<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Ensuring the Availability of Information Resources Through the Use of an Intelligent Communication Network with the Drift of Parameters of Autonomous Segments</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Andrii Fesenko</string-name>
          <email>andrii.fesenko@knu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Toroshanko</string-name>
          <email>oleksandr.toroshanko@knu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Shcheblanin</string-name>
          <email>shcheblanin.yurii@knu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Inna Mykhalchuk</string-name>
          <email>inna.mykhalchuk@knu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymyrska str., Kyiv, 01601</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>456</fpage>
      <lpage>461</lpage>
      <abstract>
        <p>The purpose of the article is the analysis of the features of functioning and the development of a mathematical model of the system for ensuring the availability of information resources due to the use of an intelligent communication network with random delays of signal and control information. The control system must ensure the operability of a network with a large amount of network equipment as a complex system in conditions of malfunctions and failures in the equipment, uncontrolled changes in operating modes, drift of network equipment parameters and its autonomous segments, disturbed actions, interference and other adverse factors. The problem of estimating the parameters and the state of a dynamic system with a delay based on differential-difference equations is considered. It is shown that the delay of the argument even for a simple differential equation of the first order with constant coefficients leads to the appearance of an aftereffect, which formally corresponds to an arbitrary variation of the order of the equation. Such differential equations are called equations with a deviating argument. The results of a numerical analysis based on the digital modelling of the control system of the parameters of the switching node are presented. The parameters of the control system for various parameters of network traffic with self-similar properties and with various random errors and distortions are studied. An approach based on regular monitoring of the parameters and state of network nodes is proposed, taking into account the delays of incoming information about the parameters and state of a specific network node and the delays of control information necessary to regulate the parameters of a network node as a control object.</p>
      </abstract>
      <kwd-group>
        <kwd>1 availability of information resources</kwd>
        <kwd>control system</kwd>
        <kwd>intellectual network</kwd>
        <kwd>estimation of network parameters</kwd>
        <kwd>deviating argument</kwd>
        <kwd>control information</kwd>
        <kwd>control of reliability</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Modern intelligent telecommunication networks are characterized by a large number of various
equipment from various manufacturers, and a wide range of services provided, the number of which is
constantly growing. The idea of intelligent networks is to separate the functions of support, creation
(development), and testing of new telecommunication services from the main functions of the switching
node [1, 2, 3]. Service delivery functions once reserved for traditional switching systems are migrating
to switch-independent computing platforms. It should be noted here that the intelligent network in its
meaning and tasks has nothing to do with the systems of the so-called artificial intelligence. In essence,
this is just an architectural concept of communication networks, the most suitable for the introduction
of new integrated services and their separation from switching processes [2, 4]. In addition, new services
are often multi-step hierarchical procedures. The problems of managing an intelligent network with a
wide range of such services have their specifics. Thus, the management tools of an intelligent
telecommunications network are a complex system with incomplete information about the state and
parameters of the network as a whole and its autonomous segments [5, 6, 7].</p>
    </sec>
    <sec id="sec-2">
      <title>2. Formulation of the research task</title>
      <p>When transmitting data and processing it in intermediate switching nodes, there are significant
delays in signalling and controlling information, as a result of which the level of information security,
namely the criterion of information availability, decreases. This situation is especially unacceptable for
information systems classified as objects of critical information infrastructure. To ensure the stable
operation of the telecommunications network and control system, it is necessary to constantly monitor
the parameters and state of the network, and search and predict faults, including a load of individual
routes and nodes of autonomous network segments [8, 9, 10]. Let us consider the effect of signal and
control information delays on the efficiency of searching for and determining the locations of failures,
overloads, and emergency modes in communication networks. The specificity of the problem is caused
by delays in the transmission of signal and control information, which are random in nature and can
vary over a wide range. Argument delay even for a simple first-order differential equation with constant
coefficients leads to the appearance of an aftereffect (this formally corresponds to an arbitrary variation
of the order of the equation) [11]. In addition, if the original equation has a stable solution, the stability
of the solution of the same equation with a delayed (so-called deviant) argument is not guaranteed. Such
differential equations are called equations with deviating argument. There is no general method for
solving such problems [5, 12], but it was found that the most effective method for the qualitative
analysis of differential equations with a deviating argument is the approximation of derivatives by finite
differences. In other words, there is a transition from the differential to difference equations. This
approach is quite natural for digital systems and packet-switched telecommunication networks.</p>
