<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Review of Computer Network Reliability</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Godwill Udoh</string-name>
          <email>godwilludoh@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Caroline Alenoghena</string-name>
          <email>carol@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bala A. Salihu</string-name>
          <email>salbala2000@hotmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Telecommunications Engineering, Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>198</fpage>
      <lpage>202</lpage>
      <abstract>
        <p>-Network reliability, as a field, is focused on questions of topological disconnection between data nodes. Computer network reliability problem is primarily resolved by calculating the probability that specific set of nodes in understudied network can speak with each other at a given time. Network reliability analysis cuts across the design, deployment and testing of computer networks. Review reveal two major approaches to reliability analysis of computer network these are Path/cute numeration and Case analysis which utilizes the concept of graph decomposition. The measures of computer network reliability analysis include issues on connectivity, capacity and travel time. The different parameters used in defining the reliability of computercommunication system include; Failure Rate, Mean Time To Repair, Mean Time Between Failures, Mean Time To Failure and Availability.</p>
      </abstract>
      <kwd-group>
        <kwd>-reliability analysis</kwd>
        <kwd>computer network</kwd>
        <kwd>reliability index</kwd>
        <kwd>network reliability</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>INTRODUCTION</p>
      <p>Effective communications is critical in determining the
economic, social, innovative and military prowess of
modern day society; this is hinged on the fact that effective
communications is a key stone in all human activities. This
communication is majorly effected by data nodes. A data
node could be a mobile phone, information centers,
encrypting and decrypting machines which have evolved
into what we call computers in today‟s world. Thus, the
design and deployment of reliable data nodes has been given
a high priority and this has enhanced the study of Computer
Network reliability analysis as a field on its own. Network
reliability is concerned with the topological disconnection
between data nodes. Computer network reliability problem
is primarily resolved by calculating the probability that
specific set of nodes in understudied network can speak
with each other at a given time. Network reliability analysis
cuts across the design, deployment and testing of computer
networks.</p>
      <p>As communication is now centered on computer
networks, the design of reliable computer networks is much
needed. Reliability analysis of a computer-communication
network gives “worthiness test” of the infrastructure or
relevant components that constitute the computer network
and as such, seeks to evaluate the relevance of the computer
network to its intended design expectations.</p>
      <p>There have been efforts by researchers using various
approaches in determining the reliability of a computer
network and as such are view to classify the approaches and
define most suitable method of analyzing understudied
Computer network is needed.</p>
      <p>In this paper a review of computer network reliability
analysis is carried out and presented in five subheadings.</p>
      <p>Section 2 gives the different approaches to reliability
analysis of computer networks, section 3 give an overview
of related works, section 4 describe the model used, section
5 describes the measures of reliability analysis, section 6
gives a description of different parameters that can affect
network reliability, section 7 gives the evaluation of the
reliability index and conclusion is presented in section 8.</p>
      <p>II.</p>
      <p>DIFFERENT APPROACHES TO RELIABILITY ANALYSIS</p>
      <p>OF COMPUTER NETWORKS</p>
      <p>
        Network Reliability defines the probability that an
understudied Network can perform its stated function to an
acceptable level of performance for some given period of
time [1]. Any specific measure of reliability, thus, depends
on the nature of the desired function and what levels of
performance are acceptable. Earliest works on Network
reliability was around 1950, with connectivity of networks
been used as there liability index [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>Different set of algorithms are employed in reliability
analysis of computer networks. The algorithms used can be
grouped into two:</p>
    </sec>
    <sec id="sec-2">
      <title>A. Path/Cut Enumeration:</title>
      <p>
        This entails the listing of all the simple paths between
end nodes. These represent a complete set of favorable
(unfavorable) non-disjoint events. Simple paths are links
in the network that connect set of nodes while prime cut sets
are links in the network which when disconnected cause the
network to fail. The simple paths are considered assets of
favorable events while the prime cuts as set of unfavorable
events. Reliability analysis entails summing the terminal
reliabilities of these paths which is an indication that each
node communicates with a designated node. To obtain the
computer network reliability, the inclusion-exclusion
techniques of path and cuts is carried out. More efficient
techniques based on Boolean algebra, can be utilized [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]–
[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>B. Case analysis:</title>
      <p>Case analysis uses the method of graph decomposition.
