A METHOD FOR ELIMINATING LOOPS IN A CLOCK SYNCHRONIZATION NETWORK

Author(s):  
М.В. ЛОБАСТОВА ◽  
А.Ю. МАТЮХИН ◽  
А.Е. КУЧЕРЯВЫЙ

Рассмотрены вопросы организации тактовой сетевой синхронизации (ТСС) в сетях пятого поколения. Предложен новый метод обнаружения и устранения петель в сети ТСС на основе определения компонент связности графа и анализа матрицы циклов графа сети синхронизации, оценена эффективность его использования. Основным математическим аппаратом, используемым для описания предложенного метода, является теория графов и матриц. The article discusses the issues of the organization of clock network synchronization in 5G networks. A new method of detecting and eliminating loops in a synchronization network basedondeterminingthecomponentsofthegraphconnectivity and analyzing the graph cycle matrix of a synchronization network is proposed, and the efficiency of its utilization is estimated. The main mathematical apparatus used to describe the proposed method is the theory of graphs and matrices.

Author(s):  
М.В. Лобастова ◽  
А.Ю. Матюхин

Эффективное применение цифровых систем передачи невозможно без грамотной организации тактовой син- хронизации. В статье рассмотрена одна из проблем организации тактовой сетевой синхронизации передача сигнала синхронизации с минимальным числом переприемов. Для поиска наиболее эффективного маршрута для передачи сигнала синхронизации предлагается использовать алгоритм Флойда-Уоршалла. Effective use of digital transmission systems is impossible without the competent organization of clock synchronization. The article considers one of the problems of organizing clock network synchronization, namely, the transmission of a synchronization signal with a minimum number of re-receptions. To find the most efficient route for transmitting the synchronization signal, it is proposed to use the Floyd-Warshall algorithm.


2020 ◽  
Vol 4 ◽  
pp. 83-90
Author(s):  
Andrey Kanaev ◽  
◽  
Maria Sakharova ◽  
Evgeny Oparin ◽  

This article provides a simulation model of the process of functioning and restoration of a network clock network (CNS), which is distinguished by the completeness of accounting for the states of the process of functioning of the CNS network. The key indicator of the process of functioning of the CNS network is the duration of the control cycle of the CNS network, which is understood as the time from the moment a failure occurs on the CNS network until the moment the mode of transmission of synchronization signals is restored. On the basis of the developed simulation model of the process of functioning and restoration of the CNS network, the duration of the control cycle of the CNS network is estimated depending on the time spent in individual states of the process of functioning of the TSS network and on the characteristics of individual subsystems of the CNS system. The results obtained can serve as a basis for developing sound strategies and plans for managing the CNS network.


2021 ◽  
Vol 7 (4) ◽  
pp. 31-42
Author(s):  
A. Kanaev ◽  
E. Oparin ◽  
E. Oparina

This article provides an overview of the interaction between the warring parties and the main stages of the confrontation between the organized attacker and the information security system in the implementation of an attack on the network management system of clock network synchronization. A simulation model has been developed that reflects all stages of the struggle, which allows, depending on the resources of an organized attacker and the information security system, to obtain probabilistic and temporal characteristics of the results of the confrontation. Simulation has been carried out for various scenarios of organizing an attack at all stages of the confrontation, from the overwhelming advantage of an organized malefactor to the overwhelming advantage of an information security system. The results obtained in the general case can be used by security administrators and network administrators to make adjustments to the strategy of organizing the protection of the network management system of clock network synchronization.


2019 ◽  
Vol 16 (6) ◽  
pp. 172988141988955
Author(s):  
Pavol Božek ◽  
Alexander Lozhkin

Robots with complex motion paths are very rarely designed. The main obstacle is the lack of the necessary mathematical apparatus, despite the fact that the theory was proposed by Newton. We managed to formulate a new method for obtaining linear transformation parameters. It can be used for ellipse, hyperbola, as well as for other complex flat differentiable curves. A theorem for receiving the values of a transformed curve is formulated in the general case. The theoretical algorithm and the results of experimental studies using the geometric modeling method are presented. The proposed method works for all test curves, but this does not mean that it can always be used. Separation of the characteristic equation imposes additional complexity. Additional research is necessary, but it can be applied to many mechatronic frameworks now.


2020 ◽  
pp. 52-59
Author(s):  
A. E. Semenov ◽  
R.P. Belikov

Predicting injury in any field of activity is an integral part of a broader trend: predicting working conditions. This direction is a new method and is in the process of formation. However, in comparison with the existing areas of forecasting (demographic, fundamental research, economic, etc.), there are general principles that should be used. What is common is the mathematical apparatus and the principle itself. An independent source of information for forecasting, its reliability, and places of concentration. According to most researchers, the most reliable method for predicting injuries is the mathematical method of analysis.


2021 ◽  
Vol 4 (4) ◽  
pp. 72
Author(s):  
Manjur Kolhar

5G technology is spreading extremely quickly. Many services, including Voice Over Internet Protocol (VoIP), have utilized the features of 5G technology to improve their performance. VoIP service is gradually ruling the telecommunication sector due to its various advantages (e.g., free calls). However, VoIP service wastes a substantial share of the VoIP 5G network’s bandwidth due to its lengthy packet header. For instance, the share of the packet header from bandwidth and channel time reaches 85.7% of VoIP 5G networks when using the IPv6 protocol. VoIP designers are exerting considerable efforts to solve this issue. This paper contributes to these efforts by designing a new technique named Zeroize (zero sizes). The core of the Zeroize technique is based on utilizing the unnecessary fields of the IPv6 protocol header to keep the packet payload (voice data), thereby reducing or “zeroizing” the payload of the VoIP packet. The Zeroize technique substantially reduces the expanded bandwidth of VoIP 5G networks, which is reflected in the wasted channel time. The results show that the Zeroize technique reduces the wasted bandwidth by 20% with the G.723.1 codec. Therefore, this technique successfully reduces the bandwidth and channel time of VoIP 5G networks when using the IPv6 protocol.


Author(s):  
Javaid A. Sheikh ◽  
Sakeena Akhtar ◽  
Arshid Iqbal Khan ◽  
Shabir A. Parah ◽  
G.M. Bhat ◽  
...  

2021 ◽  
Vol 1 ◽  
pp. 29-40
Author(s):  
S.V. Malygin ◽  
◽  
M.L. Schwartz ◽  

Modern high-speed telecommunication networks with time division multiplexing (TDM) based on nx64kBit/s channel switching cannot function without a high-quality network synchronization system, which is designed to ensure the reliability and stability of the formation, switching and processing of information in digital channels. The clock synchronization system is based on the transmission of the reference frequency from the primary clock to all digital equipment of the telecommunication network through the high-speed streams of transmission systems. However, in the case of distributed communication networks, the integrity of the clock synchronization system is violated, and there is a need to develop special technical solutions to ensure the provision of frequencies for all remote network elements. This article is devoted to an overview of such solutions.


Sign in / Sign up

Export Citation Format

Share Document