 Research
 Open access
 Published:
A network business availability modeling method based on Markov chain
EURASIP Journal on Wireless Communications and Networking volume 2022, Article number: 72 (2022)
Abstract
Military tactical networks (MTNs) have grown in size and complexity as the volume of battlefield communications business has increased dramatically. There is a critical need for a quantitative evaluation method to assess the performance of MTNs. Based on the transmission characters of battlefield communication business and the availability of communication equipment, this paper proposed a Markov chainbased network steadystate availability model. Using this model and the analysis of the CSMA/CA transmission protocol as preconditions, a delaybased quantitative evaluation model of network business availability is proposed based on statistical principles. The relationship between network business availability and crucial metrics such as node size and node failure/repair ratio is investigated in simulation experiments to ensure the validity and correctness of the proposed model. The work done in this paper contributes to effectively evaluating the overall availability of MTNs in a complex environment.
1 Introduction
Military tactical networks (MTNs) are networks that integrate multicommunications means and multibusiness data transmission [1]. MTNs can provide command and control, battlefield situational awareness, and fire coordination for digital combat forces. Its ability to communicate controlling data and situational awareness data has a significant influence on the outcome of a war. The network has gotten a lot of attention since it is going to be a remarkable feature of future wars. Precisely for this reason, the performance analysis of the whole network has been studied widely [3,4,5].
The following failure factors commonly affect MTNs’ availability: network device failure caused by the harsh combat environment; breakdowns caused by different mobility patterns of mobile nodes due to the need to perform different combat tasks; adversary malicious damage to centrality nodes; network topology and routing protocol stability; device or link repairability, and so on. Furthermore, the need for sharing huge volumes of data might influence a network's capacity to execute given activities within set time frames. Such capacity is also one of the key factors that affect the overall availability of MTNs. Moreover, various service demands have varied performance requirements. Some metrics, such as packet loss and transmission delay [6, 7], could objectively reflect the network performance. In some tactical scenarios, the transfer of situational data must be as quickly and efficiently as possible. If the delay threshold is exceeded, the communications network will fail. The availability of MTNs are determined not only by the performance of the communications devices, but also by the transmission requirements of specific business data types.
The traditional availability usually disregards the repairability of network devices. Besides, most existing availability researches mainly consider the network layer, data link layer, or physical layer. Ning et al. [8] proposed an application reliability model in terms of different applications on the same network. The model, which is applicationoriented, considers only applicationrelated hardware and services. Yue et al. [9] further studied the influence of the application process on network reliability. They found that congestion of relay nodes would have a greater impact on the reliability of network performance. Moreover, since easing the traffic load of a network [2] and improving the routing strategy are more practical and economical ways to improve network performance, a growing number of publications have focused on them [10,11,12,13]. In particular, Li et al. [14] proposed a routing algorithm based on reliable path residual lifetime prediction. Cao et al. [15] proposed a link reliability estimation routing algorithm to ensure that nodes select the best route for reliable communications. The author of [16] proposed a new network performance metric called routing availability, to measure the Quality of Service (QoS) of the network and the quality of video transmission in nonuniform network environments. Besides, Tang et al. [17,18,19] applied Markov theory to study the quality of service of networks. Zheng et al. [20] proposed an optimization model of business deployment aiming at application reliability.
However, for digital combat forces that rely on MTNs to complete situational awareness sharing and data transmission, more emphasis is placed on the business availability from the perspective of the application layer. Therefore, there are still two important issues that are not considered enough in comparison with the methods and models mentioned above:
(1) The repairability of network devices is not considered or is only considered. The advancement and maintainability of network devices are being enhanced to an unprecedented extent thanks to technological development. However, traditional availability gives little consideration to a network device’s reparability. (2) The business availability of a network can better reflect the performance of a network by integrating factors such as the reparability of network nodes, the quality of date link, network topology, routing algorithms, traffic flow, and the network repairability. The endusers, for example, the digital combat forces may pay more attention to the business availability. However, existing models may not consider the networks’ performance from the perspective of the application layer.
This paper proposes a novel business availability model based on the Markov steadystate availability model and the CSMA/CA protocol. To evaluate the validity and correctness of the model, we performed simulations using the OPNET simulator.
