<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>November</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Optimization of distributed file placement registrations on a computer network</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yevhen Davydenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hlib Horban</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alyona Shved</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kateryna Antipova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Petro Mohyla Black Sea National University St. 68 Desantnykiv 10</institution>
          ,
          <addr-line>54003, Mykolaiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>2</volume>
      <fpage>0</fpage>
      <lpage>21</lpage>
      <abstract>
        <p>The article considers a method for optimal placement of data files in a local network, taking into account the criterion of total request service time during the distribution of registrations. This method allows to effectively regulate the server load and use resources with maximum performance, which leads to a reduction in query execution time. An intelligent algorithm for balancing the load of distributed database network nodes that can optimize the processing of large amounts of data is investigated. The research results confirm the possibility of a significant increase in data processing speed through the use of mechanisms for optimizing the load of network nodes.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;distributed system</kwd>
        <kwd>computer network</kwd>
        <kwd>file</kwd>
        <kwd>request</kwd>
        <kwd>node</kwd>
        <kwd>distribution 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        coordination of data distribution and storage. The optimal method for reducing traffic in
communication channels is to use the client-server technique [
        <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5 ref6">2, 3, 4, 5, 6</xref>
        ].
      </p>
      <p>
        Thanks to the packet switching technique, in-depth and applied research has been conducted in
3 areas. The first direction is related to the development of the basics of packet switching theory in
distribution systems [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ].
      </p>
      <p>
        The second area of in-depth research is related to the mathematical theory of optimizing flows in
networks and selecting profitable network routes with packet switching [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Such research should
be conducted, in particular, using methods of expert evaluation [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ], the results of which obtained
allow to carry out a more profound analysis of the obtained expert information aimed at a synthesis
an effective and substantiated group decisions.
      </p>
      <p>
        The third direction is the implementation of scientific and applied research on the development
of modern hardware and software for packet switching technology [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. In general, research is driven
by the need to improve system performance and reliability, reduce overall costs, and expand the
range of services provided [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">7, 8, 9</xref>
        ].
      </p>
      <p>
        Paper [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] investigates the issue of distributing information resources across computer network
nodes. Optimization-oriented algorithms for placing information files were considered. The average
amount of data sent over communication channels per unit time; total request processing time; total
cost of network traffic, etc. were considered as optimization criteria.
      </p>
      <p>There is a need to choose a numerical optimality criterion that determines the average time of
user requests execution and is convenient for optimal file placement. The choice of such a
characteristic of the mass service system is due to the fact that users are usually interested not in
minimizing the size of the queue or any other characteristics of the mass service system, but in
ensuring that their requests are processed in as little time as possible.</p>
      <p>
        When determining the average waiting time for requests W in the service queue, it is
recommended [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] to use the following formula:
      </p>
      <p>W =
ρ</p>
      <p>2
λ(1 − ρ)
,
where ρ is the load factor of the service device (0 ≤ ρ &lt; 1);</p>
      <p>λ is the intensity of the request flow (the average number of packets claiming to be transmitted
per unit of time).</p>
      <p>When setting the task of optimizing the placement of files among network nodes in order to
obtain high quality service, you can keep the average request service time (excluding the service
waiting time) constant and independent of the file placement. The value ρ depends on λ and the
bandwidth of the serving device μ: ρ = λ/μ .</p>
      <p>Usually, the maximum allowable waiting time for requests in the service queue M is constant, so
the maximum allowable service device load factor is determined from the expression:
ρ</p>
      <p>+ 
.</p>
      <p>When distributing requests among the service devices, they must minimize the value of W, while
the route of the request is unknown in advance, i.e., the request can be processed by one service
device or by several service devices sequentially.</p>
      <p>The target function (quality criterion) is selected as a combination of traffic parameters through
communication channels in the network:
 (ρ) = ∑   ρ ,

communication channel:   =   ;    = .</p>
      <p>ρ
λ
where   is the weighting factors that take into account the average packet service time of the</p>
      <p>The problem of creating switching systems designed to analyze the state of the network at any
given time and optimize data transportation has not been fully resolved. Systems that perform
relatively simple optimization of the distribution of data transmission over network channels remain
extremely expensive, and the efficiency of using the capabilities of universal switches when
transmitting large amounts of multimedia information over several channels simultaneously is
relatively low.</p>
      <p>When providing multi-user access to information resources stored in the form of a database, it is
necessary to rationally place the database files in the nodes of a computer network.</p>
      <p>
        There are several relevant mathematical models that differ in the type of objective function and
the set of constraints that are taken into account when searching for an optimal method [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        Today, only application software packages, namely Matlab, are actually used to find optimal
solutions [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>After identifying the optimal solution, model stability and sensitivity analysis is usually
performed.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Organization of optimization of distributed file placement registrations in a computer network based on the theory of queuing</title>
      <p>
        Let's consider a method of building a model of rational file distribution of a DBMS over the nodes of
a computer network, the essence of which is the mathematical apparatus of the concept of queuing.
