Next Article in Journal
Hybrid Statistical–Metaheuristic Inventory Modeling: Integrating SARIMAX with Skew-Normal and Zero-Inflated Errors in Clinical Laboratory Demand Forecasting
Previous Article in Journal
Development of a Global Maximum Power Point Tracker for Photovoltaic Module Arrays Based on the Idols Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Extremely Optimal Graph Research for Network Reliability

1
School of Computer, Qinghai Normal University, Xining 810016, China
2
State Key Laboratory of Tibetan Intelligent, Qinghai Normal University, Xining 810008, China
3
Graduate School of Engineering, Nagasaki Institute of Applied Science, Nagasaki 851-0193, Japan
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(18), 3000; https://doi.org/10.3390/math13183000
Submission received: 18 August 2025 / Revised: 4 September 2025 / Accepted: 8 September 2025 / Published: 17 September 2025
(This article belongs to the Section C: Mathematical Analysis)

Abstract

Network reliability refers to a probabilistic measure of a network system’s ability to maintain its intended service functionality within a specified time interval and under given operating conditions. Let Ω ( n , m ) be the set of all simple two-terminal networks on n vertices and m edges. If each edge operates independently with the same fixed probability p [ 0 , 1 ] , then the two-terminal reliability, denoted by R 2 ( G , P ) ) , is the probability that there exists a path between two target vertices s and t. For a given number of vertices n and edges m, there are some graphs within Ω ( n , m ) that have higher reliability than others, and these are known as extremely optimal graphs. In this work, we determine the sets of extremely optimal graphs in two classes of two-terminal network with sizes m = n ( n 1 ) ) 2 2 and m = n ( n 1 ) ) 2 3 , consisting of 2 and 5 networks, respectively. Moreover, we identify one class of graphs obtained by deleting some edges among non-target vertices in the complete two-terminal graph, and we count the number of graphs of this class with size n ( n 1 ) 2 n 2 2 m n ( n 1 ) ) 2 1 by applying the Pólya counting principle.

1. Introduction

Network reliability refers to the probability that a network system maintains connectivity between specified nodes under given conditions, typically modeled using probabilistic graph theory that accounts for random failures of edges or nodes [1]. Primary evaluation approaches include exact analytical methods based on minimal path/cut sets, Monte Carlo simulation for large-scale networks, and graph-theoretical methods that identify optimal network configurations through extremal theory. This research provides a theoretical foundation for fault-tolerant network design and has significant application value in fields such as communication networks and distributed systems.
In the study of an optimal network based on extremal theory, the exploration of extremely optimal graphs holds significant theoretical value and application prospects. These graph structures can achieve the theoretical limits of network reliability under given constraints, providing benchmark references for the performance upper bounds in network design. Currently, research in this field remains in its infancy, having extremely limited existing results. The available literature focuses primarily on all-terminal reliability scenarios, which investigate the properties of extremal graphs that ensure connectivity among all the nodes in a network. However, there is a notable lack of systematic research on two-terminal reliability scenarios, which is a more practically valuable context in engineering applications. By advancing the study of extremely optimal graphs in two-terminal networks, this research will propel the expansion of network reliability theory from all-connected scenarios to more targeted point-to-point connectivity scenarios, carrying substantial academic innovation value and engineering application significance.
Let G = ( V ( G ) , E ( G ) ) be a two-terminal graph, where V ( G ) is the vertex set and E ( G ) is the edge set. An s t -path set in the two terminal graph G is a set of edges in E ( G ) that contains a path from the vertices s to t. In this work, we are only concerned with simple graphs. In fact, determining exact values for the size of an s t -path set is a difficult problem [2,3].
The above model—a two-terminal graph—can be applied to observe the two-terminal reliability of a network. If each edge of such a graph operates independently with the same fixed probability p [ 0 , 1 ] , the two-terminal reliability, denoted by R 2 ( G , P ) ) , is the probability that there exists a path between the target vertices. Much of the work in this field focuses on identifying bounds on the coefficients of two-terminal reliability polynomials [4,5,6]. A two-terminal graph G Ω ( n , m ) is said to be uniformly most reliable or uniformly optimal in Ω ( n , m ) , if R 2 ( G , p ) R 2 ( H , p ) for all p [ 0 , 1 ] and all H in Ω ( n , m ) . However, a uniformly optimal graph does not always exist [7]. The problem of graph reliability is then considered from another perspective [8] by asking whether we can find an extremely optimal graph set in which the reliability of any other graph is less than that of each graph in this set for all p [ 0 , 1 ] . We must consider the existence of a uniformly optimal graph and the determination of an extremely optimal graph set. If such a graph exists, then it is clearly the only graph contained in the corresponding extremely optimal graph set. Much similar research has been performed [9,10,11,12,13].
For all-terminal graphs, Zhao [8] proved that when n 8 was even, the cardinalities of the extremely optimal graph set for the graph family Ω ( n , n ( n 1 ) ) 2 n + 2 2 ) and Ω ( n , n ( n 1 ) ) 2 n + 4 2 ) were 2 and 6, respectively, and when n 8 was odd, the cardinality of the extremely optimal graph set for the graph family Ω ( n , n ( n 1 ) ) 2 n + 3 2 ) was 4. In the case of two-terminal graphs, their extremely optimal graphs are different from those of all-terminal graphs. Two-terminal graphs have been used in real-world applications such as transportation networks [14,15,16,17], but there are few results on this topic.
In [18], the authors determined the uniformly optimal graph of the two-terminal network Ω ( n , n ( n 1 ) ) 2 1 ) and proved that, when n ( n 1 ) 2 n 2 2 m n ( n 1 ) ) 2 4 , there was no uniformly optimal graph in the corresponding network. In this work, we expand the study to extremely optimal graphs with the same conditions as above. In other words, utilizing the related theory of two-terminal graphs, extremely optimal graph sets are found for the cases of m = n ( n 1 ) ) 2 2 and m = n ( n 1 ) ) 2 3 . Moreover, we determine a type of graph obtained by deleting some edges among non-target vertices in the complete two-terminal graph, and we apply the Pólya counting principle to count the number of graphs in this class with size n ( n 1 ) 2 12 m n ( n 1 ) ) 2 1 .
This study of extremely optimal networks provides novel theoretical perspectives and optimization pathways for the analysis of network reliability. These graph structures exhibit optimal reliability characteristics under specific constraints, enabling researchers to circumvent the challenge of seeking “universally optimal solutions”. By analyzing the topological properties of extremely optimal graphs, we can not only uncover the intrinsic principles of highly reliable networks but also develop actionable optimization frameworks for practical network design. Through rigorous mathematical proofs and extensive numerical experiments, this research systematically establishes the evaluation criteria and construction methods for extremely optimal graphs. The findings have significant guiding value for engineering practices such as survivability design in communication networks and redundancy configuration in power systems, particularly to improve the resilience of critical infrastructure against random failures and targeted attacks.

