CN103684864B  Communication network vulnerability analyzing system for largescale area fault and working method of communication network vulnerability analyzing system  Google Patents
Communication network vulnerability analyzing system for largescale area fault and working method of communication network vulnerability analyzing system Download PDFInfo
 Publication number
 CN103684864B CN103684864B CN201310675396.5A CN201310675396A CN103684864B CN 103684864 B CN103684864 B CN 103684864B CN 201310675396 A CN201310675396 A CN 201310675396A CN 103684864 B CN103684864 B CN 103684864B
 Authority
 CN
 China
 Prior art keywords
 fault
 network
 probability
 area
 region
 Prior art date
 Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
 Active
Links
 238000004891 communication Methods 0.000 title claims abstract description 22
 238000004458 analytical method Methods 0.000 claims description 36
 238000000034 method Methods 0.000 claims description 17
 238000004422 calculation algorithm Methods 0.000 claims description 13
 238000004088 simulation Methods 0.000 claims description 7
 239000011159 matrix material Substances 0.000 claims description 5
 238000005259 measurement Methods 0.000 claims description 5
 238000011156 evaluation Methods 0.000 claims description 4
 238000005303 weighing Methods 0.000 claims description 4
 230000003287 optical Effects 0.000 claims description 2
 230000003247 decreasing Effects 0.000 claims 1
 230000000007 visual effect Effects 0.000 abstract description 4
 230000000694 effects Effects 0.000 abstract 1
 XLYOFNOQVPJJNPUHFFFAOYSAN water Substances data:image/svg+xml;base64,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 data:image/svg+xml;base64,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 O XLYOFNOQVPJJNPUHFFFAOYSAN 0.000 abstract 1
 230000000875 corresponding Effects 0.000 description 5
 238000004364 calculation method Methods 0.000 description 3
 238000010586 diagram Methods 0.000 description 3
 238000005516 engineering process Methods 0.000 description 2
 206010039897 Sedation Diseases 0.000 description 1
 239000003086 colorant Substances 0.000 description 1
 238000011161 development Methods 0.000 description 1
 239000004615 ingredient Substances 0.000 description 1
 238000009114 investigational therapy Methods 0.000 description 1
 230000035772 mutation Effects 0.000 description 1
 238000011084 recovery Methods 0.000 description 1
 230000000630 rising Effects 0.000 description 1
Abstract
The invention discloses a communication network vulnerability analyzing system for a largescale area fault and a working method of the communication network vulnerability analyzing system. By means of the network vulnerability analyzing system, the level of the effect to a communication network topology design and network cabling from natural disasters (such as earthquakes and water flood), manmade sabotages (such as purposeful EMP attack and fisher trawling) and other regional faults related to geographic positions can be assessed, and the statistical behavior characteristics including average fault link capacity, the endtoend flow change property and other properties under the regional fault situation of the network are found. According to the network vulnerability analyzing system, the fault region affecting the network mostly can be positioned through the topological information of the physical network, and then the network protecting design is guided. The network vulnerability analyzing system provides a visual interface environment, and can definitely indicate the vulnerability of the system, help communication network designer and maintainer to plan ahead and build the network service with higher robustness.
Description
Technical field
The present invention relates to network vulnerability analysis, especially analysis behavior under extensive area fault for the physical network topology
Feature, positions the incipient fault regional location maximum to web influence simultaneously.
Background technology
Computer network has become as the Main Means of today's society communication.With people, the dependence of network is strengthened, use
The requirement to network reliability for the family also more and more higher.On the other hand, due to the rapidly development of network itself, large area region event
Barrier, such as natural disaster, the impact to network for the artificial destruction increasingly highlights, and its frequency and destructiveness are in rising trend, have become
For affecting one of subject matter that can not ignore of network reliability.
Network vulnerability analysis can help designer and attendant's awareness network system under attack and failure condition
Performance change degree, thus instruct us to the design upgrading of network system and operation maintenance management.Network general at present is crisp
Weak property analysis and safeguard work relate generally to the logical topology of network, and just for a small amount of network link and node failure, lead to
Cross observation in the case of the network equipment failure of limited quantity, the change of data traffic, position key equipment.
