Reenterable Model of Provider Backbone Bridge

Reenterable Model of Provider Backbone Bridge

The model has the same structure for any given PBB network. It evaluates the maximal and average network response time on-fly. The network topology is inputted as a value of dedicated constant together with other parameters such as addresses of various types of terminal and communication equipment their performance and the number of ports. Reenterable models are devised for model-driven design of networks. Dmitry A. […]

Read Me

Reenterable Model of Rectangular Communication Grid with Cut-through Nodes

Reenterable Model of Rectangular Communication Grid with Cut-through Nodes

A reenterable model of communication grid with cut-through nodes is constructed. The cut-through transmission of packets works fast, because it uses only the head of packet, which contains the destination address, for the forwarding decision. The reenterable models of the grid structures do not depend on the grid size that is the main advantage of reenterable models. The grid performance and average packet delivery time […]

Read Me

Reenterable Model of Rectangular Communication Grid

Reenterable Model of Rectangular Communication Grid

A reenterable model of communication grid with store-and-forward (SAF) nodes is constructed. The reenterable models of the grid structures do not depend on the grid size that is the main advantage of reenterable models. The grid performance and average packet delivery time are evaluated for various intensity of Poisson and Uniform distributions.   Shmeleva T.R. Efficiency estimation of computing grids with various traffic types. Proceedings […]

Read Me

Rectangular Grid with Cut-through Switching Nodes

Rectangular Grid with Cut-through Switching Nodes

The model is composed of packet switching nodes situated on a rectangular grid and generators of traffic attached to the grid borders. It is supplied with malefactor models in the form of traffic guns disguised under regular multimedia traffic. Switching nodes use cut-through transmission of packets that works fast, because it uses only the head of packet, which contains the destination address, for the forwarding […]

Read Me

Rectangular grid under disguised traffic attack

Rectangular grid under disguised traffic attack

The model consists of an 8×8 matrix of switching nodes that deliver packets to computing nodes which are attached to the matrix borders and produce and consume packets. Traffic guns are added to the model to represent traffic attacks. Simulation in CPN Tools revealed simple and dangerous traffic gun configurations. D. A. Zaitsev , T. R. Shmeleva, W. Retschitzegger, B. Pröll Security of grid structures […]

Read Me