A network tool to analyse and improve robustness of system architectures

Giota Paparistodimou, Alex Duffy, Robert Ian Whitfield, Philip Knight, Malcolm Robb

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)
11 Downloads (Pure)


The architecture of a system is decided at the initial stage of the design. However, the robustness of the system is not usually assessed in detail during the initial stages, and the exploration of alternative system architectures is limited due to the influence of previous designs and opinions. This article presents a novel network generator that enables the analysis of the robustness of alternative system architectures in the initial stages of design. The generator is proposed as a network tool for system architectures dictated by their configuration of source and sink components structured in a way to deliver a particular functionality. Its parameters allow exploration with theoretical patterns to define the main structure and hub structure, vary the number, size, and connectivity of hub components, define source and sink components and directionality at the hub level and adapt a redundancy threshold criterion. The methodology in this article assesses the system architecture patterns through robustness and modularity network based metrics and methods. Two naval distributed engineering system architectures are examined as the basis of reference for the simulated networks. The generator provides the capacity to create alternative complex system architecture options with identifiable patterns and key features, aiding in a broader explorative and analytical, in-depth, time and cost-efficient initial design process.
Original languageEnglish
Article numbere8
Number of pages40
JournalDesign Science
Early online date7 Apr 2020
Publication statusPublished - 19 Nov 2020


  • network generator
  • robustness
  • modularity
  • system architecture patterns
  • network science


Dive into the research topics of 'A network tool to analyse and improve robustness of system architectures'. Together they form a unique fingerprint.

Cite this