Traffic modeling and analysis in channels of telecommunication subsystems of complex security systems

DOI: 10.31673/2412-9070.2023.022530

Authors

  • О. Г. Варфоломеєва, (Varfolomeyeva O. H.) State University of Telecommunications, Kyiv
  • А. Г. Захаржевський, (Zakharzhevsky A. H.) State University of Telecommunications, Kyiv

DOI:

https://doi.org/10.31673/2412-9070.2023.022530

Abstract

In the article, necessity of monitoring telecommunication subsystems of complex security systems is substantiated. A simulation model is proposed, which makes it possible to form elements of a time series, in the role of which the moments of the beginning of the transmission of messages act. The possibility of forming both stationary and non-stationary flows of events is foreseen. The results of research on the main methods of time series analysis are presented. It is shown that the used approaches do not allow detecting possible anomalous traffic states with the necessary efficiency and reliability. It is proposed to consider the telecommunication system as a dynamic system for the evaluation of different traffic states. Analytical expressions for the formation of dynamic variables, on the basis of which phase portraits are formed, are presented. The obtained results of the experiments confirmed the informativeness of the proposed variant of traffic display. It is shown that the assessment of the state of telecommunication systems using phase portraits makes it possible to detect abnormal traffic conditions, as well as to predict the behavior of a dynamic system in the future.

Keywords: complex security system, telecommunication subsystem, simulation model, time series, time series analysis methods, dynamic system, dynamic variables, phase portraits.

References
1. Taqqu M., Willinger W., Sherman R. Proof of a fundamental result in self-similar traffic modeling // Computer Communication Review. 2007. vol. 27, no. 2. Р. 5–23.
2. On the self-similar nature of Ethernet traffic / W. Leland, M. Taqqu, W. Willinger, D. Wilson// IEEE/ ACM Transactions on Networking, February, 2013. 2(1). Р. 1–15.
3. Paxon V., Floyd S. Wide-area traffic: The failure of Poisson modeling // IEEE/ACM Transactions on Networking. 2015. №3. Р. 226–244.
4. Feldmann A., Gilbert A.C., Willinger W. Data Networks as Cascades: Investigating the multifractal nature of Internet WAN traffic: Proc. 1998 ACM SIGCOM. Р. 42–55. Che H., Li S.-Q., Fast algorithms for measurement-based traffic modeling // IEEE Journal on Selected Areas in Communications. June 2018. Vol. 16. P. 612–625.
5. Mondragon R. J., Pitts J. M. Chaotic Maps for Traffic Modelling and Queueing Performance Analysis // Performance Evaluation. 2001. Vol. 43, No. 4. Р. 223–240.
6. Erramilli A., Sing R. P., Pruthi P. Modeling packet traffic with chaotic maps // Royal Institute of Technology, ISRN KTH/IT/R-95/18--SE, Stockholm-Kista Sweden, August, 2014.
7. Erramilli A., Singh R., Pruhti P. Chaotic maps as models of packet traffic // ITC 14, The Fundamental Role of Teletraffic in the Evolution of Telecommunications Networks (J. Labetoulle and J. Roberts, eds.), June 6-10 2019.

Published

2023-09-20

Issue

Section

Articles