Next Article in Journal
An Energy-Efficient Method for Recurrent Neural Network Inference in Edge Cloud Computing
Previous Article in Journal
Refined Hermite–Hadamard Inequalities and Some Norm Inequalities
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Reliability Analysis of Survivable Networks under the Hostile Model †

Faculty of Engineering, Universidad de la República, Montevideo 11300, Uruguay
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in Proceedings of 8th International Conference on Variable Neighborhood Search, co-organized by the EURO Working Group on Metaheuristics.
Symmetry 2022, 14(12), 2523; https://doi.org/10.3390/sym14122523
Submission received: 23 October 2022 / Revised: 9 November 2022 / Accepted: 21 November 2022 / Published: 29 November 2022
(This article belongs to the Section Computer)

Abstract

:
This article studies the Generalized Steiner Problem with Node-Connectivity Constraints and Hostile Reliability and introduces a metaheuristic resolution approach based on Greedy Randomized Adaptive Search Procedure and Variable Neighborhood Descent. Under the hostile model, nodes and links are subject to probabilistic failures. The research focuses on studying the relationship between the optimization and the reliability evaluation in a symmetric network design problem. Relevant research questions are addressed, linking the number of feasible networks for the full probabilistic model, the sensitivity with respect to elementary probabilities of operation for both edges and nodes, and the sensitivity of the model with respect to the symmetric connectivity constraints defined for terminal nodes. The main result indicates that, for the hostile model, it is better at improving the elementary probabilities of operation of links than improving the elementary probabilities of Steiner nodes, to meet a required reliability threshold for the designed network.

1. Introduction

Currently, the backbone of the infrastructure that provides support to the Internet is based on optic fiber. The internet interconnects several types of networks, providing support for large, medium, and small retail companies, Internet Service Providers, large data centers [1]; distributed datacenters [2]; and Content Delivery Networks [3], among other relevant networks. In turn, services based on optic fiber to the home have a large penetration throughout the world, and provide high data rates to the final customers. In this context, relevant issues arise regarding the network design. For example, a specific concern is that the physical design of the optic fiber network is not robust against large-scale natural disasters and/or malicious attacks [4].
In the last twenty years, both the technological and research communities have been searching for smart strategies for the augmentation of physical networks [5,6]. The importance of the fiber-optics network deployment problem led to several relevant topological network design problems. The main goal is interconnecting distinguished nodes of the network with acceptable redundancy, while simultaneously meeting reliability constraints.
Reliability analysis refers to the study of probabilistic failures on the components of a system [7]. Reliability is defined as the the capability of a system of being trustworthy or performing correctly and consistently. The reliability is a probabilistic measure of the correct operation of the system, subject to random failures [7]. In network reliability analysis, systems are modeled as graphs where the nodes are the elements of interest of the system and the edges are the relationship between said elements (e.g. electricity transmission lines, fiber optics, etc.). The operating probabilities of the elementary components of the system (nodes and/or links) are assumed to be known. After modeling the system, it is defined what an operating state is, and the reliability of the system (i.e., the probability that the system works given that failures occur in its elementary components) is computed [8].
Network reliability can be improved through diversity enhancement [9]. The main idea consists in optimizing the network design to guarantee that communications do not fail, even when node/link failures occur (within a given tolerance). The augmentation proposes including redundant paths to guarantee reliability [10].
In this line of work, this article introduces the Generalized Steiner Problem with Node-Connectivity Constraints and Hostile Reliability (GSPNCHR) and describes a metaheuristic resolution approach based on Greedy Randomized Adaptive Search Procedure (GRASP) and Variable Neighborhood Descent (VND). The GSPNCHR is a relevant symmetric network design problem, characterized by symmetric connectivity requirements between distinguished terminal nodes and also symmetric costs for links. The hostile model is studied, assuming that nodes and links are subject to probabilistic failures [11]. The main goal of the research is studying the relationship between the network optimization and reliability evaluation for a relevant symmetric network design problem. The study provides a useful insight to characterize the reliability of symmetric networks.
The main questions that guided the research are:
  • Research Question 1 (RQ 1):How many feasible networks exists given the full probabilistic model, with input parameters ( p m i n , P E , P V T ) , where p m i n is a lower bound for the reliability of the designed network, P E is the vector of elementary probabilities of operation for links in E, and  P V T is the vector of elementary probabilities of operation for nodes in V T (i.e., Steiner nodes) de Steiner). The main goal is analyzing the number of solutions found by the proposed GRASP/VND metaheuristic to solve the GSPNCHR have a larger reliability under the hostil model than the established threshold p m i n .
  • Research Question 2 (RQ 2):What is the sensitivity of the model with respect to elementary probabilities of operation for both edges and nodes? Given the minimum reliability threshold for the network p m i n , the goal is analyzing the solutions computed by the proposed GRASP/VND metaheuristic, determining if they provide a reliability larger than p m i n in two scenarios: (i) when vector P E is fixed and values of vector P V T vary in a given range, and (ii) when components of the vector P V T are fixed and values of vector P E vary in a given range.
  • Research Question 3 (RQ 3):What is the sensitivity of the model with respect to the connectivity constraints defined for terminal nodes? Given a triplet ( p m i n , P E , P V T ) and considering a given baseline network topology, different input networks are generated for the GSPNCHR, considering different number of terminal nodes and different connectivity requirements for each pair of terminal nodes (i.e., number of disjoint path between them). Then, the number of solutions computed by the proposed GRASP/VND metaheuristic whose reliability is over p m i n is determined.
  • Research Question 4 (RQ 4):Is it better to improve the elementary probabilities of operation of links, or the the elementary probabilities of Steiner nodes, in order to meet a required reliability threshold for the designed network?
Regarding the applied methodology, on the one hand, GRASP and VND were chosen for the design and optimization due to their known efficiency in solving combinatorial optimization problems on graphs. On the other hand, the Recursive Variance Reduction (RVR) technique was used for evaluating the reliability of the designed networks, considering its better efficacy and computational efficiency with respect to other reliability estimation techniques in different scenarios [12]. RVR is characterized by returning better estimates to the exact value for the reliability of a network (in the studied problem variant, under the hostile model) and lower variance than other-well known techniques [12]
The calculation of the reliability of a network in the hostile model is an NP-hard problem. The main goal of the research is to analyze the trade-off between reliability and design cost when adding different redundancy levels between distinguished nodes. The main results indicate that the proposed approach is able to compute good quality solutions (i.e., low cost solutions) for the GSPNCHR, also complying with high reliability levels, through a specific constraint that discards feasible solutions whose reliability is lower than a certain pre-established bound ( p m i n ).
The article extends our previous conference publication “A GRASP/VND heuristic for the Generalized Steiner Problem with Node-Connectivity Constraints and Hostile Reliability” [13] at 8th International Conference on Variable Neighborhood Search Abu Dhabi, United Arab Emirates, 2021. New content and contributions in this article include:
(i)
An improved definition and description of the Generalized Steiner Problem with Node-Connectivity Constraints and Hostile Reliability (GSPNCHR).
(ii)
An exact formulation of the GSPNCHR as a mathematical programming problem.
(iii)
A proof that the GSPNCHR is in the NP-hard complexity class.
(iv)
An extended review of related works, properly contextualized with the proposed research.
(v)
The design of a GRASP/VND hybrid metaheuristic to solve the GSPNCHR, using the RVR method for estimating the reliability of the computed networks, to be compared with the established lower bound p m i n .
(vi)
An improved experimental analysis and results that highlight the fact that the proposed model is more robust under node failures than over link failures.
(vii)
Theoretical results for particular cases of the GSPNCHR are introduced.
The article is organized as follows. The next section presents a formal description for the GSPNCHR problem and demonstrates its NP-hardness. Section 3 reviews relevant related work. A GRASP/VND solution is introduced in Section 4. Numerical results are presented in Section 5. In this section the capabilities of the designed GRASP/VND and reliability evaluation approach for the GSP-NC are evaluated. Moreover, a sensitivity analysis is introduced with the aim to evaluate the impact of perturbations in the elementary reliabilities on edges and Steiner nodes. Section 6 particular cases of the addressed problem are analyzed. Among them are cases in which the problem can be solved in polynomial computational order. Finally, Section 7 presents the main conclusions of the research and formulates the main lines for future work.

2. The Generalized Steiner Problem with Node-Connectivity Constraints and Hostile Reliability

This section describes the GSPNCHR, its mathematical formulation as optimization problem, and the computational complexity of the problem.

2.1. Problem Model and Definition

The considered problem model proposes a network scenario where component failures may occur. In particular, the model works under the general hypothesis that both the network links and the network nodes can fail. Two types of nodes are considered, the so-called terminal nodes that model the more interesting nodes, for which connectivity requirements are set, and Steiner nodes, optional nodes that may or may not be part of feasible solutions. The connectivity requirements defined for terminal nodes are symmetric. Using Steiner nodes usually contributes to reduce the cost of the proposed network design, especially when considering connectivity requirements. Steiner nodes also have an impact on the reliability of feasible solutions.
Terminal nodes are always part of feasible solutions and different levels of connectivity between them are established in advance (i.e., a certain number of node-disjoint paths that connect them). Connectivity constraints are formulated in a a matrix of node-connectivity levels required between pairs of terminal nodes. The matrix that defines the connectivity requirements for terminal nodes is symmetric. Since both connectivity requirements and connectivity costs are symmetric, the network design problem in symmetric. The elementary probabilities of operation of the Steiner links and nodes are assumed to be known. They are independent and can have heterogeneous values, within specific ranges for both sets. Other inputs of the problem are two vectors with the probabilities of operation of the links and the probabilities of operation of the Steiner nodes. Terminal nodes are assumed to be perfect (they operate with probability 1).
Network links have associated costs that model the cost of commissioning the connection between two nodes, typically the dredging to lay a line that connects two sites. An input matrix establishes the connection costs between every pair of network nodes. The matrix that establishes the connections cost is symmetric. The goal of the problem is designing a minimum cost sub-network of the input network topology that satisfies the matrix of node-connectivity requirements between pairs of nodes and also the reliability of the designed sub-network exceeds a certain pre-established threshold, which is also an input to the problem.
The model applied to evaluate the reliability of the network is known as hostile model. In the hostile model, except for terminal nodes, any other component of the network is subjected to failures. In the proposed problem, both the Steiner nodes (non-terminal nodes) and the edges are subjected to failures with pre-established probabilities of operation. These probabilities are independent of each other and also within the set of edges and within the set of Steiner nodes. Usually the values they take are high, for example greater than 0.95.
The exact calculation of the reliability of a network in the hostile model is an NP-hard problem itself. Even when the probabilities of operation for Steiner nodes are equal to 1, the k-terminal-reliability model arises, a well-known NP-hard problem [14]. In this article, the RVR technique is adapted to the hostile model and applied to efficiently estimate the reliability of the network.
The proposed model does not consider dependencies between components. Links and Steiner nodes have probabilities of failure (or operation) independent of each other. This is a common assumption in edge-reliability, node-reliability, and also in the studied hostile model. Assuming dependencies between the failure of components requires having knowledge of the probability distributions of joint failures, which is usually not known. Models that assume failure dependencies do not necessarily adapt to different realities. We address the design of generic networks that can be instantiated in different contexts, so no assumptions about failure dependencies are considered.
Overall, the proposed model combines the concepts and goals of ‘designing a survivable network’ and ‘designing a reliable network’ in a single low-cost robust network design approach, without including non-realistic simplifications.

