Graph Theory and Topology Design

Size: px
Start display at page:

Download "Graph Theory and Topology Design"

Transcription

1 raph Theory and Topology esign avid Tipper ssociate Professor raduate Telecommunications and Networking Program University of Pittsburgh Slides Top own Network esign pproach Top down network design project approach should follow three phases: onceptual Model Objectives, Requirements, onstraints Logical Model Technology, network graph, node location, link size, etc. (where algorithms are used to minimize cost) Physical Model Specific hardware/software implementations (e.g., wiring i diagram, repeater locations, etc.) ocus on lgorithms for Logical Model esign raph Theory Optimization Telcom 0

2 raphs Telecommunication and computer networks are naturally represented by graphs graph = (V, ) is a mathematical structure consisting of two sets V and lements of V are called vertices (or nodes) or example, switches, routers, crossconnects lements of are called edges ommunication links are edges (wired or wireless) ach edge has two endpoints v, v ) V V ={,,,,,,} = {(,),(,), (,), (,),., (,)} ( dge Vertex Telcom 0 Terminology Networking tends to use notation (N,L) instead of (V, ) for a graph where N is set of nodes and L is set of links graph is simple if it has no loops or parallel edges. Loop Link where both endpoints are the same node. lso called a self-loop. Parallel edges collection of two or more links having identical ends. lso called a multi-edge. ocus on simple graphs egree of a node (vertex): d i Number of links/edges out of a node (assuming same number of in and out links) djacent nodes/vertices: Two nodes are adjacent if there is a link that has them as endpoints node degree d i = number of neighbor nodes of node i Telcom 0

3 Terminology ont. xample network: simple graph egree of Node d =, egree of Node d = and are adjacent, and not Size of graph characterized by number of nodes N and number of links L xample network: N = 7, L = 0 an represent graph by djacency matrix which is N x N matrix where a ij = if link exist between nodes i and j a ij = 0 otherwise = Telcom 0 5 Paths and ycles Path from node to node Z: n alternating sequence of nodes and links, representing a continuous traversal from vertex to vertex Z. Trail: a path with no repeated edges. ycle: a path starting and ending on the same node onnected graph: graph in which every pair of distinct nodes has a path between them. Weighted raph: graph (N,L) is weighted if there is a value w ij associated with each link l ij ɛ L or example, link speed, cost, etc. We often denote this graph (, W) or (N,L,W). Telcom 0 6

4 Terminology ont. xample: Path from to is given by (,),(,),(,) ycle at is given by (,), (,), (,) xample is a connected raph Telcom 0 7 raph Types omplete raph: every node is connected to every other node also called a ull Mesh N node network every node has degree (N-) Mesh raph ach node having degree or more and forming a connect graph in which every pair of distinct nodes has a path between them. Telcom 0 8

5 raph Types rid raph: Nodes have a regular grid pattern: Occurs in parallel computing, sensor networks, etc. Telcom 0 9 raph Types Tree: a connected, simple graph without cycles. ny tree with N nodes has N- links Trees often used in access networks Telcom

6 aynetworks P*8x50 RST OOO0 ON 6 PWR THR LM LINK RS LM N0 N PWR0PWR INS T LM P R entillion 00 S P* 8x50 O OO0 O N 6 aynetworks RST PWR THR LM LINK RS LM N0 N PWR0 PW R IM INS T LM P R entillion 00 S P* 8x50 O OO0 O N 6 aynetworks RST PWR THR LM LINK RS LM N0 N PWR0 PW R INS T LM P R S entillion 00 Typical ellular Network S S S7 HLR S S S6 U MS S IR S S5 VLR Tree Terminology S S7 S S S S6 S S5 Root: One node of a tree may be designated as a root (has no parent only children) ach node (besides root) has a single parent node which is the node closest to the root ach node has zero or more child nodes which are the adjacent nodes farthest from the root Leaf: a node without a child Telcom 0 raph Types tree is a STR if only node has degree > X Y P Q Z Telcom 85 6

7 raph Types HIN is a tree with no nodes of degree > X Y Z Trees are usually the cheapest network design However have poor reliability Telcom 85 P Q raph Types In graph theory, a tour refers to a possible solution of the traveling salesman problem (TSP). iven a set of Nodes N = {n,n, n N } a tour is a set of N links l L such that each node N has degree ee and the graph is connected in networking this is a ring topology Rings are used when reliability is important Telcom 85 7

