ANALYTICAL MODEL OF A DISTRIBUTED REGISTRY BASED ON THE CONCEPT OF CROWDING
DOI:
https://doi.org/10.26906/SUNZ.2025.4.092Keywords:
distributed registry, queuing, analytical model, transaction, system productivity, stabilityAbstract
The main problem in the formation of a registry in distributed systems is to determine the dependence between the parameters of the request flow, the speed of transaction service and the general characteristics of the system performance. The purpose of the study: to build an analytical model of a distributed registry, which allows describing the transaction processing process in terms of the theory of queueing and determining the key indicators of the system's efficiency. Results. The article proposes an analytical model of a distributed registry, built on the basis of the theory of queueing. The model describes the processes of recording, verification and confirmation of transactions in a decentralized environment, taking into account the limitations of the node's bandwidth and the intensity of incoming requests. The use of a queuing apparatus allows us to formalize the time characteristics of the system, estimate the average waiting time for transaction processing, the load factor of nodes, and the probability of delay. An analytical study of the influence of network parameters on the productivity of the registry has been conducted and the conditions for system stability have been determined. The proposed approach can be used to optimize the architecture of distributed systems with increased requirements for speed and reliability of data processing.Downloads
References
1. Chalapathi, G.S.S., Chamola, V., Vaish, A. and Buyya, R. (2022), “Industrial internet of things (Iiot) applications of edge and fog computing: A review and future directions”, Advances in Information Security, vol. 83, pp. 293–325, doi: https://doi.org/10.1007/978-3-030-57328-7_12
2. Dotsenko, N., Chumachenko, I., Galkin, A., Kuchuk, H. and Chumachenko, D. (2023), “Modeling the Transformation of Configuration Management Processes in a Multi-Project Environment”, Sustainability (Switzerland), Vol. 15(19), 14308, doi: https://doi.org/10.3390/su151914308
3. Zuev, A., Karaman, D. and Olshevskiy, A. (2023), “Wireless sensor synchronization method for monitoring short-term events”, Advanced Information Systems, vol. 7, no. 4, pp. 33–40, doi: https://doi.org/10.20998/2522-9052.2023.4.04
4. Hunko, M., Tkachov, V., Kuchuk, H. and Kovalenko, A. (2023), Advantages of Fog Computing: A Comparative Analysis with Cloud Computing for Enhanced Edge Computing Capabilities, 2023 IEEE 4th KhPI Week on Advanced Technology, KhPI Week 2023 – Conf. Proc, 02-06 October 2023, Code 194480, doi: https://doi.org/10.1109/KhPIWeek61412.2023.10312948
5. Bayer, D., Haber, S. and Stornetta, W.S. (1993), “Improving the efficiency and reliability of digital time-stamping”, Sequences Methods in Communication, Security and Computer Science, pp. 329–334, available at: https://www.math.columbia.edu/~bayer/papers/Timestamp_BHS93.pdf
6. Gramoli, V. (2020), “From blockchain consensus back to Byzantine consensus”, Future Generation Computer Systems, vol. 107, pp.760–769, doi: https://doi.org/10.1016/j.future.2017.09.023
7. Kovalenko, A. and Kuchuk, H. (2022), “Methods to Manage Data in Self-healing Systems”, Studies in Systems, Decision and Control, vol. 425, pp. 113–171, doi: https://doi.org/10.1007/978-3-030-96546-4_3
8. Kuchuk, N., Kovalenko, A., Ruban, I., Shyshatskyi, A., Zakovorotnyi, O. and Sheviakov, I. (2023), “Traffic Modeling for the Industrial Internet of NanoThings”, 2023 IEEE 4th KhPI Week on Advanced Technology, KhPI Week 2023 - Conference Proceedings, 2023, doi: 194480. http://dx.doi.org/10.1109/KhPIWeek61412.2023.10312856
9. Kuchuk, H. and Malokhvii, E. (2024), “Integration of IOT with Cloud, Fog, and Edge Computing: A Review”, Advanced Information Systems, vol. 8(2), pp. 65–78, doi: https://doi.org/10.20998/2522-9052.2024.2.08
10. Decker, C. and Wattenhofer, R. (2014), “Bitcoin transaction malleability and MtGox”, European symposium on research in computer security, 370, pp. 313–326, doi: https://doi.org/10.1007/978-3-319-11212-1_18
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Andriy Kovalenko, Ivan Zamriy, Volodymyr Popov, Dmytro Zharikov

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.