<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Fog  Computing  Architecture  and  Their  Analytical  Models  in  Solving Problem Flows taking into account Failures and Features  of Functioning </article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Aleksandr Matov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute for Information Recording of National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>2, Mykoly Shpaka Street, Kyiv, 03113</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>133</fpage>
      <lpage>146</lpage>
      <abstract>
        <p>   Foggy computing complements cloud computing, bringing data processing and storage nodes closer to users. By reducing traffic, this avoids many of the problems in traditional cloud infrastructures that can arise when zettabyte data needs to be moved. At the same time, the delivery time of user task solutions is reduced. Analytical models of nebulous computing are proposed to calculate characteristics using many flows and many priorities of applications for tasks, different service disciplines and their combinations, taking into account failures and different disciplines of additional service and accumulation in queues for recovery.</p>
      </abstract>
      <kwd-group>
        <kwd> 1  Reference architecture</kwd>
        <kwd>nebulous computing infrastructure</kwd>
        <kwd>node characteristics</kwd>
        <kwd>failures</kwd>
        <kwd>priority service disciplines</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>1. Introduction 
The developer of this relatively new nebulous computing technology is the OpenFog Consortium
International Consortium. To the clouds - in order to bring these resources closer to end users and speed
up decision-making processes. The OpenFog Reference Architecture (OpenFog RA) is designed for a
specific class of business tasks for which cloud structures, or intelligent boundary devices, are in
themselves inefficient. It complements the traditional model of cloud computing, ensuring the
performance of their inherent functions at different levels of the network topology while maintaining
such technological advantages as virtualization, containerization, orchestration, controllability,
efficiency. Eight basic technological ones are briefly considered. principles (Pillars) of the OpenFog
RA architecture, which characterize the belonging of systems to the OpenFog class: security,
scalability, openness, autonomy, programmability, operability and maintainability, adaptability,
hierarchy.</p>
      <p>
        The development of mathematical models of nebulous calculations is an important area for
identifying and improving their characteristics. The stochastic nature of the main factors and the need
to quantify mass processes based on probability theory determines the use of queuing theory. Models
of operation of nodes (Fog Nodes) with adaptation to failures are characterized by the following
parameters: input flow of applications and flow of failures of nodes; discipline of application service;
discipline of renewal of service of applications after restoration of the refused site; discipline of
accepting applications to the queue during this recovery. The combination of one of the disciplines of
service with one of the disciplines of renewal of service after the restoration of the failed node, and the
behavior of the application, the service of which was interrupted by denial, sets the conditions for
independent models. Six such models are considered. The models use an arbitrary law of distribution
of random values of maintenance and node recovery, which provides additional opportunities in the
study of specific nebulous calculations. The considered models are suitable for the analysis of not only
nebulous but also boundary (peripheral, extreme) nodes, as well as logically isolated executive
environments of different users of nebulous and boundary nodes. Models are based on works [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3–5</xref>
        ].
2. The concept of nebulous computing 
The concept of fog computing was formulated about ten years ago by Cisco Systems and provided for
the expansion of cloud computing to the boundaries of the network. Foggy calculations complemented
the centralized cloud model. The main meaning of nebulous calculations is to bring functional nodes
closer to users. Bringing data processing and storage closer to end users allows you to solve many
problems that arise with the exponential growth of the number of devices connected to the network.
      </p>
      <p>In 2015, the international consortium OpenFog Consortium was established. Among the founders
of the OpenFog Consortium - ARM Holdings, Cisco, Dell, Intel, Microsoft and Princeton University.</p>
    </sec>
    <sec id="sec-2">
      <title>Now it consists of about 60 organizations.</title>
      <p>
        In February 2017, the consortium proposed a reference architecture for fog computing: OpenFog
Reference Architecture [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The new IEEE 1934 standard regulates the use of reference architecture as
a universal technology platform to support applications that require processing huge amounts of data,
including the Internet of Things (IoT), the Industrial Internet of Things (IIoT), and artificial intelligence,
      </p>
    </sec>
    <sec id="sec-3">
      <title>5G networks and a number of other modern technologies [1].</title>
      <p>According to the consortium, digital innovations of the modern world – IoT, artificial intelligence,
virtual reality, tactile Internet, 5G networks - can radically change production processes, business and
people's lives. However, moving zetatabyte volumes of data generated by connected businesses,
buildings, hospitals, and cars can lead to many problems in traditional cloud infrastructures.</p>
      <p>
        The transfer of huge amounts of data to the clouds, their processing, the formation of control effects
and their delivery in a reasonable time require very high productivity from cloud resources and the
widest bandwidth from the network infrastructure. However, the construction, maintenance and
development of such systems is associated with huge costs.
3. Foggy computing architecture 
The reference architecture of nebulous computing complements the traditional model of cloud
computing, ensuring the performance of their inherent functions at different levels of the network
topology while maintaining such technological advantages as virtualization, containerization,
orchestration, controllability, efficiency. This architecture eliminates the limitations of centralized
cloud solutions, providing the necessary resources and communication channels for specific tasks [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>The OpenFog Reference Architecture (OpenFog RA) is focused on a class of business tasks for
which cloud structures or intelligent boundary devices alone are not efficient enough. It complements
the traditional model of cloud computing, ensuring the performance of their inherent functions at
different levels of the network topology while maintaining such technological advantages as
virtualization, containerization, orchestration, controllability, efficiency.</p>
      <p>
        The OpenFog RA architecture is based on eight basic technological principles (Pillars), which
characterize the belonging of systems to the OpenFog class: security, scalability, openness, autonomy,
programmability, operability and maintainability, adaptability, hierarchy [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
      <p>The OpenFog RA architecture allows you to create computing environments equipped with a wide
range of security features that are used in all their components - from "things" and IoT devices to
nebulous structures and cloud environments. Infrastructure protection has a set of requirements that
must be met when developing solutions based on a reference architecture. Above all, it is confidentiality,
anonymity, integrity, trust, certification, verification and measurement. Compliance with these
