Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Analysis of critical damage in the communication network. III: Analysis of internode flows - MaRDI portal

Analysis of critical damage in the communication network. III: Analysis of internode flows (Q2239212)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Analysis of critical damage in the communication network. III: Analysis of internode flows
scientific article

    Statements

    Analysis of critical damage in the communication network. III: Analysis of internode flows (English)
    0 references
    0 references
    0 references
    3 November 2021
    0 references
    The paper presents an interesting approach to analyzing critical damage in communication networks. As the critical damage, the authors accepted a subset of edges, removing which at least for one pair of nodes breaks all possible connection paths. For each pair of source-destination vertices, two criteria are used to estimate the decrease in the flow for each damage from the given set. At the first step, all destructive actions are determined at which the maximal possible flow for some selected pair of nodes become zero (the first criterion). At the next step, for such a pair, all damages are found at which the maximal flow was below the permissible level but greater than zero (the second criterion). Finally, based on the data obtained, diagrams of the maximal permissible flows between each pair of vertices are formed for all critical damage from the given set. In this paper, the authors consider and analyze three types of damage: destruction of the minimal cut separating the source-destination pair in an intact network, destruction of the minimal cut in a network with unit capacities, and destruction of all edges incident to a vertex. The computational experiments are carried out for all possible combinations of source-destination pairs of vertices, considering the transmission direction. The results of the consequences of destructive influences on network systems with various structural features are further analyzed -- the authors analyze two network models, so-called core, and ring networks. The capacities of edges are chosen at random from the segment [900, 999] and are equal for coinciding edges in both networks. In this study, the authors continue their earlier study of the flow method of the a priori analysis of the structural invulnerability of a network in the case of a certain type of failure. The choice as the structural damage of cuts that are minimal in terms of throughput and the number of edges, as well as separating a certain vertex from the network, is determined by the logic of the study. The search for the most vulnerable source-destination pairs for the indicated damage is carried out according to two criteria (the zeroing of the flow and the flow falling below a predetermined level), which makes it possible to estimate in advance how the structure retains the standard performance of the network system after destruction. When carrying out the computational experiment, the methods of flow programming with a polynomial estimate of the computational complexity are used. As presented by the authors, the proposed calculation scheme is relatively simple and amenable to parallelization. Therefore, when investigating the vulnerability of large networks, even clusters of personal computers with various operating systems could be used. For Part I and II see [the authors, J. Comput. Syst. Sci. Int. 59, No. 5, 745--754 (2020; Zbl 1459.94006); translation from Izv. Ross. Akad. Nauk, Teor. Sist. Upravl. 2020, No. 5, 106--115 (2020); J. Comput. Syst. Sci. Int. 59, No. 6, 918--927 (2020; Zbl 1459.94005); translation from Izv. Ross. Akad. Nauk, Teor. Sist. Upravl. 2020, No. 6, 109--119 (2020)].
    0 references
    communication networks
    0 references
    critical damage
    0 references
    mathematical modelling
    0 references
    damage assessment
    0 references
    linear programming
    0 references
    multicommodity flow
    0 references
    minimal cut
    0 references
    maximal flow
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references