This entails the creation of subsets from the path sets, either
around a reference edge or around a number of
edges/links/paths. A reference edge is simply the node from
which the factoring is anchored. When more than one edge
is considered, graph decomposition is restricted to a
conservative policy as against an exhaustive one. Using a
conservative policy minimizes the number of disjoint events
in the analysis. Disjoint events are simple paths that are not
connected or have common node. This decomposition
simplifies the analysis and helps cancel out occurrence of
parallel links.</p>
      <p>III.</p>
      <p>OVERVIEW OF RELATED WORKS</p>
      <p>Most of the works reviewed evaluate the reliability of
understudied Networks by the methods of minpaths and
mincuts. A minpath is the shortest distance/path/ number of
hops between nodes needed to keep them up and
communicating while mincut is the smallest break in the
link/network that renders the link/network ineffective. An
aggregation of paths between nodes is called pathsets while
an aggregation of cuts in the network is called cutsets.</p>
      <p>As a network enlarges and nodes increase, the number of
minpaths and mincuts increase exponentially. Effective
analysis of these sets needed to keep the network up or down
via optimization methods help in estimating the reliability of
understudied networks.</p>
      <p>
        Genetic algorithm as an optimization tool was used in
evaluating the reliability of networks [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]-[11].
      </p>
      <p>Wei-Chang Yeh [12] in his work used Particle Swarm
Optimization and Monte Carlo Simulation in analyzing the
pathsets in order to evaluate the reliability</p>
      <p>Monte Carlo simulation was also employed in [13] [14]
to analyze the pathsets/cutsets in order to evaluate the
reliability understudied network.</p>
      <p>Wei Hou [15] in his thesis, analyzed the reliability of
networks with software and hardware failures. He developed
models; MORIN – Modelling Reliability for Integrated
Networks and SAMOT – Simplified Availability Modeling
Tool, with which he used in analyzing the Network.</p>
      <p>Boolean reduction technique was also used in evaluating
the reliability of understudied network [16] – [21]</p>
      <p>Mathematical Analysis are also employed in the
reliability analysis of networks [22] – [23].</p>
      <p>An overview of works reviewed shows that little have
been done on reliability analysis of Ring topology networks
(this might be a ripple-effect from the fact that most
computer networks implement the mesh topology for its
obvious advantages).</p>
      <p>Earlier works seem to use survivability, availability,
susceptibility, connectivity and reliability interchangeably.
These mentioned parameters are distinct and a field of study
on themselves.</p>
      <p>Modern communication networks are made up of reliable
components and failed components are quickly repaired.
Multiple connections which allow for rerouting of traffic
when network failure occurs is also a common feature. With
the afore-stated in mind, it is important to take into account
the connection ports, links and state of the nodes (this should
cater for issues of power supply, equipment malfunctioning
and working environment) in the reliability analysis of
computer networks</p>
      <p>It is important to note that Failures in computer networks
cannot be completely eliminated and, hence, reliability can
never be 100 percent. In order to reduce their negative
impact on end-to-end connectivity, redundancy techniques
are implemented on network routing so as to ensure a proper
alternate (backup) path is available upon failure of the
primary working path.</p>
      <p>Performances of networks can be measured by
comparing with the reliability index. The reliability index
represents the probability that a network operates. The
performance of a design can be studied by changing the
topology of the network. This is achieved by adding,
removing or replacing some components so as to augment
the reliability or for satisfying certain specifications.</p>
      <p>IV.</p>
      <p>MODELS USED IN COMPUTER NETWORK RELIABILITY
Models used to describe computer networks help to
define a frame in which the network could be studied. From
papers researched, the common model used for Computer
Network is the Stochastic Model.</p>
      <p>A stochastic network [24] describes a physical system in
which each node and/or each edge (directed or undirected)
can fail independently and failure one element does not
affect another network element. A number representing the
non-failure probability is assigned to the element. With this
model, the network reliability analysis problem is solely
calculating the probabilities of failure/operation for the edges
and/or nodes needed to establish link connectivity [25].</p>
      <p>
        In the Reliability analysis of Computer Networks
(especially Ring Networks) [
        <xref ref-type="bibr" rid="ref12">37</xref>
        ], the following assumptions
are made (depending on the number of components
understudied):
 Components are either operational or failed at any
given time and Component state is a random event,
s, independent of any other.
 The reliability of a network component is the
probability that it is operational at a given time.
 The Channel Capacity, C, is fixed and C » B (where
B is the provisioned Bandwidth/Capacity for the
Network).
 Failure of any electronic component in a station,
including the power supply, causes the station to fail
 Network reliability does not include the probability
for failure of attached hosts since they are external to
the understudied communications subnetwork.
      </p>
      <p>The components used to define the node in the
understudied network are the link, port and station itself. The
station define the system health and caters for power issues
in the node. Failure/success probabilities of these component
are independent of each other but have an overall effect on
the state of the node.</p>
      <p>The port comprises the transmitter, receiver and the
inbound/outbound link used in effecting self-healing when a
fault occurs.
2)
3)
[32].
network reflects that a network fails gradually and that some
nodes (links) are more important than others. The stated
index is not also based on traffic patterns. Measures with the
above requirements include; terminal, “capacity-related”,
and “travel-time related” reliability measures.</p>
    </sec>
    <sec id="sec-4">
      <title>A. Terminal Reliability</title>
      <p>
        Terminal Reliability is the probability that there exists an
end-to-end connection between two or more nodes in a
computer network needed to keep the network up and
running [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. There are basically
3variants;K-Terminal,2
      </p>
      <sec id="sec-4-1">
        <title>Terminal and All-Terminal Reliabilities.</title>
        <p>(nodes) within the network [26] -[28].This reliability is the
sum of the probabilities of disjoint success paths [29].</p>
        <p>Two Terminal Reliability: This is the probability that
a path exists between end pair of nodes in the network
[30]</p>
        <p>All Terminal Reliability: This is the probability that
the nodes in a network are communicating with each other
[33][34]. Two terminal and all- terminal reliability are
modifications on the K- Terminal measure where K=2 and
K=n (n is the number of nodes in the network), respectively.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>B. Capacity-Related Network Reliability</title>
      <p>This field is an extension or specialization of the
research in computer network reliability. It is acknowledge
that not all links (edges)</p>
      <p>
        may have the same capacity
(weight, bandwidth). Further, it is also considered that the
capacity demanded of the network is variable.
CapacityRelated computer network reliability defines the network
reliability in terms of the bandwidth (variable or fixed)
needed to establish efficient data-throughput between nodes
[35] [
        <xref ref-type="bibr" rid="ref11">36</xref>
        ]. It places a bench mark requirement (bandwidth)
needed for connectivity between node shaving fixed or
variable link capacities. It is used when the data requirement
is same
or
      </p>
      <p>more than the channel bandwidth and/or
subscribed bandwidth.</p>
    </sec>
    <sec id="sec-6">
      <title>C. Travel Time Network Reliability</title>
      <p>This basically defines the time taken for data to travel
between link ends or nodes. It also describes the time taken
for a hand shake to occur between specific nodes in a
network and uses this as an index to measure reliability
VI.</p>
      <p>COMPUTER NETWORK RELIABILITY PERFORMANCE</p>
      <p>PARAMETERS</p>
      <p>
        Network reliability cannot be fully defined without
taking
into
consideration
some
parameters that affect
computer network performance. Different parameters that
affect network reliability of a computer-communication
system are described below [
        <xref ref-type="bibr" rid="ref12">37</xref>
        ]. They include failure rate,
Meantime to repair, mean time between failures, mean time
to failure and availability.
