004.056.5 ..

( , ) ( ) .
: , , , .
() QoS () ( , , ..). - . ( , ). , , , QoS , . .
. , . : ;
Lk ? = AI^ + B, ? -
; , - , . , Lk , ? QoS , . QoS , [1]
: = (), = () - , -
;/ = 1,1; I - ї . (1) . 1
Lk = 2 Lk ; Lk = const.
1 256 2048 ; 256- (3) [2].
()
(2)
l
ї ї
t

(3)
V
J

-
() - () [2]. = {\, 2}
(\) (2); $ - = {1,2} -
( = 1, ). = (1,...,,...,). , () * = {1,2}.
<
/ 3 2 1 0
2
. 1.
, 2 :
()
5 (/ ( ; = 0,
- =

3()
^ =2
( ; = 0,)
(2) (-^0)}
[ = 5 = ^2 ]
( ; = 0)
,
(- ∞ )
3(2/ ( ; = 0,
1 () 1 ,
0 = 1-------; = 1-
0 (2) 1
1 \
,()

1
{ / ( ; = 0, )}
(------:-----= 0 + X -
\2/ ( ; = 0^} =
,
, [>0^ = ; 0 + *
= [ < 0^ = 2.
. 2.
(4)
(5)
(6)
> 0, = <0, * = 2
. 2.
, -
-

(0.
I - ± , - 1, - ,
-1
+1+2
-1-2
+1+2
(7)
-1- 2 (1- ) 2 2 .
-0
. 3. (7).
. 3. = / ()
, , , .. . [3].
: ) - /- , ; ) /- (/ = 1, ).
()
(8)
= .
/=1
, .


) - 1-(1-∞ ).
-1
)-1- , )-1-().
'
(9)
(10)

() - -
()

(11)
(11):


ln 1- nlnQff .
, :

-
,(i)
.
(12) , (1) (10)
ln
Q(Pe)
Q

c(i)

(12)
(13)
(14)
(14) ,
) , :
ln(1-)

(i)
(15)
. , , [4, 7] ( ) (. 4).
-
-
() ( ())
,





. 4. MCC
( = 1,t) ( ). ,
, , .
, , (), - ():
- QoS ;
- (, , ).
, .
, ( ), , , QoS , .
. [4] , IP, ATM MPLS. , , , .
-ї - ї ї . ї . ( - ) ї .
-ї - ї ї , ї , , . , . , , , QoS . , , ї .
--ї - ї, ї ї. . ї . ( ) -ї .
[5] .
G[As Ms] : As = {a}; i = 1,S - ; Ms = {m-}; i,j = 1,S; i^ j - (). -
I IJ

j w , (16)
(S -iHj j j j
P(j) = (p(j)); Zp(j)v= 1,H j;i, j = 1,S; Hj - aj - . p(j) i V=1
, aj - ai - ,
, v - . (16) (M).
-
XHrT' XH -1 ~XT,R,rx
f (X) =
;R,T = 1, S;R^ ; = 1,t; x> 0; (H )
0, x < 0,
<x>
() = | - - : ^,, -
0
- - - ; 0,5 <<1 -
5
. - ^= ^ %
,=1
- - -
- II II ,, ~
= , ; 0^-=^1; 2 ,=1; =1,
, , N=1
- .
{; ^)} = f{G[As,]; ; ^ }; ,=1; ; == ; (17)
().
, = 1,; ; = 1,? - -
() () - ; - - - .
(17) (18):

{
V.

( )= ()
( )3 ()
, ()3
^/='2 -,,>; 3=1;;
=1
(
=.
() . . () . .2 () . .
1 , ,. ,.,. + ,,.
16
(
1-
() . . () . .2 () . .
,,3 + ,1,. + ,.,.
16
^ __1
1 () .. () . .2 () . .
1,1,1 ,l,J ,.,.
4 ' V 16 2
(18)
=2 0). ( "); , = 1, ; = 1,?;
=1 =1
}(,)= 2 =1 ,()
= 2 ) ( 1"); , = 1,; = 1,?.
=1
() - . . ()
( )
- - ; - , .. ^, = 1
( ) = 1-( )
( )= ()
( ) ()



();
,
()3 ()3
. 3 = 2 ; 1,; . 3 - -
=
=1 )
=
=1 ()

. . 7 ()3 () 3
. 3; .,. = 1,; .. ; . = '.; ,3 = 1,; .3 - - ( ),. ().
.,3; .,3 = 1,; . 3 - - ; ()3 - - ..;.,. =1,;. . , [6]; - G[ ,]; = 1,2 - G[ ,]; 00) 0.) , 1, , -, , ї - . . . 0.
(18) - 30% (17).
. :

- ( , ) ( ) .
- .
- 30% .

1. , / .. , .. : ї , 16462 6 2010 ., . 50201050230 08.12.2010 .
2. . 2 513 725 , G 06 F 11/00. / .. , .. (). - 2 012 122 695 / 08; . 01.06.12; . 20.04.14. - . 11. - 17 .
3. , / .. , .. : ї , 16227 29 2010 ., . 50201001615 05.10.2010 .
4. .. // . - 2013. - 2 (25). - . 92-96.
5. Novikov S.N. The Analysis of Probability Time Characteristics of a Telecommunication Network / S.N. Novikov, A.A. Burov // The IEEE International Siberian Conference on Control and Communications (SIBC0N-2005). - Russia, Tomsk, 2005. - P. 26-29.
6. / .. , .. // . - 2002. - 2. - . 35-39.
7. .. / .. , .. // . - 2013. - 6. -. 16-20.

. . , , . . ,
.
.: +7 (383) 269-82-45
. : snovikov@ngs.ru
Novikov S.N.
Methodological aspects of data protection with the use of resources multiservice networks
The methodological basis of complex protection of user information (ensuring the confidentiality, integrity and availability) technology-based cross-tevogo level (routing and signaling protocols) multiservice networks are proposed.
Keywords: confidentiality, integrity, availability, routing.