<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Determination of the Range of the Guaranteed Radio Communication in Wireless Telecommunication Networks of IEEE 802.11 Standard with the Use of Ping Program</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Irina A. Gudkova</string-name>
          <email>gudkova_ia@rudn.university</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oksana N. Romashkova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vyacheslav E. Samoylov</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Applied Informatics Moscow City University (MCU) 4/1</institution>
          ,
          <addr-line>2nd Selskokhozyajstvennyj passage, Moscow, 129226</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Applied Probability and Informatics Peoples' Friendship University of Russia (RUDN University)</institution>
          <addr-line>6 Miklukho-Maklaya st., Moscow, 117198, Russian Federation</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Department of Automatic Equipment, Telemechanics and communication on railway transport Russian University of transport (MIIT) 9/9</institution>
          ,
          <addr-line>Obraztsova str., Moscow, Russian Federation, 127994</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <fpage>54</fpage>
      <lpage>59</lpage>
      <abstract>
        <p>The article discusses the data transmission quality in wireless telecommunication networks developed according to IEEE 802.11 standard, which are important for design, installation and further operation of the networks. In particular, attention is paid to determining the range of guaranteed radio communication and the probability of packet loss. It is proposed to use the ping program as a method of determining the range of guaranteed radio communication and the probability of packet loss for IEEE 802.11 standard routers. The program allows to approximate the conditions of data transmission to real conditions, and, working for a long period of time, allows to determine the probability of packet loss. One of the advantages of the method proposed in the article is its availability in use, as no special equipment is required. In addition, the article presents the results of comparison of the quality of data transmission evaluation obtained by the proposed method with the data of technical documentation for equipment. This fact confirms the adequacy and accuracy of the proposed method. During the testing of the equipment, information about the number of sent, received and lost packets in the radio channel under study will be obtained, in addition, the average value of the delay in the transmission of data over the channel will be determined. The scope of application of the considered method for determining the range of guaranteed radio communication in wireless telecommunication networks of IEEE 802.11 standard is also proposed. An example of using the method is building a network coverage map or creating a database with the technical characteristics necessary for the design of local telecommunication networks with wireless access.</p>
      </abstract>
      <kwd-group>
        <kwd>and phrases</kwd>
        <kwd>the range of guaranteed radio communication</kwd>
        <kwd>wireless telecommunication networks</kwd>
        <kwd>the probability of losing packets</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Copyright © 2018 for the individual papers by the papers’ authors. Copying permitted for private and
academic purposes. This volume is published and copyrighted by its editors.</p>
      <p>In: K. E. Samouylov, L. A. Sevastianov, D. S. Kulyabov (eds.): Selected Papers of the VIII Conference
“Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems”,
Moscow, Russia, 20-Apr-2018, published at http://ceur-ws.org</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        It is often necessary to test the technique to determine the quality of network access
services at a distance from the access point at the process of designing and operating
IEEE 802.11 wireless LAN networks [
        <xref ref-type="bibr" rid="ref4 ref5">1–5</xref>
        ]. Testing of a wireless router can be either
preliminary (on a laboratory stand) or current (during network operation) [
        <xref ref-type="bibr" rid="ref4 ref5 ref6 ref7 ref8 ref9">4–9</xref>
        ]. In both
cases the most simple and quick solution is to use the built-in Windows ping utility.
      </p>
    </sec>
    <sec id="sec-3">
      <title>2. The concept of guaranteed radio communication area for modern telecommunication networks with wireless access IEEE 802.11 standard</title>
      <p>
        In the process of designing a new local telecommunication network with wireless
access, an important issue is the exact location of wireless access points, since the quality
of services provided by the network and the speed of the handler process depends on
the fact whether the location of the wi-fi point is chosen correctly. This question is
particularly relevant in the case of building a local wireless telecommunications network
with a given speech transmission quality [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref6">6, 10–17</xref>
        ]. In order to find the answer to
these questions it is necessary to know the exact value of the range of the guaranteed
radiocommunication of the equipment.
      </p>
      <p>First of all, it is necessary to introduce the concept of guaranteed radio communication
for IEEE 802.11 standard modern telecommunications networks with wireless access. It
is well known, that multitrafic is passed in modern IP networks, which is usually "split"
for video trafic, voice trafic and data transmission. Therefore, the area of guaranteed
radio communication is limited to a line, each point of which is far away from the
base station, and at the same time it meets the minimum required transmission quality
requirements for all types of trafic. The requirements for the quality of transmission
over communication channels for each type of trafic have their own characteristics.
