<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Method of operational monitoring of technical condition of multiservice communication network on the basis of hierarchical fuzzy inference</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>S А Аgeev</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>А А Gladkikh</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>D V Мishin</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>А А Privalov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Emperor Alexander I St. Petersburg state transport university</institution>
          ,
          <addr-line>9 Moskovsky pr., Saint Petersburg, Russia, 190031</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Povolzhskiy State University of Telecommunications and Informatics</institution>
          ,
          <addr-line>L. Tolstoy str., 23, Samara, , Russia 443010</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Radioavionica corporation</institution>
          ,
          <addr-line>PO Box 111, Saint-Petersburg, Russia, 190103</addr-line>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Ulyanovsk state technical university</institution>
          ,
          <addr-line>Severnyy Venets 32, Ulyanovsk</addr-line>
          ,
          <country country="RU">Russia 432027</country>
        </aff>
      </contrib-group>
      <fpage>211</fpage>
      <lpage>221</lpage>
      <abstract>
        <p>The paper proposes a method of operational monitoring of the technical condition of network elements of a multiservice communication network, based on the use of hierarchical fuzzy inference. The proposed method can be implemented in the creation of operational decision support systems for the management of multiservice communication networks. The analysis of the results of numerical simulation of the proposed method, which showed its high efficiency. The necessity of implementation of the proposed method based on the application of the concept of intelligent agents is substantiated. The functional structure of the intelligent agent for the implementation of operational functional monitoring of the technical condition of network elements of a multiservice communication network is developed. On the basis of the results of the assessment of the required performance, the possibility of hardware and software implementation of the proposed method and algorithm, which allows to monitor the technical condition in a time close to real time, is shown.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Any multiservice communication network (MСN) is a large, complex, heterogeneous, hierarchical and
geographically distributed system. The property of reliability for MСN is one of the main
characteristics providing effective application of MСN on purpose [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>With the increase in the size of the MCN, the increasing complexity of the telecommunications
equipment used and the expansion of the list of communication services provided, the task of effective
management of the MCN becomes much more difficult. Network administrators, which depend on the
quality and reliability of the MCN, as a rule, have a fairly small time resource to analyze the current
situation and develop control solutions to eliminate failures or failures in the network equipment. In
addition, they have to make decisions in conditions of incomplete information about the technical
condition of the network elements.</p>
      <p>All this leads to a discrepancy between the physical and functional capabilities of the operator or
decision-maker (DM), the increasing complexity of the tasks that need to be solved to maintain the
network in working condition. Thus, the development and implementation of elements of the
intelligent system of operational decision support (SODS) for the operational monitoring of the
technical condition of the elements of the MCN is an urgent scientific and technical problem.</p>
      <p>
        The variety of the main parameters and characteristics of the MCN, the high dynamics of their
changes, their different physical nature, determines the complexity of solving the problem of
operational monitoring of the state of network elements (NE) in the MCN by traditional methods, for
example, statistical [
        <xref ref-type="bibr" rid="ref16 ref5 ref6">5, 6, 16</xref>
        ].
      </p>
      <p>This article proposes a method of operational monitoring of the technical condition of the NE in
MCN, based on the use of the mechanism of hierarchical fuzzy inference. In the proposed approach,
the use of methods and algorithms for intelligent data processing is due to the following
circumstances: (1) uncertainty of the reasons that may be caused by failures and changes in the
technical condition of nodes and communication channels; (2) incomplete information on the state of
the NE and the MCN as a whole, which is subject to processing; (3) the time delay of transmission of
data on the functional state of the NE to the processing units.</p>
      <p>
        As it is known [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ], operational support of decision-making under uncertainty is the solution of a
set of semi-structured or unstructured problems in terms of time constraints on their solution. The
characteristic features of such problems are the lack of methods for solving them on the basis of direct
data transformation. Thus, decisions must be made in the absence of complete information about the
process, phenomenon, event, etc.
