<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Features of Processing Various Self-Similar Traffic of Telecommunication Networks</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Volodymyr</forename><surname>Nakonechnyi</surname></persName>
							<email>volodym.nakonechnyi@knu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60 Volodymyrska str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Valery</forename><surname>Kozlovskyi</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Lubomyra Huzara Avenue</addrLine>
									<postCode>03680</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrii</forename><surname>Toroshanko</surname></persName>
							<email>atoroshanko@ukr.net</email>
							<affiliation key="aff1">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Lubomyra Huzara Avenue</addrLine>
									<postCode>03680</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ivan</forename><surname>Shvets</surname></persName>
							<email>ivan.shvets@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Lubomyra Huzara Avenue</addrLine>
									<postCode>03680</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">Information Technology and Implementation (IT&amp;I-2023)</orgName>
								<address>
									<addrLine>November 20-21</addrLine>
									<postCode>2023</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Features of Processing Various Self-Similar Traffic of Telecommunication Networks</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">9D2D9E65FFFA208CAB22BF6733C9ED40</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T20:00+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Telecommunication network</term>
					<term>self-similar traffic</term>
					<term>mass service theory</term>
					<term>multi-channel system</term>
					<term>Hurst parameter</term>
					<term>network utilization factor</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Considered models of mass service systems of self-similar traffic of telecommunication networks. The differences of the main ratios of mass service theory for self-similar traffic in comparison with random processes with a classical Poisson distribution, as well as with distributions with so-called "heavy tails": Pareto, Weibull, log-normal distribution, gamma distribution, beta distribution, are analyzed. Analytical expressions for evaluating the key parameters of mass service systems of self-similar traffic under conditions of stationarity and ergodicity of the request arrival process are presented. Considered models of a single-channel and multi-channel service system with shared and shared buffer memory for the incoming request queue. For self-similar traffic, the analytical dependence of the average queue length on the average network utilization rate is determined. The Hurst parameter was used to estimate the correlation function of self-similar processes. The necessity of managing the packet arrival period and other parameters of the self-similar incoming flow is shown, reducing the risk of overloading individual routes and autonomous network segments. Graphs are shown that illustrate the dependence of the required buffer memory on the utilization ratio, as well as the growth of the queue for deterministic and quasi-deterministic traffic.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The processes of the functioning of networks and communication systems can be represented as a set of mass service systems (MSS), for which the characteristics of QoS service quality <ref type="bibr">[1]</ref> and other performance indicators are determined. The assessment of traffic service quality indicators requires taking into account many factors in order to build adequate, scientifically based methods of calculation.</p><p>For components used to build telecommunication networks (computers, operating systems, network technologies, etc.), analytical models based on mass service theory (MST) provide an acceptable convergence of theory and practice.</p><p>The accuracy of simulation results is in all cases limited by the accuracy of the input data. In addition, even in the presence of many assumptions introduced when using MST, the obtained results are close to those that would be obtained with more detailed simulation modelling <ref type="bibr" target="#b2">[2]</ref><ref type="bibr" target="#b3">[3]</ref><ref type="bibr" target="#b4">[4]</ref><ref type="bibr" target="#b5">[5]</ref><ref type="bibr" target="#b6">[6]</ref>. In addition, analysis based on MST can be performed in a shorter time than simulation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Formulation of the research task</head><p>In the mathematical models of MSS, the type of input flow, the scheme of the system and the discipline of service are taken into account 1, 2.