requirements ensures that OpenFog solutions will be deployed in a secure computing environment that
protects nodes, network components, management processes and orchestras.</p>
      <p>Fog Nodes are physical and logical components that perform computational functions in nebulous
networks. To some extent, nodes are analogs of cloud servers. Nodes located at the network boundary
perform access control and data encryption. They must ensure their contextual integrity and isolation,
as well as aggregate confidential data before they are sent to the next levels.</p>
      <p>Although nodes are unified components of nebulous networks, their architectural elements
(including CPUs and GPUs, as well as programmable logic arrays and network modules) vary
depending on the location of nodes in the nebulous hierarchy and the functions they perform.</p>
      <p>Nodes are able to form porous structures that balance the load, increase fault tolerance and reduce
cloud traffic.</p>
      <p>In more complex structures that support FaaS (Fog as a Service) service models, trust chains are
formed from node to node and extend to cloud components. Since nodes can be dynamically created
and dismantled, the software and hardware resources used for this must be trusted and certified.</p>
      <p>Scalability is ensured by the dynamic compliance of the technological capabilities of foggy
environments with business requirements, taking into account such factors as workload, productivity,
cost indicators. Scalability involves making changes to individual network nodes by adding hardware
and software, increasing the number of nodes at or near particularly busy levels, or reducing their
number as needed, and adding storage systems and analytics tools. This allows you to increase
performance in foggy structures, change the size of networks while increasing the number of
applications, "things" or end users, expand the functionality of reliability and security. In addition,
hardware configurations of node components and software are modified to adequately support
applications, management infrastructure, and the orchestration of a large number of network-connected
things and objects.</p>
      <p>Openness is a fundamental principle that contributes to the formation of a large-scale nebulous
computing ecosystem that deploys and supports IoT platforms and applications. It prevents the
limitation of the number of suppliers and the predominance of proprietary "branded" solutions, which
can lead to higher prices for products, reduce their quality and slow down the innovative development
of systems. Thanks to openness, nodes can be placed in any segment of foggy networks, expand
networks by adding nodes, use software-configured nodes that are dynamically formed.</p>
      <p>Openness provides interoperability, supports the construction of a built-in infrastructure, giving
downloaded applications the opportunity to use free resources, allows you to implement the principle
of location transparency (Location Transparency). Transparency guarantees nodes their location at any
hierarchical level of the nebulous network, and "things" IoT - optimization of network connections and
the choice of the most convenient routes for access to computing and other resources.</p>
      <p>Autonomy is determined by the ability of nodes to perform nebulous networks of the functions
offered to them in the event of failure or lack of external services supporting them. In the OpenFog RA
architecture, this principle applies to all levels of the network hierarchy. For example, in the case of
operational autonomy, centralized cloud decision-making is not the only possible option. Due to the
autonomous implementation of nodes, such functions are performed by local nodes at the network
boundary on the basis of data processed by them.</p>
      <p>Other areas where autonomy is needed include identifying and registering network connections,
orchestration, management, and security.</p>
      <p>Autonomy is one of the most important factors in improving the economic efficiency of nebulous
structures, as it reduces the cost of transmitting large amounts of raw data to the cloud.</p>
      <p>Programmability, which must be supported by hardware components, provides a high level of
adaptability of programs deployed in foggy environments. This allows you to fully automate the
resetting of tasks to be performed by fog nodes or clusters consisting of multiple nodes. This result is
achieved through the use of programming programming interfaces, which are described by universal
interfaces of computing or accelerating components.</p>
      <p>Programmability provides the formation of an adaptive infrastructure that meets the requirements of
different scenarios for the deployment of IoT applications, as well as allows you to optimize the use of
available resources, which, among other things, uses containerization. In the case of implementation in
nebulous structures of service models, programmability allows you to logically isolate the execution
environments of different users. It automates security updates and allows you to respond more quickly
to emerging threats.</p>
      <p>The performance and maintainability of foggy infrastructures is an integral attribute of modern
system architecture, helping to reduce downtime, reduce the risk of business process disruption and
simplify technical support.</p>
      <p>The technologies required for their implementation, which are the most important components of
the OpenFog RA architecture, include hardware systems, software and operations. They are especially
needed when creating foggy infrastructures that operate in an industrial environment, an unfavorable
natural environment, or remote solutions deployed in remote areas that are difficult to access.</p>
      <p>With the OpenFog RA architecture, it is possible to bring data processing closer to the sources of
data generation so that operational decisions can be made as soon as the data is translated into
meaningful context. This property of architecture, its developers called adaptability (Agility).
Adaptability allows you to make strategic decisions at different levels of the hierarchy of nebulous
structures, quickly implement innovations and scale within the overall infrastructure.</p>
      <p>Adaptability allows IoT decision makers to optimize the placement of applications that are
components of the decision-making system. Data from sensors and other devices are generated in the
form of arrays of different volumes, which arrive at different (not predetermined) times and thus create
a significant amount of network traffic. Extract useful information from them and create a useful
context, including recommendations for business, in most cases it becomes possible only after
aggregation, comparison and analysis of data.</p>
      <p>Such actions can be performed at the cloud level, but this significantly increases both the delays
associated with the transmission of large amounts of data over long distances, and the cost of paying
for communication channels.</p>
      <p>OpenFog RA complements traditional cloud architectures, including hierarchical support. Each
level of the hierarchy provides support for a set of functions required for the operation of IoT systems.
The computing resources of the reference architecture can be represented as components of a logical
hierarchical infrastructure that meets the requirements for the deployment of complex "end-to-end" IoT
systems. Depending on their scale and tasks, the hierarchy may include a network of interconnected
intelligent systems located at different physical or logical levels of architecture. At the same time, one
physical system can handle IoT tasks, as provided by the principle of autonomy.</p>
      <p>Monitoring and control are performed by microcontrollers: they are responsible for checking the
status of ongoing processes, generating three-volume signals, launching applications to attract staff
attention or automatically correcting the situation when there are significant deviations from the set
values.</p>
      <p>At the level of operational support, the analysis of telemetry data flows is performed with the
