Skip to main content
Erschienen in: Journal of Computer and Systems Sciences International 4/2021

01.07.2021 | MATHEMATICAL MODELING

Analysis of Critical Damage in the Communication Network: III. Analysis of Internode Flows

verfasst von: Y. E. Malashenko, I. A. Nazarova

Erschienen in: Journal of Computer and Systems Sciences International | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Changes in the values of the maximal permissible flows that can be transmitted between nodes in the case of network damage are analyzed through computational experiments. At the initial stage, the maximal single-product flow is independently determined for each pair of source–sink vertices. The maximal flow vector is used to estimate the functional capability limit of the original, intact network. In the course of computational experiments, each damage from the given set is considered sequentially; for all source–sink pairs, the maximal flows in the damaged network are found. For each pair of nodes, all damage are determined for which the maximal flow is either zero or less than the permissible value. Based on the data obtained, diagrams of possible damage for all pairs of source–sink are formed. Computational experiments are carried out for networks with radial-ring structures and coincident sets of nodes. The resulting diagrams allow us to compare and find the most vulnerable pairs with nondominated vector damage estimates.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yu. E. Malashenko and I. A. Nazarova, “Analysis of critical damage in the communication network. I. Model and computational experiment,” J. Comput. Syst. Sci. Int. 59, 745 (2020).CrossRef Yu. E. Malashenko and I. A. Nazarova, “Analysis of critical damage in the communication network. I. Model and computational experiment,” J. Comput. Syst. Sci. Int. 59, 745 (2020).CrossRef
2.
Zurück zum Zitat Yu. E. Malashenko and I. A. Nazarova, “Analysis of critical damage in the communication network. II. Guaranteed functional performance estimates,” J. Comput. Syst. Sci. Int. 59, 918 (2020).CrossRef Yu. E. Malashenko and I. A. Nazarova, “Analysis of critical damage in the communication network. II. Guaranteed functional performance estimates,” J. Comput. Syst. Sci. Int. 59, 918 (2020).CrossRef
3.
Zurück zum Zitat Yu. B. Germeier, Introduction to the Theory of Operations Research (Nauka, Moscow, 1971) [in Russian]. Yu. B. Germeier, Introduction to the Theory of Operations Research (Nauka, Moscow, 1971) [in Russian].
4.
Zurück zum Zitat J. M. Danskin, The Theory of Max-Min and its Application to Weapons Allocation Problems (Springer, Berlin, 1967).CrossRef J. M. Danskin, The Theory of Max-Min and its Application to Weapons Allocation Problems (Springer, Berlin, 1967).CrossRef
5.
Zurück zum Zitat J. J. Cochran, L. A. Cox, Jr., P. Keskinocak, et al., Wiley Encyclopedia of Operations Research and Management Science (Wiley, New York, 2010).CrossRef J. J. Cochran, L. A. Cox, Jr., P. Keskinocak, et al., Wiley Encyclopedia of Operations Research and Management Science (Wiley, New York, 2010).CrossRef
6.
Zurück zum Zitat Yu. E. Malashenko, I. A. Nazarova, and N. M. Novikova, “Express analysis and aggregated representation of the set of reachable flows for a multicommodity network system,” J. Comput. Syst. Sci. Int. 58, 889 (2019).CrossRef Yu. E. Malashenko, I. A. Nazarova, and N. M. Novikova, “Express analysis and aggregated representation of the set of reachable flows for a multicommodity network system,” J. Comput. Syst. Sci. Int. 58, 889 (2019).CrossRef
7.
Zurück zum Zitat P. Jensen and W. J. Barnes, Network Flow Programming (Wiley, New York, 1980).MATH P. Jensen and W. J. Barnes, Network Flow Programming (Wiley, New York, 1980).MATH
8.
Zurück zum Zitat T. H. Grubesic, T. C. Matisziw, A. T. Murray, et al., “Comparative approaches for assessing network vulnerability,” Int. Region. Sci. Rev. 31, 88 (2008).CrossRef T. H. Grubesic, T. C. Matisziw, A. T. Murray, et al., “Comparative approaches for assessing network vulnerability,” Int. Region. Sci. Rev. 31, 88 (2008).CrossRef
9.
Zurück zum Zitat A. T. Murray, “An overview of network vulnerability modeling approaches,” Geo J. 78, 209–221 (2013). A. T. Murray, “An overview of network vulnerability modeling approaches,” Geo J. 78, 209–221 (2013).
10.
Zurück zum Zitat J. Johansson, “Risk and vulnerability analysis of interdependent technical infrastructures. Addressing sociotechnical systems,” Doctoral Thesis (Lund Univ., Lund, 2010). J. Johansson, “Risk and vulnerability analysis of interdependent technical infrastructures. Addressing sociotechnical systems,” Doctoral Thesis (Lund Univ., Lund, 2010).
11.
Zurück zum Zitat T. Gomes, C. Esposito, D. Hutchison, et al., “Survey of strategies for communication networks to protect against large-scale natural disasters,” in Proceedings of the International Workshop on Reliable Networks Design and Modeling RNDM, Halmstad, 2016, pp. 11–22. T. Gomes, C. Esposito, D. Hutchison, et al., “Survey of strategies for communication networks to protect against large-scale natural disasters,” in Proceedings of the International Workshop on Reliable Networks Design and Modeling RNDM, Halmstad, 2016, pp. 11–22.
12.
Zurück zum Zitat J. O. Royset and R. K. Wood, “Solving the bi-objective maximum-flow network-interdiction problem,” INFORMS J. Comput. 19, 175–184 (2007).MathSciNetCrossRef J. O. Royset and R. K. Wood, “Solving the bi-objective maximum-flow network-interdiction problem,” INFORMS J. Comput. 19, 175–184 (2007).MathSciNetCrossRef
13.
Zurück zum Zitat J. Walteros and P. Pardalos, “Selected topics in critical element detection,” Optimiz. Appl. 71, 9–26 (2012).MathSciNetMATH J. Walteros and P. Pardalos, “Selected topics in critical element detection,” Optimiz. Appl. 71, 9–26 (2012).MathSciNetMATH
14.
Zurück zum Zitat Yu. E. Malashenko, I. A. Nazarova, and N. M. Novikova, “An approach to the analysis of possible structural damages in multicommodity network systems,” Comput. Math. Math. Phys. 59, 1562 (2019).MathSciNetCrossRef Yu. E. Malashenko, I. A. Nazarova, and N. M. Novikova, “An approach to the analysis of possible structural damages in multicommodity network systems,” Comput. Math. Math. Phys. 59, 1562 (2019).MathSciNetCrossRef
15.
Zurück zum Zitat A. Veremyev, O. A. Prokipyev, and E. L. Pasiliao, “Critical nodes for distance-based connectivity and related problems in graphs,” Networks 66, 170–195 (2015).MathSciNetCrossRef A. Veremyev, O. A. Prokipyev, and E. L. Pasiliao, “Critical nodes for distance-based connectivity and related problems in graphs,” Networks 66, 170–195 (2015).MathSciNetCrossRef
16.
Zurück zum Zitat M. Ventresca, K. R. Harrison, and B. M. Ombuki-Berman, “The bi-objective critical node detection problem,” Eur. J. Oper. Res. 265, 895–908 (2018).MathSciNetCrossRef M. Ventresca, K. R. Harrison, and B. M. Ombuki-Berman, “The bi-objective critical node detection problem,” Eur. J. Oper. Res. 265, 895–908 (2018).MathSciNetCrossRef
17.
Zurück zum Zitat J. Li, P. M. Pardalos, B. Xin, and J. Chen, “The bi-objective critical node detection problem with minimum pairwise connectivity and cost: Theory and algorithms,” Soft Comput. 23, 1–16 (2019).CrossRef J. Li, P. M. Pardalos, B. Xin, and J. Chen, “The bi-objective critical node detection problem with minimum pairwise connectivity and cost: Theory and algorithms,” Soft Comput. 23, 1–16 (2019).CrossRef
18.
Zurück zum Zitat M. Lalou, M. A. Tahraoui, and H. Kheddouci, “The critical node detection problem in networks: A survey,” Comput. Sci. Rev. 28, 92–117 (2018).MathSciNetCrossRef M. Lalou, M. A. Tahraoui, and H. Kheddouci, “The critical node detection problem in networks: A survey,” Comput. Sci. Rev. 28, 92–117 (2018).MathSciNetCrossRef
19.
Zurück zum Zitat A. Kuhnle, N. P. Nguyen, T. N. Dinh, et al., “Vulnerability of clustering under nodes failure in complex networks,” Social Network Anal. Mining 7, 8–24 (2017).CrossRef A. Kuhnle, N. P. Nguyen, T. N. Dinh, et al., “Vulnerability of clustering under nodes failure in complex networks,” Social Network Anal. Mining 7, 8–24 (2017).CrossRef
20.
Zurück zum Zitat Yu. E. Malashenko, I. A. Nazarova, and N. M. Novikova, “Analysis of cluster damages in network systems,” Comput. Math. Math. Phys. 60, 341 (2020).MathSciNetCrossRef Yu. E. Malashenko, I. A. Nazarova, and N. M. Novikova, “Analysis of cluster damages in network systems,” Comput. Math. Math. Phys. 60, 341 (2020).MathSciNetCrossRef
21.
Zurück zum Zitat Th. H. Cormen, Ch. Leiserson, R. L. Rivest, et al., Introduction to Algorithms, 3rd ed. (MIT Press, Cambridge, MA, 2009).MATH Th. H. Cormen, Ch. Leiserson, R. L. Rivest, et al., Introduction to Algorithms, 3rd ed. (MIT Press, Cambridge, MA, 2009).MATH
Metadaten
Titel
Analysis of Critical Damage in the Communication Network: III. Analysis of Internode Flows
verfasst von
Y. E. Malashenko
I. A. Nazarova
Publikationsdatum
01.07.2021
Verlag
Pleiades Publishing
Erschienen in
Journal of Computer and Systems Sciences International / Ausgabe 4/2021
Print ISSN: 1064-2307
Elektronische ISSN: 1555-6530
DOI
https://doi.org/10.1134/S1064230721030102

Weitere Artikel der Ausgabe 4/2021

Journal of Computer and Systems Sciences International 4/2021 Zur Ausgabe

Premium Partner