МЕТОДИ СЕЛЕКЦІЇ ПЕРЕВАНТАЖЕНЬ ТА ВІДМОВ МЕРЕЖНИХ ВУЗЛІВ
Анотація
The method of selection of overloads and failures of network nodes
Further development of politics of traffic is application of the differentiated and integrated services it is dynamic allocation of stripe of key-in of channels of transmission between users taking into account their priorities instead of direction of all streams one by one or by a few locally-optimal routes. At such approach it is succeeded to avoid the periodic local overloads of routes, that were certain as optimal on the current stage, and on that all users directed the traffic.
Посилання
Таненбаум Э., Уэзеролл Д. Компьютерные сети: 5-е изд. – СПб: Питер, 2012. – 960 с.
Столлингс В. Современные компьютерные сети. 2-е изд. – СПб.: Питер, 2003. – 783 с.
##submission.downloads##
Опубліковано
2016-11-23
Як цитувати
Харлай, Л. О. (2016). МЕТОДИ СЕЛЕКЦІЇ ПЕРЕВАНТАЖЕНЬ ТА ВІДМОВ МЕРЕЖНИХ ВУЗЛІВ. Збірник матеріалів Міжнародної науково-технічної конференції «ПЕРСПЕКТИВИ ТЕЛЕКОМУНІКАЦІЙ». вилучено із https://conferenc-journal.its.kpi.ua/article/view/73104
Номер
Розділ
Технології транспортних телекомунікаційних систем та мережні технології
Ліцензія
Авторське право (c) 2016 Людмила Олексіївна Харлай
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.