<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>ORCID:</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Upper Bound of Buffer Content Distribution for Self-Similar Traffic Models</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Anatolii Pashko</string-name>
          <email>anatoliipashko@knu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Iryna Rozora</string-name>
          <email>irozora@knu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Mlavets</string-name>
          <email>yurii.mlavets@uzhnu.edu.ua</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Bryla</string-name>
          <email>andrii.bryla@uzhnu.edu.ua</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Igor Sikorsky Kyiv Polytechnic Institute</institution>
          ,
          <addr-line>Peremohy av., 37, Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Volodymyrska str., 60, Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Uzhhorod National University</institution>
          ,
          <addr-line>Narodna Square, 3, Uzhhorod, 88000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>One of the most valuable results of traffic over the last years is the property of self-similarity in packet networks. In this paper, a self-similar traffic model driven by FBM is investigated. The estimation of upper bound probability buffer overflow for the traffic model is obtained. We also consider traffic that enters as input on some time-invariant linear system and find the estimation of buffer content distribution taking into account input traffic and response of the stochastic system. Finally, the obtained results in one particular case are applied. Fractional Brownian Motion, self-similarity, traffic, backlog The information content has increased seriously with regard to the steady development of communications and telecommunications and the growth of new types of services. It's already proven that classical distributions are not always adequate to explain the existing flows in advanced networks. Therefore, new ways and types of distributions are used to understand traffic characteristics, and their study sometimes cannot be studied analytically. The experimental and numerical research carried out in the last decades show that the traffic in many telecommunication and multimedia networks has a fractal structure. This traffic has a particular property that is preserved during scaling. It differs from ordinary traffic in a number of specific characteristics: it has the properties of self-similarity and longterm dependence.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        2023 Copyright for this paper by its authors.
in medicine [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], to detect DDoS attacks [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], to analyze financial processes [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], to analyze emotions
and the human condition [
        <xref ref-type="bibr" rid="ref21 ref22">21-22</xref>
        ].
      </p>
      <p>
        One of the important aspects of using a simulation model is to assess the accuracy and reliability of
the results obtained. Methods for statistical modeling of Gaussian random processes with a given
accuracy and reliability were studied in [
        <xref ref-type="bibr" rid="ref23 ref24 ref25 ref26 ref27">23-27</xref>
        ]. Thus, this paper is devoted to self-similar traffic models
that can be described by FBM. The article examines the methods of estimating the Hurst index and
modeling self-similar traffic, which was carried out by the authors in [
        <xref ref-type="bibr" rid="ref14 ref28 ref29">14, 28-29</xref>
        ].
      </p>
      <p>
        Since this process is self-similar and has stationary increments it can be used to simulate traffic in
high-speed networks. In Section 2 general aspects of stochastic models in telecommunications are
studied. Especially attention paid to understanding of traffic self-similarity. In Section 3 the arrival and
backlog processes connected with FBM are defined and the main properties are studied. The estimation
of probability buffer overflow is obtained. We also analyze traffic that enters as input on some
timeinvariant linear systems [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ]. To provide the connection of input traffic and the response (output) of
such a system a quadratic form built on these two processes is considered shown in Section 4. Section
5 is devoted to the upper bound of buffer content distribution taking into account input and output
traffic. In Section 6 a particular case of self-similar traffic model is observed and the dependence of
model parameters is studied.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Stochastic models in telecommunication</title>
      <p>Stochastic models are widely adopted in the telecommunications industry. Discrete and fluid
queueing models played a major role in the development of computer and communication networks.
There are several branches of telecommunications that use stochastic models, Let’s focus in networking
systems and other stochastic systems that aide high-performance networking.</p>
      <p>There are some important scenarios in the Internet and other networks where stochastic modeling is
applicable. Now the networks carry a huge variety of traffic (Data, Voice, Video, etc) and In the future
the it will only be increased, as the users will demand very high quality from the networks. Therefore,
it is vital to ensure that certain types of performance factors, known as quality of service (QoS), a re
taken into account. There are some commonly known end-to-end QoS metrics, for example, loss
probability, delay, delay-jitter, and bandwidth. Let us briefly describe them. When messages flow from
a source to a destination (end-to-end) through a network, parts of a message or the whole message may
be dropped due to unavailable resources (buffer capacity) to store the messages. The probability of
delivering a message with some data loss is termed loss probability.</p>
      <p>
        The time between the source sending a message and the destination receiving it is called latency or
delay. Typically real-time or multimedia traffic (such as live video conference) can be tolerated to some
loss but have very strong delay requirements. However, data traffic such as emails, fax, file transfers,
etc can tolerate some delay but almost zero loss. The other QoS measures are delay-jitter (which is a
measure of the variation in the delay) and bandwidth (which is the rate at which messages are
processed).[
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]
      </p>
      <p>Further areas of application of stochastic processes in communications involve coding theory, signal
processing, image processing, pattern recognition, speech recognition, etc.</p>
      <p>Broadly there are three types of telecommunication networks – telephony (telephone networks for
voice calls, fax, and also dial-up connections), cable-TV networks (cable, web-TV, etc), and high-speed
networks such as the Internet. We focus on high-speed networks.</p>
      <p>
        Traffic that flows through the networks can be divided into several types. Two of the most common
traffic types are ethernet packets/frames and ATM cells. Depending on the network domain, all
messages are devided into either packets or cells. The length or size of an ethernet packet ranges
anywhere from 60 bytes to 1500 bytes and generally follows a bimodal distribution. The length of ATM
cells is fixed at 53 bytes. Therefore, the network traffic comprises of millions and billions of these little
packets or cells! One of the most important tasks before evaluating the performance of
telecommunication networks is to fit appropriate models for traffic to capture their stochastic nature.
