{"title":"Effective Channel Planning of IEEE 802.11 Networks as a Plane Tessellation Problem. Part 3. Solutions of Best Channel Configuration Selection Problem for Eight-Channel Case","authors":"A. Vikulov","doi":"10.31854/1813-324x-2023-9-1-41-51","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-41-51","url":null,"abstract":"When solving the problem of channel planning of IEEE 802.11 wireless access networks, it is necessary to allocate channels for access points so that the selected channel configuration provides minimum negative mutual influence. We will consider the covering of the plane “tessellation”, i.e. the densest filling, by coverage areas of access points groups, which in the spectral sense correspond to channel clusters. By assigning a channel to each of the access points, we obtain a set of possible configurations, each of which corresponds to a possible solution of the channel planning problem. When solving actual design problems in the 5 GHz band, it is often necessary to take into account channel plans that include 8 or more channels. Based on the previously proposed model and method, in this paper, solutions to the problem of finding the best channel configuration for clusters consisting of 8 access points are obtained, and their characteristics are shown in relation to their geometry.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128717591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical Analysis of the Mathematical Model of a Cluster V2X-System","authors":"P. Plotnikov, A. Vladyko","doi":"10.31854/1813-324x-2023-9-1-14-23","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-14-23","url":null,"abstract":"The article analyzes the results of numerical modeling of information processes in vehicular ad-hoc networks (VANETs). The review of works devoted to clustering and data caching schemes in Vehicle-to-Everything (V2X) systems is given. L1-metric was chosen as a metric because of its active use in cities with modern layout. Two approaches to the description and evaluation of the efficiency of interaction of boundary devices in a traditional configuration and using a cluster scheme with a shared cache are considered. A mathematical model is constructed and an analysis of its effectiveness is carried out. It is shown that the introduction of new IEEE 802.11bd standards will increase the percentage of serviced devices, thereby minimize the overall delay of computing, which will improve the efficiency of the V2X-system. The results of the study can be used in the design and deployment of automated traffic control systems in cities.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121025131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Kartak, O. Gubareva, M. Dashkov, V. Gureev, A. Evtushenko
{"title":"The Sensitivity Investigation of Fiber Optic Paths in the Framework of an Intruder Localization at a Protected Facility","authors":"V. Kartak, O. Gubareva, M. Dashkov, V. Gureev, A. Evtushenko","doi":"10.31854/1813-324x-2023-9-1-52-58","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-52-58","url":null,"abstract":"The paper considers the possibility of using communication lines already existing at urban development sites based on such information transfer technologies as «fiber-to-the-office» and «fiber-to-the-desk» in relation to the tasks of physical protection of objects. The aspects of using distributed acoustic sensors based on a phase-sensitive optical time-domain reflectometer for localizing sources of acoustic impact in real-time, that is, for determining the location of an intruder on a protected object, are considered. The sensitivity of optical paths to acoustic influences corresponding to the speech signals of the alleged intruder was assessed. An optical path based on optical fiber in an optical module with a hydrophobic filling is considered. An analysis of the spectral sensitivity of the optical fiber samples under study has been carried out. An assessment of the influence of the conditions for the passage of the route of laying the optical cable and the interaction of the acoustic sensor with the surrounding objects was carried out. The analysis of the results obtained during the test events at the experimental site was carried out.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129312267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Post-Quantum Cryptographic Access Control Based on Hierarchical RBAC Model","authors":"A. Yarmak","doi":"10.31854/1813-324x-2022-8-4-119-129","DOIUrl":"https://doi.org/10.31854/1813-324x-2022-8-4-119-129","url":null,"abstract":"The paper considers the isogeny-based cryptographically enforced data access control scheme CSIDH-HRBAC for untrusted cloud. CSIDH-HRBAC is based on a role-based access control model with support for a role hierarchy system. The proposed scheme implies the presence of a trusted party that manages cryptographic keys associated with users, roles, files. The basic procedures for gaining access to data, revoking access rights, adding new entities and updating parameters are given. Typical scenarios of attacks on the proposed scheme are considered, including role substitution, collusion by participants to compute the parent role key, attempt to access data after role revocation from user. To evaluate the performance of cryptographic operations, the simulation of the basic procedures was performed. The advantages and limitations of the CSIDH-HRBAC scheme are discussed. In particular, the need for protection against threats from the administrator, the prospect of using lattice-based post-quantum cryptographic primitives is noted.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131132154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Core Optical Fiber with Stepped Single-Mode Cores. Part 1. Insulation with Solid Clads","authors":"M. Bylina, L. Gultyaeva","doi":"10.31854/1813-324x-2022-8-4-28-38","DOIUrl":"https://doi.org/10.31854/1813-324x-2022-8-4-28-38","url":null,"abstract":"An optical fiber with several unrelated cores inside a common clad (multi-core fiber) is used to increase the capacity of linear paths of communication systems. The number of cores in one fiber is limited by mutual influences between them, to reduce which various design solutions are used. The aim of the work is to compare various multicore fibers and identify structures that allow placing the largest number of cores in a common shell with a standard diameter of 125 microns. In the first part of this paper, modeling of single-mode fibers with cores isolated by additional solid shells is carried out. As a result of modeling, the characteristics of the fundamental modes of the cores of each fiber are calculated – the distribution of the electric field strength, chromatic dispersion and the diameter of the field of the fundamental mode, a technique is proposed and an assessment of mutual influences is carried out, the maximum possible number of cores is determined. It is shown that the insulating clad reduces mutual influences and allows increasing the number of cores by reducing the distance between them.