{"title":"Controller Location and Load Balancing Integrated Solution","authors":"A. Muthanna","doi":"10.31854/1813-324x-2023-9-2-81-93","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-2-81-93","url":null,"abstract":"The usage of multi-controller SDNs is currently the most efficient approach for constructing the core of communication networks of the fifth and following generations. One of the top priorities in the study of this topic is occupied by the optimisation of the network core construction since it involves relatively high expenses when developing communication networks of the fifth and future generations. Due to the complexity of the problems being tackled, there are currently a number of load balancing algorithms and algorithms for arranging controllers in multicontroller networks that are based on meta-heuristic methods. These algorithms allow for the optimum possible utilisation of controller resources in such networks. However, a comprehensive solution to the load balancing and controller placement issues has yet to be discovered. The answer to such an issue is the focus of this article. The report suggests using network clustering in conjunction with the meta-heuristic chaotic salp swarm technique, which has shown to be effective in prior research on the challenges of creating multi-controller networks, to accomplish this goal. The salp swarm algorithm in the paper is adjusted to take into account the integral solution to the problem of deploying controllers based on clustering of a multi-controller network and load balancing. By contrasting the simulation results with those from the well-known meta-heuristic particle swarm algorithms optimization and the grey wolf GWO, as well as the previous version of the chaotic salp swarm algorithm CSSA, the effectiveness of the proposed solution was evaluated.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114987168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical Model of the Unbalanced Monopole Feed. Part 2. Determination of Complex Capacitance of Normally Open Wire Antennas, Small with Respect to the Wavelength","authors":"O. Popov, A. Tumashov, G. Borisov, K. Korovin","doi":"10.31854/1813-324x-2023-9-2-6-21","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-2-6-21","url":null,"abstract":"A method for calculating the complex capacitance of small with respect to the wavelength, normally open antennas is proposed. Analytical expressions for determination of mutual potential coefficient of any two arbitrarily arranged linear conductors are obtained. The proposed technique can be useful in assessing the losses of normally open wire antennas placed in close proximity to the semiconductor surface, as well as in determination of their input resistance.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115211124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Bolkhovskaya, G. Ermolaev, S. Trushkov, A. Maltsev
{"title":"Prototype of High-Speed Data Transmission Receiving and Transmitting Equipment in the 57‒64 GHz Frequency Range","authors":"O. Bolkhovskaya, G. Ermolaev, S. Trushkov, A. Maltsev","doi":"10.31854/1813-324x-2023-9-2-23-39","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-2-23-39","url":null,"abstract":"The purpose of this work is to create and study the characteristics of a prototype of receiving and transmitting equipment operating in the millimeter wavelength range in high-speed data transmission networks. During the work, the task of developing and software implementation of digital signal processing algorithms was solved, the hardware part was developed and implemented, experimental measurements of characteristics and field tests of the prototype were carried out. Experimental studies have shown that the developed equipment transmits and receives signals in the frequency range 57‒64 GHz with the possibility of discrete change of the signal frequency bandwidth: 100, 200, 400, 800 MHz and supports 12 modulation and coding schemes with low-density parity check code. The use of an adaptive algorithm for demodulation and decoding at the receiver made it possible to increase the efficiency of signal transmission and reduce the probability of packet errors by half. The developed prototype provides a data transmission rate of 2 Gbit/s at distances up to 100 m and of 500 Mbit/s at distances up to 300 m.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"601 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132656275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Properties of Malicious Social Bots","authors":"M. Kolomeets, A. Chechulin","doi":"10.31854/1813-324x-2023-9-1-94-104","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-94-104","url":null,"abstract":"The paper considers the ability to describe malicious bots using their characteristics, which can be the basis for building models for recognising bot parameters and qualitatively analysing attack characteristics in social networks. The following metrics are proposed using the characteristics of VKontakte social network bots as an example: trust, survivability, price, seller type, speed, and expert quality. To extract these metrics, an approach is proposed that is based on the methods of test purchases and the Turing test. The main advantage of this approach is that it proposes to extract features from the data obtained experimentally, thereby obtaining a more reasonable estimation than the expert approach. Also, an experiment on extracting metrics from malicious bots of the VKontakte social network using the proposed approach is described, and an analysis of the metrics' dependence is carried out. The experiment demonstrates the possibility of metrics extracting and analysis. In general, the proposed metrics and the approach to their extraction can become the basis for the transition from binary attack detection in social networks to a qualitative description of the attacker and his capabilities, as well as an analysis of the evolution of bots.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125921127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hierarchical Model for the Design of Microcontroller-Based Systems Protected from Cyber-Physical Attacks","authors":"D. Levshun","doi":"10.31854/1813-324x-2023-9-1-105-115","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-105-115","url":null,"abstract":"The article proposes a hierarchical model for the design of microcontroller-based systems protected from cyber-physical attacks. Within the framework of this model, a microcontroller-based system is represented as a hierarchical relational set of interacting building blocks with different properties and links between them. The proposed model includes models of hardware, software and hardware-software elements, interfaces, protocols and links between system elements, models of attacker and attack actions. The key difference of the developed model lies in the possibility of full representation of microcontroller-based systems, while other solutions have a drawback of designing such systems without taking into account the interactions of their devices with each other and other systems. In addition, the developed model is modular and extensible, aims to ensure the security of the designed solution from cyber-physical attacks, and considers security elements as an integral part of the final solution.