scholarly journals Practical aspects of noise immune data transmission channel design in telecommunication networks

Author(s):  
O. G. Plyushch ◽  

Practical aspects of noise immune data transmission channel design in telecommunication networks are considered. Main accent is made on securing noise immunity and concealment of information transmission, as well as on countering its interception by the rogue elements. It is noted that satisfaction of the mentioned requirements is possible by using spectrum spreading of useful signal bits and deploying data scrambling. Design of telecommunication channel with spectrum spreading and scrambling on the base of pseudo noise coding sequences derived from primitive polynomials of the eighth and fifteenth order that possess good auto and inter correlation properties are proposed. While studying practical aspects of the telecommunication channel design, its structure is put forward that consists of frames counting 256 bits, each of which is spread by using the synthesized pseudo noise sequence. In this case, the second synthesized pseudo noise coding sequence with the length of 32768 chips is used to mark the frame duration and perform additional information scrambling. Computer simulation is employed to study performance of the designed algorithm. Simulation results proved that processing of the additive mixture of the useful signal and interferences, which surpass useful signal two times in their power, by the matched despreading filters permits to confidently determine the frame structure of the information being transmitted by finding frame beginning pulses and determining values of the useful information bits. Analysis of the results obtained during the research permits to assume that designed telecommunication channel can be successfully used while developing noise immune concealed telecommunication networks. It is proposed to carry out further research to study boundary possibilities of the designed telecommunication channel in terms of useful signal to interference ratio.

2020 ◽  
Vol 1 (9) ◽  
pp. 126-139
Author(s):  
Oleksandr Pliushch

An approach is proposed to design of noise immune and concealed data transfer channel for telecommunication networks. Attention is paid to securing hidden information transmission, as well as its protection from interception by rogue actors. The approach is based on the desired bits spectrum spreading and their additional scrambling by using pseudo noise coding sequences derived from primitive polynomials of eighth and fifteenth orders, which possess good auto and inter correlation properties. It is studied performance of the telecommunication channel that includes frames of 128 bit length, each of which is spectrally spread 256 times with the help of a synthesized pseudo noise coding sequence. The second 32768 chip-long pseudo noise coding sequence is used to mark the frame duration and perform additional information scrambling. Computer simulation is used to study performance of the designed telecommunication channel. The computer simulation helped to establish that the processing of the additive mixture of the desired signal and interfering ones, which surpass the desired signal two times in terms of power, by the matched filters permits to confidently reveal the information frame structure being transmitted by determining frame beginning pulse and establish the bit values of the desired information. Further improvement of information protection from interception is proposed to achieve by using cyclic shifts of 32768 chip-long pseudo noise coding sequence. Computer simulation helped to find out that ignorance of the cyclic shift leads to inability of information interception by the rogue elements. Research results, obtained in this paper, permit to claim that the designed telecommunication channel, with cyclic shifts according to a secret rule, could be successfully used in practical implementations of noise immune and concealed telecommunication networks.


Author(s):  
Yu. Khmelnitsky ◽  
O. Kablukov ◽  
L. Riaba ◽  
L. Solodeeva ◽  
L. Solodeeva

In the article the analysis of methods and means of ensuring the noise immunity transmission in telecommunication networks that use technologies in real time to ensure quality, valid and reliable data transmission under conditions of interference. For telecommunication networks the problem of optimal quality reception of information is to use the properties of the useful signal, interference, and transmission channel to increase the probability of correct reception. To increase the probability of correct reception needs to be pre-processed received signal that increases the signal interference. Transmission channels that use technologies that allow real-time to ensure quality, valid and reliable data transmission under conditions of interference provide better instruction indicators reliable transmission of information is carried out through the use of the necessary coding. During transmission on such channels, there are many difficulties associated with the impact of natural, industrial, intentional and unintentional interference. All methods of a noise stability in General lead to temporal and hardware redundancy as part of the source of information and of the addressee. Examine noise immunity of TCN as ability of the system to counteract to the hindrances, then it is necessary to know, what to counteract and on what to counteract, for a fight against hindrances a priori information is needed about properties of transmitter of information and about hindrances. Knowing all these properties of the signal and noise, it is possible to establish certain differences between them and use them to develop ways, means and methods to provide noise immunity. The aim of this article is realization of analysis of methods and backer-ups of interference immunity information transfer in TCNS, which will allow real-time to guarantee the quality, reliable and reliable transmission of the hindrances given in the conditions of influence. Unlike distortions hindrances carry casual character. They in are good time unknown and that is why cannot be fully removed. Knowledge of methods and facilities of construction of modern channels of transmission TCN in the conditions of action of hindrances, will allow building the reliable channels of information transfer for such networks.