2.2. Mathematical Formulation

The mathematical formulation of the GSPNCHR is presented next.
Definition 1 (GSPNCHR).
Consider a simple undirected graph G = ( V , E ) , a distinguished set of terminal nodes T V (called terminals), a matrix C = { c i , j } ( i , j ) E with link-costs that models the costs of connecting pairs of network nodes, and connectivity requirements defined for each pair of terminal nodes R = { r i , j } i , j T . Links are assumed to fail with probability P E = { p e } e E and nodes are assumed to fail with probability P V T = { p v } v V T . The goal of the problem is building a minimum-cost topology G S G meeting both the connectivity requirements R and a given reliability threshold p m i n i.e., R K ( G S ) p m i n , being K = T the set of terminal nodes. R K ( G S ) denotes the probability that the graph G S spans the terminal set K = T , where links and Steiner nodes may fail with probabilities P E and P V T , respectively. Namely, R K ( G S ) is the reliability of G S under the hostile model.
The mathematical formulation of the GSPNCHR considers the following elements:
  • A graph ( G , C , R , T , P E , P V T ) , according to Definition 1.
  • A value p m i n , which determines a lower bound of reliability to be satisfied by the feasible solutions of the problem.
  • A decision variable y ( i , j ) u , v , defined in Equation (1), that indicates if the link ( i , j ) E , directed from i to j, is used on a path from the terminal node u to the terminal node v in the built solution.
    y ( i , j ) u , v = 1 in   case ( i , j ) E is   used   in   a   path u i j v 0 otherwise
  • A decision variable x ( i , j ) , defined in Equation (2), that indicates if the (undirected) link ( i , j ) is used in the built solution.
    x ( i , j ) = 1 in   case ( i , j ) E is   used   in   the   solution 0 otherwise
The mathematical formulation of the GSPNCHR as a combinatorial optimization problem is presented in Equations (3)–(12).
min ( i , j ) E c i , j x i , j ( 3 ) subject to x i j y ( i , j ) u , v + y ( j , i ) u , v ( i , j ) E , u , v T , u v ( 4 ) ( u , i ) E y ( u , i ) u , v r u , v u , v T , u v ( 5 ) ( j , v ) E y ( j , v ) u , v r u , v u , v T , u v ( 6 ) ( i , p ) I ( p ) y ( i , p ) u , v ( p , j ) I ( p ) y ( p , j ) u , v 0 , p V { u , v } , u , v T , u v ( 7 ) ( s , i ) E x s , i M x ^ s , s V T ( 8 ) R K ( G S ( { x i , j } ) ) p m i n ( 9 ) x ( i , j ) { 0 , 1 } ( i , j ) E ( 10 ) x ^ i { 0 , 1 } i V T ( 11 ) y ( i , j ) u , v { 0 , 1 } ( i , j ) E , u , v T , u v ( 12 )
The objective function is expressed in Equation (3). It proposes minimizing the overall design cost of the reliable network design, considering all links included in a solution and the cost function defined for edges of the graph G.
The constraints of the problem are defined in Equations (4)–(12). Constraints in Equation (4) state that the considered network links are one-way, i.e., a direct graph is considered to model the communication network. It also establishes that the undirected edge ( i , j ) can be used in only one direction in a path that connects the terminal node u with the terminal node v. The connectivity requirements for each pair of terminal nodes are expressed by Equations (6)–(8). Equation (6) establishes that from the terminal node u at least r u , v disjoint paths must exist to the terminal node v. Equation (7) states that the terminal node v must reach at least r u , v disjoint paths from the terminal node u. Constraints in Equation (8) express the Kirchhoff flow conservation law, stating that the number of incident edges to an intermediate node p (denoted by the set I ( p ) ) that are part of disjoint paths that lead from a terminal node u to a terminal node v is equal to the number of exit edges of the node p that are part of disjoint paths that lead from u to v. Constraints in Equation (9) state that any link incident to a Steiner node should only be used if the Steiner node is included in the solution, thus avoiding superfluous links that increase the network design cost. The constant value M is any large real number, for example M = | E | without loss of generality. Constraint in Equation (10) establishes that the reliability of the solution subgraph G S G , built with all selected links x i , j must be greater or equal than the minimum reliability threshold p m i n . In the equation G S ( { x i , j } ) denotes that G S is the subgraph of G induced by the decision variables { x i , j } with value 1.
Finally, the set of constraints in Equations (11) and (12) indicate that all the considered decision variables are binary, i.e., included in { 0 , 1 } .

2.3. Generalized Steiner Problem with Node-Connectivity Constraints

The GSP-NC is a relaxation of the GSPNCHR. It is formally defined next.
Definition 2 (GSPNC).
GSPNC is the relaxation of GSPNCHR, without constraint (10). Specifically, given a simple undirected graph G = ( V , E ) , a set of distinguished nodes T V (called terminals), a matrix with symmetric link-costs { c i , j } ( i , j ) E and a matrix of connectivity requirements R = { r i , j } i , j T , build a minimum cost topology G S G fulfilling the connectivity requirements.
In this work, a full algorithm for the GSP-NC is developed. Then, the number of feasible GSP-NC solutions that also meet the reliability threshold is studied. The key questions of the proposed research are strictly related with the number of feasible solutions for the GSP-NC that are also feasible for the GSPNCHR. This way, the proposed research studies the interplay between topological network design and reliability analysis. Furthermore, a sensitivity on the reliability parameters and connectivity constraints is also discussed.

2.4. NP-Hardness of GSP-NC and GSPNCHR Problem

The GSP-NC is NP-hard [15]. The considered GSPNCHR is also NP-hard, as is proved in this subsection.
Theorem 1.
The GSPNCHR is within the class of NP-hard problems.
Proof. 
The Hamilton Tour (i.e., Hamiltonian cycle problem) belongs to the list of 21 NP-complete problems proposed by Karp [16]. Consider a graph G = ( V , E ) and the trivial instance of the GSPNCHR defined by ( G , C , R , T , P E , P V T , p m i n ) , with unitary costs, nodes and links that do not fail, all nodes are terminal, and two-path requirements r i , j = 2 for all i , j V . The network design cost is lower than the number of nodes n = | V | if and only if the graph G has a Hamilton tour. Thus, even for the trivial instance, GSPNCHR is also NP-hard.    □

3. Related Work

This article extends the Generalized Steiner Problem (GSP), by considering connectivity requirements for nodes and a hostile reliability model. This section reviews related works about the analysis of network reliability, topological network design, and problems/models studying both topological and reliability properties.
Few articles have dealt with the topological optimization of network design jointly with reliability constraints. Barrera et al. [17] optimized the topological network design to minimize costs under reliability constraints (k-terminal). A Sample Average Approximation (SAA) method [18] was applied and authors concluded that suboptimal solutions are found if the model ignores dependent failures. Recent articles have studied reliability optimization in stochastic binary systems [19], and applying SAA methods [20]. A related and challenging research field is finding uniformly most reliable graphs, considering a given number of fixed nodes and links, with maximum uniform reliability [21].
A closer problem to the one addressed in this article is considering topological transformations replacing or changing links, or even paths or trees, with the main goal of increasing/improving the considered reliability estimation. A recent article [22] has introduced a new approach for building networks by applying transformation to increase reliability. The main theoretical results is that any graph with a cut-point is transformable into a bi-connected graph with an improved reliability. Considering this theoretical result, the proposed designs do not include cut-points.
Botton et al. [23] introduced the hop-constrained survivable network design problem with reliable edges. The problem proposes finding a minimum cost set of edges so that the induced subgraph contains at least k edge-disjoint paths containing at most L edges between each pair of nodes. Two variants of the problem were introduced: a static version where the reliability of edges is given, and an upgrading problem where edges can be upgraded to the reliable status at a given cost. Both approaches were modeled by mathematical programming and solved by Benders decomposition. Results showed that both variants are more difficult to solve than the original problem (without reliable edges) [24]. Results also proved the economic benefits of using the versions with reliability edges.
Ozcan et al. [25] proposed hybrid strategies to solve the minimum cost communication network design problem under all-terminal reliability constraint. Results showed that hybridizing metaheuristics with Branch-and-Bound is an effective approach to designing reliable networks and finding better solutions. Kabiri et al. [26] formulated the wireless backhaul network design problem under reliability and survivability constraints. An accelerated Benders decomposition algorithm was applied to solve the problem. Extensive computational experiments showed the accuracy of the designed model and the efficiency of the Benders method, particularly in larger networks. Liu et al. [27] proposed a reliable mixed integer programming optimization model for designing a minimum cost and survivable network that continues operation under node failures. Three heuristic methods were designed to solve the proposed models: Branch-and-Bound, global algorithm, and heuristic algorithm based on Benders decomposition. The computational results validated the accuracy of the proposed models and resolution methods.
Few works in the network reliability literature have considered dependencies between network components. The network reliability theory and the more general case of modeling generic systems prone to failures (i.e., stochastic binary systems) also assume the independence of component failures. Park [28] analyzed the exact time-dependent all-terminal reliability of wireless networks with dependent failures, to provide a more realistic assessment of the reliability. Hardware failures and channel fading in the static environment were considered. Exact time-dependent reliability polynomials were derived for two type of wireless networks: (i) regular networks where each node connects other nodes via four point-to-point radio modules, and (ii) random mesh networks where each node connects other nodes through redundant radio-broadcast modules. The exact instantaneous failure rates were computed too. Yang et al. [29] introduced a Bayesian reliability approach for complex systems with dependent life metrics. A method was proposed to convert the overall likelihood into a product of explicit and implicit evidence-based likelihood functions. The article developed a systematic analysis of the role of dependent evidence in reliability evaluation and the proposed full Bayesian approach was applied to various system reliability models. Moreover, different numerical cases and a practical engineering case were considered to demonstrate the validity of the proposed approach. A recent article by Cancela et al. [30] addressed the problem of estimating reliability for stochastic flow networks with dependent arcs. A splitting-based Monte Carlo method was proposed, using the Marshall–Olkin copula for the case of nonindependent components. The article introduced a review of the methods based on creation and the destruction processes. A comparative experimental analysis showed the efficiency of the proposed approach.
Many articles in the network reliability literature have dealt with reliability evaluation rather than with reliability maximization. Simulations allow achieving a reasonable trade-off between the accuracy of results and the computational cost of the calculations [16]. Approaches based on Monte Carlo simulation methods allow finding point-wise estimations via independent replications and statistical modeling of complex systems. The RVR method has proven to be a useful and precise technique for reliability estimation [12], significantly improving over the standard Monte Carlo approaches In this article, the RVR method is applied for estimating the network reliability. The application is meaningful since the RVR method has been extended to Stochastic Monotone Binary Systems [31], such as the hostile model studied in this article.
The GSP proposes finding a minimum cost network to communicate a given subset of terminal nodes, meeting connectivity requirements defined by paths that are disjoint on edges (GSP-EC variant) or disjoint on nodes (GSP-NC variant). The GSP is NP-hard, thus approximation algorithms and metaheuristics have been proposed as resolution approaches. Agrawal and Ravi [32] proposed a logarithmic factor approximation algorithm to solve the GSP-EC and later Jain [33] proposed a factor-2 approximation algorithm for the same problem, applying the primal-dual approach for linear programming. Suzuki et al. [34] ennumerated optimal GSP solutions applying the Zero-Suppressed Binary Decision Diagrams compact data structure. The proposed method worked correctly for a number of realistic problem instances. Heuristics and metaheuristics have also been proposed for the GSP. Sartor and Robledo applied a resolution methodology based on GRASP to solve the GSP-EC variant [35]. Nesmachnow [36] presented an empirical evaluation of metaheuristic algorithms (including evolutionary computation and VNS) for the GSP, with promising results for several problem instances.

4. Metaheuristic Approach for the GSPNCHR

This section presents the proposed metaheuristic approach applying GRASP and VND for solving the GSPNCHR.

4.1. Methodology

The following methodology is developed to solve the GSPNCHR. First, a GRASP/VND metaheuristic is applied to compute a complete GSP-NC of the problem without the reliability threshold (constraint (10) in the problem formulation). After that, the number of feasible solutions that satisfy constraint (10) is counted. The proposed approach relies on determining whether or not the topological robustness impacts on the reliability of the resulting network.
Since the GSP-NC is NP-hard, a metaheuristic approach is proposed to compute accurate solutions in reasonable execution times [37]. Two well-known metaheuristic approaches, namely GRASP and VND, are applied. These methods have been successfully applied to solve hard combinatorial optimization problems in the liteerature.
GRASP is a powerful multi-start process that operates in two phases [38]. In the first phase (the construction phase), a feasible solution is built. The second phase (local search phase) explores the neighborhood of the built solution. In turn, VND is a local search heuristic that explores several neighborhood structures. Unlike Variable Neighborhood Search (VNS), VND is based on exploring several neighborhood structures in a deterministic order [39]. The efficacy of VND relies on the fact that different neighborhood structures may have different local minima. The computed solution is, at the same time, a local optimum under all the considered neighborhood structures appllied in th search. This article develops a hybrid GRASP/VND metaheuristic, using VND in the local search phase of a GRASP. The general scheme of the proposed GRASP/VND approach is presented in the pseudocode in Algorithm 1.
Algorithm 1 Pseudocode of the proposed GRASP/VDN algorithm for the GSPNCHR
  • NetworkDesign ( G B , i t e r , k , p m i n , P E , P V T , s i m _ i t e r )
1:
i 0
2:
P
3:
s o l
4:
while  i < i t e r   do
5:
    ( g ¯ , P ) C o n s t r u c t i o n P h a s e ( G B , C , R , k , i t e r )     ▹ Construction phase
6:
     g s o l V N D ( g ¯ , P )                 ▹ Local search/VND phase
7:
     r e l i a b i l i t y R V R ( g s o l , P E , P V T , s i m _ i t e r )     ▹ Reliability evaluation
8:
    if  r e l i a b i l i t y > p m i n  then
9:
         s o l s o l { g s o l }
10:
    end if
11:
end while
12:
return  s o l
The GRASP/VND algorithm receives seven input parameters:
  • the ground graph G B , including all possible connections to build the reliable topology
  • a number of iterations i t e r , to be used as stopping criterion for the search
  • a positive integer k, that determines the number of shortest paths to consider in the construction phase (see the description of the construction phase in the next paragraph)
  • a reliability threshold p m i n ; it is a lower bound for the reliability of feasible network designs found by the algorithm;
  • the elementary reliability P E ; a vector of operation probabilities for feasible links in set E;
  • the elementary reliability P V T , a vector of operation probabilities for Steiner nodes in V T ;
  • the number of iterations to be performed in the RVR simulations applied for reliability evaluation, s i m _ i t e r .
The NetworkDesign algorithm works as follows. In lines 1–3, the parameters are initialized: the iteration counter i is set to zero), the set of node-disjoint paths P computed between pairs of terminals in T is set to empty, and the list s o l of feasible solutions that satisfy all the constraints of the GSPNCHR is set to empty too. The while loop on lines 4–11 iterates i t e r times in the search for feasible solutions for the GSPNCHR and stores them in the s o l list. In line 5 the Construction algorithm builds a low-cost randomized greedy solution (based on the GRASP Construction Phase), which is stored in g ¯ . In line 6, the designed VND algorithm is invoked, receiving as input the solution g ¯ . VND performs a series of local searches looking for neighboring topologies with a better quality (i.e., lower cost and satisfying the connectivity requirements given by the matrix R) than the current solution, and returns the best neighbor topology found that fulfills the node-connectivity constraints R. The result topology is stored in g s o l . In line 8, the RVR method is applied to evaluate the reliability constraint, i.e., Equation (10) in the mathematical model. In case that the built solution g s o l fulfills the reliability constraint (line 8), it is inserted in the set of solutions found, s o l (line 9). If g s o l satisfies the condition of line 8 ( r e l i a b i l i t y > p m i n ), then it satisfies all the constraints of the GSPNCHR, and therefore the found topology g s o l is a feasible solution of the GSPNCHR fulfilling both the node-connectivity constraints between pairs of terminal nodes as well as the reliability constraint, exceeding the pre-established reliability value p m i n . Once the loop is finished, the list of low-cost feasible solutions found for the GSPNCHR is returned on line 12.
Next sections describe the construction phase and the local search/VND phase applied in the proposed algorithm.

4.2. Construction Phase

An iterative ad-hoc procedure is applied in the construction phase to build candidate solutions to be improved in the local search phase. The ad-hoc procedure was conceived to give a proper trade-off between simplicity and effectiveness. The ad-hoc construction procedure works by building paths iteratively. The pseudocode of the construction procedure is presented in Algorithm 2.
Algorithm 2 receives as input five parameters: the ground graph G B , including all possible connections to build the reliable topology; the link costs matrix C; the matrix with connectivity requirements R; the number of shortest paths to compute between terminals k, and the number of iterations (max_iter). The set of terminal nodes is denoted S D ( I ) .
Algorithm 2 Pseudocode of the iterative ad-hoc procedure applied in the construction phase of the proposed GRASP/VDN algorithm for the GSPNCHR
  • procedureConstruction Phase ( G B , C , R , k , m a x _ i t e r )
1:
g s o l ( S D ( I ) , )
2:
m i , j r i , j
3:
P i , j , i , j S D ( I )
4:
A i , j 0 , i , j S D ( I )
5:
while m i , j > 0 : A i , j < max_iterdo
6:
     ( i , j ) C h o o s e R a n d o m ( S D ( I ) : m i , j > 0 )
7:
     G ¯ G B \ P i , j
8:
    for all  ( u , v ) E ( G ¯ )  do
9:
         c ¯ u , v c u , v × 1 { ( u , v ) g s o l }
10:
    end for
11:
     L p K S P ( k , i , j , G ¯ , C ¯ )
12:
    if  L p =  then
13:
         A i , j A i , j + 1 ; P i , j ; m i , j r i , j
14:
    else
15:
         p S e l e c t R a n d o m ( L p ) ; g s o l g s o l { p }
16:
         P i , j P i , j { p }
17:
         m i , j m i , j 1
18:
         ( P , M ) G e n e r a l U p d a t e M a t r i x ( g s o l , P , M , p , i , j )
19:
    end if
20:
end while
21:
return ( g s o l , P )
The initial solution g s o l only contains the terminal nodes S D I , without including any link (line 1). Matrix M = { m i , j } i , j T is used to store requirements that are not satisfied yet, thus it in initialized as m i , j = r i , for all i , j S D ( I ) (line 2). Matrix P = { P i , j } i , j S D ( I ) represents the collection of node disjoint paths, which is initialized as empty for all P i , j (line 3). Matrix A = { A i , j } i , j S D ( I ) stores the number of iterations (or attempts) required by the algorithm to find r i , j node-disjoint paths between nodes i , j is initialized as A i , j = 0 i , j S D ( I ) (line 4).
The while loop in lines 5–20 iterates max_iter attempts to find paths that satisfy all the connectivity requirements. A large Restricted Candidate List is selected for diversification purposes. In each iteration, a pair of terminals ( i , j ) satisfying m i , j > 0 is uniformly selected following a uniform distribution from the set S D ( I ) (line 6). A new graph G ¯ is defined from the information in G B , by discarding the nodes already visited in the previously computed paths (line 7). Any path between i and j in G ¯ is included in subset P i j of the set P. For the next paths to be computed between i and j, the nodes of P i j cannot be taken into account, in order to guarantee that the node-disjoint constraint between previously computed paths. The for loop in lines 8–10 builds an auxiliary matrix to store costs C ¯ = { c i , j ¯ } . It keeps unchanged the costs of the edges that are not included in the matrix of paths between terminal nodes, and assigns cost zero to any edge that belongs to a path already computed and stored. This way, edges already included in the solution being constructed have zero cost in C ¯ . Matrix C ¯ allows using links from g s o l without increasing the cost. Line 11 computes the k shortest paths from i to j using Yen algorithm [40]. Then, it is tested if list L p is empty. In this case, P i , j , m i , j is re-initialized and one unit is added to A i , j . Otherwise, a path p is selected following a uniform distribution from the list L p , to be included in the solution (line 15). The path p is added to P i , j , and the corresponding requirement m i , j is decreased one unit (lines 16 and 17). Adding path p can define node-disjoint paths between terminal nodes. Thus, function GeneralUpdateMatrix is applied to find possible new paths (line 18). It updates the matrix M of connectivity deficits between pairs of terminals. For example, if the path p computed in line 15 contains a terminal node k, it is checked whether p ( i , k ) and p ( j , k ) (subpaths of p connecting nodes i and k, and k an j, respectively) are node-disjoint with respect to the sets P i k and P k j . If either or both of them are disjoint, m i k , P i k and/or m k j , P j k are updated. This procedure is performed for every terminal node on p. In turn, if two terminals u and v in p are such that the intersection of p u , v and the paths at P u , v are node-disjoint, except for u and v, then m u , v is updated (decremented by 1) and the set P u , v is updated by adding the path p ( u , v ) .
The construction phase returns a feasible solution g s o l including all the sets P = { P i , j } i , j S D ( I ) of node disjoint pairs between terminal nodes (line 21). The returned solution is feasible for the GSPNC.

4.3. Local Search (VND) Phase

The rationale behind the proposed VND is combining different neighborhoods to compute locally optimal solutions for each one of them. The proposed VND combines three neighborhood structures. Neighborhood are defined considering the concepts of key-nodes, key-paths, and key-trees, which are defined next.
Definition 3 (key-node).
A key-node in a feasible solution v g s o l is a Steiner node with degree three or greater.
Definition 4 (key-path).
A key-path in a feasible solution p g s o l is an elementary path where all the intermediate nodes are Steiner nodes with degree 2 in g s o l , and the extremes are either terminals or key-nodes. A feasible solution g s o l accepts a decomposition into key-paths, i.e.,  K g s o l = { p 1 , , p h } .
Definition 5 (key-tree).
Consider a key-node v which is part of a feasible solution g s o l . T v is the key-tree associated to v, which is composed by all the key-paths with the common end-point v.
The three neighborhood structures that combine the previous concepts are defined next, considering a feasible solution g s o l for the GSPNC.
Definition 6 (Neighborhood Structure for swap key-paths).
Given a key-path p g s o l , a neighbor solution for g s o l is defined by g ^ s o l = { g s o l \ p } { m } , being m the set of nodes and links to be added to preserve the feasibility of g ^ s o l .
Definition 7 (Neighborhood Structure for key-paths).
Given a key-path p g s o l , a neighbor-solution is defined by g ^ s o l = { g s o l \ p } { p ^ } , where p ^ is another path connecting the extreme nodes from p. The neighborhood of key-paths from g s o l includes all feasible solutions computed by the previous operation on the key-paths in the key-path decomposition of g s o l given by K g s o l .
Definition 8 (Neighborhood Structure for key-tree).
Consider a key-tree T v g s o l , rooted at key-node v. A neighbor of g s o l is defined by g ^ s o l = { g s o l \ T v } { T } , being T another tree that substitutes T v , having identical leaf nodes.
A classical VND implementation is applied in the proposed GRASP/VND algorithm to solve the GSPNCHR. Local searches on the defined neighborhood structures are applied in order, after the construction phase:
  • S w a p K e y P a t h L o c a l S e a r c h (Algorithm 3).
  • K e y P a t h L o c a l S e a r c h (Algorithm 4).
  • K e y T r e e L o c a l S e a r c h (Algorithm 5).
The order for applying the local search operators was evaluated in preliminary experiments. Even though the last two local search operators are simpler, the best results obtained in preliminary experiments suggested that S w a p K e y P a t h L o c a l S e a r c h should be applied first.
Algorithm 3 Pseudocode of the SwapKeyPath local search procedure
  • procedureSwapKeyPathLocalSearch ( G B , C , g s o l )
1:
i m p r o v e m e n t T R U E
2:
while i m p r o v e m e n t do
3:
     i m p r o v e m e n t F A L S E
4:
     K ( g s o l ) { p 1 , , p h }                                     ▹ Key-path decomposition of g s o l
5:
    while not  i m p r o v e m e n t and ∃ key-paths to be explored do
6:
         p ( K ( g s o l ) )                                                                 ▹ Path not explored yet
7:
         ( g s o l , i m p r o v e m e n t ) F i n d S u b s t i t u t e K e y P a t h ( g s o l , p , P )
8:
    end while
9:
end while
10:
return g s o l
Algorithm 4 Pseudocode of the KeyPath local search procedure
  • procedureKeyPathLocalSearch ( G B , C , g s o l )
1:
i m p r o v e m e n t T R U E
2:
while i m p r o v e m e n t do
3:
     i m p r o v e m e n t F A L S E
4:
     K ( g s o l ) { p 1 , , p h }                                            ▹ Key-path decomposition of g s o l
5:
    while not  i m p r o v e m e n t and ∃ key-paths to be explored do
6:
         p ( K ( g s o l ) )                                          ▹ Path between u and v, not explored yet
7:
         μ ^ N O D E S ( p ) S D \ N O D E S ( g s o l )                     ▹ Induced subgraph μ ^
8:
         p ^ D i j k s t r a ( u , v , μ ^ )
9:
        if  C O S T ( p ^ ) < C O S T ( p )  then
10:
            g s o l { g s o l \ p } { p ^ }
11:
            i m p r o v e m e n t T R U E
12:
        end if
13:
    end while
14:
end while
15:
return g s o l
   The proposed local search operators are only applied to solutions that are feasible and have a lower cost than the original solution. Each local search follows the defined neighborhood structures, with the main goal of finding better solutions. Two functions are used in the searches:
  • F i n d S u b s t i t u t e K e y P a t h (used in SwapKeyPath local search) receives the current solution g s o l , the key-path p and a matrix P with the collection of disjoint path between the terminals. The function replaces the current path p by p ^ , exploiting the information given by P in order to reconstruct a new feasible solution. If the built solution is cheaper, the function returns the boleean value i m p r o v e m e n t = 1 and the resulting solution. If a better solution is not found, i m p r o v e m e n t = 0 and the current solution g s o l is returned.
  • G e n e r a l R e c C o n n e c t searches for a key-tree T that spans the same leaf-nodes than key-tree T v , improving (i.e., reducing) the cost and maintaining feasibility. If a new solution with a lower cost is found, the function returns the new solution and a boolean value i m p r o v e m e n t = 1 . If a better solution is not found, i m p r o v e m e n t = 0 and the current solution g s o l is returned.
Algorithm 5 Pseudocode of the KeyTreeLocal local search procedure
  • procedureKeyTreeLocalSearch ( G B , C , g s o l )
1:
i m p r o v e m e n t T R U E
2:
while i m p r o v e m e n t do
3:
     i m p r o v e m e n t F A L S E
4:
     X K e y N o d e s ( g s o l )                                                         ▹ Key-nodes from g s o l
5:
     S ¯ S D \ N O D E S ( g s o l )
6:
    while not  i m p r o v e m e n t andkey-nodes not explored do
7:
         v X                                                                       ▹ Key-node not explored yet
8:
         ( g s o l , i m p r o v e m e n t ) G e n e r a l R e c C o n n e c t ( G B , C , g s o l , v , S ¯ )
9:
    end while
10:
end while
11:
return  g s o l

4.4. Reliability Estimation

In the third phase, the RVR method is applied to estimate the reliability of the GSP-NC solution built using the GRASP/VND metaheuristic. The underlying probabilistic model is the hostile model that assumes probabilistic failures for links and Steiner nodes. Given the monotonicity of the hostile model, the application of RVR is suitable for this purpose [12,31,41]. RVR is efficient when applied to monotone models, i.e., models where a supra-state of an operational state is also an operational state. After computing an estimation of the reliability for each solution, it is determined if constraint (10) is met. If the reliability of the built network is greater than parameter p m i n , the solution g s o l is added to the set of reliable solutions s o l .

5. Experimental Evaluation

  This section describes the experimental evaluation of the proposed GRASP/VND algorithm to solve the GSPNCHR.

5.1. Methodology

Two analysis were performed in the experimental validation of the proposed methods. First, the capabilities of the proposed GRASP/VND and reliability evaluation approach for the GSP-NC were evaluated. After that, a sensitivity analysis was performed to study the impact of perturbations in the elementary reliabilities on edges and Steiner nodes. Representative problem instances were considered in the analysis (two specific test sets were designed, see a description on the next subsection). The value of the lower bound for the reliability of the designed networks p m i n was set to 0.8 for all experiments.
In the GRASP algorithm, the size k of the candidate list used in the construction phase (i.e., list of low-cost paths between specific pairs of terminals) was set to 5. This parameterization was defined after performing a preliminary sensitivity analysis performed on random graphs that studied the impact of different values of k on the quality, particularly the cost, of the feasible solutions computed by GRASP/VND. Good quality (local) optimal feasible solutions were obtained in reasonable computational times (few seconds in most cases) for the GSPNC, using k = 5 .
The experimental validation was performed on the high performance computing platform of National Supercomputing Center (Cluster-UY), Uruguay [42].

5.2. Description of the Test Sets

This subsection describes the test sets used in the experimental evaluation of the proposed method to solve the GSPNCHR.

5.2.1. Overall Description

To the best of our knowledge, there are no benchmark instances or graph libraries, neither to evaluate the performance of exact and/or approximate techniques to solve the GSP or to evaluate network reliability. For reliability evaluation, classical graphs are generally used, e.g., dodecahedron, Arpanet, grids, some topologies of Halin and outerplanar graphs, and graphs depending on the base model (source-terminal reliability, k-terminal reliability, all-terminal reliability, etc.) [43,44]. Regarding the evaluation of custom algorithms to solve the GSP, the common approach in the literature is based on transforming instances from the the well-known TSPLIB library [45]. Therefore, two benchmark test sets were developed by adapting instances from TSPLIB: medium and large sized instances from different TSPLIB families were selected and transformed them into GSPNCHR instances following a specific methodology for test case generation.
Selected instances from TSPLIB were modified to get complete graphs, with the corresponding Euclidean costs on the links. The following instances were selected for the experimental evaluation of the proposed approach to solve the GSPNCHR: att48, berlin52, brazil58, ch150, d198, eil51, gr137, gr202, kroA100, kroA150, kroB100, kroB150, kroB200, lin105, pr152, rat195, st70, tsp225, u159, rd100, and rd400. The suffix of each name is the number of nodes in the corresponding instance (e.g., kroA100 has 100 nodes).
Two tests sets were defined, one for evaluating the GRASP/VND and reliability results and another for a sensitivity analysis to perturbations in the elementary reliabilities. These problem sets are described next.

5.2.2. Test Set for the GRASP/VND and Reliability Evaluation

Table 1 describes the main features of the considered problem instances. The table reports for each instance the following information:
  • instance name: the name of the instance. A name including (E) means that the instance is a variation of the corresponding base instance, with different connectivity requirements.
  • %T: the percentage of terminal nodes in the graph. The following values were considered to build the test set: 20%, 35% y 50%. Thus, three GSP-NC instances are defined for each TSP instance.
  • p v p e : the elementary reliabilities for Steiner nodes ( p v ) and links ( p e ).
  • % T 2 T 3 T 4 : the percentage of pairs (of terminal nodes) that must meet connectivity requirements r i , j { 2 , 3 , 4 } , respectively.
  • i t e r _ N D : number of iterations considered in the NetworkDesign procedure, defined according to %T.
  • i t e r _ R V R : number of iterations considered in R V R method.
  • #: number of generated instances.
A total number of 73 problem instances were defined. All of them were applied for the evaluation of the proposed GRASP/VND metaheuristic approach to solve the GSPNC. In turn, a subset of 38 problem instances were applied to evaluate the constraint imposed by the reliability threshold.
The maximum iterations for the NetworkDesign procedure was set to i t e r _ N D = 100 for those instances with relative small CPU times (minutes), and  i t e r _ N D { 20 , 50 } for instances demanding larger CPU times. The number of iterations for the RVR method was set to i t e r _ R V R = 10 4 , after results obtained in preliminary calibration experiments. In those instances not used for the reliability analysis, the abbreviation NA (for not applicable) is reported.

5.2.3. Test Set for the Sensitivity Analysis to Perturbations in the Elementary Reliabilities

A specific test-set was designed for experiments oriented to answer the strategic questions of the research (RQ 1–RQ 4), by studying the sensitivity of the computed solution to perturbations in the elementary reliabilities. In this dataset, different values were considered for the elementary reliabilities of Steiner nodes ( p v ) and links ( p e ). Specifically, the nine combinations of p v and p e { 0.99 , 0.97 , 0.95 } were introduced in different instances from the GRASP/VND and reliability evaluation test set. The details of the sensititivity analysis test set are presented in Table 2.
Table 2 describes the generated instances. For instance, the first row indicates that three instances were generated using problem instance att48, with 20%, 35%, and 50% of terminal nodes, respectively, and connectivity requirements r u , v = 2 (100–0–0). For each instance based on att48, one-hundred feasible solutions were found, using 10,000 iterations of the RVR method considering the nine possible scenarios of elementary reliabilities ( p v , p e ): (0.99, 0.99), (0.99, 0.97), (0.99, 0.95), (0.97, 0.99), (0.97, 0.97), (0.97, 0.95), (0.95, 0.99), (0.95, 0.97), and  ( 0.95 , 0.95 ) .

5.3. Numerical Results

This subsection reports the numerical results of the proposed approach for solving the GSPNCHR.

5.3.1. GRASP/VND and Reliability Evaluation

Table 3 reports the results of the GRASP/VND metaheuristic for each problem instance in the evaluation test set. The first two columns indicate the name of the problem instance and the percentage of terminal nodes. Regarding numerical results, the following values are reported:
  • I G : percentage of cost reduction of the solution generated by the GRASP construction phase with respect to the input graph G B , which contains all the feasible links between pairs of nodes.
  • I V N D : percentage of improvement of the VND search over the cost of the iterative construction phase.
  • C P U : average CPU-time per iteration of NetworkDesign.
  • R ¯ : average of the reliability estimation.
  • V a r ¯ : average of the estimated variance associated to the reliability estimator of RVR.
An important aspect when analyzing the results of hybrid algorithms is to determine the ability of each component to improve over the baseline values. Results in Table 3 demonstrate that the relative improvement of VND over the cost of the solution built in the construction phase was between 25.25% and 39.84%. The average improvement over all considered problem instances was 35.03%, a significant value that demonstrate the efficacy of the proposed VND search. In turn, the minimum threshold p m i n = 0.8 was significantly exceeded in all problem instances where the average reliability R ¯ was estimated. For those instances in which the elementary reliabilities were established in 0.99–0.95 for nodes and links, respectively, the resulting reliabilities of the computed solutions were between 82.31% and 96.7%. When considering elementary reliabilities of 0.99–0.90, the resulting reliabilities of the computed solutions were between 99.1% and 99.87%.
Sample graphical results are presented for two representative problem instances in the test set (instances Brazil58 and Berlin52). For each instance, the ground topology is presented and the corresponding network design found by the proposed GRASP/VND metaheuristic is shown. Terminal nodes are represented as red circles and Steiner nodes are represented as orange circles.
Both sample problem instances include at least 20% of terminal nodes, the elementary reliability in Steiner nodes was set to 0.99, the elementary reliability for links was set to 0.95 and the connectivity requirements demand two node-disjoint paths between each pair of terminal nodes.
Figure 1 and Figure 2 presents the results for problem instance Brazil58. The resulting cost was 25,106 and the computed reliability was 0.9174.
Figure 3 and Figure 4 presents the results for problem instance Berlin52. The resulting cost was 4534 and the computed reliability was 0.8448.
Sample results in Figure 1, Figure 2, Figure 3 and Figure 4 show that the proposed GRASP/VND algorithm was able to compute simple, yet accurate network designs for the considered problem instances.
The execution time significantly increased for the most dense topologies solved, as the percentage of terminal nodes increased. On the one hand, instances with 20% of terminal nodes were solved in less than five minutes for all topologies. On the other hand, some instances with 50% of terminal nodes demanded more than 10.000 seconds, i.e., more than three hours of execution time. These efficiency results are coherent with the complexity of the problem, which is related to the dimension of the set of terminal nodes.
The estimated variance was reduced in average in all the studied instances. This result suggests that the RVR method is accurate, even under reliability failures of q = 10 2 for both Steiner nodes and links. This fact is further analyzed in the sensitivity analysis presented in the following subsection.

5.3.2. Sensitivity Analysis to Perturbations in the Elementary Reliabilities

This subsection reports the results of the sensitivity analysis of the computed solution to perturbations in the elementary reliabilities. The main results and findings are discussed an related to the main research questions RQ 1–RQ 4 relating the network optimization and reliability evaluation, as defined in the introduction section.
Regarding RQ 1, Table 4 reports the number of feasible network designs found by the proposed GRASP/VND metaheuristic with a high estimated network reliability value (i.e., R > p m i n = 0.98 ).
In Table 4, the reliability was estimated for an scenario that assumes specific values in the underlying probabilistic failure model: elementary reliabilities in Steiner nodes and links were defined at 0.99. Three variants of each problem instance were considered, varying the number of terminal nodes to be 20%, 35%, and 50% of the total nodes.
   The information reported in Table 4 provides an insight of the level of feasibility computed by the GRASP/VND algorithm, providing a global answer to RQ 1. The number of computed solutions that met the reliability threshold was high. Indeed, 100% of the returned solutions satisfied the reliability threshold in all but three problem instances.
Regarding RQ 2, the sensitivity analysis studied the impact on the estimated reliability of the resulting network design in two cases: (i) fixing the elementary reliability value for Steiner nodes to p v = 0.99 and considering different values for the elementary link reliabilities p e { 0.99 , 0.97 , 0.95 } ; and (ii) fixing the elementary reliability value for links to p e = 0.99 and considering different values for the elementary reliabilities of Steiner nodes p v { 0.99 , 0.97 , 0.95 } . In both cases, the number of feasible networks that survive, according to the defined reliability threshold (i.e., R > p m i n = 0.98 ), is evaluated. Table 5 analyzes the number of feasible solution designs for each case. The table reports the percentage of feasible solutions for the GSPNCHR (reliability higher than p m i n ) computed by the proposed GRASP/VND metaheuristic, over the total number of independent executions of the NetworkDesign algorithm.   
   Results in Table 5 demonstrate that two different situations arise from varying the elementary reliabilities of links and Steiner nodes. On one hand, fixing the elementary reliability for nodes and reducing the elementary reliabilities for links, a notorious reduction in the number of feasible solutions is observed, even reaching the extreme value 0 % for all but one problem instance when the link reliabilities are 0.95. For probabilities of operation 0.99 for Steiner nodes and 0.97 for links, the number of feasible solutions of the GSPNCHR found was zero for networks with 150 nodes or more.
On the other hand, fixing the link reliabilities and varying the node reliabilities, the reduction of the resulting network reliability is less important than in the previous case, in terms of the percentage of feasible solutions found by the NetworkDesign algorithm for the GSPNCH. Results show that when the number of terminal nodes decreased, the corresponding reduction in the percentage of feasible solutions found for the GSPNCHR was also reduced, as the probabilities of operation exposed to the links decreased. Given an instance with a certain number of terminal nodes, the reduction in the number of feasible solutions found for the GSPNCHR is smaller for the case where the operation probabilities for Steiner nodes are fixed and the link operation probabilities decrease (columns 2 to 4 in Table 5) with respect to the case where the link operation probabilities are fixed and the Steiner node operation probabilities decrease (columns 5 to 7 in Table 5).
Regarding RQ 3, the main goal was analyzing the sensitivity of the model with respect to the connectivity constraints defined for terminal nodes. More precisely, given a triplet ( p m i n , P E , P V T ) and considering a given baseline network topology, different input networks are generated for the GSPNCHR, considering different number of terminal nodes and different connectivity requirements for each pair of terminal nodes. For those instances, the number of solutions computed by the proposed GRASP/VND metaheuristic whose reliability is over p m i n is analyzed. The considered connectivity requirements for pairs of terminal nodes were r i , j { 2 , 3 , 4 } , i , j T . Table 6 reports sample results obtained for problems with the parameter setting p m i n = 0.98 . The convention for the number of requirements defined in Section 5.2.2 is applied for r u , v : % T 2 T 3 T 4 is the percentage of pairs (of terminal nodes) that must meet connectivity requirements r i , j { 2 , 3 , 4 } .
Results in Table 6 indicate that increasing the network connectivity requirements always imply a corresponding increase in the percentage of networks that meet the reliability threshold, and vice-versa. Results demonstrate the interaction between the topological network design and the network reliability. In general, networks with high number of disjoint paths imposed as node-connectivity between pairs of terminal nodes are also robust networks from the point of view of their reliability (under the probabilistic model, where the elementary components of the network have an associated probability of operation), i.e., their reliability levels are high. Conversely, under probabilistic models where edges and/or nodes have associated operation probabilities, if a particular network topology has a high level of reliability (either in edge reliability, node reliability or hostile model) then, in general, it also implies the existence of redundancy in the network, either through multiple edge-disjoint paths between pairs of terminal nodes and/or multiple node-disjoint paths between pairs of terminal nodes.
In practice, in the design of WAN networks, for example, the level of 2-node-connectivity between nodes of greatest interest (modeled by terminals in the presented problem) is normally set, and the network is designed to meet this requirement at the lowest possible cost. Moreover, 2-connected networks (edge-connected or node-connected) have high levels of reliability when their elementary components are also highly reliable.
Regarding RQ 4, the main conclusion from results reported in Table 5 and Table 6 is that, in order to design a more robust network, the best decision is improving the probabilities of operation for links. The impact of elementary probabilities of links is significantly higher (better) than the impact of elementary probabilities of nodes.
Figure 5 summarizes the effect of variations on the elementary reliability values for links and nodes. The bar graph shows the overall average reliability of the constructed network designs reported in Table 5, considering fixed values for the elementary reliabilities of edges ( p e = 0.99 , blue bars) and nodes ( p v = 0.99 , orange bars). The varying elementary reliabilities in each case are represented for the lables p * in the x axis.
The graphic in Figure 5 clearly shows that the effect of reducing the elementary reliabilities of edges is significantly more important than varying the elementary reliabilities of nodes. In fact, a small reduction of 0.01 on the elementary reliabilities of edges (from 0.99 to 0.98) reduced the reliability of the resulting designs from 99.72 to only 15.28, whereas a second reduction of 0.01 caused a negligible value of 0.68 for the reliability of the network. Reducing the elementary reliabilities of nodes only decreased the reliability of the network from 99.72 to 84.39 (reduction of 0.01) and to 66.39 (reduction of 0.02).

6. Special Cases of the GSPNCHR

This section presents particular cases of the GSPNCHR that can be solved in polynomial time. Theoretical results related to obtaining global optimal solutions in polynomial times are introduced. In turn, polynomial algorithms to solve these special cases are proposed. In particular, special cases linked to source-terminal reliability ( T = { s , t } ) and all-terminal reliability ( T = V ) scenarios are introduced. The special cases studied in this section are relevant, because they model relevant problems in practice, in different contexts.

