<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Redundant Execution Of Latency-Critical</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vladimir A. Bogatyrev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stanislav V. Bogatyrev</string-name>
          <email>stanislav@nspcc.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anatoly V. Bogatyrev</string-name>
          <email>anatoly@nspcc.ru</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>ITMO University</institution>
          ,
          <addr-line>Kronverksky Pr. 49, bldg. A, Saint-Petersburg, 197101</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>JSC NEO Saint Petersburg Competence Center</institution>
          ,
          <addr-line>1-Ya Sovetskaya, house 6 str. St. Petersburg</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Saint-Petersburg State University of Aerospace Instrumentation</institution>
          ,
          <addr-line>67, Bolshaya Morskaia str. St Petersburg</addr-line>
        </aff>
      </contrib-group>
      <fpage>266</fpage>
      <lpage>273</lpage>
      <abstract>
        <p>For computer systems of cluster architecture operating in real-time, criteria for the overall efficiency of servicing requests of traffic that is heterogeneous in terms of criticality to delays are proposed and justified. The possibilities of increasing the overall efficiency of servicing heterogeneous traffic are analyzed. The replication of waiting-critical requests and the division of cluster resources between requests with different limits of acceptable delays are considered as mechanisms for improving service efficiency. The number of cluster nodes (resources) allocated for servicing requests of different criticality to waiting is determined based on the ratio of the allowed waiting time for critical and other requests, the rigidity of the requirements for fulfilling the waiting time limits for them, as well as the ratio of the intensity of receipt of these requests. As a generalized indicator of the efficiency of servicing heterogeneous traffic by a computer cluster, the profit from the provision of information services is selected. An analytical model is proposed and the efficiency of redundant service options with possible separation of cluster nodes for solving requests of different criticality to waiting is determined. It is shown that there is a region of efficiency of reserved servicing of latency-critical requests when dividing cluster nodes into groups designed to service requests of different latency criticality. The expediency of setting and solving the optimization problem of determining the multiplicity of reserving various types of requests and dividing the cluster into groups is shown. Real-time, query replication, cluster, probability of timely maintenance.</p>
      </abstract>
      <kwd-group>
        <kwd>Execution</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Paper template, paper formatting, CEUR-WS</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        For information and communication systems operating in real-time, including as part of
cyberphysical systems [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ], the key is to ensure high reliability and fault tolerance when fulfilling
restrictions on the execution time of the request flow [
        <xref ref-type="bibr" rid="ref5 ref6 ref7 ref8 ref9">5-9</xref>
        ]. In some cases, to support the functional
reliability of computer systems, it is necessary to ensure the continuity of the computing process and
the timeliness of servicing requests in case of accidental failures and malicious influences [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10-12</xref>
        ].
      </p>
      <p>Modern real-time info-communication systems are often characterized by heterogeneity of the flow
of requests in terms of functionality and criticality to reliability and acceptable waiting time.</p>
      <p>For computer systems, the efficiency of functioning is achieved when resources are consolidated as
a result of their association into clusters. For real-time systems, in the case of traffic heterogeneity in
the allowable waiting time, the reliability and timeliness of servicing a set of requests in a cluster can</p>
      <p>
        2021 Copyright for this paper by its authors.
be maintained by prioritizing them, balancing a load of nodes, replicating the most latency-critical
requests, and adaptive allocation of cluster resources for servicing requests of different types [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref14 ref15">11-15</xref>
        ].
      </p>
      <p>The complexity of choosing mechanisms to ensure the timeliness of servicing heterogeneous traffic
in terms of criticality to delays is associated with the justification of the criterion for the effectiveness
of servicing a set of different types of requests. The criterion should contribute to the justification of
the decision on the choice of the discipline of servicing requests of heterogeneous traffic, so that, based
on a compromise, to ensure the overall efficiency of servicing requests of different criticality to delays.</p>
      <p>The purpose of this article is to justify the choice of efficiency criteria and to study the possibilities
of increasing the overall (vector) efficiency of servicing requests of heterogeneous traffic.</p>
      <p>The replication of waiting-critical requests and the division of cluster resources between requests
with different limits of acceptable delays are considered as mechanisms for improving service
efficiency.</p>
      <p>The number of cluster nodes (resources) allocated for servicing requests of different criticality to
waiting is determined based on the ratio of the allowed waiting time for critical and other requests, the
rigidity of the requirements for fulfilling the waiting time limits for them, as well as the ratio of the
intensity of receipt of these requests.