2 Methods and mathematical model
2.1 Characteristics of MTNs
MTNs are mainly used to enhance combat forces’ battlefield situational awareness ability, the cooperation ability of each mobile unit, and the sustainability and timeliness of command and control [21]. As networks that do not rely on preexisting communication infrastructure, MTNs are the basis of battlefield information sharing and present some distinctive features that deserve to be noted [22]. MTNs are team collaboration of a large number of mobile nodes with selforganization and selfrepair abilities. Some key characteristics of these networks are multihop, centerless, energylimited, the need for supporting multimedia realtime traffic, and low delay access to distributed resources [23, 24]. The communication link between any pair of nodes is considered to be dynamic. Due to the burstiness and uncertainty of tactical tasks, mobile nodes arranged in different areas need to quickly move to the designated area within the limited time and organize according to the specific task requirements. The topology of MTNs is flexible and reconfigurable since they can cater for a variety of application scenarios. In addition, MTNs have different requirements for delay, traffic volume, packet loss rate, etc., according to the different specific tasks. For example, in some tactical scenarios, low delay is required for situational awareness data transmission, beyond which the communication network is judged to be a failure; In other scenarios, even if the network is freeflow, the volume of traffic does not meet the requirements, the network is still considered a failure.
2.2 Modeling and analysis for Markov steadystate availability of MTNs
The following definitions and elaborations of reliability and availability are introduced to help better understand the model.
A complex system’s reliability can be defined as its capacity to run normally from the beginning of the operation to a certain moment. By contrast, its availability refers to the possibility of normal operation for it may experience multiple failures and repairs during this period. A failure and a repair of a system are regarded as a life cycle. Reliability is the performance evaluation of the system in a life cycle, and availability is in multiple life cycles. To simplify the analysis, we make the following assumptions:
(1) MTN consists of n repairable nodes; (2) The node life X and the node repair time Y obey the exponential distributions with parameters λ and μ, respectively. X and Y are independent of each other; (3) A failed node after repair is considered new, and the node loss is ignored.
The network is operational when k or more nodes are active [27]. When nk + 1 nodes are out of order, the network fails. At this moment, k1 normal nodes in the network cease working as well, and no failure occurs until one node is repaired. The network will reenter the running state when k nodes work normally.
The state of the network is defined by the number of failed nodes. X(t) = j means that at moment t, j nodes of the network have failed and are waiting to be repaired.
It can be proved that {X(t), t ≥ 0} is a timecontinuous multistate homogeneous Markov chain [26], and the state transition probability in \(\Delta t\) is as follows:
The state transition probability diagram of the network can be described as (not shown with each state transition to itself):
Then the transition probability matrix A is described as follows:
\(P_{j} \left( t \right)\) represents the probability that the network is in the jth state at moment t. The row vector \({\mathbf{P}}\left( {\text{t}} \right) = \left( {P_{0} \left( t \right), P_{1} \left( t \right), \ldots , P_{n  k + 1} \left( t \right)} \right)\) represents the distribution probability of the network in each state at moment t. The following relationship can be established as
The solution is:
According to the properties of the homogeneous Markov process, we have
The following results can be obtained by combining (3):
where \({\varvec{\pi}}\) is that state probability distribution vector in a steady state,\({{\varvec{\uppi}}} = \left( {\pi_{0} , \pi_{1} , \ldots , \pi_{n  k + 1} } \right)\).
Substituting (2) into (6) gives rise to:
then \(\pi_{j}\) can be obtained by solving this linear system of equations, and the steadystate availability could be described as:
where A means the sum of probabilities when various network devices are in a steady state of normal operation. When the running time of the network tends to be infinite, its availability state will tend to be steady to some extent.
2.3 Business availability based on CSMA/CA protocol
As a prevailing randomaccess algorithm for wireless LANs, Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is used to get avoided of data transmission conflicts among nodes as much as possible. It is frequently used in MTNs. CSMA/CA employs the Binary Exponential Backoff Algorithm. A node must wait for a certain time interval when it wants to send a data frame. Besides, a random backoff time is calculated so that data transmission conflicts can be avoided when trying to access the channel again. In this paper, delay performance is taken as an example to model and analyze the business availability of the network.