presentation of the obtained results. Relevant analytical capabilities are small and focus mainly on the
operational aspects of the physical environment for which the IoT system is responsible. This level
compares data accumulated over short periods of time with the results of online analysis of new traffic.</p>
      <p>At the business support level, the aggregate amount of IoT platform data from all of its many systems
is analyzed, and information about events is stored (according to the rules established by the
organization). Processing at this level of five-byte data sets helps to extract useful information for the
organization, optimize business planning, compare and improve the operational efficiency of processes,
using, among other things, machine learning methods.</p>
      <p>
        Foggy calculations are often called limit calculations [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The developers of the OpenFog Reference
Architecture consider this statement to be erroneous, because nebulous structures work in conjunction
with cloud structures, and boundary structures (peripheral, extreme - Edge Computing) do not interact
with them. Unlike hierarchical nebulous infrastructures, which extend to multilevel distributed
integrated solutions that include many connected devices, "things" and clouds, boundary systems cover
a small number of levels. They involve the deployment of data-intensive applications (eg, gateways,
programmable automated controllers, etc.) at the network boundary. However, the latter can be
significantly inferior in functionality to the nodes of nebulous structures. Some experts consider the
limit calculations as a special case of nebulous.
      </p>
      <p>
        An example of one of the market segments is unmanned autonomous vehicles, which are controlled
by many interconnected components. These nodes must interact with nodes of other machines, nodes
of road infrastructure, traffic control systems and cloud applications of the highest level. Thus, the
resulting distributed fog systems will cover a fairly large area [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        The OpenFog RA architecture offers the ability to build an infrastructure that supports FaaS services
that help simplify and accelerate the deployment of foggy solutions. According to the developers, FaaS
will include not only such well-known services as Infrastructure as a Service (IaaS), Platform as a
Service (PaaS), Software as a Service (SaaS), but also many other services designed with specific
requirements of cloud structures [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
4. Mathematical formulation of models 
The development of mathematical models of fog calculations or information systems created using fog
is an important area for identifying and improving their characteristics [
        <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6">3-6</xref>
        ]. Foggy calculations (FC)
as well as cloud computing are objects with a high level of uncertainty in the functioning process, the
main factors of which are [
        <xref ref-type="bibr" rid="ref3 ref5">3, 5</xref>
        ]:
 the probability of the flow of requests for computing resources (CR);
 the presence of the necessary CR and the randomness of the time of their use by customers;
 randomness of failures of maintenance infrastructure and time of their elimination.
      </p>
      <p>The stochastic nature of the main factors and the need to quantify mass processes based on
probability theory determines the use of queuing theory.</p>
      <p>
        Analytical models are proposed to calculate the characteristics using different disciplines of service
and their combinations, taking into account failures and different disciplines of after-sales service and
accumulation in the queues at the time of recovery of the service device. The models use an arbitrary
law of distribution of random values FC of maintenance and restoration of the maintenance node, which
provides additional opportunities in the study of specific nebulous calculations. Models are based on
works [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3–5</xref>
        ].
      </p>
      <p>As previously noted, all computing, regulating, control functions in nebulous networks are
performed in nodes that are analogous to servers in cloud structures. Moreover, thanks to the FC Pillar
principle of autonomy, centralized cloud decision-making can be performed by nodes based on the data
processed in them. Therefore, the FC (Fog Node) in the simulation system of queuing (SQ) is considered
as a service device.</p>
      <p>At the input of the node, as a single-channel SQ with anticipation, there are N Poisson streams of
different types of applications to solve problems with intensity   1,  . The threads are numbered
in descending order of importance of the requests, the requests of the i-th stream have the i-th priority
in the service. Application service time is a random variable   with a distribution function and two
endpoints  and  ,  1,  .</p>
      <p>The natural process of servicing applications in the SQ is disrupted by the failure of the service
device. The service device is unreliable and may fail according to Poisson's law with the parameter  .
The recovery time of the device is a random variable with a distribution function   and two
endpoints  and  ,  1,  . The device can fail both when servicing applications (there are two
possible cases: applications are returned to the queue; applications are lost), and in the free state.
Failures of the service device lead to an increase in the queue of applications and additional delays in
their maintenance. One of the possible ways for SQ to adapt to unproductive failures of computing
resources is to prioritize the receipt of applications from various sources in the queue for these resources
at the time of their diversion. Such control of the flow of flows can be achieved by feedback from the
nodes to the sources of applications.</p>
      <p>During the recovery period of the service device, the applications of some streams are accepted in
the queue, and others are not accepted. This condition is set by a matrix-row of coefficients  ,  1,  ,
and in the case if  1 the applications of the i-th stream are accepted in the queue, and if  0 the
applications are rejected.</p>
      <p>After the restoration of the service device, two disciplines of resumption of service are possible:
from applications of higher priority and from applications whose service was interrupted by the failure
of the device (provided that they are not lost during the failure).</p>
      <p>The service of applications in the system can be organized according to the rules of relative, absolute,
mixed and combined priorities.</p>
      <p>In the case of relative priorities, the possibility of applications is taken into account only at the time
of their assignment for service. The application with the highest priority is assigned to the released
device and its further maintenance is not interrupted by other applications.</p>
      <p>Absolute priorities involve interrupting the service of low-priority applications with applications
received at the input of the system, higher priority. Interrupted applications in this case are returned to
the queue and await additional service.</p>
      <p>Intermediate to the disciplines discussed above is the discipline of service with combined priorities.
In the case of combined priorities, the service time of all applications, except for higher priority
applications, is divided into two time segments: the first segment has an absolute priority, the second
a relative one.
be used for individual applications.</p>
      <p>Mixed priorities are a combination of absolute and relative priorities, and non-priority service may
It is necessary to determine the following characteristics of application service in maintenance nodes
- the average waiting time for the start of service of applications of the i-th stream in i-th turn;
applications of the i-th stream in the system.

