Skip to main content
Log in

A Vulnerability Parameter of Networks

  • Research Articles
  • Published:
Mathematical Notes Aims and scope Submit manuscript

Abstract

The vulnerability in a communication network is the measurement of the strength of the network against damage that occurs in nodes or communication links. It is important that a communication network is still effective even when it loses some of its nodes or links. In other words, since a network can be modelled by a graph, it is desired to know whether the graph is still connected when some of the vertices or edges are removed from a connected graph. The vulnerability parameters aim to find the nature of the network when a subset of the nodes or links is removed. One of these parameters is domination. Domination is a measure of the connection of a subset of vertices with its complement. In this paper, we study porous exponential domination as a vulnerability parameter and obtain certain results on the Cartesian product and lexicographic product graphs. We determine the porous exponential domination number, denoted by \(\gamma_e^*\), of the Cartesian product of \(P_2\) with \(P_n\) and \(C_n\), separately. We also determine the porous exponential domination number of the Cartesian product of \( P_n \) with complete bipartite graphs and any graph \( G \) which has a vertex of degree \( |V(G)|-1 \). Moreover, we obtain the porous exponential domination number of the lexicographic product of \( P_n \) and \( G_m \), denoted by \( P_n[G_m] \), for the case where \( G_m \) is a graph of order \( m \) with a vertex of degree \( m-1 \) and for the opposite case where \( G_m \) is a graph of order \( m \) which has no vertex of degree \( m-1 \). We further show that \(\gamma_e^*(P_n[G_m])=\gamma_e^*(G_m[P_n])=\gamma_e^*(P_n)\) by proving \(\gamma_e^*(G_m[G_n])=\gamma_e^*(G_n)\), where \( G_m \) is a graph of order \( m \) with a vertex of degree \( m-1 \) and \( G_n \) is any graph of order \( n \).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. H. Frank and I. T. Frisch, “Analysis and design of survivable networks,” IEEE Trans. Comm. Tech. COM-1, 501–519 (1970).

    Article  MathSciNet  Google Scholar 

  2. S. Lawrencenko and Q. Luo, “Graphs with given connectivity properties,” Networks 30 (4), 255–261 (1997).

    Article  MathSciNet  Google Scholar 

  3. V. Chvátal, “Tough graphs and Hamiltonian circuits,” Discrete Math. 5, 215–228 (1973).

    Article  MathSciNet  Google Scholar 

  4. K. S. Bagga, L. W. Beineke, W. D. Goddard, M. J. Lipman, and R. E. Pippert, “A survey of integrity,” Discrete Appl. Math. 37/38, 13–28 (1992).

    Article  MathSciNet  Google Scholar 

  5. H. A. Jung, “On maximal circuits in finite graphs,” Ann. Discrete Math. 3, 129–144 (1978).

    Article  MathSciNet  Google Scholar 

  6. R. Durgut, T. Turacı, and H. Kutucu, “A heuristic algorithm to find rupture degree in graphs,” Turkish Journal of Electrical Engineering & Computer Sciences 27 (5), 3433–3441 (2019).

    Article  Google Scholar 

  7. T. W. Haynes, S. T. Hedetniemi, and P. J. Slater, Fundamentals of Domination in Graphs, in Monographs and Textbooks in Pure and Applied Mathematics (Marcel Dekker, Inc., New York, 1998), Vol. 208.

    MATH  Google Scholar 

  8. M. A. Henning, “Distance domination in graphs,” in Domination in Graphs, Monogr. Textbooks Pure Appl. Math. (Dekker, New York, 1998), Vol. 209, pp. 321–349.

    MathSciNet  MATH  Google Scholar 

  9. P. Dankelmann, D. Day, D. Erwin, S. Mukwembi, and H. Swart, “Domination with exponential decay,” Discrete Math. 309 (19), 5877–5883 (2009).

    Article  MathSciNet  Google Scholar 

  10. M. Anderson, R. C. Brigham, J. R. Carrington, R. P. Vitray, and J. Yellen, “On exponential domination of \(C_m\times C_n\),” AKCE Int. J. Graphs Comb. 6 (3), 341–351 (2009).

    MathSciNet  MATH  Google Scholar 

  11. M. A. Henning, S. Jäger, and D. Rautenbach, “Relating domination, exponential domination, and porous exponential domination,” Discrete Optim. 23, 81–92 (2017).

    Article  MathSciNet  Google Scholar 

  12. S. Bessy, P. Ochem and D. Rautenbach, “Bounds on the exponential domination number,” Discrete Math. 340 (3), 494–503 (2017).

    Article  MathSciNet  Google Scholar 

  13. V. Aytaç and T. Turacı, “Exponential domination and bondage numbers in some graceful cyclic structure,” Nonlinear Dyn. Syst. Theory 17 (2), 139–149 (2017).

    MathSciNet  MATH  Google Scholar 

  14. M. A. Henning, S. Jäger, and D. Rautenbach, “Hereditary equality of domination and exponential domination,” Discuss. Math. Graph Theory 38 (1), 275–285 (2018).

    Article  MathSciNet  Google Scholar 

  15. M. Dairyko, On Exponential Domination of Graphs, in Thesis (Ph.D.)–Iowa State University (ProQuest LLC, Ann Arbor, MI, 2018), pp. 80.

    Google Scholar 

  16. V. Aytaç, “Vulnerability in networks,” TWMS Journal of Applied and Engineering Mathematics 9 (2), 366–373 (2019).

    Google Scholar 

  17. C. Çiftçi and A. Aytaç, “Porous exponential domination in Harary graphs,” Math. Notes 107 (1-2), 231–237 (2020).

    Article  MathSciNet  Google Scholar 

  18. C. Çiftçi and A. Aytaç, “Porous exponential domination number of some graphs,” Numerical Methods for Partial Differential Equations 37 (2), 1385–1396 (2021).

    Article  MathSciNet  Google Scholar 

  19. V. Aytaç and F. Sentürk, “A variation of distance domination in composite networks,” Numerical Methods for Partial Differential Equations, https://doi.org.10.1002/num.22759.

    Google Scholar 

  20. F. Harary, “On the group of the composition of two graphs,” Duke Math. J. 26, 29–34 (1959).

    Article  MathSciNet  Google Scholar 

  21. W. Imrich and S. Klavžar, Product Graphs: Structure and Recognition (John Wiley & Sons, New York, 2000).

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. Çiftçi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Çiftçi, C., Aytaç, A. A Vulnerability Parameter of Networks. Math Notes 109, 517–526 (2021). https://doi.org/10.1134/S0001434621030202

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S0001434621030202

Keywords

Navigation