<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Inter-Machine Exchange of Real Time in Distributed Computer Systems*</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>toly Bog</string-name>
          <email>anatolyg@nspcc.ru</email>
          <email>vabogatyrev@corp.ifmo.ru</email>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>ITMO University</institution>
          ,
          <addr-line>Saint Petersburg</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>JSC NEO Saint Petersburg Competence Center</institution>
          ,
          <addr-line>St. Petersburg, Russia https://</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Saint-Petersburg State University of Aerospace Instrumentation</institution>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The possibilities of increasing the likelihood of timely service and reducing the average waiting time for requests for inter-machine exchange in distributed real-time computer systems are investigated. The analyzed effect is achieved as a result of redundant multi-way transmissions of packets that are critical to delays, which provide for the replication of transmitted packets with the task for each replica of the path (route) of the sequential passage of network nodes. The condition for the timeliness of the reserved transmissions is that the accumulated waiting in the queues of the nodes making up the path, at least for one of the replicas, does not exceed the maximum permissible time. An analytical model is proposed for estimating the average delays of multi-path redundant transmissions, when determined by the average delivery time of the first of the replicas transmitted in different ways. For requests critical to service delays, the influence of the frequency of reservation (replication) of requests on the probability of their timely service and the average waiting time accumulated at the nodes of the path for the replica delivered first was analyzed.</p>
      </abstract>
      <kwd-group>
        <kwd>Reservation</kwd>
        <kwd>Multipath Transfers</kwd>
        <kwd>Real-time</kwd>
        <kwd>Average Waiting Time</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Currently, great interest is shown in ensuring reliability and low latency in data
exchange networks, these tasks are being addressed, including in the framework of the
concept of Ultrareliable and Low-Latency Wireless Communication [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ]. The need to
ensure these requirements for distributed processing and data transfer systems,
      </p>
      <p>A feature of the transmission of images in real time is the provision of delays in
their delivery that do not exceed a certain maximum permissible value, as well as the
fight against the spread of transmission delays (jitter) and their errors, which
significantly reduce the reliability of communication and the quality of image perception,
including video streams. To combat transmission errors, various methods are used, the
main of which are noise-immune coding and retransmission schemes, however, the
latter lead to an increase in delays, which leads to the use of protocols in real time without
confirmation of delivery, increasing the timeliness of image transmission by reducing
it reliability.</p>
      <p>Real-Time Transport Protocol (RTP) and Resource Reservation Protocol (RSVP)
are aimed at ensuring timely transmissions. RTP supports the timely delivery of data in
real time to one or more subscribers. RSVP allows you to reserve network resources
for the required quality of real-time transmissions over the RTP protocol.</p>
      <p>Taking into account the specified specificity of image transmission, its quality is
characterized by such indicators as average delivery delays, variance of delivery delays,</p>
    </sec>
    <sec id="sec-2">
      <title>Inter-Machine Exchange of Real Time in Distributed Computer Systems 3</title>
      <p>delivery probability, taking into account bit errors of transmissions. For real-time
transmissions, the key quality indicator is the probability of delivery within the maximum
allowable time.</p>
      <p>
        Reliability and timeliness of query execution in a redundant information and
communication system (server cluster or switching nodes) can be improved as a result of
redundant service of copies (replicas) of requests with the issuance of one completed
copy (for example, the first issued in time) [
        <xref ref-type="bibr" rid="ref15 ref16">15,16</xref>
        ].