      </p>
      <sec id="sec-6-1">
        <title>Computationally we have;</title>
        <p>(3)
(‘T’ is the number of hours)</p>
        <p>For multiple components;
(„n‟ is the number of components in the system)
 ( ) =

 =1   ( )
for
(1)
(2)
(4)
(5)
(6)






</p>
      </sec>
      <sec id="sec-6-2">
        <title>Failure</title>
      </sec>
      <sec id="sec-6-3">
        <title>Rate (FR) is the number of failures</title>
        <p>experienced or expected for a device divided by the
total equipment operating time.</p>
        <p>Mean Time to Repair (MTTR) is the total time taken
to effect corrective maintenances divided by the total
number of these repairs.</p>
        <p>Mean Time between Failures (MTBF) is the mean
time expected between failures, measured in hours.
For constant failure rate systems, MTBF is the
inverse of the Failure Rate.</p>
      </sec>
      <sec id="sec-6-4">
        <title>Equation</title>
      </sec>
      <sec id="sec-6-5">
        <title>1givesthemathematical</title>
        <p>formula
evaluating MTBF
Mean Time to Failure (MTTF) is the mean time
expected
before the first failure
of a piece of
equipment. It is meant to be the mean over a long
period of time and a large number of units.
Availability (A) is the probability of a system to
being operational when called upon to perform its
function. Availability and unavailability (1-A) are
often expressed as probabilities.</p>
      </sec>
      <sec id="sec-6-6">
        <title>Equation 2 gives the mathematical formula for determining the availability of the network.</title>
        <p>VII. EVALUATION OF COMPUTER NETWORK RELIABILITY</p>
        <p>INDEX</p>
        <p>Reliability analysis of a computer network invariably
leads to evaluating a reliability index for the network. This
is implied sincere liability, like availability, is expressed as
probabilities. A reliability index defines a scale on which the
reliability of a computer network can be measured. This
scale ranges from 0–1. A value of zero implies a failed
network while one means an “excellent” reliable network.
The computer network reliability performance parameters
described above are used in the evaluation of Reliability (R)
index of the network.
The reliability of a computer network is invariably a sum
of the probabilities of the individual components of the
communications aspect of the Computer communication
network understudied (Equation 6).</p>
      </sec>
      <sec id="sec-6-7">
        <title>VIII. CONCLUSION</title>
        <p>The objective of a typical computer network reliability
analysis is to obtain an index against which the reliability of
the understudied network can be measured. Though a
review of computer network reliability has been carried out
in this paper, further work is been done on implementing the
above stated discourse on an existing computer network.
The intent of this is to observe and document (if any)
variations from the review, give recommendations for future
expansion and deployment of network facilities and evaluate
the reliability of the understudied network.</p>
        <p>This analysis can be carried out for a proposed network
and an existing network. This is to ensure better choices of
network components, network topology deployment and
flexibility in expansion and upgrading of network. The
Reliability analysis of Computer Networks forms a
veritable tool in defining the worth of a network to its
intended design expectations and as such seeks to give a
measure for user satisfaction. It invariably forms an
mportant criteria to enhancing Quality of Service– QoS.</p>
      </sec>
      <sec id="sec-6-8">
        <title>ACKNOWLEDGMENT</title>
        <p>Mr. Godwill, U., Dr. Caroline, A., and Dr. Bala, S., thank
the Department of Telecommunications in School of
Engineering of the Federal University of Technology,
Minna for help given in this research work.
[11] Y. Wei-Chang. "An improved sum-of-disjoint-products technique for
the symbolic network reliability analysis with known minimal
paths." Reliability Engineering &amp; System Safety 92.2 (2007):
260268.
[12] W.Oliver "Terminal-pair reliability of three-type computer
communication networks." IEEE transactions on reliability 41.1
(1992): 49-56.
[13] Niederreiter, Harald. Quasi‐Monte Carlo Methods. John Wiley &amp;</p>
        <p>Sons, Ltd, 2010.
[14] H. Wei. Integrated Reliability and Availability Aanalysis of Networks
With Software Failures and Hardware Failures. Diss. University of
South Florida, 2003.
[15] R. Suresh, A. Kumar, and E. V. Prasad. "Computing terminal
reliability of computer network." Reliability Engineering 16.2 (1986):
109-119.
[16] S. Sieteng, and S. Rai. "CAREL: Computer aided reliability evaluator
for distributed computing networks." IEEE Transactions on Parallel
and Distributed Systems 2.2 (1991): 199-213.
[17] R. Suresh, and S. Sieteng "A computer approach for reliability
evaluation of telecommunication networks with heterogeneous
linkcapacities." IEEE Transactions on Reliability 40.4 (1991): 441-451.
[18] V. Malathi, and S. Trivedi. "An improved algorithm for symbolic
reliability analysis." IEEE Transactions on Reliability 40.3 (1991):
347-358.
[19] K. Sy-Yen, F. Yeh, and H. Lin. "Efficient and exact reliability
evaluation for networks with imperfect vertices." IEEE Transactions
on Reliability 56.2 (2007): 288-300.
[20] B. Octavian. An Enhanced Approach to Network Reliability Using</p>
        <p>Boolean Algebra. Diss. Lafayette College, 2003.
[21] O.C.Ibe, "Reliability comparison of token-ring network
schemes." IEEE transactions on reliability 41.2 (1992): 288-293.
[22] A. Satyanarayana and M. Chang. "Network reliability and the
factoring theorem." Networks 13.1 (1983): 107-120.
[23] G. Giancarlo. "Reliability evaluation of Common-Cause failures and
other interdependencies in large reconfigurable networks." (2010).
[24] G. Anna"A survey of statistical network models." Foundations and</p>
        <p>Trends® in Machine Learning 2.2 (2010): 129-233.
[25] H.Gary, C. Lucet, and N. Limnios. "K-terminal network reliability
measures with binary decision diagrams." IEEE Transactions on
Reliability 56.3 (2007): 506-515.
[26] Y. Jiahnsheng, and C. B. Shin. "K-terminal reliability in ring
networks." IEEE Transactions on Reliability 43.3 (1994): 389-401.
[27] S. Appajosyula, and R. Kevin Wood. "A linear-time algorithm for
computing K-terminal reliability in series-parallel networks." SIAM
Journal on Computing 14.4 (1985): 818-832.
[28] R. Suresh, A. Kumar and E. V. Prasad. "Computing terminal
reliability of computer network." Reliability Engineering 16.2 (1986):
109-119.
[29] J. Buzacott "A recursive algorithm for finding reliability measures
related to the connection of nodes in a graph." Networks 10.4 (1980):
311-327.</p>
        <p>"Terminal-pair reliability of three-type computer</p>
        <p>networks." IEEE transactions on reliability 41.1
[30] Y. Oliver
communication
(1992): 49-56.
[31] D. Torrieri. "Calculation of node-pair reliability in large networks
with unreliable nodes." Microelectronics Reliability 3.36 (1996): 446.
[32] C. Héctor, G. Rubino, and M. Urquhart. "An algorithm to compute
the all-terminal reliability measure." OPSEARCH-NEW
DELHI38.6/1 (2002): 567-579.
[33] D. Berna, F. Altiparmak, and A. Smith. "Genetic algorithm design of
networks considering all-terminal reliability." Proceedings of the 6th
Industrial Engineering Research Conference. 1997.
[34] S. Ahuja, "Performance based reliability Optimization for computer
networks." Southeastcon'97. Engineering new New Century.,
Proceedings. IEEE. IEEE, 1997.
[35] L. Yi-Kuei. "Reliability of a stochastic-flow network with unreliable
branches &amp; nodes, under budget constraints." IEEE Transactions on
Reliability 53.3 (2004): 381-387.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Beccuti</surname>
          </string-name>
          .
