Vol 6, No 2 (2020)
View or download the full issue
PDF (Russian)
RADIO ENGINEERING AND COMMUNICATION
6-18 1802
Abstract
The analysis of frequency bands allocated among radio services in the Table of frequency allocations reveals that every band is utilized by several different radio services. The sharing of frequency bands by radio services requires that electromagnetic compatibility of the radio electronic equipment belonging to these services shouldbe ensured. Currently there is a rapid development of land mobile radio communication systems. There are concidered the basic parameters of radio transmitters and radio receivers belonging to ATP systems, which are necessary for the electromagnetic compatibility analyzing of such systems between themselves and with other systems sharing a certain frequency band. We can observe ways of using some characteristics.
19-29 1846
Abstract
The physical features of ultra-wideband signals are considered. The well-known technical solutions for synchronizing signals during their accumulation are analyzed. The necessity of randomizing the temporal parameters of the following pulse their accumulation is substantiated. The main steps of the technique are described that allow the simultaneous solution of the problem of detecting sequential signals by accumulating them on the receiving side and synchronizing them. An assessment of the computational complexity of the technique is presented and recommendations for its practical application are given.
30-38 2073
Abstract
In CDMA radio access systems, amplitude distortions in a nonlinear amplifier (NA) of a group signal lead to bit errors at the outputs of subscriber channels. To assess the permissible distortion limits and their influence on the transmission quality of subscriber signals, an electronic model of the amplitude characteristic (AC) and analytical relations are needed that relate the probability of an error when registering the output signal of the communication channel with the nonlinearity of the AC NA and other destabilizing factors. The article compares alternative mathematical models of AC NA. In contrast to traditional methods of analysis, usually limited to the choice of models with fixed parameters, a method for variably determining the parameters of AC is considered. The results are: a comparison of known methods for approximating the AC of broadband nonlinear power amplifiers of radio signals is given, an algorithm for selecting model parameters for CDMA systems with QAM using the Rapp model is proposed.
39-44 1847
Abstract
In this paper, we consider the the possibility of constructing a long-range communication link using a broadband low-element cylindrical antenna array based on Vivaldi antennas in 10 GHz band. A comparative analysis of the choice of emitters, optimization of the system according to the ratio of the number of elements and gain, and the assessment of overall characteristics are carried out. It is shown that the use of low-element cylindrical array allows one to obtain a compact antenna system with a gain of 13-16 dB, which allows one to construct a long-range communication channel.
45-59 2078
Abstract
The improved routing and signaling functions of PNNI protocol is presents in the paper. The improved this function of PNNI protocol are to use topological network redundancy and create backup paths. This improved PNNI provides high network stability, if the network topology changes rapidly.
60-78 4294
Abstract
Currently, the use of aviation systems with unmanned aerial vehicles (UAVs) of various classes and special purposes has gained particular relevance and practical importance in the interests of both special customers and civilians. Modern UAVs are used both individually and as part of a group, they can carry several target loads on board simultaneously, they are built on various physical principles: a multifunctional optoelectronic system, a digital aerial system, an airborne radar station, a radio and electronic reconnaissance system, and a system communications for transmitting data from target loads (sensors) to a mobile device (for example, a tablet) to a remote subscriber, etc. However, the question of determining the effectiveness of solving both individual UAV targets and finding an integrated assessment of the effectiveness of using aviation complexes with UAVs when solving a set of targets (sequentially or sequentially-in parallel in time) taking into account their priority and a number of other factors. This article structurally consists of three parts. In the first part, we can observe a scientific and methodological approach to determining the effectiveness of solving particular communication targets and remote monitoring by a complex with UAVs according to the probability of their solution is developed. In the framework of this approach, a mathematical apparatus has been developed for the functional dependence of the probabilities of solving particular target problems with the design parameters of target loads as part of the UAV, taking into account the peculiarities of its functioning and under the conditions of existing limitations and assumptions. The scientific and methodological approach allows already at the stage of the formation of the tactical and technical task for the complex with UAVs to obtain, using the calculation method, quantitative estimates of the probabilities of solving particular targets taking into account the technical backlog of industrial enterprises for key components of the complex (target loads, communications equipment complex, etc.). The methodological apparatus developed in the article is universal and invariant with respect to input parameters, i.e., the number of tasks to be solved, the stages of operation of the complex with UAVs, and can be easily adapted to new conditions of use. It should be noted that the result of the article is the methodological apparatus for finding exactly the integral estimate. Finding performance assessments for the group use of UAVs, as well as taking into account possible countermeasures, is beyond the scope of this article and is a direction of further research on this topic.
79-86 2279
Abstract
The evolution of the Internet of Things application dictates new, more stringent requirements for the speed of transmission and processing of information. To reduce latency, peripheral multi-service access computing is gaining in popularity. This approach allows users to process data closer to their location. However, such solutions may not take into account the specifics of applications based on peer-to-peer user requests (P2P). Subject of study. The article explores the processing time of P2P requests in mobile networks. Method. The applied methodology includes methods of mathematical and simulation modeling. The main results. The results of the work allow us to conclude that the peripheral computing of multiservice access in their standard architectural design is insufficient. At the same time, the developed solution based on a multilevel architecture with multicast routing provides significantly lower query processing time. Practical significance. The solution proposed by the authors is able to ensure the operability of applications requiring minimal network latency, such as medical applications, unmanned vehicles, search for various service providers with reference to geographical coordinates.
87-102 2207
Abstract
This work completes a series of studies evaluating positioning accuracy of radiation sources using the differential-range and / or goniometric method for the spatial scenario. A complex of models and methods is proposed for estimating the limits of positioning accuracy by the metric of the scattering ellipsoid of the lower Cramer - Rao boundary and circular spherical deviation in 3D. Based on the developed tools, a quantitative and qualitative analysis of positioning scenarios in superdense 5G radio networks was performed. The assessments made it possible to verify the requirements of 3GPP specifications for the accuracy and reliability of geolocation applications and services in the promising 5G ecosystem.
INFORMATICS, COMPUTER ENGINEERING AND MANAGEMENT
104-112 2076
Abstract
This article shows us the study results of a method for identifying the processor architecture of an executable code based on machine learning. In the second part of the series of articles, a three-stage scheme of the method and the corresponding software are synthesized. The functional and information layer of the architecture of the tool, as well as its operation modes, are described. Basic testing of the tool is carried out and the results of its work are given. By the example of identification of files with machine code of various architectures, the efficiency of the proposed method and means is substantiated.
113-120 2055
Abstract
An approach to predicting the development of attacks on network resources using distributed attacking tools is presented. Distinctive features of attack scenarios are shown. A model of the functioning of a network with distributed attacking elements is described. It is shown that dynamics modeling using the entropy approach to stability assessment does not make it possible to identify the presence of an attack. A method for detecting a focal point carrying out an attack is proposed.
ISSN 1813-324X (Print)
ISSN 2712-8830 (Online)
ISSN 2712-8830 (Online)