Keywords: networks, information, access, safety, networks, access, safety
THE POSSIBILITIES OF THE NETWORK INFORMATION EXCHANGE
UDC 681.3
DOI:
In the paper the features of the network exchange in modern means of communications are considered. The main advantages of means the Internet from the point of view of use in big networks are analyzed. The features of program systems which can be used for the analysis of characteristics of safety of computer networks are shown.
1. Fomina Yu.A., Preobrazhensky Yu.P. Indexing Principles information in search engines / Bulletin of Voronezh Institute of High Technologies. 2010. No. 7. S. 98-100.
2. Ermolova VV, Preobrazhensky Yu.P. Exchange System Architecture messages in a non-routed network / Bulletin of Voronezh Institute of High Technologies. 2010. No. 7. P. 79-81.
3. Deshina A.E., Choporov ON, Razinkin K.A. Information Risks in multiserver systems: selection of protection system parameters / Information and security. 2013.V. 16. No. 3. S. 365-370.
4. Dushkin A.V., Choporov O.N. Threat decomposition model security information and telecommunication systems / Information and security. 2007.V. 10. No. 1. P. 141-146.
5. Zavyalov D.V. On the application of information technology / Modern high technology. 2013. No. 8-1. S. 71-72.
6. Baranov A.V. Problems of the functioning of mesh-networks / Bulletin Voronezh Institute of High Technologies. 2012. No. 9. P. 49-50.
7. Miloshenko OV Methods for assessing propagation characteristics radio waves in mobile radio communication systems / Bulletin Voronezh Institute of High Technologies. 2012. No. 9. S. 60-62.
8. Mishin Ya.A. About CAD systems in wireless networks / Bulletin of the Voronezh Institute of High technology. 2013. No. 10. P. 153-156.
9. Golovinov S.O., Khromykh A.A. Systems Management Issues Mobile Communications / Bulletin of the Voronezh Institute of High technology. 2012. No. 9. S. 13-14.
10. Deshina A.E., Ushkin I.A., Choporov O.N. Integral Evaluation general risk in the synthesis of itx based on its risk parameters Components / Information and Security. 2013.V. 16. No. 4. P. 510- 513.
11. Popov EA, Korneeva NN, Choporov O.N., Zaryaev A.V. Risk analysis information and telecommunication systems with additive the nature of the irregularity parameter / Information and security. 2013.V. 16. No. 4. P. 482-485.
12. Popov EA, Korneeva NN, Choporov O.N., Zaryaev A.V. Risk analysis information and telecommunication systems with additive the nature of the irregularity parameter / Information and security. 2013.V. 16. No. 4. P. 482-485.
13. Zazulin A.V., Preobrazhensky Yu.P. Construction Features semantic domain models / Bulletin Voronezh Institute of High Technologies. 2008. No. 3. S. 026-028.
14. Internet portal of Sourcefire, a Snort software developer: http://www.snort.org/ [Electronic resource] Access: 03/08/2015.
15. Statsenko, P. Fundamentals of backup and recovery Information on the example of the HP Data Protector software product: Textbook course // Internet University of Information Technologies INTUIT.ru. [Electronic resource] Access: 03/08/2015.
16. Интернет-портал компании "Лаборатория Касперского", разработчика ПО "Kaspersky Internet Security 2015": http://www.kaspersky.ru/ [Электронный ресурс] Доступ: 08.03.2015.
Keywords: networks, information, access, safety, networks, access, safety
For citation: Kostrova V.N., Miloshenko O.V. THE POSSIBILITIES OF THE NETWORK INFORMATION EXCHANGE. Modeling, Optimization and Information Technology. 2015;3(1). URL: https://moit.vivt.ru/wp-content/uploads/2015/04/KostrovaMiloshenko_1_15_1.pdf DOI: (In Russ).
Published 31.03.2015