How work on hand effectively analyzes the impact to network performance for the extensive area fault under physical network topology, still
There is not feasible solution.This has very strong geographical position dependency mainly due to largescale area fault, burst
Property and multiple faults feature.The position that fault occurs, shape and scope are all unknown, and the network equipment is affected by faults is also difficult to
Prediction.Simply continue to use traditional analysis method in logic network, using deterministic area fault model, will exceedingly letter
The vulnerability analysis changing network it is impossible to the key character of reflecting regional fault, thus leading to network recovery strategy fails or network
Protected investment.Accordingly, it would be desirable to the communication network vulnerability that design is effectively directed to the largescale area fault such as natural disaster is divided
Analysis system.
Content of the invention
The present invention provides a kind of communication network vulnerability analysis system for largescale area fault and its method of work,
It passes through network vulnerability analysis system it can be estimated that communication network topology design and network layout are subject to natural disaster and artificial
The influence degree of the related area fault in the geographical position such as destruction, finds that statistics behavior in the case of area fault for the network is special
Levy, and position the fault zone maximum to this web influence using the topology information of physical network.
The invention provides a kind of communication network vulnerability analysis system for largescale area fault, analysis is on a large scale
Area fault to communication network affect and position the abort situation maximum to web influence it is characterised in that：This system includes
Area fault model, the physical network topology of simulation real world, topological structure includes link capacity, node and chain
The geographical location information on road, simulates common area fault, such as earthquake, hurricane etc.；
Computation analysis module, calculates the analysis number that is interrupted of network link and capacity, endtoend node between flow
Change, probability and its meansigma methodss that endtoend node is cut off to main path and backup path simultaneously；
GUI module, the parameter input of receiving area fault model, the such as selection of model, the setting and being sent to of variatevalue
Computation analysis module, the region that Calculation results are most fragile in network is marked out in visual mode.
Present invention also offers a kind of work side of the communication network vulnerability analysis system for largescale area fault
Method, it comprises the steps：
1）The physical network topology of simulation real world first builds area fault model, in this fault model, fault
The network facilities in region can be destroyed with certain Probability p, and p is bigger, and the network representing in this region is more fragile, and is broken
Bad probability can change with the difference of the area apart from disaster center distance and place disaster region；
2）Subdivision is carried out according to physical network topology to the twodimentional geographic plane in fault model, forms a series of grids,
Identical depending on the impact to the network equipment for the regional faults in each grid, then with each grid as defect center, referred to given
Mark Δ is the standard weighing network performance, the shadow to network performance index when zoning fault occurs in each grid first
Ring Δ n, then by the knowledge of geometric probability, using equation below calculating network performance indications,
Δ=∑_{n}(area(n)/all area)Δ_{n}
Wherein area (n) represents the area of nth grid, and all area represent the geographic area area of network design；
3）Form the standard volume of three measurement network vulnerabilities：
（1）The link capacity of disconnection, i.e. DLC：When area fault occurs, the link capacity meansigma methodss of disconnection.When the chain appearance of a street
When measuring as unit value, represent the number of links of average disconnection；
（2）Point between reduce flow, i.e. PTR：Area fault occur when it is intended that node between data traffic subtract
Few meansigma methodss；
（3）Point between disconnection probability, i.e. PDP：It is intended that operating path and protection between node pair when area fault occurs
There is the probability of disconnection in path simultaneously.
4）The process to the maximum fault section of web influence for the positioning, specially：According to abovementioned three measurements calculating
The standard volume of network vulnerability；These standard volumes are sorted from big to small, the corresponding lattice set coming above constitutes
The region of most fragile in network.
