Problemi telekomunìkacìj
Latest Publications


TOTAL DOCUMENTS

36
(FIVE YEARS 7)

H-INDEX

1
(FIVE YEARS 0)

Published By Kharkiv National University Of Radioelectronics

2220-6922

2020 ◽  
pp. 43-55
Author(s):  
Oleksandr Lemeshko ◽  
Yurii Hrachov ◽  
Batoul Sleiman

The article proposes a secure routing method of confidential messages in a telecommunication network by disjoint paths and its research results. The presented method of disjoint paths secure routing of confidential messages is based on the sequential solution of two optimization problems: calculating disjoint routes and secure balancing of confidential message fragments on a set of precalculated paths. An optimization model was chosen to determine the set of routes, namely, to calculate the maximum number of disjoint paths, including communication links with minimum compromise probability. Additionally, a model of fragmented transmission using a precalculated set of disjoint paths was selected according to the SPREAD mechanism and Shamir’s scheme to ensure the minimum possible probability of message compromise. The study of the proposed secure routing method on the selected network configuration for three different variants of the link compromise probabilities has been conducted. The study results confirmed the effectiveness of the proposed secure routing method and the efficiency of the underlying optimization models to determine both the set of disjoint paths and the order of secure balancing of confidential message fragments. Prospects for further research in the field of secure routing in telecommunication networks are related to considering the link compromise probabilities and other essential indicators of network security.


2020 ◽  
pp. 68-81
Author(s):  
Oleksandra Yeremenko ◽  
Amal Mersni

The article is devoted to the Network Layer means to ensure resilience during designing an infocommunication system that can counteract faults and failures. A review of the default gateway redundancy protocols concept and analysis of recent developments to overcome fault tolerance challenges in the Software-Defined Networks (SDN) control plane are conducted. In addition, an approach to the use of default gateway redundancy protocols in the existing Software-Defined Network architecture is proposed. Therefore, within the approach, the redundancy of the virtual controller is organized based on the current protocol implemented in traditional IP networks, and the SDN switch interacts with the virtual controller. This mechanism aims to reduce the amount of circulating overhead (control traffic), and the backup controller’s organization increases the control plane’s reliability. Whereas in hybrid and hierarchical SDN networks with border routers, the GLBP mechanism can be applied, which increases the reliability of the controller connected to the data plane. In addition, there are several scenarios where the controller that manages the operation of the SDN data plane may have multiple backup controllers to switch in case of failure, or a controller pool is used to manage each network that makes up the SDN data plane. It also highlights promising future areas for research and development to improve Software-Defined Network resilience, which contributes to the emergence of new solutions. Thus, future research directions are seen in proposing mathematical flow-based models of fault-tolerant interaction of the control plane and the data plane based on redundancy. At the same time, setting the problem in an optimization form with the implementation of load balancing will help to use available network resources effectively.


2020 ◽  
pp. 32-42
Author(s):  
Maryna Yevdokymenko ◽  
Maryna Shapoval ◽  
Alla Krepko

A practical approach to load balancing in a telecommunication network (TCN) is implementing Traffic Engineering (TE) technology principles to reduce link utilization and improve QoS level. In order to adapt TE solutions with network security requirements, this paper proposes a mathematical model for secure routing, which belongs to the class of flow-based optimization solutions. The model is based on the conditions of multi-flow routing implementation, flow conservation, and TCN link overload prevention. Due to this, the problem of secure routing is formulated in an optimization form. The model’s novelty is the modified conditions of load balancing in TCN. Along with the indicators of link capacity with the help of weighting coefficients, the network security (NS) indicators of TCN elements are also taken into account. The network security (NS) indicators in the TCN modeling process include information security risks of routers and communication links, losses from breach of confidentiality and integrity of information, probability of existing vulnerabilities exploitation, etc. The study confirmed the effectiveness of the proposed solution. On the test TCN topology, it is demonstrated that the use of a secure routing model allows to calculate the routes and provide such an order of load balancing, which compromises meeting the requirements of both QoS and NS. In the routing process, information security risk reduction in packet transmission by about 11.3% was accompanied by an increase (on average by 26%) in the upper bound of the network link utilization


2020 ◽  
pp. 56-67
Author(s):  
Oleksandr Lemeshko ◽  
Anastasiia Kruhlova ◽  
Anna Zhuravlova ◽  
Valentyn Lemeshko

The paper proposes an improved mathematical model of load balancing in the infocommunication network (ICN), corresponding to the Traffic Engineering (TE) concept principles. The model mathematically formalizes the case of ICN construction when each access network is switched simultaneously to not one but to several border routers to increase fault tolerance. Therefore, it is proposed to improve the load balancing level in the ICN according to the TE criterion by ensuring the distribution of traffic at the access level between several border routers that create a default virtual gateway. The proposed mathematical model is based on the conditions of implementation of single or multipath routing; load balancing at the access level; flow conservation at the access level and the network itself; overload prevention of communication links, which act as conditions for load balancing in ICN. Within the proposed model, the load balancing task in ICN is formulated as an optimization problem of mixed-integer linear programming. The results of the study confirmed the effectiveness of the proposed solution. Ensuring coordinated load balancing at both access and core network levels, in general, has increased network performance by 25.45% compared to a solution based on multipath routing, but without access level balancing, and 2.76 times compared to the model in which load balancing in the ICN was absent. Within the available load for each of the compared models, the use of the proposed solution allowed to reduce the upper bound of the network links utilization by an average from 20% to 60%. Lowering the upper bound of the network links utilization positively affects the quantitative values of the main Quality of Service indicators – the average end-to-end delay, jitter, and packet loss probability.


