<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Computer Network Reliability Analysis of a Dual Ring Network: Federal University of Technology, Minna (Gidan Kwanu Campus) As a Case Study</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
				<date>November 28 -30, 2016</date>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Godwill</forename><surname>Udoh</surname></persName>
							<email>godwilludoh@gmail.com-mail</email>
						</author>
						<author>
							<persName><forename type="first">Caroline</forename><surname>Alenoghena</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Bala</forename><forename type="middle">A</forename><surname>Salihu</surname></persName>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="institution">Federal University of Technology</orgName>
								<address>
									<settlement>Minna</settlement>
									<country key="NG">Nigeria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="department">Department of Telecommunication Engineering</orgName>
								<orgName type="institution">Federal University of Technology Minna</orgName>
								<address>
									<country key="NG">Nigeria</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Computer Network Reliability Analysis of a Dual Ring Network: Federal University of Technology, Minna (Gidan Kwanu Campus) As a Case Study</title>
					</analytic>
					<monogr>
						<imprint>
							<date type="published">November 28 -30, 2016</date>
						</imprint>
					</monogr>
					<idno type="MD5">2589B8F86AE24B6B48104A4A774B0B2B</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T04:12+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>reliability analysis</term>
					<term>computer network</term>
					<term>reliability index</term>
					<term>network reliability</term>
					<term>k-graphs</term>
					<term>dual rings</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In the reliability analysis of computer networks there are different approaches to tackling the task. For dual ring networks, k-terminal reliability is preferred and used in this work. A concise description of the campus network studied is given. In this work a reliability analysis of a computer network is done using K-terminal reliability measure to give an index for comparison and define network performance indicators that affect the reliability of the computer network. .In the reliability evaluation, the terminal stations/nodes are seen as to be made up of different critical components and is treated as such. Plots of reliability index against these components of the stations show very low values when priority is placed on only one node as is the case in the understudied network. Different parameters affect the reliability of the network and are evaluated in the work.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>INTRODUCTION</head><p>Present day communication is centered on computer networks, thus, the design of reliable computer networks is much needed. Reliability analysis of a computercommunication network gives "worthiness test" of the infrastructure or relevant components that constitute the computer network and as such, seeks to evaluate the relevance of the computer network to its intended design expectations.In evaluating the relevance of a computer network, service indicators like Quality of Service (QoS) often come into consideration. Reliability is a prominent index in achieving high QoS performances of telecommunications networks. Effective reliability design also aids resource managements. Effective reliability design technologies in developed countries employ "end-to-end reliability" measure. In catering for factors shaping the distribution of economic activities, progress process of network facilities and disparity of reliability at inter-regional level, "one-to-all" measure is employed in developing countries Most computer network reliability problem is primarily resolved by calculatingthe probability that some specific set of nodes in understudied network can "talk" to one another at a given time.</p><p>Different set of algorithms are employed in reliability analysis of computer networks. The algorithms used can be grouped into two:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Path/Cut Enumeration:</head><p>This entails the listing of all the simple paths that exist between the end nodes. This represents a complete set of favorable non-disjoint events. Simple paths are links in the network that connect set of nodes while prime cut sets are links in the network which when disconnected cause the network to fail. The simple paths are considered as sets of favorable events while the prime cuts as set of unfavorable events. Reliability analysis entails summing the terminal reliabilities of these paths which is an indication that each node communicates with a designated node. To obtain the computer network reliability, the inclusion-exclusion techniques of path and cuts is carried out. Boolean algebra also offers efficient techniques that can be used to do this.