Компетентное мнение
Cables and Passive Equipment
I.Sidoruk
Anniversary Year of the Odeskabel’ Public Company Became Victorious In May, 2014, an awarding ceremony for CIS 2013 prize winners in the field of product and service quality took place in the CIS headquarters in Minsk. The Odeskabel’ plant is among them.
Anniversary Year of the Odeskabel’ Public Company Became Victorious In May, 2014, an awarding ceremony for CIS 2013 prize winners in the field of product and service quality took place in the CIS headquarters in Minsk. The Odeskabel’ plant is among them.
Tags: lan odeskabel’ quality качество одескабель
Wireless Communication
S.Margaryan
Wireless Network to Control Mobile Services for Public Security. Part 2 The development and operation of a new-generation data exchange wireless network is described. It is intended for automated systems of on-line dispatching control of alert mobile forces of public security. In part 1 of the article, problems that are solved by the dispatching control system, as well as its functionality, safety, and robustness against unauthorized connection and noise, are considered.
Wireless Network to Control Mobile Services for Public Security. Part 2 The development and operation of a new-generation data exchange wireless network is described. It is intended for automated systems of on-line dispatching control of alert mobile forces of public security. In part 1 of the article, problems that are solved by the dispatching control system, as well as its functionality, safety, and robustness against unauthorized connection and noise, are considered.
Tags: error correction listening unauthorized access коррекция ошибок несанкционированный доступ перехват
J.Butler
GPS/GLONASS Synchronization and Payback Increase Synchronization with GPS/GLONASS signals directly influences the financial result indices of wireless Internet providers and shortens the payback period.
Systems with GPS/GLONASS synchronization utilize the spectrum more
effectively, since they allow wireless Internet providers to
reuse frequencies within the service area.
GPS/GLONASS Synchronization and Payback Increase Synchronization with GPS/GLONASS signals directly influences the financial result indices of wireless Internet providers and shortens the payback period.
Systems with GPS/GLONASS synchronization utilize the spectrum more
effectively, since they allow wireless Internet providers to
reuse frequencies within the service area.
Tags: glonass gps payback period synchronization wireless access беспроводной доступ глонасс инвестиции синхронизация
Expert Opinion
Cloud Technologies
A.Serebryakov
Full-Proxy Architecture for a Data Center When early solutions for load balancing and application delivery appeared, there was confusion in the definition of proxy machines (and even the Full-Proxy architecture) and in the understanding of their functions. The Full-Proxy architecture is becoming more and more important today, when data centers are adapted to support the more mobile virtualized infrastructure for service implementation
Full-Proxy Architecture for a Data Center When early solutions for load balancing and application delivery appeared, there was confusion in the definition of proxy machines (and even the Full-Proxy architecture) and in the understanding of their functions. The Full-Proxy architecture is becoming more and more important today, when data centers are adapted to support the more mobile virtualized infrastructure for service implementation
Tags: data processing center full-proxy architecture load balancing архитектура full-proxy балансировка нагрузки цод
Fiber-Optics Technologies
Yu.Belov, V.Dorosh, V.Smorshchevskii
Use of Y-Splitters To Improve the Fiber-Optic Communication Line Capacity Broadband access network rapid growth in rural localities has led to the
shortage of free optical fibers there. A way out of the situation might
be the single-fiber, rather than double-fiber, operating mode
of optical transmission systems. The paper considers the feasibility
of Y-Splitters in implementing the single-fiber operating mode
and suggests a technique for determining the length of the optical fiber that
is optimal for changeover to the single-fiber mode
Use of Y-Splitters To Improve the Fiber-Optic Communication Line Capacity Broadband access network rapid growth in rural localities has led to the
shortage of free optical fibers there. A way out of the situation might
be the single-fiber, rather than double-fiber, operating mode
of optical transmission systems. The paper considers the feasibility
of Y-Splitters in implementing the single-fiber operating mode
and suggests a technique for determining the length of the optical fiber that
is optimal for changeover to the single-fiber mode
Tags: line capacity optical signal losses optical y-splitters оптические y-разветвители потери оптического сигнала пропускная способность
M.Fujimaki
Leading-Edge Optical Fiber Technologies: from Ultra Long Haul to Indoor Wiring Various optical fibers are used for a wide range of applications from submarine cable transmission to indoor wiring. It is therefore important to develop novel fibers dedicated to each of these applications. Fujikura has developed bend-insensitive fibers which have low bending losses. At a small bending radius, the bending loss of the bend-insensitive fibers is more than one order of magnitude smaller than that of a conventional single-mode fiber with a step-index profile. Fujikura leads the development of multi-core fiber. The multi-core fiber can make a breakthrough in the transmission capacity and thus has attracted much attention as a novel optical fiber for long haul optical communication
Leading-Edge Optical Fiber Technologies: from Ultra Long Haul to Indoor Wiring Various optical fibers are used for a wide range of applications from submarine cable transmission to indoor wiring. It is therefore important to develop novel fibers dedicated to each of these applications. Fujikura has developed bend-insensitive fibers which have low bending losses. At a small bending radius, the bending loss of the bend-insensitive fibers is more than one order of magnitude smaller than that of a conventional single-mode fiber with a step-index profile. Fujikura leads the development of multi-core fiber. The multi-core fiber can make a breakthrough in the transmission capacity and thus has attracted much attention as a novel optical fiber for long haul optical communication
Wired Networks
A.Alekseev, Yu.Bel’skii
Multiservice Data Transmission Network at the Novolipetsk Metallurgical Combine The advantages of deploying a multiservice data transmission system when upgrading an industrial enterprise are distinctly seen by the example of the Novolipetsk metallurgical combine. Its network constructed based on Allied Telesis solutions provides the simultaneous uninterrupted operation of several important systems of the combine. The structure of this data transmission network is considered in detail, and the solutions employed in it are described
Multiservice Data Transmission Network at the Novolipetsk Metallurgical Combine The advantages of deploying a multiservice data transmission system when upgrading an industrial enterprise are distinctly seen by the example of the Novolipetsk metallurgical combine. Its network constructed based on Allied Telesis solutions provides the simultaneous uninterrupted operation of several important systems of the combine. The structure of this data transmission network is considered in detail, and the solutions employed in it are described
M.Lobastova
Analysis of the SDH Network Synchronization System The article considers the operating principles and conditions of a network clock synchronization system, algorithms for location and elimination of closed loops in clock circuits, and methods for designing and upgrading the network. The structure of the existing network is analyzed. The mathematical description of networks is based on the graph theory.
Analysis of the SDH Network Synchronization System The article considers the operating principles and conditions of a network clock synchronization system, algorithms for location and elimination of closed loops in clock circuits, and methods for designing and upgrading the network. The structure of the existing network is analyzed. The mathematical description of networks is based on the graph theory.
Tags: graph theory network synchronization triangular matrix синхронизация сети теория графов треугольная матрица
Information security
D.Kovalev, M.Kovtsur
Procedures of Authentication and IEEE 802.11-2012 Standard Key Management This article is an overview of authentication and key management presented in IEEE 802.11-2012 standard. The authentication procedures, as well as key derivation and distribution procedures are described in detail. Particular attention is paid to the procedure, called 4-way handshake, which is used for key derivation, checking and agreement. Key hierarchy, which is formed from the generated keys, is described with detailed explanation of the calculations made by the parties during authentication process.
Procedures of Authentication and IEEE 802.11-2012 Standard Key Management This article is an overview of authentication and key management presented in IEEE 802.11-2012 standard. The authentication procedures, as well as key derivation and distribution procedures are described in detail. Particular attention is paid to the procedure, called 4-way handshake, which is used for key derivation, checking and agreement. Key hierarchy, which is formed from the generated keys, is described with detailed explanation of the calculations made by the parties during authentication process.
Tags: authentication authentication server eapol-key master-key rsna wireless local area network аутентификация беспроводные локальные сети мастер-ключ сервер аутентификации
M.Lukin
Corporate Security for Mobile Business An approach to successful in-plant implementation of the BYOD concept
is considered. This approach makes it possible to integrate personal mobile devices into the IT-infrastructure of a plant and reduces information security risks.
Basic solution steps and versions that will help to successfully
solve the problem of corporate mobility are considered.
Corporate Security for Mobile Business An approach to successful in-plant implementation of the BYOD concept
is considered. This approach makes it possible to integrate personal mobile devices into the IT-infrastructure of a plant and reduces information security risks.
Basic solution steps and versions that will help to successfully
solve the problem of corporate mobility are considered.
A. Maystrenko
CISO Forum: All Possible Ways To Protect Information В апреле 2014 года в конгресс-центре Swissotel "Красные Холмы" состоялся 7-й форум CISO, в котором приняли участие более 260 директоров по информационной безопасности из разных отраслей.
CISO Forum: All Possible Ways To Protect Information В апреле 2014 года в конгресс-центре Swissotel "Красные Холмы" состоялся 7-й форум CISO, в котором приняли участие более 260 директоров по информационной безопасности из разных отраслей.
Конференции, выставки, семинары
Network Equipment
V.Babaev
Milesight Cubic IP-Camera with SIP Support A new IP camera from Milesight Co. with SIP support allows video calls by singly pressing an alarm button and also wired and wireless connection to IP networks depending on the model.
Milesight Cubic IP-Camera with SIP Support A new IP camera from Milesight Co. with SIP support allows video calls by singly pressing an alarm button and also wired and wireless connection to IP networks depending on the model.
Tags: cmos array pir sip wi-fi матрица cmos
Business and Right
A. Galkin
Topical Issues in Communication Network Design The author covers problems and legal complications encountered in designing and putting into operation the objects of capital construction (such as antenna-mast and line cable structures) and communication facilities that are not the objects of capital construction. Law change proposals put forward in this article are expected to avoid these problems
Topical Issues in Communication Network Design The author covers problems and legal complications encountered in designing and putting into operation the objects of capital construction (such as antenna-mast and line cable structures) and communication facilities that are not the objects of capital construction. Law change proposals put forward in this article are expected to avoid these problems