Training of Mid-Level Specialists in the Telecommunications Area Based on a Trusted Technical Solution
Abstract
The current situation in the world, characterized by sanctions pressure, disruption of logistics, trade, industrial and technological connections and the deepening digitalization of society, has led to a change in the state’s strategy towards the need to quickly reduce technological dependence on foreign manufacturers and transfer the country’s telecommunications infrastructure to trusted domestic solutions. At the same time, at an accelerated pace, it is necessary to develop a system for training senior and mid-level personnel capable of thinking in the paradigm of using exclusively domestic solutions in the design and modernization of the telecommunications component of critical information infrastructure subjects.
An example of this approach is the Rosatom Laboratory for Data Communication Networks at the College of the Sirius University of Science and Technology. There, equipment from the T-COM company, part of the Fuel Division of the State Corporation, is available to students.
The D-Link Trade company, a Russian legal entity of D-Link Corporation, is a technological partner of T-COM, including D-Link Trade specialists who have developed software for switches included in the Unified Register of Russian Radio-Electronic Products. At the same time, based on the extensive experience in the educational activities of D Link Trade specialists, the T-COM company decided to create a training course “Data transmission and switching in computer networks” together with its technology partner, to support the educational process in Rosatom laboratory at Sirius University College. The content of the course reflects the current state of the telecommunications industry and allows you to train mid-level IT specialists in the design, modernization and operation of multi-service telecommunication networks of various scales and complexity based on domestic equipment - switches of the TGK-125-24/4d-M/T model.
The problems of training software developers for telecommunications equipment and the corresponding solutions of the D-Link Trade company in the field of training are considered.
References
2. Haleem A., Javaid M., Qadri M.A., Suman R. Understanding the role of digital technologies in education: A review. Sustainable Operations and Computers. 2022;3:275-285. https://doi.org/10.1016/j.susoc.2022.05.004
3. O Connor A.J. The Intelligent Organization of the Future. In: Organizing for Generative AI and the Productivity Revolution. Berkeley, CA: Apress; 2024. p. 77-89. https://doi.org/10.1007/979-8-8688-0959-0_5
4. Zamiri M., Esmaeili A. Methods and Technologies for Supporting Knowledge Sharing within Learning Communities: A Systematic Literature Review. Administrative Sciences. 2024;14(1):17. https://doi.org/10.3390/admsci14010017
5. Asrar-ul-Haq M., Anwar S. A systematic review of knowledge management and knowledge sharing: Trends, issues, and challenges. Cogent Business & Management. 2016;3(1):1127744. https://doi.org/10.1080/23311975.2015.1127744
6. Ahmed S.F., Alam M.S.B., Hassan M., et al. Deep learning modelling techniques: current progress, applications, advantages, and challenges. Artificial Intelligence Review. 2023;56:13521-13617. https://doi.org/10.1007/s10462-023-10466-8
7. Al-Hamami A.H., Al-Saadoon G.M. Security Concepts, Developments, and Future Trends. In: Al-Hamami A.H., Al-Saadoon G.M. (eds.) Handbook of Research on Threat Detection and Countermeasures in Network Security. Hershey, PA: IGI Global, 2015. p. 1-16. https://doi.org/10.4018/978-1-4666-6583-5.ch001
8. Akyildiz I.F., Kak A., Nie S. 6G and Beyond: The Future of Wireless Communications Systems. IEEE Access. 2020;8:133995-134030. https://doi.org/10.1109/ACCESS.2020.3010896
9. Ushakov Y., Ushakova M., Legashev L. Research of a Virtual Infrastructure Network with Hybrid Software-Defined Switching. Engineering Proceedings. 2023;33(1):52. https://doi.org/10.3390/engproc2023033052
10. Coelho P., Gomes M., Bandeiras F., Zambroni de Souza A.C. Smart Telecommunications: The Catalyst of a Social Revolution. In: Zambroni de Souza A.C., Verkerk M.J., Ribeiro P.F. (eds.) Interdisciplinary and Social Nature of Engineering Practices. Studies in Applied Philosophy, Epistemology and Rational Ethics. Vol. 61. Cham: Springer; 2022. p. 197-233. https://doi.org/10.1007/978-3-030-88016-3_10
11. Aghmadi A., Hussein H., Polara K.H., Mohammed O. A Comprehensive Review of Architecture, Communication, and Cybersecurity in Networked Microgrid Systems. Inventions. 2023;8(4):84. https://doi.org/10.3390/inventions8040084
12. Funmilola A., Oluwafemi A. Review of Computer Network Security System. Network and Complex Systems. 2015;5(5):40-46. Available at: https://iiste.org/Journals/index.php/NCS/article/view/22825 (accessed 26.01.2024).
13. Ahmad Z., Khan A.S., Shiang C.W., Abdullah J., Ahmad F. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies. 2021;32(1):e4150. https://doi.org/10.1002/ett.4150
14. Ding P.Q., Holliday J.N., Celik A. Improving the security of wireless LANs by managing 802.1x disassociation. In: First IEEE Consumer Communications and Networking Conference, CCNC 2004. Las Vegas, NV, USA; 2004. p. 53-58. https://doi.org/10.1109/CCNC.2004.1286832
15. Protect the Data. Ch. 6. In: Andress J., Leary M. (eds.) Building a Practical Information Security Program. Syngress;2017. p. 103-123. https://doi.org/10.1016/B978-0-12-802042-5.00007-X
16. Mavrommatis K. Confronting and intrusion detection techniques of cyber-attacks in wired and wireless communication networks. In: Proceedings of the 26th Pan-Hellenic Conference on Informatics (PCI '22). New York, NY, USA: Association for Computing Machinery; 2023. p. 290-295. https://doi.org/10.1145/3575879.3576007
17. Valadares D.C.G., Sobrinho Á., Will N.C., Gorgônio K.C., Perkusich A. Trusted and only Trusted. That is the Access! In: Barolli L. (eds.) Advanced Information Networking and Applications. AINA 2023. Lecture Notes in Networks and Systems. Vol. 655. Cham: Springer; 2023. p. 490-503. https://doi.org/10.1007/978-3-031-28694-0_47
18. Al-Dujaili M., Al-dulaimi M. Fifth-Generation Telecommunications Technologies: Features, Architecture, Challenges and Solutions. Wireless Personal Communications. 2023;128:447-469. https://doi.org/10.1007/s11277-022-09962-x
19. Abu Bakar R., Kijsirikul B. Enhancing Network Visibility and Security with Advanced Port Scanning Techniques. Sensors. 2023;23(17): 7541. https://doi.org/10.3390/s23177541
20. Ryoo J.-d., Long H., Yang Y., Holness M., Ahmad Z., Rhee J.K. Ethernet ring protection for carrier ethernet networks. IEEE Communications Magazine. 2008;46(9):136-143. https://doi.org/10.1109/MCOM.2008.4623718
21. Nakayama Y., Sezaki K. Per-Flow Throughput Fairness in Ring Aggregation Network with Multiple Edge Routers. Big Data and Cognitive Computing. 2018;2(3):17. https://doi.org/10.3390/bdcc2030017
22. Matusa R., Butkus L., Krilavičius T., Man K.L., Liang H. Improving the teaching of Computer Networks through the incorporation of industry based training courses. In: Proceedings of 2013 IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE). Bali, Indonesia: IEEE Computer Society; 2013. p. 325-328. https://doi.org/10.1109/TALE.2013.6654454
23. Zakharov P.A., Romasevich P.V., Smirnova E.V., Shibanov V.A. D-Link Comprehensive Training Solution for Networking Professionals. Modern Information Technologies and IT-Education. 2020;16(3):776-787. (In Russ., abstract in Eng.) https://doi.org/10.25559/SITITO.16.202003.776-787
24. Zakharov P.A., Romasevich P.V., Smirnova E.V. D-Link Solutions for Modern Computer Networks and Specialists Education in the Sphere of Network Technologies. Modern Information Technologies and IT-Education. 2019;15(4):894-904. (In Russ., abstract in Eng.) https://doi.org/10.25559/SITITO.15.201904.894-904
25. Romasevich P.V., Smirnova E.V., Shibanov V.A. Ensuring the Security of Corporate Networks Based on D-Link Equipment. Modern Information Technologies and IT-Education. 2023;19(2):430-437. (In Russ., abstract in Eng.) https://doi.org/10.25559/SITITO.019.202302.430-437

This work is licensed under a Creative Commons Attribution 4.0 International License.
Publication policy of the journal is based on traditional ethical principles of the Russian scientific periodicals and is built in terms of ethical norms of editors and publishers work stated in Code of Conduct and Best Practice Guidelines for Journal Editors and Code of Conduct for Journal Publishers, developed by the Committee on Publication Ethics (COPE). In the course of publishing editorial board of the journal is led by international rules for copyright protection, statutory regulations of the Russian Federation as well as international standards of publishing.
Authors publishing articles in this journal agree to the following: They retain copyright and grant the journal right of first publication of the work, which is automatically licensed under the Creative Commons Attribution License (CC BY license). Users can use, reuse and build upon the material published in this journal provided that such uses are fully attributed.