 - average time of stay of applications of the i-th stream in the system (response time of the system);
- the average number of applications of the i-th stream in the i-th queue;  - the average number of
The combination of one of the disciplines of service with one of the disciplines of resumption of
service after the restoration of the failed device, and the behavior of the application, the service of which
was interrupted by failure, sets the conditions for independent tasks for priority SQ of the following
systems with relative priorities and renewal of service on applications, the service of which was
interrupted by failures (systems with relative priorities of the first type);
systems with absolute priorities;
systems with relative priorities and renewal of service from applications of higher priority
systems (systems with relative priorities of the second type);
systems with mixed priorities;
systems with combined priorities;
priority systems with losses.</p>
      <p>Thus, the queuing system that simulates the computational process of operation of the maintenance
unit FC with adaptation to failures, is characterized by the following parameters: input flow of requests
and the flow of failures of the service device; discipline of application service; the discipline of
resumption of service of applications after the restoration of the failed device, and the discipline of
acceptance of applications in the queue during this recovery.
5. System model with relative priorities of the first type 
The characteristics of the service of applications in the steady-state mode are interconnected by Little's
formulas, which for systems with priority acceptance of applications in the queue during the recovery
of a failed device are as follows:

 

∗ ,
∗

,
where  ∗ 
account the discipline of admission to the queue during the recovery of the failed device; 
is
FC: 
types:










all available applications from queues with numbers from 1 to j have been serviced;
applications received again from streams with numbers from 1 to j - 1 are serviced.
the probability that the service device is in good condition; 


is "loading" the system with</p>
      <sec id="sec-3-1">
        <title>The condition of steady state in systems of this class without losses is ∑</title>
        <p>∗ 
,where  ∗
 ∗ - the probability of employment of the device by servicing the application of the i-th stream.</p>
        <p>In addition, the average residence time of the application of the i-th stream in the considered system
 