      </p>
      <p>The main way to resolve the contradictions is to abandon the traditional requirements for the
accuracy of the input data, on the basis of which further analysis is carried out. Such requirements are
an essential attribute of rigorous mathematical analysis and solving well-defined problems. However,
the application of fuzzy set theory methods, fuzzy inference methods in conjunction with the methods
of logical analysis in the aggregate allows to implement adequate methods of operational decision
support under uncertainty.</p>
      <p>The novelty and theoretical contribution of the work are as follows: (1) a method of hierarchical fuzzy
inference for the identification of the functional and technical state of the NE MCN; (2) a modification
of the method of subtractive (mountain) clustering for the analysis of the technical state of the
processor module NE MCN; (3) the implementation of the developed methods of operational decision
support regarding the technical state of the NE, proposed on the basis of the concept of intelligent
agents (IA). Suggested approach allows to identify maintenance factors NE which have no property of
statistical stability.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Statement of the problem research</title>
      <p>The process of functioning of the restored NE MCN can be represented as a sequence of time intervals
of working States and downtime, including failures and recovery of elements. The length of these
intervals is determined by various factors. In the first approximation, the intervals can be considered
mutually independent random variables having a certain distribution with average times. The mean
time between failures T0 is calculated as</p>
      <p>n
T0   ti /n.</p>
      <p>i 1
The average recovery time T1 is calculated according to the expression:</p>
      <p>n
T1   τi /n. (2)</p>
      <p>i 1</p>
      <p>The reliability of the NE MCN is defined as the probability of finding NE in working condition. It
is equal to the mathematical expectation of the fraction of time during which the NE is in good
condition. This definition is equivalent to the concept of availability factor KГ. In this case, the
following expression is true:
or (for a communication line):</p>
      <p>K Г  T0 /(T0  T1 ),</p>
      <p>K Г  μ /(μ  λ),
(1)
(3)
(4)
where: λ = 1 / Т0 – is the failure rate of the equipment; µ = 1 / Т1 – is the recovery rate of the
equipment.</p>
      <p>Analysis of expressions (3) and (4) shows that the increase in the value of KГ corresponds to a
decrease in the recovery time of the object of control T1 , which, in turn, can be represented as follows:
T1  tdet  tev  tdes tex min,
(5)
where: tdet – is time of detection of deviation from the normative mode of functioning; tev – is time of
an assessment of a new situation concerning a condition of the controlled NE; tdes – is time of
development and decision – making; tex – is time of implementation of the decision.</p>
      <p>Thus, the formulation of the problem for the SODS is to develop a solution for the management of
the state of the NE MCN, which fulfilled the condition (5). The solution implementation time is
determined by the technical characteristics of the operations support subsystem (OSS).</p>
    </sec>
    <sec id="sec-3">
      <title>3. The analysis of the problem</title>
      <p>
        Currently, the solution of the tasks of monitoring the technical condition of the NE is implemented in
the MCN on the basis of the concept "agent – manager", which is discussed in detail in [
        <xref ref-type="bibr" rid="ref2 ref3 ref4">2-4</xref>
        ].
According to this concept, the agent previously accumulates information about the current state of the
NE, and then transmits it to the manager. The Manager, in turn, provides it in a convenient form to the
network administrator. This approach implements the "discovery – information" paradigm.
Management of NE is implemented by the network administrator. Statistical methods are used in the
basis of known and implemented in practice approaches to monitoring the state of NE [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        In some works, to reduce a priori uncertainty and reduce the reaction time to changes in the state of
NE, it is proposed to use intelligent methods [
        <xref ref-type="bibr" rid="ref10 ref7 ref8 ref9">7-10</xref>
        ]. In this case, the discovery – solution paradigm is
implemented. In a number of works it is proposed to use neural network methods to monitor the state
of the network [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ]. In work [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] the dynamic evolutionary system with fuzzy logic realizing
adaptive training in the mode of time close to real is considered. However, taking into account the
variety of the estimated parameters, in the known works on monitoring the state of NE, the elements
of SODS that implement the methods of making optimal and rational decisions are given insufficient
attention. At the same time, the experience of application of fuzzy inference mechanisms for
decisionmaking on detection of abnormal behavior and safety risk management in the MSS, given in [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ],
suggests the legitimacy of the idea of its use for operational monitoring of the state of the NE in the
MCN.
