<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Computer Network Reliability Analysis of a Dual Ring Network: Federal University of Technology, Minna (Gidan Kwanu Campus) As a Case Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Godwill Udoh</string-name>
          <email>godwilludoh@gmail.com-mail</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Caroline Alenoghena</string-name>
          <email>carol@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bala A. Salihu</string-name>
          <email>salbala2000@hotmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Telecommunication Engineering, Federal University of Technology Minna</institution>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>220</fpage>
      <lpage>226</lpage>
      <abstract>
        <p>-In the reliability analysis of computer networks there are different approaches to tackling the task. For dual ring networks, k-terminal reliability is preferred and used in this work. A concise description of the campus network studied is given. In this work a reliability analysis of a computer network is done using K-terminal reliability measure to give an index for comparison and define network performance indicators that affect the reliability of the computer network. .In the reliability evaluation, the terminal stations/nodes are seen as to be made up of different critical components and is treated as such. Plots of reliability index against these components of the stations show very low values when priority is placed on only one node as is the case in the understudied network. Different parameters affect the reliability of the network and are evaluated in the work.</p>
      </abstract>
      <kwd-group>
        <kwd>-reliability analysis</kwd>
        <kwd>computer network</kwd>
        <kwd>reliability index</kwd>
        <kwd>network reliability</kwd>
        <kwd>k-graphs</kwd>
        <kwd>dual rings</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>INTRODUCTION</p>
      <p>Present day communication is centered on computer
networks, thus, the design of reliable computer networks is
much needed. Reliability analysis of a
computercommunication network gives “worthiness test” of the
infrastructure or relevant components that constitute the
computer network and as such, seeks to evaluate the
relevance of the computer network to its intended design
expectations.In evaluating the relevance of a computer
network, service indicators like Quality of Service (QoS)
often come into consideration. Reliability is a prominent
index in achieving high QoS performances of
telecommunications networks. Effective reliability design
also aids resource managements. Effective reliability design
technologies in developed countries employ “end-to-end
reliability” measure. In catering for factors shaping the
distribution of economic activities, progress process of
network facilities and disparity of reliability at inter-regional
level, “one-to-all” measure is employed in developing
countries</p>
      <p>Most computer network reliability problem is primarily
resolved by calculatingthe probability that some specific set
of nodes in understudied network can “talk” to one another at
a given time.</p>
      <p>Different set of algorithms are employed in reliability
analysis of computer networks. The algorithms used can be
grouped into two:</p>
    </sec>
    <sec id="sec-2">
      <title>A. Path/Cut Enumeration:</title>
      <p>This entails the listing of all the simple paths that exist
between the end nodes. This represents a complete set of
favorable non-disjoint events. Simple paths are links in the
network that connect set of nodes while prime cut sets are
links in the network which when disconnected cause the
network to fail. The simple paths are considered as sets of
favorable events while the prime cuts as set of unfavorable
events. Reliability analysis entails summing the terminal
reliabilities of these paths which is an indication that each
node communicates with a designated node. To obtain the
computer network reliability, the inclusion-exclusion
techniques of path and cuts is carried out. Boolean algebra
also offers efficient techniques that can be used to do this.</p>
    </sec>
    <sec id="sec-3">
      <title>B. Case analysis:</title>
      <p>Case analysis uses the method of graph decomposition.
This entails the creation of subsets from the pathsets, either
around a reference edge or around a number of
edges/links/paths. A reference edge is simply the node from
which the factoring is referenced. When more than one edge
is considered, graph decomposition is restricted to a
conservative policy as against an exhaustive one. Using a
conservative policy minimizes the number of disjoint events
in the analysis. Disjoint events are simple paths that are not
connected or have common node. This decomposition
simplifies the analysis and helps cancel out occurrence of
parallel links.</p>
      <p>II.</p>
      <p>REVIEW OF RELATED WORKS</p>
      <p>Most of the works reviewed evaluate the reliability of
understudied Networks by the methods of minpaths and
mincuts. A minpath is the shortest distance/path/ number of
hops between nodes needed to keep them up and
communicating while mincut is the smallest break in the
link/network that renders the link/network ineffective. An
aggregation of paths between nodes is called pathsets while
an aggregation of cuts in the network is called cutsets.</p>
      <p>As a network enlarges and nodes increase, the number of
minpaths and mincuts increase exponentially. Effective
analysis of these sets needed to keep the network up or down
via optimization methods help in estimating the reliability of
understudied networks.</p>
      <p>
        Genetic algorithm as an optimization tool was used in
evaluating the reliability of networks [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]-[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        Wei-Chang Yeh [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] in his work used Particle Swarm
Optimization and Monte Carlo Simulation in analyzing the
pathsetsinorder to evaluate the reliability
      </p>
      <p>
        Monte Carlo simulation was also employed in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] [
        <xref ref-type="bibr" rid="ref8">7</xref>
        ] [
        <xref ref-type="bibr" rid="ref9">8</xref>
        ]
to analyze the pathsets/cutsets inorder to evaluate the
reliability understudied network.
