{"id":4744,"date":"2021-03-12T14:31:25","date_gmt":"2021-03-12T12:31:25","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=4744"},"modified":"2021-03-16T12:04:40","modified_gmt":"2021-03-16T10:04:40","slug":"%d1%82%d0%b5%d1%85%d0%bd%d1%96%d1%87%d0%bd%d1%96-%d0%b7%d0%b0%d1%81%d0%be%d0%b1%d0%b8-%d0%bc%d0%be%d0%b4%d0%b5%d0%bb%d1%8e%d0%b2%d0%b0%d0%bd%d0%bd%d1%8f-%d1%80%d0%be%d0%b1%d0%be%d1%82%d0%b8-%d0%bc","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=4744","title":{"rendered":"\u0422\u0435\u0445\u043d\u0456\u0447\u043d\u0456 \u0437\u0430\u0441\u043e\u0431\u0438 \u043c\u043e\u0434\u0435\u043b\u044e\u0432\u0430\u043d\u043d\u044f \u0440\u043e\u0431\u043e\u0442\u0438 \u043c\u0435\u0440\u0435\u0436"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u0422\u0415\u0425\u041d\u0406\u0427\u041d\u0406 \u0417\u0410\u0421\u041e\u0411\u0418 \u041c\u041e\u0414\u0415\u041b\u042e\u0412\u0410\u041d\u041d\u042f \u0420\u041e\u0411\u041e\u0422\u0418 \u041c\u0415\u0420\u0415\u0416<\/p>\n<p style=\"text-align: center;\">MODERN NETWORK MODELLING SOFTWARE<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/03\/7-2.pdf\"> <img loading=\"lazy\" class=\"size-full wp-image-69 alignnone\" src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" alt=\"\" width=\"76\" height=\"32\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 35-38. \u041d\u043e\u043c\u0435\u0440: \u21165, 2020 (289)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u041e.\u041e. \u041f\u041e\u041b\u042c\u041d\u041e\u0412, \u041a.\u041b. \u0413\u041e\u0420\u042f\u0429\u0415\u041d\u041a\u041e, \u0412.\u0412. \u041c\u0406\u0428\u0410\u041d<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nO. POLNOV, K. HORIASHCHENKO, V. MISHAN<br \/>\nKhmelnytskyi National University, Ukraine<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2020-289-5-35-38\">https:\/\/www.doi.org\/10.31891\/2307-5732-2020-289-5-35-38<\/a><\/p>\n<p><strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 09.10.2020 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 27.11.2020 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0421\u0443\u0447\u0430\u0441\u043d\u0430 \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0430 \u043c\u0435\u0440\u0435\u0436\u0430 \u0441\u043a\u043b\u0430\u0434\u0430\u0454\u0442\u044c\u0441\u044f \u0437 \u0432\u0435\u043b\u0438\u043a\u043e\u0457 \u0441\u0443\u043a\u0443\u043f\u043d\u043e\u0441\u0442\u0456 \u0435\u043b\u0435\u043c\u0435\u043d\u0442\u0456\u0432. \u0412 \u043c\u0435\u0440\u0435\u0436\u0443 \u043c\u043e\u0436\u0443\u0442\u044c \u0432\u0445\u043e\u0434\u0438\u0442\u0438 \u044f\u043a \u0441\u0442\u0430\u0446\u0456\u043e\u043d\u0430\u0440\u043d\u0456 \u0432\u0443\u0437\u043b\u0438, \u0442\u0430\u043a \u0456 \u043c\u043e\u0431\u0456\u043b\u044c\u043d\u0456 \u0437\u0430\u0441\u043e\u0431\u0438. \u0420\u043e\u0437\u0440\u043e\u0431\u043a\u0430 \u0442\u043e\u043f\u043e\u043b\u043e\u0433\u0456\u0457 \u0442\u0430\u043a\u043e\u0457 \u043c\u0435\u0440\u0435\u0436\u0456 \u0432\u0438\u043c\u0430\u0433\u0430\u0454 \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0456\u0437\u0443 \u0440\u043e\u0431\u043e\u0442\u0438 \u0437\u0430 \u0443\u043c\u043e\u0432 \u043c\u043e\u0436\u043b\u0438\u0432\u043e\u0457 \u0434\u0438\u043d\u0430\u043c\u0456\u0447\u043d\u043e\u0457 \u0437\u043c\u0456\u043d\u0438 \u043d\u0430\u0432\u0430\u043d\u0442\u0430\u0436\u0435\u043d\u043d\u044f. \u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u043f\u043e\u043a\u0430\u0437\u0430\u043d\u043e \u0430\u043d\u0430\u043b\u0456\u0437 \u0441\u0443\u0447\u0430\u0441\u043d\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0438\u0445 \u0437\u0430\u0441\u043e\u0431\u0456\u0432 \u043c\u043e\u0434\u0435\u043b\u044e\u0432\u0430\u043d\u043d\u044f \u0440\u043e\u0431\u043e\u0442\u0438 \u043c\u0435\u0440\u0435\u0436\u0456. \u0415\u043c\u0443\u043b\u044f\u0442\u043e\u0440\u0438 NS-2, Riverbed OPNET Modeler, Cisco Packet Tracer \u0454 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043d\u0438\u043a\u0430\u043c\u0438 \u0432\u0435\u043b\u0438\u043a\u043e\u0457 \u0441\u0443\u043a\u0443\u043f\u043d\u043e\u0441\u0442\u0456 \u0442\u0430\u043a\u0438\u0445 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0445 \u0437\u0430\u0441\u043e\u0431\u0456\u0432. \u0412 \u043f\u0430\u043a\u0435\u0442\u0430\u0445 \u043c\u043e\u0434\u0435\u043b\u044e\u0432\u0430\u043d\u043d\u044f \u043c\u0435\u0440\u0435\u0436\u0456 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u0440\u0456\u0437\u043d\u043e\u043c\u0430\u043d\u0456\u0442\u043d\u043e\u0433\u043e \u043e\u0431\u043b\u0430\u0434\u043d\u0430\u043d\u043d\u044f. Cisco Packet Tracer \u043e\u0440\u0456\u0454\u043d\u0442\u043e\u0432\u0430\u043d\u043e \u043d\u0430 \u043c\u043e\u0434\u0435\u043b\u044e\u0432\u0430\u043d\u043d\u044f \u0456\u0437 \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f\u043c \u043e\u0431\u043b\u0430\u0434\u043d\u0430\u043d\u043d\u044f \u0444\u0456\u0440\u043c\u0438 \u00abCisco\u00bb. OPNET Modeler \u043d\u0430\u0432\u043f\u0430\u043a\u0438 \u043e\u0440\u0456\u0454\u043d\u0442\u043e\u0432\u0430\u043d\u0438\u0439 \u043d\u0430 \u0441\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u044f \u043c\u043e\u0434\u0435\u043b\u0456 \u0456\u0437 \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f\u043c \u044f\u043a \u0456\u0441\u043d\u0443\u044e\u0447\u043e\u0433\u043e \u043e\u0431\u043b\u0430\u0434\u043d\u0430\u043d\u043d\u044f \u0440\u0456\u0437\u043d\u0438\u0445 \u0432\u0438\u0440\u043e\u0431\u043d\u0438\u043a\u0456\u0432, \u0442\u0430\u043a \u0456 \u043c\u043e\u0434\u0435\u043b\u0435\u0439 \u043e\u0431\u043b\u0430\u0434\u043d\u0430\u043d\u043d\u044f \u0431\u0435\u0437 \u043f\u0440\u0438\u0432\u2019\u044f\u0437\u043a\u0438 \u0434\u043e \u0432\u0438\u0440\u043e\u0431\u043d\u0438\u043a\u0430.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0441\u0438\u043b\u043e\u0432\u0430 \u043b\u0456\u043d\u0456\u044f, \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0430 \u0434\u0430\u043d\u0438\u0445, \u043f\u0435\u0440\u0435\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u044f \u0424\u0443\u0440\u2019\u0454.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>Modern telecommunication network consist of large amount of components like servers, routers, switches, end-point computers. Fibre channels and usual gigabit lines used as a medium. Modern network can combine not only static elements but mobile components like mobile phones, ZigBee modules, Wi-Fi access points, Bluetooth. High speed equipment like satellites can be added to network structure too.