2. Existence of the Extremely Optimal Network

For any simple graph G with n vertices and m edges, the two-terminal reliability polynomial can be defined as
R 2 ( G , p ) = i = 1 m N i p i ( 1 p ) m i
where N i is the number of s t -path sets with size i in G for each i { 1 , 2 , , m } , and p [ 0 , 1 ] is the probability that its edges operate independently.
Definition 1
([8]). Let n and m be positive integers. If there are graphs  G 1 , G 2 , , G a , such that  R G i , p R ( G , p ) , for each  1 i a  and all G in  Ω ( n , m ) , then  G 1 , G 2 , , G a  is an extremely optimal graph set of  Ω ( n , m ) .
For simplicity, if the graphs G , H Ω ( n , m ) satisfy R ( G , p ) > R ( H , p ) , then denote this by G H .
Definition 2
([18]). Let  n 4  and  m = n ( n 1 ) ) 2 1  be positive integers.
1 
Define  X n  as the two-terminal graph on n vertices and m edges with vertex set  V X n = s = x 1 , x 2 , , x n = t , and edge set  E X n = x i x j : 1 i < j n { s t } ;
2 
Define  Y n  as the two-terminal graph on n vertices and m edges with vertex set  V Y n = s = y 1 , y 2 , , y n = t , and edge set  E Y n = y i y j : 1 i < j n s y 2 ;
3 
Define  Z n  as the two-terminal graph on n vertices and m edges with vertex set  V Z n = s = z 1 , z 2 , , z n = t , and edge set  E Z n = z i z j : 1 i < j n z 2 z 3 .
The above three graphs are shown in Figure 1, where the red edges represent the deleted edges, and the blue edges represent the independently operable edges, and the Figure 2, Figure 3, Figure A1 and Figure A2 in the following text represent the same meaning. Furthermore, the pseudo-code for the algorithm of network two-terminal reliability is provided in Appendix A.
As previously noted, when removing two or three edges from a complete graph, there is no uniformly optimal graph in the graph family Ω ( n , m ) [5]. Based on the above case, the existence of the extremely optimal graphs and the determination of the minimal extremely optimal graph set will be considered as follows.
Theorem 1
([18]). Let  n 8  and  2 r n ( n 1 ) ) 2  be positive integers. If  m = n ( n 1 ) ) 2 r , then there is no uniformly most reliable two-terminal graph in  Ω ( n , m ) .
To determine the existence of an extremely optimal graph in a graph family Ω ( n , m ) is mainly to analyze the reliability of graphs globally on the interval [ 0 , 1 ] . The reliability of each graph in the extremely optimal graph set is greater than that of any other graph in the same graph family. Later, we analyze the extremely optimal graph sets of two graph families with m = n ( n 1 ) ) 2 2 and m = n ( n 1 ) ) 2 3 .
Now, we classify all graphs into Ω ( n , m ) according to three types:
  • In an X n -type graph, the edge s t and the other r 1 edges are deleted;
  • In a Y n -type graph, the r edges between the target vertex and non-target vertices are deleted;
  • In a Z n -type graph, the r edges between the non-target vertices are deleted.
Theorem 2.
Let  n 6  be a positive integer and  m = n ( n 1 ) ) 2 2 . Then there are two extremely optimal graphs in  Ω ( n , m ) .
Proof of Theorem 2.
We can construct all the non-isomorphic subgraphs obtained by removing two edges from an n-order complete two-terminal graph, as shown in Figure 2. Based on the above classification, we have the following: Z n -type graphs contain G 1 and G 2 ; Y n -type graphs contain G 3 , G 4 , G 5 , G 6 , and G 7 ; X n -type graphs contain G 8 and G 9 .
To prove that a Z n -type graph is more reliable than any one of the X n -type and Y n -type graphs, we show that there are more s t -path sets with size k ( 1 k m ) in Z n -type graphs than in X n -type graphs and Y n -type graphs by constructing an injection from the s t -path sets of size k in X n -type and Y n -type graphs to the s t -path sets of size k in a Z n -type graph. Thus, we consider the following two cases.
Case 1. A Z n -type graph is more reliable than an X n -type graph. Without loss of generality, we prove that G 1 G 8 .
