Necessary backbone of superhighways for transport on geographical complex networks

Size: px
Start display at page:

Download "Necessary backbone of superhighways for transport on geographical complex networks"

Transcription

1 Necessary backbone of superhighways for transport on geographical complex networks Yukio Hayashi Japan Advanced Institute of Science and Technology ECCS 2007 p.1/31

2 1. Introduction Dynamic configuration of (backbone) networks in an emergent or self-organized manner Problems for efficient communication such as in distributed sensor networks or P2P systems dissipation of wireless beam-power or wired line-cost for long-range links interference by crossing of links (non-planar) to realize efficient transport of packets ECCS 2007 p.2/31

3 1-1. Model of Ad-Hoc Nets We assume that a network evolves with a new node the position of each node is fixed a few nodes have sufficient power to be hubs various transmission ranges and the orientation are controllable (for wireless links) It is better that only local information is used because of the topological change These are reasonable in the current technology, but we don t care about the details in device or application ECCS 2007 p.3/31

4 1-2. Efficient Routing Planar triangulation: reasonable math. abstraction of ad hoc net. Moreover, a memoryless, no defeat, and competitive online routing algorithm has been developed for planar networks taking into account the face. Source Destination Bose and Morin, SIAM J. of Comp. 33(4), 2004 ECCS 2007 p.4/31

5 1-3. Motivation for Shortcuts Shorten the path length remaining local clusters SW model, D.J. Watts and S.H. Strogatz, Nature, 393, 1998 Moreover, the robustness can be improved by adding shortcuts to a one-dim. SW model C. Moore, and M.E.J. Newman, PRE 61, 2000 ECCS 2007 p.5/31

6 1-4. Objective To investigate the effect of shortcuts on geographical networks in the viewpoints: the tolerance of connectivity to random failures and targeted attacks on hubs the backbone for transport measured by the usage and centrality of links on the shortest paths in typical planar network models: random Apollonian network in complex network science, Delaunay triangulation in computer science, our proposed models to bridge them. ECCS 2007 p.6/31

7 1-5. Scale-Free Nets with Hubs Existing a surprisingly common structure: SF net. the degree dist. follows P (k) k γ, 2 < γ < 3, in many social, technological, and biological nets. ECCS 2007 p.7/31

8 1-5. Scale-Free Nets with Hubs Existing a surprisingly common structure: SF net. the degree dist. follows P (k) k γ, 2 < γ < 3, in many social, technological, and biological nets. Efficiency & Economy with short paths as the hop-count O(ln N) and the low cost of links as few as possible in the connectivity (Solé et al., Advances in Complex Systems 5, 2002) ECCS 2007 p.7/31

9 1-5. Scale-Free Nets with Hubs Existing a surprisingly common structure: SF net. the degree dist. follows P (k) k γ, 2 < γ < 3, in many social, technological, and biological nets. Efficiency & Economy with short paths as the hop-count O(ln N) and the low cost of links as few as possible in the connectivity (Solé et al., Advances in Complex Systems 5, 2002) Robust connectivity for random failures (Albert et al., Nature 406, 2000) ECCS 2007 p.7/31

10 1-5. Scale-Free Nets with Hubs Existing a surprisingly common structure: SF net. the degree dist. follows P (k) k γ, 2 < γ < 3, in many social, technological, and biological nets. Efficiency & Economy with short paths as the hop-count O(ln N) and the low cost of links as few as possible in the connectivity (Solé et al., Advances in Complex Systems 5, 2002) Robust connectivity for random failures (Albert et al., Nature 406, 2000) However, most of SF net models were irrelevant to a geographical space. ECCS 2007 p.7/31

11 2. Geographical SF Nets Many real nets have not only scale-free but also geographical heterogeneity: The Internet, power-grid, and airline-flight connections, etc. are embedded in a metric space Nodes are usually concentrated in a urban city (there are dense and sparse areas on the earth) Especially for wireless communication, planarity is suitable Majority of links are short due to economical reasons for the construction and maintenance costs ECCS 2007 p.8/31