The queue theory is the basis for building a computer network model in many works on optimizing
file allocation in a DBMS [
        <xref ref-type="bibr" rid="ref15 ref16 ref9">9, 15, 16</xref>
        ], however, a mass service system with 1 servicing device - a single
bus - is taken as a mathematical model of a local network with a bus topology.
      </p>
      <p>Let's analyze the network as a multi-device mass service system, i.e., as a system where several
identical service devices process 1 request queue. The request at the very beginning of the queue is
sent to one of the free devices for service. The multi-device queue shown in Figure 1 differs from the
queue coordination in Figure 2, which shows several single-device queues operating in parallel. If in
all cases the service devices and the incoming flow of requests are identical, and in singledevice
queues, requests arrive randomly and, once in the queue, remain there (otherwise, moving to another
queue is prohibited), then it turns out that the operation of a multi-device queue is preferable to
single-device queues operating in parallel.</p>
      <p>Let's set the optimal number of copies for each file of distributed databases, considering the
computer network as a series of overlapping multi-device SMOs with the 1st queue of requests to a
particular file.</p>
      <p>During the design of a CMA, worst-case scenarios are often performed. In this situation, the
estimates are not very accurate, but at least the errors provide a margin of safety. In real systems,
service times fluctuate. The variation can be expressed by calculating the mean and standard
deviation for the service time of specific types of equipment. The best case is when the service time
is constant, i.e., standard deviation = 0 (i.e., no deviation from the mean). The worst case is also when
the maintenance time follows an exponential distribution, i.e., when the standard deviation = the
mean (for a standard deviation, this is too high a value, which shows that there is a large spread of
maintenance time values). It is worth noting that the exponential distribution is not always the worst
case; for example, the mean of 5, 10, 20, and 200 = 58.75, and the standard deviation is approximately
Let's denote the average  by  ( ) (mathematical expectation), and the standard deviation  −
The estimation of the mean and standard deviation is more accurate the more empirical values
are used. When  is larger, the difference between equations (1) and (2) is negligible.</p>
      <sec id="sec-2-1">
        <title>Another method of determining the typical deviation:</title>
        <p>σ</p>
        <p>= √ ( 2) −  2( ).</p>
        <p>Paper [17] shows that 95% of the query response times do not exceed the average response time
plus 2 standard deviations. In other words, about 5% of responses take longer than this value.
where  ̅ is the average value of the experimental value.
(1)
(2)</p>
        <p>
          In order to simplify mathematical calculations, system load is usually expressed in relative terms
compared to the maximum load that the system can handle. As a rule, the value is denoted by the
letter ρ. As shown in the above definitions, fully utilized equipment has ρ = 1 and free equipment
has ρ = 0. Thus, the equipment utilization rate ranges from zero to one, and is sometimes expressed
There is a rule [
          <xref ref-type="bibr" rid="ref17">18</xref>
          ] according to which the response time curve rises sharply when equipment
When designing a queuing system, the goal is to ensure that its utilization at constant loads is
The exact method for determining the equipment utilization rate in a mass service system with 1
as a percentage.
utilization exceeds eighty percent.
within sixty to seventy percent [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
service device is given by the expression:
and
and
where

 =   +   ,
 (  ) =  (  ) +  (  ).
        </p>
        <p>( ) =  ( ) (  ),
 ( ) =  ( ) (  ).
