ISSN 0021-3454 (print version)
ISSN 2500-0381 (online version)
Menu
Summaries of the issue

TECHNOLOGIES OF DATA COMMUNICATION NETWORKS ANALYSIS AND DESIGN

RESEARCH INTO POSSIBILITIES OF DIGITAL RADIO STATION CREATION ON THE BASIS OF COHERENT RECEPTION OF GMSK-SIGNALS Alexander S. Merkutov, Denis V. Krutin, Andrey N. Tsyslav , Alexander A. Pletnev
7
  An investigation on noise immunity of digital demodulator with bearing and clock frequencies tuning out is performed with the use of ADS. A prototype of radio station for the VHF range is developed, and possibilities of its application as a part of radio communication system equipment operated in frequency slot pitch of 6,25 or 3,125 kHz are tested experimentally.
METHODS OF EVALUATION OF THE COMMUNICATION LINK QUALITY. WCDMA TECHNOLOGY Denis V. Krutin, Maxim A. Kislyakov, Sergey G. Mosin
12
  The problem of monitoring of exchange service station capacity of cellular system using code channel separation on the base of signal-to-noise ratio assessment is considered. Methods for signal-to-noise ratio determination with the use of WCDMA technology are proposed.
DESIGN OF WIRELESS SENSOR NETWORKS Maxim A. Kislyakov, Sergey G. Mosin , Veronika V. Savenkova
15
  Theoretical problems in wireless sensor networks design are considered. Separate stages of the design route are described. The networks classification of as topological structures is presented.
19
  Methodology of test-oriented design of mixed-signal circuits where parallel design procedures are executed at multicores or multiprocessors computer systems is proposed. The choice between methods of incircuit and external testing is provided.
24
  An analysis of equilibrium states of the TCP traffic control system is presented. A new method of congestion control in TCP/IP networks is proposed. Distinguishing features of the method are incorporation of slow adaptation algorithms and allowing for selective packet removal.
28
  Evaluation criteria and methods of organization of information exchange in a distributed information environment of integrated protection and safety systems by various manufacturers are presented.

OPERATION OF DATA COMMUNICATION NETWORKS

33
  An experimental study of quality of data transfer link organized with the use of wireless communication technologies between a mobile vehicle moving around the city and a central office is carrier out. An analysis of the results is presented.
35
  A universal list of information resources of automatic control system (ACS) is compiled on the basis of a resource involvement into information processing. The critical characteristics of information resources are determined from the standpoint of safe operation of the ACS. A method of information resources inventory is proposed, peculiarities of the method application are analyzed.
39
  The problem of reliability of information resources in corporate data communication networks is considered. Dependence of the information reliability on a row of difficult to formalize characteristics and factors is determined. A model for reliability assessment of information resource and prediction of its changes is proposed.
43
  A structure and composition of a set of tools for providing authenticity of the data circulating in corporate networks are examined. The features and peculiarities of the toolset using are analyzed.
46
  Proposed are tools for automation of processes of administration of information-technological infrastructure of an enterprise resource planning (ERP) system used in search and recovery tasks caused by destructive actions on its components
50
  A model of automated control system of corporate area network is presented. The mechanisms of the system efficiency improvement and the problems of its integration into automated control system of industrial enterprise are analyzed.

INFORMATION SECURITY OF DATA COMMUNICATION NETWORKS

53
  The problem of increase in productivity of corporate networks experiencing information security threats is formulated as a task of building of a protection system ensuring maximum possible efficiency at guaranteed detection and effective counteraction to the information security threats.
57
  Analysis of experimental studies of productivity of a corporate data communication network under operation of information protection system which quickly changes its parameters in response to information attacks is presented.
60
  Confidentiality properties of Secure Message Transmission (SMT) protocols with shared memory are determined. The confidentiality is understood as stability of the transmission protocol towards active and passive enemy attacks in a generalized communication channel described by the Dolev—Yao model.
FEATURES OF THE SMT-PROTOCOL IMPLEMENTATION BASED ON PYTHON 3 Maxim V. Belousov, Aleksey V. Aleksandrov
64
  Implementation of the SMT-protocol on the base of Shamir secret sharing scheme is described. Several characteristics of the protocol, such as algorithmic complexity, speed, and safety are studied.