Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
572 zyxwvutsrqponmlkji zyxw zyxw zyxwv IEEE TRANSACTIONS ON RELIABILITY, VOL. 40, NO. 5 , 1991 DECEMBER Estimation of Network Reliability Using Graph Evolution Models T. Elperin Ben-Gurion University of the Negev, Beer Sheva I. Gertsbakh Ben-Gurion University of the Negev, Beer Sheva zyx zyxwvu zyxwvut zyxw The usual network reliability problem is: Suppose that edges of G are s-independently erased with probabilities q ( e ) , e E E. Let F denote the set of non-erased edges; the subgraph ( V J ) of G then appears with probability: M. Lomonosov < ( e ) neE Ben-Gurion University of the Negev, Beer Sheva Pr{F) = Key words - Terminal reliability, Spanning tree, Lifetime In practice this static model describes: i) systems without edge renewal, or fi) stationary regimes Of renewable systems. h Case ii, q ( e ) is the equilibrium probability that a renewable edge e is down. simulation, Kruskal algorithm, Graph evolution, Monte Carlo method Reader Aids Purpose: Widen and advance state of the art. Special math needed for explanations: Basic graph theory, probability and reliability theory. Results useful to: System reliability analysts. neE E-F q(e) (1-1) Notation R ( 3 t , q ) reliability of Tc the m-vector with coordinates q ( e ) E E. 4 T a fixed subset of V; the members of T are called terminals Abstract - Monte Carlo techniques for estimating various net- Other, standard notation is given in “Information for Readers work reliability characteristics, including terminal C O M ~ C ~are ~ V ~& ~ YAuthors” , at the rear of each issue. developed by assuming that edges are subject to failures with arThe reliability of 3t is defined as the probability R ( Z , q ) bitrary probabilities and nodes are absolutely reliable. The core of our approach is introducing network time-evolutionprocesses that the random subgraph ( V , F ) is operating. As a principal and using certain graph-theoretic machinery resulting in a con- example, we consider terminal reliability defined by: ( V J ) is siderable increase in accuracy for Monte Carlo estimates, especially up if Tlies in one component of ( V J ) . This network is denoted for highly reliable networks. Simulationstrategies and numerical by (G9T). results are presented and discussed. We consider Monte Carlo simulation of network reliabili- 1. INTRODUCTION Reliability of networks with randomly failing edges is a subject of extensive research. Several directions prevail in this research: algorithms for reliability computation [1-3,2 1,221 reliabdity estimation by means of simulation [6,8-11,14,16,17] constructing tractable lower and upper bounds on the network reliability [2-4,18-201. This paper describes an approach to network reliability simulation based on an artificial time-evolution formulation of network failure reliability characteristics. This approach incorporates both simulation and analytic methods and has no difficulty when the edge failure probabilities are distinct. The aim of this work is to develop efficient simulation procedures. In particular, we are interested in reducing the relative error of network failure estimation for highly reliable networks. A network 3t is an undirected graph G = ( V , E ) ,with nodeset V, J V J= n , and edge-set E, J E J= m , whose spanning subgraphs ( V J ) are classified as up (operational) and down (non-operational), subject to the reasonable monotonicity condition: If ( V,F) is up then all subgraphs ( V J ‘ ) are up, where F E Ff. ty based on time evolution modification of the static model. This modification leads to an important acceleration (variance reduction) of the Monte Carlo procedures, and guarantees boundedness of the relative error, irrespective of the value of graph unreliability (claim 6.2). Section 2 presents a general statistical framework for reliability evaluation. Section 3 expresses the network reliability R ( T c , q ) in terms of two different Markov processes: i) a destruction process (DP), and ii) a creation process (CP). Section 4 presents combinatorics for analyzing DP for the network ( G, T ). The central role belongs to the notion of maximal spanning tree, the Kruskal algorithm, and lemma 4.1. In the case of equal edge-failure probabilities, the DP leads to an efficient Monte Carlo sampling scheme studied earlier by Fishman [lo]. Sections 5 & 6 describe a modification of CP based on the graphtheoretical notion of closure. Section 7 presents numerical results for a family of networks, with a comparison of several Monte Carlo approaches. zyxwvutsrqpon 2. MONTE CARLO SAMPLING SCHEME By the Monte Carlo method for evaluating a sum, z z(u) = U€ U 00 18-9529/91/ 1200-0572$01.WO1991 IEEE zyxwvutsrqponmlkjih ~ zyxwvu I zyxwvut zyxwvuts zyxwvutsrq ELPERIN ET AL.: ESTIMATION OF NETWORK RELIABILITY USING GRAPH EVOLUTION MODELS over a