It is common for multiple nodes to compete for the channel in wireless networks. The analysis in this paper is based on the following assumptions:

(1)
n nodes are competing for the channel to transmit data;

(2)
There is no hidden node and the channel is ideal;

(3)
The transmission queue for each node is always nonempty.
The Markov model is established according to the characteristics of individual nodes in the network. This model can deduce the probability p of a node to have a conflict in a data transmission within a random time interval. Moreover, it can also derive the steadystate probability (τ) of a node transmitting a data frame in a random time interval. In the Binary Exponential Backoff Algorithm used in CSMA/CA, the backoff time is chosen uniformly in the range (0, w—1), where w represents the size of contention window whose size depends on the number of retransmissions of the data frame. W_{0} is the minimum size of backoff window. \(W_{m} = 2^{m} W_{0}\), where m is equal to the number of retransmissions, m ∈ [0, M], and M is the maximum backoff order.
s(t) is the stochastic process of the node's backoff order, while b(t) is the stochastic process of the node's backoff time counter at moment t. Each data frame attempts to be sent without regards to its retransmission count. The data frames conflict at a constant and independent probability p. The discretetime Markov chains of the twodimensional stochastic process {s(t), b(t)} are modeled as:
the nonempty onestep transition probability is:
The above equation explains the following in order:

(1)
At the beginning of each time interval, the backoff time decreases;

(2)
After a data frame is successfully transmitted, the backoff order of a new data frame starts from 0;

(3)
The backoff order increases if a data frame fails to transmit at a backoff order of i1;

(4)
The backoff order will not increase when the backoff order reaches the maximum M.
All nodes transmit data frames only when the backoff counter is 0. Then p and \(\tau\) could be calculated as follows
where \(\left( {1  \tau } \right)^{n  1}\) is the probability that none of the other n − 1 nodes transmits a data frame.
Then the probability \(P_{S}\) that a data frame is successfully transmitted; the probability \(P_{N}\) that a data frame is not transmitted; and the probability \(P_{C}\) that a data frame is transmitted but conflicts occur could be described as follows:
The average size of the backoff window is an important part of delay analysis. In the backoff stage j, the size of backoff window obeys a uniform distribution in the range \(\left[ {0,W_{j}  1} \right]\). This indicates that in addition to the selection of the minimum and maximum size of backoff window, the size of the average backoff window W is also related to the conflict probability p. That is, the average size of backoff window is related to both the size of the backoff window for the successful transmission phase and the size of the window that has been backed off before the successful transmission phase.
The average size of backoff window for each round could be calculated as:
The following equations can be used to calculate the average busy time (T_{s}) of the channel when the transmission is successful and the average busy time (T_{c}) of the channel when the transmission is in conflict:
where H is the total length of the physical and MAC layer header fields; \(D_{{{\text{IFS}}}}\) is the distributed interframe spacing; \(S_{{{\text{IFS}}}}\) is the short interframe space; \(\delta\) is the transmission delay; and \(E_{{\text{D}}}\) is the average data frame transmission delay.
The average transmission delay \(\left( {E_{{\text{D}}} } \right)\) could be calculated as:
where E_{B} is the average backoff time of data frames; E_{C} is the average number of conflicts that occur for successful transmission of data frames.
The delay probability distribution \(f_{D} \left( t \right)\) is obtained from the average data frame transmission delay (E_{D}) and the corresponding probability of occurrence.
Then, the compliance rate of specific indicators P_{D} can be obtained based on the indicator threshold D_{B} required by the battlefield mission, i. e., the probability that the delay value does not exceed the threshold:
According to the definition of the compliance rate, P_{D} can also be expressed as the ratio of the number of data frames \(\left( {Q_{{\left( {E_{{\text{D}}} \le D_{{\text{B}}} } \right)}} } \right)\) whose average data frame transmission delay (E_{D}) is less than or equal to the threshold (D_{B}) to the total number of data frames \(Q_{{{\text{all}}}}\):
There is a possibility that the network is in an unavailable state, but the performance meets the criteria when the number of failed nodes in the network does not exceed a certain value. Therefore, we propose a business availability model that is defined as
That is, the steadystate availability is multiplied by the compliance rate of the metrics to evaluate the business availability of the network.
3 Simulation results and discussions
To verify the validity and accuracy of the above theoretical model, simulation experiments were designed. The experimental results will be compared with their theoretical conterparts in this section. First of all, in order to accurately simulate the nodes’ failure and repair behavior so that the actual situation of network operation could be more effectively stimulated, this paper establishes the node fault model using the OPNET simulator. Secondly, according to the failure and repair events generated by the node fault model, the proposed Markov steadystate availability model was verified. Moreover, the business availability model could be verified. Finally, through the simulation experiments of different node sizes, the correctness and practicability of the business availability model based on transmission delay applied in the MTNs were verified.
3.1 Node fault model based on OPNET
OPNET is an excellent tool for simulating reallife networks, evaluating their performance, and identifying latent problems before they arise [25]. To accurately simulate the behavior of nodes and further effectively achieve the purpose of validating the theoretical model in this paper, firstly, the Fail/Recover node model, namely node fault model, was established based on the OPNET simulator so that it can simulate the failure and repair of nodes according to the probability distribution requirements. When the node is in the Fail state, it stops receiving and sending data. When the node is in the Recover state, it receives and sends data normally. The node states alternate between Fail and Recover. The successive Fail and Recover states are independent. As what was mentioned before, the node Fail and Recover state durations obey an exponential distribution.
3.2 Simulation on the Markov steadystate model
MTNs’ availability state changes due to the occurrence of failure and repair events and the changes in network state are discrete in time. This indicates that the entire network is a discrete system and discrete events can be used to drive the simulation process forward (Figs. 1, 2).
The network’s topology during simulation verification could be customized according to needs. In this section, a simulation scenario consisting of 10, 20, and 30 nodes is applied as an example to verify the steadystate availability model. The network topology is shown in Fig. 3. Events that drive the simulation process are divided into failure and repair events. After repair, the failure node will recover and be consistent with a new node. The wear and tear of a node will be ignored. If the number of normal working nodes (K) in the network is less than 6, 12, and 18, the network is determined to be unavailable. The mathematical description of the current state of the network could be described as:
where \(\Phi \left( x \right)\) denotes the state value, and a state value of 0 means the network is unavailable; a state value of 1 means the network operates normally. P is the number of working nodes when the network is in state x.
The data packet size is 1024 bytes. The failure/repair ratio is the ratio of the average time between failures to the time it takes to repair. The four failure/repair ratios T_{1}, T_{2}, T_{3}, and T_{4} are set for simulation to obtain the network steadystate availability and related node failure probability. The parameter configurations are shown in Table 1.
We build the node fault model using MTNs features as well as modeling assumptions and analyses, and we get the steadystate availability of the network via extensive simulation experiments, as shown in Tables 2, 3, and 4. With the same parameter settings, we derive the theoretical results based on the Markov steadystate model presented in Sect. 2.2, as shown in Table 5, Table 6, and Table 7. When the experimental results with various numbers of nodes are compared, it can be seen that the higher the number of nodes, the lower the steadystate availability of the network with the same failure/repair ratio.
(Steadystate availability, T_{i}) denotes the steadystate availability, when the network reaches steadystate in a tactical scenario with a failure/repair ratio of T_{i}. It can be observed that the failure/repair ratio decreases, i.e., the nodes are faulty more of the time, and the availability of the network is significantly decreased. In the table, \(\left( {P_{i} { },{ }T_{i} } \right)\) denotes the probability of i failure nodes in the network where the failure/repair ratio is \(T_{i}\). It can be observed that \(\left( {{\text{Steady}}  {\text{state}}\;{\text{availability}},T_{i} } \right) = \sum \left( {P_{i} , T_{i} } \right)\). The experimental results based on the node failure model are very close to the results of the Markov model in this paper, as shown in Fig. 4, confirming the validity of the Markov steadystate availability model in this paper, i.e., Eq. 8.
3.3 Simulation on the business availability model
We verified the Markov steadystate availability model for MTNs, which is used to quantify the general ability of MTNs to work properly. However, whether the transfer of huge amounts of business data between nodes satisfies the needs of tactical tasks is also one of the key facets influencing MTNs’ availability. Because of the characters of MTNs, we quantify the compliance rate of delay and the Markov steadystate availability of the network, respectively, to validate the business availability model presented in this paper, i.e., Eq. 21. Set the parameters provided in Table 8. The network topology is shown in Fig. 5.
Based on the same parameter and statistical principles, we theoretically estimated the probability distribution of the delay compliance rate for different numbers of node, respectively. The results are shown in Fig. 6, where the abscissa represents the delay value, and the ordinate represents the proportion of packets corresponding to the delay value to total packets. And the yellow straight line represents the delay threshold.
Simulation experiments were performed under the same parameters, and the results are shown in Fig. 6, where the blue, red and green curves represent the simulation results when the number of nodes is 4, 5, and 6, respectively.
In the three simulation scenarios, the number of successfully transmitted data packets and their transmission delay is counted. The results are shown in Fig. 7, where the horizontal and vertical axes represent the delay value and the data packet amount corresponding delay (Fig. 8).
The theoretically calculated delay compliance rate and the statistical delay compliance rate based on experimental results both follow the same trend, with both delay values primarily distributed between 0 ms and 0.1 ms. The results for both are shown in Table 9.
In the results shown in Table 9, the theoretically calculated delay compliance rate is overall higher than the results of the simulation experiments. The deviation between the two gradually increases with the number of nodes. However, it never exceeds 10%, and the mean deviation is 1.75%.
Once the current network's Markov steadystate availability and delaybased compliance rate are determined, the delay based business availability can be calculated using Eq. 21, and the results are shown in Table 10. Under the same delay threshold, it can be seen that the network's business availability declines as the number of nodes grows. The difference between the theoretical and experimental results is within an acceptable range, indicating that the network business availability suggested in this paper is useful for evaluating the availability of complex MTNs and giving some contributions to the research of MTNs availability evaluation methods.
4 Conclusion
The military tactical network is a complex system, and its availability is affected by many factors. In order to evaluate the network performance as accurately as possible, a reasonable method must be proposed. On the basis of Markov steadystate availability modeling and considering the delay performance of the network, this paper constructed a businessbased availability evaluation method for the MTNs, and made a quantitative evaluation on the availability of the network’s delay performance. The study has certain significance for the evaluation of the effectiveness, stability and availability of military complex network business.
Availability of data and materials
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
Abbreviations
 MTNs:

Military tactical networks
 CSMA/CA:

Carriersense multiple access with collision avoidance
References
A. Nt, A. Cs, A. Cg, B. Vva, A survey on mobility in wireless sensor networks. Science 2, 889 (2021)
H. Zhou, T. Wu, H. Zhang, J. Wu, Incentivedriven deep reinforcement learning for content caching and d2d offloading. IEEE J Sel Areas Commun 99, 1–1 (2021)
W.C. Yeh, Y.C. Lin, Y.Y. Chung, M. Chih, A particle swarm optimization approach based on monte carlo simulation for solving the complex network reliability problem. IEEE Trans Reliab 59(1), 212–221 (2010)
M. Herlich, C. Maier, Measuring and monitoring reliability of wireless networks. IEEE Commun Mag 59(1), 5568 (2021)
C.M. Lin, H.K. Teng, C.C. Yang, H.L. Weng, C.C. Chung, A mesh network reliability analysis using reliability block diagram. IEEE 2, 778 (2010)
G. Kadamus, M. Langer, Measurements and statistical analysis for assessment of availability of mobile network services. J Telecommun Inform Technol 2(2), 48–52 (2018)
X. Shan, P. Wang, W. Lu, The reliability and availability evaluation of repairable district heating networks under changeable external conditions. Appl Energy 203(1), 686–695 (2017)
N. Huang, Application reliability for communication networks and its analysis method. J. Syst. Eng. Electron. 22(6), 1030–1036 (2011)
Z. Yue, H. Ning, W. Wu, S. Zhang, The influence of application processes on performance reliability. MATEC Web Conf 3, 771 (2018)
N. Barthwal, S.K. Verma, An optimized routing algorithm for enhancing scalability of wireless sensor network. Wirel Pers Commun 9, 1–24 (2020)
S. Aghda, M. Mirfakhraei, Improved routing in dynamic environments with moving obstacles using a hybrid fuzzygenetic algorithm. Fut Gener Comput Syst 112, 5528 (2020)
M. Elmonser, H.B. Chikha, R. Attia, Mobile routing algorithm with dynamic clustering for energy largescale wireless sensor networks. IET Wirel Sens Syst 8, 556 (2020)
Q. Zhou, Y. Zheng, Long link wireless sensor routing optimization based on improved adaptive ant colony algorithm. Int J Wirel Inform Netw 27(103), 2234 (2019)
L.I. ZhiNan, X.D. Yang, Routing discovery algorithm based on reliable path stability estimation in MANET. J Commun 37(8), 119–128 (2016)
F. Cao, L.V. Na, K. Chen, B. Zhang, C. Liu, Reliability estimation routing strategy of aviation cluster network. Comput Eng Appl 53(24), 129–136 (2017)
V. Kalpana, S. Karthik, Route availability with qoe and qos metrics for data analysis of video stream over a mobile ad hoc networks. Wirel Pers Commun 6, 110 (2020)
J. Tang, C. Ma, P. Tian, Network availability evaluation based on markov chain of qosaware. Wirel Pers Commun 113(12), 5520 (2020)
S. Du, E. Zio, R. Kang, A new analytical approach for interval availability analysis of Markov repairable systems. IEEE Trans Reliab 67(1), 118–128 (2018)
L. Yanli, Y. Yixin, An effective method to formulate state transition probability matrix of Markov model of largescale system. J Tianjin Univ Technol 46(9), 791–798 (2017)
X. Zheng, N. Huang, S. Yin, G. Wen, X. Zhang, A service deployment method considering application reliability of networks. IEEE Access 99, 1–1 (2021)
Network Centric Warfare, Department of Defense report to congress [R]. http://www.dod.mil/nii/NCW/
Z. Younis, M. Abdulazeez, Adnan & Zeebaree, Subhi & Zebari, Rizgar & Zeebaree, Qader., Mobile ad hoc network in disaster area network scenario a review on routing protocols. Int J Online Biomed Eng 17, 49–75 (2021). https://doi.org/10.3991/ijoe.v17i03.16039
H. Kumar et al., Study and design of route repairing mechanism in MANET. Des Framew Wirel Netw (2020). https://doi.org/10.1007/9789811395741_6
A. Banerjee, S. Ghosh, WEEP: Weight based energy effective priority scheduling of data packets in mobile adhoc networks. Int J Inf Technol 11(3), 435–443 (2019). https://doi.org/10.1007/s4187001802465
S.S. Adarshpal, W. Lingfang, The practical OPNET user guide for computer network simulation (China Machine Press, Xi’an, 2014)
Q. Liang, Y. Yang, H. Zhang, C. Peng, J. Lu, Analysis of simplification in markov statebased models for reliability assessment of complex safety systems. Reliab Eng Syst Saf 2, 221 (2022)
C. Cheng, J. Yang, L. Li, Reliability evaluation of a koutofn(g)subsystem based multistate phased mission system with common bus performance sharing subjected to common cause failures. Reliab Eng Syst Saf 216, 550 (2021)
Funding
This research was supported by the Shannxi S&T under Grant (2021KW07) and 2022QFY0114, projects of NationalLocal Joint Engineering Laboratory of Advanced Network and Monitoring Control.
Author information
Authors and Affiliations
Contributions
Y.L, Y.C and Y.F have contributed the theoretical and modeling part of this paper, result analysis and completed the writing of the paper. J.L, N.F, Q.G designed and completed the experiment. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Lu, Y., Chen, Y., Liu, J. et al. A network business availability modeling method based on Markov chain. J Wireless Com Network 2022, 72 (2022). https://doi.org/10.1186/s1363802202154y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363802202154y