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132850938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling a Program with Vulnerabilities in the Terms of Its Representations Evolution. Part 1. Life Cycle Scheme","authors":"K. Izrailov","doi":"10.31854/1813-324x-2023-9-1-75-93","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-75-93","url":null,"abstract":"The investigation results of the creating programs process and the resulting vulnerabilities are presented. The first part of the articles series offers a life cycle graphical scheme of the representations (namely, the following: Idea, Conceptual model, Architecture, 2D block diagram, Function diagram, Flowchart, Structogram, Pseudo-code, Classical code, Generation metacode, Script code, Assembly code, Abstract Syntax Tree, Machine Code, Bytecode) through which any sample program passes. The main properties of such representations are indicated - the purpose, form and content, obtaining and restoring representations methods, as well as possible vulnerabilities and ways to detect them. A vulnerabilities nested classification is introduced, consisting of their division according to the structural level in the program, the change in the content of the functionality and the impact on the information being processed.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116885623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Kirichek, A. Berezkin, D. Kukunin, A. Kolesnikov
{"title":"Analysis of Experience Quality Parameters of Cloud Video Conferencing Systems under Interference Conditions","authors":"R. Kirichek, A. Berezkin, D. Kukunin, A. Kolesnikov","doi":"10.31854/1813-324x-2023-9-1-59-73","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-59-73","url":null,"abstract":"The article deals with the testing of popular domestic and foreign cloud videoconferencing systems. A methodology for testing and comparing qualitative parameters of videoconferencing applications based on international experience is proposed. Assessment and comparison of videoconferencing services is based on the calculation of Hurst data flows, formed by the investigated cloud videoconferencing systems. Various applications of foreign and domestic videoconferencing systems have been tested in different operation modes with different channel quality parameters.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131558747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Direct Sequence Spread Spectrum Signal’s Demodulator Acquisition Implementation Based on Fast Fourier Transform. Part 2. Carrier Frequency Estimation","authors":"E. Brusin","doi":"10.31854/1813-324x-2023-9-1-35-40","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-35-40","url":null,"abstract":"Signals with direct spread spectrum are widespread in modern communication and navigation systems. Often for communication channels in which such signals are used, significant changes in the carrier frequency in relation to the information speeds of the received signals are characteristic. In particular, for communication channels with significant Doppler shift. Therefore, estimation of the carrier frequency plays a key role in solving the problem of initial synchronization of demodulators of signals with direct spectral broadening. In the first part of the paper, the main approaches to solving the initial synchronization problem were presented. In this part of the paper an algorithm for estimating the carrier frequency based on the analysis of the received signal uncertainty function cross section in the delay plane was proposed. The carrier frequency estimation is based on the fast Fourier transform using an iterative dichotomous search procedure. The results of its efficiency analysis are presented; the variance of the estimates obtained in the implementation of the proposed estimation algorithm are compared with the Cramer-Rao boundary.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127731668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Justification of the Empirical Expression for Assessing the Noise Immunity of Quadrature Modulation Signals","authors":"S. Dvornikov","doi":"10.31854/1813-324x-2023-9-1-6-13","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-6-13","url":null,"abstract":"An approach to the substantiation of the empirical formula for calculating the bit error probability of quadrature modulation signals in terms of the average signal energy and the minimum Euclidean distance is considered. An analytical description of quadrature synthesis signals in the time and frequency continuum is presented. An approach to assessing the noise immunity of quadrature modulation signals from the standpoint of the indicator of the average signal energy and the Euclidean distance is considered. The equivalence of various well-known approaches to the analytical calculation of the bit error probability is shown. Graphic materials are presented, as well as simulation results. Empirically substantiated is a universal expression for assessing the noise immunity of receiving quadrature modulation signals, based on the differences in the average energy value and the value of the minimum Euclidean distance. Its generality with known expressions is shown.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126603493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical Model of the Unbalanced Monopole Feed. Part 1. General Approach to Building a Mathematical Model","authors":"O. Popov, A. Tumashov, G. Borisov, K. Korovin","doi":"10.31854/1813-324x-2023-9-1-24-33","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-24-33","url":null,"abstract":"The paper proposes a method for separate calculation of the reactive component of the input impedance, radiation resistance and loss resistance small, in comparison with the wavelength of normally open antennas. A detailed equivalent circuit of of the Unbalanced Monopole with Shunt Feed (UMSF). Integral relations are obtained that determine the radiation resistance and the electromotive force of an equivalent generator. The decomposition of the active part of the input resistance into two components, one of which characterizes the radiated power, and the other - thermal losses, allows us to successfully solve both the problem of determining the resistance matching coefficient and the antenna efficiency. The results obtained can be useful in the design of antennas and energy calculations of radio links.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121726504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}