very large set Uof “outcomes”, we mean the following method. Introduce the probability distribution p ( U ) on U and consider U as an um from which a ball u can be drawn with probability p (U). Also let Z denote the mean value of random variable Y(u) = z(u)/p(u) by: The variance and coefficient of variation of Y are: 513 balls u in this scheme are the trajectories of a certain Markov process on the state space 2“ or its proper reduction, and the value Y( U ) of the random variable is the conditional probability of the up state for a given trajectory. Except for a special choice of the urn we suggest no changes to the above basic sampling scheme. This, however, provides performance of the Monte Carlo which is in general comparable with the existing advanced sampling techniques. In certain cases, such as highly reliable networks and dense graphs, the suggested method is definitely better. 3. GRAPH DESTRUCTION AND CREATION PROCESSES zyx zyxwvutsrq zyx zyxwv zyxwvuts From basic statistics we have Introduce an artificial time t and let F ( t ) denote the set of edges existing at the instant t. Consider two types of graph evolution processes G ( t ) = ( V , F ( t ) ) , F ( t ) E E, t 1 0. - Ckim 2.1. Let S = (U’, u2,...,UN) be the result of N s-independent choices from U,with probabilities p (U). Then N Ps = N-’ Y(Ui) i=l is an unbiased estimate of E { Y) , with variance and coefficient of variation equal: Destruction Process (DP) Initially, at t =0, all edges are up: F ( 0) =E. Edges leave the set F ( t ) s-independently, at random moments T( e ) , with the Cdf, Pr{.r(e) It} = 1 -exp( -X(e)t). Let 7(X) denote the random moment when G( t ) goes down. The Cdf of T( X ) is Pr{7(X) It} = R ( X , q ) , where q is an m-vector with the components q(e) = 1 -exp( -X(e)t), e E E. The static model in the Introduction agrees with DP when the edge failure rates X(e) are chosen so that - Var{E} = N-’ * Var{Y> 6s = 0 and is realized at t = 1. Crude Monte Carlo Creation Process (CP) Consider a network X with a graph G = ( V,E ) and some operational (up) criterion. Realization of the above scheme for the set of subsets of E as the urn U,with p (F), F E E, given by (1-1), and Y(F) = 1 when (VJ) is up, and 0 otherwise, are referred to as crude Monte Carlo (CMC) for evaluating R ( X , q ) , or equivalently, for evaluating Q(X , q ) = l-R(X,q). The variance of CMC is: Initially, at t =0, all edges are down: F( 0) = 0. The edges of G join F( t) s-independently, at random moments 7 ( e ) , with the Cdf, Pr{.r(e) It} = 1-exp( -X(e)t), e E E, and operate forever. Let [ ( X ) denote the moment when G ( t) goes up. TheCdfof[(X) i s P r { t ( X ] It} = R ( X , q ) ,withq(e) = exp( -X(e)t). The static model agrees with CP when the edge birth rates h ( e ) are chosen so that, and the relative error in evaluating Q on the basis of N s-independent experiments is: The main deficiency of CMC is the unbounded growth of BCMC as Q approaches 0 (viz, for highly reliable networks). Various improvements of CMC have been suggested in order to reduce or eliminate this effect [6,8-11,14,17]. In this paper we offer another urn scheme for evaluating network reliability which guarantees finite relative error. The and is realised at t = 1. For each of these processes consider an ordering (permutation) w = (el,...,e,,,) of E specifying the order in which the edges are erased (in DP) or created (in CP). The probability of w is given by the well-known expression [7,17]: (3-3) where Eo = E, Ei = E - e l - ...- ei, 1 Ii s m-1, and h(Ei) = L E E , h(e)* For a given w ,an edge e is called DP-critical if erasing it causes G( t) to go down, and CP-critical if its creation causes 574 zyx zyxwvutsrqponmlkj IEEE TRANSACTIONS ON RELIABILITY, VOL. 40, NO. 5, 1 9 9 1 DECEMBER zyxwvutsrqp zyxwvutsrq zyxwvutsr zyxwvutsr zyxwvut zyxw zyxwvu zyxwvu zyxwvutsr G(t) to go up. The ordinal number of the critical edge in w is called the critical number of w and denoted by [w], so that min{i:G-el- ... -ei is down}, in DP (el,e2,...,ei)) is up), in CP. PutP(t(w) = Pr{7(32) It I (3-4) tJw} for DP, and Pr(t(32) I w) for CP. By a well-known property of Markov processes The following obvious variance decomposition reveals the gain in accuracy provided by DP or CP with respect to CMC (at the expense of more complex computations). VarcMc = Varp + Pr{x} P(tlx) P(tlx). (3-9) X Similarly, a tail y can be identified with the bundle of permutations w satisfying tl( w) =y. Its probability is: [7], P ( t ( w ) is a convolution of exponential r.v.’s: i=r h(ei)+ ... +h(e,) P ( t ( w ) does not depend on the order of e[wl+l,...,em in the permutation w. The following notions are therefore reasonable. Trajectories and Tails An ordered subset x = (el, e 2 , ...,er) of E is called a rrajectory of DP if G-el-e2- ... -ei is up for i < rand down for i = r; x is called a