Let V X n = V G 8 , E X n = E G 8 , V Z n = V G 1 , and E Z n = E G 1 . Now construct an injection φ 1 from the s t -path sets of size k in X n to the s t -path sets of size k in Z n . Let P be the s t -path sets of size k in X n . The following two sub-cases are considered.
Subcase 1.1. Suppose P does not contain an edge x 4 x 5 . Then set φ 1 ( P ) = { z i z j | x i x j P } . Note that the image is an s t -path set in Z n with the same size as P that does not contain edge s t .
Subcase 1.2. Suppose P contains edge x 4 x 5 . Then define φ 1 ( P ) = { z i z j | x i x j P } { s t } { z 4 z 5 } . Note that the image is an s t -path set in Z n with the same size as P that contains edge s t , which is distinct from that in subcase 1.1.
Then φ 1 is an injection and there are at least as many s t -path sets in Z n as in X n . Thus is uniformly more reliable than X n , i.e., G 1 G 8 . Similarly, G i G j , i = 1 , 2 and j = 8 , 9 .
Case 2. A Z n -type graphs is more reliable than a Y n -type graph. Without loss of generality, we can prove that G 2 G 3 .
Let V ( Y n ) = V ( G 3 ) , E ( Y n ) = E ( G 3 ) , V ( Z n ) = V ( G 2 ) and E ( Z n ) = E ( G 2 ) . We construct a mapping φ 2 from an s t -path sets of k in Y n to an s t -path sets of k in Z n . Let P be an s t -path sets of size 1 k m in Y n . We discuss four sub-cases.
Subcase 2.1. Suppose P { y 3 y 4 } does not contain edge y 3 y 4 . Then let φ 2 ( P ) = { z i z j | y i y j P } . The image is an s t -path sets in Z n with the same size as P, which does not contain edge s z 3 .
Subcase 2.2. Suppose P contains edge y 3 y 4 and P { y 3 y 4 } is still an s t -path sets. Then define φ 2 ( P ) = { z i z j | y i y j P } { s z 3 } { z 3 z 4 } . The image is an s t -path sets in Z n with the same size as P which contains edge s z 3 . We can see that φ 2 ( P ) { s z 3 } is still an s t -path sets.
Subcase 2.3. Suppose P contains edge y 3 y 4 and P { y 3 y 4 } is not an s t -path sets but it is a y 3 t -path-set. Then define φ 2 ( P ) = { z i z j | y i y j P } { s z 3 } { z 3 z 4 } . Note that the image is an s t -path sets in Z n with the same size as P, which contains the edge s z 3 . Evidently, φ 2 ( P ) { s z 3 } is not an s t -path sets which is distinct from any one of the images in subcase 2.2.
Subcase 2.4. Now suppose P contains edge y 3 y 4 , P { y 3 y 4 } is not an s t -path sets and it is also not a y 3 t -path-set. Then define
φ 2 ( P ) = { z i z j | 2 i j n , y i y j P } { z 4 z j | s y j P } { s z 3 } { z 3 z 4 } .
Note that φ 2 ( P ) has the same size as P, which is completely disjoint from the image described in subcase 2.3. Since the mapping φ 2 defined in both of these two cases yields disjoint s t -path sets of Z n , it is an injection. Then, there are at least as many s t -path sets of size k in Z n as in Y n , and Z n is uniformly more reliable than Y n . That is, G 2 G 3 .
Similarly, G i G j , i = 1 , 2 and j = 3 , 4 , 5 , 6 , 7 .
Thus, we find that graphs G 1 and G 2 are uniformly more reliable than other graphs in Ω ( n , n ( n 1 ) ) 2 2 ) , which are just the Z n -type graphs.    □
In Figure 3, we plot the two-terminal reliabilities for graphs G 1 , G 2 , G 9 in the case of n = 6 , m = 13 .
In Figure 3, we clearly see that the curves corresponding to G 1 and G 2 are at the top. Furthermore, we consider the case of removing three edges from a complete two-terminal graph, which will appear as more non-isomorphic subgraphs. However, the extremely optimal graphs can still be found in the same way. Therefore, we obtain Theorem 3.
Theorem 3.
Let  n 8  be a positive integer and  m = n ( n 1 ) ) 2 3 . Then there are five extremely optimal graphs in  Ω ( n , m ) .
Proof of Theorem 3.
All the non-isomorphic graphs obtained by removing three edges from an n-order complete two-terminal graph can be constructed, as shown in Figure 4. We have:
Z n -type graphs containing G 1 , G 2 , G 3 , G 4 , G 5 ;
Y n -type graphs containing G 6 G 21 ;
X n -type graphs containing G 22 G 28 .