      </p>
      <p>
        The theoretical basis of hierarchical fuzzy situational networks can be the basis for the practical
implementation of methods of operational control of the technical condition of the NE MCN [
        <xref ref-type="bibr" rid="ref10 ref14 ref15 ref16 ref7 ref8 ref9">7 – 10,
14 - 16</xref>
        ]. However, such categories as reference fuzzy situations are used for decision-making in
known methods. With the growth of the network size and, accordingly, with the growth of its
dimension, the application of this approach becomes extremely difficult, and often impossible. To
solve the problem, it is proposed to combine hierarchical methods for assessing the fuzzy situation of
the technical state of the network element of fuzzy mathematical programming methods. Using the
methods of fuzzy mathematical programming it is proposed to search for a rational management
decision.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Method of evaluating the condition of the ne in the mcn</title>
      <p>Let the input variables characterizing the state of NE in MCN take the form of linguistic input
variables after the fuzzification unit of the Mamdani fuzzy inference machine and are given in the
following form:</p>
      <p>
        x,T,U,G, M
where: x is the variable name; T – term set, each element of which specifies a fuzzy set to the universal
set U; G – syntactic rules that generate the membership functions of the names of terms; M is the
semantic rule that defines the membership function of the fuzzy terms generated by the syntax rules of
(6)
G. Fuzzy inference for the formation of estimates of the state of NE in MCN based on the method of
fuzzy inference Mamdani has the following form [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]:
      </p>
      <p>(x1  a1 j j ... j xn  anj )  wj  y j d j, j  1,...,m (7)
where: aij – fuzzy term, which evaluates the variable xi in the j-th rule of the knowledge base; dj –
conclusion of the j-th rule; m – the number of rules in the knowledge base; wj – weights for each j – th
rule of the knowledge base (wj  1);  j – logical operation, linking parcels in the j-th rule of the
knowledge base. As a result of the operation of defuzzification of the fuzzy set Y, which can be carried
out, for example, using the method of determining the center of gravity, a clear value of the output y is
obtained.</p>
      <p>Summarizing the above results, it is proposed to assess the current situation of the state of the
control object to implement the mechanism of fuzzy inference, which has a hierarchical structure. An
example of implementing such a structure as an IA is shown in figure 1. The same figure shows a
variant of IA interaction with a NE. In the presented structure, the number of hierarchical levels is
conditional and can be changed in accordance with the solution of a specific problem. Each
hierarchical level in its composition contains fuzzy inference machines. NE, for example, a router, in
figure 1 is represented as a set of hardware, operating system, application software and network
element management system. NE operates as part of the MCN and communicates with IA regarding
procedures for operational decision support.</p>
      <p>IA functionally consists of a situation assessment module, a decision-making module, a module for
solving information and computational problems. The peculiarity of the structure of IA is the absence
of intermediate operations of defuzzification and fuzzification. These operations are performed at the
input and output of the SODS.</p>
      <p>The inputs of fuzzy logic output machines of the first level of the hierarchy receive feature vectors
{Xi} of each controlled functional group of parameters that determine the technical condition of the
NE.</p>
      <sec id="sec-4-1">
        <title>STRUCTURE OF NETWORK</title>
      </sec>
      <sec id="sec-4-2">
        <title>ELEMENT</title>
        <sec id="sec-4-2-1">
          <title>APPLICATION-DEPENDENT</title>
        </sec>
        <sec id="sec-4-2-2">
          <title>SOFTWARE</title>
          <p>E
N
F
O
M
E
T
SSY OPERATING SYSTEM
G
N
I</p>
        </sec>
      </sec>
      <sec id="sec-4-3">
        <title>LLO HARDWARE COMPONENT</title>
        <p>R
T
NO NETWORK ELEMENT</p>
