ARTICLE
TITLE

MATHEMATICAL MODEL OF TRANSMISSION OF DATA IN THE MODE OF DETECTING THE ERRORS OF THE RECIPIENT WITH ACCOUNT OF FAILURES AT THE COMMUTATION NETWORKS IN NETWORKS OF AUTOMATED AIR TRAFFIC CONTROL SYSTEMS

SUMMARY

When transmitting information in modern networks of automated air traffic control systems, various methods of data exchange control are used, which is caused by the need to ensure the delivery time and the acceptable value of the equivalent error probability. In order to guarantee the delivery of messages, the reliability of the transmitted data is controlled, which is realized by using noise-immune encoding in detection or error correction modes with verification at each of the intermediate switching nodes or directly by the recipient. Thus, to study the probability-time characteristics of data exchange control methods in data exchange networks, it is necessary to analyze the process of packet transmission in the specified modes, taking into account the effect of intermediate switching nodes. In this case, in general, one should take into account both the presence of several data streams from other sources, and the possibility of failures in service at each of the switching nodes. The article describes a mathematical model of data transmission in the receiver error detection mode that allows to investigate the main probabilistic and temporal characteristics of the data transmission process in the networks of automated air traffic control systems in the mode of error detection taking into account additional information flows from other sources and possible failures at the switching nodes.

 Articles related

Oleh Y. Sova,Valerii A. Romaniuk,Pavlo V. Zhuk,Vitalii M. Oshurko    

Objective functions are optimality criterion for the nodal intellectual control systems decisions. The primary objective functions are: throughput maximization, the messages delivery time minimization, transmission power minimization or radio network lif... see more


Oleksandr Y. Salii    

We conducted analysis of frequency range occupation and engagement by the usury of various origin (civil or military) and written it out in the given article. It allows to define the priorities in the increase of efficiency of radio electronic suppressio... see more


Ihor V. Ruban,Yevhenii S. Loshakov,Dmytro V. Prybylnov    

Analysis of the main types of DoS-attacks has carried out. The ways of their realization for attacks of computer networks and possibilities of protection against them have considered.


Yurii V. Kravchenko,Olena V. Starkova,Roman A. Mykolaichuk,Serhii A. Mykus    

The article introduces the OSI-interlayer consistency problem, gives the possible solution through the use of developed theoretical foundations the OSI-interlayer protocol consistency. It is known that the formation and organization of data transfer subj... see more


Boris Melnikov,Yulia Terentyeva    

The paper deals with the development of the topology of ultra-large communication networks, i.e. networks containing several thousand vertices. In this case, the coordinates of the vertices of the undirected graph are somehow predetermined and a set of e... see more