We can also construct two injections from the s t -path sets of size k  ( 1 k m ) in X n -type and Y n -type graphs to s t -path sets of size k in Z n -type graphs.
Case 1. A Z n -type graph is more reliable than an X n -type graph. Without loss of generality, we prove that G 3 G 22 .
Let V X n = V G 22 , E X n = E G 22 , V Z n = V G 3 and E Z n = E G 3 . We construct an injection θ 1 from an s t -path sets of size k in X n to the s t -path sets of size k in Z n . Let Q be the s t -path sets of size k in X n . We consider two subcases.
Subcase 1.1. Suppose Q does not contain edge x 4 x 5 . Then let θ 1 ( Q ) = { z i z j | x i x j Q } . Note that the image is an s t -path sets in Z n with the same size as Q, which does not contain edge s t .
Subcase 1.2. Suppose Q contains edge x 4 x 5 . Then define θ 1 ( Q ) = { z i z j | x i x j Q } { s t } { z 4 z 5 } . The image is an s t -path sets in Z n with the same size as Q, which contains the edge s t . Thus, the image is distinct from those in subcase 1.1.
Then θ 1 is an injection and there are at least as many s t -path sets in Z n as in X n . Thus, Z n is uniformly more reliable than X n , i.e., G 3 G 22 . We can prove the following results analogous to the proof of Theorem 2. It holds that G i G j , i = 1 , 2 , 4 , 5 and j = 23 , 24 , , 28 .
Case 2. A Z n -type graph is more reliable than a Y n -type graph. In this case, without loss of generality, we prove that G 4 G 7 .
Let V ( Y n ) = V ( G 7 ) , E ( Y n ) = E ( G 7 ) , V ( Z n ) = V ( G 4 ) , and E ( Z n ) = E ( G 4 ) . We construct a mapping θ 2 from an s t -path set of k in Y n to an s t -path set of k in Z n . Let Q be the s t -path set of size 1 k m in Y n . We discuss four sub-cases.
Subcase 2.1. Suppose Q does not contain edge y 4 y 5 . Then let θ 2 ( Q ) = { z i z j | y i y j Q } . Note that the image is the s t -path set in Z n with the same size as Q, which does not contain edge s z 4 .
Subcase 2.2. Suppose Q contains edge y 4 y 5 , and Q { y 4 y 5 } is still an s t -path set. Then define θ 2 ( Q ) = { z i z j | y i y j Q } { s z 4 } { z 4 z 5 } . The corresponding image is the s t -path set in Z n with the same size as Q, which contains edge s z 4 . We can see that θ 2 ( Q ) { s z 4 } is still an s t -path set.
Subcase 2.3. Suppose Q contains edge y 4 y 5 and that P { y 4 y 5 } is not an s t -path set, but it is a y 4 t -path-set. Then define θ 2 ( Q ) = { z i z j | y i y j Q } { s z 4 } { z 4 z 5 } . Note that the image consists of the s t -path sets in Z n , with the same size as Q, which contain the edge s z 4 , but θ 2 ( Q ) { s z 4 } is not an s t -path set, which is distinct from the image in subcase 2.2.
Subcase 2.4. Now suppose Q contains edge y 4 y 5 , and P { y 4 y 5 } is not an s t -path set and it is not a y 4 t -path-set. Then define
θ 2 ( Q ) = { z i z j | 2 i < j n , y i y j Q } { z 5 z j | s y j Q } { s z 4 } { z 4 z 5 } .
Note that θ 2 ( Q ) has the same size as Q, and it is completely disjoint from the image described in subcase 2.3.
In each of the above four subcases, θ 2 yields disjoint s t -path sets of Z n . Then the mapping is an injection. There are at least as many s t -path sets of size k in Z n as in Y n , and hence Z n is uniformly more reliable than Y n , i.e., G 4 G 7 . We can similarly prove that G i G j , i = 1 , 2 , 3 , 5 , and j = 6 , 8 , 9 , , 21 .
In summary, we can find that graphs G 1 , G 2 , G 3 , G 4 , and G 5 are uniformly more reliable than other graphs, constitute the minimum extremely optimal graph set in the graph family Ω ( n , n ( n 1 ) 2 3 ) , and are exactly the Z n -type graphs.    □
For better visualization, in Figure 5 we plot two-terminal reliabilities for the graphs G 1 , G 2 , G 28 in the case of n = 8 , m = 25 .
Referring to Theorems 2 and 3, it is evident that Z n -type graphs exhibit higher uniform reliability than the other two types of graph in Ω ( n , m ) , as more edges are deleted. Moreover, we can find that the number of extremely optimal graphs in their corresponding graph classes is constant as n keeps increasing.

