Сообщение

2017, Vol. 5, Iss. 4

 

Methods and systems of information protection, information security

IEEE 802.11 WLAN LOAD ANALYSIS
A. Vikulov, A. Paramonov

Read

Abstract: The modern WLANs design is closely connected with the choice of the correct model, which requires to define the initial parameters. Therefore, in order to determine the required modes of operation at the data link layer, it is necessary to understand the load values that are important for solving the problems of performance and design evaluation. Research subject. The present work is devoted to the determination of practical reference points for the values of the network load in two different wireless networks. Method. The analysis is based on data collected by the deployed monitoring and management system in both WLANs. Core results. The statistical distributions of the average frame size and traffic intensity have been constructed. Practical relevance. The estimations of the characteristics can be used both in modelling and in the WLAN operation modes determination.

Keywords: IEEE 802.11, network load, traffic characteristics, Wi-Fi.

APPROACHES TO THE INTEGRATION OF TECHNOLOGY NB-IOT NETWORKS 5G/IMT-2020
A. Grebenshchikova, Abdelhamied A. Ateya, A. Muthanna, R. Kirichek

Read

Abstract: Research subject. The 3GPP has introduced a new narrowband radio technology called narrowband Internet of Things (NB-IoT) in Release 13. NB-IoT was designed to support very low power consumption and low-cost devices in extreme coverage conditions. NB-IoT operates in very small bandwidth and will provide connectivity to a large number of low-data-rate devices. Method. In this work, we built a system to integrate the NB-IoT with the 5G cellular system. We mainly concern with the deployment of edge cloud units for ultra-low latency applications. Core results. One of the NB-IoT development targets is to simplify the RAN protocols by removing functionality not needed for IoT applications. The simplified system is easier to implement and more costefficient to deploy. Among other benefits, the simplified system can be implemented on a general- purpose computing platform. Practical relevance. These aspects make NB-IoT attractive for implementation in cloud computing platforms.

Keywords: Internet of Things, NB-IoT, MEC, architecture, 5G/IMT-2020.

PROSPECTS OF USING UFMC TECHNOLOGY IN 5G/IMT-2020 NETWORKS
I. Grishin, N. Fedeneva

Read

Abstract: Research subject. The article considers the universal filtered multicarrier technology UFMC, planned to be introduced in the mobile communication networks of the fifth generation, which allows to maximize the rate of decay of the side lobes of the spectrum of the multifrequency signal, which are the cause of out-of-band emissions. Method. The method of computational experiment was chosen. Core results. The parameters of OFDM and UFMC signals were compared to determine the gain of UFMC technology in the occupied bandwidth of the signal spectrum, as well as the number of arithmetic operations required to generate a data symbol in comparison with OFDM technology, on the basis of which conclusions were made about the possibility practical application of UFMC technology in 5th generation mobile communication networks. Practical relevance. The analysis carried out can contribute to the selection of the optimal number of subcarriers in groups in order to minimize the amount of computation during the UFMC symbol generation process.

Keywords: 5G/IMT-2020, OFDM, UFMC, Dolph-Chebyshev window.

NETWORK INTERFACE ARCHITECTURE SIM-SIM WITH POWER SUPPLY OF DISTRIBUTED MODULES
V. Dashevsky, V. Budkov

Read

Abstract: The existing modern communication solutions for distributed modules of automation systems and different robotic complexes are described. The firmware architecture of network interface Sim-Sim is proposed, which supports a system of priorities and interrupts that allows devices to transmit data and power over a common coaxial cable. The architecture is used to power and communicate on-board sensors that form a hierarchical distributed sensor network on a robotic device. The comparative analysis of the developed architecture and modern solutions is given.

Keywords: Network interface, sensor network, power supply, Internet of things, robots, cyberphysical systems.

MEASUREMENT OF THE SIGNAL TIME IN POSITIONING OBJECTS IN MOBILE NETWORKS WITH NON-LINE-OF-SIGHT
A. Kireev, G. Fokin

Read

Abstract: Positioning of objects in mobile networks is an important task, beneficial both in commercial and in practical sense. Scenarios for this technology are constantly expanding. The task of positioning in mobile communication networks is solved by a variety of methods, the article considers algorithms for measuring the arrival time of signals. Research subject. The article is devoted to the analysis of positioning methods in mobile networks, as well as the dependence of positioning accuracy on the number of sources with non-line-of-sight. Method. The main mathematical dependencies of the methods work are considered, Modelling of signal propagation processes in mobile networks, which allowed to compare the signal-to-noise ratio with different number of base stations is carried out. Core results. Comparison of a number of popular positioning algorithms by measuring the arrival time of signals is made, the dependence of the positioning accuracy on the number of base stations without line-of-sight is revealed, the necessary conclusions are drawn. The results are statistically confirmed by the Cramer-Rao bound. Practical relevance. Developed software allows analyzing and simulating various mobile network structures and positioning of objects.