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Case analysis:</head><p>Case analysis uses the method of graph decomposition. This entails the creation of subsets from the pathsets, either around a reference edge or around a number of edges/links/paths. A reference edge is simply the node from which the factoring is referenced. When more than one edge is considered, graph decomposition is restricted to a conservative policy as against an exhaustive one. Using a conservative policy minimizes the number of disjoint events in the analysis. Disjoint events are simple paths that are not connected or have common node. This decomposition simplifies the analysis and helps cancel out occurrence of parallel links.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>II. REVIEW OF RELATED WORKS</head><p>Most of the works reviewed evaluate the reliability of understudied Networks by the methods of minpaths and mincuts. A minpath is the shortest distance/path/ number of hops between nodes needed to keep them up and communicating while mincut is the smallest break in the link/network that renders the link/network ineffective. An aggregation of paths between nodes is called pathsets while an aggregation of cuts in the network is called cutsets.</p><p>As a network enlarges and nodes increase, the number of minpaths and mincuts increase exponentially. Effective analysis of these sets needed to keep the network up or down via optimization methods help in estimating the reliability of understudied networks.</p><p>Genetic algorithm as an optimization tool was used in evaluating the reliability of networks <ref type="bibr" target="#b0">[1]</ref>- <ref type="bibr">[3] [4]</ref>.</p><p>Wei-Chang Yeh <ref type="bibr" target="#b4">[5]</ref> in his work used Particle Swarm Optimization and Monte Carlo Simulation in analyzing the pathsetsinorder to evaluate the reliability Monte Carlo simulation was also employed in <ref type="bibr" target="#b5">[6]</ref> [7] <ref type="bibr" target="#b7">[8]</ref> to analyze the pathsets/cutsets inorder to evaluate the reliability understudied network.</p><p>Wei Hou <ref type="bibr" target="#b8">[9]</ref> in his thesis, analyzed the reliability of networks with software and hardware failures. He developed models; MORIN -Modelling Reliability for Integrated Networks and SAMOT -Simplified Availability Modeling Tool, with which he used in analyzing the Network.</p><p>Boolean reduction technique was also used in evaluating the reliability of understudied network <ref type="bibr" target="#b9">[10]</ref> - <ref type="bibr" target="#b13">[14]</ref> Mathematical Analysis are also employed in the reliability analysis of networks <ref type="bibr" target="#b14">[15]</ref> - <ref type="bibr" target="#b16">[17]</ref>.</p><p>An overview of works reviewed shows that little has been done on reliability analysis of Ring topology networks (this might be a ripple-effect from the fact that most computer networks implement the mesh topology for its obvious advantages).</p><p>Earlier works seem to use survivability, availability, susceptibility, connectivity and reliability interchangeably. These mentioned parameters are distinct and a field of study on themselves.</p><p>Modern communication networks are made up of reliable components and failed components are quickly repaired. Multiple connections which allow for rerouting of messages in the event of a network failure is also a common feature. With the afore-stated in mind, it is important to take into account the connection ports, links and state of the nodes (this should cater for issues of power supply, equipment malfunctioning and working environment) in the reliability analysis of computer networks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>III. MODELING THE NETWORK</head><p>Models used to describe computer networks help to define a frame in which the network could be studied. From papers researched, the common model used for Computer Network is the Stochastic Model.</p><p>A stochastic network <ref type="bibr" target="#b17">[18]</ref> describes a physical system in which each node and/or each edge (directed or undirected) fails statistically independently with a number representing the non-failure probability such that failures of any network elements do not affect another network element in same network. With this model, the network reliability analysis problem consists of measuring the probability given failure/operation probabilities for edges/nodes and the link connectivity <ref type="bibr" target="#b18">[19]</ref>.</p><p>In the Reliability analysis of Computer Networks (especially Ring Networks), the following assumptions are made (depending on the number of components understudied):</p><p> Components are either operative or failed at any given time. Component state is a random event, s, independent of the state of any other component  The reliability of a network component is the probability that it is operative at any given point in time.  The Channel Capacity, C, is fixed and C » B (where B is the provisioned Bandwidth/Capacity for the Network).  Failure of any electronic component in a station, including the power supply, causes the station to fail  Network reliability does not include the probability for failure of attached hosts since they are external to the understudied communication ssubnetwork.