NCDP MULTICAST NETWORK CODING PROTOCOL IN TCP/IP NETWORKS
- S.S. Vladimirov, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, department of communication networks and data transmission, associate professor, Ph.D.; firstname.lastname@example.org
Keywords: network coding, NCDP protocol, round trip time.
A new multicast session protocol NCDP based on the network coding method is presented. The proposed protocol is intended for use in content delivery systems based on multicast data transmission from several sources. The basic structure of the NCDP packet and its operation logic are shown, taking into account the variability of the protocols used in conjunction with it. The packet header processing algorithms for encoder nodes are given. A variant of a virtual laboratory testbed for studying the operation of the protocol is proposed. The results of testing the timing characteristics of the NCDP protocol for a butterfly-type network and a network with a diamond topology are presented. A comparison of simple serial multicast transmission with transmission by the network coding method is carried out.
MULTIPLE ACCESS SCHEMES FOR 5G AND NEXT GENERATIONS COMMUNICATION SYSTEMS
- M.G. Bakulin, Moscow Technical University of Communications and Informatics (MTUCI), associate professor, Ph.D.; email@example.com
- T.B.K. Ben Rejeb, MTUCI, dean of faculty, Ph.D.; firstname.lastname@example.org
- V.B. Kreyndelin, MTUCI, head of a department, professor, Dr.Sci.(Tech.); email@example.com
- Yu.B. Mironov, MTUCI, head of a faculty, Ph.D.; firstname.lastname@example.org
- D.Yu. Pankratov, MTUCI, associate professor, Ph.D.; email@example.com
- A.E. Smirnov, MTUCI, associate professor, Ph.D.; firstname.lastname@example.org
Keywords: 5G, multiple access, Non-Orthogonal Multiple Access, NOMA, code domain, power domain.
This article provides an overview of two main technologies of NOMA (Non-Orthogonal Multiple Access): code division NOMA and Power-Division NOMA (PD-NOMA). It is shown that the PD-NOMA allow organizing multiple access due to different power levels of user signals depending on the conditions in the transmission channel. The main types of NOMA receivers are also described, in particular, a receiver with successive interference cancellation. The main examples of NOMA signal structure division systems include NOMA code division systems are given, as well as some other varieties of NOMA: SCMA (Sparse Code Multiple Access), PDMA (Pattern Division Multiple Access), IDMA (Interleave-Division Multiple-Access), etc. In addition, the article discusses the key features of NOMA for communication networks of the fifth and subsequent generations.
MODEL AND METHOD OF ESTIMATION OF RELIABILITY OF 5G AND BEYOND NETWORKS
- D.V. Kashkarov, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, department of communication networks and data transmission, postgraduate; email@example.com
Keywords: 5G networks, network reliability, random graph, reliability model, network connectivity.
The paper presents a model and method for estimating the reliability and availability of 5G and beyond networks using the theory of random graphs. Hardware reliability determined by equipment availability factors is considered. The possibilities of taking into account the finite reliability of network elements in assessing the probability of a good state as the probability of a random graph being connected, as well as the selection of network parameters in accordance with the requirements for its reliability, are demonstrated. It is shown that the model and method of reliability assessment can be used in the analysis, planning and design of 5G and beyond networks.
MODELLING AND ANALYSIS OF TRAFFIC IN THE CHANNELS OF TELECOMMUNICATION SUBSYSTEMS OF INTEGRATED SECURITY SYSTEMS
- N.V. Tamp, Military University of Radio Electronics (Cherepovets), researcher, Ph.D.; firstname.lastname@example.org
- A.V. Fedulov, FSUE Russian Broadcasting and Alert Networks (RBAN), director general; 6 431 email@example.com
- S.S. Pljasunov, FSUE RBAN, chief designer; firstname.lastname@example.org
Keywords: integrated security system, telecommunication subsystem, simulation model, time series, time series analysis methods, dynamic system, dynamic variables, phase portraits.
The article substantiates the need for monitoring telecommunications subsystems of integrated security systems. It is proposed a simulation model that allows forming of elements of a time series, in the role of which are the moments of the beginning of the transmission of messages. The possibility of generating both stationary and non-stationary event streams is provided. The results of studies of the main methods of time series analysis are presented. It is shown that the approaches used do not allow detecting possible abnormal traffic states with the required efficiency and reliability. It is proposed to consider a telecommunication system as a dynamic system to evaluate various traffic conditions. Analytical expressions are given for the formation of dynamic variables, on the basis of which phase portraits are formed. The presented experimental results confirmed the informativeness of the proposed traffic display option. It is shown that the assessment of the state of telecommunication systems using phase portraits makes it possible to identify abnormal traffic states, as well as predict the behavior of a dynamic system in the future.
THREAT MODEL OF DECISION SUPPORT SYSTEMS BASED ON ARTIFICIAL INTELLIGENCE ELEMENTS
- I.B. Saenko, St. Petersburg Federal Research Center of the Russian Academy of Sciences, leading researcher, S.M. Budyonny’s Military Academy of Communications (MAC), professor, Dr.Sci.(Tech.); email@example.com
- O.S. Lauta, Admiral S.O. Makarov State University of Marine and Inland Shipping, professor, Dr.Sci.(Tech.); firstname.lastname@example.org
- N.A. Vasiliev, S.M. Budyonny’s MAC, applicant; email@example.com
- K.V. Kribel, S.M. Budyonny’s MAC, applicant; firstname.lastname@example.org
Keywords: artificial intelligence, machine learning, neural networks, human-machine interaction, data visualization, computer security, technology vulnerabilities.
The article provides an overview of existing attacks on artificial intelligence (AI) systems that take into account the stages of learning, the use of machine learning algorithms, as well as the information infrastructure of the system. The classification of these attacks is proposed based on the analysis of the AI functioning process and the classes of attacks that are the most relevant and dangerous for AI systems are identified. A threat model of the decision support system developed on the basis of AI technologies is proposed, the feature of which is to take into account both threats to the confidentiality of AI system data, threats to the functioning of AI systems, and threats to information systems.
DEEP PERCEPTION OF SOUND AND VIDEO SEQUENCES OF MASS MEDIA
- S.L. Mishenkov, Moskow Technical University of Communication and Informatics (MTUCI), department of television and broadcasting, professor, Dr.Sci. (Tech.); email@example.com
- K.A. Miller, MTUCI, department of television and broadcasting, senior lecturer; firstname.lastname@example.org
- E.S. Epifanova, FSUE TTC Ostankino, engineer, undergraduate; email@example.com
Keywords: deep localization, online media.
The necessity of approaching the perception of information transmitted through mass infocommunication systems from the source to the user («from air to air» and «from light to light» at the same time) to the perception generated by the source-object of transmission is shown.
REQUIREMENTS FOR THE OPERATION OF SATELLITE EARTH STATIONS AND SFN NETWORK TRANSMITTERS IN RUSSIA
V.L. Karyakin, Povolzhskiy State University of Telecommunications and Informatics, department of radio-electronic systems, professor, IEEE Full Member, Dr.Sci.(Tech.); firstname.lastname@example.org
Keywords: network transmitters, satellite earth stations, DVB-T2 standard, requirements actualization, operation, certification, quality monitoring, SFN networks.
The analysis of technical requirements for single-frequency networks DVB-T2 equipment is carried out based on a comparison of European and Russian standards, taking into account scientific and technical research results. This analysis allows assessing the relevance and reliability of the material set out in the standard GOST R 58 912−2020. The results of the analysis allow us to conclude that the standard cannot serve as a basis for updating the requirements for network transmitters and earth stations of satellite repeaters in single-frequency television and radio broadcasting networks, which have been in operation since the beginning of the Federal Target Program «Development of broadcasting in the Russian Federation for 2009−2018.»
UAV FLIGHT HEIGHT ESTIMATION BY AIRFIELD SURVEILLANCE RADAR FOR LOW ELEVATION ANGLES
- V.M. Nuzhdin, Moscow Aviation Institute (MAI), department 410, associate professor, Ph.D.; email@example.com
- P.V. Sokolov, MAI, leading engineer; firstname.lastname@example.org
- A.E. Ananenkov, MAI, department 410, associate professor, Ph.D.; email@example.com
Keywords: radar system, unmanned aerial vehicle, UAV, all-weather round-the-clock surveillance, height measurement for low-flight targets, radio waves multipath propagation, high spatial resolution.
The actual problem of elevation angles measuring in the airfield surveillance radar for small-sized unmanned aerial vehicles (UAVs) at elevation angles less than the radar antenna system beam width in the elevation plane is considered. It is shown that when using the radiation of the short part of the centimeter range, for most natural types of the underlying surface, there is no multipath propagation of signals. Estimates of the required delay resolution for resolving signals from the target and its antipode for various radar antenna height elevations are given. Estimates of the achievable accuracy of measuring the elevation angle detected by the UAV are presented.