trajectory ofCP if ( V , {el,...,ei)) is down for i < r and up for i = r . An ordered subset y = (er, e,, l,. ..,em)of E is called a tail of DP if ( V, {ei,ei+1,. . .,e,} is down for i > r and up for i = r; y is called a tail of CP if G-ei-ei+l-... -em is up for i > r a n d down for i = r . The Cdf of the critical moment, given y , is: (3-10‘) 0 The critical number r=[w] divides a permutation w = (el,...,em) into the trajectory tr ( w ) = ( e1,e2,...,e,.) and the tail tl(w) = (er,er+l,...,em).A trajectory x can be identified with the set (bundle) of permutations w satisfying tr (w) = x, thus - In the important case of equal edge-failure probabilities (X(e) = X for all e E E) we have - P(tlx) = P(tlw) for w satisfying tr(w) = x , n r Pr{4 = Pr{x} = w:tr(w) = x i=l X(ei) . h ( E - e l -... -ei-l) (3-6) By the total probability formula, 1 (m-r)! ( r - l)! Pr{w} = -, Pr{x} = ____ , Pr{y} = -. m! m! m! (3-11) Now we describe generating permutations, trajectories and tails with their “natural” probabilities, as they appear in the corresponding process. Generating permutations q = {q(e ) ; e E E } is the vector of edge failure probabilities, de) = i 1-exp[-X(e)t], exp[-h(e)t], for DP for CP. For each edge e generate a value b(e) of r.v. 7(e), the lifetime of e. Then the desired permutation w = ( el,e2,...,em) is induced by the inequalities: b(el) The sum at the left in (3-7) is over all trajectories of the corresponding process. The Monte Carlo scheme based on generating trajectories x and exactly computing P ( t Ix) is characterised by the variance: (3-8) < b(e2) <...< b(e,). (3-12) This method is equivalent to drawing a permutation w from the um (see section 2) of all m! possible permutations of E with 0 probability p ( w ) given by (3-3). Generating trajectories A trajectory x = (e1,e2,...,er)is generated by sequentially choosing el from E with probability X ( e l ) /X( E ) , e2 from E-el with probability h(e2)/h(E-el), etc, until the critical zyxwvutsrqponmlkji zyxwvu zyxwvutsrq zyxwvuts zyxwvu zyxwvutsr I ELPERIN ET AL.: ESTIMATION OF NETWORK RELIABILITY USING GRAPH EVOLUTION MODELS edge is generated. This is equivalent to drawing a trajectory from an urn with probability (3-6). Sequentially generating tails in the reverse order e,, e, - l,. .., with natural probabilities (3- 10) is practically intractable, except for the case of equal edge-failure probabilities. In the latter case, tails are generated in the same sequential manner as trajectories. 0 4. IDENTIFYING THE CRITICAL EDGE OF DP FOR 3Z=(G,T) 515 the subset C of E connecting D ' & D " becomes empty. If it did not, then there would exist ej in C, with j >k, so that the spanning tree D, - t?k ej is lexicographically greater than D,-which is a contradiction. + Example Figure l a presents the graph called dodecahedron [12]. It has 20 nodes and 30 edges. The double-circled nodes 1,3,17 are the terminals. The numbers near edges specify the edge lifetimes, b ( e ) .The corresponding tree D, is shown on figure lb; its bold part is D,( T ) . The network lifetime is 19, while the overall connectivity is lost earlier, at t=6. zyxwvutsrqpo zyxwvutsr Notation component of G - el - e2- ... - ek- that contains T some spanning tree of Gk the minimal subtree of D that contains T the lexicographically maximal spanning tree with respect to w e (w,T ) the junior edge of the subtree D, ( T ) . Gk D D(T) D, Consider generating a trajectory x = ( e1,e2,. .. ) of DP. After a current edge ek is erased, we need only to check if the terminal-set T is connected by G -el - e2- ... - ek. Surely, the choice of ek can always be restricted to the edge-set of Gk. The possibilities are: i. ek 4 D. Then Gk+l=G-ek, and obviously Gk+l contains T; D might be preserved. ii. otherwise. Find an edge e of Gk-ek connecting the components of D-ek. If e exists, then Gk+l =G-ek, Gk+l connects T, and we can put D: =D - ek e; otherwise (e does not exist), consider the components of D - ek. If one of them, say D ' contains the entire T, then Gk+ = Gk( D ' ) which is the subgraph of Gk induced by the vertices of D ' , Gk+ connects T, and we can put D: =D'; otherwise T is disconnected in Gk-ek, so that the critical number is k, and (el,e2,...,ek) is the desired trajectory. 0 + a. An important fact is that when an entire permutation w is available, the critical edge can be determined by using exactly one special spanning tree D, as shown in lemma 4.1 below. For a spanning tree D,D(T ) is the union of the chains of D between all pairs of terminals. An edge permutation w induces the following lexicographic order among the spanning trees: D >D " when the senior edge of D ' -D " is greater than that of D " -D Then D, is exactly the tree constructed by the famous Kruskal algorithm [15], with the input w. I . Lemma 4.1. Let b (e) be the lifetime of edge e in DP, and w = ( el,e2,...,e,) be the edge permutation induced by inequalities b ( e l ) < b ( e 2 )e . . .