8 raph nalysis asic graph theory analysis to study/compare network topologies Some Typical Metrics Maximum Node degree verage node degree Minimum node degree verage path length between a node pair verage shortest path length network wide Network iameter length of longest shortest path in the network Number of critical points in graph Link/node whose loss partitions graph K connectivity is k connected in removal of any combination of k- nodes doesn t partition the graph tc.. Telcom 0 5 Small World raphs/networks property of some networks is ``small world or scale free behavior Small number of hops to reach most people lustering into Neighborhoods Used to model social networks Scale-ree Networks istribution of node degree has a power law behavior ~ k -r r >, typically < r < where k = # links; Simple test for scale free is to plot a histogram of node degree test power law behavior Telcom 0 6 8

9 Telecom Italia ackbone Testing if Scale ree get frequency histogram TORINO MILNO RSI VINZ MILNO VRON VNZI LSSNRI PINZ SVON NOV OLON PIS IRNZ PRUI NON ROM L QUIL PSR ROM OI RI SSSRI NPOLI SLRNO POTNZ TRNTO LIRI TNZRO MSSIN PLRMO RIO. Not scale free! Telcom 0 7 Network Topologies Most networks a mix of trees, rings, mesh depending on network type, cost/traffic/reliability Need to know how to determine good topologies for Tree, Ring and Mesh Use graph theory derived algorithms for Tree and Rings Telcom 0 8 9

10 esign of Trees Many algorithms for design and types of trees Minimum Spanning Trees, Shortest Path Trees, etc. Spanning Trees and Subgraphs Subgraph of graph obtained by selecting number of links and nodes from or each link, the two nodes incident on that link must be selected ive graph (N,L), graph (N,L ) is a subgraph of iff N N and L L and l L, if l incident on e and w then e, w N spanning subgraph includes all the nodes of tree T is a spanning tree of if T is a spanning subgraph of Not usually unique typically many spanning trees Telcom 0 9 Spanning Tree xamples Network raph onsidered Spanning Tree Spanning Tree Telcom 0 0 0

11 inding the MST The Minimal Spanning Tree (MST) spanning tree of whose total weight is a minimum minimum cost spanning tree an have many MSTs all with same cost MSTs are used in for network designs when have just few nodes and cost is dominant factor (ccess networks) Two algorithms Kruskal and Prim Telcom 0 lgorithm Prim s lgorithm given a weighted graph (N,L,W) starts by selecting a node adding the least expensive link iterates until tree is built U = set of nodes in MST V = set of nodes that are NOT in MST but are adjacent to nodes in U. Place any node in U and update V. ind the link with smallest weight that connects a node in V to a node in U. dd that edge to the tree and update U & V.. Repeat & until all nodes are included U = N Telcom 0

12 lgorithm xample pply Prim algorithm to the graph below Telcom 0 Prim s lgorithm xample rbitrarily pick node to start with min cost link to a node in V is (,) Iteration ti U V 0,,,,,,,,,, Telcom 0

13 Prim s lgorithm xample Iteration U V 0,,,,,,,,,,,,,,, Telcom 0 5 Prim s lgorithm xample Iteration U V 0,,,,,,,,,,,,,,,,,,,, <= arbitrarily pick (,) link rather than (,) Telcom 0 6

14 Prim s lgorithm xample Iteration U V 0,,,,,,,,,,,,,,,,,,,,,,,,,,,, Telcom 0 7 Prim s lgorithm xample Iteration U V 0,,,,,,,,,,,,,,,,,,,,,,,,,,,, 5,,,,, Telcom 0 8

15 Prim s lgorithm xample Iteration U V 0,,,,,,,,,,,,,,,,,,,,,,,,,,,, 5,,,,, 6,,,,,, <= arbitrarily pick (,) link rather than (,) link MST is complete weight is Telcom 0 9 Kruskal s lgorithm Kruskal achieves the MST by starting with a graph and picking out edges based on cost. heck that the graph is connected. If it is not connected stop. Sort the edges of the graph in ascending order of weight.. Mark each node as a separate component.. xamine each of the sorted edges: if the edge connects two separate components, add it ; otherwise, discard and go to step Telcom 0 0 5

16 lgorithm xample pply Kruskal s algorithm to the graph below Pick one of the edges with minimum weight bi rbitrarily il pick k() (,) rather than () (,) Telcom 0 lgorithm xample Iteration pick (,) as it has minimum weight Telcom 0 6

17 7 lgorithm xample Iteration rbitrarily pick (,) out of possible choices (,), (,), (,),(,) Telcom 0 lgorithm xample Iteration rbitrarily pick (,) out of possible choices (,), (,),(,) Telcom 0

18 8 lgorithm xample Iteration 5 pick (,) as (,) is not a valid choice ( and are in same component) Telcom 0 5 lgorithm xample Iteration 6 pick (,) from possible choices (,), (,) MST is complete weight is p g Telcom 0 6

