Method for Finding Protected Nodes for Robust Network against Node Failures

被引:2
|
作者
Matsui, Tomomi [1 ]
Miwa, Hiroyoshi [1 ]
机构
[1] Kwansei Gakuin Univ, Grad Sch Sci & Technol, 2-1 Gakuen, Sanda, Hyogo 6691337, Japan
来源
2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS) | 2014年
关键词
Quality of service; Node failure; Node attack; Node protection; Network design; Optimization; NP-hard; Approximation algorithm; Polynomial-time Algorithm;
D O I
10.1109/INCoS.2014.79
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The reliability of a communication network is important, as the Internet is an important social infrastructure. However, especially in a large network, it is difficult to avoid the failures due to various factors. It is necessary to design a network that keeps communication among nodes even during failures. However, in many actual networks, there exists the risk of telecommunication blackout by a node failure or attack. To get rid of this risk, it is necessary to design a network so that many nodes can communicate mutually even if nodes fail. It is desirable that all nodes have their backup facility, but it needs much cost; therefore, at least critical nodes whose failures fragment a network to many small connected components must be protected by backup facility. We addressed a problem to determine protected nodes such that, even if non-protected nodes fail, the minimum size of the connected components of a remaining network is not less than a threshold. In this paper, we propose an approximation algorithm with the approximation ratio of two for the problem restricted to the case that at most two nodes simultaneously fail. Moreover, we evaluate the performance of the approximation algorithm by using actual network topologies.
引用
收藏
页码:378 / 383
页数:6
相关论文
共 50 条
  • [21] Computation for network reliability with node failures
    Northeastern Univ, Shenyang, China
    Dongbei Daxue Xuebao, 5 (562-564):
  • [22] A Robust Cooperative Spectrum Sensing Method against Faulty Nodes in CWSNs
    Men, Shaoyang
    Charge, Pascal
    Pillement, Sebastien
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 334 - 339
  • [23] Robust quantum state transfer with topologically protected nodes
    Chang, Yanlong
    Xue, Jiaojiao
    Han, Yuxiang
    Wang, Xiaoli
    Li, Hongrong
    PHYSICAL REVIEW A, 2023, 108 (06)
  • [24] A Mobile Sensor Control Method Considering Node Failures in Sparse Sensor Network
    Shinjo, Tatsuya
    Kitajima, Shinya
    Ogawa, Takefumi
    Hara, Takahiro
    Nishio, Shojiro
    CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2, 2009, : 1054 - +
  • [25] Robust Network Tomography in the Presence of Failures
    Tati, S.
    Silvestri, S.
    He, T.
    La Porta, T.
    2014 IEEE 34TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2014), 2014, : 481 - 492
  • [26] Algorithms for Finding Robust and Sustainable Network Flows against Multilink-Attack
    Baffier, Jean-Francois
    Suppakitpaisarn, Vorapong
    2015 7TH INTERNATIONAL WORKSHOP ON RELIABLE NETWORKS DESIGN AND MODELING (RNDM) PROCE4EDINGS, 2015, : 251 - 258
  • [27] Robust Multi-Resource Allocation Against Controller Failures in Network Slice Provisioning
    de lara, Laiza
    Fossati, Francesca
    Rovedakis, Stephane
    PROCEEDINGS OF THE 2022 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (IEEE CLOUDNET 2022), 2022, : 28 - 33
  • [28] How to Make the Preconditioned Conjugate Gradient Method Resilient Against Multiple Node Failures
    Pachajoa, Carlos
    Levonyak, Markus
    Gansterer, Wilfried N.
    Traeff, Jesper Larsson
    PROCEEDINGS OF THE 48TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING (ICPP 2019), 2019,
  • [29] A new model of network cascading failures with dependent nodes
    Zhou, Jian
    Huang, Ning
    Sun, Xiaolei
    Wang, Kunlong
    Yang, Hongqi
    2015 61ST ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM (RAMS 2015), 2015,
  • [30] Robust Communication Against Femtocell Access Failures
    Simeone, Osvaldo
    Erkip, Elza
    Shamai, Shlomo
    2009 IEEE INFORMATION THEORY WORKSHOP (ITW 2009), 2009, : 263 - 267