</p><p>Requests arrive at MSS with some average intensity  (number of requests per second). At any given time, there will be a certain number of requests (zero or more) in the queue; denote the average number of requests in the queue by w , the average number of requests served -by ρ, and the average waiting time is 𝑇 𝑤 . This time is averaged over all requests received at the entrance. Average service time of one request 𝑇 𝑠 ̶ this is the time interval between sending the request to the server and leaving the serviced request from the server. Service intensity 𝜇this is the number of requests served per unit of time. The total average number of requests in the system is defined as 𝑟. Average time of finding a request in the system (waiting in the queue and service) -𝑇 𝑟 . If the capacity of the queue is infinite, then requests in the system are never lost; they are only delayed during waiting and service times. Under these circumstances, the average number of sent requests is equal to the average number of incoming requests per unit of time. When the intensity of the arrival of requests at the entrance of the system increases, the time of finding requests in the system also increases, which leads to traffic jams (overload). The queue is getting longer, the waiting time is increasing. When 𝜌 = 1 , i.e 𝜆 = 𝜇, the server is saturated, working 100% of the time <ref type="bibr">[1]</ref>. Therefore, the theoretical maximum intensity of the incoming flow is related to the average service time 𝑇 𝑠 as 𝜆 max = 1 𝑇 𝑠 ⁄ .</p><p>In the first approximation, the length of the request stream is taken as an infinite stream. This means that the average frequency of applications does not change when they are lost. If the length of the stream is limited, then the amount of requests that can be expected at the system entrance is reduced by the number of requests currently in the system; this usually results in a proportional decrease in the average frequency of applications.</p><p>If an infinite queue size is assumed, the waiting time can grow to infinity. Under the conditions of a limited queue, some applications in the system may be lost. In practice, of course, any queue is limited. In many cases, this does not lead to a significant difference in the analysis [1, 2].</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Models of mass service systems</head><p>The simplest and most frequently used in MSS are service disciplines FIFO (First came In -First came Out) and LIFO (Last In -First Out) 3, 6, 8]. In computer and telecommunication networks, other service disciplines can also be chosen <ref type="bibr" target="#b9">[9]</ref>, for example: ̶ FIRO (First came In ̶ in Random order came Out. Another name ̶ SIRO (Service In Random Order); -SPT (Shortest requests are Processing First); -PRS (Priority Requests Service), service according to priority. In practice, the service discipline is chosen for reasons of acceptable service time. For example, in a node with packet switching, it is possible to provide for the sending of the shortest packets first or, conversely, the longest packets. This choice is determined by the nature of traffic and quality of service requirements.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Single-channel MSS model</head><p>This is the simplest model of SMO <ref type="bibr" target="#b10">[10,</ref><ref type="bibr" target="#b11">11]</ref> (Figure <ref type="figure">1</ref>). The central element of the system is a server that serves the incoming flow of applications. These applications enter the service system. If the server is free, the request is served immediately. Otherwise, the application becomes a queue for service.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1: Single-channel MSS model</head><p>When the server has finished servicing the current request, it is removed from the queue. If there are requests in the queue, one of them immediately enters the server according to the service discipline used. The server in this model can perform some auxiliary services in processing requests. Examples: a processor provides a service to processes; the data transmission line provides the service of transmission of packets or frames; an I/O device provides read or write requests. When the system is saturated, when 𝜌 → 1, the queue grows to infinity. In practice, in a single-channel system, the intensity of the input flow is limited to 70% to 90% relative to the theoretical maximum.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">A model of a multi-channel system with a common queue</head><p>In figure <ref type="figure">2</ref> shows a model of a multi-channel service system with a shared buffer memory of the input queue of requests. A common queue with a given service discipline is used for all requests.</p><p>If a request arrives at a time when at least one server is free, it is immediately sent to that server. All servers are assumed to be identical; therefore, if more than one server is available, it does not matter which server is selected for service. If all servers are busy, a queue begins to form. As soon as one server becomes free, the request is dequeued according to the current service discipline.