<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Method of Forming Complex Services in Networks using Virtualization Technology of Network Functions</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Yurii</forename><surname>Khlaponin</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Kyiv National University of Construction and Architecture</orgName>
								<address>
									<addrLine>Povitriflotskyi ave., 31</addrLine>
									<postCode>03037</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Muhi-Aldin</forename><surname>Hassan</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Al Iraqia University</orgName>
								<address>
									<addrLine>22 hayba Katoon str</addrLine>
									<postCode>7366</postCode>
									<settlement>Haifaa, Baghdad</settlement>
									<country key="IQ">Iraq</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alexander</forename><surname>Nikitchyn</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>Volodymyrska str., 60</addrLine>
									<postCode>01033</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Method of Forming Complex Services in Networks using Virtualization Technology of Network Functions</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">DDADAB1C3A41AC644F09B52896460817</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T05:30+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Network functions virtualization (NFV)</term>
					<term>virtual network</term>
					<term>complex service</term>
					<term>Quality of Service (QoS)</term>
					<term>atomic services</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>NFV technology allows you to replace physical network devices with certain functions with their software image as virtual network devices that perform the same functions on public server equipment. In order to cover the whole range of solutions for providing the required quality of service, it is necessary to develop a method for increasing the QoS level, in the absence of services with the required level of quality of service. In order to solve the problem, a mathematical method for the formation of a distributed complex service based on the information on available atomic services in the network is proposed. The proposed method allow to increase the reliability and performance of the requested services. Applying the method of forming a distributed service and a method to increase the reliability of the service will allow to supplement and improve the mechanism of formation of services with the required quality indicators, increase the number of better services in the network, reduce the load of services with high PCs through the use of services with lower values of parameters QoS.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>NFV technology allows you to replace physical network devices with certain functions with their software image as virtual network devices that perform the same functions on public server equipment. Physical network devices, in this case, can be switches, routers, etc., which performed the physical function of switching, routing, etc. Virtual network devices perform virtual network functions of switching, routing, etc. NFV technology originated among non-traditional methods of network development and is designed to overcome a number of limitations in the development of communication networks (flexibility, scaling, administration, etc.) and add additional benefits to this development (freedom of equipment choice, speed and efficiency, flexibility, etc.).</p><p>Interaction of computers with each other, as well as with other active network equipment, in TCP / IP-networks is organized on the basis of the use of network services, which are provided by special processes of the network operating system (OS). A network service provides network users with a set of services, also called a network service. Examples of network services are web servers (World Wide Web sites), e-mail, FTP servers for file sharing, and more.</p><p>In accordance with the recommendations of RFC 7149 and IETF P1904. CEUR Workshop Proceedings (CEUR-WS.org)</p><p>In order to cover the full range of solutions to ensure the required quality of service, it is necessary to develop a method of increasing the level of QoS in the absence of services with the required level of service quality. The maintenance of the required quality indicators often amounts to solving the optimization problem in the formation of services <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b9">10]</ref>.</p><p>In that case, if the complex service satisfying the given restrictions will not be found in the selection of its composite (atomic services), which allow to form. In order to cover the whole range of solutions for providing the required quality of service, it is necessary to develop a method for increasing the QoS level, in the absence of services with the required level of quality of service. In order to solve the problem, a mathematical method for the formation of a distributed complex service based on the information on available atomic services in the network is proposed.</p><p>At the heart of the proposed method is the idea of forming an complex service consisting of several services from a multitude of available services whose quality indicators are below the set standards, the simultaneous use of which will increase the availability of the service:</p><formula xml:id="formula_0">CS i ⸦CS, CS l = { CS 1 , CS 2 , … ,CS i , … , CS n }, CS i = { S w , S w+1 , … ,S w+y },</formula><p>where inumber of complex services in the set CS, wservice number in the selected subset of atomic services CS i , znumber of services in a subset of atomic services CS i , yany number from 1 to ( zw), while the situation is possible when CS i ∩CS i+1 ≠ ∅, Sfunctionally equivalent services. Distributed complex service can be represented as a combination of a variety of services P i . In this case, QoS parameters of atomic services P i may have values lower than the required ones, however, due to their simultaneous use, the aggregate performance indicators of the distributed service increase.