(3)
(4)
 ( =  ) =</p>
        <p>0,   if    &lt;  ,</p>
        <p>!
where  ( ) is the average number of requests received per unit of service time;  (  ) is the average
time for servicing the 1st request.</p>
        <p>Suppose there are M service devices of the same type. So, it sends requests to any device per unit
of time  ( )/ requests per unit of time.</p>
      </sec>
      <sec id="sec-2-2">
        <title>Consequently, the utilization rate of a particular device:</title>
      </sec>
      <sec id="sec-2-3">
        <title>The ratio ρ should be less than one.</title>
        <p>ρ =
 ( ) (  ).</p>
        <p />
        <p>Let  be the number of requests waiting to be served at a certain time, and  be the number of
system requests waiting and being served at that time.</p>
        <p>Let it go on   is the service waiting time, and   is the time a request stays in the system, i.e. the
time it spends both waiting and being served. The average values  , values  ,   and   , let's set it
to  ( ),  ,  (  ) and  (  ). Equality is always objective:</p>
      </sec>
      <sec id="sec-2-4">
        <title>Because E(n) is the average number of incoming requests, and then analyzes the steady state</title>
        <p>The quantities  ,  ,   and   refer to requests waiting on any of the servers  . Substituting in
 ( ) =  ( ) (  ) =  ( ) (  ) +  ( ) (  ),
the corresponding values from equations (3) and (4), we obtain</p>
      </sec>
      <sec id="sec-2-5">
        <title>The probability of having N requests in the system at a given time.</title>
      </sec>
      <sec id="sec-2-6">
        <title>The probability that all service devices are busy at a given time is and is calculated by the formula So,</title>
      </sec>
      <sec id="sec-2-7">
        <title>A typical deviation for  is:</title>
      </sec>
      <sec id="sec-2-8">
        <title>Average waiting period before processing is:</title>
      </sec>
      <sec id="sec-2-9">
        <title>So, the average time spent in the queue is:</title>
        <p>Typical waiting period before processing rejection is:
and the typical deviation of the time spent in the queue is:
σ
  =</p>
        <p>(  )
 (1 − ρ)</p>
        <p>√ (2 −  ) +  2(1 − ρ)2 .</p>
        <p>The equation reduces to  = ρ when</p>
        <p>= 1. The factor B is present in all other equations for
systems with multiple service devices. To determine its quantitative indicators, the function B is
described, which determines the probability of loading all devices depending on the numerical value
of the equipment utilization factor and the number of service devices  .</p>
      </sec>
      <sec id="sec-2-10">
        <title>In a QS with multiple service devices, the average number of requests pending service is But:</title>
      </sec>
      <sec id="sec-2-11">
        <title>Therefore:</title>
      </sec>
      <sec id="sec-2-12">
        <title>The probability that the waiting time exceeds t is determined by the following formula:</title>
        <p>(</p>
        <p>≥  ) =   − (1−ρ) / (  ) .</p>
        <p>A real system can be coordinated so that a few requests do not wait for service at all, and a small
fraction of them are delayed for a long period of time. In this case, the average waiting time of a
delayed request is much higher than  (  ).</p>
        <p>Let's set the average delay time  (  ) as the average period of time for requests that must wait.
The probability that a request will be in the queue is B. Thus, the average waiting time is
 =
∑ =0
 −1 ( ρ)

∑ =0  !</p>
        <p>!
1 − ρ ∑ =0
 !
 !
 ( ) =</p>
        <p>ρ
1 − ρ</p>
        <p>.
 ( ) =</p>
        <p>+  ρ.</p>
        <p>ρ
1 − ρ
σ
 =</p>
        <p>1
1 − ρ</p>
        <p>√ ρ(1 + ρ −  ρ).
 (  ) =
(  )</p>
        <p>.</p>
        <p>(1 − ρ)
 (  ) =</p>
        <p>(  )
 (1 − ρ)</p>
        <p>+  (  ).
σ

 =</p>
        <p>(  )
 (1 − ρ)</p>
        <p>√ (2 −  ) ,
 (  ) = 
(  ) + (1 −  )0 =</p>
        <p>(  ) .
 (  ) =
 (  ) =</p>
        <p>(  )
 (1 − ρ)</p>
        <p>(  )
 (1 − ρ)
.
.</p>
        <p>The previous equations for queues with a number of servers are based on the assumption that
service times follow an exponential distribution. There are no simple expressions that describe
multiinstrument QS systems that have better service times than an exponential distribution, but it would
be useful to use a mathematical approximation tool to estimate in such situations.</p>
        <p>There are several cases where the theory described above is incorrect. The above formulas serve
to approximate the most difficult situations that exist in reality. The reason is the assumption of
arbitrariness of the request and (sometimes) indicativeness of the service time. In reality, there may
be a more favorable request than a random one.</p>
        <p>But there are 2 types of situations where queues and delays are much worse than the ones
obtained from the above formulas.</p>
      </sec>
      <sec id="sec-2-13">
        <title>First, the maximum number of requests can be received in a short period of time. In some cases, it cannot be assumed that the arrival time value follows a Poisson distribution. It is worth emphasizing that most forecasting programs for these systems are designed for a Poisson input event stream.</title>
        <p>To select a more suitable model from those on offer, it is necessary to assess user requirements.