2. Criteria for the Effectiveness of Reserved Services</p>
      <p>Let's analyze the options for organizing redundant request servicing in a cluster containing n
identical computer nodes (servers), with and without distributing its resources between requests of
different criticality to waiting in the queue.</p>
      <p>Consider heterogeneous traffic with the allocation of z types (streams) of requests for which the
allowed waiting times in queues are t1, t2,…, tz,, and their shares are equal to g1, g2, … , gz, while
z
 gi  1.</p>
      <p>i1</p>
      <p>
        The efficiency of real-time servicing of requests of the i-th stream is determined by the probability
of not exceeding the expectation of the maximum allowable time ti [
        <xref ref-type="bibr" rid="ref16">16-19</xref>
        ].
      </p>
      <p>
        Determining the efficiency of servicing a total heterogeneous flow is associated with finding a
compromise to resolve the contradiction of achieving the efficiency of servicing all flows [
        <xref ref-type="bibr" rid="ref16">1 6-19</xref>
        ].
      </p>
      <p>The efficiency of servicing a heterogeneous flow of requests in [19] is determined by the probability
that waiting in the queue for requests of each of the z types does not exceed the maximum allowable
time for each of them ti,
z
Pм   Pi . ,
i1</p>
      <p>Such a criterion allows us to reduce the vector problem of evaluating the total efficiency by a
multiplicative scalar criterion, but its application is limited to the case of the same importance of the
probability of timely servicing of all types of traffic requests. The criterion does not allow taking into
account the probabilities of requests of different criticality to the waiting time.</p>
      <p>The scalar criterion allows us to take into account the influence of the probabilities of various types
of requests for heterogeneous traffic on the final probability of timely servicing of the total flow
z
А   gi Pi ,
i1
corresponding to the mathematical expectation of the probability that any type of request of an
inhomogeneous stream will be executed in a timeless than the maximum allowable time for it ti, it is
possible to modify the last additive scalar criterion in the form
z
А   i gi Pi ,
1</p>
      <p>i1
where αi -sets the importance of timely servicing of requests of the i-th stream</p>
      <p>The profit from the provision of information services can be chosen as a generalized indicator of the
efficiency of the system's functioning. So, if the profit from timely servicing of the request of the j-th
stream is cj, and the penalties for late servicing are sj, then the mathematical expectation of profit from
executing one request and receiving profit per unit of time from providing information services (profit
intensity) of the total flow will be [18]
3. Evaluation of the Efficiency of Reserving Wait-Critical Requests in a Cluster
without Splitting Nodes into Groups</p>
      <p>The cluster is represented by a set of n single-channel queuing systems with infinite queues of the
M/M/1 type [20, 21]. Under such assumptions, the probability that the delay in the queue of an unserved
request of the i-th thread is less than the maximum allowable time ti for the average execution time of
requests of all z types equal to v is calculated as
where ...</p>
      <p>z
0   ki gi .</p>
      <p>i1</p>
      <p>Let's distinguish two gradations of requests in the heterogeneous flow according to criticality to
expectation - critical and non-critical. Critical requests are duplicated, non-critical requests are not
replicated. The share of critical requests g.</p>
      <p>The profit per unit of time from the provision of information services is calculated as
С  g c1P1  s1 1 P1   1 g  c2P2  s2 1 P2  .</p>
      <p>If there is no replication of requests, then P1 and P2 are determined by (1).</p>
      <p>If only critical requests are duplicated, then</p>
      <p>Pi  1</p>
      <p>n
 v e n 1v  i
t
(1)</p>
      <p>The dependence of the intensity of the profit received when servicing requests of the total flows on
their intensity Λ without dividing n=12 cluster nodes into groups is shown in Fig.1. The calculations
were performed at the average query execution time v=0.01 s and the maximum allowable waiting time
for critical queries t1=0.01 s and non-critical queries t2=0.1 s. The values of profit and penalties for
timely and untimely servicing of requests of various criticality to waiting are set as c1=2, y. e. c2=0.2 y.</p>
      <p>P2  1</p>
      <p> (12g)1v  2 .
