<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Increasing the Reliability of a Heterogeneous Network using Redundant Means and Determining the Statistical Channel Availability Factor</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Pavlo Anakhov</string-name>
          <email>anakhov@i.ua</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktoriia Zhebka</string-name>
          <email>viktoria_zhebka@ukr.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Bondarchuk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kamila Storchak</string-name>
          <email>kpstorchak@ukr.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mylana Sablina</string-name>
          <email>m.sablina@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State University of Telecommunications</institution>
          ,
          <addr-line>7 Solomenskaya str., Kyiv, 03110</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>231</fpage>
      <lpage>236</lpage>
      <abstract>
        <p>The purpose of the article is to develop recommendations for controlling the reliability of a communication network by introducing redundant facilities and using statistical data evaluation. Improving the reliability of communications is ensured through the use of redundant facilities that duplicate the most critical objects. The reliability indicator is the load route availability factor, which is represented by predefined sequences of interstation directional channels used to transmit information between two points (nodes) of the network, taking into account the type of load of the telecommunication channel. A reliability assurance scheme has been proposed, which is intended to develop an action plan aimed at preventing hazards or at least reducing their negative consequences. Monitoring of network reliability indicators will allow for conducting its dynamic control, and the use of backup facilities that duplicate the most critical facilities will eliminate possible consequences of danger.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Reli-availability</kwd>
        <kwd>availability factor</kwd>
        <kwd>communication channel</kwd>
        <kwd>load route</kwd>
        <kwd>communication route</kwd>
        <kwd>between nodes</kwd>
        <kwd>communication network</kwd>
        <kwd>monitoring of reliability indicators</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Before considering reliability issues, it is
necessary to recall the structure of a
heterogeneous Telecommunication Network
(TCN) [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1–4</xref>
        ]. The scheme of a full-fledged
heterogeneous TCN is a three-level hierarchical
sequence of multiplexers (Fig. 1).
      </p>
      <p>The first level of multiplexing (compression)
uses the separation of transmission channels by
frequency, and time:</p>
      <p> k tl  k tl
C = C i Cti  =  C i , ti 
1 t1 1 t1
(1)
where  i is the number of frequency intervals; ti
is the number of time intervals; i is the number of
a channel in order (non-negative integers).</p>
      <p>The second level includes signals of different
physical nature:</p>
      <p>CII =
f (E )m
 Cf (E )i ,
f (E )1
f (E )i = f (E )1, f (E )m ,
(2)
where f ( E ) is the number of energy channels.
i</p>
    </sec>
    <sec id="sec-2">
      <title>2. Research Results</title>
      <p>
        The reliability of the components of a
heterogeneous telecommunication network is
understood as the ability to maintain over time
within the established limits the values of all
parameters that characterize the ability to perform
the required functions in the specified modes and
conditions of use, maintenance, storage, and
transportation [
        <xref ref-type="bibr" rid="ref4">5</xref>
        ].
      </p>
      <p>The reliability scheme is shown in Fig. 2.</p>
      <p>
        The suggested scheme is designed to develop
an action plan aimed to prevent hazards or at least
reduce their negative consequences. Short-term
hazard forecasting is performed to alert the public
and collect data. These data are used in long-term
forecasting, which in turn is used to assess risks
and their permissible levels to declare the safety
of facilities, make decisions on their location and
operation, develop measures to prevent accidents,
and prepare for response to them. The list of
protection measures includes:
• Use of materials and structures resistant
to a particular hazard.
• Hazard interception involves shielding
the facility or its most vulnerable and critical
elements from the hazard, or shielding the
hazard from the facility, as well as
counteracting the hazard.
• Replacement of maintenance systems
(power supply, ventilation, air conditioning,
fire alarm, fire extinguishing, warning, etc.).
• Reconfiguration of the communication
network by redistributing resources [
        <xref ref-type="bibr" rid="ref6 ref7">7, 8</xref>
        ].
