МЫ КОНЦЕНТРИРУЕМ УСИЛИЯ НА ДОСТИЖЕНИИ МАКСИМАЛЬНОГО ПОКРЫТИЯ ТЕРРИТОРИИ РЕГИОНА УСЛУГАМИ ШПД
Рассказывает заместитель министра государственного управления, информационных технологий и связи Московской области В.Г.Метелев
ТЕХНОЛОГИЯ ПАССИВНЫХ ОПТИЧЕСКИХ ЛОКАЛЬНЫХ СЕТЕЙ
Структурированные кабельные системы нормируются стандартами, а их широкое распространение во многом было обеспечено благодаря минимизации количества
ПРОВОДНОЙ ШПД: ЗАКАТ ПОСЛЕ РАССВЕТА?
Каких-то двадцать лет назад участники рынка широкополосного доступа B2C мечтали об оптике хотя бы до дома, а сам рынок развивался преимущественно там, где были самые большие деньги – то есть в B2B
ПРОГРАММНО ОПРЕДЕЛЯЕМЫЕ СЕТИ ДОСТУПА
SEBA (SDN Enabled Broadband Access – программно определяемый ШПД) – перспективное направление развития сетей фиксированного доступа, которое

sitemap
Наш сайт использует cookies. Продолжая просмотр, вы даёте согласие на обработку персональных данных и соглашаетесь с нашей Политикой Конфиденциальности
Согласен
Search:

Sign in
Last Mile
Editorial policy
Articles annotations
For authors
For reviewers
Publisher
TECHNOSPHERA
TS_pub
technospheramag
technospheramag
ТЕХНОСФЕРА_РИЦ
© 2001-2025
JSC "TECHNOSPHERA".
All rights reserved.
Phone +7 (495) 234-0110
Оферта

Яндекс.Метрика
R&W
 
 
Sign in:

Your e-mail:
Password:
 
Create your account
Forgot your password?
FOR AUTHORS:

Instruction to authors
FOR REVIEWERS:

Книги по связи
Другие серии книг:
Мир связи
Библиотека Института стратегий развития
Мир квантовых технологий
Мир математики
Мир физики и техники
Мир биологии и медицины
Мир химии
Мир наук о Земле
Мир материалов и технологий
Мир электроники
Мир программирования
Мир строительства
Мир цифровой обработки
Мир экономики
Мир дизайна
Мир увлечений
Мир робототехники и мехатроники
Для кофейников
Мир радиоэлектроники
Библиотечка «КВАНТ»
Умный дом
Мировые бренды
Вне серий
Библиотека климатехника
Мир транспорта
Мир фотоники
Мир станкостроения
Мир метрологии
Мир энергетики
Книги, изданные при поддержке РФФИ
Content & Annotations of Issue #1/2020
Executive Opinion
News
Exhibitions and Conferences
L.Pavlova, S.Popov
CSTB‘2020: PAY TV IN AN ERA OF MARKET SATURATION
At the 22nd CSTB exhibition and forum held in late January in the Crocus Expo International Exhibition Center. Telecom & Media‘2020 continued the trend of media dominance relative to telecom.
Network Infrastructure
V.Netes
ABOUT BEAUTY, TECHNICAL PERFECTION AND SWITCHING METHODS
The expediency of using methods of packet switching and circuit switching in telecommunication networks is discussed, as well as the criteria used for their evaluation. In particular, their effectiveness for different types of traffic and security are considered. The paper also traces the evolution of switching methods and explains the reasons for the emergence and widespread use of the All-over-IP concept.
D.Terentyev
ELECTROMAGNETIC PROTECTION OF EQUIPMENT PORTS WITH 100 / 1000BASE-T INTERFACES. Part 1.
The article is a continuation of the series of publications “Accidents at communication facilities. The reason is dangerous electromagnetic influences ”and summarizes the experience in the development and operation of equipment (and protection devices for it) for wired and wireless broadband access, IP video surveillance systems using Ethernet interfaces and operating in the presence of electromagnetic interference.
Cables and passive equipment
A.Semenov
TECHNOLOGY OF PASSIVE OPTICAL LOCAL AREA NETWORKS
Considered are the main features, advantages and disadvantages of passive optical networks. It is shown that this technology is a natural development and a successful way to use the well-known advantages of fiber-optic technology at the lower levels of information systems, where it can potentially compete with classical twisted pair solutions. The greatest benefits are achieved in networks with a centralized architecture.
Wired Communication
A.Golyshko, V.Shub
WIRED BBA: SUNSET AFTER DAWN?
Some twenty years ago, B2C broadband market participants dreamed of optics at least at home, and the market itself developed mainly where there was the biggest money - that is, in B2B. Wireless access with the first IEEE 802.11 networks was not yet a competitor to anyone, and data transmission over GSM networks was not even a “dial-up” telephone access.
Tags:   5g   broadband access   fmc   fttb   gpon   ptt   шпд
S.Popov
SOFTWARE DEFINED ACCESS NETWORKS
At the end of last autumn, IskraUralTEL first presented Iskratel solutions in the field of software-defined broadband access to the Russian professional audience.
E.Bogdanova
OPTICAL ROUTE IN THE TRANSPORT IMT-2020 / 5G NETWORK
The issues of routing in the IMT-2020 / 5G transport network, as well as the hardware and software complex of equipment for the Backhaul segment and requirements for it are considered. Taking into account the need to form end-to-end connections in the 5G network, a method is proposed for constructing the optimal route at the optical level with a two-parameter metric and weighting coefficients for each parameter, which can be determined by the 5G scenario. The most important characteristics of the IMT-2020 / 5G network are recommended as criteria: delay and optical signal-to-noise ratio (OSNR).
Cables & Passive Equipment
V.Andreev, A.Bulkhin, B.Popov, V.Popov
QUALITY OF LAN CABLES - THE BASIS FOR RELIABLE WORK OF SCS AND BBA NETWORKS
The quality of LAN cables is largely determined by the uniformity of the insulated copper core. The estimation of the working capacity of the twisted pair, which is taken as the main parameter in the system of automatic regulation of the linear capacity and the diameter of the insulated core was discussed. Practical recommendations are formulated to ensure high uniformity of cables when insulating a copper core.
Power Supply
MONITORED MANAGED SOCKET UNITS AND REM CONTROLLER
New controlled outlet blocks with monitoring of the Rem brand are designed to control equipment, fire and security alarms, maintain microclimate, distribute power in telecommunication cabinets, server rooms and data centers.
Security
E. Ryapolova, M.Studyannikova, A. Presnov
CALCULATION OF THE RISK OF IMPLEMENTATION OF THREATS TO THE CONFIDENTIAL DOCUMENTATION SYSTEM
The article presents an analysis of the statistical data of the InfoWatch analytical center on the research problem, presents a calculation of the level of security of the confidential document management subsystem based on cryptographic security tools, calculates the probability of vulnerabilities, the probability of threats, and presents a risk assessment.
Chapters of History
Разработка: студия Green Art