Сообщение

2016, Vol. 4, Iss. 2

Telecommunication systems, networks and devices

AN OVERVIEW OF POSSIBLE TESTING TYPES AND METHODS FOR THE INTERNET OF THINGS
R. Dolgushev, R. Kirichek, A. Koucheryavy

Read

Abstract: Research subject. The article provides an overview of types and methods of testing various Internet Things. Method. Existing testing approaches that are used in communication networks nowadays have been analyzed during the research. In this article, set of test specifications was proposed for the complex testing of Internet Things. Core results. During the test it is possible to evaluate various criteria such as probabilistic and time parameters associated with the data exchange between things, as well as with the use of network resources, protocols, etc. Practical relevance. As a validation of the proposed test specifications the natural experiment was made to test the fragment of net- work with the purpose of selecting a standard application protocol for the typical Internet Thing. Protocol selection is based on the determination of the average response time to a request (RTT) using such protocols as MQTT, CoAP and HTTP.

Keywords: Internet Thing, IoT, Wi-Fi, Bluetooth, ZigBee, MQTT, CoAP, HTTP.

TRAFFIC AND QUALITY OF SERVICE RESEARCH IN A FLYING AD-HOC NETWORK
A. Dorohova, A. Paramonov

Read

Abstract: Research subject. The article concentrates on the research of traffic and quality of service in Flying Ad-Hoc Networks (FANETs). Method. The research method is network simulation based on ns-3. In the article we estimate characteristics of traffic and quality of service in the network constructed in accordance with the developed simulation model. Core results. The paper contains the estimation results of traffic and quality of service in the network constructed in accordance with the developed simulation model using AODV and OLSR routing protocols. Practical relevance. The paper presents recommendations of choosing the network mobility model and routing protocols.

Keywords: FANET, UAV, IEEE 802.11, routing protocol, flying ad-hoc network, QoS, simulation modeling, ns-3.

METHOD OF POSITIONING ELEMENTS OF A SENSOR NETWORK USING UNMANNED AERIAL VEHICLES
R. Kirichek, I. Grishin, E. Hundonugbo, D. Dumin

Read

Abstract: Research subject. The article is devoted to the method of determining the location of elements of a sensor network using unmanned aerial vehicles. Method. As a method of empirical research was chosen as the experiment, in which the described method was determined by the positions of the nodes of a sensor network. Core results. In the article the method of determining the location of sensor nodes of a sensor network. The considered method allows to improve the accuracy of the location data of each node of the sensor network, as well as to build a map of the touch fields for subsequent optimal flight. Practical relevance. The proposed method can be used when solving the tasks of collecting and delivering data from sensor fields in a communication network of General use.

Keywords: flying sensor network, FUSN, UAV, quadrocopter, sensor node, sensor, positioning.

STUDY OF THE INTERACTION BETWEEN AUGMENTED REALITY APPLICATIONS AND CONTROL METHODS OF UAV
M. Makolkina, V. Teltevskaya, V. Kulik, R. Kirichek

Read

Abstract: Research subject. The article is devoted to the study of the interaction between augmented reality applications and control methods of unmanned aerial vehicles. Method. The study was conducted experimentally using the developed experimental stand. In the experiment, the augmented reality application was used to control the UAV. Core results. Quality of Service of the network and a subjective assessment of experience were evaluated. To determine the relationship between quality of service of the network and quality of experience was used the Hurst exponent. Practical relevance. The parameters of the maintenance of the network to ensure a given quality of experience in the control of the UAV using the augmented reality app.

Keywords: augmented reality, flying sensor network, unmanned aerial vehicles, the quality of experience, the Hurst exponent.

METHODS FOR THE FLYING UBIQUITOUS SENSOR NETWORKS
A. Shklyaeva, R. Kirichek, A. Koucheryavy

Read

Abstract: Research subject. This article provides an overview of possible types and methods of testing the flying ubiquitous sensor networks. Method. As a research method the analysis of the main tasks of FUSN, their facilities and the types of interactions between FUSN segments was made. Core results. The article contains results of testing the FUSN by the developed technique: the number of simultaneously sampled nodes, the maximum distance of interaction, the average delay during the data transmission between nodes. Practical relevance. Test specifications that can be used for testing FUSN were proposed in this article.

Keywords: flying ubiquitous sensor network, FUSN, ZigBee, BLE, 6LoWPAN, IoT, UAV, quadrocopter, sensor node, testing.

THE METHOD OF THE TRAFFIC CONTROL IN HYBRID SOFTWARE-DEFINED NETWORK
A. Krasov, M. Levin, A. Tcvetkov

Read

Abstract: Research subject. The article is devoted to the method of managing traffic highly loaded hybrid software-defined network. Method. As a method of study used experiment. Core results. The article presents the universal software model of the proposed traffic control method. Practical relevance. Shows formalized model of the proposed traffic control method, as well as its versatile programming model implementation.

Keywords: availability, security, software-defined network, controller, EIGRP, load.

System analysis, information management and processing, statistics

GREEN'S FUNCTION IN CONTEST OF PROCESSING DIGITAL IMAGE
Y. Boltov

Read

Abstract: Research subject. The possibility of presenting digital images scalar fields. Method. The method of research is the use of mathematical physics equations. Core results. The use of green's functions for processing digital images. Practical relevance. The practical significance is to improve the quality of the digital image processing.

Keywords: Green's function, image, scalar field, field of singular points, the Dirac's function.

ANALYZING OF THE SMART HOME GATEWAY PERFORMANCE BASED ON CLOUD PLATFORM ALLJOYN
A. Khakimov, A. S. Muthanna, V. Kulik, R. Kirichek

Read

Abstract: Research subject. The paper analyzes the performance of the gateway smart home-based cloud plat- form ALLJOYN. Method. In the full-scale experiment has been chosen as the research method. In the role of gateway used hardware platform Raspberry Pi, which operates on the basis of an application for remote control of actuators and sensors based software platform AllJoyn using WhatsApp application based on XMPP protocol. Core results. The research used performance based RAM memory of the gate- way have been obtained on the number of sensor nodes. Practical relevance. The paper presents recommendations for the construction of the complex architecture of the smart home solutions and to reduce the processing load on the gateway level.

Keywords: AllJoyn, Internet of Things, XMPP, sensor networks, gateway, Web of Things.

Methods and systems of information protection, information security

UTILITY FOR VULNERABILITY SEARCH IN SOFTWARE OF TELECOMMUNICATION DEVICES BY METHOD ALGORITHMIZATION OF MACHINE CODE. PART 2. INFORMATION ARCHITECTURE
K. Izrailov

Read

Abstract: Research subject. The article continues the series of articles devoted to the author's method algorithmization machine code telecommunications devices, having the automation of the main stage as a utility. Following the functional utility researched information layer formalizing data used in it, and defining the principles of their conversion. Method. The main prerequisites for the formalization of data were obtained by analyze of a functional architecture and synthesis of schema evolution «workers» in the context of the data used in the method of the model. Core results. An information architecture of the utility, including formats input and output assembly algorithmic code, as well as the structure of the internal representation at all stages of the work. The intermediate data created by the utility for through example is at the article. Practical relevance. The proposed architecture can be used to represent in software different models of software code, from creation to optimization and modeling of the experiment.

Keywords: telecommunication devices, vulnerability search, algorithmization utility, information architecture.


© SPbSUT © Authors 
 
войти

Авторизация