Literature DB >> 26496705

Optimal Allocation of Node Capacity in Cascade-Robustness Networks.

Zhen Chen1, Jun Zhang1, Wen-Bo Du2, Oriol Lordan3, Jiangjun Tang4.   

Abstract

The robustness of large scale critical infrastructures, which can be modeled as complex networks, is of great significance. One of the most important means to enhance robustness is to optimize the allocation of resources. Traditional allocation of resources is mainly based on the topology information, which is neither realistic nor systematic. In this paper, we try to build a framework for searching for the most favorable pattern of node capacity allocation to reduce the vulnerability to cascading failures at a low cost. A nonlinear and multi-objective optimization model is proposed and tackled using a particle swarm optimization algorithm (PSO). It is found that the network becomes more robust and economical when less capacity is left on the heavily loaded nodes and the optimized network performs better resisting noise. Our work is helpful in designing a robust economical network.

Entities:  

Mesh:

Year:  2015        PMID: 26496705      PMCID: PMC4619834          DOI: 10.1371/journal.pone.0141360

Source DB:  PubMed          Journal:  PLoS One        ISSN: 1932-6203            Impact factor:   3.240


Introduction

Modern human societies very much depend on large scale critical infrastructures to deliver resources and services to consumers and businesses. These infrastructures are complex systems of structural and functional elements. Such systems work reliably in our everyday life. However, as some rare occurrences in the past have shown, they are still vulnerable to major outages, such as telecommunication outages [1], blackouts in power grids [2-4] and financial bankruptcy [5]. The theory of complex networks has emerged in recent years, and has proved to be a valid tool to describe, model and quantify complex systems in system robustness and cascading failures [6-16]. In these fields, two important issues are always focused on by most researchers: how to design man-made networks with higher robustness to cascading failures and how to reduce the cost to maintain the robustness of networks. High robustness and low cost seem to be contradictory, and it is difficult to achieve both in most cases. For instance, dense networks are more likely to be robust to cascading failures, but more edges always mean more resources and a higher cost. In short, building a robust network is very expensive. Some models and strategies have been proposed to balance robustness and cost. Motter et al. [17] first introduced a homogeneous capacity-load relationship model which is widely used today. In this model, the capacity of a node is proportional to the initial load of the node which is based on the flow along the shortest hop path. Wang et al. [18] introduced a model in which the capacity of a vertex is assigned as a nonlinear monotonically increasing function of the load. It aims to enhance the robustness of the network with a lower cost via protecting the higher load vertices merely. However, most previous works allocate the capacity resources simply according to network topology information, such as degree and betweenness. Kim et al. [19, 20] argued that these models are unrealistic due to the fact that empirical networks always show a nonlinear capacity-load relationship and heavily loaded nodes usually have relative less unoccupied capacity. Actually, the essence of resource allocation is an optimization problem, but the cascading failure process is hard to be described functionally, rendering traditional optimization methods powerless. It was not until very recently intelligent optimization algorithms, which have been proven to be valid for solving practical non-functional optimization problems, have been applied to network optimization [21-25]. Huang et al. [21] proposed a multi-objective simulated annealing algorithm to optimize the network topology for packet routing. Zhou et al. [22] introduced a memetic algorithm to optimize the structure of networks in order to enhance the robustness of scale-free networks against cascading failures. Fang et al. [23] applied the non-dominated sorting binary differential evolution algorithm to the power generation allocation of the existing buses in the 400kV French power transmission network. It turns out that optimization algorithms work well in optimizing the robustness of complex networks. Motivated by their works, in this paper we formulate the problem of resource allocation within a large-scale, nonlinear and multi-objective optimization framework and construct an optimal model of allocating the capacity resources. To solve it, an effective algorithm named particle swarm optimization (PSO) is utilized. We investigate the cost-efficiency, capacity-load and vulnerability-cost relationships and the effect of noise.

Materials and Methods

In this section, we describe (1) network and cascade model, (2) optimal model of capacity allocation, and (3) PSO algorithm based solution. For clarity, the terms “node” and “vertex” will be used interchangeably in this paper.

Network and cascade model

To capture the heterogeneity of many real-world networks, the Barabási-Albert (BA) scale-free network [26] is adopted. The BA network is generated by starting from a small amount of m 0 fully connected nodes. It increases by adding a new node at each time step. This new node is connected preferentially to m(m ≤ m 0) old nodes in such a way that the probability of connecting to an existing node is proportional to the old node’s degree. The BA scale-free network exhibits a power-law distribution P(k) ∼ k −. In the following, the networks are set to N = 500, m 0 = 2 and m = 2. In the cascade model, the node load is estimated through node betweenness if the traffic flow travels along the shortest-path. As in Refs. [17, 27] we adopt the data-transport model which uses node betweenness to denote the node load: where is the number of shortest paths between nodes s and t that run through node i, and θ denotes the total number of available shortest paths from s to t. The capacity of a node is the maximum load that the node can handle. Following Refs. [17, 18], the capacity of node i is assigned as Where is the initial load and α (α ≥ 0) is the tolerance parameter. The cascading failure is triggered by removing the highest-load node in the network resulting in the globally redistribution of the flow and node loads [17, 18]. If a surviving node is overloaded, i.e. L > C , then it fails, leading to further load redistribution. This process continues recursively until no more nodes overload. Moreover, it is assumed that only the nodes in the giant component remain functional.

Optimal model of capacity allocation

Methods of resource allocation are generally framed to reduce the vulnerability (enhance the robustness) of networks against cascading failures with a limited cost. The variables to be optimized are defined as the tolerance parameter vector (i.e. , is a vector of network size N). Motter-Lai (ML) model [17] is the most basic and widely used model, in which α are the same values c(c > 0) for all nodes. Wang et al. [18] proposed a model in which , where Θ(x) = 0(1) for x < 0(x > 0), is a two-valued function. The latter model performs better than the former one, so it is possible that a pattern of that yields lower vulnerability and cost can be found by means of a variation approach. The vulnerability of a network is defined as where is the number of failed vertices under the tolerance vector and N is the total number of vertices in the network. Obviously, the smaller V is, the more robust the network will be. The cost of whole network resources is defined, in accordance with previous works [18], as where is a column vector of ones. The larger the E is, the more resources the network costs. The cascade-robustness network is a network with redundant vertex capacity. However, redundancy usually means extra cost. Robustness and cost are expected to be in opposition, requiring trade-offs. Therefore, we define the overall objective function of a network by aggregating vulnerability and cost through an adjusting parameter ω(0 < ω ≤ 1) balancing the importance of vulnerability and cost: When ω is small, we pay more attention to controlling the cost rather than reducing the vulnerability. On the contrary, when ω is large, we focus more on enhancing the network robustness and care less about the cost. It is easily found that the smaller the objective function is, the better the results are. Maximum cost is always a constraint in real world projects, which are subject to a budget. Thus, it is necessary to set whole network maximum cost as a constraint. Since ML model is the fundamental model, without loss of generality, we set the whole network cost of the initial pattern of ML model, as the maximum cost. Then the node capacity allocation optimization model can be formulated as The dimension of the variable is N, which represents the number of vertices in the network. is the objective function which is the linear combination of vulnerability and cost and is not an analytic expression. λ is the upper bound of the total node capacity cost. The value is a feasible solution if it satisfies all the constraints, otherwise it is an infeasible solution. One feasible solution is , which means feasible solutions do exist.

Particle swarm optimization based solution

Particle swarm optimization is an effective optimization algorithm proposed by Kennedy and Eberhart [28] which is inspired by the social behavior of swarms such as fish schooling or bird flocking [29]. In PSO, to search for the global optimum, a flock of particles move in a constrained parameter space, interacting with each other and updating their positions and velocities. Owing to its simplicity, effectiveness and low computational cost, PSO is widely used in solving practical optimization problems [30, 31] and there are a number of variations [32-36]. For our capacity allocation optimization problem with N variables and an objective function , the PSO algorithm represents the potential solutions with a flock of particles. Each particle i has a position and a velocity in the N-dimensional space. The position represents the tolerance parameter and the velocity represents the variance of . The goal is to find an optimal position of any particle i that makes the objective function minimum. Initially the particles’ positions and velocities are generated randomly within the constraint. Then, at each iteration each particle updates its position and velocity according to the following equations [28]: where , φ = c 1 + c 2 > 4. Here p is the best historical position found by i’s neighbors, c 1 and c 2 are the acceleration coefficients. is a random number drawn at each iteration from the uniform distribution [a, b]. Therefore, c 1 and c 2 balance the impacts of each particle’s own and its neighbors’ experiences, and η indicates the learning rate. Based on previous extensive analysis [37], we choose the appropriate setting as c 1 = c 2 = 2.05 and η = 0.7298. The number of particle is 50 and the number of iterations is 1000. To handle the constraints, we follow Ref. [38]: A volition function is assigned to make up the final fitness function with . The volition function is defined as follows: 2) A better solution is chosen by the tournament selection operator. The following three criteria are satisfied during the selection operator: when two feasible solutions are compared, the one with smaller value of is chosen; when two infeasible solutions are compared, the one with smaller value of is chosen; when one feasible and one infeasible solutions are compared, the infeasible solution is chosen only if it has a smaller value of and is less than a constant ε, otherwise the feasible solution is chosen. 3) The constant ε is used to limit the number of infeasible solutions. To keep the proportion of infeasible solutions a fixed proportion l, ε is defined as: It is worth noting that a handful of infeasible solutions do exist in the population. They are helpful due to the fact that sometimes the optimal solution is found in the boundary of the constraints.

Results and Discussion

Solving the optimal model of allocation of resources using the PSO algorithm described in previous section, we analyze (1) the optimization performance of the network; (2) cost-efficiency, (3) capacity-load and (4) vulnerability-cost relationships; and (5) the effect of noise.

Optimization performance of the network

We start by analyzing the optimization performance on BA scale-free networks. The basic Motter-Lai model [17] is set as the initial model to compare with. As reducing the vulnerability is the main purpose of real network design, we set the adjusting parameter ω = 0.8. In our optimization model this is also a well-considered trade-off which is discussed in the part of vulnerability-cost relationship of the network. Fig 1A shows that the objective function is much smaller after optimization for all values of λ. The optimized capacity allocation pattern does perform better than the initial model pattern. To get a full scenario, Fig 1B and 1C show the vulnerability and cost of the network, respectively. The network’s vulnerability decreases monotonously as the maximum cost increases in both optimized and non-optimized situations, which is in agreement with the intuition that more redundancy results in lower vulnerability. The optimized networks are always less vulnerable than the initial ones. Regarding the cost, the optimized pattern’s cost is only approximately 70% of the initial pattern. Consequently, the optimized networks are more robust at a lower cost.
Fig 1

Performance of the optimized pattern and the initial model pattern under different maximum costs.

(a) Objective function. (b) Vulnerability of the network. (c) Cost of the network. Each point is averaged from 20 different networks. The adjusting parameter is set to ω = 0.8. The algorithm runs for 1,000 iterations each time.

Performance of the optimized pattern and the initial model pattern under different maximum costs.

(a) Objective function. (b) Vulnerability of the network. (c) Cost of the network. Each point is averaged from 20 different networks. The adjusting parameter is set to ω = 0.8. The algorithm runs for 1,000 iterations each time.

Cost-efficiency relationship of the network

In order to further investigate the robustness and cost of the network, we set up a cost-efficiency indicator: Here H represents the average robustness gain from a unit cost, which is akin to the marginal utility in economics. Fig 2 shows that the cost-efficiency of optimized pattern is higher than that of initial pattern, especially when the maximum cost λ is small. In general terms, if the resources are allocated in the optimized pattern, the unit cost can produce much more robustness benefit, and more nodes will be able to survive a cascading failure. Besides, as the λ increases, each homogenous unit cost contribution to the network’s robustness becomes smaller. This interesting observation is just like the law of diminishing marginal utility. It shows that it is not wise to invest too much extra cost in protecting facilities when designing a system.
Fig 2

The cost-efficiency indicator H of different maximum costs.

Each point is averaged from 20 different networks. The adjusting parameter is set to ω = 0.8. The algorithm runs for 1,000 iterations each time.

The cost-efficiency indicator H of different maximum costs.

Each point is averaged from 20 different networks. The adjusting parameter is set to ω = 0.8. The algorithm runs for 1,000 iterations each time.

Capacity-load relationship of the network

Now we investigate the relationship between optimized node capacity and initial node load in the network reported in Fig 3. The capacity-load relationship in the initial model is linear and the tolerance parameter α is the same for all nodes. On the contrary, the relationship in the optimized model is nonlinear and α changes depending on the node. What is more, Fig 3 shows that nodes with large initial loads tend to have less unoccupied capacity in the optimized model. This interesting phenomenon is due to the fact that the flow fluctuations in heavily loaded nodes are relatively small when cascading failures occur and flow redistributes. Assigning excessive unoccupied capacity to heavily loaded nodes is actually a waste of resources and cannot reinforce the robustness of the network greatly. Assigning more resources to some lightly loaded but fragile nodes or simply taking out these redundancy capacities is a better alternative. It is worth to note that this finding is consistent with the empirical observations and results such as airports network, power grids and Internet router network [19, 20].
Fig 3

Capacity-load relationship of the network.

(a) Node capacity as a function of node initial load. (b) Node tolerance parameter α as a function of node initial load. The adjusting parameter is set to ω = 0.8. The maximum cost λ = 1.0. The algorithm runs for 1,000 iterations each time.

Capacity-load relationship of the network.

(a) Node capacity as a function of node initial load. (b) Node tolerance parameter α as a function of node initial load. The adjusting parameter is set to ω = 0.8. The maximum cost λ = 1.0. The algorithm runs for 1,000 iterations each time.

Vulnerability-cost relationship of the network

There is a critical parameter in the optimal model of allocation of resources, ω. It is a trade-off of the vulnerability and the cost in the objective function. Fig 4 shows the Pareto frontier of ω from 0.01 to (considering that the vulnerability of the network should be taken into account, ω cannot be equal to 0). As we can see, all the solutions of the initial model pattern are dominated by the solutions of the optimized pattern, which means that no matter what the adjusting parameter ω is, the results of the optimized model are always better. When ω is relatively small, the solutions mainly gather in the upper left corner. Networks that follow these node capacity allocation patterns possess a lower cost as well as a higher vulnerability. When ω is relative large, the solutions tend to distribute evenly. Networks following these allocation patterns are more robust against cascading failures at a relatively lower cost. Therefore, the parameter ω can be chosen in accordance to the actual demand. It should also be noted that the solutions for ω = 1 do not lie on the frontier, and they are dominated by other solutions, indicating that enhancing robustness at all costs is not a good solution. ω = 0.6 and ω = 0.8 are well-considered trade-offs of vulnerability and cost.
Fig 4

The Pareto frontiers of various values for parameter ω.

Each point is averaged from 20 different networks. The algorithm runs for 1,000 iterations each time.

The Pareto frontiers of various values for parameter ω.

Each point is averaged from 20 different networks. The algorithm runs for 1,000 iterations each time.

Noise effect

In reality, nodes capacity is inevitably fluctuant resulting from the outside interference such as noise. Thus, we are interested in how the presence of noise impacts the cascade behaviors within our optimized model. Following Ref. [18], the effects of noise are introduced as an erroneous assignment of the capacity function. In detail, at a given error probability q (q and q for optimized and initial models, respectively), node i’s capacity is changed from C to : where τ(τ ∈ [−0.2, 0.2]) obeys uniform distribution with zero mean. This is plausible in real-world applications due to the fact that the ignorance of the true value of the load for each node often results in an erroneous assignment of that node’s capacity. Fig 5 shows that the vulnerability of both the optimized network and the initial network increases as the error probabilities q and q increase, indicating the negative effects of noise. For the same error probability, although the redundancy capacity is reduced (please see the inset of Fig 5), the optimized network performs better, especially when λ is small. The optimized pattern of node capacity allocation has a stronger ability to resist noise.
Fig 5

The effect of noise.

The dot lines represent the initial networks and the solid lines represent the optimized networks. Each point is averaged from 20 different networks. The adjusting parameter is set to ω = 0.8.

The effect of noise.

The dot lines represent the initial networks and the solid lines represent the optimized networks. Each point is averaged from 20 different networks. The adjusting parameter is set to ω = 0.8.

Conclusions

In summary, we propose a framework for searching for the most favorable pattern of node capacity allocation. It is modeled by a large-scale, nonlinear and multi-objective problem and solved by particle swarm optimization. We demonstrate that the optimized pattern does indeed make the network less vulnerable while at the same time reducing the cost of assigning capacities. We also introduce an indicator H to measure the cost-efficiency of the network. It is found that the cost-efficiency increases a lot through optimization and approximately follows the law of diminishing marginal utility. Besides, we found that the capacity-load relationship of the optimized network is nonlinear: heavily loaded nodes tend to decrease their capacity. Finally, the effect of noise is investigated, and the optimized pattern of capacity allocation shows a stronger ability to resist noise. The optimal framework we propose here is systemic and generally applicable, which can be easily adopted in other circumstances, with the consideration of different constraints and objectives. Our results show that it is not wise to invest too much extra cost in protecting facilities when designing a network or a system due to the cost-efficiency is very small at a large maximum cost. Moreover, assigning less unoccupied capacity to the heavily loaded nodes, and more extra capacity to some lightly loaded nodes can make the network most robust as well as least cost. We believe that our work should be helpful in designing infrastructure networks from an economic point of view.
  16 in total

1.  Emergence of scaling in random networks

Authors: 
Journal:  Science       Date:  1999-10-15       Impact factor: 47.728

2.  Novel type of phase transition in a system of self-driven particles.

Authors: 
Journal:  Phys Rev Lett       Date:  1995-08-07       Impact factor: 9.161

3.  Attack vulnerability of complex networks.

Authors:  Petter Holme; Beom Jun Kim; Chang No Yoon; Seung Kee Han
Journal:  Phys Rev E Stat Nonlin Soft Matter Phys       Date:  2002-05-07

4.  Cascade-based attacks on complex networks.

Authors:  Adilson E Motter; Ying-Cheng Lai
Journal:  Phys Rev E Stat Nonlin Soft Matter Phys       Date:  2002-12-20

5.  Model for cascading failures in complex networks.

Authors:  Paolo Crucitti; Vito Latora; Massimo Marchiori
Journal:  Phys Rev E Stat Nonlin Soft Matter Phys       Date:  2004-04-29

6.  A self-learning particle swarm optimizer for global optimization problems.

Authors:  Changhe Li; Shengxiang Yang; Trung Thanh Nguyen
Journal:  IEEE Trans Syst Man Cybern B Cybern       Date:  2011-11-04

7.  Parameter estimation in stochastic mammogram model by heuristic optimization techniques.

Authors:  S Easter Selvan; C Cecil Xavier; Nico Karssemeijer; Jean Sequeira; Rekha A Cherian; Bharathi Y Dhala
Journal:  IEEE Trans Inf Technol Biomed       Date:  2006-10

8.  How to make a fragile network robust and vice versa.

Authors:  André A Moreira; José S Andrade; Hans J Herrmann; Joseph O Indekeu
Journal:  Phys Rev Lett       Date:  2009-01-09       Impact factor: 9.161

9.  Selectively-informed particle swarm optimization.

Authors:  Yang Gao; Wenbo Du; Gang Yan
Journal:  Sci Rep       Date:  2015-03-19       Impact factor: 4.379

10.  Particle swarm optimization with scale-free interactions.

Authors:  Chen Liu; Wen-Bo Du; Wen-Xu Wang
Journal:  PLoS One       Date:  2014-05-23       Impact factor: 3.240

View more
  2 in total

1.  Overload-based cascades on multiplex networks and effects of inter-similarity.

Authors:  Dong Zhou; Ahmed Elmokashfi
Journal:  PLoS One       Date:  2017-12-18       Impact factor: 3.240

2.  Network recovery based on system crash early warning in a cascading failure model.

Authors:  Dong Zhou; Ahmed Elmokashfi
Journal:  Sci Rep       Date:  2018-05-10       Impact factor: 4.379

  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.