Data can be obtained by using “sniffers” on the network and analyzing a “dump” of all the packets or
cells that were generated during the time the sniffer was used. The information that can be obtained
about each packet or cell by sniffing include: its arrival time, its source, its destination, its length, its
type, etc. To fit traffic models, only the time of arrival and packet size are sufficient. [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ].
      </p>
      <p>
        Telecommunication networks are typically hierarchical in nature. Appropriate traffic models can be
used depending on the levels being considered. Although, different researchers prefer to use different
traffic models, the models can be broadly classified into two parts, discrete models and fluid models.
In the discrete model each packet or cell is assumed to be a discrete entity that can be of varying sizes.
In the fluid models it is assumed that the packets or cells are packed so close to each other that the
traffic can be assumed to be a fluid flowing across a pipe as a stochastic process with continuous time
parameters, maybe at different rates.[
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Self-similarity in traffic models</title>
      <p>
        One of the most important findings of traffic measurement studies over the last years is the observed
self-similarity in packet network traffic. A lot of research has focused on the origins of this
selfsimilarity, and the network engineering significance of this phenomenon, see for example [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
In the case of data networks, high time-resolution packet level traffic measurements are generally
recorded from the physical link over which the data is sent, by copying either an initial part of each
packet (i.e., the packet header) or every single bit of each packet (i.e., header plus payload) over to a
high-performance storage device. The last decade has seen an enormous increase in empirical studies
of high-quality and high-volume data sets of traffic measurements from a variety of different data
networks, but especially from different links within the global Internet. These studies typically describe
pertinent statistical characteristics of the temporal dynamics of the “packet” or bit rate processes (i.e.,
the time series representing the number of packets or bits per time unit, over a certain time interval) as
seen on a link within the network. They provide a piece of evidence that measured packet traffic exhibits
extended temporal correlations [i.e., long-range dependence (LRD)], and hence when viewed within
some range of (sufficiently large) time scales, the traffic appears to be fractal-like or self-similar, in the
sense that a segment of the traffic measured at some time scale looks or behaves just like an
appropriately scaled version of the traffic measured over a different time scale. In effect, this
empirically-based effort toward describing actual data network traffic has demonstrated that
selfsimilarity provides an elegant and compact mathematical framework for capturing the essence behind
the wide range of observed traffic traces (see[
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] for further references). The observed self-similar
behavior of measured traffic was in sharp contrast to what the conventional models for data traffic
predicted, models that in general lacked validation against measured traffic traces. A hallmark of these
traditional voice-based data traffic models is a correlation function which decays exponentially fast
[i.e., short-range dependence (SRD)], implying that time-aggregation quickly results in white noise
traffic characterized by the absence of any significant temporal correlations, and capable only of
reproducing the observed bursty behavior of measured traffic over a narrow range of time scales.[
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]
      </p>
      <p>
        A good starting point in understanding the impact of self-similarity was provided by Norros [
        <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
        ],
who developed a formula that can be used to estimate buffer overflow probabilities at network switches
and routers. The Norros results showed that the queueing backlogs were in general worse with
selfsimilar traffic, in the sense that the buffer sizes to achieve a certain loss objective could be significantly
greater. This agrees with the common intuition that the presence of positive correlations in the incident
traffic can only aggravate queueing delays. The long-range correlations provide themselves in extended
periods of time over which the incident traffic exceeds link capacity, leading to heavy queueing
backlogs. In contrast, a small amount of buffering is sufficient to smooth out the peaks and valleys in
SRD traffic. The large deviations principles that underpin the Norros’ formula, and its refinements
[
        <xref ref-type="bibr" rid="ref24 ref28 ref31 ref32 ref33 ref34">24,28,31-34</xref>
        ], directly relate the traffic characteristics (e.g., distribution of arrival counts) to
performance measures (e.g., queue length distributions, loss rates). They indicate that to obtain the
performance estimates necessary to accomplish even basic network engineering tasks, one must in
principle characterize an infinite family of distributions of the arrival counts. This is clearly impossible
to do in practice. In theory (i.e., assuming an idealized Gaussian setting), it enables the representation
of the infinite family of distributions by three parameters over the entire scaling region—an enormous
reduction in the description complexity. These three parameters are the mean and the variability of the
traffic process, and the self-similarity or Hurst parameter [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>There are three fundamental conditions that should be satisfied for a Gaussian self-similar traffic,
corresponding to the observation of long-range dependence in traffic, to apply:
1) the network traffic should be sufficiently aggregated so that the marginal distributions of counts
are at least approximately Gaussian (due to Central Limit Theorem);
2) the long-range dependent scaling region should span the engineering time scales of interest;
3) the impact of network controls on the traffic flows must not be significant over the
engineering time scales of interest.</p>
      <p>
        These three conditions together suggest a feasibility regime for the standard self-similar traffic
model based on fractional Brownian motion (FBM). It is delineated by: moderate to heavy traffic (so
that the aggregation levels are sufficient for a second-order description to be valid), aggregation from a
large number of low-activity sources (so that no one source is dominant), and moderate to large buffer
sizes (so that the scaling region covers the time scales of interest). [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Arrival and backlog processes</title>
      <p>To describe the character of the observed properties of traffic data more precisely, we introduce a
second order stochastic process.</p>
      <p>Let , , P is a standard probability space.</p>
      <p>Definition 1. We say that stochastic process B (t), t  0,1, is called the generalized Wiener process
(fractional Brownian motion, FBM) with the Hurst index   0,1 if the following conditions hold true:
1. it’s Gaussian stochastic process;
2. starts at zero, B (0)  0 ,
3.</p>
      <p>with zero expectation EB (t)  0 and
4. it has a covariance function R (t, s)  1 t 2  s 2  t  s 2  .</p>
      <p>2
The self-similarity parameter   0,1 , Hurst index, has the following role. If  
then the
1
2
1
2
process B (t) , is a process with dependent increments. There are
-self-similar processes with
independent increments. In the case  </p>
      <p>the increments of FBM are negatively correlated. In
contrast, when  
the increments of FBM is positively correlated and the increments of the process
1
2
B (t) are long-range dependent. The case  </p>
      <p>corresponds to short-range dependence.
1
2
1
2</p>
      <p>1</p>
      <sec id="sec-4-1">
        <title>When studying self-similar traffic, as usual,  </title>
        <p>
          is considered.
period of time 0,T . The increment will be denoted as A(s,t)  A(t)  A(s), t  s  0 . In [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] it’s
shown that input traffic ca be presented as
        </p>
        <p>
          A(t)  mt  amB (t) ,
where m is an average traffic rate, B (t) is FBM with Hurst index  , a is some constant.
If the network has one service device with the rate C  m , the backlog process can be defined as [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]
Q(t)  supA(s,t)  C(t  s) .
        </p>
        <p>st
The system with n independent identically service devices provide the backlog processes as</p>
      </sec>
      <sec id="sec-4-2">
        <title>Really, in [24] it was shown that</title>
      </sec>
      <sec id="sec-4-3">
        <title>Let us denote</title>
        <p>x </p>
        <p>
          2 am
Theorem 1.[
          <xref ref-type="bibr" rid="ref24">24</xref>
          ] For x  D we have
        </p>
        <p>b  T (C  m)
Here, the symbol  means identically distributed quantity.</p>
        <p>Study now the probability of overloading by threshold b of Q(t) on time interval 0,T . Let
We are interested in the upper bound for buffer content distribution</p>
        <p> n 
Qn (t)  sup  Ai (s,t)  nC(t  s) .</p>
        <p>st i1 
Q  sup Q(t) ,  (b)  PQ  b .</p>
        <p>t0,T </p>
        <p> 
PQ  b  P sup Q(t)  b .</p>
        <p>t0,T  

PQ  b  P sup  B (t)  
t0,T 
b  T (C  m) </p>
        <p>
2 am 
, then the following theorem is fulfilled.
where
V  4T 2 .</p>
        <p>   x  D2 
P sup  B (t)   x  2exp  
t0,T    2V 
(1)</p>
        <p>Remark 1. Using the estimates obtained, we can determine what the threshold should be, so that the
probability of being exceeded is less than given.</p>
        <p>Thus,</p>
        <p>   
PQ  b  P  sup Q(t)  b  P  sup  B (t)   x   b , if
t0,T   t0,T  </p>
        <p> x  D2 
x  D and 2exp     b .</p>
        <p> 2V </p>
      </sec>
      <sec id="sec-4-4">
        <title>And the threshold should be b  2D am  T (C  m) .</title>
        <p>The value  b one can interpretate as significance level.</p>
        <p>The linear system with input-output signals is often used in practice. Therefore, there is an interesting
task, how to estimate the buffer overflow, taking into account the input and output data.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Square-Gaussian stochastic processes</title>
      <p>To connect the input traffic signal of some linear system and the response (output) of this system we
should, on the one hand, find out a such functional relation that depends on input and output signals.
On the other hand, such relationship should be easily investigated. It’s natural to consider a quadratic
form of input and output process. That’s why we introduce a quadratic form on Gaussian distributions.
Let’s give the definitions and some properties of Square-Gaussian random variables and stochastic
processes.</p>
      <p>Assume that (T , ) is some compact metric space with metric  .</p>
      <p>Definition 2. Let   {t , t T} be a family of zero-mean joint Gaussian random variables. A space
SG () is a space of Square-Gaussian random variables if any element of this space  SG () can
written as</p>
      <p>where   (1,2 ,...,n ), k , k  1, n, A is a real-valued matrix or an element,  SG () is a
square mean limit of the sequence</p>
      <p>  A T  E A T ,
  l.i.m( n A nT  E n A nT ).</p>
      <p>n
Remark 2. The space SG () is a Banach space with respect to the norm || || E 2 .
Definition 3. A stochastic process (t), t [0, T] , is called Square-Gaussian if for any fixed t є [0,T]
sup | (t) | 
each random variable (t) belongs to the space SG () and t[0,T ]</p>
      <p>
        Theorem 2. [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] Assume that (t), t [0, T] , is a separable Square-Gaussian stochastic process and
sup
|ts|h
      </p>
      <p>D( (t)  (s))   h  kh ,    ,
(2)
where k is some constant. Then for х such that
the inequality
holds true where    sup (D( (t)))1/2 .</p>
      <p>t[0,T ]
x 
2 2 max{  , k(T/ 2) }
</p>
      <p>,
P  sup | (t) | x  4e3 exp  x   x 2/ 1
t[0,T ]   2 2    2 2   
1/2
2x </p>
      <p>
2  
6. Upper bound of buffer content distribution taking into account input and
output traffics of stochastic system</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] it’s shown that the distribution of backlog buffer can be estimated by the distribution of
suprema for FBM.
      </p>
      <p>In the case of traffic signal transfer on some system not only input process but also the response
(output) of system should be taken into account. For these purposes the distribution of suprema of
Square-Gaussian processes can be used.</p>
      <p>Consider a time-invariant linear system with a real-valued square integrable impulse response
function H () which is defined on a finite domain  [0, T] . This means that the response of the system
to an input signal X (t) which is observed on [ T, T] has the following form
0</p>
      <p>T</p>
      <p>Y (t)   H () X(t ) d , t [0, T]
and H  L2 ([0, T]) .</p>
      <p>
        Some properties and estimators of impulse response function can be found in [
        <xref ref-type="bibr" rid="ref29 ref30">29-30</xref>
        ].
In [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ] we can find that Fractional Brownian Motion can be shown in the form of random series

B (t)  X (t)   ak sin  xk t  Xk  bk 1 cos  yk t Yk 
      </p>
      <p>k1
where X k ,Yk  are uncorrelated standard Gaussian random variables,
(3)
xk  are zeros of Bessel function J  (x) and
yk  zeros of Bessel function J1 (x) ,
2  12s1in( ) .</p>
      <p>Suppose that the impulse response function is known. We also suggest that the input signal in system
(3) is FBM with Hurst index  . From (3) follows that the response of the system (output) Y (t) can be
presented as
where the functions ck (t), sk (t) equal</p>
      <p>
Y t  Y (t)   (k  ck (t) k sk (t)),</p>
      <p>k1</p>
      <p>T
ck (t)  bk  H ()(1 cos(yk (t ))) d ,
0</p>
      <p>T
sk (t)  ak  H () sin(xk (t )) d .</p>
      <p>0</p>
      <p>
        In this section we investigate the backlog of system with input signal FBM X (t) , taking into
account the output of the system Y (t) . To perform such results, we use the theory of Square-Gaussian
random variables and processes. Sometimes the input process isn’t known and it’s possible to construct
the model of the process and then to estimate the probability of overflow. The results on simulation of
Gaussian process were obtained in [
        <xref ref-type="bibr" rid="ref28 ref29">28,29</xref>
        ].
      </p>
      <p>Under  t we denote the sum of square X (t) and Y (t)</p>
      <p> t  (X (t))2  (Y (t))2 .</p>
      <p>
        Making the same manipulation as in [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] the probability of backlog can be estimated as

P Q  b  P  sup  X 2 (t)  Y2 (t)  
t0,T
b  T (C  m) 
      </p>
      <p> 
2 am 
  b  T (C  m) 2 
 P  sup  X 2 (t)  Y2 (t)     
t0,T  2 am  
 
 P  sup | (t)  E t | x0  ,</p>
      <p>t0,T 
 b  T (C  m) 2
where x0     sup E t .</p>
      <p> 2 am  t[0,T ]</p>
      <p>It’s easy to shown that zero-mean process  t  E t is Square-Gaussian. So, Theorem 2 can be
applied in this case.</p>
      <p>Let’s make the following notation:
1kl  1kl (t)  bk al (1 cos(yk t))(1 cos(yl t))  ck (t) cl (t);
k2l  k2l (t)  2(bk al (1 cos(yk t)) sin(xl t)  ck (t) sl (t));
3kl  3kl (t)  ak al sin(xk t) sin(xl t)  sk (t) sl (t).</p>
      <p>Then by (3), (4) we have that quadratic form  t can be written as</p>
      <p> 
 (t)    (1kl (t)k l  k2l (t)k l  3kl (t)k l ).</p>
      <p>k1l1</p>
      <sec id="sec-5-1">
        <title>Let us also denote the increments of the functions</title>
        <p>(4)
(5)</p>
        <p>At first, present the auxiliary relationships concerning mean, variance and variance of increments
for the process  t  .</p>
        <p>Lemma 1. The mean, variance and variance for the increments of stochastic form (t) equal:

E (t)   (1kk (t)  3kk (t));
k 1</p>
        <p>
D (t)   2(1kl (t))2  (k2l (t))2  2(3kl (t))2 ;
k,l1
Proof.</p>
        <p>Since k , l , k  0,l  0, are jointly independent Gaussian with
average of the process is</p>
        <p>  
E(t)    (1kl (t) E k l  2kl (t) E k l  3kl (t) E k l )   (1kk (t)  3kk (t))
k 1 l1 k 1
Deriving the variance of the process  t  we should first find the second moment
  2
E((t))2  E   (1kl (t) E k l  k2l (t) E k l  3kl (t) E k l )  .</p>
        <p> k,l1 
mean 0 and variance 1 then the</p>
        <p>By Isserlis formulas we can compute the moment of the forth order for standard Gaussian random
variables:</p>
        <p>EX1X 2 X3 X 4  EX1X 2 EX X</p>
        <p>3 4  EX1X3EX 2 X 4  EX1X 4 EX 2 X3 .</p>
      </sec>
      <sec id="sec-5-2">
        <title>Then we obtain</title>
        <p> 
E((t))2  E   (1kk (t)1ll (t)  2(1kl (t))2  (2kl (t))2 3kk (t)3ll (t)  2(3kl (t))2  21kk (t)3ll (t)).</p>
        <p>k1 l1</p>
      </sec>
      <sec id="sec-5-3">
        <title>Therefore, the variance of the process  t  should be</title>
        <p>D(t)  E((t))2  (E (t))2 

  2(1kl (t))2  (2kl (t))2  2(3kl (t))2 .</p>
        <p>k,l 1
Similarly, it can be proved the formula for variance of process increments (t)  (s) .
  1/2
If we put dkl  sup (2(1kl (t))2  (2kl (t))2  2(3kl (t))2 ) . Then D(t)    dkl  : 0 .</p>
        <p>t[0,T]  k,l1 
Under some conditions it could be shown that (D((t)  (s)))1/2  K | t s | ,  (0,1],
where K is a some constant.</p>
        <p>The following theorem gives the upper bound of the backlog buffer content of the system with
respect to input and output process providing equal weights for them.</p>
        <p>Theorem 3. Suppose that the input traffic of system (3) is FBM X (t). If
x0 
2 2 max{  , K (T/ 2) }

, then
the inequality</p>
        <p>P Q  b  4e3 exp  x0   x 2/ 1 2x0 1/2 .</p>
        <p> 2 2    2 2    2  </p>
        <p>Using the obtained results, it is possible to estimate the required buffer size in the framework of
different measurement options. The estimation is performed with given accuracy and reliability.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>7. Case study</title>
      <p>In this section we will investigate the dependence of the Hurst index and the threshold value in
backlog process, the dependence of the service characteristics such as rate and the value of the threshold.</p>
      <p>At first, we present the results of simulation of FBM with different Hurst indices. According to the
value of the Hurst parameter (α) FBM detects a long dependence and a short dependence. Let's
demonstrate each of these two cases on the graphs. As it can be seen in Fig. 1 and in Fig. 2, the higher
the Hurst index, the smoother the curve will be.</p>
      <p>Let's consider the dependencies of the upper bound of buffer content and simulation on different
traffic characteristics. Let us remind the notations that were used in this paper: m is the average traffic
rate, C is the service rate (it is necessary that C&gt;m), α is the Hurst index, T is the time period over which
the service process is considered, and is a certain traffic coefficient, the probability of traffic buffer
overflow is less then a given εb that can be considered as significance level.</p>
      <p>Applying Theorem 1 and substituting the values of above described parameters: εb = 0.05; C = 100;
m = 90; a = 1; T = 1;  = 0.9, we obtain the upper bound of traffic backlog threshold should be b &gt;=
62,6. For parameters εb = 0.05; C = 100; m = 90; a = 1; T = 1;  = 0.2 it follows that b &gt;= 131.2.</p>
      <p>Thus, changing the value of the Hurst index as an input argument (and not changing the value of
the service rate C and the average rate of arrival traffic m), we have the following dependence, shown
in Fig. 3. It’s seen that the larger Hurst index is the smaller threshold value is.</p>
    </sec>
    <sec id="sec-7">
      <title>8. Conclusions</title>
      <p>One of the most important findings of traffic studies over the last years is the property of
selfsimilarity in packet network. This paper investigated self-similar traffic model driven by FBM. We
defined the arrival and backlog processes of stochastic network and obtained estimation of upper bound
probability buffer overflow.</p>
      <p>We also explored a traffic that enters as input on some time-invariant linear system and found the
estimation of buffer content distribution taking into account input traffic and a response of stochastic
system. Finally, we examined the obtained results in one particular case and showed how the threshold
level of buffer overflow depends on such parameters of stochastic network as Hurst index and arrival
traffic rate.</p>
      <p>We see further research of the problem in the study of generalized FBM to consider traffic data. The
generalization of FBM can be guided in several directions. It is possible to generalize the type of
covariance function for Gaussian processes, while the stationary increments property can be lost. The
other way to generalize FBM is to go away from Gaussian distributions allowing to include the
distribution with heavy tails that is more attractive in case of network framework.</p>
      <p>The algorithms for statistical modeling of self-similar traffic allows to use of computational
experiment methods for research and analysis of traffic in telecommunication networks.</p>
    </sec>
    <sec id="sec-8">
      <title>9. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>I.</given-names>
            <surname>Norros</surname>
          </string-name>
          ,
          <article-title>A storage model with self-similar input</article-title>
          .
          <source>Queueing Systems</source>
          , vol.
          <volume>16</volume>
          ,
          <year>1994</year>
          , pp.
          <fpage>387</fpage>
          -
          <lpage>396</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kilpi</surname>
          </string-name>
          and
          <string-name>
            <surname>I. Norros</surname>
          </string-name>
          ,
          <article-title>Testing the Gaussian approximation of aggregate traffic</article-title>
          .
          <source>Proceedings of the second ACM SIGCOMM Workshop</source>
          , Marseille, France,
          <year>2002</year>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>61</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Yu</surname>
          </string-name>
          and
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Petropulu</surname>
          </string-name>
          ,
          <article-title>"Study of the Effect of the Wireless Gateway on Incoming Self-Similar Traffic,"</article-title>
          <source>in IEEE Transactions on Signal Processing</source>
          , vol.
          <volume>54</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>3741</fpage>
          -
          <lpage>3758</lpage>
          , Oct.
          <year>2006</year>
          , doi: 10.1109/TSP.
          <year>2006</year>
          .
          <volume>879329</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>B.</given-names>
            <surname>Yan</surname>
          </string-name>
          et al.,
          <article-title>"Tidal-traffic-aware routing and spectrum allocation in elastic optical networks,"</article-title>
          <source>in Journal of Optical Communications and Networking</source>
          , vol.
          <volume>10</volume>
          , no.
          <issue>11</issue>
          , pp.
          <fpage>832</fpage>
          -
          <lpage>842</lpage>
          , Nov.
          <year>2018</year>
          , doi: 10.1364/JOCN.10.000832.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B.</given-names>
            <surname>Tsybakov</surname>
          </string-name>
          and
          <string-name>
            <given-names>N. D.</given-names>
            <surname>Georganas</surname>
          </string-name>
          ,
          <article-title>"On self-similar traffic in ATM queues: definitions, overflow probability bound, and cell delay distribution,"</article-title>
          <source>in IEEE/ACM Transactions on Networking</source>
          , vol.
          <volume>5</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>397</fpage>
          -
          <lpage>409</lpage>
          ,
          <year>June 1997</year>
          , doi: 10.1109/90.611104.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Wilian de Godoy Stenico</surname>
          </string-name>
          and
          <string-name>
            <given-names>L. Luan</given-names>
            <surname>Ling</surname>
          </string-name>
          ,
          <article-title>"A New Network Traffic Modeling Based in Conservative Multiplicative Cascade with Weights Newton Binomial,"</article-title>
          <source>in IEEE Latin America Transactions</source>
          , vol.
          <volume>11</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>1143</fpage>
          -
          <lpage>1155</lpage>
          , Sept.
          <year>2013</year>
          , doi: 10.1109/TLA.
          <year>2013</year>
          .
          <volume>6684388</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>J.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Luo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wen</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Zhong</surname>
          </string-name>
          ,
          <article-title>"Learning Multiaspect Traffic Couplings by Multirelational Graph Attention Networks for Traffic Prediction,"</article-title>
          <source>in IEEE Transactions on Intelligent Transportation Systems</source>
          , vol.
          <volume>23</volume>
          , no.
          <issue>11</issue>
          , pp.
          <fpage>20681</fpage>
          -
          <lpage>20695</lpage>
          , Nov.
          <year>2022</year>
          , doi: 10.1109/TITS.
          <year>2022</year>
          .
          <volume>3173689</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>X.</given-names>
            <surname>Ma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Jiang</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <article-title>"Cellular Network Traffic Prediction Based on Correlation ConvLSTM and Self-Attention Network,"</article-title>
          <source>in IEEE Communications Letters</source>
          , vol.
          <volume>27</volume>
          , no.
          <issue>7</issue>
          , pp.
          <fpage>1909</fpage>
          -
          <lpage>1912</lpage>
          ,
          <year>July 2023</year>
          , doi: 10.1109/LCOMM.
          <year>2023</year>
          .
          <volume>3275327</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Betker</surname>
          </string-name>
          et al.,
          <article-title>"Comprehensive topology and traffic model of a nationwide telecommunication network,"</article-title>
          <source>in Journal of Optical Communications and Networking</source>
          , vol.
          <volume>6</volume>
          , no.
          <issue>11</issue>
          , pp.
          <fpage>1038</fpage>
          -
          <lpage>1047</lpage>
          ,
          <year>November 2014</year>
          , doi: 10.1364/JOCN.6.001038.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chabaa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zeroual</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Antari</surname>
          </string-name>
          ,
          <source>Identification and Prediction of Internet traffic Using Artificial Neural Networks. Intelligent learning systems &amp; applications. No.2.- 2010</source>
          , pp.
          <fpage>147</fpage>
          -
          <lpage>155</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gowrishankar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Satyanarayana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Time</given-names>
            <surname>Series Modeling</surname>
          </string-name>
          and
          <article-title>Prediction of Wireless Network Traffic</article-title>
          .
          <source>International Journal of Interactive Mobile Technologies</source>
          . Vol.
          <volume>4</volume>
          , no.
          <issue>1</issue>
          ,
          <issue>2009</issue>
          , pp.
          <fpage>53</fpage>
          -
          <lpage>62</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
            <surname>Veitch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Hohn</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Abry</surname>
          </string-name>
          ,
          <article-title>Multifractality in TCP/IP traffic: the case against</article-title>
          .
          <source>Computer Nerworks</source>
          ,
          <year>2005</year>
          . №
          <volume>48</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>293</fpage>
          -
          <lpage>313</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gajda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wylomanska</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <article-title>Fractional Lévy stable motion time-changed by gamma subordinator</article-title>
          ,
          <source>Communications in Statistics - Theory and Methods</source>
          ,
          <year>2018</year>
          . DOI: https://doi.org/10.1080/03610926.
          <year>2018</year>
          .
          <volume>1523430</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Pashko</surname>
          </string-name>
          <string-name>
            <surname>A.</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Rozora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Syniavska</surname>
          </string-name>
          ,
          <source>Estimation of Hurst Index and Traffic Simulation. Lecture Notes on Data Engineering and Communications Technologies</source>
          ,
          <volume>83</volume>
          ,
          <year>2021</year>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>G.</given-names>
            <surname>Lozhkovskyi</surname>
          </string-name>
          ,
          <article-title>"Simplified calculation of the hurst coefficient by the R/S-analysis method: The coefficient H is equal to the ratio of the relative displacement of two points of the line along the x</article-title>
          and y axes,
          <source>" 2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)</source>
          , Lviv, Ukraine,
          <year>2017</year>
          , pp.
          <fpage>254</fpage>
          -
          <lpage>257</lpage>
          , doi: 10.1109/AIACT.
          <year>2017</year>
          .
          <volume>8020113</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>T.</given-names>
            <surname>Pin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Fei</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. Q.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <article-title>"A Novel DPM Algorithm Based on the Hurst Probability,"</article-title>
          <source>2008 International Conference on Embedded Software and Systems</source>
          , Chengdu, China,
          <year>2008</year>
          , pp.
          <fpage>175</fpage>
          -
          <lpage>180</lpage>
          , doi: 10.1109/ICESS.
          <year>2008</year>
          .
          <volume>67</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Savu-Jivanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Isar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Stolojescu-Crisan</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Gal</surname>
          </string-name>
          ,
          <article-title>"Network Self-Similar Traffic Generator with Variable Hurst Parameter," 2020 International Symposium on Electronics and Telecommunications (ISETC), Timisoara</article-title>
          , Romania,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi: 10.1109/ISETC50328.
          <year>2020</year>
          .
          <volume>9301120</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>C.</given-names>
            <surname>Zhong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Yao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Yi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bai</surname>
          </string-name>
          and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Hurst Exponent Analysis Of Schizophrenia Electroencephalogram Based On Multi-point Fractional Brownian Bridge," 2022 15th International Congress on Image and Signal Processing</source>
          , BioMedical Engineering and
          <string-name>
            <surname>Informatics (CISP-BMEI</surname>
            <given-names>)</given-names>
          </string-name>
          , Beijing, China,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.1109/CISPBMEI56279.
          <year>2022</year>
          .
          <volume>9980315</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ling</surname>
          </string-name>
          et al.,
          <source>"Real-time Detection of DDoS Attacks Based on Hurst Index," 2022 2nd International Conference on Networking Systems of AI (INSAI)</source>
          , Shanghai, China,
          <year>2022</year>
          , pp.
          <fpage>42</fpage>
          -
          <lpage>45</lpage>
          , doi: 10.1109/INSAI56792.
          <year>2022</year>
          .
          <volume>00018</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Lei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Liu</surname>
          </string-name>
          and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>"Long-memory behavior analysis of China stock market based on Hurst exponent," 2017 29th Chinese Control And Decision Conference (CCDC), Chongqing</article-title>
          , China,
          <year>2017</year>
          , pp.
          <fpage>1710</fpage>
          -
          <lpage>1712</lpage>
          , doi: 10.1109/CCDC.
          <year>2017</year>
          .
          <volume>7978792</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>K.</given-names>
            <surname>Marri</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Swaminathan</surname>
          </string-name>
          ,
          <article-title>"Multifractal analysis of sEMG signals for fatigue assessment in dynamic contractions using Hurst exponents," 2015 41st Annual Northeast Biomedical Engineering Conference (NEBEC), Troy</article-title>
          ,
          <string-name>
            <surname>NY</surname>
          </string-name>
          , USA,
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>2</lpage>
          , doi: 10.1109/NEBEC.
          <year>2015</year>
          .
          <volume>7117117</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Renjith</surname>
          </string-name>
          and
          <string-name>
            <given-names>K. G.</given-names>
            <surname>Manju</surname>
          </string-name>
          ,
          <article-title>"Speech based emotion recognition in Tamil and Telugu using LPCC and hurst parameters - A comparitive study using KNN and</article-title>
          ANN classifiers,
          <article-title>" 2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT), Kollam</article-title>
          , India,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/ICCPCT.
          <year>2017</year>
          .
          <volume>8074220</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>A. B. Dieker</surname>
          </string-name>
          , Simulation of fractional Brownian motion,
          <source>Master's thesis</source>
          , Vrije Universiteit Amsterdam, Amsterdam,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Pashko</surname>
          </string-name>
          <string-name>
            <surname>A.</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.Rozora</surname>
          </string-name>
          ,
          <article-title>Estimation of Probability Overflow for Self-Similar Traffic</article-title>
          .
          <source>2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology, PIC S and T 2021 - Proceedings</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>28</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>A.</given-names>
            <surname>Erramilli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Roughan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Veitch</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Willinger</surname>
          </string-name>
          ,
          <article-title>Self-similar traffic and network dynamics</article-title>
          ,
          <source>in Proceedings of the IEEE</source>
          , vol.
          <volume>90</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>800</fpage>
          -
          <lpage>819</lpage>
          , May
          <year>2002</year>
          , doi: 10.1109/JPROC.
          <year>2002</year>
          .
          <volume>1015008</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>P.</given-names>
            <surname>Nikolaus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Henningsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Beck</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Schmitt</surname>
          </string-name>
          ,
          <source>Integrating Fractional Brownian Motion Arrivals into the Statistical Network Calculus</source>
          ,
          <year>2018</year>
          30th
          <string-name>
            <given-names>International</given-names>
            <surname>Teletraffic</surname>
          </string-name>
          <article-title>Congress (ITC 30)</article-title>
          , Vienna, Austria,
          <year>2018</year>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>42</lpage>
          , doi: 10.1109/ITC30.
          <year>2018</year>
          .
          <volume>10059</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>N.</given-names>
            <surname>Gautam</surname>
          </string-name>
          ,
          <article-title>Stochastic Models in Telecommunications for Optimal Design, Control</article-title>
          and
          <string-name>
            <given-names>Performance</given-names>
            <surname>Evaluation</surname>
          </string-name>
          , Handbook of Statistics,
          <volume>21</volume>
          ,
          <year>2003</year>
          , pp.
          <fpage>243</fpage>
          -
          <lpage>284</lpage>
          , DOI:10.1016/S0169-
          <volume>7161</volume>
          (
          <issue>03</issue>
          )
          <fpage>21009</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>Y. S.</given-names>
            <surname>Herasymiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. V.</given-names>
            <surname>Rozora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Pashko</surname>
          </string-name>
          ,
          <article-title>On probability estimation of buffer overflow for communication networks</article-title>
          , .
          <source>Bulletin of Taras Shevchenko National University of Kyiv. Series: Physics &amp; Mathematics, 2</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>64</fpage>
          -
          <lpage>69</lpage>
          . https://doi.org/10.17721/1812-
          <fpage>5409</fpage>
          .
          <year>2022</year>
          /2.8
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Yu</surname>
          </string-name>
          .
          <article-title>Kozachenko and I. Rozora, Simulation of Gaussian stochastic processes</article-title>
          .
          <source>Random Oper. and Stochastic Equ</source>
          .
          <volume>11</volume>
          (
          <issue>3</issue>
          ),
          <year>2003</year>
          , pp.
          <fpage>275</fpage>
          -
          <lpage>296</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>I.</given-names>
            <surname>Rozora</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Pashko</surname>
          </string-name>
          ,
          <article-title>Accuracy of simulation for the network traffic in the form of Fractional Brownian Motion</article-title>
          , 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering,
          <source>TCSET 2018 - Proceedings 2018-April</source>
          , pp.
          <fpage>840</fpage>
          -
          <lpage>845</lpage>
          . DOI: https://doi.org/10.1109/TCSET.
          <year>2018</year>
          .8336328
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>W.</given-names>
            <surname>Willinger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Taqqu</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Erramilli</surname>
          </string-name>
          ,
          <article-title>A bibliographical guide to self-similar traffic and performance modeling for modern high-speed networks</article-title>
          ,
          <source>in Stochastic Networks: Theory and Applications</source>
          ,
          <string-name>
            <given-names>F. P.</given-names>
            <surname>Kelly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zachary</surname>
          </string-name>
          , and I. Ziedins, Eds. Oxford, U.K.: Clarendon Press,
          <year>1996</year>
          , vol.
          <volume>4</volume>
          ,
          <string-name>
            <surname>Roy</surname>
          </string-name>
          .
          <source>Stat. Soc. Lecture Note Series</source>
          , pp.
          <fpage>339</fpage>
          -
          <lpage>366</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>N. G.</given-names>
            <surname>Duffield and N. O'Connell</surname>
          </string-name>
          ,
          <article-title>Large deviations and overflow probabilities for the general single-server queue, with applications</article-title>
          ,
          <source>Math. Proc. Cambridge Philos. Soc.</source>
          , vol.
          <volume>118</volume>
          , pp.
          <fpage>363</fpage>
          -
          <lpage>374</lpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>L.</given-names>
            <surname>Massoulie</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Simonian</surname>
          </string-name>
          ,
          <article-title>Large buffer asymptotics for the queue with FBM input</article-title>
          ,
          <source>J. Appl. Probab.</source>
          , vol.
          <volume>36</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>894</fpage>
          -
          <lpage>906</lpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>O.</given-names>
            <surname>Narayan</surname>
          </string-name>
          ,
          <article-title>Exact asymptotic queue length distribution for fractional Brownian traffic</article-title>
          ,
          <source>Advances in Perform. Anal.</source>
          , vol.
          <volume>1</volume>
          , pp.
          <fpage>39</fpage>
          -
          <lpage>63</lpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Yu</surname>
          </string-name>
          . Mishura,
          <article-title>Stochastic calculus for fractional Brownian motion and related processes</article-title>
          . Berlin: Springer, -
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>