Data Simulation and Networking

Size: px
Start display at page:

Download "Data Simulation and Networking"

Transcription

1 IST Project N Integrated Project IRRIIS Integrated Risk Reduction of Information-based Infrastructure Systems Deliverable D Provision of Prototype Leontief-Based Tool Due date of deliverable: January 30, 2008 Actual submission date: March 10, 2008 Version 1.0 Organisation name of lead contractor for this deliverable: ENEA Dissemination Level PU Public Start date of project: 01 February 2006 Duration: 3 years Project co-funded by the European Commission within the Sixth Framework Programme ( )

2 Editor(s) E. Djambazova (ENEA) Author(s) E. Djambazova (ENEA), V Rosato (ENEA), G. Vicoli (ENEA) Contributor(s) Work package Task(s) WP 2.2 : LCCI Interdependency Analysis Task 2.2.2: Tools and techniques for interdependency analysis D Provision of Prototype Leontief-Based Tool 2

3 Contents CONTENTS...3 FIGURES THE NETWORK ANALYSIS TOOLS (NAT) PLATFORM NAT Database Net Builder Types of Complex Networks Usage Unweighted Networks Topology analysis of unweighted networks Topological properties of a graph Usage Weighted Networks Topological properties of a weighted graph Usage The Simulator Communication Networks Traffic Simulator Description of the elements of the Traffic Simulator Usage Interdependency Leontief-Based Simulator INTRODUCTION TO THE LEONTIEF-BASED MODEL The Leontief economic model Adapting the Leontief model to critical infrastructures The Leontief-based simulation tool: the algorithm Inoperability dynamics of interdependent networks The system The simulation Optimisation INTRODUCTION TO THE LEONTIEF-BASED SIMULATION (LBS) TOOL Home page Creating an account to the tool Downloading documentation User login to the Leontief-based tool Managing a Leontief account Executing the algorithm Creation of a network Downloading the network D Provision of Prototype Leontief-Based Tool 3

4 3.5.4 Uploading the network Starting the execution Stopping the execution REFERENCES...22 APPENDIX A...24 D Provision of Prototype Leontief-Based Tool 4

5 Figures Figure 1. A node and its input and output...14 Figure 2. Results of the inoperability dynamics for a system of 5 nodes subject to disturbance..17 Figure 3. Output of LBS for a system of 5 networks in the first mode of presentation...19 Figure 4. Output of LBS for a system of 5 networks in the second mode of presentation Figure 5. Organization of the Home page...20 Figure 6. Management of the network...21 D Provision of Prototype Leontief-Based Tool 5

6 1. The Network Analysis Tools (NAT) Platform The Network Analysis Tools (NAT) [NAT] is a platform for the analysis of topological parameters of a graph. It has been conceived and realized to apply ideas and methods of the Complexity Science in the area of the analysis of Large Complex Critical Infrastructures (LCCI). The NAT platform can be accessed at: Each LCCI can be ultimately represented by a network containing the logical position of its different constitutive elements, connected through (logical or physical) links. Networks can be subsequently mapped onto graphs which constitute the ultimate, and more abstract, layout of a technological infrastructure, where only the mathematical structure of its constitutive elements and their connections are kept. Graphs can, thus, be analyzed by methods typical for the Graphs Theory. The goal is to estimate relevant network properties from the analysis of the associated graph and, thus, to gain insights on the effective properties of the "real" technological network represented by the graph. There are two other functionalities that have been added to the NAT platform. The first one considers the possibility of simulating a specific graph as representing a communication network. A simplified version of a data traffic simulator has been introduced in order to allow the user to simulate the efficiency of a given network in processing the data flow among the nodes. The second functionality deals with the simulation of the effects which networks interdependency introduces into infrastructures behaviour. As technological infrastructures are mutually dependent, a linear Leontief model for evaluating the effects on network operability induced by the presence of an "interdependency matrix" has been provided. This matrix quantifies the extent of perturbation that a network produces on the others when its operability is reduced. The NAT platform contains different tools to solve different problems associated with the analysis of LCCIs: A Database containing the graphs of several LCCIs A graph generator (Net Builder) A topological analysis of unweighted graphs A topological analysis of weighted graphs A simplified simulator of a communication network An interdependency simulator (based on the Leontief model) Since the analyses and simulation of the networks usually take time, the tool does an off-line analysis. The requested results are then sent to the user by . The NAT interface with the user is organized as follows: 1. The user uploads a network descriptor file. For the Net Builder that step is not necessary. 2. The user enters an address, where the NAT results will be sent. 3. He/she selects the parameters and all initial information needed to perform: generation of a network, analysis of different types of networks or simulation of a network. 4. The user is then prompted to enter a name for the current run. 5. At the end he/she launches the analysis or resets all values. The NAT platform has a good help support to the user for all types of analysis. D Provision of Prototype Leontief-Based Tool 6

7 1.1 NAT Database The NAT Database offers a variety of network descriptor files (.ndf format) and the results from the performed analysis (.zip format). The.ndf format ( NDF'' stands for Extensible N-Dimensional Data Format) is a standard file format for storing data which represent N-dimensional arrays of numbers, such as spectra, images, etc. and it, therefore, forms the basis of many spectral and image-processing applications [Starlink]. The descriptor files available are: DIMES (World-wide graph of the Internet network at the level of AS-level routers) German Motorways Italian Motorways Italian Electricity Transmission Network The results from the analysis of the respective network are available in ZIP format. The results are represented in graphical (JPG files) and numerical (text files with the data) form. They display the following parameters: node betweenness distribution, node clustering coefficient, degree distribution, input aisee, K-pruning, shortest path lengths distribution, and for some networks also graph spectrum of the adjacency matrix and information centrality. 1.2 Net Builder Types of Complex Networks The Networks Builder tool of the NAT suite enables the user to generate different kinds of complex networks, distinguished by their topological properties and, thus, generated with different growing mechanism. Networks are represented by graphs, particularly by undirected and unweighted graphs. An undirected graph is a graph, for which the relations between pairs of nodes are symmetric, so that each edge has no directional character (as opposed to a directed graph). This means that, if an edge between the nodes i and j (represented by (i, j)) exists, the reverse edge (j, i) also exists. An unweighted graph, instead, is a graph, in which all edges have no label and the same unitary weight. The network topologies created by the Networks Builder tool are the following: Random Graphs A random graph is a graph that is generated by some random process. In the NAT Networks Builder, the growing mechanism used is the Erdös-Rényi one. The growing mechanism for the creation of a random graph G=(N, L) starts with a set of N nodes with no connections. The process continues iteratively, adding new nodes at each iteration, according to an unconditional probability P. It means that the edge creation probability between two nodes, the new node i and the pre-existing node j (P(i > j)), is constant and node independent: 1 P( i j) = (1) N Scale-Free Networks Recent studies about "real networks" in several domains, such as biology, sociology, telecommunications, have shown that the homogenous nodes' degree distribution typical of random graphs is not the best way to represent these systems. Nodes' degree distribution of these systems seems to follow a Power Law function: γ ( k) k P ~ (2) D Provision of Prototype Leontief-Based Tool 7