12 2-1. Rare Long-range Links Histograms of the lengths of links Gastner and Newman, Eur. Phys. J.B 49, 2005 Also, the length dist. of the links between routers: P (l) l 1 Yook et al., PNAS 99, 21, 2002 ECCS 2007 p.9/31

13 2-2. Random Apollonian Net Configuration: iterative subdivision of a randomly chosen triangle from an initial triangulation Initial triangulation Add a new node inside a chosen triangle Connect to its closest 3 nodes Some long-range links naturally appear in narrow collapsed triangles near the boundary edges Zhou, Yan, Wang, Phys. Rev. E 71, 2005 ECCS 2007 p.10/31

14 2-3. Voronoi and Delaunay Optimal triangulation in some geometric criteria: maximim angle, minimax circumcircle, short path length in the same order as the direct Euclidean dist. Dual Graph Consider the combination of RA (by triangulation on a plane) and DT to avoid the long-range links ECCS 2007 p.11/31

15 2-4. Delaunay-like SF Net We propose DLSF: Set an initial planar triangulation. Select a triangle at random and add a new node at the barycenter. Then, connect the new node to its three nodes tentatively. By iteratively applying diagonal flips, connect it to the nearest node(s) within a radius as a localization. = + 1st diagonal flip 2nd diagonal flip ECCS 2007 p.12/31

16 2-5. Topological Structure DLSF has the intermediate structure RA DT DLSF We should remark that there exists mixing of dense and sparse areas as similar to a population density star-like stubs at four corner and the center nodes ECCS 2007 p.13/31

17 2-6. Degree Distribution RA DT DLSF P(k) k RA: power law, DT: lognormal, DLSF: power law with exponential cutoff (the deg. of hubs are reduced) ECCS 2007 p.14/31

18 3. Improvement of Robustness SF nets are extremely vulnerable for the intentional attacks on hubs R. Albert, and A.-L. Barabási, Nature 406, 378, 2000 It s further affected by geographical constraints, such as local cycles. ECCS 2007 p.15/31

19 3-1. Theoretical Prediction The breaking of connectivity for random failures becomes more serious by small-order cycles On the assumpt. of a tree L c = 0, the percolation threshold q c = k /( k 2 k ) is well-known. It is generalized to any cycle length e.g. L c = 3, q c = k(k 1) k ( ) k(k 2) 1 q c k, C(k)k(k 1) 2 1 f c = q c > q c predicts decreasing of robustness. Huang et al., Europhy. Lett. 72, 2005 & PRE 75, 2007 ECCS 2007 p.16/31

20 3-2. Damages by Attacks Initial N=200 targeted attacks on 16 hubs RA DT Vulnerable RA broken to many isolated clusters ECCS 2007 p.17/31

21 3-3. Overhead Bridge The effect of adding shortcuts on the robustness To bridge the isolated areas on the plain ECCS 2007 p.18/31

22 3-4. Giant Component Relative size S/N of the GC vs. fraction f of attacks Relative size S/N % 3% 5% 7% 10% 20% 30% Relative size S/N % 3% 5% 7% 10% 20% 30% Relative size S/N % 3% 5% 7% 10% 20% 30% Fraction f of attacks RA Fraction f of attacks DT Fraction f of attacks DLSF Hayashi et. al., Physica A 380, 2007 The robustness is improved remaining with a bigger GC from 0 % to 30 % of the shortcuts rate ECCS 2007 p.19/31

23 3-5. Hetero. Communication Spatially heterogeneous communication Assumed that both source and terminal are chosen in uniformly random from all nodes at every time step. However the spatial distribution of packet generation and receiving is remarkably heterogeneous Dense area much more communication Sparse area few frequent one according to the geographical configuration of nodes. ECCS 2007 p.20/31

