2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon) 2019
DOI: 10.1109/fareastcon.2019.8934215
|View full text |Cite
|
Sign up to set email alerts
|

Method for Providing Rationale of Basic Option of Information and Telecommunication Network under Hostile Action

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…In this data transmission network, data transmission routes are organized for information exchange in accordance with the required quality of user service (Figure 2). nisms of telecommunication networks, in [7,8,23] it is proposed to use a complex of GERT models that allows one to estimate the average time and dispersion of the metadata file transmission time, organization and delivery time of control transfer commands to a software client of the telecommunication network. The main restriction of the solutions obtained in [7,8] is the limitation on the type of traffic transmitted in the network and the usage of individual exponential distributions characterizing the realization time of individual processes, namely, the transmission of an information packet and the formation and delivery of control transmission commands.…”
Section: Problem Statementmentioning
confidence: 99%
“…In this data transmission network, data transmission routes are organized for information exchange in accordance with the required quality of user service (Figure 2). nisms of telecommunication networks, in [7,8,23] it is proposed to use a complex of GERT models that allows one to estimate the average time and dispersion of the metadata file transmission time, organization and delivery time of control transfer commands to a software client of the telecommunication network. The main restriction of the solutions obtained in [7,8] is the limitation on the type of traffic transmitted in the network and the usage of individual exponential distributions characterizing the realization time of individual processes, namely, the transmission of an information packet and the formation and delivery of control transmission commands.…”
Section: Problem Statementmentioning
confidence: 99%