      </p>
      <p>
        Wei Hou [
        <xref ref-type="bibr" rid="ref10">9</xref>
        ] in his thesis, analyzed the reliability of
networks with software and hardware failures. He developed
models; MORIN – Modelling Reliability for Integrated
Networks and SAMOT – Simplified Availability Modeling
Tool, with which he used in analyzing the Network.
      </p>
      <p>
        Boolean reduction technique was also used in evaluating
the reliability of understudied network [
        <xref ref-type="bibr" rid="ref11">10</xref>
        ] – [
        <xref ref-type="bibr" rid="ref15">14</xref>
        ]
      </p>
      <p>
        Mathematical Analysis are also employed in the
reliability analysis of networks [
        <xref ref-type="bibr" rid="ref16">15</xref>
        ] – [
        <xref ref-type="bibr" rid="ref18">17</xref>
        ].
      </p>
      <p>An overview of works reviewed shows that little has
been done on reliability analysis of Ring topology networks
(this might be a ripple-effect from the fact that most
computer networks implement the mesh topology for its
obvious advantages).</p>
      <p>Earlier works seem to use survivability, availability,
susceptibility, connectivity and reliability interchangeably.
These mentioned parameters are distinct and a field of study
on themselves.</p>
      <p>Modern communication networks are made up of reliable
components and failed components are quickly repaired.
Multiple connections which allow for rerouting of messages
in the event of a network failure is also a common feature.
With the afore-stated in mind, it is important to take into
account the connection ports, links and state of the nodes
(this should cater for issues of power supply, equipment
malfunctioning and working environment) in the reliability
analysis of computer networks.</p>
      <p>III.</p>
      <p>MODELING THE NETWORK</p>
      <p>Models used to describe computer networks help to
define a frame in which the network could be studied. From
papers researched, the common model used for Computer
Network is the Stochastic Model.</p>
      <p>
        A stochastic network [
        <xref ref-type="bibr" rid="ref19">18</xref>
        ] describes a physical system in
which each node and/or each edge (directed or undirected)
fails statistically independently with a number representing
the non-failure probability such that failures of any network
elements do not affect another network element in same
network. With this model, the network reliability analysis
problem consists of measuring the probability given
failure/operation probabilities for edges/nodes and the link
connectivity [
        <xref ref-type="bibr" rid="ref20">19</xref>
        ].
