<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "http://jats.nlm.nih.gov/publishing/1.3/JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xml:lang="en" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="nlm-ta">PJS</journal-id>
<journal-id journal-id-type="publisher-id">Premier Journal of Science</journal-id>
<journal-id journal-id-type="pmc">PJS</journal-id>
<journal-title-group>
<journal-title>PJ Science</journal-title>
</journal-title-group>
<issn pub-type="epub">3049-9011</issn>
<publisher>
<publisher-name>Premier Science</publisher-name>
<publisher-loc>London, UK</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.70389/PJS.100117</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>ORIGINAL RESEARCH</subject>
</subj-group>
<subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Cognitive science</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Social sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Sensory perception</subject><subj-group><subject>Hallucinations</subject></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Social sciences</subject><subj-group><subject>Linguistics</subject><subj-group><subject>Grammar</subject><subj-group><subject>Phonology</subject><subj-group><subject>Syllables</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Engineering and technology</subject><subj-group><subject>Signal processing</subject><subj-group><subject>Speech signal processing</subject></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Cognitive science</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Social sciences</subject><subj-group><subject>Psychology</subject><subj-group><subject>Cognitive psychology</subject><subj-group><subject>Perception</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Sensory perception</subject></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Medicine and health sciences</subject><subj-group><subject>Mental health and psychiatry</subject><subj-group><subject>Schizophrenia</subject></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Research and analysis methods</subject><subj-group><subject>Bioassays and physiological analysis</subject><subj-group><subject>Electrophysiological techniques</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Physiology</subject><subj-group><subject>Electrophysiology</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Brain mapping</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Medicine and health sciences</subject><subj-group><subject>Clinical medicine</subject><subj-group><subject>Clinical neurophysiology</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Research and analysis methods</subject><subj-group><subject>Imaging techniques</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject><subj-group><subject>Event-related potentials</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Cell biology</subject><subj-group><subject>Cellular types</subject><subj-group><subject>Animal cells</subject><subj-group><subject>Neurons</subject><subj-group><subject>Interneurons</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Cellular neuroscience</subject><subj-group><subject>Neurons</subject><subj-group><subject>Interneurons</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Research and analysis methods</subject><subj-group><subject>Bioassays and physiological analysis</subject><subj-group><subject>Electrophysiological techniques</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Physiology</subject><subj-group><subject>Electrophysiology</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neurophysiology</subject><subj-group><subject>Brain electrophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Brain mapping</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Medicine and health sciences</subject><subj-group><subject>Clinical medicine</subject><subj-group><subject>Clinical neurophysiology</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Research and analysis methods</subject><subj-group><subject>Imaging techniques</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group><subj-group subj-group-type="Discipline-v3">
<subject>Biology and life sciences</subject><subj-group><subject>Neuroscience</subject><subj-group><subject>Neuroimaging</subject><subj-group><subject>Electroencephalography</subject></subj-group></subj-group></subj-group></subj-group>
</article-categories>

<title-group>
<article-title>Investigation of the Analytical Model of a Queue to Several Servers of Computer Networks with Priority Maintenance</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<contrib-id contrib-id-type="orcid">https://orcid.org/0009-0004-3265-9747</contrib-id>
<name>
<surname>Huseynov</surname>
<given-names>Zakir</given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Zeynalov</surname>
<given-names>Zaman</given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Mammadova</surname>
<given-names>Bahariyya</given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Guliyev</surname>
<given-names>Anar</given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Gadimli</surname>
<given-names>Gultekin</given-names>
</name>
</contrib>
<aff id="aff1"><institution>Department of Information Technologies, Azerbaijan State Agricultural University, 450 Ataturk Ave.</institution>, <city>Ganja</city>, <country>Azerbaijan</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor001"><bold>Correspondence to:</bold> Zakir Huseynov, <email>huseynovzakir75@gmail.com</email></corresp>
<fn fn-type="other"><p>Peer Review</p></fn>
</author-notes>
<pub-date pub-type="epub">
<day>03</day>
<month>10</month>
<year>2025</year>
</pub-date>
<pub-date pub-type="collection">
<month>10</month>
<year>2025</year>
</pub-date>
<volume>14</volume>
<issue>1</issue>
<elocation-id>100117</elocation-id>
<history>
<date date-type="received">
<day>05</day>
<month>09</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>19</day>
<month>09</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>19</day>
<month>09</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-year>2025</copyright-year>
<copyright-holder>Zakir Huseynov, Zaman Zeynalov, Bahariyya Mammadova, Anar Guliyev and Gultekin Gadimli</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/" xlink:type="simple">
<license-p>This is an open access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/" xlink:type="simple">Creative Commons Attribution License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="info:doi/10.70389/PJS.100117"/>
<abstract>
<sec>
<title>BACKGROUND</title>
<p>The performance of modern computer networks depends significantly on the number of nodes, available channels, and waiting slots. Efficient modeling of these factors is critical for optimizing resource allocation, reducing service delays, and maintaining high-quality metrics under dynamic loads.</p>
</sec>
<sec>
<title>MATERIALS AND METHODS</title>
<p>This study adopts a quantitative approach and aims to develop and validate an analytical model for multi-node, multi-server computer networks with finite queues and priority-based servicing. The model seeks to identify functional dependencies between nodes, channels, and waiting slots and to quantify their impact on key performance indicators, including waiting time, rejection probability, and server utilisation. An analytical model of a priority queueing system was constructed, incorporating finite queues, absolute priority for critical requests, and variable load conditions. Simulation experiments were performed under different network configurations to validate the theoretical dependencies.</p>
</sec>
<sec>
<title>RESULTS</title>
<p>Simulation results demonstrated that increasing the number of nodes from 10 to 100 raised average waiting time from 0.8s to 8s and rejection probability from 5% to 60%. Priority analysis revealed that under absolute priority at <italic>&#x3c1;</italic> = 0.99, critical requests were processed in 2.1s on average, while standard requests required 8s, with rejection rates staying within 16%. Additionally, increasing the number of servers from 2 to 5 at fixed load (<italic>&#x3c1;</italic> = 0.8) raised the average number of requests in the system from 4 to 6, but reduced service time variability, as the standard deviation-to-mean ratio decreased from 2.6 to 1.3.</p>
</sec>
<sec>
<title>CONCLUSION</title>
<p>The proposed model effectively captures the interplay between network nodes, channels, and waiting slots in determining quality of service under variable loads. The findings provide practical insights for optimizing network configurations to balance efficiency, fairness, and reliability in modern computer systems.</p>
</sec>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Load management</kwd>
<kwd>Performance evaluation</kwd>
<kwd>Rejection probability</kwd>
<kwd>Request processing</kwd>
<kwd>Resource allocation</kwd>
<kwd>Waiting time</kwd>
</kwd-group>
<counts>
<fig-count count="7"/>
<table-count count="2"/>
<equation-count count="12"/>
<page-count count="14"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>Version accepted</meta-name>
<meta-value>2</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec>
<title><ext-link ext-link-type="uri" xlink:href="https://premierscience.com/wp-content/uploads/2025/14/pjs-25-1325.pdf">Source-File: pjs-25-1325.pdf</ext-link></title>
</sec>
<sec id="sec001">
<title>Highlights</title>
<list list-type="bullet">
<list-item><p>Analytical model developed to evaluate network performance under finite queues, service priorities, and dynamic loads.</p></list-item>
<list-item><p>Functional relationships established between nodes, channels, and waiting slots affecting key performance metrics.</p></list-item>
<list-item><p>Simulations confirmed that high load accelerates critical request processing but delays standard requests.</p></list-item>
</list>
<p>Increasing server numbers reduced service time variability and improved overall system stability.</p>
</sec>
<sec id="sec002" sec-type="intro">
<title>Introduction</title>
<p>The advancement of digital technologies is closely tied to the efficiency of computer networks, which not only enable communication between devices but also form the backbone of distributed systems, cloud computing, and other modern technologies. Effective resource management within these networks is crucial for ensuring rapid data access and reliable storage, which are essential for maintaining high-quality service in an increasingly digital world.</p>
<p>In contemporary computer networks, one of the key challenges is managing request servicing, which is often accompanied by significant delays, particularly under high-load conditions.<sup><xref ref-type="bibr" rid="ref1">1</xref></sup> These delays are exacerbated when requests with varying priorities &#x2013; such as urgent or real-time requests &#x2013; are processed. As the demand for both efficiency and reliability continues to grow, it becomes imperative to develop models that optimise resource allocation and minimise delays, especially for critical requests that require immediate attention.<sup><xref ref-type="bibr" rid="ref2">2</xref></sup></p>
<p>Queueing systems (QS) form the foundation for analysing request processing across various fields, including telecommunications, logistics, and computer networks.<sup><xref ref-type="bibr" rid="ref3">3</xref></sup> These mathematical models are instrumental in describing key system performance metrics such as resource allocation, waiting periods, request blocking probability, and server load. A considerable amount of attention has been given to modelling multi-server systems that can handle requests with different priority levels, as this is essential for improving overall system performance.</p>
<p>Classical queueing models like M/M/n are commonly used to analyse multi-server systems. Multiple servers, exponential interarrival durations, and Poisson request flows are considered in these models. With the assumption that events occur independently and at a constant average rate, the Poisson distribution explains the chance of a certain number of events occurring in a specified region of time or space. This paradigm is useful for modelling random arrival patterns in queueing systems, where events like incoming requests occur intermittently but with a known average rate.</p>
<p>In queueing theory, the Erlang distribution is utilised alongside the Poisson distribution. The Erlang distribution describes waiting times in multi-channel systems with exponential inter-arrival and service delays. It calculates the probability that a request will wait in a queue based on server count and system load. Erlang is essential for monitoring system performance, especially in multi-server networks where active servers may delay requests.</p>
<p>Classical queueing models, such as the M/M/n type, have been widely applied in the analysis of multi-server systems.<sup><xref ref-type="bibr" rid="ref4">4</xref></sup> These models consider multiple servers, exponentially distributed interarrival times, and Poisson-distributed request flows, providing a foundational understanding of system performance and resource allocation.<sup><xref ref-type="bibr" rid="ref5">5</xref></sup> However, such models typically assume homogeneous service conditions and do not account for dynamic factors such as varying request priorities or load fluctuations, which are increasingly common in modern computer networks.<sup><xref ref-type="bibr" rid="ref5">5</xref></sup></p>
<p>To address these limitations, this study introduces a novel analytical model that extends classical M/M/n queueing theory by incorporating dynamic priority servicing and adaptive server scaling. These mechanisms allow for the efficient processing of both critical and standard requests, ensuring minimal delays for high-priority tasks while optimising overall system performance. Unlike traditional models, our approach adapts to real-time load fluctuations, making it highly relevant for modern, high-demand network environments. The core hypothesis is that as the number of nodes in a network increases, service resources must be proportionally expanded to maintain a consistent quality of service. Additionally, absolute priority servicing is assumed to significantly reduce waiting times for critical requests without adversely affecting the processing of non-critical requests.</p>
<p>The implementation of priority-based servicing introduces additional complexity and practical relevance to these systems.<sup><xref ref-type="bibr" rid="ref7">7</xref></sup> This approach involves categorising requests by importance, with critical requests receiving higher priority, which can be implemented through absolute or relative priority mechanisms. By applying advanced analytical models based on queueing theory, it is possible to predict system behaviour under varying conditions and formulate effective strategies to enhance the performance of computer networks that employ priority-based servicing.<sup><xref ref-type="bibr" rid="ref8">8</xref></sup></p>
<p>Several studies have explored the performance of multi-server systems with priority servicing. For example, the work of Elliriki et al.<sup><xref ref-type="bibr" rid="ref9">9</xref></sup> examined a multi-channel queueing system that accounts for server failures and recovery strategies, though it did not consider priority-based servicing for different request classes, which is crucial for multi-node networks under dynamic loads. Similarly, Huseynov et al.<sup><xref ref-type="bibr" rid="ref10">10</xref></sup> made significant progress in studying the performance of multi-channel and multi-node computer networks with priority servicing under variable loads. The researchers calculated average request waiting times and server utilisation, enabling an assessment of system efficiency. However, the study does not account for dynamic priority adjustments in real time, limiting its applicability to real-world systems where conditions may change dynamically.</p>
<p>Additionally, research on M/M/1/&#x221e; queueing systems by Melikov and Shahmaliyev<sup><xref ref-type="bibr" rid="ref11">11</xref></sup> focused on factors like perishable inventory and repeat customers, providing insights into system performance under these conditions. However, their model does not address variable load or finite queues, which are essential components of real-world systems, particularly in modern computer networks that must handle dynamic and unpredictable traffic.</p>