        <sec id="sec-4-3-1">
          <title>C «MULTIPROTOCOL ROUTER»</title>
        </sec>
        <sec id="sec-4-3-2">
          <title>COMMNDS OF CONTROL NE</title>
          <p>1
ABONENT
ABONENTS
SDBMS
SCS
SERR
SPR</p>
        </sec>
      </sec>
      <sec id="sec-4-4">
        <title>SCOM</title>
      </sec>
      <sec id="sec-4-5">
        <title>SSYS SD SR</title>
        <sec id="sec-4-5-1">
          <title>INTELLIGENT AGENT</title>
        </sec>
        <sec id="sec-4-5-2">
          <title>Sgen3</title>
          <p>Sgen1</p>
        </sec>
        <sec id="sec-4-5-3">
          <title>Sgen2</title>
        </sec>
        <sec id="sec-4-5-4">
          <title>Sgen</title>
          <p>Sel
MODULE OF SITUATION
ASSESSMENT</p>
        </sec>
      </sec>
      <sec id="sec-4-6">
        <title>CONTROL</title>
        <p>ABONENTS</p>
        <sec id="sec-4-6-1">
          <title>DOMAIN MCN</title>
          <p>N
O
I
S
I
FLEDUOOM ISTLNUOO -IIFTARNNOOM ISPTTNUACGKOM</p>
          <p>At the output of the hierarchical layer, a set of estimates of the fuzzy situation {Si} of the SE state
with respect to each functional group of parameters is formed. The next level of the hierarchy
aggregates these estimates.</p>
          <p>
            It should be noted that it is possible to use a variant of the hierarchical structure of the NE state
assessment process based on cluster analysis methods [
            <xref ref-type="bibr" rid="ref14 ref16">14, 16</xref>
            ]. This structure can be used for a large
number of input variables characterizing the technical condition of the NE. Such an approach can be
used, for example, to control the performance of the solution of a set of application tasks by the
processor module of a network element. As the main clustering methods, it is advisable to choose the
method of subtractive clustering, if a priori the number of possible clusters is unknown [
            <xref ref-type="bibr" rid="ref14">14</xref>
            ].
          </p>
          <p>The fuzzy situation of the state of NE is formed in the following form:</p>
          <p>S NiE  F1 ({S ifg},{X ifg}, Rifg ) ,. (8)
Where S NiE
– fuzzy situation of NE state; F – aggregation operator; {S ifg} – set of fuzzy situations
1
of states of controlled functional groups of NE; {X ifg} – set of fuzzy parameters of states of
controlled functional groups of NE; Rifg – set of functional and technological resources of NE.</p>
          <p>Then the solution for the management of the NE would be:</p>
          <p>RsliNE  Fsil NE (S NiE , {X ifg}, Rifg ) ,
where: RsliNE
i
– the decision for management of NE; Fsl NE
management of the NE.</p>
          <p>On the basis of the proposed approach, the method of monitoring of the technical condition of the
NE model can be represented in the form of the generalized algorithm having the following form:
STEP 1. «BEGINNING»;
STEP 2."Monitoring of the technical condition of NE»;
STEP 3."Formation of values of fuzzy situations for each controlled functional group of NE»;
STEP 4."If (Sifg )  (Sifg0 )  i, the functioning of the NE staff»;</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>STEP 5."If</title>
      <p> i,(Sifg доп )  (Sifg )  (Sifg0 ) ,the technical condition of the SE has deteriorated,
but is acceptable»:</p>
      <p>ACTION: "Preparing a solution for the case of further deterioration of the situation, the request for
additional resources from a higher level of management»;</p>
      <p>STEP 6."If  i,(Sifg доп )  (Sifg ) , the technical condition of the SE has deteriorated, operation is
impossible."</p>
      <p>ACTION: "Solution for the case of NE failure, request an additional resource from a higher level
of management, redistribution of resources between other NE, if the resource is received, the
restoration of NE, if not, the output of NE from the network. NE restored ? YES – continue
monitoring. Go to step 2. NO – go to step 7»;</p>
      <p>STEP 7. «END».</p>
      <p>There are two options for making a decision:
1. The decision is made by the IA directly on the NE itself, and the higher level of management,
for example, the network administrator, is only notified of the decision. This is possible if the
authority of the SODS is delegated to a higher level.
