<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Algorithms for Placing Files in Tiered Storage Using Kohonen Map*</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>rnikov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>D. Poym</string-name>
          <email>e.d.poymanova@gmail.com</email>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Russian State Hydrometeorological University</institution>
          ,
          <addr-line>79, Voronelsraya st., 192007 St. Petersburg</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Saint-Petersburg State University of Aerospace Instrumentation</institution>
          ,
          <addr-line>67, Bolshaya Morskaia str., 190000 St. Petersburg</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>193</fpage>
      <lpage>202</lpage>
      <abstract>
        <p>The data storage task is not limited only to the allocation of volume for data placement. It needs a new storage resource management models with tiered storage and proactive migration of information. Present storage systems are still one-tier. The storage administrator decides about data migration to other media. The decision to migrate data is determined by the time that has passed since the last access to the data. However, many metrics can be taken into account, such as the rate at which the requested data is provided, the cost of data loss, the period through which information is transferred to another storage tier. The paper proposes a sequence of algorithms for distributing files in tiered storage. For the first, the algorithm of vertical placement files across storage tiers, next horizontal placement of files on physical and logical media, and then migration data algorithm. The result of algorithms applying is visualized in the form of a matrix, the size of which corresponds to the number of storage tiers and the number of physical or logical media. All storage resource management algorithms are based on the analysis of stored file metadata. The representation of the storage system in the form of a matrix allows using the Kohonen neural network tool to arrange files by levels and sections of a specific storage system level. Using Kohonen neural network allows you to move from sequential execution of algorithms to placement in one-step.</p>
      </abstract>
      <kwd-group>
        <kwd>Tier Data Storage</kwd>
        <kwd>Data Storage System</kwd>
        <kwd>Metadata</kwd>
        <kwd>Efficient Data Placement</kwd>
        <kwd>File Metadata</kwd>
        <kwd>Data Migration</kwd>
        <kwd>Clustering</kwd>
        <kwd>Kohonen Neural Network</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Data storage is a necessity for both an enterprise, a corporation, state structures, and a
person. For enterprises and the corporate sector, the need to store large amounts of data
*
is determined by existing business processes, in the public sector by the transition to
interdepartmental electronic document management and the creation of departmental
analytical resources. In addition, users who upload their photos to the Internet, videos
and actively exchange multimedia content in social networks create a powerful data
stream.</p>
      <p>
        The engineering solution for the implementation of storage infrastructure is data
storage systems. The data storage system mainly is segregate into a computing
subsystem complex, for example, in a data center [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        The data storage system is an architectural solution for connecting external data
storage devices of different physical nature [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        The main task in the design of storage infrastructure is the effective management of
storage resources, mainly capacitive. Its solution is complicated by the following
circumstances:
 storage heterogeneity: storage devices in a storage system can be different in
physical nature (for example, magnetic, optical, solid-state) and in architecture (direct or
network access storage systems) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ];
 different data storage requirements: critical transactional systems such as billing,
processing, ERP, etc., require highly reliable and productive storage systems;
analytical systems - high productivity and low cost per storage unit; for work with files
– functionality and low cost of storage [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ];
 the lack of efficient multi-level data storage algorithms with different storage
requirements.
      </p>
      <p>The paper describes the problem of organizing tiered data storage, which assumes using
different storage technologies for different files depending on the guaranteed storage
time.</p>
      <p>Storage engineering solutions analysis allows distinguishing three tiers of the data
storage architecture:
 RAID (Redundant Array of Independent Disks);
 automated libraries;
 long-term storage media.</p>
      <p>
        Each storage tier involves its own storage technologies [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Despite the fact, that modern data storage systems (DSS) are multi-tier associations
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], the decision on the choice of the storage tier lies with the administrator. This
decision is based on a single metric - the time elapsed since the last access to the information
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>The purpose of the research is to develop a tiered data storage model and data
distribution algorithms for storage systems that will partially solve the listed issues of data
storage.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Tiered structured</title>
      <p>It is proposed to distribute data files using the file metadata analysis.</p>
      <p>The distribution process includes the following principles:
 the storage tier selection depending on data storage time;
 the storage local volume selection depending on the file size and the length of the
logical data block;
 the principle of data migration across tiers depending on the frequency of data file
access.</p>
      <p>
        Before writing to a specific storage tier, it is necessary to analyze the data in order to
select the optimal file system (FS) for the RAID tier or the type of archive media, which
will allow saving storage space [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Thus, the data storage gets a matrix structure,
containing data with certain characteristics in each cell (Fig. 1).
