Work place: National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”/ Department of computer engineering, Kyiv, 03056, Ukraine
E-mail: artem_volokyta@kpi.ua
Website: https://scholar.google.com.ua/citations?user=mHDxf5wAAAAJ&hl=uk
Research Interests:
Biography
Artem Volokyta: Candidate of Sciences, Associate Professor, Department of Computer Engineering, National Technical University of Ukraine, “Igor Sikorsky Kyiv Polytechnic Institute”, Ukraine.
Areas of scientific interests: High-performance computer systems and networks: theory, methods and means of hardware and software implementation; design of fault-tolerant distributed computing systems; network topological organization.
By Artem Volokyta Alla Kogan Oleksii Cherevatenko Dmytro Korenko Dmytro Oboznyi Yurii Kulakov
DOI: https://doi.org/10.5815/ijcnis.2024.05.01, Pub. Date: 8 Oct. 2024
A method of traffic engineering (TE) based on the method of multi-path routing is proposed in the study. Today, one of the main challenges in networking is to organize an efficient TE system that will provide such parameters of quality of service (QoS) as the allowable value of packet loss and time for traffic re-routing. Traditional one-way routing facilities do not provide the required quality of service (QoS) parameters for TE. Modern computer networks use static and dynamic routing algorithms, which are characterized by big time complexity and a large amount of service information. This negatively affects the overall state of the network, namely: leads to network congestion, device failure, loss of information during routing and increases the time for traffic re-routing. Research has shown that the most promising way to solve the TE problem in computer networks is a comprehensive approach, which consists of multi-path routing, SDN technology and monitoring of the overall situation of the network. This paper proposes a method of traffic engineering in a software-defined network with specified quality of service parameters, which has reduced the time of traffic re-routing and the percentage of packet loss due to the combination of the centralized TE method and multi-path routing. From a practical point of view, the obtained method, will improve the quality of service in computer networks in comparison with the known method of traffic construction.
[...] Read more.By Artem Volokyta Heorhii Loutskii Oleksandr Honcharenko Oleksii Cherevatenko Volodymyr Rusinov Yurii Kulakov Serhii Tsybulia
DOI: https://doi.org/10.5815/ijcnis.2024.01.08, Pub. Date: 8 Feb. 2024
This article considers the method of analyze potentially vulnerable places during development of topology for fault-tolerant systems based on using betweenness coefficient. Parameters of different topological organizations using De Bruijn code transformation are observed. This method, assessing the risk for possible faults, is proposed for other topological organizations that are analyzed for their fault tolerance and to predict the consequences of simultaneous faults on more significant fragments of this topology.
[...] Read more.By Artem Volokyta Heorhii Loutskii Pavlo Rehida Artem Kaplunov Bohdan Ivanishchev Oleksandr Honcharenko Dmytro Korenko
DOI: https://doi.org/10.5815/ijcnis.2022.06.03, Pub. Date: 8 Dec. 2022
Scaling high performance computer systems needs increasing the fault tolerance at the design stage of a topology. There are several approaches of designing simple fast routing with fault tolerance. One of effective approach is to ensure fault tolerance at the topology level. This article discusses two methods for optimizing topologies synthesized using Dragonfly and Excess De Brujin. Methods of topology saturation are discusses, which allow to increase the dimension of the system without deterioration of topological characteristics due to the optimization of the synthesis method. Three scaling constraint methods are also proposed to reduce the topology dimension to the desired performance.
[...] Read more.By Vadym Mukhin Artem Volokyta
DOI: https://doi.org/10.5815/ijcnis.2013.02.03, Pub. Date: 8 Feb. 2013
Today, there are known the basic principles of decision-making on the safety control of distributed computer systems in the face of uncertainty and risk. However, in this area there are no practical methods for the quantitative risk analysis and assessment, taking into account the dynamic changes of security threats, which is typical for distributed computer systems.
In this paper is suggested an approach to assesment and minimization of the security risks, which allows to reduce the potential losses due to the realization of threats, to analyze the dynamics of intrusions into computer systems and to select the effective security tools.
As a result, there is designed the structure of the tools for risk minimization in the distributed computer systems and are formalized the main functions of this structure. Also, in the paper is suggested the assessment of risk factors of the security threats and the probability of the threats realization, which are based on their division into appropriate groups. The proposed tools for security risk minimization allow effectively identify, classify and analyze threats to the security of the distributed computing systems.
Subscribe to receive issue release notifications and newsletters from MECS Press journals