2020 ◽  
pp. 3-15
Author(s):  
Yulia Koliadenko ◽  
Mykyta Chursanov ◽  
Oleksii Koliadenko

To ensure the electromagnetic compatibility of mobile networks, it is necessary to monitor and control: radio frequency resource, frequency and power of signals in the allocated frequency resource, group delay time, resistance parameters to linear attenuation and attenuation associated with multi-beam signal transmission, polarization signal parameters, location (coordinates) of moving sources. The evaluation of parameters based on the results of measurements is currently carried out based on observations, and decision-making is carried out based on sample statistics. The use of methods for measuring the parameters of network elements and communication signals against the background of thermal noise is proposed. The measurement methods are based on the recursive Robbins-Monroe algorithm for estimating such parameters as random variables and the recursive Kalman-Bussey algorithm for estimating random processes. The efficiency analysis of recursive algorithms of optimal estimation of random variables and random processes is carried out. The advantage of recursive estimation methods is that, in practice, they are more effective than statistical processing methods, as they provide real-time estimation and do not require a waste of time for accumulation and processing. In addition to noise, extraneous signals are concentrated in the spectrum with the measured signal in radio communication channels. This fact determines the problem relevance of extracting from the additive mixture of signals and interference of useful signals that come from measurements. Methods for measuring the parameters of network elements and communication signals in the conditions of external signals have been developed. The possibility of using in the meters of parameters of mobile communication networks adaptive noise compensators with adaptive reference reception channel is considered, reducing the power of extraneous signals by 20 … 30 decibels and more.


2020 ◽  
pp. 82-98
Author(s):  
Nazar Peleh ◽  
Olha Shpur ◽  
Mykhailo Klymash

The current state of information technology is to develop and implement new approaches to the computational process. Evaluating the effectiveness of cloud centers is an important challenge for research, but it is complicated by the dynamic of cloud environments and a variety of user requests. This evaluation is vital in cases where virtualization is used to provide well-defined computing resources for users. The proposed model for evaluating the effectiveness of cloud centers in a high degree of virtualization to solve this problem has been proposed. Compared to existing, it considers the ability to service requests for group requests and the distributed time of service requests. The model is based on a two-stage approximation technique. The main non-Markov process is first modeled as an embedded semi-Markov process, then modeled as an approximated Markov process but only when receiving group request flows. The technique of constructing Markov links to build the model has been used. This model provides a full probability distribution of request waiting time, response time to execute requests, and the number of requests in the system. The results show that the performance of cloud centers is highly dependent on the coefficient of variation (CoV), request service time, and the size of the group flow (i.e., the number of requests in the group flow of requests). The larger the flow rate and/or the value of the coefficient of variation of the service time of requests, the longer the response time. But this helps reduce the use of resources by cloud providers. As a result, the work shows that in the conditions of large group flow of requests and/or large value of CoV, it is possible to increase the efficiency of cloud centers by grouping requests using the criterion of homogeneity.


2020 ◽  
pp. 16-31
Author(s):  
Kostiantyn Sielіvanov ◽  
Bohdan Muliar ◽  
Yulia Koliadenko ◽  
Mykola Moskalets ◽  
Oleh Bondarenko

The paper proposes a dynamic model of multiple nonlinear electromagnetic interactions when using the radio resource of a group of radio-electronic means of the 5G-NewRadio mobile communication network. The model describes the electromagnetic environment of multiple nonlinear interactions of a group of electronic means in the state space based on n-elements of a complex system, which considers the nature of interelement connections and phase states, taking into account the intensity of its elements. The analysis of phase states of a grouping of 5G-NewRadio electronic means depending on the intensity of nonlinear interactions of its elements at which the network will function without deterioration of qualitative indicators in the conditions of optimum distribution of a radio resource is carried out. The dynamics of nonequilibrium states of groups of 5G-NewRadio mobile networks at different values of the intensity of interactions of electronic means, the cumulative nature of which is displayed by the normalized value of the signal/(interference+noise) ratio, is demonstrated. It is shown that the nonequilibrium state of the 5G-NewRadio mobile communication system occurs at a normalized value of the interaction intensity greater than 1.4. The article results show that with the help of the proposed mathematical model, which demonstrates the dynamics of multiple electromagnetic nonlinear interactions of electronic means of grouping at different parameters and the nature of the intensity of their interactions, it is possible to analyze the state of 5G-NewRadio network in the future.


2019 ◽  
Vol 0 (2(25)) ◽  
pp. 78-96
Author(s):  
Ievgeniia Kuzminykh ◽  
Maryna Fliustikova

Sign in / Sign up

Export Citation Format

Share Document