2. The decision, as in the first case, is made by the IA, but is verified and can be adjusted by a
higher level of management, taking into account its preferences.</p>
      <p>The proposed SODS inherit the features of multi-agent systems. These include the following
properties:
– the statement of decision on
(9)
1. System agents adapt to the network architecture and adequately respond to changes in the
configuration of network equipment.
2. IA is distributed evenly across all of the NE in MCN, which allows to rationally (optimally)
allocate computing resources.
3. Failure of one IA part of its functions themselves can take other IA.
4. The high degree of information security. The security subsystem does not have a dedicated
control center, since the agents are distributed evenly throughout the system; therefore, it is
more difficult to attack the MCN than the network with a centralized security server.
Distributed information and distributed protection require an attacker to attack many nodes at
the same time.
5. Possibility of centralized management. Changes in agents can be produced centrally and
interaction protocols of agents be transferred to any point of safety.</p>
      <p>Figure 2 shows the proposed modified algorithm of subtractive (mining) clustering of the
evaluation of the technical condition of the processor module NE.</p>
      <p>MONITORING</p>
      <p>DATA
2</p>
      <p>Start</p>
      <p>Impute basic data
-Package of status flag NE
X J  {x j }, j  1,N ,i  1,M;
I -IPSiec algorithm preference {α β,ε, Rk , P0 }
where a, β &gt; 0, ε - parameter setting algorithm accuracy</p>
      <p>Initial determination of quantity of clusters</p>
      <p>D=N×M
Initial determination of capacities centers clusters:</p>
      <p>M
P(Wm)k1exp(αR(W ,X )),where R(W ,X ) (WmXk )2,α0</p>
      <p>m k m k
Ranging of capacities centers clusters:</p>
      <p>P(W)  max {P (Wm )}, m</p>
      <p>Recalculation of centers clusters:
Pi1(W)  Pi (Wm ) - Pi (Vi ) exp(- R(Wm ,Vi )),
Vi  argmax {Pi (Vk )}, k  1, D ,m</p>
      <p>no</p>
      <p>Pi (Wn)P0?
yes
result Ci (xi , yi )
1
i = i + 1
no
no
1
xi &lt; xд &amp; yi &lt; ya ?
yes
ДА
yi &lt; y = kxi ?
Creation of a perpendicular:
yp = -x(xa/ya) + (xa/ya )xi + yi
The coordinate of crossing
forming and a perpendicular:</p>
      <p>xn = (k/k2 +1)(xi/k +yi);
yn = (k2 /k2 +1)(xi/k +yi); k=ya/xa</p>
      <p>calculation h = ya - yi
d  (xi  xn )2 (yi  yn )2
Indistinct logical conclusion of</p>
      <p>Mamdani: d, h
assessment of TS</p>
      <sec id="sec-5-1">
        <title>To continue?</title>
        <p>no
end
yes</p>
        <p>Features of functioning of the modified algorithm of subtractive (mountain) clustering of an
assessment of a technical condition of the processor module of NE are explained in figure 5 and
consist in the following. After clustering and obtaining the coordinate values of the cluster centers
Ci (xi, yi), the distances from these centers to the corresponding permissible and unacceptable zones of
the phase plane are estimated, on the basis of which, using the fuzzy inference method of Mamdani, a
decision is made about the current technical condition of the processor module NE.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Analysis of the results of numerical simulation</title>
      <p>For numerical simulation as an example was chosen SE "ROUTER" (figure 1). n the numerical
experiment, the state of SE was estimated by the following functional parameters (FP):
1. Electrical parameter;
2. Performance of application tasks;
3. The status of the software.</p>
      <p>As an example, figures 3 and 4 present the characteristics of the fuzzy inference system to assess
the fuzzy situation on the electrical parameters of the NE.</p>
      <p>fault adm norm adm
fault
norm
adm
fault</p>
      <p>Input variable
a) FP «power supply» parameter</p>
      <p>Input variable
b) FP of the «attenuation» parameter
fault
adm norm adm
fault
fault
adm
norm</p>
      <p>Input variable
с) FP parameter «interface resistance»</p>
      <p>Input variable
d) FP values of fuzzy situation Sпит
a) FP «power supply – attenuation »</p>
      <p>Power supply Interface resistance
b) FP «power supply – interface resistance»
c)</p>
      <p>
        Without loss of generality, in this computational experiment all membership functions are
represented by trapezoidal functions. This is due to the simplicity of their practical implementation.
