Skip to main content
Erschienen in: Journal of Computer and Systems Sciences International 5/2020

01.09.2020 | MATHEMATICAL SIMULATION

Analysis of Critical Damage in the Communication Network: I. Model and Computational Experiment

verfasst von: Yu. E. Malashenko, I. A. Nazarova

Erschienen in: Journal of Computer and Systems Sciences International | Ausgabe 5/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the computational experiments on a flow model of a communication and control network, changes in the system’s functional characteristics under destructive effects are studied. The removal of a subset of edges is considered to be critical damage if it results in the absence of connection paths for at least one pair of source-sink nodes. For each case of damage, both the total number of disconnected pairs and all communication directions, the throughput of which is less than the specified standard value, are determined. Based on the data obtained, multiparameter diagrams are constructed for assessing changes in the maximum flows for each dividing cut and all pairs of vertices. The boundary points on the diagrams correspond to the most dangerous damage not dominated by at least one damage indicator. The results of the effects of destructive effects on network systems with various structural features are analyzed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat P. Jensen and W. J. P. Barnes, Network Flow Programming (Krieger, Malabar, FL, 1987).MATH P. Jensen and W. J. P. Barnes, Network Flow Programming (Krieger, Malabar, FL, 1987).MATH
2.
Zurück zum Zitat H. Frank and I. T. Frisch, Communication, Transmission, and Transportation Networks (Addison-Wesley, Reading, MA, 1971).MATH H. Frank and I. T. Frisch, Communication, Transmission, and Transportation Networks (Addison-Wesley, Reading, MA, 1971).MATH
3.
Zurück zum Zitat Yu. B. Germeier, Introduction to the Theory of Operations Research (Nauka, Moscow, 1971) [in Russian]. Yu. B. Germeier, Introduction to the Theory of Operations Research (Nauka, Moscow, 1971) [in Russian].
4.
Zurück zum Zitat T. N. Dinh and M. T. Thai, “Assessing attack vulnerability in networks with uncertainty,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Kowloon,2015, pp. 2380–2388. T. N. Dinh and M. T. Thai, “Assessing attack vulnerability in networks with uncertainty,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Kowloon,2015, pp. 2380–2388.
5.
Zurück zum Zitat Yu. E. Malashenko, I. A. Nazarova, and N. M. Novikova, “An approach to the analysis of possible structural damages in multicommodity network systems,” Comput. Math. Math. Phys. 59, 1562 (2019).MathSciNetCrossRef Yu. E. Malashenko, I. A. Nazarova, and N. M. Novikova, “An approach to the analysis of possible structural damages in multicommodity network systems,” Comput. Math. Math. Phys. 59, 1562 (2019).MathSciNetCrossRef
6.
Zurück zum Zitat M. Lalou, M. A. Tahraoui, and H. Kheddouci, “The critical node detection problem in networks: A survey,” Comput. Sci. Rev. 28, 92–117 (2018).MathSciNetCrossRef M. Lalou, M. A. Tahraoui, and H. Kheddouci, “The critical node detection problem in networks: A survey,” Comput. Sci. Rev. 28, 92–117 (2018).MathSciNetCrossRef
7.
Zurück zum Zitat J. Walteros and P. Pardalos, “Selected topics in critical element detection,” Optimiz. Appl. 71, 9–26 (2012).MathSciNetMATH J. Walteros and P. Pardalos, “Selected topics in critical element detection,” Optimiz. Appl. 71, 9–26 (2012).MathSciNetMATH
8.
Zurück zum Zitat A. Veremyev, O. A. Prokipyev, and E. L. Pasiliao, “Critical nodes for distance-based connectivity and related problems in graphs,” Networks 66, 170–195 (2015).MathSciNetCrossRef A. Veremyev, O. A. Prokipyev, and E. L. Pasiliao, “Critical nodes for distance-based connectivity and related problems in graphs,” Networks 66, 170–195 (2015).MathSciNetCrossRef