8 where 2 < γ < 3 according to single system s peculiarities. These kinds of networks are defined as scale-free, because the Power Law is the unique functional form that remains unchanged, except for a multiplicative factor, after a scale modification. Scale-free networks are characterized by an extremely inhomogeneous nodes' degree distribution, with the presence of few nodes highly connected (known as hubs) and a lots of minimally connected ones (known as leaves). To reproduce scale-free networks the NAT Networks Builder tool uses the Barabási-Albert (BA) growing model. This model is based on two elements: the growing process and the Preferential Attachment (PA). The model is inspired by the "rich get richer" principle, in which highly connected elements have higher probability to attract new connections. Internet-Like Scale-Free Model The Barabási-Albert (BA) mechanism can reproduce most of the "real" networks but, as each network type has its own peculiarities, to reproduce the relevant properties of different networks, several modifications to the growing mechanism should be added. The Internet network, for instance, has been shown to display an "extreme" scale-free topology, with the presence of higher degree hubs, a bigger number of leaves, an extremely different clustering coefficient with respect to "normal" scale-free networks. To reproduce better the Internet topology, a new growing mechanism has been proposed. The proposed mechanism modifies the BA mechanism in two ways: 1) by varying the probability exponent of the PA mechanism; and 2) by adding a mechanism able to produce the very high clustering coefficient experienced in the Internet topology (c~ ). The first modification is taken to mimic higher degree hubs typical for the Internet and the PA mechanism has been generalized by introducing an adjustable parameter a: P ( i j) = P k j = 1 2 j k α j If a < 1 the strength of a hub to attract new links is reduced, while if a > 1 it is increased. The second modification is the insertion of a mechanism able to increase the clustering of a network. Such a mechanism is known as Triad Formation (TF). The TF mechanism applies when more than one link can be drawn for a new node. The first link of a new node is selected on the basis of the BA mechanism, while the others, instead of being chosen to stick on a randomly selected pre-existing node, are forced to be stuck to the nearest neighbour of the previously selected node. This obviously realizes the formation of triangles ( triads ). A suitable combination of BA and TF allows the reproduction of several topological properties of the Internet, as they appear from recent observations (projects DIMES and RouteViews) [Rosa08] Usage The NAT Networks Builder tool can be used via registration and authentication at the NAT Homepage. Input Data A valid address for the results: once the tool has created the network in a text file (.txt), the file is sent by to the user. Type of network: the network type that is to be created. There are three possible types of network: random graphs, scale-free networks, and Internet-like scale-free networks. Number of nodes in the network. The number of edges is defined according to the network's type and the number of nodes. D Provision of Prototype Leontief-Based Tool 8 (3)

9 The m 0 parameter: this parameter is used only in case of a scale-free (Barabási-Albert or Internetlike) network. Output Data The output data of the Networks Builder tool consist of a text file (.txt), in which the network structure is stored. The network structure is represented as follows: Each node is represented by an identification number (ID), the numbering starts from 0. Each edge is represented by a couple of nodes. In the tool, all graphs are undirected. Each edge is stored in a single line. 1.3 Unweighted Networks Topology analysis of unweighted networks As it was mentioned above, the networks can be represented by graphs and then analysed using the graphs theory. A graph can be described as a set G = G(N, L) of N nodes and L arcs (or links). A graph can be mathematically defined by its adjacency matrix A with elements a ij. The "conceptual" layout of this analysis is the following: The physical (or logical) map of the infrastructure should be transformed into a network; The network is transformed into an adjacency matrix; The adjacency matrix is elaborated to provide the estimate of the topological properties Topological properties of a graph The NAT suite enables the user to evaluate different topological properties of a user-defined graph, which can be uploaded on the tool s Web site from the user repository. The considered topological properties evaluated by the NAT platform are the following: Connectedness Verification if the graph is connected or disconnected. A graph is defined as connected if there is a path connecting each pair of nodes i and j (with i j). Graph Degree Evaluation of the degree distribution, P(k), which is the fraction of nodes in the graph displaying degree k. Graph Spectrum Evaluation of the graph spectrum, corresponding to the set of eigenvalues of its adjacency matrix A. Min Cut Evaluation of the min cut, consisting in the optimal partitioning of the graph into two connected subgraphs (of dimensions N 1 and N 2, such as N = N 1 + N 2 ) separated by k edges. Cluster Evaluation of the clustering coefficient, C, derived from the average over all nodes of the graph of the node clustering coefficient, c i. D Provision of Prototype Leontief-Based Tool 9

10 Diameter Evaluation of: (a) the distribution of the "shortest path" (or geodesic) lengths, d ij, of the graph, where d ij is the length of the geodesic from node i to j; (b) the diameter, Diam(G), which is the maximum value of d ij ; (c) the matrix, d, of the shortest path lengths. Betweenness Node Evaluation of the Node Betweenness Centrality, b i, of node i, also known as load. Betweenness Edge Evaluation of the Edge Betweenness Centrality, e il, of the edge between nodes i and l, that is determined similarly to the node betweenness. Information Centrality Evaluation of the Information Centrality, I i, of node i, which defines the importance of node i by the ability of the network to remedy the deactivation of that node. Kshell Evaluation of the k-shell decomposition of the graph. Given a graph G = G(N, K) with N nodes and K edges, a k-core (or core of order k) is defined through the subgraph H(C, K(C)) induced by the subset C of N, such that for each node n of C the degree(n) k, and H is the maximum subgraph with this property. The k-shell decomposition is the recursive removal of all nodes of degree k (or less) until all nodes of the remaining subgraph have at least degree k+1, i.e., the subgraph is a (k+1)-core. The decomposition starts with k and carries on increasing k at each step. The process stops when no further nodes remain; the last not empty k-core provides a very robust definition of the heart (or nucleus) of a graph Usage Input Data Types of analysis to be executed on the network. The user can select among: degree distribution, node betweenness centrality, graph spectrum, edge betweenness centrality, min cut, information centrality, shortest path length distribution, K-pruning, shortest path length values, clustering coefficient. The query network must be undirected, resulting in a symmetric adjacency matrix, such that for its elements: a ij = a ji. A text file (.ndf) with each line reporting a single couple of numbers, which identifies the linked nodes, is accepted. Each pair of numbers can be separated by space(s) and/or tab(s). Output Data Analysis replies can be in the form of text (.txt) and/or figure (.jpg) and all together are zipped in a file (.zip) sent by as attachment. 1.4 Weighted Networks Topological properties of a weighted graph The NAT suite enables the user to evaluate different topological properties of a user-defined weighted graph which can be uploaded on the server Web site from the user repository. The topological properties of weighted networks evaluated by the NAT platform are the following: D Provision of Prototype Leontief-Based Tool 10