</p><p>The components used to define the node in the understudied network are the link, port and station itself. The station define the system health and caters for power issues in the node. Failure/success probabilities of these component are independent of each other but have an overall effect on the state of the node.</p><p>The port comprises the transmitter, receiver and the inbound/outbound link used in effecting self-healing when a fault occurs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Describing the Understudied Network</head><p>The School's campus network understudied (Federal University of Technology, Minna; GidanKwanu campus), as at time of research has 9 nodes (RAD ETX-1002) and 11 terminal stations (RAD ETX-201). All the nodes have a port/Terminal station/leaf that serves the complex they are located. The nodes (which are basically DAS -Dual Attachment Station) form the backbone of the network. The terminal stations or leafs on the branches are basically SAS -Single Attachment Station. The Campus Network is a Dual Core, full-Duplex, Bi-directional Ring Network. For the purpose of analysis, we are considering it as a dual ring network having 9 DAS as nodes. We implement the K-Terminal Reliability measure in evaluating the reliability of the dual ring.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. K -Terminal Reliability</head><p>A good index for measuring the utilization of a computer network reflects the fact that network usually fails gradually and that some nodes and/or links are more important than others. The measure also should not be based on traffic patterns. Terminal, "capacity-related", and "travel-time related" reliability measures are possible measures that satisfy the stated prerequisites.</p><p>Terminal Reliability is the probability that there is an end-to-end connection between atleast two nodes in a computer network needed to keep the network up and running. There are basically 3 variants; K-Terminal, 2-Terminal and All-Terminal Reliabilities.</p><p>The common measures of reliability problems when applied to computer networks are mainly specialized cases of k-terminal reliability. This is defined as the probability that a path exists which connects k terminals (nodes) within the network.Reliability here is gotten by summing the probabilities of disjoint success paths. The complexity of identifying all disjoint success paths is exponential and as such determining K -terminal reliability for a network could be very time-consuming. Most existing researches on Kterminal reliability speed up calculations by reducing the computation efforts as much as possible.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>C. K -Terminal Reliability of Ring Networks</head><p>A ring can be defined by a network graph; G = (V, L), whose vertices (V) and directed edges (L) are connected in a cycle(circuit). The vertices represent nodes and the directed edges represent fiber path from one NAP (Network Attachment Port) transmitter to another NAP receiver. Whenthe primary ring is operative, then the vertices and edges comprising the subgraph of these elements are traversed exactly once, forming an Eulerian circuit. If a link or a station should fail on the primary link, it is eliminated from G and self-healing is invoked. Consequently a new subgraph is formed which comprises operative stations on both the primary and secondary links. This constitute the needed Eulerian circuit. The derivedsubgraph provides communication among operative stations and links in a ring network. It also provide communication among stations that can communicate using the ring network protocol. <ref type="bibr" target="#b19">[20]</ref> For K stations, at least one component is not in any other K-MEC. Each of its K-MEC (minimal eulerian circuit) is distinct in graph.Edges and vertices in G that are not in these circuits are irrelevant and contribute nothing to K-terminal reliability for this subset. The reliability of the ring network having k nodes, 𝑅 𝑘 (G), then becomes the probability that a set of K-MEC is operative. The sum of probabilities of this set, using inclusion-exclusion to evaluate the K-terminal reliability of a ring network containing the set of K-MEC, Ei, for i = 1. . . m, is given in equation 1</p><formula xml:id="formula_0">pr 𝐴 = 𝐴𝑖 𝑖 − 𝐴𝑖 ∩ 𝐴𝑗 + 𝑖&lt;𝑗 𝐴𝑖 ∩ 𝐴𝑗 ∩ 𝑖&lt;𝑗 &lt;𝑘 𝐴𝑘 + ⋯ + −1 𝑚 −1 . 𝑃𝑟 𝐴𝑖 ∩ 𝐴𝑗 ∩ 𝐴𝑘 … 𝐴𝑚<label>(1)</label></formula><p>Where Ai is a MEC having i nodes and Aj has j number of nodes.</p><p>From the analysis, a K-graph is derived. A K-graph is a circuit formation containing one or more K-MECand is a subgraph of G. A particular K-graph can correspond to several different circuit formations which might have many repeated terms. Some of these have a positive coefficient (−1) 𝑘−1 corresponding to an odd number k of K-MEC and some have a negative coefficient (−1) 𝑘−1 corresponding to an even number k of K-MEC in the formation. Statedcircuit formations are odd or even formations respectively. The combination of these positive and negative coefficients on repeated terms cancels out some of the terms in the final expression. The net number of noncanceled terms which is also the net number of noncanceled K-graphs of type Hi, viz, the net number of noncanceled circuit formations is termedthe domination value 𝑑 𝐻𝑖 . To reduce the number of repeated terms in the final expression we introduce the denomination value as given in <ref type="bibr" target="#b1">(2)</ref>.