2015
DOI: 10.1109/tnet.2014.2309253
|View full text |Cite
|
Sign up to set email alerts
|

Finding Critical Regions and Region-Disjoint Paths in a Network

Abstract: Abstract-Due to their importance to society, communication networks should be built and operated to withstand failures. However, cost considerations make network providers less inclined to take robustness measures against failures that are unlikely to manifest, like several failures coinciding simultaneously in different geographic regions of their network.Considering networks embedded in a two-dimensional plane, we study the problem of finding a critical region -a part of the network that can be enclosed by a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
63
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 53 publications
(63 citation statements)
references
References 27 publications
0
63
0
Order By: Relevance
“…Understanding how to deal with circular disk failures is a good start; however, one should consider other disaster shapes too. In , it is proven that, in a similar problem setting (the model of considers that a link is hit by a disaster exactly if at least one of its endpoints is inside the disaster region. We believe our failure model is more realistic), there are a polynomial number of maximal failures caused by disasters having elliptic or polygonal (e.g., rectangular or equilateral triangular) shape.…”
Section: Approximate Algorithms and Implementation Issuesmentioning
confidence: 99%
“…Understanding how to deal with circular disk failures is a good start; however, one should consider other disaster shapes too. In , it is proven that, in a similar problem setting (the model of considers that a link is hit by a disaster exactly if at least one of its endpoints is inside the disaster region. We believe our failure model is more realistic), there are a polynomial number of maximal failures caused by disasters having elliptic or polygonal (e.g., rectangular or equilateral triangular) shape.…”
Section: Approximate Algorithms and Implementation Issuesmentioning
confidence: 99%
“…By using a slightly relaxed failure model in which only links that have at least one endpoint in the failure region are destroyed, Trajanovski et al [16] are able to determine the most vulnerable region for a failure of circular shape at a reduced complexity than that of [15]. Moreover, they can exactly and in polynomial time determine such vulnerable regions also for failures of elliptical shape and for shapes represented by a polygon.…”
Section: B Identification Of Vulnerable Regionsmentioning
confidence: 99%
“…Trajanovski et al [16] address the problem of finding two region-disjoint paths that (with the exception of the regions around the source and destination) cannot both be cut by a failure of given diameter. In this case, the shape of the failing region is not important, only its diameter is (as it could be rotated in any direction).…”
Section: Spatio-temporal Disaster-aware Routingmentioning
confidence: 99%
“…In many prior works, the objective is to find the most vulnerable network area of a predefined size, under specific disaster models, e.g., under line disasters [8], circular disasters [8], [9], or general polygon disasters [10]. For all the network components that intersect the disaster, they 50 may become definitely inoperative [5], [8] or fail with a probability [9], [11].…”
Section: Related Workmentioning
confidence: 99%