Author(s):  
 M.S. MUTHANNA ◽  
A.S. MUTHANNA ◽  
 A.S. BORODIN

Achieving high Quality of Service (QoS) remains a challenge for LoRa technology. However, high QoS can be achieved via optimizing the transmission policy parameters such as bandwidth and code rate. Existing approaches do not provide an opportunity to optimize the LoRa networks' data transmission parameters. The article proposes transmission policy enforcementfor QoS-aware LoRanetworks.The QoSparameter ranking is implemented for IoT nodes where priority and nonpriority information is identified by the new field of LoRa frame structure(QRank).The optimaltransmissionpolicyenforcement uses fast deep reinforcement learning that utilizes the environmental parameters including QRank, signal quality, and signal-to-interference-plus-noise-ratio. The transmission policy is optimized for spreading factor, code rate, bandwidth, and carrier frequency. Performance evaluation is implemented using an NS3.26 LoRaWAN module. The performance is examined for various metrics such as delay and throughput. Достижение высокого качества обслуживания (QoS) по-прежнему остается достаточно сложной задачей для технологии LoRa. В принципе высокий уровень QoS может быть достигнут за счет оптимизации параметров передачи, например, пропускной способности и скорости передачи информации в сети. Известные на сегодняшний день решения не дают возможности оптимизировать параметры передачи данных для сетей LoRa. В статье предложен эффективный метод передачи данных, обеспечивающий требования по QoS при использовании технологии LoRa. Ранжирование параметров QoS для узлов интернета вещей определяется новым полем структуры фрейма LoRa (QRank) для приоритетной и неприоритетной информации. Для обеспечения эффективной передачи применяется быстрое глубокое обучение с подкреплением, для которого используются как параметры качества обслуживания, так и отношение сигнал/шум. Метод передачи оптимизирован с учетом коэффициента распространения, скорости передачи данных, полосы пропускания и несущей частоты. Оценка производительности при применении предложенного метода проведена с использованием модуля LoRaWAN в пакете имитационного моделирования NS3.26. Производительность оценивается на основе параметров задержки и пропускной способности.


2021 ◽  
pp. 63-68
Author(s):  
Daniil S. Shiryaev ◽  
Olga A. Kozyreva ◽  
Ivan S. Polukhin ◽  
Sergey A. Shcheglov ◽  
Svetlana A. Degtiareva ◽  
...  

The system of intellectual lighting data transmission via visible light is developed and manufactured. Spectral characteristics of a downlink which uses the red crystal of a RGBW light emitting diode for data transfer were studied. The DALI protocol-based radiation chromaticity control system which allows us to set different lighting scenarios with constant data transmission rate was developed. The radiation chromaticity range covers almost the entire colour gamut in the colour space. The system of high-frequency matching of system component impedances was developed and frequency characteristics of the suggested scheme were studied for development of the system. Optimal parameters of the signal for visual light communication such as carrier frequency, modulation type and band were determined. Observation of the constellation diagram which represents different values of the complex amplitude of the keyed signal in the form of a complex number on a quadrature plane (cosine and sine components of the carrying signal) and of fixation of the amplitude of the error vector magnitude (EVM) was selected as a method of study of the transmission channel quality. The value of EVM in the visible light transmission channel was significantly lower for signals with amplitude modulation than for phase-manipulated signals. When implementing different lighting change scenarios, radiation of other crystals of the light emitting diode crystals not used for transmission did not lead to increase of EVM by more than one percent.


Author(s):  
Maksim Peregudov ◽  
Anatoliy Steshkovoy

Currently, centrally reserved access to the medium in the digital radio communication networks of the IEEE 802.11 family standards is an alternative to random multiple access to the environment such as CSMA/CA and is mainly used in the transmission voice and video messages in real time. Centrally reserved access to the environment determines the scope of interest in it from attackers. However, the assessment of effectiveness of centrally reserved access to the environment under the conditions of potentially possible destructive impacts was not carried out and therefore it is impossible to assess the contribution of such impacts to the decrease in the effectiveness of such access. Also, the stage establishing of centrally reserved access to the environment was not previously taken into account. Analytical model development of centrally reserved access to the environment under the conditions of destructive influences in digital radio communication networks of the IEEE 802.11 family standards. A mathematical model of centrally reserved access to the environment has been developed, taking into account not only the stage of its functioning, but also the stage of formation under the conditions of destructive influences by the attacker. Moreover, in the model the stage of establishing centrally reserved access to the medium displays a sequential relationship of such access, synchronization elements in digital radio communication networks and random multiple access to the medium of the CSMA/CA type. It was established that collisions in the data transmission channel caused by destructive influences can eliminate centrally reserved access to the medium even at the stage of its establishment. The model is applicable in the design of digital radio communication networks of the IEEE 802.11 family of standards, the optimization of such networks of the operation, and the detection of potential destructive effects by an attacker.


