Graph Theory and Topology Design
|
|
|
- Blanche Ferguson
- 10 years ago
- Views:
Transcription
1 raph Theory and Topology esign avid Tipper ssociate Professor raduate Telecommunications and Networking Program University of Pittsburgh Slides Top own Network esign pproach Top down network design project approach should follow three phases: onceptual Model Objectives, Requirements, onstraints Logical Model Technology, network graph, node location, link size, etc. (where algorithms are used to minimize cost) Physical Model Specific hardware/software implementations (e.g., wiring i diagram, repeater locations, etc.) ocus on lgorithms for Logical Model esign raph Theory Optimization Telcom 0
2 raphs Telecommunication and computer networks are naturally represented by graphs graph = (V, ) is a mathematical structure consisting of two sets V and lements of V are called vertices (or nodes) or example, switches, routers, crossconnects lements of are called edges ommunication links are edges (wired or wireless) ach edge has two endpoints v, v ) V V ={,,,,,,} = {(,),(,), (,), (,),., (,)} ( dge Vertex Telcom 0 Terminology Networking tends to use notation (N,L) instead of (V, ) for a graph where N is set of nodes and L is set of links graph is simple if it has no loops or parallel edges. Loop Link where both endpoints are the same node. lso called a self-loop. Parallel edges collection of two or more links having identical ends. lso called a multi-edge. ocus on simple graphs egree of a node (vertex): d i Number of links/edges out of a node (assuming same number of in and out links) djacent nodes/vertices: Two nodes are adjacent if there is a link that has them as endpoints node degree d i = number of neighbor nodes of node i Telcom 0
3 Terminology ont. xample network: simple graph egree of Node d =, egree of Node d = and are adjacent, and not Size of graph characterized by number of nodes N and number of links L xample network: N = 7, L = 0 an represent graph by djacency matrix which is N x N matrix where a ij = if link exist between nodes i and j a ij = 0 otherwise = Telcom 0 5 Paths and ycles Path from node to node Z: n alternating sequence of nodes and links, representing a continuous traversal from vertex to vertex Z. Trail: a path with no repeated edges. ycle: a path starting and ending on the same node onnected graph: graph in which every pair of distinct nodes has a path between them. Weighted raph: graph (N,L) is weighted if there is a value w ij associated with each link l ij ɛ L or example, link speed, cost, etc. We often denote this graph (, W) or (N,L,W). Telcom 0 6
4 Terminology ont. xample: Path from to is given by (,),(,),(,) ycle at is given by (,), (,), (,) xample is a connected raph Telcom 0 7 raph Types omplete raph: every node is connected to every other node also called a ull Mesh N node network every node has degree (N-) Mesh raph ach node having degree or more and forming a connect graph in which every pair of distinct nodes has a path between them. Telcom 0 8
5 raph Types rid raph: Nodes have a regular grid pattern: Occurs in parallel computing, sensor networks, etc. Telcom 0 9 raph Types Tree: a connected, simple graph without cycles. ny tree with N nodes has N- links Trees often used in access networks Telcom
6 aynetworks P*8x50 RST OOO0 ON 6 PWR THR LM LINK RS LM N0 N PWR0PWR INS T LM P R entillion 00 S P* 8x50 O OO0 O N 6 aynetworks RST PWR THR LM LINK RS LM N0 N PWR0 PW R IM INS T LM P R entillion 00 S P* 8x50 O OO0 O N 6 aynetworks RST PWR THR LM LINK RS LM N0 N PWR0 PW R INS T LM P R S entillion 00 Typical ellular Network S S S7 HLR S S S6 U MS S IR S S5 VLR Tree Terminology S S7 S S S S6 S S5 Root: One node of a tree may be designated as a root (has no parent only children) ach node (besides root) has a single parent node which is the node closest to the root ach node has zero or more child nodes which are the adjacent nodes farthest from the root Leaf: a node without a child Telcom 0 raph Types tree is a STR if only node has degree > X Y P Q Z Telcom 85 6
