{"title":"Assessment of the modern state of mobile communication market development in Ukraine","authors":"O. S. Novik","doi":"10.31673/2518-7678.2020.011519","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.011519","url":null,"abstract":"In today's economic environment, the decisive factor in accelerating economic growth is the development of the information space and, in particular, the telecommunications industry. It is the intensification of the processes of informatization of society that will lead to the transition to a new type of economic relations focused on the interests of people, where telecommunications, and in particular, mobile communication, play a major role. Sustainable development of information and telecommunication infrastructure is the most important prerequisite for enhancing the competitiveness of Ukraine's economy and integration into the global information society, enhancing human access to national and world information resources, improving living conditions and quality of life.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127199255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Providing QoS to High Performance Distributed Applications in Software-Defined Networks (SDNs)","authors":"N. P. Hnidenko","doi":"10.31673/2518-7678.2021.023745","DOIUrl":"https://doi.org/10.31673/2518-7678.2021.023745","url":null,"abstract":"Nowadays, there is an ever-increasing number of applications that have strict quality of service (QoS) requirements. The ability to define QoS requirements in traditional networks is limited due to the complex control of these environments. Modification of the existing infrastructure has high administrative costs, since the subsystem of each service component must have its resources managed by a centralized organization to guarantee users the level of QoS that each of them requires. The specification of quality of service (QoS) requirements in traditional networks is limited by the high administrative cost of these environments. Nevertheless, newer network paradigms, as Software-Defined Networks (SDNs), simplify and relaxes the management of networks. In this sense, SDN can provide a simple/effective way to develop QoS provisioning. This approach allows the specification of classes of service and also negotiates the QoS requirements between applications and the SDN network controller. The SDN controller, in turn, monitors the network and adjusts its performance through resource reservation and traffic prioritization. Have developed a QoS provision architecture for high performance distributed applications exploiting the capabilities of SDN. In this architecture, simple software components enable a process of message exchanging that includes reservation request and reservation confirmation. This procedure allows a network controller to configure QoS queues to individual packet flows. The developed a proof-of-concept of proposal and experimental results show that the additional routines present low overhead, whereas – for a given test application — observes a reduction of up to 47% in transfer times. Despite the specific scenario evaluated, results indicate our solution feasibility. Future works include the development of renegotiation and adaptation functions.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123744861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and improvement of scenarios for the deployment of NTN networks","authors":"O. S. Syvyk","doi":"10.31673/2518-7678.2021.011218","DOIUrl":"https://doi.org/10.31673/2518-7678.2021.011218","url":null,"abstract":"The era of fifth-generation mobile or wireless networking technology has just begun, and it is this technology that can actually improve system performance to an extremely high level. Mobile communications from space are evolving rapidly. Non-terrestrial networks have the ability to provide reliable connections to areas that were previously difficult to connect, which has a high impact on the economic situation. A non-terrestrial network with 5G support can be an effective solution for providing services anywhere and anytime and expand the coverage area. This paper analyzes possible solutions for satellite systems and multi-beam data technologies due to their ability to increase bandwidth through frequency reuse, as well as increase data rates. To adapt 5G to support non-terrestrial, you need to consider and explore a holistic architecture or design that can cover many areas and users. The article analyzes and explores the main aspects of non-terrestrial networks, analyzes in detail the design possibilities, problems of implementation and construction, as well as areas of research. Fifth generation (5G) technologies and systems will meet the needs of users around the world anywhere, anytime. Extraterrestrial Network (NTN) systems are able to meet connection requests anywhere, offering a wide coverage area and ensuring continuity, availability and scalability of services. In this article, we will look at NTN's capabilities and its potential to meet the expectations of users on and off 5G networks. The current situation, current research and unresolved issues underscore the importance of NTN in the field of wireless communications.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121322037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New information technologies for detecting adverse compromising electromagnetic radiations from electronic computer equipment","authors":"Yury Katkov","doi":"10.31673/2518-7678.2020.042533","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.042533","url":null,"abstract":"The article deals with the problem of TEMPEST - unintentional radiation of electronic equipment, which can be intercepted by malefactors in the form of radiation of an electromagnetic parasitic wave, and which, from a security point of view, is compromising radiation because they can have compromising information. Today, the term TEMPEST is the name of a technology that includes various methods of analyzing electromagnetic compromising radiation in such a way that they can be used to recover intercepted data. The task was completed: It is known that electronic equipment creates electromagnetic fields that can interfere with radio and television reception at a considerable distance. But interference is not the only problem caused by stray electromagnetic radiation. In some cases, you can get information about the signals that are used inside the equipment, when the radiation signals are intercepted by intruders and these signals are decoded. This capability poses a problem, especially in the case of digital equipment, since remote signal recovery within the equipment can allow the reconstruction of the data that the equipment is processing. Therefore, the problem arises of determining technologies for detecting spurious electromagnetic radiation from electronic computers, which may have compromising information. The content of TEMPEST-technology is considered as a physical phenomenon of capturing and recovery of electromagnetic radiation emitted by digital equipment, and which can have compromising information. TEMPEST hardware analysis is performed, which includes various types of sensitive receivers that can monitor a wide range of frequencies, as well as a combination of hardware and software capable of processing the received signals. The analysis of various types of TEMPEST-technology is carried out, namely: Tempest-attack, Soft TEMPEST, as well as a variety of technologies for intercepting information by receiving spurious radiation of a monitor signal, searching for the necessary information on a disk, outputting information to an unused serial port; reflections of the luminous flux from the monitor screen on the walls; modeling the luminous flux in LED indicators and others. Recommendations for protection against TEMPEST technologies for companies and individuals are given.