      </p>
      <p>RAID</p>
      <p>FS 1</p>
      <sec id="sec-2-1">
        <title>Volum 1 FS 2</title>
      </sec>
      <sec id="sec-2-2">
        <title>Volum 2</title>
        <sec id="sec-2-2-1">
          <title>Automated libraries</title>
        </sec>
      </sec>
      <sec id="sec-2-3">
        <title>Data Media 1 Data Media 1</title>
        <sec id="sec-2-3-1">
          <title>Long term storage media</title>
        </sec>
      </sec>
      <sec id="sec-2-4">
        <title>Data Media 1 Data Media 1</title>
        <p>The storage tier selection principle is based on the analysis of organizational metadata
containing data type information:
 ind (initial data) – raw data that is placed on the RAID tier;
 bck (backups) – backups, archived data that is stored at the automated libraries tier;
 ngd (next-generation data) – data of unlimited storage that is stored in the long term
storage tier.</p>
        <p>The storage logic tier selection principle of the storage system is based on the selection
of the file system for the RAID tier and the type of storage media on the lower storage
tiers:</p>
        <p>If f(fi; fi+1], then  ai+1  F Voli+1,
where f – the size of the saved file F;
fi, fi+1 – size limits of the file F, with which the file system can work;
ai+1 – the logical data block size with which the file system operates;
Voli+1 – the number of a RAID volume that is managed by the corresponding file
system.</p>
        <p>At the lower storage tiers, it is proposed to divide the capacity according to the types
of storage media: tape drive, DVD, BD for the automated libraries tier and M-disk,
glass disk and DNA – for long-term storage media tier:</p>
        <p>If f  (fi, fi+1], then F  ali+1 (lti+1),
(1)
(2)
where ali+1 or lti+1 – the type of media at the automated libraries tier (al) or at the
longterm storage tier (lt).</p>
        <p>The principle of data migration across storage tiers depends on the frequency of
data files access:</p>
        <p>If F  ( λi, λi+1], then F  l,
(3)
where F – the frequency of the file F request;
i, i+1 – limits of the file request frequency;
l – the number of the storage tier to which the file F is migrated.</p>
        <p>The migration principle allows overcoming the shortcomings of a subjective
selection of the saving files type when implementing the first stage - data recording.</p>
        <p>The complex of principles above allows managing storage capacity and making
rational use of media. Note that all these principles are based on the file's metadata
analysis.</p>
        <p>The result of the proposed storage capacity management principle, in general, is the
storage matrix of size m × n, where m is the number of storage tiers (M), and n is the
number of physical or logical media (N). Elements of the matrix are sets of data files
with certain characteristic values: file type (type), file size (f) (Fig. 2). During the initial
data distribution, the data access frequency (λ) is not taken into account, because of
absence of accumulated statistics of data access at this moment.</p>
        <p>N1 ... Nn
M1
M2
M3
type1, f1
type2, f1
type3, f1
...
Based on the storage technologies analysis, three storage tiers were identified.
Accordingly, the matrix will always contain three rows. The number of columns is selected
based on the physical implementation of each data storage tier.</p>
        <p>A block diagram of aggregate algorithms for placing files in the tiered storage is
shown in Fig. 3</p>
        <p>
          The consistent implementation of the presented above principles requires
high-energy costs. In this regard, to distribute files among the cells of the matrix (Fig.1), it is
proposed to analyze the metadata of the input file stream using Kohonen neural
networks. Kohonen trained a neural network that is capable of solving this problem not by
the consistent use of principles, but in one-step [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. It is noteworthy that the neural
network, in this case, is used precisely as a principle for distributing data to the cells of
the storage matrix.