Accordingly, the area of guaranteed radio communication is limited to the most stringent
requirements applicable to one of the three types of trafic. The most sensitive of these
types of trafic is voice trafic, so we use the requirements for speech transmission over
IP networks as a requirement to limit the area of guaranteed radio communication.</p>
      <p>
        There are two methods, most common for assessing the quality of speech transmission
in modern packet telecommunication networks: the method of subjective assessment
of the quality of speech transmission MOS (Mean Opinion Score) and E-model. We
would like to draw attention to the method of objective assessment of speech quality –
E-model. This method is governed by ITU-t G. 107 recommendation. The E-model is a
common model for assessing the quality of speech transmission in networks. The main
task of the method is to find the values of the parameter called R-factor. R-factor is
an integral index of speech transmission, calculated by the specified parameters of the
speech path, taking into account its configuration [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
      </p>
      <p>
        The method of calculation of the R-factor takes into account the following features
of speech:
1. the appearance of speech packets loss in the transmission of speech in the network
with packet switching, due to the increase in the transmission delay time;
2. use of codecs of diferent types in the network. The use of low-speed codecs, such
as G723, G729, etc., can result in packet loss and transmission delays. The use
of low-speed codecs allows you to increase the bandwidth of the network, but
it significantly reduces the quality of the voice signal compared to the case of
high-speed codecs, such as G. 711, G. 726-32, etc.
3. speech transmission between two subscribers or group call support;
4. the use of voice activity detectors VAD (Voice Activity Detection) in the network,
which allows to detect voice activity when a signal occurs and separate speech from
noise [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
      </p>
      <p>
        These features have a diferent efect on the signal delay time, which creates
inconvenience due to overlapping conversations and the occurrence of echo. The efect of delay
becomes critical when its value in one transmission direction exceeds 250 ms [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
      </p>
      <p>
        When calculating the R-factor, it is possible to localize the following causes and
places of delays in the formation, transmission and processing of speech packets in the
conversation: in the codec (encoder or decoder), in the receive or transmit bufer, in the
summator, in the adaptation module, in the IP network, in the switch [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. Most of the
coeficients used in the calculation are determined by tables, because they depend on the
type of codec used or the type of technology used. However, you cannot use the table
to determine the probability of packet loss in a speech path because this characteristic
depends only on the properties of the communication channel. To sum it all up, it can
be said that the boundary of guaranteed radio communication area will vary depending
on the change in the probability of packets loss at diferent points.
      </p>
    </sec>
    <sec id="sec-4">
      <title>Determination of the range of the guaranteed radio communication</title>
      <p>It is proposed to use the following scheme of testing equipment to determine the
range of the guaranteed radiocommunication using the ping program (see Fig. 1). You
need to take two laptops (one used as a server, the other as a client) and a router
supporting one of the IEEE 802.11 b/g/n wireless transmission standards.</p>
      <p>The router configuring and a wireless LAN creating are done through the web
interface of the router. In order to do this, you need to connect the router to the first
laptop using a cable with a connector of standard RJ 45, called “twisted pair”, and then
connect to the IP address of the router by default using a browser. In our case, Wi-Fi
router Asus Rt-N12 with a standard IP address by default-192.168.1.1 is used. Then
it is necessary to connect the second laptop to the created local network. In order to
do this, it is required to check the operation of the PC2 wi-fi adapter, select the local
wireless network created by the router, enter the appropriate username and password.
The exchange of packages is checked after connecting the laptop to the network.</p>
      <p>Afterwards, it is necessary to customize your ping on the first laptop: you should
open the Execute task window using the win+r shortcut, enter the cmd command,
and then open the command window. It is necessary to enter a command on the
opened command window to start the ping utility. Ping program has several diferent
parameters that afect the principle of its operation. In order to test wireless routers,
you need to bring the transmission conditions closer to the real ones. Therefore,
Ethernet packets with data must be sent to the router. Accordingly, the ping utility
must constantly form a packet size of 1 kb. In our case, this command is as follows:
ping [router ip address] –l 1000 –t. With this command we create a packet size
of 1000 bytes that will be transmitted from PC1 to PC2 and back again until we enter
the command Ctrl+C.</p>
      <p>The program runs for a long period of time, suficient to fully estimate the probability
of losing packets. After that, the program is stopped by a certain combination of keys.