Table 1 shows whether or not the models include the following features of computer networks,
information bases, and applications.</p>
        <p>Studying the numerical results of the implementation of models I and II, built with a unified
approach, we can emphasize the following features of the models:</p>
        <p>1. The obtained examples of tests of the optimal allocation matrix for distributed databases show
a huge dependence between the chosen optimality aspect and the final allocation matrix.</p>
        <p>2. In the obtained matrices of rational file allocation, when minimizing the average amount of
data sent and minimizing the single processing time of absolutely all requests received by the system
per unit of time, the assumption of uniform load of network nodes is clearly violated. It is clear that
the 1st nodes will be the most loaded.</p>
        <p>3. To increase the system throughput, you can apply a restriction on the time it takes to wait for
a request from any node as an auxiliary condition. Let   be the waiting time required to execute a
request initiated at node   to file   contained in the s-th node;   be the maximum request
execution time for file   initiated at node   . There is a relationship between the values   and   :
  (1 −   )  ≤   .</p>
        <p>For  ≠  , 1 ≤  ≤  . In order to obtain constraints from this relation, we need to express the
values of   in terms of the variables   . This is very difficult to do.</p>
        <p>4. The above query processing scheme practically does not fit into the parallelism of information
processing in the network, and also does not take into account the very common situation of complex
queries (simultaneous access to several files from 1 node). For example, the local database of the host
  contains the files   , and   +1 and the local information database of the node   +1contains the
files   +1and   +2. The node   starts a complex request for the files   and   +1. According to the
given scheme, both of these files will be processed in the node   in turn. However, it would be more
logical to send a request to process file   +1 loaded) when searching for file   on node   .</p>
        <p>5. However, if the issue is solved in a comprehensive manner, i.e., by software optimization and
even hardware upgrades, then the load of some network nodes will not affect the speed of operation.
Therefore, despite the above disadvantages, these models of the optimization problem can be applied
in practice when designing certain databases.</p>
        <p>
          Thus, the proposed mathematical models of the optimization problem of file allocation of the DBMS
on the nodes of the local network can be successfully applied in the design of certain distribution
databases, using a preliminary assessment of user requirements and a software package for the
purpose of statistical collection and optimal redistribution of requests.
3. Coordination of optimization of file placement of the database by a
single time of request service
Several works [
          <xref ref-type="bibr" rid="ref14 ref16 ref8 ref9">8, 9, 14, 16</xref>
          ] have been devoted to solving the problem of rational placement of
information files on local network nodes, which differ in both the problem statement and the
methods of its solution.
        </p>
        <p>
          We study a network with a single bus topology. Local area networks with a bus topology are
characterized by relative ease of management, low arbitration time, ease of expansion, and fairly
high reliability (due to parallel connections of nodes to the channel) [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>Let's say that a query that comes to any network node involves access to a database file. We will
distinguish between 2 types of requests: search requests and fix requests. Queries are served in the
node in the order of receipt. To save resources, we do not implement a priority system. A search
request is initiated in a specific node. If a copy of the required file is contained in the local node
database from which the request came, it is processed. If a copy of the required file is not in the local
database of this node, the search request is sent to a free node that contains a copy of the required