3. The Number of Extremely Optimal Networks

It is easy to see that a Z n -type graph is formed by deleting r( 1 r n 2 2 ) edges among non-target vertices for the complete two-terminal graph K n , which is equivalent to the simple graph obtained by deleting any r edges in the complete graph K n 2 with n 2 non-target vertices.
Let N be the number of non-isomorphic subgraphs of the complete two-terminal graph K n . We can visualize the relationship between r and N in logarithmic coordinates and fit the corresponding curves, as shown in Figure 6. Then we can see that, as the parameter r increases, the number of non-isomorphic subgraphs N grows exponentially. This work aims to reduce the search range for more reliable graphs. Then it is sufficient to count the number of a specific type of graphs, i.e., Z n -type graphs. In the following, we apply the Pólya counting principle to count the parameter N by deleting the edges of 1 r 12 .
Lemma 1.
(Pólya theorem for generating function type) Let n objects be colored with m colors  b 1 , b 2 , , b m  and n objects to form a permutation group  G = { a 1 , a 2 , , a g } , where  a i = 1 k i 1 2 k i 2 3 k i 3 n k i n  and  k i j  denotes the number of rotations of j order in the permutation  a i . Then the Pólya theorem for generating function type is as follows.
P = 1 G i = 1 g j = 1 n b 1 j + b 2 j + + b m j k i j ,
where the coefficients of  b 1 k 1 b 2 k 2 b m k m  indicate the numbers of coloring schemes in which there are  k i  objects with color  b i ,  1 i m .
If the edges of K n are colored by two colors b 1 and b 2 , then the number of different schemes is the number of its spanning subgraphs, which is equivalent to enumeration polynomials in the Pólya theorem in the case of b 1 = r = x , b 2 = b = 1 .
Next, we calculate the number of Z n -type graphs as deleting 2 and 3 edges and take complete two-terminal graphs of order 8 as an example. Clearly, we only need to calculate the number of spanning subgraphs of K 6 (See Figure 7 and Table 1).
As n = 6 , 7 , 8 , if b 1 = r = x , b 2 = b = 1 , then
P 6 ( x ) = 1 720 [ ( x + 1 ) 15 + 40 ( x 3 + 1 ) 5 + 15 ( x + 1 ) 3 ( x 2 + 1 ) 6 + 15 ( x + 1 ) 7 ( x 2 + 1 ) 4 + 90 ( x + 1 ) ( x 2 + 1 ) ( x 4 + 1 ) 3 + 40 ( x + 1 ) 3 ( x 3 + 1 ) 4 + 144 ( x 5 + 1 ) 3 + 120 ( x + 1 ) ( x 2 + 1 ) ( x 3 + 1 ) 2 ( x 6 + 1 ) + 90 ( x + 1 ) ( x 2 + 1 ) ( x 4 + 1 ) 3 + 120 ( x 3 + 1 ) 3 ( x 6 + 1 ) 2 ] = 1 + x + 2 x 2 + 5 x 3 + 9 x 4 + 15 x 5 + 21 x 6 + 24 x 7 + 24 x 8 + 21 x 9 + 15 x 10 + 9 x 11 + 5 x 12 + 2 x 13 + x 14 + x 15
Similarly, we have
P 7 ( x ) = 1 + x + 2 x 2 + 5 x 3 + 10 x 4 + 21 x 5 + 41 x 6 + 65 x 7 + 97 x 8 + 131 x 9 + 148 x 10 + 148 x 11 + 131 x 12 + 97 x 13 + 65 x 14 + 41 x 15 + 21 x 16 + 10 x 17 + 5 x 18 + 2 x 19 + x 20 + x 21 ,
P 8 ( x ) = 1 + x + 2 x 2 + 5 x 3 + 11 x 4 + 24 x 5 + 56 x 6 + 115 x 7 + 221 x 8 + 402 x 9 + 663 x 10 + 980 x 11 + 1312 x 12 + 1557 x 13 + 1646 x 14 + 1557 x 15 + 1312 x 16 + 980 x 17 + 663 x 18 + 402 x 19 + 221 x 20 + 115 x 21 + 56 x 22 + 24 x 23 + 11 x 24 + 5 x 25 + 2 x 26 + x 27 + x 28 .
We see that the coefficients of the terms with exponents 2 and 3 are 2 and 5, respectively, which is consistent with Theorems 2 and 3. Table 2 gives the number of Z n -type graphs for 1 r 12 . Additionally, we provide pseudo-code for Pólya’s counting principle in Appendix A (See Algorithm A2).
From the above, the determination of extremely optimal graphs is useful to find consistently more reliable graphs in the same graph family. From Table 2, we see that the number of Z n -type graphs shows exponential growth as r increases.
However, for any r, there is a minimal subset of extremely optimal graphs, which is included in the set of the corresponding Z n -type graphs.

4. Conclusions

The study of extremely optimal networks holds unique value for network reliability optimization. These special network structures reveal the theoretical upper bounds of reliability under resource constraints, providing benchmark references for practical network design. By analyzing the topological characteristics of extremal graphs, critical vulnerability points in networks can be identified to guide targeted reinforcement. This research avoids the computational complexity challenges inherent in traditional reliability analysis, offering new perspectives for evaluating reliability in large-scale network systems, with significant application potential in data center networks and IoT scenarios, etc.
In this paper, we studied the locally most reliable graphs in two special two-terminal graph families in which there are no uniformly optimal graphs. In particular, Z n -type graphs are uniformly more reliable than X n - and Y n -type graphs under the same conditions. By classifying and comparing graphs, we proved the existence of an extremely optimal graph set, which plays an important role in constructing the most reliable graphs. Furthermore, the Pólya counting theorem was used to enumerate the number of Z n -type graphs, which provided quantifiable design principles and optimization pathways for building highly robust networks. Its value extends beyond improving communication efficiency and resource utilization.

Author Contributions

Z.W.: conceptualization, methodology, validation, formal analysis, writing—review and editing; Z.Y.: writing—original draft. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key R&D Program of China (2020YFC1523300), the Key R&D and Transformation Program of Qinghai Province (2025-QY-215), and the Major Research Program of National Natural Science Foundation of China (92470202).

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Acknowledgments

The authors are very grateful to anonymous referees and editors for their constructive suggestions and insightful comments, which have considerably improved the presentation of this paper.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. The Pseudo-Codes of Two Algorithms

Algorithm A1 An algorithm computing the reliable polynomial coefficients for two-terminal networks
Require: The incidence matrix I of the two-terminal network
Ensure: All coefficients N i of the two-terminal reliable polynomial
1:
For matrix I, any k columns are deleted to obtain matrix X. The adjacency matrix of the generated subgraph G after deleting k edges is obtained by the formula A ( G ) = X X T d i a g ( d i a g ( X X T ) ) , where diag( X X T ) is the degree matrix of X X T ;
2:
By using A ( H ) to determine the connectivity between target nodes (in the form of powers of A ( H ) ,) until all k-tuples are traversed and the number of G subgraphs generated by the connected components of G is recorded, the coefficient N m k can be obtained;
3:
Go through the cycle k from 1 to m 1 and obtain all the polynomial coefficients.
Algorithm A2 Pólya’s counting principle
Require: the number of vertices n
Ensure: coefficient of x m
1:
Generate different permutations cycle type for all edges;
2:
For each cyclic permutation: (1) calculate the number of cyclic permutations; (2) calculate the number of cycles k i j on the edge set; (3) sum the coefficient of ( 1 + x ) k i j ;
3:
Except for normalization with n ! ;
4:
Extract the coefficient of x m to obtain results.

Appendix B. The Extremely Optimal Graph Sets in Ω(6,13) and Ω(8,25)

For the graph family Ω ( 6 , 13 ) , its extremely optimal graph set contains two graph structures, as shown in Figure A1.
Figure A1. The extremely optimal graph set in Ω ( 6 , 13 ) .
Figure A1. The extremely optimal graph set in Ω ( 6 , 13 ) .
Mathematics 13 03000 g0a1
The coefficient sequences of the two terminal reliable polynomials in Ω ( 6 , 13 ) are, respectively,
N i ( G 1 ) = ( 1 , 16 , 114 , 458 , 1111 , 1648 , 1700 , 1285 , 715 , 286 , 78 , 13 , 1 ) ;
N i ( G 2 ) = ( 1 , 16 , 114 , 460 , 1107 , 1642 , 1698 , 1285 , 715 , 286 , 78 , 13 , 1 ) .
For the graph family Ω ( 8 , 25 ) , its extremely optimal graph set contains two graph structures, as shown in Figure A2.
The coefficient sequences of the two terminal reliable polynomials in Ω ( 8 , 25 ) are, respectively,
N i ( G 1 ) = ( 1 , 30 , 432 , 3923 , 24774 , 113240 , 380668 , 961014 , 1924051 , 3170672 , 4389948 , 5162205 , 5183008 , 4451268 , 3267128 , 2042669 , 1081539 , 480698 , 177100 , 53130 , 12650 , 2300 , 300 , 25 , 1 ) ;
N i ( G 2 ) = ( 1 , 30 , 432 , 3925 , 24802 , 113306 , 380322 , 959754 , 1922113 , 3168868 , 4388828 , 5161729 , 5182872 , 4451244 , 3267126 , 2042669 , 1081539 , 480698 , 177100 , 53130 , 12650 , 2300 , 300 , 25 , 1 ) ;
N i ( G 3 ) = ( 1 , 30 , 432 , 3927 , 24828 , 113378 , 380024 , 958684 , 1920491 , 3167340 , 4387844 , 5161289 , 5182740 , 4451220 , 3267124 , 2042669 , 1081539 , 480698 , 177100 , 53130 , 12650 , 2300 , 300 , 25 , 1 ) ;
N i ( G 4 ) = ( 1 , 30 , 432 , 3929 , 24858 , 113480 , 379652 , 957050 , 1917573 , 3164078 , 4385300 , 5159861 , 5182168 , 4451064 , 3267098 , 2042667 , 1081539 , 480698 , 177100 , 53130 , 12650 , 2300 , 300 , 25 , 1 ) ;
N i ( G 5 ) = ( 1 , 30 , 432 , 3929 , 24864 , 113588 , 380332 , 958632 , 1919829 , 3166376 , 4387068 , 5160893 , 5182612 , 4451196 , 3267122 , 2042669 , 1081539 , 480698 , 177100 , 53130 , 12650 , 2300 , 300 , 25 , 1 ) .
Figure A2. The extremely optimal graph set in Ω ( 8 , 25 ) .
Figure A2. The extremely optimal graph set in Ω ( 8 , 25 ) .
Mathematics 13 03000 g0a2