• Alternative routing (call re-routing), in
which traffic includes at least one node not
involved in the previously selected route [
        <xref ref-type="bibr" rid="ref8">9</xref>
        ].
      </p>
      <p>
        Reconfiguration/re-routing can be performed
by load balancing, in which the task of
establishing communication is distributed among
several network devices. This is done, in
particular, to optimize resource utilization, reduce
request service time, and horizontal cluster scaling
(dynamic addition/removal of devices) [
        <xref ref-type="bibr" rid="ref10 ref11 ref9">10–12</xref>
        ].
      </p>
      <p>
        Elimination of hazards is ensured through the
use of backup facilities that duplicate the most
critical facilities. It should also be noted that the
use of monitoring of network reliability indicators
is effective, allowing conducting their dynamic
control [
        <xref ref-type="bibr" rid="ref12 ref13 ref14">13–15</xref>
        ].
      </p>
      <p>The purpose of the paper is to develop
recommendations for controlling the reliability of
a communication network by introducing
redundant facilities and using statistical data
evaluation. Increasing the reliability of
communications is ensured through the use of
redundant facilities that duplicate the most critical
objects.</p>
      <p>Reliability is the feature of an object to
maintain over time within the established limits
the values of all parameters that characterize its
ability to perform the required functions in the
specified modes and conditions of use,
maintenance, storage, and transportation.</p>
      <p>Reliability is one of the components of an
object’s functional stability. Fig. 3 shows that the
components of functional sustainability are
reliability, survivability, and fault tolerance.</p>
      <p>The indicators of the functional sustainability
components are considered by the following
groups:
1. Reliability indicators.
2. Indicators of survivability.
3. Indicators of fault tolerance.</p>
      <p>Reliability
Vitality</p>
      <p>Fault
tolerance
Functional
stability</p>
      <p>This paper will focus on the reliability property
of an object.</p>
      <p>
        It is indicated that reliability is a complex
feature that, depending on the purpose of the
object and the conditions of its use, may include
reliability, durability, maintainability, and
preservation or certain combinations of these
properties. It is also indicated that this term is used
only for a general non-quantitative description of
these properties [
        <xref ref-type="bibr" rid="ref4">5</xref>
        ].
      </p>
      <p>
        One of the parameters for quantifying this
reliability is the time between failures [
        <xref ref-type="bibr" rid="ref15">16</xref>
        ]. The
quantitative indicator of reliability, and
availability, use the term “time to failure of the
telecommunication channel”—Time to Failure
(TTF).
      </p>
      <p>
        The statistical channel availability factor for a
certain period of observation time t is calculated
by the formula [
        <xref ref-type="bibr" rid="ref15 ref16 ref17">16–18</xref>
        ]:
kch ( t ) =
      </p>
      <sec id="sec-2-1">
        <title>TTFch</title>
      </sec>
      <sec id="sec-2-2">
        <title>TTFch + TTRch</title>
        <p>, t  0 ,
(4)
where TTF + TTR is the considered time
interval; TTR is the time-to-repair (time to restore
the telecommunication channel performance).</p>
        <p>
          TTRch can be calculated by the formula [
          <xref ref-type="bibr" rid="ref18">19</xref>
          ]:
TTRch = TTR01 + TTR12 + TTR23 ,
(5)
where TTR01 is the time interval from the failure
to its detection (undetected fault time), for
example, in the case of a latent failure; TTR12 is
the time interval during which maintenance is
prepared (maintenance support performance).
TTR12 is characterized by a certain time interval
of logistic delay (including delivery of parts and
tools; delivery, installation, or calibration of
measuring instruments; the arrival of specialists;
the processing of technical documentation;
delivery registration; waiting for transportation;
delay due to unacceptable environmental
conditions, etc.), including administrative delays
(time interval of waiting for logistics resources,
which does not include delivery of spare parts);
TTR23 is an active repair time.
        </p>
        <p>
          By the type of load, the unified communication
network is divided into technological and
corporate (production and economic) networks
[
          <xref ref-type="bibr" rid="ref20">21</xref>
          ]. The technological segment of the network
includes the means of an automated dispatch
control system: a complex of remote control and
data collection; a subsystem of automatic
frequency and power control; a complex of
control and optimization of electrical modes; a
complex of dispatch simulator; a complex of
equipment repair scheduling and coordination
procedures. The corporate segment of the network
includes organizational and economic
management; production and economic management;
operational and dispatching and operational and
technological management (voice information);
repair and maintenance of facilities [
          <xref ref-type="bibr" rid="ref21 ref22 ref23 ref24 ref25 ref26 ref27 ref28 ref29 ref30">22–31</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Conclusions</title>
      <p>When calculating the availability factors of
communication channels, load routes, and the
communication network, statistical data have
been used. By entering the sequence of operations
for calculating availability factors and the
conditions for monitoring network reliability
indicators, dynamic control of the network can be
performed.</p>
      <p>Increasing the reliability of communications is
ensured through the use of redundant facilities that
duplicate the most critical facilities. The reliability
indicator is the load route availability factor,
which is represented by predefined sequences of
interstation channels used to transmit information
between two points (nodes) of the network, taking
into account the type of telecommunication
channel load.</p>
    </sec>
    <sec id="sec-4">
      <title>4. References</title>
      <p>[1]</p>
      <p>V. Buriachok, et al., Invasion Detection
Model using Two-Stage Criterion of
Detection of Network Anomalies, in:
Workshop on Cybersecurity Providing in
Information and Telecommunication
Systems, vol. 2746 (2020) 23–32.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , et al,
          <article-title>New Secure Block Cipher for Critical Applications: Design, Implementation, Speed</article-title>
          and
          <string-name>
            <given-names>Security</given-names>
            <surname>Analysis</surname>
          </string-name>
          ,
          <source>Advances in Intelligent Systems and Computing</source>
          , vol.
          <volume>1126</volume>
          (
          <year>2020</year>
          )
          <fpage>93</fpage>
          -
          <lpage>104</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -39162-
          <issue>1</issue>
          _
          <fpage>9</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
            <surname>Anakhov</surname>
          </string-name>
          , et al.,
          <article-title>Increasing the Functional Network Stability in the Depression Zone of the Hydroelectric Power Station Reservoir</article-title>
          ,
          <source>in: Workshop on Emerging Technology Trends on the Smart Industry and the Internet of Things</source>
          , vol.
          <volume>3149</volume>
          (
          <year>2022</year>
          )
          <fpage>169</fpage>
          -
          <lpage>176</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <article-title>Decentralized Access Demarcation System Construction in Situational Center Network</article-title>
          ,
          <source>in Workshop on Cybersecurity Providing in Information and Telecommunication Systems II</source>
          , vol.
          <volume>3188</volume>
          , no.
          <issue>2</issue>
          ,
          <issue>2022</issue>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <source>[5] Statestandard of Ukraine 2860-94</source>
          .
          <article-title>Reliability of equipment. Terms and definitions (in Ukrainian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Anakhov</surname>
          </string-name>
          , et. al.,
          <article-title>Evaluation Method of the Physical Compatibility of Equipment in a Hybrid Information Transmission Network</article-title>
          ,
          <source>J. Theor. Appl. Inf. Technol</source>
          .
          <volume>100</volume>
          (
          <issue>22</issue>
          ) (
          <year>2022</year>
          )
          <fpage>6635</fpage>
          -
          <lpage>6644</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>[7] Industry guidance document 34.20</source>
          .
          <fpage>507</fpage>
          -
          <lpage>2003</lpage>
          .
          <article-title>Technical operation of electrical stations and networks</article-title>
          .
          <source>Rules (in Ukrainian).</source>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sulima</surname>
          </string-name>
          ,
          <source>Methods of Reconfiguration of Basic Network Computing Resources Based on Virtualization Technology: Diss. ... Candidate Technical Sciences: 05.12.02 “Telecommunication Systems and Networks”. Kyiv: 2019 (in Ukrainian).</source>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Recommendation</given-names>
            <surname>ITU-T Q</surname>
          </string-name>
          .
