CORRECTLY PLANNING OF DRM BROADCASTING NETWORKS
O.V. Varlamov, Moscow Technical University of Communications and Informatics, senior staff scientist, Ph.D.; firstname.lastname@example.org.
The main questions of correct DRM network planning on LW and MW bands for daylight hours are considered. The reference point for the seasonal variations of the ground wave field strength was defined.
Defined maximum expected atmospheric radio noise field strength in different regions. In most parts of Russian Federation, they do not exceed the intrinsic noise of the receiver. For the calculation of the coverage area of the DRM system proposed to use ground-wave propagation curves, transformed to SNR curves, taking into account the atmospheric radio noise field strength the in the estimated region. It is shown that despite the increase in atmospheric noise field strength with decreasing frequency, the use of lower frequencies provides a substantially larger radius of coverage area.
A comparison of coverage areas in the AM and DRM modes are given.
The given examples of calculations are confirmed by experimental measurements.
Using DRM digital broadcasting on LW band can provide the most economical coverage of large areas with low population density, especially in the northern regions of Russia.
Key words: digital broadcasting, DRM, radio noise, field strength variation, coverage area, experimental measurements.
ECONOMIC AND LEGAL ISSUES OF RADIO-FREQUENCY SPECTRUM’S USE IN THE RUSSIAN FEDERATION
E.E. Volodina, Moscow Technical University of Communications and Informatics, Department «Economy of Communication», Professor, Ph.D.; evolodinaHYPERLINK «mailto:email@example.com"@HYPERLINK «mailto:firstname.lastname@example.org"listHYPERLINK «mailto:email@example.com».HYPERLINK «mailto:firstname.lastname@example.org"ru
E.E. Devyatkin, FSUE NIIR, Head of Laboratory, Ph. D; edevyatkinHYPERLINK «mailto:email@example.com"@HYPERLINK «mailto:firstname.lastname@example.org"niirHYPERLINK «mailto:email@example.com».HYPERLINK «mailto:firstname.lastname@example.org"ru.;
S.V. Yushkov, lawyer; email@example.com
The article considersthe possibility ofputting the right to use radio frequency spectrum into civil circulation. Sufficient experience of other countries in this field as well as the existing native judicial practices allow to affirm the necessity to focus on the development of legal regime for the spectrum use meeting the demands of economic development of the country.
The article analyses the particularities of the legal regime for frequency spectrum, such as: the object of legal regime, defining the legal status of legal persons, defining the complex of regulatory, protective and procedural means. And developed proposals for updating the licensed activity.
Key words: radio frequency spectrum, natural resource, act of legislation, legal regime, civil turnover, right of use.
REQUIREMENTS TO A RADIO-FREQUENCY SPECTRUM OCCUPANCY EVALUATION
V.A. Kozmin, «IRCOS» JSC, director for scientific works, docent, phD; firstname.lastname@example.org
A.P. Pavlyuk, «IRCOS» JSC, consultant s.r.f., phD; alexander. email@example.com
A.B. Tokarev, «IRCOS» JSC, section chief, docent, phD; TokarevAB@ircoc.vrn.ru
The article deals with problems arising during measurements of a radio-frequency spectrum occupancy in traditional conditions when requirements to accuracy of occupancy estimations are established in the form of limiting of maximum permissible relative or absolute errors. It is shown that for achieving of a reasonable compromise between equipment expenses and quality of obtained estimations, «floating» demands to errors should be imposed assuming that with increasing of an occupancy relative error will be more rigorous while allowing an insignificant increase of an absolute error of the evaluation. It is shown that at the lack of availability of a priori data on occupancy of analyzed channels, at a choice of an equipment operation mode it is necessary to be guided by obtaining of minimum 600 samples during integration interval of data accumulation for channels with lengthy signals, and not less than 1800 samples for radio channels with pulse signals.
Key words: radio-frequency spectrum, occupancy evaluation, measurement error.