6.1. Source-Terminal Reliability

Let T = { s , t } be the terminal-set (this scenario is known as the source-terminal model) with r s , t = 1 . Let l be the length of the shortest path P s , t connecting s and t, Lemma 1 holds.
Lemma 1.
The threshold p m i n is met with the shortest path if and only if p l p m i n .
Proof. 
A globally optimum solution is met with the shortest path G S = P o p t under identical costs if l satisfies the previously stated inequality. The shortest path P o p t is found using Dijkstra algorithm [46].    □
Proposition 1 relates the source-terminal scenario with the GSPNCHR.
Proposition 1.
If there exists a feasible single path P s , t for the source-terminal scenario with identical probabilities p i , j = p , then the globally optimum solution for GSPNCHR can be found.
Proof. 
By hypothesis, a feasible path P s , t that meets the reliability threshold p m i n exists. In particular, the threshold is met by the shortest path. By Lemma 1, p l p m i n . Consider the largest integer h such that p h p m i n , defined by Equation (13).
h = l o g ( p m i n ) l o g ( p )
The globally optimum solution for the GSPNCHR is obtained applying the Cheng-Ansari algorithm [47], finding the minimum cost among all the paths with lengths i { l , , h } .    □
Proposition 2.
For the source-terminal scenario, T = { s , t } , P E = { p i j } ( i , j ) E , P V \ T = { 1 } v V \ T , r s t = 1 , c i j = c , ( i , j ) E , and a given p m i n , the global optimal solution of the G S P N C H R can be computed in polynomial time.
Proof. 
Given a path p communicating s and t in G, the reliability condition for this path is given by Equation (14).
( i , j ) p p i j p m i n .
The constraint is established by Equation (15), applying logarithm to both sides of the inequality.
( i , j ) p ( log ( p i j ) ) log ( p m i n )
Consider the matrix P ^ = { log ( p i j ) } ( i , j ) E . The length-bounded Dijsktra Algorithm, which computes the shortest path between two nodes with the condition that the path has no more than l edges (hops), a pre-established parameter, is applied until the first path that satisfies the reliability condition is found. If the GSPNCHR has a feasible solution, Algorithm 6 returns the global optimum for this particular case.    □
Algorithm 6 Pseudocode of GSP-NCHR Source Terminal reliability
  • procedureGSP-NCHRSourceTerminal ( G = ( V , E ) , T = { s , t } , P ^ , c, p m i n )
1:
l 1 ;
2:
found_solution← FALSE;
3:
while ( l | E | 1 ) and not found_solution do do
4:
     ( p ^ , c o s t )  RestrictedDijkstra ( G , P ^ , s , t , l )          ▹ Compute the bounded shortest path from                             ▹s to t based in matrix P ^ . p ^ has no more than l hops
5:
    if  c o s t log ( p m i n )  then
6:
        found_solution← TRUE;
7:
        optimal_solution  p ^ ;
8:
        optimal_solution  l · c ;
9:
    else
10:
         l l + 1 ;
11:
    end if
12:
end while
13:
iffound_solutionthen
14:
    return (optimal_solution,optimal_cost);
15:
end if
   Consider now the particular case defined by T = { s , t } , r s , t = k > 1 . If the costs and the probabilities (in edges or nodes) are not uniform, the problem is NP-hard.
Two relevant sub-cases are studied:
(i)
The sub-case with non-uniform costs in the edges, uniform edge probabilities, and uniform node probabilities (i.e., P V \ T = { 1 } v V \ T ).
(ii)
The sub-case with uniform costs in the edges, non-uniform edge probabilities, and uniform node probabilities.
For both sub-cases, the Suurballe Algorithm [48] can be applied to determine if there are feasible solutions, as described in Proposition 3. The Suurballe algorithm computes in polynomial time the k-node-disjoint paths (or the k-edge-disjoint paths) from s to t of minimum total edge cost, for a given integer k.
Proposition 3.
[Existence of feasible solutions for sub-cases ( i ) and ( i i ) ] Lets graph G ^ be equal to G but such that each edge e E is weighted by log ( p e ) . Lets denote C ^ = { log ( p e ) } e E . Let L = { l i } i 1 k be the k-node-disjoint paths (respectively, k-edge-disjoint paths) with minimum sum of costs over G ^ between s and t considering C ^ . Then, there is a feasible solution if the inequality given by Equation (16) holds.
i = 1 k e l i log ( p e ) log ( p m i n )
Proof. 
If L = { l i } i 1 k were not feasible, the inequality i = 1 k e l i p e < p m i n would hold, which would imply i = 1 k e l i log ( p e ) < log ( p m i n ) .    □
For the sub-case (i), the Suurballe Algorithm must be applied in combination with the Grötschel Algorithm when calculating a path that interlinks the remaining r paths.
For the sub-case (ii), since the costs of the edges are uniform, say equal to c 0 , then the maximum possible cost is bounded by m · c 0 , where m is the number of the edges in the graph. So, it is enough to find the k minimum logprob path ( e L k log ( p e ) > log ( p m i n ) ) with lower cost than i · c 0 , with  i = 1 m . Algorithm 7 describes the proposed procedure for sub-case (ii) (i.e., r s , t = k > 1 , and edges with uniform costs).   
Algorithm 7 Pseudocode of GSP-NCHR Source Terminal reliability, case (ii)
  • procedureGSP-NCHRSourceTerminal-k-conn ( G ^ , C ^ , T = { s , t } , P E , m, p m i n )
1:
l 1
2:
optimum← FALSE;
3:
repeat
4:
     i i + 1
5:
     L k the k paths given by Suurballe ( G ^ , C ^ , k , s , t , i ) using Grotschel;
6:
    if  c o s t o ( L k ) log ( p m i n )  then
7:
        optimum TRUE
8:
    end if
9:
untiloptimum or i = m
10:
ifoptimumthen
11:
    return  L k
12:
else
13:
    return no solution
14:
end if

6.2. All-Terminal Reliability

Under the all-terminal reliability model, all the nodes are considered as terminal, i.e., T = V , and no Steiner (optional) nodes are taken into account. Consider the (cheapest) Minimum Spanning Tree G S = T . If T fulfills the reliability threshold, then the globally optimum solution is met.
Proposition 4 relates the all-terminal reliability model with the GSPNCHR.
Proposition 4.
Under the all-terminal reliability model, a Minimum Spanning Tree T achieves the globally optimum solution if and only if e T p e p m i n .
Proof. 
Under the all-terminal reliability model T = V , so the minimal feasible solutions for the GSPNCHR are spanning trees. Let T be a minumum spanning tree. The topology T is globally optimal if and only if it is globally optimal for the integer linear programming problem presented in Section 2.2. This condition is fulfilled since:
(i)
T minimizes Equation (3) (the objective function), since it is a minimum spanning tree.
(ii)
T complies with the constraints defined in Equations (4)–(10) as it is a feasible solution. In particular, the reliability Equation (10) satisfies the expression in Equation (17), completing the proof.
R K ( G S ( { x i , j } ) ) p m i n R V ( T ) p m i n e T p e p m i n

7. Conclusions and Future Work

This article introduced the Generalized Steiner Problem with Node-Connectivity Constraints under the hostile reliability model. This is a relevant symmetric network design problem with application in nowadays technological and scientific communities. A hybrid metaheuristic approach combining GRASP and VND was proposes to efficient solve the addressed problem.
A reliability analysis was performed under the hostile model, where both nodes and links are subject to probabilistic failures. The analysis studied the relationship between the network optimization and the reliability evaluation. The research was based on relevant questions related to the number of feasible networks found by the proposed GRASP/VND algorithm for the full probabilistic model, a sensitivity analysis of the proposed model with respect to elementary probabilities of operation for both edges and nodes, and a sensitivity analysis of the proposed model with respect to the connectivity constraints defined for terminal nodes.
The main results demonstrated the efficacy of the proposed VND search, which achieved relative cost improvements above 35% over the solution built in the construction phase. Regarding the proposed research questions, the main answers based on the experimental results reported in Section 5 are as follows. RQ 1: A very high number of feasible solutions were computed by GRASP/VND, even reaching 100% of computed solutions meting the reliability threshold in all but three problem instances solved, for the considered input parameters ( p m i n , P E , P V T ) . RQ 2: Two different situations were detected when varying the elementary reliabilities of links and Steiner nodes: fixing the elementary reliability for nodes and reducing the elementary reliabilities for links resulted in a significant reduction of the number of feasible solutions. Fixing the link reliabilities and varying the node reliabilities, the reduction of the resulting network reliability was less than in the previous case. RQ 3: Results demonstrated a proportional increase of the number of networks that meet the reliability threshold with respect to the connectivity constraints defined for terminal nodes. Networks with a high number of imposed disjoint paths have also a highly robust topology, i.e., their reliability levels are high. RQ 4: Overall, for the hostile model, the empirical analysis indicate that it is better improving the elementary probabilities of operation of links than improving the elementary probabilities of Steiner nodes, to meet a required reliability threshold for the designed network.
The obtained results can be applied to any type of network with associated design/construction costs where the elementary probabilities of operation of the links and the optional (Steiner) nodes are known. Some relevant examples include the design of electrical power networks and fiber optic networks in telecommunications.
Finally, two particular cases of the GSPNCHR that can be solved in polynomial time were presented. Theoretical results were developed to compute optimal solutions in polynomial times and polynomial algorithms to solve them were presented.
The main lines for future work are related to extend the experimental evaluation of the proposed hybrid metaheuristic approach and design improved search operators to address larger problem instances. The sensitivity analysis of perturbations can be extended too, including scenarios that consider the theoretical results for problem instances solvable in polynomial time.

Author Contributions

Conceptualization, F.R. and S.N.; methodology, S.L., F.R. and S.N.; investigation, S.L., F.R. and S.N.; writing–original draft preparation, S.L., F.R. and S.N.; writing–review and editing, F.R. and S.N.; supervision, F.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Nesmachnow, S.; Perfumo, C.; Goiri, Í. Holistic multiobjective planning of datacenters powered by renewable energy. Clust. Comput. 2015, 18, 1379–1397. [Google Scholar] [CrossRef]
  2. Iturriaga, S.; Dorronsoro, B.; Nesmachnow, S. Multiobjective evolutionary algorithms for energy and service level scheduling in a federation of distributed datacenters. Int. Trans. Oper. Res. 2016, 24, 199–228. [Google Scholar] [CrossRef] [Green Version]
  3. Iturriaga, S.; Nesmachnow, S.; Goñi, G.; Dorronsoro, B.; Tchernykh, A. Evolutionary Algorithms for Optimizing Cost and QoS on Cloud-based Content Distribution Networks. Program. Comput. Softw. 2019, 45, 544–556. [Google Scholar] [CrossRef]
  4. Bienstock, D.; Brickell, E.F.; Monma, C.L. On the Structure of Minimum-Weight -k-Connected Spanning Networks. SIAM J. Discret. Math. 1990, 3, 320–329. [Google Scholar] [CrossRef] [Green Version]
  5. Tapolcai, J.; Hajdú, Z.L.; Pašić, A.; Ho, P.H.; Rónyai, L. On Network Topology Augmentation for Global Connectivity under Regional Failures. In Proceedings of the IEEE Conference on Computer Communications, Athens, Greece, 19–22 July 2021; pp. 1–10. [Google Scholar]
  6. Thulasiraman, K.; Lin, T.; Javed, M.; Xue, G. Logical topology augmentation for guaranteed survivability under multiple failures in IP-over-WDM optical networks. Opt. Switch. Netw. 2010, 7, 206–214. [Google Scholar] [CrossRef]
  7. Hershey, J.; Yarlagadda, R. Network Reliability and Survivability. In Data Transportation and Protection; Springer: Berlin/Heidelberg, Germany, 1986; pp. 469–483. [Google Scholar]
  8. Boesch, F.T.; Satyanarayana, A.; Suffel, C.L. A survey of some network reliability analysis and synthesis results. Netw. Int. J. 2009, 54, 99–107. [Google Scholar] [CrossRef]
  9. Li, T.; Song, T.; Liang, Y. Wireless Communications under Hostile Jamming: Security and Efficiency; Springer: Singapore, 2018. [Google Scholar]
  10. Hoersch, F. Connectivity Problems in Graph Theory: Structures, Algorithms and Complexity. Ph.D. Thesis, Université Grenoble Alpes, Saint-Martin-d’Hères, France, 2021. [Google Scholar]
  11. Lena, D.; Robledo, F.; Romero, P. A Hostile model for network reliability analysis. J. Heuristics 2017, 8, 489–498. [Google Scholar] [CrossRef]
  12. Cancela, H.; Khadiri, M.E.; Rubino, G. A new simulation method based on the RVR principle for the rare event network reliability problem. Ann. Oper. Res. 2012, 196, 111–136. [Google Scholar] [CrossRef]
  13. Laborde, S.; Robledo, F.; Romero, P.; Viera, O. A GRASP/VND Heuristic for the Generalized Steiner Problem with Node-Connectivity Constraints and Hostile Reliability. In Proceedings of the Variable Neighborhood Search, Abu Dhabi, United Arab Emirates, 21–25 March 2021; Mladenovic, N., Sleptchenko, A., Sifaleras, A., Omar, M., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 43–57. [Google Scholar]
  14. Colbourn, C. The Combinatorics of Network Reliability; Oxford University Press: Oxford, UK, 1987. [Google Scholar]
  15. Winter, P. Steiner problem in networks: A survey. Networks 1987, 17, 129–167. [Google Scholar] [CrossRef]
  16. Garey, M.; Johnson, D. Computers and Intractability; A Guide to the Theory of NP-Completeness; W. H. Freeman and Co.: New York, NY, USA, 1990. [Google Scholar]
  17. Barrera, J.; Cancela, H.; Moreno, E. Topological optimization of reliable networks under dependent failures. Oper. Res. Lett. 2015, 43, 132–136. [Google Scholar] [CrossRef]
  18. Kleywegt, A.; Shapiro, A.; Homem de Mello, T. The Sample Average Approximation Method for Stochastic Discrete Optimization. SIAM J. Optim. 2002, 12, 479–502. [Google Scholar] [CrossRef] [Green Version]
  19. Cancela, H.; Guerberoff, G.; Robledo, F.; Romero, P. Reliability maximization in stochastic binary systems. In Proceedings of the 21st Conference on Innovation in Clouds, Internet and Networks and Workshops, Paris, France, 20–22 February 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–7. [Google Scholar]
  20. Pulsipher, J.; Zavala, V. Measuring and optimizing system reliability: A stochastic programming approach. TOP 2020, 28, 626–645. [Google Scholar] [CrossRef]
  21. Archer, K.; Graves, C.; Milan, D. Classes of uniformly most reliable graphs for all-terminal reliability. Discret. Appl. Math. 2019, 267, 12–29. [Google Scholar] [CrossRef]
  22. Canale, E.; Robledo, F.; Romero, P.; Viera, J. Building Reliability-Improving Network Transformations. In Proceedings of the 15th International Conference on the Design of Reliable Communication Networks, Coimbra, Portugal, 19–21 March 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 107–113. [Google Scholar]
  23. Botton, Q.; Fortz, B.; Gouveia, L. On the hop-constrained survivable network design problem with reliable edges. Comput. Oper. Res. 2015, 64, 159–167. [Google Scholar] [CrossRef]
  24. Botton, Q.; Fortz, B.; Gouveia, L.; Poss, M. Benders decomposition for the hop-constrained survivable network design problem. INFORMS J. Comput. 2013, 25, 13–26. [Google Scholar] [CrossRef] [Green Version]
  25. Ozkan, O.; Ermis, M.; Bekmezci, I. Reliable communication network design: The hybridisation of metaheuristics with the branch and bound method. J. Oper. Res. Soc. 2020, 71, 784–799. [Google Scholar] [CrossRef]
  26. Raayatpanah, M.; Kabiri, M.; Eshghi, F.; Kelarestaghi, M.; Nepomuceno, N. Design of Survivable Wireless Backhaul Networks With reliability Considerations. SSRN 2022. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4051814 (accessed on 1 November 2022). [CrossRef]
  27. Liu, T.; Yang, W.; Huang, J. Reliable Network Design Problem under Node Failure with Benders Decomposition. Appl. Math. 2014, 5, 241–255. [Google Scholar] [CrossRef] [Green Version]
  28. Park, J.H. Time-dependent reliability of wireless networks with dependent failures. Reliab. Eng. Syst. Saf. 2017, 165, 47–61. [Google Scholar] [CrossRef]
  29. Yang, L.; Wang, P.; Wang, Q.; Bi, S.; Peng, R.; Behrensdorf, J.; Beer, M. Reliability analysis of a complex system with hybrid structures and multi-level dependent life metrics. Reliab. Eng. Syst. Saf. 2021, 209, 107469. [Google Scholar] [CrossRef]
  30. Cancela, H.; Murray, L.; Rubino, G. Reliability Estimation for Stochastic Flow Networks With Dependent Arcs. In IEEE Transactions on Reliability; IEEE: Piscataway, NJ, USA, 2022; pp. 1–15. [Google Scholar]
  31. Canale, E.A.; Cancela, H.; Piccini, J.; Robledo, F.; Romero, P.; Rubino, G.; Sartor, P. Recursive Variance Reduction method in Stochastic Monotone Binary Systems. In Proceedings of the 7th International Workshop on Reliable Networks Design and Modeling (RNDM), Munich, Germany, 5–7 October 2015; pp. 135–141. [Google Scholar]
  32. Agrawal, A.; Klein, P.; Ravi, R. When Trees Collide: An Approximation Algorithm for the Generalized Steiner Problem on Networks. SIAM J. Comput. 1995, 24, 440–456. [Google Scholar] [CrossRef]
  33. Jain, K. A Factor 2 Approximation Algorithm for the Generalized Steiner Network Problem. In Proceedings of the 39th Annual Symposium on Foundations of Computer Science (FOCS ’98), Washington, DC, USA, 8–11 November 1998; IEEE Computer Society: Piscataway, NJ, USA, 1998; p. 448. [Google Scholar]
  34. Suzuki, H.; Ishihata, M.; Minato, S.I. Designing Survivable Networks with Zero-Suppressed Binary Decision Diagrams. In Proceedings of the WALCOM: Algorithms and Computation, Singapore, 31 March–2 April 2020; Rahman, M.S., Sadakane, K., Sung, W.K., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 273–285. [Google Scholar]
  35. Sartor, P.; Robledo, F. GRASP Algorithms for the edge-survivable Generalized Steiner Problem. Int. J. Control. Autom. 2012, 5, 27–44. [Google Scholar]
  36. Nesmachnow, S. Evaluating simple metaheuristics for the Generalized Steiner Problem. J. Comput. Sci. Technol. 2005, 5, 285–291. [Google Scholar]
  37. Nesmachnow, S. An overview of metaheuristics: Accurate and efficient methods for optimisation. Int. J. Metaheuristics 2014, 3, 320–347. [Google Scholar] [CrossRef]
  38. Resende, M.; Ribeiro, C. Optimization by GRASP; Springer: Berlin/Heidelberg, Germany, 2016. [Google Scholar]
  39. Hansen, P.; Mladenoviç, N. Variable Neighborhood Search. In Search Methodologies; Burke, E., Kendall, G., Eds.; Springer International Publishing: Berlin/Heidelberg, Germany, 2005. [Google Scholar]
  40. Martins, E.; Pascoal, M. A new implementation of Yen’s ranking loopless paths algorithm. Q. J. Belg. Fr. Ital. Oper. Res. Soc. 2003, 1, 121–133. [Google Scholar]
  41. Cancela, H.; El Khadiri, M.; Rubino, G.; Tuffin, B. A Recursive Variance Reduction Technique with Bounded relative Error for Communication Network Reliability Estimation. In Proceedings of the 6th St Petersburg Workshop in Computer Simulation, St. Petersburg, Russia, 27–29 April 2009. [Google Scholar]
  42. Nesmachnow, S.; Iturriaga, S. Cluster-UY: Collaborative Scientific High Performance Computing in Uruguay. In Supercomputing; Communications in Computer and Information Science; Torres, M., Klapp, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2019; Volume 1151, pp. 188–202. [Google Scholar]
  43. Baïou, M.; Mahjoub, A. Steiner 2-Edge Connected Subgraph Polytopes on Series-Parallel Graphs. SIAM J. Discret. Math. 1997, 10, 505–514. [Google Scholar] [CrossRef]