      <p>It is shown in [13] that when managing flows and processes in information and communication
networks, there are delays in obtaining information about the state and parameters of the network, which
are random in nature and can vary over a wide range. There are also delays in the information used to
change the parameters of network nodes, routes, and autonomous parts.</p>
      <p>The purpose of the article is to develop a control system for an intelligent telecommunications
network with a large amount of network equipment and random delays in signal and control
information. The control system must ensure the operability of the network as a complex system in the
event of failures and failures in equipment, uncontrolled changes in operating modes, the effects of
disturbances, interference and other adverse factors.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Mathematical model of a control system with information delays</title>
      <p>The task of estimating the parameters and state of a dynamic system with delay, which is used as a
network segment model, is a retrospective identification problem [14]. It is assumed that the segment
under consideration is practically independent of other segments and is connected to them by
appropriate transmission lines. Consider the problem of discretizing a differential equation with a
retarded argument and ensuring the stability of the solution. An inhomogeneous differential equation
with constant coefficients and a deviating argument has the following form:
dyas t 
dt</p>
      <p> byas t  k   u t  m  ,
where yas t  – desired function; u t  – excitation; b – feedback coefficient: k , m – delays of signal
and control information, respectively, and in the general case k  m .</p>
      <p>
        Under conditions of comparable smallness of network clock synchronization intervals in comparison
with changes in its parameters and state, equation (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) can be discretized as follows. We approximate it
by a finite difference equation of the form
      </p>
      <p>
        yas n  yas n 1  byas n  k   u n  m ,
where yas  n – object state function; u n  m – control signal; k and m are the delays of the status
and control signals, respectively. In general, n  m .
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
The system function of the object, which is described by equation (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), has the following form:
zm
H  z  
      </p>
      <p>1 z1  bzk ,
zk  zk 1  b  0 .
whose characteristic polynomial has a rather specific form:</p>
      <p>
        System function (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) has zero m-th order, which is located at an infinitely distant point z-plane, and
k poles, located at equal angular distances   2 k from each other.
      </p>
      <p>
        In [15] asymptotic estimates for the stability of systems with a characteristic polynomial of the form
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) and the stability region were calculated. It is shown that to maintain the stability of the control
system, it is necessary to reduce the absolute value of the feedback coefficient in the control loop with
an increase in control signal delays. However, the problem of finding the relationship between the
feedback coefficient and the delay does not have a unique closed-form solution. In addition, there are
uncontrolled deviations in dynamic characteristics and deterioration in the quality of control.
      </p>
      <p>
        Equation (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) can be considered the simplest control equation for a concentrated object with delays
in state and control signals. Using the discretization method of a differential equation with a delayed
argument, a typical model of a network node as an object of control has been developed, which is shown
in Figure 1.
      </p>
      <p>x(n)
x1(n)
u(n)
z-m
z-k</p>
      <p>HNN(z)</p>
      <p>z-n
HCS(z)
(n)
y(n)</p>
      <p>Here x  n – information signal; u  n – control signal; zm , zk – delay elements that take place
in the delivery of information; in general, the delay value of information about the upstream and
downstream data exchange channels do not match ( k  m ); z l – element for delaying the reaction of
a network node to variations in its state; zr – packet processing delay in the control object;  n –
external noise and interference causing distortion and packet loss. A network node as a control object
is a feedback system that must provide some response to variations in its state, for example, general
congestion, reception congestion, bandwidth reduction, buffer underrun, improper functioning,
complete or partial failure, etc. For the correct operation of reliability management systems, the
response time must be tuned very carefully [10]. With a very short response period of the target node,
the control system will receive a sequence of conflicting information signals. The system will be in a
state of undamped oscillations and will not come to a stable state. On the other hand, if the response
period is too long, the state mechanism will respond too slowly to be of any real benefit at all. To have
the appropriate quality of the control process, you need to apply a certain method of adaptation, but the
correct choice of time constants is not a trivial matter. Let's consider this problem in more detail.</p>
      <p>The equation of the system in finite differences for the control data has the following form:
u1 n  u n  m hNN n  u1 n  k  l  hCS n .</p>
      <p>Let's write the expression for the transfer function H1  z   X1  z  X  z  object controlled by the
control system:</p>
      <p>H1  z  </p>
      <p>1
1 H NN  z  zm HCS  z  z k l
.</p>
      <p>
        (
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
following form:
interference   n ,
      </p>
      <p>H y  z  </p>
      <p>zr
1 H NN  z  HCS  z  zmkl
   z  .</p>
      <p>
        (
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
where   z  ̶ the ratio of signal energy to the modulus of the complex spectral density of external
      </p>
      <p>
        Expression (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ) in the case of large signal-to-noise ratios converges to the general transfer function
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        ) of a system with signal and control information delays.
3.1.
      </p>
    </sec>
    <sec id="sec-4">
      <title>Numerical analysis results</title>
      <p>x t </p>
      <p>
        Using expressions (
        <xref ref-type="bibr" rid="ref5 ref6 ref7">5-7</xref>
        ), a digital simulation of the control system for the parameters of the
switching node was carried out. The parameters of the control system were investigated for various
network traffic parameters (in particular, Triple/QuadroPlay traffic with self-similar properties) and
with various random errors and distortions. To ensure the global stability of the control system, the
feedback coefficients were specially selected.
      </p>
      <p>The main result of the simulation is the dependence of queue length variations on the response time
of the network node (number of periods l , which corresponds to the delay z l ) compared with the
delay time of data processing and delivery (the number of periods, respectively zm , zk ). As a test
information signal a step function of changing the instantaneous intensity of network traffic was
chosen with an additive random process superimposed on it, distributed according to the Pareto law.</p>
      <p>The figures below show the simulation results for two values of the relative network node response
delay l with a full delay in data processing and delivery m  k  10 : l = 20 (Figure 2) and l = 10
q  k 
(Figure 3). Here – is a transient response of a control system with processing delays of
information and control signals. As can be seen from Figures 2 and 3, with a significant difference in
the response delay of the network node and the total delay in the processing and delivery of data, there
is a minimum stability margin of the control system according to the buffer overload criterion.</p>
      <p>With bursts of network activity, caused, for example, by the bursting of self-similar traffic, the risk
of buffer overload, control signal packet dropping, and, as a result, the network management system
switching to the undamped oscillation mode [10] increases. At the same time, when matching the
mentioned delays, a sufficient resource of control stability is provided according to the buffer overload
criterion for the same statistical characteristics of a burst of network activity. It should be noted that
delays in the detection and recognition of useful signals and interference or equipment failures occur
not only in the description of statistical characteristics but also in the evaluation of various time
parameters of signals, the application of signal accumulation principles, etc. For the optimal selection
of such important characteristics of control systems as the current reaction time of the control object, it
is necessary to constantly analyze the delays of signal and control information and adjust the parameters
of switching nodes for them. It is quite logical to choose the value of the current reaction time of the
control object close to the value of the mentioned delays. The results of digital simulation also testify
to this.</p>
      <p>This can be done, for example, using an elementary first-order difference equation with a coefficient
that is set depending on the characteristics of network nodes and current traffic parameters [10, 11].</p>
    </sec>
    <sec id="sec-5">
      <title>4. Multi-stage fault finding algorithm</title>
      <p>Errors in the estimation of the random process parameters used as diagnostic signs to determine the
state of the object lead to the fact that the fault may not be found during the first search cycle.</p>
      <p>
        To increase the reliability of fault detection, it is necessary to conduct repeated and further search
cycles. Failure to identify the faulty element belonging to the i-th block is possible in two cases:
- when checking the i-th block, a false result was obtained with a probability of   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        );
- when checking the i-th block, a malfunction was detected, and the check ki-th the element that
refused gave a false result with a probability of   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ).
      </p>
      <p>Thus, the probability of missing a failure in the i-th block is defined as:</p>
      <p>
        ni (
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
Pi  qi(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )  1 qi(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )   pkiqki(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) .
      </p>
      <p>ki
The probability of missing a failure in the first test cycle is equal to the:</p>
      <p>
        ni  ni  (
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
P   pi qi(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )  1 qi(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )   pki(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )qki(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )  .
      </p>
      <p>ki  ki </p>
      <p>The probability of not detecting a malfunction during the first test cycle due to an error of the first
kind, depending on the observation time T of the implementation of a random process, can reach values
that do not satisfy regulatory documents. Reduction of the specified probability can be ensured by
repeated control of the block which is checking and its corresponding elements.</p>
      <p>
        For the adopted two-stage search program according to (
        <xref ref-type="bibr" rid="ref9">9</xref>
        ), it is possible to not find a defective
element belonging to the i-th block, taking into account the multiplicity of checks
ni (
        <xref ref-type="bibr" rid="ref10">10</xref>
        )
Pi  qi(m)  1 qi(m)   pkiqki(n) ,
ki
where   ( ) and   ( ) – probabilities of errors of the first kind (“missing” a malfunction) with m-times
checking of the i-th block and n-times checking of the ki-th element, respectively.
      </p>
      <p>
        The presented dependencies (
        <xref ref-type="bibr" rid="ref10 ref8 ref9">8-10</xref>
        ) allow for the selected value of T and the required value of Pi to
determine the multiplicity of checking the element and block with the corresponding probability of
failure.
      </p>
    </sec>
    <sec id="sec-6">
      <title>5. Conclusions</title>
      <p>To ensure the functioning of electronic communication systems in the conditions of the possible
presence of various defects in the communication equipment, changes in operating modes, disturbed
actions, interference, actions of intruders and other adverse factors, various types of redundancy are
laid in the system: structural, hardware, signal, information and others. Additional hardware or
computing resources designed to manage the network and to deal with congestion should be in a state
of reserve and put into operation after determining the time and place of the found overload, providing
the necessary level of system functioning. Therefore, this paper proposes an approach based on regular
monitoring of the parameters and state of network nodes, taking into account the delays in incoming
information about the parameters and state of a particular network node and the delays in the control
information necessary to regulate the parameters of the network node as a control object.</p>
      <p>Errors in the estimation of the random process parameters used as diagnostic signs to determine the
state of the object lead to the fact that the fault may not be found during the first search cycle.</p>
      <p>Therefore, a multi-stage fault-finding algorithm is proposed to increase the reliability of fault
detection. Reasoned expediency and features of its use. The practical implementation of the approach
proposed in the work will ensure the availability of information resources, which is an extremely urgent
task in modern conditions.</p>
    </sec>
    <sec id="sec-7">
      <title>6. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Tanenbaum</surname>
            <given-names>A. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wetherall</surname>
            <given-names>D. J. Computer</given-names>
          </string-name>
          <string-name>
            <surname>Networks</surname>
          </string-name>
          . 5-th ed.
          <source>Cloth Prentice Hall</source>
          ,
          <year>2011</year>
          . 960 p.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Stallings</surname>
            <given-names>W.</given-names>
          </string-name>
          <article-title>Foundations of Modern Networking: SDN, NFV</article-title>
          , QoE, IoT, and
          <string-name>
            <surname>Cloud</surname>
          </string-name>
          . New Jersey: Pearson Education, Inc.,
          <string-name>
            <surname>Old</surname>
            <given-names>Tappan</given-names>
          </string-name>
          ,
          <year>2016</year>
          . 538 p.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Kennedy</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davis</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prasanna S. R. M. Electronic Communication</surname>
            <given-names>Systems</given-names>
          </string-name>
          , 6th ed. /
          <source>McGraw Hill Education</source>
          ,
          <year>2017</year>
          . 704 p.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Speidel</surname>
            <given-names>J</given-names>
          </string-name>
          . Introduction to Digital Communications / Springer Nature Switzerland AG,
          <year>2019</year>
          . 329 p.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Kurose</surname>
            <given-names>J. F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ross K. W. Computer Networking: A Top-Down Approach</surname>
          </string-name>
          . 7-th ed.
          <source>Pearson Education</source>
          , Inc.,
          <year>2017</year>
          . 864 p.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Bonaventure</surname>
            <given-names>O. Computer</given-names>
          </string-name>
          <string-name>
            <surname>Networking</surname>
          </string-name>
          : Principles, Protocols and Practices.
          <source>Release. - cnp3book</source>
          ,
          <year>2018</year>
          . 272 p.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Forouzan</surname>
            <given-names>B. A. Data</given-names>
          </string-name>
          <string-name>
            <surname>Communications</surname>
          </string-name>
          and Networking$ 5th ed. /
          <string-name>
            <surname>McGraw-Hill</surname>
          </string-name>
          , Inc.,
          <year>2013</year>
          . 1264 p.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Danyluk</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Provost</surname>
            <given-names>F. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carr</surname>
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Telecommunication Network</surname>
          </string-name>
          <article-title>Diagnosis. In Handbook of Data Mining</article-title>
          and
          <string-name>
            <given-names>Knowledge</given-names>
            <surname>Discovery</surname>
          </string-name>
          . ‒ Oxford University Press, Inc. New York,
          <year>2002</year>
          . 1064 p.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Yurii</given-names>
            <surname>Shcheblanin</surname>
          </string-name>
          , Bohdan Oliinyk, Oleg Kurchenko,
          <source>Oleksandr Toroshanko and Nataliia Korshun. Research of Authentication Methods in Mobile Applications</source>
          . CPITS-2023
          <source>: Cybersecurity Providing in Information and Telecommunication Systems, February</source>
          <volume>28</volume>
          ,
          <year>2023</year>
          , Kyiv, Ukraine.
          <source>SEUR-WS.org</source>
          , vol
          <volume>3421</volume>
          . PP.
          <volume>266</volume>
          -
          <fpage>271</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Vinogradov</surname>
            <given-names>N. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savchenko</surname>
            <given-names>A. S. Comparative</given-names>
          </string-name>
          <article-title>Analysis of the Functionals of Optimal Control Corporate Computer Network</article-title>
          . Journal of Qafqaz University (Mathematics and Computer Science).
          <year>2013</year>
          . Vol.
          <volume>1</volume>
          , No. 2. PP.
          <volume>156</volume>
          -
          <fpage>167</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Di</surname>
            <given-names>Giorgio A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pietrabissa</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Priscoli F. D.</surname>
          </string-name>
          , and
          <article-title>Isidori A. Robust Output Regulation for a Class of Linear Differential-Algebraic Systems</article-title>
          .
          <source>IEEE Control Systems Letters. 2018</source>
          . Vol.
          <volume>2</volume>
          . No. 3. PP.
          <volume>477</volume>
          -
          <fpage>482</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Frenzel</surname>
            <given-names>L. E.</given-names>
          </string-name>
          <article-title>Principles of Electronic Communication Systems</article-title>
          , 4th Ed.
          <source>McGraw Hill Education</source>
          ,
          <year>2016</year>
          . 944 p.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Pietrabissa</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Priscoli F. D.</surname>
          </string-name>
          ,
          <string-name>
            <surname>Fiaschetti</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Di Paolo F. A Robust Adaptive Congestion</surname>
          </string-name>
          <article-title>Control for Communication Networks with Time-Varying Delays</article-title>
          .
          <source>2006 IEEE Conference on Computer Aided Control System Design</source>
          .
          <year>2006</year>
          . PP.
          <year>2093</year>
          -
          <fpage>2098</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Shooman</surname>
            <given-names>M. L.</given-names>
          </string-name>
          <article-title>Reliability of Computer Systems and Networks ̶ Fault Tolerance, Analysis and Design</article-title>
          . John Wiley &amp; Sons, Inc., New York,
          <year>2002</year>
          . 546 p.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Lesnaya</surname>
            <given-names>N. N.</given-names>
          </string-name>
          <article-title>Development of Control Algorithm Intelligent Multiservice Networks</article-title>
          . Problems Efficiency Infrastructure. Collected Works, issue
          <volume>11</volume>
          .
          <string-name>
            <surname>Kyiv</surname>
          </string-name>
          ,
          <year>2015</year>
          . PP.
          <volume>150</volume>
          -
          <fpage>155</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>