You are on page 1of 22

Proceedings of the 2013 ASME International Design Engineering Technical Conferences &

Computers and Information in Engineering Conference


IDETC/CIE 2013
August 4-7, 2013, Portland, Oregon, USA

DETC2013-12188
arXiv:1310.1050v1 [cs.DC] 27 Sep 2013

THE FAILURE TOLERANCE OF MECHATRONIC SOFTWARE SYSTEMS TO


RANDOM AND TARGETED ATTACKS

Dharshana Kasthurirathna Andy Dong ∗


Centre for Complex Systems Research Faculty of Engineering & Information Technologies
Faculty of Engineering & Information Technologies University of Sydney
University of Sydney Sydney, NSW, 2006, Australia
Sydney, NSW, 2006, Australia andy.dong@sydney.edu.au
dkas2394@uni.sydney.edu.au

Mahendrarajah Piraveenan Irem Y. Tumer


Centre for Complex Systems Research Complex Engineered Systems Design (CESD) Laboratory
Faculty of Engineering & Information Technologies School of Mechanical, Industrial, & Manufacturing Engineering
University of Sydney Oregon State University
Sydney, NSW, 2006, Australia Corvallis, OR 97331-6001
mahendrarajah.piraveenan@sydney.edu.au irem.tumer@oregonstate.edu

ABSTRACT are not significantly more failure-tolerant than interconnections


This paper describes a complex networks approach to study with no prescribed architecture, that is, a random architecture.
the failure tolerance of mechatronic software systems under var- Our research provides a data-driven approach to engineer the
ious types of hardware and/or software failures. We produce syn- architecture of mechatronic software systems for failure toler-
thetic system architectures based on evidence of modular and hi- ance.
erarchical modular product architectures and known motifs for
the interconnection of physical components to software. The sys-
tem architectures are then subject to various forms of attack. The 1 Introduction
attacks simulate failure of critical hardware or software. Four While mechatronic systems, that is, mechanical systems
types of attack are investigated: degree centrality, betweenness controlled by or having software embedded in them, have been
centrality, closeness centrality and random attack. Failure tol- in operation for quite some time, the understanding of the fail-
erance of the system is measured by a ‘robustness coefficient’, ure properties of integrated mechatronic software systems has
a topological ‘size’ metric of the connectedness of the attacked not kept up with their adoption. The unexplained failure of these
network. We find that the betweenness centrality attack results in systems, including heretofore recently unexplained ones such as
the most significant reduction in the robustness coefficient, con- the sudden uncommanded pitch-down manoeuvres of a Qantas
firming betweenness centrality, rather than the number of con- Airbus A330 over Western Australia in 2008, have raised the pri-
nections (i.e. degree), as the most conservative metric of compo- ority of understanding the complex interactions between hard-
nent importance. A counter-intuitive finding is that “designed” ware and software in mechatronic software systems. Of concern
system architectures, including a bus, ring, and star architecture, in this paper is the performance of the overall mechatronic soft-
ware system due to failures in hardware components or software

∗ Address all correspondence to this author. 1 c 2013 by ASME


Copyright
code. dividual failures within each system on the mechatronic software
As engineered mechatronic systems become more architec- system. Specifically, it is not known if the failure properties of
turally complex, which is to say, have an increasingly complex the physical system due to the physical architecture and the soft-
physical product architecture [1] and a complex set of inter- ware system due to its software architecture should be studied
relations with software code, the study of the tolerance of these individually or whether the failure properties are, in a sense, an
systems to failures of physical components and software be- additive sum of the two architectures combined. To investigate
comes increasingly challenging. Abstracting such systems from the failure of a combined mechatronic software system, we take
the viewpoint of energy flow between components seems to be the product architecture of hardware and software architecture,
the preferred method of modelling and analysis. study their individual failure properties, and then study the fail-
Design methods such as the Function-Failure Design ure properties of the two interdependent networks using a topo-
Method [2] and the Functional Failure Identification and Prop- logical metric known as a ‘robustness coefficient’ [19, 20].
agation (FFIP) analysis framework [3, 4, 5] have begun to adopt
graph-based approaches. Methods for hazard identification such
as the model-based failure identification and propagation (MFIP) 2 Background
framework similarly identify components likely to fail when a Until recently, the study of the failure of complex engineered
hazard is propagated from one component to another [6]. The ba- systems had focused on the reliability of individual components
sic idea underlying these approaches is to model the function of and on simulating the performance of the system under vari-
components and the flow of energy between them as a network, ous input conditions in order to understand system-wide effects
and then to identify the failure propagation through the network. of input variability [21, 22, e.g.]. Extending from this base of
We extend this basic idea to study mechatronic software sys- reliability-based system design, engineering design researchers
tems as interdependent networks [7, 8, 9], wherein the physical have begun to direct their efforts toward the robustness of com-
architecture of the hardware and the software (code) architecture plex engineered systems so as to engineer systems that are able
are modelled as interacting networks. We study the topological to recover from disturbances and failures to continue function-
properties of interdependent mechatronic software networks as- ing within the expected performance envelope [23]. At the core
sociated with system tolerance to failure of components because of these methods, though, is a focus on the component and the
the topology of complex networks is known to influence the be- influence of the component on the failure of the system, or on
haviour of the network in response to the failure or modification the external conditions and their causal influence on the failure
of nodes [10]. of the system vis-à-vis the components.
The importance of studying the failure of systems based Recent research evidence emanating from the field of com-
upon the topology of its hardware and software architecture has plex networks suggests that the vulnerability of a system is at
become even more important due to recent observations that least equally dependent upon the architecture of the system,
modular systems tend to have low robustness even under increas- which takes into account the connectivity of the components,
ing robustness of individual components [11]. Modular systems as the components themselves [10, 24, 25, 26, 27]. Research in
have high robustness only when the failure of components can the field of complex networks has shown that not all network
be isolated to its module or when alternative (redundant) path- topologies display equivalent properties of failure tolerance to
ways between components can be designed in [12]. Designing a errors in nodes (components). In other words, some networks
complex system as a single large module with a high density of exhibit topological weakness. Scale-free networks, that is, net-
connections is not always practical though. Conversely, the hier- works wherein a few nodes have a high number of connections
archical modular structure of brain networks has been observed but most nodes have very few connections to other nodes, have a
to enhance the brain’s robustness, but too much modularity re- high degree of tolerance against the random failure of nodes [10].
duces its functionality [13], which is consistent with observa- Braha and Bar-Yam similarly find that the dynamic behaviour of
tions on the loss of performance in highly modular engineered inhomogenous networks is resilient to random failures of nodes
systems [14]. We cite these references against the backdrop but highly sensitive to modifications to essential nodes [28]. Sim-
of a preference for increasingly modular physical architectures ilarly, systems containing hubs have been found to have higher
in complex engineered products [15, 16] despite loss of perfor- levels of quality [29, 30], suggesting that systems having scale-
mance improvement [17] and making it easier for competitors to free properties may be preferred over their small-world or expo-
copy designs [18]. Thus, the recommendation and preference for nential (homogenous) degree counterparts when it comes to tol-
modular physical system architectures may have the unintended erance to random failures or modifications to nodes. This failure
downside of making the systems less tolerant to failure. tolerance is not true of other network topologies such as random
In summary, although great efforts are taken to engineer re- networks or homogeneous networks, wherein most nodes have
liable physical components and error-free software code, little is approximately the same number of links to other nodes. How-
known about the compound effect of system connectivity and in- ever, the scale-free networks also lose connectivity quickly when

2 c 2013 by ASME
Copyright
the most important nodes fail, which means that the network be-
comes fragmented into isolated nodes and communities of nodes.
In an engineered system, this could be equivalent to total system
failure, especially if the functional network is disconnected, since
the system would no longer behave as designed, or if a critical
module is separated from the rest of the system.
Mechatronic software systems represent a more interesting
and qualitatively different type of network though, one which
is more ‘naturally’ represented as two interdependent networks,
a hardware network (physical architecture) and a software net-
work (software architecture). The hardware network is partially FIGURE 1. THE INTEGRATION OF THE ADJACENCY MA-
dependent upon the software network, which operates the control TRICES OF MECHATRONIC SOFTWARE SYSTEM ARCHITEC-
logic for the hardware. In turn, the software is partially depen- TURES
dent upon the hardware for power, sensing, and actuation. These
dependencies can make the system vulnerable to an avalanche
of failures because a failure in the hardware cascades and causes tures in mechanical systems. To produce modular and hierarchi-
failure in the software, which in turn may produce erratic control cal modular networks, we follow the method described by Sarkar
signals that produce abnormal behaviour by the hardware and and Dong [33]. This methodology involves ‘rewiring’ each edge
so on. Recent theoretical research on interdependent networks in a perfectly modular network to take away intra-community
shows altogether different failure behaviours for interdependent edges in each module with a rewiring probability p. By varying
networks than for single networks. Inhomogenous degree distri- p, we obtain networks that have varying modularity levels.
butions increase the vulnerability of interdependent networks to Similarly, we produce synthetic, scale-free software net-
random failure [9], meaning that the advantage of an inhomoge- works. Software architecture have been demonstrated to show
neous single network becomes a disadvantage for interdependent scale-free behaviour despite design strategies associated with
networks. Likewise, cascading failures occur in interdependent software engineering preferring tree-like structures [32]. Pref-
networks when nodes in each network mutually depend on nodes erential attachment based generator models can be used to pro-
in other networks such that that failures can cascade back and duce scale-free networks [34]. Therefore, we generated synthetic
forth between the networks [31]. Contrary to intuition, adding scale-free software networks based upon preferential attachment.
more interconnectivity between networks can become detrimen- The preferential attachment may represent software dependen-
tal to the system even when the additional interconnectivity is cies at different granularity levels such as class graphs or function
beneficial to an individual network [7]. graphs. These synthetic software networks will be connected to
Based upon these critical observations on the failure prop- the hardware networks in the integrated hardware-software net-
erties of interdependent layered networks, this paper addresses works based upon various connection motifs.
the failure properties of mechatronic software systems. We syn- The next part of the research focuses on producing synthetic
thesise modular and hierarchical modular physical architectures hardware-software interdependent networks. We combine the
hardware networks, which are frequently found in product archi- hardware physical architecture network and software networks
tectures, and scale-free software architectures, based upon theo- by integrating their adjacency matrices. An adjacency matrix
retical evidence of their presence [32]. We create an interdepen- represents the edges between nodes in a network using a matrix
dent layered hardware-software network based on various rules representation. A binary adjacency matrix A represents whether
for their interconnection. We describe the failure properties of or not there is an edge (physical architecture relationship) be-
the networks based upon a ‘robustness coefficient’ [19, 20] and tween nodes i and j as in
show how the failure properties differ from the failure properties
of individual networks. 
1 if an edge exists between nodes i and j
Ai j = (1)
0 otherwise
3 Research Method
3.1 Network synthesis Fig. 1 shows how a typical mechatronic software system
The initial part of the research focuses on a producing syn- could be represented in this manner.
thetic networks that model real-world product and software ar- In a typical mechatronic software system, the hardware and
chitectures. The synthetic hardware networks simulate a hard- the software system ‘interact’ with each other to form an inte-
ware system having modular and hierarchical modular product grated interdependent network. As such, in our approach, we
architectures, given the preference for modular product architec- neither reduce the two networks into a single network nor do we

3 c 2013 by ASME
Copyright
study them separately. Instead, we integrate the two networks TABLE 1. HW–SW ADJACENCY MATRIX BIT PATTERNS
by considering the interactions between them as interdependent RESEMBLING DIFFERENT EMBEDDED SYSTEM ARCHITEC-
networks. Some hardware components depend upon the software TURES
for their behaviour and some software components depend upon Architecture Adjacency Pattern
hardware for input data. 0 1 0 0 1 0
In Fig. 1, section A represents the hardware product archi-
1 0 1 0 0 1
tecture network, while D represents the software architecture net-
work. Accordingly, the B and C adjacency matrix sections repre- 0 1 0 1 0 0
Bus
sent the interactions between the hardware components and soft- 0 0 1 0 0 0
ware code, such as between a sensor (hardware) and the software
code polling the sensor data. The fraction of non-zero values in B 1 0 0 0 0 0
and C describe the fraction of nodes in A that depend upon D and 0 1 0 0 0 0
the fraction of nodes in D that depend upon A, respectively. The
0 1 0 0 0 1
total adjacency matrix could be regarded as a representation of
the integrated hardware-software network in a mechatronic soft- 1 0 1 0 0 0
ware system. This type of integration would minimise the loss of 0 1 0 1 0 0
information that could occur when reducing the networks into a Ring
0 0 1 0 1 0
single network. At the same time, this approach would facilitate
the studying of a mechatronic software system as a single system 0 0 0 1 0 1
constituted by two separate hardware and software networks. 1 0 0 0 1 0
We investigate various ways in which the hardware-software
networks could be interdependent. Network motifs have been 0 1 1 1 1 1
used as an indicator of software architectural patterns. For ex- 1 0 0 0 0 0
ample, given a network of software classes, the network motifs 1 0 0 0 0 0
that may exist in that particular network would have a relation- Star
ship to the architectural pattern or the rules that are used in devel- 1 0 0 0 0 0
oping the system [35]. Extending on the same idea, we propose 1 0 0 0 0 0
the usage of network motifs as an implication of the usage of a
1 0 0 0 0 0
particular architecture in mechatronic software system design.
A network motif can be represented by a specific bit pattern
in the hardware-software adjacency matrix. Therefore, by apply-
ing different adjacency patterns to the hardware–software adja- ity, betweenness centrality and closeness centrality based attacks.
cency matrix sections (namely B and C), we could manipulate The ‘attack’ of a node models a hardware or software component
the architecture of the hardware-software system that it resem- no longer behaving within its performance envelope, i.e., com-
bles. Table 1 shows the adjacency patterns that could be used ponent performance satisfies its marginal value [23]. Random
to emulate several well-known architectures in mechatronic soft- attack signifies the failure of components due to gradual degra-
ware system design. dation. The last three types of attack are based on the premise of
When generating the integrated adjacency matrix, we use the deliberately attacking the most significant nodes in the network.
largest single block of each pattern that a mechatronic software All these measures characterise the importance of the node to the
system adjacency matrix section could accommodate. network, on the basis that the more connected a node is, the more
We followed a similar process to produce a synthetic mecha- important the node is to the network, and that critical subsystems
tronic software system comprised of the physical product archi- share important connections. As there is not necessarily one cor-
tecture network of the Pratt Whitney (PW) aircraft engine [36] rect metric of node centrality, we investigate three common ones
and synthetic software networks. Analysis of this system allows to determine which is the most conservative in relation to attack
us to understand how the principles of failure tolerance of mecha- tolerance. Degree centrality is based on the degree or the number
tronic software systems might apply in a real-world system. of links that a particular node has. The betweenness centrality is
a measure of the number of paths that pass through a particular
node. Closeness centrality measures how close a particular node
3.2 Topological attacks to the other nodes in the network. Thus, the centrality attacks
Following a general method in complex networks to study provide three mechanisms to simulate the failure of important
the failure tolerance of networks, we ‘attack’ the hardware- components. In each of the centrality based attacks, the node
software network in one of four ways: random, degree central- with the highest centrality value is removed from the network

4 c 2013 by ASME
Copyright
in an iterative manner, until the network becomes fully disinte- 12
grated. In contrast, the removal of a randomly selected node in
each iteration emulates the random failure of components. When

Size of the largest component


10
simulating all these attacks, we make the assumption that the
component failures occur gradually and incrementally; thus, we 8
do not take into account the instances where more than one com- 6
ponent would fail simultaneously.
The betweenness centrality and the closeness centrality are 4
calculated based on well-known algorithms [37]. Eqn. (2) gives
the formal definition of betweenness centrality. 2

1 σs,t (v) -2
BC(v) = ∑
(N − 1)(N − 2) s6=v6=t σs,t
(2) -2 0 2 4 6 8 10 12
Number of nodes removed

Here, σs,t is the number of shortest paths between the source FIGURE 2. SIZE OF LARGEST COMPONENT AGAINST THE
node s and the target node t. σs,t (v) is the number of shortest NUMBER OF NODES REMOVED FOR A NETWORK UNDER SUS-
paths between source node s and target node t that lies through TAINED TARGETED ATTACK
node v.

they typically calculate averaged effects of single node removals,


1 rather than effects of sequential removals, or are too simplistic.
CC(v) = (3) For example, the network efficiency has been defined as the av-
∑i6=v dg (v, i)
erage of inverted shortest path lengths [39], and used for quan-
tifying the robustness of a network. Node removals are not ex-
Eqn. (3) defines how the closeness centrality [37] of a node plicitly considered in this measure. Similarly, Dekker and Col-
is measured. Here, dg (v, i) denotes the shortest path (geodesic) bert [40] introduced two concepts of connectivity for a graph
distance between nodes v and i. The average is inverted so that which can be used to model network robustness: the node con-
the node that is closest to the other nodes will have the highest nectivity and link connectivity, which are the smallest number of
closeness centrality. nodes and links respectively, whose removal results in a discon-
Degree centrality is directly related to the degree of each nected or single-node graph. In this work, we used robustness
node in the network. Thus, DC(v) = deg(v). coefficient [20] as the robustness measure as it has the advantage
of providing a single numeric value to quantify the topological
3.3 Topological robustness and robustness coeffi- robustness of a network under sustained attack.
cient The calculation of the robustness coefficient utilises the size
The ability of a network to sustain or withstand random fail- of the largest connected component in a network. When a net-
ures or targeted attacks depends on its topological structure. For work is ‘attacked’, or when a particular node is removed, this
example, scale-free networks have been shown to be more re- could alter the size of the largest connected component (a group
silient against random failures, but are more vulnerable to tar- of connected nodes) of the network. For each network, the num-
geted centrality based attacks, in comparison to Erdös-Rényi ran- ber of nodes that has to be removed to disintegrate the network
dom networks [10]. Thus, it is important to observe the topolog- completely would be different. Thus, if the size of the largest
ical robustness of a network to comprehend how its topological connected component is plotted against the number of nodes re-
structure would contribute to random node failures or targeted moved, that would give an indication on how resilient the net-
attacks. work is against targeted attacks and random failures. The topo-
There exists a substantial body of work which introduces logical metric provides a proxy for system performance without
and analyses structural robustness measures. Albert et al. [38] having to calculate the actual system performance, which can be
considered error and attack tolerance of complex networks by computationally expensive unless methods such as response sur-
comparing the profiles of quantities such as the Network diame- face are applied to estimate performance [21]. As the robustness
ter and the size of the largest component. Following their work, coefficient decreases, more of the system is behaving outside of
a multitude of metrics have been proposed to measure the topo- its marginal value.
logical robustness of networks as a single quantity. However, Fig. 2 shows a typical curve that is generated by plotting

5 c 2013 by ASME
Copyright
12
Size of the largest component

10
A2 = (1/2)N 2 (5)
8

6 The ratio between the area under the equivalent graph of any
network and the area under the ideal curve would give a measure
4 of the topological robustness of the network of concern. This
measure is called the ‘robustness coefficient’ of a network. Thus,
2 the robustness coefficient R would be,
0

-2 N
-2 0 2 4 6 8 10 12 2 ∑ Sk − S0
A1 k=0
Number of nodes removed R= = (6)
A2 N2
FIGURE 3. SIZE OF LARGEST COMPONENT AGAINST THE
NUMBER OF NODES REMOVED FOR AN IDEALLY ROBUST Eqn. (7) represents R as a percentage.
NETWORK UNDER TARGETED ATTACK

N
the size of the largest connected component against the number 200 ∑ Sk − 100S0
of nodes removed. The area under this curve can be regarded A1 k=0
R= = (7)
as a measure of attack tolerance or the topological robustness of A2 N2
a network under sustained attack. By accumulating the areas of
trapeziums of unitary width along the x-axis, the area under the Therefore, the formal definition of the robustness coefficient
curve could be calculated as, can be given as,

A1 = 0.5(S0 + S1) + 0.5(S1 + S2 ) + ...... + 0.5(SN−1 + SN ) 200 ∑Nk=0 Sk − 100S0


R= (8)
N−1 N2
= 0.5S0 + ∑ Sk + 0.5SN
k=1
In Eqn. (8), Sk is the size of the largest component after k
nodes are removed. S0 denotes the initial largest component size.
where Sk is the size of the largest component after k nodes are N is the network size. According to the above calculation, for a
removed. fully connected network of any size, the robustness coefficient
Here S0 is the initial largest component size. Since SN , the (R) would always be 100%.
size of the largest component after N nodes are removed, is by In order to measure the robustness coefficient under different
definition zero, the above expression can be reduced to Eqn. (4). types of attacks, the nodes that are removed are selected based
on their centrality values. For example, in a betweenness based
attack, the node that would be removed in each iteration would
N be the node with the highest betweenness centrality value, at that
A1 = ∑ Sk − 0.5S0 (4) particular instance of the network. Likewise, the other centrality
k=0 based attacks would select the node with the highest value of the
respective centrality measure. In the case of a random attack, a
Fig. 3 shows the ideal curve that could occur in a network randomly selected node would be removed in each iteration.
under attack. In an ideal scenario, with the removal of each node, The interactions between the hardware and software net-
the size of the largest connected component would get reduced in works in a mechatronic system form a separate network among
a linear fashion. The size of the largest component would always the hardware components and their respective software drivers.
decrease only by 1, in each iteration. Since the particular curve The total network that is formed by the hardware component
forms a triangle of base N and height N, the area under it can be architecture network, software network and the interactions of
calculated by, these two networks provide an interesting platform on which the

6 c 2013 by ASME
Copyright
topological robustness measures such as the robustness coeffi- In the figures given in Table 2, the network generated with
cient could be applied. When the hardware-software networks p = 0 represents a perfectly modular network and an increasing p
evolve over time, due to the changes in requirements or the ad- indicates increasing degree of hierarchical modularity. Accord-
dition of new features into the system, the total network topol- ing to these results it is evident that the hierarchical modular net-
ogy of the original system may become altered in an unexpected works show higher degree of topological robustness compared
manner. How these unexpected topological changes affect the to modular networks under sustained attacks because the fail-
topological robustness of the system may not be obvious un- ures can be isolated within a nested module. It is important to
less a topological robustness analysis of the total system is per- note that we are referring to the ‘topological robustness’ of a net-
formed. Therefore, it is very important to observe the topological work in contrast to the engineering robustness that may be more
robustness of hardware-software networks using measures such directly applicable to engineering systems. Generally, engineer-
as the robustness coefficient in order to better understand how ing systems with higher modularity are regarded as possessing
the robustness of the overall system is affected by its topological higher engineering robustness, but only when the failure can be
changes. isolated to a single module. Nevertheless, these results provide
Engineering robustness of a system is its ability to perform an interesting baseline on topological robustness of an engineer-
in an acceptable manner under the expected variations of certain ing system from a network analysis point of view.
parameters, but also in the presence of unexpected variations in We performed a topological robustness analysis on the ac-
other unknown parameters. However, the topological robustness tual hardware component network of the Pratt Whitney Aircraft
of a network focuses on sustaining the connectivity of the nodes Engine component network [36]. Since this will be the hardware
under random failures or deliberate sustained attacks. Therefore, network that we will subsequently use as part of our hardware-
engineering robustness can be thought of as a measure of a sys- software integrated network, it was necessary to observe its own
tem’s ability to maintain its functionality under random failures robustness coefficient measures first. Table 3 shows the robust-
or targeted attacks. On the other hand the topological robustness ness coefficient results obtained for the Pratt Whitney (PW) Air-
is a measure of a system’s ability to maintain the connectivity craft Engine component network [36] under different types of
among its components under random failures or targeted attacks sustained attacks.
from a network analysis point of view. Even though the topo-
logical connectivity may affect a system’s functionality, it is im-
TABLE 3. ROBUSTNESS COEFFICIENT VALUES FOR THE PW
portant to note that there exists a significant difference between
AERO-ENGINE UNDER DIFFERENT TYPES OF ATTACKS
these two perspectives of robustness.
Type of Attack Robustness Coefficient (%)
Degree based 85
4 Results Betweenness 68
4.1 Topological robustness of hardware networks Closeness 79
As the initial part of the research, a comparison of topologi-
Random 91
cal robustness between modular and hierarchical modular archi-
tectures was performed. Table 2 shows the results obtained from
that comparison. The hierarchical modular networks were gener-
ated using varying rewiring probability (p) values to change the According to the above results, the PW aircraft engine net-
modularity in each network. Each of these networks tested had work shows higher robustness against random node failures,
100 nodes with 5 modules. compared to the centrality based attacks.

4.2 Topological robustness of software networks


TABLE 2. ROBUSTNESS COEFFICIENT VALUE COMPARISON
In order to evaluate a hardware-software network’s be-
OF MODULAR AND HIERARCHICAL MODULAR NETWORKS
haviour under different kinds of attacks, we generated three hy-
Type of Attack Robustness Coefficient (%) pothetical software networks of varying sizes. The sizes were
p=0 p = 0.2 p = 0.5 p = 0.8 selected in such a way that they would have approximately 1:2,
1:5 and 1:10 ratios (with the values 100, 250 and 500) to the size
Degree based 22 93 91 91
of the PW engine network (54). The isolated nodes were pruned
Betweenness 22 83 88 88 from the generated networks, which reduced their sizes from the
Closeness 36 91 94 93 projected values.
Software networks have been demonstrated to have a scale-
Random 24 98 99 97
free architecture [32]. Therefore, the software networks were

7 c 2013 by ASME
Copyright
generated using preferential attachment, since preferential at- Table 5 shows the robustness coefficient values of randomly
tachment model is known to generate scale free networks [34]. integrated modular and hierarchical modular synthetic hardware
Table 4 shows the robustness coefficient values of three scale- networks with a synthetic scale-free software network. The hard-
free software networks that were generated, under different types ware networks that were used had 100 nodes each, containing ex-
of attacks. actly 5 modules. The rewiring probability p used for generating
the hierarchical modular network was 0.5. The software network
that was used had 470 nodes. Three different adjacency proba-
TABLE 4. ROBUSTNESS COEFFICIENT OF SCALE-FREE bilities (10, 20 and 50%) were considered when integrating the
SOFTWARE NETWORKS OF DIFFERENT SIZES (N) UNDER DIF- networks.
FERENT TYPES OF ATTACK The results do not show a significant difference between the
Type of Attack Robustness Coefficient (%) two different types of integrated networks, that is, no advantage
N = 95 N = 233 N = 470 for hierarchical modular network. In contrast, the modular and
hierarchical modular hardware networks demonstrated a signifi-
Degree 26 23 26
cant difference in topological robustness in favour of hierarchical
Betweenness 23 21 23 modular as per the results shown in the table 2. Thus, it is pos-
Closeness 39 38 39 sible to argue that even though the hardware networks of differ-
ent modularity levels may show varying topological robustness
Random 73 71 73 characteristics, when they are integrated with scale-free software
networks, the topological robustness of the resulting integrated
networks tend to be uniform in nature. It may be that scale-free
All three hypothetical software networks demonstrate higher software network dominates the failure characteristic, since the
topological robustness against random attacks, compared to cen- scale-free software network is vulnerable to targeted attacks as
trality based attacks. This is comparable with the results obtained shown in Table 4. Apart from that, we can observe that the vari-
for the PW engine network, but differs from the modular and hi- ation of the number of interconnections (denoted by the different
erarchical modular hardware networks. However, in the software percentages of adjacency levels) do not have a significant impact
networks considered, the margin of difference between topologi- on the robustness coefficient values. This implies that the re-
cal robustness under random failures and centrality based attacks dundancy of random interconnections between the hardware and
is much higher than that of the PW engine network. software networks does not necessarily improve the topological
robustness of the resulting integrated network.
Next, we measured the robustness coefficients of several in-
4.3 Topological robustness analysis of hardware- tegrated hardware-software networks consisting of modular and
software networks hierarchical modular synthetic hardware networks and a syn-
We now test the integration of the hardware and software thetic scale-free software network. These networks were inte-
networks. We start with a random integration of the modular grated according to several well-known motifs. A randomly in-
and hierarchical modular hardware networks with a scale-free tegrated network of a similar adjacency levels was used for com-
software network, that is, randomly setting the adjacency values parison. Table 6 shows the results obtained from the measure-
in C and D of Fig. 1. ments. The hardware networks had 100 nodes and 5 modules
each. The hierarchical modular network was generated with a
rewiring probability p of 0.5. The scale-free software network
TABLE 5. ROBUSTNESS COEFFICIENTS OF RANDOMLY IN-
used had 470 nodes.
TEGRATED HW-SW INTEGRATED NETWORKS OF MODULAR
The robustness coefficient values given in the Table 6 show
AND HIERARCHICAL MODULAR HARDWARE NETWORKS
that when a hierarchical modular hardware network is integrated
AND A SCALE-FREE SOFTWARE NETWORK UNDER DIFFER-
with a scale-free software network, bus and ring architectures
ENT TOPOLOGICAL ATTACKS
would generally introduce more topological robustness com-
Type of Attack Modular HW–SW HM HW–SW pared to the star architecture. Apart from that, the random in-
10% 20% 50% 10% 20% 50% tegration gives similar robustness coefficient values, implying
that following a specific architecture when integrating the hard-
Degree 47 47 47 47 47 47
ware and software networks does not significantly improve the
Closeness 59 60 60 58 59 60 resulting network’s topological robustness. This would indicate
Betweenness 45 47 45 45 45 45 that the “designed” system architecture does not show signifi-
cantly higher robustness than the random integration of compa-
Random 98 98 99 97 99 99
rable sized networks. Also, when a hierarchical modular hard-

8 c 2013 by ASME
Copyright
TABLE 6. ROBUSTNESS COEFFICIENTS OF HW-SW IN- TABLE 7. ROBUSTNESS COEFFICIENTS OF HW-SW INTE-
TEGRATED NETWORKS OF MODULAR AND HIERARCHI- GRATED NETWORKS OF VARYING RANDOM ADJACENCY
CAL MODULAR HARDWARE NETWORKS AND A SCALE- LEVELS, UNDER DIFFERENT TYPES OF ATTACKS
FREE SOFTWARE NETWORK, INTEGRATED WITH HETEROGE- Type of Attack HW (N = 54) SW (N = 95)
NEOUS ARCHITECTURES, UNDER DIFFERENT TOPOLOGICAL
10% 20% 50%
ATTACKS
Type of Attack Modular HW–SW Betweenness Attack 65 68 68

Bus Ring Star Random Closeness Attack 74 80 75

Degree 38 32 39 38 Degree Attack 67 69 70

Closeness 47 55 47 50 Random Attack 95 98 99

Betweenness 23 15 22 29 Type of Attack HW (N = 54) SW (N = 233)


Random 75 76 76 80 10% 20% 50%
Type of Attack HM HW–SW Betweenness Attack 47 48 48

Bus Ring Star Random Closeness Attack 59 58 59

Degree 38 39 31 39 Degree Attack 49 50 50

Closeness 52 53 52 51 Random Attack 95 98 99

Betweenness 25 25 17 31 Type of Attack HW (N = 54) SW (N = 470)


Random 78 83 77 78 10% 20% 50%
Betweenness Attack 35 35 35

ware network is used, the ring and bus architectures would not Closeness Attack 50 51 52
substantially improve the topological robustness of the resulting Degree Attack 37 37 37
integrated network.
Random Attack 96 98 99
Finally, we integrate the PW engine hardware network with
the hypothetical scale-free software networks. First we tested
random integration. This was done by randomly populating the
hardware-software adjacency matrix sections C and D of Fig. software network.
1. Three different percentages (10, 20 and 50%) of probability Finally, we combined the PW hardware network and the
of connection in the adjacency matrix sections were considered. software networks according to different well-known architec-
Then, the robustness coefficients of the resulting integrated net- tures by following the adjacency matrix patterns given in Table 1.
works were measured. Table 7 shows the results of those mea- Table 8 shows the robustness coefficient values of the hardware-
surements. software networks that were obtained under different architec-
All the integrated networks show higher topological robust- tures, against different types of attacks. The software network
ness against random failures compared to targeted centrality used has a network of node count 233. A randomly integrated
based attacks. Another important observation that can be made is network with a similar adjacency level was also used for the com-
that when the software network used increases in size, the respec- parison.
tive hardware-software network’s topological robustness against
centrality based attacks tends to decrease. In other words, as
the amount of code increases, the overall system tolerance to TABLE 8. ROBUSTNESS COEFFICIENTS OF HW-SW NET-
failure decreases. However, the software network size does not WORKS OF HETEREOGENEOUS ARCHITECTURES, UNDER
seem to affect the topological robustness of the integrated net- DIFFERENT TYPES OF ATTACKS
work against random failures. Type of Attack Ring Bus Star Random
Another key observation that could be made out of this com-
Betweenness Attack 27 27 17 32
parison is that the increase in the adjacency level does not seem
to affect the topological robustness of the integrated network in a Closeness Attack 50 46 48 50
substantial manner. Though more connections among the hard- Degree Attack 37 37 27 38
ware and software layers increase redundancy, it does not seem
Random Attack 79 75 77 78
to positively affect the topological robustness of the hardware-

9 c 2013 by ASME
Copyright
Based on the results given in Table 8, it is possible to argue more accurately whether the robustness coefficient could serve
that the ring and bus architectures show better topological robust- as a useful and efficient proxy for system performance, given
ness against centrality based attacks, compared to the star archi- the computational complexity involved in simulating the perfor-
tecture. Another interesting observation that can be made is how mance of a complex system. As well, we will investigate new de-
the randomly integrated network manages to demonstrate com- sign methods for ‘wiring up’ product architectures to their soft-
parable topological robustness, under all types of attacks. This ware controllers with the aim of improving the overall robustness
may suggest that following a particular architecture in hardware- of the system as a first-class concern. The complex networks ap-
software integration may not result in a substantial improvement proach applied in this research can be used for future work in
in the topological robustness of the integrated network. understanding the failure tolerance of complex engineered sys-
tems with interdependent networks.
Although the scope of the paper is focused on mechatronic
5 Discussion and Conclusion systems, it maybe generalised for complex engineered systems
This paper introduced a complex networks approach to cal- with inter-dependent networks. However, in this work, we opted
culate the failure tolerance of mechatronic software systems to to focus more on mechatronic software systems as the modelling
the failure of critical hardware components and software code formalism used relates more to such systems. Generalising this
(functions and classes). We used a novel approach in modelling particular modelling approach for complex engineered systems
the integration of interdependent hardware component networks would be a possible extension to this research.
and software networks in mechatronic software systems, accord-
ing to different system architectures. Calculation of the robust-
ness of the system is based on a robustness coefficient, which ACKNOWLEDGMENT
is a topological measure of the size and connectedness of the Andy Dong is the recipient of an Australian Research Coun-
network. We investigated the robustness of several synthetic cil Future Fellowship (project number FT100100376).
hardware-software networks comprised of modular and hierar-
chical modular product architectures and scale-free software ar-
chitectures connected randomly or through known connection REFERENCES
architectures and a synthetic network comprised of a Pratt and [1] Simon, H. A., 1962. “The architecture of complexity”. Pro-
Whitney aero-engine and a scale-free software network. In all ceedings of the American Philosophical Society, 106(6),
instances, the results show that random integration of the product pp. 467–482.
architecture to the software code results in comparably resilient [2] Stone, R. B., Tumer, I. Y., and Van Wie, M., 2005. “The
hardware-software systems compared to the designed counter- function-failure design method”. Journal of Mechanical
parts of star, bus, and ring architectures. Although actual engi- Design, 127(3), pp. 397–407.
neered systems are not randomly integrated, this result implies [3] Papakonstantinou, N., Sierla, S., Jensen, D. C., and Tumer,
that the attempts to optimise system connectivity through certain I. Y., 2012. “Simulation of interactions and emergent fail-
architectures may not necessarily make the system more resilient ure behavior during complex system design”. Journal of
to topological failure. The challenge of system engineering is to Computing and Information Science in Engineering, 12(3),
balance the assembly efficiency gains introduced by prescribed p. 031007.
interconnections between components and the possible robust- [4] Kurtoglu, T., Tumer, I. Y., and Jensen, D. C., 2010. “A
ness gains introduced by directly connecting components to their functional failure reasoning methodology for evaluation of
interacting counterparts without any prescribed regularity. This conceptual system architectures”. Research in Engineering
is what is meant by a ‘random’ connection architecture, not that Design, 21(4), pp. 209–234.
components are randomly connected to other components. [5] Kurtoglu, T., and Tumer, I. Y., 2008. “A graph-based fault
Centrality-based attacks produced the most failure in the identification and propagation framework for functional de-
hardware-software system (most significant reduction in robust- sign of complex systems”. Journal of Mechanical Design,
ness coefficient), with betweenness centrality attacks produc- 130(5), pp. 051401–8.
ing the most significant effects. The scale-free architecture of [6] Mehrpouyan, H., Jensen, D. C., Hoyle, C., Tumer, I. Y.,
software networks strongly determined the vulnerability of the and Kurtoglu, T., 2012. “A model-based framework fail-
hardware-software system, thus highlighting the importance of ure identification and propagation framework for concep-
producing error-free code but also bringing into question the tual design of complex systems”. In ASME 2012 Interna-
suitability of software code with highly dependent functions and tional Design Engineering Technical Conference and Com-
classes in mission-critical systems. puters and Information in Engineering Conference, 24th In-
Future work will include correlating the robustness coeffi- ternational Conference on Design Theory and Methodol-
cient with the actual performance of the system to determine ogy, ASME Press, pp. DETC2012–70542.