          <volume>12</volume>
          (
          <issue>11</issue>
          /
          <year>1988</year>
          ).
          <article-title>General Recommendations on telephone switching and signalling. International automatic and semi-automatic working. Overflow-alternative routing-reroutingautomatic repeat attempt</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Recommendation</given-names>
            <surname>ITU-T Y</surname>
          </string-name>
          .
          <year>2085</year>
          (
          <issue>06</issue>
          /
          <year>2016</year>
          ).
          <article-title>Next Generation NetworksFrameworks and functional architecture models. Distributed service networking service routing</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>I.</given-names>
            <surname>Keslassy</surname>
          </string-name>
          , et. al.,
          <string-name>
            <surname>Optimal</surname>
            <given-names>LoadBalancing</given-names>
          </string-name>
          ,
          <source>INFOCOM 2005 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Proceedings</source>
          ,
          <volume>3</volume>
          (
          <year>2005</year>
          )
          <fpage>1712</fpage>
          -
          <lpage>1722</lpage>
          . doi:
          <volume>10</volume>
          .1109/INFCOM.
          <year>2005</year>
          .1498452
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>F.</given-names>
            <surname>Li</surname>
          </string-name>
          , et. al.,
          <source>Load Balancing Routing in Three Dimensional Wireless Networks</source>
          ,
          <source>2008 IEEE International Conference on Communications</source>
          ,
          <year>2008</year>
          ,
          <fpage>3073</fpage>
          -
          <lpage>3077</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICC.
          <year>2008</year>
          .578
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P.</given-names>
            <surname>Vorobienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Nikityuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Reznichenko</surname>
          </string-name>
          , Telecommunication and
          <string-name>
            <given-names>Information</given-names>
            <surname>Networks</surname>
          </string-name>
          ,
          <source>Kyiv: SUMMITKnyga</source>
          ,
          <year>2010</year>
          ,
          <volume>708</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Herlich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Maier</surname>
          </string-name>
          ,
          <article-title>Measuring and Monitoring Reliability of Wireless Networks</article-title>
          ,
          <source>IEEE Communications Magazine</source>
          ,
          <volume>59</volume>
          (
          <issue>1</issue>
          ) (
          <year>2021</year>
          )
          <fpage>76</fpage>
          -
          <lpage>81</lpage>
          . doi:
          <volume>10</volume>
          .1109/
          <string-name>
            <surname>MCOM</surname>
          </string-name>
          .
          <volume>001</volume>
          .2000250
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>P.</given-names>
            <surname>Anakhov</surname>
          </string-name>
          , et. al.,
          <source>Stability Method of Connectivity Automated Calculation for Heterogeneous Telecommunication Network, CEUR Workshop Proceeding</source>
          ,
          <volume>3188</volume>
          (
          <year>2021</year>
          )
          <fpage>282</fpage>
          -
          <lpage>287</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <string-name>
            <surname>ITU-T Recommendation</surname>
          </string-name>
          G.
          <volume>602</volume>
          .
          <article-title>Transmission media characteristics. Reliability and availability of analogue cable transmission systems and associated equipments</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>[17] IEC 60870-4</source>
          :
          <fpage>1990</fpage>
          .
          <article-title>Telecontrol equipment and systems. Part 4: Performance requirements</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <surname>ITU-T Recommendation</surname>
          </string-name>
          E.
          <volume>862</volume>
          (
          <issue>06</issue>
          /92).
          <article-title>Dependability planning of telecommunication networks</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <article-title>Public telecommunications network. Telephone network. Technical requirements (in three parts). Part 1. Principles of building a public telephone network</article-title>
          .
          <source>Kyiv: Administration of State Special Communications</source>
          ,
          <year>2015</year>
          . 129 p.