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134407568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of the influence of the collision domain on the efficiency of the wireless communication","authors":"M. P. Hnidenko","doi":"10.31673/2518-7678.2020.030513","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.030513","url":null,"abstract":"The data channel in the wireless network is essentially a collision domain of the 802.11 standard. In networks with a very high density of VHD subscribers, one of the best strategies to increase the total airtime is to achieve spatial reuse. Spatial reuse of a radio frequency resource is extremely difficult to achieve in practice in very high density zones due co-channel interference CCI and adjacent-channel interference ACI. To understand how to mitigate the effects of interference, the mechanisms by which they impair system performance should be explored. The investigation shows that there is a significant impact on reducing the performance of high-density wireless networks due to suboptimal radio frequency resource planning, which leads to an increase in the impact of co-channel interference CCI and adjacent-channel interference ACI as the number of subscribers increases. The transmissions rate can be reduced by increasing the number of clients to 100. At the same time, there is the potential to increase the performance of a high-density VHD wireless network through good frequency resource design and best configuration practices combined with cell size reduction to limit co-channel interference CCI and adjacent-channel interference ACI.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133159652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis software needed to ensure control over data packets in the software-configured networks","authors":"A. Bereznyuk","doi":"10.31673/2518-7678.2020.041624","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.041624","url":null,"abstract":"The paper presents the concept of Software-Defined-Networking, and the history of programmable networks and associated review of the latest standards. One of them, the OpenFlow protocol, played an important role in promoting the concept of SDN, significantly influenced research and industry. Consider in more detail the basic principles of OpenFlow. To debug the software, it is necessary to ensure the control of packets in the network, although formally verification can be used to determine the correct flow. This is necessary in order to generate detailed network images and also to inspect function parameters under certain network conditions. From the standpoint of security, OpenFlow's potential for new security schemes has not been well understood. When analyzing packets in a Packet message on a network controller, it follows that they can be used to identify and detect the penetration of the connection before the stream is configured. While new attack vectors were investigated for network security, the centralized network controller and control channel remain partially unprotected.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"344 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124254300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods of determining the parameters of objects management of telecommunication networks","authors":"L. Berkman","doi":"10.31673/2518-7678.2020.010509","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.010509","url":null,"abstract":"We consider the problem and methods for determining the parameters of objects management of telecommunication networks. Determined that in modern science and technology, as well as in telecommunications in particular are widely used mathematical models of processes under study. The basic problem of determining the parameters of facilities management, including in particular is the task of the operator stochastic object that describes the relations hip between random input and output variables. This full common carrier, for example, multivariate conditional probability density of the vector output when monitoring the input vector. However, the definition of conditional distribution laws require sophisticated experiment and large volume calculations. Therefore, solving practical problems using conventional torque characteristics: conditional mathematical expectations and correlation functions. On this basis, determine the best deterministic operator in terms of statistical criteria adopted approximating operator system is determined. It is shown that many features with parametric parameters defining managed object has a method of least squares using the theory of sensitivity and studied this method. This method can be applied to objects that based on prior information known structure equations describing their behavior and nominal values.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128831875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Drones Performance Assessment Tool in 4G Cellular Networks","authors":"I. V. Lyenkov","doi":"10.31673/2518-7678.2020.012834","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.012834","url":null,"abstract":"A measurement tool for evaluating wireless drone performance on cellular networks is provided. Android software records various LTE settings, estimates TCP and UDP bandwidth, and tracks GPS location information. Examples of measurement results are given.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122246923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tasks and methods of determining the parameters of objects management of telecommunication networks","authors":"А. О. Makarenko","doi":"10.31673/2518-7678.2020.044145","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.044145","url":null,"abstract":"We consider the problem and methods for determining the parameters of objects management of telecommunication networks. Determined that in modern science and technology, as well as in telecommunications in particular are widely used mathematical models of processes under study. The basic problem of determining the parameters of facilities management, including in particular is the task of the operator stochastic object that describes the relations hip between random input and output variables. This full common carrier, for example, multivariate conditional probability density of the vector output when monitoring the input vector. However, the definition of conditional distribution laws require sophisticated experiment and large volume calculations. Therefore, solving practical problems using conventional torque characteristics: conditional mathematical expectations and correlation functions. On this basis, determine the best deterministic operator in terms of statistical criteria adopted approximating operator system is determined. It is shown that many features with parametric parameters defining managed object has a method of least squares using the theory of sensitivity and studied this method. This method can be applied to objects that based on prior information known structure equations describing their behavior and nominal values.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134620868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technique for Securing Corporate Network Communication in Remote Management","authors":"A. Chernoshtan","doi":"10.31673/2518-7678.2020.011014","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.011014","url":null,"abstract":"This article describes how to secure your corporate communications network with remote management. The principles of corporate network security enhancement are presented taking into account the developed methodology. The review of modern technologies of protection of corporate networks and methods of influence of malefactors on them is made. The obtained results are analyzed and systematized. The feasibility of performing each of the considered methods of protection under specific conditions is investigated.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131843483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}