References

  1. Colbourn, C.J. The Combinatorics of Network Reliability; Oxford University Press: Oxford, UK, 1987. [Google Scholar]
  2. Brown, J.; Cox, D. Nonexistence of optimal graphs for all terminal reliability. Networks 2013, 63, 146–153. [Google Scholar] [CrossRef]
  3. Kelmans, A.K. On graphs with randomly deleted edges. Acta. Math. Acad. Sci. Hung. 1981, 37, 77–88. [Google Scholar] [CrossRef]
  4. Brecht, T.B.; Colbourn, C.J. Lower bounds on the two-terminal network reliability. Discrete Appl. Math. 1998, 21, 185–198. [Google Scholar] [CrossRef]
  5. Harms, D.D.; Colbourn, C.J. Renormalization of two-terminal reliability. Networks 1993, 23, 289–297. [Google Scholar] [CrossRef]
  6. Van Slyke, R.M.; Frank, H. Network reliability analysis: Part I. Networks 1972, 1, 279–290. [Google Scholar] [CrossRef]
  7. Myrvold, W.; Cheung, K.H.; Page, L.B.; Perry, J.E. Uniformly-most reliable networks do not always exist. Networks 1991, 21, 417–429. [Google Scholar] [CrossRef]
  8. Zhao, H.X. Research on Subgraph Polynomials and Reliability of Networks. Doctoral Dissertation, Northwestern Polytechnical University, Xi’an, China, 2004. [Google Scholar]
  9. Bauer, D.; Boesch, F.; Suffel, C.; Tindell, R. Combinatorial optimization problems in the analysis and design of probabilistic networks. Networks 1985, 15, 257–271. [Google Scholar] [CrossRef]
  10. Boesch, F.T.; Li, X.; Suffel, C. On the existence of uniformly optimal networks. Networks 1991, 21, 181–194. [Google Scholar] [CrossRef]
  11. Byer, O.D. Two path extremal graphs and an application to a Ramsey-type problem. Discrete Math. 1999, 196, 51–64. [Google Scholar] [CrossRef]
  12. Romero, P. Uniformly optimally reliable graphs: A survey. Networks 2021, 80, 466–481. [Google Scholar] [CrossRef]
  13. Gross, D.; Saccoman, J.T. Uniformly optimal graphs. Networks 1998, 31, 217–225. [Google Scholar] [CrossRef]
  14. Shao, F.M.; Zhao, L.C. Optimal design improving a communication networks reliability. Microelectron Reliab. 1997, 37, 591–595. [Google Scholar] [CrossRef]
  15. Bobylev, D.A.; Borovskikh, L.P. A universal converter for the parameters of multicomponent two-terminal networks. Autom. Remote Control 2016, 77, 1649–1655. [Google Scholar] [CrossRef]
  16. Bai, G.; Zuo, M.J.; Tian, Z. Search for all d-MPs for all d levels in multistate two-terminal networks. Reliab. Eng. Syst. Saf. 2015, 142, 300–309. [Google Scholar] [CrossRef]
  17. Ibe, A.O.; Cory, B.J. Traveling Wave-based Fault Locator for Two and Three Terminal Networks. IEEE Trans. Power Syst. 1986, 1, 283–288. [Google Scholar] [CrossRef]
  18. Bertrand, H.; Goff, O.; Graves, G.; Sun, M. On uniformly most reliable two-terminal graphs. Networks 2018, 72, 200–216. [Google Scholar] [CrossRef]
Figure 1. Graphs X n , Y n , and Z n .
Figure 1. Graphs X n , Y n , and Z n .
Mathematics 13 03000 g001
Figure 2. All cases of graph family Ω ( n , n ( n 1 ) ) 2 2 ) .
Figure 2. All cases of graph family Ω ( n , n ( n 1 ) ) 2 2 ) .
Mathematics 13 03000 g002
Figure 3. In the figure, the one on the left shows Two-terminal reliabilities for graphs G 1 , G 2 , G 9 in the case of n = 6 , m = 13 ; the one on the right represents its partial enlargement of the left one.