Step 1）Described area fault model includes simulating the concentric circular probability region fault model of earthquake, and simulation
Hurricane, trawlnet damages the line segment failure probability model of optical cable, wherein：
The structure of described concentric circular probability region fault model is：
(1) m r is followed successively by by M radius, the concentric circular of m=1 ..., M is divided into M annulus, and the annulus at center is simultaneously
It is round, each annulus is a uniform disk like probability region fault, wherein r is pitch；
(2) in mth disk like concentric ring fault zone, length is that the probability that breaks down of link of arbitrarily short δ is
q_{m}δ, wherein q_{m}Represent the probability of malfunction in mth region；
(3) because destructiveness reduces with the increase to source point distance, parameter q in annulus is passed by inner dullness outward
Subtract, i.e. q_{1}>q_{2}>…>q；
Article (4) one, link is longer through the length of concentric circular probability region fault, and the probability being damaged is also bigger, if warp
The linkage length crossing concentric circular probability region fault is l, and the Probability p that it breaks down is：
Especially, as q=0, p=0, representing does not have generation area fault；As q=+ ∞, p=1, it is degenerated to definitiveness mould
Type；
The structure of described line segment probability region fault model is：
(1) network portion cut by linelike area fault will be completely destroyed；
(2) length 2r of linelike area fault is fixing, but direction has randomness；
(3) note linearity failure length be 2r, the distance away from link for its central point be x, link normal and linearity failure
The angle being formed is α it is assumed that the direction of line segment probability region fault is equally distributed, then the Probability p that link is interrupted is
P=2 α/π=(2/ π) arccos (x/r)
Step 2）Detailed process be：
Assume that the network having E bar side is divided into N number of grid, its calculating process is as follows：
Step1：Using some grid as area fault center it is assumed that fault model and its parameter are by user setup
Good, calculate the probability that each edge is affected by this fault, after the completion of all probability calculations, define the probability of malfunction matrix of N*E,
It is set to failure_prob [] [], failure_prob [i] [j] represents with ith grid as defect center, jth strip side is broken
Bad probability；
Step2：With each given network performance index Δ as evaluation criteria, in calculating with any one grid as fault
The impact that the heart causes to network.
Step 4）Detailed process be：
(1) computational methods of DLC：Calculate the probability that the link in fault zone is interrupted first, then with this probability be
Weight, calculates the weighted sum of link capacity.
(2) computational methods of PTR：Using Suurballe algorithm find point between all sides not repeatedly path set,
Calculate the weighted sum of the link capacity of these path sets.
(3) computational methods of PDP：Using Suurballe algorithm find point between two sides the shortest not repeatedly
Path, calculates the weighted sum of the link capacity of this two paths.
K bar side between described Suurballe algorithm is look for specifying at 2 points is not repeated and the minimum path of overall length
The classic algorithm of collection.
To all grids, sort from big to small by DLC, PTR, PDP respectively, select front 0.1% grid as final knot
Really, i.e. most fragile region in network.
The present invention has the advantages that：
The present invention passes through network vulnerability analysis system it can be estimated that communication network topology design and network layout are subject to nature
The influence degree of the related area fault in the geographical position such as disaster and artificial destruction, finds network in the case of area fault
Statistics behavior characteristicss, including mean failure rate link capacity, the performance such as changes in flow rate end to end.On this basis, this network is crisp
Weak property analysis system utilizes the topology information of physical network, can position the fault zone maximum to this web influence, and then refer to
Wire guide network design protection.Network vulnerability analysis system provides visual interface environments, can clearly indicate system
Vulnerability, helps exploited in communication person and guardian to provide for a rainy day, and builds the higher network service of robustness.
Compared to the network vulnerability theory analysis based on graph theory, stress and strain model calculates broadly adaptability,
Process more simply effective in the complex topology of real network；Compared to definitiveness area fault model, probability fault model is more preferable
The simulation feature of physical damage, has a higher practicality.
Brief description：
Fig. 1 is physical network topology schematic diagram.
Fig. 2 is concentric circular probability region fault model figure during M=3.
Fig. 3 is line segment probability region fault model figure.
Fig. 4 is mesh generation schematic diagram.
Fig. 5 is grid and network vulnerability analysis system schematic.