      </p>
      <p>In the Reliability analysis of Computer Networks
(especially Ring Networks), the following assumptions are
made (depending on the number of components
understudied):
 Components are either operative or failed at any
given time. Component state is a random event, s,
independent of the state of any other component</p>
      <p>The reliability of a network component is the
probability that it is operative at any given point in
time.</p>
      <p>The Channel Capacity, C, is fixed and C » B (where
B is the provisioned Bandwidth/Capacity for the
Network).</p>
      <p>Failure of any electronic component in a station,
including the power supply, causes the station to fail
Network reliability does not include the probability
for failure of attached hosts since they are external to
the understudied communication ssubnetwork.</p>
      <p>The components used to define the node in the
understudied network are the link, port and station itself. The
station define the system health and caters for power issues
in the node. Failure/success probabilities of these component
are independent of each other but have an overall effect on
the state of the node.</p>
      <p>The port comprises the transmitter, receiver and the
inbound/outbound link used in effecting self-healing when a
fault occurs.</p>
    </sec>
    <sec id="sec-4">
      <title>A. Describing the Understudied Network</title>
      <p>The School’s campus network understudied (Federal
University of Technology, Minna; GidanKwanu campus), as
at time of research has 9 nodes (RAD ETX-1002) and 11
terminal stations (RAD ETX-201). All the nodes have a
port/Terminal station/leaf that serves the complex they are
located. The nodes (which are basically DAS –Dual
Attachment Station) form the backbone of the network. The
terminal stations or leafs on the branches are basically SAS –
Single Attachment Station. The Campus Network is a Dual
Core, full-Duplex, Bi-directional Ring Network. For the
purpose of analysis, we are considering it as a dual ring
network having 9 DAS as nodes. We implement the
KTerminal Reliability measure in evaluating the reliability of
the dual ring.</p>
    </sec>
    <sec id="sec-5">
      <title>B. K –Terminal Reliability</title>
      <p>A good index for measuring the utilization of a computer
network reflects the fact that network usually fails gradually
and that some nodes and/or links are more important than
others. The measure also should not be based on traffic
patterns. Terminal, “capacity-related”, and “travel-time
related” reliability measures are possible measures that
satisfy the stated prerequisites.</p>
      <p>Terminal Reliability is the probability that there is an
end-to-end connection between atleast two nodes in a
computer network needed to keep the network up and
running. There are basically 3 variants; K-Terminal,
2Terminal and All-Terminal Reliabilities.</p>
      <p>The common measures of reliability problems when
applied to computer networks are mainly specialized cases of
k-terminal reliability. This is defined as the probability that
a path exists which connects k terminals (nodes) within the
network.Reliability here is gotten by summing the
probabilities of disjoint success paths. The complexity of
identifying all disjoint success paths is exponential and as
such determining K -terminal reliability for a network could
be very time-consuming. Most existing researches on K–
terminal reliability speed up calculations by reducing the
computation efforts as much as possible.</p>
    </sec>
    <sec id="sec-6">
      <title>C. K – Terminal Reliability of Ring Networks</title>
      <p>A ring can be defined by a network graph; G = (V, L),
whose vertices (V) and directed edges (L) are connected in a
cycle(circuit). The vertices represent nodes and the directed
edges
represent fiber
path
from
one</p>
      <p>NAP
(Network
Attachment Port) transmitter to another
NAP receiver.</p>
      <p>Whenthe primary ring is operative, then the vertices and
edges
comprising the subgraph
of these elements are
traversed exactly once, forming an Eulerian circuit. If a link
or a station should fail on the primary link, it is eliminated
from</p>
      <p>
        G and self-healing is invoked. Consequently a new
subgraph is formed which comprises operative stations on
both the primary and secondary links. This constitute the
needed
communication among operative stations and links in a ring
network. It also provide communication among stations that
can communicate using the ring network protocol. [
        <xref ref-type="bibr" rid="ref21">20</xref>
        ]
      </p>
      <p>For K stations, at least one component is not in any other
K-MEC. Each of its K-MEC (minimal eulerian circuit) is
distinct in graph.Edges and vertices in G that are not in these
circuits are irrelevant and contribute nothing to K-terminal
reliability for this subset. The reliability of the ring network
having k nodes,   (G), then becomes the probability that a
set of K-MEC is operative. The sum of probabilities of this
set, using inclusion-exclusion to evaluate the
K-terminal
reliability of a ring network containing the set of K-MEC, Ei,
for i = 1. . . m, is given in equation 1
pr  =    −  &lt;   ∩   +  &lt; &lt;   ∩   ∩
 
+ ⋯ + −1  −1.     ∩  
∩   …  
(1)</p>
      <p>Where Ai is a MEC having i nodes and Aj has j number
of nodes.</p>
      <p>From the analysis, a K-graph is derived. A K-graph is a
circuit formation containing one or more K-MECand is a
subgraph of G. A</p>
      <p>particular K-graph can correspond to
several different circuit formations which might have many
repeated terms. Some of these have a positive coefficient
(−1) −1corresponding to an odd number k of K-MEC and
some have a negative coefficient (−1) −1corresponding to
an even number k of K-MEC in the formation. Statedcircuit
formations are odd or even formations respectively. The
combination of these positive and negative coefficients on
repeated terms cancels out some of the terms in the final
expression. The net number of noncanceled terms which is
also the net number of noncanceled K-graphs of type Hi, viz,
the
net number of noncanceled
circuit formations is
termedthe domination value    . To reduce the number of
repeated terms in the final expression we introduce the
denomination value as given in (2).</p>
      <p>Pr   =  =1    .    
