September  2009, 4(3): 537-575. doi: 10.3934/nhm.2009.4.537

Robustness of square networks

1. 

Istituto per le Applicazioni del Calcolo “Mauro Picone”, Consiglio Nazionale delle Ricerche, Viale del Policlinico 137, 00161 ROMA

Received  August 2008 Revised  May 2009 Published  July 2009

The topic of security often enters in many real world situations. In this paper we focus on security of networks on which it is based the delivery of services and goods (e.g. water and electric supply networks) the transfer of data (e.g. web and telecommunication networks), the movement of transport means (e.g. road networks), etc... We use a fluid dynamic framework, networks are described by nodes and lines and our analysis starts from an equilibrium status: the flows are constant in time and along the lines. When a failure occurs in the network a shunt changes the topology of the network and the flows adapt to it reaching a new equilibrium status. The question we consider is the following: is the new equilibrium satisfactory in terms of achieved quality standards? We essentially individuate, for regular square networks, the nodes whose breakage compromises the quality of the flows. It comes out that networks which allow circular flows are the most robust with respect to damages.
Citation: A. Marigo. Robustness of square networks. Networks & Heterogeneous Media, 2009, 4 (3) : 537-575. doi: 10.3934/nhm.2009.4.537
[1]

Alessia Marigo. Equilibria for data networks. Networks & Heterogeneous Media, 2007, 2 (3) : 497-528. doi: 10.3934/nhm.2007.2.497

[2]

Alberto Bressan, Ke Han. Existence of optima and equilibria for traffic flow on networks. Networks & Heterogeneous Media, 2013, 8 (3) : 627-648. doi: 10.3934/nhm.2013.8.627

[3]

Klaus-Jochen Engel, Marjeta Kramar Fijavž, Rainer Nagel, Eszter Sikolya. Vertex control of flows in networks. Networks & Heterogeneous Media, 2008, 3 (4) : 709-722. doi: 10.3934/nhm.2008.3.709

[4]

Jacek Banasiak, Proscovia Namayanja. Asymptotic behaviour of flows on reducible networks. Networks & Heterogeneous Media, 2014, 9 (2) : 197-216. doi: 10.3934/nhm.2014.9.197

[5]

Emiliano Cristiani, Fabio S. Priuli. A destination-preserving model for simulating Wardrop equilibria in traffic flow on networks. Networks & Heterogeneous Media, 2015, 10 (4) : 857-876. doi: 10.3934/nhm.2015.10.857

[6]

Alberto Bressan, Khai T. Nguyen. Optima and equilibria for traffic flow on networks with backward propagating queues. Networks & Heterogeneous Media, 2015, 10 (4) : 717-748. doi: 10.3934/nhm.2015.10.717

[7]

Michael Herty, Christian Ringhofer. Averaged kinetic models for flows on unstructured networks. Kinetic & Related Models, 2011, 4 (4) : 1081-1096. doi: 10.3934/krm.2011.4.1081

[8]

Fatih Bayazit, Britta Dorn, Marjeta Kramar Fijavž. Asymptotic periodicity of flows in time-depending networks. Networks & Heterogeneous Media, 2013, 8 (4) : 843-855. doi: 10.3934/nhm.2013.8.843

[9]

Casian Pantea, Heinz Koeppl, Gheorghe Craciun. Global injectivity and multiple equilibria in uni- and bi-molecular reaction networks. Discrete & Continuous Dynamical Systems - B, 2012, 17 (6) : 2153-2170. doi: 10.3934/dcdsb.2012.17.2153

[10]

Neal Koblitz, Alfred Menezes. Another look at security definitions. Advances in Mathematics of Communications, 2013, 7 (1) : 1-38. doi: 10.3934/amc.2013.7.1

[11]

Isabelle Déchène. On the security of generalized Jacobian cryptosystems. Advances in Mathematics of Communications, 2007, 1 (4) : 413-426. doi: 10.3934/amc.2007.1.413

[12]

Linet Ozdamar, Dilek Tuzun Aksu, Elifcan Yasa, Biket Ergunes. Disaster relief routing in limited capacity road networks with heterogeneous flows. Journal of Industrial & Management Optimization, 2018, 14 (4) : 1367-1380. doi: 10.3934/jimo.2018011

[13]

Archana Prashanth Joshi, Meng Han, Yan Wang. A survey on security and privacy issues of blockchain technology. Mathematical Foundations of Computing, 2018, 1 (2) : 121-147. doi: 10.3934/mfc.2018007

[14]

Philip Lafrance, Alfred Menezes. On the security of the WOTS-PRF signature scheme. Advances in Mathematics of Communications, 2019, 13 (1) : 185-193. doi: 10.3934/amc.2019012

[15]

Riccardo Aragona, Alessio Meneghetti. Type-preserving matrices and security of block ciphers. Advances in Mathematics of Communications, 2019, 13 (2) : 235-251. doi: 10.3934/amc.2019016

[16]

Yannick Viossat. Game dynamics and Nash equilibria. Journal of Dynamics & Games, 2014, 1 (3) : 537-553. doi: 10.3934/jdg.2014.1.537

[17]

Antonio Giorgilli. Unstable equilibria of Hamiltonian systems. Discrete & Continuous Dynamical Systems - A, 2001, 7 (4) : 855-871. doi: 10.3934/dcds.2001.7.855

[18]

Jian Mao, Qixiao Lin, Jingdong Bian. Application of learning algorithms in smart home IoT system security. Mathematical Foundations of Computing, 2018, 1 (1) : 63-76. doi: 10.3934/mfc.2018004

[19]

Liqun Qi, Zheng yan, Hongxia Yin. Semismooth reformulation and Newton's method for the security region problem of power systems. Journal of Industrial & Management Optimization, 2008, 4 (1) : 143-153. doi: 10.3934/jimo.2008.4.143

[20]

Neal Koblitz, Alfred Menezes. Critical perspectives on provable security: Fifteen years of "another look" papers. Advances in Mathematics of Communications, 2019, 13 (4) : 517-558. doi: 10.3934/amc.2019034

2018 Impact Factor: 0.871

Metrics

  • PDF downloads (7)
  • HTML views (0)
  • Cited by (0)

Other articles
by authors

[Back to Top]