Specific embodiment
1. system input
Fig. 1 represents that the input of network vulnerability analysis system is the physical network topology of real world, rather than network is patrolled
Collect topology.This topological structure includes link capacity, the geographical position coordinates information of node and link.Additionally, analysis system is also
Need the size of large area region fault and the probability parameter of input investigation.For example same for natural disasters such as simulation earthquakes
Heart circular probability area fault model, data parameters include the unit link failure probability in zone radius and specified fault coverage,
This information can be obtained by historical data.For simulation hurricane, the natural line segment probability region event with man power disaster such as trawlnet
Barrier model, data parameters are the line segment length needing to investigate.
The standard volume that the present invention weighs network vulnerability has three：
（1）. the link capacity (Disrupted Link Capacity, DLC) of disconnection：When area fault occurs, disconnection
Link capacity meansigma methodss.When link capacity is for unit value, represent the number of links of average disconnection.
（2）. point between reduce flow (Pairwise Traffic Reduction, PTR)：Area fault occurs
When it is intended that node between data traffic reduce meansigma methodss.
（3）. point between disconnection probability (Pairwise Disconnection Probability, PDP)：Region event
When barrier occurs it is intended that between node pair operating path and Protection path there is the probability of disconnection simultaneously.
The invention mainly comprises three below ingredient：
a）. area fault model
In order to more accurately simulate the extensive area fault in real world, the present invention devises two according to the example above
Kind of probability region fault model  concentric circular model and line segment model, to simulate earthquake respectively, flood, the natural disaster such as trawlnet and
The impact to network for the artificial destruction.In probability fault model, the network facilities in disaster region can be broken with certain probability
Bad, and destroyed probability can change with the difference of the area apart from disaster center distance and place disaster region.
Described concentric circular probability region fault model is as shown in Fig. 2 have following feature：
（a）. m r, m=1 are followed successively by by M radius ..., the concentric circular of M is divided into M annulus（The annulus at center is simultaneously
It is also round）, each annulus is a uniform disk like probability region fault, and wherein r is pitch.
（b）. in mth disk like concentric ring fault zone, length is that the probability that breaks down of link of arbitrarily short δ is
q_{m}δ, wherein q_{m}Represent the probability of malfunction in mth region.
（c）. because destructiveness reduces with the increase to source point distance, parameter qm in annulus is by inner dull outward
Successively decrease, i.e. q1>q2>…>qM.
（d）. a link is longer through the length of concentric circular probability region fault, and the probability being damaged is also bigger.If
It is l through the linkage length of concentric circular probability region fault, the Probability p that it breaks down is：
Especially, as q=0, p=0, representing does not have generation area fault；As q=+ ∞, p=1, it is degenerated to definitiveness mould
Type.
Described line segment probability region fault model is as shown in figure 3, have following feature：
（a）. the network portion cut by linelike area fault will be completely destroyed.
（b）. length 2r of linelike area fault is fixing, but direction has randomness.
（c）. note linearity failure length be 2r, the distance away from link for its central point be x, link normal and linearity failure
The angle being formed is it is assumed that the direction of line segment probability region fault is equally distributed, then the Probability p that link is interrupted is
P=2 α/π=(2/ π) arccos (x/r)
b）. the network performance mutation analysises under the fault model of specific region
Analyze the impact of fault and device geographical location except introducing geometric probability during analysis network vulnerability
Outward, also use the mesh generation technological orientation weak section maximum to web influence, closer to realistically reflecting Disaster Event
Impact to network.Be employed technical scheme comprise that：First the plane that network is located is divided into a series of lattices, works as grid
When sufficiently small it is believed that in grid the impact to network performance for any point be the same.
By the impact to network for the mesh generation zoning fault.To each given network performance index Δ, this is
Impact Δ n to network performance index when system zoning fault first occurs in each grid, then passes through geometric probability
Knowledge, using equation below calculating network performance indications,
Δ=∑_{n}(area(n)/all area)Δ_{n}
Wherein area (n) represents the area of nth grid, and all area represent the geographic area area of network design.
To first index：The link capacity (DLC) of disconnection, calculates the failure probability of link in fault zone, so first
Pass through afterwards to calculate the value of the expected value acquisition DLC of be possible to disconnection link capacity.For second index：Point between reduce
Flow (PTR), first calculate specify node pair between maximum quantity side not duplicate paths.Node on these paths and link
Constitute a subnetwork of former network.When probability of happening area fault, former network node between minimizing data flow
Amount expected value is exactly the PTR being led to due to link failure in subnetwork.Trail protection is a kind of less cost of conventional cost
The strategy of network reliability just can be improved, its thought is to set up both links between a pair of node, and one of them is main road
Footpath, in addition one is backup path, it is possible to use Suurballe algorithm find node between primary link and auxiliary link.Pass through
The probability that when zoning fault occurs, main path and backup path break down simultaneously, as put between disconnection probability
(PDP).K bar side between described Suurballe algorithm is look for specifying at 2 points is not repeated and the minimum path set of overall length
Classic algorithm.
c）. positioning is to the maximum vulnerability fault zone of web influence
Assume that defect center occurs in the center of each subdivision network, calculate the corresponding performance weighing network vulnerability and refer to
Mark.These standard volumes are sorted from big to small, comes above（As 0.1%）Corresponding lattice set constitutes in network
Fragile region.
When the steplength of grid division is less, and when the scale of network is larger, corresponding amount of calculation can be very big.For this reason, this
Invention employs Distributed Parallel Computing technology, by calculating generation area event in each mesh generation in multiple computing units
Impact to network during barrier, then calculate the method quickening calculating process of meansigma methodss.
2. network vulnerability analysis system principle
Fig. 4 is network plane subdivision schematic diagram.Except introducing geometric probability analysis during analysis network vulnerability
Outside the impact of fault and device geographical location, also use mesh generation technological orientation to the maximum weak section of web influence,
Closer to realistically reflecting the impact to network for the Disaster Event.Be employed technical scheme comprise that：The plane first network being located
It is divided into a series of lattices, when grid is sufficiently small it is believed that in grid, the impact to network performance for any point is one
Sample.Then calculate with each grid as defect center, with given index Δ for weighing the standard of network performance, network is caused
Impact.Assume that the network having E bar side is divided into N number of grid, its calculating process is as follows：
Step1：Using some grid as area fault center it is assumed that fault model and its parameter are by user setup
Good.Calculate the probability that each edge is affected by this fault, after the completion of all probability calculations, define the probability of malfunction matrix of N*E,
It is set to failure_prob [] [], failure_prob [i] [j] represents with ith grid as defect center, jth strip side is broken
Bad probability.
Step2：With each given network performance index Δ as evaluation criteria, calculate with ith ndex grid as fault
The impact that center is caused to network.The computational methods of indexs of three kinds of measurement network vulnerabilities are respectively：
（1）.DLC computational methods：Calculate the probability that the link in fault zone is interrupted first, then with this probability be
Weight, calculates the weighted sum of link capacity；
（2）.PTR computational methods：Using Suurballe algorithm find point between all sides not repeatedly path
Collection, calculates the weighted sum of the link capacity of these path sets；
（3）.PDP computational methods：Using Suurballe algorithm find point between two sides the shortest not repeatedly
Path, calculates the weighted sum of the link capacity of this two paths.
Step3:To all grids, sort from big to small by DLC, PTR, PDP respectively.Select front 0.1% grid as
Whole result, i.e. most fragile region in network.
When the steplength of grid division is less, and when the scale of network is larger, corresponding amount of calculation can be very big.However, removing
Failure probability matrix failure_prob [] [] that the first step calculates needs to be used in the calculating process of each grid, the
2nd, the calculating of three steps is mutually incoherent, therefore adopts the method for parallel computation to accelerate calculating speed.Step2 is simply to tire out
Plus process, Step3 is sequencer procedure, and two steps merge into a step parallel computation of Mapreduce, this Mapreduce calculating process
Input be the failure probability matrix failure_prob that size is N*E, output is sorted keyvalue pair<dlc,Point>,<
ptr,Point>,<pdp,Point>, wherein Point represents net center of a lattice.
3. network vulnerability analysis system composition
System is divided into computing module and two parts of GUI module, and GUI module is responsible for the input of receive user（Including model
Selection, the setting of parameter etc.）And result is presented in visual mode.Computing module is parallel according to model and parameter
Zoning probability of malfunction, calculating process is as described in 2.
Fig. 5 is network vulnerability analysis system schematic, and the unit wherein comprising have：
（1）Select the combobox of physical network；
（2）Select probability area fault model（Concentric circular model/line segment model）Radio button；
（3）Display network and the textview field of probability region fault parameter；
（4）Executive button（The analysis of execution given parameters）；
（5）Select evaluation criteria（DLC/PTR/PDP）Radio button；
（6）In the case of the given defect center of display, evaluate in the case of and the entering of worst case lower network performance change situation
Degree bar；
（7）Empty button（Prepare to analyze next time）；
（8）All of node and side in display network, and represent source point and terminal with thicker round dot；
（9）Duplicate paths collection different colours do not indicate to be different from other paths on the side found out.
Finally, in figure dash area represents the incipient fault regional location maximum to particular network Index Influence.
The above is only the preferred embodiment of the present invention it is noted that ordinary skill people for the art
For member, some improvement can also be made under the premise without departing from the principles of the invention, these improvement also should be regarded as the present invention's
Protection domain.
Claims (6)
1. a kind of method of work of the communication network vulnerability analysis system for largescale area fault it is characterised in that：Its
Comprise the steps：
1) simulate the physical network topology of real world first and build area fault model, in this fault model, faulty section
The network facilities in domain can be destroyed with certain Probability p, and p is bigger, and the network representing in this region is more fragile, and destroyed
Probability can change with the difference of the area in and place disaster region far and near apart from disaster center；
2) subdivision is carried out according to physical network topology to the twodimentional geographic plane in fault model, form a series of grids, depending on every
In individual grid, the impact to the network equipment for the regional faults is identical, with each grid as defect center, with given index Δ for weighing apparatus
The standard of amount network performance, the impact Δ n, Ran Houtong to network performance index when zoning fault occurs in each grid
Cross the knowledge of geometric probability, using equation below calculating network performance indications,
Δ=∑_{n}(area(n)/all area)Δ_{n}
Wherein area (n) represents the area of nth grid, and all area represent the geographic area area of network design；
3) form the standard volume of three measurement network vulnerabilities：
(1) link capacity of disconnection, i.e. DLC：When area fault occurs, the link capacity meansigma methodss of disconnection；When link capacity is
During unit value, represent the number of links of average disconnection；
(2) point between reduce flow, i.e. PTR：Area fault occur when it is intended that node between data traffic reduce
Meansigma methodss；
(3) point between disconnection probability, i.e. PDP：It is intended that operating path and Protection path between node pair when area fault occurs
There is the probability of disconnection simultaneously.
2. it is directed to the method for work of the communication network vulnerability analysis system of largescale area fault as claimed in claim 1,
It is characterized in that：The method also includes step 4) process to the maximum fault section of web influence for the positioning, specially：According to upper
State the standard volume of the three measurement network vulnerabilities calculating；These standard volumes are sorted from big to small, comes correspondence above
Lattice set constitute the region of most fragile in network.
3. it is directed to the work side of the communication network vulnerability analysis system of largescale area fault as claimed in claim 1 or 2
Method it is characterised in that：Step 1) described in area fault model include simulate earthquake concentric circular probability region fault model, with
And simulation hurricane, the line segment failure probability model of trawlnet infringement optical cable, wherein：The knot of described concentric circular probability region fault model
Structure is：
(1) m r is followed successively by by M radius, the concentric circular of m=1 ..., M is divided into M annulus, and the annulus at center is also simultaneously
Circle, each annulus is a uniform disk like probability region fault, and wherein r is pitch；
(2) in mth disk like concentric ring fault zone, length is the probability that breaks down of link of arbitrarily short δ is q_{m}δ, its
Middle q_{m}Represent the probability of malfunction in mth region；
(3) because destructiveness reduces, parameter q in annulus with the increase to source point distance_{m}By inner monotone decreasing outward,
I.e. q_{1}>q_{2}>…>q_{m}；
Article (4) one, link is longer through the length of concentric circular probability region fault, and the probability being damaged is also bigger, if through same
The linkage length of heart circular probability area fault is l, and the Probability p that it breaks down is：
Especially, as q=0, p=0, representing does not have generation area fault；As q=+ ∞, p=1, it is degenerated to definitiveness mould
Type；
The structure of described line segment failure probability model is：
(1) network portion cut by linelike area fault will be completely destroyed；
(2) length 2r of linelike area fault is fixing, but direction has randomness；
(3) length of note linearity failure is 2r, and the distance away from link for its central point is x, and link normal is formed with linearity failure
Angle is α it is assumed that the direction of line segment probability region fault is equally distributed, then the Probability p that link is interrupted is
P=2 α/π=(2/ π) arccos (x/r).
4. it is directed to the work side of the communication network vulnerability analysis system of largescale area fault as claimed in claim 1 or 2
Method is it is characterised in that step 2) detailed process be：
Assume that the network having E bar side is divided into N number of grid, its calculating process is as follows：
Step 1：Using some grid as area fault center it is assumed that fault model and its parameter are good by user setup,
Calculate the probability that each edge is affected by this fault, after the completion of all probability calculations, define the probability of malfunction matrix of N*E, if
For failure_prob [] [], with ith grid as defect center, jth strip side is destroyed for failure_prob [i] [j] expression
Probability；
Step 2：With each given network performance index Δ as evaluation criteria, calculate with any one grid as defect center
The impact that network is caused.
5. it is directed to the method for work of the communication network vulnerability analysis system of largescale area fault as claimed in claim 2,
It is characterized in that step 3) detailed process be：
(1) computational methods of DLC：Calculate the probability that the link in fault zone is interrupted first, then with this probability as weight,
Calculate the weighted sum of link capacity；
(2) computational methods of PTR：Using Suurballe algorithm find point between all sides not repeatedly path set, calculate
The weighted sum of the link capacity of these path sets；
(3) computational methods of PDP：Using Suurballe algorithm find point between two sides the shortest not repeatedly path,
Calculate the weighted sum of the link capacity of this two paths；
K bar side between described Suurballe algorithm is look for specifying at 2 points is not repeated and overall length minimum path set
Classic algorithm.
6. it is directed to the method for work of the communication network vulnerability analysis system of largescale area fault as claimed in claim 5,
It is characterized in that step 4) detailed process be：To all grids, sort from big to small by DLC, PTR, PDP respectively, before selecting
0.1% grid is as final result, i.e. most fragile region in network.
Priority Applications (1)
Application Number  Priority Date  Filing Date  Title 

CN201310675396.5A CN103684864B (en)  20131211  20131211  Communication network vulnerability analyzing system for largescale area fault and working method of communication network vulnerability analyzing system 
Applications Claiming Priority (1)
Application Number  Priority Date  Filing Date  Title 

CN201310675396.5A CN103684864B (en)  20131211  20131211  Communication network vulnerability analyzing system for largescale area fault and working method of communication network vulnerability analyzing system 
Publications (2)
Publication Number  Publication Date 

CN103684864A CN103684864A (en)  20140326 
CN103684864B true CN103684864B (en)  20170215 
Family
ID=50321245
Family Applications (1)