11 Connectedness Verifies if the graph is connected or disconnected. A graph is defined as connected if there is a path connecting each pair of nodes i and j (with i j). Moreover, in case of a disconnected graph, the tool discovers the subgraphs whose nodes are completely connected. Degree Distribution Calculates: - the degree distribution, P(k), which is the fraction of nodes in the graph displaying degree k. The degree k i of a node i is the number of edges incident to that node. - the node weighted connectivity (or strength). Clustering Calculates the weighted clustering coefficient, C W, as the average of the local weighted clustering coefficients, c i W, of all nodes of the graph. Diameter Calculates: - the weighted shortest path lengths, d ij, of the graph, where d ij is the smallest sum of the edge lengths throughout all possible paths in the graph from node i to j. - the diameter, which is the maximum d ij, and the average of the weighted shortest paths. - the node closeness centrality, C C, which quantifies the closeness of a node i to all other nodes. Weighted Betweenness Centrality Calculates the weighted betweenness of the nodes and edges. Node Information Centrality Calculates the information centrality of the nodes. Information centrality, C I, assesses a node importance by the ability of the network to remedy the deactivation of that node. Edge Information Centrality Calculates the information centrality of the edges. Information centrality, C I, assesses an edge importance by the ability of the network to remedy the deactivation of that edge. Min Cut Evaluation of the min cut, consisting in the optimal partitioning of a graph of N nodes into two connected subgraphs of dimensions N 1 and N 2 (such that N = N 1 + N 2 ) separated by a minimum number of K edges. In the partitioning the weight of the edges is also considered Usage Input Data Types of analysis to be executed on the network. The user can select among: connectedness, betweenness centrality, degree distribution, node information centrality, clustering coefficient, edge information centrality, closeness centrality (+diameter), weighted min cut, shortest path length values. D Provision of Prototype Leontief-Based Tool 11

12 A text file (.ndf) with each line reporting a single triple of numbers is accepted. The first two numbers identify the linked nodes and the third one is corresponding to the weight of the link. The numbers of each triple must be separated by space(s) and/or tab(s). Output Data Analysis replies can be in the form of text (.txt) and/or figure (.jpg) and all together are zipped in a file (.zip) and sent by as attachment. 1.5 The Simulator Communication Networks Traffic Simulator The NAT Communication Networks Traffic Simulator tool enables the user to simulate the traffic dynamics in a packet-switched communication network. Packet-switched networks have a crucial relevance in our world; they are the backbone for all our communications and lots of critical infrastructures rely on them. The aim of this tool is to allow the study of the influence of network's structure on the traffic dynamics. Therefore, the NAT Communication Networks Traffic Simulator tool enables the simulation of the traffic dynamics on a switched network, composed by routers, lines. Packets are sent through the network. The model includes the main features of a data network: a send/receive mechanism, the routing nodes which have a static routing table, a policy to route packets of data, a buffer able to contain an unlimited number of data packets (handled by using a FIFO policy). (For further details on the model see [Rosa08]). The NAT platform has been also conceived to assess the influence of topology on the network traffic management Description of the elements of the Traffic Simulator The simulator takes as input the network topology described as an undirected unweighted graph, in which each node represents a router of the network and each edge represents a connection between two routers (link). Along that link the data can be exchanged in data units referenced to as packets. Routers are identified by an identification number (ID), i, (0 < i < (N-1)), where N is the total number of routers in the network. Links are identified by the couple of routers that they connect and each link is supposed to have an infinite bandwidth. In the simulator, the packets are identified by: creation time, origin router, destination router. Each packet is assumed to have zero size and the time needed to cross each link is supposed to be unitary. The dynamical evolution in time is presented in time steps (TS). At each TS, a router can send a packet to another router with a certain probability. A node cannot send a packet to itself. The amount of traffic present in the network is measured by the variable λ (0 < λ < 1), which measures the frequency with which a node emits a packet (or, equivalently, the fraction of nodes that, at a given TS, emits a packet). The packet is generated by a randomly chosen "emitting" node and directed to a randomly chosen "destination" node. Each router hosts a routing table (RT), where information about the next hop to reach every other router in the network is stored. The RTs present on each node are evaluated, once and forever, via the Breadth-first search algorithm. The strategy, which rules packet dispatching, is based, in fact, on the shortest path between sender and receiver: each pair of nodes (origin - destination) is associated with a routing path, which is formed by the nodes joining the minimal-distance path between the two nodes. In the present model, at a given TS, a node can send a fixed number of data packets and, in turn, can receive as many packets as needed (i.e., if more than one neighbour sent it a packet at the previous TS). In order to host multiple D Provision of Prototype Leontief-Based Tool 12

13 packets arriving simultaneously and to dispatch them at later time, each node has an infinite-size buffer, where packets are stored. When a packet arrives to a router, two cases are taken into account: If the router is the packet's destination, the packet is eliminated from the network, Otherwise, the packet is stored in the last position of the router's buffer, where it waits for being delivered. The buffer management complies with the First In - First Out (FIFO) policy: at each TS, each router picks the first packet (in order of arrival) from its queue and forwards it according to its routing table. All remaining packets get ahead in the queue. The simulation starts with an "empty" network, i.e., with no traffic and all buffers empty. In the course of simulation, buffers start filling and it takes a certain time (i.e., a certain number of simulation TS) for the emitted packets to reach the destination node. In the best possible case, the packet is re-emitted by a node the TS after its arrival to that node. However, if the buffer of that node is already filled by packets arrived at earlier time steps, the packet must remain on that node a number of TS equal to the number of packets waiting in the buffer, according to the FIFO policy Usage The NAT Communication Networks Traffic Simulator tool can be used via registration and authentication at the NAT Homepage. Input Data Simulation parameters: Insert simulation parameters, i.e., Lambda Start, Lambda Stop and Simulation Model to be applied. For a suggestion about Lambda Start and Lambda Stop values the user can refer to the tables. The suggestions are related with: Type of network utilized, Simulation model, Number of nodes in the network. The Simulation Model can be: Fixed Routing, No Power Routers Fixed Routing, High Power Routers Fixed Routing, Low Power Routers Deterministic Routing, High Power Routers Deterministic Routing, Low Power Routers Probabilistic Routing, High Power Routers Probabilistic Routing, Low Power Routers A valid address for the results. A valid Network Description File (.ndf). The initial value of θ parameter (θ min ). It defines the lower traffic level simulated. The final value of θ parameter (θ max ). It defines the maximum traffic level simulated in the run. Run identification name. Output Data Simulation replies consist of a text (results.txt), a figure (results.jpg) and a log (simulation.log) file. results.txt D Provision of Prototype Leontief-Based Tool 13

14 The file consists of a set of lines. Each line represents the results of a simulation for a fixed value of λ. results.jpg The file contains the graphical representation of results, in.jpg format. The x axis of the graph represents the value of λ, the y axis represents the mean packets arrival time <T>; both axes are in logarithmic scale. simulation.log Contains simulation logs information. In case of errors, the file reports the cause of the error, if known. 1.6 Interdependency Leontief-Based Simulator The interdependency Leontief-based simulator is an independent simulation environment that can be accessed from the NAT platform at Web address 2. Introduction to the Leontief-Based Model 2.1 The Leontief economic model The Leontief economic model as described in [HaJi01] considers the economy of a nation or region. This economy is divided into n distinct sectors or industries. Each of these sectors can be connected to any one of the other sectors. Thus, the economy can be regarded as an n nodes network. Each sector or node x k takes as an input some goods or services (x k1, x k2,, x kn ) that were produced by other sectors and, to some extent, by itself. It then produces an output (x 1k, x 2k,, x nk ), which in turn can serve as an input for other sectors or the public sector. The nodes in the system produce and consume some goods or services produced by other nodes. In addition, they can produce some output that will be consumed by the public sector. In this case, the system is called an open Leontief model, as opposed to a closed system, where all goods produced are consumed by the system s own elements. A node can also consider some additional input c k which could represent some external or system influence, not caused by other nodes (external demand). Figure 1 depicts a representation of a node within a Leontief model network. At each point in time, depending on its inputs, a node will be more or less able to produce its due output, thus, the node will be in some describable state. The aggregated production of all nodes leads to the system having a state that can be assessed depending on whether all nodes and the public sectors are provided with the goods or not. In case of perfect functionality (all nodes produce flawlessly), the system is said to be in the ground state or at equilibrium. c k x k1 x 1k x k2 x k x 2k x kn x nk Figure 1. A node and its input and output In case of a modification in the behaviour of some nodes (e.g. one node produces less than expected), the Leontief model offers a means to predict the behaviour of the system, i.e., how the change will propagate within the system and what will be the overall consequence of this change. It also helps compute which modifications are necessary for the system to return to equilibrium. D Provision of Prototype Leontief-Based Tool 14

15 2.2 Adapting the Leontief model to critical infrastructures The Leontief model can also be transferred to the problem of interdependent infrastructures. In [HaJi01], the production or consumption of a node in the economic model is replaced by its inoperability. Inoperability of a node or system means its inability to provide the expected good or service in the expected quality. The second measure is the dependency between nodes. Each pair of nodes can be described in terms of how strong the dependence of one on another is. The dependence relation can also be bidirectional. In this case, we say that the nodes or subsystems are interdependent. The input of a node is the inoperability of all nodes it depends on and its output is its own inoperability, which will influence the nodes that depend on it. Thus, at each point in time, a node is characterised by its inoperability value and the list and values of its dependencies upon other nodes. Dependency values can be assumed constant, while inoperability varies over time. The dynamics model In order to observe how a critical infrastructure system evolves over time, the inoperability values for the nodes are calculated and updated at each time period. At the beginning all values are set to 0 (all system components are operable). If we denote the inoperability of node x k also with x k, f k is a failure that can occur at time t, e.g. due to machine failure, natural catastrophe or external attack, then at each time t+1, the update equation for x k is: k n ( ( fk () t + = dk i xi () t ) x ( t + 1) = min 1, (4) i 1, where d k,i expresses the dependency of node x k upon node x i. The min operator guarantees that a node or subsystem can not fail more than 100%. This is the simplest version implemented. Under normal circumstances f k = 0. The basic Leontief economic model offers a basis for studying the interconnectedness and interdependencies within complex infrastructures. If a change occurs in the system, then the Leontief model helps to calculate which state the system will end up in. Setting the due values in the new state and solving the system brings out which values are necessary to get the system back to equilibrium. Moreover, one can determine how network s behaviour upon fault propagates within the system over time. With this knowledge one can develop the mitigation strategies necessary for the system to recover. The principle of Leontief model can be enhanced by using a hierarchical model of the complex infrastructures. This permits to decompose and aggregate the system where necessary. Although the Leontief model presents several advantages, it also has some limitations. One of the major disadvantages is the assumption that all dependency values among the network components are known in advance. Determining how one component depends exactly upon another can be a difficult task. Therefore, diverging models have also been considered, that can be used in combination with the Leontief model. There are studies [Seto07] that propose methodologies to assess the interdependency among critical infrastructures. In [Seto07], an Input-Output Inoperability Model, based on the Leontief model, is presented to analyze how the presence of dependencies and interdependencies among different sectors of the society may facilitate the spreading of degradation. Using sector specific questionnaires the approach acquires data from domain experts that assess the impact on the respective infrastructure of a malfunction of other infrastructures. The estimates of the experts are graded according to the level of influence their infrastructures take from the others. The estimates D Provision of Prototype Leontief-Based Tool 15

16 are done in five different time slots, using the time of the event as a reference point. The time evolution of some Leontief matrix entries, the degree of dependency of one infrastructure on the other (dependency index), and the influence that an infrastructure has on the other (influence gain) is shown. 2.3 The Leontief-based simulation tool: the algorithm Inoperability dynamics of interdependent networks The Leontief-Based Simulation (LBS) tool simulates a system composed of a set of interconnected networks (a network of networks). It allows the evaluation of the impact a fault in one network has on the rest of the system in terms of networks' inoperability. The basic assumption of this approach is that each network produces some product or gives some service. The interdependency is introduced by the fact that the products/services of one network are consumed by other network/s The system The Leontief-based simulation system can be formulated as follows: Consider a system S = {1,, n} consisting of n interdependent subsystems. Each subsystem is also called a node of S. If node i sends a product or gives some service to node j, there is an edge from node i to node j. The edge's magnitude implies the strength of the dependency between each two nodes of the system i, j S. It is denoted as ρ ij and is assumed to be constant in time, its values range between zero and one. We denote the matrix of the dependencies as ρ and ρ ij are also referred to as the Leontief technical coefficients. It is further assumed that each of the nodes is characterized by its inoperability denoted as x i. A node i is said to be fully operable, if x i = 0, and non operable, if x i = 1. In a normal situation, i.e., when no disturbance is introduced to the system, all subsystems are assumed to be fully operable, hence x i = 0 i S. To estimate the impact of a disturbance in one or more of the nodes the following inoperability dynamics equation is introduced: (For the derivation of this equation please consult [Tron06].) x i n + ρ ij j i i (5) j= 1 ( t 1) = min 1, x ( t) + γ d ( t) where ρ is the Leontief coefficients matrix, d i (t) [0, 1] is the disturbance (fault injection) at node i and γ i is the sensibility of node i to faults The simulation Given a set S of nodes and their initial inoperability x i (t=t 0 ) the LBS tool computes the inoperability of all nodes for t > t 0 according to equation (5). The result of the computation is presented to the user in the form of 2N plots showing the disturbance applied to the nodes and node's inoperability. D Provision of Prototype Leontief-Based Tool 16

17 Figure 2. Results of the inoperability dynamics for a system of 5 nodes subject to disturbance. As an example Figure 2 presents a simulation done on a system of 5 nodes, disturbance plots are on the left-hand side, inoperability is on the right. As can be seen in Figure 2 the disturbances applied to the nodes are not fixed in time. This is because the LBS operates as a controller, that is, in an endless loop it reads the networks state allowing to change the disturbance in real time. In other words, it is possible to introduce new disturbances and to eliminate, increase or decrease existing disturbances at any given moment of the simulation Optimisation While the first LBS dynamics feature gives the user the possibility to gain some intuition of how networks react to a disturbance coming from other networks or, in other words, how inoperability spreads over a network of networks, the second feature suggests a way to control that reaction by increasing the inoperability of a single network (system's node) artificially. As in case of a cascade in an electrical grid, a controlled increase of inoperability of one part of the system (e.g., a shut down of a line such that a whole area gets disconnected) can prevent the cascade from reaching other areas and, thus, the total damage decreases. Therefore, the goal is to increase the inoperability of a node in order to prevent the disturbance from propagating to the other nodes, thus, decreasing the total inoperability. For this aim an objective function, which represents a measure of the total inoperability, should be defined and then minimized. Total inoperability is the inoperability of the network of networks, which the LBS system stands for. To implement this strategy two additional elements are introduced to the system: a sink node (denoted as node zero), representing any external demand, and nodes buffers. The buffers function as a store house of the nodes. D Provision of Prototype Leontief-Based Tool 17

18 Let node i produce for node j an amount w ij of its product. If, for reason of disturbance, node j is unable to collect the product, then node i simply puts it in its buffer to be used once node j is again operable. If now for some reason node i has a reduction in its operability that is a decrease in its production, it can compensate this decrease taking what is stored in the buffer. This behaviour of the buffers can be described as: b i ( t + ) = b () t x () t + x () t i i n 1 ρ (6) j = 0 ij ij where x ij (t) is the inoperability between networks (nodes) i and j, that is the relative amount of product not delivered to j from i at time t: x ij () t W w W ij () t ij ij = (7) W ij is what should be produced and w ij (t) < W ij is the amount produced at time t. In [Tron06], the relation between system productivity and system inoperability is used to formulate the problem of minimizing the total inoperability as a Mixed Integer Linear Problem (MILP). The objective function to minimize is: h 1 n n γ t μixi, t + θi yi, t (8) t = 0 i= 1 i= 1 where y i,t = x i0 (t) denotes the inoperability of the networks (nodes) versus the external demand represented as the sink node (node zero) and μ i defines how important is to us subsystem i with respect to all others subsystems in the network; θ i defines how important is to us the output of subsystem i with respect to all other subsystem outputs; γ t defines the importance in our planning horizon h of the overall system inoperability at time t defined by expression (8). Given a network and initial inoperability settings of all nodes, the LBS tool computes new inoperability settings, so as to minimize the objective function defined above. The optimisation simulation also works as a controller. That is, in an endless loop it reads the network state and computes the new settings for node inoperabilities on a given horizon. The outputs are: node's inoperability, node's external demand inoperability, buffer values and the objective function values. The user can choose one of two modes for the visualisation of these values. In the first mode, there are four plots one for each output, as can be seen in Figure 3. The first three plots are bar plots indicating the output value of each node at a given moment of time, the forth plot is that of the objective function as a function of time. The plots are being updated as the simulation runs. D Provision of Prototype Leontief-Based Tool 18

19 Figure 3. Output of LBS for a system of 5 networks in the first mode of presentation. The second mode presents plots only for a selected number of nodes (no more than 5), where outputs are given to each node as a function of time. An additional plot is shown for the objective function, as seen in Figure 4. Figure 4. Output of LBS for a system of 5 networks in the second mode of presentation. D Provision of Prototype Leontief-Based Tool 19

20 Figure 4 shows the output of LBS for a system of 5 networks in the second mode of presentation. Each column of plots contains 5 plots representing the 5 networks of the system. The three columns from left to right are the measures of inoperability, external inoperability and buffer contents. At the bottom are the objective function values during the 50 time steps of the simulation. 3. Introduction to the Leontief-Based Simulation (LBS) Tool 3.1 Home page Login Username Password Documentation Login Create an account Download documents Create an account A.tar.gz file Name Surname Address Username Password Figure 5. Organization of the Home page The Home page of the Leontief-Based Simulation Tool is the entrance to the simulator. Its Web address is From this page the user can (Figure 5): Login to the tool, Download documentation, Create a Leontief account. 3.2 Creating an account to the tool In order to create an account, the user has to fill in some obligatory fields: name, surname, an address, username, and password. That information is necessary for the administration of the tool. 3.3 Downloading documentation The user can download the documentation of the tool in.tar.gz format. The zipped file contains a brief tutorial of how to create the input files, a technical report describing the tool and the input files used in the technical report. 3.4 User login to the Leontief-based tool The login to the LBS tool is made via user name and password. 3.5 Managing a Leontief account From the page of management (Figure 6) the user can run the Leontief algorithm selecting the maximum execution time in seconds or minutes. D Provision of Prototype Leontief-Based Tool 20

21 Number of nodes n Create a network Upload a network Download the network Run the network New network Leontief technical coefficients ρ ij Inoperability values x ij Sensibility to failure γ i Disturbance values d i Upload Number of nodes Size.dat Leontief technical coefficients Rho.dat Inoperability values Inop.dat Sensibility to failure Beta.dat Disturbance values Fail.dat Number of nodes Size.dat Leontief technical coefficients Rho.dat Diagrams Download Inoperability values Inop.dat Sensibility to failure Beta.dat Disturbance values Fail.dat Figure 6. Management of the network Before the execution the following actions can be done: creating a network with maximum 5 nodes, uploading the network giving the respective files size.dat, rho.dat, inop.dat, fail.dat, and beta.dat, or executing the network that is already created during the last user s access to the site (download the network). From this page the user can start or stop the execution Executing the algorithm If the user chose to start the execution of the Leontief algorithm, a new window opens showing the diagrams of inoperability and disturbance of the network nodes at run time. The diagrams for the five network nodes (subnetworks) are shown in two columns. The first column displays the disturbance for every node of the network as a function of time. The second column depicts nodes inoperability as a function of time. The algorithm s execution can be stopped at any time. At the end of the execution the diagrams (the plots) can be saved (downloaded) for future use and examination. They are displayed as a JPEG file. D Provision of Prototype Leontief-Based Tool 21

22 3.5.2 Creation of a network To create a new network the user can select the option Create a Network in the main menu. He/she can select up to five nodes (subnetworks) for the network. Then he/she is prompted to insert the Leontief technical coefficients, ρ ij, for the network arcs in a table. A file rho.dat is created that contains the coefficients chosen. The creation of the network continues with the insertion of the inoperability values, x ij, for the network nodes. A file inop.dat is created with the values chosen. In the next window, the values of the failure sensibility of the nodes, γ i, are inserted. A file beta.dat is created. The disturbance values, d i, for the network nodes are inserted in the next window. A file fail.dat is created. In that way, the network is created and the user can proceed with its execution Downloading the network From the main menu the user can download the network that is present in the account for future use and experimentation. The following files are downloaded: rho.dat, size.dat, beta.dat, fail.dat, and inop.dat. If the user follows the links to the files, he/she can see the values of the parameters inserted Uploading the network If the user wants to use a network that is already created during the previous access of the user to the modelling tool, he/she can upload the files rho.dat, size.dat, beta.dat, fail.dat, and inop.dat Starting the execution There are three options for the user before he/she starts the execution of the model: If no network is specified, the LBS tool starts to execute the network from the last user s access to the tool. If the user wants to create a new network, after he/she inserts the input parameters, the LBS tool executes the network just created. If the user has uploaded a network of his/her choice, then the LBS tool executes that network Stopping the execution The execution of the model can be stopped at any point. For a detailed description of the Leontief-based tool see Appendix A. 4. References [NAT] [Starlink] [Leontief] or [HaJi01] Pu Jiang and Y. Y. Haimes, Risk Management for Leontief-Based Interdependent Systems, Risk Analysis, Vol. 24, No. 5, 2004 [Seto07] R. Setola and S. De Porcellinis, A Methodology to Estimate Input-Output Inoperability Model Parameters D Provision of Prototype Leontief-Based Tool 22

23 [Tron06] E. Tronci, Methods and Instruments for Evaluation of Interdependencies among Technological Networks and Minimization of Inoperability Caused by Natural and/or Deliberate Events, Technical Report, Nov [Rosa08] V.Rosato et al., Is the topology of the Internet network really fit to sustain its function?, Physica A 387 (2008), pp D Provision of Prototype Leontief-Based Tool 23

24 Appendix A Leontief-Based Simulation Tool User s Guide 1. The Leontief-based simulation tool: the algorithm 1.1 Inoperability dynamics of interdependent networks The Leontief-Based Simulation (LBS) tool [Leontief] simulates a system composed of a set of interconnected networks (a network of networks). It allows the evaluation of the impact a fault in one network has on the rest of the system in terms of networks' inoperability. The basic assumption of this approach is that each network produces some product or gives some service. The interdependency is introduced by the fact that the products/services of one network are consumed by other network/s. 1.2 The system The LBS system can be formulated as follows: Consider a system S = {1,, n} consisting of n interdependent subsystems. Each subsystem is also called a node of S. If node i sends a product or gives some service to node j, there is an edge from node i to node j. The edge's magnitude implies the strength of the dependency between each two nodes of the system i, j S. It is denoted as ρ ij and is assumed to be constant in time, ρ ij [ 0,1]. The matrix of the dependencies is denoted as ρ and ρ ij are also referred to as the Leontief technical coefficients. It is further assumed that each of the nodes is characterized by its inoperability denoted as x i. A node i is said to be fully operable, if x i = 0, and non operable, if x i = 1. In a normal situation, i.e., when no disturbance is introduced to the system, all subsystems are assumed to be fully operable, hence x i = 0 i S. To estimate the impact of a disturbance in one or more of the nodes the following inoperability dynamics equation is introduced [Tron06]: x i n + ρ ij j i i (1) j= 1 ( t 1) = min 1, x ( t) + γ d ( t) where ρ is the Leontief coefficients matrix, d i (t) [0, 1] is the disturbance (fault injection) at node i and γ i is the sensibility of node i to faults. 1.3 The simulation Given a set S of nodes and their initial inoperability x i (t=t 0 ) the LBS tool computes the inoperability of all nodes for t > t 0 according to equation (1). The result of the computation is presented to the user in the form of 2N plots showing the disturbance applied to the nodes and node's inoperability. As an example Figure 1 presents a simulation done on a system of 5 nodes, disturbance plots are on the left-hand side, inoperability is on the right. D Provision of Prototype Leontief-Based Tool 24

25 As can be seen in Figure 1 the disturbances applied to the nodes are not fixed in time. This is because the LBS tool operates as a controller, that is, in an endless loop it reads the networks state, allowing change of the disturbance in real time. In other words, it is possible to introduce new disturbances and to eliminate, increase or decrease existing disturbances at any given moment of the simulation. 1.4 Optimisation Figure 1. Results of the inoperability dynamics for a system of 5 nodes subject to disturbance. While the first LBS dynamics feature gives the user the possibility to gain some intuition of how networks react to a disturbance coming from other networks or, in other words, how inoperability spreads over a network of networks, the second feature suggests a way to control that reaction by increasing the inoperability of a single network artificially. For example, in case of a cascade in an electrical grid, a controlled increase of inoperability of one part of the system (such as a shut down of a line to disconnect the whole area) can prevent the cascade from reaching other areas and, thus, the total damage decreases. The goal is to increase the inoperability of a node in order to prevent the disturbance from propagating to the other nodes, thus, decreasing the total inoperability. For this aim an objective function, which represents a measure of the total inoperability, should be defined and then minimized. By total inoperability we mean the inoperability of the network of networks, which the LBS system stands for. To implement this strategy two additional elements are introduced to the system: a sink node (denoted as node zero), representing any external demand, and nodes buffers. The buffers function as a store house of the nodes. The objective function to minimize is then: D Provision of Prototype Leontief-Based Tool 25

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Effects of node buffer and capacity on network traffic

Effects of node buffer and capacity on network traffic Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,

More information

Social Media Mining. Graph Essentials

Social Media Mining. Graph Essentials Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu

More information

TD 271 Rev.1 (PLEN/15)

TD 271 Rev.1 (PLEN/15) INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 15 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 12/15 Geneva, 31 May - 11 June 2010 Source:

More information

Part 2: Community Detection

Part 2: Community Detection Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -

More information

Complex Networks Analysis: Clustering Methods

Complex Networks Analysis: Clustering Methods Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich nefedov@isi.ee.ethz.ch 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications

More information

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003 Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS

USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu ABSTRACT This

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

Nonlinear Iterative Partial Least Squares Method

Nonlinear Iterative Partial Least Squares Method Numerical Methods for Determining Principal Component Analysis Abstract Factors Béchu, S., Richard-Plouet, M., Fernandez, V., Walton, J., and Fairley, N. (2016) Developments in numerical treatments for

More information

Practical Graph Mining with R. 5. Link Analysis

Practical Graph Mining with R. 5. Link Analysis Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities

More information

Circuits 1 M H Miller

Circuits 1 M H Miller Introduction to Graph Theory Introduction These notes are primarily a digression to provide general background remarks. The subject is an efficient procedure for the determination of voltages and currents

More information

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1 System Interconnect Architectures CSCI 8150 Advanced Computer Architecture Hwang, Chapter 2 Program and Network Properties 2.4 System Interconnect Architectures Direct networks for static connections Indirect

More information

Mining Social-Network Graphs

Mining Social-Network Graphs 342 Chapter 10 Mining Social-Network Graphs There is much information to be gained by analyzing the large-scale data that is derived from social networks. The best-known example of a social network is

More information

On the Interaction and Competition among Internet Service Providers

On the Interaction and Competition among Internet Service Providers On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers

More information

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents

More information

TABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES

TABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES TABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES ii iii x xiv CHAPTER 1: INTRODUCTION 1 1.0 Background 1 1.1 Research Motivation 4 1.2 Research Objectives 5 1.3 Project Scope 6

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

arxiv:physics/0601033 v1 6 Jan 2006

arxiv:physics/0601033 v1 6 Jan 2006 Analysis of telephone network traffic based on a complex user network Yongxiang Xia, Chi K. Tse, Francis C. M. Lau, Wai Man Tam, Michael Small arxiv:physics/0601033 v1 6 Jan 2006 Department of Electronic

More information

Analyzing Distribution of Traffic Capacity

Analyzing Distribution of Traffic Capacity Analyzing Distribution of Traffic Capacity D. Mancas, E. I. Manole, N. Enescu, S. Udristoiu Abstract In this paper, an evaluation of the network routing algorithms is made. In a real network, it is expected

More information

Towards Modelling The Internet Topology The Interactive Growth Model

Towards Modelling The Internet Topology The Interactive Growth Model Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS

More information

DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS

DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS International Scientific Conference & International Workshop Present Day Trends of Innovations 2012 28 th 29 th May 2012 Łomża, Poland DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS Lubos Takac 1 Michal Zabovsky

More information

How To Find Influence Between Two Concepts In A Network

How To Find Influence Between Two Concepts In A Network 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation Influence Discovery in Semantic Networks: An Initial Approach Marcello Trovati and Ovidiu Bagdasar School of Computing

More information

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: M.Vidyasagar@utdallas.edu October 17, 2015 Outline

More information

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu

More information

Dynamic Network Analyzer Building a Framework for the Graph-theoretic Analysis of Dynamic Networks

Dynamic Network Analyzer Building a Framework for the Graph-theoretic Analysis of Dynamic Networks Dynamic Network Analyzer Building a Framework for the Graph-theoretic Analysis of Dynamic Networks Benjamin Schiller and Thorsten Strufe P2P Networks - TU Darmstadt [schiller, strufe][at]cs.tu-darmstadt.de

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Why? A central concept in Computer Science. Algorithms are ubiquitous.

Why? A central concept in Computer Science. Algorithms are ubiquitous. Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online

More information

SPANNING CACTI FOR STRUCTURALLY CONTROLLABLE NETWORKS NGO THI TU ANH NATIONAL UNIVERSITY OF SINGAPORE

SPANNING CACTI FOR STRUCTURALLY CONTROLLABLE NETWORKS NGO THI TU ANH NATIONAL UNIVERSITY OF SINGAPORE SPANNING CACTI FOR STRUCTURALLY CONTROLLABLE NETWORKS NGO THI TU ANH NATIONAL UNIVERSITY OF SINGAPORE 2012 SPANNING CACTI FOR STRUCTURALLY CONTROLLABLE NETWORKS NGO THI TU ANH (M.Sc., SFU, Russia) A THESIS

More information

Social Media Mining. Network Measures

Social Media Mining. Network Measures Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users

More information

IP Traffic Engineering over OMP technique

IP Traffic Engineering over OMP technique IP Traffic Engineering over OMP technique 1 Károly Farkas, 1 Zoltán Balogh, 2 Henrik Villför 1 High Speed Networks Laboratory Department of Telecommunications and Telematics Technical University of Budapest,

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

Collapse by Cascading Failures in Hybrid Attacked Regional Internet

Collapse by Cascading Failures in Hybrid Attacked Regional Internet Collapse by Cascading Failures in Hybrid Attacked Regional Internet Ye Xu and Zhuo Wang College of Information Science and Engineering, Shenyang Ligong University, Shenyang China xuy.mail@gmail.com Abstract

More information

Three Effective Top-Down Clustering Algorithms for Location Database Systems

Three Effective Top-Down Clustering Algorithms for Location Database Systems Three Effective Top-Down Clustering Algorithms for Location Database Systems Kwang-Jo Lee and Sung-Bong Yang Department of Computer Science, Yonsei University, Seoul, Republic of Korea {kjlee5435, yang}@cs.yonsei.ac.kr

More information

Metabolic Network Analysis

Metabolic Network Analysis Metabolic Network nalysis Overview -- modelling chemical reaction networks -- Levels of modelling Lecture II: Modelling chemical reaction networks dr. Sander Hille shille@math.leidenuniv.nl http://www.math.leidenuniv.nl/~shille

More information

NETZCOPE - a tool to analyze and display complex R&D collaboration networks

NETZCOPE - a tool to analyze and display complex R&D collaboration networks The Task Concepts from Spectral Graph Theory EU R&D Network Analysis Netzcope Screenshots NETZCOPE - a tool to analyze and display complex R&D collaboration networks L. Streit & O. Strogan BiBoS, Univ.

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!

Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere! Interconnection Networks Interconnection Networks Interconnection networks are used everywhere! Supercomputers connecting the processors Routers connecting the ports can consider a router as a parallel

More information

15.062 Data Mining: Algorithms and Applications Matrix Math Review

15.062 Data Mining: Algorithms and Applications Matrix Math Review .6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop

More information

A discussion of Statistical Mechanics of Complex Networks P. Part I

A discussion of Statistical Mechanics of Complex Networks P. Part I A discussion of Statistical Mechanics of Complex Networks Part I Review of Modern Physics, Vol. 74, 2002 Small Word Networks Clustering Coefficient Scale-Free Networks Erdös-Rényi model cover only parts

More information

Graph theoretic approach to analyze amino acid network

Graph theoretic approach to analyze amino acid network Int. J. Adv. Appl. Math. and Mech. 2(3) (2015) 31-37 (ISSN: 2347-2529) Journal homepage: www.ijaamm.com International Journal of Advances in Applied Mathematics and Mechanics Graph theoretic approach to

More information

A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing

A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing N.F. Huysamen and A.E. Krzesinski Department of Mathematical Sciences University of Stellenbosch 7600 Stellenbosch, South

More information

2004 Networks UK Publishers. Reprinted with permission.

2004 Networks UK Publishers. Reprinted with permission. Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET

More information

Distance Degree Sequences for Network Analysis

Distance Degree Sequences for Network Analysis Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation

More information

Fault Analysis in Software with the Data Interaction of Classes

Fault Analysis in Software with the Data Interaction of Classes , pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered

More information

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

EPM Performance Suite Profitability Administration & Security Guide

EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 Windows Patents Trademarks Copyright Third-party Contributors Business Objects

More information

HSR HOCHSCHULE FÜR TECHNIK RA PPERSW I L

HSR HOCHSCHULE FÜR TECHNIK RA PPERSW I L 1 An Introduction into Modelling and Simulation 4. A Series of Labs to Learn Simio af&e Prof. Dr.-Ing. Andreas Rinkel andreas.rinkel@hsr.ch Tel.: +41 (0) 55 2224928 Mobil: +41 (0) 79 3320562 Lab 1 Lab

More information

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu

More information

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti

More information

LOGICAL TOPOLOGY DESIGN Practical tools to configure networks

LOGICAL TOPOLOGY DESIGN Practical tools to configure networks LOGICAL TOPOLOGY DESIGN Practical tools to configure networks Guido. A. Gavilanes February, 2010 1 Introduction to LTD " Design a topology for specific requirements " A service provider must optimize its

More information

A hierarchical multicriteria routing model with traffic splitting for MPLS networks

A hierarchical multicriteria routing model with traffic splitting for MPLS networks A hierarchical multicriteria routing model with traffic splitting for MPLS networks João Clímaco, José Craveirinha, Marta Pascoal jclimaco@inesccpt, jcrav@deecucpt, marta@matucpt University of Coimbra

More information

Technology, Kolkata, INDIA, pal.sanjaykumar@gmail.com. sssarma2001@yahoo.com

Technology, Kolkata, INDIA, pal.sanjaykumar@gmail.com. sssarma2001@yahoo.com Sanjay Kumar Pal 1 and Samar Sen Sarma 2 1 Department of Computer Science & Applications, NSHM College of Management & Technology, Kolkata, INDIA, pal.sanjaykumar@gmail.com 2 Department of Computer Science

More information

Probabilistic Response of Interdependent Infrastructure Networks

Probabilistic Response of Interdependent Infrastructure Networks Probabilistic Response of Interdependent Infrastructure Networks Leonardo Dueñas-Osorio, James I. Craig, and Barry J. Goodno ABSTRACT Interdependent infrastructures constitute one of the most visible examples

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani

Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine Placement Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani Overview:

More information

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University park.764@osu.edu yilmaz.15@osu.edu ABSTRACT Depending

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Web Mining using Artificial Ant Colonies : A Survey

Web Mining using Artificial Ant Colonies : A Survey Web Mining using Artificial Ant Colonies : A Survey Richa Gupta Department of Computer Science University of Delhi ABSTRACT : Web mining has been very crucial to any organization as it provides useful

More information

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

Network management and QoS provisioning - QoS in the Internet

Network management and QoS provisioning - QoS in the Internet QoS in the Internet Inernet approach is based on datagram service (best effort), so provide QoS was not a purpose for developers. Mainly problems are:. recognizing flows;. manage the issue that packets

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

Memory Systems. Static Random Access Memory (SRAM) Cell

Memory Systems. Static Random Access Memory (SRAM) Cell Memory Systems This chapter begins the discussion of memory systems from the implementation of a single bit. The architecture of memory chips is then constructed using arrays of bit implementations coupled

More information

Towards Load Balancing in SDN Networks During DDoS attacks

Towards Load Balancing in SDN Networks During DDoS attacks Towards Load Balancing in SDN Networks During DDoS attacks Mikhail Belyaev St.Petersburg Polytechnic University Svetlana Gaivoronski Moscow State University ARCCN DDoS - attacks DDoS attack distributed

More information

Web Load Stress Testing

Web Load Stress Testing Web Load Stress Testing Overview A Web load stress test is a diagnostic tool that helps predict how a website will respond to various traffic levels. This test can answer critical questions such as: How

More information

Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging

Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Aravind. P, Kalaiarasan.A 2, D. Rajini Girinath 3 PG Student, Dept. of CSE, Anand Institute of Higher Technology,

More information

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

Interconnection Networks

Interconnection Networks CMPT765/408 08-1 Interconnection Networks Qianping Gu 1 Interconnection Networks The note is mainly based on Chapters 1, 2, and 4 of Interconnection Networks, An Engineering Approach by J. Duato, S. Yalamanchili,

More information

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

1. Introduction 2. Programs access rights 3. Fiscal Media Player 4. Fiscal Media Manager 5. Fiscal Media Server 6. Examples

1. Introduction 2. Programs access rights 3. Fiscal Media Player 4. Fiscal Media Manager 5. Fiscal Media Server 6. Examples 1 Fiscal Digital Signage System 1. Introduction 2. Programs access rights 3. Fiscal Media Player 4. Fiscal Media Manager 5. Fiscal Media Server 6. Examples 1. Introduction These instructions are intended

More information

Francesco Sorrentino Department of Mechanical Engineering

Francesco Sorrentino Department of Mechanical Engineering Master stability function approaches to analyze stability of the synchronous evolution for hypernetworks and of synchronized clusters for networks with symmetries Francesco Sorrentino Department of Mechanical

More information

Protein Protein Interaction Networks

Protein Protein Interaction Networks Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics

More information

Exam 1 Review Questions

Exam 1 Review Questions CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web

More information

PORTAL ADMINISTRATION

PORTAL ADMINISTRATION 1 Portal Administration User s Guide PORTAL ADMINISTRATION GUIDE Page 1 2 Portal Administration User s Guide Table of Contents Introduction...5 Core Portal Framework Concepts...5 Key Items...5 Layouts...5

More information

DATA ANALYSIS II. Matrix Algorithms

DATA ANALYSIS II. Matrix Algorithms DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where

More information

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software

More information

Capacity planning and.

Capacity planning and. Some economical principles Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Assume users have

More information

Instructor Notes for Lab 3

Instructor Notes for Lab 3 Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in

More information

University of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities

University of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities II.2 Life Cycle and Safety Safety Life Cycle: The necessary activities involving safety-related systems, occurring during a period of time that starts at the concept phase of a project and finishes when

More information

Securepoint Network Access Controller (NAC)

Securepoint Network Access Controller (NAC) Securepoint Network Access Controller (NAC) Administration Guide Business Class Secure Mobility Version 1 2 Securepoint NAC Administration Guide 1 Table of contents 1 Table of contents... 2 2 Table of

More information

ModelingandSimulationofthe OpenSourceSoftware Community

ModelingandSimulationofthe OpenSourceSoftware Community ModelingandSimulationofthe OpenSourceSoftware Community Yongqin Gao, GregMadey Departmentof ComputerScience and Engineering University ofnotre Dame ygao,gmadey@nd.edu Vince Freeh Department of ComputerScience

More information

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing

More information

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,

More information

Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi

Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Lecture - 9 Basic Scheduling with A-O-A Networks Today we are going to be talking

More information

Pharos Control User Guide

Pharos Control User Guide Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter

More information

An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic

An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic Ó The Author 26. Published by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: journals.permissions@oxfordjournals.org doi:1.193/comjnl/bxl26

More information

CORRELATED TO THE SOUTH CAROLINA COLLEGE AND CAREER-READY FOUNDATIONS IN ALGEBRA

CORRELATED TO THE SOUTH CAROLINA COLLEGE AND CAREER-READY FOUNDATIONS IN ALGEBRA We Can Early Learning Curriculum PreK Grades 8 12 INSIDE ALGEBRA, GRADES 8 12 CORRELATED TO THE SOUTH CAROLINA COLLEGE AND CAREER-READY FOUNDATIONS IN ALGEBRA April 2016 www.voyagersopris.com Mathematical

More information