10 c 2013 by ASME
Copyright
[7] Brummitt, C. D., D’Souza, R. M., and Leicht, E. A., tained targeted attacks”. In 2012 IEEE/ACM International
2012. “Suppressing cascades of load in interdependent net- Conference on Advances in Social Networks Analysis and
works”. Proceedings of the National Academy of Sciences, Mining, IEEE Computer Society.
109(12), pp. E680–E689. [21] Kim, C., and Choi, K. K., 2008. “Reliability-based design
[8] Parshani, R., Buldyrev, S. V., and Havlin, S., 2010. “Inter- optimization using response surface method with predic-
dependent networks: Reducing the coupling strength leads tion interval estimation”. Journal of Mechanical Design,
to a change from a first to second order percolation transi- 130(12), p. 121401.
tion”. Phys. Rev. Lett., 105, Jul, p. 048701. [22] Tu, J., Choi, K. K., and Park, Y. H., 1999. “A new study on
[9] Buldyrev, S. V., Parshani, R., Paul, G., Stanley, H. E., and reliability-based design optimization”. Journal of Mechan-
Havlin, S., 2010. “Catastrophic cascade of failures in inter- ical Design, 121(4), pp. 557–564.
dependent networks”. Nature, 464(7291), pp. 1025–1028. [23] Youn, B. D., Hu, C., and Wang, P., 2011. “Resilience-
10.1038/nature08932. driven system design of complex engineered systems”.
[10] Albert, R., Jeong, H., and Barabási, A.-L., 2000. “Error and Journal of Mechanical Design, 133(10), pp. 101011–15.
attack tolerance of complex networks”. Nature, 406(6794), [24] Costa, L. d. F., Rodrigues, F. A., Travieso, G., and Vil-
pp. 378–382. las Boas, P. R., 2007. “Characterization of complex net-
[11] Bagrow, J. P., Lehmann, S., and Ahn, Y.-Y., 2011. “Robust- works: A survey of measurements”. Advances in Physics,
ness and modular structure in networks”. ArXiv e-prints, 56(1), pp. 167–242.
arXiv:1102.5085. [25] Dorogovtsev, S. N., and Mendes, J. F. F., 2003. Evolution of
[12] Ash, J., and Newth, D., 2007. “Optimizing complex net- Networks: From Biological Nets to the Internet and WWW.
works for resilience against cascading failure”. Physica A: Oxford University Press, Oxford, January.
Statistical Mechanics and its Applications, 380, pp. 673– [26] Piraveenan, M., Prokopenko, M., and Zomaya, A. Y.,
683. 2008. “Local assortativeness in scale-free networks”. Eu-
[13] Wang, S.-J., and Zhou, C., 2012. “Hierarchical modular rophysics Letters, 84(2), p. 28002.
structure enhances the robustness of self-organized critical- [27] Piraveenan, M., Prokopenko, M., and Zomaya, A. Y., 2007.
ity in neural networks”. New Journal of Physics, 14(2), “Information-cloning of scale-free networks”. In Advances
p. 023005. in Artificial Life: 9th European Conference on Artificial
[14] Hölttä, K., Suh, E. S., and de Weck, O., 2005. “Tradeoff be- Life (ECAL-2007), Lisbon, Portugal, F. A. e Costa, L. M.
tween modularity and performance for engineered systems Rocha, E. Costa, and A. C. I. Harvey, eds., Vol. 4648 of
and products”. In International Conference on Engineer- Lecture Notes in Artificial Intelligence. Springer, pp. 925–
ing Design (ICED05), A. Samuel and W. Lewis, eds., The 935.
Design Society, p. DS35 60.1. [28] Braha, D., and Bar-Yam, Y., 2007. “The statistical mechan-
[15] Gershenson, J. K., Prasad, G. J., and Zhang, Y., 2003. ics of complex product development: Empirical and analyt-
“Product modularity: Definitions and benefits”. Journal ical results”. Management Science, 53(7), pp. 1127–1145.
of Engineering Design, 14(3), pp. 295 – 313. [29] Sosa, M. E., Mihm, J., and Browning, T., 2011. “Degree
[16] Ishii, K., and Yang, T. G., 2003. “Modularity: International distribution and quality in complex engineered systems”.
industry benchmarking and research roadmap”. In ASME Journal of Mechanical Design, 133(10), p. 101008.
2003 International Design Engineering Technical Confer- [30] Piraveenan, M., Prokopenko, M., and Zomaya, A. Y.,
ences and Computers and Information in Engineering Con- 2012. “Assortative mixing in directed biological networks”.
ference (IDETC/CIE2003), Vol. 3a: 8th Design for Manu- IEEE/ACM Transactions on computational biology and
facturing Conference, ASME, pp. 1–11. bioinformatics, 9(1), pp. 66–78.
[17] Ethiraj, S. K., and Levinthal, D., 2004. “Modularity and [31] Gao, J., Buldyrev, S. V., Havlin, S., and Stanley, H. E.,
innovation in complex systems”. Management Science, 2011. “Robustness of a network of networks”. Phys. Rev.
50(2), pp. 159–173. Lett., 107, Nov, p. 195701.
[18] Ethiraj, S. K., Levinthal, D., and Roy, R. R., 2008. “The [32] Valverde, S., Cancho, R. F., and Solé, R. V., 2002. “Scale-
dual role of modularity: Innovation and imitation”. Man- free networks from optimal design”. EPL (Europhysics Let-
agement Science, 54(5), pp. 939–955. ters), 60(4), p. 512.
[19] Piraveenan, M., Thedchanamoorthy, G., Uddin, S., and [33] Sarkar, S., and Dong, A., 2011. “Characterizing modu-
Chun, K. S. K., In Review. “Quantifying topological ro- larity, hierarchy and module interfacing in complex design
bustness of networks under sustained targeted attacks”. So- systems”. In ASME 2011 International Design Engineering
cial Network Analysis and Mining. Technical Conferences and Computers and Information in
[20] Piraveenan, M., Uddin, S., and Chung, K. S. K., 2012. Engineering Conference (IDETC/CIE2011), Vol. 9: 23rd
“Measuring topological robustness of networks under sus- International Conference on Design Theory and Method-

11 c 2013 by ASME
Copyright
ology; 16th Design for Manufacturing and the Life Cycle
Conference, ASME, pp. 375–384.
[34] Barabási, A.-L., and Albert, R., 1999. “Emergence of scal-
ing in random networks”. Science, 286(5439), pp. 509–
512.
[35] Valverde, S., and Solé, R. V., 2005. “Network motifs in
computational graphs: A case study in software architec-
ture”. Phys. Rev. E, 72, p. 026107.
[36] Sosa, M. E., Eppinger, S. D., and Rowles, C. M., 2003.
“Identifying modular and integrative systems and their im-
pact on design team interactions”. Journal of Mechanical
Design, 125(2), pp. 240–252.
[37] Sabidussi, G., 1966. “The centrality index of a graph”. Psy-
chometrika, 31(4), pp. 581–603.
[38] Albert, R., Jeong, H., and Barabási, A.-L., 2000. “Error
and attack tolerance of complex networks”. Nature, 406,
pp. 378–382.
[39] Crucittia, P., Latora, V., Marchiori, M., and Rapisarda, A.,
2004. “Error and attack tolerance of complex networks”.
Physica A, 340, p. 388394.
[40] Dekker, A. H., and Colbert, B. D., 2004. “Network ro-
bustness and graph topology”. In Proceedings of the 27th
Australasian conference on Computer science - Volume 26,
ACSC ’04, Australian Computer Society, Inc., pp. 359–
368.

12 c 2013 by ASME
Copyright
Proceedings of the 2013 ASME International Design Engineering Technical Conferences &
Computers and Information in Engineering Conference
IDETC/CIE 2013
August 4-7, 2013, Portland, Oregon, USA

DETC2013-12188
arXiv:1310.1050v1 [cs.DC] 27 Sep 2013

DRAFT: THE FAILURE TOLERANCE OF MECHATRONIC SOFTWARE SYSTEMS TO


RANDOM AND TARGETED ATTACKS

Dharshana Kasthurirathna Andy Dong ∗


Centre for Complex Systems Research Faculty of Engineering & Information Technologies
Faculty of Engineering & Information Technologies University of Sydney
University of Sydney Sydney, NSW, 2006, Australia
Sydney, NSW, 2006, Australia andy.dong@sydney.edu.au
dkas2394@uni.sydney.edu.au

Mahendrarajah Piraveenan Irem Y. Tumer


Centre for Complex Systems Research Complex Engineered Systems Design (CESD) Laboratory
Faculty of Engineering & Information Technologies School of Mechanical, Industrial, & Manufacturing Engineering
University of Sydney Oregon State University
Sydney, NSW, 2006, Australia Corvallis, OR 97331-6001
mahendrarajah.piraveenan@sydney.edu.au irem.tumer@oregonstate.edu

ABSTRACT are not significantly more failure-tolerant than a random archi-


This paper describes a complex networks approach to study tecture of interconnections. Our research provides a data-driven
the failure tolerance of mechatronic software systems under var- approach to engineer the architecture of mechatronic software
ious types of hardware and/or software failures. We produce syn- systems for failure tolerance.
thetic system architectures based on evidence of modular and hi-
erarchical modular product architectures and known motifs for
the interconnection of physical components to software. The sys- 1 Introduction
tem architectures are then subject to various forms of attack. The While mechatronic systems, that is, mechanical systems
attacks simulate failure of critical hardware or software. Four controlled by or having software embedded in them, have been
types of attack are investigated: degree centrality, betweenness in operation for quite some time, the understanding of the fail-
centrality, closeness centrality and random attack. Failure tol- ure properties of integrated mechatronic software systems has
erance of the system is measured by a ‘robustness coefficient’, not kept up with their adoption. The unexplained failure of these
a topological ‘size’ metric of the connectedness of the attacked systems, including heretofore recently unexplained ones such as
network. We find that the betweenness centrality attack results in the sudden uncommanded pitch-down manoeuvres of a Qantas
the most significant reduction in the robustness coefficient, con- Airbus A330 over Western Australia in 2008, have raised the pri-
firming betweenness centrality, rather than the number of con- ority of understanding the complex interactions between hard-
nections (i.e. degree), as the most conservative metric of compo- ware and software in mechatronic software systems. Of concern
nent importance. A counter-intuitive finding is that “designed” in this paper is the performance of the overall mechatronic soft-
system architectures, including a bus, ring, and star architecture, ware system due to failures in hardware components or software
code.

∗ Address all correspondence to this author. 1 c 2013 by ASME


Copyright
As engineered mechatronic systems become more architec- system. Specifically, it is not known if the failure properties of
turally complex, which is to say, have an increasingly complex the physical system due to the physical architecture and the soft-
physical product architecture [?] and a complex set of inter- ware system due to its software architecture should be studied
relations with software code, the study of the tolerance of these individually or whether the failure properties are, in a sense, an
systems to failures of physical components and software be- additive sum of the two architectures combined. To investigate
comes increasingly challenging. Abstracting such systems from the failure of a combined mechatronic software system, we take
the viewpoint of energy flow between components seems to be the product architecture of hardware and software architecture,
the preferred method of modelling and analysis. study their individual failure properties, and then study the fail-
Design methods such as the Function-Failure Design ure properties of the two interdependent networks using a topo-
Method [?] and the Functional Failure Identification and Prop- logical metric known as a ‘robustness coefficient’ [?, ?].
agation (FFIP) analysis framework [?, ?, ?] have begun to adopt
graph-based approaches. Methods for hazard identification such
as the model-based failure identification and propagation (MFIP) 2 Background
framework similarly identify components likely to fail when a Until recently, the study of the failure of complex engineered
hazard is propagated from one component to another [?]. The systems had focused on the reliability of individual components
basic idea underlying these approaches is to model the function and on simulating the performance of the system under various
of components and the flow of energy between them as a net- input conditions in order to understand system-wide effects of in-
work, and then to identify the failure propagation through the net- put variability [?,?, e.g.]. Extending from this base of reliability-
work. We extend this basic idea to study mechatronic software based system design, engineering design researchers have begun
systems as interdependent networks [?, ?], wherein the physical to direct their efforts toward the robustness of complex engi-
architecture of the hardware and the software (code) architecture neered systems so as to engineer systems that are able to recover
are modelled as interacting networks. We study the topological from disturbances and failures to continue functioning within the
properties of interdependent mechatronic software networks as- expected performance envelope [?]. At the core of these meth-
sociated with system tolerance to failure of components because ods, though, is a focus on the component and the influence of
the topology of complex networks is known to influence the be- the component on the failure of the system, or on the external
haviour of the network in response to the failure or modification conditions and their causal influence on the failure of the system
of nodes [?]. vis-à-vis the components.
The importance of studying the failure of systems based Recent research evidence emanating from the field of com-
upon the topology of its hardware and software architecture has plex networks suggests that the vulnerability of a system is at
become even more important due to recent observations that least equally dependent upon the architecture of the system,
modular systems tend to have low robustness even under increas- which takes into account the connectivity of the components,
ing robustness of individual components [?]. Modular systems as the components themselves. Research in the field of com-
have high robustness only when the failure of components can plex networks has shown that not all network topologies dis-
be isolated to its module or when alternative (redundant) path- play equivalent properties of failure tolerance to errors in nodes
ways between components can be designed in [?]. Designing (components). In other words, some networks exhibit topologi-
a complex system as a single large module with a high density cal weakness. Scale-free networks, that is, networks wherein a
of connections is not always practical though. Conversely, the few nodes have a high number of connections but most nodes
hierarchical modular structure of brain networks has been ob- have very few connections to other nodes, have a high degree
served to enhance the brain’s robustness, but too much modular- of tolerance against the random failure of nodes [?]. Braha and
ity reduces its functionality [?], which is consistent with obser- Bar-Yam similarly find that the dynamic behaviour of inhomoge-
vations on the loss of performance in highly modular engineered nous networks is resilient to random failures of nodes but highly
systems [?]. We cite these references against the backdrop of sensitive to modifications to essential nodes [?]. Similarly, sys-
a preference for increasingly modular physical architectures in tems containing hubs have been found to have higher levels of
complex engineered products [?, ?] despite loss of performance quality [?], suggesting that systems having scale-free properties
improvement [?] and making it easier for competitors to copy de- may be preferred over their small-world or exponential (homoge-
signs [?]. Thus, the recommendation and preference for modular nous) degree counterparts when it comes to tolerance to random
physical system architectures may have the unintended downside failures or modifications to nodes. This failure tolerance is not
of making the systems less tolerant to failure. true of other network topologies such as random networks or ho-
In summary, although great efforts are taken to engineer re- mogeneous networks, wherein most nodes have approximately
liable physical components and error-free software code, little is the same number of links to other nodes. However, the scale-free
known about the compound effect of system connectivity and in- networks also lose connectivity quickly when the most important
dividual failures within each system on the mechatronic software nodes fail, which means that the network becomes fragmented

2 c 2013 by ASME
Copyright
into isolated nodes and communities of nodes. In an engineered
system, this could be equivalent to total system failure, especially A B
if the functional network is disconnected, since the system would
no longer behave as designed, or if a critical module is separated
from the rest of the system.
Mechatronic software systems represent a more interesting
and qualitatively different type of network though, one which
is more ‘naturally’ represented as two interdependent networks, C D
a hardware network (physical architecture) and a software net-
work (software architecture). The hardware network is partially
dependent upon the software network, which operates the con-
trol logic for the hardware. In turn, the software is also par-
tially dependent upon the hardware for power, sensing, and actu-
ation. These dependencies can make the system vulnerable to an FIGURE 1. THE INTEGRATION OF THE ADJACENCY MA-
avalanche of failures because a failure in the hardware cascades TRICES OF MECHATRONIC SOFTWARE SYSTEM ARCHITEC-
and causes failure in the software, which in turn may produce TURES
erratic control signals that produce abnormal behaviour by the
hardware and so on. Recent theoretical research on interdepen- with a rewiring probability p. By varying p, we obtain networks
dent networks shows altogether different failure behaviours for that have varying modularity levels.
interdependent networks than for single networks. Inhomoge- Similarly, we produce synthetic, scale-free software net-
nous degree distributions increase the vulnerability of interde- works. Software architecture have been demonstrated to show
pendent networks to random failure [?], meaning that the advan- scale-free behaviour despite design strategies associated with
tage of an inhomogeneous single network becomes a disadvan- software engineering preferring tree-like structures [?]. Prefer-
tage for interdependent networks. Likewise, cascading failures ential attachment based generator models can be used to pro-
occur in interdependent networks when nodes in each network duce scale-free networks [?]. Therefore, we generated synthetic
mutually depend on nodes in other networks such that that fail- scale-free software networks based upon preferential attachment.
ures can cascade back and forth between the networks [?]. The preferential attachment may represent software dependen-
Based upon these critical observations on the failure prop- cies at different granularity levels such as class graphs or function
erties of interdependent layered networks, this paper addresses graphs. These synthetic software networks will be connected to
the failure properties of mechatronic software systems. We syn- the hardware networks in the integrated hardware-software net-
thesise modular and hierarchical modular physical architectures works based upon various connection motifs.
hardware networks, which are frequently found in product archi- The next part of the research focuses on producing synthetic
tectures, and scale-free software architectures, based upon theo- hardware-software interdependent networks. We combine the
retical evidence of their presence [?]. We create an interdepen- hardware physical architecture network and software networks
dent layered hardware-software network based on various rules by integrating their adjacency matrices. An adjacency matrix
for their interconnection. We describe the failure properties of represents the edges between nodes in a network using a matrix
the networks based upon a ‘robustness coefficient’ [?,?] and show representation. A binary adjacency matrix A represents whether
how the failure properties differ from the failure properties of in- or not there is an edge (physical architecture relationship) be-
dividual networks. tween nodes i and j as in

3 Research Method 
1 if an edge exists between nodes i and j
3.1 Network synthesis Ai j = (1)
0 otherwise
The initial part of the research focuses on a producing syn-
thetic networks that model real-world product and software ar-
chitectures. The synthetic hardware networks simulate a hard- Fig. 1 shows how a typical mechatronic software system
ware system having modular and hierarchical modular product could be represented in this manner.
architectures, given the preference for modular product architec- In a typical mechatronic software system, the hardware and
tures. To produce modular and hierarchical modular networks, the software system ‘interact’ with each other to form an inte-
we follow the method described by Sarkar and Dong [?]. This grated interdependent network. As such, in our approach, we
methodology involves ‘rewiring’ each edge in a perfectly modu- neither reduce the two networks into a single network nor do we
lar network to take away intra-community edges in each module study them separately. Instead, we integrate the two networks

3 c 2013 by ASME
Copyright
by considering the interactions between them as interdependent TABLE 1. HW–SW ADJACENCY MATRIX BIT PATTERNS
networks. Some hardware components depend upon the software RESEMBLING DIFFERENT EMBEDDED SYSTEM ARCHITEC-
for their behaviour and some software components depend upon TURES
hardware for input data. Architecture Adjacency Pattern
In Fig. 1, the section A represents the hardware product ar- 0 1 0 0 1 0
chitecture network, while D represents the software architecture
1 0 1 0 0 1
network. Accordingly, the B and C adjacency matrix sections
represent the interactions between the hardware components and 0 1 0 1 0 0
Bus
software code, such as between a sensor (hardware) and the soft- 0 0 1 0 0 0
ware code polling the sensor data. The fraction of non-zero val-
ues in B and C describe the fraction of nodes in A that depend 1 0 0 0 0 0
upon D and the fraction of nodes in D that depend upon A, re- 0 1 0 0 0 0
spectively. The total adjacency matrix could be regarded as a
0 1 0 0 0 1
representation of the integrated hardware-software network in a
mechatronic software system. This type of integration would 1 0 1 0 0 0
minimise the loss of information that could occur when reduc- 0 1 0 1 0 0
ing the networks into a single network. At the same time, this Ring
0 0 1 0 1 0
approach would facilitate the studying of a mechatronic software
system as a single system constituted by two separate hardware 0 0 0 1 0 1
and software networks. 1 0 0 0 1 0
We investigate various ways in which the hardware-software
networks could be interdependent. Network motifs have been 0 1 1 1 1 1
used as an indicator of software architectural patterns. For ex- 1 0 0 0 0 0
ample, given a network of software classes, the network motifs 1 0 0 0 0 0
that may exist in that particular network would have a relation- Star
ship to the architectural pattern or the rules that are used in de- 1 0 0 0 0 0
veloping the system [?]. Extending on the same idea, we propose 1 0 0 0 0 0
the usage of network motifs as an implication of the usage of a
1 0 0 0 0 0
particular architecture in mechatronic software system design.
A network motif can be represented by a specific bit pattern
in the hardware-software adjacency matrix. Therefore, by apply-
ing different adjacency patterns to the hardware–software adja- ity, betweenness centrality and closeness centrality based attacks.
cency matrix sections (namely B and C), we could manipulate The ‘attack’ of a node models a hardware or software component
the architecture of the hardware-software system that it resem- no longer behaving within its performance envelope, i.e., compo-
bles. Table 1 shows the adjacency patterns that could be used nent performance satisfies its marginal value [?]. Random attack
to emulate several well-known architectures in mechatronic soft- signifies the failure of components due to gradual degradation.
ware system design. The last three types of attack are based on the premise of delib-
When generating the integrated adjacency matrix, we use the erately attacking the most significant nodes in the network. All
largest single block of each pattern that a mechatronic software these measures characterise the importance of the node to the net-
system adjacency matrix section could accommodate. work, on the basis that the more connected a node is, the more
We followed a similar process to produce a synthetic mecha- important the node is to the network, and that critical subsystems
tronic software system comprised of the physical product archi- share important connections. As there is not necessarily one cor-
tecture network of the Pratt Whitney (PW) aircraft engine [?] and rect metric of node centrality, we investigate three common ones
synthetic software networks. Analysis of this system allows us to to determine which is the most conservative in relation to attack
understand how the principles of failure tolerance of mechatronic tolerance. Degree centrality is based on the degree or the number
software systems might apply in a real-world system. of links that a particular node has. The betweenness centrality is
a measure of the number of paths that pass through a particular
node. Closeness centrality measures how close a particular node
3.2 Topological attacks to the other nodes in the network. Thus, the centrality attacks
Following a general method in complex networks to study provide three mechanisms to simulate the failure of important
the failure tolerance of networks, we ‘attack’ the hardware- components. In each of the centrality based attacks, the node
software network in one of four ways: random, degree central- with the highest centrality value is removed from the network

4 c 2013 by ASME
Copyright
in an iterative manner, until the network becomes fully disinte- 12
grated. In contrast, the removal of a randomly selected node in
each iteration emulates the random failure of components. When

Size of the largest component


10
simulating all these attacks, we make the assumption that the
component failures occur gradually and incrementally, thus we 8
don’t take into account the instances where more than one com- 6
ponent would fail simultaneously.
The betweenness centrality and the closeness centrality are 4
calculated based on well-known algorithms [?]. The Eq. (2)
gives the formal definition of betweenness centrality. 2

1 σs,t (v) -2
(N − 1)(N − 2) s6=∑
BC(v) = (2) -2 0 2 4 6 8 10 12
v6=t σs,t
Number of nodes removed

Here, σs,t is the number of shortest paths between the source FIGURE 2. SIZE OF LARGEST COMPONENT AGAINST THE
node s and the target node t. σs,t (v) is the number of shortest NUMBER OF NODES REMOVED FOR A NETWORK UNDER SUS-
paths between source node s and target node t that lies through TAINED TARGETED ATTACK
node v.
could alter the size of the largest connected component (a group
1 of connected nodes) of the network. For each network, the num-
CC(v) = (3) ber of nodes that has to be removed to disintegrate the network
∑i6=v dg (v, i)
completely would be different. Thus, if the size of the largest
connected component is plotted against the number of nodes re-
Eq. 3 defines how the closeness centrality [?] of a node is
moved, that would give an indication on how resilient the net-
measured. Here, dg (v, i) denotes the shortest path (geodesic) dis-
work is against targeted attacks and random failures. The topo-
tance between nodes v and i. The average is inverted so that the
logical metric provides a proxy for system performance without
node that is closest to the other nodes will have the highest close-
having to calculate the actual system performance, which can be
ness centrality.
computationally expensive unless methods such as response sur-
Degree centrality is directly related to the degree of each
face are applied to estimate performance [?]. As the robustness
node in the network. Thus, DC(v) = deg(v).
coefficient decreases, more of the system is behaving outside of
its marginal value.
3.3 Topological robustness and robustness coeffi- Fig. 2 shows a typical curve that is generated by plotting
cient the size of the largest connected component against the number
The ability of a network to sustain or withstand random fail- of nodes removed. The area under this curve can be regarded
ures or targeted attacks depends on its topological structure. For as a measure of attack tolerance or the topological robustness of
example, scale-free networks have been shown to be more re- a network under sustained attack. By accumulating the areas of
silient against random failures, but are more vulnerable to tar- trapeziums of unitary width along the x-axis, the area under the
geted centrality based attacks, in comparison to Erdös-Rényi ran- curve could be calculated as,
dom networks [?]. Thus, it is important to observe the topolog-
ical robustness of a network to comprehend how its topological
structure would contribute to random node failures or targeted A1 = 0.5(S0 + S1 ) + 0.5(S1 + S2) + ...... + 0.5(SN−1 + SN )
attacks. In this work, we used ‘robustness coefficient’ [?] as the N−1
measure of topological robustness or the attack tolerance in a = 0.5S0 + ∑ Sk + 0.5SN
network. Though there exists numerous other techniques and k=1
measures for measuring topological robustness [?], robustness
coefficient offers a single quantity that holistically captures the where Sk is the size of the largest component after k nodes are
disintegration of a network under sustained attacks. removed.
The calculation of the robustness coefficient utilises the size Here S0 is the initial largest component size. Since SN , the
of the largest connected component in a network. When a net- size of the largest component after N nodes are removed, is by
work is ‘attacked’, or when a particular node is removed, this definition zero, the above expression can be reduced to Eq. 4.

5 c 2013 by ASME
Copyright
12
Size of the largest component

10 N
200 ∑ Sk − 100S0
A1 k=0
8 R= = (7)
A2 N2
6

4 Therefore, the formal definition of the robustness coefficient


can be given as,
2

0
200 ∑Nk=0 Sk − 100S0
R= (8)
-2 N2
-2 0 2 4 6 8 10 12
Number of nodes removed In Eq. 8, Sk is the size of the largest component after k nodes
are removed. S0 denotes the initial largest component size. N
FIGURE 3. SIZE OF LARGEST COMPONENT AGAINST THE is the network size. According to the above calculation, for a
NUMBER OF NODES REMOVED FOR AN IDEALLY ROBUST fully connected network of any size, the robustness coefficient
NETWORK UNDER TARGETED ATTACK (R) would always be 100%.
In order to measure the robustness coefficient under different
types of attacks, the nodes that are removed are selected based
on their centrality values. For example, in a betweenness based
attack, the node that would be removed in each iteration would
N
A1 = ∑ Sk − 0.5S0 (4) be the node with the highest betweenness centrality value, at that
particular instance of the network. Likewise, the other centrality
k=0
based attacks would select the node with the highest value of the
respective centrality measure. In the case of a random attack, a
Fig. 3 shows the ideal curve that could occur in a network randomly selected node would be removed in each iteration.
under attack. In an ideal scenario, with the removal of each node, The interactions between the hardware and software net-
the size of the largest connected component would get reduced in works in a mechatronic system form a separate network among
a linear fashion. The size of the largest component would always the hardware components and their respective software drivers.
decrease only by 1, in each iteration. Since the particular curve The total network that is formed by the hardware component
forms a triangle of base N and height N, the area under it can be architecture network, software network and the interactions of
calculated by, these two networks provide an interesting platform on which the
topological robustness measures such as the robustness coeffi-
cient could be applied. When the hardware-software networks
A2 = (1/2)N 2 (5) evolve over time, due to the changes in requirements or the ad-
dition of new features into the system, the total network topol-
ogy of the original system may become altered in an unexpected
The ratio between the area under the equivalent graph of any manner. How these unexpected topological changes affect the
network and the area under the ideal curve would give a measure topological robustness of the system may not be obvious un-
of the topological robustness of the network of concern. This less a topological robustness analysis of the total system is per-
measure is called the ‘robustness coefficient’ of a network. Thus, formed. Therefore, it is very important to observe the topological
the robustness coefficient R would be, robustness of hardware-software networks using measures such
as the robustness coefficient in order to better understand how
the robustness of the overall system is affected by its topological
N changes.
2 ∑ Sk − S0 Engineering robustness of a system is its ability to perform
A1 k=0
R= = (6) in an acceptable manner under the expected variations of certain
A2 N2 parameters, but also in the presence of unexpected variations in
other unknown parameters. However, the topological robustness
Eq. 7 represents R as a percentage. of a network focuses on sustaining the connectivity of the nodes

6 c 2013 by ASME
Copyright
under random failures or deliberate sustained attacks. Therefore, Engine component network [?]. Since this will be the hardware
engineering robustness can be thought of as a measure of a sys- network that we will subsequently use as part of our hardware-
tem’s ability to maintain its functionality under random failures software integrated network, it was necessary to observe its own
or targeted attacks. On the other hand the topological robustness robustness coefficient measures first. Table 3 shows the robust-
is a measure of a system’s ability to maintain the connectivity ness coefficient results obtained for the Pratt Whitney (PW) Air-
among its components under random failures or targeted attacks craft Engine component network [?] under different types of sus-
from a network analysis point of view. Even though the topo- tained attacks.
logical connectivity may affect a system’s functionality, it is im-
portant to note that there exists a significant difference between
these two perspectives of robustness.
TABLE 3. ROBUSTNESS COEFFICIENT VALUES FOR THE PW
AERO-ENGINE UNDER DIFFERENT TYPES OF ATTACKS
4 Results Type of Attack Robustness Coefficient (%)
4.1 Topological robustness of hardware networks Degree based 85
As the initial part of the research, a comparison of topologi-
Betweenness 68
cal robustness between modular and hierarchical modular archi-
tectures was performed. Table 2 shows the results obtained from Closeness 79
that comparison. The hierarchical modular networks were gener- Random 91
ated using varying rewiring probability (p) values to change the
modularity in each network. Each of these networks tested had
100 nodes with 5 modules.

According to the above results, the PW aircraft engine net-


TABLE 2. ROBUSTNESS COEFFICIENT VALUE COMPARISON work shows higher robustness against random node failures,
OF MODULAR AND HIERARCHICAL MODULAR NETWORKS compared to the centrality based attacks.
Type of Attack Robustness Coefficient (%)
p=0 p = 0.2 p = 0.5 p = 0.8
Degree based 22 93 91 91 4.2 Topological robustness of software networks
Betweenness 22 83 88 88 In order to evaluate a hardware-software network’s be-
haviour under different kinds of attacks, we generated three hy-
Closeness 36 91 94 93 pothetical software networks of varying sizes. The sizes were
Random 24 98 99 97 selected in such a way that they would have approximately 1:2,
1:5 and 1:10 ratios (with the values 100, 250 and 500) to the size
of the PW engine network (54). The isolated nodes were pruned
from the generated networks, which reduced their sizes from the
In the figures given in Table 2, the network generated with
projected values.
p = 0 represents a perfectly modular network and an increasing p
indicates increasing degree of hierarchical modularity. Accord- Software networks have been demonstrated to have a scale-
ing to these results it is evident that the hierarchical modular net- free architecture [?]. Therefore, the software networks were gen-
works show higher degree of topological robustness compared erated using preferential attachment, since preferential attach-
to modular networks under sustained attacks because the fail- ment model is known to generate scale free networks [?]. Ta-
ures can be isolated within a nested module. It is important to ble 4 shows the robustness coefficient values of three scale-free
note that we are referring to the ‘topological robustness’ of a net- software networks that were generated, under different types of
work in contrast to the engineering robustness that may be more attacks.
directly applicable to engineering systems. Generally, engineer- All three hypothetical software networks demonstrate higher
ing systems with higher modularity are regarded as possessing topological robustness against random attacks, compared to cen-
higher engineering robustness, but only when the failure can be trality based attacks. This is comparable with the results obtained
isolated to a single module. Nevertheless, these results provide for the PW engine network, but differs from the modular and hi-
an interesting baseline on topological robustness of an engineer- erarchical modular hardware networks. However, in the software
ing system from a network analysis point of view. networks considered, the margin of difference between topologi-
We performed a topological robustness analysis on the ac- cal robustness under random failures and centrality based attacks
tual hardware component network of the Pratt Whitney Aircraft is much higher than that of the PW engine network.

7 c 2013 by ASME
Copyright
TABLE 4. ROBUSTNESS COEFFICIENT OF SCALE-FREE sible to argue that even though the hardware networks of differ-
SOFTWARE NETWORKS OF DIFFERENT SIZES (N) UNDER DIF- ent modularity levels may show varying topological robustness
FERENT TYPES OF ATTACK characteristics, when they are integrated with scale-free software
Type of Attack Robustness Coefficient (%) networks, the topological robustness of the resulting integrated
N = 95 N = 233 N = 470 networks tend to be uniform in nature. It may be that scale-free
software network dominates the failure characteristic, since the
Degree 26 23 26
scale-free software network is vulnerable to targeted attacks as
Betweenness 23 21 23 shown in Table 4. Apart from that, we can observe that the vari-
Closeness 39 38 39 ation of the number of interconnections (denoted by the different
percentages of adjacency levels) do not have a significant impact
Random 73 71 73 on the robustness coefficient values. This implies that the re-
dundancy of random interconnections between the hardware and
software networks does not necessarily improve the topological
4.3 Topological robustness analysis of hardware- robustness of the resulting integrated network.
software networks Next, we measured the robustness coefficients of several in-
We now test the integration of the hardware and software tegrated hardware-software networks consisting of modular and
networks. We start with a random integration of the modular hierarchical modular synthetic hardware networks and a syn-
and hierarchical modular hardware networks with a scale-free thetic scale-free software network. These networks were inte-
software network, that is, randomly setting the adjacency values grated according to several well-known motifs. A randomly inte-
in C and D of Fig. 1. grated network of a similar adjacency levels was also used for the
comparison. Table 6 shows the results obtained from the mea-
surements. The hardware networks had 100 nodes and 5 mod-
TABLE 5. ROBUSTNESS COEFFICIENTS OF RANDOMLY IN- ules each. The hierarchical modular network was generated with
TEGRATED HW-SW INTEGRATED NETWORKS OF MODULAR
a rewiring probability p of 0.5. The scale-free software network
AND HIERARCHICAL MODULAR HARDWARE NETWORKS used had 470 nodes.
AND A SCALE-FREE SOFTWARE NETWORK UNDER DIFFER-
ENT TOPOLOGICAL ATTACKS
Type of Attack Modular HW–SW HM HW–SW TABLE 6. ROBUSTNESS COEFFICIENTS OF HW-SW IN-
TEGRATED NETWORKS OF MODULAR AND HIERARCHI-
10% 20% 50% 10% 20% 50% CAL MODULAR HARDWARE NETWORKS AND A SCALE-
Degree 47 47 47 47 47 47 FREE SOFTWARE NETWORK, INTEGRATED WITH HETEROGE-
NEOUS ARCHITECTURES, UNDER DIFFERENT TOPOLOGICAL
Closeness 59 60 60 58 59 60
ATTACKS
Betweenness 45 47 45 45 45 45 Type of Attack Modular HW–SW
Random 98 98 99 97 99 99 Bus Ring Star Random
Degree 38 32 39 38

Table 5 shows the robustness coefficient values of randomly Closeness 47 55 47 50


integrated modular and hierarchical modular synthetic hardware Betweenness 23 15 22 29
networks with a synthetic scale-free software network. The hard- Random 75 76 76 80
ware networks that were used had 100 nodes each, containing ex-
actly 5 modules. The rewiring probability p used for generating Type of Attack HM HW–SW
the hierarchical modular network was 0.5. The software network Bus Ring Star Random
that was used had 470 nodes. Three different adjacency proba-
Degree 38 39 31 39
bilities (10, 20 and 50%) were considered when integrating the
networks. Closeness 52 53 52 51
The results do not show a significant difference between the Betweenness 25 25 17 31
two different types of integrated networks, that is, no advantage
for hierarchical modular network. In contrast, the modular and Random 78 83 77 78
hierarchical modular hardware networks demonstrated a signifi-
cant difference in topological robustness in favour of hierarchical
modular as per the results shown in the table 2. Thus, it is pos- The robustness coefficient values given in the Table 6 show

8 c 2013 by ASME
Copyright
that when a hierarchical modular hardware network is integrated TABLE 7. ROBUSTNESS COEFFICIENTS OF HW-SW INTE-
with a scale-free software network, bus and ring architectures GRATED NETWORKS OF VARYING RANDOM ADJACENCY
would generally introduce more topological robustness com- LEVELS, UNDER DIFFERENT TYPES OF ATTACKS
pared to the star architecture. Apart from that, the random in- Type of Attack HW (N = 54) SW (N = 95)
tegration gives similar robustness coefficient values, implying 10% 20% 50%
that following a specific architecture when integrating the hard-
ware and software networks does not significantly improve the Betweenness Attack 65 68 68
resulting network’s topological robustness. This would indicate Closeness Attack 74 80 75
that the “designed” system architecture does not show signifi-
Degree Attack 67 69 70
cantly higher robustness than the random integration of compa-
rable sized networks. Also, when a hierarchical modular hard- Random Attack 95 98 99
ware network is used, the ring and bus architectures would not Type of Attack HW (N = 54) SW (N = 233)
substantially improve the topological robustness of the resulting
10% 20% 50%
integrated network.
Finally, we integrate the PW engine hardware network with Betweenness Attack 47 48 48
the hypothetical scale-free software networks. First we tested Closeness Attack 59 58 59
random integration. This was done by randomly populating the
hardware-software adjacency matrix sections C and D of Fig. Degree Attack 49 50 50
1. Three different percentages (10, 20 and 50%) of probability Random Attack 95 98 99
of connection in the adjacency matrix sections were considered.
Type of Attack HW (N = 54) SW (N = 470)
Then, the robustness coefficients of the resulting integrated net-
works were measured. Table 7 shows the results of those mea- 10% 20% 50%
surements. Betweenness Attack 35 35 35
All the integrated networks show higher topological robust-
ness against random failures compared to targeted centrality Closeness Attack 50 51 52
based attacks. Another important observation that can be made is Degree Attack 37 37 37
that when the software network used increases in size, the respec- Random Attack 96 98 99
tive hardware-software network’s topological robustness against
centrality based attacks tends to decrease. In other words, as
the amount of code increases, the overall system tolerance to TABLE 8. ROBUSTNESS COEFFICIENTS OF HW-SW NET-
failure decreases. However, the software network size does not WORKS OF HETEREOGENEOUS ARCHITECTURES, UNDER
seem to affect the topological robustness of the integrated net- DIFFERENT TYPES OF ATTACKS
work against random failures. Type of Attack Ring Bus Star Random
Another key observation that could be made out of this com-
Betweenness Attack 27 27 17 32
parison is that the increase in the adjacency level does not seem
to affect the topological robustness of the integrated network in a Closeness Attack 50 46 48 50
substantial manner. Though more connections among the hard- Degree Attack 37 37 27 38
ware and software layers increase redundancy, it does not seem
Random Attack 79 75 77 78
to positively affect the topological robustness of the hardware-
software network.
Finally, we combined the PW hardware network and the
software networks according to different well-known architec- tecture. Another interesting observation that can be made is how
tures by following the adjacency matrix patterns given in Table 1. the randomly integrated network manages to demonstrate com-
Table 8 shows the robustness coefficient values of the hardware- parable topological robustness, under all types of attacks. This
software networks that were obtained under different architec- may suggest that following a particular architecture in hardware-
tures, against different types of attacks. The software network software integration may not result in a substantial improvement
used has a network of node count 233. A randomly integrated in the topological robustness of the integrated network.
network with a similar adjacency level was also used for the com-
parison.
Based on the results given in Table 8, it is possible to argue 5 Discussion and Conclusion
that the ring and bus architectures show better topological robust- This paper introduced a complex networks approach to cal-
ness against centrality based attacks, compared to the star archi- culate the failure tolerance of mechatronic software systems to

9 c 2013 by ASME
Copyright
the failure of critical hardware components and software code
(functions and classes). We used a novel approach in modelling
the integration of interdependent hardware component networks
and software networks in mechatronic software systems, accord-
ing to different system architectures. Calculation of the robust-
ness of the system is based on a robustness coefficient, which
is a topological measure of the size and connectedness of the
network. We investigated the robustness of several synthetic
hardware-software networks comprised of modular and hierar-
chical modular product architectures and scale-free software ar-
chitectures connected randomly or through known connection
architectures and a synthetic network comprised of a Pratt and
Whitney aero-engine and a scale-free software network. In all
instances, the results show that random integration of the product
architecture to the software code results in comparably resilient
hardware-software systems compared to the designed counter-
parts of star, bus, and ring architectures. This result implies that
the attempts to optimise system connectivity through certain ar-
chitectures may not necessarily make the system more resilient to
topological failure. Centrality-based attacks produced the most
failure in the hardware-software system (most significant reduc-
tion in robustness coefficient), with betweenness centrality at-
tacks producing the most significant effects. The scale-free ar-
chitecture of software networks strongly determined the vulner-
ability of the hardware-software system, thus highlighting the
importance of producing error-free code but also bringing into
question the suitability of software code with highly dependent
functions and classes in mission-critical systems.
Future work will include correlating the robustness coeffi-
cient with the actual performance of the system to determine
more accurately whether the robustness coefficient could serve
as a useful and efficient proxy for system performance, given
the computational complexity involved in simulating the perfor-
mance of a complex system. As well, we will investigate new de-
sign methods for ‘wiring up’ product architectures to their soft-
ware controllers with the aim of improving the overall resilience
of the system as a first-class concern. The complex networks ap-
proach applied in this research can be used for future work in
understanding the failure tolerance of complex engineering sys-
tems as interdependent networks.

ACKNOWLEDGMENT
Andy Dong is the recipient of an Australian Research Coun-
cil Future Fellowship (project number FT100100376).

10 c 2013 by ASME
Copyright

You might also like