Method for Finding Protected Nodes for Robust Network against Node Failures

被引:2
|
作者
Matsui, Tomomi [1 ]
Miwa, Hiroyoshi [1 ]
机构
[1] Kwansei Gakuin Univ, Grad Sch Sci & Technol, 2-1 Gakuen, Sanda, Hyogo 6691337, Japan
来源
2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS) | 2014年
关键词
Quality of service; Node failure; Node attack; Node protection; Network design; Optimization; NP-hard; Approximation algorithm; Polynomial-time Algorithm;
D O I
10.1109/INCoS.2014.79
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The reliability of a communication network is important, as the Internet is an important social infrastructure. However, especially in a large network, it is difficult to avoid the failures due to various factors. It is necessary to design a network that keeps communication among nodes even during failures. However, in many actual networks, there exists the risk of telecommunication blackout by a node failure or attack. To get rid of this risk, it is necessary to design a network so that many nodes can communicate mutually even if nodes fail. It is desirable that all nodes have their backup facility, but it needs much cost; therefore, at least critical nodes whose failures fragment a network to many small connected components must be protected by backup facility. We addressed a problem to determine protected nodes such that, even if non-protected nodes fail, the minimum size of the connected components of a remaining network is not less than a threshold. In this paper, we propose an approximation algorithm with the approximation ratio of two for the problem restricted to the case that at most two nodes simultaneously fail. Moreover, we evaluate the performance of the approximation algorithm by using actual network topologies.
引用
收藏
页码:378 / 383
页数:6
相关论文
共 50 条
  • [31] Finding robust influential seeds from networked systems against structural failures using a niching memetic algorithm
    Wang, Shuai
    Tan, Xiaojun
    APPLIED SOFT COMPUTING, 2023, 136
  • [32] Robust facility location: Hedging against failures
    Hernandez, Ivan
    Ramirez-Marquez, Jose Emmanuel
    Rainwater, Chase
    Pohl, Edward
    Medal, Hugh
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2014, 123 : 73 - 80
  • [33] Detecting Protected Links to Keep Reachability to Server against Failures
    Imagawa, Koji
    Miwa, Hiroyoshi
    2013 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2013,
  • [34] Two-Stage Robust Distribution Network Reconfiguration Against Failures of Lines and Renewable Generations
    Zhang, Zhi
    Du, Weizhu
    Lu, Yi
    Xu, Guangda
    Zhao, Yuan
    IEEE ACCESS, 2022, 10 : 108614 - 108624
  • [35] Robust Network Routing under Cascading Failures
    Savla, Ketan
    Como, Giacomo
    Dahleh, Munther A.
    2014 IEEE 53RD ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2014, : 2889 - 2894
  • [36] Robust Network Routing under Cascading Failures
    Savla, Ketan
    Como, Giacomo
    Dahleh, Munther A.
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2014, 1 (01): : 53 - 66
  • [37] Robust data Replication Algorithm for MANETs with Obstacles and Node Failures
    Detti, Andrea
    Bracciale, Lorenzo
    Fedi, Francesco
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [38] Protecting Against Emerging Vmin Failures in Advanced Technology Nodes
    Lee, J. K. Jerry
    Haggag, Amr
    Eklow, William
    2014 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2014,
  • [39] Robust Network Flow Against Attackers with Knowledge of Routing Method
    Suppakitpaisarn, Vorapong
    Dai, Wenkai
    Baffier, Jean-Francois
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (HPSR), 2015, : 40 - 47
  • [40] Cutset enumeration of network systems with link and node failures
    Fard, NS
    Lee, TH
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 1999, 65 (02) : 141 - 146