(1 2g)v e n t
n
e., s1=-3, y. e. s2=-0.02 y. e. Curves 1-3 correspond to the duplication of critical requests with the
proportions of critical requests g =0.7, 0.5, 0.2. It can be seen from the graphs that there are areas of
efficiency of duplicated requests that are prone to waiting. At the same time, as the intensity of the total
flow of requests increases, this efficiency first increases, and then begins to fall. At the same time, there
is a value of Λ, above which duplication of critical requests becomes impractical. Indeed, the replication
of waiting-critical requests causes an increase in the overall cluster load and a decrease in the probability
of timely servicing of non-critical requests, which can lead to a decrease in the intensity of profit from
the provision of information services.
4. Maintenance with the Separation of Cluster Nodes Between Requests of
Different Criticality to Waiting</p>
      <p>Let's analyze the efficiency of dividing the cluster into two groups, including n1 and n-n1 nodes, the
first of which is allocated for servicing critical waiting requests, and the second for the remaining
requests.</p>
      <p>The probability of timely execution of critical and non-critical waiting requests without their
replication will be:</p>
      <p>P  1 
1</p>
      <p>n1
gv1 e n1g v11 t1 ,</p>
      <p>
P2  1 </p>
      <p> (1g)v12 t2 .
1  g  v2 e nn1
n  n1
The profit per unit of time from the provision of information services is calculated as
С   g c1P1  s1 1  P1   1  g  c2 P2  s2 1  P2  .</p>
      <p>The dependence of the profit intensity when servicing total flow requests on their intensity Λ with
and without dividing n=12 cluster nodes into groups is shown in Fig.2. Fig. 2 a reflects the case when
the proportion of critical requests is g=0.7 and Fig. 2 b when g=0.1. The calculations are performed at
g=0.7, the average query execution time is v=0.01 s, and the maximum allowable waiting time for
critical requests is t1=0.01 s, and for non-critical t2=0.05 s. In this case, c1=2 y. e., c2=0.2 y. e., s1=-3, y.
e. s2=-0.02 y. e. Curve 1 corresponds to a cluster without dividing nodes into groups. Curves 1-6
correspond to the allocation for servicing the waiting-critical requests n1=2, 3, 4, 7, 8 nodes. From the
presented dependencies, it is clear that there is an area for which it is advisable to divide the cluster
resources into groups. With an increase in the intensity of the total flow of requests, the growth and
then the fall in profits from the provision of information services is visible first. The presented graphs
show the significance of the influence of the number of nodes allocated to groups on the overall
efficiency of servicing heterogeneous traffic. Moreover, some options for splitting the cluster may not
be effective compared to the basic option without dividing the cluster into groups.</p>
      <p>The dependence of the intensity of the profit received when servicing requests of the total flow on
the number of nodes allocated for servicing latency-critical requests is shown in Fig. 3. The calculation
was carried out for the previously specified initial data with the proportion of requests critical to delays
g=0.7, t1=0.01 s, t2=0.05 s. Curves 1-5 correspond to the intensities of the total flow Λ=600, 500, 400,
350, 200 1/s. To compare the efficiency of group allocation, Figure 2 shows the values of the profit
intensity without dividing the cluster into groups, while lines 6 and 7 correspond to Λ=600 1/s and Λ=
200 1/s. These dependencies confirm the effectiveness of dividing the cluster into groups when there is
an optimal variant of allocating cluster resources that allows you to get maximum profit from the
provision of information services.</p>
      <p>The presented dependencies allow us to conclude that reserving the most critical requests for delays
in queues can significantly increase the efficiency of servicing not only these requests but also the total
flow as a whole. It is shown that varying the number of cluster nodes included in the group for servicing
critical requests makes it possible to increase the efficiency of providing services both critical to delays
in request queues and the entire total flow. Thus, the expediency of setting and solving the optimization
problem of determining the multiplicity of reserving requests and dividing the cluster into groups to
maximize the probability of timely execution of requests of a heterogeneous flow is shown.</p>
    </sec>
    <sec id="sec-3">
      <title>5. Conclusions</title>
      <p>For computer systems of cluster architecture operating in real-time, efficiency criteria are proposed
and the possibilities of increasing the overall efficiency of servicing requests of heterogeneous traffic
are shown based on the replication of waiting-critical requests and the allocation of a group of nodes
for their servicing of certain types of requests for acceptable waiting delays.</p>
      <p>An analytical model is proposed and the efficiency of redundant service options is determined with
the possible allocation of cluster nodes to solve the most critical waiting requests in queues.</p>
      <p>It is shown that there is a region of efficiency of reserved servicing of latency-critical requests when
dividing cluster nodes into groups designed to service requests of different latency criticality.
Sequence of Info-Communication Nodes. Lecture Notes in Computer Science (including subseries
Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2020. Vol. 12563. pp.