<br \/>\nSo, selecting of correct equipment for network, estimating characteristics of such network can be hard task to be done in most cases. The analysis of modern programmatic facilities of design of work of network is in-process shown. Emulators of NS &#8211; 2, Riverbed OPNET Modeler, Cisco Packet Tracer are the representatives of large aggregate of such technical equipment. In the packages of design of network accessible the use of various equipment. It is oriented Cisco Packet Tracer to the design with application of equipment of firm Cisco. OPNET Modeler vice versa &#8211; oriented to creation of model with application of both existent equipment of different producers and models of equipment without attachment to the producer.<br \/>\n<strong>Keywords:<\/strong> power line, data transmission, Fourier transform.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Lokal&#8217;nye seti: arhitektura, algoritmy, proektirovanie \/ Ju.V. Novikov, S.V. Kondratenko. \u2013 M. : JeKOM, 2001. \u2013 312 s.<\/li>\n<li>Horiashchenko K.L. Ohliad system imitatsiinoho modeliuvannia telekomunikatsiinykh merezh \/ K.L. Horiashchenko, M.D. Dorotiuk \/\/ Herald of Khmelnytskyi National University. \u2013 2014. \u2013 \u21165. \u2013 S. 115\u2013118.<\/li>\n<li>3. Komp&#8217;juternye seti. Kniga 2: Networking Essentials. Jenciklopedija pol&#8217;zovatelja \/ A. Mark, D. Sportak i dr. ; per. s angl. \u2013 K. : Izd-vo \u00abDiaSoft\u00bb, 1999. \u2013 468 s.<\/li>\n<li>Dainese A. UNetLab: List of supported images [Elektronnyi resurs] \/ A. Dainese. \u2013 Rezhym dostupu : http:\/\/www.unetlab.com\/documentation\/supported-images\/index.html. \u2013 Data zvernennia : 16.03.2017 h.<\/li>\n<li>Ivanova T.I. Korporativnye seti svjazi \/ T.I. Ivanova. \u2013 Moskva, 2001. \u2013 297 s.<\/li>\n<li>Horiashchenko K.L. Vprovadzhennia tekhnolohii PLC \/ K.L. Horiashchenko, O.P. Voitiuk, S.L. Kushniruk, O.V. Shevchuk \/\/ Herald of Khmelnytskyi National University. \u2013 2017. \u2013 \u21162. \u2013 S. 250\u2013253.<\/li>\n<li>Zbaravskyi V.V. Realizatsiia kontseptsii Triple play v merezhi ADSL \/ V.V. Zbaravskyi, K.L. Horiashchenko, L.O. Kovtun \/\/ Herald of Khmelnytskyi National University. \u2013 2012. \u2013 \u21162. \u2013 S. 266\u2013270.<\/li>\n<li>Popov E.F. Ispol&#8217;zovanie programmnyh sredstv jemuljacii oborudovanija pri modifikacii setevoj infrastruktury \/ E.F. Popov \/\/ Sbornik nauchnyh trudov po materialam vserossijskuju nauchno-prakticheskoj konferencii studentov, aspirantov i molodyh uchenyh \u00abNovye tehnologii \u2013 neftegazovomu regionu\u00bb. \u2013 Tjumen&#8217;, 2012.<\/li>\n<li>Introduction to Cisco IOS Netflow:A Technical Overview [Elektronnyi resurs]. \u2013 Rezhym dostupu : http:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/ios-nx-os-software\/ios- netflow\/prod_white_paper0900aecd80406232.html. \u2013 Data zvernennia : 16.03.2017.<\/li>\n<li>Devis D. Vychislitel&#8217;nye seti i setevye protokoly \/ D. Devis, D. Barber, U. Prajs. \u2013 M. : Mir, 1982. \u2013 562 s.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[38],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/4744"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4744"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/4744\/revisions"}],"predecessor-version":[{"id":4879,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/4744\/revisions\/4879"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}