Abstract
Several works shed light on the vulnerability of networks against regional failures, which are failures of multiple pieces of equipment in a geographical region as a result of a natural or human-made disaster. This chapter overviews how this information can be added to the existing network protocols through defining shared risk link groups (SRLGs) and probabilistic SRLGs (PSRLGs). The output of this chapter can be the input of later chapters to design and operate the networks to enhance the preparedness against disasters and regional failures in general. In particular, we are focusing on the state-of-the-art algorithmic approaches for generating lists of (P)SRLGs of the communication networks protecting different sets of disasters.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
A point of presence (PoP) is an artificial demarcation point or interface point between communicating entities.
- 2.
For infinite sets, one can use discretization and consider only finite number of sets, albeit with a small error.
- 3.
- 4.
This is true for communication networks but not for networks in which there is no monotonicity in failures.
When attaching probability to the SRLGs, this no longer holds.
- 5.
If there are more than one equal-size sets that satisfy the condition, one is chosen arbitrarily.
- 6.
Polygonal chains can be dismantled to a set of line segments; the method can be applied, and then, the sets of line segments can be joined.
- 7.
Reference [18] offers a mistaken heuristic for computing \(M_r\). It claims the disc failures having nodes of the network as their centre point represent the worst case of failures of radius r, which is clearly not the case. Consider, e.g. a network being an equilateral triangle with side length 3, and \(r=1\); here, \(M_r\) consists of a single SRLG containing all the 3 links instead of the 3 link-pairs claimed by [18].
- 8.
Refreshing in Algorithm 4.1 means that \(M'\) is the set of maximal failures among which are already checked, and if f is maximal amongst them, it is added to \(M'\) and all f’s subsets are eliminated from \(M'\); or if f is not maximal in\(M'\), nothing happens.
- 9.
Under certain conditions, the complexity of the algorithm presented in [29] is optimal.
- 10.
Probabilistic refinements are presented in Sect. 4.3.4.1.
- 11.
Similarly to the precise algorithms, refreshing in Algorithm 4.2 means that \(M_r^g\) is the set of maximal failures among which are already checked, and if \(e(P)_{\text {hit}}\) is maximal amongst them, it is added to \(M_r^g\) and all \(e(P)_{\text {hit}}\)’s subsets are eliminated from \(M_r^g\); or if\(e(P)_{\text {hit}}\) is not maximal in \(M'\), nothing happens.
- 12.
In other words, the degree of over-approximation (Definition 4.9) tends to (1, 0) as \(d_{\mathcal {P}}\rightarrow 0\).
- 13.
Reference [35] tackles a similar problem.
- 14.
An R-tree is an efficient tree data structure for storing spatial objects. Objects are grouped based on their minimum bounding rectangle.
- 15.
The investigated measures are: (1) the total expected capacity of the intersected links, (2) the fraction of pairs of nodes that remain connected, (3) the maximum flow between a given pair of nodes, (4) the average value of maximum flow between all pairs of nodes.
- 16.
Algorithm 4.3 is polynomial assuming the SRLG enumeration and calculating the metric value runs in polynomial time.
- 17.
In contrast, Sect. 4.3.2.5 depicts the non-probabilistic version of this regional failure model.
- 18.
In particular, we may assume that the probability f(e, p) that link e fails if a disaster with epicentre p happens is independent of p as long as it is in \(c\). We denote this common value by \(f(e,c)\).
- 19.
In Sect. 4.4.1.2, we could see how CFPs (and thus all kind of PSRLGs) can be used for calculating the availability of services. To leverage the probabilistic information stored in PSRLGs in case of resilient routing, one needs to calculate a list of SRLGs based on a PSRLG input.
- 20.
Of course, in a non-practical extreme case of R being greater than half of the network diameter, it is possible that \(M_T=\{E\}\), meaning \(|M_T|=1\).