In our case, the program has a suficient duration of 20 minutes. In other words, the
program must transfer 1000+ packets. At the end of the program work we will see
information about the number of the packets sent, received and lost, in addition, we will
know the average value of the delay in the transmission of data through the channel.
After the end of the program and the probability of loss of packets for this point, the
distance between the router and the receiving laptop increases. Testing is repeated
for multiple points to obtain the average probability of packet loss. It is assumed to
start with a distance of 5 m between PC1 and PC2 and increase by 5 m for a more
accurate result. In addition, a fundamental condition for this type of testing is to
perform measurements in conditions of direct radio visibility, since various obstacles
between PC1 and PC2 can lead to less accurate values.</p>
      <p>4.</p>
    </sec>
    <sec id="sec-5">
      <title>The results of a wireless LAN standard IEEE 802.11 testing</title>
      <p>The following results were obtained during the testing of the section of the
experimental telecommunications network with wireless access of IEEE 802.11 standard (see
Tab. 1).</p>
      <p>The results of a wireless LAN standard IEEE 802.11 testing</p>
      <p>Measurements were carried out at 6 diferent points at a distance between PC1 and
PC2 – 5 m, 10 m, 15 m, 20 m, 25 m and 30 m. In the following, as an example, we
present the result of one point processing using the ping program (see Fig. 2). Figure 2
shows the statistics that are generated after the test packets are transmitted. You can
see the number of packets sent, the number of packets received, the number of packets
lost, the minimum time for receiving and transmitting one test packet, the maximum
time for receiving and transmitting one test packet, and, accordingly, the average time
for one test packet receiving and transmitting.</p>
      <p>In order to generate the guaranteed radiocommunication segment parameter value
let’s carry out the averages calculation: the average latency of transfer and acceptance
transmission for 6 experiments — 332,33 ms; the average number of packets sent – 1207
PCs; the average number of packets lost for 6 experiments — 11; the percentage of
losses for 6 experiments is 0.91%.You should pay attention to the fact that the average
value of the transmission delay in one direction is 165 ms. Estimation the probability
of packet loss in the range of 1-3% and the average value of the transmission delay in
one direction within 250 ms, indicates a good quality of speech transmission over the
channel.</p>
      <p>5.</p>
    </sec>
    <sec id="sec-6">
      <title>The scope of application of the proposed method</title>
      <p>Considering the fact that the proposed method is simple and requires no special
equipment, there are other areas of potential use.</p>
      <p>
        1. The use of the proposed method makes it possible to obtain not only a zone of
guaranteed radio communication for a particular equipment, but also the correspondence
of the probability of packet loss on distance.
2. Testing a large amount of equipment for wireless access will allow you to create
a database with the technical characteristics required for the design of local
telecommunications networks with Wi-Fi access and a given speech transmission
quality [
        <xref ref-type="bibr" rid="ref4 ref5">1–5</xref>
        ].
3. The use of additional software will provide additional information about the network,
for example the use of such software as Acrylic Wi-Fi Home allows you to receive
the level of received signal in dB, which allows you to build a sheet of the real radio
network coverage, which is largely diferent from the calculated radio coverage
obtained by statistical design methods [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
4. Using this method in real conditions allows to get a picture of real radio coverage
based not on the level of transmitted signal, but on the quality of services, which
in turn carries more information load, because, for example, the construction of
networks with a specified quality of speech transmission requires the following –
the probability of packet loss does not exceed a certain value at each point of the
network [
        <xref ref-type="bibr" rid="ref15 ref16 ref17 ref18 ref19 ref20 ref6 ref7 ref8">6–8, 15–20</xref>
        ].
      </p>
      <p>In addition, the use of laptops as a server and client brings test conditions closer to the
real conditions in which computers or smartphones usually act as network subscribers.
6.</p>
    </sec>
    <sec id="sec-7">
      <title>Conclusions</title>
      <p>Summing it all up, it is necessary to mention that the method proposed in the article
is efective and adequate. The comparison of technical parameters of the router given
in technical documentation with the parameters received in the conditions of testing
can serve as the certificate of its adequacy. According to the data stated in the router
technical documentation, under the conditions of direct radio visibility, wi-fi router Asus
Rt-N12 provides data transmission to a distance of 30 m with a probability of packet loss
of 1-3%. As shown earlier at a distance of 30 m between PC1 and PC2, the probability
of packet loss does not exceed 1%. In turn, the efectiveness of the method is confirmed
by its simplicity, reliability and a wide range of possible applications.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>G. V.</given-names>
            <surname>Gorelov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. E.</given-names>
            <surname>Samoylov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Markachev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. L.</given-names>
            <surname>Popov</surname>
          </string-name>
          ,
          <article-title>Measurement of the parameters of the 2.4 GHz band radio channel with the exception of the influence of multipath propagation, Modern problems of science and education</article-title>
          ,
          <source>no. 1</source>
          (
          <issue>2015</issue>
          ), in Russian.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. E.</given-names>
            <surname>Samoylov</surname>
          </string-name>
          ,
          <article-title>To the definition of the quality of packet speech in mobile communication networks, High-Tech technologies in space exploration of the Earth 9 (3) (</article-title>
          <year>2017</year>
          )
          <fpage>39</fpage>
          -
          <lpage>44</lpage>
          , in Russian.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. V.</given-names>
            <surname>Dedova</surname>
          </string-name>
          ,
          <article-title>The survivability of wireless networks in an emergency situation</article-title>
          ,
          <source>T-Comm</source>
          <volume>8</volume>
          (
          <issue>6</issue>
          ) (
          <year>2014</year>
          )
          <fpage>40</fpage>
          -
          <lpage>43</lpage>
          , in Russian.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>G. V.</given-names>
            <surname>Gorelov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Gitnov</surname>
          </string-name>
          ,
          <article-title>Distortions of the energy spectrum of speech message using the Voice Over Wi Fi technology</article-title>
          , Telecommunications, no.
          <issue>1</issue>
          (
          <year>2011</year>
          )
          <fpage>10</fpage>
          -
          <lpage>12</lpage>
          , in Russian.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <surname>R. I. Yakovlev</surname>
          </string-name>
          ,
          <article-title>The analysis of models and methods for an assessment of survivability of infokommunication networks in the conditions of emergency situations</article-title>
          ,
          <source>T-Comm</source>
          <volume>6</volume>
          (
          <issue>7</issue>
          ) (
          <year>2012</year>
          )
          <fpage>165</fpage>
          -
          <lpage>170</lpage>
          , in Russian.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Y.</given-names>
            <surname>Orlov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zenyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Samuylov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Moltchanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gaidamaka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Samouylov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Andreev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O</given-names>
            <surname>Romashkova</surname>
          </string-name>
          .
          <article-title>Time-dependent sir modeling for D2D communications in indoor deployments</article-title>
          ,
          <source>Proceedings - 31st European Conference on Modelling and Simulation</source>
          ,
          <string-name>
            <surname>ECMS</surname>
          </string-name>
          ,
          <year>2017</year>
          ,
          <fpage>726</fpage>
          -
          <lpage>731</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>G. V.</given-names>
            <surname>Gorelov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. A.</given-names>
            <surname>Kazanskii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Lukova</surname>
          </string-name>
          ,
          <article-title>Communication quality assessment in speech packet transmission networks with random service interrupts</article-title>
          ,
          <source>Automatic Control and Computer Sciences</source>
          <volume>27</volume>
          (
          <issue>1</issue>
          ) (
          <year>1993</year>
          ) P.
          <fpage>62</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>G. V.</given-names>
            <surname>Gorelov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <article-title>Influence of russian, spanish and vietnamese speech characteristics on digital information transmission quality</article-title>
          ,
          <source>IEEE International Symposium on Industrial Electronics Proceedings of the IEEE International Symposium on Industrial Electronics, ISIE'96. Part 1 (of 2)</source>
          . sponsors: IEEE, Warsaw University of Technology. Warsaw, Poland,
          <year>1996</year>
          ,
          <fpage>311</fpage>
          -
          <lpage>313</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Drozdova</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. I. Guseva</surname>
          </string-name>
          ,
          <article-title>Modern Technologies of E-learning and its Evaluation of Eficiency, Procedia - Social and</article-title>
          <source>Behavioral Sciences</source>
          <volume>237</volume>
          (
          <year>2017</year>
          )
          <fpage>1032</fpage>
          -
          <lpage>1038</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. V. S. Kireev,
          <article-title>Development of fuzzy cognitive map for optimizing e-learning course</article-title>
          ,
          <source>Communications in Computer and Information Science</source>
          <volume>706</volume>
          (
          <year>2017</year>
          )
          <fpage>47</fpage>
          -
          <lpage>56</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>V.</given-names>
            <surname>Kireev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Silenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Guseva</surname>
          </string-name>
          ,
          <article-title>Cognitive competence of graduates, oriented to work in the knowledge management system in the state corporation “Rosatom”</article-title>
          ,
          <source>Journal of Physics: Conference Series</source>
          <volume>781</volume>
          (
          <issue>1</issue>
          ) (
          <year>2017</year>
          )
          <fpage>012060</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>A.</given-names>
            <surname>Adamu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gaidamaka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Samuylov</surname>
          </string-name>
          ,
          <article-title>Discrete Markov chain model for analyzing probability measures of P2P streaming network</article-title>
          ,
          <source>Lecture Notes in Computer Science</source>
          <volume>6869</volume>
          (
          <year>2011</year>
          )
          <fpage>428</fpage>
          -
          <lpage>439</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. V. Y. Borodakiy,
          <string-name>
            <given-names>K. E.</given-names>
            <surname>Samouylov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Gudkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. O.</given-names>
            <surname>Abaev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Buturlin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Sh. A.</given-names>
            <surname>Etezov</surname>
          </string-name>
          ,
          <article-title>Modelling a random access channel with collisions for M2M trafic in LTE networks</article-title>
          ,
          <source>Lecture Notes in Computer Science</source>
          <volume>8638</volume>
          (
          <year>2014</year>
          ) P.