<p>The objective of this study was to develop an analytical model for assessing the performance quality of modern computer networks, considering parameters such as the number of channels, waiting slots in network nodes, and the total number of nodes. One hypothesis of the research is that as the number of nodes increases, service resources must be proportionally expanded to maintain a specified quality level. Additionally, it is assumed that implementing absolute priority servicing can minimise waiting times for critical requests without significantly affecting the servicing of other requests.</p>
</sec>
<sec id="sec003">
<title>Materials and Methods</title>
<p>Relevant statistics were obtained for the M/M/H model, in which the exponential distribution of service time is identical for all servers. This model accounts for both the general characteristics of the system and specific aspects related to priority servicing, which is crucial for ensuring efficient network operation under high-load conditions.</p>
<p>In the constructed model, request arrivals follow a Poisson process with intensity &#x03BB;, and service times are exponentially distributed with rate &#x03BC;. The system consists of <italic>H</italic> identical servers and a finite waiting buffer of size <italic>B</italic>. The traffic load is defined as <italic>&#x3c1;</italic> = &#x03BB;/(H&#x03BC;). Requests are divided into two classes: critical and standard. Critical requests are assigned higher priority and are serviced first, which affects the overall system performance. However, for a comprehensive system analysis, it is necessary to first examine general metrics that consider all request types. This allows for an evaluation of the system&#x2019;s overall efficiency and an assessment of how priority servicing influences its operation. Within each class, the queue discipline is First-Come-First-Served (FCFS). The buffer policy is of finite capacity: if the system already contains <italic>H</italic>+<italic>B</italic> requests, any new arrival is blocked and lost. Thus, blocking probability P<sub>block</sub>, mean waiting time <italic>W</italic>, and mean number of requests in the system <italic>L</italic> can be derived using standard Erlang loss and delay formulas adapted for two classes under priority.</p>
<p>This model follows the Poisson distribution law and the Erlang distribution law (1, 2):</p>
<disp-formula id="DM1"><label>(1)</label><mml:math display="block" id="DMM1"><mml:mrow><mml:mi>K</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:msubsup><mml:mstyle mathsize='140%' displaystyle='true'><mml:mo>&#x2211;</mml:mo></mml:mstyle><mml:mrow><mml:mi>I</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msubsup><mml:mfrac><mml:mrow><mml:msup><mml:mrow><mml:mo stretchy='false'>(</mml:mo><mml:mi>H</mml:mi><mml:mi>&#x03C1;</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mi>I</mml:mi></mml:msup></mml:mrow><mml:mrow><mml:mi>I</mml:mi><mml:mo>!</mml:mo></mml:mrow></mml:mfrac></mml:mrow><mml:mrow><mml:msubsup><mml:mstyle mathsize='140%' displaystyle='true'><mml:mo>&#x2211;</mml:mo></mml:mstyle><mml:mrow><mml:mi>I</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mi>H</mml:mi></mml:msubsup><mml:mfrac><mml:mrow><mml:msup><mml:mrow><mml:mo stretchy='false'>(</mml:mo><mml:mi>H</mml:mi><mml:mi>&#x03C1;</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mi>I</mml:mi></mml:msup></mml:mrow><mml:mrow><mml:mi>I</mml:mi><mml:mo>!</mml:mo></mml:mrow></mml:mfrac></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<p>where: <italic>K</italic> &#x2013; Poisson coefficient function, <italic>H</italic> &#x2013; number of servers, <italic>&#x3c1;</italic> &#x2014; system load.</p>
<disp-formula id="DM2"><label>(2)</label><mml:math display="block" id="DMM2"><mml:mrow><mml:mi>C</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>K</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x00A0;</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03C1;</mml:mi><mml:mi>K</mml:mi></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<p>where: <italic>C</italic> &#x2013; Erlang function, <italic>K</italic> &#x2013; Poisson coefficient function&#x3c1; &#x2014; system load.</p>
<p>The Poisson coefficient <italic>K</italic> is used in the model to calculate the probability that all servers are busy. The Erlang function <italic>C</italic>, in turn, indicates the probability that a request will enter the queue.</p>
<p>The change in the functional dependence between the Poisson coefficient <italic>K</italic> and the Erlang function <italic>C</italic> relative to the system load (&#x3c1;) is illustrated in <xref ref-type="fig" rid="F1">Figure 1</xref>.</p>
<fig id="F1" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100117.g001</object-id>
<label>Fig 1</label>
<caption><title>Graphs of changes in the Poisson coefficient function and the Erlang function</title>
<p>Source: Compiled by the authors.</p></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1325-Figure-1.webp?">Figure 1</ext-link></p>
</fig>
<p>The Erlang function <italic>C</italic> is a probabilistic quantity, the magnitude of which always lies within the range of 0 to 1. As can be observed, the value of <italic>C</italic> is a function of the number of servers <italic>H</italic> and the utilisation coefficient (load) <italic>&#x3c1;</italic> (3):</p>
<disp-formula id="DM3"><label>(3)</label><mml:math display="block" id="DMM3"><mml:mrow><mml:mi>C</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>H</mml:mi><mml:mo>,</mml:mo><mml:mi>&#x03C1;</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>K</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>H</mml:mi><mml:mo>,</mml:mo><mml:mi>&#x03C1;</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03C1;</mml:mi><mml:mi>K</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>H</mml:mi><mml:mo>,</mml:mo><mml:mi>&#x03C1;</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<p>where: <italic>C</italic> &#x2013; Erlang function, <italic>K</italic> &#x2013; Poisson coefficient function, <italic>H</italic> &#x2013; number of servers,&#x3c1; &#x2014; system load.</p>
<p>The change in load in a multi-server system was determined using the following formula (4):</p>
<disp-formula id="DM4"><label>(4)</label><mml:math display="block" id="DMM4"><mml:mrow><mml:mi>&#x03C1;</mml:mi><mml:mo>&#x00A0;</mml:mo><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>&#x03BB;</mml:mi><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow><mml:mi>H</mml:mi></mml:mfrac></mml:mrow></mml:math></disp-formula>
<p>where: <italic>&#x03BB;</italic> &#x2013; packet transmission rate per second (packets/s), <italic>T</italic><sub><italic>s</italic></sub> &#x2013; average service time per request (excluding queue waiting time), <italic>H</italic> &#x2013; number of servers.</p>
<p>The average number of requests in the system (waiting and being serviced) was calculated using the formula (5):</p>
<disp-formula id="DM5"><label>(5)</label><mml:math display="block" id="DMM5"><mml:mrow><mml:mi>r</mml:mi><mml:mo>=</mml:mo><mml:mi>C</mml:mi><mml:mfrac><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03C1;</mml:mi></mml:mrow></mml:mfrac><mml:mo>+</mml:mo><mml:mi>H</mml:mi><mml:mi>&#x03C1;</mml:mi></mml:mrow></mml:math></disp-formula>
<p>where: <italic>C</italic> &#x2013; Erlang function, <italic>H</italic> &#x2013; number of servers,&#x3c1; &#x2014; system load.</p>
<p>The average number of requests waiting to be serviced (<italic>w</italic>) was determined by the formula (6):</p>
<disp-formula id="DM6"><label>(6)</label><mml:math display="block" id="DMM6"><mml:mrow><mml:mi>w</mml:mi><mml:mo>=</mml:mo><mml:mi>C</mml:mi><mml:mfrac><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03C1;</mml:mi></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<p>where: <italic>C</italic> &#x2013; Erlang function,&#x3c1; &#x2014; system load.</p>
<p>The average request time (<italic>T</italic><sub><italic>r</italic></sub>) and average waiting time in the system (<italic>T</italic><sub><italic>w</italic></sub>) were calculated using the following formulas (7, 8):</p>
<disp-formula id="DM7"><label>(7)</label><mml:math display="block" id="DMM7"><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>r</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mi>C</mml:mi><mml:mi>H</mml:mi></mml:mfrac><mml:mo>&#x22C5;</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03C1;</mml:mi></mml:mrow></mml:mfrac><mml:mo>+</mml:mo><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:math></disp-formula>
<p>where: <italic>C</italic> &#x2013; Erlang function, <italic>H</italic> &#x2013; number of servers, &#x3c1; &#x2014; system load, <italic>T</italic><sub><italic>s</italic></sub> &#x2013; average service time per request.</p>
<disp-formula id="DM8"><label>(8)</label><mml:math display="block" id="DMM8"><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>w</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mi>C</mml:mi><mml:mi>H</mml:mi></mml:mfrac><mml:mo>&#x22C5;</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03C1;</mml:mi></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<p>where: <italic>C</italic> &#x2013; Erlang function, <italic>H</italic> &#x2013; number of servers,&#x3c1; &#x2014; system load, <italic>T</italic><sub><italic>s</italic></sub> &#x2013; average service time per request.</p>
<p>The standard deviations of <italic>T</italic><sub><italic>r</italic></sub> and <italic>T</italic><sub><italic>w</italic></sub> were determined by the following formulas, respectively (9):</p>
<disp-formula id="DM9"><label>(9)</label><mml:math display="block" id="DMM9"><mml:mrow><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>r</mml:mi></mml:msub></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03C1;</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow></mml:mfrac><mml:mo>+</mml:mo><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:math></disp-formula>
<p>where: <italic>H</italic> &#x2013; number of servers,&#x3c1; &#x2014; system load, <italic>T</italic><sub><italic>s</italic></sub> &#x2013; average service time per request (10).</p>
<disp-formula id="DM10"><label>(10)</label><mml:math display="block" id="DMM10"><mml:mrow><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>w</mml:mi></mml:msub></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03C1;</mml:mi></mml:mrow></mml:mfrac><mml:msqrt><mml:mrow><mml:mi>C</mml:mi><mml:mi>&#x03C1;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:mi>&#x03C1;</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mi>C</mml:mi><mml:mi>&#x03C1;</mml:mi></mml:mrow></mml:msqrt></mml:mrow></mml:math></disp-formula>
<p>where: <italic>H</italic> &#x2013; number of servers,&#x3c1; &#x2014; system load, <italic>T</italic><sub><italic>s</italic></sub> &#x2013; average service time per request.</p>
<p>The calculation of the average waiting time <italic>T</italic><sub><italic>d</italic></sub> (excluding requests with zero waiting time) was performed using the formula (11):</p>
<disp-formula id="DM11"><label>(11)</label><mml:math display="block" id="DMM11"><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03C1;</mml:mi><mml:mo stretchy='false'>)</mml:mo></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<p>where: <italic>H</italic> &#x2013; number of servers,&#x3c1; &#x2014; system load, <italic>T</italic><sub><italic>s</italic></sub> &#x2013; average service time per request.</p>
<p>For the M/M/H model with a limited queue, the rejection probability <italic>P</italic><sub><italic>rejection</italic></sub> was defined as the probability that all servers are busy and the queue is full. The rejection probability formula is as follows (12):</p>
<disp-formula id="DM12"><label>(12)</label><mml:math display="block" id="DMM12"><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>j</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mfrac><mml:mrow><mml:msup><mml:mrow><mml:mo stretchy='false'>(</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mi>H</mml:mi></mml:msup></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mo>!</mml:mo></mml:mrow></mml:mfrac><mml:mo>&#x22C5;</mml:mo><mml:mfrac><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mo stretchy='false'>(</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo>/</mml:mo><mml:msup><mml:mrow><mml:mo stretchy='false'>(</mml:mo><mml:mi>H</mml:mi><mml:mo>/</mml:mo><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mrow><mml:mi>k</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mo stretchy='false'>(</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo>/</mml:mo><mml:mo stretchy='false'>(</mml:mo><mml:mfrac><mml:mi>H</mml:mi><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac><mml:mo stretchy='false'>)</mml:mo></mml:mrow></mml:mfrac></mml:mrow><mml:mrow><mml:msubsup><mml:mstyle mathsize='140%' displaystyle='true'><mml:mo>&#x2211;</mml:mo></mml:mstyle><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msubsup><mml:mfrac><mml:mrow><mml:msup><mml:mrow><mml:mo stretchy='false'>(</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mi>i</mml:mi></mml:msup></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>!</mml:mo></mml:mrow></mml:mfrac><mml:mo>+</mml:mo><mml:mfrac><mml:mrow><mml:msup><mml:mrow><mml:mo stretchy='false'>(</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mi>H</mml:mi></mml:msup></mml:mrow><mml:mrow><mml:mi>H</mml:mi><mml:mo>!</mml:mo></mml:mrow></mml:mfrac><mml:mo>&#x22C5;</mml:mo><mml:mfrac><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:msup><mml:mrow><mml:mo stretchy='false'>(</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo>/</mml:mo><mml:mo stretchy='false'>(</mml:mo><mml:mfrac><mml:mi>H</mml:mi><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac><mml:mo stretchy='false'>)</mml:mo><mml:mo stretchy='false'>)</mml:mo></mml:mrow><mml:mrow><mml:mi>k</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mo stretchy='false'>(</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo>/</mml:mo><mml:mo stretchy='false'>(</mml:mo><mml:mfrac><mml:mi>H</mml:mi><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac><mml:mo stretchy='false'>)</mml:mo><mml:mo stretchy='false'>)</mml:mo></mml:mrow></mml:mfrac></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<p>where: <italic>H</italic> &#x2013; number of servers, <italic>&#x03BB;</italic> &#x2013; packet transmission rate per second, <italic>T</italic><sub><italic>s</italic></sub> &#x2013; average service time per request, <italic>k</italic> &#x2013; queue size.</p>
<p>To ensure analytical correctness, the derived expressions were cross-checked against standard results from queueing theory. In particular, when the queue length tends to infinity, the rejection probability (12) reduces to the classical Erlang-C formula for the M/M/c model.<sup><xref ref-type="bibr" rid="ref13">13</xref></sup> Similarly, for <italic>k</italic> = 0, the model reduces to Erlang function (<italic>C</italic>) blocking probabilities. For systems with priority scheduling, the derived expressions converge to the preemptive-resume M/M/c priority model described in Harchol-Balter.<sup><xref ref-type="bibr" rid="ref12">12</xref></sup> These limiting cases validate the internal consistency of the analytical framework.</p>
<p>The analytical model developed in this study is fully presented within the article, together with all relevant formulas and calculation procedures. Typical parameter values of the system were applied to analyse the functional dependencies between load, waiting time, blocking probability, and server utilisation. This ensured that the determination of optimal performance indicators is transparent and reproducible directly from the analytical framework provided in the text.</p>
</sec>
<sec id="sec004" sec-type="results">
<title>Results</title>
<p>Modern telecommunications networks employ various approaches to request servicing. The two most common structural types are: systems with a shared queue for all servers and systems with dedicated queues for each server.</p>
<p>As seen in <xref ref-type="fig" rid="F1">Figure 1</xref>, for <italic>H</italic> = 2, the changes in <italic>K</italic> values are negligible, while with an increase in the average number of requests in the system, these values decrease and fluctuate between 0.85 and 1. In this case, the values of <italic>C</italic> range from 0.1 to 0.7. <xref ref-type="fig" rid="F2">Figure 2</xref> presents a model with a shared queue, where all incoming requests accumulate in a single queue before being distributed among available servers. This approach ensures balanced workload distribution among servers but may cause delays under high-load conditions.</p>