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115544454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Usage of LDPC Codes in a Gilbert Channel","authors":"A. Ovchinnikov, A. Veresova, A. Fominykh","doi":"10.31854/1813-324x-2022-8-4-55-63","DOIUrl":"https://doi.org/10.31854/1813-324x-2022-8-4-55-63","url":null,"abstract":"Although low-density parity-check (LDPC) codes in modern communication standards have been extensively studied over a memoryless channel, their burst error correction capacity in channels with memory has yet to be thoroughly analyzed. The conventional approach to transmission in channels with memory uses interleaving within a buffer of several codewords. However, such an approach reduces the efficiency of the redundancy embedded by the error-correcting code. It is known from information theory that considering channel memory during decoding allows the transmission rate to be increased. An evaluation of the decoding error probability of different types of low-density parity-check codes in channels with memory is presented along with estimates of minimum distance and burst error correction capability for the considered codes. The decoding error probability is estimated for conventional decoding with deinterleaving and decoding taking channel memory into account. The decoding error probability is estimated for several parameters of a channel with memory and different buffer lengths. The obtained results reveal the absence of the unique decoding approach for all parameters of the channel with memory. The best decoding error probability is determined by the degree of channel memory correlation.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127664957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flying Fog Mobile Edge Computing Based on UAV-Assisted for IoT Nodes in Smart Agriculture","authors":"A. Alzaghir","doi":"10.31854/1813-324x-2022-8-4-82-88","DOIUrl":"https://doi.org/10.31854/1813-324x-2022-8-4-82-88","url":null,"abstract":"Flying Fog Mobile Edge Computing can play a pivotal part in the field of smart agriculture. Moreover, is an ideal choice for the significant features it enjoys such as its capability of functioning in remote locations, its wide coverage of areas, sufficient bandwidth, as well as its ability of dealing with connectivity issues. Hence, it is essential for smart agriculture provided with IoT devices to utilize offloading data in a real time and execution the satisfactory steps for a certain circumstance by using flying fog mobile edge computing. Flying Fog Mobile Edge Computing is a good choice to treat connectivity issues. In this paper, proposed a cooperation paradigm of UAVs and IoT devices towards smart agriculture for offloading and executing the computation tasks on-behalf IoT nodes by using dynamic programming algorithm and get satisfactory solution for constrained optimization problem and achieving minimize delay to accomplish tasks.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127918163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method and Algorithm for Determining the Type of Traffic in an Encrypted Communication Channel","authors":"S. Ishkuvatov","doi":"10.31854/1813-324x-2022-8-4-109-118","DOIUrl":"https://doi.org/10.31854/1813-324x-2022-8-4-109-118","url":null,"abstract":"The article proposes a method for determining the composition of protocols used in IPsec communication channel, based on the regularities of the chronology and the lengths of encrypted load packets. The characteristic informative features of the protocols are considered. An algorithm is given to obtain the length values of ESP packets containing arbitrary user data for common modes of IPsec tunnel operation.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"35 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114111272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decision Support Methodology Based on Evaluation of Customer Experience and Telecommunications Operator Efficiency Indicators","authors":"V. Akishin","doi":"10.31854/1813-324x-2022-8-4-75-81","DOIUrl":"https://doi.org/10.31854/1813-324x-2022-8-4-75-81","url":null,"abstract":"The article considers the methodology for dynamic analysis of the cognitive model for assessing customer experience in the context of communication providers. The relevance of the study is due to the need for telecom operators to have a decision support system that allows analyzing dependence of customer experience on the efficiency of the company's operating environment, as well as emulating customer experience management scenarios in the context of the main sales and service processes. The objective of the study is to formalize the methodology of dynamic analysis of the model for assessing the integral customer experience that is based on fuzzy cognitive maps of the hierarchical structure. In particular, the mechanics of changing target factors (i.e., customer experience indicators) when perturbing control factors (i.e., operational performance indicators that affect customer experience) are investigated.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116600508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Karetnikov, Ya. Kosiak, O. Danilov, A. Bespalov
{"title":"Modern Approach to Data Collection and Processing from Automatic Identification System for Ship Traffic Organization","authors":"V. Karetnikov, Ya. Kosiak, O. Danilov, A. Bespalov","doi":"10.31854/1813-324x-2022-8-4-48-54","DOIUrl":"https://doi.org/10.31854/1813-324x-2022-8-4-48-54","url":null,"abstract":"The article is devoted to the collection and generalization of automatic identification system (AIS) data on the movement of ships, both on inland waterways and in coastal marine areas. The list of information necessary for the further carrying out of researches on the organization of movement is defined. Attention is paid to the peculiarities of obtaining data from technical means of communication and open online resources. The approach to statistical data accumulation from AIS receiver using Raspberry Pi single-board microcomputer has been offered. The application, which reads data from the serial port and transfers them to the library and then to the PostgreSQL database management system server, is implemented. It is concluded that the proposed approach is constructive and potentially effective.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134423899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}