7 raph Types HIN is a tree with no nodes of degree > X Y Z Trees are usually the cheapest network design However have poor reliability Telcom 85 P Q raph Types In graph theory, a tour refers to a possible solution of the traveling salesman problem (TSP). iven a set of Nodes N = {n,n, n N } a tour is a set of N links l L such that each node N has degree ee and the graph is connected in networking this is a ring topology Rings are used when reliability is important Telcom 85 7
8 raph nalysis asic graph theory analysis to study/compare network topologies Some Typical Metrics Maximum Node degree verage node degree Minimum node degree verage path length between a node pair verage shortest path length network wide Network iameter length of longest shortest path in the network Number of critical points in graph Link/node whose loss partitions graph K connectivity is k connected in removal of any combination of k- nodes doesn t partition the graph tc.. Telcom 0 5 Small World raphs/networks property of some networks is ``small world or scale free behavior Small number of hops to reach most people lustering into Neighborhoods Used to model social networks Scale-ree Networks istribution of node degree has a power law behavior ~ k -r r >, typically < r < where k = # links; Simple test for scale free is to plot a histogram of node degree test power law behavior Telcom 0 6 8
9 Telecom Italia ackbone Testing if Scale ree get frequency histogram TORINO MILNO RSI VINZ MILNO VRON VNZI LSSNRI PINZ SVON NOV OLON PIS IRNZ PRUI NON ROM L QUIL PSR ROM OI RI SSSRI NPOLI SLRNO POTNZ TRNTO LIRI TNZRO MSSIN PLRMO RIO. Not scale free! Telcom 0 7 Network Topologies Most networks a mix of trees, rings, mesh depending on network type, cost/traffic/reliability Need to know how to determine good topologies for Tree, Ring and Mesh Use graph theory derived algorithms for Tree and Rings Telcom 0 8 9
10 esign of Trees Many algorithms for design and types of trees Minimum Spanning Trees, Shortest Path Trees, etc. Spanning Trees and Subgraphs Subgraph of graph obtained by selecting number of links and nodes from or each link, the two nodes incident on that link must be selected ive graph (N,L), graph (N,L ) is a subgraph of iff N N and L L and l L, if l incident on e and w then e, w N spanning subgraph includes all the nodes of tree T is a spanning tree of if T is a spanning subgraph of Not usually unique typically many spanning trees Telcom 0 9 Spanning Tree xamples Network raph onsidered Spanning Tree Spanning Tree Telcom 0 0 0
11 inding the MST The Minimal Spanning Tree (MST) spanning tree of whose total weight is a minimum minimum cost spanning tree an have many MSTs all with same cost MSTs are used in for network designs when have just few nodes and cost is dominant factor (ccess networks) Two algorithms Kruskal and Prim Telcom 0 lgorithm Prim s lgorithm given a weighted graph (N,L,W) starts by selecting a node adding the least expensive link iterates until tree is built U = set of nodes in MST V = set of nodes that are NOT in MST but are adjacent to nodes in U. Place any node in U and update V. ind the link with smallest weight that connects a node in V to a node in U. dd that edge to the tree and update U & V.. Repeat & until all nodes are included U = N Telcom 0
12 lgorithm xample pply Prim algorithm to the graph below Telcom 0 Prim s lgorithm xample rbitrarily pick node to start with min cost link to a node in V is (,) Iteration ti U V 0,,,,,,,,,, Telcom 0
13 Prim s lgorithm xample Iteration U V 0,,,,,,,,,,,,,,, Telcom 0 5 Prim s lgorithm xample Iteration U V 0,,,,,,,,,,,,,,,,,,,, <= arbitrarily pick (,) link rather than (,) Telcom 0 6
14 Prim s lgorithm xample Iteration U V 0,,,,,,,,,,,,,,,,,,,,,,,,,,,, Telcom 0 7 Prim s lgorithm xample Iteration U V 0,,,,,,,,,,,,,,,,,,,,,,,,,,,, 5,,,,, Telcom 0 8
15 Prim s lgorithm xample Iteration U V 0,,,,,,,,,,,,,,,,,,,,,,,,,,,, 5,,,,, 6,,,,,, <= arbitrarily pick (,) link rather than (,) link MST is complete weight is Telcom 0 9 Kruskal s lgorithm Kruskal achieves the MST by starting with a graph and picking out edges based on cost. heck that the graph is connected. If it is not connected stop. Sort the edges of the graph in ascending order of weight.. Mark each node as a separate component.. xamine each of the sorted edges: if the edge connects two separate components, add it ; otherwise, discard and go to step Telcom 0 0 5