1</p>
        <p>. Therefore, to find the necessary characteristics to calculate enough  ,  1, .</p>
        <p>Follow the movement of some application coming into the system  1, 
the j-th stream, Before
it gets to the device, the following must be done:
in the queue during the restoration of the failed device);
interrupted by a refusal and the device is currently restored);
completed renewal of the device (provided that the applications of the j-th stream are accepted
completed service on the device (if it is working) or in the queue (if the application service was
For the average durations of these events, the equilibrium equation is:
∗
 
1 
;   
is the probability that at the time of receipt
of the application of the j-th stream, the service device is restored; 
is the average recovery
time of the failed device;  1</p>
        <p>is the probability that the application coming into the system,
the j-th stream will find in it the required application of the i-th stream; 
is the average time to
service the application of the i-th flow without taking into account the failures of the service device.</p>
        <p>After simple transformations of equation (1) we obtain the following recurrent relation:</p>
        <p>,







(1) </p>
        <p> 
(2) 
(3) 
 
 
 
(4) 

 ∗.
where</p>
        <p>∑</p>
        <p>For recurrent view ratio
it is easy to show that

2



1</p>
        <p>∑


1</p>
        <p>1</p>
        <p>∗,  
1</p>
        <p />
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Using expression (3) from relation (2), we define explicitly:</title>
      <p>6. System model with absolute priorities 
 
1 
which is subject to the service discipline.</p>
      <p>Absolute priorities are allowed to change the service of applications of lower priority by applications
of higher priority. That is the middle hour of the j-th thread being interrupted in the system 

— the middle hour of the j-th thread interrupting the requests in the service,</p>
      <p>Obsessively expressing for the purpose  . For which we know in advance the average valority of
the period of employment of a non-necessary appli- ance for one i-th flow of applications.</p>
      <p>In the old mode, the attachment can be more flexible, if there are no applications in the system,
service jobs and renewals to service.</p>
      <p>It seems that the middle hour at the fixed moment of the end of the period of work-to-stay will come
before the first arrival at the warehouse system of the application of the i-th flow of the warehouse ∗
one for an hour. For the whole  ∗1 
For the great hour T, the service is scheduled for 
∗one hour, the service is renewed for 
∗
 one
hour there is
not enough time in the middle service cycle. Therefore, the middle period of employment of a nenadium
will be:
flow-kiv with numbers from 1 to  1
For an hour of servicing the request of the j-th thread, there will be 

a retry, 
. Skin such a rewriting - the whole period of employment will be applied with
applications from streams with numbers from 1 to  1
. Average hour for servicing an application</p>
      <p>The same applies to the formula (5) the period of employment will be applied with applications from
and the middle hour is interrupted in the service of applications of the j-th flow, educated by the
discipline of service,</p>
    </sec>
    <sec id="sec-5">
      <title>Considering (7)</title>
      <p>Determine 
from the equilibrium equation, for a system with absolute priorities may look like


∑</p>
      <p>∗
where, unlike formula (1), other additional insurance hour for additional service of requests from flows
with numbers from 1 to  ; 
∑
 
1 
is the middle hour of additional servicing of
applications from numbers from 2 to  , the service of which was interrupted by the overdue applications
of higher priorities;  is the mobility of that which is in the order of the  -th flow is interrupted by
applications from the total flow, which will go to the  1
first flows. Obviously, what
After performing the incoherent transformations in echuals (8), wit improvisations in expressions (7)
and (9) obsessive recursive singing for  :

From relation (10), using equation (5), we determine explicitly  :


1











2
1</p>
      <p>∗
 ∗ 


∗</p>
      <p>∗
 






 ∗ ,
,
 



 



7. System model with relative priorities of the second type 
In the considered system of interruption of service of applications of the lower priority by applications
of the higher priority are caused by discipline of renewal of service after restoration of the failed device.
Therefore, the average residence time of the application of the j-th stream in the system
Where  ∗ is the average time of all breaks in the service of the application of the j-th stream, due to the
discipline of resumption of service after the restoration of the failed device.
where  ОТК
of the j-th stream.</p>
      <sec id="sec-5-1">
        <title>For calculation  ОТК</title>
        <p>where 1 
on the device;</p>
        <p>Then</p>
        <p>ср
- the probability that at time t the application of the j-th stream will not be serviced
- the probability that no time will occur during time t.</p>
        <p>The equilibrium equation</p>
        <p>with respect to the considered system has the following form:





∗ ∗ 

∗
where, in contrast to expression (8), the third term takes into account the time of additional service
applications from streams with numbers from j + 1 to N;  ∗ is the average time of employment of the
device for maintenance of the application of the i-th stream and recovery after failure that occurred
during the maintenance of this application;  ∗
∑
 ∗ ∗ 1 
is the average time of additional
service of applications from the queues with numbers from 2 to j, service interruptions which are due
to the discipline of renewal of service after the restoration of the failed device;  ∗ 
∗  ∗
probability that the queue of the k-th thread is in the queue, which was replaced by the request from the
is the
total thread connecting the  1</p>
      </sec>
      <sec id="sec-5-2">
        <title>From the definition  ∗ it is obvious that</title>
        <p>where  ОТК
of the i-th stream.</p>
        <p>To determine  ОТК</p>
        <p>it is necessary to have the probability distribution function of the service
time of the i-th stream on the device. It is known that the probability density distribution of this time
first streams on the device restored after failure.
 ∗ 1 
ОТК</p>
        <p>ОТК
is the probability of interruption by failure of the process of servicing the application</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Then, taking into account this formula and expression (12):</title>
    </sec>
    <sec id="sec-7">
      <title>After simple transformations in equation (13), using formula (3), we find explicitly:</title>
      <p>To determine  ∗, note that, in contrast to the system with absolute priorities, the applications of
higher priority, received in the system during the service of the application of lower priority, will replace
it on the device only if the service is interrupted by failure. So,
 ∗ 
ОТК</p>
      <p>,
is the probability of interruption by the failure of the service process of the application
, determine the average residence time of the application of the j-th stream
on the device before the first interruption by denial of maintenance  ср , because these values are
related by the following relationship:
The function of distribution of time of stay of the application of the j-th stream on the device has a look




 ОТК 





1


 
∞
1
1 

1 



1
,  
,</p>
      <p>∗ ∗
(11) 
(12) </p>
      <p> 
(13) 
∗ ∗ 
 ОТК</p>
      <p>Models of systems with mixed priorities 
In systems with mixed priorities, adjacent application flows in M groups, between which there is an
absolute, and within each - a relative priority in service. In this case, each m-th group of application
streams contains streams with numbers from 
1
to 
,  1, 
disciplines for resuming applications from flows grouped into one group: applications that have been
interrupted by device failure (type I system) and applications from higher priority applications (type II
. There are two possible
system).</p>
      <p>Type I system model. It is easy to see that, unlike the system with absolute priorities, the application
of the j-th stream of the m-th group, arriving at the input of the system, must wait in line for additional
service requests from streams with numbers from 1 to 
, and its service may be interrupted priorities
in the event that  
numbers from 1 to 
(the total flow of applications that interrupts its service, includes flows with
). Therefore, the equilibrium equation of the relative average waiting time for
the start of service of applications of the j-th stream of the m-th group will be as follows:
∗
, and the average residence time of the application
where</p>
      <p>∑
∑</p>
      <p>where</p>
      <p>of the j-th current of the m-th group in the system:</p>
      <p>Performing simple transformations in expression (15), we obtain:











∗ ∗
∑
1 




∗
Using equations (16) and (3), it is easy to obtain the expression 
1 
for explicitly.</p>
      <p>,  ∗

∗ ∗

1 

 

system are due to both the discipline of service and the discipline of renewal of service after the
restoration of the device that failed. So

,
From equation (14), taking into account equation (3), we find the expression for explicitly  :
where 
∗

has the following form:
, 


1 


∗


∗
, and the equilibrium equation 
for
 
(14) 
 (15) 
(16) 
 
 
 
.</p>
      <p>Models of systems with combined priorities 
In the system</p>
      <p>with combined priorities, the service time of all applications, except for the
applications of the first stream, is divided into two segments (stages): on the first segment there is an
absolute priority, on the second - relative. The duration of the first stage of service of the application of
the k-th stream - a constant value: 
,  1,  1,  2, 
. In the second stage of application service,
two disciplines of renewal of service are possible: from applications whose service was interrupted by
the failure of the device (type I system), and from applications of higher priority (type II system).</p>
      <p>Type I system model. The average residence time of the j-th flow application in the system 