100-112. DOI 10.1088/1742-6596/1864/1/012094.
[17] V.A. Bogatyrev, S.V. Bogatyrev A.N. Derkach, Timeliness of the Reserved Maintenance by
Duplicated Computers of Heterogeneous Delay-Critical Stream. CEUR Workshop Proceedings.
2019. Vol. 2522. pp. 26-36.
[18] V.A. Bogatyrev, S.V. Bogatyrev, A.V. Bogatyrev, Replication of requests when dividing
cluster nodes between threads of different criticality to delays in queues CEUR Workshop
Proceedingsthis link is disabled, 2020, 2893
[19] V.A. Bogatyrev, S.V. Bogatyrev, A.V. Bogatyrev, Redundant multi-path service of a flow
heterogeneous in delay criticality with defined node passage paths // Journal of Physics: Conference
Series, Volume 1864, 13th Multiconference on Control Problems (MCCP 2020) 6-8 October 2020,
Saint Petersburg, Russia 2021 J. Phys.: Conf. Ser. 1864 012094 - 2021, Vol. 1864, 012094, No. 1,
pp. 012094
[20] Kleinrock, L. Queueing Systems: Volume I. Theory. New York: Wiley Interscience. 1975
p. 417.
[21] Kleinrock, L. Queueing Systems: Volume II. Computer Applications. New York: Wiley
Interscience. 1976 p. 576.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>I. Koren</surname>
          </string-name>
          ,
          <article-title>Fault-tolerant systems</article-title>
          . Morgan Kaufmann publications, San Francisco 2009 378 p.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>H.</given-names>
            <surname>Aysan</surname>
          </string-name>
          ,
          <article-title>Fault-tolerance strategies and probabilistic guarantees for real-time systems Mälardalen University</article-title>
          , Västerås, Sweden.
          <year>2012</year>
          . 190 p.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>T.</given-names>
            <surname>Astakhova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Verzun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kolbanev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shamin</surname>
          </string-name>
          ,
          <article-title>A model for estimating energy consumption seen when nodes of ubiquitous sensor networks communicate information to each other</article-title>
          .
          <source>In Proceedings of the 10th Majorov International Conference on Software Engineering and Computer Systems</source>
          , Saint Petersburg, Russia, December
          <volume>20</volume>
          -
          <fpage>21</fpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.A.</given-names>
            <surname>Zakoldaev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.G.</given-names>
            <surname>Korobeynikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Shukalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.O.</given-names>
            <surname>Zharinov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.O.</given-names>
            <surname>Zharinov</surname>
          </string-name>
          ,
          <article-title>Industry 4.0 vs Industry 3.0: the role of personnel in production/</article-title>
          /IOP Conference Series: Materials Science and Engineering,
          <year>2020</year>
          , Vol.
          <volume>734</volume>
          , No.
          <issue>1</issue>
          , pp.
          <fpage>012048</fpage>
          . DOI 10.1088/
          <fpage>1757</fpage>
          -899X/734/1/012048
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lanctot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Unified</given-names>
            <surname>Game-Theoretic Approach</surname>
          </string-name>
          to Multiagent Reinforcement Learning / M. Lanctot et al. /
          <source>/ Advances in Neural Information Processing Systems</source>
          . - 2017. -
          <fpage>Р</fpage>
          .
          <fpage>4190</fpage>
          -
          <lpage>4203</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bennis</surname>
          </string-name>
          ,
          <string-name>
            <surname>M Debbah</surname>
          </string-name>
          ,.; Poor,
          <string-name>
            <given-names>H.V.</given-names>
            <surname>Ultrareliable</surname>
          </string-name>
          and
          <article-title>Low-Latency Wireless Communication: Tail, Risk, and Scale</article-title>
          .
          <source>Proc. IEEE</source>
          <year>2018</year>
          ,
          <volume>106</volume>
          ,
          <fpage>1834</fpage>
          -
          <lpage>1853</lpage>
          . DOI:
          <volume>10</volume>
          .1109/JPROC.
          <year>2018</year>
          .
          <volume>2867029</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>H.</given-names>
            <surname>Ji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Yeo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Shim</surname>
          </string-name>
          , Ultra-Reliable and
          <article-title>Low-Latency Communications in 5G Downlink: Physical Layer Aspects</article-title>
          .
          <source>IEEE Wirel. Commun</source>
          .
