Scientific paper ID 2064 : 2021/1

Nina Kuchuk1, Galina Cherneva2, Viacheslav Davydov 1

Transmission of packets of the maximum length does not in all cases provide the best probability-time characteristics. In such cases, it is customary to use the fragmentation mechanism. This approach is most useful for unstable data exchange in computer networks in transport.

The purpose of the article is to develop a method for fragmentation of packets with un-stable data exchange in computer networks on transport.

The article proposes a criterion for the fragmentation of the original data packets to achieve the maximum possible reduction of the error probability under the given conditions. This criterion is the maximum ratio of the error probability of the original packet to the error probability of the fragmented packet. The dependence of the optimal number of fragments on the length of the information part of the original data packet is shown. A method for calculating the optimal number of fragments with known characteristics of the data transmission channel and fixed sizes of information, service and verification information is presented. It has been proved that the optimal number of fragments increases with an increase in the size of the information part of the packet and with a deterioration in the quality of the communication channel. It is also shown that when using poor quality communication channels for data transmission and/or the need to transmit packets of considerable length, the advantages of fragmentation become more significant. For such conditions, the original packet should be split into smaller fragments.

One of the directions for further research in this area is to determine the criterion for fragmentation of original packets to reduce the average delivery time while increasing the reliability of the data.

передача данных фрагментация вероятность ошибки критерий фрагментацииdata transfer fragmentation probability of error fragmentation criterionNina Kuchuk Galina Cherneva Viacheslav Davydov


[1] Olifer V.G., N.A. Olifer. Kompyuternyye seti. Printsipy, tehnologii, protoko-ly: uchebnik dlya vuzov. 2-e izd. SPb: Piter, 2005. 864 s.
( [1] Олифер В.Г., Н.А. Олифер. Компьютерные сети. Принципы, технологии, протоко-лы: учебник для вузов. 2-е изд. СПб: Питер, 2005. 864 с. )

[2] Kuchuk, G.A., Kovalenko, A.A. and Lukova-Chujiko, N.V. (2017), “A method for mini-mizing the average latency of packets in the virtual connections of the cloud service sup-port network”, Control, navigation and communication systems, PNTU, Poltava, No. 2 (42), pp. 117–120.

[3] Sviridov, A., Kovalenko, A. and Kuchuk, H. (2018), “The pass-through capacity redevel-opment method of net critical section based on improvement ON/OFF models of traffic”, Advanced Information Systems, Vol. 2, No. 2, pp. 139–144, DOI:

[4] Donets, V., Kuchuk, N. and Shmatkov, S. (2018), “Development of software of e-learning information system synthesis modeling process”, Advanced Information Systems, Vol. 2, No 2, pp. 117–121, DOI:

[5] Kuchuk G. A. Metod parametricheskogo upravleniya peredachey dannyh dlya modifika-tsii transportnyh protokolov besprovodnyh setey / G.A. Kuchuk, A.S. Mohammad, A.A. Kovalenko // Sistemi obrobki іnformatsії. – 2011. – № 8(98). – S. 211-218.
( [5] Кучук Г. А. Метод параметрического управления передачей данных для модифика-ции транспортных протоколов беспроводных сетей / Г.А. Кучук, А.С. Мохаммад, А.А. Коваленко // Системи обробки інформації. – 2011. – № 8(98). – С. 211-218. )

[6] Viacheslav Davydov and Daryna Hrebeniuk (2020), Development the resources load variation forecasting method within cloud computing systems, Advanced Information Systems, Vol. 4, No. 4, pp. 128–135, DOI:

[7] Kuchuk G.A., Mohammad A.S. and Kovalenko, A.A. (2011), “Method for reducing data transmission time in a wireless network”, Control, navigation and communication systems, No. 3 (19), pp. 209-213.

[8] Oleksandr Pliushch, Viktor Vyshnivskyi and Yuliia Berezovska (2020), Robust telecommunication channel with parameters changing on a frame-by-frame basis, Advanced Information Systems, Vol. 4, No. 3, pp. 62–69, DOI:




This site uses cookies as they are important to its work.

Accept all cookies
Cookies Policy