Application Number  Title  Priority Date  Filing Date 

CN201310675396.5A Active CN103684864B (en)  20131211  20131211  Communication network vulnerability analyzing system for largescale area fault and working method of communication network vulnerability analyzing system 
Country Status (1)
Country  Link 

CN (1)  CN103684864B (en) 
Families Citing this family (3)
Publication number  Priority date  Publication date  Assignee  Title 

CN104506337B (en) *  20141120  20180213  北京邮电大学  Mapping method of virtual network and device based on regional faults prediction 
CN109302310B (en) *  20180829  20190618  中国人民解放军陆军工程大学  A kind of network O&M vulnerability analysis method 
CN110445634B (en) *  20190617  20210108  华北电力大学  Power communication network vulnerability area discovery method based on area flow density 
Citations (4)
Publication number  Priority date  Publication date  Assignee  Title 

US6996514B2 (en) *  20001113  20060207  Nortel Networks Limited  Time simulation techniques to determine network availability 
CN101588263A (en) *  20090623  20091125  广东电网公司电力通信中心  Method for evaluating reliability of electric force communication network 
CN102270325A (en) *  20110712  20111207  北京师范大学  Method for evaluating vulnerability of regional environment risk receptor 
CN103413015A (en) *  20130424  20131127  重庆科技学院  Method for building city gas pipe network vulnerability evaluation model 

2013
 20131211 CN CN201310675396.5A patent/CN103684864B/en active Active
Patent Citations (4)
Publication number  Priority date  Publication date  Assignee  Title 

US6996514B2 (en) *  20001113  20060207  Nortel Networks Limited  Time simulation techniques to determine network availability 
CN101588263A (en) *  20090623  20091125  广东电网公司电力通信中心  Method for evaluating reliability of electric force communication network 
CN102270325A (en) *  20110712  20111207  北京师范大学  Method for evaluating vulnerability of regional environment risk receptor 
CN103413015A (en) *  20130424  20131127  重庆科技学院  Method for building city gas pipe network vulnerability evaluation model 
Also Published As
Publication number  Publication date 

CN103684864A (en)  20140326 
Similar Documents
Publication  Publication Date  Title 

CN103684864B (en)  Communication network vulnerability analyzing system for largescale area fault and working method of communication network vulnerability analyzing system  
CN103308824B (en)  Power system fault diagnostic method based on probability Petri net  
Testa et al.  Resilience of coastal transportation networks faced with extreme climatic events  
CN105471659B (en)  A kind of failure root cause analysis method and analytical equipment  
Mao et al.  Assessment of the impact of interdependencies on the resilience of networked critical infrastructure systems  
Hosseini Nourzad et al.  Vulnerability of infrastructure systems: Macroscopic analysis of critical disruptions on road networks  
Kermanshah et al.  Impact analysis of extreme events on flows in spatial networks  
Zhang et al.  Megaregion network simulation for evacuation analysis  
Kong et al.  Sequential hazards resilience of interdependent infrastructure system: A case study of Greater Toronto Area energy infrastructure system  
CN106027399A (en)  Method for identifying key links in communication network  
Yang et al.  Vulnerability evaluation of the highway transportation system against meteorological disasters  
Kong et al.  Probabilistic multiple hazard resilience model of an interdependent infrastructure system  
Yang et al.  Criticality ranking for components of a transportation network at risk from tropical cyclones  
Liu et al.  A comprehensive risk analysis of transportation networks affected by rainfall‐induced multihazards  
Chen et al.  Bayesian network of risk assessment for a superlarge dam exposed to multiple natural risk sources  
CN108616405A (en)  The Fault Locating Method and device in a kind of intelligent substation void circuit  
CN105045574A (en)  Software key function identification method based on complex network fault propagation  
Kim et al.  Seismic performance assessment of interdependent lifeline systems  
CN102281103B (en)  Optical network multifault recovering method based on fuzzy set calculation  
CN106603294A (en)  Comprehensive vulnerability assessment method based on power communication network structure and state  
CN110213087A (en)  A kind of complication system Fault Locating Method based on dynamic multilayer coupling network  
CN107465535B (en)  A kind of link down risk analysis method, device, electronic equipment and storage medium  
CN109656904A (en)  A kind of case risk checking method and system  
CN106066436A (en)  Consider the operation of power networks state identification method of cascading trip  
US10938631B2 (en)  Quantitative analysis of physical risk due to geospatial proximity of network infrastructure 
Legal Events
Date  Code  Title  Description 

PB01  Publication  
PB01  Publication  
SE01  Entry into force of request for substantive examination  
C10  Entry into substantive examination  
GR01  Patent grant  
C14  Grant of patent or utility model 