        </p>
        <p>F(ind)</p>
        <p>Yes
RAID tier
f ϵ(0; f1]</p>
        <p>No
f ϵ(f1; f2]</p>
        <p>No
...</p>
        <p>No
f ϵ(fn; )
Volume1</p>
        <p>Yes
Volum2</p>
        <p>Yes
Volumen</p>
        <p>Yes</p>
        <p>Yes</p>
        <p>Input data stream
Metadata analysis
Automated libraries
tier
F(bck)
Yes
f ϵ(0; f1]</p>
        <p>No
f ϵ(f1; f2]</p>
        <p>No
...</p>
        <p>No
f ϵ(fn; )
File access frequency
analysis</p>
        <p>No</p>
        <p>Yes
al1
al2
...
aln</p>
        <p>Yes
Yes
Yes
Yes
lt1
lt2
...
ltn</p>
        <p>Yes
Yes
Yes
Yes
No</p>
        <p>Tier long-term
storage media</p>
        <p>No
F(ngd)
Yes
f ϵ(0; f1]</p>
        <p>No
f ϵ(f1; f2]</p>
        <p>No
...</p>
        <p>No
f ϵ(fn; )</p>
        <p>No</p>
        <p>Yes
λϵ(λ1; )</p>
        <p>No
λϵ(λ2; λ1]</p>
        <p>No
λϵ[0; λ2]
The result of using a neural network is a topological map in which the input data is
classified into groups (clusters). Thus, each cell of the resulting map must correspond
to a cell of the storage matrix.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Kohonen Network as a Data File Clustering Tool</title>
      <p>Kohonen neural network, unlike many other types of neural networks, is trained
without a teacher.</p>
      <p>The main purpose of the Kohonen network is to solve the problem of cluster analysis
(clustering).</p>
      <p>
        The Kohonen network includes two layers: input and output. Each neuron of the
input layer is connected to each neuron of the output layer and all connections have a
certain weight, which is corrected in the learning process. The output layer is also called
the topological map layer. Neurons of a topological map are scattered in a
two-dimensional field (Fig. 4) [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>Input layer</p>
      <p>Output layer</p>
      <p>Topological map</p>
      <p>Kohonen maps have a set of input elements, the number of which coincides with the
dimension of the input vectors, and a set of output elements, each of which corresponds
to one cluster (group).</p>
      <p>The essence of the Kohonen network is as follows. When inputting some vector X
to the input, the network must determine to which of the clusters this vector is closest.
As the proximity criterion can be chosen the metric of the square of the Euclidean
distance</p>
      <p>n 2
dij   xik  y jk  ,
k0
(4)
where dij is the squared distance between point X and cluster Y. The coordinates of
point X are xi1, xi2, ..., xin, and the coordinates of the cluster center Y are yj1, yj2, ..., yjn.</p>
      <p>Vector X is a point in n-dimensional space, where n is the number of vector
coordinates that are fed to the input of the neuron network. Calculating the distance between
this point and the centers of different clusters allows you to determine the cluster, the
distance to which will be minimal. Then this cluster and the corresponding output
neuron is declared the winner.</p>
      <p>The cluster center is defined as a point whose coordinates in n-dimensional space
are the weights of all connections that arrive at a given output neuron from the input
neurons.</p>
      <p>Kohonen maps solve the clustering problem as follows: by submitting a vector to the
network input, one winning cluster will be obtained, which determines the membership
of the input vector to this cluster.</p>
      <p>
        Kohonen network learning algorithm is recurrent. Any training example is processed
in this sequence [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]:
 take the winner neuron, that is, the one that is closer to the entered example;
 perform correction of the winning neuron so that it becomes as close as possible to
the entered example, finding the square of the Euclidean distance from the center of
the winning neuron to the learning example.
      </p>
      <p>When calculating the center of the winning neuron, uses the learning rate factor. This
coefficient gradually decreases in such a way that, at each new stage, the correction of
the weights became more and more close to the given one. As a result, the location of
the center will be established in some position that best reflects the examples for which
this neuron is the winner.</p>
      <p>Because of such a recurrent learning procedure, the neural network will be organized
so that neurons located close to each other in the space of the input layer will be located
close to each other and on a topological map.</p>
      <p>The completion of the Kohonen map is based on the concept of a neighborhood.</p>
      <p>The neighborhood is characterized by a radius R. It is a group of neurons that
surround the winner-neuron (Fig. 5). Similarly, the learning rate, the radius of the
neighborhood decreases with the learning time in such a way that a significant number of
neurons are located in the neighborhood first (perhaps almost everything located on the
topological map). Then, in the final stages, the neighborhood tends to zero – it includes
only the winner-neuron itself (Fig. 5).</p>
      <p>R
If changes in weights become insignificant, then the training ends.</p>
      <p>
        After the network has been trained to solve the clustering, we use it as a visualization
tool in the form of a Kohonen map [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
The Kohonen network learning algorithm has the following sequence of steps:
Step 1. For the input vector X, calculate the coordinates of the neurons of the output
layer, calculate dij from X to each of the neurons of the network.