Author(s):  
Valentin Dzhumkov ◽  
Georgy Maltsev

Introduction: Data transmission reliability analysis when using noise-immune coding in channels with grouping of errors (in particular, in radio channels with interference and fading of the received signals) is complicated by the need to use discrete data transmission channel models which take into account the error grouping, differing from the traditional binomial model. The complexity of the analytical description of such models leads to the fact that the quality indicators of data transmission over channels with error grouping are usually analyzed by simulation methods, and the development of analytical models of data transmission discrete channels with grouping of errors is one of the modern direction in the noise-immune coding theory development. Purpose: Finding the additive boundary of a bit error probability for data transmission discrete channel with grouping of symbol errors, described by Elliot — Hilbert model. Results: For the case of data transmission using a group noise-immune code, analytical expressions are obtained for calculating the additive boundary of a bit error probability in a discrete data transmission channel with grouping of symbol errors. The obtained expressions take into account the features of data transmission over a channel with error grouping, in particular, the fact that the probabilities of various combinations of the same number of errors are not equal to each other. Examples are presented of calculating a bit error probability for the case of using noise-immune codes which correct errors. It is shown that for any code length, the use of the Elliot — Hilbert model allows you to substantially refine the results of calculating the probabilistic indicators of the reliability of data transmission in channels with error grouping, as compared to the original binomial model. The obtained results are compared to the results of the simulation. Practical relevance: The results can be used in the design and analysis of the characteristics of data transmission systems for various purposes, operating under conditions of error grouping. Using analytical expressions to calculate the probability indicators of the reliability of data transfer allows you to abandon complex simulation modeling of transmitting data in channels with error grouping at the stage of choosing a noise-immune code and its parameters.


Author(s):  
Александр Вильямович Бабурин ◽  
Лариса Александровна Глущенко ◽  
Борис Николаевич Добряков ◽  
Григорий Александрович Остапенко ◽  
Андрей Петрович Преображенский

Цель исследования состоит в разработке методов защиты от несанкционированного доступа информации, циркулирующей в беспроводных ИК-каналах передачи данных. Показаны возможные способы несанкционированного доступа к каналу передачи данных от ИК-клавиатуры к компьютеру. Основной способ несанкционированного доступа к ИК-каналу передачи данных - это регистрация диффузно-отраженного от элементов интерьера излучения. Проведены теоретические оценки, подтверждающие возможность получения информации, циркулирующей в беспроводных ИК-каналах передачи данных при несанкционированном доступе. Рассмотрен типичный случай распространения излучения в помещении при использовании ИК-канала передачи данных при несанкционированном доступе. Неуполномоченный наблюдатель может регистрировать через оконный проем диффузно-отраженное излучение, используя специальную оптико-электронную систему. Для расчетов были приняты типовые фотометрические характеристики интерьера помещения и предельно достижимые на современном уровне техники характеристики фотоприемных устройств. Размер диаметра входного зрачка оптической системы принят не слишком большим из того соображения, что он не должен привлекать внимание (служить демаскирующим признаком). Предложен метод защиты информации, циркулирующей в беспроводных ИК-каналах передачи данных, основанный на формировании засветочных помех. Приведены схемы формирования засветочных помех. Для помехи может быть использовано диффузно-отраженной излучение или специально сформированное излучение, направленное на оконный проем помещения. The purpose of the research is to develop methods of protection against unauthorized access to information circulating in wireless infrared channels of data transmission. Possible ways of unauthorized access to the data transmission channel from the IR keyboard to the computer are shown. The main method of unauthorized access to the IR data transmission channel is the registration of radiation diffusely reflected from interior elements. Theoretical estimates have been carried out confirming the possibility of obtaining information circulating in wireless infrared channels of data transmission under unauthorized access. A typical case of propagation of radiation in room when using an IR data transmission channel with unauthorized access to information is considerd. An unauthorized observer can register diffusely reflected radiation through a window opening using a special optoelectronic system. For the calculations, the standard photometric characteristics of the interior of the room and the maximum achievable at the modern level of technology characteristics of photodetectors were taken. The size of the diameter of the entrance pupil of the optical system is taken not too large for the reason that optoelectronic system should not attract attention (serve as a unmasking feature). The method for protecting of information ciculating in optical wireless channels of data transmission, based on the formation of optical intentional noise, is proposed. It provides a brief overview of methods for generating pseudorandom sequences, wich can serv as a basis for the formation of an illumination noise channel. For optical intentional noise can be used diffusely reflected radiation or specially formed radiation, directed at the window opening of the room.


Sign in / Sign up

Export Citation Format

Share Document