1. Introduction
The graphs we discuss in this article are undirected, finite, and simple. We denote
as the cardinality of the isolated vertex set in
G. The operator ∨ in
means adding edges for all pairs of vertices between
and
. For a subgraph
H of graph
G,
denotes the graph function, which is restricted to
H. Throughout the entire paper,
with
and
, and
h:
is the fractional indicator function (FIF). The standard graph notations and terminologies can be referred to in [
1].
1.1. Data Transmission in Real-Time Monitoring Network
In traditional graph theory, data transmission (DT) between vertices is accomplished through the shortest path. However, in communication networks, this naive idea is not feasible due to the conflict between large data size and the limit of channel capacity. In real data transmission networks, a large data packet is divided into several small data packets, transmitted via different channels, and finally assembled at the target site. The feasibility of DT is quantified by fractional flow, which is represented by the existence of the fractional factor (FF) in the idealized state. We say a graph G (corresponding to a specific network) admits a fractional k-factor (FkF) if FIF exists such that for each , where is the fractional degree (FD) of vertex x. Obviously, the traditional k-factor is a specific setting of FkF if h becomes binary.
It is noteworthy that the constraint condition on the fractional degree is too strict for the communication network application, which inquires its value to be equal to k for each vertex. The fractional factor (FF) is introduced to relax the original fractional k factor, which requires the fractional degree of each vertex to fall into the interval , i.e., . FkF is apparently a special version of FF when interval collapses into a real number k.
However, F
F is not applicable to real networks since it treats all sites equally. In a real network, each site has its own computability and throughput based on its status, which leads to the fractional degree of each site not being the same. To cope with this problem, fractional
factors are utilized. Let
g and
f be two integer-valued functions on the vertex set satisfying
for arbitrary vertex
x. A
fractional -factor (F
F) is a spanning subgraph consisting of edge set
such that
for any
. A graph
G admits a F
F if FIF satisfies (
1). Again, F
F is an extreme situation of F
F if both
g and
f are constant functions.
Unfortunately, even F
F cannot be directly applied to real networks. Imagine that many stations send data to external stations simultaneously. Due to the limitation of the channel capacity, parts of stations and channels will be congested. Or in the scenario of a network attack, parts of the sites under attack will be unable to be used. In this spirit, the entire network needs to have a monitoring ability to promptly label sites in congested, damaged, or maintenance status. In real-time data transmission, it is necessary to delete these specially annotated sites and query the availability of DT in the remaining subnetworks, that is, to determine the existence of FFs in the remaining subgraph. The network with real-time monitoring action is called the self-definition network (SDN), and its difference from traditional networks is similar to the difference between buses and private cars. In traditional networks, the transmission path of segmented data packets is determined by algorithm implementation in advance, which cannot be changed. In self-definition networks, in terms of the real-time monitoring of data, algorithms can temporarily change transmission paths to avoid congested or damaged sites. The foregoing circumstances can be characterized by fractional critical graphs. For
,
G is a
fractional -critical graph (F
CG) if deleting any
n vertices from
G, and the resulting subgraph still admits a F
F. Liu [
2] determined that
G is a F
CG if and only if
for any disjoint subsets
S and
T of
with
.
The fractional -critical graph (FCG) and fractional -critical graph (FCG) can be regarded as the special case of FCG when and for all vertices in G, respectively.
1.2. Network Stability Based on Graph Parameter
As a salient graph-theoretic variable,
isolated toughness (IT) is introduced by [
3] which is formulated by
and specifically
for complete graphs since no
S satisfies the constraint condition. In computer networks, isolated toughness is utilized to quantify the stability of the network. The greater the isolated toughness, the more robust the network, and the network is more vulnerable to intrusion, on the contrary. For the network corresponding to the non-complete graph, the target sites of the network attack are stated by
S, which minimizes the ratio
. From this perspective, analyzing the isolated toughness of the network is beneficial to identify the target sites for network attacks.
1.3. Motivation
It is well known that the more robust the network, the higher the construction costs. In the real network, it is not necessary to build a fully connected network topology, and actually, most networks present sparse structures. Network designers often struggle with the issue of finding a balance between budget and network performance, and it is a crux to simultaneously balance the stability and the feasibility of DT in networks. Thankfully, the theoretical results show isolated toughness pertinent to the fractional factor, and it becomes an intriguing topic both in graph theory and computer networks.
In the early years, Ma and Liu [
4] determined the sharp IT bound for a graph
G, admitting a F
kF. Nevertheless, the study has stagnated for a long time since 2006. Gao and Wang [
5] argued that
G is a F
CG if
and
(i.e.,
), where
a and
b are the lower bound of
g and upper bound of
f, respectively. However, the counterexample only shows that the
bound is tight in a very special case (i.e.,
, which equals to a constant for each vertex
x). Recently, there has been a dramatic breakthrough in the isolation toughness bound of fractional critical graphs. Gao et al. [
6] proposed the sharp IT bound for F
CGs. This conclusion was extended by Gao et al. [
7], i.e.,
G is a F
CG if
and
, where
and
is an integer satisfying
.
Wei et al. [
8] investigated the existence of FF from high-dimensional space, and the results for the corresponding
-factors are characterized in surface forms. Dimitrov and Hosam [
9] proposed the independent set neighborhood union bound for FF in a specific setting. Zhou [
10] determined a generalized binding number bound for fractional ID-factor-critical graphs, where the deleted vertex subset is an independent set of the graph. More recent results on factor in graphs can be referred to in [
11,
12,
13].
The optimal isolated toughness condition in the fractional critical setting has cardinal engineering significance. It tells network designers that in order to ensure that the remaining subnetwork data transmission is still feasible under a certain degree of network attack (where n sites are simultaneously destroyed), large isolated toughness parameter values are needed. At the same time, this threshold value also provides the lowest budget for building the corresponding network.
Since the fractional
-factor is only an extreme circumstance of F
F when both
g and
f are constant functions on
, it is natural to ask the following question (raised by Gao et al. [
7]):
In addition, to pursue the optimal topology structure parameter, the following intuitive problem on minimum degree is proposed:
Can the minimum degree bound
of Gao and Wang [
5] be strengthened or not?
1.4. Main Result and Counterexamples
Motivated by the aforementioned questions, in this contribution, we determine the tight IT bound for F
CGs, which both improves the previous bound in [
5] and answers the open question raised by [
7].
Theorem 1. Let G be a graph, and be positive integers with and . Let g and f be integer-valued functions on such that for all . If and , then G is a FCG.
Theorem 1 has explicitly guiding significance in network designing, where the tight IT bound provides the characteristics that a network topology needs to possess under specific network vulnerability conditions. Specifically, the network is not necessary to be fully connected. As long as the IT parameter meets the lower bound requirement, theoretically, data transmission services can be maintained when a specific number of sites are attacked.
For shorthand notation, we define
and
In the following four counterexamples (from
to
), for given
S and
T, we assume
for all
and
for all
, and these graphs are not F
CGs, which are assessed by (
2).
It is identified that
, which reveals that the minimum degree condition improves the previous bound stated by Gao and Wang [
5]. We now show that
is tight to ensure a meaningful
bound. If
(mod2), then focusing on
with
, and
is a large number. Clearly, the value of
can be taken to be arbitrarily large since
t is a large number. Set
and
, then
which implies that
is not a F
CG. If
(mod2), then considering
with
, and
is a large number. Obviously, the value of
can be taken to be arbitrarily large since
t is a large number. Set
and
, then
which reveals that
is not a F
CG.
The sharpness of the IT bound in Theorem 1 is showcased by considering the following instances. If
(mod2), then consider
, where
and
are integers. We directly obtain (for
part, it can be identified by checking
and
, respectively)
and
Set
and
, then
Thus, is not a FCG.
If
(mod2), then consider
where
and
are integers. We directly obtain
and
Set
and
, then
Thus, is not a FCG.
Remark 1. By observation, it can be seen that the sharp IT bound for FCGs cannot directly derive the tight IT condition for FCGs determined by Gao et al. [7]. We explain its intrinsic mechanism. In the setting of the FCG, the feasible interval of FD for each vertex is . Nevertheless, from the above counterexample, in the extreme FCG setting, for some vertices, while for other parts of vertices. It is well-known that FF degenerates to FF iff for all vertices. The extreme setting of the g and f functions mentioned in the above counterexample makes it impossible to bespeak the characteristic in a fractional factor setting. Remark 2. The celebrated Lemma 2.2 in Liu and Zhang [14] has by now become an invaluable tool in the study of subgraphs in special divisions, and its slightly improved version is used in the next section. The detailed proof of Theorem 1 is presented in the subsequent section.
2. Proof of Theorem 1
We only consider that
G is not complete because the result for the complete graph can be immediately obtained by
. Assume that
G satisfies the hypothesis of Theorem 1 but is not a F
CG. According to the sufficient and necessary condition stated in Liu [
2], there exist disjoint subsets
S and
T of
with
satisfying
We choose S and T with the smallest value of . Thus, , and for any .
Let l be the number of the components in and let be the set of vertices in , whose degree is zero in . Let H be the subgraph obtained from by deleting and components. Let be a set of vertices that contains exactly vertices in each component of in .
If
, then in view of (
3),
(verify separately for three scenarios:
,
, and
), we yield
i.e.,
which implies
. With the aid of the definition of IT, we deduce
Let
, where
and
. Then, by
and
, we infer
which implies that
reaches the maximum value when
reaches its lower bound 2. Hence,
which contradicts
and
.
Hence, we have
. Let
, where
is the union of components of
H, which satisfies that
for each vertex
and
. Assume that
and
are the maximum independent set and the covering set of
, where
. Furthermore, denote
for
and
. Using the definition of
H and
, we verify that each component of
has a vertex of degree at most
in
. Clearly, if
, then
, and
can be selected by the algorithm in [
6].
Set and . The subsequent derivation is divided into two situations.
Case 1. .
First, we analyze the circumstances if or .
Claim 1. If , then .
Proof. Suppose . Then by . Hence, .
We partition into two subsets.
: if there exists such that ;
: if there is no intersection between and .
In light of Lemma 2.2 in Liu and Zhang [
14], we yield
and
Let
, where
and
. Then, we obtain
If
and
, then
is negative, thus
, which contradicts
. Hence,
is a non-negative term and it reaches the maximum value when
reaches its lower bound. Therefore,
which contradicts the hypothesis of
and the truth that
. □
Remark 3. It can be concluded that we always check that reaches the maximum value when (some terms may become zero in a special setting) arrives at the lower bound. In the following arguments, the trick is the same as the aforementioned discussion, and we will skip the illustration of these details.
Claim 2. If , then .
Proof. If . We yield by , and hence and .
Let
be vertices in
such that
and
. Then
,
and
We infer
where
and
According to the definition of IT, we verify
a contradiction. □
From Claims 1 and 2, we check , and .
Denote
as vertices in
. Then
,
and
We acquire
, where
,
and hence
which contradicts
and
.
Case 2. .
Similar to Case 1, we cope with the circumstances if one of and is empty.
Claim 3. If , then .
Proof. Suppose , then we obtain , and .
If
, then
,
, and
a contradiction (identified by three cases:
,
and
). Hence,
.
In this case,
, where
, and using the deduction in Claim 1, we obtain
Hence,
which contradicts the hypothesis of isolated toughness and
. □
Claim 4. If , then .
Proof. Suppose , then and hence .
If
, then we set
and
such that
, thus
. Hence, we deduce
and
which reveals
A contradiction to the hypothesis of .
Hence, we obtain
. Let
be vertices in
. We have
, and
We infer
where
, and in view of the discussion in Claim 2, we yield
Using the same fashion as presented before, we obtain
which contradicts
. □
It is verified from Claims 3 and 4 that
,
and
. We verify that
, where
,
and
which contradicts
.
Therefore, contradictions are derived in all situations, and Theorem 1 follows. □