scholarly journals Methods of the estimation of readiness of the telecommunication networks of organs of administration on example of the territory of Bryansk region.

2015 ◽  
Vol 2015 (2) ◽  
pp. 110-115 ◽  
Author(s):  
Фёдор Лозбинев ◽  
Fedor Lozbinev ◽  
Андрей Кобышев ◽  
Andrey Kobyshev

Approaches of estimation of the factors of stability and wholeness of telecommunications are shown. Description of algorithm of the calculation factor of readiness of object of network is brought. Analysis of factors of readiness of pathway of corporative telecommunication network on territory of Bryansk region is executed. Perspective problems are worded.


Author(s):  
Ф.Х. НАХЛИ ◽  
А.И. ПАРАМОНОВ

Анализируется фрактальная размерность (ФР) сети связи и ее использование для исследования и планирования сетей связи. Рассматривается применение метода «выращивания кластера» для оценки ФР и предлагается новый метод определения ФР сети, основанный на оценивании связности сети путем поиска кратчайших путей. Показано, что оценка ФР сети является дополнительной характеристикой, отражающей топологические свойства сети. Дается сравнительный анализ предложенного метода и «выращивания кластера». Полученные результаты позволяют выбрать метод и получить оценки ФР сети в зависимости от ее особенностей. The paper analyzes the fractal dimension of the network and its use for telecommunication networks research and planning. The analysis of the "cluster growing" method for assessing the fractal dimension is given and a new method for assessing the fractal dimensionof anetwork is proposed, based onassessing the network connectivity by finding the shortest paths. The article shows that the assessment of the fractal dimension of the network is an additional characteristic that reflects the topological properties of the network. Comparative analysis of the proposed method and "cluster growing" is given. The results obtained make it possible to select a method and obtain estimates of the fractal dimension of the network, depending on its features.



2013 ◽  
Vol 4 (3) ◽  
pp. 388-392
Author(s):  
Shanu K Rakesh ◽  
Bharat Choudhary ◽  
Rachna Sandhu

Swarm intelligence, as demonstrated by natural biological swarms, has numerous powerful properties desirable in many engineering systems, such as telecommunication. Communication network management is becoming increasingly difficult  due to the increasing size, rapidly changing topology, and complexity of communication networks. This paper describes  how biologically-inspired agents can be used to solve control problems in telecommunications. These agents, inspired by the foraging behaviour of ants, exhibit the desirable characteristics of simplicity of action and interaction. The colle ction of agents, or swarm system, deals only with local knowledge and exhibits a form of distributed control with agent communication effected through the environment. In this paper we explore the application of ant-like agents to the problem of routing in telecommunication networks.



2019 ◽  
Vol 11 (1) ◽  
pp. 145-158
Author(s):  
Luis M. Roman ◽  
Ante Salcedo ◽  
Miguel Alonso Vilchis

Purpose – In this paper we propose an iterative approach for the deployment of rural telecommunication networks. Methodology/approach/design – This approach relies heavily on the concept of locality, prioritizing small ‘cells’ with a considerable population density, and exploits the natural nesting of the distribution of rural communities, focusing in communities which are populous enough to justify the investment required to provide them with connectivity, and whose sheer size promotes the formation of ‘satellite’ communities that could be benefited from the initial investment at a marginal expense. For this approach, the concept of ‘cells’ is paramount, which are constructed iteratively based on the contour of a Voronoi tessellation centered on the community of interest. Once the focal community has been ‘connected’ with network of the previous layer, the process is repeated with less populous communities at each stage until a coverage threshold has been reached. One of the main contributions of this methodology is that it makes every calculation based on ‘street distance’ instead of Euclidean, giving a more realistic approximate of the length of the network and hence the amount of the investment. To test our results, we ran our experiments on two segregated communities in one of the most complicated terrains, due to the mountain chains, in the state of Chiapas, Mexico. Findings – The results suggest that the use of ‘street distance’ and a local approach leads to the deployment of a remarkably different network than the standard methodology would imply. Practical implications – The results of this paper might lead to a significant reduction in the costs associated with these kinds of projects and therefore make the democratization of connectivity a reality. In order to make our results reproducible, we make all our code open and publicly available on GitHub.



2014 ◽  
Vol 5 (1) ◽  
pp. 1-13
Author(s):  
Haibo Wang ◽  
Bahram Alidaee ◽  
Wei Wang ◽  
Wei Ning

Telecommunication network infrastructures both stationary and ad hoc, play an important role in maintaining the stability of society worldwide. The protection of these critical infrastructures and their supporting structures become highly challenged due to its complexity. The understanding of interdependency of these infrastructures is the essential step to protect these infrastructures from destruction and attacks. This paper presents a critical infrastructure detection model to discover the interdependency based on the theories from social networks and new telecommunication pathways while this study transforms social theory into computational constructions. The procedure and solution of protecting critical infrastructures are discussed and computational results from the proposed model are presented.



Energies ◽  
2020 ◽  
Vol 13 (23) ◽  
pp. 6370
Author(s):  
Krzysztof Przystupa ◽  
Mykola Beshley ◽  
Mykola Kaidan ◽  
Volodymyr Andrushchak ◽  
Ivan Demydov ◽  
...  

