On Centrality-Related Disaster Vulnerability of Network Regions

Farabi Muhammad Iqbal, Fernando Kuipers

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

8 Citations (Scopus)
159 Downloads (Pure)

Abstract

Networks are typically embedded in non-homogeneous areas and different parts/regions of the network may therefore be at risk from different types of disasters. This non-homogeneity leads to difficulties in protecting the network against (the risk of) disasters. Network operators need to be able to integrate predictions on possible future disaster events in the planning of their network operation. Especially the (future) availability of network links is crucial in configuring network connections, since the requested availability of network connections is stipulated in Service Level Agreements and must be satisfied, even under the threat of disasters. In this paper, we propose (1) a novel model to characterize disaster areas, with occurrences of each type of disaster represented by a temporal distribution (e.g., Poisson process), and (2) two metrics, namely a betweenness-centrality metric for network regions and an impact metric that indicates the magnitude of the threat posed by disasters within a network region during a given time period.
Original languageEnglish
Title of host publication2017 9th International Workshop on Reliable Networks Design and Modeling (RNDM)
PublisherIEEE
Pages1-6
Number of pages6
ISBN (Electronic)978-1-5386-0671-1
ISBN (Print)978-1-5386-0672-8
DOIs
Publication statusPublished - 2017
EventResilient Networks Design and Modeling RDNM 2017: 9th International Workshop - Alghero, Italy
Duration: 4 Sept 20176 Sept 2017

Workshop

WorkshopResilient Networks Design and Modeling RDNM 2017
Country/TerritoryItaly
CityAlghero
Period4/09/176/09/17

Keywords

  • Measurement
  • Eathquakes
  • Planning
  • Hurricanes
  • Resilience
  • Shape
  • Tsunami

Fingerprint

Dive into the research topics of 'On Centrality-Related Disaster Vulnerability of Network Regions'. Together they form a unique fingerprint.

Cite this