16 lgorithm xample pply Kruskal s algorithm to the graph below Pick one of the edges with minimum weight bi rbitrarily il pick k() (,) rather than () (,) Telcom 0 lgorithm xample Iteration pick (,) as it has minimum weight Telcom 0 6
17 7 lgorithm xample Iteration rbitrarily pick (,) out of possible choices (,), (,), (,),(,) Telcom 0 lgorithm xample Iteration rbitrarily pick (,) out of possible choices (,), (,),(,) Telcom 0
18 8 lgorithm xample Iteration 5 pick (,) as (,) is not a valid choice ( and are in same component) Telcom 0 5 lgorithm xample Iteration 6 pick (,) from possible choices (,), (,) MST is complete weight is p g Telcom 0 6
19 MST s rawbacks n MST for 0 nodes N0 N N6 N7 N9 N N5 N8 N N MSTs don t scale well when traffic is internal note graph above is beginning to have a leggy look, which means that some traffic is taking a circuitous route between its source and destination. Telcom 0 7 Shortest-Path Trees (SPT) Shortest Path iven a weighted graph (,W) and nodes n and n, the shortest path from n to n is a path P such that the sum of link weights along the path is a minimum. Shortest Path Tree e P w ( e) iven a weighted graph (,W) and a node n, a shortest path tree rooted at n is a tree T such that, for any other node n, the path from n to n in the tree T is a shortest path between the nodes. SPT vs. MST SPT cost more, but will have lower link utilization and lower delay, smaller average hop count Telcom 0 8 9
20 inding a Shortest Path Tree iven a connected graph and a node selected to be a root ijkstra s algorithm can be used to find a shortest path tree The algorithm is similar to Prim s in that one iteratively builds a tree Let N = set of Nodes S = source node U = set of nodes incorporated so far W() is the link cost, specifically w(i,j) is the cost from node i to node j, w(i,j) = if the two vertices are not directly connected d_min is the currently known minimum cost path from node s to node k Telcom 0 9 inding a Shortest Path Tree ijkstra s lgorithm. Initialization: Mark every node as unscanned and U = {s}, d_min(k) = w(s,k) for k s. Loop until you have scanned all the nodes.. ind the node x not in tree T with the minimum cost path from s, add x to T. Update the minimum cost paths d_min(k) = min{d_min(k), min(k), d_min(x) + w(x,k)} Terminate when all nodes added to T Requires N iterations Telcom 0 0 0
21 lgorithm xample pply ijkstra s algorithm to find a SPT rooted at Iteration T d_min() Path d_min() Path d_min() Path d_min() Path d_min() Path d_min() Path {} (,) - (,) (,) (,) - {,} (,) (,),(,) (,) (,) (,) (,),(,) Telcom 0 lgorithm xample Iteration T d_min() Path d_min() Path d_min() Path d_min() Path d_min() Path d_min() Path {} (,) - (,) (,) (,) - {,} (,) (,),(,) (,) (,) (,) (,),(,) {,,} (,) (,),(,) (,) (,) (,) (,),(,) {,,,} (,) (,),(,) (,) (,) (,) (,),(,) 5 {,,,,} (,) (,),(,) (,) (,) (,) (,),(,) 6 {,,,,,} (,) (,),(,) (,) (,) (,) (,),(,) 7{,,,,,,} (,) (,),(,) (,) (,) (,) (,),(,) SPT is a Star topology MST Telcom 0
22 Prim ijkstra Trees MSTs have high delay but are cheap SPTs have lower delay and utilization but more expensive Prim-ijkstra algorithm interpolates between MST and SPT (comprise) lgorithms : ) Prim s: min neighbors dist( node, neighbor) ) ijkstra s: min ( dist( root, neighbor) dist( neighbor, node)) neighbors ) Prim-ijkstra s: 0 min ( dist( root, neighbor) dist( neighbor, node)) neighbors Telcom 0 Rings tree maybe too unreliable to be a good network design as they are subject to single point of failure onsider the reliability of Tree vs. Ring Let p = probability of a link failure ive Node Tree ive Node Ring P(No ailure) = (-p) P(ailure) = (-p) = ( p + 6p p + p ) = p - 6p + p - p P(ailure) = - (-p) 5 5p(-p) P (ailure) = 0p (-p) + 0p (-p) + 5p (-p) + p 5 Telcom 0