1</p>
      <p>is the average time of all interruptions in the service of the j-th flow
application, due to the action of absolute priority in the first stage of its maintenance.</p>
      <p>We obtain an expression for definition  . During the service of the application of the j-th current in
the first stage there will be ∑


interrupts, and at each time period 

,
of
service of the application, the interrupt flow combines i the first flows. Using expression (6), similarly
to systems with absolute priorities, we find  :
The equilibrium equation for this system is as follows:</p>
      <p>ОТН  ОТН 1 
where; 
∑
∑</p>
      <p>1 
the application of the i-th stream;  ОТН
application received in the system of the j-th stream, will find in it underserved in the second stage of
is the probability that the
is average time of additional service at the second stage
of the i-th stream;</p>
      <p>i first flows.</p>
      <sec id="sec-7-1">
        <title>Values  and</title>
      </sec>
      <sec id="sec-7-2">
        <title>Let's define</title>
        <p>combining the first i flows:
Then:

 ,

∗
 ,</p>
        <p>Using equations (3) and (18), it is easy to obtain  explicitly:
of applications of the i-th stream in relation to applications of the j-th stream;  , 
is respectively,
the first and second moments of the duration of the second stage of service of the application of the
ith stream in relation to the applications of the j-th stream; 
is the probability that the queue is the
application of the k-th stream, the service of which at the first stage was interrupted by the application
the service of which was interrupted at the first stage by applications from the total flow, combining the
is the average time of service of the application of the k-th stream,
can be found by the following formulas:
. Taking into account expression (17), the average time of interruptions in the service of
the application of the k-th flow, due to interruptions of its service by applications from the total flow,
,


,
 

;  ОТН
∗
1</p>
        <p>2

∗</p>
        <p>,
 







,
 

 

priority.</p>
        <p>Obviously
where: 
device will fail on time</p>
        <p>∑
 ОТК
;  ,


,
;  ОТК

,
and 
,


,  ОТК
intervals.


ОТН
Failure probabilities  ОТК
,  ,
,  ОТК
can be calculated by the following formulas:
of the duration of the second stage:   
of the function</p>
        <p />
      </sec>
      <sec id="sec-7-3">
        <title>The equilibrium equation</title>
        <p>for in this system is as follows:
where 
the j-th stream in relation to the applications of the first stream.</p>
        <p>is the function of the distribution of the duration of the second stage of maintenance of
The function  
can be determined using the direct Laplace transform of the density distribution
, where</p>
        <p>is the direct Laplace transform
 ОТК
,  ,</p>
        <p>ОТК
- according to the probability that the service
,  ОТК
1
,</p>
        <p>∑</p>
        <p>∗
,
,</p>
        <p>Type II system model. In contrast to the type I system, in the system under consideration,
where  ∗ is the average time of interruptions in the service of the application of the j-th stream, due to
the discipline of renewal of service after the restoration of the failed device in the area of relative</p>
        <p>∑
∑
 ∗  ∗ ;  ∗ОТН</p>
        <p>1 
time of employment of the device of pre-service of the application  -th flow in the area of relative
priority in relation to applications  -th flow and recovery after failure that occurred during this

ОТК
ОТН 
is the average
additional service;  ОТК ОТН</p>
        <p>1
in the remaining time to service the application of the i-th stream in the area of relative priority in
relation to the applications of the j-th stream;  ∗ is the probability that the queue of the k-th stream is
in the queue, which was replaced by the application of the i-th stream on the device restored after
is the probability of failure of the device
failure 
;  ∗ 
∗
ОТН
area of relative priority.
which was replaced on the restored after failure of the device by the application of the i-th stream in the
is the average service life of the application of the k-th stream,
 ∗
is determined similarly 
for type I system:  ∗ 
∗
 ,
∗

∗

∗
 ,

∗  ОТК ,
,</p>
        <p>ОТК
10. Models of priority systems with losses 
(11).</p>
        <p>A distinctive feature of this class of systems is the loss of applications, the service of which was
interrupted by the failure of the device. Therefore, the probability of employment of the device by
servicing the application of the i-th stream  с∗р 
∗
 ср , which  ср is determined from expression
in this system</p>
        <p>where  ∗</p>
        <p>ср 
1</p>
        <p>Finally explicitly:
where ∗
∑
 ∗ ∗.</p>
        <p />
        <p />
        <p>System model with absolute priorities. Using the same method of determining wj and vj as for the
system with absolute priorities without losses, the following results can be obtained. The average period
of employment of the device by servicing the application of the i-th stream and recovery after failure
that occurred during this service:
 ∗ 
∗ ∗,</p>
        <p>The average time of all interruptions in the service of the application of the j-th stream, due to the
Model of a system with mixed priorities. By analogy with the eponymous system without losses (system
with mixed priorities of type I) the necessary characteristics of the service of applications of the j-th
stream of the m-th group are found by the formulas:</p>
        <sec id="sec-7-3-1">
          <title>The condition of a steady state in systems with losses is ∑</title>
          <p>Consider the following types of priority systems with losses:
 с∗р 
system with relative priorities;
system with absolute priorities;
a system with mixed priorities.</p>
          <p>System model with relative priorities. The average residence time of applications of the j-th stream
The expression for the definition</p>
          <p>is obtained from the equation