file, processed there, and the result is sent to the original node.</p>
        <p>As an aspect of rationality, a single time required to service requests received by the system
within a unit of time is accepted. The bus topology, the uniformity of communication lines and their
short length in local area networks make the sending time independent of the request node and the
transmission node.</p>
        <p>Let:
•  is the number of network nodes;
•  is the number of independent files of distributed databases;
•   is the j-th steam node;
•   is the i-th file of distributed databases;
•   file size   ;
•   is the storage capacity of the   node, which is intended to host files;
• s is the number of search query types;
• λ is the intensity of k-type search requests to the file   from the node   ;
•   is the processing time of a k-type search request to the file   in the node   ;
•   (1) is the time of sending a k-type search request to the file;
•   (2) is the time it takes to send a response to a k-type search request to the file   ;
• r is the number of types of corrections;
• λ′ is the intensity of l-type fixes of the file   from the node   ;
•  ′ is the processing time for fixing the l-type of the file   in the node   ;
•   ′ is the time of sending the l-type file patch   ;
•   ( = 1, … ,  ;   = 1, … ,  )are the values determined by the formula:
−   = 1, if a copy of the file   is located in the node   ,
−   = 0, if a copy of the file   is not located in the node   .</p>
        <p>The time it takes to send data from the node   data during the execution of a k-type search query
to the file   , is equal to (  (1) +   (2)) (1 −   ). Then the only time required to send data through
The standardized time required to fulfill all patch requests that come into the network during a
Noting  0 ≡   0 +  0,   = − 
+  ̂
+</p>
        <p>+  ′ ,we obtain an exact model of the problem of
optimal distribution of copies of files between network nodes in terms of the minimum uniform time
required to service all requests received by the system within a unit of time, associated with the type
of discrete programming problems with boolean variables:</p>
        <p>′ = ∑ ∑ ∑
∑ λ′
 ′   = ∑ ∑ ∑
∑ λ′</p>
        <p>′   .</p>
        <p>,

∑ =1   ≥ 1  ( = 1,2, … ,  );</p>
        <p>∑ =1     ≤   ( = 1,2, … ,  );
  ∈ {0,  1}( = 1,2, … ,  ;    = 1,2, … ,  )
unit of time is set as</p>
        <p>By putting
we get
under restrictions
comparison.
algorithm.</p>
        <p>.</p>
      </sec>
      <sec id="sec-2-14">
        <title>Then:</title>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>4. Algorithmic implementation of the model</title>
      <p>
        To implement models (5) (8), we propose an algorithm that creates a model [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] for further
      </p>
      <p>At the first stage of the algorithm, the initial distribution of files is found, which will be rational
if the condition (7) is not taken into account. At the second stage, the files are redistributed if there
is at least a 1-n index for the original distribution.</p>
      <p>J is such that condition (7) is not met. The second stage of the algorithm is performed until a
distribution is found that meets condition (7). Let us consider the stages of the recommended
The first stage. Determination of the initial distribution.</p>
      <p>Determining the values of   ( = 1,2, … ,  ;    = 1,2, … ,  ) and calculation of the matrix  =
If for   ∃   &lt; 0,then
If for ∀  ≥ 0, then we define   1≤ ≤   . Let   1≤ ≤   =     .</p>
      <p>∗ = {
1,   &lt; 0;
0,   ≥ 0.
 ∗ = {
1,  =   ;
0,  ≠   .</p>
      <p>The second stage. Redistribution of files.</p>
      <p>1. Create a vector of values  = (ε1, ε2, … , ε ), where ε = 0  ( = 1,2, … ,  ). During the
algorithm, after redistributing a file from a certain filled node   the corresponding component ε of
the vector E is set to 1, and this node is closed for redistribution.
(5)
(6)
(7)
(8)</p>
      <p>2. For all indices j, where ε = 0, we check the fulfillment of condition (8). If this condition is
fulfilled for all j indexes, then the algorithm ends. If for sure j=r we have:</p>
      <p>Then we move on to the third point.
3. If ∃  ≠    such as:

 =1
∑     &gt;   ,

 =1

 =1
∑     ≤   , ∑     ≤   ,</p>
      <p>(−  ) = −  .
   (</p>
      <p>−   ) =     −   .</p>
      <p>(    −   ) =     −   .</p>
      <p>For those i, where   = {01,,     ≠=  ,, we determine    ( 
to those indicators  ≠  , where ε = 0. Let:</p>
      <p>Then we define    (</p>
      <p>−   ). Let:
then we swap the memory of the r-th and s-th nodes and return to the second point. Otherwise, we
go to the fourth point.</p>
      <p>For those where ∃ ≠  such as   = 1, visualize    (−  ). Let:
−   ), where little is taken, according
If 
file   is excluded from the node   . If</p>
      <p>(−  ,     −   ) = −  , then in the matrix  provide</p>
      <p>= 0,      = 1.This means that the file   from node   is redistributed to node   . Such a
redistribution of files corresponds to a minimal increase in the objective function.</p>
      <p>Check condition (7)  =  . If it is not fulfilled, then go to the third step. If the condition is met,
then the element ε element of the vector  is assigned a value of 1 and proceed to the second step.</p>
      <p>Thus, the algorithm allows you to find the optimal or almost rational distribution of files between
network nodes in a finite number of steps. The result of the algorithm is the matrix X.</p>
    </sec>
    <sec id="sec-4">
      <title>5. Optimization of the distribution of registrations</title>
      <p>To determine the intensity of access to various files of the information base, we used the resident
program "Query Analyzer" written in the Assembler programming language. The language
guarantees compactness and flexibility when writing resident programs and does not allow errors in
the measured processes. The resident program is loaded on all network nodes. The computer time is
synchronized.</p>
      <p>The program analyzes all file requests and records the date, time, file name, request duration,
response time, and response duration.</p>
      <p>Logging is performed in the internal buffer and is written to disk only during computer idle time,
when typing from the keyboard or other operations that require waiting for a response are
performed.</p>
      <p>The non-resident part of the program analyzes the processed data and finds temporary file access
properties. The network load is characterized by unevenness - complete absence of calls or
simultaneous calls from all workstations.</p>
      <p>The LAN Query Optimizer program is designed to redistribute search queries for reference and
information files between network nodes, which significantly reduces queues.</p>
      <p>As an aspect of optimality, a single time required to service all requests received by the system in</p>
      <sec id="sec-4-1">
        <title>1 hour is taken as a single time.</title>
        <p>The efficiency of requests for corrections and searches in various data files of the Revenue</p>
      </sec>
      <sec id="sec-4-2">
        <title>Accounting DBMS and the average search time are presented in the table.</title>
        <p>The output file for the optimization program was created in the following order: the efficiency of
searches and corrections in any database file; the duration of records in the files; and the average
processing time of search queries to data files.</p>
        <p>As an aspect of optimality, the average amount of information sent over the communication lines
when processing requests is taken. The resulting matrix of the expedient distribution of files to
network nodes as a result of the calculation using the optimization program is as follows:
1 0 0 0 0 0 0 0 0 0 0 0
1 0 0 0 0 0 0 0 0 0 0 0
1 0 0 0 0 0 0 0 0 0 0 0
1 0 0 0 0 0 0 0 0 0 0 0
1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1
 = 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1
[1 1 1 1 1 1 1 1 1 1 1 1]</p>
        <p>For example, files that have been modified are often stored in 1 copy each. Copies of other files
are duplicated in the local databases of network nodes.</p>
        <p>If we take a single time as the optimality aspect, the time required to service all requests that
come into the system within 1 hour, the matrix of the appropriate file allocation is of a different type:
1 0 0 0 0 0 0 0 0 0 0 0
1 0 0 0 0 0 0 0 0 0 0 0
1 0 0 0 0 0 0 0 0 0 0 0
1 0 0 0 0 0 0 0 0 0 0 0
1 1 1 1 0 0 0 0 0 0 0 0
1 1 1 1 0 0 0 0 0 0 0 0
1 1 1 1 0 0 0 0 0 0 0 0
 = 1 1 1 1 0 0 0 0 0 0 0 0
1 1 1 1 0 0 0 0 0 0 0 0
1 1 1 1 0 0 0 0 0 0 0 0
1 1 1 1 0 0 0 0 0 0 0 0
1 1 1 1 0 0 0 0 0 0 0 0
1 1 1 1 0 0 0 0 0 0 0 0
1 1 1 1 0 0 0 0 0 0 0 0
[1 1 1 1 0 0 0 0 0 0 0 0]</p>
        <p>For example, the first 4 files of information bases, which have a high intensity of corrections, are
stored on the 1st of the most productive nodes (1 copy each).</p>
        <p>Copies of other files, where corrections and additions are made less frequently, are located in the
local databases of the first four computer nodes.</p>
        <p>In fact, it is more convenient to use the second method of file distribution, since for very
timelimited work on the introduction of payments, distribution of incoming amounts between budgets
and the creation of general reporting, it is enough to use the first four network nodes with the highest
speed. Similar placement of copies of data files will help to avoid unnecessary information
redundancy and difficulties in reconciling it.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>6. Conclusion</title>
      <p>The method of optimization of distributed file placement registrations in a computer network
based on the waiting time. The problem of creating switching systems designed to analyze the state
of the network at any given time and optimal data transportation to find optimal solutions.</p>
      <p>A practical implementation of the method of balancing the load of the DBMS network nodes
intended for processing large and ultra-large volumes of databases is proposed. The results of the
operation of the revenue accounting system based on the proposed method indicate the possibility
of a significant increase in the speed of data processing in large-volume databases by using
mechanisms for optimizing the load of network nodes used to process databases. The application of
the method allows to increase the productivity and reduce the reaction time of the information
system working with the DBMS.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <sec id="sec-6-1">
        <title>The authors have not employed any Generative AI tools.</title>
        <p>URL :</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Krainyk</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davydenko</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tomas</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Configurable</surname>
          </string-name>
          <article-title>Control Node for Wireless Sensor Network</article-title>
          .
          <source>2019 3rd International Conference on Advanced Information and Communications Technologies (AICT)</source>
          , Lviv, Ukraine,
          <year>2019</year>
          , pp.
          <fpage>258</fpage>
          <lpage>262</lpage>
          . doi:
          <volume>10</volume>
          .1109/AIACT.
          <year>2019</year>
          .8847732
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Bailis</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ghodsi</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Braams</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hellerstein</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stoica</surname>
            <given-names>I</given-names>
          </string-name>
          .
          <article-title>Bolt-on causal consistency</article-title>
          .
          <source>In Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data. ACM</source>
          ,
          <year>2013</year>
          . pp.
          <fpage>761</fpage>
          <lpage>772</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Boncz</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zukowski</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nes</surname>
            <given-names>N.</given-names>
          </string-name>
          <article-title>LATEX: MonetDB/X100: Hyper-Pipelining Query Execution</article-title>
          .
          <source>Cidr</source>
          , Vol.
          <volume>5</volume>
          ,
          <year>2005</year>
          . pp.
          <fpage>225</fpage>
          <lpage>237</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Charapko</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ailijiang</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demirbas</surname>
            <given-names>M.</given-names>
          </string-name>
          <article-title>Adapting to Access Locality via Live Data Migration in Globally Distributed Datastores</article-title>
          .
          <source>In 2018 IEEE International Conference on Big Data (Big Data)</source>
          . IEEE,
          <year>2018</year>
          . pp.
          <fpage>3321</fpage>
          <lpage>3330</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Liu</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shen</surname>
            <given-names>H</given-names>
          </string-name>
          .
          <article-title>Minimum-cost cloud storage service across multiple cloud providers</article-title>
          .
          <source>IEEE/ACM Transactions on Networking (TON)</source>
          , Vol.
          <volume>25</volume>
          ,
          <issue>4</issue>
          (
          <year>2017</year>
          ). pp.
          <fpage>2498</fpage>
          <lpage>2513</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Mahmoud</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nawab</surname>
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pucher</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Agrawal</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>El</surname>
            <given-names>Abbadi A</given-names>
          </string-name>
          .
          <article-title>Low-latency multi-datacenter databases using replicated commit</article-title>
          .
          <source>Proceedings of the VLDB Endowment</source>
          , Vol.
          <volume>6</volume>
          ,
          <issue>9</issue>
          (
          <year>2013</year>
          ), pp.
          <fpage>661</fpage>
          <lpage>672</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Guerraoui</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <article-title>How fast can a distributed transaction commit</article-title>
          ?
          <source>In Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems. ACM</source>
          ,
          <year>2017</year>
          . pp.
          <fpage>107</fpage>
          <lpage>122</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Ping</surname>
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hwang</surname>
            <given-names>J.-F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McConnel</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vabbalareddy</surname>
            <given-names>R</given-names>
          </string-name>
          .
          <article-title>Wide area placement of data replicas for fast and highly available data access</article-title>
          .
          <source>In Proceedings of the fourth international workshop on Data-intensive distributed computing. ACM</source>
          ,
          <year>2011</year>
          . pp.
          <volume>1</volume>
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Ports</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grittner</surname>
            <given-names>K.</given-names>
          </string-name>
          <article-title>Serializable snapshot isolation in PostgreSQL</article-title>
          .
          <source>Proceedings of the VLDB Endowment</source>
          , Vol.
          <volume>5</volume>
          ,
          <issue>12</issue>
          (
          <year>2012</year>
          ), pp.
          <year>1850 1861</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Shved</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalenko</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davydenko</surname>
            <given-names>Y.</given-names>
          </string-name>
          <article-title>Method of Detection the Consistent Subgroups of Expert Assessments in a Group Based on Measures of Dissimilarity in Evidence Theory</article-title>
          . In: Shakhovska N.,
          <string-name>
            <surname>Medykovskyy</surname>
            <given-names>M</given-names>
          </string-name>
          . (eds) Advances
          <source>in Intelligent Systems and Computing IV. CCSIT 2019. Advances in Intelligent Systems and Computing</source>
          , vol
          <volume>1080</volume>
          . Springer, Cham,
          <year>2020</year>
          . pp.
          <fpage>36</fpage>
          <lpage>53</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -33695-
          <issue>0</issue>
          _
          <fpage>4</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Kovalenko</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davydenko</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shved</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <source>Formation of Consistent Groups of Expert Evidences Based on Dissimilarity Measures in Evidence Theory</source>
          .
          <source>2019 IEEE 14th International Conference on Computer Sciences and Information Technologies (CSIT)</source>
          , Lviv, Ukraine,
          <year>2019</year>
          , pp.
          <fpage>113</fpage>
          <lpage>116</lpage>
          . doi:
          <volume>10</volume>
          .1109/STC-CSIT.
          <year>2019</year>
          .8929858
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Adya</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Myers</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Howell</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Elson</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meek</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khemani</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fulger</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gu</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bhuvanagiri</surname>
            <given-names>L</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hunter</surname>
            <given-names>J.</given-names>
          </string-name>
          , et al.
          <article-title>Slicer: Auto-sharding for datacenter applications</article-title>
          .
          <source>In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)</source>
          .
          <year>2016</year>
          . pp.
          <fpage>739</fpage>
          <lpage>753</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Lakshman</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malik</surname>
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Cassandra</surname>
          </string-name>
          <article-title>: a decentralized structured storage system</article-title>
          .
          <source>ACM SIGOPS Operating Systems Review</source>
          , Vol.
          <volume>44</volume>
          ,
          <issue>2</issue>
          (
          <year>2010</year>
          ), pp.
          <fpage>35</fpage>
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Bacon</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bales</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bruno</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cooper</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dickinson</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fikes</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fraser</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gubarev</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kogan</surname>
            <given-names>E.</given-names>
          </string-name>
          , et al.
          <article-title>Spanner: Becoming a SQL system</article-title>
          .
          <source>In Proceedings of the 2017 ACM International Conference on Management of Data</source>
          .
          <year>2017</year>
          . pp.
          <fpage>331</fpage>
          <lpage>343</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Klophaus</surname>
            <given-names>R.</given-names>
          </string-name>
          <article-title>Riak core: Building distributed applications without shared state</article-title>
          .
          <source>In ACM SIGPLAN Commercial Users of Functional Programming. ACM</source>
          ,
          <year>2010</year>
          . p.
          <fpage>14</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Pavlo</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Angulo</surname>
            <given-names>G</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Arulraj</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Arulraj</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lin</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lin</surname>
            <given-names>H.</given-names>
          </string-name>
          , Ma L.,
          <string-name>
            <surname>Menon</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mowry</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perron</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Quah</surname>
            <given-names>I.</given-names>
          </string-name>
          , et al.
          <article-title>Self-Driving Database Management Systems</article-title>
          .
          <source>In CIDR</source>
          , Vol.
          <volume>4</volume>
          .
          <issue>1</issue>
          (
          <year>2017</year>
          ). https://www.slideshare.net/AmazonWebServices/dat202getting-started
          <string-name>
            <surname>-</surname>
          </string-name>
          with-amazonaurora/14 (Last accessed:
          <volume>11</volume>
          .
          <fpage>01</fpage>
          .24).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Nishtala</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fugal</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grimm</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kwiatkowski</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lee</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            <given-names>H. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McElroy</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Paleczny</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peek</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saab</surname>
            <given-names>P.</given-names>
          </string-name>
          , et al.
          <article-title>Scaling memcache at facebook</article-title>
          .
          <source>In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13)</source>
          .
          <year>2013</year>
          . pp.
          <fpage>385</fpage>
          <lpage>398</lpage>
          .
          <string-name>
            <given-names>S.</given-names>
            <surname>Anzaroot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>McCallum</surname>
          </string-name>
          ,
          <source>UMass citation field extraction dataset</source>
          ,
          <year>2013</year>
          . URL : http://www.iesl.cs.umass.edu/data/data-umasscitationfield.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>