Objective: To develop a formalized algorithm of carrier class network Carrier Ethernet operation and, by means of the latter, obtain an assessment of control cycle duration for intelligent control system (ISU) of the network in question. The given operation scenario is different from those currently in use by an account of processes of the new generation Carrier Ethernet network, failures’ identification and reconstruction of network elements by means of core control technologies of elements’ status (OAM technologies) and application of statistically defined change traffic (distributive laws) of Carrier Ethernet network elements’ status. Methods: In order to achieve the objective in question the following methods were applied: signature method, statistical method and neural networks. Results: The building principles of Carrier Ethernet network were presented and its OAM architecture was formed. In accordance with the analyzed types of Carrier Ethernet network connections and failure control mechanisms on the basis of OAM, control process and Carrier Ethernet network operation scenario was developed. Practical importance: The obtained operation scenario of the new generation network and the assessment of ISU control cycle of Carrier Ethernet network makes it possible to formulate the requirements to perspective operation system, whereas the assessment result of Carrier Ethernet network operation cycle duration allows one to determine probabilistically time response characteristics of network functioning and assess the input of different subprocesses in the total process time. The presented building principles of Carrier Ethernet network make it possible to solve the task halfway, which is aimed at the necessity of building a unified methodological basis for the formation of perspective operation system for the network in question.
Objective: To consider the main approaches to organization of systems and communication networks on high-speed railway transport and provide cyber security on the basis of current international and home practice in the given sphere. Methods: Game-theory approach, hierarchy analysis method as well as topological transformation of stochastic networks were applied in the given study. Results: It was detected that a single realization of organizational and technical measures on cyber security cannot provide strong security from threats of cyber security during a long period of time; the latter is connected with constant development of data infrastructure, modification of methods, as well as the methods of attacks, potential attacker opportunities and other factors. Telecommunication networks’ security (TKS) of OJSC “Russian railways” and high-speed railway lines (VSM) from cyber impact is a systemic problem, for the solution of which fundamental research studies are to be conducted, aimed at the detection of basic patterns of information confrontation and directions of TKS cyber security provision and, subsequently, research and development activities for creating an automated communication control system of OJSC “Russian railways” and VSM, the constituent part of which is a subsystem of TKS information security. It is advisable to create an expert council based at regional transport universities, which provide extensive analysis conduct of systems and means of providing information security offered by the industry, as well as cyber security of OJSC “Russian railways” and VSM critically important systems including TKS. Practical importance: The realization of the suggested approach to OJSC “Russian railways” and VSM cyber security provision will make it possible to form the conditions for safe functioning of elements of information infrastructure, provide the creation, effective functioning and the improvement of cyber security control system, as well as to minimize damage from possible attack attempts.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.