      </p>
      <p>
        Multipath backup service, provides for replication of requests) with the task for each
replica of the path (route) of the sequential passage of nodes, systems [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        The concept of ensuring the timeliness and reliability of the service under
consideration is based on multi-path routing technologies [
        <xref ref-type="bibr" rid="ref13 ref14">13,14</xref>
        ], multicast transmissions,
and broadcast services [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], dynamic query distribution [
        <xref ref-type="bibr" rid="ref18 ref19">18, 19</xref>
        ] and clustering [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>
        The condition for the success of redundant transmissions is that the accumulated
total waiting in the queues of the nodes making up the path does not exceed the
maximum permissible time for at least one of the copies. The quality indicator of real-time
transmission systems is the probability of timely service of requests for inter-machine
exchange and the average time of implementation of such an exchange [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>The purpose of the article is to create an analytical model for estimating the average
delays of multi-path redundant transmissions through a sequence of nodes that make
up the paths when determining the required time for delivery of the first of the replicas
transmitted over different paths.</p>
      <p>
        The developed model is designed to assess the effectiveness and determine the
feasibility of redundant multi-way transmissions depending on the frequency of their
reservation, the intensity of the flow of requests and their criticality to delays in the queues
of nodes making up the reserved paths. Similar problems must be solved in the
modeloriented design of distributed computer systems [
        <xref ref-type="bibr" rid="ref21 ref22 ref23">21-23</xref>
        ], which function in real time,
including distributed image processing and image streaming.
2
      </p>
      <sec id="sec-2-1">
        <title>Multipath Redundant Transmission Model</title>
        <p>Consider a system in which k replicas are created when generating requests for the
transmission of a packet through the network. For each replica, the path of sequential
passage of m network nodes is registered. All paths include the same number of nodes.
When assigning a node to be included in the i-th path, one of the ni nodes is selected.</p>
        <p>
          We represent the nodes of the infocommunication system as single-channel queuing
systems with an infinite queue of type M/M/1 [
          <xref ref-type="bibr" rid="ref24 ref25">24, 25</xref>
          ]. To simplify the model, we
assume that the i-th nodes of all paths are identical as queuing systems.
        </p>
        <p>Taking into account the fact that when passing a certain replica of the next node
included in the path, the margin of the acceptable waiting time decreases on average by
the total average waiting time in the queues of the previous nodes, the probability of
timely delivery when passing all m nodes of the path specified for the replica will be
calculated as</p>
        <p>P = m 1− kvi e nik −v1i t0 − j=i1 wj  </p>
        <p>i=1  ni 
where vi is the average transmission time of the packet replica of the i-th node of the
path, t0 -maximum allowed total waiting time for query replicas in the list of all nodes
on the path, Λ is the intensity of the input stream of requests for packet transmission,
kΛ is the intensity of the reserved input stream of requests for transmission of packet
replicas,  j = k n j is the intensity of the stream of requests arriving at the j-th node,
and wj is the average timeout for request replicas in it.</p>
        <p>wj =  jv j2
1−  v
j j</p>
        <p>The probability of not exceeding the permissible travel time t of all m nodes of the
path, at least for one of the k replicas, provided that the number of nodes included in all
the paths and their characteristics are the same, we calculate as</p>
        <p>R = 1− (1− P)k</p>
        <p>The average delays of multi-path redundant transmissions through a sequence of
communication nodes that make up the paths when determining the desired time for the
first replica delivered from different paths in time</p>
        <p>W = 0 1 − im=1 1 − nkivi e nik −v1i t− j=i1 wj  k dt .
3</p>
        <p>Calculation of the Probability-Time Characteristics of
Redundant Transmissions
In the calculations, we will assume that the average request service time at each node
is v = 0.1 s, and the maximum allowable total waiting time in the queues of all nodes
making up the path is t0 = 0.5 s.</p>
        <p>In Fig. 1 shows the dependence of the probability of timely reserved service on the
intensity of the input request stream Λ, and Fig. 2 on the multiplicity of reservation
requests. In Fig. 1, with the reservation factor k = 1, 2, 3, curves 1-3 correspond to the
path passing through m = 5 nodes, and curves 4-6 through m = 10 nodes. In Fig. 2,
curves 1-5 represent the intensity of the input request stream Λ = 500, 600, 700, 900,
1000 1/s, respectively, at m = 10. The calculations were performed for ni = n = 5 nodes.</p>
        <p>The presented calculations confirm the existence of an optimal multiplicity of
packet reservation critical to the total delay in the queues of the nodes transmitting
them. It can be seen from the graphs that with a reduced load on the system, the
recommended multiplicity of reservation of critical to expect packets, at which the maximum
probability of timely delivery of at least one of the packet replicas is achieved,
increases.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Inter-Machine Exchange of Real Time in Distributed Computer Systems 5</title>
      <p>In Fig. 3 shows the dependence of the average total waiting time in queues of nodes
included in the path, counted until the first replica is delivered along one of the paths,
on the intensity of the input request stream Λ. Fig. 4 shows the dependence of the
indicated time on the multiplicity of reservation requests. In Fig. 3, when the request
reservation ratio is k = 1, 2, 3, curves 1-3 correspond to the path passing through m = 5
nodes, and curves 4-6 through m = 10 nodes. In Fig. 4, curves 1–5 correspond to path
lengths equal to m = 9, 10, 11, 12, 15 nodes at an input request stream intensity Λ = 1
(1/s). The calculations were performed for ni = n = 5 nodes.</p>
      <p>Fig. 1. Dependence of the probability of timely reserved service on the intensity of the input
request stream
The established dependencies confirm the existence of an optimal multiplicity of
reservation critical to the total delay in the request queues. The graphs show that with a
decrease in the system load, the recommended redundancy rate at which the maximum
probability of timely service and the minimum total average wait time in queues of
nodes counted until the first replica is delivered along one of the paths is increased.