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 2:</head><p>Multi-channel service system with a common queue Except for service intensity 𝜌, all parameters used in the analysis of a single-channel system have the same meaning. If used 𝑁 identical servers, then the average intensity of maintenance of the system as a whole is equal to 𝑁𝜌. This term is often associated with traffic intensity 𝑢, which is numerically equal to the intensity of the incoming flow of requests . The theoretical maximum of the relative service intensity is equal to 𝑁 × 100%, and the theoretical maximum intensity of the incoming flow is 𝜆 max = 𝑁 𝑇 𝑠 ⁄ .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">A model of a multichannel system with a split queue</head><p>In figure <ref type="figure">3</ref> shows a multi-channel system with a separate buffer memory. Such a system can be interpreted as a parallel structure of single-channel service systems. Although the structural changes are not fundamental, the operating characteristics of the depicted system may differ from those previously discussed. The key characteristics of a queue with multiple serving devices are similar to those of a single-channel system. An infinite volume of buffer memory and an infinite size of the queue are assumed, with the distribution of the queue among all serving devices (servers). It is commonly believed that the discipline of service in the order of arrival (FIFO) is implemented. In the case of a multi-channel service system, if all servers are assumed to be identical, the choice of a specific server for the next request does not affect the service time.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Determination of key parameters of self-similar traffic</head><p>To estimate the average queue size r under conditions of stationarity and ergodicity of the application arrival process, Little's formula is used 1, 9, 11:</p><p>-for a single-channel service system: 𝑟 = 𝜆𝑇, 𝑟 = 𝑤 + 𝜌;</p><p>(1)</p><p>-for 𝑁 -channel service system: 𝜌 = 𝜆𝑇 𝑟 𝑁 ⁄ , 𝑢 = 𝜆𝑇 𝑠 = 𝜌𝑁, 𝑟 = 𝑤 + 𝑁𝜌, де 𝑇 𝑟 = 𝑇 𝑤 + 𝑇 𝑠 .</p><p>(2)</p><p>Accordingly, Little's formulas can be used to connect the number ρ with the intensity of incoming requests 𝜆 and the time the request was in the system 𝑇 𝑠 : 𝜌 = 𝜆𝑇 𝑠 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 3: Multi-channel service system with split buffer queue</head><p>Thus, the following a priori information is necessary for the analysis of MSS: the intensity of the incoming flow of requests, the average service time, and the number of service channels. Based on this information, you can get asymptotic estimates of the average number of requests in the queue, the average waiting time, and the total time the requests are in the system.</p><p>It should be taken into account that request flows may not be distributed according to Poisson's law, but according to other probabilistic laws with so-called "heavy tails" <ref type="bibr" target="#b11">[11]</ref>. These are the Pareto, Weibull, log-normal distribution, gamma distribution, beta distribution, and some other less popular ones.</p><p>For example, for the Pareto distribution, the main relations have the following form:</p><p>-probability density</p><formula xml:id="formula_0">𝑓(𝑥) = 𝛼 𝑘 ⁄ ( 𝑘 𝑥 ⁄ ) 𝛼+1 , (𝑘 і 𝛼 &lt; 0) ̶ distribution parameters;<label>(3)</label></formula><p>-probability function:</p><formula xml:id="formula_1">𝐹(𝑥) = 1 − 𝑘 𝑥 ⁄ 𝛼 , (𝑥 &gt; 𝑘, 𝛼 &gt; 0);<label>(4)</label></formula><p>-average value</p><formula xml:id="formula_2">𝐸[𝑋] = 𝛼 𝛼 − 1 ⁄ 𝑘, (𝛼 &gt; 1). (<label>5</label></formula><formula xml:id="formula_3">)</formula><p>Real random processes, of course, preserve the property of self-similarity only up to a certain limit. This measure of the statistical stability of the process under multiple scaling is defined by the so-called Hurst parameter or related self-similarity parameter. A random process x(t) is statistically self-similar with the Hurst parameter H (0,5  H  1), if for any a &gt; 0 process 𝑥(𝑎𝑡) 𝑎 𝐻 ⁄ has the same statistical characteristics as the process  </p><formula xml:id="formula_4">xt itself: -mathematical expectation 𝑀[𝑥(𝑡)] = 𝑀[𝑥(𝑎𝑡)] 𝑎 𝐻 ⁄ (6) -dispersion 𝐷[𝑥(𝑡)] = 𝐷[𝑥(𝑎𝑡)] 𝑎 2𝐻 ⁄<label>(7)</label></formula><p>-correlation function</p><formula xml:id="formula_5">𝑅(𝑡, 𝑎) = 𝑅(𝑎𝑡, 𝑎𝜏) 𝑎 2𝐻 ⁄ (<label>8</label></formula><formula xml:id="formula_6">)</formula><p>The more 𝐻, the longer the property of self-similarity is preserved under multiple scaling. At 𝐻 = 0,5 this property is practically absent. Correlation functions of self-similar processes with a large Hurst parameter decay more slowly than those of ordinary random processes, and the decay has, as a rule, an oscillatory character. It was established that the constant component of the correlation function decreases according to the law 𝑐 1 𝑡 −𝑐 2 𝑎 , where 𝑐 1 , 𝑐 2 ̶ constants, 𝑎 ̶ scale parameter.</p><p>Accordingly, the spectral density of the process theoretically tends to infinity at a frequency approaching zero. Ratios (1-7) can be useful as asymptotic approximations of real processes.