FIELD: information technology.
SUBSTANCE: method further includes specifying a set of M service control nodes; after receiving response messages from the service control nodes, selecting and storing identifiers and addresses of service control nodes, as well as a plurality of L messaging routes, followed by calculating the critical ratio of previously stored "hazardous" and "safe" nodes
EFFECT: high reliability of results of comparative evaluation of information computer networks structures in conditions exposed to random and deliberate interference by forming alternative routes to service control nodes included in the information computer network structure and determining a safer route.
3 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR COMPARATIVE ASSESSMENT OF INFORMATION COMPUTER NETWORK | 2009 |
|
RU2408928C1 |
METHOD FOR COMPARATIVE ASSESSMENT OF COMMUNICATION NETWORK STRUCTURES | 2021 |
|
RU2791154C1 |
METHOD FOR COMPARATIVE EVALUATION OF COMMUNICATION NETWORK STRUCTURES | 2011 |
|
RU2460123C1 |
METHOD FOR COMPARATIVE EVALUATION OF COMMUNICATION NETWORK STRUCTURES | 2011 |
|
RU2450338C1 |
RELIABLE ESTIMATION METHOD OF RESISTANCE TO ACCIDENTS OF AUTOMATED INFORMATION SYSTEMS | 2018 |
|
RU2741273C2 |
METHOD OF COMPARATIVE ESTIMATION OF COMMUNICATION NETWORK STRUCTURES | 2016 |
|
RU2626099C1 |
METHOD FOR PROTECTING INFORMATION-COMPUTER NETWORKS AGAINST CYBER ATTACKS | 2016 |
|
RU2622788C1 |
METHOD FOR MASKING THE STRUCTURE OF TELECOMMUNICATION NETWORK | 2016 |
|
RU2622842C1 |
METHOD OF EVASIVE ROUTING IN COMMUNICATION NETWORKS (VARIANTS) | 2007 |
|
RU2331158C1 |
METHOD FOR MASKING STRUCTURE OF TELECOMMUNICATION NETWORK | 2016 |
|
RU2645292C2 |
Authors
Dates
2016-01-20—Published
2014-05-19—Filed