By Topic

Detecting protected links to keep reachability to server against failures

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Imagawa, K. ; Grad. Sch. of Sci. & Technol., Kwansei Gakuin Univ., Sanda, Japan ; Miwa, H.

Methods to design a reliable network against network failures are important for Internet service providers (ISPs). ISPs must offer connectivity to users, even if link failures occur. The best way to design a reliable network is to protect all links so that the failure probability of a link is sufficiently small by sufficient backup resource and rapid recovery system. However, sufficient backup resource needs much cost for ISP. Therefore, it is necessary to find the smallest number of links to be protected such that, even if any non-protected links fail, the resulting network offers users connectivity. In this paper, as a measure of connectivity, we focus on the size of the connected component including a server or a gateway. Critical links whose failures drastically decrease the size of the connected component including a server must be protected not to fail, because such a failure prevent a large number of users from access to the server. Similarly, when a server is a gateway to another ISP's network, many users cannot communicate with exterior users and servers. Our purpose is to find the links to be protected such that, even if any non-protected links fail, the number of the nodes connected with a server in the resulting network is not less than a threshold. In this paper, we formulate this problem and prove that the problem is NP-hard. In addition, we propose a polynomial-time algorithm to solve the problem that the number of the simultaneous link failures is restricted to one. Furthermore, we present a polynomial-time algorithm to solve the problem that the number of the simultaneous link failures is restricted to two and a network is a tree.

Published in:

Information Networking (ICOIN), 2013 International Conference on

Date of Conference:

28-30 Jan. 2013