References
Agarwal PK, Efrat A, Ganjugunte SK, Hay D, Sankararaman S, Zussman G (2010) Network vulnerability to single, multiple, and probabilistic physical attacks. In: Military Communications Conference (MILCOM). IEEE, pp 1824–1829
Agarwal PK, Efrat A, Ganjugunte SK, Hay D, Sankararaman S, Zussman G (2013) The resilience of WDM networks to probabilistic geographical failures. IEEE/ACM Trans Netw (TON) 21(5):1525–1538
Colman-Meixner C, Dikbiyik F, Habib F, Tornatore M, Chuah CN, Mukherjee B (2014) Disaster-survivable cloud-network mapping. Photonic Netw Commun 27(3):141–153
de Sousa, A., Santos, D.: The minimum cost D-geodiverse anycast routing with optimal selection of anycast nodes. In: 2019 15th International Conference on the Design of Reliable Communication Networks (DRCN), pp 21–28. https://doi.org/10.1109/DRCN.2019.8713729
Dikbiyik F, Tornatore M, Mukherjee B (2014) Minimizing the risk from disaster failures in optical backbone networks. J Lightwave Technol 32(18):3175–3183
Dinh TN, Thai MT (2015) Network under joint node and link attacks: vulnerability assessment methods and analysis. IEEE/ACM Trans Netw 23(3):1001–1011
Gardner MT, Beard C (2011) Evaluating geographic vulnerabilities in networks. In: IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR), pp 1–6
Gerstel O, Jinno M, Lord A, Yoo SB (2012) Elastic optical networking: a new dawn for the optical layer? IEEE Commun Mag 50(2):s12–s20
Gomes T, Tapolcai J, Esposito C, Hutchison D, Kuipers F, Rak J, de Sousa A, Iossifides A, Travanca R, Andre J, Jorge L, Martins L, Ugalde PO, Pašić A, Pezaros D, Jouet S, Secci S, Tornatore M (2016) A survey of strategies for communication networks to protect against large-scale natural disasters. In: 8th International Workshop on Resilient Networks Design and Modeling (RNDM), pp 11–22. https://doi.org/10.1109/RNDM.2016.7608263
Habib MF, Tornatore M, De Leenheer M, Dikbiyik F, Mukherjee B (2012) Design of disaster-resilient optical datacenter networks. J Lightwave Technol 30(16):2563–2573
Habib MF, Tornatore M, Mukherjee B (2013) Fault-tolerant virtual network mapping to provide content connectivity in optical networks. In: Optical Fiber Communication Conference. OSA, pp OTh3E–4
Harter IBB, Schupke D, Hoffmann M, Carle G et al (2014) Network virtualization for disaster resilience of cloud services. IEEE Commun Mag 52(12):88–95
Heidemann J, Quan L, Pradkin Y (2012) A preliminary analysis of network outages during Hurricane Sandy. University of Southern California, Information Sciences Institute
Hmaity A, Musumeci F, Tornatore M (2016) Survivable virtual network mapping to provide content connectivity against double-link failures. In: Design of Reliable Communication Networks (DRCN). IEEE, pp 160–166
Hochbaum D, Pathria A (1998) Analysis of the greedy approach in problems of maximum k-coverage. In: Naval research logistics (NRL)
Iqbal F, Trajanovski S, Kuipers F (2016) Detection of spatially-close fiber segments in optical networks. In: 2016 12th International Conference on the Design of Reliable Communication Networks (DRCN). IEEE, pp 95–102. https://doi.org/10.1109/DRCN.2016.7470840. http://ieeexplore.ieee.org/document/7470840/
Jaumard B, Hoang HA (2013) Design and dimensioning of logical survivable topologies against multiple failures. J Opt Commun Netw 5(1):23–36
Kushwaha A, Kapadia D, Gumaste A, Somani A (2018) Designing multi-layer provider networks for circular disc failures. In: International Conference on Optical Network Design and Modeling (ONDM), Dublin, Ireland
Lee HW, Modiano E, Lee K (2010) Diverse routing in networks with probabilistic failures. IEEE/ACM Trans Netw 18(6):1895–1907
Long X, Tipper D, Gomes T (2014) Measuring the survivability of networks to geographic correlated failures. Opt Switching Netw 14:117–133
Mukherjee B, Habib M, Dikbiyik F (2014) Network adaptability from disaster disruptions and cascading failures. IEEE Commun Mag 52(5):230–238
Neumayer S, Zussman G, Cohen R, Modiano E (2011) Assessing the vulnerability of the fiber infrastructure to disasters. IEEE/ACM Trans Netw (TON) 19(6):1610–1623
Oostenbrink J, Kuipers F (2017) Computing the impact of disasters on networks. ACM SIGMETRICS Perform Eval Rev 45(2):107–110
Orlowski S, Wessäly R, Pióro M, Tomaszewski A (2010) SNDlib 1.0: survivable network design library. Networks 55(3):276–286
Pašić A, Girao-Silva R, Vass B, Gomes T, Babarczi P (2018) FRADIR: a novel framework for disaster resilience. In: International Workshop on Resilient Networks Design and Modeling (RNDM), Longyearbyen, Svalbard, Norway