Conducted various studies confirm their acceptable approximation properties [
        <xref ref-type="bibr" rid="ref15 ref17">15, 17</xref>
        ].
      </p>
      <p>Figure 5 shows examples of joint operation of the functional modules "Attenuation", "Processor
Temperature" and "Power Supply voltage" in the time domain.</p>
      <p>On the upper and middle graph the digits " 1 "denote the permissible level of the controlled
parameter value, and the digits" 2 " denote their critical values. These levels are determined by a
sections of the corresponding membership functions.</p>
      <p>The lower figure shows a graph of the value of the FLAG parameter. If the situation is normal, the
value "FLAG" is 0. If the situation worsens but is acceptable, the value of the FLAG parameter is 1. If
the situation is invalid, the " FLAG " is 2.</p>
      <p>and "Supply Voltage" in the time domain.</p>
      <p>
        A modified method of subtractive clustering is used to evaluate the performance of solving applied
problems (figure 2). The properties of this method in solving applied problems have been studied in
detail in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Here we note only its features when it is used to assess the technical condition of the
processor module SE.
      </p>
      <p>Time for solving applied problems in the time slot allocated by the task Manager can be
represented as:</p>
      <p>N</p>
      <p>TN  i1(Tож i  Tдост i  Tреш i ) ,. (10)
where: Tож i – the time of loading the parameters of the i - th task in the cache memory of the
processor; Tдост i – processor access time to the cache memory; T реш i – the time of the i-th task.</p>
      <p>The number of operations performed by the processor is:</p>
      <p>N</p>
      <p>M  i1(Vi  T реш i ) ,. (11)
whereVi – the speed of the processor. Then the performance is equal to M/TN . How can we see that
the performance of the problem is a random variable.</p>
      <p>During the computational experiment the average relative error of cluster centers estimation δ≤ 7%
was obtained. Figure 7 shows examples of membership functions of the fuzzy inference algorithm
Mamdani to assess the technical condition of the processor module.</p>
      <p>fault
adm
norm
adm
norm
а) The FP parameter d
fault
adm</p>
      <p>norm
45
40
30
k
s
a
t
in20
e
m
i
t
10
00</p>
      <p>Area С
μ(d)
μ(r)
ceanntaelryssiscloufsater T2</p>
      <p>Area В</p>
      <p>T1</p>
      <p>30
productivity
a)
d
fault</p>
      <p>Area С
y1=kx
d1d2h1</p>
      <p>C1(x1, y1)
y2=kx - b,</p>
      <p>b &gt; 0
10
20</p>
      <p>AreaВ
analysis of a
centers cluster
ya
</p>
      <p>h2</p>
      <p>C2
Area А
b)</p>
      <p>xa
30
productivity
40
true center of a
cluster</p>
      <p>xд
50</p>
      <p>55
h
b) The FP parameter h
h
d
c) The output FP
d) The joint distribution FP parameters d и h</p>
      <p>Table 1 shows the results of a computational experiment to assess the technical condition of the
processor module. The analysis showed that at the time of obtaining the solution no more than 1 MS
(10-3 seconds) when implementing the IA on FPGA, taking into account the possible parallelization of
the computational procedures, the computational performance of 0.18 Mgfl/s is required. When
implemented on a unified processor - 0.6 Mgfl/s. These results allow us to conclude about the
possibility of implementing the proposed methods and algorithms both on universal processors and on
the basis of FPGA technology.</p>
      <p>The data obtained in the numerical experiment indicate the high efficiency of the proposed methods
for assessing the state of SE based on the model of a typical functional element. The proposed
algorithms operate in the time mode, close to real.</p>
    </sec>
    <sec id="sec-7">
      <title>6. Conclusion</title>
      <p>On the basis of the analysis of methods to ensure the reliability of the MSS formulated the task of
operational monitoring of the NE.</p>
      <p>On the basis of the proposed mechanism of fuzzy hierarchical inference, an algorithm for
operational monitoring of the state of NE was developed.</p>
      <p>The analysis of the results of the experimental evaluation of the developed algorithm showed its
high efficiency. The accuracy and reliability of the algorithm for assessing the state of NE is