24 3-6. Superhighways Consider the distribution P (u) of frequency of superhighways u def = l super /l short where l super is the number of shortcuts in a given shortest path of length l short 10 0 qs = 0.03 qs = qs = 0.03 qs = qs = 0.03 qs = P(u) 10 4 P(u) 10 4 P(u) u RA u DT u DLSF High frequency in spite of only 3 or 10 % of the total ECCS 2007 p.21/31

25 3-7. P (B l ) of Link Centrality Normalized betweenness centrality of link l on the shortest distant path between nodes j and k B l def = 2 (N 2)(N 3) k j l1,l2 b j k (l), b j k Planar Shortcut Planar Shortcut Planar Shortcut P(B l ) 10 3 P(B l ) 10 3 P(B l ) B l B l B l RA DT DLSF The peak is righter for the shortcuts with higher B l ECCS 2007 p.22/31

26 4. Summary: shortcut effects Based on the realistic SF properties, we ve proposed a modified model from RA in complex net. science and DT in computer science to reduce long-range links on a planar space for ad hoc networks. For the vulnerability to attacks caused by geographical constraints, it has been shown that adding shortcuts of only about 10 % of the total improve it. They also construct a necessary backbone such as superhighways to bridge isolated clusters (more contribute in the measures of frequency and centrality of links used on the shortest distant paths.) ECCS 2007 p.23/31

27 Thanks Thank you for your kind attention! Related papers: (see Ref. in the Proc.) Geographical effects on the path length and the robustness in complex networks, Physical Review E 73, , (2006). Improvement of the robustness on geographical networks by adding shortcuts, Physica A 380, , (2007). ECCS 2007 p.24/31

28 A1. Damages by Failures Initial N=200 randomly removed 32 nodes RA DT Similarly remained connectivity in the GC ECCS 2007 p.25/31

29 A2. Breaking of GC at the Peak Average size s of isolated clusters except of the GC vs. fraction f of attacks Average size <s> of isolated clusters Average size <s> of isolated clusters Fraction f of attacks 0% 3% 5% 7% 10% 20% 30% Fraction f of attacks RA Average size <s> of isolated clusters % 3% 5% 7% 10% 20% 30% Fraction f of attacks DT Average size <s> of isolated clusters Average size <s> of isolated clusters Fraction f of attacks 0% 3% 5% 7% 10% 20% 30% Fraction f of attacks DLSF Inset shows the peaks enlarged by other scale of the vertical axis. The robustness is more improved by larger shortcut rate (from 0 % to 30 %). ECCS 2007 p.26/31

30 A3. Randomly Rewired Nets We compare the tolerance to random failures of nodes and targeted attacks on hubs in the geographical and non-geographical randomly rewired networks, when a fraction f of nodes is removed. : : : : : : : : : : : : : : : : Rewiring a pair of links with the same degree at each node Maslov et al., Physica A 333, 2004 ECCS 2007 p.27/31

31 A4. Tolerance to Failures Relative size S/N of the giant component Inset: the average size s of isolated clusters <s> RA RA+NN(one) RA+NN(all) DT RA RA+NN(one) RA+NN(all) DT <s> RA RA+NN(one) RA+NN(all) DT RA RA+NN(one) RA+NN(all) DT Relative size S/N f Relative size S/N f Fraction f of failures (a) geographical nets Fraction f of failures (b) rewired nets Similar robustness in RA:, DT:, DLSF: + ECCS 2007 p.28/31

32 A5. Tolerance to Attacks Relative size S/N <s> RA RA+NN(one) RA+NN(all) DT RA RA+NN(one) RA+NN(all) DT f Fraction f of attacks (a) geographical nets Relative size S/N RA RA+NN(one) RA+NN(all) DT f Fraction f of attacks <s> (b) rewired nets Improvement from the extremely vulnerable RA Hayashi et. al., PRE 73, 2006 RA RA+NN(one) RA+NN(all) DT ECCS 2007 p.29/31

33 A6. Classes of Geo. SF Nets Modulated BA: Π i k i l α, rand. position of node SF on lattices: connect within r = A k 1/d i Space-filling: subdivision of a region (heterogeneous dist. of nodes) (a) BA (b) SFL (c) RAN Step 0 Step 1 Step 2 initial N0 nodes with m links assign a degree k initial trianglulation add new node saturated node select a node connect to the neighborhoods 1/2 in the radius r = A k add new node into a chosen triangle new m links : pref. attach. connect to its 3 nodes ECCS 2007 p.30/31

34 A7. Planarity and Shortness class planarity of net shortness of links Modulated BA Manna 02, crossing links with disadvantaged Xulvi-Brunet 02 (not prohibited) long-range links SF on lattices ben-avraham 03, cross of regular long shortcuts Warren 02 links and shortcuts from hubs Space-filling Apollonian nets. by subdivision long-range links Doye 05, Zhou 04 of a selected region in narrow triangles ECCS 2007 p.31/31

Effects of node buffer and capacity on network traffic

Effects of node buffer and capacity on network traffic Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,

More information

Cluster detection algorithm in neural networks

Cluster detection algorithm in neural networks Cluster detection algorithm in neural networks David Meunier and Hélène Paugam-Moisy Institute for Cognitive Science, UMR CNRS 5015 67, boulevard Pinel F-69675 BRON - France E-mail: {dmeunier,hpaugam}@isc.cnrs.fr

More information

Complex Networks Analysis: Clustering Methods

Complex Networks Analysis: Clustering Methods Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich nefedov@isi.ee.ethz.ch 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications

More information

Self similarity of complex networks & hidden metric spaces

Self similarity of complex networks & hidden metric spaces Self similarity of complex networks & hidden metric spaces M. ÁNGELES SERRANO Departament de Química Física Universitat de Barcelona TERA-NET: Toward Evolutive Routing Algorithms for scale-free/internet-like

More information

Structural constraints in complex networks

Structural constraints in complex networks Structural constraints in complex networks Dr. Shi Zhou Lecturer of University College London Royal Academy of Engineering / EPSRC Research Fellow Part 1. Complex networks and three key topological properties

More information

A discussion of Statistical Mechanics of Complex Networks P. Part I

A discussion of Statistical Mechanics of Complex Networks P. Part I A discussion of Statistical Mechanics of Complex Networks Part I Review of Modern Physics, Vol. 74, 2002 Small Word Networks Clustering Coefficient Scale-Free Networks Erdös-Rényi model cover only parts

More information

Protein Protein Interaction Networks

Protein Protein Interaction Networks Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics

More information

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing

More information

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and NETWORK By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Network A network is a group of devices (Nodes) connected by media

More information

The Network Structure of Hard Combinatorial Landscapes

The Network Structure of Hard Combinatorial Landscapes The Network Structure of Hard Combinatorial Landscapes Marco Tomassini 1, Sebastien Verel 2, Gabriela Ochoa 3 1 University of Lausanne, Lausanne, Switzerland 2 University of Nice Sophia-Antipolis, France

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

Bioinformatics: Network Analysis

Bioinformatics: Network Analysis Bioinformatics: Network Analysis Graph-theoretic Properties of Biological Networks COMP 572 (BIOS 572 / BIOE 564) - Fall 2013 Luay Nakhleh, Rice University 1 Outline Architectural features Motifs, modules,

More information

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is

More information

Scale-free user-network approach to telephone network traffic analysis

Scale-free user-network approach to telephone network traffic analysis Scale-free user-network approach to telephone network traffic analysis Yongxiang Xia,* Chi K. Tse, WaiM.Tam, Francis C. M. Lau, and Michael Small Department of Electronic and Information Engineering, Hong