(2)</p>
      <sec id="sec-6-1">
        <title>Where Ki is the K-MEC derived at i</title>
      </sec>
      <sec id="sec-6-2">
        <title>Computational complexity</title>
        <p>of the decomposition is
dependent on the number of K-graphs in the network.</p>
        <p>In order to apply this to the Ethernet ring network
topology deployed in the</p>
        <p>Campus (FUT</p>
        <p>MINNA), the
number of K-MEC in each topology is first determined. We
assume that the K stations of interest are sorted in
tokenpassing order and are renumbered with an additional index
from</p>
        <p>
          1 to K. We refer to the station pair (ij) in this
renumbered K element subset as consecutive stations if j =
(i± ) mod K. [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]
        </p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>D. K – MEC in Dual Rings</title>
      <sec id="sec-7-1">
        <title>A dual ring has two sets of K-MEC.</title>
        <p>Set #1 consists a circuit which contains all the stations
and links in the operative primary ring.</p>
        <p>Set #2 comprises other circuits that are formed by using
two consecutive stations of the K given stations;having the
self-healed end stations. Since there are K end-station pairs,
there are K</p>
        <p>K-MEC in set #2, making the total number of</p>
      </sec>
      <sec id="sec-7-2">
        <title>K-MEC in a dual ring K+ 1.</title>
        <p>Using
the
concept
of
case
analysis
(stated in
introduction); we effect graphical decomposition around a
single keystone. The keystone chosen here was the node at</p>
      </sec>
      <sec id="sec-7-3">
        <title>ITS-InfoTech Studies center.</title>
        <p>IV.</p>
        <p>COMPUTING THE K-TERMINAL RELIABILITY OF THE</p>
        <p>NETWORK
P
 
 
⨁


For K ordinary DAS and K =9</p>
      </sec>
      <sec id="sec-7-4">
        <title>Notation</title>
      </sec>
      <sec id="sec-7-5">
        <title>Station Reliability</title>
      </sec>
      <sec id="sec-7-6">
        <title>Link/ Fiber path Reliability</title>
      </sec>
      <sec id="sec-7-7">
        <title>Port Reliability</title>
      </sec>
      <sec id="sec-7-8">
        <title>Addition modulo K</title>
        <p>( ( .  ) , 0, *), j = 1... K; addresses of the K
stations of interest in a dual ring (These addresses
are sorted in token-passing order on the fault-free
ring)
  ((  .  ) ⨁1 - (  .  ) ⨁ ).mod N-station-separation
In order to determine the probability that stations   , j =
1. . . K, can communicate with each other in a dual ring, the
noncanceled K-graphs are derived and Pr {Ki} is computed.
distance.</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>A. Case l</title>
      <p>MEC.</p>
    </sec>
    <sec id="sec-9">
      <title>B. Case 2</title>
      <p>K-graph  1 results from
circuit formation  1 and
contains all DAS and links on the primary ring. This occurs
for all K in the noncanceled graphs at k=0 in the derived
k   1 =   .   .  2 (3)</p>
      <p>K-graph   results from circuit formation   , j = 2... K,
and contains all DAS and links connecting the K specific
stations in both primary and secondary ring segments with
self-healed end stations   ⨁    
 ⨁1. This is formed from
the nodes under consideration in the network.</p>
      <p>= 
 −  +1.  
2( −  ).  
2( −  +1)
(4)</p>
    </sec>
    <sec id="sec-10">
      <title>C. Case 3</title>
      <p>K-graph   + results from circuit formation 1 , j = 2...