</p><formula xml:id="formula_1">Pr 𝐴𝑖 = 𝑑 𝐻𝑖 . 𝑛 𝑖=1 𝑃𝑟 𝑘 𝑖 (<label>2</label></formula><formula xml:id="formula_2">)</formula><p>Where Ki is the K-MEC derived at i Computational complexity of the decomposition is dependent on the number of K-graphs in the network.</p><p>In order to apply this to the Ethernet ring network topology deployed in the Campus (FUT MINNA), the number of K-MEC in each topology is first determined. We assume that the K stations of interest are sorted in tokenpassing order and are renumbered with an additional index from 1 to K. We refer to the station pair (ij) in this renumbered K element subset as consecutive stations if j = (i±𝟏 ) mod K. <ref type="bibr" target="#b23">[24]</ref> </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>D. K -MEC in Dual Rings</head><p>A dual ring has two sets of K-MEC.</p><p>Set #1 consists a circuit which contains all the stations and links in the operative primary ring.</p><p>Set #2 comprises other circuits that are formed by using two consecutive stations of the K given stations;having the self-healed end stations. Since there are K end-station pairs, there are K K-MEC in set #2, making the total number of K-MEC in a dual ring K+ 1.</p><p>Using the concept of case analysis (stated in introduction); we effect graphical decomposition around a single keystone. The keystone chosen here was the node at ITS-InfoTech Studies center. In order to determine the probability that stations 𝑡 𝑗 , j = 1. . . K, can communicate with each other in a dual ring, the noncanceled K-graphs are derived and Pr {Ki} is computed.</p><p>A. Case l K-graph 𝐻 1 results from circuit formation 𝐹 1 and contains all DAS and links on the primary ring. This occurs for all K in the noncanceled graphs at k=0 in the derived k-MEC.</p><formula xml:id="formula_3">𝑅 𝐷𝑅1 = 𝑝 𝑁 . 𝐷 𝑙 𝑁 . 𝐷 𝑝 2𝑁<label>(3)</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Case 2</head><p>K-graph 𝐻 𝑗 results from circuit formation 𝐹 𝑗 , j = 2... K, and contains all DAS and links connecting the K specific stations in both primary and secondary ring segments with self-healed end stations 𝑡 𝑗 ⨁𝑘 𝑎𝑛𝑑 𝑡 𝑗 ⨁1 . This is formed from the nodes under consideration in the network.</p><p>𝑅 𝐷𝑅𝑗 = 𝑝 𝑁−𝑆 𝑗 +1 . 𝐷 𝑙 2(𝑁−𝑆 𝑗 ) . 𝐷 𝑝 2(𝑁−𝑆 𝑗 +1)</p><p>C. Case 3 K-graph 𝐻 𝑗 +𝑘 results from circuit formation𝐹 1𝑗 , j = 2... K, and contains:  all DAS and links connecting the K specific stations in both primary and secondary ring segments with self-healed stations 𝑡 𝑗 ⨁𝑘 𝑎𝑛𝑑 𝑡 𝑗 ⨁1  all DAS and primary ring</p><formula xml:id="formula_5">𝑅 𝐷𝑅1𝑗 = 𝑝 𝑁 . 𝐷 𝑙 2𝑁−𝑆 𝑗 . 𝐷 𝑝 2𝑁<label>(5)</label></formula><p>K -terminal Reliability of a dual ring network having N = 9 nodes and 1 ≤ 𝑆 𝑗 ≤ 8 is obtained by summing the probabilities in cases 1, 2 and 3 after multiplying by the appropriate domination coefficient gives <ref type="bibr" target="#b23">[24]</ref> 𝑅 𝐾 (𝐺) 𝐷𝑅 = 𝑅 𝐷𝑅1 + (𝑅 𝐷𝑅𝑗 − 𝑅 𝐷𝑅1𝑗 )</p><formula xml:id="formula_6">𝐾+1 𝑗 =2<label>(6)</label></formula><p>V. RESULTS</p><p>Applying the above stated equation to the K-graphs for the understudied network, we have p, 𝐷 𝑙 , 𝐷 𝑝 are the operative probabilities (and hence, reliability) of the nodes, links and ports respectively.</p><p>To calculate 𝑝, 𝐷 𝑙 𝑎𝑛𝑑 𝐷 𝑝 we use</p><formula xml:id="formula_7">1 − 𝑅 𝑓𝑎𝑖𝑙𝑢𝑟𝑒 = 1 − 𝑒 −𝜆𝑡 (7)</formula><p>Where 𝜆 the failure rate of the component under discussion,𝑅 𝑓𝑎𝑖𝑙𝑢𝑟𝑒 is the failure probability of component and t is the time frame used to understudy the component in the link.</p><p>The accepted probability for fiber failures in the distribution part of the new ITU-T G.657 proposal document (in Annex I) is around 1/100000 over 20 years per fiber per network element.</p><p>This gives 𝑅 𝑓𝑎𝑖𝑙𝑢𝑟𝑒 = 1/100000=0.00001 Determining the Mean Time before Failure, MTBF, entails summing the mean time to fail (MTTF) and the mean time to detect and repair (MTTR) <ref type="bibr" target="#b23">[24]</ref> MTBF = MTTF + MTTR <ref type="bibr" target="#b7">(8)</ref> For the equipment in this research (RAD SWITCHES), the repair time (actually, negligible since there have been no faults since their provisioning) is quite small compared to the MTBF, so this work approximates the MTBF to be equal to the MTTF.</p><formula xml:id="formula_8">𝐷 𝑓𝑙 = 1-𝑅 𝑓𝑎𝑖𝑙𝑢𝑟𝑒 = 1-0.00001= 0.99999 𝐷 𝑡 = 1 − 𝑅 𝑓𝑎𝑖𝑙𝑢𝑟𝑒 = 1 − 𝑒 −𝜆𝑡</formula><p>With the afore-stated and considering the Time frame for data collection, we assume the average time between power outages to be the MTBF of the RAD Switches. For the Optic Fiber Link, cuts/failures are usually due to excavation or construction works on fiber path and attacks by rodent. Data gotten from the ITS shows there have been no fiber cut/failure since the provisioning of the facility, and considering the layout and terrain of the campus, there is likely to be none for the next 2years.