TECHNOLOGIES OF DATA COMMUNICATION NETWORKS ANALYSIS AND DESIGN
RESEARCH INTO POSSIBILITIES OF DIGITAL RADIO STATION CREATION ON THE BASIS OF COHERENT RECEPTION OF GMSK-SIGNALS
Alexander S. Merkutov, Denis V. Krutin, Andrey N. Tsyslav , Alexander A. Pletnev
7
An investigation on noise immunity of digital demodulator with bearing and clock frequencies tuning out is performed with the use of ADS. A prototype of radio station for the VHF range is developed, and possibilities of its application as a part of radio communication system equipment operated in frequency slot pitch of 6,25 or 3,125 kHz are tested experimentally.
METHODS OF EVALUATION OF THE COMMUNICATION LINK QUALITY. WCDMA TECHNOLOGY
Denis V. Krutin, Maxim A. Kislyakov, Sergey G. Mosin
12
The problem of monitoring of exchange service station capacity of cellular system using code channel separation on the base of signal-to-noise ratio assessment is considered. Methods for signal-to-noise ratio determination with the use of WCDMA technology are proposed.
DESIGN OF WIRELESS SENSOR NETWORKS
Maxim A. Kislyakov, Sergey G. Mosin , Veronika V. Savenkova
15
Theoretical problems in wireless sensor networks design are considered. Separate stages of the design route are described. The networks classification of as topological structures is presented.
METHODOLOGY OF TEST-ORIENTED DESIGN OF MIXED-SIGNAL CIRCUITS
Sergey G. Mosin
19
Methodology of test-oriented design of mixed-signal circuits where parallel design procedures are executed at multicores or multiprocessors computer systems is proposed. The choice between methods of incircuit and external testing is provided.
24
An analysis of equilibrium states of the TCP traffic control system is presented. A new method of congestion control in TCP/IP networks is proposed. Distinguishing features of the method are incorporation of slow adaptation algorithms and allowing for selective packet removal.
ON ORGANIZATION OF DISTRIBUTED INFORMATION ENVIRONMENT FOR INTEGRATED PROTECTION AND SAFETY SYSTEMS
Andrey V. Telniy , Oleg R. Nikitin , Igor V. Khrapov
28
Evaluation criteria and methods of organization of information exchange in a distributed information environment of integrated protection and safety systems by various manufacturers are presented.
OPERATION OF DATA COMMUNICATION NETWORKS
ANALYSIS OF WIRELESS CHANNELS QUALITY IN DISTRIBUTED TELECOMMUNICATION DATA TRANSFER ENVIRONMENT IN DENSELY BUILT-UP CITY AREA
Aleksey V. Goryachev , Mikhail Yu. Monakhov
33
An experimental study of quality of data transfer link organized with the use of wireless communication technologies between a mobile vehicle moving around the city and a central office is carrier out. An analysis of the results is presented.
INVENTORY OF INFORMATION RESOURCES AS A BASIS FOR SAFE OPERATION OF AUTOMATIC CONTROL SYSTEM
Mikhail Yu. Monakhov , Olga I. Fayman
35
A universal list of information resources of automatic control system (ACS) is compiled on the basis of a resource involvement into information processing. The critical characteristics of information resources are determined from the standpoint of safe operation of the ACS. A method of information resources inventory is
proposed, peculiarities of the method application are analyzed.
A MODEL FOR ASSESSMENT OF FACTORS OF INFORMATION RELIABILITY CHANGE IN CORPORATE DATA COMMUNICATION NETWORKS
Dmitry A. Polyansky , Mikhail Yu. Monakhov
39
The problem of reliability of information resources in corporate data communication networks is considered. Dependence of the information reliability on a row of difficult to formalize characteristics and factors is determined. A model for reliability assessment of information resource and prediction of its changes is proposed.
A TOOLSET FOR PROVIDING INFORMATION AUTHENTICITY IN CORPORATE NETWORKS SUPPORTING DATA COMMUNICATION IN AUTOMATIC CONTROL SYSTEMS
Dmitry A. Polyansky , Olga I. Fayman, Svetlana Yu. Kirillova
43
A structure and composition of a set of tools for providing authenticity of the data circulating in corporate networks are examined. The features and peculiarities of the toolset using are analyzed.
ON AUTOMATION OF PROCESSES PROVIDING FUNCTIONAL STABILITY OF INFORMATION ECHNOLOGICAL INFRASTRUCTURE OF AN ENTERPRISE RESOURCE
PLANNING SYSTEM
Denis V. Mishin , Mikhail Yu. Monakhov
46
Proposed are tools for automation of processes of administration of information-technological infrastructure of an enterprise resource planning (ERP) system used in search and recovery tasks caused by destructive actions on its components
SYSTEM OF ADMINISTRATION OF CORPORATE DATA TRANSMISSION NETWORK SERVING AN AUTOMATIC CONTROL SYSTEM OF INDUSTRIAL ENTERPRISE
Denis V. Mishin , Maria M. Monakhova , Arkady A. Petrov
50
A model of automated control system of corporate area network is presented. The mechanisms of the system efficiency improvement and the problems of its integration into automated control system of industrial enterprise are analyzed.
INFORMATION SECURITY OF DATA COMMUNICATION NETWORKS
INCREASE IN PRODUCTIVITY OF CORPORATE NETWORKS SUBJECTED TO INFORMATION SECURITY THREAT
Ludmila M. Gruzdeva , Mikhail Yu. Monakhov
53
The problem of increase in productivity of corporate networks experiencing information security threats is formulated as a task of building of a protection system ensuring maximum possible efficiency at guaranteed detection and effective counteraction to the information security threats.
EXPERIMENTAL STUDY OF CORPORATE TELECOMMUNICATION NETWORK WITH ADAPTIVE INFORMATION SECURITY SYSTEM
Ludmila M. Gruzdeva , Konstantin G. Abramov , Yury M. Monakhov
57
Analysis of experimental studies of productivity of a corporate data communication network under operation of information protection system which quickly changes its parameters in response to information attacks is presented.
STABILITY OF SMT-PROTOCOL TOWARDS ENEMY ATTACK IN DOLEV—YAO SAFETY MODEL
Aleksey V. Aleksandrov
60
Confidentiality properties of Secure Message Transmission (SMT) protocols with shared memory are determined. The confidentiality is understood as stability of the transmission protocol towards active and passive enemy attacks in a generalized communication channel described by the Dolev—Yao model.
FEATURES OF THE SMT-PROTOCOL IMPLEMENTATION BASED ON PYTHON 3
Maxim V. Belousov, Aleksey V. Aleksandrov
64
Implementation of the SMT-protocol on the base of Shamir secret sharing scheme is described. Several characteristics of the protocol, such as algorithmic complexity, speed, and safety are studied.