Network failure detection and graph connectivity

We consider a model for monitoring the connectivity of a network subject to node or edge failures. In particular, we are concerned with detecting (ε, <i>k</i>)-<i>failures</i>: events in which an adversary deletes up to network elements (nodes or edges), after which there are two sets of nodes <i>A</i> and <i>B</i>, each at least an ε fraction of the network, that are disconnected from one another. We say that a set <i>D</i> of nodes is an (ε <i>k</i>)-detection set if, for any (ε <i>k</i>)-failure of the network, some two nodes in <i>D</i> are no longer able to communicate; in this way, <i>D</i> "witnesses" any such failure. Recent results show that for any graph <i>G</i>, there is an is (ε <i>k</i>)-detection set of size bounded by a polynomial in <i>k</i> and ε, independent of the size of <i>G</i>.In this paper, we expose some relationships between bounds on detection sets and the edge-connectivity λ and node-connectivity κ of the underlying graph. Specifically, we show that detection set bounds can be made considerably stronger when parameterized by these connectivity values. We show that for an adversary that can delete κλ edges, there is always a detection set of size <i>O</i>((κ/ε) log (1/ε)) which can be found by random sampling. Moreover, an (ε, &lambda)-detection set of minimum size (which is at most 1/εε) can be computed in polynomial time. A crucial point is that these bounds are independent not just of the size of <i>G</i> but also of the value of λ.Extending these bounds to node failures is much more challenging. The most technically difficult result of this paper is that a random sample of <i>O</i>((κ/ε) log (1/ε)) nodes is a detection set for adversaries that can delete a number of nodes up to κ, the node-connectivity.For the case of edge-failures we use VC-dimension techniques and the cactus representation of all minimum edge-cuts of a graph; for node failures, we develop a novel approach for working with the much more complex set of all minimum node-cuts of a graph.

[1]  Harold N. Gabow Centroids, Representations, and Submodular Flows , 1995, J. Algorithms.

[2]  Harold N. Gabow,et al.  Using expander graphs to find vertex connectivity , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[3]  Lisa Fleischer Building Chain and Cactus Representations of All Minimum Cuts from Hao-Orlin in the Same Asymptotic Run Time , 1999, J. Algorithms.

[4]  Robert Nowak,et al.  Internet tomography , 2002, IEEE Signal Process. Mag..

[5]  W. Mader Über die Maximalzahl kantendisjunkterA- Wege , 1978 .

[6]  Torsten Suel,et al.  Inferring tree topologies using flow tests , 2003, SODA '03.

[7]  David Shallcross,et al.  Distance Realization Problems with Applications to Internet Tomography , 2001, J. Comput. Syst. Sci..

[8]  Harold N. Gabow Using expander graphs to find vertex connectivity , 2006, JACM.

[9]  Joseph Cheriyan,et al.  Fast Algorithms for k-Shredders and k-Node Connectivity Augmentation , 1999, J. Algorithms.

[10]  David Haussler,et al.  Learnability and the Vapnik-Chervonenkis dimension , 1989, JACM.

[11]  Maurice Queyranne,et al.  On the structure of all minimum cuts in a network and applications , 1982, Math. Program..

[12]  Uriel Feige,et al.  Finding small balanced separators , 2006, STOC '06.

[13]  L. Lovász On some connectivity properties of Eulerian graphs , 1976 .

[14]  Jon M. Kleinberg,et al.  Detecting a Network Failure , 2004, Internet Math..

[15]  Vern Paxson,et al.  Towards a Framework for Defining Internet Performance Metrics , 2006 .

[16]  Vern Paxson,et al.  IPPM Metrics for Measuring Connectivity , 1999, RFC.

[17]  Tibor Jordán,et al.  On the Optimal Vertex-Connectivity Augmentation , 1995, J. Comb. Theory B.

[18]  Tibor Jordán,et al.  On the number of shredders , 1997, J. Graph Theory.