Method for Finding Protected Nodes for Robust Network against Node Failures

被引:2
|
作者
Matsui, Tomomi [1 ]
Miwa, Hiroyoshi [1 ]
机构
[1] Kwansei Gakuin Univ, Grad Sch Sci & Technol, 2-1 Gakuen, Sanda, Hyogo 6691337, Japan
来源
2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS) | 2014年
关键词
Quality of service; Node failure; Node attack; Node protection; Network design; Optimization; NP-hard; Approximation algorithm; Polynomial-time Algorithm;
D O I
10.1109/INCoS.2014.79
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The reliability of a communication network is important, as the Internet is an important social infrastructure. However, especially in a large network, it is difficult to avoid the failures due to various factors. It is necessary to design a network that keeps communication among nodes even during failures. However, in many actual networks, there exists the risk of telecommunication blackout by a node failure or attack. To get rid of this risk, it is necessary to design a network so that many nodes can communicate mutually even if nodes fail. It is desirable that all nodes have their backup facility, but it needs much cost; therefore, at least critical nodes whose failures fragment a network to many small connected components must be protected by backup facility. We addressed a problem to determine protected nodes such that, even if non-protected nodes fail, the minimum size of the connected components of a remaining network is not less than a threshold. In this paper, we propose an approximation algorithm with the approximation ratio of two for the problem restricted to the case that at most two nodes simultaneously fail. Moreover, we evaluate the performance of the approximation algorithm by using actual network topologies.
引用
收藏
页码:378 / 383
页数:6
相关论文
共 50 条
  • [41] Cutset enumeration of network systems with link and node failures
    Fard, Nasser S.
    Lee, Tae-Han
    Reliability Engineering and System Safety, 1999, 65 (02): : 141 - 146
  • [42] Consideration of node failures in network-reliability calculation
    Netes, VA
    Filin, BP
    IEEE TRANSACTIONS ON RELIABILITY, 1996, 45 (01) : 127 - 128
  • [43] Direction Finding of a Compromised Node in a Wireless Network
    Torrieri, Don
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (09) : 1995 - 2002
  • [44] Network reliability with failures at nodes and arcs in terms of minimal cuts
    Lin, YK
    NINTH ISSAT INTERNATIONAL CONFERENCE ON RELIABILITY AND QUALITY IN DESIGN, 2003 PROCEEDINGS, 2003, : 92 - 96
  • [45] FINDING N MOST VITAL NODES IN A FLOW NETWORK
    CORLEY, HW
    CHANG, H
    MANAGEMENT SCIENCE SERIES A-THEORY, 1974, 21 (03): : 362 - 364
  • [46] A Robust Dynamic State Estimator Against Exciter Failures
    Rouhani, Alireza
    Abur, Ali
    2016 North American Power Symposium (NAPS), 2016,
  • [47] Robust Network Coding in the Presence of Untrusted Nodes
    Wang, Da
    Silva, Danilo
    Kschischang, Frank R.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (09) : 4532 - 4538
  • [48] Robust Traffic Sign Recognition Against Camera Failures
    Atif, Muhammad
    Ceccarelli, Andrea
    Zoppi, Tommaso
    Gharib, Mohamad
    Bondavalli, Andrea
    IEEE OPEN JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 3 : 709 - 722
  • [49] Robust reliable H∞ filtering against sensor failures
    Chen, Yuepeng
    Zhang, Qingling
    Zhang, Daqing
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2005, 12 : 316 - 324
  • [50] Design of redundant systems protected against common-mode failures
    Mitra, S
    McCluskey, EJ
    19TH IEEE VLSI TEST SYMPOSIUM, PROCEEDINGS, 2001, : 190 - 195