Document Type

Conference Proceeding

Publisher

IEEE

Faculty

Computing, Health and Science

School

School of Engineering and Mathematics, Centre for Communications Engineering Research

RAS ID

3403

Comments

This conference paper was originally published as: Habibi, D. , Nguyen, H. N., Phung, Q.V. , & Lo, K. (2005). Establishing Physical Survivability of Large Networks using Properties of Two-Connected Graphs. Proceedings of IEEE Tencon (IEEE Region 10 Conference). (pp. 24-28). Melbourne. IEEE. Original article available here

© 2005 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Abstract

Establishing the physical survivability of large networks is not a trivial task. Some techniques for assessing physical survivability such as the cutset method can not deal with large size networks (S. Ramamurthy and B. Mukherjee), (W.N. Grover and J. Doucette, 2001). A fast technique for finding biconnected components of a graph and testing the network for node-/link-bridges, presented in (W.D. Grover, 2004), does not provide any further information, such as identifying the fundamental cycles within the network, which would significantly benefit the next phase of network design for protection using such techniques as shared backup path protection (SBPP), p-cycle, or ring protection (W.D. Grover, 2004). This paper presents an alternative technique, based on graph theory, for evaluating the physical survivability of networks. This technique can deal with network sizes of many thousand nodes, with computational times which are comparable with the biconnected components method, whilst providing more information about the susceptibility of a network to individual link and node failures in preparation for the next phase of network protection design.

DOI

10.1109/TENCON.2005.301226

Access Rights

free_to_read

Included in

Engineering Commons

 
COinS
 

Link to publisher version (DOI)

10.1109/TENCON.2005.301226