PRINCIPLES AND STRUCTURE OF THE METHODOLOGY OF RISK-ADAPTIVE MANAGEMENT OF PARAMETERS OF INFORMATION AND TELECOMMUNICATION NETWORKS OF CRITICAL APPLICATION SYSTEMS
DOI:
https://doi.org/10.30837/2522-9818.2017.1.046Keywords:
information-telecommunication network, risks, adaptive management, information structure, parameters, methodologyAbstract
The subject matter of the article is the processes of structural synthesis and parametric analysis of information and telecommunication networks (ITN). The aim is to develop the methodological apparatus which will enable obtaining ITN structural and technical parameters in order to ensure the operation of safety-critical systems (SCS), adaptive to external conditions and resistant to risks. The tasks to be solved are: to formulate principles and definition of the structure of the risk-adaptive management methodology of ITN SCS parameters; to determine the composition of the methodical apparatus and the applied means of the suggested methodology. General scientific methods used are: system analysis, structural and parametric synthesis, methods of decomposition and aggregation, methods of risk-adaptive management. The following results are obtained. The diagram of the main stages of ITN analysis is presented. In this case, the elements of the distributed architecture of ITN SCS are defined. The requirements for calculating the characteristics of the information and technical structures of the network are listed. The ways of fixing SCS applications at the functional nodes of the network are considered. The steps that are performed at the stage of solving the task of network setting are defined. The stage of matching task settings and operational management is a part of adaptive control. The above steps of analysis, synthesis and management of ITN are the basis of the structure of the risk-adaptive ITN SCS management methodology, which includes the following elements: principles, models, methods, and applied means. The methodology is based on the principles of decomposition, matching of goals and coordination of management, stream analysis and modeling of processes, adaptive and risk-based management. The composition and peculiarities of models (mathematical and systemic) and methods which are the basis of the methodical apparatus are determined. The applied part of the methodology is implemented by the information technology of adaptive management of distribution of network traffic. On ITN basis, the problem of interaction of technical and software means in the management of traffic distribution and organization of collecting, processing and transmitting information in the management system is solved. Adaptive management is provided by solving the tasks of setting the mode. Risk orientation is represented by two contours of feedback, which involves assessment and risk management at the stages of structural and parametric synthesis and distribution of network traffic. Conclusions. The implementation of the suggested methodology for ITN synthesis and management will enable the operation of SCS that is adaptive to external conditions and risk-resistant, which contributes to the improvement of the system safety.References
Ageev, D. V., Ignatenko, A. A., Kopylev, A. N. (2011), "Method for determining the parameters of streams in different sections of a multiservice telecommunications network, taking into account the self-similarity effect", Electronic scientific specialized edition - journal "Problems of telecommunications" ["Metodika opredeleniya parametrov potokov na raznykh uchastkakh mul'tiservisnoy telekommunikatsionnoy seti s uchetom effekta samopodobiya", Elektronnoe nauchnoe spetsializirovannoe izdanie – zhurnal "Problemy telekommunikatsiy"], No. 3 (5), pp. 18-37, available at: http://pt.journal.kh.ua/2011/3/1/113_ageyev_ method.pdf
Losev, Yu. I., Rukkas, K. M. (2007), "Comparative analysis of mathematical apparatus of modeling of telecommunication networks", Information processing systems ["Sravnitel'nyy analiz matematicheskogo apparata modelirovaniya telekommunikatsionnykh setey", Systemy obrobky informatsiyi], No. 8 (66), pp. 55-60.
Gelenbe, E., Pujolle, G (2010), Analysis and synthesis of computer systems (2nd Edition), Advances in Computer Science and Engineering: Texts, Vol. 4, 309 p.
Poshtarenko, V. M., Andreev, A. Yu., Amal', M. (2013), "Ensuring quality of service at critical sections of a multiservice network", Bulletin of the National Technical University ["Obespechenie kachestva obsluzhivaniya na kriticheskikh uchastkakh mul'tiservisnoy seti", Visnyk Natsional'noho tekhnichnoho universytetu], No. 60, pp. 94-100.
Shelukhin, O. I. (2012), Modelirovanie informatsionnykh sistem [Modeling of information systems], Moscow, Goryachaya liniya Telekom, 516 p.
Paulsen, S., Boens J. (2012), Summary of the Workshop on information and communication technologies supply chain risk management, National Institute of Standarts and Technology, 21 p.
Boyarchuk, A. V. (2011), "Security of critical infrastructures: mathematical and engineering methods of analysis and provision" ["Bezopasnost' kriticheskikh infrastruktur: matematicheskie i inzhenernye metody analiza i obespecheniya"], Kharkov: NAKU «KhAI», 641 p.
Sklyar, V. V., Kharchenko, V. S. (ed.) (2011), "Methodology of risk analysis of functional safety of information-control systems", Safety of critical infrastructures: mathematical and engineering methods of analysis and provision, National Aerospace University "KhAI", Kharkiv, Section 12, pp. 360-408.
Kharybin, A. V., Odarushchenko, O. N. (2006), "About the approach to the decision of a problem of a choice of methodology of an estimation of structural reliability and survivability of information networks of critical application", Radio electronic and computer systems ["O podkhode k resheniyu zadachi vybora metodologii otsenki strukturnoy nadezhnosti i zhivuchesti informatsionnykh setey kriticheskogo primeneniya", Radіoelektronnі і komp’yuternі sistemi], No. 6, pp. 61-70.
Dodonov, A. G., Gorbachik, E. S., Kuznetsova, M. G. (2003), "The vitality of information and analytical systems in the aspect of information security", Collection of scientific works "Information Technologies and Security" ["Zhivuchest' informatsionno-analiticheskikh sistem v aspekte informatsionnoy bezopasnosti", Sb. nauch. tr. «Informatsionnye tekhnologii i bezopasnost'»], No. 4, IPRI NANU, Kiev, pp. 27-30.
Kosenko, V. V., Lisenko, E. V. (2015), "Analysis and mathematical modeling of the structure of information and telecommunications network", Monograph "Modeling Processes in Economics and Project Management on the Use of New Information Technologies" ["Analiz ta matematychne modelyuvannya struktury informatsiyno-telekomunikatsiynoyi merezhi", Monografіya "Modelyuvannya protsesіv v ekonomіtsі ta upravlіnnі proektami z vikoristannyam novikh іnformatsіynikh tekhnologіy"], KhNURE, Kharkov, pp. 215-227.
Levitt, K. N., Rou, D., Balepin, I. V., Mal'tsev, S. V. (2003), "Rapid Response Systems", Data protection. Confident ["Sistemy bystrogo reagirovaniya", Zashchita informatsii. Konfident], No. 5, pp. 47-50.
Ellison, R. J., Fisher, D. A., Linger, R. C., Lipson, H. F., et al. "Survivable Network Systems: An Emerging Discipline", available at: http://www.cert.org/research/ 97tr013.pdf Kuznyetsova, M. H. (2005), "The use of mechanisms to improve survivability in distributed information systems", Collection of scientific works "Information Technologies and Security" ["Vykorystannya mekhanizmiv pidvyshchennya zhyvuchosti u rozpodilenykh informatsiynykh systemakh", Sb. nauch. tr. Ynformatsyonnыe tekhnolohyy y bezopasnost'], YPRY NANU, Kiev, No. 8, pp. 63–65.
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2018 Viktor Kosenko
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Our journal abides by the Creative Commons copyright rights and permissions for open access journals.
Authors who publish with this journal agree to the following terms:
Authors hold the copyright without restrictions and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-commercial and non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their published work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.