</p><p>The RAD Switches employed in the Network design have not failed since provisioning too. Inoperability of the devices is due primarily to challenges of erratic power supply to the Station.  When we make any parameter defining the node, port and/or link to be one, we are assuming a perfect parameter, making its influence on the Reliability of the Network negligible. In the computation for node reliability and overall reliability of the network, the events are independent and as such making any of the events to be one simply makes its effect negligible.</p><p>Plot 2: When the effects of p is made negligible, best values for reliability index is at K = 2. This implies that if the other parameters are considered only as variables, considering the present network, it will be better to have priorities placed on two nodes for optimal reliability values. (Fig <ref type="figure">2</ref>)</p><p>Plot 3: When the effects of p and 𝐷 𝑙 are made negligible on the network, reliability values peaks at K = 3. This implies that if only the port reliability,𝐷 𝑝 is considered, three nodes are needed to be given priority for optimal network reliability. (Fig <ref type="figure">3</ref>)</p><p>Plot 4: When the value of 𝐷 𝑙link reliability, is made negligible, the plot peaks at K = 2 for optimal reliability. This implies that if only the station and port reliability are considered, it will take two nodes of priority for optimal reliability (Fig <ref type="figure">4</ref>).</p><p>Plot 5: When 𝐷 𝑝 𝑎𝑛𝑑𝐷 𝑙 is made negligible, the plot pikes at K = 2 and K = 5 and 6. Optimal values is at K = 5 and 6 approximating one <ref type="bibr" target="#b0">(1)</ref>. Given that the links (fiber paths) and ports on network devices (SAS and DAS) have not had any fault since their commissioning, it is safe to assume their overall effect on the network reliability is negligible. This plot (fig <ref type="figure">5</ref>) aptly describes FUT, MINNA; Gidan Kwanu Campus Computer Backbone Network. As such it is imperative to have priorities placed on five or six nodes out of the nine nodes that comprise the backbone network. Keeping priority on only one node (ITS), as it is presently, makes the network very unreliable. Where 𝐷 𝑙 𝑎𝑛𝑑𝐷 𝑝 are assumed to be 1, as in the case of the FUT MINNA, GidanKwanu campus network (fig <ref type="figure">5</ref>), it is observed that 5 to 6 priority nodes are needed to have optimal network reliability when the Network reliability is dependent, primarily, on the station reliability ( as it is with FUT MINNA, GidanKwanu campus computer backbone network). . It is observed from all plots that at K = 1 the network reliability is always minimal. Often in the range of 10 −4 and in some cases 10 −23 (fig <ref type="figure">7</ref>).</p><p>The value of 𝐷 𝑙 -composite link reliability, shows that it is the weakest and most vulnerable of the parameters in the understudied network. Hence, adequate protection measures are needed to maintain its workability.</p><p>The value of reliability for DAS which comprises the backbone of the understudied network shows it is very low and that the attached hosts (consisting of SAS) are more reliable in the network. This is as a result of epileptic power supply (𝑝. 𝐷 𝑝 2 ) and that the DAS are integral in the design of the network.</p><p>The Mean Time before Failures (MTBF) value of 5.645hours when compared to tens of hours for average enterprise networks is low.</p><p>The average time taken to restore the network (0.25hours) is much given that current trend in telecommunications is to limit the range to about 20ms.</p><p>The availability of the network is good, 0.95744681 (given it is an academic environment) even though it falls short of the "five-nines" (99.999%) property needed of most telecommunications networks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>VII. CONCLUSION AND RECOMMENDATIONS</head><p>FUT Minna campus computer backbone Network was analyzed and its reliability index was computed to be around 0.0007 using the K-Terminal Reliability measure.</p><p>The following outlined recommendations are given:  Future studies on the school's network reliability analysis should go further to incorporate Capacity related and travel time measures of reliability. This would answer questions of packet drops, effective data throughput and transmission delays.  To improve the network, the station reliability has to be upgraded. For optimal network reliability, priority should be placed on 5 or 6 nodes out of the 9 nodes that make the network. As observed, priority placed on only one node (as it is presently in the school's campus network with the node at ITS given the highest and only priority) yields a very low reliability for the network; 0.00076 for the school's network understudied.  Upgrading will entail installing battery/power banks to improve upon power supply to selected 5 or 6 nodes.  Distributing the servers among these nodes will also be needed (actually better-off) than concentrating the servers at the ITS Node.  