K, and contains:
 all DAS and links connecting the K specific stations
in both primary and secondary ring segments with
self-healed stations   ⨁      ⨁1
 all DAS and primary ring</p>
      <p>1 =   .   2 −  .  2</p>
      <p>
        K –terminal Reliability of a dual ring network having N
= 9 nodes and 1 ≤   ≤ 8 is obtained by summing the
probabilities in cases 1, 2 and 3 after multiplying by the
appropriate domination coefficient gives [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]
  ( )  =    1 +  =+21(    −    1 )
      </p>
      <p>V.</p>
      <p>RESULTS</p>
      <p>Applying the above stated equation to the K-graphs for
the understudied network, we have
(5)
(6)
p,   ,   are the operative probabilities (and hence,
reliability) of the nodes, links and ports respectively.</p>
      <p>To calculate  ,        we use</p>
      <p>1 −         = 1 −  −</p>
      <p>Where  the failure rate of the component under
discussion,        is the failure probability of component
and t is the time frame used to understudy the component in
the link.</p>
      <p>The accepted probability for fiber failures in the
distribution part of the new ITU-T G.657 proposal document
(in Annex I) is around 1/100000 over 20 years per fiber per
network element.</p>
      <p>This gives         = 1/100000=0.00001</p>
      <p>
        = 1- 0.00001= 0.99999
   = 1-        
  = 1 −         = 1 −  − 
From [
        <xref ref-type="bibr" rid="ref22">21</xref>
        ] [
        <xref ref-type="bibr" rid="ref23">22</xref>
        ],
      </p>
      <p>FIT (/109 hours) = 958; hence FR = 958/ 109 = 0.958
x10−6
1 −  − 
=
Readings taken from the campus shows an average of
128 failures in 1month; (30×24) hours on the nodes. High
rate of failure here is due primarily to the erratic power
supply in the campus and the absence of working standby
power banks.</p>
      <p>This gives 30 × 24hours = 128
         = 128/ (30 × 24)</p>
      <p>P = 1 −         = 1 - 128/ (30 × 24) = 0.82222</p>
      <p>= 1 −  −  →         =  − 
1 −        
1 – 0.82222 =  − ×20×365×24</p>
      <p>
        Determining the Mean Time before Failure, MTBF,
entails summing the mean time to fail (MTTF) and the mean
time to detect and repair (MTTR) [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]
      </p>
      <p>MTBF = MTTF + MTTR
(8)</p>
      <p>For the equipment in this research (RAD SWITCHES),
the repair time (actually, negligible since there have been no
faults since their provisioning) is quite small compared to the
MTBF, so this work approximates the MTBF to be equal to
the MTTF.
With the afore-stated and considering the Time frame for
data collection, we assume the average time between power
outages to be the MTBF of the RAD Switches.</p>
      <p>MTBF = 1 ÷ (128/ (30×24)) hours</p>
      <p>= 1 ÷ 0.178 = 5.625 hours</p>
      <p>The average time taken to restore power supply to the
Station via alternate sources is around 15 minutes and supply
by the Generator set lasts about 4 hours.</p>
      <p>MTTR = 15 minutes = 15/60 = 0.25hours</p>
      <p>Unavailability of the Network, q = MTTR/MTBF =
0.25/5.625 =0.0444444</p>
      <p>MTBF ≈ MTTF= 5.625 hours</p>
      <p>Availability and unavailability are often expressed as
probabilities. For the equipment understudied (RAD
Switches and Fiber Links), all of the failure rates were based
on field data or assumptions that devices of comparable
complexity and exposure should have similar failure nodes.</p>
      <p>=     /(    +     )= 5.625 / (5.625 + 0.25)
= 0.95744681</p>
      <p>For the Optic Fiber Link, cuts/failures are usually due to
excavation or construction works on fiber path and attacks
by rodent. Data gotten from the ITS shows there have been
no fiber cut/failure since the provisioning of the facility, and
considering the layout and terrain of the campus, there is
likely to be none for the next 2years.</p>
      <p>The RAD Switches employed in the Network design
have not failed since provisioning too. Inoperability of the
devices is due primarily to challenges of erratic power
supply to the Station.</p>
      <p>The average time taken to restore power supply to the
Station via alternate sources is around 15 minutes and supply
by the Generator set lasts about 4 hours.</p>
      <p>MTTR = 15 minutes = 15/60 = 0.25hours</p>
      <p>Plot 1: The best value for reliability Index is at K = 2.
This plot shows the effect on Reliability Index when all the
variables are considered (fig 1)</p>
      <p>When we make any parameter defining the node, port
and/or link to be one, we are assuming a perfect parameter,
making its influence on the Reliability of the Network
negligible. In the computation for node reliability and overall
reliability of the network, the events are independent and as
such making any of the events to be one simply makes its
effect negligible.</p>
      <p>Plot 2: When the effects of p is made negligible, best
values for reliability index is at K = 2. This implies that if the
other parameters are considered only as variables,
considering the present network, it will be better to have
priorities placed on two nodes for optimal reliability values.
(Fig 2)</p>
      <p>Plot 3: When the effects of p and   are made negligible
on the network, reliability values peaks at K = 3. This
implies that if only the port reliability,  is considered, three
nodes are needed to be given priority for optimal network
reliability. (Fig 3)</p>
      <p>Plot 4: When the value of   – link reliability, is made
negligible, the plot peaks at K = 2 for optimal reliability.
This implies that if only the station and port reliability are
considered, it will take two nodes of priority for optimal
reliability (Fig 4).</p>
      <p>Plot 5: When        is made negligible, the plot pikes
at K = 2 and K = 5 and 6. Optimal values is at K = 5 and 6
approximating one (1). Given that the links (fiber paths) and
ports on network devices (SAS and DAS) have not had any
fault since their commissioning, it is safe to assume their
overall effect on the network reliability is negligible. This
plot (fig 5) aptly describes FUT, MINNA; Gidan Kwanu
Campus Computer Backbone Network. As such it is
imperative to have priorities placed on five or six nodes out
of the nine nodes that comprise the backbone network.
Keeping priority on only one node (ITS), as it is presently,
makes the network very unreliable.</p>
      <p>Plot 6: When   is made negligible, reliability values
peaks at K = 2 (fig 6)</p>
      <p>Plot 7: When p and  are made negligible, the lot peaks
at K = 4 (fig 7)</p>
      <p>Where        are assumed to be 1, as in the case of
the FUT MINNA, GidanKwanu campus network (fig 5), it is
observed that 5 to 6 priority nodes are needed to have
optimal network reliability when the Network reliability is
dependent, primarily, on the station reliability ( as it is with
FUT MINNA, GidanKwanu campus computer backbone
network). . It is observed from all plots that at K = 1 the
network reliability is always minimal. Often in the range of
10−4 and in some cases 10−23 (fig 7).</p>
      <p>The value of   - composite link reliability, shows that it
is the weakest and most vulnerable of the parameters in the
understudied network. Hence, adequate protection measures
are needed to maintain its workability.</p>
      <p>The value of reliability for DAS which comprises the
backbone of the understudied network shows it is very low
and that the attached hosts (consisting of SAS) are more
reliable in the network. This is as a result of epileptic power
supply ( .  2) and that the DAS are integral in the design of
the network.</p>
      <p>The Mean Time before Failures (MTBF) value of
5.645hours when compared to tens of hours for average
enterprise networks is low.</p>
      <p>The average time taken to restore the network
(0.25hours) is much given that current trend in
telecommunications is to limit the range to about 20ms.</p>
      <p>The availability of the network is good, 0.95744681
(given it is an academic environment) even though it falls
short of the “five-nines” (99.999%) property needed of most
telecommunications networks.</p>
      <p>VII. CONCLUSION AND RECOMMENDATIONS</p>
      <p>FUT Minna campus computer backbone Network was
analyzed and its reliability index was computed to be around
0.0007 using the K-Terminal Reliability measure.</p>
      <p>The following outlined recommendations are given:
 Future studies on the school’s network reliability
analysis should go further to incorporate Capacity
related and travel time measures of reliability. This
would answer questions of packet drops, effective
data throughput and transmission delays.
 To improve the network, the station reliability has to
be upgraded. For optimal network reliability, priority



should be placed on 5 or 6 nodes out of the 9 nodes
that make the network. As observed, priority placed
on only one node (as it is presently in the school’s
campus network with the node at ITS given the
highest and only priority) yields a very low
reliability for the network; 0.00076 for the school’s
network understudied.</p>
      <p>Upgrading will entail installing battery/power banks
to improve upon power supply to selected 5 or 6
nodes.</p>
      <p>Distributing the servers among these nodes will also
be needed (actually better-off) than concentrating the
servers at the ITS Node.</p>
      <p>The RAD Switches cannot implement automatic
switching in order to effect self-healing on the ring
when a cut/fault occurs. Thus, network engineers
have to physically unplug and plug back fiber links
to through-ports on the ODF (optical distribution
frame). The use of layer 3 devices, like Cisco 3550
series, can help eliminate this need and reduce
MTTR for the network. They do this by
implementing the Hot Standby Router Protocol
HSRP and Gateway Load Balancing Protocol
GLBP. HSRP provides automatic router back-up.</p>
      <p>GLBP improves on the redundancy of the system.</p>
      <p>With these devices, the school can also implement the
MPLS (Multi-protocol layer switching) technology. MPLS
delivers highly scalable, differentiated, end-to-end IP
services with simple configuration, management, and
provisioning for providers and subscribers.</p>
      <p>We have been able to perform a reliability analysis of a
real time, physical network using K –terminal reliability
measure. Since works on real networks is very limited, this
could serve as a template (especially for enterprise networks
using a ring network) or better still, serve as a reference for
future works</p>
      <sec id="sec-10-1">
        <title>VIII. ACKNOWLEDGEMENT</title>
        <p>Godwill, U., Dr. Caroline, A., and Dr. Bala, S., thank the
department of telecommunications in school ofEngineering
of the Federal university of Technology, Minna, for help
given in this research.