          <article-title>(in Ukrainian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <article-title>Standard of the Organization of Ukraine National Energy Company</article-title>
          “Ukrenergo”
          <volume>35</volume>
          .101:2018.
          <article-title>General Technical Requirements for Automated Control Systems for Technological Processes of 220-750 k V substations of the unified energy system of Ukraine (in Ukrainian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Transmission</given-names>
            <surname>System Code</surname>
          </string-name>
          (
          <volume>14</volume>
          .
          <fpage>03</fpage>
          .
          <year>2018</year>
          , No.
          <volume>309</volume>
          )
          <article-title>(in Ukrainian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <source>[22] IEC</source>
          <volume>61025</volume>
          :
          <year>2006</year>
          .
          <article-title>Fault tree analysis (FTA)</article-title>
          .
          <source>Second edition</source>
          <year>2006</year>
          -
          <volume>12</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>B.</given-names>
            <surname>Suo</surname>
          </string-name>
          , et. al.,
          <source>Calculation of Failure Probability of Series and Parallel Systems for Imprecise Probability, Int. J. Eng. Manuf</source>
          .
          <volume>2</volume>
          (
          <issue>2</issue>
          ) (
          <year>2012</year>
          ),
          <fpage>79</fpage>
          -
          <lpage>85</lpage>
          . doi:
          <volume>10</volume>
          .5815/ijem.
          <year>2012</year>
          .
          <volume>02</volume>
          .12
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <source>[24] IEC</source>
          <volume>61703</volume>
          :
          <year>2016</year>
          .
          <article-title>Mathematical Expressions for Reliability, Availability, Maintainability and Maintenance Support Terms</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [25]
          <article-title>Standard of the Organization of Ukraine National Energy Company "</article-title>
          <source>Ukrenergo" 29.240</source>
          .
          <fpage>7</fpage>
          -
          <lpage>18</lpage>
          :
          <year>2021</year>
          .
          <article-title>Planning and determination of the availability ratio of the transmission system. Part I. Overhead power lines (in Ukrainian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kharazishvili</surname>
          </string-name>
          , E. Dron,
          <article-title>Forecasting of Indicators, Threshold Values and the Level of Economic Security of Ukraine in the Medium Term; Analytical Report</article-title>
          . Kyiv: National Institute of Strategic Studies,
          <year>2014</year>
          ,
          <volume>117</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [27]
          <article-title>Methodology for calculating the level of economic security of Ukraine (approved by Order of the Ministry of Economy of Ukraine (2</article-title>
          .
          <fpage>03</fpage>
          .
          <year>2007</year>
          , No.
          <volume>60</volume>
          )
          <article-title>(in Ukrainian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xin-She</surname>
          </string-name>
          ,
          <article-title>Nature-Inspired Optimization Algorithms</article-title>
          , Elsevier Inc.
          <year>2014</year>
          . doi:
          <volume>10</volume>
          .1016/C2013-0-01368-0
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [29]
          <string-name>
            <surname>ENTSO-E Continental Europe</surname>
          </string-name>
          <article-title>Operation Handbook</article-title>
          . Policy 6:
          <string-name>
            <given-names>Communication</given-names>
            <surname>Infrastructure</surname>
          </string-name>
          .
          <volume>14</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>V.</given-names>
            <surname>Mukhin</surname>
          </string-name>
          , et. al.,
          <source>Protecting Hybrid Information Transmission Network from Natural and Anthropogenic Hazards, Int. J. Comput. Netw. Inf. Secur</source>
          .
          <volume>14</volume>
          (
          <issue>5</issue>
          ) (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . doi:
          <volume>10</volume>
          .5815/ijcnis.
          <year>2022</year>
          .
          <volume>05</volume>
          .01
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>Recommendation</given-names>
            <surname>ITU-T E</surname>
          </string-name>
          .
          <volume>500</volume>
          (
          <issue>11</issue>
          /98)
          <article-title>Traffic intensity measurement principles</article-title>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>