Computational framework for modeling infrastructure network performance and vulnerability

2021 ◽  
Author(s):  
Seyed Hossein Hosseini Nourzad
2019 ◽  
Vol 30 (07) ◽  
pp. 1940004 ◽  
Author(s):  
Ke Wang ◽  
Yong Li ◽  
Jun Wu

Infrastructure networks provide significant services for our society. Nevertheless, high dependence on physical infrastructures makes infrastructure networks vulnerable to disasters or intentional attacks which being considered as geographically related failures that happened in specific geographical locations and result in failures of neighboring network components. To provide comprehensive network protection against failures, vulnerability of infrastructure network needs to be assessed with various network performance measures. However, when considering about multiple vulnerable areas, available researches just employ measure of total number of affected edges while neglecting edges’ different topologies. In this paper, we focus on identifying multiple vulnerable areas under global connectivity measure: Size Ratio of the Giant Component (SRGC). Firstly, Deterministic Damage Circle Model and Multiple Barycenters Method are presented to determine damage impact and location of damage region. For solving the HP-hard problem of identifying multiple optimal attacks, we transform the problem into combinational optimization problem and propose a mixed heuristic strategy consisted of both Greedy Algorithm and Genetic Algorithm to attain the optimal solution. We obtain numerical results for real-world infrastructure network, thereby demonstrating the effectiveness and applicability of the presented strategy and algorithms. The distinctive results of SRGC indicate the necessity and significance of considering global connectivity measure in assessing vulnerability of infrastructure networks.


Sensors ◽  
2021 ◽  
Vol 22 (1) ◽  
pp. 229
Author(s):  
Lorena Chinchilla-Romero ◽  
Jonathan Prados-Garzon ◽  
Pablo Ameigeiras ◽  
Pablo Muñoz ◽  
Juan M. Lopez-Soler

Fifth Generation (5G) is expected to meet stringent performance network requisites of the Industry 4.0. Moreover, its built-in network slicing capabilities allow for the support of the traffic heterogeneity in Industry 4.0 over the same physical network infrastructure. However, 5G network slicing capabilities might not be enough in terms of degree of isolation for many private 5G networks use cases, such as multi-tenancy in Industry 4.0. In this vein, infrastructure network slicing, which refers to the use of dedicated and well isolated resources for each network slice at every network domain, fits the necessities of those use cases. In this article, we evaluate the effectiveness of infrastructure slicing to provide isolation among PLs in an industrial private 5G network. To that end, we develop a queuing theory-based model to estimate the E2E mean packet delay of the infrastructure slices. Then, we use this model to compare the E2E mean delay for two configurations, i.e., dedicated infrastructure slices with segregated resources for each PL against the use of a single shared infrastructure slice to serve the performance-sensitive traffic from PLs. Also we evaluate the use of TSN against bare Ethernet to provide layer 2 connectivity among the 5G system components. We use a complete and realistic setup based on experimental and simulation data of the scenario considered. Our results support the effectiveness of infrastructure slicing to provide isolation in performance among the different slices. Then, using dedicated slices with segregated resources for each PL might reduce the number of the production downtimes and associated costs as the malfunctioning of a PL will not affect the network performance perceived by the performance-sensitive traffic from other PLs. Last, our results show that, besides the improvement in performance, TSN technology truly provides full isolation in the transport network compared to standard Ethernet thanks to traffic prioritization, traffic regulation, and bandwidth reservation capabilities.


2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


2012 ◽  
Vol 3 (3) ◽  
pp. 368-374
Author(s):  
Usha Kumari ◽  
Udai Shankar

IEEE 802.16 based wireless mesh networks (WMNs) are a promising broadband access solution to support flexibility, cost effectiveness and fast deployment of the fourth generation infrastructure based wireless networks. Reducing the time for channel establishment is critical for low latency/interactive Applications. According to IEEE 802.16 MAC protocol, there are three scheduling algorithms for assigning TDMA slots to each network node: centralized and distributed the distributed is further divided into two operational modes coordinated distributed and uncoordinated distributed. In coordinated distributed scheduling algorithm, network nodes have to transmit scheduling message in order to inform other nodes about their transfer schedule. In this paper a new approach is proposed to improve coordinated distributed scheduling efficiency in IEEE 802.16 mesh mode, with respect to three parameter Throughput, Average end to end delay and Normalized Overhead. For evaluating the proposed networks efficiency, several extensive simulations are performed in various network configurations and the most important system parameters which affect the network performance are analyzed


Sign in / Sign up

Export Citation Format

Share Document