<fig id="F2" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100117.g002</object-id>
<label>Fig 2</label>
<caption><title>Structure and parameters of a queuing system with a shared queue</title>
<p>Source: Compiled by the authors.</p></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1325-Figure-2.webp?">Figure 2</ext-link></p>
</fig>
<p><xref ref-type="fig" rid="F3">Figure 3</xref> illustrates a system structure with dedicated queues for each server. In this model, servers process only those requests that enter their respective queues. This approach ensures server independence but may lead to workload imbalance, particularly under uneven request distribution.</p>
<fig id="F3" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100117.g003</object-id>
<label>Fig 3</label>
<caption><title>Structure and parameters of a queuing system with a dedicated queue for each server</title>
<p>Source: Compiled by the authors.</p></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1325-Figure-3.webp?">Figure 3</ext-link></p>
</fig>
<p>The analysis of the relationship between the Poisson coefficient <italic>(K)</italic> and the Erlang function <italic>(C)</italic> as a function of system load (<italic>&#x3c1;</italic>) is crucial for assessing the performance of a queuing system. The Poisson coefficient determines the probability that all servers are busy, while the Erlang function indicates the probability of a request entering the queue. These metrics help understand how the system responds to changes in load and identify optimal parameters to maintain stable operation.</p>
<p>From the dependency graph (<xref ref-type="fig" rid="F1">Figure 1</xref>), constructed using formulas 1, 2, and 3, it can be observed that at <italic>H</italic> = 2, the changes in <italic>K</italic> values are negligible. As the average number of requests in the system increases, these values decrease and fluctuate between 0.85 and 1. This indicates that the probability of all servers being busy remains high even under increased load. Meanwhile, the value of <italic>C</italic> fluctuates between 0.1 and 0.7, suggesting that the probability of a request entering the queue increases with higher load but remains lower than <italic>K</italic>. This confirms that the system remains stable even under high load, though some requests still enter the queue, which may require additional resources to maintain service quality.</p>
<p>The next critical stage involves investigating how the load (<italic>&#x3c1;</italic>) changes depending on the number of packets transmitted per second (<italic>&#x03BB;</italic>) for different numbers of servers (<italic>H</italic>). This allows for assessing how the system scales with increasing input flow intensity and determining the optimal number of servers to ensure stable operation. Based on formula 4 and using typical system parameter values, a graph of the functional dependency of system load for different numbers of servers was constructed (<xref ref-type="fig" rid="F4">Figure 4</xref>).</p>
<fig id="F4" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100117.g004</object-id>
<label>Fig 4</label>
<caption><title>Dependencies of load changes (<italic>&#x3c1;</italic>) on the number of packets transmitted per second (<italic>&#x03BB;</italic>) for different numbers of servers (<italic>H</italic>)</title>
<p>Source: Compiled by the authors.</p></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1325-Figure-4.webp?">Figure 4</ext-link></p>
</fig>
<p>As seen in <xref ref-type="fig" rid="F4">Figure 4</xref>, the dependency of load (<italic>&#x3c1;</italic>) on the number of packets transmitted per second (<italic>&#x03BB;</italic>) exhibits different behaviours depending on the number of servers (<italic>H</italic>). At <italic>H</italic> = 1, the load increases sharply, indicating rapid saturation of the system&#x2019;s maximum throughput. However, as the number of servers increases (<italic>H</italic> = 2, 3, 4, 5), the load growth becomes more gradual, demonstrating the system&#x2019;s ability to handle requests more efficiently due to additional resources. This suggests that increasing the number of servers helps maintain stable load levels even as input flow intensity (<italic>&#x03BB;</italic>) grows.</p>
<p>To evaluate network performance, graphs of key metrics as functions of load (<italic>&#x3c1;</italic>) were constructed using typical system parameters such as request arrival rate (<italic>&#x03BB;</italic>), average service time per request (<italic>T</italic><sub><italic>s</italic></sub>), number of servers (<italic>H</italic>), and queue size (<italic>k</italic>). These graphs allow for examining the relationships between different metrics and identifying optimal parameters to ensure stable network operation.</p>
<p>The graph in <xref ref-type="fig" rid="F5">Figure 5</xref> illustrates the dependency of the average number of requests in the system on the load. Based on formula 5, a metric was obtained to assess how the number of requests in the system (both in the queue and in service) changes with increasing load.</p>
<fig id="F5" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100117.g005</object-id>
<label>Fig 5</label>
<caption><title>Graph of the dependency of the average number of requests on load <inline-formula id="IM1"><mml:math id="IIM1"><mml:mrow><mml:mfrac><mml:mi>r</mml:mi><mml:mi>&#x03C1;</mml:mi></mml:mfrac></mml:mrow></mml:math></inline-formula></title>
<p>Source: Compiled by the authors.</p></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1325-Figure-5.webp?">Figure 5</ext-link></p>
</fig>
<p>From <xref ref-type="fig" rid="F5">Figure 5</xref>, it is evident that as the number of servers increases, more requests are processed. For example, at a load of <italic>&#x3c1;</italic> =0.8:</p>
<list list-type="bullet">
<list-item><p>with <italic>H</italic> = 2 the average number of requests in the network is <italic>r</italic> = 4;</p></list-item>
<list-item><p>with <italic>H</italic> = 5 the average number of requests in the network is <italic>r</italic> = 6.</p></list-item>
</list>
<p>This indicates that additional servers enhance the system&#x2019;s throughput. For low load values (<italic>&#x3c1;</italic> &#x003C; 0.5), the system operates efficiently. However, at high load values (<italic>&#x3c1;</italic> &#x003E; 0.8), a sharp increase in the number of requests in the system is observed, which may indicate potential overload.</p>
<p>Using calculations based on formula 9, a graph of the dependency of the ratio of standard deviation to average service time per request on load was constructed (<xref ref-type="fig" rid="F6">Figure 6</xref>). This metric helps assess the variability and stability of service time under different load conditions.</p>
<fig id="F6" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100117.g006</object-id>
<label>Fig 6</label>
<caption><title>Graph of the relationship between the change in the ratio of the standard deviation of mean request time to mean service time <inline-formula id="IM2"><mml:math id="IIM2"><mml:mrow><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>r</mml:mi></mml:msub><mml:mo>&#x00A0;</mml:mo></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> and the system load</title>
<p>Source: Compiled by the authors.</p></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1325-Figure-6.webp?">Figure 6</ext-link></p>
</fig>
<p>The data in <xref ref-type="fig" rid="F6">Figure 6</xref> demonstrate that the ratio of the standard deviation of <inline-formula id="IM3"><mml:math id="IIM3"><mml:mrow><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>r</mml:mi></mml:msub><mml:mo>&#x00A0;</mml:mo></mml:mrow></mml:msub></mml:mrow></mml:math></inline-formula> to the mean service time per request <italic>T</italic><sub><italic>s</italic></sub> increases with rising load. This indicates greater variability in service time, particularly under system overload. With fewer servers (<italic>H</italic> = 2.3) the ratio grows faster compared to a higher number of servers (<italic>H</italic> = 4.5). For instance, at a load <italic>&#x3c1;</italic> =0.8 with <italic>H</italic> = 2 servers, the ratio of standard deviation to mean service time is <inline-formula id="IM4"><mml:math id="IIM4"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>r</mml:mi></mml:msub><mml:mo>&#x00A0;</mml:mo></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> = 2.6, whereas with <italic>H</italic> = 5 servers, this ratio equals <inline-formula id="IM5"><mml:math id="IIM5"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>r</mml:mi></mml:msub><mml:mo>&#x00A0;</mml:mo></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> = 1.3.</p>
<p>Applying Formula 11, the relationship between mean waiting time and mean service time per request as a function of load was determined (<xref ref-type="fig" rid="F7">Figure 7</xref>). This metric helps illustrate how request waiting times in the system change under increasing load.</p>
<fig id="F7" position="float">
<object-id pub-id-type="doi">10.70389/journal.PJS.100117.g007</object-id>
<label>Fig 7</label>
<caption><title>Graph of the relationship between mean waiting time and mean service time per request <inline-formula id="IM6"><mml:math id="IIM6"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> as a function of load</title>
<p>Source: Compiled by the authors.</p></caption>
<p><ext-link ext-link-type="uri" xlink:href="https://i0.wp.com/premierscience.com/wp-content/uploads/2025/14/pjs-25-1325-Figure-7.webp?">Figure 7</ext-link></p>
</fig>
<p>The dependency graph in <xref ref-type="fig" rid="F7">Figure 7</xref> shows that the ratio of mean waiting time to mean service time per request <inline-formula id="IM7"><mml:math id="IIM7"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> increases significantly with rising load, particularly as 1. However, this ratio decreases with a higher number of servers:</p>
<list list-type="bullet">
<list-item><p>At <italic>&#x3c1;</italic> =0.5 with <italic>H</italic> = 1 <inline-formula id="IM8"><mml:math id="IIM8"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> = 2, with <italic>H</italic> =2 <inline-formula id="IM9"><mml:math id="IIM9"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> =1.2, and with <italic>H</italic> = 5 <inline-formula id="IM8a"><mml:math id="IIM8a"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula>=0.5.</p></list-item>
<list-item><p>At <italic>&#x3c1;</italic> = 0.8 with <italic>H</italic> = 1 <inline-formula id="IM10"><mml:math id="IIM10"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> =5, with <italic>H</italic> = 2 <inline-formula id="IM11"><mml:math id="IIM11"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> =2.5, and with <italic>H</italic> = 5 <inline-formula id="IM8b"><mml:math id="IIM8b"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula>=1.</p></list-item>
</list>
<p>For high <italic>&#x3c1;</italic> values (&#x003E;0.8) the mean waiting time grows exponentially, which may indicate service disruptions.</p>
<p>An increase in the number of nodes (<italic>N</italic>) leads to a higher mean number of requests (<italic>r</italic>), entering the system. This may elevate server load, reflected in an increased utilisation factor (<italic>&#x3c1;</italic>). If the number of servers remains unchanged, this can result in longer request waiting and service times. Based on Formulas 4, 5, 8, and 12, calculations were performed to assess the impact of node count variation on key network performance metrics, with results presented in <xref ref-type="table" rid="T1">Table 1</xref>.</p>
<table-wrap id="T1">
<label>Table 1</label>
<caption><title>Calculation results of the influence of node count on network performance quality parameters</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="center">Number of nodes (<italic>N</italic>)</th>
<th valign="top" align="center">Number of servers (<italic>H</italic>)</th>
<th valign="top" align="center">Load (<italic>&#x3c1;</italic>)</th>
<th valign="top" align="center">Mean waiting time (<italic>T</italic><sub><italic>w</italic></sub>), s</th>
<th valign="top" align="center">Rejection probability (<italic>P</italic><sub><italic>rejection</italic></sub>), %</th>
<th valign="top" align="center">Mean number of requests (<italic>r</italic>)</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="center">10</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">0.5</td>
<td valign="top" align="center">0.8</td>
<td valign="top" align="center">5</td>
<td valign="top" align="center">2.5</td>
</tr>
<tr>
<td valign="top" align="center">20</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">0.8</td>
<td valign="top" align="center">2.5</td>
<td valign="top" align="center">20</td>
<td valign="top" align="center">4.0</td>
</tr>
<tr>
<td valign="top" align="center">30</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">0.6</td>
<td valign="top" align="center">1.2</td>
<td valign="top" align="center">10</td>
<td valign="top" align="center">5.0</td>
</tr>
<tr>
<td valign="top" align="center">40</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">0.9</td>
<td valign="top" align="center">4.0</td>
<td valign="top" align="center">30</td>
<td valign="top" align="center">8.0</td>
</tr>
<tr>
<td valign="top" align="center">50</td>
<td valign="top" align="center">6</td>
<td valign="top" align="center">0.7</td>
<td valign="top" align="center">1.8</td>
<td valign="top" align="center">15</td>
<td valign="top" align="center">10.0</td>
</tr>
<tr>
<td valign="top" align="center">60</td>
<td valign="top" align="center">6</td>
<td valign="top" align="center">0.95</td>
<td valign="top" align="center">5.2</td>
<td valign="top" align="center">40</td>
<td valign="top" align="center">12.5</td>
</tr>
<tr>
<td valign="top" align="center">70</td>
<td valign="top" align="center">8</td>
<td valign="top" align="center">0.8</td>
<td valign="top" align="center">3.0</td>
<td valign="top" align="center">25</td>
<td valign="top" align="center">15.0</td>
</tr>
<tr>
<td valign="top" align="center">80</td>
<td valign="top" align="center">8</td>
<td valign="top" align="center">0.97</td>
<td valign="top" align="center">6.5</td>
<td valign="top" align="center">50</td>
<td valign="top" align="center">18.0</td>
</tr>
<tr>
<td valign="top" align="center">90</td>
<td valign="top" align="center">10</td>
<td valign="top" align="center">0.85</td>
<td valign="top" align="center">4.2</td>
<td valign="top" align="center">35</td>
<td valign="top" align="center">21.0</td>
</tr>
<tr>
<td valign="top" align="center">100</td>
<td valign="top" align="center">10</td>
<td valign="top" align="center">0.99</td>
<td valign="top" align="center">8.0</td>
<td valign="top" align="center">60</td>
<td valign="top" align="center">25.0</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>Source: Compiled by the authors.</p></fn>
</table-wrap-foot>
</table-wrap>
<p>The conducted analysis revealed a clear dependency between the number of nodes <italic>(N)</italic>, request waiting time (<italic>T</italic><sub><italic>w</italic></sub>) and the probability of rejection (<italic>P</italic><sub><italic>rejection</italic></sub>). Specifically, as the number of nodes (<italic>N</italic>) increases, the system load (<italic>&#x3c1;</italic>), rises, leading to an increase in request waiting time (<italic>T</italic><sub><italic>w</italic></sub>) and the probability of rejection (<italic>P</italic><sub><italic>rejection</italic></sub>). To ensure stable network operation, it is necessary to increase the number of servers (<italic>H</italic>) and corresponding service channels. In particular, with 10&#x2013;30 nodes, the system demonstrates acceptable performance metrics. However, with 40 or more nodes, the waiting time and probability of rejection increase sharply, indicating the need to expand server resources. For instance, with 80 nodes, the probability of rejection reaches 50%, and the average waiting time is 6.5s, significantly exceeding permissible limits for efficient system operation.</p>
<p>Equally important is the impact of changes in the number of nodes on the probability of rejection, i.e., the likelihood that a request will not be serviced due to system overflow. If the number of nodes increases while the number of servers and waiting slots remains unchanged, the probability of rejection may rise. This occurs because the system may fail to process all incoming requests, especially when the load (<italic>&#x3c1;</italic>) approaches 1. Conversely, if the number of servers is increased proportionally (e.g., from 2 to 4), the load (<italic>&#x3c1;</italic>) remains stable, and the probability of rejection can be minimised.</p>
<p>Thus, as the number of nodes grows, the infrastructure must be scaled by adding servers, increasing communication channel bandwidth, and optimising load distribution to ensure stable service quality.</p>
<p>For stable operation, the system load must be maintained at <italic>&#x3c1;</italic> &#x003C; 0.5. The number of waiting slots should be adequate to minimise waiting time. Increasing waiting slots may reduce the probability of request loss but could also increase overall waiting time.<sup><xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref16">16</xref></sup> To ensure stable operation, service priorities must be considered. High-priority requests should be processed faster, achievable through dynamic resource allocation among channels.</p>
<p>The use of priority servicing in the model ensures rapid execution of critical high-priority requests compared to standard requests. The servicing mechanism, such as absolute priority, involves interrupting low-priority requests when a higher-priority request arrives.<sup><xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref></sup> After servicing the high-priority request, the server resumes processing the suspended low-priority request.</p>
<p>High-priority requests are serviced immediately, ensuring high service quality for critical tasks. Consequently, overall system efficiency improves, as servers always process the most important requests first. Absolute priority allows the system to adapt to uneven loads by prioritising urgent requests during peak periods.<sup><xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref></sup> However, if high-priority requests continuously enter the system, low-priority requests may never be serviced.</p>
<p>The discussed adaptation of the model for different load types and service conditions includes implementing mechanisms to ensure stable network operation under variable loads, such as dynamic resource allocation. Real-time network load monitoring tracks incoming requests to determine the current system load level or identify potential network bottlenecks.<sup><xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref></sup> Dynamic load balancing utilises real-time server load data to distribute requests dynamically. This approach prevents system downtime by automatically redirecting requests from overloaded servers to less loaded ones.</p>
<p>The application of automatic system scaling involves automated decision-making regarding server scaling, load distribution among nodes, queue optimisation, prioritisation, and resource allocation.<sup><xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref28">28</xref></sup> Without administrator intervention, decisions are made to redirect traffic, deactivate server loads, and balance loads.<sup><xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref30">30</xref></sup> Such a mechanism reduces system failures, enhances service availability, and minimises downtime, thereby improving system reliability.</p>
<p>It should be noted that automatic scaling mechanisms have certain drawbacks and limitations. Primarily, technical challenges arise due to the complexity of configuring scaling rules and the need for continuous monitoring and parameter adjustments, which can be particularly demanding for large networks. Additionally, resource constraints exist, reflected in physical network infrastructure limitations and the need for additional computational power. Potential risks include excessive resource allocation and incorrect scaling algorithm performance. Automatic scaling is a powerful tool for optimising computer networks, and when implemented correctly, it significantly enhances resource utilisation efficiency and user service quality, despite certain configuration and operational complexities.<sup><xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref></sup></p>
<p>One of the proposed hypotheses is based on the premise that an increase in the number of nodes (<italic>N</italic>) leads to a rise in the overall system load, requiring additional resources to maintain stable operation. An analysis of the impact of the number of nodes on system performance parameters (<xref ref-type="table" rid="T1">Table 1</xref>) demonstrated that as the number of nodes (<italic>N</italic>) increases, the average waiting time (<italic>T</italic><sub><italic>w</italic></sub>) and the system failure probability rise significantly if the number of service channels and queue capacity remains unchanged.</p>
<p>This is explained by the fact that each node generates additional requests, creating an increased load on the entire system. The simulation results revealed that to maintain acceptable service quality with a growing number of nodes (<italic>N</italic>), it is necessary to increase the number of service channels and queue capacity.</p>
<p>However, the relationship between the number of nodes and the required service resources is not linear. For instance, if the number of nodes (<italic>N</italic>) doubles, it is not always necessary to double the number of service channels and queue capacity &#x2013; a gradual increase, accounting for load dynamics and priority request distribution, proves more efficient. Thus, the results confirmed that an increase in the number of network nodes necessitates a corresponding expansion of service resources to sustain a stable level of operational quality. Consequently, this hypothesis is validated.</p>
<p>The next hypothesis is grounded in the assertion that priority-based service enables efficient resource allocation, ensuring rapid processing of critical requests. <xref ref-type="table" rid="T2">Table 2</xref> presents the results of calculations assessing the impact of absolute priority on service parameters in a multi-node network.</p>
<table-wrap id="T2">
<label>Table 2</label>
<caption><title>Calculation results of absolute priority&#x2019;s impact on network performance metrics</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="center">Number of nodes (<italic>N</italic>)</th>
<th valign="top" align="center">Number of servers (<italic>H</italic>)</th>
<th valign="top" align="center">Load (<italic>&#x3c1;</italic>)</th>
<th valign="top" align="center">Average waiting time for non-critical requests (<italic>T<sub>w&#x2212;</sub>n</italic>), s</th>
<th valign="top" align="center">Average waiting time for critical requests (<italic>T<sub>w&#x2212;</sub>c</italic>), s</th>
<th valign="top" align="center">Rejection probability (<italic>P<sub>rejection</sub></italic>), %</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="center">10</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">0.5</td>
<td valign="top" align="center">0.3</td>
<td valign="top" align="center">1.0</td>
<td valign="top" align="center">2.5</td>
</tr>
<tr>
<td valign="top" align="center">20</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">0.7</td>
<td valign="top" align="center">0.5</td>
<td valign="top" align="center">2.5</td>
<td valign="top" align="center">4.2</td>
</tr>
<tr>
<td valign="top" align="center">30</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">0.8</td>
<td valign="top" align="center">0.7</td>
<td valign="top" align="center">3.0</td>
<td valign="top" align="center">5.6</td>
</tr>
<tr>
<td valign="top" align="center">40</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">0.85</td>
<td valign="top" align="center">0.9</td>
<td valign="top" align="center">3.8</td>
<td valign="top" align="center">7.0</td>
</tr>
<tr>
<td valign="top" align="center">50</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">0.9</td>
<td valign="top" align="center">1.1</td>
<td valign="top" align="center">4.5</td>
<td valign="top" align="center">8.5</td>
</tr>
<tr>
<td valign="top" align="center">60</td>
<td valign="top" align="center">5</td>
<td valign="top" align="center">0.92</td>
<td valign="top" align="center">1.3</td>
<td valign="top" align="center">5.0</td>
<td valign="top" align="center">9.8</td>
</tr>
<tr>
<td valign="top" align="center">70</td>
<td valign="top" align="center">5</td>
<td valign="top" align="center">0.94</td>
<td valign="top" align="center">1.5</td>
<td valign="top" align="center">5.7</td>
<td valign="top" align="center">11.3</td>
</tr>
<tr>
<td valign="top" align="center">80</td>
<td valign="top" align="center">6</td>
<td valign="top" align="center">0.96</td>
<td valign="top" align="center">1.7</td>
<td valign="top" align="center">6.5</td>
<td valign="top" align="center">13.0</td>
</tr>
<tr>
<td valign="top" align="center">90</td>
<td valign="top" align="center">6</td>
<td valign="top" align="center">0.98</td>
<td valign="top" align="center">1.9</td>
<td valign="top" align="center">7.2</td>
<td valign="top" align="center">14.5</td>
</tr>
<tr>
<td valign="top" align="center">100</td>
<td valign="top" align="center">7</td>
<td valign="top" align="center">0.99</td>
<td valign="top" align="center">2.1</td>
<td valign="top" align="center">8.0</td>
<td valign="top" align="center">16.0</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>Source: Compiled by the authors.</p></fn>
</table-wrap-foot>
</table-wrap>
<p>Based on the analysis of the interpreted Formula 8 for the average waiting time of critical (<italic>T</italic><sub><italic>w</italic></sub> <italic>_c</italic>) and non-critical requests (<italic>T</italic><sub><italic>w</italic></sub> <italic>_n</italic>) it was determined that with an increase in the number of nodes (<italic>N</italic>) and overall load (<italic>&#x3c1;</italic>), the system ensures a significant reduction in waiting time for critical requests (<italic>T</italic><sub><italic>w</italic></sub> <italic>_c</italic>) even under high network load. This indicates that critical requests are almost always serviced with minimal delay, aligning with the concept of absolute priority. Meanwhile, the average waiting time for non-critical requests (<italic>T</italic><sub><italic>w</italic></sub> <italic>_n</italic>) gradually increases with rising load, though this increase is not critical. For example, at a load of <italic>&#x3c1;</italic> = 0.9, the average waiting time for critical requests is only 1.1s, whereas for non-critical requests, it rises to 4.5s. However, even at the maximum load of <italic>&#x3c1;</italic> = 0.99, critical requests wait only 2.1s, which remains acceptable for high-priority requests. The failure probability, derived from Formula 12, increases with load but remains within permissible limits.</p>
<p>Thus, the obtained results confirm that absolute priority effectively reduces waiting time for critical requests without significantly degrading overall service quality for the remaining traffic. This validates the hypothesis and underscores the efficacy of this approach in optimising computer network performance.</p>
<p>Parameter sweeps were conducted over arrival rate (<italic>&#x03BB;</italic>), number of servers (H), and queue capacity (k). Results demonstrated monotonicity consistent with theoretical expectations: (i) increasing &#x03BB; at fixed H raises rejection probability and mean waiting time exponentially as &#x3c1; &#x2192; 1; (ii) increasing H shifts the saturation threshold rightward, delaying overload effects; and (iii) enlarging k decreases rejection probability but increases mean waiting time for low-priority classes. These observations align with benchmark behaviors reported in classical M/M/c/K models. 5 Across 10^6 arrivals, simulation statistics matched analytical results within &#x00B1;3% for mean waiting time and &#x00B1;2% for rejection probability across all tested configurations (<italic>&#x3c1;</italic> = 0.5&#x2013;0.99, <italic>H</italic> = 2&#x2013;10, <italic>k</italic> = 10&#x2013;100). This confirms that the analytical model is both computationally accurate and practically reproducible.</p>
<p>Based on the developed analytical network model, recommendations were formulated for selecting optimal network parameters depending on operational specifics and conditions. Several typical network usage scenarios were examined, and key parameters requiring optimisation were identified.</p>
<p>For large corporate networks with a high number of simultaneous connections, such as banking institutions, the following conditions apply: under a high volume of concurrent connections, the number of network nodes exceeds 500 units; there is a critical need to process certain requests (e.g., financial transactions); and stringent requirements for uninterrupted network operation are in place.<sup><xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref></sup> Under such conditions, it is necessary to implement a multi-channel network architecture (with no fewer than 10 servers) to ensure even load distribution and enforce absolute priority for transactions, guaranteeing that critical requests are processed without delay. Additionally, resource redundancy must be provisioned to handle peak loads.</p>
<p>For cloud service providers, the primary operational conditions involve dynamic system load, the need for rapid adaptation to traffic fluctuations, and processing a large volume of requests with varying priority levels.<sup><xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref></sup> For such networks, it is recommended to implement flexible scaling of service channels based on network load, employ adaptive priority management algorithms, and reserve channels for critical requests.</p>
<p>In telecommunications networks of mobile operators, the key conditions include a high number of mobile users with constant mobility, dynamic load variations depending on time of day, and the necessity to ensure high service quality for voice calls and streaming video. Under these conditions, a multi-tier priority system is advised &#x2013; maximum priority for voice calls and emergency services &#x2013; alongside dynamic adjustment of service channels according to peak loads and the implementation of adaptive traffic balancing algorithms.</p>
</sec>
<sec id="sec005" sec-type="discussion">
<title>Discussion</title>
<p>The complexity of modern computer networks, particularly multichannel systems with priority-based servicing, lies in the need to dynamically balance conflicting requirements: minimising latency for critical requests, efficient resource utilisation under heterogeneous traffic, and scalability amid increasing node counts. Classical queuing models often disregard load unevenness, leading to inefficient bandwidth allocation, excessive infrastructure costs, or degraded service quality during peak loads. A key challenge remains the development of adaptive solutions that integrate traffic prioritisation, load forecasting, and resource management into a unified mechanism capable of ensuring deterministic performance parameters for different request classes. The validation against limiting cases (Erlang-C, preemptive-resume priority) confirms the analytical correctness of the proposed model. This dual approach strengthens confidence in the results and ensures that the conclusions are not artifacts of approximation but reflect established queueing-theoretic behavior under priority servicing.</p>
<p>The conducted study confirms that the use of absolute priority significantly minimises waiting times for critical requests without substantially degrading quality metrics for other requests. This is particularly crucial for networks servicing mission-critical applications, such as financial transactions, medical systems, or real-time telecommunications networks. The importance of this finding extends to cloud services, where ensuring the swift processing of high-priority data packets is vital for maintaining high service availability. Similarly, in 5G networks, where latency is critical for maintaining real-time connections, the prioritisation of critical traffic is fundamental to user experience, particularly in scenarios such as autonomous driving or remote surgery. In IoT systems, where numerous devices continuously communicate with each other, absolute priority ensures that crucial control signals are processed promptly, preventing network congestion or delays in mission-critical tasks. To improve system performance, optimal resource allocation must be configured. The number of channels should be sufficient to handle the average number of incoming requests.<sup><xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref13">13</xref></sup> Optimising system parameters, such as the number of channels and queue capacities, enables the required performance level to be maintained even under substantial network load increases.</p>
<p>For a system with 70 nodes and 5 servers (<italic>N</italic> = 70, <italic>H</italic> = 5) under a load of <italic>&#x3c1;</italic> = 0.94, calculations yielded an average waiting time of 5.7s for standard requests and 1.5s for critical ones, with a rejection probability of 11.3%. These metrics correlate with the findings of Elliriki et al.,<sup><xref ref-type="bibr" rid="ref9">9</xref></sup> where a rejection probability of 1&#x2013;3% was observed under similar loads. The 8&#x2013;10% discrepancy is attributed to their model incorporating server failure recovery mechanisms, whereas our system lacks such features. Compared to the results of Huseynov et al.,<sup><xref ref-type="bibr" rid="ref10">10</xref></sup> the waiting time for critical requests (1.5s) obtained in this study was 25% lower than the authors&#x2019; reported values (2.0s) under comparable conditions. This advantage is achieved through an optimised request distribution algorithm.</p>
<p>The current study establishes the dependence of the average number of requests in the system on the load. It was determined that under a load of <italic>&#x3c1;</italic> = 0.8 with <italic>H</italic> = 2 servers, the average number of requests in the network is <italic>r</italic> = 4, whereas with <italic>H</italic> = 5, it increases to <italic>r</italic> = 6. A similar effect was observed by Melikov and Shahmaliyev<sup><xref ref-type="bibr" rid="ref11">11</xref></sup> when increasing the number of service channels, though their model also accounts for losses due to inventory spoilage. The average number of requests (<italic>r</italic> = 4 at <italic>H</italic> = 2) aligns with the findings of Li et al.,<sup><xref ref-type="bibr" rid="ref38">38</xref></sup> where <italic>r</italic> = 3.8 was obtained for an equivalent load (<italic>&#x3c1;</italic> = 0.8), albeit under a different optimality criterion.</p>
<p>Experimental data confirm that as the number of servers increases, the ratio of waiting time to average service time per request decreases. Calculations show that under a load of &#x3c1; = 0.8 with <italic>H</italic> = 1, the ratio is <inline-formula id="IM12"><mml:math id="IIM12"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> =2, with <italic>H</italic> = 2 <inline-formula id="IM13"><mml:math id="IIM13"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> =1.2, and with <italic>H</italic> = 5 <inline-formula id="IM14"><mml:math id="IIM14"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> =0.5. These results are consistent with those obtained by Mazhar et al.,<sup><xref ref-type="bibr" rid="ref39">39</xref></sup> though the difference lies in the researchers&#x2019; implementation of additional load balancing, which reduces average waiting time. A similar nonlinear increase in waiting time as <italic>&#x3c1;</italic> &#x2192; 1 was identified by Zhao et al.;<sup><xref ref-type="bibr" rid="ref40">40</xref></sup> however, the developed model with <italic>H</italic> = 5 demonstrates a 60% higher performance <inline-formula id="IM15"><mml:math id="IIM15"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> =2 at <italic>&#x3c1;</italic> =0.9 versus <inline-formula id="IM16"><mml:math id="IIM16"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> =1.33 in the baseline model), attributable to the authors&#x2019; specialised adaptive control algorithms.</p>
<p>Consistent with the work of Mas et al.,<sup><xref ref-type="bibr" rid="ref41">41</xref></sup> this study confirms that increasing the number of servers (<italic>H</italic>) leads to a more gradual rise in load (<italic>&#x3c1;</italic>). However, the obtained results demonstrate a more pronounced effect: at <italic>H</italic> = 5, the load only increases to 0.7, whereas in the researchers&#x2019; fog architecture, a similar effect required <italic>H</italic> = 6 due to additional inter-node delays.</p>
<p>In addition to the theoretical insights provided by this study, its practical significance is underscored in the context of critical systems like cloud services, 5G, and IoT. The ability to prioritise critical requests without unduly degrading the overall system performance is essential in ensuring uninterrupted service delivery for high-demand applications. By adjusting key parameters like the number of servers and channels in real-time, adaptive mechanisms can be implemented to optimise network resources and meet the stringent demands of these systems, making the approach valuable for future network infrastructure development.</p>
<p>Analysis of the impact of node count on key network performance metrics revealed a rejection probability however, the developed model with <italic>H</italic> = 5 demonstrates a 60% higher performance <inline-formula id="IM17"><mml:math id="IIM17"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> =2 at <italic>&#x3c1;</italic> =0.9 versus <inline-formula id="IM18"><mml:math id="IIM18"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> =1.33 in the baseline model), indicating a sharp increase in failure likelihood when exceeding the optimal <italic>H/N</italic> ratio. These findings correlate with the results of Geeta and Prakash,<sup><xref ref-type="bibr" rid="ref42">42</xref></sup> though the authors&#x2019; dynamic load balancing implementation reduces this metric to 35%.</p>
<p>The derived dependence of the average number of requests on system load aligns with the findings of Krishnamoorthy et al.<sup><xref ref-type="bibr" rid="ref43">43</xref></sup>: at <italic>&#x3c1;</italic> = 0.8 with <italic>H</italic> = 5, the average request count is <italic>r</italic> = 6, whereas in their &#x201C;<italic>k-out-of-n</italic>&#x201D; model &#x2013; where a system with 5 servers (<italic>n</italic> = 5) requires only 3 operational (<italic>k</italic> = 3) to service requests &#x2013; the average request count under the same load is <italic>r</italic> = 5.2. The 15% discrepancy stems from the absence of redundancy in the current study&#x2019;s model.</p>
<p>This study calculates that for a system with 20 nodes and 2 servers (<italic>N</italic> = 20, <italic>H</italic> = 2) under <italic>&#x3c1;</italic> = 0.8, the rejection probability is 20%, consistent with the general trend identified by Saad et al.<sup><xref ref-type="bibr" rid="ref44">44</xref></sup> in 5G networks. However, the obtained rejection probabilities are 10&#x2013;15% higher than under analogous conditions in the authors&#x2019; study, attributable to differing optimisation methodologies.</p>
<p>Investigated parameters for a system with 40 nodes and 4 servers (<italic>N</italic> = 40, <italic>H</italic> = 4) under a load of <italic>&#x3c1;</italic> = 0.85 record an average waiting time of 3.8s for regular requests and 0.9s for critical ones, with a failure probability of 7.0%. These results correlate with the findings of Liu,<sup><xref ref-type="bibr" rid="ref45">45</xref></sup> where, under a similar load in a genetically optimised distribution network, an average waiting time of 2.9s (24% better than the obtained metric for regular requests) was achieved, confirming the effectiveness of the researchers&#x2019; proposed network topology optimisation method. In comparison with the work of Li et al.,<sup><xref ref-type="bibr" rid="ref46">46</xref></sup> which focuses on wireless body area networks (BAN), the obtained failure probability metrics (7.0% versus 5.2% reported by the authors under similar conditions) are slightly higher, which is explained by the fundamental difference in network architecture.</p>
<p>The examined metrics for a system with 60 nodes and 5 servers (<italic>N</italic> = 60, <italic>H</italic> = 5) under a load of <italic>&#x3c1;</italic> = 0.92 demonstrate an average waiting time of 5.0s for regular requests and 1.3s for critical ones, with a failure probability of 9.8%. These results reflect similar patterns to the study by Do-Du et al.<sup><xref ref-type="bibr" rid="ref47">47</xref></sup> in the field of unmanned aerial vehicle (UAV) networks, where, under a comparable load, an average delay of 3.8s (32% better than our metric for regular requests) was obtained, which is attributed to the researchers&#x2019; approach to dynamic node deployment. Compared to the work of Islam et al.,<sup><xref ref-type="bibr" rid="ref48">48</xref></sup> the developed model with limited queueing and priority servicing provides an advantage in processing critical requests for a system with corresponding characteristics (1.3s versus 2.4s in the authors&#x2019; examined network). Implementing such an approach is optimal for applications where timely servicing of priority requests is critically important.</p>
<p>The obtained empirical results of the study demonstrate a clear dependence between failure probability (<italic>P</italic><sub><italic>rejection</italic></sub>), and load level (<italic>&#x3c1;</italic>): at =0.8 and <italic>H</italic> = 2 we observe =20%, which decreases to 8% when the number of servers increases to <italic>H</italic> = 5, and sharply rises to 40% under an extreme load of <italic>&#x3c1;</italic> = 0.95. These results align with the conclusions of A.V. Bhaskar and Venkatesh<sup><xref ref-type="bibr" rid="ref49">49</xref></sup> regarding the general trend of exponential growth in <italic>P</italic><sub><italic>rejection</italic></sub> at <italic>&#x3c1;</italic>&#x003E;0.8, yet reveal significant differences in absolute values: the NoC architecture examined by the authors demonstrates 15&#x2013;28% better reliability metrics (<italic>P</italic><sub><italic>rejection</italic></sub>=5% at <italic>&#x3c1;</italic> = 0.8 versus obtained <italic>P</italic><sub><italic>rejection</italic></sub> =8% at <italic>H</italic> = 5, and <italic>P</italic><sub><italic>rejection</italic></sub> =12% at <italic>&#x3c1;</italic> = 0.95 versus obtained =40%). Such a discrepancy is due to the fundamental difference in network architectures.</p>
<p>In the analysis of the relationship between the Poisson coefficient (<italic>K</italic>) and the Erlang function (<italic>C</italic>) as a function of load (<italic>&#x3c1;</italic>), it was determined that with <italic>H</italic> = 2 servers, coefficient <italic>K</italic> maintains high values (0.85&#x2013;1.0), while the Erlang function (<italic>C</italic>) exhibits sensitivity to load, increasing from 0.1 to 0.7 as &#x3c1; rises from 0.1 to 0.9. These results partially agree with the findings of Jassar&#x2019;s<sup><xref ref-type="bibr" rid="ref50">50</xref></sup> study on software-defined networking (SDN), where similarly high K values (0.82&#x2013;0.98) are observed.</p>
<p>However, the obtained <italic>C</italic> values are 75% higher (0.7 versus 0.4 in the researcher&#x2019;s work at <italic>&#x3c1;</italic> = 0.9), which is explained by the fundamental architectural difference: in SDN networks, dynamic balancing via a centralised controller significantly reduces queueing probability, whereas in the developed model, adaptation mechanisms for dynamic load are implemented within dedicated computational resources, leading to a more pronounced response to peak loads compared to SDN architecture.</p>
<p>A systematic review by Keshari et al.<sup><xref ref-type="bibr" rid="ref51">51</xref></sup> confirms this trend, demonstrating that SDNs ensure significantly more stable performance: the standard deviation of response time (<inline-formula id="IM19"><mml:math id="IIM19"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>r</mml:mi></mml:msub><mml:mo>&#x00A0;</mml:mo></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula>) in an SDN network is only 0.8&#x2013;1.2 even under high load, whereas in the analysed network, the ratio of standard deviation to average service time <inline-formula id="IM20"><mml:math id="IIM20"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>r</mml:mi></mml:msub><mml:mo>&#x00A0;</mml:mo></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> =2.6 at a load of <italic>&#x3c1;</italic> = 0.8 with <italic>H</italic> = 2, servers, which is 125&#x2013;225% higher than the metrics reported by the researchers.</p>
<p>For a system with 30 nodes and 3 servers (<italic>N</italic> = 30, <italic>H</italic> = 3) under a load of <italic>&#x3c1;</italic> = 0.8, calculations yielded an average waiting time of 3.0s for regular requests and a failure probability of 5.6%. In their work, Afzal and Kavitha<sup><xref ref-type="bibr" rid="ref52">52</xref></sup> obtained a similar dependence between load and waiting time: 2.5s at <italic>&#x3c1;</italic> = 0.8. The authors&#x2019; proposed hybrid approach demonstrates 18% better performance, which is attributed to the use of parallel queues with dynamic resource reallocation.</p>
<p>A similar trend is observed in the study by Mazloomi et al.,<sup><xref ref-type="bibr" rid="ref53">53</xref></sup> where even higher metrics were obtained for wireless sensor networks with analogous parameters: a waiting time of 2.2s (26% better than the obtained results) and a failure probability of 4.1% (27% lower). The authors achieved this through efficient distribution of energy resources among network nodes.</p>
<p>In the analysis of the change in waiting time within the system under increasing load for a system with 4 servers (<italic>H</italic> = 4) at a load of <italic>&#x3c1;</italic> = 0.6 the ratio of the standard deviation to the mean service time <inline-formula id="IM21"><mml:math id="IIM21"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>r</mml:mi></mml:msub><mml:mo>&#x00A0;</mml:mo></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> =0.6 was obtained. Under analogous conditions Liu et al.<sup><xref ref-type="bibr" rid="ref54">54</xref></sup> obtained a value of <inline-formula id="IM22"><mml:math id="IIM22"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>r</mml:mi></mml:msub><mml:mo>&#x00A0;</mml:mo></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> =0.4, which is 33% lower than the results obtained in this study. This discrepancy is explained by the authors&#x2019; use of a multi-tiered explicit congestion notification (ECN) marking strategy in programmable networks, which enables dynamic traffic management through mechanisms such as early congestion detection, adaptive rate adjustment, and optimised request distribution across all available channels.</p>
<p>For a system with 100 nodes and 10 servers (<italic>N</italic> = 100, <italic>H</italic> = 10) under a load of <italic>&#x3c1;</italic> = 0.99 the measured values indicate an average waiting time of 8.0s for standard requests, with a rejection probability of 16%. Under these experimental conditions, the multi-domain network architecture proposed by Miranda et al.<sup><xref ref-type="bibr" rid="ref55">55</xref></sup> achieves a 25% lower rejection probability (<italic>P</italic><sub><italic>rejection</italic></sub> =10.4%) due to the integration of Wi-Fi and wired networks.</p>
<p>Under similar conditions, the machine learning-based approach by Pundir and Sandhu<sup><xref ref-type="bibr" rid="ref56">56</xref></sup> demonstrates a rejection probability of 12&#x2013;15% and an average response time of 2.8s. This suggests that the authors&#x2019; model improves availability through adaptive control; however, the method employed in the current study achieves a 25% lower response time (2.1s) due to absolute priority scheduling without additional computational overhead.</p>
<p>In summary, the analysis of the study&#x2019;s results and their comparison with findings from other researchers in the field underscores the importance of a comprehensive approach to evaluating communication network performance. Individual factors alone are insufficient to fully understand the complex dynamics of networks. It should be noted that while hardware capabilities remain a critical factor, the key outcome of this work is the demonstrated flexibility of software-configurable parameters (e.g., prioritisation rules, queue limits) in compensating for the system&#x2019;s physical limitations.</p>
<p>The analysis confirmed the effectiveness of priority scheduling in minimising the waiting time of critical requests in multi-channel, multi-node computer networks. Additionally, the importance of a holistic approach to network performance analysis is emphasised. The results share commonalities with other studies in queueing theory and network optimisation, which also highlight the significance of proper resource balancing, priority management, and network adaptation to variable conditions. Many studies focus on improving traffic distribution algorithms, which could be leveraged to further refine our model. Promising approaches also include dynamic priority adjustment and the application of machine learning methods to predict optimal network parameters.</p>
</sec>
<sec id="sec006">
<title>Conclusions</title>
<p>The study analysed the parameters of multi-channel, multi-node computer networks with priority scheduling to optimise their operation. It was determined that the use of absolute priority significantly reduces the average waiting time for critical requests (<italic>T</italic><sub><italic>w</italic></sub> <italic>_c</italic> =0.9 at <italic>&#x3c1;</italic> = 0.85 with <italic>N</italic> = 40, <italic>H</italic> = 4), without substantially degrading the service of other requests (<italic>T</italic><sub><italic>w</italic></sub> <italic>_n</italic> =3.8 under the same conditions). For comparison, the following metrics were obtained in a system with <italic>N</italic> = 90 and <italic>H</italic> = 6: <italic>T</italic><sub><italic>w</italic></sub> <italic>_c</italic> =1.9, <italic>T</italic><sub><italic>w</italic></sub> <italic>_n</italic> =7.2. The optimal number of communication channels and queue slots can be determined based on functional dependencies that account for network load and quality-of-service requirements.</p>
<p>The study revealed a clear correlation between the number of nodes and system performance. For networks with 10&#x2013;30 nodes, the rejection probability does not exceed 5%, and the average waiting time ranges from 0.8 to 2.5s. However, with 40 or more nodes, performance degrades sharply, as waiting times increase to 4.0&#x2013;6.5s and rejection probability rises to 30&#x2013;60%.</p>
<p>The results confirm that implementing priority scheduling significantly improves the performance of computer networks: critical requests are processed in 1.1&#x2013;2.1s (at <italic>&#x3c1;</italic> = 0.9&#x2013;0.99), standard requests in 4.5s, and the rejection probability does not exceed 16%. This ensures stable network operation even under extreme loads.</p>
<p>The analysis of dependency graphs for key performance indicators against load (<italic>&#x3c1;</italic>) revealed important patterns. Increasing the number of servers (<italic>H</italic>) from 2 to 5 leads to: higher throughput (<italic>r</italic> increases from 4 to 6 requests at <italic>&#x3c1;</italic> = 0.8), reduced service time variability (<inline-formula id="IM23"><mml:math id="IIM23"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>r</mml:mi></mml:msub><mml:mo>&#x00A0;</mml:mo></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> drops from 2.6 t&#x43e; 1.3) and shorter waiting times (<inline-formula id="IM24"><mml:math id="IIM24"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>s</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula> drops from 2.5 to 1 at <italic>&#x3c1;</italic> =0.8). However, under high loads (<italic>&#x3c1;</italic> &#x003E; 0.8) an exponential increase in waiting time is observed (up to 5 at <italic>H</italic> = 1), underscoring the critical importance of selecting an optimal number of servers. The obtained dependencies demonstrate that an optimal H (e.g., 5 servers) simultaneously ensures: low latency (&#x2264;1s), minimised rejection probability (&#x003C;10%), and stable performance even under peak loads. The findings expand the theoretical foundation for modelling priority queues in multi-node systems, demonstrating direct correlations between the number of channels, resource allocation algorithms, and quality-of-service metrics.</p>
<p>Among the study&#x2019;s limitations, it should be noted that the results are based on analytical models that do not account for dynamic traffic fluctuations in real-world conditions. Additionally, the study did not examine energy efficiency in detail, which is a critical aspect in modern networks. Promising directions for further research include expanding the model by incorporating variable request priorities and developing methods for adaptive real-time network management. Additionally, the application of machine learning techniques for load forecasting and network resource allocation optimisation presents a viable avenue. Further development of the model may involve experimental validation of the obtained analytical results on real or simulated networks, which would enhance the accuracy and practical applicability of the proposed solutions.</p>
</sec>
</body>
<back>
<fn-group>
<fn id="n1" fn-type="other">
<p>Additional material is published online only. To view please visit the journal online.</p>
<p><bold>Cite this as:</bold> Huseynov Z, Zeynalov Z, Mammadova B, Guliyev A and Gadimli G. Investigation of the Analytical Model of a Queue to Several Servers of Computer Networks with Priority Maintenance. Premier Journal of Science 2025;14:100117</p>
<p><bold>DOI:</bold> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.70389/PJS.100117">https://doi.org/10.70389/PJS.100117</ext-link></p>
</fn>
<fn id="n2" fn-type="other">
<p><bold>Ethical approval</bold></p>
<p>N/a</p>
</fn>
<fn id="n3" fn-type="other">
<p><bold>Consent</bold></p>
<p>N/a</p>
</fn>
<fn id="n4" fn-type="other">
<p><bold>Funding</bold></p>
<p>No industry funding</p>
</fn>
<fn id="n5" fn-type="conflict">
<p><bold>Conflicts of interest</bold></p>
<p>N/a</p>
</fn>
<fn id="n6" fn-type="other">
<p><bold>Author contribution</bold></p>
<p>Zakir Huseynov &#x2013; conceptualization, methodology, supervision, writing &#x2013; original draft preparation. Zaman Zeynalov &#x2013; software, validation, data curation, visualization. Bahariyya Mammadova &#x2013; investigation, formal analysis, resources, writing &#x2013; reviewing and editing. Anar Guliyev &#x2013; methodology, project administration, validation, writing &#x2013; reviewing and editing. Gultekin Gadimli &#x2013; data curation, software, visualization, writing &#x2013; reviewing and editing. All authors read and approved the final manuscript</p>
</fn>
<fn id="n7" fn-type="other">
<p><bold>Guarantor</bold></p>
<p>Zakir Huseynov</p>
</fn>
<fn id="n8" fn-type="other">
<p><bold>Provenance and peer-review</bold></p>
<p>Unsolicited and externally peer-reviewed</p>
</fn>
<fn id="n9" fn-type="other">
<p><bold>Data availability statement</bold></p>
<p>The data that support the findings of this study are available on request from the corresponding author</p>
</fn>
</fn-group>
<ref-list>
<title>References</title>
<ref id="ref1"><label>1</label><mixed-citation publication-type="journal"><string-name><surname>Omidvar</surname> <given-names>N</given-names></string-name>, <string-name><surname>Ahmadi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Hosseini</surname> <given-names>SM</given-names></string-name>. <article-title>Optimal service placement, request routing and CPU sizing in cooperative mobile edge computing networks for delay-sensitive applications</article-title>. <source>arXiv</source>. <year>2024</year>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.48550/arXiv.2405.10648">https://doi.org/10.48550/arXiv.2405.10648</ext-link></mixed-citation></ref>
<ref id="ref2"><label>2</label><mixed-citation publication-type="journal"><string-name><surname>Wei</surname> <given-names>R</given-names></string-name>, <string-name><surname>Han</surname> <given-names>R</given-names></string-name>. <article-title>An ICN-based delay-sensitive service scheduling architecture with stateful programmable data plane for computing network</article-title>. <source>Appl Sci</source>. <year>2024</year>;<volume>14</volume>(<issue>22</issue>):<fpage>10207</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/app142210207">https://doi.org/10.3390/app142210207</ext-link></mixed-citation></ref>
<ref id="ref3"><label>3</label><mixed-citation publication-type="journal"><string-name><surname>Zheng</surname> <given-names>H</given-names></string-name>, <string-name><surname>Jin</surname> <given-names>S</given-names></string-name>. <article-title>A multi-source fluid queue based stochastic model of the probabilistic offloading strategy in a MEC system with multiple mobile devices and a single MEC server</article-title>. <source>Int J Appl Math Comput Sci</source>. <year>2022</year>;<volume>32</volume>(<issue>1</issue>):<fpage>125</fpage>&#x2013;<lpage>138</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.34768/amcs-2022-0010">https://doi.org/10.34768/amcs-2022-0010</ext-link></mixed-citation></ref>
<ref id="ref4"><label>4</label><mixed-citation publication-type="journal"><string-name><surname>Liu</surname> <given-names>TH</given-names></string-name>, <string-name><surname>Hsu</surname> <given-names>HY</given-names></string-name>, <string-name><surname>Ke</surname> <given-names>JC</given-names></string-name>, <string-name><surname>Chang</surname> <given-names>FM</given-names></string-name>. <article-title>Preemptive priority Markovian queue subject to server breakdown with imperfect coverage and working vacation interruption</article-title>. <source>Computation</source>. <year>2023</year>;<volume>11</volume>(<issue>5</issue>):<fpage>89</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/computation11050089">https://doi.org/10.3390/computation11050089</ext-link></mixed-citation></ref>
<ref id="ref5"><label>5</label><mixed-citation publication-type="journal"><string-name><surname>N&#x00FA;&#x00F1;ez-Queija</surname> <given-names>R</given-names></string-name>, <string-name><surname>Prabhu</surname> <given-names>BJ</given-names></string-name>, <string-name><surname>Resing</surname> <given-names>JAC</given-names></string-name>. <article-title>Markovian queues with Poisson control</article-title>. <source>Indag Math</source>. <year>2023</year>;<volume>34</volume>(<issue>5</issue>):<fpage>990</fpage>&#x2013;<lpage>1013</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.indag.2023.03.002">https://doi.org/10.1016/j.indag.2023.03.002</ext-link></mixed-citation></ref>
<ref id="ref6"><label>6</label><mixed-citation publication-type="journal"><string-name><surname>Melikov</surname> <given-names>A</given-names></string-name>, <string-name><surname>Aliyeva</surname> <given-names>S</given-names></string-name>, <string-name><surname>Sztrik</surname> <given-names>J</given-names></string-name>. <article-title>Analysis of queueing system MMPP/M/K/K with delayed feedback</article-title>. <source>Mathematics</source>. <year>2019</year>;<volume>7</volume>(<issue>11</issue>):<fpage>1128</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/math7111128">https://doi.org/10.3390/math7111128</ext-link></mixed-citation></ref>
<ref id="ref7"><label>7</label><mixed-citation publication-type="journal"><string-name><surname>Mandal</surname> <given-names>SK</given-names></string-name>, <string-name><surname>Ayoub</surname> <given-names>R</given-names></string-name>, <string-name><surname>Kishinevsky</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ogras</surname> <given-names>UY</given-names></string-name>. <article-title>Analytical performance models for NoCs with multiple priority traffic classes</article-title>. <source>ACM Trans Embed Comput Syst</source>. <year>2019</year>;<volume>18</volume>(<issue>5s</issue>):<fpage>1</fpage>&#x2013;<lpage>21</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1145/3358176">https://doi.org/10.1145/3358176</ext-link></mixed-citation></ref>
<ref id="ref8"><label>8</label><mixed-citation publication-type="journal"><string-name><surname>Hanczewski</surname> <given-names>S</given-names></string-name>, <string-name><surname>Stasiak</surname> <given-names>M</given-names></string-name>, <string-name><surname>Weissenberg</surname> <given-names>J</given-names></string-name>. <article-title>An analytical model of a system with compression and queuing for selected traffic flows</article-title>. <source>Electronics</source>. <year>2023</year>;<volume>12</volume>(<issue>17</issue>):<fpage>3601</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/electronics12173601">https://doi.org/10.3390/electronics12173601</ext-link></mixed-citation></ref>
<ref id="ref9"><label>9</label><mixed-citation publication-type="journal"><string-name><surname>Elliriki</surname> <given-names>M</given-names></string-name>, <string-name><surname>Reddy</surname> <given-names>CS</given-names></string-name>, <string-name><surname>Anand</surname> <given-names>K</given-names></string-name>, <string-name><surname>Saritha</surname> <given-names>S</given-names></string-name>. <article-title>Multi server queuing system with crashes and alternative repair strategies</article-title>. <source>Commun Stat Theory Methods</source>. <year>2022</year>;<volume>51</volume>(<issue>23</issue>):<fpage>8173</fpage>&#x2013;<lpage>8185</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/03610926.2021.1889603">https://doi.org/10.1080/03610926.2021.1889603</ext-link></mixed-citation></ref>
<ref id="ref10"><label>10</label><mixed-citation publication-type="journal"><string-name><surname>Huseynov</surname> <given-names>ZN</given-names></string-name>, <string-name><surname>Mammadov</surname> <given-names>MI</given-names></string-name>, <string-name><surname>Ismayilov</surname> <given-names>TA</given-names></string-name>. <article-title>Modeling and analysis of the characteristics of multichannel and multi-node computer networks with priority service</article-title>. <source>IT Autom Meas Econ Environ Prot</source>. <year>2023</year>;<volume>13</volume>(<issue>2</issue>):<fpage>74</fpage>&#x2013;<lpage>77</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.35784/iapgos.3394">https://doi.org/10.35784/iapgos.3394</ext-link></mixed-citation></ref>
<ref id="ref11"><label>11</label><mixed-citation publication-type="journal"><string-name><surname>Melikov</surname> <given-names>AZ</given-names></string-name>, <string-name><surname>Shahmaliyev</surname> <given-names>MO</given-names></string-name>. <article-title>Queueing system M/M/1/&#x221e; with perishable inventory and repeated customers</article-title>. <source>Autom Remote Control</source>. <year>2019</year>;<volume>80</volume>(<issue>1</issue>):<fpage>53</fpage>&#x2013;<lpage>65</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1134/S0005117919010053">https://doi.org/10.1134/S0005117919010053</ext-link></mixed-citation></ref>
<ref id="ref12"><label>12</label><mixed-citation publication-type="journal"><string-name><surname>Harchol-Balter</surname> <given-names>M</given-names></string-name>. <article-title>Performance modeling and design of computer systems: Queueing theory in action</article-title>. <publisher-loc>Cambridge</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>; <year>2013</year>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1017/CBO9781139226424">https://doi.org/10.1017/CBO9781139226424</ext-link></mixed-citation></ref>
<ref id="ref13"><label>13</label><mixed-citation publication-type="journal"><string-name><surname>Shortle</surname> <given-names>JF</given-names></string-name>, <string-name><surname>Thompson</surname> <given-names>JM</given-names></string-name>, <string-name><surname>Gross</surname> <given-names>D</given-names></string-name>, <string-name><surname>Harris</surname> <given-names>CM</given-names></string-name>. <article-title>Fundamentals of queueing theory</article-title>. <publisher-loc>New Jersey</publisher-loc>: <publisher-name>John Wiley &#x0026; Sons</publisher-name>; <year>2018</year>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1002/9781119453765">https://doi.org/10.1002/9781119453765</ext-link></mixed-citation></ref>
