TECHNOLOGIES OF DATA COMMUNICATION NETWORKS ANALYSIS AND DESIGN
						RESEARCH INTO POSSIBILITIES OF DIGITAL RADIO STATION CREATION ON THE BASIS OF COHERENT RECEPTION OF GMSK-SIGNALS
Alexander S. Merkutov, Denis V. Krutin, Andrey N. Tsyslav , Alexander A. Pletnev					
					7
					
					
					
	 
	An investigation on noise immunity of digital demodulator with bearing and clock frequencies tuning out is performed with the use of ADS. A prototype of radio station for the VHF range is developed, and possibilities of its application as a part of radio communication system equipment operated in frequency slot pitch of 6,25 or 3,125 kHz are tested experimentally.
					
					
						METHODS OF EVALUATION OF THE COMMUNICATION LINK QUALITY. WCDMA TECHNOLOGY
Denis V. Krutin, Maxim A. Kislyakov, Sergey G. Mosin 					
					12
					
					
					
	 
	The problem of monitoring of exchange service station capacity of cellular system using code channel separation on the base of signal-to-noise ratio assessment is considered. Methods for signal-to-noise ratio determination with the use of WCDMA technology are proposed.
					
					
						DESIGN OF WIRELESS SENSOR NETWORKS
Maxim A. Kislyakov, Sergey G. Mosin , Veronika V. Savenkova					
					15
					
					
					
	 
	Theoretical problems in wireless sensor networks design are considered. Separate stages of the design route are described. The networks classification of as topological structures is presented.
					
					
						METHODOLOGY OF TEST-ORIENTED DESIGN OF MIXED-SIGNAL CIRCUITS
Sergey G. Mosin 					
					19
					
					
					
	 
	Methodology of test-oriented design of mixed-signal circuits where parallel design procedures are executed at multicores or multiprocessors computer systems is proposed. The choice between methods of incircuit and external testing is provided.
					
					
					24
					
					
					
	 
	An analysis of equilibrium states of the TCP traffic control system is presented. A new method of congestion control in TCP/IP networks is proposed. Distinguishing features of the method are incorporation of slow adaptation algorithms and allowing for selective packet removal.
					
					
						ON ORGANIZATION OF DISTRIBUTED INFORMATION ENVIRONMENT FOR INTEGRATED PROTECTION AND SAFETY SYSTEMS
Andrey V. Telniy , Oleg R. Nikitin , Igor V. Khrapov 					
					28
					
					
					
	 
	Evaluation criteria and methods of organization of information exchange in a distributed information environment of integrated protection and safety systems by various manufacturers are presented.
					
OPERATION OF DATA COMMUNICATION NETWORKS
						ANALYSIS OF WIRELESS CHANNELS QUALITY IN DISTRIBUTED TELECOMMUNICATION DATA TRANSFER ENVIRONMENT IN DENSELY BUILT-UP CITY AREA
Aleksey V. Goryachev , Mikhail Yu. Monakhov 					
					33
					
					
					
	 
	An experimental study of quality of data transfer link organized with the use of wireless communication technologies between a mobile vehicle moving around the city and a central office is carrier out. An analysis of the results is presented.
					
					
						INVENTORY OF INFORMATION RESOURCES AS A BASIS FOR SAFE OPERATION OF AUTOMATIC CONTROL SYSTEM
Mikhail Yu. Monakhov , Olga I. Fayman					
					35
					
					
					
	 
	A universal list of information resources of automatic control system (ACS) is compiled on the basis of a resource involvement into information processing. The critical characteristics of information resources are determined from the standpoint of safe operation of the ACS. A method of information resources inventory is
	proposed, peculiarities of the method application are analyzed.
					
					
						A MODEL FOR ASSESSMENT OF FACTORS OF INFORMATION RELIABILITY CHANGE IN CORPORATE DATA COMMUNICATION NETWORKS
Dmitry A. Polyansky , Mikhail Yu. Monakhov 					
					39
					
					
					
	 
	The problem of reliability of information resources in corporate data communication networks is considered. Dependence of the information reliability on a row of difficult to formalize characteristics and factors is determined. A model for reliability assessment of information resource and prediction of its changes is proposed.
					
					
						A TOOLSET FOR PROVIDING INFORMATION AUTHENTICITY IN CORPORATE NETWORKS SUPPORTING DATA COMMUNICATION IN AUTOMATIC CONTROL SYSTEMS
Dmitry A. Polyansky , Olga I. Fayman, Svetlana Yu. Kirillova					
					43
					
					
					
	 
	A structure and composition of a set of tools for providing authenticity of the data circulating in corporate networks are examined. The features and peculiarities of the toolset using are analyzed.
					
					
						ON AUTOMATION OF PROCESSES PROVIDING FUNCTIONAL STABILITY OF INFORMATION ECHNOLOGICAL INFRASTRUCTURE OF AN ENTERPRISE RESOURCE
PLANNING SYSTEM
Denis V. Mishin , Mikhail Yu. Monakhov 					
					46
					
					
					
	 
	Proposed are tools for automation of processes of administration of information-technological infrastructure of an enterprise resource planning (ERP) system used in search and recovery tasks caused by destructive actions on its components
					
					
						SYSTEM OF ADMINISTRATION OF CORPORATE DATA TRANSMISSION NETWORK SERVING AN AUTOMATIC CONTROL SYSTEM OF INDUSTRIAL ENTERPRISE
Denis V. Mishin , Maria M. Monakhova , Arkady A. Petrov 					
					50
					
					
					
	 
	A model of automated control system of corporate area network is presented. The mechanisms of the system efficiency improvement and the problems of its integration into automated control system of industrial enterprise are analyzed.
					
INFORMATION SECURITY OF DATA COMMUNICATION NETWORKS
						INCREASE IN PRODUCTIVITY OF CORPORATE NETWORKS SUBJECTED TO INFORMATION SECURITY THREAT
Ludmila M. Gruzdeva , Mikhail Yu. Monakhov 					
					53
					
					
					
	 
	The problem of increase in productivity of corporate networks experiencing information security threats is formulated as a task of building of a protection system ensuring maximum possible efficiency at guaranteed detection and effective counteraction to the information security threats.
					
					
						EXPERIMENTAL STUDY OF CORPORATE TELECOMMUNICATION NETWORK WITH ADAPTIVE INFORMATION SECURITY SYSTEM
Ludmila M. Gruzdeva , Konstantin G. Abramov , Yury M. Monakhov 					
					57
					
					
					
	 
	Analysis of experimental studies of productivity of a corporate data communication network under operation of information protection system which quickly changes its parameters in response to information attacks is presented.
					
					
						STABILITY OF SMT-PROTOCOL TOWARDS ENEMY ATTACK IN DOLEV—YAO SAFETY MODEL
Aleksey V. Aleksandrov 					
					60
					
					
					
	 
	Confidentiality properties of Secure Message Transmission (SMT) protocols with shared memory are determined. The confidentiality is understood as stability of the transmission protocol towards active and passive enemy attacks in a generalized communication channel described by the Dolev—Yao model.
					
					
						FEATURES OF THE SMT-PROTOCOL IMPLEMENTATION BASED ON PYTHON 3
Maxim V. Belousov, Aleksey V. Aleksandrov 					
					64
					
					
					
	 
	Implementation of the SMT-protocol on the base of Shamir secret sharing scheme is described. Several characteristics of the protocol, such as algorithmic complexity, speed, and safety are studied.
					









            
            