</p><p>Such specific characteristics are inherent not only to data traffic (TCP, FTP protocols), but also to signal traffic (SS7 protocol), VBR-video, Ethernet/ISDN and some others. Physically, they are caused by a high degree of grouping of packets at client sites, in routers and switching nodes of information communication networks. Even if the source generates a regular stream of packets, the data is delivered to the consumer in bursts interspersed with idle intervals. The reasons for this are the limited speed of network devices, insufficient volume of buffers, etc. In addition, self-similar traffic has a special structure that is preserved during multiple scaling. In real processes, there is some outliers with a relatively small average traffic level. Due to such bursts of load, network characteristics also deteriorate: losses, delays, jitter of packets when passing through network nodes increase <ref type="bibr" target="#b12">[12]</ref>.</p><p>Methods for calculating the requirements for networks of new generations (channel bandwidth, buffer capacity, etc.) based on Markov models and Erlang or Little formulas, which were successfully used in the design of telephone networks, can give unreasonably optimistic solutions and lead <ref type="bibr" target="#b7">[7,</ref><ref type="bibr" target="#b13">13]</ref>. With the self-similar nature of the traffic, the dependence of the average duration of the queue (respectively, the required size of the buffer) q from the average utilization ratio has the following form:</p><formula xml:id="formula_7">𝑞 = 𝜌 1/2(1−𝐻) (1 − 𝜌) 𝐻/(1−𝐻) ⁄</formula><p>At H=0,5 this formula is simplified:</p><formula xml:id="formula_8">𝑞 = 𝜌 (1 − 𝜌) ⁄</formula><p>which is a classical result of MSS with the simplest input flow and exponentially distributed service time (М/М/1). For a system with deterministic maintenance time (М/D/1) a classic result looks like this:</p><formula xml:id="formula_9">𝑞 = 𝜌 1 − 𝜌 ⁄ − 𝜌 2 2(1 − 𝜌) ⁄ .</formula><p>In figure <ref type="figure" target="#fig_0">4</ref>  The graphs clearly show that for self-similar traffic already at 4 , 0   a larger memory resource of buffer devices is required than for the classic model M/M/1, which is considered the least favorable compared to others (for example, with a constant or Gaussian service time distribution). The rate of growth of the required amount of memory increases with the increase of the Hurst parameter, which is mainly due to the degree of grouping of homogeneous packets and bursts of network load.</p><p>It can also be concluded that simply increasing the buffer memory (hardware or software) is ineffective. With the expected increase in the share of data traffic in the total volume, the degree of selfsimilarity will increase, and the dependence 𝜌(𝑞 𝑏𝑢𝑓𝑓 ) will grow more and more sharply. To eliminate or at least reduce the harmful effect of traffic similarity, methods of regulation or shaping of the incoming flow (policing -shaping) are usually used. Ideally, this results in a deterministic or close to deterministic application order. With deterministic traffic (deterministic order of incoming applications and deterministic processing time), the queue growth graph is a linear-broken line (Figure <ref type="figure" target="#fig_1">5</ref>).  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions</head><p>Models of heterogeneous computer network traffic, which has self-similar properties, are analyzed in the work. The considered models of single-channel and multi-channel service system with shared and separate buffer memory for the input queue of requests. Their advantages and disadvantages are shown. Analytical expressions for evaluating the key parameters of mass service systems of self-similar traffic under conditions of stationarity and ergodicity of the application arrival process are presented. </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 4 :</head><label>4</label><figDesc>shows the results of calculations of the dependence of the required buffer memory 𝑞 𝑏𝑢𝑓𝑓 from the utilization factor 𝜌 = 𝜆 𝜇 ⁄ for different inbound traffic patterns. Calculations are made as for Poisson flows of requests M/M/1 і M/D/1, as well as for self-similar flows. (1 -H=0,6; 2 -H=0,8; 3 -H=0,7; 4 -H=0,4; 5 -M/M/1; 6 -M/D/1) Dependencies of the required buffer memory on the utilization ratio 𝝆.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Graph of queue growth with deterministic trafficIn practice, both the traffic at the output of the shaper and the packet processing time are quasideterministic (we denote them by QD). In figure. 6 shows graphs for the relevant cases.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Graph of queue growth with quasi-deterministic traffic</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m">average queue duration on the average network utilization rate is determined</title>
				<imprint/>
	</monogr>
	<note>For self-similar traffic, the analytical dependence of the. To eliminate traffic bursting caused by the similarity of the incoming stream, it is necessary to control its parameters, first of all, the period of arrival of packets. Thanks to this, the rate of growth of queues in the buffer memory of switching nodes slows down. As a result, the risk of overloading individual routes and autonomous network segments is reduced</note>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><surname>Giambene</surname></persName>
		</author>