More information

PUBLIC TRANSPORT SYSTEMS IN POLAND: FROM BIAŁYSTOK TO ZIELONA GÓRA BY BUS AND TRAM USING UNIVERSAL STATISTICS OF COMPLEX NETWORKS

PUBLIC TRANSPORT SYSTEMS IN POLAND: FROM BIAŁYSTOK TO ZIELONA GÓRA BY BUS AND TRAM USING UNIVERSAL STATISTICS OF COMPLEX NETWORKS Vol. 36 (2005) ACTA PHYSICA POLONICA B No 5 PUBLIC TRANSPORT SYSTEMS IN POLAND: FROM BIAŁYSTOK TO ZIELONA GÓRA BY BUS AND TRAM USING UNIVERSAL STATISTICS OF COMPLEX NETWORKS Julian Sienkiewicz and Janusz

More information

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com>

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com> IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration

More information

http://www.elsevier.com/copyright

http://www.elsevier.com/copyright This article was published in an Elsevier journal. The attached copy is furnished to the author for non-commercial research and education use, including for instruction at the author s institution, sharing

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

1.204 Final Project Network Analysis of Urban Street Patterns

1.204 Final Project Network Analysis of Urban Street Patterns 1.204 Final Project Network Analysis of Urban Street Patterns Michael T. Chang December 21, 2012 1 Introduction In this project, I analyze road networks as a planar graph and use tools from network analysis

More information

Degree distribution in random Apollonian networks structures

Degree distribution in random Apollonian networks structures Degree distribution in random Apollonian networks structures Alexis Darrasse joint work with Michèle Soria ALÉA 2007 Plan 1 Introduction 2 Properties of real-life graphs Distinctive properties Existing

More information

Strategies for Optimizing Public Train Transport Networks in China: Under a Viewpoint of Complex Networks

Strategies for Optimizing Public Train Transport Networks in China: Under a Viewpoint of Complex Networks Strategies for Optimizing Public Train Transport Networks in China: Under a Viewpoint of Complex Networks Zhichong ZHAO, Jie LIU Research Centre of Nonlinear Science, College of Science, Wuhan University

More information

Dmitri Krioukov CAIDA/UCSD

Dmitri Krioukov CAIDA/UCSD Hyperbolic geometry of complex networks Dmitri Krioukov CAIDA/UCSD dima@caida.org F. Papadopoulos, M. Boguñá, A. Vahdat, and kc claffy Complex networks Technological Internet Transportation Power grid

More information

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu

More information

Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs

Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs Iyad A. Kanj Ljubomir Perković Ge Xia Abstract We describe a new distributed and strictly-localized approach for constructing

More information

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Biology and Computer Science, Northeastern University, Boston, MA 02115. Massachusetts Institute of Technology, Cambridge, MA 02139.

Biology and Computer Science, Northeastern University, Boston, MA 02115. Massachusetts Institute of Technology, Cambridge, MA 02139. NEW GENERATION OF MOBILE PHONE VIRUSES AND CORRESPONDING COUNTERMEASURES Pu Wang 1,2,3, Marta C. González 1,3, Ronaldo Menezes 4 & Albert-LászlóBarabási 1,5 1 Center for Complex Network Research, Department

More information

Routing on a weighted scale-free network

Routing on a weighted scale-free network Physica A 387 (2008) 4967 4972 Contents lists available at ScienceDirect Physica A journal homepage: www.elsevier.com/locate/physa Routing on a weighted scale-free network Mao-Bin Hu a,b,, Rui Jiang a,

More information

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency

More information

Understanding the evolution dynamics of internet topology

Understanding the evolution dynamics of internet topology Understanding the evolution dynamics of internet topology Shi Zhou* University College London, Adastral Park Campus, Ross Building, Ipswich, IP5 3RE, United Kingdom Received 2 December 2005; revised manuscript

More information

The Structure of Growing Social Networks

The Structure of Growing Social Networks The Structure of Growing Social Networks Emily M. Jin Michelle Girvan M. E. J. Newman SFI WORKING PAPER: 2001-06-032 SFI Working Papers contain accounts of scientific work of the author(s) and do not necessarily

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

An Alternative Web Search Strategy? Abstract

An Alternative Web Search Strategy? Abstract An Alternative Web Search Strategy? V.-H. Winterer, Rechenzentrum Universität Freiburg (Dated: November 2007) Abstract We propose an alternative Web search strategy taking advantage of the knowledge on

More information

Introduction to Networks and Business Intelligence

Introduction to Networks and Business Intelligence Introduction to Networks and Business Intelligence Prof. Dr. Daning Hu Department of Informatics University of Zurich Sep 17th, 2015 Outline Network Science A Random History Network Analysis Network Topological

More information

Scalable Source Routing

Scalable Source Routing Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable

More information

corresponds to the case of two independent corresponds to the fully interdependent case.

corresponds to the case of two independent corresponds to the fully interdependent case. Authors Title Track Director Abstract Kashin SUGISHITA, Katsuya SAKAI, Yasuo ASAKURA Vulnerability Assessment for Cascading Failures in Interdependent Networks General Papers Mark Wardman INTRODUCTION

More information

Wiring cost in the organization of a biological neuronal network

Wiring cost in the organization of a biological neuronal network Physica A 367 (2006) 531 537 www.elsevier.com/locate/physa Wiring cost in the organization of a biological neuronal network Yong-Yeol Ahn a, Hawoong Jeong a, Beom Jun Kim b, a Department of Physics, Korea

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P) Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

General Network Analysis: Graph-theoretic. COMP572 Fall 2009

General Network Analysis: Graph-theoretic. COMP572 Fall 2009 General Network Analysis: Graph-theoretic Techniques COMP572 Fall 2009 Networks (aka Graphs) A network is a set of vertices, or nodes, and edges that connect pairs of vertices Example: a network with 5

More information

GENERATING AN ASSORTATIVE NETWORK WITH A GIVEN DEGREE DISTRIBUTION

GENERATING AN ASSORTATIVE NETWORK WITH A GIVEN DEGREE DISTRIBUTION International Journal of Bifurcation and Chaos, Vol. 18, o. 11 (2008) 3495 3502 c World Scientific Publishing Company GEERATIG A ASSORTATIVE ETWORK WITH A GIVE DEGREE DISTRIBUTIO JI ZHOU, XIAOKE XU, JIE

More information

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns

More information

Application of Social Network Analysis to Collaborative Team Formation

Application of Social Network Analysis to Collaborative Team Formation Application of Social Network Analysis to Collaborative Team Formation Michelle Cheatham Kevin Cleereman Information Directorate Information Directorate AFRL AFRL WPAFB, OH 45433 WPAFB, OH 45433 michelle.cheatham@wpafb.af.mil

More information

The Topology of Large-Scale Engineering Problem-Solving Networks

The Topology of Large-Scale Engineering Problem-Solving Networks The Topology of Large-Scale Engineering Problem-Solving Networks by Dan Braha 1, 2 and Yaneer Bar-Yam 2, 3 1 Faculty of Engineering Sciences Ben-Gurion University, P.O.Box 653 Beer-Sheva 84105, Israel

More information

Some questions... Graphs

Some questions... Graphs Uni Innsbruck Informatik - 1 Uni Innsbruck Informatik - 2 Some questions... Peer-to to-peer Systems Analysis of unstructured P2P systems How scalable is Gnutella? How robust is Gnutella? Why does FreeNet

More information

Data Center Switch Fabric Competitive Analysis

Data Center Switch Fabric Competitive Analysis Introduction Data Center Switch Fabric Competitive Analysis This paper analyzes Infinetics data center network architecture in the context of the best solutions available today from leading vendors such

More information

Network Architecture and Topology

Network Architecture and Topology 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end