< b(6,). Then ( G , T ) fails when e(w,T) fails, so that e ( w , T ) is the critical edge of w. Proof. Let k be the ordinal number of e ( w,T)in w ,and putFi=E-el- ...- ei, i = l , ...,k. For i < k , (V,Fi)contains D,( T ) and thus connects T. We show that T is disconnected in ( v,Fk). Consider the components D ' , D " of D, - ek By definition of ek, both D ' , D" contain terminals. When ek fails, b. Figure 1. The Dodecahedronand Its Maximal Spanning Tree Simulation Strategy The following Monte Carlo simulation algorithm is suggested by lemma 4.1. 576 zyxwvutsrqponml zyxwvutsrqpo zyxwvutsrq zyxwvutsrq IEEE TRANSACTIONS ON RELIABILITY, VOL. 40, NO. 5, 1991 DECEMBER 1. Generate N permutations wj (j= 1,..., N ) as described in (3-12). 2. For each j = 1,. ..,N, determine [wj] using the Kruskal algorithm; the trajectory tr ( w j ) is thus identified. 3. Compute P(tlwj) by (3-5). 4. Compute the estimate of network failure probability as the sample average of P ( t 1 w j ) (j= 1,. .., N ) , see (2-2); compute the corresponding sample variance. 0 The Kruskal algorithm used in the above simulation starts from e, and terminates with e,, ie, it deals only with the tail of the given permutation. In principle, this property could be exploited by sequentially generating the tail of a permutation wj, applying (3-10) & (3-10'). Unfortunately, however, these formulas are too complicated for straightforward calculations. The situation is, however, much easier in the important case of equal edge-failure probabilities, as in (3-1 1). The reliability simulation of 32 = ( G,Z') with equal edge-failure probabilities is considered by Fishman [8,10]. In [lo], the simulation method is based on generating tails, and lemma 4.1 was used, but without being formulated explicitly. The case of equal edge-failure probabilities is extremely favorable for the network Monte Carlo. Indeed, in this case all permutations have the same probability, 1/ (m!). On the other hand, assuming, without loss of generality, h ( e )= 1 for all e E E, the convolution (3-5) can be considerably simplified. Indeed, in the theory of order statistics [5] it is well-known that 1-exp( - ( m - i + l ) t ) istheCdf0fther.v. ~ = T ( ~ ) - T ( ~ . where T ( ~ is) order statistic i for the sample of m i.i.d. r.v.'s T~ exp(l), q,=O. Moreover, ther.v.'s V,, i = l , ...,m, are s-independent. Thus the r.h.s. of (3-5) is: TABLE 1 Simulated ID'Sof Complete Graphs, N = lo6 zyxwvu A ( r ) s for ~ 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ~ ) , 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 0.023810 0.095238 0.002050 0.285714 0.010155 0.000127 0.595238 0.029820 0.000761 0.000006 0.071937 0.002688 0.000043 0.155212 0.007294 0.000165 0.298834 0.016465 0.ooO529 0.431992 0.033110 0.001451 0.061712 0.003070 0.108629 0.006247 0.181284 0.011650 0.277702 0.020218 0.310228 0.034246 0.055661 0.086821 0.130692 0.186388 0.241062 0.221751 0.000002 0.000002 O.ooOo16 0.oooD29 O.ooOo87 0.000259 0.000549 0.001019 0.001869 0.003360 0.005759 0.009628 0.014864 0.023444 0.035028 0.051427 0.073990 0.103387 0.138312 0.177942 0.201261 0.157776 0.000000 0.000000 0.000000 0.000000 0.000000 0.000000 0.000000 zyxwvuts zyxwvu zyxwvutsrq zyxwvutsrq - The Cdf Hr(t) of the r-th order statistic is given by a wellknown formula Hr(t) = Pr{T(,)st) = binfc(r;l-e-',m) (4-2) Thus (3-7) acquires the form: m R(=,q) = A(r)Hr(t), (4-3) 0.000006 0.000005 O.ooOo13 0.000041 0.000065 0.000117 0.000216 0.000342 0.000499 0.000757 0.001205 0.001785 0.002634 0.003678 0.005431 0.007685 0.010677 0.014367 0.019461 0.026335 0.035125 0.045961 0.059512 0.075767 0.093734 0.112722 0.130512 0.140335 0.130172 0.080841 r= 1 A ( r ) = (number of permutations with [w] = r)/m!, This presentation is used in [lo] as a basis for a Monte Carlo sampling scheme. A remarkable property of (4-3) is that the relevant combinatorics of 32 = ( G ,Z') , expressed by the numbers { A ( r ), r = 1,...,m}, are totally separated from the probabilities contained in the functions Hr( t) , These functions are standard and always available for any value of t. So, the Monte Carlo simulation efforts should be turned to obtaining the distribution { A ( r ), r = 1,...,m}.It is reasonable to c d it the internal distribution (ID) of the network ( G , n. As an illustration, tables 1 & 2 present the IDS of several complete graphs with T= V, and for the dodecahedredon with various Ts. obtained by simulation. 