23 Rings and Reliability omparing the reliability of Trees vs Rings p Tree Ring x x x x x x x 0-6 x 0 - How can one find a good ring topology? Telcom 0 5 Traveling Salesman Problem (TSP) Number of tours is in a set of N nodes is inding a tour/ring is equivalent to the Traveling Salesman Problem (TSP) iven a set of nodes ( n, n,..., n N ) and a distance/cost function d : N N, the traveling salesman problem is to find the tour such that N d ( n, i n ) i is a minimum. i TSP is a tough problem (NP Hard) Solve using use heuristic algorithms. ( N )!/ Telcom 0 6
24 Nearest-neighbor lgorithm. Start at a node we call root and set current_node = root.. Loop until we have all the nodes in the tour. ind the node closest (i.e., min cost or distance ) to the current_node that is not in the tour. We call this best_node. reate an edge between current_node and best_node. Reset the current_node to the best_node.. inally create an edge between the last node and the root to complete the tour. Telcom 0 7 Nearest Neighbor xample xample: Start at node Table 6. xample Network Link osts Node Node Telcom 0 8
25 Nearest Neighbor xample Telcom 0 9 Nearest Neighbor xample Telcom
26 Nearest Neighbor xample Telcom 0 5 Nearest Neighbor xample Telcom 0 5 6
27 Nearest Neighbor xample 5 Telcom 0 5 Nearest Neighbor xample 5 6 Telcom 0 5 7
28 Nearest Neighbor xample Total ost = 50 Telcom 0 55 Observation: * ood (?): Nearest-neighbor lgorithm We are trying to produce a short tour, we will always move to the best possible next location. * ad (?): When we look at the figure produced, we can see the lines may cross frequently. Several improved version of nearest-neighbor in the literature - will look at optimization based approaches later Simple improvement is grow ring/tour r from both ends That is when finding best node to move to look at option from both ends of current partial tour Telcom
29 Nearest Neighbor xample: Start at node Table 6. xample Network Link osts Node Node Telcom 0 57 Nearest Neighbor xample Telcom
30 Nearest Neighbor xample Telcom 0 59 Nearest Neighbor xample Telcom
31 Nearest Neighbor xample Telcom 0 6 Nearest Neighbor xample 5 Telcom 0 6
32 Nearest Neighbor xample 5 6 Telcom 0 6 Nearest Neighbor xample Total ost = 8 Telcom 0 6
33 (Rings) o Not Scale iven uniform traffic any Ring of N nodes has hops N N if n is odd and if n is even. ( N ) omparison of average number of hops for MST and TSP: Number of nodes hops MST hops TSP Telcom 0 65 Improving Ring Topologies an reduce hop count by adopting a multi-ring topology. Topology is a set of interconnected rings xample, a TSP tour on 0 nodes. The average number of hops is 5.6. We want to reduce the average hop count but keep the -connectivity. N0 N N6 N N7 N5 N9 N N0 N N5 N9 N N6 N8 N7 N N8 N N Telcom 0 66
34 ivide and onquer Use a ivide and onquer approach ivide nodes into disjoint subset, construct ring for each subset, then join rings xample ivide the 0 nodes into compact clusters of 0 nodes each. all these clusters and. (We might divide the 0 nodes by ranges of their coordinates, for example, to create the clusters.) Use the nearest-neighbor algorithm to design TSP tours on each cluster. Select v and v to be the nodes such that t the distance is the minimum. Now select v -v and v -v to be the nodes such that the distance is the minimum. dd the edges (v,v), (v,v) to the design. Telcom 0 67 ivide and onquer rouping into groups of 0 nodes. Then running the nearest neighbor algorithm gives two rings as below. Note that the average hop count is reduced N0 N N6 N N7 N5 N9 N N0 N N5 N9 N N6 N8 N7 N N8 N N Telcom 0 68
35 ivide and onquer rouping into groups of 0 nodes. Then running the nearest neighbor algorithm gives two rings as below. Joining i the two rings at their closet points results in N0 N N6 N N7 N5 N9 N N0 N N5 N9 N N6 N8 N7 N N8 N N Telcom 0 69 Level N. merican Network Snapshoot of their backbone in mid 90 s Telcom
36 Typical Network esign Network Topology esign Need to know how to construct Trees Rings Mesh networks ccess lgorithms adopted from graph theory are used for eeder Network Trees and Rings Metro rea ackbone Metro rea ore ~Mesh Metro ~ Ring ccess ~ Tree entral Offices Metro rea Metro rea n TLOM 0 7 Summary asic raph theory terminology and techniques nalysis useful to compare/evaluate designs Trees and Rings are often used in access networks Trees MST (Prim, Kruskal algorithrms) SPT Prim-ikjistra Trees Rings etter reliability than trees Nearest neighbor, Improved nearest neighbor Multi-Ring Telcom 0 7 6
Social Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
Any two nodes which are connected by an edge in a graph are called adjacent node.
. iscuss following. Graph graph G consist of a non empty set V called the set of nodes (points, vertices) of the graph, a set which is the set of edges and a mapping from the set of edges to a set of pairs
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti
Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
Chapter 6: Graph Theory
Chapter 6: Graph Theory Graph theory deals with routing and network problems and if it is possible to find a best route, whether that means the least expensive, least amount of time or the least distance.
Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch
Network Infrastructure or building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater
Internet Layer. Routing Tables. Routing in the Internet. Routing Protocols
Internet Layer Routing Tables estination ddress Next Hop Raw division into three tasks: ata transfer over a global network Route decision at the sub-nodes ontrol of the network or transmission status.7...../8
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways
ynamically onfigurable Topology ontrol for Hybrid d Hoc Networks with Internet ateways eun-hee ho and Young-ae Ko raduate School of Information & ommunication, jou University, Republic of Korea {khzho,
V. Adamchik 1. Graph Theory. Victor Adamchik. Fall of 2005
V. Adamchik 1 Graph Theory Victor Adamchik Fall of 2005 Plan 1. Basic Vocabulary 2. Regular graph 3. Connectivity 4. Representing Graphs Introduction A.Aho and J.Ulman acknowledge that Fundamentally, computer
Load balancing in a heterogeneous computer system by self-organizing Kohonen network
Bull. Nov. Comp. Center, Comp. Science, 25 (2006), 69 74 c 2006 NCC Publisher Load balancing in a heterogeneous computer system by self-organizing Kohonen network Mikhail S. Tarkov, Yakov S. Bezrukov Abstract.
Why? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis
Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.0, [email protected] Chapter 06: Network analysis Version: April 8, 04 / 3 Contents Chapter
Topological Properties
Advanced Computer Architecture Topological Properties Routing Distance: Number of links on route Node degree: Number of channels per node Network diameter: Longest minimum routing distance between any
Graph/Network Visualization
Graph/Network Visualization Data model: graph structures (relations, knowledge) and networks. Applications: Telecommunication systems, Internet and WWW, Retailers distribution networks knowledge representation
Cpt S 223. School of EECS, WSU
The Shortest Path Problem 1 Shortest-Path Algorithms Find the shortest path from point A to point B Shortest in time, distance, cost, Numerous applications Map navigation Flight itineraries Circuit wiring
OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION
OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering
Graph Mining and Social Network Analysis. Data Mining; EECS 4412 Darren Rolfe + Vince Chu 11.06.14
Graph Mining and Social Network nalysis Data Mining; EES 4412 Darren Rolfe + Vince hu 11.06.14 genda Graph Mining Methods for Mining Frequent Subgraphs priori-based pproach: GM, FSG Pattern-Growth pproach:
Introduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
Euclidean Minimum Spanning Trees Based on Well Separated Pair Decompositions Chaojun Li. Advised by: Dave Mount. May 22, 2014
Euclidean Minimum Spanning Trees Based on Well Separated Pair Decompositions Chaojun Li Advised by: Dave Mount May 22, 2014 1 INTRODUCTION In this report we consider the implementation of an efficient
Chinese postman problem
PTR hinese postman problem Learning objectives fter studying this chapter, you should be able to: understand the hinese postman problem apply an algorithm to solve the problem understand the importance
CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.
Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure
Vehicle Routing and Scheduling. Martin Savelsbergh The Logistics Institute Georgia Institute of Technology
Vehicle Routing and Scheduling Martin Savelsbergh The Logistics Institute Georgia Institute of Technology Vehicle Routing and Scheduling Part I: Basic Models and Algorithms Introduction Freight routing
Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li
Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 13 Overview Graphs and Graph
Load balancing Static Load Balancing
Chapter 7 Load Balancing and Termination Detection Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection
Static IP Routing and Aggregation Exercises
Politecnico di Torino Static IP Routing and Aggregation xercises Fulvio Risso August 0, 0 Contents I. Methodology 4. Static routing and routes aggregation 5.. Main concepts........................................
Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis. Contents. Introduction. Maarten van Steen. Version: April 28, 2014
Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R.0, [email protected] Chapter 0: Version: April 8, 0 / Contents Chapter Description 0: Introduction
System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1
System Interconnect Architectures CSCI 8150 Advanced Computer Architecture Hwang, Chapter 2 Program and Network Properties 2.4 System Interconnect Architectures Direct networks for static connections Indirect
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
28 Networks and Communication Protocols
113 28 Networks and ommunication Protocols Trend in computer systems: personal computing. Reasons why: ost: economies of scale. lso, avoids large initial investment in timesharing system. Performance:
Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
A number of tasks executing serially or in parallel. Distribute tasks on processors so that minimal execution time is achieved. Optimal distribution
Scheduling MIMD parallel program A number of tasks executing serially or in parallel Lecture : Load Balancing The scheduling problem NP-complete problem (in general) Distribute tasks on processors so that
Complex Networks Analysis: Clustering Methods
Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich [email protected] 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications
Load Balancing and Termination Detection
Chapter 7 Load Balancing and Termination Detection 1 Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
CIS 700: algorithms for Big Data
CIS 700: algorithms for Big Data Lecture 6: Graph Sketching Slides at http://grigory.us/big-data-class.html Grigory Yaroslavtsev http://grigory.us Sketching Graphs? We know how to sketch vectors: v Mv
Data Caching in Networks with Reading, Writing and Storage Costs
Data Caching in Networks with Reading, 1 Writing and Storage Costs Himanshu Gupta Computer Science Department Stony Brook University Stony Brook, NY 11790 Email: [email protected] Bin Tang Computer
Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
Cluster Analysis: Advanced Concepts
Cluster Analysis: Advanced Concepts and dalgorithms Dr. Hui Xiong Rutgers University Introduction to Data Mining 08/06/2006 1 Introduction to Data Mining 08/06/2006 1 Outline Prototype-based Fuzzy c-means
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
Distributed Dynamic Load Balancing for Iterative-Stencil Applications
Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,
Home Page. Data Structures. Title Page. Page 1 of 24. Go Back. Full Screen. Close. Quit
Data Structures Page 1 of 24 A.1. Arrays (Vectors) n-element vector start address + ielementsize 0 +1 +2 +3 +4... +n-1 start address continuous memory block static, if size is known at compile time dynamic,
Architectural Level Power Consumption of Network on Chip. Presenter: YUAN Zheng
Architectural Level Power Consumption of Network Presenter: YUAN Zheng Why Architectural Low Power Design? High-speed and large volume communication among different parts on a chip Problem: Power consumption
Interconnection Network
Interconnection Network Recap: Generic Parallel Architecture A generic modern multiprocessor Network Mem Communication assist (CA) $ P Node: processor(s), memory system, plus communication assist Network
Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks
Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, [email protected] Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents
Mathematics for Algorithm and System Analysis
Mathematics for Algorithm and System Analysis for students of computer and computational science Edward A. Bender S. Gill Williamson c Edward A. Bender & S. Gill Williamson 2005. All rights reserved. Preface
Routing in wireless networks
Routing in wireless networks. Pham Université de Pau et des Pays de l dour épartement Informatique http://www.univ-pau.fr/~cpham [email protected] Routing in wireless networks What s a wireless network?
CSE 4351/5351 Notes 7: Task Scheduling & Load Balancing
CSE / Notes : Task Scheduling & Load Balancing Task Scheduling A task is a (sequential) activity that uses a set of inputs to produce a set of outputs. A task (precedence) graph is an acyclic, directed
Reductions & NP-completeness as part of Foundations of Computer Science undergraduate course
Reductions & NP-completeness as part of Foundations of Computer Science undergraduate course Alex Angelopoulos, NTUA January 22, 2015 Outline Alex Angelopoulos (NTUA) FoCS: Reductions & NP-completeness-
Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers
Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers Ho Trong Viet, Yves Deville, Olivier Bonaventure, Pierre François ICTEAM, Université catholique de Louvain (UCL), Belgium.
Protein Protein Interaction Networks
Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics
136 CHAPTER 4. INDUCTION, GRAPHS AND TREES
136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics
Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design
Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design Hongsik Choi and Hyeong-Ah Choi Department of Electrical Engineering and Computer Science George Washington University Washington,
Part 2: Community Detection
Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -
Hyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network
Hyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network 1 Gliederung Einführung Vergleich und Problemstellung Algorithmen Evaluation 2 Aspects Backbone Last mile access stationary commodity equipment
Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!
Interconnection Networks Interconnection Networks Interconnection networks are used everywhere! Supercomputers connecting the processors Routers connecting the ports can consider a router as a parallel
Distributed Computing over Communication Networks: Maximal Independent Set
Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
Lecture 13: Distance-vector Routing. Lecture 13 Overview. Bellman-Ford Algorithm. d u (z) = min{c(u,v) + d v (z), c(u,w) + d w (z)}
Lecture : istance-vector Routing S : omputer Networks hris Kanich Quiz TOMORROW Lecture Overview istance vector ssume each router knows its own address and cost to reach each of its directly connected
DATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
Social Media Mining. Network Measures
Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints
Internet Routing. Review of Networking Principles
Internet Routing Review of Networking Principles 1 Principles of the Internet Edge vs. core (end-systems vs. routers) Dumb Intelligence at the end-systems Different communication paradigms Connection oriented
Probe Station Placement for Robust Monitoring of Networks
Probe Station Placement for Robust Monitoring of Networks Maitreya Natu Dept. of Computer and Information Science University of Delaware Newark, DE, USA, 97 Email: [email protected] Adarshpal S. Sethi
Chapter 15: Distributed Structures. Topology
1 1 Chapter 15: Distributed Structures Topology Network Types Operating System Concepts 15.1 Topology Sites in the system can be physically connected in a variety of ways; they are compared with respect
Practical Graph Mining with R. 5. Link Analysis
Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities
Load Balanced Link Reversal Routing in Wireless Ad Hoc Networks
oad alanced ink Reversal Routing in Wireless d oc Networks Nabhendra isnik, lhussein bouzeid, ostas usch Rensselaer Polytechnic nstitute Troy, New York [email protected], [email protected], [email protected]
Graph Theory Algorithms for Mobile Ad Hoc Networks
Informatica 36 (2012) 185-200 185 Graph Theory Algorithms for Mobile Ad Hoc Networks Natarajan Meghanathan Department of Computer Science, Jackson State University Jackson, MS 39217, USA E-mail: [email protected]
A Study of Sufficient Conditions for Hamiltonian Cycles
DeLeon 1 A Study of Sufficient Conditions for Hamiltonian Cycles Melissa DeLeon Department of Mathematics and Computer Science Seton Hall University South Orange, New Jersey 07079, U.S.A. ABSTRACT A graph
NP-Completeness. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University