More information

Load Balancing in Ad Hoc Networks: Single-path Routing vs. Multi-path Routing

Load Balancing in Ad Hoc Networks: Single-path Routing vs. Multi-path Routing Balancing in d Hoc Networks: Single-path Routing vs. Multi-path Routing Yashar Ganjali, btin Keshavarzian Department of Electrical Engineering Stanford University Stanford, C 9435 Email:{yganjali, abtink}@stanford.edu

More information

Social Media Mining. Graph Essentials

Social Media Mining. Graph Essentials Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

More information

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University park.764@osu.edu yilmaz.15@osu.edu ABSTRACT Depending

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003 Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation

More information

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin

More information

Social and Economic Networks: Lecture 1, Networks?

Social and Economic Networks: Lecture 1, Networks? Social and Economic Networks: Lecture 1, Networks? Alper Duman Izmir University Economics, February 26, 2013 Conventional economics assume that all agents are either completely connected or totally isolated.

More information

Performance and Scalability of Self-Organizing Hierarchical Ad Hoc Wireless Networks

Performance and Scalability of Self-Organizing Hierarchical Ad Hoc Wireless Networks Performance and Scalability of Self-Organizing archical Ad Hoc Wireless Networks Suli Zhao, Ivan Seskar and Dipankar Raychaudhuri WINLAB, Rutgers University 7 Brett Road, Piscataway, NJ 8854 {sulizhao,

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

IEQGOR to Increase the Quality of Service in Wireless Sensor Network

IEQGOR to Increase the Quality of Service in Wireless Sensor Network IEQGOR to Increase the Quality of Service in Wireless Sensor Network K.Mythilipriya 1, B.Arunkumar 2 III M.E., Dept of CSE, Karpagam University, Coimbatore, India 1 Assistant Professor, Dept of CSE, Karpagam

More information

TORA : Temporally Ordered Routing Algorithm

TORA : Temporally Ordered Routing Algorithm TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol. The main objective of TORA is to limit control

More information

Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling

Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling Shudong Jin Department of Electrical Engineering and Computer Science, Case Western Reserve University Cleveland,

More information

A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING IN LEO SATELLITE CONSTELLATION NETWORK. Received September 2012; revised January 2013

A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING IN LEO SATELLITE CONSTELLATION NETWORK. Received September 2012; revised January 2013 International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 10, October 2013 pp. 4139 4149 A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING

More information

MODEL SELECTION FOR SOCIAL NETWORKS USING GRAPHLETS

MODEL SELECTION FOR SOCIAL NETWORKS USING GRAPHLETS MODEL SELECTION FOR SOCIAL NETWORKS USING GRAPHLETS JEANNETTE JANSSEN, MATT HURSHMAN, AND NAUZER KALYANIWALLA Abstract. Several network models have been proposed to explain the link structure observed

More information

On the effect of forwarding table size on SDN network utilization

On the effect of forwarding table size on SDN network utilization IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz

More information

The architecture of complex weighted networks

The architecture of complex weighted networks The architecture of complex weighted networks A. Barrat*, M. Barthélemy, R. Pastor-Satorras, and A. Vespignani* *Laboratoire de Physique Théorique (Unité Mixte de Recherche du Centre National de la Recherche

More information

Building Alternate Multicasting Trees in MPLS Networks

Building Alternate Multicasting Trees in MPLS Networks Treasures at UT Dallas Eric Jonsson School of Engineering and Computer Science 5-2009 Building Alternate Multicasting Trees in MPLS Networks Limin Tang, et al. Follow this and additional works at: http://

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu

More information

Mesh Networks. Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries

Mesh Networks. Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries Mesh Networks Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries Ermanno Pietrosemoli Escuela Latinoamericana de Redes (Latin American

More information

arxiv:cond-mat/0212469v1 [cond-mat.dis-nn] 19 Dec 2002

arxiv:cond-mat/0212469v1 [cond-mat.dis-nn] 19 Dec 2002 Generating correlated networks from uncorrelated ones A. Ramezanpour and V. Karimipour arxiv:cond-mat/0212469v1 [cond-mat.dis-nn] 19 Dec 2002 Department of Physics, Sharif University of Technology, P.O.Box

More information

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors 2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

On Game Theory for Load Balancing in Wireless Networks

On Game Theory for Load Balancing in Wireless Networks On Game Theory for Load alancing in Wireless Networks Mehdi Kargar Nima Haghpanah and Mohammad Ghodsi epartment of Computer ngineering Sharif University of Technology, Tehran, Iran bstract We study the

More information

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

An Investigation of Synchrony in Transport Networks

An Investigation of Synchrony in Transport Networks An Investigation of Synchrony in Transport Networks REX K. KINCAID 1, NATALIA ALEXANDROV 2, AND MICHAEL J. HOLROYD 3 1 Department of Mathematics, The College of William and Mary,Williamsburg,Virginia;

More information

ATM Network Performance Evaluation And Optimization Using Complex Network Theory

ATM Network Performance Evaluation And Optimization Using Complex Network Theory ATM Network Performance Evaluation And Optimization Using Complex Network Theory Yalin LI 1, Bruno F. Santos 2 and Richard Curran 3 Air Transport and Operations Faculty of Aerospace Engineering The Technical

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Hierarchical organization in complex networks

Hierarchical organization in complex networks PHYSICAL REVIEW E 67, 026112 2003 Hierarchical organization in complex networks Erzsébet Ravasz and Albert-László Barabási Department of Physics, 225 Nieuwland Science Hall, University of Notre Dame, Notre

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

WAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches.

WAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches. Routing WAN Wide Area Networks WANs are made of store and forward switches. To there and back again COMP476 Networked Computer Systems A packet switch with two types of I/O connectors: one type is used

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Network Design. Yiannos Mylonas

Network Design. Yiannos Mylonas Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which

More information

Distributed Coordinate-free Hole Recovery

Distributed Coordinate-free Hole Recovery Distributed Coordinate-free Hole Recovery Xiaoyun Li Department of Computing and Electronic Systems University of Essex Colchester, UK CO4 3SQ xliw@essex.ac.uk Abstract This paper proposes a distributed

More information

Strength of Weak Ties, Structural Holes, Closure and Small Worlds. Steve Borgatti MGT 780, Spring 2010 LINKS Center, U of Kentucky

Strength of Weak Ties, Structural Holes, Closure and Small Worlds. Steve Borgatti MGT 780, Spring 2010 LINKS Center, U of Kentucky Strength of Weak Ties, Structural Holes, Closure and Small Worlds Steve orgatti MGT 780, Spring 2010 LINKS Center, U of Kentucky Strength of Weak Ties theory Granovetter 1973 Overall idea Weak ties are

More information

arxiv:physics/0601033 v1 6 Jan 2006

arxiv:physics/0601033 v1 6 Jan 2006 Analysis of telephone network traffic based on a complex user network Yongxiang Xia, Chi K. Tse, Francis C. M. Lau, Wai Man Tam, Michael Small arxiv:physics/0601033 v1 6 Jan 2006 Department of Electronic

More information

Medial Axis Construction and Applications in 3D Wireless Sensor Networks

Medial Axis Construction and Applications in 3D Wireless Sensor Networks Medial Axis Construction and Applications in 3D Wireless Sensor Networks Su Xia, Ning Ding, Miao Jin, Hongyi Wu, and Yang Yang Presenter: Hongyi Wu University of Louisiana at Lafayette Outline Introduction

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Detection of topological patterns in complex networks: correlation prole of the internet

Detection of topological patterns in complex networks: correlation prole of the internet Available online at www.sciencedirect.com Physica A (2004) 529 540 www.elsevier.com/locate/physa Detection of topological patterns in complex networks: correlation prole of the internet Sergei Maslov a;,

More information