Integrating local and partial network view for routing on scale-free networks

Size: px
Start display at page:

Download "Integrating local and partial network view for routing on scale-free networks"

Transcription

1 . RESEARCH PAPER. SCIENCE CHINA Information Sciences October 2013, Vol : :10 doi: /s y Integrating local and partial network view for routing on scale-free networks TANG MingDong 1, ZHANG GuoQiang 2,3, SUN Yi 3,LIUJianXun 1, YANG Jing 4 &LINTao 5 1 Key Lab of Knowledge Processing and Networked Manufacturing, Hunan University of Science and Technology, Xiangtan, , China; 2 School of Computer Science and Technology, Nanjing Normal University, Nanjing , China; 3 Institute of Computing Technology, Chinese Academy of Sciences, Beijing , China; 4 China Mobile Research Institute, Beijing , China; 5 Institute of Acoustics, Chinese Academy of Sciences, Beijing , China Received April 13, 2012; accepted July 20, 2012; published online August 30, 2012 Abstract Traditional routing schemes, such as OSPF, optimize data plane routing efficiency by maintaining full view of the network at the control plane. However, maintaining full network view and handling frequent routing information updates are costly in large-scale complex networks, which are considered to be the root causes for the routing scalability issue. Recently, it is suggested that routing on local or partial information is plausible if slight performance degradation is acceptable. This paper proposes a routing scheme, operating on an integrated network view at each node that consists of its local neighborhood and a globally unique skeleton tree. This scheme significantly reduces storage, communication and processing costs. On scale-free networks, this benefit only comes at the cost of marginal performance degradation, which implies that it is not worthwhile to do shortest path routing based on full view of the network on scale-free networks. In contrast, the routing efficiency is severely aggravated on purely random networks, indicating the inappropriateness of this scheme and the rationality of maintaining full network view on random networks. Keywords routing, scale-free networks, complex networks, power-law Citation Tang M D, Zhang G Q, Sun Y, et al. Integrating local and partial network view for routing on scale-free networks. Sci China Inf Sci, 2013, 56: (10), doi: /s y 1 Introduction Routing is a fundamental functionality of communication networks. Usually, a routing scheme can be decomposed into two logically independent components: the control plane that exchanges network information and builds a distributed routing table at each node, and the data plane that relies on the routing table to correctly forward data packets towards their destinations. How to build the routing tables thus lies at the heart of a routing scheme. An extreme but commonly adopted approach is for every node to maintain a full view of the network through information flooding, and construct shortest paths to every other node according to this view, such as OSPF [1]. However, Corresponding author ( guoqiang@ict.ac.cn) c Science China Press and Springer-Verlag Berlin Heidelberg 2012 info.scichina.com

2 Tang M D, et al. Sci China Inf Sci October 2013 Vol :2 considering the scale of real networks, maintaining full view of the network up-to-the-minute places heavy burden on either the storage or the processing capabilities needed to handle network dynamics. It is already known that large volume as well as rapid growth rate of routing information updates is problematic to the scalability of the Internet [2,3]. Another extremity is to do routing only on local information. Examples of this kind of routing include greedy routing on navigatable small-world networks [4,5], greedy routing on pre-constructed spanning trees [6,7], random routing [8 10], and the largest degree based routing [11]. However, these routing schemes either have to program the network topology and node names according to the routing schemes in prior, or cannot guarantee the relative shortness of paths on real networks. Another category of routing schemes performs routing on partial network view [12 14]. The primary goal is to alleviate the impact of network dynamics, i.e., reducing routing information updates and cutting down the frequency of route re-computation, and meanwhile to ensure routing efficiency, i.e., relative shortness or bounded path lengths. These routing schemes can be viewed as variations of the link state routing. But unlike traditional link state routing that requires a complete network topology to be maintained at each node, these routing schemes only maintain a subgraph of the entire network topology, and compute routes based on this subgraph. Real complex networks typically show special structural properties. Most real networks, e.g., Internet and WWW, can be categorized into the so-called scale-free networks [15 18], i.e., the degree distribution p(k) follows p(k) k r. As previous work has demonstrated, although the accuracy of routing schemes should not depend on the network topology, the efficiency of these schemes is strongly tied to particular network topologies [19 22]. A natural question is: for networks with given structural properties, is it worthwhile to maintain full network view in the routing process? In other words, does the gain arising from this resource-consuming activity outweigh its cost? In this paper, we show that routing on partial network view can also utilize the structural properties of network topology to optimize its routing performance. We propose a routing scheme specialized for scale-free networks. Each node relies on a subgraph which is a union of a uniform network skeleton and its distinct neighborhood to do routing. Simulation results show that, compared with routing on full network view, the degradation of routing efficiency of this routing scheme is marginal on scale-free networks, whereas it allows significant reduction in storage, communication and computation overhead. So, maintaining full network view is not economic for scale-free networks. On the other hand, non-trivial routing efficiency degradation is observed when the scheme is applied to random networks, demonstrating that appropriateness of this scheme is topology-dependent. 2 Routing scheme Our routing scheme is built upon the concept of skeleton of complex networks proposed by Kim et al. [23]. In complex networks, the roles different nodes and edges play in forwarding network traffic may vary vastly. A simple metric that predicts the network traffic a node or edge has to handle is the betweenness δ centrality [24 26], which is defined as B(w) =Σ (w) (u,v) u v δ(u,v),whereδ(u, v) denotes the total number of shortest paths between u and v, andδ (w) (u, v) denotes the number of those shortest paths that pass through w. On scale-free networks, the betweenness centralities of either the nodes or the edges are very heterogenous. Some nodes and edges have very high centralities, meaning they are responsible for handling more traffic. It is suggested to use the spanning tree consisting of edges with large betweenness centralities as the network s skeleton [23,27], which can be viewed as the communication kernel of the corresponding network 1). It is shown that for scale-free networks, the proposed skeleton shows very similar degree distribution and joint degree distribution to the original network. However, routing solely on the skeleton tree can substantially increase lengths of some paths. To combat this problem, we also incorporate the local topological information in the routing process. Following is a 1) The skeleton tree is constructed in the following way. Initially, set the skeleton to be an empty set. Then add the edges one by one in decreasing order of betweenness values to the skeleton without causing a loop until a tree is formed

3 Tang M D, et al. Sci China Inf Sci October 2013 Vol :3 Figure 1 An illustrative example for Observation 1. detailed description of our proposed routing scheme: Routing table: each node maintains a partial view of the network, which is a union of its direct links (different from node to node) and a globally unique skeleton tree (identical to all nodes). Each node bases on this partial view to build its own shortest path routing tree to other nodes. Packet forwarding: when a packet arrives at node u, if the destination v N(u)(N(u) denotes u s direct neighbors), then the packet will be forwarded directly to v, otherwise, it will be forwarded to the next hop along the shortest path determined by its partial view. Network dynamics handling: when a link not on the skeleton tree fails, this event does not need to be propagated across the network. Only the two adjacent nodes need to adjust their routing paths to the other endpoints based on their partial views, while all other nodes remain unaffected. when a link on the skeleton tree fails, the two adjacent nodes first check whether their partial views remain connected. If at least one of the partial views remains connected, then the corresponding node chooses a candidate link that is able to connect the two disconnected components of the original skeleton tree and broadcasts this information to the whole network. Otherwise, the link failure event is flooded across the network. Upon receiving this event, each node other than the two adjacent nodes which is still able to reach all other nodes based on its partial view chooses a link that can bridge the two disjunct components of the original skeleton tree (Observation 1 guarantees that such node should exist if the whole network does not fall apart), and broadcasts the information of this candidate link to the whole network 2). Finally, each node executes a deterministic procedure in a distributed manner to agree on a link among these candidate links to be added to the skeleton tree. Such distributed yet deterministic election procedures are well equipped in the literature of distributed algorithms [29], e.g., choosing the link with the smallest node IDes. Observation 1. If a link failure on the skeleton tree does not cause a bipartition of the network as a whole, then after removing this link on each node s partial view, there is at least one node whose partial view remains connected. Proof. Suppose a link on the skeleton tree fails, then the skeleton tree falls apart into two disconnected subtrees, T l and T r (see Figure 1). Considering the left subtree T l, for any node v i V (T l ), if one of its direct neighbors is located in the right subtree T r, e.g., u j,thene(t l ) e(v i,u j ) E(T r )formsa new spanning tree. So, v i s partial view remains connected. Otherwise, for each node in V (T l ), its direct neighbors are all in V (T l ). Hence, T l is disconnected from T r, contradicting the assumption that the whole network is connected. Figure 2 gives an example to illustrate our routing scheme. Figure 2(a) and Figure 2(b) are the original 2) Mechanisms such as the exponential backoff algorithm can be used to suppress the amount of this information [28]

4 Tang M D, et al. Sci China Inf Sci October 2013 Vol :4 Figure 2 An example of the routing scheme. network and its skeleton tree respectively. Figure 2(c) (e) are the routing trees for node A, B, C respectively 3) We observe that each node bases on the skeleton tree and its neighborhood to build its distinct routing tree. We use dashed lines to denote those skeleton links that are maintained by each node but do not occur in its routing tree. If node A detects the failure of link A B, a link not on the skeleton tree, then A only has to find a new path to B based on the skeleton tree, so does B. This failure can be confined locally, and does not need to be propagated outside A, B. If, on the other hand, a skeleton tree link C E fails, then since neither C nor E s partial view remains connected, this failure event will be propagated across the whole network. After receiving this update message, A, G find their partial views disconnected; however, B, D, H and F can still reach all nodes. B decides that the link B-F can be added to the skeleton tree to form a new skeleton. This message can be broadcast across the network. Finally, a new skeleton is agreed on all nodes, as is shown in Figure 2(f). 3 Performance evaluation We tested the routing performance of our proposed routing scheme on various synthesized complex networks generated by different network models, i.e., ER model [30,31], BA model [18], and PFP model [32], and on real AS-level Internet topology. The major topological properties of the synthesized networks with 1000 nodes are shown in Table 1. Figure 3 plots the max degree, average shortest path length (ASPL) and diameter for the three kinds of synthesized networks with different sizes. The AS-level Internet topology is the ITDK0304 data kit containing 9204 nodes and edges, whose power-law exponent γ Since every routing scheme is a tradeoff between the routing efficiency and the overhead for communication, computation and storage, we present detailed analysis on this tradeoff. 3.1 Routing efficiency One major concern of routing efficiency is the cost, or simply path length of the paths taken by a given routing scheme. Stretch is usually used to evaluate the quality of paths for a given routing scheme. For a given node pair u, v, the stretch is defined as the ratio of the path length under the given routing scheme Γ to the shortest path length between them. Here we use average stretch to evaluate the routing efficiency of a given routing scheme, which is formally defined as s = 2Σ i<j d (Γ ) (i,j) d(i,j), (1) N(N 1) 3) Note that from the point of view of network structural equivalence, there are three equivalent node classes: {A, G},{C, E}, {B, D, H, F}, anda, B, C fall into different classes

5 Tang M D, et al. Sci China Inf Sci October 2013 Vol :5 Table 1 Major topological properties of the synthesized networks used in the simulation. Here, N is the number of nodes, k max is the largest degree, k is the average degree, D is the diameter, d is the average path length, C is the average clustering coefficient, and γ is the power law exponent of the BA and PFP network Network N k max k D d γ C ER BA PFP Figure 3 k max, d, andd of three kinds of synthesized networks with different sizes. (a) k max; (b) d ; (c)d. where d(i, j) is the shortest path length between i and j, andd (Γ ) (i, j) is the path length between i and j under routing algorithm Γ. Figure 4 plots the average stretch as as a function of network size on different synthesized networks for two routing schemes: one is our proposed routing scheme routing by skeleton with local links 4),and the other is routing on the skeleton tree only. Two observations can be made. First, the average stretch is relatively low on power-law networks and is stable as the network grows, whereas it is much higher on random networks, regardless of the routing scheme being used. Second, on a particular network, augmenting the routing decision with local links can significantly reduce the average stretch. On real AS graph(itdk0304), the average stretch of the Skeleton only routing scheme is 1.23, whereas if local links are incorporated, the average stretch can be reduced to Figure 5 presents the cumulative distribution of the stretch on networks listed in Table 1 (Figure 5(a)) and on real AS graph ITDK0304 (Figure 5(b)) for our proposed routing scheme. It is observed that relying on the integrated view for routing, 51% of the paths on the BA network are shortest paths, and on the PPF network, this ratio goes up to 85%. Since the PFP network is more heterogenous than the BA network, as evidenced by k max and γ, this observation also implies that this routing scheme imposes 4) Here local links refer to those direct neighboring links that are not in the skeleton

6 Tang M D, et al. Sci China Inf Sci October 2013 Vol :6 Figure 4 Average stretch of two routing schemes on different synthesized networks. Each plot line is identified by a two tuple. The first element denotes the network kind, and the second element denotes the routing scheme being used. Skeleton with local links is our proposed routing scheme, and Skeleton only is routing on the skeleton tree only. Figure 5 Stretch distribution of our routing scheme on different networks. (a) synthesized networks; (b) AS graph (ITDK0304). less impact on the quality of paths for more heterogenous networks. In sharp contrast, only less than 20% of the paths on the ER network are shortest paths, while more than 30% of the paths are two times longer than the shortest path length. For real AS Internet topology, the result is quite similar to PFP, which conforms to the reality that the PFP model accurately models the AS-level Internet topology [32]. These results show that routing on the skeleton tree augmented by local links only has slight impact on the quality of paths for scale-free networks. In contrast, the performance degrades significantly for the ER network. This reconfirms the philosophy that routing efficiency strongly depends on network topologies. Figure 6 presents the average stretch as a function of the average degree for the BA network and ER network. The networks used here are of equal number of nodes (1000 nodes), but with varying average degrees (see Figure 7 for the basic properties of these networks). For a given size, 5 instances are generated, and the results presented here are an average over 5 instances. Since networks generated by the PFP model always have fixed average degree, we omit the PFP model in this figure. It can be seen that the average stretch of this routing strategy is largely unaffected by the network density as long as it gets moderately dense enough. This property makes our proposed routing scheme more promising and attractive, because the denser the network is, the more link update information can be potentially suppressed and the fewer route re-computations needed, and consequently more gain can be expected out of applying this routing scheme. Another concern of routing efficiency is the load distribution. Acceptable routing schemes should not easily cause congestion on the network. We generate a sufficiently large number ( in our exper-

7 Tang M D, et al. Sci China Inf Sci October 2013 Vol :7 Figure 6 Average stretch of our proposed scheme on BA and ER networks with increasing density. Figure 7 k max, d and D for ER and BA networks of 1000 nodes with varying densities. (a) k max; (b) d ; (c)d. iment) of packets with random sources and destinations, and define the load imposed on a node as the number of packets passing through a node following the particular routing scheme. Figure 8 shows the load distribution of three routing schemes on the networks listed in Table 1 and on the real AS graph ITDK0304. These three routing schemes are: routing on the full network view (Full), routing on the skeleton tree only (Skeleton only), and routing on skeleton tree augmented by local links (Skeleton with local links). It is observed that on power-law networks, these three schemes show similar load distribution features. This is because on scale-free networks, even with full network view, shortest path routing itself enforces most of the traffic to go through the network skeleton, whereas on the ER network, the shortest path routing significantly outperforms the other two schemes in the sense that routing on full network view can make the traffic more balanced by routing on more links. 3.2 Overhead The overhead of a routing scheme typically involves the space needed to store the raw routing information as well as the routing table, the communication cost to exchange routing information between routers and the computation overhead to handle the dynamically received routing information. Traditional shortest path routing such as OSPF requires maintenance of the entire network topology, which has O(M) space requirement, where M is the number of links. In our routing scheme, each node v maintains at most N 1+d v 1=N + d v 2 connections, where N is the number of nodes and d v is the degree of v. Consequently, the overall space requirement of all nodes is at most Σ v V (N + d v 2) = N 2 +2M 2N, which means the average storage overhead on each node is N 2+ k, significantly smaller than maintaining the full network topology, where k is the average degree. The communication overhead and its ensuing route re-computation is believed to be one of the route causes that prohibit the scaling of a routing system. Communication overhead is mainly caused by network dynamics. Here we only consider link failures. In traditional OSPF-like routing, each time a link

8 Tang M D, et al. Sci China Inf Sci October 2013 Vol :8 Figure 8 Load distribution of three routing schemes on three different synthesized networks as well as on the real AS graph ITDK0304. (a) ER; (b) BA; (c) PFP; (d) AS graph (ITDK0304). fails, its two endpoints flood this event across the whole network so that all nodes are notified of this event and perform routing table re-computation. So, the number of messages generated per link failure is approximately 2M. In our scheme, since failures of non-skeleton links do not trigger message flooding, it is expected that the number of messages generated will be significantly reduced. Indeed, when a link on the skeleton tree fails, if the two adjacent nodes can find a link that can bridge the two disconnected components of the original skeleton tree, then the number of messages is M or 2M, depending on whether only one endpoint or both endpoints satisfy the above condition. Otherwise, if none of the two adjacent nodes partial view remains connected, then the number of messages is about (λ +2)M according to our routing scheme, where λ is the number of nodes whose partial view remain connected after the link failure 5). Figure 9 presents the simulation results of the average number of messages generated per link failure for our routing scheme and traditional OSPF-like shortest path routing scheme on both the BA and ER networks with varying densities (networks used here are the same as in Figure 6, with their basic properties presented in Figure 7). Each time, we randomly select a link, break it down, and compute the number of messages generated. For each network, we repeat the previous process for 1000 times. For a given size, we generate 5 network instances and the results presented here are the average over 5 instances. In addition, we performed the simulation on PFP networks of 1000 nodes. We generated 5 instances of the PFP network, and performed the same simulation as described above. Since PFP model has fixed degree, we don t have the plots for PFP networks with degrees other than 6. It is shown that in BA and ER networks, with traditional routing scheme, the number of messages generated per link failure grows linearly with the network density, approximately 2M = N k. On the contrary, the resulting number of messages per link failure of our routing scheme on BA network stays nearly constant as the network density increases. Under the random link failure model, the probability that a failed link is on the 5) According to our routing scheme, when none of the two adjacent nodes partial view remains connected, the link failure is first flooded across the network by the two endpoints, then the λ nodes whose partial view remain connected after the link failure will choose a candidate link and broadcast this information across the network. Hence the total number of messages is about (2 + λ)m

9 Tang M D, et al. Sci China Inf Sci October 2013 Vol :9 Figure 9 Average number of messages generated per link failure. skeleton tree is about 2/ k. On BA networks, the probability that the partial views of the two adjacent endpoints of the failed link remain connected is almost 100%, hence the average message overhead per link failure is approximately 2 k 2M =2N. However, it should be noted that when network is not dense enough, our routing scheme on ER network may generate higher volume of messages than traditional routing scheme. This is because on ER networks of low density, the probability that none of the two endpoints of the failed link finds its partial view connected cannot be neglected, e.g., 2.4% when k =4. However, k, the number of other nodes whose partial views remain connected, is very large, e.g., when k = 4. Anyway, on scale-free networks, our scheme generates much smaller number of messages per link failure than the traditional scheme, as evidenced by both the BA network and PFP network. The route re-computation overhead is simple to analyze. For traditional OSPF-like routing, in principle, each link failure event triggers route re-computation on all nodes. In comparison, for our routing scheme, only when links on the skeleton tree fails, should each node perform route re-computation. 4 Discussion and conclusion Scaling the routing system is of paramount importance for the large, complex and dynamic networks. We proposed a routing scheme that relies on both the local topology information and a globally unique skeleton tree to build the routing tables. It can substantially reduce the storage overhead and the impact of network dynamics on the routing system without sacrificing routing performance on scale-free networks. However, for purely random network, this scheme significantly degrades the routing performance, either in the sense of average stretch or the traffic balance. Hence, we argue that for scale-free networks, it is not economic to maintain full view of the network upto-the-minute while performing shortest path routing. To take the full advantage offered by full network view on scale-free networks, it is more appropriate to relax the shortest path routing to achieve good balance between other routing objectives, e.g., path quality and load balance. For example, the EFR [20] and HAP [22] routing schemes try to balance network traffic among network nodes/links on scale-free networks without significantly increasing path lengths. These routing schemes are grounded on the full network view assumption, and hence can be viewed as optimizing the routing from another angle. In contrast, unlike scale-free networks, it is rational to bear the cost of maintaining the full network view in random networks even under the shortest path routing paradigm. It should be noted that our approach focuses on constructing per-node partial topology view upon which routing is performed, whereas there are other routing schemes that focus on filtering routing updates, for example, the XL routing scheme [3]. In essence, these two schemes are orthogonal (the former focuses on the topology being used, whereas the latter emphasizes on developing filtering policies) and thus complementary to each other. Policies developed in the XL scheme can be applied to the partial

10 Tang M D, et al. Sci China Inf Sci October 2013 Vol :10 network view to further reduce the volume of routing update information. The problem as to what is the effect of integrating these two kinds of schemes remains to be investigated in our future work. Acknowledgements This work was partly supported by National Basic Research Program of China (Grant No. 2012CB315802), National Natural Science Foundation of China (Grant Nos , , , ), and Startup Foundation of Nanjing Normal University (Grant No XGQ0248). References 1 Moy J. OSPF Version 2. IETF RFC Krioukov D, Fall K, Claffy K. Scalability of routing: compactness and dynamics. slides/rrg-3.pdf Levchenko K, Voelker G M, Paturi R, et al. XL: an efficient network routing algorithm. In: Proceedings of ACM SIGCOMM New York: ACM Press, Kleinberg J. Navigation in a small world. Nature, 2000, 406: Fraignaiaud, Giakkoupis G. On the searchability of small-world networks with arbitrary underlying structure. In: Proceedings of the 42th ACM Symposium on Theory of Computing(STOC 10). New York: ACM Press, Dragan F F, Matamala M. Navigating in a graph by aid of its spanning tree. LNCS, 2008, 5369: Kleinberg R. Geographic routing using hyperbolic space. In: Proceedings of IEEE INFOCOM Washington D.C.: IEEE Computer Society Press, Yin C Y, Wang B H, Wang W X, et al. Efficient routing on scale-free networks based on local information. Phys Lett A, 2006, 351: Wang W X, Wang B H, Yin C Y, et al. Traffic dynamics based on local routing protocol on a scale-free network. Phys Rev E, 2006, 73: Yang S J. Exploring complex networks by walking on them. Phys Rev E, 2005, 71: Adamic L, Lukose R M, Puniyani A R, et al. Search in power-law networks. Phys Rev E, 2001, 64: Clausen T, Jacquet P. Optimized link state routing protocol(olsr). IETF RFC Jacquet P, Viennot L. Remote-spanners: what to know beyond neighbors. In: Proceedings of IEEE International Symposium on Parallel&Distributed Processing Washington D. C.: IEEE Computer Society Press, Jacquet P, Minet P, Muhlethaler P, et al. Data transfer in HIPERLAN. Wireless Pers Commun, 1997, 4: Newman M E J. The structure and function of complex networks. SIAM Rev, 2003, 45: Faloutsos M, Faloutsos P, Faloutsos C. On power-law relationships of the Internet topology. In: Proceedings of ACM SIGCOMM New York: ACM Press, Zhang G Q, Quoitin B, Zhou S. Phase changes in the evolution of the IPv4 and IPv6 AS-level Internet topologies. Comput Commun, 2011, 34: Barabási A L, Albert R. Emergence of scaling in random networks. Science, 1999, 286: Zhang G Q. On cost-effective communication network designing. Europhys Lett, 2010, 89: Yan G, Zhou T, Hu B, et al. Efficient routing on complex networks. Phys Rev E, 2006, 73: Zhang G Q, Wang D, Li G J. Enhancing the transmission efficiency by edge deletion in scale-free networks. Phys Rev E, 2007, 76: Sreenivasan S, Cohen R, López E, et al. Structural bottlenecks for communication in networks. Phys Rev E, 2007, 75: Kim D H, Noh J D, Jeong H. Scale-free trees: the skeletons of complex networks. Phys Rev E, 2004, 70: Freeman L C. Centrality in social networks: conceptual clarification. Soc Netw, 1979, 1: Borgatti S P. Centrality and network flow. Soc Netw, 2005, 27: Goh K I, Kahng B, Kim D. Universal behavior of load distribution in scale-free networks. Phys Rev Lett, 2001, 87: Goh K I, Salvi G, Kahng B, et al. Skeleton and fractal scaling in complex networks. Phys Rev Lett, 2006, 96: Metcalfe R M, Boggs D R. Ethernet: distributed packet switching for local computer networks. Commun ACM, 1976, 19: Lynch N A. Distributed Algorithms. San Mateo: Morgan Kaufmann Publishers, Bollobas B. Random Grpahs. Cambridge: Cambridge University Press, Erdös P, Rényi A. On random graphs. Publ Math Debrecen, 1959, 6: Zhou S, Mondragón R. Accurately modeling the Internet topology. Phys Rev E, 2004, 70:

An Evolving Network Model With Local-World Structure

An Evolving Network Model With Local-World Structure The Eighth International Symposium on Operations Research and Its Applications (ISORA 09) Zhangjiajie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 47 423 An Evolving Network odel With

More information

Global dynamic routing for scale-free networks

Global dynamic routing for scale-free networks Global dynamic routing for scale-free networks Xiang Ling, Mao-Bin Hu,* Rui Jiang, and Qing-Song Wu School of Engineering Science, University of Science and Technology of China, Hefei 230026, People s

More information

Response Network Emerging from Simple Perturbation

Response Network Emerging from Simple Perturbation Journal of the Korean Physical Society, Vol 44, No 3, March 2004, pp 628 632 Response Network Emerging from Simple Perturbation S-W Son, D-H Kim, Y-Y Ahn and H Jeong Department of Physics, Korea Advanced

More information

Algorithms for Minimum m-connected k-dominating Set Problem

Algorithms for Minimum m-connected k-dominating Set Problem Algorithms for Minimum m-connected k-dominating Set Problem Weiping Shang 1,2, Frances Yao 2,PengjunWan 3, and Xiaodong Hu 1 1 Institute of Applied Mathematics, Chinese Academy of Sciences, Beijing, China

More information

Small World Properties Generated by a New Algorithm Under Same Degree of All Nodes

Small World Properties Generated by a New Algorithm Under Same Degree of All Nodes Commun. Theor. Phys. (Beijing, China) 45 (2006) pp. 950 954 c International Academic Publishers Vol. 45, No. 5, May 15, 2006 Small World Properties Generated by a New Algorithm Under Same Degree of All

More information

On minimum m-connected k-dominating set problem in unit disc graphs

On minimum m-connected k-dominating set problem in unit disc graphs J Comb Optim (2008) 16: 99 106 DOI 10.1007/s10878-007-9124-y On minimum m-connected k-dominating set problem in unit disc graphs Weiping Shang Frances Yao Pengjun Wan Xiaodong Hu Published online: 5 December

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Attack Vulnerability of Network with Duplication-Divergence Mechanism

Attack Vulnerability of Network with Duplication-Divergence Mechanism Commun. Theor. Phys. (Beijing, China) 48 (2007) pp. 754 758 c International Academic Publishers Vol. 48, No. 4, October 5, 2007 Attack Vulnerability of Network with Duplication-Divergence Mechanism WANG

More information

Algorithms for minimum m-connected k-tuple dominating set problem

Algorithms for minimum m-connected k-tuple dominating set problem Theoretical Computer Science 381 (2007) 241 247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem Weiping Shang a,c,, Pengjun Wan b, Frances Yao c, Xiaodong

More information

The missing links in the BGP-based AS connectivity maps

The missing links in the BGP-based AS connectivity maps The missing links in the BGP-based AS connectivity maps Zhou, S; Mondragon, RJ http://arxiv.org/abs/cs/0303028 For additional information about this publication click this link. http://qmro.qmul.ac.uk/xmlui/handle/123456789/13070

More information

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs . RESEARCH PAPER. SCIENCE CHINA Information Sciences February 2012 Vol. 55 No. 2: 433 440 doi: 10.1007/s11432-011-4345-1 Spray and forward: Efficient routing based on the Markov location prediction model

More information

Integrating local static and dynamic information for routing traffic

Integrating local static and dynamic information for routing traffic Integrating local static and dynamic information for routing traffic Wen-Xu Wang, 1 Chuan-Yang Yin, 1 Gang Yan, 2 and Bing-Hong Wang 1, * 1 Nonlinear Science Center and Department of Modern Physics, University

More information

Ad hoc and Sensor Networks Chapter 10: Topology control

Ad hoc and Sensor Networks Chapter 10: Topology control Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks 2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

More information

CS 204 Lecture Notes on Elementary Network Analysis

CS 204 Lecture Notes on Elementary Network Analysis CS 204 Lecture Notes on Elementary Network Analysis Mart Molle Department of Computer Science and Engineering University of California, Riverside CA 92521 mart@cs.ucr.edu October 18, 2006 1 First-Order

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks ECS 253 / MAE 253, Lecture 8 April 21, 2016 Web search and decentralized search on small-world networks Search for information Assume some resource of interest is stored at the vertices of a network: Web

More information

Pheromone Static Routing Strategy for Complex Networks. Abstract

Pheromone Static Routing Strategy for Complex Networks. Abstract Pheromone Static Routing Strategy for Complex Networks Xiang Ling 1, Henry Y.K. Lau 2, Rui Jiang 1, and Mao-Bin Hu 1 1.School of Engineering Science, University of Science and Technology of China, arxiv:1108.6119v1

More information

CSCI5070 Advanced Topics in Social Computing

CSCI5070 Advanced Topics in Social Computing CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Graphs Origins Definition Spectral Properties Type of

More information

Internet Engineering Task Force (IETF) Updates: 5614 October 2013 Category: Experimental ISSN:

Internet Engineering Task Force (IETF) Updates: 5614 October 2013 Category: Experimental ISSN: Internet Engineering Task Force (IETF) R. Ogier Request for Comments: 7038 SRI International Updates: 5614 October 2013 Category: Experimental ISSN: 2070-1721 Abstract Use of OSPF-MDR in Single-Hop Broadcast

More information

Geographical routing 1

Geographical routing 1 Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

Flat Routing on Curved Spaces

Flat Routing on Curved Spaces Flat Routing on Curved Spaces Dmitri Krioukov (CAIDA/UCSD) dima@caida.org Berkeley April 19 th, 2006 Clean slate: reassess fundamental assumptions Information transmission between nodes in networks that

More information

Complex networks: A mixture of power-law and Weibull distributions

Complex networks: A mixture of power-law and Weibull distributions Complex networks: A mixture of power-law and Weibull distributions Ke Xu, Liandong Liu, Xiao Liang State Key Laboratory of Software Development Environment Beihang University, Beijing 100191, China Abstract:

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

SLALoM: A Scalable Location Management Scheme for Large Mobile Ad-hoc Networks

SLALoM: A Scalable Location Management Scheme for Large Mobile Ad-hoc Networks SLALoM A Scalable Location Management Scheme for Large Mobile Ad-hoc Networks Christine T. Cheng *, Howard L. Lemberg, Sumesh J. Philip, Eric van den Berg and Tao Zhang * Institute for Math & its Applications,

More information

Research on Community Structure in Bus Transport Networks

Research on Community Structure in Bus Transport Networks Commun. Theor. Phys. (Beijing, China) 52 (2009) pp. 1025 1030 c Chinese Physical Society and IOP Publishing Ltd Vol. 52, No. 6, December 15, 2009 Research on Community Structure in Bus Transport Networks

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008 Lesson 4 Random graphs Sergio Barbarossa Graph models 1. Uncorrelated random graph (Erdős, Rényi) N nodes are connected through n edges which are chosen randomly from the possible configurations 2. Binomial

More information

Failure in Complex Social Networks

Failure in Complex Social Networks Journal of Mathematical Sociology, 33:64 68, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0022-250X print/1545-5874 online DOI: 10.1080/00222500802536988 Failure in Complex Social Networks Damon

More information

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 3 Aug 2000

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 3 Aug 2000 Error and attack tolerance of complex networks arxiv:cond-mat/0008064v1 [cond-mat.dis-nn] 3 Aug 2000 Réka Albert, Hawoong Jeong, Albert-László Barabási Department of Physics, University of Notre Dame,

More information

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing

More information

THE FIRST APPROXIMATED DISTRIBUTED ALGORITHM FOR THE MINIMUM DEGREE SPANNING TREE PROBLEM ON GENERAL GRAPHS. and

THE FIRST APPROXIMATED DISTRIBUTED ALGORITHM FOR THE MINIMUM DEGREE SPANNING TREE PROBLEM ON GENERAL GRAPHS. and International Journal of Foundations of Computer Science c World Scientific Publishing Company THE FIRST APPROXIMATED DISTRIBUTED ALGORITHM FOR THE MINIMUM DEGREE SPANNING TREE PROBLEM ON GENERAL GRAPHS

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

IP Paging Considered Unnecessary:

IP Paging Considered Unnecessary: IP Paging Considered Unnecessary: Mobile IPv6 and IP Paging for Dormant Mode Location Update in Macrocellular and Hotspot Networks James Kempf DoCoMo USA Communications Labs 181 Metro Drive, Suite 3 San

More information

Modeling and Analysis of Random Walk Search Algorithms in P2P Networks

Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik and Alhussein Abouzeid Electrical, Computer and Systems Engineering Department Rensselaer Polytechnic Institute Troy,

More information

Random Generation of the Social Network with Several Communities

Random Generation of the Social Network with Several Communities Communications of the Korean Statistical Society 2011, Vol. 18, No. 5, 595 601 DOI: http://dx.doi.org/10.5351/ckss.2011.18.5.595 Random Generation of the Social Network with Several Communities Myung-Hoe

More information

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306

More information

Statistical Analysis of the Metropolitan Seoul Subway System: Network Structure and Passenger Flows arxiv: v1 [physics.soc-ph] 12 May 2008

Statistical Analysis of the Metropolitan Seoul Subway System: Network Structure and Passenger Flows arxiv: v1 [physics.soc-ph] 12 May 2008 Statistical Analysis of the Metropolitan Seoul Subway System: Network Structure and Passenger Flows arxiv:0805.1712v1 [physics.soc-ph] 12 May 2008 Keumsook Lee a,b Woo-Sung Jung c Jong Soo Park d M. Y.

More information

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection, most

More information

Heuristic Clustering Algorithms in Ad hoc Networks

Heuristic Clustering Algorithms in Ad hoc Networks Heuristic Clustering Algorithms in Ad hoc Networks Artvin Çoruh University e-mail: nevin.aydin@gmail.com Volume 3 No 3 (2014) ISSN 2158-8708 (online) DOI 10.5195/emaj.2014.39 http://emaj.pitt.edu Abstract

More information

FORMATION OF SCATTERNETS WITH HETEROGENEOUS BLUETOOTH DEVICES

FORMATION OF SCATTERNETS WITH HETEROGENEOUS BLUETOOTH DEVICES FORMATION OF SCATTERNETS WITH HETEROGENEOUS BLUETOOTH DEVICES Paal Engelstad, Do Van Thanh, Tore E. Jonvik University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway {Paal.Engelstad, Thanh-van.Do, Tore-erling.Jonvik

More information

Routing. Information Networks p.1/35

Routing. Information Networks p.1/35 Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual

More information

Stable Statistics of the Blogograph

Stable Statistics of the Blogograph Stable Statistics of the Blogograph Mark Goldberg, Malik Magdon-Ismail, Stephen Kelley, Konstantin Mertsalov Rensselaer Polytechnic Institute Department of Computer Science Abstract. The primary focus

More information

Improved Compact Routing Schemes for Power-Law Networks

Improved Compact Routing Schemes for Power-Law Networks Improved Compact Routing Schemes for Power-Law Networks Mingdong Tang 1,2, Jianxun Liu 1, Guoqing Zhang 2 1 Key Laboratory of Knowledge Processing and Networked Manufacturing, Hunan University of Science

More information

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services Zhiyong Liu, CATR Prof. Zhili Sun, UniS Dr. Dan He, UniS Denian Shi, CATR Agenda Introduction Background Problem Statement

More information

MAE 298, Lecture 9 April 30, Web search and decentralized search on small-worlds

MAE 298, Lecture 9 April 30, Web search and decentralized search on small-worlds MAE 298, Lecture 9 April 30, 2007 Web search and decentralized search on small-worlds Search for information Assume some resource of interest is stored at the vertices of a network: Web pages Files in

More information

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions GIAN Course on Distributed Network Algorithms Spanning Tree Constructions Stefan Schmid @ T-Labs, 2011 Spanning Trees Attactive infrastructure : sparse subgraph ( loop-free backbone ) connecting all nodes.

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 14 Sep 2005

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 14 Sep 2005 APS/xxx Load Distribution on Small-world Networks Huijie Yang, Tao Zhou, Wenxu Wang, and Binghong Wang Department of Modern Physics and Nonlinear Science Center, University of Science and Technology of

More information

Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter)

Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter) Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter) Department of Electronic & Electrical Engineering University College London London WC1E 6EA United

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

Link Prediction for Social Network

Link Prediction for Social Network Link Prediction for Social Network Ning Lin Computer Science and Engineering University of California, San Diego Email: nil016@eng.ucsd.edu Abstract Friendship recommendation has become an important issue

More information

Min-Cost Multicast Networks in Euclidean Space

Min-Cost Multicast Networks in Euclidean Space Min-Cost Multicast Networks in Euclidean Space Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue School of Computer Science Fudan University {09110240030,11110240029,xinw,xyxue}@fudan.edu.cn Zongpeng Li Dept.

More information

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Symeon Papavassiliou (joint work with Eleni Stai and Vasileios Karyotis) National Technical University of Athens (NTUA) School of

More information

Mixing navigation on networks. Tao Zhou

Mixing navigation on networks. Tao Zhou Published in "Physica A: Statistical Mechanics and its Applications 387(12): 3025-3032, 2008" which should be cited to refer to this work. Mixing navigation on networks Tao Zhou Department of Modern Physics,

More information

Analysis of Multiple Trees on Path Discovery for Beacon-Based Routing Protocols

Analysis of Multiple Trees on Path Discovery for Beacon-Based Routing Protocols Analysis of Multiple Trees on Path Discovery for Beacon-Based Routing Protocols Baruch Awerbuch, David Holmer and Herbert Rubens Johns Hopkins University Department of Computer Science Baltimore, MD, USA

More information

Number Theory and Graph Theory

Number Theory and Graph Theory 1 Number Theory and Graph Theory Chapter 6 Basic concepts and definitions of graph theory By A. Satyanarayana Reddy Department of Mathematics Shiv Nadar University Uttar Pradesh, India E-mail: satya8118@gmail.com

More information

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

Basics of Network Analysis

Basics of Network Analysis Basics of Network Analysis Hiroki Sayama sayama@binghamton.edu Graph = Network G(V, E): graph (network) V: vertices (nodes), E: edges (links) 1 Nodes = 1, 2, 3, 4, 5 2 3 Links = 12, 13, 15, 23,

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

arxiv:cs/ v1 [cs.ir] 26 Apr 2002

arxiv:cs/ v1 [cs.ir] 26 Apr 2002 Navigating the Small World Web by Textual Cues arxiv:cs/0204054v1 [cs.ir] 26 Apr 2002 Filippo Menczer Department of Management Sciences The University of Iowa Iowa City, IA 52242 Phone: (319) 335-0884

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Expanding Ring Search for Route Discovery in LOADng Routing Protocol

Expanding Ring Search for Route Discovery in LOADng Routing Protocol Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com,

More information

Vertex Cover Approximations on Random Graphs.

Vertex Cover Approximations on Random Graphs. Vertex Cover Approximations on Random Graphs. Eyjolfur Asgeirsson 1 and Cliff Stein 2 1 Reykjavik University, Reykjavik, Iceland. 2 Department of IEOR, Columbia University, New York, NY. Abstract. The

More information

12.1 Formulation of General Perfect Matching

12.1 Formulation of General Perfect Matching CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Perfect Matching Polytope Date: 22/02/2008 Lecturer: Lap Chi Lau Scribe: Yuk Hei Chan, Ling Ding and Xiaobing Wu In this lecture,

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

Search in weighted complex networks

Search in weighted complex networks Search in weighted complex networks Hari P. Thadakamalla, R. Albert 2 and S. R. T. Kumara Department of Industrial Engineering, The Pennsylvania State University, University Park, PA 6802 2 Department

More information

Simple Quality-of-Service Path First Protocol and Modeling Analysis*

Simple Quality-of-Service Path First Protocol and Modeling Analysis* Simple Quality-of-Service Path First Protocol and Modeling Analysis* Lin Shen, Mingwei Xu, Ke Xu, Yong Cui, Youjian Zhao Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

A FRAMEWORK FOR PERFORMANCE CHARACTERIZATION AND ENHANCEMENT OF THE OSPF ROUTING PROTOCOL

A FRAMEWORK FOR PERFORMANCE CHARACTERIZATION AND ENHANCEMENT OF THE OSPF ROUTING PROTOCOL A FRAMEWORK FOR PERFORMANCE CHARACTERIZATION AND ENHANCEMENT OF THE OSPF ROUTING PROTOCOL H. El-Sayed, M. Ahmed, M. Jaseemuddin, D. Petriu UAE University, Al-Ain P.O.Box, UAE, helsayed@uaeu.ac.ae, CIENA

More information

Summary: What We Have Learned So Far

Summary: What We Have Learned So Far Summary: What We Have Learned So Far small-world phenomenon Real-world networks: { Short path lengths High clustering Broad degree distributions, often power laws P (k) k γ Erdös-Renyi model: Short path

More information

BOSAM: A Tool for Visualizing Topological Structures Based on the Bitmap of Sorted Adjacent Matrix

BOSAM: A Tool for Visualizing Topological Structures Based on the Bitmap of Sorted Adjacent Matrix BOSAM: A Tool for Visualizing Topological Structures Based on the Bitmap of Sorted Adjacent Matrix Yuchun Guo and Changjia Chen School of Electrical and Information Engineering Beijing Jiaotong University

More information

Sharp lower bound for the total number of matchings of graphs with given number of cut edges

Sharp lower bound for the total number of matchings of graphs with given number of cut edges South Asian Journal of Mathematics 2014, Vol. 4 ( 2 ) : 107 118 www.sajm-online.com ISSN 2251-1512 RESEARCH ARTICLE Sharp lower bound for the total number of matchings of graphs with given number of cut

More information

Mining Quantitative Association Rules on Overlapped Intervals

Mining Quantitative Association Rules on Overlapped Intervals Mining Quantitative Association Rules on Overlapped Intervals Qiang Tong 1,3, Baoping Yan 2, and Yuanchun Zhou 1,3 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China {tongqiang,

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem

An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem Ahmad Biniaz Anil Maheshwari Michiel Smid September 30, 2013 Abstract Let P and S be two disjoint sets of n and m points in the

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

INVESTIGATING THE SCALABILITY OF THE FISH-EYE STATE ROUTING PROTOCOL FOR AD HOC NETWORKS

INVESTIGATING THE SCALABILITY OF THE FISH-EYE STATE ROUTING PROTOCOL FOR AD HOC NETWORKS INVESTIGATING THE SCALABILITY OF THE FISH-EYE STATE ROUTING PROTOCOL FOR AD HOC NETWORKS 1 NATARAJAN MEGHANATHAN, 2 AYOMIDE ODUNSI 1 Asstt Prof., Department of Computer Science, Jackson State University,

More information

Universal Properties of Mythological Networks Midterm report: Math 485

Universal Properties of Mythological Networks Midterm report: Math 485 Universal Properties of Mythological Networks Midterm report: Math 485 Roopa Krishnaswamy, Jamie Fitzgerald, Manuel Villegas, Riqu Huang, and Riley Neal Department of Mathematics, University of Arizona,

More information

Characterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs

Characterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs ISSN 0975-3303 Mapana J Sci, 11, 4(2012), 121-131 https://doi.org/10.12725/mjs.23.10 Characterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs R Mary Jeya Jothi * and A Amutha

More information

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless

More information

C3PO: Computation Congestion Control (PrOactive)

C3PO: Computation Congestion Control (PrOactive) C3PO: Computation Congestion Control (PrOactive) an algorithm for dynamic diffusion of ephemeral in-network services Liang Wang, Mario Almeida*, Jeremy Blackburn*, Jon Crowcroft University of Cambridge,

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Associate Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection,

More information

A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes

A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes 1,* Chengpei Tang, 1 Jiao Yin, 1 Yu Dong 1

More information

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions GIAN Course on Distributed Network Algorithms Spanning Tree Constructions Stefan Schmid @ T-Labs, 2011 Spanning Trees Attactive infrastructure : sparse subgraph ( loop-free backbone ) connecting all nodes.

More information

Predicting connection quality in peer-to-peer real-time video streaming systems

Predicting connection quality in peer-to-peer real-time video streaming systems Predicting connection quality in peer-to-peer real-time video streaming systems Alex Giladi Jeonghun Noh Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,

More information

Control Traffic Analysis of On-Demand Routing Protocol. in Mobile Ad-hoc Networks

Control Traffic Analysis of On-Demand Routing Protocol. in Mobile Ad-hoc Networks Second International Conference on Networking and Distributed Computing Control Traffic Analysis of On-Demand Routing Protocol in Mobile Ad-hoc Networks Zhilin Zhang School of Computer Science & Technology

More information

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1

More information

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University park.764@osu.edu yilmaz.15@osu.edu ABSTRACT Depending

More information