</p><p>The method of forming a distributed service allows you to create a service with specified values of quality parameters in the case when there is no service with the required quality indicators in the network with support for virtualization technology. This algorithm is below.</p><p>The values of the considered QoS parameters are represented by the set L. Information on the QoS indicators of atomic services is extracted from the modified UDDI register <ref type="bibr" target="#b0">[1]</ref>.</p><p>The set Q represents the value of the QoS parameter, which does not meet the user's requirements. The set Q belongs to the set L, Q ⸦ L. The set Z also belongs to the set L, Z ⸦ L, and includes all the parameters of this set, except for the parameter belonging to the set Q, Z = L \ Q. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Pseudocode for Forming a Complex CS Service</head><formula xml:id="formula_1">i = i + 1 "; else if f &gt; 0 then if f &gt; 1</formula><p>then QoS generation for a set of S-compliant services SLA req = {Cost req , T req , R req , S req , Av req }; Rationing of values R; Deciding on the provision of a comprehensive CS service; Formation of information on access to a comprehensive CS service; else Generation of a message about the impossibility of providing the service to the user The end.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Results and Discussion</head><p>The set H and G belong to the set L, G ⸦ L, H ⸦ L, Z ∪ H = L. The set H includes the PCs that need to be maximized, and the set G includes quality indicators that need to be minimized.</p><p>User requirements for quality of service are represented by many SLA req = {Cost req , T req , R req , S req , Av req }. Search of all CS of this service without taking into account quality indicators should be carried out in the event that at the request of the user the service with necessary PCs is not found in a network.</p><p>Further, the integral QoS indices of the selected integrated service are compared with the requirements of the quality of service provided by the set SLA req .</p><p>In the case where the QoS parameter tends to maximize its values, then the comparison is performed as follows:</p><formula xml:id="formula_2">M K sum ≥ M K (SLA req ) Otherwise, K ⸦ G: M K sum ≥ M K (SLA req ).</formula><p>If satisfies the M K sum requirements for the QoS parameter that belongs to the set K, then the other QoS parameters, which belong to the set Z, are checked. This action is necessary in order for the selected complex service not only to have quality characteristics not lower than the required parameters, but also retained the value the remaining parameters within the required limits. In case if Z j this parameter QoS belongs to the set H (Z j ⸦ H), then the comparison takes place as follows:</p><formula xml:id="formula_3">M Dj sum ≥ M Dj (SLA req )</formula><p>Otherwise, Z j ⸦ H: M Dj sum ≥ M Dj (SLA req ).</p><p>In the event that the integral values of the quality indices from the set Z are lower than the required ones, then the following subset of the services CS i selected from the set is checked. In the opposite case, the service i is stored in the set CS1.</p><p>If there are unchecked subsets in the CS set, the verification process continues. Otherwise, an analysis of the formed set of CS1 is performed.</p><p>If the set CS1 is empty, a message is sent to the user about the absence of a network service with the required PC. If the CS1 set consists of one service, then the user is provided with the address of this service.</p><p>In the event that the CS1 set includes more than one S service, then the calculation procedure for the service with the best parameters is performed.</p><p>In the first stage, a matrix of quality QoSM services is created which are included in the set of CS1 and the vector of SLA_VEC with the requirements of the user on the quality of service: SLA_VEC = SLA req = {Cost req , T req , R req , S req , Av req }, where fthe number of services in the set CS1, i -the service number in the set CS1, j -the number of the QoS parameter in the set L, and 1 -the number of QoS parameters in the set L.</p><p>Next, the normalization of the PC of the matrix QoSM and the vector SLA_VEC is performed. The next step is to calculate the Euclidean distance between the vectors CS1 and SLA_VEC: dis (CS1 t , SLA_VEC) =√∑ l a=1 (CS1 t a -SLA_VEC a ) 2 .</p><p>In the event that for the user some parameters are more important than others, then when comparing services, this priority is taken into account using the weighting factor represented by the vector K, K={k 1 , k 2 , … , k a , … , k l }: dis (CS1 t , SLA_VEC) =√∑ l a=1 (CS1 t a -SLA_VEC a ) 2 *k i .</p><p>In the next step, the CS1 service with a minimum Euclidean distance is determined. Further, the address of the selected service is provided to the user.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusion</head><p>The proposed method allow to increase the reliability and performance of the requested services. Applying the method of forming a distributed service and a method to increase the reliability of the service will allow to supplement and improve the mechanism of formation of services with the required quality indicators, increase the number of better services in the network, reduce the load of services with high PCs through the use of services with lower values of parameters QoS.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>3 ,</head><label>3</label><figDesc>as well as several other recommendations [2-4, 9], for the assessment of quality indicators for integrated services, it is suggested to use a set of indicators: • The cost of providing a comprehensive service Cost(s) • Response time when forming an integrated service T(s) • Reliability of the service R(s) • Availability of service Av(s) Emerging Technology Trends on the Smart Industry and the Internet of Things, January 19, 2022, Kyiv, Ukraine EMAIL: y.khlaponin@gmail.com (Y. Khlaponin), hassan.mohialdeen88@gmail.com (H. M Muhi-Aldin), nikan@ukr.net (A. Nikitchyn) ORCID: 0000-0002-9287-0817 (Y. Khlaponin), 0000-0002-9287-0817 (H. M Muhi-Aldin), 0000-0001-7256-433X (A. Nikitchyn) ©️ 2021 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Effect of Weighting Scheme to QoS Properties in Web Service Discovery</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">O</forename><surname>Agushaka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Lawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Bagiwa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Abdullahi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Science and Information Security</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="92" to="100" />
