Resilient Networks Missouri S&T University CPE 6510 Graph Robustness and Algorithms
|
|
- Shanna Cannon
- 5 years ago
- Views:
Transcription
1 Resilient Networks Missouri S&T University CPE 6510 Graph Robustness and Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology 23 February 2017 rev Egemen K. Çetinkaya
2 Graph Robustness and Algorithms Outline Introduction Connectivity improvement Diversity improvement Analysis 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 2
3 Graph Robustness and Algorithms Introduction Introduction Connectivity improvement Diversity improvement Analysis 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 3
4 Network Design and Optimization Introduction and Motivation Communication networks faces several challenges random and targeted attacks large scale disasters links and node failures Need for a cost-efficient optimization method multiple objective functions cost minimization resilience (reliability, robustness, connectivity is also used) Optimizations possible links: add or rewire new links nodes additions: location of nodes 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 4
5 Network Design and Optimization Overview Many problems are NP-hard Cost and resilience are opposing objectives Backbone and access networks differ Two methods to improve graph connectivity rewiring and link additions Realistic criterion exists can you add a direct fiber link between LA and NY? Many graph metrics exist focus on algebraic connectivity and path diversity algebraic connectivity measure robust connectivity [ÇAP+2013] path diversity is crucial for measuring survivability [RJS2014] 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 5
6 Graph Robustness and Algorithms Connectivity Improvement Introduction Connectivity improvement Diversity improvement Analysis 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 6
7 Algebraic Connectivity Improvement Background and Related Work Algebraic connectivity Laplacian matrix: diagonal depends on degree a(g) is second 2 nd smallest eigenvalue of Laplacian matrix measures robust connectivity more links failures needed to be partitioned [WM2008] Rewiring edges [SSG2013] rewiring edges to increase algebraic connectivity a(g) Adding edges [WM2008] adding edges to increase algebraic connectivity a(g) lowest degree and random 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 7
8 Algebraic Connectivity Improvement Algorithm Objective identify the best links to be added to improve a(g) reduce the cost by selecting the least cost links Candidate links heuristic is to choose lowest degree nodes search space is reduced from O(n 2 ) to O(n) [AÇS2014a] iterations depend on number of links to be added Link selection based on: a(g), cost, and parameter rank function: rank[l]=(1 )a(g) + (1 cost(l)) Output an ordered list of the best selected links (highest ranked) 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 8
9 Algebraic Connectivity Improvement Example Optimization nodes and 9 links graph 28 max. links, 28 9=19 links to be searched heuristic reduces it to be 11 links connected to lowest degree nodes For = 0, link (7,1) highest a(g); for = 1, link (0,2) lowest cost 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 9
10 Graph Robustness and Algorithms Diversity Improvement Introduction Connectivity improvement Diversity improvement Analysis 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 10
11 Path Diversity Background 0 1 D(P 2 ) = 2 / 3 P 0 2 D(P 1 ) = Path diversity measure of links and nodes in common EPD: effective path diversity [0,1) normalized diversity with respect to a single shortest path measure of E2E flow resilience TGD: total graph diversity is average of EPD for all pairs: quantifies available diversity in graph D P k 1 P k P P 0 0 [RJS2014] 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 11
12 Objective Path Diversity Improvement Algorithm identify the best links to be added to improve TGD reduce the cost by selecting the least cost links Candidate links heuristic is to choose node pairs with the lowest EPD search space is reduced from O(n 2 ) to O(nm) where m is the lowest degree node pairs Link selection based on: EPD and cost if multiple EPD candidates, select with the least cost Output an ordered list of the best selected links [AÇS2014b] 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 12
13 Topology Optimization Algorithm PD Optimization Example 4 [AÇS2014b] : Los Angeles, LA 1: Houston, TX 2: Kansas City, MO 3: Chicago, IL 4: Boston, MA 5 nodes, 5 links, 5 candidate links, lowest EPD pair Best link (1,3): the most EPD increase, least costly 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 13
14 Graph Robustness and Algorithms Analysis Introduction Connectivity improvement Diversity improvement Analysis 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 14
15 Analysis Dataset and Parameters Three real world providers CORONET Internet2 Level 3 Dataset three physical graphs 20 links to be added Varying h (5, 10, 15) and k (4, 8, 12) while λ = 0.5 Flow robustness: betweenness, closeness, degree ratio of connected components to all pairs 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 15
16 Algorithm Comparison Cost of Optimized Physical-Level Topologies CORONET Internet2 Level 3 Add 20 links in each graph, parameters: PD: h = 15, k = 12, λ = 0.5; a(g): = 0 (no cost, max a(g)) a(g) optimised graphs incur more cost a(g): CORONET > Level 3 > Internet2 PD: Internet2 > CORONET > Level 3 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 16
17 Algorithm Comparison Flow Robustness of Optimized Topologies CORONET Internet2 Level 3 Attack 50 nodes adaptively based on: betweenness, closeness, degree centrality a(g) optimised graphs react better to attacks betweenness > closeness > degree FR 0: 35/99 Level 3; 30/75 CORONET; 25/57 Internet2 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 17
18 References and Further Reading [AÇS2014a] Mohammed J.F. Alenazi, Egemen K. Çetinkaya, and James P.G. Sterbenz, Cost-efficient algebraic connectivity optimisation of backbone networks, Optical Switching and Networking, Volume 14, Part 2, pp , August [AÇS2014b] Mohammed J.F. Alenazi, Egemen K. Çetinkaya, and James P.G. Sterbenz, Cost-Efficient Network Improvement to Achieve Maximum Path Diversity, in Proceedings of the 6th IEEE/IFIP International Workshop on Reliable Networks Design and Modeling (RNDM), Barcelona, November 2014, pp [ÇAP+2015] Egemen K. Çetinkaya, Mohammed J.F. Alenazi, Andrew M. Peck, Justin P. Rohrer, and James P.G. Sterbenz, Multilevel Resilience Analysis of Transportation and Communication Networks, Telecommunication Systems, Volume 60, no. 14, pp , December February 2017 MST CPE 6510 Graph Robustness and Algorithms 18
19 References and Further Reading [RJS2014] Justin P. Rohrer, Abdul Jabbar, and James P.G. Sterbenz, Path Diversification for Future Internet End-to-End Resilience and Survivability, Telecommunication Systems, Vol. 56, no. 1, pp , May [SSG2013] A. Sydney, C. Scoglio, and D. Gruenbacher, Optimizing algebraic connectivity by edge rewiring, Applied Mathematics and Computation, vol. 219, no. 10, pp , January [WM2008] H. Wang and P.V. Mieghem, Algebraic connectivity optimization via link addition, Proc. of IEEE/ACM Bionetics, February 2017 MST CPE 6510 Graph Robustness and Algorithms 19
20 End of Foils 23 February 2017 MST CPE 6510 Graph Robustness and Algorithms 20
Network Resilience Improvement and Evaluation Using Link Additions Ph.D. Dissertation Defense
Network Resilience Improvement and Evaluation Using Link Additions Ph.D. Dissertation Defense Mohammed J.F. Advisor: James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information
More informationMultilevel Resilience Analysis of Transportation and Communication Networks
Telecommunication Systems Multilevel Resilience Analysis of Transportation and Communication Networks Egemen K. Çetinkaya Mohammed J.F. Alenazi Andrew M. Peck Justin P. Rohrer* James P.G. Sterbenz Received:
More informationSpectral Analysis of Backbone Networks Against Targeted Attacks
Spectral Analysis of Backbone Networks Against Targeted Attacks Tristan A. Shatto* and Egemen K. Çetinkaya* *Department of Electrical and Computer Engineering Intelligent Systems Center Missouri University
More informationResilience Evaluation and Enhancement in Mobile Ad Hoc Networks
Resilience Evaluation and Enhancement in Mobile Ad Hoc Networks By Copyright c 2015 Dongsheng Zhang Submitted to the graduate degree program in Electrical Engineering & Computer Science and the Graduate
More informationMultipath Resilient Transport and Routing for the Future Internet
Multipath Resilient Transport and Routing for the Future Internet * 司徒傑莫 Джеймс Ф.Г. Штербэнз 송재윤 Yufei Cheng 成宇飞, Anh Nguyễn, Justin P. Rohrer, Egemen Çetinkaya *Department of Electrical Engineering &
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Anomaly Detection
Introduction to Network Security Missouri S&T University CPE 5420 Anomaly Detection Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science
More informationITTC A Geographical Routing Protocol for Highly-Dynamic Aeronautical Networks
A Geographical Routing Protocol for Highly-Dynamic Aeronautical Networks Kevin Peters, Abdul Jabbar, Egemen K. Çetinkaya, James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information
More informationITTC Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark
Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark Trúc Anh N. Nguyễn, Egemen K. Çetinkaya, Mohammed Alenazi, and James P.G. Sterbenz Department
More information132 Emerson Electric Co. Hall Missouri University of Science and Technology Rolla, MO
EGEMEN K. ÇETİNKAYA 132 Emerson Electric Co. Hall Missouri University of Science and Technology Rolla, MO 65409-0040 cetinkayae@mst.edu +1 573 341 6887 http://web.mst.edu/~cetinkayae EDUCATION The University
More informationResTP A Transport Protocol for Future Internet Resilience
A Transport Protocol for Future Internet Resilience Anh Nguyen, Justin P. Rohrer, and James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications
More informationITTC Communication Networks Laboratory The University of Kansas EECS 563 Introduction to Protocol Analysis with Wireshark
Communication Networks Laboratory The University of Kansas EECS 563 Introduction to Protocol Analysis with Wireshark Trúc Anh N. Nguyễn, Egemen K. Çetinkaya, Mohammed Alenazi, and James P.G. Sterbenz Department
More informationKU-LocGen: Location and Cost-Constrained Network Topology Generator
The University of Kansas Technical Report KU-LocGen: Location and Cost-Constrained Network Topology Generator Abdul Jabbar, Qian Shi, Egeman Çetinkaya and James P. G. Sterbenz ITTC-FY29-TR--1 December
More informationOptimised Heuristics for a Geodiverse Routing Protocol
Optimised Heuristics for a Geodiverse Routing Protocol Yufei Cheng, M. Todd Gardner, Junyan Li, Rebecca May, Deep Medhi, and James P.G. Sterbenz Information and Telecommunication Technology Center EECS,
More informationarxiv: v1 [cs.si] 2 Sep 2016
Miuz: measuring the impact of disconnecting a node Ivana Bachmann 1, Patricio Reyes 2, Alonso Silva 3, and Javier Bustos-Jiménez 4 arxiv:1609.00638v1 [cs.si] 2 Sep 2016 1,4 NICLabs, Computer Science Department
More informationNarra, et al. Performance Analysis of AeroRP with Ground Station Advertisements. Hemanth Narra, Egemen K. Çetinkaya, and James P.G.
Performance Analysis of AeroRP with Ground Station Advertisements Hemanth Narra, Egemen K. Çetinkaya, and James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology
More informationOn the Fitness of Geographic Graph Generators for Modelling Physical Level Topologies
This paper was presented at RNDM 2013-5 th International Workshop on Reliable Networks Design and Modeling, co-located with ICUMT 2013 Congress (Sept. 10-12, 2013, Almaty, KZ) On the Fitness of Geographic
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Network Access Control
Introduction to Network Security Missouri S&T University CPE 5420 Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology cetinkayae@mst.edu
More informationDesign Improvement and Implementation of 3D Gauss-Markov Mobility Model
Design Improvement and Implementation of 3D Gauss-Markov Mobility Model Mohammed J.F. Alenazi, Cenk Sahin, and James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information &
More informationRobustness of Mobile Ad Hoc Networks Under Centrality-Based Attacks
This paper was presented at RNDM 1-5 th International Workshop on Reliable Networks Design and Modeling, co-located with ICUMT 1 Congress (Sept. 1-1, 1, Almaty, KZ) Robustness of Mobile Ad Hoc Networks
More informationGeodiverse Routing with Path Delay and Skew Requirement under Area-Based Challenges
Geodiverse Routing with Path Delay and Skew Requirement under Area-Based Challenges Yufei Cheng a,, Deep Medhi b, James P.G. Sterbenz a,c,d a Information and Telecommunication Technology Center, The University
More informationA Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks
A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks Iyad Katib and Deep Medhi Computer Science & Electrical Engineering Department University of Missouri-Kansas City, USA {IyadKatib,
More informationPh.D in Electrical Engineering, The University of Kansas, U.S.A. Received Honors, GPA 3.88/4.0
Abdul Jabbar 400 Blake St, Apt 3201 New Haven, CT, 06515 U.S.A. Phone: 785-979-6779 Fax: 612-746-9210 email: jabbar@gmail.com url: http://www.ittc.ku.edu/~jabbar Objective To obtain a position which challenges
More informationA Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks
A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland
More informationResilient Communications: Staying connected during a disaster.
Resilient Communications: Staying connected during a disaster. A presentation by the Telecommunications Services of Trinidad and Tobago Limited (TSTT) on behalf of CANTO Agenda Resilient Telecommunication
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics
Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science
More informationAn Comparative Evaluation of Graph Metrics in Measuring the Resilience of Telecommunications Backbone Networks
An Comparative Evaluation of Graph Metrics in Measuring the Resilience of Telecommunications Backbone Networks CS224W: Analysis of Networks - Project Final Report Stanford University Ramesh Subbaraman
More informationReal Time Crime Center. St. Louis Metropolitan Police Department April 16, 2015
Real Time Crime Center St. Louis Metropolitan Police Department April 16, 2015 Investments in Technology Cities with Real Time Crime Centers Kansas City, MO Memphis, TN Chicago, IL New York City, NY Houston,
More informationIntroduction to Digital Logic Missouri S&T University CPE 2210 Registers
Introduction to Digital Logic Missouri S&T University CPE 2210 Registers Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology cetinkayae@mst.edu
More informationAssessing and Safeguarding Network Resilience to Nodal Attacks
Assessing and Safeguarding Network Resilience to Nodal Attacks Pin-Yu Chen and Alfred O. Hero III, Fellow, IEEE Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor,
More informationSpare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection
Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Victor Yu Liu Network Advanced Research, Huawei Technologies Santa Clara, California, USA yuliu@ieee.org Abstract
More informationDeriving Network Topologies from Real World Constraints
IEEE Globecom 2010 Workshop on Complex and Communication Networks Deriving Network Topologies from Real World Constraints Mahmood A. Hameed, Abdul Jabbar, Egemen K. Çetinkaya, James P. G. Sterbenz Information
More informationDesign Improvement and Implementation of 3D Gauss-Markov Mobility Model. Mohammed Alenazi, Cenk Sahin, and James P.G. Sterbenz
AFFTC-PA-12430 Design Improvement and Implementation of 3D Gauss-Markov Mobility Model Mohammed Alenazi, Cenk Sahin, and James P.G. Sterbenz A F F T C AIR FORCE FLIGHT TEST CENTER EDWARDS AFB, CA 2/19/13
More informationPAST PRESENTATIONS Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016
Past Presentations PAST PRESENTATIONS 2016 Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016 Current Healthcare Information Security Trends and Challenges,
More informationIntroduction to Digital Logic Missouri S&T University CPE 2210 Multipliers/Dividers
Introduction to Digital Logic Missouri S&T University CPE 2210 Multipliers/Dividers Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science
More informationFreight Industry Outlook
Freight Industry Outlook St. Louis Regional Freightway The Port Working Group Monthly Meeting, April 6, 2016 1 Our conversation today Regions across the United States and North America Peer Metropolitan
More informationRobustness Analysis of Real Network Topologies Under Multiple Failure Scenarios
Downloaded from orbit.dtu.dk on: Aug 15, 2018 Robustness Analysis of Real Network Topologies Under Multiple Failure Scenarios Manzano, M. ; Marzo, J. L.; Calle, E.; Fagertun, Anna Manolova Published in:
More informationSpectral Clustering on Handwritten Digits Database
October 6, 2015 Spectral Clustering on Handwritten Digits Database Danielle dmiddle1@math.umd.edu Advisor: Kasso Okoudjou kasso@umd.edu Department of Mathematics University of Maryland- College Park Advance
More informationAdaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks
Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Tibor Fabry-Asztalos, Nilesh Bhide and Krishna M. Sivalingam School of Electrical Engineering &
More informationPerformance Analysis of AeroRP with Ground Station Updates in Highly-Dynamic Airborne Telemetry Networks
Performance Analysis of AeroRP with Ground Station Updates in Highly-Dynamic Airborne Telemetry Networks Hemanth Narra, Egemen K. Çetinkaya, and James P.G. Sterbenz Department of Electrical Engineering
More informationGpENI Great Plains Environment for Network Innovation
Great Plains Environment for Network Innovation James P.G. Sterbenz* Joseph B. Evans, Rick McMullen, KU Deep Medhi, Baek-Young Choi, Jim Schonemann, UMKC Greg Monaco, GPN Byrav Ramamurthy, Dale Finkelson,
More informationHeuristic Algorithms for Multiconstrained Quality-of-Service Routing
244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service
More informationConstrained Minimum Spanning Tree Algorithms
December 8, 008 Introduction Graphs and MSTs revisited Minimum Spanning Tree Algorithms Algorithm of Kruskal Algorithm of Prim Constrained Minimum Spanning Trees Bounded Diameter Minimum Spanning Trees
More informationImplementation of the AeroRP and AeroNP Protocols in Python
Implementation of the AeroRP and AeroNP Protocols in Python Mohammed J.F. Alenazi, Egemen K. Çetinkaya, Justin P. Rohrer, and James P.G. Sterbenz Department of Electrical Engineering & Computer Science
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms
Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of
More informationEnergy Efficient Cloud Computing: Challenges and Solutions
Energy Efficient Cloud Computing: Challenges and Solutions Burak Kantarci and Hussein T. Mouftah School of Electrical Engineering and Computer Science University of Ottawa Ottawa, ON, Canada Outline PART-I:
More informationResilient Networks Missouri S&T University CPE 6510 Network Security Overview
Resilient Networks Missouri S&T University CPE 6510 Network Security Overview Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and
More informationAd Hoc Airborne Networking for Telemetry Test and Evaluation
Highly-Dynamic Ad Hoc Airborne Networking for Telemetry Test and Evaluation James P.G. Sterbenz Abdul Jabbar, Erik Perrins, Justin Rohrer Department of Electrical Engineering & Computer Science Information
More informationSocial-Network Graphs
Social-Network Graphs Mining Social Networks Facebook, Google+, Twitter Email Networks, Collaboration Networks Identify communities Similar to clustering Communities usually overlap Identify similarities
More informationRedundancy, Diversity, and Connectivity to Achieve Multilevel Network Resilience, Survivability, and Disruption Tolerance invited paper
Telecommunication Systems Redundancy, Diversity, and Connectivity to Achieve Multilevel Network Resilience, Survivability, and Disruption Tolerance invited paper James P.G. Sterbenz David Hutchison Egemen
More informationSpectral Clustering. Presented by Eldad Rubinstein Based on a Tutorial by Ulrike von Luxburg TAU Big Data Processing Seminar December 14, 2014
Spectral Clustering Presented by Eldad Rubinstein Based on a Tutorial by Ulrike von Luxburg TAU Big Data Processing Seminar December 14, 2014 What are we going to talk about? Introduction Clustering and
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard
Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of
More informationFinding Critical Regions and Region-Disjoint Paths in a Network Term Paper
Finding Critical Regions and Term Paper Jean Olimb Department of Electrical & Computer Engineering Missouri University of Science and Technology SJOFX3@mst.edu, 23 February 2017 rev. 1.0 2017 solimb Outline
More informationMinimizing Collateral Damage by Proactive Surge Protection
Minimizing Collateral Damage by Proactive Surge Protection Jerry Chou, Bill Lin University of California, San Diego Subhabrata Sen, Oliver Spatscheck AT&T Labs-Research ACM SIGCOMM LSAD Workshop, Kyoto,
More informationIntroduction to Digital Logic Missouri S&T University CPE 2210 Hardware Implementations
Introduction to Digital Logic Missouri S&T University CPE 2210 Hardware Implementations Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science
More informationSurvivability Function A Measure of Disaster-Based Routing Performance
Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected
More informationSystem of Systems Architecture Generation and Evaluation using Evolutionary Algorithms
SysCon 2008 IEEE International Systems Conference Montreal, Canada, April 7 10, 2008 System of Systems Architecture Generation and Evaluation using Evolutionary Algorithms Joseph J. Simpson 1, Dr. Cihan
More informationAutomatic Service and Protection Path Computation - A Multiplexing Approach
Automatic Service and Protection Path Computation - A Multiplexing Approach Loay Alzubaidi 1, Ammar El Hassan 2, Jaafar Al Ghazo 3 1 Department of Computer Engineering & Science, Prince Muhammad bin Fahd
More informationITTC High-Performance Networking The University of Kansas EECS 881 Architecture and Topology
High-Performance Networking The University of Kansas EECS 881 Architecture and Topology James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications
More informationBig Data Analytics. Special Topics for Computer Science CSE CSE Feb 11
Big Data Analytics Special Topics for Computer Science CSE 4095-001 CSE 5095-005 Feb 11 Fei Wang Associate Professor Department of Computer Science and Engineering fei_wang@uconn.edu Clustering II Spectral
More informationConstructing Connected Dominating Sets with Bounded Diameters in Wireless Networks
Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng
More informationMining Social Network Graphs
Mining Social Network Graphs Analysis of Large Graphs: Community Detection Rafael Ferreira da Silva rafsilva@isi.edu http://rafaelsilva.com Note to other teachers and users of these slides: We would be
More informationNLR Update: Backbone Upgrade Joint Techs July 2008
NLR Update: Backbone Upgrade Joint Techs July 2008 Dave Reese 1 National LambdaRail Infrastructure 2006 2004 National LambdaRail, Inc. 2 NLR Backbone Upgrade Upgrade Phase 1 portion of NLR backbone Jacksonville
More informationAirborne Telemetry Networking Scenario and Environment
Highly-Dynamic Ad Hoc Airborne Networking for Telemetry Test and Evaluation James P.G. Sterbenz Abdul Jabbar, Erik Perrins, Justin Rohrer Department of Electrical Engineering & Computer Science Information
More informationImplementation of the AeroRP and AeroNP in Python. Mohammed Alenazi, Egemen K. Cetinkaya, Justin P. Rohrer, and James P.G.
AFFTC-PA- 12431 Implementation of the AeroRP and AeroNP in Python Mohammed Alenazi, Egemen K. Cetinkaya, Justin P. Rohrer, and James P.G. Sterbenz A F F T C AIR FORCE FLIGHT TEST CENTER EDWARDS AFB, CA
More informationAdapted and Constrained Dijkstra for Elastic Optical Networks
Adapted and Constrained Dijkstra for Elastic Optical Networks Ireneusz Szcześniak AGH University of Science and Technology Department of Telecommunications al. Mickiewicza 30 30-059 Krakow Poland Bożena
More informationCross-Layer Framework with Geodiverse Routing in Software-Defined Networking
Cross-Layer Framework with Geodiverse Routing in Software-Defined Networking Yufei Cheng, Md. Moshfequr Rahman, Siddharth Gangadhar, Mohammed J.F. Alenazi, and James P.G. Sterbenz Information and Telecommunication
More informationITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks
Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications
More informationDistributed Detection in Sensor Networks: Connectivity Graph and Small World Networks
Distributed Detection in Sensor Networks: Connectivity Graph and Small World Networks SaeedA.AldosariandJoséM.F.Moura Electrical and Computer Engineering Department Carnegie Mellon University 5000 Forbes
More informationOPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005
OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in
More informationA LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK
Clemson University TigerPrints All Theses Theses 8-2014 A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Raihan Hazarika Clemson University, rhazari@g.clemson.edu Follow
More informationHierarchical Multi level Approach to graph clustering
Hierarchical Multi level Approach to graph clustering by: Neda Shahidi neda@cs.utexas.edu Cesar mantilla, cesar.mantilla@mail.utexas.edu Advisor: Dr. Inderjit Dhillon Introduction Data sets can be presented
More informationSparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms
Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sanjay K. Bose, SMIEEE, Y.N. Singh, MIEEE A.N.V.B. Raju Bhoomika Popat Department of Electrical
More informationApplication of Spectral Clustering Algorithm
1/27 Application of Spectral Clustering Algorithm Danielle Middlebrooks dmiddle1@math.umd.edu Advisor: Kasso Okoudjou kasso@umd.edu Department of Mathematics University of Maryland- College Park Advance
More informationOn the Vulnerability of Multi-level Communication Network under Catastrophic Events
On the Vulnerability of Multi-level Communication Network under Catastrophic Events Pankaz Das, Mahshid Rahnamay-Naeini, Nasir Ghani, and Majeed M. Hayat Department of Electrical and Computer Engineering,
More informationProtection Methods for Multi-Link Failure in Optical Networks Chen Ma
Protection Methods for Multi-Link Failure in Optical Networks Chen Ma 27 Sep. 2014 machen1188@gmail.com Outline 1 2 3 4 Introduction of Myself Description of Multi-Link Failure Multi-Dimensional Protection
More informationA Comprehensive Framework to Simulate Network Attacks and Challenges
2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) A Comprehensive Framework to Simulate Network Attacks and Challenges Egemen K. Çetinkaya, Dan Broyles,
More informationEstrada Index. Bo Zhou. Augest 5, Department of Mathematics, South China Normal University
Outline 1. Introduction 2. Results for 3. References Bo Zhou Department of Mathematics, South China Normal University Augest 5, 2010 Outline 1. Introduction 2. Results for 3. References Outline 1. Introduction
More informationDynamic service Allocation with Protection Path
www.ijcsi.org 115 Dynamic service Allocation with Protection Path Loay Alzubaidi Department of Computer Engineering & Science, Prince Muhammad bin Fahd University AL-Khobar, Saudi Arabia Abstract Path
More informationOptimal Topology Design for Overlay Networks
Optimal Topology Design for Overlay Networks Mina Kamel 1, Caterina Scoglio 1, and Todd Easton 2 1 Electrical and computer Engineering Department 2 Industrial and Manufacturing Systems Engineering Department
More informationHeuristic Clustering Algorithms in Ad hoc Networks
Heuristic Clustering Algorithms in Ad hoc Networks Artvin Çoruh University e-mail: nevin.aydin@gmail.com Volume 3 No 3 (2014) ISSN 2158-8708 (online) DOI 10.5195/emaj.2014.39 http://emaj.pitt.edu Abstract
More informationA Study on Layer Correlation Effects Through a Multilayer Network Optimization Problem
A Study on Layer Correlation Effects Through a Multilayer Network Optimization Problem Iyad Katib and Deep Medhi University of Missouri Kansas City, USA Abstract Multilayer network design has received
More informationA Native Approach to Cell to Switch Assignment Using Firefly Algorithm
International Journal of Engineering Inventions ISSN: 2278-7461, www.ijeijournal.com Volume 1, Issue 2(September 2012) PP: 17-22 A Native Approach to Cell to Switch Assignment Using Firefly Algorithm Apoorva
More informationUsing Genetic Algorithm with Triple Crossover to Solve Travelling Salesman Problem
Proc. 1 st International Conference on Machine Learning and Data Engineering (icmlde2017) 20-22 Nov 2017, Sydney, Australia ISBN: 978-0-6480147-3-7 Using Genetic Algorithm with Triple Crossover to Solve
More informationA Game-Theoretic Framework for Congestion Control in General Topology Networks
A Game-Theoretic Framework for Congestion Control in General Topology SYS793 Presentation! By:! Computer Science Department! University of Virginia 1 Outline 2 1 Problem and Motivation! Congestion Control
More informationMessage-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Khaled M. Alzoubi Department of Computer Science Illinois Institute of Technology Chicago, IL 6066 alzoubi@cs.iit.edu Peng-Jun Wan Department
More informationTraffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks
Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Ankitkumar N. Patel, Chengyi Gao, and Jason P. Jue Erik Jonsson School of Engineering and Computer Science The University
More informationTrace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers
Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, 2007 378 Trace Driven Simulation of GDSF# and Existing Caching Algorithms for
More informationPartitioning and Partitioning Tools. Tim Barth NASA Ames Research Center Moffett Field, California USA
Partitioning and Partitioning Tools Tim Barth NASA Ames Research Center Moffett Field, California 94035-00 USA 1 Graph/Mesh Partitioning Why do it? The graph bisection problem What are the standard heuristic
More informationPartha Sarathi Mandal
MA 515: Introduction to Algorithms & MA353 : Design and Analysis of Algorithms [3-0-0-6] Lecture 39 http://www.iitg.ernet.in/psm/indexing_ma353/y09/index.html Partha Sarathi Mandal psm@iitg.ernet.in Dept.
More informationResilience of Backbone Provider Networks
Resilience of Backbone Provider Networks Egemen K. Çetinkaya, Justin P. Rohrer, James P.G. Sterbenz The Global Internet is a complex, critical infrastructure and the research community has been analysing
More informationImplementation of the AeroTP Transport Protocol in Python
Implementation of the AeroTP Transport Protocol in Python Santosh Ajith Gogi, Dongsheng Zhang, Egemen K. Çetinkaya, Justin P. Rohrer, and James P.G. Sterbenz Department of Electrical Engineering & Computer
More informationarxiv: v1 [cs.ni] 27 May 2016
I Accidentally the Whole Internet arxiv:1605.08714v1 [cs.ni] 27 May 2016 ABSTRACT Ivana Bachmann NICLabs, Universidad de Chile Blanco Encalada 1975 Santiago de Chile ivana@niclabs.cl Alonso Silva Bell
More informationBEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA
BEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA Order Instituting Investigation into the State of Competition Among Telecommunications Providers in California, and to Consider and Resolve
More informationIterative Optimization in VTD to Maximize the Open Capacity of WDM Networks
Iterative Optimization in VTD to Maximize the Open Capacity of WDM Networks Karcius D.R. Assis, Marcio S. Savasini and Helio Waldman DECOM/FEEC/UNICAMP, CP. 6101, 13083-970 Campinas, SP-BRAZIL Tel: +55-19-37883793,
More informationAnalysis and Algorithms for Partial Protection in Mesh Networks
Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT
More informationA Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks
A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks Wojciech Molisz, DSc, PhD Jacek Rak, PhD Gdansk University of Technology Department of Computer Communications
More informationUnsupervised Clustering of Bitcoin Transaction Data
Unsupervised Clustering of Bitcoin Transaction Data Midyear Report 1 AMSC 663/664 Project Advisor: Dr. Chris Armao By: Stefan Poikonen Bitcoin: A Brief Refresher 2 Bitcoin is a decentralized cryptocurrency
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Networking Background
Introduction to Network Security Missouri S&T University CPE 5420 Networking Background Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science
More informationClustering. SC4/SM4 Data Mining and Machine Learning, Hilary Term 2017 Dino Sejdinovic
Clustering SC4/SM4 Data Mining and Machine Learning, Hilary Term 2017 Dino Sejdinovic Clustering is one of the fundamental and ubiquitous tasks in exploratory data analysis a first intuition about the
More informationImproving Connectivity via Relays Deployment in Wireless Sensor Networks
Improving Connectivity via Relays Deployment in Wireless Sensor Networks Ahmed S. Ibrahim, Karim G. Seddik, and K. J. Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems
More information