Figure 3. In the figure, the one on the left shows Two-terminal reliabilities for graphs G 1 , G 2 , G 9 in the case of n = 6 , m = 13 ; the one on the right represents its partial enlargement of the left one.
Mathematics 13 03000 g003
Figure 4. All cases of graph family Ω ( n , n ( n 1 ) ) 2 3 ) .
Figure 4. All cases of graph family Ω ( n , n ( n 1 ) ) 2 3 ) .
Mathematics 13 03000 g004
Figure 5. The left figure shows the two-terminal reliability curve for graphs G 1 , G 2 , G 28 in the case of n = 8 , m = 25 , while the right figure represents its partial enlargement.
Figure 5. The left figure shows the two-terminal reliability curve for graphs G 1 , G 2 , G 28 in the case of n = 8 , m = 25 , while the right figure represents its partial enlargement.
Mathematics 13 03000 g005
Figure 6. The relationship between r and N in logarithmic coordinates and their curve fitting.
Figure 6. The relationship between r and N in logarithmic coordinates and their curve fitting.
Mathematics 13 03000 g006
Figure 7. K 6 .
Figure 7. K 6 .
Mathematics 13 03000 g007
Table 1. Enumeration of non-isomorphic subgraphs of K 6 .
Table 1. Enumeration of non-isomorphic subgraphs of K 6 .
Group S 6 Permutation of the Corresponding EdgesNumberType
( 1 ) ( 2 ) ( 3 ) ( 4 ) ( 5 ) ( 6 ) e1 1 15
( 135 ) ( 246 ) ( e 1 e 5 e 4 ) ( e 2 e 6 e 3 ) ( e 7 e 14 e 9 ) ( e 8 e 13 e 11 ) ( e 10 e 12 e 15 ) 40 3 5
( 12 ) ( 36 ) ( 45 ) ( e 3 e 6 ) ( e 4 e 5 ) ( e 7 e 10 ) ( e 8 e 11 ) ( e 9 e 12 ) ( e 14 e 15 ) 15 1 3 2 6
( 12 ) ( 3 ) ( 4 ) ( 5 ) ( 6 ) ( e 3 e 7 ) ( e 6 e 10 ) ( e 8 e 12 ) ( e 9 e 11 ) 15 1 7 2 4
( 1234 ) ( 5 ) ( 6 ) ( e 1 e 3 e 5 e 8 ) ( e 2 e 9 e 11 e 14 ) ( e 4 ) ( e 6 e 10 e 13 e 15 ) ( e 7 e 12 ) 90 1 1 2 1 4 3
( 123 ) ( 4 ) ( 5 ) ( 6 ) ( e 1 e 3 e 7 ) ( e 5 e 8 e 12 ) ( e 6 e 10 e 13 ) ( e 9 e 11 e 14 ) ( e 15 ) 40 1 3 3 4
( 12345 ) ( 6 ) ( e 1 e 3 e 5 e 2 e 9 ) ( e 4 e 6 e 10 e 13 e 15 ) ( e 7 e 12 e 14 e 8 e 11 ) 144 5 3
( 1 ) ( 23 ) ( 456 ) ( e 1 e 7 ) ( e 2 e 4 e 15 ) ( e 5 e 11 e 13 e 12 e 14 e 10 ) ( e 6 e 8 e 9 ) 120 1 1 2 1 3 2 6 1
( 12 ) ( 3456 ) ( e 2 e 4 e 13 e 5 ) ( e 3 e 8 e 11 e 6 ) ( e 7 e 12 e 9 e 10 ) ( e 14 e 15 ) 90 1 1 2 1 4 3
( 123456 ) ( e 1 e 3 e 5 e 2 e 4 e 6 ) ( e 7 e 12 e 14 e 15 e 9 e 10 ) ( e 8 e 11 e 13 ) 120 3 1 6 2
( 13 ) ( 2 ) ( 46 ) ( 5 ) ( e 1 e 3 ) ( e 2 e 4 ) ( e 5 e 6 ) ( e 8 e 13 ) ( e 9 e 14 ) ( e 10 e 12 ) 45 1 3 2 6
Table 2. The number of the Z n -type graphs for 1 r 12 .
Table 2. The number of the Z n -type graphs for 1 r 12 .
r123456789101112
N1251126681771476461315,21652,944193,367
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Z.; Ye, Z. Extremely Optimal Graph Research for Network Reliability. Mathematics 2025, 13, 3000. https://doi.org/10.3390/math13183000

AMA Style

Wang Z, Ye Z. Extremely Optimal Graph Research for Network Reliability. Mathematics. 2025; 13(18):3000. https://doi.org/10.3390/math13183000

Chicago/Turabian Style

Wang, Zhaoyang, and Zhonglin Ye. 2025. "Extremely Optimal Graph Research for Network Reliability" Mathematics 13, no. 18: 3000. https://doi.org/10.3390/math13183000

APA Style

Wang, Z., & Ye, Z. (2025). Extremely Optimal Graph Research for Network Reliability. Mathematics, 13(18), 3000. https://doi.org/10.3390/math13183000

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop