Attack Vulnerability of Complex Communication Networks
The Internet has been studied as a typical example of real-world complex networks. In this brief, we study the traffic performance of the Internet when it encounters a random or intentional attack. Different from previous approaches, the congestion control protocols are considered so that the bandwidth can be reallocated among flows. In this way, cascading breakdown is less likely to happen. The flow rates are adjusted when a node is attacked and out of function. Consequently, the traffic...[Show more]
|Collections||ANU Research Publications|
|Source:||IEEE Transactions on Circuits and Systems-II|
|01_Xia_Attack_Vulnerability_of_2008.pdf||144.98 kB||Adobe PDF||Request a copy|
Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.