The RAD Switches cannot implement automatic switching in order to effect self-healing on the ring when a cut/fault occurs. Thus, network engineers have to physically unplug and plug back fiber links to through-ports on the ODF (optical distribution frame). The use of layer 3 devices, like Cisco 3550 series, can help eliminate this need and reduce MTTR for the network. They do this by implementing the Hot Standby Router Protocol -HSRP and Gateway Load Balancing Protocol -GLBP. HSRP provides automatic router back-up. GLBP improves on the redundancy of the system.</p><p>With these devices, the school can also implement the MPLS (Multi-protocol layer switching) technology. MPLS delivers highly scalable, differentiated, end-to-end IP services with simple configuration, management, and provisioning for providers and subscribers.</p><p>We have been able to perform a reliability analysis of a real time, physical network using K -terminal reliability measure. Since works on real networks is very limited, this could serve as a template (especially for enterprise networks using a ring network) or better still, serve as a reference for future works VIII. ACKNOWLEDGEMENT Godwill, U., Dr. Caroline, A., and Dr. Bala, S., thank the department of telecommunications in school ofEngineering of the Federal university of Technology, Minna, for help given in this research.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>IV. COMPUTING THE K-TERMINAL RELIABILITY OF THE NETWORK For K ordinary DAS and K =9 Notation P Station Reliability 𝐷 𝑙 Link/ Fiber path Reliability 𝐷 𝑝 Port Reliability ⨁ Addition modulo K 𝑡 𝑗 ( (𝑡. 𝑥) 𝑗 , 0, *), j = 1... K; addresses of the K stations of interest in a dual ring (These addresses are sorted in token-passing order on the fault-free ring) 𝑠 𝑗 (( 𝑡. 𝑥) 𝑗 ⨁1 -( 𝑡. 𝑥) 𝑗 ⨁𝑘 ).mod N-station-separation distance.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>From [ 21 ]</head><label>21</label><figDesc><ref type="bibr" target="#b21">[22]</ref>, FIT (/10 9 hours) = 958; hence FR = 958/ 10 9 = 0.958 x10−6   𝐷 𝑡 = 1 − 𝑒 −𝜆𝑡 = 1 − 𝑒 −0.958 x10 −6 ×20×365 ×24 = 0.1545123𝐷 𝑟 = 1 − 𝑅 𝑓𝑎𝑖𝑙𝑢𝑟𝑒 = 1 − 𝑒 −𝜆𝑡From [21] [22], FIT (/10 9 hours) = 130; hence FR = 130 / 10 9 = 0.13 x10 −6 𝐷 𝑟 = 1 − 𝑒 −𝜆𝑡 = 1 − 𝑒 − 0.13 x10 −6 ×20×365 ×24 = 0.02251858 𝐷 𝑙 = 𝐷 𝑡 . 𝐷 𝑟 . 𝐷 𝑓𝑙 = 0.99999×0.1545123×0.02251858 = 0.003479 From [23], FIT (/2.92x10 6 hours) = 1; Hence, 𝐹𝑅 = 𝜆 = 1 2.92x10 6 = 3.424658x10 −7 This gives the Reliability of the port as 𝐷 𝑝 = 1 − 𝑒 −𝜆𝑡 over a time frame of 20 years as 1 − 𝑒 −𝜆𝑡 = 1 -𝑒 −3.424658 x10 −7 ×20×365 ×24 = 0.0582354 Readings taken from the campus shows an average of 128 failures in 1month; (30×24) hours on the nodes. High rate of failure here is due primarily to the erratic power supply in the campus and the absence of working standby power banks. This gives 30 × 24hours = 128 𝑃𝑟 𝑓𝑎𝑖𝑙𝑢𝑟𝑒 = 128/ (30 × 24) P = 1 − 𝑅 𝑓𝑎𝑖𝑙𝑢𝑟𝑒 = 1 -128/ (30 × 24) = 0.82222 1 − 𝑅 𝑓𝑎𝑖𝑙𝑢𝑟 𝑒 = 1 − 𝑒 −𝜆𝑡 → 𝑅 𝑓𝑎𝑖𝑙𝑢𝑟𝑒 = 𝑒 −𝜆𝑡 1 -0.82222 = 𝑒 −𝜆×20×365×24 0.18888 = 𝑒 −𝜆×175200 λ = In 0.18888 ÷ -175200 = 9.512805×10 −6 SAS reliability = 𝐷 𝑆𝐴𝑆 = p. 𝐷 𝑝 = 0.82222×0.0582354 = 0.04788231 DAS reliability = 𝐷 𝐷𝐴𝑆 = p.𝐷 𝑝 2 = 0.82222×0.0582354 2 = 0.002788446</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>MTBF = 1 ÷</head><label>1</label><figDesc>(128/ (30×24)) hours = 1 ÷ 0.178 = 5.625 hours The average time taken to restore power supply to the Station via alternate sources is around 15 minutes and supply by the Generator set lasts about 4 hours. MTTR = 15 minutes = 15/60 = 0.25hours Unavailability of the Network, q = MTTR/MTBF = 0.25/5.625 =0.0444444 MTBF ≈ MTTF= 5.625 hours Availability and unavailability are often expressed as probabilities. For the equipment understudied (RAD Switches and Fiber Links), all of the failure rates were based on field data or assumptions that devices of comparable complexity and exposure should have similar failure nodes. 𝐴 = 𝑀𝑇𝐵𝐹/(𝑀𝑇𝐵𝐹 + 𝑀𝑇𝑇𝑅)= 5.625 / (5.625 + 0.25) = 0.95744681</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 1 .</head><label>1</label><figDesc>Figure 1. Reliability plot at P, 𝐷 𝑙 , 𝐷 𝑝</figDesc><graphic coords="5,55.50,578.77,234.59,133.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 2 .Figure 3 .Figure 4 .Figure 5 .Figure 6 .Figure 7 .</head><label>234567</label><figDesc>Figure 2. Reliability plot at P negligible</figDesc><graphic coords="5,316.50,54.21,244.50,138.54" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Plot 6 :</head><label>6</label><figDesc>When 𝐷𝑝 is made negligible, reliability values peaks at K = 2 (fig 6) Plot 7: When p and𝐷 𝑙 are made negligible, the lot peaks at K = 4 (fig 7)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>TABLE I</head><label>I</label><figDesc></figDesc><table><row><cell>.</cell><cell cols="2">RESULTS FOR RELIABILITY INDEX COMPUTATION FROM K</cell></row><row><cell></cell><cell>= 1 TO K = 9</cell><cell></cell></row><row><cell>Skeleto n</cell><cell>Given Rules</cell><cell></cell></row><row><cell>𝑅 1 (𝐺) 𝐷𝑅</cell><cell>𝑝 9 . 𝐷 𝑙 9 . 𝐷 𝑝 18</cell><cell></cell></row><row><cell>𝑅 2 𝐺 𝐷𝑅</cell><cell cols="2">𝑝 9 . 𝐷 𝑙 9 . 𝑝 18 + 𝑝 7 . 𝐷 𝑙 6 . 𝐷 𝑝 14 1 − 𝑝 2 . 𝐷 𝑙 1 . 𝐷 𝑝 4 + 𝑝 4 . 𝐷 𝑙 3 . 𝐷 𝑝 8 (1 − 𝑝 5 . 𝐷 𝑙 4 . 𝐷 𝑝 10 )</cell></row><row><cell></cell><cell>𝑝 9 . 𝐷 𝑙 9 . 𝐷 𝑝 18 + 𝑝 7 . 𝐷 𝑙 6 . 𝐷 𝑝 14 1 − 𝑝 2 . 𝐷 𝑙 1 . 𝐷 𝑝 4</cell><cell></cell></row><row><cell>𝑅 3 (𝐺) 𝐷𝑅</cell><cell cols="2">+ 𝑝 7 . 𝐷 𝑙 6 . 𝐷 𝑝 14 1 − 𝑝 2 . 𝐷 𝑙 1 . 𝐷 𝑝 4 + 𝑝 7 . 𝐷 𝑙 7 . 𝐷 𝑝 14 (1 − 𝑝 2 𝐷 𝑙 1 𝐷 𝑝 4 )</cell></row><row><cell>𝑅 4 (𝐺) 𝐷𝑅</cell><cell>𝑝 9 . 𝐷 𝑙 9 . 𝐷 𝑝 18 + 2 𝑝 7 . 𝐷 𝑙 6 . 𝐷 𝑝 14 1 − 𝑝 2 𝐷 𝑙 1 . 𝐷 𝑝 4</cell><cell>+ 𝑝 8 𝐷 𝑙 7 𝐷 𝑝 16</cell></row><row><cell>𝑅 5 (𝐺) 𝐷𝑅</cell><cell>𝑝 9 𝐷 𝑙 9 𝐷 𝑝 18 + 4{𝑝 8 𝐷 𝑙 7 𝐷 𝑝 16 }</cell><cell></cell></row><row><cell>𝑅 6 (𝐺) 𝐷𝑅</cell><cell>𝑝 9 𝐷 𝑙 9 𝐷 𝑝 18 + 4{𝑝 8 𝐷 𝑙 7 𝐷 𝑝 16 }</cell><cell></cell></row><row><cell>𝑅 7 (𝐺) 𝐷𝑅</cell><cell>𝑝 9 𝐷 𝑙 9 𝐷 𝑝 18 + 2{𝑝 8 𝐷 𝑙 7 𝐷 𝑝 16 }</cell><cell></cell></row><row><cell>𝑅 8 𝐺 𝐷𝑅</cell><cell>𝑝 9 𝐷 𝑙 9 𝐷 𝑝 18 + 𝑝 8 𝐷 𝑙 7 𝐷 𝑝 16</cell><cell></cell></row><row><cell>𝑅 9 (𝐺) 𝐷𝑅</cell><cell>𝑝 9 𝐷 𝑙 9 𝐷 𝑝 18</cell><cell></cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Designing reliable communication networks with a genetic algorithm using a repair heuristic</title>
		<author>
			<persName><forename type="first">R</forename><surname>Dirk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Rothlauf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Gmilkowsky</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">European Conference on Evolutionary Computation in Combinatorial Optimization</title>
				<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Genetic-algorithm-based reliability optimization for computer network expansion</title>
		<author>
			<persName><forename type="first">K</forename><surname>Anup</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pathak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Gupta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on reliability</title>
		<imprint>
			<biblScope unit="volume">44</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="63" to="72" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Reliability optimization of computer communication networks using genetic algorithms</title>
		<author>
			<persName><forename type="first">A</forename><surname>Fulya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Dengiz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Smith</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="1998">1998. 1998. 1998</date>
			<biblScope unit="volume">5</biblScope>
		</imprint>
	</monogr>
	<note>Systems, Man, and Cybernetics</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A hybrid genetic algorithm approach for backbone design of communication networks</title>
		<author>
			<persName><forename type="first">K</forename><surname>Abdullah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Smith</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 1999 Congress on</title>
				<meeting>the 1999 Congress on</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="1999">1999. 1999</date>
			<biblScope unit="volume">3</biblScope>
		</imprint>
	</monogr>
	<note>Evolutionary Computation</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">An improved sum-of-disjoint-products technique for the symbolic network reliability analysis with known minimal paths</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Wei-Chang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Reliability Engineering &amp; System Safety</title>
		<imprint>
			<biblScope unit="volume">92</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="260" to="268" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Terminal-pair reliability of three-type computer communication networks</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Oliver</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE transactions on reliability</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="49" to="56" />
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A new Monte Carlo method for the network reliability</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Wei-Chang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of First International Conference on Information Technologies and Applications</title>
				<meeting>First International Conference on Information Technologies and Applications</meeting>
		<imprint>
			<date type="published" when="2002">ICITA2002. 2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Computing terminal reliability of computer network</title>
		<author>
			<persName><forename type="first">R</forename><surname>Suresh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">V</forename><surname>Prasad</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Reliability Engineering</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="109" to="119" />
			<date type="published" when="1986">1986</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Integrated Reliability and Availability Aanalysis of Networks With Software Failures and Hardware Failures</title>
		<author>
			<persName><forename type="first">H</forename><surname>Wei</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
		<respStmt>
			<orgName>Diss. University of South Florida</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">CAREL: Computer aided reliability evaluator for distributed computing networks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sieteng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rai</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Parallel and Distributed Systems</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="199" to="213" />
			<date type="published" when="1991">1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A computer approach for reliability evaluation of telecommunication networks with heterogeneous linkcapacities</title>
		<author>
			<persName><forename type="first">R</forename><surname>Suresh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Soh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Reliability</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="441" to="451" />
			<date type="published" when="1991">1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">An improved algorithm for symbolic reliability analysis</title>
		<author>
			<persName><forename type="first">V</forename><surname>Malathi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Trivedi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Reliability</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="347" to="358" />
			<date type="published" when="1991">1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Efficient and exact reliability evaluation for networks with imperfect vertices</title>
		<author>
			<persName><forename type="first">K</forename><surname>Sy-Yen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Yeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Lin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Reliability</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="288" to="300" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">An Enhanced Approach to Network Reliability Using Boolean Algebra</title>
		<author>
			<persName><forename type="first">B</forename><surname>Octavian</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
		<respStmt>
			<orgName>Diss. Lafayette College</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Reliability comparison of token-ring network schemes</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">C</forename><surname>Ibe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE transactions on reliability</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="288" to="293" />
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Network reliability and the factoring theorem</title>
		<author>
			<persName><forename type="first">A</forename><surname>Satyanarayana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Chang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Networks</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="107" to="120" />
			<date type="published" when="1983">1983</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Reliability evaluation of Common-Cause failures and other interdependencies in large reconfigurable networks</title>
		<author>
			<persName><forename type="first">G</forename><surname>Giancarlo</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Reliability of a stochastic-flow network with unreliable branches &amp; nodes, under budget constraints</title>
		<author>
			<persName><forename type="first">L</forename><surname>Yi-Kuei</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Reliability</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="381" to="387" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Modeling and evaluating the reliability of wireless sensor networks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Akhilesh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Liudong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Annual Reliability and Maintainability Symposium</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2007">2007. 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">K-terminal reliability in ring networks</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Jiahnsheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">B</forename><surname>Shin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Reliability</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="389" to="401" />
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<ptr target="www.semiconductor.agilent.com" />
		<title level="m">Reliability Data, Agilent technologies</title>
				<imprint>
			<publisher>Inc</publisher>
			<date type="published" when="1999-11">1999. 11/99</date>
			<biblScope unit="page" from="5968" to="6620E" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title level="m" type="main">Impact of Fiber Optics on System Reliability and Maintainability</title>
		<author>
			<persName><forename type="first">C</forename><surname>Nathan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Passauer</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1988">1988</date>
			<publisher>VITRO CORP SILVER SPRING MD</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">Failure rates for fiber optic assemblies</title>
		<author>
			<persName><forename type="first">S</forename><surname>Flint</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1980">1980</date>
			<publisher>IIT RESEARCH INST CHICAGO IL</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<title level="m" type="main">Node Reliability in WDM Optical Network</title>
		<author>
			<persName><forename type="first">P</forename><surname>Chinmayananda</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