<ref id="ref14"><label>14</label><mixed-citation publication-type="journal"><string-name><surname>Babak</surname> <given-names>VP</given-names></string-name>, <string-name><surname>Scherbak</surname> <given-names>LM</given-names></string-name>, <string-name><surname>Kuts</surname> <given-names>YV</given-names></string-name>, <string-name><surname>Zaporozhets</surname> <given-names>AO</given-names></string-name>. <article-title>Information and measurement technologies for solving problems of energy informatics</article-title>. <source>CEUR Workshop Proc</source>. <year>2021</year>;<volume>3039</volume>:<fpage>24</fpage>&#x2013;<lpage>31</lpage>.</mixed-citation></ref>
<ref id="ref15"><label>15</label><mixed-citation publication-type="journal"><string-name><surname>Biliuk</surname> <given-names>I</given-names></string-name>, <string-name><surname>Shareyko</surname> <given-names>D</given-names></string-name>, <string-name><surname>Tubaltsev</surname> <given-names>A</given-names></string-name>, <string-name><surname>Havrylov</surname> <given-names>S</given-names></string-name>, <string-name><surname>Savchenko</surname> <given-names>O</given-names></string-name>, <string-name><surname>Fomenko</surname> <given-names>A</given-names></string-name>. <article-title>Expansion of measurement grid in field problems</article-title>. <source>In: Proc IEEE 20th Int Conf Mod Elect Energ Syst MEES 2021</source>; <publisher-loc>Kremenchuk</publisher-loc>: <publisher-loc>IEEE</publisher-loc>; <year>2021</year>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/MEES52427.2021.9598576">https://doi.org/10.1109/MEES52427.2021.9598576</ext-link></mixed-citation></ref>
<ref id="ref16"><label>16</label><mixed-citation publication-type="journal"><string-name><surname>Kerimkulov</surname> <given-names>S</given-names></string-name>, <string-name><surname>Teleuova</surname> <given-names>S</given-names></string-name>, <string-name><surname>Tazhbenova</surname> <given-names>G</given-names></string-name>. <article-title>Measuring chaotic and cyclic fluctuations of cass freight index: Expenditures</article-title>. <source>Act Prob Econ</source>. <year>2015</year>;<volume>171</volume>(<issue>9</issue>):<fpage>434</fpage>&#x2013;<lpage>445</lpage>.</mixed-citation></ref>
<ref id="ref17"><label>17</label><mixed-citation publication-type="journal"><string-name><surname>Bezshyyko</surname> <given-names>O</given-names></string-name>, <string-name><surname>Bezshyyko</surname> <given-names>K</given-names></string-name>, <string-name><surname>Kadenko</surname> <given-names>I</given-names></string-name>, <string-name><surname>Yermolenko</surname> <given-names>R</given-names></string-name>, <string-name><surname>Dolinskii</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ziemann</surname> <given-names>V</given-names></string-name>. <article-title>Monte Carlo simulation model of internal pellet targets</article-title>. <source>In: Proc EPAC 2006 - Contrib Proc</source>; <year>2006</year>. p. <fpage>2239</fpage>&#x2013;<lpage>2241</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/EPAC.2006.4422159">https://doi.org/10.1109/EPAC.2006.4422159</ext-link></mixed-citation></ref>
<ref id="ref18"><label>18</label><mixed-citation publication-type="journal"><string-name><surname>Kadenko</surname> <given-names>IM</given-names></string-name>, <string-name><surname>Sakhno</surname> <given-names>NV</given-names></string-name>, <string-name><surname>Bir&#x00F3;</surname> <given-names>B</given-names></string-name>, <string-name><surname>Fenyvesi</surname> <given-names>A</given-names></string-name>, <string-name><surname>Iermolenko</surname> <given-names>RV</given-names></string-name>, <string-name><surname>Gogota</surname> <given-names>OP</given-names></string-name>. <article-title>A bound dineutron: Indirect and possible direct observations</article-title>. <source>Acta Phys Pol B Proc Suppl</source>. <year>2024</year>;<volume>17</volume>(<issue>1</issue>):<fpage>1A31</fpage>&#x2013;<lpage>1A39</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5506/APhysPolBSupp.17.1-A3">https://doi.org/10.5506/APhysPolBSupp.17.1-A3</ext-link></mixed-citation></ref>
<ref id="ref19"><label>19</label><mixed-citation publication-type="journal"><string-name><surname>Orazbayev</surname> <given-names>B</given-names></string-name>, <string-name><surname>Zhumadillayeva</surname> <given-names>A</given-names></string-name>, <string-name><surname>Kabibullin</surname> <given-names>M</given-names></string-name>, <string-name><surname>Crabbe</surname> <given-names>MJ</given-names></string-name>, <string-name><surname>Orazbayeva</surname> <given-names>K</given-names></string-name>, <string-name><surname>Yue</surname> <given-names>X</given-names></string-name>. <article-title>A systematic approach to the model development of reactors and reforming furnaces with fuzziness and optimization of operating modes</article-title>. <source>IEEE Access</source>. <year>2023</year>;<volume>11</volume>:<fpage>74980</fpage>&#x2013;<lpage>74996</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ACCESS.2023.3294701">https://doi.org/10.1109/ACCESS.2023.3294701</ext-link></mixed-citation></ref>
<ref id="ref20"><label>20</label><mixed-citation publication-type="journal"><string-name><surname>Ashirbaev</surname> <given-names>B</given-names></string-name>, <string-name><surname>Altymyshova</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Alymbaeva</surname> <given-names>Z</given-names></string-name>. <article-title>Optimal energy-saving control for a thermal plant of a linear singularly perturbed discrete system with a small step</article-title>. <source>In: Proc Int Conf Electr Comput Energ Technol ICECET 2023; Cape Town: IEEE</source>; <year>2023</year>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICECET58911.2023.10389496">https://doi.org/10.1109/ICECET58911.2023.10389496</ext-link></mixed-citation></ref>
<ref id="ref21"><label>21</label><mixed-citation publication-type="journal"><string-name><surname>Havrylenko</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Kholodniak</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Halko</surname> <given-names>S</given-names></string-name>, <string-name><surname>Vershkov</surname> <given-names>O</given-names></string-name>, <string-name><surname>Bondarenko</surname> <given-names>L</given-names></string-name>, <string-name><surname>Suprun</surname> <given-names>O</given-names></string-name>, <string-name><surname>Miroshnyk</surname> <given-names>O</given-names></string-name>, <string-name><surname>Shchur</surname> <given-names>T</given-names></string-name>, <string-name><surname>&#x15a;rutek</surname> <given-names>M</given-names></string-name>, <string-name><surname>Gackowska</surname> <given-names>M</given-names></string-name>. <article-title>Interpolation with specified error of a point series belonging to a monotone curve</article-title>. <source>Entropy</source>. <year>2021</year>;<volume>23</volume>(<issue>5</issue>):<fpage>493</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/e23050493">https://doi.org/10.3390/e23050493</ext-link></mixed-citation></ref>
<ref id="ref22"><label>22</label><mixed-citation publication-type="journal"><string-name><surname>Havrylenko</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Kholodniak</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Halko</surname> <given-names>S</given-names></string-name>, <string-name><surname>Vershkov</surname> <given-names>O</given-names></string-name>, <string-name><surname>Miroshnyk</surname> <given-names>O</given-names></string-name>, <string-name><surname>Suprun</surname> <given-names>O</given-names></string-name>, <string-name><surname>Dereza</surname> <given-names>O</given-names></string-name>, <string-name><surname>Shchur</surname> <given-names>T</given-names></string-name>, <string-name><surname>&#x15a;rutek</surname> <given-names>M</given-names></string-name>. <article-title>Representation of a monotone curve by a contour with regular change in curvature</article-title>. <source>Entropy</source>. <year>2021</year>;<volume>23</volume>(<issue>7</issue>):<fpage>923</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/e23070923">https://doi.org/10.3390/e23070923</ext-link></mixed-citation></ref>
<ref id="ref23"><label>23</label><mixed-citation publication-type="journal"><string-name><surname>Tultayev</surname> <given-names>B</given-names></string-name>, <string-name><surname>Balbayev</surname> <given-names>G</given-names></string-name>, <string-name><surname>Zhauyt</surname> <given-names>A</given-names></string-name>. <article-title>A kinematic analysis of flat leverage mechanism of the fourth class for manipulators</article-title>. <source>Proc IOP Conf Ser Mater Sci Eng</source>. <year>2017</year>;<volume>230</volume>(<issue>1</issue>):<fpage>012047</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1088/1757-899X/230/1/012047">https://doi.org/10.1088/1757-899X/230/1/012047</ext-link></mixed-citation></ref>
<ref id="ref24"><label>24</label><mixed-citation publication-type="journal"><string-name><surname>Balbayev</surname> <given-names>G</given-names></string-name>, <string-name><surname>Carbone</surname> <given-names>G</given-names></string-name>. <article-title>A dynamic simulation of a novel continuous variable transmission</article-title>. <source>Mech Mach Sci</source>. <year>2014</year>;<volume>17</volume>:<fpage>109</fpage>&#x2013;<lpage>116</lpage>.</mixed-citation></ref>
<ref id="ref25"><label>25</label><mixed-citation publication-type="journal"><string-name><surname>Karymsakova</surname> <given-names>IB</given-names></string-name>, <string-name><surname>Krak</surname> <given-names>IV</given-names></string-name>, <string-name><surname>Denissova</surname> <given-names>NF</given-names></string-name>. <article-title>Criteria for implants classification for coating implants using plasma spraying by robotic complex</article-title>. <source>Eur J Math Comput Appl</source>. <year>2017</year>;<volume>5</volume>(<issue>3</issue>):<fpage>44</fpage>&#x2013;<lpage>52</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.32523/2306-3172-2017-5-3-44-52">https://doi.org/10.32523/2306-3172-2017-5-3-44-52</ext-link></mixed-citation></ref>
<ref id="ref26"><label>26</label><mixed-citation publication-type="journal"><string-name><surname>Bondarenko</surname> <given-names>IN</given-names></string-name>, <string-name><surname>Galich</surname> <given-names>AV</given-names></string-name>. <article-title>Electrodeless lamps based on the resonant irregular microwave structures</article-title>. <source>In: Proc CriMiCo 2013 - 23rd Int Conf Microw Telecommun Technol</source>; <year>2013</year>. p. <fpage>1063</fpage>&#x2013;<lpage>1064</lpage>.</mixed-citation></ref>
<ref id="ref27"><label>27</label><mixed-citation publication-type="journal"><string-name><surname>Bondarenko</surname> <given-names>IN</given-names></string-name>, <string-name><surname>Vasiliev</surname> <given-names>YS</given-names></string-name>, <string-name><surname>Zhizhiriy</surname> <given-names>AS</given-names></string-name>, <string-name><surname>Ishenko</surname> <given-names>AL</given-names></string-name>. <article-title>Arrangement device for monitoring of parameters of microwave resonators</article-title>. <source>In: KpbiMuKo 2010 CriMiCo - 20th Int Conf Microwave Telecommun Technol</source>; <year>2010</year>. p. <fpage>969</fpage>&#x2013;<lpage>970</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/crmico.2010.5632420">https://doi.org/10.1109/crmico.2010.5632420</ext-link></mixed-citation></ref>
<ref id="ref28"><label>28</label><mixed-citation publication-type="journal"><string-name><surname>Kerimkhulle</surname> <given-names>S</given-names></string-name>, <string-name><surname>Aitkozha</surname> <given-names>Z</given-names></string-name>. <article-title>A criterion for correct solvability of a first order difference equation</article-title>. <source>AIP Conf Proc</source>. <year>2017</year>;<volume>1880</volume>:<issue>040016</issue>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1063/1.5000632">https://doi.org/10.1063/1.5000632</ext-link></mixed-citation></ref>
<ref id="ref29"><label>29</label><mixed-citation publication-type="journal"><string-name><surname>Asanov</surname> <given-names>A</given-names></string-name>, <string-name><surname>Orozmamatova</surname> <given-names>J</given-names></string-name>. <article-title>About uniqueness of solutions of Fredholm linear integral equations of the first kind in the axis</article-title>. <source>Filomat</source>. <year>2019</year>;<volume>33</volume>(<issue>5</issue>):<fpage>1329</fpage>&#x2013;<lpage>1333</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2298/FIL1905329A">https://doi.org/10.2298/FIL1905329A</ext-link></mixed-citation></ref>
<ref id="ref30"><label>30</label><mixed-citation publication-type="journal"><string-name><surname>Marignetti</surname> <given-names>F</given-names></string-name>, <string-name><surname>Di Stefano</surname> <given-names>RL</given-names></string-name>, <string-name><surname>Rubino</surname> <given-names>G</given-names></string-name>, <string-name><surname>Giacomobono</surname> <given-names>R</given-names></string-name>. <article-title>Current source inverter (CSI) power converters in photovoltaic systems: A comprehensive review of performance, control, and integration</article-title>. <source>Energ</source>. <year>2023</year>;<volume>16</volume>(<issue>21</issue>):<fpage>7319</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/en16217319">https://doi.org/10.3390/en16217319</ext-link></mixed-citation></ref>
<ref id="ref31"><label>31</label><mixed-citation publication-type="journal"><string-name><surname>Fioretto</surname> <given-names>M</given-names></string-name>, <string-name><surname>Rubino</surname> <given-names>G</given-names></string-name>, <string-name><surname>Rubino</surname> <given-names>L</given-names></string-name>, <string-name><surname>Serbia</surname> <given-names>N</given-names></string-name>, <string-name><surname>Marino</surname> <given-names>P</given-names></string-name>. <article-title>Active parallel filter for DC bus and DC feeding line</article-title>. <source>Proc IEEE Int Conf Ind Technol</source>. <year>2013</year>;<volume>1</volume>:<fpage>463</fpage>&#x2013;<lpage>468</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ICIT.2013.6505716">https://doi.org/10.1109/ICIT.2013.6505716</ext-link></mixed-citation></ref>
<ref id="ref32"><label>32</label><mixed-citation publication-type="journal"><string-name><surname>Cherniha</surname> <given-names>R</given-names></string-name>, <string-name><surname>King</surname> <given-names>JR</given-names></string-name>, <string-name><surname>Kovalenko</surname> <given-names>S</given-names></string-name>. <article-title>Lie symmetry properties of nonlinear reaction-diffusion equations with gradient-dependent diffusivity</article-title>. <source>Commun Nonlinear Sci Numer Simul</source>. <year>2016</year>;<volume>36</volume>:<fpage>98</fpage>&#x2013;<lpage>108</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.cnsns.2015.11.023">https://doi.org/10.1016/j.cnsns.2015.11.023</ext-link></mixed-citation></ref>
<ref id="ref33"><label>33</label><mixed-citation publication-type="journal"><string-name><surname>Yakovlev</surname> <given-names>SV</given-names></string-name>, <string-name><surname>Valuiskaya</surname> <given-names>OA</given-names></string-name>. <article-title>Optimization of linear functions at the vertices of a permutation polyhedron with additional linear constraints</article-title>. <source>Ukr Math J</source>. <year>2001</year>;<volume>53</volume>(<issue>9</issue>):<fpage>1535</fpage>&#x2013;<lpage>1545</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1023/A:1014374926840">https://doi.org/10.1023/A:1014374926840</ext-link></mixed-citation></ref>
<ref id="ref34"><label>34</label><mixed-citation publication-type="journal"><string-name><surname>Cherniha</surname> <given-names>R</given-names></string-name>, <string-name><surname>Serov</surname> <given-names>M</given-names></string-name>, <string-name><surname>Rassokha</surname> <given-names>I</given-names></string-name>. <article-title>Lie symmetries and form-preserving transformations of reaction-diffusion-convection equations</article-title>. <source>J Math Anal Appl</source>. <year>2008</year>;<volume>342</volume>(<issue>2</issue>):<fpage>1363</fpage>&#x2013;<lpage>1379</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.jmaa.2008.01.011">https://doi.org/10.1016/j.jmaa.2008.01.011</ext-link></mixed-citation></ref>
