Перегляд за автором "Persikov, M."
Зараз показано 1 - 5 з 5
Результатів на сторінку
Варіанти сортування
Публікація Comparison of Network Configuration Management Tools(Сумський державний університет, 2023) Persikov, M.; Lemeshko, V.; Khikhlo, V.Network automation uses specific software to continuously automate network security and management to improve efficiency and functionality. Therefore, a comparative analysis of configuration management tools within network automation was carried out. Various modern network administration techniques exist for automated network monitoring, management, and configuration. The most popular configuration management tools are Ansible, Puppet, and Chef.Публікація ICT Disruptive Technologies: Starlink in Ukraine Case(2022) Yeremenko, O.; Lemeshko, O.; Persikov, M.; Lemeshko, V.Currently, disruptive technologies make fundamental changes in markets and industry and are vital in providing critical services. Starlink is such a technology provisioning global Internet access. Thus, there is an urgent need to deploy the Starlink in Ukraine for reliable Internet access to restore destroyed territories.Публікація Network Reliability Engineering for SDN(2024) Persikov, M.; Lemeshko, V.; Khikhlo, V.Публікація Providing cyber resilience in software-defined networks by secure routing means(Національний університет «Львівська політехніка», 2021) Chhaytli Ali; Persikov, M.This paper is devoted to solving the technical task of providing cyber resilience utilizing secure routing means in Software-Defined Networks (SDN). The work analyzes the SDN architecture and its main components, the concept of cyber resilience and its means, as well as security issues in SDN. Particular attention is paid to the use of secure routing in software-defined networks. Numerical research of the model of secure multipath routing of fragmented confidential messages in the SDN data plane was conducted. The calculation of the message compromise probability for different values of links compromise probabilities was performed. The obtained results showed that the model of secure multipath routing of fragmented confidential messages with redundancy provides a better balancing of message parts by routes. Results of the numerical study proved the adequacy of the selected secure multipath routing model.Публікація Results of an Experimental Study of the Fault-Tolerant Routing Method with the GLBP Protocol(Eskişehir Technical University, 2022) Lemeshko, O.; Yeremenko, O.; Kruglova, A.; Zhuravlyova, A.; Lemeshko, V.; Persikov, M.This work proposes the results of an experimental study of a fault-tolerant routing method in an infocommunication network. The method implements proactive and reactive protection of the default gateway to provide a high level of network fault tolerance. Therefore, method is based on solving an optimization problem related to calculating primary and backup routes and determining the order of balancing the load incoming to edge routers from access networks. If one of the routers creating the virtual default gateway fails, the method changes the load balancing order between the functional border routers. Causes of failure can include overloading, low equipment reliability, hardware and software router failures, and violation of their network security level (compromise). The method considers the flow-based nature of network traffic, and the optimality criterion of routing solutions under Traffic Engineering is a minimum upper bound of network link utilization. To evaluate the effectiveness of the solutions, they were implemented on Cisco equipment. In the lab experiment, the Gateway Load Balancing Protocol functionality was used. Based on this fault-tolerant routing protocol, it is possible to set weighting coefficients administratively, the value of which affects the order of load balancing on the border routers. During the experiment, the weighting coefficients were adjusted not heuristically but according to the calculations obtained by the studied fault-tolerant routing method. The results of the study confirmed the effectiveness of the proposed solution. Ensuring optimal load balancing between border routers compared to the solution based on multipath routing, but without access layer balancing, improved network performance by 25.45% and reduced the upper bound of network link utilization by an average of 63.77 %. Lowering the utilization upper bound positively affects the quantitative values of the main Quality of Service indicators – the average end-to-end delay, jitter, and packet loss probability.