Telecom IT
Latest Publications


TOTAL DOCUMENTS

80
(FIVE YEARS 80)

H-INDEX

1
(FIVE YEARS 1)

Published By Bonch-Bruevich State University Of Telecommunications

2307-1303

Telecom IT ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 47-58
Author(s):  
S. Shterenberg ◽  
A. Moskalchuk ◽  
A. Krasov

The article demonstrates the concept of building a laboratory for penetration testing using a special pro-gram. The program is a set of scripts that configure the system in accordance with a user-defined script. Thanks to the elements of script randomization, this solution allows you to deploy several educational tasks at once to a group of students using only one virtual machine image. The basic idea is that the set-up and creation of a vulnerable target occurs just before the execution of the learning task itself. Those, the virtual machine is initially a basic Ubuntu Linux image that does not have any set of vulnerabilities. The main feature of the proposed solution is that the content of the scripts describes not one variant of the system configuration, but several at once, forming scripts with elements of randomization. In other words, having a basic Ubuntu Linux image and a set of the scripts, you can create different tasks for a dozen students.


Telecom IT ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 13-25
Author(s):  
A. Antonenko ◽  
R. Dunaytsev

High-speed access to information resources and services via the Internet is necessary for students not only at the university, but in dormitories as well. This became especially important during the COVID-19 pandemic with forced self-isolation and distance learning. Research subject. In this paper, we present the results of a performance evaluation study of Wi-Fi networks in SUT dormitories. Method. To achieve this goal, the following methods of empirical research were used: measurement, experiment, and survey. Core results. The first part of the study is devoted to the results of an online survey con-ducted among SUT students regarding the use of Wi-Fi in dormitories. In the second part of the study, experimental data on measuring the throughput of wired and wireless channels in one of the rooms of SUT dormitory “Rybatskoye” are presented. Practical relevance. The obtained results can be used for designing Wi-Fi network in student dormitories and connecting them to the Internet.


Telecom IT ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 59-78
Author(s):  
G. Fokin

In this work, a simulation model of a radio channel with fading is implemented for use in research of the multipath channel, as well as for assessing the noise immunity of transmission, recep-tion and processing systems in modern and future mobile communication and radio access networks. Formalization of mathematical models of a radio channel with fading, including the Rayleigh amplitude distribution, uniform phase distribution and a given Doppler spectrum, made it possible to visualize the time-frequency and probabilistic characteristics of a radio channel with fading. The implementation of the procedures for delaying and attenuating copies of signals in a multipath radio channel made it pos-sible to reproduce scenarios of flat and frequency selective fading, which are widely used in practice in assessing the noise immunity of signals with given frequency and time characteristics.


Telecom IT ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 79-86
Author(s):  
I. Davydovich ◽  
V. Zurakhov ◽  
I. Ushakov

This article discusses the methods of an attacker to conduct an attack on a web server and how to pro-tect against them. This methodology contains a description of the stages of preparing an attack and a description of how to protect against them. The aim of the work is to draw up such a methodology, with the help of which it is possible to prevent the majority of hacker attacks. Since Internet technologies have been developing at a rapid pace lately, and companies are moving their businesses to the Internet, the issue of information security is more urgent than ever. One of the methods to defend against mali-cious attacks is to understand the methodology for attacking a web server. Understanding how an at-tacker will act in an attack allows you to prevent it in a timely manner and, as a result, avoid conse-quences. The purpose of this work is: description of the stages that an attacker goes through during an attack on a web server and making recommendations for its protection. To understand the methods of protecting a web server from hacking, it is important to know the concept of its device, how it functions and other elements associated with it.


Telecom IT ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 1-12
Author(s):  
D. Alekseeva ◽  
A. Marochkina ◽  
A. Paramonov

Future networks bring higher communication requirements in latency, computations, data quality, etc. The attention to various challenges in the network field through the advances of Artificial Intelligence (AI), Machine Learning (ML) and Big Data analysis is growing. The subject of research in this paper is 4G mobile traffic collected during one year. The amount of data retrieved from devices and network management are motivating the trend toward learning-based approaches. The research method is to compare various ML methods for traffic prediction. In terms of ML, to find a solution for a regression problem using the ensemble models Random Forest, Boosting, Gradient Boosting, and Adaptive Boosting (AdaBoost). The comparison was based on the quality indicators RMSE, MAE, and coefficient of determi-nation. In the result Gradient Boosting showed the most accurate prediction. Using this ML model for mobile traffic optimization could improve network performance.


Telecom IT ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 26-36
Author(s):  
S. Vladimirov ◽  
A. Fomin

Research subject. The paper presents the concept of a multicast session protocol based on the net-work coding method. Method. Development of a data transfer protocol based on the analysis of existing principles and models of network coding. Core results. The proposed NCDP multicast protocol is de-signed to work over a datagram transport protocol. The basic structure of the NCDP packet header has been developed, taking into account the variability of the protocols used in conjunction with NCDP. Prac-tical relevance. The proposed protocol is intended for use in content delivery systems based on mul-ticast data transmission from several sources.


Telecom IT ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 37-46
Author(s):  
A. Paramonov ◽  
S. Bushelenkov

The article analyzes the problems of implementation access networks in high-density communication networks, proposes a method for assessing the achievable data transfer rate, taking into account the mutual influences of network nodes, as well as a method for constructing the logical structure of the network. The possibility of constructing a network model in the form of a cell structure for which the methods of percolation theory are applicable is considered. The use of these methods makes it possible to obtain a structure with specified properties, which makes it possible to ensure the required quality of network functioning


Telecom IT ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 87-98
Author(s):  
M. Kovtsur ◽  
A. Kistruga ◽  
G. Voroshnin ◽  
A. Fedorova

Nowadays, Wi-Fi technology is used everywhere in the world: in the offices of large companies, public places and in simple home premises. However, the use of a public transmission medium leads to the possibility of various attacks. This article discusses attacks such as authentication failure and Address Resolution Protocol inject. The considered attacks have shown high efficiency and danger for wireless networks. In this connection, methods of detection and protection against them were proposed. Methods. At the first stage, the concept of how attacks work, their main idea and purpose, were analyzed. At the subsequent stages, for testing, a laboratory stand was created, on which they were simulated. In the course of the experiments, the effectiveness of attacks was found out, and the main phases of attacks and the elements that contribute to their detection were graphically reflected in the article. Main results. As a result of the work done, it was possible to isolate attack vectors and identify their accompanying anomalies. Based on the research materials, mechanisms for detecting and preventing the attacks under consideration were developed. The practical part. All theoretical and experimental materials collected in the article can be used in detecting and preventing attacks on wireless networks by network administra-tors and information security specialists.


Telecom IT ◽  
2021 ◽  
Vol 8 (4) ◽  
pp. 1-9
Author(s):  
T. Nzinga ◽  
A. Koucheryavy

Research subject. The article is devoted to the analysis of the development of telecommunication net-works in the Republic of Angola and the prospects for their development Method. System analysis. Core results. Determination of promising areas of research in the development of communication net-works in terms of their creation in sparsely populated and hard-to-reach areas. Practical relevance. The results of the article can be used to modernize the telecommunication network of the Republic of Angola.


Telecom IT ◽  
2020 ◽  
Vol 8 (4) ◽  
pp. 35-59
Author(s):  
G. Fokin

In this paper, we investigate the dependence of the level of intersystem interference on the beam width of the adaptively formed antenna radiation pattern and the territorial separation of neighboring devices in ultra-dense 5G radio access networks. The results of simulation modeling of a radio access network based on 19 base stations with the parameterization of the antenna array gain by the width of the radiation pattern in the horizontal plane show that when the base station beam is di-rected to the user device and narrowed from 360° to 5°, the level of intrasystem interference decreases by 15 dB compared with the case of omnidirectional antennas. The results of simulation of a radio access network based on 19 three-sector base stations with planar antenna arrays of 64 elements illustrate a significant reduction in the level of interference in comparison with the case of omnidirectional antennas and, in order to obtain zones of a positive signal-to-noise ratio, confirm the need for a territorial separation of neighboring devices by 10–20 % of the range of radio coverage.


Sign in / Sign up

Export Citation Format

Share Document