[23] S. Flint, “ Failure rates for fiber optic assemblies”. IIT RESEARCH</p>
        <p>INST CHICAGO IL, 1980.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.</given-names>
            <surname>Dirk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Rothlauf</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Gmilkowsky</surname>
          </string-name>
          .
          <article-title>"Designing reliable communication networks with a genetic algorithm using a repair heuristic</article-title>
          .
          <source>" European Conference on Evolutionary Computation in Combinatorial Optimization</source>
          . Springer Berlin Heidelberg,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>K.</given-names>
            <surname>Anup</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pathak</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Gupta</surname>
          </string-name>
          .
          <article-title>"Genetic-algorithm-based reliability optimization for computer network expansion."</article-title>
          <source>IEEE Transactions on reliability 44.1</source>
          (
          <year>1995</year>
          ):
          <fpage>63</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Fulya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Dengiz</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Smith.</surname>
          </string-name>
          <article-title>"Reliability optimization of computer communication networks using genetic algorithms</article-title>
          .
          <source>" Systems, Man, and Cybernetics</source>
          ,
          <year>1998</year>
          . 1998 IEEE International Conference on. Vol.
          <volume>5</volume>
          . IEEE,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>K.</given-names>
            <surname>Abdullah</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Smith</surname>
          </string-name>
          .
          <article-title>"A hybrid genetic algorithm approach for backbone design of communication networks</article-title>
          .
          <source>" Evolutionary Computation</source>
          ,
          <year>1999</year>
          . CEC 99.
          <article-title>Proceedings of the 1999 Congress on</article-title>
          . Vol.
          <volume>3</volume>
          . IEEE,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wei-Chang</surname>
          </string-name>
          .
          <article-title>"An improved sum-of-disjoint-products technique for the symbolic network reliability analysis with known minimal paths</article-title>
          .
          <source>" Reliability Engineering &amp; System Safety 92.2</source>
          (
          <year>2007</year>
          ):
          <fpage>260</fpage>
          -
          <lpage>268</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Oliver communication</surname>
          </string-name>
          (
          <year>1992</year>
          ):
          <fpage>49</fpage>
          -
          <lpage>56</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>"Terminal-pair reliability of three-type computer networks</article-title>
          .
          <source>" IEEE transactions on reliability 41.1</source>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wei-Chang</surname>
          </string-name>
          .
          <article-title>"A new Monte Carlo method for the network reliability."</article-title>
          <source>Proceedings of First International Conference on Information Technologies and Applications (ICITA2002)</source>
          .
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Suresh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kumar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E. V.</given-names>
            <surname>Prasad</surname>
          </string-name>
          .
          <article-title>"Computing terminal reliability of computer network."</article-title>
          <source>Reliability Engineering 16.2</source>
          (
          <year>1986</year>
          ):
          <fpage>109</fpage>
          -
          <lpage>119</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>H.</given-names>
            <surname>Wei</surname>
          </string-name>
          .
          <article-title>Integrated Reliability and Availability Aanalysis of Networks With Software Failures and Hardware Failures</article-title>
          . Diss. University of South Florida,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sieteng</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Rai</surname>
          </string-name>
          .
          <article-title>"CAREL: Computer aided reliability evaluator for distributed computing networks</article-title>
          .
