Перегляд за автором "Lemeshko, V."
Зараз показано 1 - 5 з 5
Результатів на сторінку
Варіанти сортування
Публікація Comparison of Network Configuration Management Tools(Сумський державний університет, 2023) Persikov, M.; Lemeshko, V.; Khikhlo, V.Network automation uses specific software to continuously automate network security and management to improve efficiency and functionality. Therefore, a comparative analysis of configuration management tools within network automation was carried out. Various modern network administration techniques exist for automated network monitoring, management, and configuration. The most popular configuration management tools are Ansible, Puppet, and Chef.Публікація ICT Disruptive Technologies: Starlink in Ukraine Case(2022) Yeremenko, O.; Lemeshko, O.; Persikov, M.; Lemeshko, V.Currently, disruptive technologies make fundamental changes in markets and industry and are vital in providing critical services. Starlink is such a technology provisioning global Internet access. Thus, there is an urgent need to deploy the Starlink in Ukraine for reliable Internet access to restore destroyed territories.Публікація Network Reliability Engineering for SDN(2024) Persikov, M.; Lemeshko, V.; Khikhlo, V.Публікація Network Security Approach based on Traffic Engineering Fast ReRoute with support of Traffic Policing(CEUR-WS, 2021) Lemeshko, O.; Yeremenko, O.; Yevdokymenko, M.; Shapovalova, A.; Lemeshko, V.The work is devoted to the approach development and investigation of the network security providing based on Traffic Engineering Fast ReRoute with support of Traffic Policing. The corresponding flow-based mathematical model has been developed where the technological task of secure fast rerouting was presented in the form of a linear programming problem. The novelty of the proposed model is the modification of load balancing conditions and bandwidth protection during fast rerouting, which in addition to the Quality of Service, also considers the probability of compromising the link as an indicator of network security. The routing solutions obtained within the proposed model are aimed at reducing the overload of communication links with a high probability of compromising by redistributing traffic for transmission through more secure network links. The advantage of the proposed solution is that in the conditions of congestion the load balancing is realized on the principles of Traffic Engineering and, if necessary, differentiated limitation of the load entering the network. An additional advantage of the proposed optimization model is its linearity, which focuses on the low computational complexity of the corresponding protocol implementation in practice. Numerical research of the Secure TE-FRR-TP model has confirmed the adequacy and efficiency of routing solutions made on its basis, both in terms of ensuring network security, resilience, and load balancing with traffic policing based on priorities.Публікація Results of an Experimental Study of the Fault-Tolerant Routing Method with the GLBP Protocol(Eskişehir Technical University, 2022) Lemeshko, O.; Yeremenko, O.; Kruglova, A.; Zhuravlyova, A.; Lemeshko, V.; Persikov, M.This work proposes the results of an experimental study of a fault-tolerant routing method in an infocommunication network. The method implements proactive and reactive protection of the default gateway to provide a high level of network fault tolerance. Therefore, method is based on solving an optimization problem related to calculating primary and backup routes and determining the order of balancing the load incoming to edge routers from access networks. If one of the routers creating the virtual default gateway fails, the method changes the load balancing order between the functional border routers. Causes of failure can include overloading, low equipment reliability, hardware and software router failures, and violation of their network security level (compromise). The method considers the flow-based nature of network traffic, and the optimality criterion of routing solutions under Traffic Engineering is a minimum upper bound of network link utilization. To evaluate the effectiveness of the solutions, they were implemented on Cisco equipment. In the lab experiment, the Gateway Load Balancing Protocol functionality was used. Based on this fault-tolerant routing protocol, it is possible to set weighting coefficients administratively, the value of which affects the order of load balancing on the border routers. During the experiment, the weighting coefficients were adjusted not heuristically but according to the calculations obtained by the studied fault-tolerant routing method. The results of the study confirmed the effectiveness of the proposed solution. Ensuring optimal load balancing between border routers compared to the solution based on multipath routing, but without access layer balancing, improved network performance by 25.45% and reduced the upper bound of network link utilization by an average of 63.77 %. Lowering the utilization upper bound positively affects the quantitative values of the main Quality of Service indicators – the average end-to-end delay, jitter, and packet loss probability.