9.
Zurück zum Zitat M. Ventresca, K. R. Harrison, and B. M. Ombuki-Berman, “The bi-objective critical node detection problem,” Eur. J. Oper. Res. 265, 895–908 (2018).MathSciNetCrossRef M. Ventresca, K. R. Harrison, and B. M. Ombuki-Berman, “The bi-objective critical node detection problem,” Eur. J. Oper. Res. 265, 895–908 (2018).MathSciNetCrossRef
10.
Zurück zum Zitat J. Li, P. M. Pardalos, B. Xin, and J. Chen, “The bi-objective critical node detection problem with minimum pairwise connectivity and cost: Theory and algorithms,” Soft Comput. 23, 1–16 (2019).CrossRef J. Li, P. M. Pardalos, B. Xin, and J. Chen, “The bi-objective critical node detection problem with minimum pairwise connectivity and cost: Theory and algorithms,” Soft Comput. 23, 1–16 (2019).CrossRef
11.
Zurück zum Zitat A. Kuhnle, N. P. Nguyen, T. N. Dinh, and M. T. Thai, “Vulnerability of clustering under nodes failure in complex networks,” Social Network Anal. Mining 7, 8–24 (2017).CrossRef A. Kuhnle, N. P. Nguyen, T. N. Dinh, and M. T. Thai, “Vulnerability of clustering under nodes failure in complex networks,” Social Network Anal. Mining 7, 8–24 (2017).CrossRef
12.
Zurück zum Zitat Yu. E. Malashenko, I. A. Nazarova, and N. M. Novikova, “Analysis of cluster damages in network systems,” Comput. Math. Math. Phys. 60, 341 (2020).MathSciNetCrossRef Yu. E. Malashenko, I. A. Nazarova, and N. M. Novikova, “Analysis of cluster damages in network systems,” Comput. Math. Math. Phys. 60, 341 (2020).MathSciNetCrossRef
13.
Zurück zum Zitat T. H. Grubesic, T. C. Matisziw, A. T. Murray, et al., “Comparative approaches for assessing network vulnerability,” Int. Regional Sci. Rev. 31, 88 (2008).CrossRef T. H. Grubesic, T. C. Matisziw, A. T. Murray, et al., “Comparative approaches for assessing network vulnerability,” Int. Regional Sci. Rev. 31, 88 (2008).CrossRef
14.
Zurück zum Zitat A. T. Murray, “An overview of network vulnerability modeling approaches,” Geo J. 78, 209–221 (2013). A. T. Murray, “An overview of network vulnerability modeling approaches,” Geo J. 78, 209–221 (2013).
15.
Zurück zum Zitat J. Johansson, “Risk and vulnerability analysis of interdependent technical infrastructures. Addressing socio-technical systems,” Doctoral Thesis in Industrial Automation (Lund Univ., Lund, 2010). J. Johansson, “Risk and vulnerability analysis of interdependent technical infrastructures. Addressing socio-technical systems,” Doctoral Thesis in Industrial Automation (Lund Univ., Lund, 2010).
16.
Zurück zum Zitat T. Gomes, C. Esposito, D. Hutchison, F. Kuipers, J. Rak, and M. Tornatore, “A survey of strategies for communication networks to protect against large-scale natural disasters,” in Proceedings of the International Workshop on Reliable Networks Design and Modeling (RNDM), Halmstad,2016, pp. 11–22. T. Gomes, C. Esposito, D. Hutchison, F. Kuipers, J. Rak, and M. Tornatore, “A survey of strategies for communication networks to protect against large-scale natural disasters,” in Proceedings of the International Workshop on Reliable Networks Design and Modeling (RNDM), Halmstad,2016, pp. 11–22.
17.
Zurück zum Zitat V. Velichko, V. Popkov, and G. Popkov, Models and Methods for Increasing the Survivability of Modern Communication Systems (Goryachaya Liniya - Telekom, Moscow, 2017) [in Russian]. V. Velichko, V. Popkov, and G. Popkov, Models and Methods for Increasing the Survivability of Modern Communication Systems (Goryachaya Liniya - Telekom, Moscow, 2017) [in Russian].
18.
Zurück zum Zitat A. K. Levakov, Features of the Functioning of Next-Generation Telecommunication Networks in Emergency Situations (IRIAS, Moscow, 2012) [in Russian]. A. K. Levakov, Features of the Functioning of Next-Generation Telecommunication Networks in Emergency Situations (IRIAS, Moscow, 2012) [in Russian].
19.
Zurück zum Zitat S. I. Noskov, A. A. Butin, and L. E. Sokolova, “Multicriterial assessment of the level of vulnerability of the objects of infomatization,” Dokl. TUSURa, No. 2 (32), 137–142 (2014). S. I. Noskov, A. A. Butin, and L. E. Sokolova, “Multicriterial assessment of the level of vulnerability of the objects of infomatization,” Dokl. TUSURa, No. 2 (32), 137–142 (2014).
20.
Zurück zum Zitat S. Wang, J. Zhang, and N. Duana, “Multipleperspective vulnerability analysis of the power network,” Phys. A (Amsterdam, Neth.) 492, 1581–1590 (2018). S. Wang, J. Zhang, and N. Duana, “Multipleperspective vulnerability analysis of the power network,” Phys. A (Amsterdam, Neth.) 492, 1581–1590 (2018).
21.
Zurück zum Zitat A. M. Faddeev, “Vulnerability of transmission systems of Russia, other post-soviet states and european countries to the cascade faults,” Vestn. MGU. Ser. 5: Geogr., No. 1, 46–53 (2016). A. M. Faddeev, “Vulnerability of transmission systems of Russia, other post-soviet states and european countries to the cascade faults,” Vestn. MGU. Ser. 5: Geogr., No. 1, 46–53 (2016).
22.
Zurück zum Zitat Y. E. Malashenko, I. A. Nazarova, N. M. Novikova, and I. I. Pospelova, “A network flow model for power and energy system with changing capabilities,” Int. J. Public Administr. 42, 1323–1332 (2019).CrossRef Y. E. Malashenko, I. A. Nazarova, N. M. Novikova, and I. I. Pospelova, “A network flow model for power and energy system with changing capabilities,” Int. J. Public Administr. 42, 1323–1332 (2019).CrossRef
23.
Zurück zum Zitat Yu. E. Malashenko, I. A. Nazarova, and N. M. Novikova, “Fuel and energy system control at large-scale damages. IV. A priori estimates of structural and functional vulnerability,” J. Comput. Syst. Sci. Int. 57, 907–920 (2018).CrossRef Yu. E. Malashenko, I. A. Nazarova, and N. M. Novikova, “Fuel and energy system control at large-scale damages. IV. A priori estimates of structural and functional vulnerability,” J. Comput. Syst. Sci. Int. 57, 907–920 (2018).CrossRef
24.
Zurück zum Zitat J. O. Royset and R. K. Wood, “Solving the bi-objective maximum-flow network-interdiction problem,” INFORMS J. Comput. 19, 175–184 (2007).MathSciNetCrossRef J. O. Royset and R. K. Wood, “Solving the bi-objective maximum-flow network-interdiction problem,” INFORMS J. Comput. 19, 175–184 (2007).MathSciNetCrossRef
25.
Zurück zum Zitat C. D. Nicholson, K. Kashbarker, and J. E. Ramirez-Marquez, “Flow-based vulnerability measures for network component importance: Experimentation with preparedness planning,” Reliab. Eng. Syst. Safety 145, 62–73 (2016).CrossRef C. D. Nicholson, K. Kashbarker, and J. E. Ramirez-Marquez, “Flow-based vulnerability measures for network component importance: Experimentation with preparedness planning,” Reliab. Eng. Syst. Safety 145, 62–73 (2016).CrossRef
26.
Zurück zum Zitat T. Cormen, Ch. Leiserson, R. Rivest, and C. Stein, Introduction to Algorithms (MIT Press, Boston, MA, 2009).MATH T. Cormen, Ch. Leiserson, R. Rivest, and C. Stein, Introduction to Algorithms (MIT Press, Boston, MA, 2009).MATH
Metadaten
Titel
Analysis of Critical Damage in the Communication Network: I. Model and Computational Experiment
verfasst von
Yu. E. Malashenko
I. A. Nazarova
Publikationsdatum
01.09.2020
Verlag
Pleiades Publishing
Erschienen in
Journal of Computer and Systems Sciences International / Ausgabe 5/2020
Print ISSN: 1064-2307
Elektronische ISSN: 1555-6530
DOI
https://doi.org/10.1134/S106423072005010X

Weitere Artikel der Ausgabe 5/2020

Journal of Computer and Systems Sciences International 5/2020 Zur Ausgabe

Premium Partner