Small time scale networks are a delay based network model. It can run on an hourly
                  time scale. Compared to traditional network models, small time scale networks have
                  higher flexibility and adaptability. It can better cope with changes in network traffic.
                  Therefore, small time scale networks can be used in a variety of application scenarios,
                  such as Network monitoring, packet forwarding and traffic scheduling [18,19].
               
               
                     3.1 Network Interruption Fault Identification based on Small Time Scale Networks
                  Small time scale network interruption fault identification refers to the fault diagnosis
                     of network systems on a small time scale. By analyzing network system signals, possible
                     faults in the network system are identified. Usually, the characteristics are analyzed
                     mainly from the aspects of small time scale characteristics of signals, characteristics
                     of network interruption signals, network system faults, communication distance and
                     signal transmission. The small time scale characteristics of signals refer to the
                     fact that network signals often have very small time resolution on small time scales,
                     which makes fault diagnosis more difficult. Therefore, the small time scale characteristics
                     of the signal need to be considered for better fault diagnosis. Network interruption
                     signals often have some characteristics, such as sudden rapid changes, continuous
                     slow changes. These features can better achieve fault diagnosis. Network system failure
                     refers to the possibility that a network system may be affected by some failures on
                     a small time scale, such as equipment aging, system updates, human errors, and so
                     on. Therefore, the impact of these faults on the network system should be considered
                     for better fault diagnosis. On a small time scale, communication distance and signal
                     transmission may be subject to some interference, such as noise [20,21,22]. Therefore, the impact of these interferences and factors on communication distance
                     and signal transmission should be considered. Based on bottleneck links, small-scale
                     network fault identification has been studied. Firstly, the case where there is only
                     one bottleneck link in a connected backhaul is considered. The transmission rate of
                     the output link in the transmission direction of a connection is $c_{s} $. The effective
                     bandwidth allocated by a bottleneck link for this connection is $c_{r} $. If $c_{s}
                     > c_{r} $, then the bandwidth allocated to all other links on the return path of this
                     connection is greater than the maximum sum of $c_{s} $ and $c_{r} $. The round-trip
                     link model structure of a single bottleneck link is shown in Fig. 1.
                  
                  In practical applications, there is more than one bottleneck link on the round-trip
                     path of the connection. The maximum transmission rate of a connection on the output
                     link $j_{0} $ is $c_{0} $. The effective bandwidth allocated by bottleneck link $j_{n}
                     $ for this connection is $c_{n} $. The effective bandwidth allocated by bottleneck
                     links $j_{n} $ and $j_{n-1} $ for this connection is $c_{n-1} > c_{n} $. Any bottleneck
                     free link $j$ between bottleneck links $j_{n-1} $ and must meet the effective bandwidth
                     $c_{j} \ge c_{n-1} $. There are $n$ bottleneck links on one link. The effective bandwidth
                     of this link for this connection is $c_{0} >c_{1}> c_{n} $. From 3.1, it can be seen
                     that the rate of confirming the packet returning to the sender is $c_{n} $. The maximum
                     transmission rate of the sender is the minimum value between $c_{0} $ and $(1+a)c_{n}
                     $. $a$ is a progressive increment. Further assuming $c_{0} > (1+a)c_{n} $, the bottleneck
                     links $j_{i} $ and $j_{i+1} $ on the connected round-trip path satisfy $c_{i} > (1+a)_{cn}
                     > c_{i+1} $. So the number of bottleneck links on the round-trip path of the connection
                     is reduced to $r$, that is, link $j_{i+1} $, $j_{i+2} $, ..., $j_{n} $. Therefore,
                     the round-trip link model structure of the connection is shown in Fig. 2.
                  
                  
                        
                        
Fig. 1. Round-trip link model structure diagram for a single bottleneck link.
                      
                  
                        
                        
Fig. 2. Architecture diagram of a multi-bottleneck link.
                      
                  From the above analysis, it can be seen that when a small-scale network is connected,
                     it can utilize several bottleneck links to achieve communication round-trip. When
                     a long buffer appears on a bottleneck link, the validity value of the buffer is greater
                     than the interrupt failure window. At this point, the average value of the maximum
                     packet in the buffer is the standby state. This buffer is a buffer for multiple bottleneck
                     links. The average value of the maximum group is represented by Formula (1).
                  
                  
                  In Formula (1), $A$ represents the average rate of achievement. $w_{i} $ represents the initial
                     value in the connection state. $n$ represents the number of links. $i=1$, $2$, ...,
                     $m-1$.
                  
                  According to the example of the $i$-th communication return, two links each transmit
                     $w_{i} $ back-to-back data packets, both of which are transmitted to the bottleneck
                     link. The data packets belonging to the transmitting party are transmitted to link
                     1. Packets belonging to the bottleneck are transmitted to link 2. At this point, the
                     data packet is transmitted to the waiting connection state. The value in buffered
                     state can be calculated using Formula (2).
                  
                  
                  In Formula (2), $a$ represents the packet level increment of congestion windows. $c_{n} $ represents
                     effective broadband. On this basis, the average value of the maximum number of groups
                     can be calculated using Formula (3).
                  
                  
                  In Formula (3), $w_{ i-1} $ represents the value at the moment before the connection state. To ensure
                     that the allocation of links meets the requirements, the width of the connection is
                     allocated. The standard value of the distribution is calculated is shown in Formula
                     (4).
                  