          <article-title>"A new symbolic approach for network reliability analysis</article-title>
          .
          <source>" IEEE/IFIP International Conference on Dependable Systems and Networks (DSN</source>
          <year>2012</year>
          ). IEEE,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C.</given-names>
            <surname>Cassir</surname>
          </string-name>
          ,and
          <string-name>
            <given-names>M.</given-names>
            <surname>Bell</surname>
          </string-name>
          .
          <article-title>"Reliability of Transport Networks. Chapter 7</article-title>
          .
          <string-name>
            <surname>The N+ M Person Game Approach To Network Variability</surname>
          </string-name>
          .
          <article-title>" Publication of: RESEARCH STUDIES PRESS LTD (</article-title>
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Giaoutzi</surname>
          </string-name>
          , Maria, and P. Nijkamp, eds.
          <article-title>Network strategies in Europe: Developing the future for transport and ICT</article-title>
          . Ashgate Publishing, Ltd.,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wei-Chang</surname>
          </string-name>
          .
          <article-title>"A new Monte Carlo method for the network reliability."</article-title>
          <source>Proceedings of First International Conference on Information Technologies and Applications (ICITA2002)</source>
          .
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>J. Wilson "</surname>
          </string-name>
          <article-title>An improved minimizing algorithm for sum of disjoint products [reliability theory]</article-title>
          .
          <source>" IEEE Transactions on Reliability 39.1</source>
          (
          <year>1990</year>
          ):
          <fpage>42</fpage>
          -
          <lpage>45</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Soh</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Rai</surname>
          </string-name>
          .
          <article-title>"Experimental results on preprocessing of path/cut terms in sim of disjoint products technique</article-title>
          .
          <source>" IEEE transactions on reliability 42.1</source>
          (
          <year>1993</year>
          ):
          <fpage>24</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K.</given-names>
            <surname>Aggarwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Chopra</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J. S.</given-names>
            <surname>Bajwa</surname>
          </string-name>
          .
          <article-title>"Modification of cutsets for reliability evaluation of communication systems</article-title>
          .
          <source>" Microelectronics Reliability 22.3</source>
          (
          <year>1982</year>
          ):
          <fpage>337</fpage>
          -
          <lpage>340</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Dirk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Rothlauf</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Gmilkowsky</surname>
          </string-name>
          .
          <article-title>"Designing reliable communication networks with a genetic algorithm using a repair heuristic</article-title>
          .
          <source>" European Conference on Evolutionary Computation in Combinatorial Optimization</source>
          . Springer Berlin Heidelberg,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Fulya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Dengiz</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Smith.</surname>
          </string-name>
          <article-title>"Reliability optimization of computer communication networks using genetic algorithms</article-title>
          .
          <source>" Systems, Man, and Cybernetics</source>
          ,
          <year>1998</year>
          . 1998 IEEE International Conference on. Vol.
          <volume>5</volume>
          . IEEE,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>K.</given-names>
            <surname>Abdullah</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Smith</surname>
          </string-name>
          .
          <article-title>"A hybrid genetic algorithm approach for backbone design of communication networks</article-title>
          .
          <source>" Evolutionary Computation</source>
          ,
          <year>1999</year>
          . CEC 99.
          <article-title>Proceedings of the 1999 Congress on</article-title>
          . Vol.
          <volume>3</volume>
          . IEEE,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>R.</given-names>
            <surname>Suresh</surname>
          </string-name>
          , and
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>Sieteng "A computer approach for reliability evaluation of telecommunication networks with heterogeneous linkcapacities</article-title>
          .
          <source>" IEEE Transactions on Reliability 40.4</source>
          (
          <year>1991</year>
          ):
          <fpage>441</fpage>
          -
          <lpage>451</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>P.</given-names>
            <surname>Chinmayananda</surname>
          </string-name>
          <article-title>"Node Reliability in WDM Optical Network</article-title>
          .
          <source>"</source>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>