In communication networks, the volume of traffic, the number of connected devices and users continues to grow. As a result, the energy consumption generated by the communication infrastructure has become an important parameter that needs to be carefully considered and optimized both when designing the network and when operating it in real-time. In this paper, the methodology of calculation of complex parameters of energy consumption for transport telecommunication networks is proposed. Unlike the known techniques, the proposed methodology takes into account heterogeneity and multilayer networks. It also takes into account the energy consumption parameter during the downtime of the network equipment in the process of processing the service data blocks, which is quite an important task for improving the accuracy of energy consumption at the stage of implementing the energy-saving network. We also developed simulation software to estimate and manage the energy consumption of the optical transport network using the LabVIEW environment. This software tool allows telecommunication network designers to evaluate energy consumption, which allows them to choose the optimal solution for the desired projects. The use of electro-and acousto-optical devices for optical transport networks is analyzed. We recommended using electro-optical devices for optical modulators and acousto-optical devices for optical switches. The gain from using this combination of optical devices and the parameter of rij electro-optical coefficient and M2 acousto-optical quality parameter found in the paper is about 36.1% relative to the complex criterion of energy consumption.



2011 ◽  
Vol 1 (4) ◽  
Author(s):  
Xiuquan Qiao ◽  
Xiaofeng Li ◽  
Anna Fensel ◽  
Fang Su

AbstractUbiquitous convergent telecommunication and Internet networks need to deliver services and content to users in a way that is tailored to the users’ context information and preferences. Thus, there is a new challenge in the areas of accurate service description, linking dynamic service discovery and invocation, which involves the services of telecom networks and the Internet. Semantic annotation can provide advantages for precise service description, discovery and composition. However, open service interface specifications of telecommunication networks are currently still in the syntactic level. By applying semantics to Parlay-based services for telecommunication networks and the Internet, we present an OWL-S-based semantic description approach for telecommunication network services, enabled by the telecommunication service domain ontologies to address the semantic interoperability that exists. Using this approach, we have implemented the semantic telecommunication services gateway and proposed the unified service integration architecture of telecommunication and Internet networks within the semantic-web service environment. Proof-of-concept prototype and case studies demonstrate the practical feasibility of the suggested solution.



Author(s):  
Sonia Giovinazzi ◽  
Andrew Austin ◽  
Rob Ruiter ◽  
Colin Foster ◽  
Mostafa Nayyerloo ◽  
...  

This paper provides an overview on the physical and functional performance of the New Zealand telecommunication network following the 14 November 2016 Kaikōura earthquake (Mw 7.8). Firstly, the paper provides an overview of the New Zealand telecommunications infrastructure. Secondly, the paper presents preliminary information on the impacts of the Kaikōura earthquake on the telecommunication network following the format proposed by [1] for post-earthquake assessment and resilience analysis of infrastructure systems, namely: extent of earthquake-induced physical impacts on the components of the telecommunication networks, identified according to a proposed taxonomy; main observed dependency issues; identification of resilience attributes and strategies that allowed an effective and rapid reinstatement of the telecommunication service. Finally lessons learned and research needs are discussed.



2018 ◽  
pp. 12-18
Author(s):  
Vladimir Baranov ◽  
Mikhail Kotsynyak ◽  
Denis Ivanov

The main trend in recent years is the shift of emphasis from mass attacks to targeted (target) attacks, which are the actions of the enemy of a particular state or non-state structure in advance. The target attack is always built under the object of influence, being a thoughtful operation, not a simple technical action. Target cyber attack on the element of information and telecommunication network is implemented in the form of a set of activities aimed at studying the information system and software. This allows for revealing weaknesses in the structure of the information and telecommunication network. The authors develop the technique of hidden introduction and bypass of standard means of information protection, fix the infrastructure, distribute the harmful action. Under the impact of a targeted cyber attack, it is difficult to choose the methods and means of protecting the information and telecommunication network, as their resource is limited. One of the ways to resolve this contradiction is a differentiated approach to the protection of information and telecommunication network, which is to choose the most relevant for the current situation areas of protection. The article deals with the problem of targeted attacks proliferation and describes the principle of their realization. The authors also substantiate the need of working out the methodology for estimating the impact of targeted cyber attacks by the enemy on information and telecommunications networks as well as their key elements. The special attention is paid to the purpose and structure of this methodology. The authors describe the stages of targeted cyber attack and its application areas.



Telecom IT ◽  
2021 ◽  
Vol 8 (4) ◽  
pp. 1-9
Author(s):  
T. Nzinga ◽  
A. Koucheryavy

Research subject. The article is devoted to the analysis of the development of telecommunication net-works in the Republic of Angola and the prospects for their development Method. System analysis. Core results. Determination of promising areas of research in the development of communication net-works in terms of their creation in sparsely populated and hard-to-reach areas. Practical relevance. The results of the article can be used to modernize the telecommunication network of the Republic of Angola.



2020 ◽  
pp. 43-55
Author(s):  
Oleksandr Lemeshko ◽  
Yurii Hrachov ◽  
Batoul Sleiman

The article proposes a secure routing method of confidential messages in a telecommunication network by disjoint paths and its research results. The presented method of disjoint paths secure routing of confidential messages is based on the sequential solution of two optimization problems: calculating disjoint routes and secure balancing of confidential message fragments on a set of precalculated paths. An optimization model was chosen to determine the set of routes, namely, to calculate the maximum number of disjoint paths, including communication links with minimum compromise probability. Additionally, a model of fragmented transmission using a precalculated set of disjoint paths was selected according to the SPREAD mechanism and Shamir’s scheme to ensure the minimum possible probability of message compromise. The study of the proposed secure routing method on the selected network configuration for three different variants of the link compromise probabilities has been conducted. The study results confirmed the effectiveness of the proposed secure routing method and the efficiency of the underlying optimization models to determine both the set of disjoint paths and the order of secure balancing of confidential message fragments. Prospects for further research in the field of secure routing in telecommunication networks are related to considering the link compromise probabilities and other essential indicators of network security.



Sign in / Sign up

Export Citation Format

Share Document