			<date type="published" when="2010-03">March 2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">An evaluation of load distribution between servers&apos; platforms inside a data center</title>
		<author>
			<persName><forename type="first">Hassan</forename><surname>Mohamed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Muhi-Aldeen ;</forename><surname>Hassan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mohamed</forename><surname>Muhi-Aldeen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Abdulghafoor</forename><surname>Raed Yahya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM)</title>
				<editor>
			<persName><forename type="first">O</forename><forename type="middle">B</forename><surname>Tkachova</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2017-02">February, 2017</date>
			<biblScope unit="page" from="357" to="359" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Symbolic Model Checking for Realtime Systems</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">A</forename><surname>Henzinger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Nicollin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Sifakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yovine</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Inf. Comput</title>
		<imprint>
			<biblScope unit="volume">111</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="193" to="244" />
			<date type="published" when="1994-06">1994. June</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Communicating Sequential Processes / C. A</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">A R ;</forename><surname>Hoare</surname></persName>
		</author>
		<author>
			<persName><surname>Hoare</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Commun. ACM</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="666" to="677" />
			<date type="published" when="1978">1978</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">QoS-aware Middleware for Web Services Composition</title>
		<author>
			<persName><forename type="first">L</forename><surname>Zeng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Benatallah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Software Engineering</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="311" to="327" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Five nines of southbound reliability in software-defined networks</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">J</forename><surname>Ros</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">J</forename><surname>Ros</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename></persName>
		</author>
		<idno>-2014. -P. 31-36</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, ser. HotNFV &apos;14</title>
				<meeting>the Third Workshop on Hot Topics in Software Defined Networking, ser. HotNFV &apos;14<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">FlowVisor: A Network Virtualization Layer</title>
		<author>
			<persName><forename type="first">R</forename><surname>Sherwood</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sherwood</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Gibb</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">K</forename><surname>Yap</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Appenzeller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Casado</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Mckeown</surname></persName>
		</author>
		<idno>-18 р</idno>
		<ptr target="http://archive.openflow.org/downloads/technicalreports/openflow-tr-2009-1-flowvisor.pdf" />
	</analytic>
	<monogr>
		<title level="m">Open Networking Foundation</title>
				<meeting><address><addrLine>-CA, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
	<note>Electronic resource</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Depth first search and linear graph algorithms / Tarjan R</title>
		<author>
			<persName><forename type="first">R</forename><surname>Tarjan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SIAM Journal on Computing</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="146" to="160" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A software reliability model for Web services</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">T</forename><surname>Tsai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">T</forename><surname>Tsai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Paul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Liao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The 8th IASTED International Conference on Software Engineering and Applications</title>
				<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Methods for assessing the impact of bandwidth of control channels on the quality of telecommunications networks in the transmission of data packets of different types</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Khlaponin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Mohialdeen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Berkman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename></persName>
		</author>
		<idno>-P. 220-229</idno>
		<ptr target="https://www.ijcnis.org/index.php/ijcnis/article/view/5034" />
	</analytic>
	<monogr>
		<title level="m">International Journal of Communication Networks and Information Security (IJCNIS)</title>
				<editor>
			<persName><forename type="first">K</forename><surname>Zaika</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">O</forename><surname>Konstiantyn</surname></persName>
		</editor>
		<editor>
			<persName><surname>Turovsky</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