          <fpage>301</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>D.</given-names>
            <surname>Danaiata</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Negovan</surname>
          </string-name>
          , L. Hurbean,
          <article-title>Accepting information technology changes in universities - A research framework</article-title>
          ,
          <source>15th International Conference on Informatics in Economy</source>
          <volume>273</volume>
          (
          <year>2016</year>
          )
          <fpage>55</fpage>
          -
          <lpage>69</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Cheskidov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. A.</given-names>
            <surname>Frolov</surname>
          </string-name>
          ,
          <article-title>Improvement of information technologies of the decision of problems of management in economic systems, Modern high technologies no</article-title>
          .
          <volume>10</volume>
          (
          <year>2017</year>
          )
          <fpage>63</fpage>
          -
          <lpage>67</lpage>
          , in Russian.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. V.</given-names>
            <surname>Gorelov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. I.</given-names>
            <surname>Osnitsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. S.</given-names>
            <surname>Trusov</surname>
          </string-name>
          ,
          <article-title>Compounding of speech communication on the recommendation of ITU-T G.711 of the International Telecommunication Union, Modern problems of science and education</article-title>
          ,
          <source>no. 1</source>
          (
          <issue>2015</issue>
          ), in Russian.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. L.</given-names>
            <surname>Popov</surname>
          </string-name>
          ,
          <article-title>Methods of ensuring survivability of mobile radio networks in emergency situations on railway transport</article-title>
          ,
          <source>Science and technology of transport, no. 3</source>
          (
          <year>2016</year>
          )
          <fpage>67</fpage>
          -
          <lpage>73</lpage>
          , in Russian.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. N.</given-names>
            <surname>Ermakova</surname>
          </string-name>
          ,
          <article-title>Improving the data flows management in the educational complex</article-title>
          , Ryazan, Vestnik of RSTU, no.
          <volume>57</volume>
          (
          <year>2016</year>
          )
          <fpage>82</fpage>
          -
          <lpage>86</lpage>
          , ISSN 1995-
          <volume>4565</volume>
          , in Russian.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. I.</given-names>
            <surname>Zykov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. L.</given-names>
            <surname>Popov</surname>
          </string-name>
          ,
          <article-title>Secure location of base stations of mobile communication network. Determination of the handover zone in cellular communication networks in emergency situations, Fires and emergencies: prevention, elimination</article-title>
          , no.
          <issue>1</issue>
          (
          <year>2017</year>
          )
          <fpage>25</fpage>
          -
          <lpage>29</lpage>
          , in Russian.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20. T. Kryshtab,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Savkina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. B.</given-names>
            <surname>Smirnov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kladkevich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Samoylov</surname>
          </string-name>
          ,
          <article-title>Multiband radiation detector based on hgcdte heterostructure, Physical Status Solidi (C) Current Topics in Solid State Physics</article-title>
          , no.
          <issue>7-9</issue>
          (
          <year>2016</year>
          )
          <fpage>639</fpage>
          -
          <lpage>642</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Recommendation ITU-T G</surname>
          </string-name>
          .107
          <article-title>- 2011 The E-model: a computational model for use in transmission planning</article-title>
          . - 18 p. [
          <source>Electronic resource].</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>