NP-Completeness CptS 223 Advanced Data Structures Larry Holder School of Electrical Engineering and Computer Science Washington State University 1 Hard Graph Problems Hard means no known solutions with
InfiniBand Clustering
White Paper InfiniBand Clustering Delivering Better Price/Performance than Ethernet 1.0 Introduction High performance computing clusters typically utilize Clos networks, more commonly known as Fat Tree
Ethernet (LAN switching)
Ethernet ( switching) 1 Outline Interconnection devices Bridges/ switches vs. Routers Bridges Learning Bridges Transparent bridges 2 1 Bridges/ switches Interconnect multiple, possibly with different type
Lecture 18: Interconnection Networks. CMU 15-418: Parallel Computer Architecture and Programming (Spring 2012)
Lecture 18: Interconnection Networks CMU 15-418: Parallel Computer Architecture and Programming (Spring 2012) Announcements Project deadlines: - Mon, April 2: project proposal: 1-2 page writeup - Fri,
Interconnection Networks Programmierung Paralleler und Verteilter Systeme (PPV)
Interconnection Networks Programmierung Paralleler und Verteilter Systeme (PPV) Sommer 2015 Frank Feinbube, M.Sc., Felix Eberhardt, M.Sc., Prof. Dr. Andreas Polze Interconnection Networks 2 SIMD systems
Distance Degree Sequences for Network Analysis
Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation
2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]
Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)
Computer Science Department. Technion - IIT, Haifa, Israel. Itai and Rodeh [IR] have proved that for any 2-connected graph G and any vertex s G there
- 1 - THREE TREE-PATHS Avram Zehavi Alon Itai Computer Science Department Technion - IIT, Haifa, Israel Abstract Itai and Rodeh [IR] have proved that for any 2-connected graph G and any vertex s G there
Load Balancing and Termination Detection
Chapter 7 slides7-1 Load Balancing and Termination Detection slides7-2 Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination
Scheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
Interconnection Network Design
Interconnection Network Design Vida Vukašinović 1 Introduction Parallel computer networks are interesting topic, but they are also difficult to understand in an overall sense. The topological structure
Why the Network Matters
Week 2, Lecture 2 Copyright 2009 by W. Feng. Based on material from Matthew Sottile. So Far Overview of Multicore Systems Why Memory Matters Memory Architectures Emerging Chip Multiprocessors (CMP) Increasing
Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)
School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit
Stationary random graphs on Z with prescribed iid degrees and finite mean connections
Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative
Course on Social Network Analysis Graphs and Networks
Course on Social Network Analysis Graphs and Networks Vladimir Batagelj University of Ljubljana Slovenia V. Batagelj: Social Network Analysis / Graphs and Networks 1 Outline 1 Graph...............................
MATHEMATICAL THOUGHT AND PRACTICE. Chapter 7: The Mathematics of Networks The Cost of Being Connected
MATHEMATICAL THOUGHT AND PRACTICE Chapter 7: The Mathematics of Networks The Cost of Being Connected Network A network is a graph that is connected. In this context the term is most commonly used when
Medial Axis Construction and Applications in 3D Wireless Sensor Networks
Medial Axis Construction and Applications in 3D Wireless Sensor Networks Su Xia, Ning Ding, Miao Jin, Hongyi Wu, and Yang Yang Presenter: Hongyi Wu University of Louisiana at Lafayette Outline Introduction
Internet Control Message Protocol (ICMP)
SFWR 4C03: Computer Networks & Computer Security Jan 31-Feb 4, 2005 Lecturer: Kartik Krishnan Lecture 13-16 Internet Control Message Protocol (ICMP) The operation of the Internet is closely monitored by
Metabolic Network Analysis
Metabolic Network nalysis Overview -- modelling chemical reaction networks -- Levels of modelling Lecture II: Modelling chemical reaction networks dr. Sander Hille [email protected] http://www.math.leidenuniv.nl/~shille
Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks*
Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks* Abhishek Kashyap, Anuj Rawat and Mark Shayman Department of Electrical and Computer Engineering, University