<ref id="ref35"><label>35</label><mixed-citation publication-type="journal"><string-name><surname>Salah</surname> <given-names>J</given-names></string-name>. <article-title>Note on the modified Caputo&#x2019;s fractional calculus derivative operator</article-title>. <source>Far East J Math Sci</source>. <year>2016</year>;<volume>100</volume>(<issue>4</issue>):<fpage>609</fpage>&#x2013;<lpage>615</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.17654/MS100040609">https://doi.org/10.17654/MS100040609</ext-link></mixed-citation></ref>
<ref id="ref36"><label>36</label><mixed-citation publication-type="journal"><string-name><surname>Rehman</surname> <given-names>HU</given-names></string-name>, <string-name><surname>Darus</surname> <given-names>M</given-names></string-name>, <string-name><surname>Salah</surname> <given-names>J</given-names></string-name>. <article-title>Graphing examples of starlike and convex functions of order &#x03B2;</article-title>. <source>Appl Math Inf Sci</source>. <year>2018</year>;<volume>12</volume>(<issue>3</issue>):<fpage>509</fpage>&#x2013;<lpage>515</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.18576/amis/120305">https://doi.org/10.18576/amis/120305</ext-link></mixed-citation></ref>
<ref id="ref37"><label>37</label><mixed-citation publication-type="journal"><string-name><surname>Smailov</surname> <given-names>N</given-names></string-name>, <string-name><surname>Akmardin</surname> <given-names>S</given-names></string-name>, <string-name><surname>Ayapbergenova</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ayapbergenova</surname> <given-names>G</given-names></string-name>, <string-name><surname>Kadyrova</surname> <given-names>R</given-names></string-name>, <string-name><surname>Sabibolda</surname> <given-names>A</given-names></string-name>. <article-title>Analysis of VLC efficiency in optical wireless communication systems for indoor applications</article-title>. <source>Inform. Autom. Pomiary Gospod Ochronie &#x15a;rodow</source>. <year>2025</year>;<volume>15</volume>(<issue>2</issue>):<fpage>135</fpage>&#x2013;<lpage>138</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.35784/iapgos.6971">https://doi.org/10.35784/iapgos.6971</ext-link></mixed-citation></ref>
<ref id="ref38"><label>38</label><mixed-citation publication-type="journal"><string-name><surname>Li</surname> <given-names>L</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>F</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>H</given-names></string-name>. <article-title>Modeling and simulation of missile defense M/M/N queueing system</article-title>. <source>J Syst Simul</source>. <year>2019</year>;<volume>30</volume>(<issue>4</issue>):<fpage>1260</fpage>&#x2013;<lpage>1271</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.16182/j.issn1004731x.joss.201804007">https://doi.org/10.16182/j.issn1004731x.joss.201804007</ext-link></mixed-citation></ref>
<ref id="ref39"><label>39</label><mixed-citation publication-type="journal"><string-name><surname>Mazhar</surname> <given-names>T</given-names></string-name>, <string-name><surname>Malik</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Mohsan</surname> <given-names>SAH</given-names></string-name>, <string-name><surname>Li</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Haq</surname> <given-names>I</given-names></string-name>, <string-name><surname>Ghorashi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Karim</surname> <given-names>FK</given-names></string-name>, <string-name><surname>Mostafa</surname> <given-names>SM</given-names></string-name>. <article-title>Quality of service performance analysis in a traffic engineering model for next-generation wireless sensor networks</article-title>. <source>Symmetry</source>. <year>2023</year>;<volume>15</volume>(<issue>2</issue>):<fpage>513</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/sym15020513">https://doi.org/10.3390/sym15020513</ext-link></mixed-citation></ref>
<ref id="ref40"><label>40</label><mixed-citation publication-type="journal"><string-name><surname>Zhao</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>CK</given-names></string-name>, <string-name><surname>Ren</surname> <given-names>J</given-names></string-name>, <string-name><surname>Tsang</surname> <given-names>Y</given-names></string-name>. <article-title>Quality of service measurement for electric vehicle fast charging stations: a new evaluation model under uncertainties</article-title>. <source>Transportmetrica A Transp Sci</source>. <year>2025</year>;<volume>21</volume>(<issue>1</issue>):<fpage>2232044</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/23249935.2023.2232044">https://doi.org/10.1080/23249935.2023.2232044</ext-link></mixed-citation></ref>
<ref id="ref41"><label>41</label><mixed-citation publication-type="journal"><string-name><surname>Mas</surname> <given-names>L</given-names></string-name>, <string-name><surname>Vilaplana</surname> <given-names>J</given-names></string-name>, <string-name><surname>Mateo</surname> <given-names>J</given-names></string-name>, <string-name><surname>Solsona</surname> <given-names>F</given-names></string-name>. <article-title>A queuing theory model for fog computing</article-title>. <source>J Supercomput</source>. <year>2022</year>;<volume>78</volume>(<issue>8</issue>):<fpage>11138</fpage>&#x2013;<lpage>11155</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s11227-022-04328-3">https://doi.org/10.1007/s11227-022-04328-3</ext-link></mixed-citation></ref>
<ref id="ref42"><label>42</label><mixed-citation publication-type="journal"><string-name><surname>Geeta</surname></string-name>, <string-name><surname>Prakash</surname> <given-names>S</given-names></string-name>. <article-title>A literature review of QoS with load balancing in cloud computing environment</article-title>. In: <person-group person-group-type="editor"><string-name><surname>Aggarwal</surname> <given-names>V</given-names></string-name>, <string-name><surname>Bhatnagar</surname> <given-names>V</given-names></string-name>, <string-name><surname>Mishra</surname> <given-names>D</given-names></string-name></person-group>, <role>eds.</role> <source>Big Data Analytics: Proceedings of CSI 2015</source>. <publisher-name>Springer</publisher-name>, <publisher-loc>Singapore</publisher-loc>; <year>2018</year>:<fpage>667</fpage>&#x2013;<lpage>675</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-981-10-6620-7_64">https://doi.org/10.1007/978-981-10-6620-7_64</ext-link></mixed-citation></ref>
<ref id="ref43"><label>43</label><mixed-citation publication-type="journal"><string-name><surname>Krishnamoorthy</surname> <given-names>A</given-names></string-name>, <string-name><surname>Joshua</surname> <given-names>AN</given-names></string-name>, <string-name><surname>Mathew</surname> <given-names>AP</given-names></string-name>. <article-title>The k-out-of-n:G system viewed as a multi-server queue</article-title>. <source>Mathematics</source>. <year>2024</year>;<volume>12</volume>(<issue>2</issue>):<fpage>210</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/math12020210">https://doi.org/10.3390/math12020210</ext-link></mixed-citation></ref>
<ref id="ref44"><label>44</label><mixed-citation publication-type="journal"><string-name><surname>Saad</surname> <given-names>WK</given-names></string-name>, <string-name><surname>Shayea</surname> <given-names>I</given-names></string-name>, <string-name><surname>Hamza</surname> <given-names>BJ</given-names></string-name>, <string-name><surname>Mohamad</surname> <given-names>H</given-names></string-name>, <string-name><surname>Daradkeh</surname> <given-names>YI</given-names></string-name>, <string-name><surname>Jabbar</surname> <given-names>WA</given-names></string-name>. <article-title>Handover parameters optimisation techniques in 5G networks</article-title>. <source>Sensors</source>. <year>2021</year>;<volume>21</volume>(<issue>15</issue>):<fpage>5202</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/s21155202">https://doi.org/10.3390/s21155202</ext-link></mixed-citation></ref>
<ref id="ref45"><label>45</label><mixed-citation publication-type="journal"><string-name><surname>Liu</surname> <given-names>Y</given-names></string-name>. <article-title>Distribution network optimization planning based on genetic algorithms</article-title>. <source>J Phys Conf Ser</source>. <year>2021</year>;<volume>1881</volume>(<issue>3</issue>):<fpage>032094</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1088/1742-6596/1881/3/032094">https://doi.org/10.1088/1742-6596/1881/3/032094</ext-link></mixed-citation></ref>
<ref id="ref46"><label>46</label><mixed-citation publication-type="journal"><string-name><surname>Li</surname> <given-names>L</given-names></string-name>, <string-name><surname>Long</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>W</given-names></string-name>, <string-name><surname>Jolfaei</surname> <given-names>A</given-names></string-name>, <string-name><surname>Haghighi</surname> <given-names>MS</given-names></string-name>. <article-title>Joint optimization of energy consumption and data transmission in smart body area networks</article-title>. <source>Sensors</source>. <year>2022</year>;<volume>22</volume>(<issue>22</issue>):<fpage>9023</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/s22229023">https://doi.org/10.3390/s22229023</ext-link></mixed-citation></ref>
<ref id="ref47"><label>47</label><mixed-citation publication-type="journal"><string-name><surname>Do-Duy</surname> <given-names>T</given-names></string-name>, <string-name><surname>Nguyen</surname> <given-names>LD</given-names></string-name>, <string-name><surname>Duong</surname> <given-names>TQ</given-names></string-name>, <string-name><surname>Khosravirad</surname> <given-names>SR</given-names></string-name>, <string-name><surname>Claussen</surname> <given-names>H</given-names></string-name>. <article-title>Joint optimisation of real-time deployment and resource allocation for UAV-aided disaster emergency communications</article-title>. <source>IEEE J Sel Areas Commun</source>. <year>2021</year>;<volume>39</volume>(<issue>11</issue>):<fpage>3411</fpage>&#x2013;<lpage>3424</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/JSAC.2021.3088662">https://doi.org/10.1109/JSAC.2021.3088662</ext-link></mixed-citation></ref>
<ref id="ref48"><label>48</label><mixed-citation publication-type="journal"><string-name><surname>Islam</surname> <given-names>M</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>F</given-names></string-name>, <string-name><surname>Amin</surname> <given-names>M</given-names></string-name>. <article-title>Control and optimisation of networked microgrids: a review</article-title>. <source>IET Renew Power Gener</source>. <year>2021</year>;<volume>15</volume>(<issue>6</issue>):<fpage>1133</fpage>&#x2013;<lpage>1148</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1049/rpg2.12111">https://doi.org/10.1049/rpg2.12111</ext-link></mixed-citation></ref>
<ref id="ref49"><label>49</label><mixed-citation publication-type="journal"><string-name><surname>Bhaskar</surname> <given-names>AV</given-names></string-name>, <string-name><surname>Venkatesh</surname> <given-names>TG</given-names></string-name>. <article-title>Performance analysis of network-on-chip in many-core processors</article-title>. <source>J Parallel Distrib Comput</source>. <year>2021</year>;<volume>147</volume>:<fpage>196</fpage>&#x2013;<lpage>208</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.jpdc.2020.09.013">https://doi.org/10.1016/j.jpdc.2020.09.013</ext-link></mixed-citation></ref>
<ref id="ref50"><label>50</label><mixed-citation publication-type="journal"><string-name><surname>Jassar</surname> <given-names>AA</given-names></string-name>. <article-title>An analysis of QoS in SDN-based network by queuing model</article-title>. <source>Telecommun Radio Eng</source>. <year>2018</year>;<volume>77</volume>(<issue>4</issue>):<fpage>297</fpage>&#x2013;<lpage>308</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1615/TelecomRadEng.v77.i4.20">https://doi.org/10.1615/TelecomRadEng.v77.i4.20</ext-link></mixed-citation></ref>
<ref id="ref51"><label>51</label><mixed-citation publication-type="journal"><string-name><surname>Keshari</surname> <given-names>SK</given-names></string-name>, <string-name><surname>Kansal</surname> <given-names>V</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>S</given-names></string-name>. <article-title>A systematic review of quality of services in software defined networking</article-title>. <source>Wirel Pers Commun</source>. <year>2021</year>;<volume>116</volume>(<issue>3</issue>):<fpage>2593</fpage>&#x2013;<lpage>2614</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s11277-020-07812-2">https://doi.org/10.1007/s11277-020-07812-2</ext-link></mixed-citation></ref>
<ref id="ref52"><label>52</label><mixed-citation publication-type="journal"><string-name><surname>Afzal</surname> <given-names>S</given-names></string-name>, <string-name><surname>Kavitha</surname> <given-names>G</given-names></string-name>. <article-title>A hybrid multiple parallel queuing model to enhance QoS in cloud computing</article-title>. <source>Int J Grid High Perform Comput</source>. <year>2020</year>;<volume>12</volume>(<issue>1</issue>):<fpage>18</fpage>&#x2013;<lpage>34</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4018/IJGHPC.2020010102">https://doi.org/10.4018/IJGHPC.2020010102</ext-link></mixed-citation></ref>
<ref id="ref53"><label>53</label><mixed-citation publication-type="journal"><string-name><surname>Mazloomi</surname> <given-names>N</given-names></string-name>, <string-name><surname>Gholipour</surname> <given-names>M</given-names></string-name>, <string-name><surname>Zaretalab</surname> <given-names>A</given-names></string-name>. <article-title>Efficient configuration for multi-objective QoS optimization in wireless sensor network</article-title>. <source>Ad Hoc Netw</source>. <year>2022</year>;<volume>125</volume>:<issue>102730</issue>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.adhoc.2021.102730">https://doi.org/10.1016/j.adhoc.2021.102730</ext-link></mixed-citation></ref>
<ref id="ref54"><label>54</label><mixed-citation publication-type="journal"><string-name><surname>Liu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Yao</surname> <given-names>X</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Li</surname> <given-names>W</given-names></string-name>. <article-title>A multi-queue-based ECN marking strategy for multi-class QoS guarantee in programmable networks</article-title>. <source>PeerJ Comput Sci</source>. <year>2024</year>;<volume>10</volume>:<fpage>e2382</fpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.7717/peerj-cs.2382">https://doi.org/10.7717/peerj-cs.2382</ext-link></mixed-citation></ref>
<ref id="ref55"><label>55</label><mixed-citation publication-type="journal"><string-name><surname>Miranda</surname> <given-names>G</given-names></string-name>, <string-name><surname>Municio</surname> <given-names>E</given-names></string-name>, <string-name><surname>Haxhibeqiri</surname> <given-names>J</given-names></string-name>, <string-name><surname>Hoebeke</surname> <given-names>J</given-names></string-name>, <string-name><surname>Moerman</surname> <given-names>I</given-names></string-name>, <string-name><surname>Marquez-Barja</surname> <given-names>JM</given-names></string-name>. <article-title>Enabling time-sensitive network management over multi-domain wired/wi-fi networks</article-title>. <source>IEEE Trans Netw Serv Manag</source>. <year>2023</year>;<volume>20</volume>(<issue>3</issue>):<fpage>2386</fpage>&#x2013;<lpage>2399</lpage>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/TNSM.2023.3274590">https://doi.org/10.1109/TNSM.2023.3274590</ext-link></mixed-citation></ref>
<ref id="ref56"><label>56</label><mixed-citation publication-type="journal"><string-name><surname>Pundir</surname> <given-names>M</given-names></string-name>, <string-name><surname>Sandhu</surname> <given-names>JK</given-names></string-name>. <article-title>A systematic review of quality of service in wireless sensor networks using machine learning: recent trend and future vision</article-title>. <source>J Netw Comput Appl</source>. <year>2021</year>;<volume>188</volume>:<issue>103084</issue>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.jnca.2021.103084">https://doi.org/10.1016/j.jnca.2021.103084</ext-link></mixed-citation></ref>
</ref-list>
</back>
</article>
