DECOMPOSITION OF COMPUTER NETWORK TECHNOLOGY IN THEIR DESIGN
DOI:
https://doi.org/10.18372/2225-5036.29.18072Keywords:
computer network, computer network technology, decomposition method, structure topology, optimal designAbstract
This article discusses the issue of security and topology in computer networks, where practical methods of protecting information do not have a sufficient theoretical basis. The importance of considering the network topology in ensuring security is emphasized. The problems with system approaches to system analysis and integration, as well as the lack of effective mechanisms for assessing the quality of systems are highlighted. It is proposed to use decomposition methods to optimally design the topology of computer networks and minimize computing resources. We also note that the success of the method depends on the nature of the specific system topology and information flows. By emphasizing a discrete approach to system optimization, decomposition techniques can be useful for finding simplifications for complex systems. This article emphasizes the importance of the theoretical justification of information protection methods in computer networks. It challenges the traditional practical approach to data protection and emphasizes the non-workability of an integrated approach to network security. The influence of topology on the level of protection is analyzed in detail and the advantages of decomposition methods for solving this problem are highlighted. It is shown that the diversity of systems requires an individual approach and that the study of decomposition methods can become a step towards to effectively ensure security in complex information systems.
References
Згуровський М.З., Панкратова Н.Д. Основи систематичного аналізу. К:Вид. група BHV, 2007. 544 с.
Месарович М., Мако Д., Такахара І. Теорія ієрархічних багаторівневих систем. К:Техніка, 1993. 248 с.
Лесдок Л.С. Оптимизация больших систем М:Наука, 1975. 432с.
Geoffrion A.M. Elements of logrescecele math-ematical programing. Paris–Management Scsence, 2000, №11. pp.652-691.
Тамашевський В.М. Моделювання систем. К:Вид.група BHV, 2007. 352 с.
Левин Г.М. Ганаев В.С. Декомпозиционные методы оптимизации проектных решений. Минск: Наука и техника, 1998. 240 с.
Изурнов В.И. Декомпозиции в задачах большой размерности. 2-е изд. Минск: Наука и техника, 2001. 352 с.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.