Small time scale networks are a delay based network model. It can run on an hourly
time scale. Compared to traditional network models, small time scale networks have
higher flexibility and adaptability. It can better cope with changes in network traffic.
Therefore, small time scale networks can be used in a variety of application scenarios,
such as Network monitoring, packet forwarding and traffic scheduling [18,19].
3.1 Network Interruption Fault Identification based on Small Time Scale Networks
Small time scale network interruption fault identification refers to the fault diagnosis
of network systems on a small time scale. By analyzing network system signals, possible
faults in the network system are identified. Usually, the characteristics are analyzed
mainly from the aspects of small time scale characteristics of signals, characteristics
of network interruption signals, network system faults, communication distance and
signal transmission. The small time scale characteristics of signals refer to the
fact that network signals often have very small time resolution on small time scales,
which makes fault diagnosis more difficult. Therefore, the small time scale characteristics
of the signal need to be considered for better fault diagnosis. Network interruption
signals often have some characteristics, such as sudden rapid changes, continuous
slow changes. These features can better achieve fault diagnosis. Network system failure
refers to the possibility that a network system may be affected by some failures on
a small time scale, such as equipment aging, system updates, human errors, and so
on. Therefore, the impact of these faults on the network system should be considered
for better fault diagnosis. On a small time scale, communication distance and signal
transmission may be subject to some interference, such as noise [20,21,22]. Therefore, the impact of these interferences and factors on communication distance
and signal transmission should be considered. Based on bottleneck links, small-scale
network fault identification has been studied. Firstly, the case where there is only
one bottleneck link in a connected backhaul is considered. The transmission rate of
the output link in the transmission direction of a connection is $c_{s} $. The effective
bandwidth allocated by a bottleneck link for this connection is $c_{r} $. If $c_{s}
> c_{r} $, then the bandwidth allocated to all other links on the return path of this
connection is greater than the maximum sum of $c_{s} $ and $c_{r} $. The round-trip
link model structure of a single bottleneck link is shown in Fig. 1.
In practical applications, there is more than one bottleneck link on the round-trip
path of the connection. The maximum transmission rate of a connection on the output
link $j_{0} $ is $c_{0} $. The effective bandwidth allocated by bottleneck link $j_{n}
$ for this connection is $c_{n} $. The effective bandwidth allocated by bottleneck
links $j_{n} $ and $j_{n-1} $ for this connection is $c_{n-1} > c_{n} $. Any bottleneck
free link $j$ between bottleneck links $j_{n-1} $ and must meet the effective bandwidth
$c_{j} \ge c_{n-1} $. There are $n$ bottleneck links on one link. The effective bandwidth
of this link for this connection is $c_{0} >c_{1}> c_{n} $. From 3.1, it can be seen
that the rate of confirming the packet returning to the sender is $c_{n} $. The maximum
transmission rate of the sender is the minimum value between $c_{0} $ and $(1+a)c_{n}
$. $a$ is a progressive increment. Further assuming $c_{0} > (1+a)c_{n} $, the bottleneck
links $j_{i} $ and $j_{i+1} $ on the connected round-trip path satisfy $c_{i} > (1+a)_{cn}
> c_{i+1} $. So the number of bottleneck links on the round-trip path of the connection
is reduced to $r$, that is, link $j_{i+1} $, $j_{i+2} $, ..., $j_{n} $. Therefore,
the round-trip link model structure of the connection is shown in Fig. 2.
Fig. 1. Round-trip link model structure diagram for a single bottleneck link.
Fig. 2. Architecture diagram of a multi-bottleneck link.
From the above analysis, it can be seen that when a small-scale network is connected,
it can utilize several bottleneck links to achieve communication round-trip. When
a long buffer appears on a bottleneck link, the validity value of the buffer is greater
than the interrupt failure window. At this point, the average value of the maximum
packet in the buffer is the standby state. This buffer is a buffer for multiple bottleneck
links. The average value of the maximum group is represented by Formula (1).
In Formula (1), $A$ represents the average rate of achievement. $w_{i} $ represents the initial
value in the connection state. $n$ represents the number of links. $i=1$, $2$, ...,
$m-1$.
According to the example of the $i$-th communication return, two links each transmit
$w_{i} $ back-to-back data packets, both of which are transmitted to the bottleneck
link. The data packets belonging to the transmitting party are transmitted to link
1. Packets belonging to the bottleneck are transmitted to link 2. At this point, the
data packet is transmitted to the waiting connection state. The value in buffered
state can be calculated using Formula (2).
In Formula (2), $a$ represents the packet level increment of congestion windows. $c_{n} $ represents
effective broadband. On this basis, the average value of the maximum number of groups
can be calculated using Formula (3).
In Formula (3), $w_{ i-1} $ represents the value at the moment before the connection state. To ensure
that the allocation of links meets the requirements, the width of the connection is
allocated. The standard value of the distribution is calculated is shown in Formula
(4).