Pašić A, Girao-Silva R, Vass B, Gomes T, Mogyorósi F, Babarczi P, Tapolcai J (2019) FRADIR-II: an improved framework for disaster resilience. In: International Workshop on Resilient Networks Design and Modeling (RNDM), Nicosia, Cyprus
Souza Couto R, Secci S, Mitre Campista M, Costa K, Maciel L (2014) Network design requirements for disaster resilience in IaaS clouds. IEEE Commun Mag 52(10):52–58
Su TH, Chang RC (1990) The \(k\)-Gabriel graphs and their applications. In: Algorithms. Lecture Notes in Computer Science, vol 450. Springer, Berlin (1990)
Tapolcai J, Rónyai L, Vass B, Gyimóthi L. Fast enumeration of regional link failures caused by disasters with limited size. Technical report. http://lendulet.tmit.bme.hu/lendulet_website/wp-content/papercite-data/pdf/tapolcai2019fast.pdf
Tapolcai J, Rónyai L, Vass B, Gyimóthi L (2017) List of shared risk link groups representing regional failures with limited size. In: Proceedings of IEEE INFOCOM, Atlanta, USA
Tapolcai J, Vass B, Heszberger Z, Biró J, Hay D, Kuipers FA, Rónyai L (2018) A tractable stochastic model of correlated link failures caused by disasters. In: Proceedings of IEEE INFOCOM, Honolulu, USA
The internet topology zoo. http://www.topology-zoo.org/dataset.html
Tomita E, Tanaka A, Takahashi H (2006) The worst-case time complexity for generating all maximal cliques and computational experiments. Theor Comput Sci 363(1):28–42
Trajanovski S, Kuipers F, Van Mieghem P et al (2013) Finding critical regions in a network. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, pp 223–228
Trajanovski S, Kuipers FA, Ilić A, Crowcroft J, Van Mieghem P (2015) Finding critical regions and region-disjoint paths in a network. IEEE/ACM Trans Netw (TON) 23(3):908–921
Valentini A, Vass B, Oostenbrink J, Csák L, Kuipers FA, Pace B, Hay D, Tapolcai J (2019) Network resiliency against earthquakes. In: International Workshop on Resilient Networks Design and Modeling (RNDM), Nicosia, Cyprus
Vass B, Bérczi-Kovács E, Tapolcai J (2017) Enumerating shared risk link groups of circular disk failures hitting k nodes. In: Procedings of International Workshop on Design of Reliable Communication Networks (DRCN), Munich, Germany
Vass B, Kovács E, Tapolcai J. Enumerating maximal shared risk link groups of circular disk failures hitting k nodes. Technical report. http://lendulet.tmit.bme.hu/lendulet_website/wp-content/papercite-data/pdf/vass2019enumerating.pdf
Vass B, Németh L, Tapolcai J (2019) The Earth is nearly flat: precise and approximate algorithms for detecting vulnerable regions of networks in plane and on sphere. In: Networks. Wiley (2019)
Veremyev A, Boginski V, Pasiliao EL (2014) Exact identification of critical nodes in sparse networks via new compact formulations. Optim Lett 8(4):1245–1259
Xie A, Wang X, Lu S (2019) Risk minimization routing against geographically correlated failures. IEEE Access 7:62920–62929. https://doi.org/10.1109/ACCESS.2019.2916834
Yallouz J, Rottenstreich O, Orda A (2014) Tunable survivable spanning trees. ACM SIGMETRICS Perform Eval Rev 42(1):315–327
Zang H, Ou C, Mukherjee B (2003) Path-protection routing and wavelength assignment (RWA) in WDM mesh networks under duct-layer constraints. IEEE/ACM Trans Netw (TON) 11(2):248–258
Acknowledgements
This chapter is based on work from COST Action CA15127 (“Resilient communication services protecting end-user applications from disaster-based failures—RECODIS”) supported by European Cooperation in Science and Technology (COST). Part of this work is supported by the Hungarian Scientific Research Fund (grant No. OTKA K124171, K128062), by the BME-Artificial Intelligence FIKP grant of EMMI (BME FIKP-MI/SC), and the HUJI Cyber Security Center together with the Israel National Cyber Directorate in the Prime Minister’s Office.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Vass, B., Tapolcai, J., Hay, D., Oostenbrink, J., Kuipers, F. (2020). How to Model and Enumerate Geographically Correlated Failure Events in Communication Networks. In: Rak, J., Hutchison, D. (eds) Guide to Disaster-Resilient Communication Networks. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-44685-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-44685-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-44684-0
Online ISBN: 978-3-030-44685-7
eBook Packages: Computer ScienceComputer Science (R0)