Formation of a sustainable data transmission channel on the internet.

Keywords: data channel, network, Internet, formation, stability, impact, package, security, speed.

Abstract

A study of the principles of forming a stable data transmission channel on the Internet. Models, methods and algorithms for implementing data transmission on the Internet are revealed. The principles of data network formation are described. It is emphasized that such a parameter as the speed of data packets transmission on the Internet is controlled by the data flow and at the same time - by indirect measurements. It is noted that the distribution of data streams by the shortest ways for the implementation of fast and high-quality data arrays is especially problematic. It is emphasized that the methods of data transmission on the Internet, which require minimal time, or methods with minimal interference are such problems, on this basis, it is noted that the optimization of the path should be carried out according to any technical and economic criteria, ensure efficient use of communication lines and vertices. The need to create and develop new models of computer networks in connection with the emergence of global networks, the growth of information to be transmitted, its volume and the need to maintain high-quality computer security. The implementation of the method of Dijkstra, Johnson and Jackson is described. Each of the algorithms is mathematically substantiated and a number of advantages and disadvantages of the described algorithms in the process of data transmission on the Internet are formed, taking into account the conditions of transmission, the amount of information transmitted and the channels used for transmission. It is emphasized that the application of the considered algorithms of data transfer will allow to optimize the process of data transfer and processing in computer networks, in turn, optimized data transfer and processing will significantly reduce operating time and software development and maintenance costs. software is possible due to the integration of information resources into the data center, provided the integration, significantly reduce the cost of services and data transmission on the Internet.

References

Zanjireh, M. M., & Larijani, H. (2015, May). A survey on centralised and distributed clustering routing algorithms for WSNs. In 2015 IEEE 81st Vehicular Technology Conference (VTC Spring) (pp. 1-6). IEEE.

Toh, C. K., Le, A. N., & Cho, Y. Z. (2009). Load balanced routing protocols for ad hoc mobile wireless networks. IEEE Communications Magazine, 47(8), 78-84.

Stajano, F., & Anderson, R. (1999, April). The resurrecting duckling: Security issues for ad-hoc wireless networks. In International workshop on security protocols (pp. 172-182). Springer, Berlin, Heidelberg.

Wilensky, U., & Rand, W. (2015). An Introduction to Agent-Based Modeling: Modeling Natural, Social, and. In and engineered complex systems with NetLogo. The MIT Press.

Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2003, May). LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks. In 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings. (pp. 749-755). IEEE. doi: 10.1109/icdcsw.2003.1203642.

Abstract views: 94
PDF Downloads: 98
Published
2021-06-30
How to Cite
Ozerchuk , I. (2021). Formation of a sustainable data transmission channel on the internet . COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (43), 212-217. https://doi.org/10.36910/6775-2524-0560-2021-43-35
Section
Computer science and computer engineering