19 MST s rawbacks n MST for 0 nodes N0 N N6 N7 N9 N N5 N8 N N MSTs don t scale well when traffic is internal note graph above is beginning to have a leggy look, which means that some traffic is taking a circuitous route between its source and destination. Telcom 0 7 Shortest-Path Trees (SPT) Shortest Path iven a weighted graph (,W) and nodes n and n, the shortest path from n to n is a path P such that the sum of link weights along the path is a minimum. Shortest Path Tree e P w ( e) iven a weighted graph (,W) and a node n, a shortest path tree rooted at n is a tree T such that, for any other node n, the path from n to n in the tree T is a shortest path between the nodes. SPT vs. MST SPT cost more, but will have lower link utilization and lower delay, smaller average hop count Telcom 0 8 9

20 inding a Shortest Path Tree iven a connected graph and a node selected to be a root ijkstra s algorithm can be used to find a shortest path tree The algorithm is similar to Prim s in that one iteratively builds a tree Let N = set of Nodes S = source node U = set of nodes incorporated so far W() is the link cost, specifically w(i,j) is the cost from node i to node j, w(i,j) = if the two vertices are not directly connected d_min is the currently known minimum cost path from node s to node k Telcom 0 9 inding a Shortest Path Tree ijkstra s lgorithm. Initialization: Mark every node as unscanned and U = {s}, d_min(k) = w(s,k) for k s. Loop until you have scanned all the nodes.. ind the node x not in tree T with the minimum cost path from s, add x to T. Update the minimum cost paths d_min(k) = min{d_min(k), min(k), d_min(x) + w(x,k)} Terminate when all nodes added to T Requires N iterations Telcom 0 0 0

21 lgorithm xample pply ijkstra s algorithm to find a SPT rooted at Iteration T d_min() Path d_min() Path d_min() Path d_min() Path d_min() Path d_min() Path {} (,) - (,) (,) (,) - {,} (,) (,),(,) (,) (,) (,) (,),(,) Telcom 0 lgorithm xample Iteration T d_min() Path d_min() Path d_min() Path d_min() Path d_min() Path d_min() Path {} (,) - (,) (,) (,) - {,} (,) (,),(,) (,) (,) (,) (,),(,) {,,} (,) (,),(,) (,) (,) (,) (,),(,) {,,,} (,) (,),(,) (,) (,) (,) (,),(,) 5 {,,,,} (,) (,),(,) (,) (,) (,) (,),(,) 6 {,,,,,} (,) (,),(,) (,) (,) (,) (,),(,) 7{,,,,,,} (,) (,),(,) (,) (,) (,) (,),(,) SPT is a Star topology MST Telcom 0

22 Prim ijkstra Trees MSTs have high delay but are cheap SPTs have lower delay and utilization but more expensive Prim-ijkstra algorithm interpolates between MST and SPT (comprise) lgorithms : ) Prim s: min neighbors dist( node, neighbor) ) ijkstra s: min ( dist( root, neighbor) dist( neighbor, node)) neighbors ) Prim-ijkstra s: 0 min ( dist( root, neighbor) dist( neighbor, node)) neighbors Telcom 0 Rings tree maybe too unreliable to be a good network design as they are subject to single point of failure onsider the reliability of Tree vs. Ring Let p = probability of a link failure ive Node Tree ive Node Ring P(No ailure) = (-p) P(ailure) = (-p) = ( p + 6p p + p ) = p - 6p + p - p P(ailure) = - (-p) 5 5p(-p) P (ailure) = 0p (-p) + 0p (-p) + 5p (-p) + p 5 Telcom 0

23 Rings and Reliability omparing the reliability of Trees vs Rings p Tree Ring x x x x x x x 0-6 x 0 - How can one find a good ring topology? Telcom 0 5 Traveling Salesman Problem (TSP) Number of tours is in a set of N nodes is inding a tour/ring is equivalent to the Traveling Salesman Problem (TSP) iven a set of nodes ( n, n,..., n N ) and a distance/cost function d : N N, the traveling salesman problem is to find the tour such that N d ( n, i n ) i is a minimum. i TSP is a tough problem (NP Hard) Solve using use heuristic algorithms. ( N )!/ Telcom 0 6

24 Nearest-neighbor lgorithm. Start at a node we call root and set current_node = root.. Loop until we have all the nodes in the tour. ind the node closest (i.e., min cost or distance ) to the current_node that is not in the tour. We call this best_node. reate an edge between current_node and best_node. Reset the current_node to the best_node.. inally create an edge between the last node and the root to complete the tour. Telcom 0 7 Nearest Neighbor xample xample: Start at node Table 6. xample Network Link osts Node Node Telcom 0 8

25 Nearest Neighbor xample Telcom 0 9 Nearest Neighbor xample Telcom

26 Nearest Neighbor xample Telcom 0 5 Nearest Neighbor xample Telcom 0 5 6

27 Nearest Neighbor xample 5 Telcom 0 5 Nearest Neighbor xample 5 6 Telcom 0 5 7

28 Nearest Neighbor xample Total ost = 50 Telcom 0 55 Observation: * ood (?): Nearest-neighbor lgorithm We are trying to produce a short tour, we will always move to the best possible next location. * ad (?): When we look at the figure produced, we can see the lines may cross frequently. Several improved version of nearest-neighbor in the literature - will look at optimization based approaches later Simple improvement is grow ring/tour r from both ends That is when finding best node to move to look at option from both ends of current partial tour Telcom

29 Nearest Neighbor xample: Start at node Table 6. xample Network Link osts Node Node Telcom 0 57 Nearest Neighbor xample Telcom

30 Nearest Neighbor xample Telcom 0 59 Nearest Neighbor xample Telcom

31 Nearest Neighbor xample Telcom 0 6 Nearest Neighbor xample 5 Telcom 0 6

32 Nearest Neighbor xample 5 6 Telcom 0 6 Nearest Neighbor xample Total ost = 8 Telcom 0 6

33 (Rings) o Not Scale iven uniform traffic any Ring of N nodes has hops N N if n is odd and if n is even. ( N ) omparison of average number of hops for MST and TSP: Number of nodes hops MST hops TSP Telcom 0 65 Improving Ring Topologies an reduce hop count by adopting a multi-ring topology. Topology is a set of interconnected rings xample, a TSP tour on 0 nodes. The average number of hops is 5.6. We want to reduce the average hop count but keep the -connectivity. N0 N N6 N N7 N5 N9 N N0 N N5 N9 N N6 N8 N7 N N8 N N Telcom 0 66

34 ivide and onquer Use a ivide and onquer approach ivide nodes into disjoint subset, construct ring for each subset, then join rings xample ivide the 0 nodes into compact clusters of 0 nodes each. all these clusters and. (We might divide the 0 nodes by ranges of their coordinates, for example, to create the clusters.) Use the nearest-neighbor algorithm to design TSP tours on each cluster. Select v and v to be the nodes such that t the distance is the minimum. Now select v -v and v -v to be the nodes such that the distance is the minimum. dd the edges (v,v), (v,v) to the design. Telcom 0 67 ivide and onquer rouping into groups of 0 nodes. Then running the nearest neighbor algorithm gives two rings as below. Note that the average hop count is reduced N0 N N6 N N7 N5 N9 N N0 N N5 N9 N N6 N8 N7 N N8 N N Telcom 0 68

35 ivide and onquer rouping into groups of 0 nodes. Then running the nearest neighbor algorithm gives two rings as below. Joining i the two rings at their closet points results in N0 N N6 N N7 N5 N9 N N0 N N5 N9 N N6 N8 N7 N N8 N N Telcom 0 69 Level N. merican Network Snapshoot of their backbone in mid 90 s Telcom

36 Typical Network esign Network Topology esign Need to know how to construct Trees Rings Mesh networks ccess lgorithms adopted from graph theory are used for eeder Network Trees and Rings Metro rea ackbone Metro rea ore ~Mesh Metro ~ Ring ccess ~ Tree entral Offices Metro rea Metro rea n TLOM 0 7 Summary asic raph theory terminology and techniques nalysis useful to compare/evaluate designs Trees and Rings are often used in access networks Trees MST (Prim, Kruskal algorithrms) SPT Prim-ikjistra Trees Rings etter reliability than trees Nearest neighbor, Improved nearest neighbor Multi-Ring Telcom 0 7 6

Social Media Mining. Graph Essentials

Social Media Mining. Graph Essentials Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

More information

Any two nodes which are connected by an edge in a graph are called adjacent node.

Any two nodes which are connected by an edge in a graph are called adjacent node. . iscuss following. Graph graph G consist of a non empty set V called the set of nodes (points, vertices) of the graph, a set which is the set of edges and a mapping from the set of edges to a set of pairs

More information

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti

More information

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique

More information

Chapter 6: Graph Theory

Chapter 6: Graph Theory Chapter 6: Graph Theory Graph theory deals with routing and network problems and if it is possible to find a best route, whether that means the least expensive, least amount of time or the least distance.

More information

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch Network Infrastructure or building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater

More information

Internet Layer. Routing Tables. Routing in the Internet. Routing Protocols

Internet Layer. Routing Tables. Routing in the Internet. Routing Protocols Internet Layer Routing Tables estination ddress Next Hop Raw division into three tasks: ata transfer over a global network Route decision at the sub-nodes ontrol of the network or transmission status.7...../8

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],

More information

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways ynamically onfigurable Topology ontrol for Hybrid d Hoc Networks with Internet ateways eun-hee ho and Young-ae Ko raduate School of Information & ommunication, jou University, Republic of Korea {khzho,

More information

V. Adamchik 1. Graph Theory. Victor Adamchik. Fall of 2005

V. Adamchik 1. Graph Theory. Victor Adamchik. Fall of 2005 V. Adamchik 1 Graph Theory Victor Adamchik Fall of 2005 Plan 1. Basic Vocabulary 2. Regular graph 3. Connectivity 4. Representing Graphs Introduction A.Aho and J.Ulman acknowledge that Fundamentally, computer

More information

Load balancing in a heterogeneous computer system by self-organizing Kohonen network

Load balancing in a heterogeneous computer system by self-organizing Kohonen network Bull. Nov. Comp. Center, Comp. Science, 25 (2006), 69 74 c 2006 NCC Publisher Load balancing in a heterogeneous computer system by self-organizing Kohonen network Mikhail S. Tarkov, Yakov S. Bezrukov Abstract.

More information

Why? A central concept in Computer Science. Algorithms are ubiquitous.

Why? A central concept in Computer Science. Algorithms are ubiquitous. Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online

More information

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.0, [email protected] Chapter 06: Network analysis Version: April 8, 04 / 3 Contents Chapter

More information

Topological Properties

Topological Properties Advanced Computer Architecture Topological Properties Routing Distance: Number of links on route Node degree: Number of channels per node Network diameter: Longest minimum routing distance between any

More information

Graph/Network Visualization

Graph/Network Visualization Graph/Network Visualization Data model: graph structures (relations, knowledge) and networks. Applications: Telecommunication systems, Internet and WWW, Retailers distribution networks knowledge representation

More information

Cpt S 223. School of EECS, WSU

Cpt S 223. School of EECS, WSU The Shortest Path Problem 1 Shortest-Path Algorithms Find the shortest path from point A to point B Shortest in time, distance, cost, Numerous applications Map navigation Flight itineraries Circuit wiring

More information

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering

More information

Graph Mining and Social Network Analysis. Data Mining; EECS 4412 Darren Rolfe + Vince Chu 11.06.14

Graph Mining and Social Network Analysis. Data Mining; EECS 4412 Darren Rolfe + Vince Chu 11.06.14 Graph Mining and Social Network nalysis Data Mining; EES 4412 Darren Rolfe + Vince hu 11.06.14 genda Graph Mining Methods for Mining Frequent Subgraphs priori-based pproach: GM, FSG Pattern-Growth pproach:

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

Euclidean Minimum Spanning Trees Based on Well Separated Pair Decompositions Chaojun Li. Advised by: Dave Mount. May 22, 2014

Euclidean Minimum Spanning Trees Based on Well Separated Pair Decompositions Chaojun Li. Advised by: Dave Mount. May 22, 2014 Euclidean Minimum Spanning Trees Based on Well Separated Pair Decompositions Chaojun Li Advised by: Dave Mount May 22, 2014 1 INTRODUCTION In this report we consider the implementation of an efficient

More information

Chinese postman problem

Chinese postman problem PTR hinese postman problem Learning objectives fter studying this chapter, you should be able to: understand the hinese postman problem apply an algorithm to solve the problem understand the importance

More information

CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.

CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92. Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure

More information

Vehicle Routing and Scheduling. Martin Savelsbergh The Logistics Institute Georgia Institute of Technology

Vehicle Routing and Scheduling. Martin Savelsbergh The Logistics Institute Georgia Institute of Technology Vehicle Routing and Scheduling Martin Savelsbergh The Logistics Institute Georgia Institute of Technology Vehicle Routing and Scheduling Part I: Basic Models and Algorithms Introduction Freight routing

More information

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order

More information

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 13 Overview Graphs and Graph

More information

Load balancing Static Load Balancing

Load balancing Static Load Balancing Chapter 7 Load Balancing and Termination Detection Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection

More information

Static IP Routing and Aggregation Exercises

Static IP Routing and Aggregation Exercises Politecnico di Torino Static IP Routing and Aggregation xercises Fulvio Risso August 0, 0 Contents I. Methodology 4. Static routing and routes aggregation 5.. Main concepts........................................

More information

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis. Contents. Introduction. Maarten van Steen. Version: April 28, 2014

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis. Contents. Introduction. Maarten van Steen. Version: April 28, 2014 Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R.0, [email protected] Chapter 0: Version: April 8, 0 / Contents Chapter Description 0: Introduction

More information

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1 System Interconnect Architectures CSCI 8150 Advanced Computer Architecture Hwang, Chapter 2 Program and Network Properties 2.4 System Interconnect Architectures Direct networks for static connections Indirect

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

28 Networks and Communication Protocols

28 Networks and Communication Protocols 113 28 Networks and ommunication Protocols Trend in computer systems: personal computing. Reasons why: ost: economies of scale. lso, avoids large initial investment in timesharing system. Performance:

More information

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P) Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...

More information

A number of tasks executing serially or in parallel. Distribute tasks on processors so that minimal execution time is achieved. Optimal distribution

A number of tasks executing serially or in parallel. Distribute tasks on processors so that minimal execution time is achieved. Optimal distribution Scheduling MIMD parallel program A number of tasks executing serially or in parallel Lecture : Load Balancing The scheduling problem NP-complete problem (in general) Distribute tasks on processors so that

More information

Complex Networks Analysis: Clustering Methods

Complex Networks Analysis: Clustering Methods Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich [email protected] 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications

More information

Load Balancing and Termination Detection

Load Balancing and Termination Detection Chapter 7 Load Balancing and Termination Detection 1 Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

CIS 700: algorithms for Big Data

CIS 700: algorithms for Big Data CIS 700: algorithms for Big Data Lecture 6: Graph Sketching Slides at http://grigory.us/big-data-class.html Grigory Yaroslavtsev http://grigory.us Sketching Graphs? We know how to sketch vectors: v Mv

More information

Data Caching in Networks with Reading, Writing and Storage Costs

Data Caching in Networks with Reading, Writing and Storage Costs Data Caching in Networks with Reading, 1 Writing and Storage Costs Himanshu Gupta Computer Science Department Stony Brook University Stony Brook, NY 11790 Email: [email protected] Bin Tang Computer

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

Cluster Analysis: Advanced Concepts

Cluster Analysis: Advanced Concepts Cluster Analysis: Advanced Concepts and dalgorithms Dr. Hui Xiong Rutgers University Introduction to Data Mining 08/06/2006 1 Introduction to Data Mining 08/06/2006 1 Outline Prototype-based Fuzzy c-means

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

Distributed Dynamic Load Balancing for Iterative-Stencil Applications

Distributed Dynamic Load Balancing for Iterative-Stencil Applications Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,

More information

Home Page. Data Structures. Title Page. Page 1 of 24. Go Back. Full Screen. Close. Quit

Home Page. Data Structures. Title Page. Page 1 of 24. Go Back. Full Screen. Close. Quit Data Structures Page 1 of 24 A.1. Arrays (Vectors) n-element vector start address + ielementsize 0 +1 +2 +3 +4... +n-1 start address continuous memory block static, if size is known at compile time dynamic,

More information

Architectural Level Power Consumption of Network on Chip. Presenter: YUAN Zheng

Architectural Level Power Consumption of Network on Chip. Presenter: YUAN Zheng Architectural Level Power Consumption of Network Presenter: YUAN Zheng Why Architectural Low Power Design? High-speed and large volume communication among different parts on a chip Problem: Power consumption

More information

Interconnection Network

Interconnection Network Interconnection Network Recap: Generic Parallel Architecture A generic modern multiprocessor Network Mem Communication assist (CA) $ P Node: processor(s), memory system, plus communication assist Network

More information

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, [email protected] Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents

More information

Mathematics for Algorithm and System Analysis

Mathematics for Algorithm and System Analysis Mathematics for Algorithm and System Analysis for students of computer and computational science Edward A. Bender S. Gill Williamson c Edward A. Bender & S. Gill Williamson 2005. All rights reserved. Preface

More information

Routing in wireless networks

Routing in wireless networks Routing in wireless networks. Pham Université de Pau et des Pays de l dour épartement Informatique http://www.univ-pau.fr/~cpham [email protected] Routing in wireless networks What s a wireless network?

More information

CSE 4351/5351 Notes 7: Task Scheduling & Load Balancing

CSE 4351/5351 Notes 7: Task Scheduling & Load Balancing CSE / Notes : Task Scheduling & Load Balancing Task Scheduling A task is a (sequential) activity that uses a set of inputs to produce a set of outputs. A task (precedence) graph is an acyclic, directed

More information

Reductions & NP-completeness as part of Foundations of Computer Science undergraduate course

Reductions & NP-completeness as part of Foundations of Computer Science undergraduate course Reductions & NP-completeness as part of Foundations of Computer Science undergraduate course Alex Angelopoulos, NTUA January 22, 2015 Outline Alex Angelopoulos (NTUA) FoCS: Reductions & NP-completeness-

More information

Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers

Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers Ho Trong Viet, Yves Deville, Olivier Bonaventure, Pierre François ICTEAM, Université catholique de Louvain (UCL), Belgium.

More information

Protein Protein Interaction Networks

Protein Protein Interaction Networks Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics

More information

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES 136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics

More information

Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design

Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design Hongsik Choi and Hyeong-Ah Choi Department of Electrical Engineering and Computer Science George Washington University Washington,

More information

Part 2: Community Detection

Part 2: Community Detection Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -

More information

Hyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network

Hyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network Hyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network 1 Gliederung Einführung Vergleich und Problemstellung Algorithmen Evaluation 2 Aspects Backbone Last mile access stationary commodity equipment

More information

Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!

Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere! Interconnection Networks Interconnection Networks Interconnection networks are used everywhere! Supercomputers connecting the processors Routers connecting the ports can consider a router as a parallel

More information

Distributed Computing over Communication Networks: Maximal Independent Set

Distributed Computing over Communication Networks: Maximal Independent Set Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

Lecture 13: Distance-vector Routing. Lecture 13 Overview. Bellman-Ford Algorithm. d u (z) = min{c(u,v) + d v (z), c(u,w) + d w (z)}

Lecture 13: Distance-vector Routing. Lecture 13 Overview. Bellman-Ford Algorithm. d u (z) = min{c(u,v) + d v (z), c(u,w) + d w (z)} Lecture : istance-vector Routing S : omputer Networks hris Kanich Quiz TOMORROW Lecture Overview istance vector ssume each router knows its own address and cost to reach each of its directly connected

More information

DATA ANALYSIS II. Matrix Algorithms

DATA ANALYSIS II. Matrix Algorithms DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where

More information

Social Media Mining. Network Measures

Social Media Mining. Network Measures Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users

More information

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints

More information

Internet Routing. Review of Networking Principles

Internet Routing. Review of Networking Principles Internet Routing Review of Networking Principles 1 Principles of the Internet Edge vs. core (end-systems vs. routers) Dumb Intelligence at the end-systems Different communication paradigms Connection oriented

More information

Probe Station Placement for Robust Monitoring of Networks

Probe Station Placement for Robust Monitoring of Networks Probe Station Placement for Robust Monitoring of Networks Maitreya Natu Dept. of Computer and Information Science University of Delaware Newark, DE, USA, 97 Email: [email protected] Adarshpal S. Sethi

More information

Chapter 15: Distributed Structures. Topology

Chapter 15: Distributed Structures. Topology 1 1 Chapter 15: Distributed Structures Topology Network Types Operating System Concepts 15.1 Topology Sites in the system can be physically connected in a variety of ways; they are compared with respect

More information

Practical Graph Mining with R. 5. Link Analysis

Practical Graph Mining with R. 5. Link Analysis Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities

More information

Load Balanced Link Reversal Routing in Wireless Ad Hoc Networks

Load Balanced Link Reversal Routing in Wireless Ad Hoc Networks oad alanced ink Reversal Routing in Wireless d oc Networks Nabhendra isnik, lhussein bouzeid, ostas usch Rensselaer Polytechnic nstitute Troy, New York [email protected], [email protected], [email protected]

More information

Graph Theory Algorithms for Mobile Ad Hoc Networks

Graph Theory Algorithms for Mobile Ad Hoc Networks Informatica 36 (2012) 185-200 185 Graph Theory Algorithms for Mobile Ad Hoc Networks Natarajan Meghanathan Department of Computer Science, Jackson State University Jackson, MS 39217, USA E-mail: [email protected]

More information

A Study of Sufficient Conditions for Hamiltonian Cycles

A Study of Sufficient Conditions for Hamiltonian Cycles DeLeon 1 A Study of Sufficient Conditions for Hamiltonian Cycles Melissa DeLeon Department of Mathematics and Computer Science Seton Hall University South Orange, New Jersey 07079, U.S.A. ABSTRACT A graph

More information

NP-Completeness. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University

NP-Completeness. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University NP-Completeness CptS 223 Advanced Data Structures Larry Holder School of Electrical Engineering and Computer Science Washington State University 1 Hard Graph Problems Hard means no known solutions with

More information

InfiniBand Clustering

InfiniBand Clustering White Paper InfiniBand Clustering Delivering Better Price/Performance than Ethernet 1.0 Introduction High performance computing clusters typically utilize Clos networks, more commonly known as Fat Tree

More information

Ethernet (LAN switching)

Ethernet (LAN switching) Ethernet ( switching) 1 Outline Interconnection devices Bridges/ switches vs. Routers Bridges Learning Bridges Transparent bridges 2 1 Bridges/ switches Interconnect multiple, possibly with different type

More information

Lecture 18: Interconnection Networks. CMU 15-418: Parallel Computer Architecture and Programming (Spring 2012)

Lecture 18: Interconnection Networks. CMU 15-418: Parallel Computer Architecture and Programming (Spring 2012) Lecture 18: Interconnection Networks CMU 15-418: Parallel Computer Architecture and Programming (Spring 2012) Announcements Project deadlines: - Mon, April 2: project proposal: 1-2 page writeup - Fri,

More information

Interconnection Networks Programmierung Paralleler und Verteilter Systeme (PPV)

Interconnection Networks Programmierung Paralleler und Verteilter Systeme (PPV) Interconnection Networks Programmierung Paralleler und Verteilter Systeme (PPV) Sommer 2015 Frank Feinbube, M.Sc., Felix Eberhardt, M.Sc., Prof. Dr. Andreas Polze Interconnection Networks 2 SIMD systems

More information

Distance Degree Sequences for Network Analysis

Distance Degree Sequences for Network Analysis Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation

More information

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8] Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)

More information

Computer Science Department. Technion - IIT, Haifa, Israel. Itai and Rodeh [IR] have proved that for any 2-connected graph G and any vertex s G there

Computer Science Department. Technion - IIT, Haifa, Israel. Itai and Rodeh [IR] have proved that for any 2-connected graph G and any vertex s G there - 1 - THREE TREE-PATHS Avram Zehavi Alon Itai Computer Science Department Technion - IIT, Haifa, Israel Abstract Itai and Rodeh [IR] have proved that for any 2-connected graph G and any vertex s G there

More information

Load Balancing and Termination Detection

Load Balancing and Termination Detection Chapter 7 slides7-1 Load Balancing and Termination Detection slides7-2 Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination

More information

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling. Tim Nieberg Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

More information

Interconnection Network Design

Interconnection Network Design Interconnection Network Design Vida Vukašinović 1 Introduction Parallel computer networks are interesting topic, but they are also difficult to understand in an overall sense. The topological structure

More information

Why the Network Matters

Why the Network Matters Week 2, Lecture 2 Copyright 2009 by W. Feng. Based on material from Matthew Sottile. So Far Overview of Multicore Systems Why Memory Matters Memory Architectures Emerging Chip Multiprocessors (CMP) Increasing

More information

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007) School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

More information

Stationary random graphs on Z with prescribed iid degrees and finite mean connections

Stationary random graphs on Z with prescribed iid degrees and finite mean connections Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative

More information

Course on Social Network Analysis Graphs and Networks

Course on Social Network Analysis Graphs and Networks Course on Social Network Analysis Graphs and Networks Vladimir Batagelj University of Ljubljana Slovenia V. Batagelj: Social Network Analysis / Graphs and Networks 1 Outline 1 Graph...............................

More information

MATHEMATICAL THOUGHT AND PRACTICE. Chapter 7: The Mathematics of Networks The Cost of Being Connected

MATHEMATICAL THOUGHT AND PRACTICE. Chapter 7: The Mathematics of Networks The Cost of Being Connected MATHEMATICAL THOUGHT AND PRACTICE Chapter 7: The Mathematics of Networks The Cost of Being Connected Network A network is a graph that is connected. In this context the term is most commonly used when

More information

Medial Axis Construction and Applications in 3D Wireless Sensor Networks

Medial Axis Construction and Applications in 3D Wireless Sensor Networks Medial Axis Construction and Applications in 3D Wireless Sensor Networks Su Xia, Ning Ding, Miao Jin, Hongyi Wu, and Yang Yang Presenter: Hongyi Wu University of Louisiana at Lafayette Outline Introduction

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) SFWR 4C03: Computer Networks & Computer Security Jan 31-Feb 4, 2005 Lecturer: Kartik Krishnan Lecture 13-16 Internet Control Message Protocol (ICMP) The operation of the Internet is closely monitored by

More information

Metabolic Network Analysis

Metabolic Network Analysis Metabolic Network nalysis Overview -- modelling chemical reaction networks -- Levels of modelling Lecture II: Modelling chemical reaction networks dr. Sander Hille [email protected] http://www.math.leidenuniv.nl/~shille

More information

Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks*

Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks* Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks* Abhishek Kashyap, Anuj Rawat and Mark Shayman Department of Electrical and Computer Engineering, University

More information