4</p>
      <sec id="sec-3-1">
        <title>Conclusion</title>
        <p>For multi-path redundant transmission systems, an analytical model is proposed for
estimating the average total waiting time, counted until the first replica is delivered along
one of the paths.</p>
        <p>For requests critical to delays in queues, the influence of the frequency of
reservation (replication) of requests on the probability of their timely service and on the
average total delay in waiting for delivery of the first replica of time is analyzed.</p>
        <p>The existence of an optimal multiplicity of reservation critical to the total delay in
the request queues is shown.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Inter-Machine Exchange of Real Time in Distributed Computer Systems 7</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. Siddiqi1,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Joung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            5G
            <surname>Ultra-Reliable</surname>
          </string-name>
          Low-Latency
          <source>Communication Implementation Challenges and Operational Issues with IoT Devices Electronics</source>
          <year>2019</year>
          ,
          <volume>8</volume>
          , 981; doi:10.3390/electronics8090981 www.mdpi.com/journal/electronics
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Ji</surname>
          </string-name>
          , H.,
          <string-name>
            <surname>Park</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yeo</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shim</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Ultra-Reliable</surname>
          </string-name>
          and
          <article-title>Low-Latency Communications in 5G Downlink: Physical Layer Aspects</article-title>
          .
          <source>IEEE Wirel. Commun</source>
          .
          <year>2018</year>
          ,
          <volume>25</volume>
          ,
          <fpage>124</fpage>
          -
          <lpage>130</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Sachs</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wikström</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dudda</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baldemair</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kittichokechai</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <article-title>5G Radio Network Design for Ultra-Reliable Low-Latency Communication</article-title>
          .
          <source>IEEE Netw</source>
          .
          <year>2018</year>
          ,
          <volume>32</volume>
          ,
          <fpage>24</fpage>
          -
          <lpage>31</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bennis</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Debbah</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poor</surname>
            ,
            <given-names>H.V.</given-names>
          </string-name>
          <string-name>
            <surname>Ultrareliable</surname>
          </string-name>
          and
          <article-title>Low-Latency Wireless Communication: Tail, Risk and Scale</article-title>
          .
          <source>Proc. IEEE</source>
          <year>2018</year>
          ,
          <volume>106</volume>
          ,
          <fpage>1834</fpage>
          -
          <lpage>1853</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Zakoldaev</surname>
            ,
            <given-names>D.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gurjanov</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shukalov</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zharinov</surname>
            ,
            <given-names>I.O.</given-names>
          </string-name>
          <article-title>Functional safety of cyber-physical production of the Industry 4</article-title>
          .0//IOP Conference Series: Materials Science and Engineering,
          <year>2020</year>
          , Vol.
          <volume>734</volume>
          , No.
          <issue>1</issue>
          , pp.
          <fpage>012110</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Gurjanov</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shukalov</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zakoldaev</surname>
            ,
            <given-names>D.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zharinov</surname>
            ,
            <given-names>I.O.</given-names>
          </string-name>
          <article-title>Develop of reconfigurable manufacturing plant/</article-title>
          /Journal of Physics: Conference Series,
          <year>2020</year>
          , Vol.
          <volume>1515</volume>
          , No.
          <issue>4</issue>
          , pp.
          <fpage>042060</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Krouk</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Semenov</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <article-title>Application of Coding at the Network Transport Level to Decrease the Message Delay //</article-title>
          <source>Proc. of 3rd Intern. Symp. on Communication Systems Networks and Digital Signal Processing</source>
          . Staffordshire University, UK,
          <year>2002</year>
          . pp.
          <fpage>109</fpage>
          -
          <lpage>112</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Kabatiansky</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krouk</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Semenov</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <article-title>Error Correcting Coding and Security for Data Networks. Analysis of the Superchannel Concept</article-title>
          . Wiley,
          <year>2005</year>
          . 288 р
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Sahni</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Varma</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <article-title>A hybrid approach to live migration of virtual machines Proc</article-title>
          .
          <source>IEEE Int. Conf. on Cloud Computing for Emerging Markets (CCEM</source>
          <year>2012</year>
          ) Bengalore India pp
          <fpage>12</fpage>
          -
          <lpage>16</lpage>
          doi: 10.1109/CCEM.
          <year>2012</year>
          .6354587
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Jin</surname>
            ,
            <given-names>H</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shi</surname>
            ,
            <given-names>X</given-names>
          </string-name>
          ,,
          <string-name>
            <surname>Pan</surname>
            <given-names>X. Live</given-names>
          </string-name>
          <article-title>virtual machine migration with adaptive memory compression Proc</article-title>
          .
          <source>IEEE International Conference on Cluster Computing (CLUSTER '09)</source>
          . New Orleans, USA,
          <year>2009</year>
          . Art.
          <volume>5289170</volume>
          . doi:
          <volume>10</volume>
          .1109/CLUSTR.
          <year>2009</year>
          .5289170
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Machida</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kawato</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maeno</surname>
            ,
            <given-names>Y:</given-names>
          </string-name>
          <article-title>Redundant virtual machine placement for fault-tolerant consolidated server clusters</article-title>
          .
          <source>In: IEEE Network Operations and Management Symposium</source>
          , pp.
          <fpage>32</fpage>
          -
          <lpage>39</lpage>
          . IEEE Press, Osaka (
          <year>2010</year>
          ), doi: 10.1109/NOMS.
          <year>2010</year>
          .
          <volume>5488431</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <year>2020</year>
          71-
          <fpage>85</fpage>
          Kim,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Choi</surname>
          </string-name>
          ,
          <string-name>
            <surname>Y.</surname>
          </string-name>
          <article-title>Constraint-aware VM placement in heterogeneous computing clusters</article-title>
          .
          <source>Cluster Comput</source>
          <volume>23</volume>
          ,
          <fpage>71</fpage>
          -
          <lpage>85</lpage>
          (
          <year>2020</year>
          ). https://doi.org/10.1007/s10586-019-02966-6
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Merindol</surname>
            , P. Improving Load Balancing with Multipath Routing / P. Merindol,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Pansiot</surname>
          </string-name>
          , S. Cateloin //
          <source>Proc. of the 17-th International Conference on Computer Communications and Networks</source>
          ,
          <string-name>
            <surname>IEEE ICCCN</surname>
          </string-name>
          <year>2008</year>
          .
          <article-title>-</article-title>
          2008. - P.
          <fpage>54</fpage>
          -
          <lpage>61</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Prasenjit</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tuhina</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Indrajit</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <article-title>Fault-tolerant multipath routing scheme for energy efficient wireless sensor networksInternational Journal of Wireless &amp; Mobile Networks (IJWMN</article-title>
          ) Vol.
          <volume>5</volume>
          , No.2,April 2013 pp
          <fpage>33</fpage>
          -
          <lpage>45</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Bogatyrev</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bogatyrev</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bogatyrev</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          <string-name>
            <surname>Model</surname>
          </string-name>
          and Interaction Efficiency of Computer Nodes Based on Transfer Reservation at Multipath Routing // Wave Electronics and
          <article-title>its Application in Information and Telecommunication Systems (WECONF</article-title>
          <year>2019</year>
          )
          <article-title>-</article-title>
          2019, pp.
          <fpage>8840647</fpage>
          . doi:
          <volume>10</volume>
          .1109/WE-CONF.
          <year>2019</year>
          .8840647
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Bogatyrev</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parshutina</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          <string-name>
            <surname>Redundant</surname>
          </string-name>
          <article-title>Distribution of Requests Through the Network by Transferring Them Over Multiple Paths /</article-title>
          / Communications in Computer and Information Science - 2016, Vol.
          <volume>601</volume>
          , pp.
          <fpage>199</fpage>
          -
          <lpage>207</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Dudin</surname>
            ,
            <given-names>A.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>A multiserver MAP/PH/N system with controlled broadcasting by unreliable servers</article-title>
          .
          <source>Automatic Control and Computer Sciences, No. 5</source>
          , pp.
          <fpage>32</fpage>
          -
          <lpage>44</lpage>
          (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Bogatyrev</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          <article-title>An interval signal method of dynamic interrupt handling with load balancing Automatic Control</article-title>
          and
          <source>Computer Sciences</source>
          <year>2000</year>
          ,
          <volume>34</volume>
          (
          <issue>6</issue>
          ), pp.
          <fpage>51</fpage>
          -
          <lpage>57</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Bogatyrev</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bogatyrev</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Golubev</surname>
            ,
            <given-names>I.Yu.</given-names>
          </string-name>
          <article-title>Optimization and the process of task distribution between computer system clusters / Automatic Control</article-title>
          and
          <source>Computer Sciences</source>
          <year>2012</year>
          ,
          <volume>46</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>103</fpage>
          -
          <lpage>111</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Bogatyrev</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          <string-name>
            <surname>Fault</surname>
          </string-name>
          <article-title>Tolerance of Clusters Configurations with Direct Connection of Storage Devices // Automatic Control</article-title>
          and
          <source>Computer Sciences - 2011</source>
          , Vol.
          <volume>45</volume>
          , No.
          <issue>6</issue>
          , pp.
          <fpage>330</fpage>
          -
          <lpage>337</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Poymanova</surname>
            ,
            <given-names>E.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tatarnikova</surname>
            ,
            <given-names>T. M.</given-names>
          </string-name>
          <string-name>
            <surname>Models</surname>
          </string-name>
          and
          <article-title>Methods for Studying Network Traffic</article-title>
          .
          <source>In 2018 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1109 / WECONF.
          <year>2018</year>
          .8604470
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Kutuzov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tatarnikova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <article-title>On the acceleration of simulation modeling</article-title>
          .
          <source>Proceedings of 22nd International Conference on Soft Computing and Measurements</source>
          ,
          <string-name>
            <surname>SCM</surname>
          </string-name>
          <year>2019</year>
          (
          <year>2019</year>
          ) p.
          <fpage>45</fpage>
          -
          <lpage>47</lpage>
          . DOI:
          <volume>10</volume>
          .1109/SCM.
          <year>2019</year>
          .8903785
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Astakhova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Verzun</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolbanev</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shamin</surname>
            ,
            <given-names>A. A.</given-names>
          </string-name>
          <article-title>Model for estimatingenergy consumption seen when nodes of ubiquitous sensor networks communicate information to each other</article-title>
          .
          <source>In Proceedings of the 10th Majorov International Conference on Software Engineering and Computer Systems</source>
          , Saint Petersburg, Russia, December
          <volume>20</volume>
          -
          <fpage>21</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Kleinrock</surname>
            ,
            <given-names>L. Queueing</given-names>
          </string-name>
          <string-name>
            <surname>Systems: Volume I - Theory</surname>
          </string-name>
          . New York: Wiley Interscience.
          <year>1975</year>
          p.
          <fpage>417</fpage>
          . ISBN 978-0471491101.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Kleinrock</surname>
            ,
            <given-names>L. Queueing</given-names>
          </string-name>
          <string-name>
            <surname>Systems: Volume II - Computer Applications</surname>
          </string-name>
          . New York: Wiley Interscience.
          <year>1976</year>
          p.
          <fpage>576</fpage>
          . ISBN 978-0471491118.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>