      </p>
      <p>Step 2. Find the minimum dij from the obtained values, determine the winner neuron.</p>
      <p>Step 3. For the winning neuron, as well as for those neurons that are in a
neighborhood with radius R, perform the adjustment of the weights:
wij (t 1)  wij (t)  (t)  xi  wij (t),
(5)
where wij (t 1) is the weight at step (t + 1);
wij (t) – weight at step t;
 – learning rate;
xi – coordinate of the input vector.</p>
      <p>Step 4. Update the values of the learning rate and radius R of the neighborhood.
Step 5. Continue learning until the condition for stopping learning is fulfilled.
Learning stops when weights become insignificant.</p>
      <p>The choice of this method for solving the file allocation is due to the peculiarities of
the algorithm that implements the Kohonen network:
1. Uncontrolled learning is used, in which the learning rule of a neuron is based on
information about its location;
2. There are no reference values of the training set;
3. The result of the algorithm is a topological map, in which the input data are classified
into groups (clusters).</p>
      <p>
        In the case of the proposed distribution of files in the data storage cells, it is obvious
that the selected file characteristics define the feature value vectors. Thus, each cell of
the resulting map must correspond to an element of the matrix representing the storage
system [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Experiment Description and Analysis of Results</title>
      <p>The experiment involved 5,000 files with different characteristics: the type of file, its
estimated storage time, file size, frequency of accessing data.</p>
      <p>
        The stream is generated based on the analysis of 43,000 files taken from an
experimental file server [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The file size does not exceed 1 GB, the frequency of
accessing data is a random variable in the interval [
        <xref ref-type="bibr" rid="ref1 ref10 ref2 ref3 ref4 ref5 ref6 ref7 ref8 ref9">0–300</xref>
        ] requests per hour. The
frequency of accessing data was considered in absolute units - the number of requests per
hour.
      </p>
      <p>The data files distribution was implemented in accordance with the structure of the
storage matrix of size 33.</p>
      <p>Normalization of file types was adopted based on the considerations of obtaining
disjoint classes: the file type ind corresponds to the value 1, bck – 2, ngd – 3.</p>
      <p>Normalization of the file size is done in decimal order: if the file size is from 0 to
999 B, we assign the value of the attribute 1; from 1000 to 999,999B – 2; from
1,000,000 to 999,999,999B – 3.</p>
      <p>The results of the experiment show that the Kohonen neural network apparatus can
be a principle for solving the problem of distributing files with different characteristics
and storage time requirements. The main difficulty is the choice of classification
parameters and their normalization. An example of the Kohonen map in 3D, which is built
as a result of the experiment, is shown in Fig. 6.</p>
      <p>Fig. 6. The results of the experiment file distribution depending on the type, size, and
frequency of requests (the Kohonen maps in 3D)</p>
      <p>The decision of the necessity of data files migration to another storage tier is based
on analyzing the value of the files accessing frequency. The storage administrator
should determine the limit values of the request frequency, upon which the files are
migrated (Fig. 7).
– the limit value of the requestы
frequency for data migration to
tier 2;
– the limit value of the requestы
frequency for data migration to
tier 3
Fig. 7. An example of visualization of the limit values of the files access frequency
The results of the experiment showed that the Kohonen neural network can be a tool
for solving the problem of placing files.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>The paper suggests a tiered data storage model. The file distribution in data storage
system is implemented in accordance with the consistent use of principles for vertical,
horizontal placement and migration of data.</p>
      <p>The initial vertical and horizontal distribution of files in the tiered data storage
system is formalized in the form of a matrix. Such a presentation allows using the Kohonen
neural network apparatus, whose main purpose is to solve the clustering problem. In
the problem of the distributing file, clusters correspond to cells of the storage matrix.
Before solving the clustering problem, metadata that sets the characteristics of the saved
files were normalized.</p>
      <p>Using the Kohonen neural network allows us to abandon the consistent
implementation of distribution algorithms, and solve the problem of file distribution in one step.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Information</given-names>
            <surname>Storage</surname>
          </string-name>
          and
          <source>Management. 2nd Edition</source>
          . New Jersey: John Wiley &amp; Sons Inc., (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Mesnier</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ganger</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Riedel</surname>
            <given-names>E</given-names>
          </string-name>
          .
          <article-title>Object-Based Storage</article-title>
          .
          <source>IEEE Communications Magazine</source>
          , vol.
          <volume>41</volume>
          , no.
          <issue>8</issue>
          ,
          <fpage>84</fpage>
          -
          <lpage>90</lpage>
          (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Farley M. Building</surname>
          </string-name>
          <article-title>Storage Networks</article-title>
          . Osborne:
          <string-name>
            <surname>McGraw-Hall</surname>
          </string-name>
          ,
          <article-title>(</article-title>
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Sovetov</surname>
            <given-names>B. Ya.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tatarnikova</surname>
            <given-names>T. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poymanova</surname>
            <given-names>E. D.</given-names>
          </string-name>
          <article-title>Organization of multi-level data storage</article-title>
          .
          <source>Informatsionno-Upravliaiushchie Sistemy, no. 2</source>
          ,
          <fpage>74</fpage>
          -
          <lpage>81</lpage>
          (
          <year>2019</year>
          ). DOI:
          <volume>10</volume>
          .31799/
          <fpage>1684</fpage>
          - 8853-2019-2-
          <fpage>68</fpage>
          -75
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bogatyrev</surname>
            <given-names>V.A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bogatyrev</surname>
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bogatyrev</surname>
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polyakov</surname>
            <given-names>V. I.</given-names>
          </string-name>
          <article-title>Redundant service of request copies by a sequence of groups of reserved nodes</article-title>
          .
          <source>In CEUR Workshop Proceedings: Workshop International Scientific and Technical Conference &amp;quot;Fundamental and practical aspects of computer technology&amp;quot, FPACT</source>
          <year>2018</year>
          ,
          <volume>5</volume>
          -
          <fpage>7</fpage>
          Nov.
          <year>2018</year>
          ,
          <string-name>
            <surname>Saint</surname>
            <given-names>Petersburg</given-names>
          </string-name>
          , IET - 2019, pp.
          <fpage>135</fpage>
          -
          <lpage>140</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Kohonen</surname>
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Self-Organizing Maps</surname>
          </string-name>
          . New York, (
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Stacey</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salvatore</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jorgensen</surname>
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Visual</surname>
          </string-name>
          <article-title>Intelligence: Microsoft Tools and Techniques for Visualizing Data</article-title>
          . New Jersey, John Wiley &amp; Sons, (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Morville</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Callender</surname>
            <given-names>J</given-names>
          </string-name>
          . Search Patterns:
          <article-title>Design for Discovery</article-title>
          .
          <source>O'Reilly</source>
          , (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Poymanova</surname>
            <given-names>E.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tatarnikova</surname>
            <given-names>T.M.</given-names>
          </string-name>
          <string-name>
            <surname>Models</surname>
          </string-name>
          and
          <article-title>Methods for Studying Network Traffic</article-title>
          .
          <source>In Wave Electronics and its Application in Information and Telecommunication Systems, WECONF 2018</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , (
          <year>2019</year>
          ). DOI:
          <volume>10</volume>
          .1109/WECONF.
          <year>2018</year>
          .8604470
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Tatarnikova</surname>
            <given-names>T. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Volskiy</surname>
            <given-names>A.V.</given-names>
          </string-name>
          <article-title>Estimation of probabilistic-temporal characteristics of network nodes with traffic differentiation</article-title>
          .
          <source>Informatsionno-Upravliaiushchie Sistemy, no. 3</source>
          ,
          <fpage>54</fpage>
          -
          <lpage>60</lpage>
          (
          <year>2018</year>
          ). DOI:
          <volume>10</volume>
          .31799/
          <fpage>1684</fpage>
          -8853-2019-2-
          <fpage>68</fpage>
          -75.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>