          <year>2018</year>
          ,
          <volume>25</volume>
          ,
          <fpage>124</fpage>
          -
          <lpage>130</lpage>
          . DOI:
          <volume>10</volume>
          .1109/MWC.
          <year>2018</year>
          .
          <volume>1700294</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Sachs</surname>
          </string-name>
          , G. Wikström, T. Dudda,;,
          <string-name>
            <given-names>R.</given-names>
            <surname>Baldemair</surname>
          </string-name>
          .
          <article-title>; K. Kittichokechai, 5G Radio Network Design for Ultra-Reliable Low-Latency Communication</article-title>
          .
          <source>IEEE Netw</source>
          .
          <year>2018</year>
          ,
          <volume>32</volume>
          ,
          <fpage>24</fpage>
          -
          <lpage>31</lpage>
          . DOI:
          <volume>10</volume>
          .1109/MNET.
          <year>2018</year>
          .1700232
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Samarasinghe</surname>
          </string-name>
          ,
          <source>Neural Networks for Applied Sciences and engineering:</source>
          from Fundamentals to Complex Pattern Recognition /
          <string-name>
            <given-names>S.</given-names>
            <surname>Samarasinghe</surname>
          </string-name>
          . - Boston: Auerbach publications,
          <year>2016</year>
          . - 570 p.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>M. Siddiqi1</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Joung</surname>
          </string-name>
          , 5G
          <string-name>
            <surname>Ultra-Reliable</surname>
          </string-name>
          Low-Latency
          <source>Communication Implementation Challenges and Operational Issues with IoT Devices Electronics</source>
          <year>2019</year>
          ,
          <volume>8</volume>
          , 981; doi:10.3390/electronics8090981
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>I S.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Choi</surname>
          </string-name>
          ,
          <article-title>Constraint-aware VM placement in heterogeneous computing clusters</article-title>
          .
          <source>Cluster Comput</source>
          <volume>23</volume>
          ,
          <fpage>71</fpage>
          -
          <lpage>85</lpage>
          (
          <year>2020</year>
          ). https://doi.org/10.1007/s10586-019-02966-6.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>B.</given-names>
            <surname>Sovetov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Tatarnikova</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
          <article-title>Cehanovsky, a Detection system for threats of the presence of the hazardous substance in the environment</article-title>
          .
          <source>Proceedings of 2019 22nd International Conference on Soft Computing and Measurements</source>
          ,
          <string-name>
            <surname>SCM</surname>
          </string-name>
          <year>2019</year>
          (
          <year>2019</year>
          )
          <fpage>121</fpage>
          -
          <lpage>124</lpage>
          . DOI:
          <volume>10</volume>
          .1109/SCM.
          <year>2019</year>
          .
          <volume>8903771</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>E.D.</given-names>
            <surname>Poymanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. M.</given-names>
            <surname>Tatarnikova</surname>
          </string-name>
          ,
          <article-title>Models and Methods for Studying Network Traffic</article-title>
          .
          <source>In 2018 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1109 / WECONF.
          <year>2018</year>
          .8604470
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sahni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Varma</surname>
          </string-name>
          ,
          <article-title>A hybrid approach to live migration of virtual machines //</article-title>
          <source>Proc. IEEE Int. Conf. on Cloud Computing for Emerging Markets (CCEM</source>
          <year>2012</year>
          ). Bangalore, India,
          <year>2012</year>
          . P.
          <volume>12</volume>
          -
          <fpage>16</fpage>
          . DOI:
          <volume>10</volume>
          .1109/CCEM.
          <year>2012</year>
          .6354587
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>V.</given-names>
            <surname>Malik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.R.</given-names>
            <surname>Barde</surname>
          </string-name>
          ,
          <article-title>Live migration of virtual machines in cloud environment using prediction of CPU usage //</article-title>
          <source>International Journal of Computer Applications</source>
          .
          <year>2015</year>
          . V. 117
          <string-name>
            <surname>N</surname>
          </string-name>
          23. P. 1-
          <fpage>5</fpage>
          . DOI:
          <volume>10</volume>
          .5120/
          <fpage>20691</fpage>
          -
          <lpage>3604</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V.A.</given-names>
            <surname>Bogatyrev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Bogatyrev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.V.</given-names>
            <surname>Bogatyrev</surname>
          </string-name>
          ,
          <article-title>Redundant Servicing of a Flow of Heterogeneous Requests Critical to the Total Waiting Time During the Multi-path Passage of a</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>