No 3 (2012)
3-10 390
Abstract
Bit Torrent protocol is a leader of file transfer protocols. The main aim of the protocol is to distribute the file to a lot of participants without reducing the file distribution accessibility. While creating, the protocol was intended as a central node (tracker), which stores and distributes participants' list of distribution. As the owner of the tracker, you can manage traffic distribution inside the Bit Torrent network, simply changing the list of participants.
Over time, the question of decentralization arose. It was facilitated by several factors: the inability of trackers to serve huge number of participants, a large number of independent trackers, right possessors' claims for content distribution protected by copyright. The solution was to add to the protocol BitTorrent[5] describing the distribution of the participants with the help of DHT protocol. As a result, the possibility to influence traffic distribution or to manage the list of participants was eliminated.
This paper describes a method you can influence the network traffic and BitTorrent protocol and to manage if not fully but partially the process of file distribution. It can be useful as for the Internet providers for data flows redistribution within their network and for the right possessors to limit file distribution.
Over time, the question of decentralization arose. It was facilitated by several factors: the inability of trackers to serve huge number of participants, a large number of independent trackers, right possessors' claims for content distribution protected by copyright. The solution was to add to the protocol BitTorrent[5] describing the distribution of the participants with the help of DHT protocol. As a result, the possibility to influence traffic distribution or to manage the list of participants was eliminated.
This paper describes a method you can influence the network traffic and BitTorrent protocol and to manage if not fully but partially the process of file distribution. It can be useful as for the Internet providers for data flows redistribution within their network and for the right possessors to limit file distribution.
11-28 132
Abstract
This paper presents a new hyper network approach to networks infrastructure optimization. The focus is on the interdependence of anthropogenic system indexes «land site + network». The results of numerical experiments on the calculation of the linear structures installation cost of a given site are presented.
29-39 587
Abstract
This article observes destructive software tools recognition based on hidden Markov's models. Mathematical model of recognition system is considered and assessment results of it's effectiveness are presented.
40-49 202
Abstract
This paper considers main causes of element mismatch in differential pairs and current mirrors while designing complex functional (CF) blocks of digital-to-analog and analog-to-digital converters of integrated circuits according to submicron CMOS technology. Main problems encountered while designing differential pairs and current mirrors being part of CF blocks and using fictitious (dummy) transistors are considered. General principles of mismatched elements layout are presented. The necessity of using dummy transistors being part of differential pairs and current mirrors is presented. The analysis of mismatched elements layout design using dummy elements is conducted. Basic dummy transistor connection variants are given. Check code of dummy transistors connection for various differential pairs design and current mirrors by means of Calibre topology verification by Mentor Graphics.
50-55 135
Abstract
The article analyzes the specifics of the industry specific human capital theory illustrated by the example, forming an index of development of innovative human capital for innovative business projects in 21 regions of Russian Federation in the field of «electrical equipment production» for the period from 2006 to 2010. Based on the analysis, a regression model of development of innovative human capital for business project «electrical equipment production» is formulated. The regression model takes the form of a linear simple regression equation linking the number of innovative organizations with the level of development of innovative human capital.
56-80 555
Abstract
This article considers complex of experiments aimed at practical confirmation of one of the varieties of the frequency reflectometry method functionality based on the use of broadband probing signals with the spectrum presenting frequency spectrum with even pitch. The description of the experiment routine is presented. The results and conclusions are presented, perspectives for further development and usage of the method are outlined. The article is written in such a way as to enable experimenters to get the same results with the described methods as well as to continue further research.
81-85 142
Abstract
The interframe offsets model and pseudogradient algorithm of images shifts and turns estimation on frames sequence are described. The accelerated sequential algorithm on the base of pseudogradient algorithm is proposed. The efficiency of accelerated sequential algorithm convergence is presented.
86-97 403
Abstract
The aim of this paper is to develop sources of secondary power supply 200watts, implementing the technology of «soft switching» Zero Voltage Switch (ZVS). This paper consists of several parts addressing various aspects of modular power supplies construction. In the first part of the paper the results of the analysis of information sources and evaluation of the most important parameters of some foreign modular power supplies are presented.
98-104 163
Abstract
In this paper, quantitative analysis of the effectiveness of multicast routing methods in multiservice networks is presented. Recommendations on application of multicast routing methods in the conditions of various level of network nonstationarity are suggested.
105-135 163
Abstract
We investigate behavioural equivalences of concurrent systems modeled by Petri nets with invisible transitions labeled by silent actions. τ-equivalences are the relations which abstract from silent actions corresponding to internal activity of the modeled system. The basic τ-equivalences known from the literature are supplemented by new notions. The interrelations of all the equivalences are determined on the whole class of Petri nets as well as on two subclasses: Petri nets with visible transitions, where no transitions are labeled by the invisible action, and sequential Petri nets, where no concurrent transition firings exist. We present an example of equivalence-preserving reduction of a Petri net that models the well-known dining philosophers system. The decidability results for basic τ-equivalences are outlined.
ISSN 1998-6920 (Print)