Research Article

Quantitative Invulnerability Analysis of Artificial Spider-Web Topology Model Based on End-to-End Delay

Table 1

Variation in the network delay when the nodes in the first, second, and third layers are damaged.

Number of nodes damagedFailure typeEnd-to-end delay time (s)Delay increment (s)
Damage of the 1st layerDamage of the 2nd layerDamage of the 3rd layerDamage of the 1st layerDamage of the 2nd layerDamage of the 3rd layer

1A0.0490.0440.0420.0060.001–0.001

2B0.0620.0470.0400.0190.004–0.003
C0.0570.0460.0400.0140.003–0.003

3D0.0820.0520.0390.0390.009–0.004
E0.0710.0490.0390.0280.006–0.004
F0.0650.0480.0390.0220.005–0.004

4G0.1120.0590.0370.0690.016–0.006
H0.0930.0540.0370.0500.011–0.006
I0.0870.0530.0370.0440.010–0.006

5J0.1530.0690.0340.1100.026–0.009