          <source>" IEEE Transactions on Parallel and Distributed Systems 2.2</source>
          (
          <year>1991</year>
          ):
          <fpage>199</fpage>
          -
          <lpage>213</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R.</given-names>
            <surname>Suresh</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Soh</surname>
          </string-name>
          .
          <article-title>"A computer approach for reliability evaluation of telecommunication networks with heterogeneous linkcapacities</article-title>
          .
          <source>" IEEE Transactions on Reliability 40.4</source>
          (
          <year>1991</year>
          ):
          <fpage>441</fpage>
          -
          <lpage>451</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>V.</given-names>
            <surname>Malathi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Trivedi</surname>
          </string-name>
          .
          <article-title>"An improved algorithm for symbolic reliability analysis</article-title>
          .
          <source>" IEEE Transactions on Reliability 40.3</source>
          (
          <year>1991</year>
          ):
          <fpage>347</fpage>
          -
          <lpage>358</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>K.</given-names>
            <surname>Sy-Yen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Yeh</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Lin</surname>
          </string-name>
          .
          <article-title>"Efficient and exact reliability evaluation for networks with imperfect vertices</article-title>
          .
          <source>" IEEE Transactions on Reliability 56.2</source>
          (
          <year>2007</year>
          ):
          <fpage>288</fpage>
          -
          <lpage>300</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>B.</given-names>
            <surname>Octavian</surname>
          </string-name>
          .
          <article-title>An Enhanced Approach to Network Reliability Using Boolean Algebra</article-title>
          . Diss. Lafayette College,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O.C.</given-names>
            <surname>Ibe</surname>
          </string-name>
          ,
          <article-title>"Reliability comparison of token-ring network schemes."</article-title>
          <source>IEEE transactions on reliability 41.2</source>
          (
          <year>1992</year>
          ):
          <fpage>288</fpage>
          -
          <lpage>293</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.</given-names>
            <surname>Satyanarayana</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Chang</surname>
          </string-name>
          .
          <article-title>"Network reliability and the factoring theorem</article-title>
          .
          <source>" Networks 13.1</source>
          (
          <year>1983</year>
          ):
          <fpage>107</fpage>
          -
          <lpage>120</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>G.</given-names>
            <surname>Giancarlo</surname>
          </string-name>
          .
          <article-title>"Reliability evaluation of Common-Cause failures and other interdependencies in large reconfigurable networks</article-title>
          .
          <source>"</source>
          (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>L.</given-names>
            <surname>Yi-Kuei</surname>
          </string-name>
          .
          <article-title>"Reliability of a stochastic-flow network with unreliable branches &amp; nodes, under budget constraints</article-title>
          .
          <source>" IEEE Transactions on Reliability 53.3</source>
          (
          <year>2004</year>
          ):
          <fpage>381</fpage>
          -
          <lpage>387</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S.</given-names>
            <surname>Akhilesh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Liudong</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Liu</surname>
          </string-name>
          .
          <article-title>"Modeling and evaluating the reliability of wireless sensor networks." 2007 Annual Reliability and Maintainability Symposium</article-title>
          . IEEE,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Jiahnsheng</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C. B.</given-names>
            <surname>Shin</surname>
          </string-name>
          .
          <article-title>"K-terminal reliability in ring networks</article-title>
          .
          <source>" IEEE Transactions on Reliability 43.3</source>
          (
          <year>1994</year>
          ):
          <fpage>389</fpage>
          -
          <lpage>401</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Reliability</surname>
            <given-names>Data</given-names>
          </string-name>
          ,
          <article-title>Agilent technologies</article-title>
          ,
          <source>Inc</source>
          .
          <year>1999</year>
          ,
          <fpage>5968</fpage>
          -
          <lpage>6620E</lpage>
          (
          <issue>11</issue>
          /99),www.semiconductor.agilent.com
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>C.</given-names>
            <surname>Nathan</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Passauer</surname>
          </string-name>
          .
          <article-title>Impact of Fiber Optics on System Reliability and Maintainability</article-title>
          .
          <string-name>
            <surname>VITRO CORP SILVER SPRING</surname>
            <given-names>MD</given-names>
          </string-name>
          ,
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>P.</given-names>
            <surname>Chinmayananda</surname>
          </string-name>
          ,
          <article-title>"Node Reliability in WDM Optical Network</article-title>
          .
          <source>"</source>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>