Keywords: Simulation time, arrival time, least squares method.

DEEP LEARNING METHODS ANALYSIS FOR TACTILE INTERNET TASKS
R. Kirichek, D. Naumkin, V. Uss

Read

Abstract: The concept of Tactile Internet is gaining popularity, especially with the spread of 5G networks. One of the main requirements for Tactile Internet systems is to ensure a round-trip delay to be less than 1 ms. Otherwise, the user will have difficulties with remote control and perception of tactile data. Since delays greater than 1 ms remain quite frequent, it becomes necessary to compensate for lost and delayed data using prediction methods. Research subject. The article analyzes the most common neural network architectures in the context of solving the problem of predicting the trajectory of a robotic system and choosing the most suitable one. Method. The principles of organization and interaction of layers in various architectures are discussed. Also, the methods of learning are compared. Core results. The architectures of neural networks are compared, and recommendations are given on the choice of the network and the learning method, depending on the task. Practical relevance. The described methods make it possible to train the network more quickly and make its predictions more accurate.

Keywords: Tactile Internet, Internet of Skills, reinforcement learning, deep learning, neural networks, minimal latency.

THE ARCHITECTURE OF INDUSTRIAL INTERNET OF THINGS
T. Moskalenko, R. Kirichek, A. Borodin

Read

Abstract: Now the ecosystem of industrial Internet of things (IIoT) is at the stage of formation, which is characterized by decisions within the framework of individual companies. The withdrawal of the industrial Internet to the state level implies a transition to a digital economy, namely, the digitization of production. To date, this process is hindering many factors, and the main problem is the lack of common standards for interaction of various IIoT platforms. Research subject. The article is devoted to the existing architecture of the industrial Internet of things. Method. The standards IIC, ISO/IEC, IEC, the analysis of the framework and the functions of the elements of architectural solutions are considered. Core results. A comparison of various architectural solutions is made from the point of view of suitability for use in constructing networks used in various rules and protocols. Practical relevance. The comparative analysis can serve as a basis for creating new standards for the interaction of industrial Internet systems.

Keywords: M2M, IoT, industrial Internet of Things, reference architecture.

ANALYSIS OF NETWORK SLICING TECHNOLOGY FOR 5G NETWORKS
S. Muhizi, R. Kirichek

Read

Abstract: 5G mobile communication technologies are rapidly developing due to the fact that new applications seemingly require qualitatively different characteristics of quality of service, which have not yet been implemented. Currently, there are two main parameters for future networks: high data transfer rate, up to 10 Gbps at the access level and ultra-low latency for end-to-end data transmission, down to 1 ms. For this, acutely rises the question of developing network management methods. The main management concept in the 5G mobile communication technologies will be the transition to softwaredefined networks. For services management, at the present time, are being developed principles of network segmentation or network slicing, which will be covered in the article. Research subject. The article considers concept of slicing in communication networks and its application for 5G mobile networks. Method. The joint integration of network slicing with SDN/NFV technologies is analyzed; is also reviewed main challenges for network slicing implementation road-map in communication networks from a slice management and monitoring point of view. Core results. A new architectural solution for network management is proposed, based on the organization and placement of independent network slices on a common network infrastructure. A main feature of this implementation is that each slice is isolated and secured to improve slice capabilities to deliver particular type of network service while sharing infrastructure resources with other network slices. Practical relevance. The new architectural approach to network organization plays a key role in the implementation of software-defined networks in networks 5G/IMT-2020.

Keywords: Mobile networks 5G/IMT-2020, slicing, network slice, SDN, NFV.

IDENTIFICATION OF THE INTERNET OF THINGS DEVICES WITH AUGMENTED REALITY TECHNOLOGIES
V. Teltevskaya, V. Zelenov, N. Shustov, V. Kulik, R. Kirichek, M. Makolkina

Read

Abstract: Identification of Internet of Things devices is one of the priority areas in the work of ITU-T study groups 11 and 20. One of the most important issues is the interaction with the user during the identification procedure. Augmented reality technologies are one of the possible solutions that have already proven themselves in inventory problems and in decision help systems. Research subject. This article describes the architecture of the model network hardware – software complex for the identification of Internet of Things devices by man using augmented reality technology. Based on this architecture was developed to model the network, and then conducted her testing. Method. As a method of research was chosen as the empirical research method. Core results. In the course of the work, a model identification network was designed and implemented, as well as a number of experiments were conducted to assess the values of service quality parameters. Practical relevance. The obtained test results allow to determine the quality of service for this type of service and allow further to conduct a full-scale experiment to assess the quality of perception of the identification procedure, using augmented reality technologies. It is also proposed to develop a software and hardware complex for testing the identification procedure of "smart" devices using augmented reality technologies.

Keywords: The Internet of Things, augmented reality, identification, DOA, DOI.

INTERNET OF THINGS TECHNOLOGIES FOR HEALTHCARE APPLICATIONS
V. D. Pham, R. Kirichek, R. Glushakov, R. Pirmagomedov

Read

Abstract: Over the past few years, the active introduction of the concept Internet of Things has changed the way patients are served in Healthcare. A significant increase in the number of portable devices for body state monitoring has led to making primary diagnosis for physicians becomes easier. The performance of medical devices is increasing every day. In addition apart from the fact that microcontrollers in such devices are gradually replaced by microprocessors, wireless technologies are used to transfer data, which allow to reduce power consumption and transmit data over long distances. Research subject. This article focuses on analysis of approaches to implementing Healthcare applications using wireless technologies in personal, local and global networks. Method. The structure of data exchange between medical devices and cloud service is considered. The description, analysis and comparison of wireless technologies which are used for collecting data on the state of human health and for transmission over a long distance are described. Core results. Based on the analysis of wireless technologies, conclusions were drawn regarding the possible use of BLE, 5G/IMT-2020, NB-IoT in the implementation of Healthcare applications. Practical relevance. The results of the analysis in the article can be used when choosing a particular wireless data transmission technology in the development of Healthcare applications.

Keywords: Healthcare, Internet of Things, BLE, ZigBee, 5G/IMT-2020, NB-IoT, LoRaWAN.

ENERGY EFFICIENT EDGE CLOUD SYSTEM FOR 5G
M. Filimonova, Abdelhamied A. Ateya, A. Muthanna, R. Kirichek

Read

Abstract: Research subject. In this work, we propose a 5G cellular communication system based on the green micro-cloud edge computing unit at the border of the cellular system. Method. The proposed work is modeled in terms of delay and unloading and provides better system performance. Core 79 Информационные технологии и телекоммуникации. 2017. Т. 5. № 4. results. The traffic for the proposed system is simulated, the received indicators are compared with other architectural variations. Practical relevance. The computing unit at the edge of the cellular system is introduced to reduce the number of intermediate nodes involved in communication process and provides the offloading way for data. This reduces the load on the core of the network and provides better efficiency in terms of latency and throughput. In addition, the cloud block represents solar energy, which reduces energy consumption.

Keywords: Clouds, 5G, energy, MEC.

Methods and systems of information protection, information security

CISCO TRUSTSEC
A. Katasonov, A. Tsvetkov, V. Andrianov

Read

Abstract: In our time, technology is continuously evolving. Each day, new protocols for networking, knowledge of the work necessary to ensure the proper functioning of the network. Research subject. The article is devoted to the security protocol in the network, TrustSec, its operation principle, architecture, capabilities, and similarities and differences of this protocol from its analogues. Method. The structure, operating principle, available protocol and characteristic features are revealed, and a comparative analysis was carried with the IPSec protocol, showing the positive and negative aspects of the explored protocol. Core results. The work of the protocol of TrustSec, the revealed features of this protocol, as well as the described operating principles, architecture, capabilities and characteristics of this protocol are analyzed. Material is prepared for studying and obtaining the necessary knowledge to use the TrustSec protocol. Practical relevance. The article developed by us can be filled by teachers for teaching students, help network administrators configure the operation of this protocol.

Keywords: TrustSec, Security, network, encryption, Cisco, MACsec.

© SPbSUT © Authors 
 
войти

Авторизация