• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Guo Chi, Wang Lina, Li Yu, Zhou Furong. Study on Network Cascading Failures Based on Load-Capacity Model[J]. Journal of Computer Research and Development, 2012, 49(12): 2529-2538.
Citation: Guo Chi, Wang Lina, Li Yu, Zhou Furong. Study on Network Cascading Failures Based on Load-Capacity Model[J]. Journal of Computer Research and Development, 2012, 49(12): 2529-2538.

Study on Network Cascading Failures Based on Load-Capacity Model

More Information
  • Published Date: December 14, 2012
  • Cascading failures always occur in computer networks in which network traffic is severely impaired or halted to or between larger sections of the network, caused by failing or disconnected hardware or software. “Load-capacity” models are usually used for solving network traffic problems and exploring the mechanisms of cascading failures. Centering on cascading failures in complex networks, the following work is done. Firstly, the effect of network traffic load on cascading failures is analyzed. It indicates that the communication activity among network nodes presents a self-organized criticality phenomenon, and the influence on the network robustness brought by the traffic change of those original inactive nodes is much greater than that brought by those active ones. Secondly, under the constraints of economy and technology, a cost factor is introduced to model the relationship of network capacity and load, so as to reveal their constraints relationship. Finally, Centering on the issue of “how to allocate the limited redundant resources to a network with specific structure in order to improve its robustness”, an evolutionary algorithm to search an optimized capacity-allocation strategy is proposed, which makes the network achieve optimal robustness with the same resources. Experiments show that our algorithm can find a better result of capacity-allocation than the ones with linear or preferences-attached strategies.
  • Related Articles

    [1]Guo Yuhan, Zhang Yu, Shen Xueli, Yu Junyu. Multi-Strategy Solution Space Graph Search Algorithm of Real-Time Ride-Sharing Problem[J]. Journal of Computer Research and Development, 2020, 57(6): 1269-1283. DOI: 10.7544/issn1000-1239.2020.20190484
    [2]Sun Qian, Xue Leiqi, Gao Ling, Wang Hai, Wang Yuxiang. Selection of Network Defense Strategies Based on Stochastic Game and Tabu Search[J]. Journal of Computer Research and Development, 2020, 57(4): 767-777. DOI: 10.7544/issn1000-1239.2020.20190870
    [3]Shen Yijie, Zeng Dan, Xiong Jin. A Benefit Model Based Data Reuse Mechanism for Spark SQL[J]. Journal of Computer Research and Development, 2020, 57(2): 318-332. DOI: 10.7544/issn1000-1239.2020.20190563
    [4]Wang Ye, Li Qingbao, Zeng Guangyu, Chen Zhifeng. A Code Reuse Attack Protection Technique Based on Code Anti-Leakage[J]. Journal of Computer Research and Development, 2016, 53(10): 2277-2287. DOI: 10.7544/issn1000-1239.2016.20160423
    [5]Xie Heng, Wang Mei, Le Jiajin, Sun Li. Calculation Results Characteristics Extract and Reuse Strategy Based on Hive[J]. Journal of Computer Research and Development, 2015, 52(9): 2014-2024. DOI: 10.7544/issn1000-1239.2015.20140548
    [6]Jin Wenbing, Shi Feng, Zuo Qi, Zhang Yang. Study of Ahead Branch Prediction Architecture and Algorithm[J]. Journal of Computer Research and Development, 2013, 50(10): 2228-2238.
    [7]Lin Junmin, Wang Wei, Qiao Lin, and Tang Zhizhong. A Cache Replacement Policy Based on Reuse Distance Prediction and Stream Detection[J]. Journal of Computer Research and Development, 2012, 49(5): 1049-1060.
    [8]Zhang Qi, Wang Mei, Le Jiajin, Liu Guohua. Scheduling Algorithm for the Reuse Buffers in Column-Store Data Warehouse Query Execution[J]. Journal of Computer Research and Development, 2011, 48(10): 1942-1950.
    [9]Luo Shutong, Pei Zhili, Zhang Changhai, Jin Ying. A of Feature Reuse Method at Requirement Level Based on Aspect Encapsulation[J]. Journal of Computer Research and Development, 2011, 48(9): 1714-1721.
    [10]Song Shijie, Hu Huaping, Zhou Jiawei, and Jin Shiyao. A Sequential Pattern Mining Algorithm Based on Large-Itemset Reuse[J]. Journal of Computer Research and Development, 2006, 43(1): 68-74.

Catalog

    Article views (826) PDF downloads (385) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return