Telecommunication systems, networks and devices
ANALYZING IEEE 802.11AH ENERGY EFFICIENCY FOR THE INTERNET OF THINGS UTILIZATION |
V. Petrov, A. Ometov, S. Andreev, Y. Koucheryavy |
Read
Abstract: In this paper, we review a novel IEEE 802.11ah technology, which is currently being standardized to efficiently support a plethora of prospective machine-to-machine (M2M) applications. In contrast to conventional human-to-human communications, the M2M scenarios are often characterized by their small-size and infrequent traffic, stringent power requirements, large device population, and longer transmission ranges. To address these specific challenges, the emerging IEEE 802.11ah specifications are proposing a number of improvements to augment the conventional IEEE 802.11 technology. We study the achievable energy efficiency and the number of supported devices for a reference M2M scenario by taking into account the characteristic IEEE 802.11ah parameters.
Keywords: IEEE 802.11ah, Internet of Things, wireless networks, MAC.
|
THE RESEARCH OF ECC DATA TRANSMISSION SYSTEMS MODULAR SIMULATION MODELLING PROGRAM DESIGN METHODS |
S. Vladimirov, А. Samaydanov |
Read
Abstract: Research subject. The article concentrates on the research of ECC data transmission systems modular simulation modelling program design methods. Method. The research method is computer modelling. In the article we estimate the execution time of programs based on described design methods. Core results. The paper contains the results of calculated efficiency of examined methods, which has been estimated with execution time of programs based on described design methods for computers with single-core and multi-core architectures. Practical relevance. The paper presents recommendations of choosing the simulation modelling program design method for multi-core computers powered by POSIX operation.
Keywords: Modelling program, simulation modelling, error-coddecting coding, socket, named pipe.
|
SDN-CONTROLLERS BENCHMARKING BASED ON MODEL NETWORK |
А. Vladyko, N. Matvienko, M. Novikov, R. Kirichek |
Read
Abstract: Object of research. Software-defined networking controller platforms. Method. As a research method is used full-scale experiment. In the estimated performance of controllers depending on various parameters (the number of threads, number of cores, and others.). Core results. The article presents the results of the evaluation of software and configurable controllers performance networks Floodlight, OpenDaylight, Mul, Beacon, Maestro, Ryu on the basis of a series of stress tests. Practical relevance. The results will allow to select the desired type of controller in the planning of networks with different number of connected subscribers.
Keywords: Software-defined Networking, SDN-controller, model network, benchmarking.
|
ANALYSIS OF UAV IMPLEMENTATION AS A MOBILE CLUSTER HEAD OF THE GROUND-BASED AUTONOMOUS SENSOR NETWORKS |
А. Vyrelkin, А. Vybornova, А. Koucheryavy |
Read
Abstract: Research subject. The article explores the questions of a lifecycle of ground-based wireless sensor networks with autonomous nodes. The research provides abilities to increase the WSN lifecycle due to usage of unmanned aerial vehicles (UAV) as a mobile gateway (sink) of the autonomous WSN. Method. In this article we have compared power consumption of the cluster head nodes to transmit packets to the stationary and mobile sensor network gateway. Core results. In this research the specificity of cluster head nodes and mobile sink interaction was considered and it was found out that usage of UAV as a mobile gateway allowed to achieve the significant energy savings for the ground network section. Theoretical relevance of the research lies in the necessity of the new energy-efficient protocols and algorithms. Practical relevance of this research consists in the energy and therefore cost savings for the maintenance of the wireless sensor network.
Keywords: Wireless Sensor Networks, Flying Sensor Networks, censor network lifecycle, cluster head, unmanned aerial vehicle.
|
ROBOTIC INDOOR POSITIONING METHODS BASED ON TELECOMMUNICATION TECHNOLOGIES |
T. Moskalenko, R. Kirichek |
Read
Abstract: Subject of Study. The article concentrates on the research of robotic indoor positioning methods – one of the current trend in different spheres of activity becoming more and more popular in the market. Method. The research methods are comparative analysis of existing telecommunication technologies and computing modelling in AnyLogic. Core results. The article contains the results of service- simulating tests in particular calculated maximum tags value that can be serviced in the positioning systems. Practical significance. The article presents recommendation of choosing the telecommunication technologies for designing robotic indoor positioning systems.
Keywords: indoor-navigation, robotic positioning, UWB, RTLS.
|
PROBLEMS OF TELECOMMUNICATION SERVICES DEVELOPMENT AND IMPACT ON THE TRAFFIC DISTRIBUTION |
А. Paramonov, N. Senkina |
Read
Abstract: At the beginning of the telecommunication technologies growth the number of players on the tele- communication market was restricted by a number of operators of telecommunications networks. In most countries it was one ore a few companies. Evolution of telecommunications brings up to new services development. This leads to traffic redistribution and reflects to income redistribution between operators on services providers. The report contains: analysis of trends in the development of new services, such as OTT services access to video content, VoIP, social networks, analysis and forecast changes in the number of users and traffic of new services, analysis of traffic redistribution problems, the report provides a model of redistribution of traffic, was built on the basis of forecasts of changes in the number of users and the price / quality. The report presents an analysis of the development of communication technologies, trends in the development of subscriber devices and client applications, the impact of development of services in the reallocation of subscriber traffic. It was selected user traffic model with the development of services. It was formed by the preliminary forecast of changes in the number of users of advanced services, as well as the forecast traffic changes.
Keywords: telecommunications, net, traffic redistribution, data, services, communication, provider, user, imposed services.
|
RESEARCH OF PROTOCOLS OF INTERACTION OF THE INTERNET OF THINGS ON THE BASIS OF THE LABORATORY BENCH |
V-D. Pham, L. Yulchieva, R. Kirichek |
Read
Abstract: The article presents a study of the Internet of Things protocols based on the laboratory bench. As a hardware platform is considered NodeMCU module, which uses the WiFi data transmission technology, is the most common today for the Internet of Things devices. During experiment time delays, losses of packets depending on their size, the attitude of the control footing towards the useful were received for one transaction in case of data transfer with use of the protocols MQTT, CoAP, HTTP/2, for the purpose of determination in what devices these protocols will be most effective.
Keywords: Internet of Things, protocol, HTTP/2, MQTT, CoAP.
|
Radio engineering, including television systems and devices
STATE-OF-THE-ART WAYS FOR INCREASING SPECTRUM EFFICIENCY AND IMPLEMENTATION OF NEW RADIO TECHNOLOGIES |
E. Vinogradov |
Read
Abstract: New principles to use radio spectrum and introduce new radio technologies supplementing the traditional approach such as cognitive radio, a new approach to the frequency assignment (WAPECS), li- censed shared access (LSA) are considered. Problems arising in implementing the principles and the ways examined for their solution are described.
Keywords: radio frequency spectrum, spectrum efficiency, cognitive radio, frequency assignment, frequency block.
|
LTE STANDARD ZC-SEQUENCES ANALYSIS |
V. Lazarev, A. Ryjkov |
Read
Abstract: The paper describes the generation process and special features of ZC-sequence-based signals used in LTE standard. In particular, the research considers primary synchronization signal (PSS) and net- work access request preamble. Correlation properties of the signals are shown and evaluated.
Keywords: synchronization, preamble, ZC-sequence, Zadoff-Chu, LTE, PSS, SSS, PRACH, PUSCH, PUCCH.
|
WI-FI NETWORKS DESIGN AND OPTIMIZATION |
I. Alshaev, V. Lavrukhin |
Read
Abstract: The paper describes design and optimization processes of the modern corporate WLANs. User load and radio coverage aspects are considered. The number of access point calculation algorithm is pro- posed. Basic optimization methods of Wi-Fi networks are shown.
Keywords: design, optimization, Wi-Fi, wireless local area network, airtime, subscriber station, access point, station parameters, radio coverage, user load.
|
MEASUREMENT IN SFN DVB-T2 WITH A R&S EFL AND ETL |
A. Buchatsky, S. Kulikov |
Read
Abstract: Currently Russia moves to digital broadcasting in the DVB-T2 standard. For consistent reception of signal is necessary to control not only the quality indicators transmitters, but also the possibility of their operation in SFN. This paper discusses the stages of measurements in SFN using devices ETL and EFL of the company Rohde&Schwarz.
Keywords: DVB-T2, SFN, R&S ETL, R&S EFL.
|
Methods and systems of information protection, information security
SECURING DATA WITH STEGANOGRAPHY FOR INTERNET OF THINGS |
М. Klyuev, Т. Minaeva, А. Ometov |
Read
Abstract: In this paper, authors consider cases related to the confidentiality question of the Internet of Things (IoT). As a matter of fact, both Information Security and Telecommunications communities are concerned about what information may leak out via IoT. Therefore, the need of a secure environment is vital securing the data transmission over the wireless medium. In this work, authors survey the main steganography systems and the corresponding methods of their analysis, followed by practical implementation of the statistical ones.
Keywords: Steganography, Internet of Things, Image steganography.
|
UTILITY FOR VULNERABILITY SEARCH IN A SOFTWARE OF TELECOMMUNICATION DEVICES BY METHOD ALGORITMIZATION OF MACHINE CODE. PART 1. FUNCTIONAL ARCHITECTURE |
M. Buinevich, K. Izrailov |
Read
Abstract: Research subject. The article is devoted to the author's method algorithmization machine code tele- communications device that allows you to search for vulnerabilities when the source code is absent. We study the main stage of the method for its automation with the help of special software in the form of a utility. Method. The main prerequisites for the realization of utility were obtained with analysis of compilation and decompilation approaches, that is close to the phase, as well as the model, that is used in the method. Core results. A functional architecture utility, including its division at the stage of implementation and functional modules has been proposed. The types of internal data representations inside the utility, that are used to work and interaction modules has been defined. The hypothetical modeling examples of the work stages and the individual modules on the test data was conducted. Practical relevance. The proposed architecture can be used to implement an entire group of applications close to solving the algorithmization task.
Keywords: Telecommunication Devices, Software, Vulnerability Search, Computer Code, Algorithmization Method, Functional Architecture.
|
© SPbSUT © Authors
|
|