                  
                  In Formula (4), $c$ represents the bandwidth on the path. Based on Formula (4) analysis, if $n=1$ is present on the communication round-trip path, the minimized
                     bandwidth link must exist on the round-trip path and be effective. If $n=2$, then
                     $c$ represents the effective bandwidth on that path. At this point, the bottleneck
                     bandwidth is shown in Formula (5).
                  
                  
                  In Formula (5), when $0<c_{2} <c{}_{\max } $, it indicates that there must be a bottleneck link.
                     The possibility of becoming a bottleneck link is shown in (6).
                  
                  
                  In Formula (6), $k$ represents the width rate.
                  
                
               
                     3.2 Construction of a Mathematical Model for Fault Tolerant Identification of Network
                     Interruptions
                  
                  A reconfigurable service carrying network (RSCN) link fault-tolerant mathematical
                     model has been constructed for identified link failures, which can achieve small-scale
                     network interruption fault repair. Normal communication is ensured in the event of
                     failure. The physical network description of the reconfigurable service bearer network
                     model is completed by a $G^{u} =(N^{u} ,E^{u} ,C^{u} )$ undirected graph. $C^{u} $
                     represents the carrying capacity, provided by the network. $N^{u} $ represents a physical
                     node. $E^{u} $ represents the set of links. The construction standard for the RSCN
                     model is $G^{r} =(N^{r} ,E^{r} ,C^{r} )$. $N^{r} $ represents a virtual node and belongs
                     to $N^{u} $. $E^{r} $ represents a virtual link and belongs to $E^{u} $. $R^{r} $
                     represents the demand for bearing capacity. The construction of the RSCN model can
                     be regarded as a mapping process, represented by $G^{s} $. This process is between
                     subsets $G^{r} $ and $G^{u} $. On the basis of meeting the constraint conditions in
                     $G^{r} $, it can be represented by Formula (7).
                  
                  
                  In Formula (7), $N^{s} \subset N^{u} $, $E^{s} \subset E^{u} $. The mathematical model flow commonly
                     used for network fault identification is shown in Fig. 3.
                  
                  
                        
                        
Fig. 3. Mathematical model process commonly used for network fault identification.
                      
                  To describe the importance of resources in the network, the resource urgency measure
                     $e$ is introduced into the model. Represented by nodes, many links in a network pass
                     through them. Once $e$ malfunctions, it will cause widespread paralysis of the entire
                     network, greatly affecting its connectivity. Therefore, the influence of node $e$
                     also needs to be considered. $n_{i} $ represents a node. The degree in $G^{u} $ is
                     represented by $d_{i} $. $NI$ represents the degree of influence vector, belonging
                     to $n_{i} $ and its adjacent nodes. $CF$ represents a resource node that belongs to
                     a physical network. It can be used to describe the degree of segmentation, which is
                     caused by the failure of the remaining network in $n_{i} $. The adjacency matrix is
                     represented by $A(G^{u} )$. $G^{u} $ is a subset. After normalizing the node connectivity,
                     it is the degree of node connectivity. The processing formula is shown in (8).
                  
                  
                  In Formula (8), $n_{i} $ represents the connectivity of the node. The strength of link connectivity
                     can be expressed by the degree of adjacent point connectivity, as shown in Formula
                     (9).
                  
                  
                  In Formula (9), $d_{i} $ represents the specific degree value in the connection. $d_{j} $ represents
                     the connection value in connectivity. When the network is interrupted, the RSCN affected
                     can be described by saturation, as shown in Formula (10).
                  
                  
                  In Formula (10), $x$ represents the resources in the node and link. $k$ represents the number of
                     nodes. $M_{x} $ represents the assigned resource value. The degree of resource urgency
                     is shown in Formula (11).
                  
                  
                  In Formula (11), $\alpha $ represents the regulatory factor 1. $\beta $ represents regulatory factor
                     2. $\alpha +\beta =1$. $SF(x)$ represents the degree of impact caused by a malfunction.
                     The RSCN link fault-tolerant mathematical model has been constructed. While measuring
                     the construction cost, ensure that the number of RSCNs affected by resource failures
                     is minimized by reducing the occupancy rate of resources with higher urgency. After
                     the requirement decomposition of the model is completed, it is transformed into the
                     sequential solution of each requirement. In $s,t$, the determination of the connection
                     path in $G^{u} $ represents the construction of the model, represented by $V_{s,t}
                     $. The values that need to be met are shown in Formula (12).
                  
                  
                  In Formula (12), $b(c)$ represents the bandwidth value in the connecting link. $d_{e} $ represents
                     the measurement value in connectivity. To verify that the constructed attribute model
                     can perform network fault tolerance identification, the constructed mathematical model
                     is compared with random network models and scale-free network models. The results
                     are shown in Fig. 4.
                  
                  As shown in Fig. 4, the fault tolerance recognition matching rate of the random network model is 93.25%.
                     The fault-tolerant recognition matching rate of the mathematical model is 96.72%.
                     The fault tolerance recognition matching rate of the scale-free network model is 89.97%.
                     The fault-tolerant recognition matching rate of the mathematical model is significantly
                     higher than the other two models, indicating that the constructed mathematical model
                     can be used for experiments. The link recovery mechanism is used to map and migrate
                     terminal failed links. Based on the goal of minimizing adjustment costs, fault-tolerant
                     analysis of interrupt failures is implemented. The mathematical model construction
                     process for fault tolerance identification of network interruption faults is shown
                     in Fig. 5.
                  
                  
                        
                        
Fig. 4. Matching of the three models.
                      
                  
                        
                        
Fig. 5. Mathematical construction process for fault-tolerant identification of network
                           outages based on small time scales.