METHOD OF ENSURING THE SURVIVABILITY OF THE COMPUTER NETWORK BASED ON VPN-TUNNELING
DOI:
https://doi.org/10.26906/SUNZ.2021.1.090Keywords:
survivability, computer network, virtualization, VPNAbstract
The article analyzes the main approaches to ensuring the survivability of computer networks. It is shown that the survivability methodology that is applied to computer systems is partially different from that used in computer networks, which is associated with the active development of virtualization technologies. The purpose of the article is to develop a method to ensure the survivability of a computer network, which is an information environment for guaranteed provision of digital services, by using virtual tunnels based on the principles of VPN tunneling to delegate "white" IP addresses to computer networks, or routing schemes for data flows when using internal VPN servers with a single "white" IP address. The results obtained make it possible: to formulate a scientific problem with the formalization of the necessary technical requirements for the developed computer network; develop an application solution for ensuring the survivability of a computer network based on the use of multiple VPN tunnels; conduct a series of experiments to study the effectiveness of using various network protocols in VPN tunnels; to create a basis for further development of the methodology for ensuring the survivability of computer systems to ensure the continuity of network infrastructure management processes. The studies allow us to conclude that the proposed method can be used at the design stages of computer networks when determining redundancy indicators when implementing the principles of managing network elements such as servers, gateways, technological equipment, etcDownloads
References
Nahavandi, S. (2019). Industry 5.0—A human-centric solution. Sustainability, 11(16), 4371.
Kharchenko, V., Kondratenko, Y., & Kacprzyk, J. (Eds.). (2017). Green IT engineering: concepts, models, complex systems architectures. Springer International Publishing.
Додонов А.Г., Ландэ Д.В. Живучесть информационных систем. - К.: Наук. думка, 2011. - 256 с.
Князева Н. А. Метод обеспечения живучести телекоммуникационной сети на основе перераспределения ресурсов сети / Н. А. Князева, И. В. Грищенко, С. В. Шестопалов // Холодильна техніка та технологія. - 2014. - No 4. - С. 65-71.
Кучук Г.А. Метод перерозподілу пропускної здатності критичної ділянки мережі на основі удосконалення ON/OFF- моделі трафіку / Г.А. Кучук, А.С. Свиридов, А. А. Коваленко. // Сучасні інформаційні системи. Харків: НТУ «ХПІ», 2018. – Том 2, No 2. – С. 139-144.
L.D. Orda, T.V. Jensen, O. Gehrke, & H.W. Bindner (2019). “Efficient Routing for Overlay Networks in a Smart Grid Context”. Proceedings of the 8th International Conference on Smart Cities and Green ICT Systems (SMARTGREENS 2019), Heraklion, Crete, Greece, 2019, pp. 251-258.
Tkachov, V., Bondarenko, M., Ulyanov, O., & Reznichenko, O. (2019, December). Overlay Network Infrastructure for Remote Control of Radio Astronomy Observatory. In 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT) (pp. 161-165).
Кулаков А. Ю. Способ повышения эффективности GRID систем на базе виртуальных сетей VPN / А. Ю. Кулаков // Вісник НТУУ «КПІ». Інформатика, управління та обчислювальна техніка : зб. наук. пр. – 2007. – No 47. – С. 280–286.
R. Wróbel, M. Andrych-Zalewska, & R. Dimitrov (2016). Diagnostic telemetry system. Journal of KONES. Powertrain and Transport, 23(4), pp.569-574.
Doghonadze, N., Aliyev, A., Halawachy, H., Knodel, L., & Adedoyin, A. S. (2020). The Degree of Readiness to Total Distance Learning in the Face of COVID-19-Teachers’ View (Case of Azerbaijan, Georgia, Iraq, Nigeria, UK and Ukraine). Journal of Education in Black Sea Region, 5(2), 2-41.
Шейда, В. В. (2010). Использование протоколов TCP и UDP для защищенной передачи информации по SSL-VPN-туннелям. Доклады Томского государственного университета систем управления и радиоэлектроники, (1-2 (21)).
Amin Salih M., Potrus M. Y. A Method for Compensation of TCP Throughput Degrading During Movement Of Mobile Node ZANCO Journal of Pure and Applied Sciences. 2015.Vol. 27, No 6. P. 59–68.
Nechausov A., Mamusuĉ I., Kuchuk N. Synthesis of the air pollution level control system on the basis of hyperconvergent infrastructures. Сучасні інформаційні системи. 2017. Т. 1, No 2. С. 21 – 26. DOI: https://doi.org/10.20998/2522-9052.2017.2.04
Amin Salih Mohammed, Saravana Balaji B., Saleem Basha M S, Asha P N and Venkatachalam K (2020), FCO — Fuzzy constraints applied Cluster Optimization technique for Wireless AdHoc Networks, Computer Communications, Volume 154, , Pages 501-508, DOI: https://doi.org/10.1016/j.comcom.2020.02.079.
Sivaram, M., Yuvaraj, D., Mohammed, A. S., Manikandan, V., Porkodi, V., & Yuvaraj, N. (2019). Improved Enhanced Dbtma with Contention-Aware Admission Control to Improve the Network Performance in Manets. CMC-COMPUTERS MATERIALS & CONTINUA, 60(2), pp. 435-454, DOI: https://doi.org/10.32604/cmc.2019.06295
Mozhaiev, M., Kuchuk, N. and Usatenko, M. (2019), “ The method of jitter determining in the telecommunication network of a computer system on a special software platform”, Innovative technologies and scientific solutions for industries, Vol. 4 (10), pp. 134-140. doi: https://doi.org/10.30837/2522-9818.2019.10.134.
Tkachov V. Principles of Constructing an Overlay Network Based on Cellular Communication Systems for Secure Control of Intelligent Mobile Objects / Vitalii Tkachov, Andriy Kovalenko, Mykhailo Hunko and Kateryna Hvozdetska // Информационные технологии и безопасность. Материалы XIX Международной научно-практической конференции ИТБ-2020. – К.: ООО "Инжиниринг", 2020. – С. 51-55.