∑
 с∗р
∑
 ∗   ∗

∑</p>
          <p>∗  ∗,
is the average time of employment of the device by servicing the
application of the i-th stream and recovery after failure that occurred during this service;  ОТК
ср is the probability of interruption by refusing to service the application of the i-th stream.
11. Conclusions </p>
          <p>
            1. Analytical models for calculating characteristics using many streams and many priorities of
applications for solving problems, different service disciplines and their combinations, taking into
account failures and different disciplines of after-sales service and accumulation in queues for the time
of service recovery node FN - Fog Node. The models use an arbitrary law of distribution of random
values of maintenance and restoration of the maintenance node FN, which provides additional
opportunities in the study of specific nebulous calculations. Models are based on works [
            <xref ref-type="bibr" rid="ref3 ref4 ref5">3–5</xref>
            ].
          </p>
          <p>2. Models suitable for the analysis of not only nebulous but also boundary (peripheral, extreme)
nodes, as well as logically isolated executive environments of different users of nebulous and boundary
1</p>
          <p>∑
∗
1 
 

 

∑</p>
          <p>∗
ср 1</p>
          <p>∗
 с∗р  ∗</p>
          <p>1 

∑
 с∗р</p>
          <p>1 

,</p>
          <p>∑
∗
1 
∑
∗
1 
1 



∗
∗



∗</p>
          <p>ср
1 
 ср
∗
.</p>
          <p>1 
∗ ,
1 
1 
∗
∗
∗
,
nodes are considered. The last possibility is provided by the programmability of implementation in
nebulous and boundary structures of service models.</p>
          <p>
            3. The efficiency of fog nodes can be determined by the quality of organization of computational
processes, which are quantified by efficiency indicators [
            <xref ref-type="bibr" rid="ref3 ref4 ref6">3, 4, 6</xref>
            ], based on estimating the average or
maximum time of tasks in the system, response time of the computer system, delays allowable
deadlines, etc. The obtained formulaic expressions of characteristics of different models are suitable for
evaluating the efficiency of nebulous nodes.
          </p>
        </sec>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>OpenFog</given-names>
            <surname>Reference Architecture for Fog Computing</surname>
          </string-name>
          ,
          <year>2017</year>
          . URL: https://www.iiconsortium.org/pdf/OpenFog_Reference_Architecture_
          <volume>2</volume>
          _
          <fpage>09</fpage>
          _
          <fpage>17</fpage>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Alexey</given-names>
            <surname>Chernobrovtsev</surname>
          </string-name>
          .
          <article-title>Foggy infrastructure standardization</article-title>
          .
          <source>Journal of Network Solutions</source>
          ,
          <year>2018</year>
          . URL: https://www.osp.ru/lan/2018/04/13054572
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A. Y.</given-names>
            <surname>Matov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Shpilev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. D.</given-names>
            <surname>Komov</surname>
          </string-name>
          , Organization of computational processes in ACS, Kyiv,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A. Y.</given-names>
            <surname>Matov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. O.</given-names>
            <surname>Khramova</surname>
          </string-name>
          ,
          <article-title>"Problems of use and mathematical modeling of cloud computing for an integrated information-analytical system of public administration." Data Recording</article-title>
          ,
          <source>Storage &amp; Processing 12.2</source>
          (
          <year>2010</year>
          ):
          <fpage>113</fpage>
          -
          <lpage>127</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Matov</surname>
          </string-name>
          ,
          <article-title>Mathematical models of cloud computing with absolute-relative priorities of providing of computer resources to users in conditions of functioning features and failures</article-title>
          ,
          <source>in: CEUR Workshop Proceedings (ceur-ws.org)</source>
          . Vol-
          <volume>2318</volume>
          urn:nbn:de:
          <fpage>0074</fpage>
          -
          <lpage>2318</lpage>
          -4.
          <source>Selected Papers of the XVIII International Scientific and Practical Conference «Information Technologies and Security» (ITS</source>
          <year>2018</year>
          ),
          <volume>2318</volume>
          ,
          <year>2018</year>
          , pp.
          <fpage>150</fpage>
          -
          <lpage>159</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Matov</surname>
          </string-name>
          ,
          <article-title>Adaptation of cloud computing as optimization of the process of rendering services to users in the conditions of limited computing resources</article-title>
          ,
          <source>in: CEUR Workshop Proceedings (ceurws.org)</source>
          . Vol-
          <volume>2318</volume>
          urn:nbn:de:
          <fpage>0074</fpage>
          -
          <lpage>2318</lpage>
          -4.
          <source>Selected Papers of the XIX International Scientific and Practical Conference «Information Technologies and Security» (ITS</source>
          <year>2019</year>
          ),
          <volume>2577</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>210</fpage>
          -
          <lpage>221</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>