  44. Yang, J.; Shi, X.; Marchese, M.; Liang, Y. An ant colony optimization method for generalized TSP problem. Prog. Nat. Sci. 2008, 18, 1417–1422. [Google Scholar] [CrossRef]
  45. Reinelt, G. TSPLIB—A Traveling Salesman Problem Library. ORSA J. Comput. 1991, 3, 376–384. [Google Scholar] [CrossRef]
  46. Dijkstra, E.W. A Note on Two Problems in Connexion with Graphs. Numer. Math. 1959, 1, 269–271. [Google Scholar] [CrossRef] [Green Version]
  47. Cheng, G.; Ansari, N. Finding all hops k-shortest paths. In Proceedings of the IEEE Pacific Rim Conference on Communications Computers and Signal Processing, Victoria, BC, Canada, 28–30 August 2003; Volume 1, pp. 474–477. [Google Scholar]
  48. Suurballe, J.; Tarjan, R. A quick method for finding shortest pairs of disjoint paths. Networks 1984, 14, 325–336. [Google Scholar] [CrossRef]
Figure 1. Problem instance Brazil58 (ground topology).
Figure 1. Problem instance Brazil58 (ground topology).
Symmetry 14 02523 g001
Figure 2. Computed network design for problem instance Brazil58.
Figure 2. Computed network design for problem instance Brazil58.
Symmetry 14 02523 g002
Figure 3. Problem instance Berlin52 (ground topology).
Figure 3. Problem instance Berlin52 (ground topology).
Symmetry 14 02523 g003
Figure 4. Computed network design for problem instance Berlin52.
Figure 4. Computed network design for problem instance Berlin52.
Symmetry 14 02523 g004
Figure 5. Analysis of the impact of modifying p e and p v in the overall average reliability of the constructed network designs.
Figure 5. Analysis of the impact of modifying p e and p v in the overall average reliability of the constructed network designs.
Symmetry 14 02523 g005
Table 1. Description of the problem instances used for the evaluation of the proposed GRASP/VND and reliability results.
Table 1. Description of the problem instances used for the evaluation of the proposed GRASP/VND and reliability results.
Instance NameT p v p e % T 2 T 3 T 4 iter_NDiter_RVR#
att4820–35–500.99–0.95100–0–0100–100–100100003
berlin5220–35–500.99–0.95100–0–0100–100–100100003
brazil5820–35–500.99–0.95100–0–0100–100–100100003
ch15020–35–500.99–0.95100–0–0100–100–100100003
d19820–35–500.99–0.95100–0–020–20–20NA3
eil5120–35–500.99–0.95100–0–0100–100–100100003
gr13720–35–500.99–0.95100–0–0100–20–20NA3
gr20220–35–500.99–0.95100–0–0100–100–100100003
kroA10020–35–500.99–0.95100–0–0100–100–100NA3
kroA15020–35–500.99–0.95100–0–0100–20–20NA3
kroB10020–35–500.99–0.95100–0–0100–100–100NA3
kroB15020–35–500.99–0.95100–0–0100–20–20NA3
kroB20020–35–500.99–0.95100–0–020–20–20NA3
lin10520–35–500.99–0.95100–0–0100–100–100NA3
pr15220–35–500.99–0.95100–0–020–20–20NA3
rat19520–35–500.99–0.95100–0–020–20–20NA3
st7020–35–500.99–0.95100–0–0100–100–100100003
tsp22520–35–500.99–0.95100–0–050–50–50100003
u15920–35–500.99–0.95100–0–020–20–20NA3
rd10020–35–500.99–0.95100–0–0100–100–100NA3
rd40020–35–500.99–0.95100–0–050–50–50100003
berlin52(E)200.99–0.9065–25–10100100001
eil51(E)200.99–0.9065–25–10100100001
att48(E)350.99–0.9065–25–10100100001
st70(E)350.99–0.9065–25–10100100001
brazil58(E)500.99–0.9065–25–10100100001
eil51(E)500.99–0.9065–25–10100100001
kroB100(E)200.99–0.9065–25–10100100001
lin105(E)200.99–0.9065–25–10100NA1
kroA100(E)350.99–0.9065–25–1020100001
rd100(E)350.99–0.9065–25–1020NA1
Table 2. Description of the problem instances used for the sensitivity analysis to perturbations in the elementary reliabilities.
Table 2. Description of the problem instances used for the sensitivity analysis to perturbations in the elementary reliabilities.
Instance NameT% T 2 T 3 T 4 iter_NDiter_RVR#
att4820–35–50100–0–0100100003
att48(E)200-100-0100100001
att48(E)200-0-100100100001
att48(E)3565–25–10100100001
berlin5220–35–50100–0–0100100003
berlin52(E)2065–25–10100100001
brazil5820–35–50100–0–0100100003
brazil58(E)5065–25–10100100001
eil5120–35–50100–0–0100100003
eil51(E)2065–25–10100100001
eil51(E)5065–25–10100100001
kroA10035100–0–0100100001
kroA100(E)3565–25–10100100001
kroB10020100–0–0100100001
kroB100(E)2065-20-10100100001
ch15020–35–50100–0–0100100003
gr20220–35–50100–0–0100100003
tsp22520–35–50100–0–0100100003
rd40020–35–50100–0–0100100003
Table 3. Numerical results of the proposed GRASP/VND metaheuristic.
Table 3. Numerical results of the proposed GRASP/VND metaheuristic.
Instance NameT IG IVND CPU  (s) R ¯ Var ¯
att482099.2734.6111.460.9677.60 × 10 7
att483598.6036.8329.760.9433.44 × 10 6
att485098.2237.1065.900.9275.32 × 10 6
berlin522098.9830.5530.600.9373.294 × 10 6
berlin523599.0633.9333.430.9383.19 × 10 6
berlin525098.0233.48106.940.9076.487 × 10 6
brazil582098.9231.9662.370.8856.722 × 10 6
brazil583599.2539.4568.890.8608.34 × 10 6
brazil585098.7535.26103.550.9107.09 × 10 6
ch1502099.7637.51222.550.8561.02 × 10 5
ch1503599.7236.65546.650.8809.03 × 10 5
ch1505099.6934.421203.050.8888.97 × 10 5
d1982099.9032.22320.14NANA
d1983599.8634.122086.37NANA
d1985099.8133.395548.63NANA
eil512099.3438.7914.870.9601.18 × 10 6
eil513598.5436.1139.020.9423.73 × 10 6
eil515098.5637.3244.790.9374.28 × 10 6
gr1372099.7936.31137.49NANA
gr1373599.7134.18404.06NANA
gr1375099.6834.61976.36NANA
gr2022099.8932.43528.160.8231.22 × 10 5
gr2023599.7534.563511.690.8411.11 × 10 5
gr2025099.7433.369505.620.8301.27 × 10 5
kroA1002099.6136.7744.22NANA
kroA1003599.5338.23101.490.8908.52 × 10 5
kroA1005099.4535.89280.83NANA
kroA1502099.8336.70102.71NANA
kroA1503599.7536.30412.97NANA
kroA1505099.7032.322035.06NANA
kroB1002099.6838.7117.300.9016.25 × 10 5
kroB1003599.5936.3253.74NANA
kroB1005099.4934.98191.72NANA
kroB1502099.8437.49112.09NANA
kroB1503599.7736.05665.67NANA
kroB1505099.7334.531327.52NANA
kroB2002099.8936.14279.15NANA
kroB2003599.8435.062234.73NANA
kroB2005099.833.827448.42NANA
lin1052099.7435.899.44NANA
lin1053599.6137.0486.85NANA
lin1055099.536.40245.24NANA
pr1522099.7937.14281.16NANA
pr1523599.7736.86808.47NANA
pr1525099.7436.881673.46NANA
rat1952099.8837.31280.94NANA
rat1953599.8234.701925.98NANA
rat1955099.834.994599.87NANA
st702099.4439.8439.850.9194.07 × 10 6
st703599.339.5663.650.9065.74 × 10 6
st705099.1636.37128.190.9137.02 × 10 6
tsp2252099.8834.981658.770.8481.14 × 10 5
tsp2253599.8534.654684.360.8461.24 × 10 5
tsp2255099.8233.2612088.720.8721.09 × 10 5
u1592099.8135.84333.26NANA
u1593599.7636.14864.99NANA
u1595099.7535.611278.13NANA
rd1002099.6837.1522.42NANA
rd1003599.534.54126.82NANA
rd1005099.4236.13245.82NANA
rd4002099.9435.845000.210.80914.22 × 10 5
rd4003599.9433.549000.100.85411.89 × 10 5
rd4005099.9333.1619000.700.86411.51 × 10 5
berlin52(E)2098.4525.2534.200.9934.84 × 10 7
eil51(E)2098.4728.4529.620.9962.71 × 10 7
att48(E)3597.4531.7462.960.9944.93 × 10 7
st70(E)3598.5231.87135.500.9936.55 × 10 7
brazil58(E)5097.4831.84172.630.9944.82 × 10 7
eil51(E)5097.2632.6774.470.9917.94 × 10 7
kroB100(E)2099.3730.2539.250.9991.21 × 10 6
lin105(E)2099.3331.9564.41NANA
kroA100(E)3598.9935.88225.500.9981.82 × 10 6
rd100(E)3599.1535.30130.01NANA
average-99.3935.031026.000.9142.33 × 10 5
Table 4. Percentage of feasible GSPNCHR solutions verifying R 0.98 .
Table 4. Percentage of feasible GSPNCHR solutions verifying R 0.98 .
Instance%TSolutions with R 0.98 Instance%TSolutions with R 0.98
att4820100%ch15020100%
att4835100%ch15035100%
att4850100%ch15050100%
eil5120100%gr2022099%
eil5135100%gr20235100%
eil5150100%gr20250100%
berlin5220100%tsp22520100%
berlin5235100%tsp22535100%
berlin5250100%tsp22550100%
brazil582099%rd40020100%
brazil583597%rd40035100%
brazil5850100%rd40050100%
Table 5. Solutions such that R > p m i n = 0.98 . for p e fixed to 0.99 (left) and for p v fixed to 0.99 (right).
Table 5. Solutions such that R > p m i n = 0.98 . for p e fixed to 0.99 (left) and for p v fixed to 0.99 (right).
InstanceFixed Elementary Reliability for Links Fixed Elementary Reliability for Nodes
0.99–0.990.99–0.970.99–0.95 0.99–0.990.97–0.990.95–0.99
att48 T201009012 10010099
att48 T35100530 1009896
att48 T50100200 10010099
berlin52 T20100410 10010080
berlin52 T35100500 1009993
berlin52 T5010010 100100100
brazil58 T2099150 995941
brazil58 T359700 97439
brazil58 T5010050 1009981
ch150 T2010000 1006020
ch150 T3510000 1009876
ch150 T5010000 10010097
gr202 T209900 998030
gr202 T3510000 1006916
gr202 T5010000 10010076
rd400 T2010000 100162
rd400 T3510000 1009880
rd400 T5010000 100100100
Table 6. Solutions such that R 0.98 (case 0.99–0.97).
Table 6. Solutions such that R 0.98 (case 0.99–0.97).
Instance%T% T 2 T 3 T 4 Feasible Solutions with R 0.98
att4820(100–0–0)90%
att4820(65–25–10)100%
att4820(0-100-0)100%
att4820(0-0-100)100%
eil5120(100–0–0)76%
eil5120%(65–25–10)100%
eil5150%(100–0–0)54%
eil5150%(65–25–10)100%
berlin5220%(100–0–0)41%
berlin5220%(65–25–10)100%
brazil5850%(100–0–0)5%
brazil5850%(65–25–10)100%
kroA10035%(100–0–0)0%
kroA10035%(65–25–10)100%
kroB10020%(100–0–0)3%
kroB10020%(65–25–10)100%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Laborde, S.; Robledo, F.; Nesmachnow, S. Reliability Analysis of Survivable Networks under the Hostile Model. Symmetry 2022, 14, 2523. https://doi.org/10.3390/sym14122523

AMA Style

Laborde S, Robledo F, Nesmachnow S. Reliability Analysis of Survivable Networks under the Hostile Model. Symmetry. 2022; 14(12):2523. https://doi.org/10.3390/sym14122523

Chicago/Turabian Style

Laborde, Sebastián, Franco Robledo, and Sergio Nesmachnow. 2022. "Reliability Analysis of Survivable Networks under the Hostile Model" Symmetry 14, no. 12: 2523. https://doi.org/10.3390/sym14122523

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop