Skip to main content

How to Model and Enumerate Geographically Correlated Failure Events in Communication Networks

  • Chapter
  • First Online:
Guide to Disaster-Resilient Communication Networks

Abstract

Several works shed light on the vulnerability of networks against regional failures, which are failures of multiple pieces of equipment in a geographical region as a result of a natural or human-made disaster. This chapter overviews how this information can be added to the existing network protocols through defining shared risk link groups (SRLGs) and probabilistic SRLGs (PSRLGs). The output of this chapter can be the input of later chapters to design and operate the networks to enhance the preparedness against disasters and regional failures in general. In particular, we are focusing on the state-of-the-art algorithmic approaches for generating lists of (P)SRLGs of the communication networks protecting different sets of disasters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A point of presence (PoP) is an artificial demarcation point or interface point between communicating entities.

  2. 2.

    For infinite sets, one can use discretization and consider only finite number of sets, albeit with a small error.

  3. 3.

    Some papers like [6, 20, 40, 42, 43] are loosely related to the regional (P)SRLG generating problem, however, our goal is presenting the most relevant works in this field.

    A list of (P)SRLGs can be used as a pre-computed input for various problems [3, 11, 14, 17].

  4. 4.

    This is true for communication networks but not for networks in which there is no monotonicity in failures.

    When attaching probability to the SRLGs, this no longer holds.

  5. 5.

    If there are more than one equal-size sets that satisfy the condition, one is chosen arbitrarily.

  6. 6.

    Polygonal chains can be dismantled to a set of line segments; the method can be applied, and then, the sets of line segments can be joined.

  7. 7.

    Reference [18] offers a mistaken heuristic for computing \(M_r\). It claims the disc failures having nodes of the network as their centre point represent the worst case of failures of radius r, which is clearly not the case. Consider, e.g. a network being an equilateral triangle with side length 3, and \(r=1\); here, \(M_r\) consists of a single SRLG containing all the 3 links instead of the 3 link-pairs claimed by [18].

  8. 8.

    Refreshing in Algorithm 4.1 means that \(M'\) is the set of maximal failures among which are already checked, and if f is maximal amongst them, it is added to \(M'\) and all f’s subsets are eliminated from \(M'\); or if f is not maximal in\(M'\), nothing happens.

  9. 9.

    Under certain conditions, the complexity of the algorithm presented in [29] is optimal.

  10. 10.

    Probabilistic refinements are presented in Sect. 4.3.4.1.

  11. 11.

    Similarly to the precise algorithms, refreshing in Algorithm 4.2 means that \(M_r^g\) is the set of maximal failures among which are already checked, and if \(e(P)_{\text {hit}}\) is maximal amongst them, it is added to \(M_r^g\) and all \(e(P)_{\text {hit}}\)’s subsets are eliminated from \(M_r^g\); or if\(e(P)_{\text {hit}}\) is not maximal in \(M'\), nothing happens.

  12. 12.

    In other words, the degree of over-approximation (Definition 4.9) tends to (1, 0) as \(d_{\mathcal {P}}\rightarrow 0\).

  13. 13.

    Reference [35] tackles a similar problem.

  14. 14.

    An R-tree is an efficient tree data structure for storing spatial objects. Objects are grouped based on their minimum bounding rectangle.

  15. 15.

    The investigated measures are: (1) the total expected capacity of the intersected links, (2) the fraction of pairs of nodes that remain connected, (3) the maximum flow between a given pair of nodes, (4) the average value of maximum flow between all pairs of nodes.

  16. 16.

    Algorithm 4.3 is polynomial assuming the SRLG enumeration and calculating the metric value runs in polynomial time.

  17. 17.

    In contrast, Sect. 4.3.2.5 depicts the non-probabilistic version of this regional failure model.

  18. 18.

    In particular, we may assume that the probability f(ep) that link e fails if a disaster with epicentre p happens is independent of p as long as it is in \(c\). We denote this common value by \(f(e,c)\).

  19. 19.

    In Sect. 4.4.1.2, we could see how CFPs (and thus all kind of PSRLGs) can be used for calculating the availability of services. To leverage the probabilistic information stored in PSRLGs in case of resilient routing, one needs to calculate a list of SRLGs based on a PSRLG input.

  20. 20.

    Of course, in a non-practical extreme case of R being greater than half of the network diameter, it is possible that \(M_T=\{E\}\), meaning \(|M_T|=1\).

References

  1. Agarwal PK, Efrat A, Ganjugunte SK, Hay D, Sankararaman S, Zussman G (2010) Network vulnerability to single, multiple, and probabilistic physical attacks. In: Military Communications Conference (MILCOM). IEEE, pp 1824–1829

    Google Scholar 

  2. Agarwal PK, Efrat A, Ganjugunte SK, Hay D, Sankararaman S, Zussman G (2013) The resilience of WDM networks to probabilistic geographical failures. IEEE/ACM Trans Netw (TON) 21(5):1525–1538

    Article  Google Scholar 

  3. Colman-Meixner C, Dikbiyik F, Habib F, Tornatore M, Chuah CN, Mukherjee B (2014) Disaster-survivable cloud-network mapping. Photonic Netw Commun 27(3):141–153

    Article  Google Scholar 

  4. de Sousa, A., Santos, D.: The minimum cost D-geodiverse anycast routing with optimal selection of anycast nodes. In: 2019 15th International Conference on the Design of Reliable Communication Networks (DRCN), pp 21–28. https://doi.org/10.1109/DRCN.2019.8713729

  5. Dikbiyik F, Tornatore M, Mukherjee B (2014) Minimizing the risk from disaster failures in optical backbone networks. J Lightwave Technol 32(18):3175–3183

    Article  Google Scholar 

  6. Dinh TN, Thai MT (2015) Network under joint node and link attacks: vulnerability assessment methods and analysis. IEEE/ACM Trans Netw 23(3):1001–1011

    Article  Google Scholar 

  7. Gardner MT, Beard C (2011) Evaluating geographic vulnerabilities in networks. In: IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR), pp 1–6

    Google Scholar 

  8. Gerstel O, Jinno M, Lord A, Yoo SB (2012) Elastic optical networking: a new dawn for the optical layer? IEEE Commun Mag 50(2):s12–s20

    Article  Google Scholar 

  9. Gomes T, Tapolcai J, Esposito C, Hutchison D, Kuipers F, Rak J, de Sousa A, Iossifides A, Travanca R, Andre J, Jorge L, Martins L, Ugalde PO, Pašić A, Pezaros D, Jouet S, Secci S, Tornatore M (2016) A survey of strategies for communication networks to protect against large-scale natural disasters. In: 8th International Workshop on Resilient Networks Design and Modeling (RNDM), pp 11–22. https://doi.org/10.1109/RNDM.2016.7608263

  10. Habib MF, Tornatore M, De Leenheer M, Dikbiyik F, Mukherjee B (2012) Design of disaster-resilient optical datacenter networks. J Lightwave Technol 30(16):2563–2573

    Article  Google Scholar 

  11. Habib MF, Tornatore M, Mukherjee B (2013) Fault-tolerant virtual network mapping to provide content connectivity in optical networks. In: Optical Fiber Communication Conference. OSA, pp OTh3E–4

    Google Scholar 

  12. Harter IBB, Schupke D, Hoffmann M, Carle G et al (2014) Network virtualization for disaster resilience of cloud services. IEEE Commun Mag 52(12):88–95

    Article  Google Scholar 

  13. Heidemann J, Quan L, Pradkin Y (2012) A preliminary analysis of network outages during Hurricane Sandy. University of Southern California, Information Sciences Institute

