No. 2
2020-06-30 16
-
Vol. 10 No. 1
2020-03-30 19
Main Article Content
DOI
Authors
Abstract
The successful functioning of telecommunication networks largely depends on the effectiveness of algorithms for detection and protection against overloads. The article describes the main differences that arise when forecasting, monitoring and managing congestion at the node level and at the channel level. An algorithm for detecting congestion by estimating the entropy of time distributions of traffic parameters is proposed. The entropy measures of data sets for various types of model distribution, in particular for the Pareto distribution, which optimally describes the behavior of self-similar random processes, were calculated and analyzed. The advantages of this approach include scalability, sensitivity to changes in distributions of traffic characteristics and ease of implementation and accessible interpretation.
Keywords:
References
Airehrour D., Gutierrez J. A., Ray S. K.: SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems 93, 2019, 860–876 [http://doi.org/10.1016/j.future.2018.03.021]. DOI: https://doi.org/10.1016/j.future.2018.03.021
Alashhab A. A., Zahid M. S. M., Azim M. A., Daha M. Y., Isyaku B., Ali S.: A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks. Symmetry 14, 2022, 1563 [http://doi.org/10.3390/sym14081563]. DOI: https://doi.org/10.3390/sym14081563
Bakhovskyy P. et al.: Stages of the Virtual Technical Functions Concept Networks Development. Cagáˇnová et al. (eds.): Advances in Industrial Internet of Things, Engineering and Management. EAI/Springer Innovations in Communication and Computing, 2021, 119–135 [http://doi.org/10.1007/978-3-030-69705-1_7]. DOI: https://doi.org/10.1007/978-3-030-69705-1_7
Bedin A., Chiariotti F., Kucera S., Zanella A.: Optimal Latency-Oriented Coding and Scheduling in Parallel Queuing Systems. IEEE Transactions on Communications 70(10), 2022, 6471–6488 [http://doi.org/10.1109/TCOMM.2022.3200105]. DOI: https://doi.org/10.1109/TCOMM.2022.3200105
Chughtai O., Badruddin N., Rehan M., Khan A.: Congestion Detection and Alleviation in Multihop Wireless Sensor Networks. Wireless Communications and Mobile Computing 2017, 9243019 [http://doi.org/10.1155/2017/9243019]. DOI: https://doi.org/10.1155/2017/9243019
Desai R. M., Patil B. P., Sharma D. P.: Learning based route management in mobile ad hoc networks. Indonesian Journal of Electrical Engineering and Computer Science 7(3), 2017, 718–723 [http://doi.org/10.11591/ijeecs.v7.i3.pp718-723]. DOI: https://doi.org/10.11591/ijeecs.v7.i3.pp718-723
Desmoulins N., Fouque P.A., Onete C., Sanders O.: Pattern Matching on Encrypted Streams. ASIACRYPT 2018. Lecture Notes in Computer Science 11272, Springer, Cham. [http://doi.org/10.1007/978-3-030-03326-2_5]. DOI: https://doi.org/10.1007/978-3-030-03326-2_5
Divitskyi A., Salnyk S., Hol V., Sydorkin P., Storchak A.: Development of a model of a subsystem for forecasting changes in data transmission routes in special purpose mobile radio networks. Eastern-European Journal of Enterprise Technologies 3(9), 2021, 116–125 [http://doi.org/10.15587/1729-4061.2021.235609]. DOI: https://doi.org/10.15587/1729-4061.2021.235609
Dobkach L.: Analysis of methods for recognizing computer attacks. Legal informatics 1, 2020, 67–75 [http://doi.org/10/21681/1944-1404-2020-1-67-75].
Durairaj M., Hirudhaya Mary Asha J.: The Internet of Things (IoT) Routing Security – A Study. International Conference on Communication, Computing and Electronics Systems. Lecture Notes in Electrical Engineering 637. Springer, Singapore 2020 [http://doi.org/10.1007/978-981-15-2612-1_58]. DOI: https://doi.org/10.1007/978-981-15-2612-1_58
Hasan N., Mishra A, Ray A. K.: Fuzzy logic based cross-layer design to improve Quality of Service in Mobile ad-hoc networks for Next-gen Cyber Physical System. Engineering Science and Technology, an International Journal 35, 2022, 101099 [http://doi.org/10.1016/j.jestch.2022.101099]. DOI: https://doi.org/10.1016/j.jestch.2022.101099
Hui W., Zijian C., Bo H.: A Network Intrusion Detection System Based on Convolutional Neural Network. Journal of Intelligent & Fuzzy Systems 38(6), 2020, 7623–7637 [http://doi.org/10.3233/JIFS-179833]. DOI: https://doi.org/10.3233/JIFS-179833
Mangelkar S., Dhage S., Nimkar A.: A comparative study on RPL attacks and security solutions. International Conference on Intelligent Computing and Control (I2C2), 2017, 1–6 [http://doi.org/10.1109/I2C2.2017.8321851]. DOI: https://doi.org/10.1109/I2C2.2017.8321851
Moroz S., Tkachuk A., Khvyshchun M., Prystupa S., Yevsiuk M.: Methods for Ensuring Data Security in Mobile Standards. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 12(1), 2022, 4–9 [http://doi.org/10.35784/iapgos.2877]. DOI: https://doi.org/10.35784/iapgos.2877
Myneni S., Chowdhary A., Huang D., Alshamrani A.: A distributed deep defense against DDoS attacks with edge computing. Computer Networks 209, 2022, 108874 [http://doi.org/10.1016/j.comnet.2022.108874]. DOI: https://doi.org/10.1016/j.comnet.2022.108874
Priyadarshini R., Rabindra K.: A deep learning based intelligent framework to mitigate DDoS attack in fog environment. Journal of King Saud University – Computer and Information Sciences 34(3), 2022, 825–831 [http://doi.org/10.1016/j.jksuci.2019.04.010]. DOI: https://doi.org/10.1016/j.jksuci.2019.04.010
Rafe V., Mohammady S., Cuevas E.: Using Bayesian optimization algorithm for model-based integration testing. Soft Comput 26, 2022, 3503–3525 [http://doi.org/10.1007/s00500-021-06476-9]. DOI: https://doi.org/10.1007/s00500-021-06476-9
Showail A., Tahir R., Zaffar M. F., Noor M. H., Al-Khatib M.: An internet of secure and private things: A service-oriented architecture. Computers & Security 120, 2022, 102776 [http://doi.org/10.1016/j.cose.2022.102776]. DOI: https://doi.org/10.1016/j.cose.2022.102776
Tkachuk A. et al.: Basic Stations Work Optimization in Cellular Communication Network. Advances in Industrial Internet of Things, Engineering and Management, EAI. Springer Innovations in Communication and Computing, 2021, 1–19 [http://doi.org/10.1007/978-3-030-69705-1_1]. DOI: https://doi.org/10.1007/978-3-030-69705-1_1
Toroshanko Y., Selepyna Y., Yakymchuk N., Cherevyk V.: Control of traffic streams with the multi-rate token bucket, in International Conference on Advanced Information and Communications Technologies AICT 2019, 2019, 352–355 [http://doi.org/10.1109/AIACT.2019.8847860]. DOI: https://doi.org/10.1109/AIACT.2019.8847860
Verma A., Ranga V.: Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks. TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON), 2019, 552–557 [http://doi.org/10.1109/TENCON.2019.8929409]. DOI: https://doi.org/10.1109/TENCON.2019.8929409
Yin C., Wang H., Yin X. et al.: Improved deep packet inspection in data stream detection. J Supercomput 75, 2019, 4295–4308 [http://doi.org/10.1007/s11227-018-2685-y]. DOI: https://doi.org/10.1007/s11227-018-2685-y
Yungaicela-Naula N., Vargas-Rosales C., Pérez-Díaz J., Carrera D.: A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning. Journal of Network and Computer Applications 205, 2022, 103444 [http://doi.org/10.1016/j.jnca.2022.103444]. DOI: https://doi.org/10.1016/j.jnca.2022.103444
Zheng C., Li X., Liu Q., Sun Y., Fang B.: Hashing Incomplete and Unordered Network Streams. Advances in Digital Forensics XIV. DigitalForensics 2018. IFIP Advances in Information and Communication Technology 532. Springer, Cham. 2018 [https://doi.org/10.1007/978-3-319-99277-8_12]. DOI: https://doi.org/10.1007/978-3-319-99277-8_12
Article Details
Abstract views: 228
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