5 . CREATION AND MERGING PROCESSES FOR 32= (G,Z') A closer look at the performance of the Kruskal algorithm reveals that on each step of constructing a maximal spanning tree, there can be identified a set of irrelevant edges whose future appearance does not affect the time t (32). These are exactly the edges complementing the existing part of the tree to its graphtheoketical closure. The closure of a subset F of E consists of F and all edges of G whose ends lie in the same component of the spanning subgraph ( V , F ) . A subset F is closed if it coincides with its closure. zyxwvu zyxwvutsrqpon ELPERIN ET AL.: ESTIMATION OF NETWORK RELIABILITY USING GRAPH EVOLUTION MODELS TABLE 2 Simulated ID’S for the Dodecahedron, N = IO5 AV) zyxwvutsrqponmlkjih zyxwvu I r T = V T = (1, 7, 8, 11, 16) T = (1, 20) 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 0.00476 0.01637 0.03366 0.05991 0.09559 0.13872 0.17746 0.20031 0.17794 0.09528 0.00130 0 .OO429 0.00959 0.01928 0.03486 0.05867 0.09259 0.13270 0.17232 0.17733 0.13625 0.08407 0.00039 0.00170 0.00374 0.00752 0.01464 0.02600 0.04515 0.07215 0.10635 0.13207 0.13642 0.12568 0.10235 0.07963 0.05561 0.03731 0.02361 0.01428 0.00836 o.oO401 0.00183 0.00089 0.00029 0.m2 577 in one of direct successors of g, say g’, obtained by merging exactly two super-nodes of g, and chosen with probability (A (g) - X(g ’ ) ) /X(g) . The above is summarized in the following. Claim 5.1. i. g(t) = ( F ( t ) ) is a Markov process on L ( G ) ; ii. the time spent by g(t) in a state g is distributed as exp ( (g) 1; iii. thetransitiong g’hastheprobabilityPr{g’Ig} = (X(g) - X(g’))/X(g), when g’ is a direct successor of g, and 0 otherwise. - For additional details see [3,19]. In the following, g ( t ) is referred to as Merging Process, MP. zyxwvutsrqponm zyxwvutsrq 0.04464 0.02017 0.00784 0.00284 o.oO091 0.00028 O.ooOo5 0 . m 2 Example Figure 2 presents L (K4), the set of all regular partitions g of the complete 4-node graph, “naturally” stratified into 4 levels according to the number of super-nodes in g. The arrows show the direct successions in L ( K4), thus forming the transition graph of the Markov process g(t). The members of L ( K 4 ) are represented by circles; the corresponding closed spanning subgraph is drawn in each circle. Let T = {2,3}. The double circles correspond to the partitions for which T lies in one super-node. zyxwvutsrqp zyxwvut For example, closing the set of bold edges of the dodecahedron shown in figure l b adds the edge e = ( 1,3). The closure operation enables us to deal simultaneously with thicker bundles of permutations than in the original DP or CP. A serious obstacle for using this approach in the DP for the network ( G,T ) is the stochastic properties of tails, expressed by (3-lo), (3-10’). This obstacle never appears for (G,T) in CP, as is shown below [3,19]. In what follows, the notion of regularpartition of Vplays the central role. Given a graph G = ( V,E), a partition g = {Xl,X2 ,...,X,} of V, where Xi f l J = 0 for i # j , and U [= 1 Xi = V, is called regular (with respect to G) if each induced subgraph G ( X i ) is connected. Arbitrary set F of edges generates a regular partition (F) = {Xl,X2,. ..,X,} where Xi are the components of the spanning subgraph ( V , F ) (including isolated nodes, if any). Subsets F’ and F“ are equivalent if (F’) = ( F ” ) , and identify every regular partition g with the class of subsets F of E satisfying (F) =g. Clearly, each such class is the collection of subsets of edges with a common closure. For every regular g, let its components be referred to as super-nodes and E(g) denote the set of exteml edges (the edges between distinct super-nodes). Put A (8) = (e). Consider the set L( G ) of all regular partitions of V, partially ordered by the relation: g ’ < g ” when g ” is obtained by merging components of g’. Suppose that a state F ( t ) of CP (see section 3) belongs to an equivalence class g ( t ) = g. Clearly, the time F( t) spends inghasthecdf l-exp[-X(g).t]. Onleavingg,F(t) jumps Figure 2. Transition Diagram for a Markov Process Whose States Are All Regular Partitions of a Complete 4-Node Graph Given a network ( G,T ), we say that g E L( G ) is up if all terminals lie in one super-node of g. A trajectory of g ( t ) is a sequence U = ( go,gl,...,g,) of regular partitions where go is the trivial partition into singletons; gi is a direct successor of gi-l for i = l , ...,r; and r is the first i such that gi is up. In general, trajectories have distinct lengths, so that r depends on U. The probability of U is: 578 zyxwvuts zyxwv zyxwvutsrqponmlk zyx IEEE TRANSACTIONS ON RELIABILITY, VOL. 40, NO. 5 , 1991 DECEMBER r-1 Pr{u} = zyxwvu zyxwvu zyxwvu zyxwvut zyxwvutsrq (si) - (gi+ 1 ) (5-1) E, of the edges between distinct components Xi.If g, is up, then stop; otherwise draw an edge from E, and form g,+1 by merging the two components connected by this edge. After a trajectory u = (go,gl,...,gr} is formed, the condiThe conditional distribution function of 4 (37.1 along u is tional Cdf ( l is computed as the convolution of functions (l-exp[-Ait]) where Ai= CeEErX(e), i=O, ...,r-1. (5-2) P (t 1 U ) = Convo, is 1 { 1 - exp[ - X (gi)t]} . the