    Google Scholar 

  14. Hmaity A, Musumeci F, Tornatore M (2016) Survivable virtual network mapping to provide content connectivity against double-link failures. In: Design of Reliable Communication Networks (DRCN). IEEE, pp 160–166

    Google Scholar 

  15. Hochbaum D, Pathria A (1998) Analysis of the greedy approach in problems of maximum k-coverage. In: Naval research logistics (NRL)

    Google Scholar 

  16. Iqbal F, Trajanovski S, Kuipers F (2016) Detection of spatially-close fiber segments in optical networks. In: 2016 12th International Conference on the Design of Reliable Communication Networks (DRCN). IEEE, pp 95–102. https://doi.org/10.1109/DRCN.2016.7470840. http://ieeexplore.ieee.org/document/7470840/

  17. Jaumard B, Hoang HA (2013) Design and dimensioning of logical survivable topologies against multiple failures. J Opt Commun Netw 5(1):23–36

    Article  Google Scholar 

  18. Kushwaha A, Kapadia D, Gumaste A, Somani A (2018) Designing multi-layer provider networks for circular disc failures. In: International Conference on Optical Network Design and Modeling (ONDM), Dublin, Ireland

    Google Scholar 

  19. Lee HW, Modiano E, Lee K (2010) Diverse routing in networks with probabilistic failures. IEEE/ACM Trans Netw 18(6):1895–1907

    Article  Google Scholar 

  20. Long X, Tipper D, Gomes T (2014) Measuring the survivability of networks to geographic correlated failures. Opt Switching Netw 14:117–133

    Article  Google Scholar 

  21. Mukherjee B, Habib M, Dikbiyik F (2014) Network adaptability from disaster disruptions and cascading failures. IEEE Commun Mag 52(5):230–238

    Article  Google Scholar 

  22. Neumayer S, Zussman G, Cohen R, Modiano E (2011) Assessing the vulnerability of the fiber infrastructure to disasters. IEEE/ACM Trans Netw (TON) 19(6):1610–1623

    Article  Google Scholar 

  23. Oostenbrink J, Kuipers F (2017) Computing the impact of disasters on networks. ACM SIGMETRICS Perform Eval Rev 45(2):107–110

    Article  Google Scholar 

  24. Orlowski S, Wessäly R, Pióro M, Tomaszewski A (2010) SNDlib 1.0: survivable network design library. Networks 55(3):276–286

    Google Scholar 

  25. Pašić A, Girao-Silva R, Vass B, Gomes T, Babarczi P (2018) FRADIR: a novel framework for disaster resilience. In: International Workshop on Resilient Networks Design and Modeling (RNDM), Longyearbyen, Svalbard, Norway

    Google Scholar 

  26. Pašić A, Girao-Silva R, Vass B, Gomes T, Mogyorósi F, Babarczi P, Tapolcai J (2019) FRADIR-II: an improved framework for disaster resilience. In: International Workshop on Resilient Networks Design and Modeling (RNDM), Nicosia, Cyprus

    Google Scholar 

  27. Souza Couto R, Secci S, Mitre Campista M, Costa K, Maciel L (2014) Network design requirements for disaster resilience in IaaS clouds. IEEE Commun Mag 52(10):52–58

    Article  Google Scholar 

  28. Su TH, Chang RC (1990) The \(k\)-Gabriel graphs and their applications. In: Algorithms. Lecture Notes in Computer Science, vol 450. Springer, Berlin (1990)

    Google Scholar 

  29. Tapolcai J, Rónyai L, Vass B, Gyimóthi L. Fast enumeration of regional link failures caused by disasters with limited size. Technical report. http://lendulet.tmit.bme.hu/lendulet_website/wp-content/papercite-data/pdf/tapolcai2019fast.pdf

  30. Tapolcai J, Rónyai L, Vass B, Gyimóthi L (2017) List of shared risk link groups representing regional failures with limited size. In: Proceedings of IEEE INFOCOM, Atlanta, USA

    Google Scholar 

  31. Tapolcai J, Vass B, Heszberger Z, Biró J, Hay D, Kuipers FA, Rónyai L (2018) A tractable stochastic model of correlated link failures caused by disasters. In: Proceedings of IEEE INFOCOM, Honolulu, USA

    Google Scholar 

  32. The internet topology zoo. http://www.topology-zoo.org/dataset.html

  33. Tomita E, Tanaka A, Takahashi H (2006) The worst-case time complexity for generating all maximal cliques and computational experiments. Theor Comput Sci 363(1):28–42

    Article  MathSciNet  MATH  Google Scholar 

  34. Trajanovski S, Kuipers F, Van Mieghem P et al (2013) Finding critical regions in a network. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, pp 223–228

    Google Scholar 

  35. Trajanovski S, Kuipers FA, Ilić A, Crowcroft J, Van Mieghem P (2015) Finding critical regions and region-disjoint paths in a network. IEEE/ACM Trans Netw (TON) 23(3):908–921

    Article  Google Scholar 

  36. Valentini A, Vass B, Oostenbrink J, Csák L, Kuipers FA, Pace B, Hay D, Tapolcai J (2019) Network resiliency against earthquakes. In: International Workshop on Resilient Networks Design and Modeling (RNDM), Nicosia, Cyprus

    Google Scholar 

  37. Vass B, Bérczi-Kovács E, Tapolcai J (2017) Enumerating shared risk link groups of circular disk failures hitting k nodes. In: Procedings of International Workshop on Design of Reliable Communication Networks (DRCN), Munich, Germany

    Google Scholar 

  38. Vass B, Kovács E, Tapolcai J. Enumerating maximal shared risk link groups of circular disk failures hitting k nodes. Technical report. http://lendulet.tmit.bme.hu/lendulet_website/wp-content/papercite-data/pdf/vass2019enumerating.pdf

  39. Vass B, Németh L, Tapolcai J (2019) The Earth is nearly flat: precise and approximate algorithms for detecting vulnerable regions of networks in plane and on sphere. In: Networks. Wiley (2019)

    Google Scholar 

  40. Veremyev A, Boginski V, Pasiliao EL (2014) Exact identification of critical nodes in sparse networks via new compact formulations. Optim Lett 8(4):1245–1259

    Article  MathSciNet  MATH  Google Scholar 

  41. Xie A, Wang X, Lu S (2019) Risk minimization routing against geographically correlated failures. IEEE Access 7:62920–62929. https://doi.org/10.1109/ACCESS.2019.2916834

    Article  Google Scholar 

  42. Yallouz J, Rottenstreich O, Orda A (2014) Tunable survivable spanning trees. ACM SIGMETRICS Perform Eval Rev 42(1):315–327

    Article  Google Scholar 

  43. Zang H, Ou C, Mukherjee B (2003) Path-protection routing and wavelength assignment (RWA) in WDM mesh networks under duct-layer constraints. IEEE/ACM Trans Netw (TON) 11(2):248–258

    Article  Google Scholar 

Download references

Acknowledgements

This chapter is based on work from COST Action CA15127 (“Resilient communication services protecting end-user applications from disaster-based failures—RECODIS”) supported by European Cooperation in Science and Technology (COST). Part of this work is supported by the Hungarian Scientific Research Fund (grant No. OTKA K124171, K128062), by the BME-Artificial Intelligence FIKP grant of EMMI (BME FIKP-MI/SC), and the HUJI Cyber Security Center together with the Israel National Cyber Directorate in the Prime Minister’s Office.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Balázs Vass .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Vass, B., Tapolcai, J., Hay, D., Oostenbrink, J., Kuipers, F. (2020). How to Model and Enumerate Geographically Correlated Failure Events in Communication Networks. In: Rak, J., Hutchison, D. (eds) Guide to Disaster-Resilient Communication Networks. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-44685-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-44685-7_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-44684-0

  • Online ISBN: 978-3-030-44685-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics