Necessary backbone of superhighways for transport on geographical complex networks
|
|
- Marybeth Brown
- 7 years ago
- Views:
Transcription
1 Necessary backbone of superhighways for transport on geographical complex networks Yukio Hayashi Japan Advanced Institute of Science and Technology ECCS 2007 p.1/31
2 1. Introduction Dynamic configuration of (backbone) networks in an emergent or self-organized manner Problems for efficient communication such as in distributed sensor networks or P2P systems dissipation of wireless beam-power or wired line-cost for long-range links interference by crossing of links (non-planar) to realize efficient transport of packets ECCS 2007 p.2/31
3 1-1. Model of Ad-Hoc Nets We assume that a network evolves with a new node the position of each node is fixed a few nodes have sufficient power to be hubs various transmission ranges and the orientation are controllable (for wireless links) It is better that only local information is used because of the topological change These are reasonable in the current technology, but we don t care about the details in device or application ECCS 2007 p.3/31
4 1-2. Efficient Routing Planar triangulation: reasonable math. abstraction of ad hoc net. Moreover, a memoryless, no defeat, and competitive online routing algorithm has been developed for planar networks taking into account the face. Source Destination Bose and Morin, SIAM J. of Comp. 33(4), 2004 ECCS 2007 p.4/31
5 1-3. Motivation for Shortcuts Shorten the path length remaining local clusters SW model, D.J. Watts and S.H. Strogatz, Nature, 393, 1998 Moreover, the robustness can be improved by adding shortcuts to a one-dim. SW model C. Moore, and M.E.J. Newman, PRE 61, 2000 ECCS 2007 p.5/31
6 1-4. Objective To investigate the effect of shortcuts on geographical networks in the viewpoints: the tolerance of connectivity to random failures and targeted attacks on hubs the backbone for transport measured by the usage and centrality of links on the shortest paths in typical planar network models: random Apollonian network in complex network science, Delaunay triangulation in computer science, our proposed models to bridge them. ECCS 2007 p.6/31
7 1-5. Scale-Free Nets with Hubs Existing a surprisingly common structure: SF net. the degree dist. follows P (k) k γ, 2 < γ < 3, in many social, technological, and biological nets. ECCS 2007 p.7/31
8 1-5. Scale-Free Nets with Hubs Existing a surprisingly common structure: SF net. the degree dist. follows P (k) k γ, 2 < γ < 3, in many social, technological, and biological nets. Efficiency & Economy with short paths as the hop-count O(ln N) and the low cost of links as few as possible in the connectivity (Solé et al., Advances in Complex Systems 5, 2002) ECCS 2007 p.7/31
9 1-5. Scale-Free Nets with Hubs Existing a surprisingly common structure: SF net. the degree dist. follows P (k) k γ, 2 < γ < 3, in many social, technological, and biological nets. Efficiency & Economy with short paths as the hop-count O(ln N) and the low cost of links as few as possible in the connectivity (Solé et al., Advances in Complex Systems 5, 2002) Robust connectivity for random failures (Albert et al., Nature 406, 2000) ECCS 2007 p.7/31
10 1-5. Scale-Free Nets with Hubs Existing a surprisingly common structure: SF net. the degree dist. follows P (k) k γ, 2 < γ < 3, in many social, technological, and biological nets. Efficiency & Economy with short paths as the hop-count O(ln N) and the low cost of links as few as possible in the connectivity (Solé et al., Advances in Complex Systems 5, 2002) Robust connectivity for random failures (Albert et al., Nature 406, 2000) However, most of SF net models were irrelevant to a geographical space. ECCS 2007 p.7/31
11 2. Geographical SF Nets Many real nets have not only scale-free but also geographical heterogeneity: The Internet, power-grid, and airline-flight connections, etc. are embedded in a metric space Nodes are usually concentrated in a urban city (there are dense and sparse areas on the earth) Especially for wireless communication, planarity is suitable Majority of links are short due to economical reasons for the construction and maintenance costs ECCS 2007 p.8/31
12 2-1. Rare Long-range Links Histograms of the lengths of links Gastner and Newman, Eur. Phys. J.B 49, 2005 Also, the length dist. of the links between routers: P (l) l 1 Yook et al., PNAS 99, 21, 2002 ECCS 2007 p.9/31
13 2-2. Random Apollonian Net Configuration: iterative subdivision of a randomly chosen triangle from an initial triangulation Initial triangulation Add a new node inside a chosen triangle Connect to its closest 3 nodes Some long-range links naturally appear in narrow collapsed triangles near the boundary edges Zhou, Yan, Wang, Phys. Rev. E 71, 2005 ECCS 2007 p.10/31
14 2-3. Voronoi and Delaunay Optimal triangulation in some geometric criteria: maximim angle, minimax circumcircle, short path length in the same order as the direct Euclidean dist. Dual Graph Consider the combination of RA (by triangulation on a plane) and DT to avoid the long-range links ECCS 2007 p.11/31
15 2-4. Delaunay-like SF Net We propose DLSF: Set an initial planar triangulation. Select a triangle at random and add a new node at the barycenter. Then, connect the new node to its three nodes tentatively. By iteratively applying diagonal flips, connect it to the nearest node(s) within a radius as a localization. = + 1st diagonal flip 2nd diagonal flip ECCS 2007 p.12/31
16 2-5. Topological Structure DLSF has the intermediate structure RA DT DLSF We should remark that there exists mixing of dense and sparse areas as similar to a population density star-like stubs at four corner and the center nodes ECCS 2007 p.13/31
17 2-6. Degree Distribution RA DT DLSF P(k) k RA: power law, DT: lognormal, DLSF: power law with exponential cutoff (the deg. of hubs are reduced) ECCS 2007 p.14/31
18 3. Improvement of Robustness SF nets are extremely vulnerable for the intentional attacks on hubs R. Albert, and A.-L. Barabási, Nature 406, 378, 2000 It s further affected by geographical constraints, such as local cycles. ECCS 2007 p.15/31
19 3-1. Theoretical Prediction The breaking of connectivity for random failures becomes more serious by small-order cycles On the assumpt. of a tree L c = 0, the percolation threshold q c = k /( k 2 k ) is well-known. It is generalized to any cycle length e.g. L c = 3, q c = k(k 1) k ( ) k(k 2) 1 q c k, C(k)k(k 1) 2 1 f c = q c > q c predicts decreasing of robustness. Huang et al., Europhy. Lett. 72, 2005 & PRE 75, 2007 ECCS 2007 p.16/31
20 3-2. Damages by Attacks Initial N=200 targeted attacks on 16 hubs RA DT Vulnerable RA broken to many isolated clusters ECCS 2007 p.17/31
21 3-3. Overhead Bridge The effect of adding shortcuts on the robustness To bridge the isolated areas on the plain ECCS 2007 p.18/31
22 3-4. Giant Component Relative size S/N of the GC vs. fraction f of attacks Relative size S/N % 3% 5% 7% 10% 20% 30% Relative size S/N % 3% 5% 7% 10% 20% 30% Relative size S/N % 3% 5% 7% 10% 20% 30% Fraction f of attacks RA Fraction f of attacks DT Fraction f of attacks DLSF Hayashi et. al., Physica A 380, 2007 The robustness is improved remaining with a bigger GC from 0 % to 30 % of the shortcuts rate ECCS 2007 p.19/31
23 3-5. Hetero. Communication Spatially heterogeneous communication Assumed that both source and terminal are chosen in uniformly random from all nodes at every time step. However the spatial distribution of packet generation and receiving is remarkably heterogeneous Dense area much more communication Sparse area few frequent one according to the geographical configuration of nodes. ECCS 2007 p.20/31
24 3-6. Superhighways Consider the distribution P (u) of frequency of superhighways u def = l super /l short where l super is the number of shortcuts in a given shortest path of length l short 10 0 qs = 0.03 qs = qs = 0.03 qs = qs = 0.03 qs = P(u) 10 4 P(u) 10 4 P(u) u RA u DT u DLSF High frequency in spite of only 3 or 10 % of the total ECCS 2007 p.21/31
25 3-7. P (B l ) of Link Centrality Normalized betweenness centrality of link l on the shortest distant path between nodes j and k B l def = 2 (N 2)(N 3) k j l1,l2 b j k (l), b j k Planar Shortcut Planar Shortcut Planar Shortcut P(B l ) 10 3 P(B l ) 10 3 P(B l ) B l B l B l RA DT DLSF The peak is righter for the shortcuts with higher B l ECCS 2007 p.22/31
26 4. Summary: shortcut effects Based on the realistic SF properties, we ve proposed a modified model from RA in complex net. science and DT in computer science to reduce long-range links on a planar space for ad hoc networks. For the vulnerability to attacks caused by geographical constraints, it has been shown that adding shortcuts of only about 10 % of the total improve it. They also construct a necessary backbone such as superhighways to bridge isolated clusters (more contribute in the measures of frequency and centrality of links used on the shortest distant paths.) ECCS 2007 p.23/31
27 Thanks Thank you for your kind attention! Related papers: (see Ref. in the Proc.) Geographical effects on the path length and the robustness in complex networks, Physical Review E 73, , (2006). Improvement of the robustness on geographical networks by adding shortcuts, Physica A 380, , (2007). ECCS 2007 p.24/31
28 A1. Damages by Failures Initial N=200 randomly removed 32 nodes RA DT Similarly remained connectivity in the GC ECCS 2007 p.25/31
29 A2. Breaking of GC at the Peak Average size s of isolated clusters except of the GC vs. fraction f of attacks Average size <s> of isolated clusters Average size <s> of isolated clusters Fraction f of attacks 0% 3% 5% 7% 10% 20% 30% Fraction f of attacks RA Average size <s> of isolated clusters % 3% 5% 7% 10% 20% 30% Fraction f of attacks DT Average size <s> of isolated clusters Average size <s> of isolated clusters Fraction f of attacks 0% 3% 5% 7% 10% 20% 30% Fraction f of attacks DLSF Inset shows the peaks enlarged by other scale of the vertical axis. The robustness is more improved by larger shortcut rate (from 0 % to 30 %). ECCS 2007 p.26/31
30 A3. Randomly Rewired Nets We compare the tolerance to random failures of nodes and targeted attacks on hubs in the geographical and non-geographical randomly rewired networks, when a fraction f of nodes is removed. : : : : : : : : : : : : : : : : Rewiring a pair of links with the same degree at each node Maslov et al., Physica A 333, 2004 ECCS 2007 p.27/31
31 A4. Tolerance to Failures Relative size S/N of the giant component Inset: the average size s of isolated clusters <s> RA RA+NN(one) RA+NN(all) DT RA RA+NN(one) RA+NN(all) DT <s> RA RA+NN(one) RA+NN(all) DT RA RA+NN(one) RA+NN(all) DT Relative size S/N f Relative size S/N f Fraction f of failures (a) geographical nets Fraction f of failures (b) rewired nets Similar robustness in RA:, DT:, DLSF: + ECCS 2007 p.28/31
32 A5. Tolerance to Attacks Relative size S/N <s> RA RA+NN(one) RA+NN(all) DT RA RA+NN(one) RA+NN(all) DT f Fraction f of attacks (a) geographical nets Relative size S/N RA RA+NN(one) RA+NN(all) DT f Fraction f of attacks <s> (b) rewired nets Improvement from the extremely vulnerable RA Hayashi et. al., PRE 73, 2006 RA RA+NN(one) RA+NN(all) DT ECCS 2007 p.29/31
33 A6. Classes of Geo. SF Nets Modulated BA: Π i k i l α, rand. position of node SF on lattices: connect within r = A k 1/d i Space-filling: subdivision of a region (heterogeneous dist. of nodes) (a) BA (b) SFL (c) RAN Step 0 Step 1 Step 2 initial N0 nodes with m links assign a degree k initial trianglulation add new node saturated node select a node connect to the neighborhoods 1/2 in the radius r = A k add new node into a chosen triangle new m links : pref. attach. connect to its 3 nodes ECCS 2007 p.30/31
34 A7. Planarity and Shortness class planarity of net shortness of links Modulated BA Manna 02, crossing links with disadvantaged Xulvi-Brunet 02 (not prohibited) long-range links SF on lattices ben-avraham 03, cross of regular long shortcuts Warren 02 links and shortcuts from hubs Space-filling Apollonian nets. by subdivision long-range links Doye 05, Zhou 04 of a selected region in narrow triangles ECCS 2007 p.31/31
Effects of node buffer and capacity on network traffic
Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,
More informationCluster detection algorithm in neural networks
Cluster detection algorithm in neural networks David Meunier and Hélène Paugam-Moisy Institute for Cognitive Science, UMR CNRS 5015 67, boulevard Pinel F-69675 BRON - France E-mail: {dmeunier,hpaugam}@isc.cnrs.fr
More informationComplex Networks Analysis: Clustering Methods
Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich nefedov@isi.ee.ethz.ch 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications
More informationSelf similarity of complex networks & hidden metric spaces
Self similarity of complex networks & hidden metric spaces M. ÁNGELES SERRANO Departament de Química Física Universitat de Barcelona TERA-NET: Toward Evolutive Routing Algorithms for scale-free/internet-like
More informationStructural constraints in complex networks
Structural constraints in complex networks Dr. Shi Zhou Lecturer of University College London Royal Academy of Engineering / EPSRC Research Fellow Part 1. Complex networks and three key topological properties
More informationA discussion of Statistical Mechanics of Complex Networks P. Part I
A discussion of Statistical Mechanics of Complex Networks Part I Review of Modern Physics, Vol. 74, 2002 Small Word Networks Clustering Coefficient Scale-Free Networks Erdös-Rényi model cover only parts
More informationProtein Protein Interaction Networks
Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics
More informationChapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks
Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing
More informationA network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and
NETWORK By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Network A network is a group of devices (Nodes) connected by media
More informationThe Network Structure of Hard Combinatorial Landscapes
The Network Structure of Hard Combinatorial Landscapes Marco Tomassini 1, Sebastien Verel 2, Gabriela Ochoa 3 1 University of Lausanne, Lausanne, Switzerland 2 University of Nice Sophia-Antipolis, France
More informationChristian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
More informationBioinformatics: Network Analysis
Bioinformatics: Network Analysis Graph-theoretic Properties of Biological Networks COMP 572 (BIOS 572 / BIOE 564) - Fall 2013 Luay Nakhleh, Rice University 1 Outline Architectural features Motifs, modules,
More informationGreedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures
Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is
More informationScale-free user-network approach to telephone network traffic analysis
Scale-free user-network approach to telephone network traffic analysis Yongxiang Xia,* Chi K. Tse, WaiM.Tam, Francis C. M. Lau, and Michael Small Department of Electronic and Information Engineering, Hong
More informationPUBLIC TRANSPORT SYSTEMS IN POLAND: FROM BIAŁYSTOK TO ZIELONA GÓRA BY BUS AND TRAM USING UNIVERSAL STATISTICS OF COMPLEX NETWORKS
Vol. 36 (2005) ACTA PHYSICA POLONICA B No 5 PUBLIC TRANSPORT SYSTEMS IN POLAND: FROM BIAŁYSTOK TO ZIELONA GÓRA BY BUS AND TRAM USING UNIVERSAL STATISTICS OF COMPLEX NETWORKS Julian Sienkiewicz and Janusz
More informationIC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com>
IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration
More informationhttp://www.elsevier.com/copyright
This article was published in an Elsevier journal. The attached copy is furnished to the author for non-commercial research and education use, including for instruction at the author s institution, sharing
More informationCustomer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
More information1.204 Final Project Network Analysis of Urban Street Patterns
1.204 Final Project Network Analysis of Urban Street Patterns Michael T. Chang December 21, 2012 1 Introduction In this project, I analyze road networks as a planar graph and use tools from network analysis
More informationDegree distribution in random Apollonian networks structures
Degree distribution in random Apollonian networks structures Alexis Darrasse joint work with Michèle Soria ALÉA 2007 Plan 1 Introduction 2 Properties of real-life graphs Distinctive properties Existing
More informationStrategies for Optimizing Public Train Transport Networks in China: Under a Viewpoint of Complex Networks
Strategies for Optimizing Public Train Transport Networks in China: Under a Viewpoint of Complex Networks Zhichong ZHAO, Jie LIU Research Centre of Nonlinear Science, College of Science, Wuhan University
More informationDmitri Krioukov CAIDA/UCSD
Hyperbolic geometry of complex networks Dmitri Krioukov CAIDA/UCSD dima@caida.org F. Papadopoulos, M. Boguñá, A. Vahdat, and kc claffy Complex networks Technological Internet Transportation Power grid
More informationUSING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu
More informationStrictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs
Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs Iyad A. Kanj Ljubomir Perković Ge Xia Abstract We describe a new distributed and strictly-localized approach for constructing
More informationTechnology White Paper Capacity Constrained Smart Grid Design
Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless
More informationPERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationBiology and Computer Science, Northeastern University, Boston, MA 02115. Massachusetts Institute of Technology, Cambridge, MA 02139.
NEW GENERATION OF MOBILE PHONE VIRUSES AND CORRESPONDING COUNTERMEASURES Pu Wang 1,2,3, Marta C. González 1,3, Ronaldo Menezes 4 & Albert-LászlóBarabási 1,5 1 Center for Complex Network Research, Department
More informationRouting on a weighted scale-free network
Physica A 387 (2008) 4967 4972 Contents lists available at ScienceDirect Physica A journal homepage: www.elsevier.com/locate/physa Routing on a weighted scale-free network Mao-Bin Hu a,b,, Rui Jiang a,
More informationPower Efficiency Metrics for Geographical Routing In Multihop Wireless Networks
Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency
More informationUnderstanding the evolution dynamics of internet topology
Understanding the evolution dynamics of internet topology Shi Zhou* University College London, Adastral Park Campus, Ross Building, Ipswich, IP5 3RE, United Kingdom Received 2 December 2005; revised manuscript
More informationThe Structure of Growing Social Networks
The Structure of Growing Social Networks Emily M. Jin Michelle Girvan M. E. J. Newman SFI WORKING PAPER: 2001-06-032 SFI Working Papers contain accounts of scientific work of the author(s) and do not necessarily
More informationIRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
More informationAn Alternative Web Search Strategy? Abstract
An Alternative Web Search Strategy? V.-H. Winterer, Rechenzentrum Universität Freiburg (Dated: November 2007) Abstract We propose an alternative Web search strategy taking advantage of the knowledge on
More informationIntroduction to Networks and Business Intelligence
Introduction to Networks and Business Intelligence Prof. Dr. Daning Hu Department of Informatics University of Zurich Sep 17th, 2015 Outline Network Science A Random History Network Analysis Network Topological
More informationScalable Source Routing
Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable
More informationcorresponds to the case of two independent corresponds to the fully interdependent case.
Authors Title Track Director Abstract Kashin SUGISHITA, Katsuya SAKAI, Yasuo ASAKURA Vulnerability Assessment for Cascading Failures in Interdependent Networks General Papers Mark Wardman INTRODUCTION
More informationWiring cost in the organization of a biological neuronal network
Physica A 367 (2006) 531 537 www.elsevier.com/locate/physa Wiring cost in the organization of a biological neuronal network Yong-Yeol Ahn a, Hawoong Jeong a, Beom Jun Kim b, a Department of Physics, Korea
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationOptimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
More informationBig Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
More informationDistributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
More informationRouting in packet-switching networks
Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call
More informationGeneral Network Analysis: Graph-theoretic. COMP572 Fall 2009
General Network Analysis: Graph-theoretic Techniques COMP572 Fall 2009 Networks (aka Graphs) A network is a set of vertices, or nodes, and edges that connect pairs of vertices Example: a network with 5
More informationGENERATING AN ASSORTATIVE NETWORK WITH A GIVEN DEGREE DISTRIBUTION
International Journal of Bifurcation and Chaos, Vol. 18, o. 11 (2008) 3495 3502 c World Scientific Publishing Company GEERATIG A ASSORTATIVE ETWORK WITH A GIVE DEGREE DISTRIBUTIO JI ZHOU, XIAOKE XU, JIE
More informationGraphs over Time Densification Laws, Shrinking Diameters and Possible Explanations
Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns
More informationApplication of Social Network Analysis to Collaborative Team Formation
Application of Social Network Analysis to Collaborative Team Formation Michelle Cheatham Kevin Cleereman Information Directorate Information Directorate AFRL AFRL WPAFB, OH 45433 WPAFB, OH 45433 michelle.cheatham@wpafb.af.mil
More informationThe Topology of Large-Scale Engineering Problem-Solving Networks
The Topology of Large-Scale Engineering Problem-Solving Networks by Dan Braha 1, 2 and Yaneer Bar-Yam 2, 3 1 Faculty of Engineering Sciences Ben-Gurion University, P.O.Box 653 Beer-Sheva 84105, Israel
More informationSome questions... Graphs
Uni Innsbruck Informatik - 1 Uni Innsbruck Informatik - 2 Some questions... Peer-to to-peer Systems Analysis of unstructured P2P systems How scalable is Gnutella? How robust is Gnutella? Why does FreeNet
More informationData Center Switch Fabric Competitive Analysis
Introduction Data Center Switch Fabric Competitive Analysis This paper analyzes Infinetics data center network architecture in the context of the best solutions available today from leading vendors such
More informationNetwork Architecture and Topology
1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end
More informationLoad Balancing in Ad Hoc Networks: Single-path Routing vs. Multi-path Routing
Balancing in d Hoc Networks: Single-path Routing vs. Multi-path Routing Yashar Ganjali, btin Keshavarzian Department of Electrical Engineering Stanford University Stanford, C 9435 Email:{yganjali, abtink}@stanford.edu
More informationSocial Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
More informationA SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION
A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University park.764@osu.edu yilmaz.15@osu.edu ABSTRACT Depending
More informationAn Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationssumathy@vit.ac.in upendra_mcs2@yahoo.com
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,
More informationGraph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003
Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation
More informationConsecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
More informationSocial and Economic Networks: Lecture 1, Networks?
Social and Economic Networks: Lecture 1, Networks? Alper Duman Izmir University Economics, February 26, 2013 Conventional economics assume that all agents are either completely connected or totally isolated.
More informationPerformance and Scalability of Self-Organizing Hierarchical Ad Hoc Wireless Networks
Performance and Scalability of Self-Organizing archical Ad Hoc Wireless Networks Suli Zhao, Ivan Seskar and Dipankar Raychaudhuri WINLAB, Rutgers University 7 Brett Road, Piscataway, NJ 8854 {sulizhao,
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationIEQGOR to Increase the Quality of Service in Wireless Sensor Network
IEQGOR to Increase the Quality of Service in Wireless Sensor Network K.Mythilipriya 1, B.Arunkumar 2 III M.E., Dept of CSE, Karpagam University, Coimbatore, India 1 Assistant Professor, Dept of CSE, Karpagam
More informationTORA : Temporally Ordered Routing Algorithm
TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol. The main objective of TORA is to limit control
More informationSmall-World Characteristics of Internet Topologies and Implications on Multicast Scaling
Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling Shudong Jin Department of Electrical Engineering and Computer Science, Case Western Reserve University Cleveland,
More informationA ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING IN LEO SATELLITE CONSTELLATION NETWORK. Received September 2012; revised January 2013
International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 10, October 2013 pp. 4139 4149 A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING
More informationMODEL SELECTION FOR SOCIAL NETWORKS USING GRAPHLETS
MODEL SELECTION FOR SOCIAL NETWORKS USING GRAPHLETS JEANNETTE JANSSEN, MATT HURSHMAN, AND NAUZER KALYANIWALLA Abstract. Several network models have been proposed to explain the link structure observed
More informationOn the effect of forwarding table size on SDN network utilization
IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz
More informationThe architecture of complex weighted networks
The architecture of complex weighted networks A. Barrat*, M. Barthélemy, R. Pastor-Satorras, and A. Vespignani* *Laboratoire de Physique Théorique (Unité Mixte de Recherche du Centre National de la Recherche
More informationBuilding Alternate Multicasting Trees in MPLS Networks
Treasures at UT Dallas Eric Jonsson School of Engineering and Computer Science 5-2009 Building Alternate Multicasting Trees in MPLS Networks Limin Tang, et al. Follow this and additional works at: http://
More informationDESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More informationComplex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics
Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu
More informationMesh Networks. Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries
Mesh Networks Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries Ermanno Pietrosemoli Escuela Latinoamericana de Redes (Latin American
More informationarxiv:cond-mat/0212469v1 [cond-mat.dis-nn] 19 Dec 2002
Generating correlated networks from uncorrelated ones A. Ramezanpour and V. Karimipour arxiv:cond-mat/0212469v1 [cond-mat.dis-nn] 19 Dec 2002 Department of Physics, Sharif University of Technology, P.O.Box
More informationHyper Node Torus: A New Interconnection Network for High Speed Packet Processors
2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationOn Game Theory for Load Balancing in Wireless Networks
On Game Theory for Load alancing in Wireless Networks Mehdi Kargar Nima Haghpanah and Mohammad Ghodsi epartment of Computer ngineering Sharif University of Technology, Tehran, Iran bstract We study the
More informationCHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed
More informationSECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
More informationPosition and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
More informationPerformance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
More informationAn Investigation of Synchrony in Transport Networks
An Investigation of Synchrony in Transport Networks REX K. KINCAID 1, NATALIA ALEXANDROV 2, AND MICHAEL J. HOLROYD 3 1 Department of Mathematics, The College of William and Mary,Williamsburg,Virginia;
More informationATM Network Performance Evaluation And Optimization Using Complex Network Theory
ATM Network Performance Evaluation And Optimization Using Complex Network Theory Yalin LI 1, Bruno F. Santos 2 and Richard Curran 3 Air Transport and Operations Faculty of Aerospace Engineering The Technical
More informationDynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network
Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationHierarchical organization in complex networks
PHYSICAL REVIEW E 67, 026112 2003 Hierarchical organization in complex networks Erzsébet Ravasz and Albert-László Barabási Department of Physics, 225 Nieuwland Science Hall, University of Notre Dame, Notre
More informationPERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir
More informationWAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches.
Routing WAN Wide Area Networks WANs are made of store and forward switches. To there and back again COMP476 Networked Computer Systems A packet switch with two types of I/O connectors: one type is used
More informationDetecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
More informationNetwork Design. Yiannos Mylonas
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
More informationDistributed Coordinate-free Hole Recovery
Distributed Coordinate-free Hole Recovery Xiaoyun Li Department of Computing and Electronic Systems University of Essex Colchester, UK CO4 3SQ xliw@essex.ac.uk Abstract This paper proposes a distributed
More informationStrength of Weak Ties, Structural Holes, Closure and Small Worlds. Steve Borgatti MGT 780, Spring 2010 LINKS Center, U of Kentucky
Strength of Weak Ties, Structural Holes, Closure and Small Worlds Steve orgatti MGT 780, Spring 2010 LINKS Center, U of Kentucky Strength of Weak Ties theory Granovetter 1973 Overall idea Weak ties are
More informationarxiv:physics/0601033 v1 6 Jan 2006
Analysis of telephone network traffic based on a complex user network Yongxiang Xia, Chi K. Tse, Francis C. M. Lau, Wai Man Tam, Michael Small arxiv:physics/0601033 v1 6 Jan 2006 Department of Electronic
More informationMedial Axis Construction and Applications in 3D Wireless Sensor Networks
Medial Axis Construction and Applications in 3D Wireless Sensor Networks Su Xia, Ning Ding, Miao Jin, Hongyi Wu, and Yang Yang Presenter: Hongyi Wu University of Louisiana at Lafayette Outline Introduction
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
More informationMobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
More informationDemystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
More informationDetection of topological patterns in complex networks: correlation prole of the internet
Available online at www.sciencedirect.com Physica A (2004) 529 540 www.elsevier.com/locate/physa Detection of topological patterns in complex networks: correlation prole of the internet Sergei Maslov a;,
More information