THE LEVEL OF RISK SECURITY THREATS FRAUD IN A VoIP NETWORK USING SIP
V.A. Matweev, Bauman University (BMSTU), Head of Scientific-Technical Complex Faculty «Informatics and control systems», Head of department «Information Security», professor, Dr.Sci. (Tech.); firstname.lastname@example.org
A.M. Morozov, Moscow branch of «Rostelecom», Leading Engineer of the Network of Regional network control center; email@example.com
R.A. Belfer, Bauman University (BMSTU), Senior Researcher, Ph. D; a. firstname.lastname@example.org
Knowledge of the level of risk of threats to information security allows for the design, testing and operation of the network to make decisions to improve its information security by increasing protection against threats to which corresponds to the highest level of risk. This paper analyzes the mathematical model of evaluation threat levels adopted for multiple networks. The analysis is performed on the basis of ETSI, works domestic and foreign experts. All models are divided into those that are constructed using pre- calculate the risk of information security threats and without it. The possibility of using two of these models to assess the level of information security threats of fraud in the SIP signaling system for transmitting voice and data over IP.
Keywords: information security, fraud, threat, fuzzy set, risk, risk level of threat, protocol SIP (Session Initialization Protocol), likelihood of occurrence, impact, Universal Personal Telecommunication (UPТ).
OPTIMIZATION OF 6A CATEGORY’S SCS-CABLES' CONSTRUCTION
O.G. Patric, The Bonch-Bruevich Saint Petersburg State University of Telecommunications, department Photonica and Lines of Communication, professor, Ph. D; oleg. email@example.com
M.Y. Sverchkova, «Giprospetsgaz» JSC, engineer; firstname.lastname@example.org
Reaching high speed of transmission of information in Date Centre is possible by application unshielded cables SCS of the 6A category. Optimal construction of cable application get permission decrease expense of copper and price of cable
Key words: Date Center, unshielded cable, optimization.
ON THE APPLICABILITY OF RISK MANAGEMENT TECHNIQUES TO PROCESSES OF AUTHENTICATION FOR REMOTE ELECTRONIC INTERACTION
A.G. Sabanov, Aladdin R.D., Deputy CEO, Bauman University (BMSTU), associate professor of, Ph.D.; email@example.com
Modified risk management techniques are analyzed for applicability to processes of authentication for remote electronic interaction. Analysis of possible dangerous events and economic analysis of threats elimination by implementation of information security systems are shown to be most applicable for authentication risk management.
Keywords: method, authentication, information security, multilevel analysis, risk control, remote electronic interaction.
ORGANIZATION OF MANAGEMENT SYSTEM SMALL CELL CLASS PICOCELLS AND FEMTOCELLS IN LTE NETWORKS
O.L. Smirnov, JSC «IAS», Chairman of the Board of Directors, Department 609 MAI, professor Dr.Sci. (Tech.); firstname.lastname@example.org
Y.A. Kerzhencev, OJSC «Intellect Telecom». Deputy Director of strategic development Department; email@example.com
E.A. Bashev, OJSC «Intellect Telecom», Project Director; firstname.lastname@example.org
Management Network (TMN), Local Area BS, Home BS, Small cell, management of Small cell, Self-Organizing Networks (SON), self-configuration, self-optimizing, self-healing.
Some development aspects of management systems for LTE mobile networks with Small Cells (Pico & Femto) have been examined in the article. The findings and recommendations are based on the analysis of Small Cell Forum materials and the latest 3GPP Small Cell-related recommendations. General architecture of operation support systems for LTE mobile network and functional requirements for subsystems are described. Self-Organizing Networks (SON) approach of operational costs reduction has been noticed. Self-configuration, self-optimizing and self-healing functions are in the scope.
Key words: cellular communication network, Long Term Evolution (LTE), Telecommunications.
MONETIZATION OF LTE NETWORKS BASED ON M2M SERVICES
V.О. Tikhvinskiy, «Icominvest» LLC, Deputy CEO on Innovation Technologies, professor, Dr.Sci. (Econ.); email@example.com
G.S. Bochechka,"Icominvest" LLC, Head of Innovation Center Department, Ph.D.; g. firstname.lastname@example.org
A.V. Minov, «Icominvest» LLC, Deputy CEO; a. email@example.com
Needs of investments return on infrastructure of LTE networks forces operators to seek new markets and new ways of LTE services monetization. Perspective direction of services monetization for mobile operators in the coming years would be market of M2M (machine-to-machine) services. It is expected that by 2022 the number of M2M devices in mobile networks will increase by more than 8 times and reach 2.6 billion connections. The article has considered the market prospects of M2M services, technological capabilities and benefits of LTE networks to provide M2M services, as well as M2M traffic tariffication issues.
Keywords: monetization, LTE, M2M, tariffication, traffic models.