In Formula (4), $c$ represents the bandwidth on the path. Based on Formula (4) analysis, if $n=1$ is present on the communication round-trip path, the minimized
bandwidth link must exist on the round-trip path and be effective. If $n=2$, then
$c$ represents the effective bandwidth on that path. At this point, the bottleneck
bandwidth is shown in Formula (5).
In Formula (5), when $0<c_{2} <c{}_{\max } $, it indicates that there must be a bottleneck link.
The possibility of becoming a bottleneck link is shown in (6).
In Formula (6), $k$ represents the width rate.
3.2 Construction of a Mathematical Model for Fault Tolerant Identification of Network
Interruptions
A reconfigurable service carrying network (RSCN) link fault-tolerant mathematical
model has been constructed for identified link failures, which can achieve small-scale
network interruption fault repair. Normal communication is ensured in the event of
failure. The physical network description of the reconfigurable service bearer network
model is completed by a $G^{u} =(N^{u} ,E^{u} ,C^{u} )$ undirected graph. $C^{u} $
represents the carrying capacity, provided by the network. $N^{u} $ represents a physical
node. $E^{u} $ represents the set of links. The construction standard for the RSCN
model is $G^{r} =(N^{r} ,E^{r} ,C^{r} )$. $N^{r} $ represents a virtual node and belongs
to $N^{u} $. $E^{r} $ represents a virtual link and belongs to $E^{u} $. $R^{r} $
represents the demand for bearing capacity. The construction of the RSCN model can
be regarded as a mapping process, represented by $G^{s} $. This process is between
subsets $G^{r} $ and $G^{u} $. On the basis of meeting the constraint conditions in
$G^{r} $, it can be represented by Formula (7).
In Formula (7), $N^{s} \subset N^{u} $, $E^{s} \subset E^{u} $. The mathematical model flow commonly
used for network fault identification is shown in Fig. 3.
Fig. 3. Mathematical model process commonly used for network fault identification.
To describe the importance of resources in the network, the resource urgency measure
$e$ is introduced into the model. Represented by nodes, many links in a network pass
through them. Once $e$ malfunctions, it will cause widespread paralysis of the entire
network, greatly affecting its connectivity. Therefore, the influence of node $e$
also needs to be considered. $n_{i} $ represents a node. The degree in $G^{u} $ is
represented by $d_{i} $. $NI$ represents the degree of influence vector, belonging
to $n_{i} $ and its adjacent nodes. $CF$ represents a resource node that belongs to
a physical network. It can be used to describe the degree of segmentation, which is
caused by the failure of the remaining network in $n_{i} $. The adjacency matrix is
represented by $A(G^{u} )$. $G^{u} $ is a subset. After normalizing the node connectivity,
it is the degree of node connectivity. The processing formula is shown in (8).
In Formula (8), $n_{i} $ represents the connectivity of the node. The strength of link connectivity
can be expressed by the degree of adjacent point connectivity, as shown in Formula
(9).
In Formula (9), $d_{i} $ represents the specific degree value in the connection. $d_{j} $ represents
the connection value in connectivity. When the network is interrupted, the RSCN affected
can be described by saturation, as shown in Formula (10).
In Formula (10), $x$ represents the resources in the node and link. $k$ represents the number of
nodes. $M_{x} $ represents the assigned resource value. The degree of resource urgency
is shown in Formula (11).
In Formula (11), $\alpha $ represents the regulatory factor 1. $\beta $ represents regulatory factor
2. $\alpha +\beta =1$. $SF(x)$ represents the degree of impact caused by a malfunction.
The RSCN link fault-tolerant mathematical model has been constructed. While measuring
the construction cost, ensure that the number of RSCNs affected by resource failures
is minimized by reducing the occupancy rate of resources with higher urgency. After
the requirement decomposition of the model is completed, it is transformed into the
sequential solution of each requirement. In $s,t$, the determination of the connection
path in $G^{u} $ represents the construction of the model, represented by $V_{s,t}
$. The values that need to be met are shown in Formula (12).
In Formula (12), $b(c)$ represents the bandwidth value in the connecting link. $d_{e} $ represents
the measurement value in connectivity. To verify that the constructed attribute model
can perform network fault tolerance identification, the constructed mathematical model
is compared with random network models and scale-free network models. The results
are shown in Fig. 4.
As shown in Fig. 4, the fault tolerance recognition matching rate of the random network model is 93.25%.
The fault-tolerant recognition matching rate of the mathematical model is 96.72%.
The fault tolerance recognition matching rate of the scale-free network model is 89.97%.
The fault-tolerant recognition matching rate of the mathematical model is significantly
higher than the other two models, indicating that the constructed mathematical model
can be used for experiments. The link recovery mechanism is used to map and migrate
terminal failed links. Based on the goal of minimizing adjustment costs, fault-tolerant
analysis of interrupt failures is implemented. The mathematical model construction
process for fault tolerance identification of network interruption faults is shown
in Fig. 5.
Fig. 4. Matching of the three models.
Fig. 5. Mathematical construction process for fault-tolerant identification of network
outages based on small time scales.