		<title level="m">Queuing Theory and Telecommunications: Networks and Applications</title>
				<meeting><address><addrLine>NY</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>2nd edition</note>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">A</forename><surname>Floudas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Pardalos</surname></persName>
		</author>
		<title level="m">Encyclopedia of optimization: 2-d</title>
				<imprint>
			<publisher>Springer science+buisiness media, LLC</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page">4646</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Computer Networking: Principles, Protocols and Practices</title>
		<author>
			<persName><forename type="first">O</forename><surname>Bonaventure</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
	<note>Release. -cnp3book</note>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">W</forename><surname>Stallings</surname></persName>
		</author>
		<title level="m">Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud</title>
				<meeting><address><addrLine>Old Tappan</addrLine></address></meeting>
		<imprint>
			<publisher>New Jersey; Pearson Education, Inc</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Popovsʹkyy</surname></persName>
		</author>
		<ptr target="http://www.znanius.com/3534.html" />
		<title level="m">Telekomunikatsiyni systemy ta merezhi. Struktura ta osnovni funktsiyi</title>
				<meeting><address><addrLine>Kharkiv</addrLine></address></meeting>
		<imprint>
			<publisher>SMIT</publisher>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Introduction to Digital Communications</title>
		<author>
			<persName><forename type="first">J</forename><surname>Speidel</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2019">2019</date>
			<publisher>Springer Nature Switzerland AG</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Computer Networking: A Top-Down Approach</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">F</forename><surname>Kurose</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">W</forename><surname>Ross</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2017</date>
			<publisher>-Pearson Education, Inc</publisher>
		</imprint>
	</monogr>
	<note>7th ed.</note>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Principles of electronic communication systems</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">E</forename><surname>Frenzel</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016</date>
			<publisher>McGraw Hill Education</publisher>
		</imprint>
	</monogr>
	<note>4th Ed</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Development of control algorithm intelligent multiservice networks</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">N</forename><surname>Lesnaya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Problems efficiency infrastructure</title>
				<meeting><address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="150" to="155" />
		</imprint>
	</monogr>
	<note>Collected Works</note>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Distributed systems: principles and paradigms</title>
		<author>
			<persName><forename type="first">Tanenbaum</forename><surname>Andrew</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename></persName>
		</author>
		<author>
			<persName><forename type="first">Maarten</forename><surname>Van Steen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>Pearson Education. Inc. Pearson Prentice Hall</publisher>
			<pubPlace>Upper Saddle River, NJ 07458</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Comparative analysis of the functionals of optimal control corporate computer network</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A</forename><surname>Vinogradov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Savchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Qafqaz University (Mathematics and Computer Science)</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="156" to="167" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Robust Output Regulation for a Class of Linear Differential-Algebraic Systems</title>
		<author>
			<persName><forename type="first">Di</forename><surname>Giorgio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pietrabissa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Priscoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">D</forename><surname>Isidori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Control Systems Letters</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="477" to="482" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><surname>Forbs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Evans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Hastings</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Peacock</surname></persName>
		</author>
		<title level="m">Statistical Distributions: 4-th Edition</title>
				<meeting><address><addrLine>Hoboken, New Jersey</addrLine></address></meeting>
		<imprint>
			<publisher>-John Wiley &amp; Sons, Inc</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page">212</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
