INFORMATION TECHNOLOGY OF MANAGING PARAMETERS OF INFORMATION ANDCOMMUNICATION NETWORK IN THE SYSTEMS OF CRITICAL INFRASTRUCTURE

Authors

  • N. V. Kosenko

Keywords:

information technology, critical infrastructure system, information and communication network, adaptive management, process model, data flow intensity

Abstract

The subject matter of the article is the problem of ensuring the requirements for the efficiency and exchange of information with a high level of information security in critical infrastructure systems. The goals of the work is to develop information technology for network structuring, to determine its parameters, to manage the distribution of network traffic, that focus on solving a given set of applications and providing the necessary security of critical infrastructure within the information and communication network. The following tasks were solved in the article: the model of information technology process for managing the parameters of the information and communication network was developed, the block for developing the information structure of the network for the automated control system of technological processes was tested. Such methods as the set-theoretical one and matrix calculations were used; the process models were presented in IDEF0 notation. The following results were obtained. The structure of the information technology which contains three main blocks was suggested. The sequence of processes in each block was considered. The model of the block for developing the structure of the information and communication network was developed. The operation of the synthesiser of the network informational structure was considered regarding the software and hardware complex as a part of the automated control system of technological processes as an example. The functional tasks of the software and hardware complex were determined and distributed among the hierarchical levels of the network. According to the structural diagram of the automated control system, elements of the information model of the network structure were determined. Conclusions: The suggested information technology help solve the following tasks: according to the received parameters of information structure, the requirements for the technical structure of the network can be determined; the adaptive managing the parameters of data flows can be ensured by setting the network to the varied conditions of operation of critical infrastructure system; risks at the stages of structural and parametric synthesis and distribution of network traffic can be assessed and managed.

Downloads

Download data is not yet available.

References

Бірюков Д. С. Захист критичної інфраструктури: проблеми та перспективи впровадження в Україні / Д. С. Бірюков, С. І. Кондратов. – К. : НІСД, 2012. – 96 с.

Лаврут О.О. Дослідження якості управління потоками інформації у телекомунікаційній системі критичного призначення // Системи озброєння і військова техніка, 2014, № 4(40) – С.89-93.

Степанов С.Н. Основы телетрафика мультисервисных сетей. - Эко-Трендз, 2010 – 391с.

Основные стандарты сетей передачи даннях [Е лектроний ресурс] Режим доступу: http://www.gpntb.ru/win/book/5/Doc11.HTML

Проектирование телекоммуникационных и информационных средств и систем: Сб. науч. тр. / Под ред. Л.Н. Кечиева. – М. МИЭМ. – 2006. – 302с.

Агеев, Д.В. Методика определения параметров потоков на разных участках мультисервисной телекоммуникационной сети с учетом эффекта самоподобия [E лектроний ресурс] / Д.В. Агеев, А.А. Игнатенко, А.Н. Копылев // «Проблемы телекоммуникаций», 2011, № 3 (5). – С. 18 – 37. Режим доступа: http://pt.journal.kh.ua/2011/3/1/113_ageyev_ method.pdf.

Sen, G. Exact approaches for static data segment allocation problem in an information network [Text] / G. Sen, M. Krishnamoorthy, N. Rangaraj, V. Narayanan // Computers & Operations Research. – 2015. – Vol. 62. – P. 282–295.

You, L. Cross-layer optimization of wireless multihop networks with one-hop two-way network coding [Text] / L. You, L. Ding, P. Wu, Z. Pan, H. Hu, M. Song, J. Song // Computer Networks. – 2011. – Vol. 55, Issue 8. – P. 1747–1769.

Xi, N. Secure service composition with information flow control in service clouds [Text] / N. Xi, C. Sun, J. Ma, Y. Shen // Future Generation Computer Systems. – 2015. – Vol. 49. – P. 142–148.

Гончар С.Ф. Шляхи удосконалення державної політики забезпечення інформаційної безпеки критичної інфраструктури України: матеріали круглого столу “Державне реагування на загрози національним інтересам України: актуальні проблеми та шляхи їх розв'язання”, 19 лютого 2014 р., Київ, НАДУ при Президентові України (кафедра національної безпеки). – 2014. – С. 92–95.

Боярчук А.В. Безопасность критических инфраструктур: математические и инженерные методы анализа и обеспечения / А.В. Боярчук; под ред. В.С. Харченко. – Харьков: НАКУ «ХАИ», 2011. – 641с.

Кучук Г.А. Методика синтезу інформаційної технології управління мережевим трафіком / Г.А. Кучук, В.В. Косенко, О.П. Давікоза, С.А. Калкаманов // Системи управління, навігації та зв'язку, 2013, випуск 2(26) – С.138-143.

Downloads

Published

2017-12-30