determined by the characteristics of the primary sources of the analyzed information.</p>
      <p>The developed hardware and software for a research of the offered methods and algorithms allows
to carry out the analysis of experimental results for the wide range change parameters of functioning
technical condition for NE MCN.</p>
      <p>The direction of further research is associated with the use of fuzzy inference for decision-making on
the management of MCN.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>“</surname>
          </string-name>
          ITU-T:
          <article-title>General principles and general reference model for Next Generation Networks</article-title>
          . Recommendation
          <string-name>
            <surname>Y.</surname>
          </string-name>
          <year>2011</year>
          ”, Geneva,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2] “RFC 1450.
          <article-title>Management Information Base for version 2 of the Simple Network Management Protocol (SNMP v2)”</article-title>
          , IETF, April,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Harrington</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Presuhn</surname>
          </string-name>
          , and
          <string-name>
            <surname>B. Wijnen.</surname>
          </string-name>
          “
          <article-title>An Architecture for Describing SNMP Management Fremeworks”</article-title>
          , IETF, April,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4] “RFC 1450.
          <article-title>Management Information Base for version 2 of the Simple Network Management Protocol (SNMP v2)”</article-title>
          , IETF, April,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Uy. Black.</surname>
          </string-name>
          “
          <article-title>Network management standards: SNMP, CMIP, TMN, MIBs</article-title>
          and Objects libraries”,
          <string-name>
            <surname>McGraw-Hill</surname>
            <given-names>Inc</given-names>
          </string-name>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.L.</given-names>
            <surname>Goel</surname>
          </string-name>
          . “
          <source>Software Reliability Models: Assumptions</source>
          , Limitations, and Applicability”,
          <source>IEEE Transactions on Software Engineering</source>
          , vol. SE-
          <volume>11</volume>
          , is. 12, pp
          <fpage>1411</fpage>
          -
          <lpage>1423</lpage>
          , Dec.
          <year>1985</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Zhang-Shen</surname>
          </string-name>
          and
          <string-name>
            <surname>N. McKeown.</surname>
          </string-name>
          “
          <article-title>Guaranteeing quality of service to peering traffic”</article-title>
          ,
          <source>Proc. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies (INFOCOM</source>
          <year>2008</year>
          ), IEEE Press,
          <year>Apr</year>
          .
          <year>2008</year>
          , pp.
          <fpage>1472</fpage>
          -
          <lpage>1480</lpage>
          , doi: 10.1109/INFOCOM.
          <year>2008</year>
          .
          <volume>206</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>E.</given-names>
            <surname>Mamdani</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Efstathion</surname>
          </string-name>
          . “
          <article-title>Higher-order logics for handling uncertainty in expert systems”</article-title>
          ,
          <source>Int. J. Man-Mach. Stud., no.3</source>
          , pp
          <fpage>243</fpage>
          -
          <lpage>259</lpage>
          ,
          <year>1985</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>E.</given-names>
            <surname>Mamdani</surname>
          </string-name>
          and
          <string-name>
            <surname>S. Assilian. “</surname>
          </string-name>
          <article-title>An Experiment in Linguiste Syntheses with Fuzzy Logic Controller”</article-title>
          ,
          <source>Int. Man-Machine Studies</source>
          , vol.
          <volume>7</volume>
          , no.
          <issue>1</issue>
          , pp
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          ,
          <year>1975</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Leung</surname>
          </string-name>
          , “
          <article-title>Impruved possibilistic c-means clustering algorithms”</article-title>
          ,
          <source>IEEE Transactions on Fuzzy Systems</source>
          , vol.
          <volume>12</volume>
          , pp
          <fpage>209</fpage>
          -
          <lpage>217</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Azruddin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Gobithasan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Rahmat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Azman</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Sureswaran</surname>
          </string-name>
          , “
          <article-title>A hybrid rule based fuzzy-neural expert system for passive network monitoring”</article-title>
          ,
          <source>Proc. of the Arab Conference on Information Technology (ACIT)</source>
          , pp
          <fpage>746</fpage>
          -
          <lpage>752</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>L.</given-names>
            <surname>Souza</surname>
          </string-name>
          and G. Barreto, “
          <article-title>Nonlinear system identification using local arx models based on the self-organizing map</article-title>
          .
          <source>Learning and Nonlinear Models”, Revista da Sociedade Brasileira de Redes Neurais (SBRN)</source>
          , vol.
          <volume>4</volume>
          , no.
          <issue>2</issue>
          , pp
          <fpage>112</fpage>
          -
          <lpage>123</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>N.</given-names>
            <surname>Kasabov</surname>
          </string-name>
          and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Song</surname>
          </string-name>
          , “DENFIS:
          <article-title>Dynamic Evolving Neuro-Fuzzy Inference System and Its Application for Time-Series Prediction”</article-title>
          ,
          <source>IEEE Transactions on Fuzzy Systems</source>
          , vol.
          <volume>10</volume>
          , no.
          <issue>2</issue>
          , pp
          <fpage>144</fpage>
          -
          <lpage>154</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>R.</given-names>
            <surname>Yager</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Filev</surname>
          </string-name>
          , “
          <article-title>Essentials of Fuzzy Modeling and Control”</article-title>
          , USA: John Wiley&amp;Sons,
          <year>1984</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>I.</given-names>
            <surname>Saenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ageev</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Kotenko</surname>
          </string-name>
          , “
          <article-title>Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference”, Intelligent Distributed Computing X. Studies in Computational Intelligence</article-title>
          , vol.
          <volume>678</volume>
          .
          <source>Proceedings of 10th International Symposium on Intelligent Distributed Computing - IDC'2016</source>
          , Paris, France,
          <source>October 10-12</source>
          ,
          <year>2016</year>
          , Springer International Publishing, doi: 10.1007/978-3-
          <fpage>319</fpage>
          -48829-
          <issue>5</issue>
          , pp
          <fpage>79</fpage>
          -
          <lpage>88</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>I.</given-names>
            <surname>Kotenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Saenko</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Ageev</surname>
          </string-name>
          , “
          <article-title>Countermeasure Security Risks Management in the Internet of Things based on Fuzzy Logic Inference”</article-title>
          ,
          <source>Proc. of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2015)</source>
          ,
          <source>The 13th IEEE International Symposium on Parallel and Distributed Processing with Applications</source>
          ,
          <volume>20</volume>
          -22
          <source>August</source>
          <year>2015</year>
          , Helsinki, Finland, pp
          <fpage>655</fpage>
          -
          <lpage>659</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Andrey</surname>
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Nikolaev</surname>
            , Yuliya S. Sapego,
            <given-names>Anatolij N.</given-names>
          </string-name>
          <string-name>
            <surname>Jakubovich</surname>
            ,
            <given-names>Leonid I. Bernerb</given-names>
          </string-name>
          and
          <string-name>
            <given-names>Victor</given-names>
            <surname>Yu</surname>
          </string-name>
          .
          <article-title>Stroganovc // Fuzzy Algorithm for the Detection of Incidents in the Transport System //</article-title>
          <source>International Journal of Environmental &amp; Science Education</source>
          ,
          <year>2016</year>
          , VOL.
          <volume>11</volume>
          , NO.
          <volume>16</volume>
          , p.
          <fpage>9039</fpage>
          -
          <lpage>9059</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>