Since all Ai are distinct (in fact, & > A1 > above convolution is a linear combination of the exponents Finally, the Cdf of [ (31) is exp[ - A$], i =0,..., r - 1, whose coefficients are homogenous (5-3) functions of Ai, of order 0. The following recurrent procedure has the complexity 0 ( r2): i=O h(gi) where U is the set of all trajectories of g(t). Returning to the initial creation process F ( t) E E, we see that a trajectory x = (el,e2, ...) of CP produces a uniquely defined trajectory of MP which we denote by (x). We say that trajectories n’ , x ” of CP are equivalent if ( x ’ ) = ( x ” ) . Thus, a trajectory u of MP represents the class of trajectories of CP satisfying (x) = U ; we write it as x E U. For x E u one has - Assume Conv,-kcicr-l (1 -exp[-Aitl} k = 1- Ak,i exp[-A,-itl i=l k With Ak,j = 1. i=l (To start with, we haveAl,l = 1). Pr {x 1 U } = Pr { x } /Pr (U} Then - The Monte Carlo scheme based on generating trajectories of MP and exactly computing P ( t ( u ) using (5-2) has k Ak+l,k+l = l- Ak+l,i. i= 1 zyxwvu 6. COMPLEXITY OF THE MP-MONTE CARLO Comparison with CMC and CP is based on the expansions: VarcMc = VarMp + Pr(u}P(tJu) P ( t l u ) , (5-5) A. Estimating Q = E( X , q ) for particular value of the vector q with a given mean relative error 6. B. Estimating Q = R(%,q) for a l-parameter family qr oftheformq,(e) = ql(e)‘ = exp[-h(e)t], t E (tl,t2, ...,tk) (5-6) With a given mean relative error 6. The following statements can be easily established. U Varcp = VarMp + Pr{u} U ( Pr(x)u} P(tlx)2-P(tlx)2 . xEu ) For evaluating the computationalcomplexity of the Monte Carlo scheme based on MP consider two problems. The second term in the r.h.s. Of (5-6) is the Part of Varcp Claim 6.1. The complexity of one simulation run for A is by the state space reductionwhen cp was transform- 0(n2). For B, the values of Q ( tl 1 U),...,Q ( tk1 U ) are available ed into MP. in one simulation run: its complexity is 0 ( n 2 ) O(k-n). In the example of figure 2 the trajectories of g ( t ) are the Let 6Mp denote the coefficient of variation in the MP paths starting in 86 and terminating in doubled circles. Monte Carlo scheme: Simulation strategy For estimating the sum (5-3), the sampling scheme of sec- 6$p(Q) = V ~ ~ M - P & U Pr{u}Q(tlu)2 -1, Q2 Q(02 tion 2 is applied, with “natural” probabilities p ( u ) = Pr{u} given by (5-1). Then the complexity of the MP Monte Carlo for both A and B is: Generating a trajectory of g ( t ) + (e) Start from go = {XI,...,Xn},(Xil = l . At step r one has a sequence g0,gl,g2,...,grr with g,= {XI,...,Xn-,},and a list zyxwvu sz,,(Q) . 0(~2). 62 U zyxwvu zyx zyxwvut zy zyxwvutsrqpo zyxwvutsrqp zyxwvutsr zyxwvutsrqp ELPERIN ET AL.: ESTIMATION OF NETWORK RELIABILITY USING GRAPH EVOLUTION MODELS A pleasant feature of MP is given by the following statement. Claim 6.2. For a given n and a given operational criterion the coefficient of variation 8hp(Q) is bounded uniformly for all values of A(e), e E E and 0 5 t IW . Proof. Since the A’s appear only in the products A(e) .t and in 0-homogeneous form, it is sufficient to prove that limt-o, 8Lp(Q) exists and is bounded in the unit ball E, A2 (e) I 1. Consider the lattice L of all partitions of the node-set I/ (states), and let UP and DN denote the sets of up and down states respectively. A trajectory of MP is a sequence U = (go,gl,... ,gr), where go,. ..,gr- E DN, g, E UP (in this formulation trajectories with zero probabilities are permitted). Then - W = (Variance) x (CPU-time in sec for lo00 replications). (7-1) The values WDp & WMp for DP & MP, respectively, were compared with the corresponding WcMc for the crude Monte Carlo (CMC) and for some methods in [6,9,14,16]. The CMC was based on erasing edge e with probability q( e), e E E , and on checking the terminal connectivity of the resulting subnetwork. When no edges fail, the CMC simulation program skips the terminal connectivity check [6]. The set union algorithm of Hopcroft & Ullman [13] was applied for the connectivity check. For both DP & CP, the ratios WCMCIWDp & WCMC/WMp were computed. From the accuracy point of view, the principal parameter is the relative error: 6 = (Variance) “/(Network failure probability). - as t oo (since A(g,) >...>A(gr-l)). Define p ( % ) = min{h(g) : g E DN with a direct successor in UP} and U, = {U = (go,...,gr-l,gr) E U :A(g,-l)=p(%)}. Then- [for t large enough] U€ U, (7-2) The variance reduction factor with respect to CMC was computed for MP as, qMp = 6&C/6hp. The simulation results are based on N = lo4 replications. The followingnetworks were chosen for numerical experiments: 1. The Easton-Wong [6] communicationnetwork with 105 nodes and 127 edges, with the all-terminal connectivity as the operational criterion. 2. The dodecahedron (figure la) with the s-t connectivity as the operational criterion for s = 1 and t =20 [9]. 3. The dodecahedron with the all-terminal connectivity as the operational criterion. 4. A family of complete graphs Klo, K15, K20, K25,K30 with the all-terminal connectivity as the operational criterion. For networks #1 & #2, the performance of our methods is compared with that of alternative methods [6,9]. Table 3 presents simulation results for the Easton-Wong network, table 4 for the dodecahedrons, and table 5 for complete graphs. The following conclusions can be drawn from analyzing tables 3 - 5. zyxwvutsr Pr{u} ~ ( u ) . A(%) = 519 This limit is a continuous function of A( e), e E E , and the assertion follows. 0 In the particular case of complete graph G=K,,, with equal edge-failure rates, and all-terminal connectivity as an operational criterion, it can be shown that A&( Q) I1 for all n . The following seemingly non-trivial question is then reasonable and important. Question. Is there a universal constant A such that 6MP(Q) A for all n, all possible A’s and 0 It e oo? I 7. SIMULATION RESULTS In order to evaluate the performance of the Monte Carlo schemesbased on edge destruction & creation processes, a series of experiments has been done for several networks. Network failure probability Q=R{%,q} was estimated along the lines of the simulation strategies for DP & MP described in sections 4 & 5. As a performance measure of the simulation method we take: zyxwv 1. DP is not competitivewith MP, in terms of both variance reduction factor and in the Wperformance measure. Relative to CMC, DP has good performance parameters for nondense and very reliable graphs, as shown in table 4. The reasonable application field of DP is networks with equal edge-failure probabilities. In that case, one simulation run results in estimating the ID of (G, T ) and serves for any q value; see section 5. 2. MP is very efficient for highly reliable networks and dense graphs; see lines 4,5 and 9,lO in table 4, and lines 3,4,5 in table 5. The performance of MP increases when the network reliability approaches 1. 3. The suggested MP algorithm needs no extra modifications to include the cases of distinct edge failure probabilities and various partition-dependent operational criteria. 4. The complexity of MP-evaluation of Q (t) for several ti ( i = 1,. .., k ) is essentially the same as for one value of t; see section 6. In particular, all 5 values of Q in table 4 can be obtained in a single simulation experiment of io4 replications; this would increase the W-performance ratio by a factor of 5. 580 zyxwvutsrqponm zyx zyxwvuts zyxwvut IEEE TRANSACTIONS ON RELIABILITY, VOL. 40, NO. 5, 1991 DECEMBER TABLE 3 Simulation Results of the Easton - Wong Network IS] (all-terminal connectivity) zyxwvutsrqponmlkj Network failure probability Edge failure probabilities pH pV WCMC e*’ PS 6?fP VMP ~ WCMC** zyxwvutsrqponmlkjihgfedcbaZ WSD 0.02 0.005 0.01 0.01 0.001 0.0005 0.0438 0.00538 0.9 1.6 <1 1.5 0.6 1.2 67 135 3.4 5.4 2.4 7.6 *)Estimated by MP **)WcMc/WsD is the performance ratio of the CMC versus the Easton-Wong’s sequential destruction method [6]. zyxwv TABLE 4 Simulation Results for the Dodecahedron (s- t connectivity; s = “1 t = “20”,see Fig. 1,a.) ‘I, (1)’ 0.5 0.2 0.1 0.05 0.02 0.71023 0.0358 0.00282 0.000288 O.oooO167 34 43 0.2 0.1 0.05 0.02 0.01 0.1876 0.0226 0.002650 0.000158 O.oooO2 1.2 1.5 1.6 1.7 <1 <1 <I 1.3 8.2 0.38 1.8 3.1 3.8 4.1 2.8 8.3 37.7 246 3472 0.67 2.0 8.8 55.7 495 1.56 (2)’ {3)* 1.81 1.91 - 0.68 1.40 2.71 - 0.56 12.3 136 - - - - - {41* 0.05 - 70.3 3714.4 - All-terminal connectivity <1 4.0 10.2 23.0 109 0.43 0.72 0.86 0.95 0.98 23 85 504 6960 51590 5.4 20 108 1227 7635 - *) Computed by MP. {I)’ Dagger sampling [16],source [9]. {2}* Sequential Construction [6],source [9]. (3)* Method of Bounds [9]. (4)’ Methods of failure sets [14],source [9].The failure set method produced two estimates, the table presents the better one, with larger value of WcMc/WFs. zyxwvutsrqponm 5. In our experiments, sparse networks were represented by the dodecahedron. Based on the results in tables 3 & 4, we suggest using MP for 0 IQ < 0.05. 6. The comparison with the results from the literature reveals that MP (for a particular value of the q-vector) is competitive with the sequential destruction method [16] applied to a very sparse network; see table 3. Based on data in [9], MP Monte Carlo considerable outperforms the dagger method and the sequential construction method when applied to the dodecahedron, for Q < 0.05; see table 4. For the same example, the MP is inferior to the Fishman method of bounds [9] by a factor of 1.5-2.5. zyxwvutsrqponmlkjihg zyxwvu zyx zyxwvutsr zyxwvutsrqpo zyxwvutsrqp I ELPERIN ET AL.: ESTIMATION OF NETWORK RELMILITY USING GRAPH EVOLUTION MODELS zyx TABLE 5 Simulation Results for Complete Graphs (all-terminal connectivity). Edge failure probability q = 0.55 Network failure probability The graph K1o 4 5 K20 K25 K30 e.) 0.456*10-’ 0.346-10-2 0.232-10-3 0.147.10-4 0.889*10-5 % wDP <1 <1 <1 <1 <1 581 a P ?UP wCMC wMP 0.54 0.57 0.53 0.50 0.47 70 887 15160 0.27.106 5.08-107 21 169 3280 47220 0.73.107 *) Estimated by MP. The dodecahedron with terminals s = 1 and t =20 (figure la) has a specific feature with respect to the method of bounds. Namely, the bound 1-A in terms of edge-disjoint cuts [9, p 149; 11, p 4631 asymptotically coincides-in this particular case-with the true network unreliability value, since the collection of cuts chosen for A contains all minimum size cuts between s and t (which is far from being so, for general G, s, t). The MP is considerable inferior to the Karp-Luby method of failure sets; see table 4. The KarpLuby method requires extra effort for computing failure sets, in terms of computer time and computer memory; see comments on this issue in [9, p 531. [9] G. S. Fishman, “A comparison of four Monte Carlo methods for estimating the probability of s-t connectedness”, IEEE Truns. Reliubility, vol R-35, 1986, pp 145-154. [lo] G. S. Fishman, “A Monte Carlo sampling plan for estimating reliability parameters and related functions”, Networks, vol17, 1987, pp 169-186. [ 111 G. S. Fishman, “Estimating the S-t reliability function using importance and stratified sampling’’,Operarions Research, ~0137,1989,pp 462-473. [12] F. Harary, Graph Theory, 1969; Addison Wesley. [13] J. E. Hopcroft, J. D. Ullman, “Setmergingalgorithms”, SIAMJ. Computing, vol2, 1973, pp 296-303. [14] R. Karp, M. G. Luby, “A new Monte Carlo method for estimating the failure probability of an n-component system”, 1983; Computer Science Div., Univ. of California. [15] J. B. Kruskal, “Onthe shortest spanning tree of a graph and the travelling salesman problem”, Proc. Amer. Mathematical Soc., vol 7, 1956, pp 48-50. [16] H. Kumamoto, et al, “Dagger sampling Monte Carlo for system unavailability evaluation”, IEEE Trans. Reliability, vol R-29, 1980 Jun, pp 122-125. [17] H. Kumamoto, T. Kazuo, I. Koichi, E. J. Henley, “State transition Monte Carlo for evaluating large, repairable systems”, IEEE Trans. Reliability, VOI R-29, 1980 DE, pp 376-380. [18] M. V. Lomonosov, V. P. Polesskii, “On maximum of probability of connectivity”, Problems of Infonnation Trunsmission, vol 8, n u n 4, 1972. [19] M. V. Lomonosov, “Bernoulli scheme with closure”, Problems of Information Transmission, vol 10, num I, 1974. [20] M. V. Lomonosov, “Tender-spot of a reliable network”, Discrete Applied Mathematics, (to appear). [21] Lucia I. P. Resende, “Implementation of factoring algorithm for reliability evaluation of undirected networks”, IEEE Truns. Reliubility, vol37, 1988 Dw, pp 462-468. [22] A. Satanarayana, R. K. Wood, “A linear time algorithm for k-terminal reliability in series-parallel networks”, SIAM J. Computing, 1985, pp 818-832. zyxwvu ACKNOWLEDGMENT We thank the referees for their constructive and helpful comments. REFERENCES [l] A. Agraval, R. E. Barlow, “A survey of network reliability and domination theory”, Operations Research, vol 32, 1984, pp 478-492. [2] R. E. Barlow, F. Proschan, Statistical Theory of Reliability and Life Testing, 1975; Holt, Rinehart & Winston. [3] C. J. Colboum, % Combinatorics ofNetwork Reliability, 1987; Oxford Univ. Press. [4] C. J. Colbourn, D. D. Harms, “Bounding all-terminal reliability in computer networks”, Networks, 1988, pp 1-12. [5] H. A. David, Order Statistics, 1981, 2d ed; John Wiley & Sons. [6] M. C. Easton, C. K. Wong, “Sequential destruction method for Monte Carlo evaluation of system reliability”, IEEE Truns. Reliability, vol R-29, 1980 Apr, pp 27-32. [7] W. Feller, An Introduction to Probability Theory and Its Applications, vol II, 1966; John Wiley & Sons. [8] G. S. Fishman, “A Monte Carlo sampling plan for estimating network reliability”, Operations Research, vol 34, 1986, pp 581-592. AUTHORS Dr. Tov I. Elperin; The Pearlstone Center for Aeronautid Engineering Studies; Dept. of Mechanical Engineering; Ben Gurion University of the Negev; FQBox 653; Beer-Sheva 84105 ISRAEL. Tov. I. ElpeM: For biography, see IEEE Truns. Reliability, vol 39, 1990 Jun, p 208. Dr.nya B. Gertsbakh; Dept. of Mathematicsand Computer Science; Ben Gurion University of the Negev; FQBox 653; Beer-Sheva 84105 ISRAEL. nya B. Gertsbakh:For biography, see IEEE Trans. Reliability, vol39, 1990 Jun, p 208. Dr. Michael V. Lomonosov; Dept. of Mathematics and Computer Science; Ben Gurion University of the Negev; POBOX653; Beer-Sheva 84105 ISRAEL. Michael V. Lomonosov is an Associate Professor in the Dept. of Mathematics and Computer Science at the Ben Gurion University of the Negev. His research interests include network reliability and network flow theory. zyxwvutsrqpo Manuscript TR89-113 received 1989 December 12; revised 1990 September 22; revised 1991 April 28. IEEE Log Number 01573 4TRF