Spectral Analysis of Backbone Networks Against Targeted Attacks

Size: px
Start display at page:

Download "Spectral Analysis of Backbone Networks Against Targeted Attacks"

Transcription

1 Spectral Analysis of Backbone Networks Against Targeted Attacks Tristan A. Shatto* and Egemen K. Çetinkaya* *Department of Electrical and Computer Engineering Intelligent Systems Center Missouri University of Science and Technology, Rolla, MO 65409, USA {taszrc, mstconets Abstract Network science has been a central focus to correctly model and study resilience characteristics of communication networks. There have been many metrics used to represent connectivity of graphs; however, they do not suffice to compare networks with different numbers of nodes and links. The normalized Laplacian spectra enables network scientists to analyze network structures beyond what traditional graph metrics lacks. In this paper, we study the normalized Laplacian spectra of five backbone networks against targeted attacks. The physical and logical level of four commercial and one research backbone provider networks is studied. The intelligent attacks are modeled based on important graph centrality metrics of betweenness, closeness, and degree. Our results indicate that spectra of eigenvalues converge to zero after attacks. Moreover, we also identify that while in some scenarios different centrality-based attack strategies yield identical eigenvalue distribution, in other scenarios different attacks yield different eigenvalue distributions. Index Terms Internet, backbone network, Laplacian, eigenvalue, normalized Laplacian spectra, resilience, centrality, betweenness, closeness, degree, attack I. INTRODUCTION AND MOTIVATION Modeling and analysis of the Internet has been one of the focus areas of network science research. Many network models have developed to study mathematical underpinnings [1] [4]. The aim of these studies is to understand the evolution of networks, as well as develop mechanisms so that network services remain uninterrupted during attacks and failures. Despite the efforts and technological progress made, communication networks face a variety of challenges and perturbations that disrupt normal operation [5]. Besides, the Internet that operates by many different protocols and functional layers is a complex system. For example, the Internet can be modeled by different levels such as IP, PoP (Point of Presence), and physical [6], in which different defense mechanisms need to be developed and adapted for disparate threat models for different levels. It is therefore important to: i) investigate communication networks that provide important services to the society, ii) analyze these networks at distinct levels for correct modeling against threats, iii) study mathematical underpinnings to improve its resilience against challenges and perturbations. In network science, from a graph theoretic perspective, despite many efforts, there is still not a clear pathway to evaluate graphs with different order (number of nodes) and size (number of links). Consider the two graphs: one with 10 nodes and 9 links as a star topology and the other with 10 nodes and 9 links as a bus (or linear) topology. While both graphs have the same number of nodes, an attack at the central node in the star topology will eliminate all potential flows between every pair of nodes, whereas in a linear topology, removal of a node will not eliminate the flow of information between every pair of nodes completely. While both the star and linear topologies have the same average node degree of 1.8, an intelligent attack against the star topology is obviously more damaging. This simple example shows a scenario in which it might be very misleading to evaluate connectivity by means of relying on a single graph metric. Furthermore, we can expand this argument to evaluate different order and size graphs. How do we know which graph is more resilient to attacks and challenges: one with 10 nodes 9 links, or the one with 100 nodes and 90 links? Obviously, rigorous analysis and tools are needed to investigate such scenarios that further motivates this research. The graph spectra captures eigenvalues and their multiplicities. The normalized Laplacian spectra (nls), which is a connectivity matrix normalized according to the degree of nodes, is a mathematical data structure that can help to evaluate resilience of networks that differ in size and order. Moreover, the nls provide the connectivity information in a spectrum of eigenvalues spread between [0,2] range, rather than a single value. In this paper, we evaluate the normalized Laplacian spectra of five backbone networks against intelligent attack scenarios. Four commercial service provider backbone networks: AT&T, Level 3, Sprint, and TeliaSonera, as well as the Internet2 research backbone network, and their corresponding physicaland logical-level topologies are used to analyze their spectra. The attack strategies are chosen based on well-known graph centrality metrics betweenness, closeness, and degree. With the aim of understanding the nls under attack scenarios, our results indicate that as more network components are removed, eigenvalues converge to a zero value. The nls analysis of these five backbone networks also results that while in some scenarios different attack strategies yield different eigenvalue distribution, in some other cases different attack strategy yield identical eigenvalue distribution.

2 The paper is organized as follows: The background and past work about spectral analysis of communication networks is presented in Section II. The details of the topological dataset is presented in Section III and the description of our methodology is presented in Section IV. In Section V, we present our experimental results of normalized Laplacian spectra to understand the effect of intelligent attacks on backbone networks, then we conclude and showcase some probable future work in Section VI. II. BACKGROUND AND RELATED WORK Let G = (V,E) be an unweighted, undirected graph with n vertices and m edges. The vertex set is denoted by V = {v 0,v 1,...,v n 1 } and the edge set is denoted by E = {e 0,e 1,...,e l 1 } for G. The graph connectivity can be represented by several structures such as an adjacency matrix, incidence matrix, Laplacian matrix, and normalized Laplacian matrix [7], [8]. A(G) is the symmetric adjacency matrix with no self-loops where a ii =0, a ij = a ji =1if there is a link between {v i,v j }, and a ij = a ji =0if there is no link between {v i,v j }. B(G) is the n l incidence matrix in which B ij =1 if vertex v i and edge e j are incident. The Laplacian matrix of G is: L(G) =D(G) A(G) where D(G) is the diagonal matrix of node degrees, d ii = deg(v i ). Given the degree of a node is d i = d(v i ), the normalized Laplacian matrix L(G) is denoted: 8 1, if i = j and d i 6=0 >< 1 L(G)(i, j) = p, if v i and v j are adjacent di d >: j 0, otherwise Let M be a symmetric matrix of order n and I be the identity matrix of order n. Then, eigenvalues ( ) and the eigenvector (x) of M satisfy M x = x for x 6= 0, viz., eigenvalues are the roots of the characteristic polynomial, det(m I) =0. The set of eigenvalues { 1, 2,..., n} together with their multiplicities (number of occurrences of an eigenvalue i) define the spectrum of M. There exists several manuscripts on spectral graph theory covering the topic in depth [7] [11]. The research on graph spectrum with emphasis on communication networks has been progressing primarily in two directions. The first group of research studies modeling and analyzing communication networks using graph spectra, particularly AS-level Internet topologies [4], [12] [18]. The second group of research focuses on connectivity, resilience, robustness of communication networks and how to improve connectedness of communication networks using spectral properties [19] [22]. We summarize the past work chronologically in the proceeding paragraphs. The normalized Laplacian spectrum of AS-level topologies has been shown to differ significantly from that of synthetically generated topologies [12]. The adjacency spectrum of ASlevel topology of the Internet was analyzed and clusters were found to be correlated with the spectrum [13]. The Laplacian spectrum of the IP-level topology of the Internet is compared against synthetically generated topologies, and that spectra differs between measured and synthetic topologies [14]. A weighted spectral distribution metric has been proposed and has shown that synthetically generated AS-level graphs can be generated using spectral properties [15]. The AS-level Internet topology has an evolving structure (e.g. connectivity and clustering properties changing) based on spectral analysis [15], [16]. The normalized Laplacian spectrum of physical- and logical-level backbone networks are compared, and it was identified that spectra of the motorway network is similar to physical-level backbone network [17], [18]. The spectral gap of a normalized Laplacian spectrum is utilized to identify critical nodes in a network [19]. Several spectral-related metrics (i.e. algebraic connectivity, spectral gap, network criticality) has been utilized to analyze robustness and optimize synthetically-generated random graphs [20], [21]. The AS-level topologies are analyzed and optimizations are performed against node and link deletions using normalized Laplacian spectra [22]. In this paper, we analyze the nls of physical- and logical-level five backbone provider networks under targeted attack scenarios. III. TOPOLOGICAL DATASET We utilize backbone networks that are geographically located within the contiguous US to experiment with our spectral analysis methodology. We use four commercial service provider networks: AT&T, Level 3, Sprint, and TeliaSonera, as well as the Internet2 research network. We analyze both the physical-level topologies (e.g. fiber) and logical-level (e.g. PoP-level) topologies of these networks. We also note that our objective is not to compare the performance of different service provider networks, but rather investigate the spectral properties of these realistic backbone networks under challenged conditions. The properties number of nodes, number of links, average node degree, closeness, maximum node betweenness, and maximum link betweenness of these five backbone networks are shown in Table I. Note that L1 represents physical-level and L3 represents logical-level topologies in Table I. TABLE I TOPOLOGICAL PROPERTIES OF BACKBONE NETWORKS Network Node Link Avg. Max. Node Max. Link Clo. Deg. Between. Between. AT&T L AT&T L Level 3 L Level 3 L Sprint L Sprint L TeliaSonera L TeliaSonera L Internet2 L Internet2 L We obtain the data from the KU-Topview Network Topology Tool [23]. An in-depth discussion of structural and visual

3 (a) Internet2 L1 non-degraded (b) Internet2 L1 10 nodes (c) Internet2 L1 20 nodes (d) Internet2 L1 30 nodes (e) Internet2 L1 50 nodes (f) Internet2 L1 56 nodes Fig. 1. Spectra of Internet2 backbone network based on node degree removal properties of these graphs are explained [4], [17], [18]. While the methodology presented in this paper can be applied to other datasets such as the Internet Topology Zoo [24], [25] and Rocketfuel [26], [27], we believe that the dataset we analyze suffices to present the methodology and conclusions. IV. METHODOLOGY A graph-theoretic approach is applied to evaluate the connectivity of backbone networks. The normalized Laplacian spectra (nls) is utilized to measure and observe connectivity. We use the following Python packages for our calculations: the Python NumPy package for numerical calculations [28], Python NetworkX library [29] for simulating network attacks, and Python Matplotlib 2D graphics package for plotting figures [30]. We use three node centrality measures for removal of nodes betweenness, closeness, and degree. For link removals, we use edge-betweenness measure [31]. The betweenness measure informs of the number of shortest paths that flow through a node or a link. Closeness is the reciprocal of farness and computed as the reciprocal of the sum of the distances from the given node to all the other nodes. Degree is calculated as the sum of the number of incident links to a node. While there exist many other measures [32], we want to observe how the backbone networks behave under attack scenarios using the well-known graph metrics. Investigating the nls behavior of graphs under different graph measures will be part of our future work. The sequence of steps involved in connectivity analysis of backbones is as follows. First we calculate the given graph metric for all nodes (i.e. node betweenness, closeness, or degree) or links (link betweenness). We sort the nodes or links in the descending order and remove the highest node or link. We iterate this until we reach to a set number of nodes or links. The removal scenarios are representative of intelligent targeted attacks with topological information. For this study, we set the number of components to be removed at: 10, 20, 30, 50, 100, 200, and 300. Additionally, the maximum number of nodes or links to be removed is limited by the number of nodes or links exist in a backbone network. An example node removal scenario (based on node degree) is shown in Figure 1 for the Internet2 L1 backbone network (Internet2 L1 network has 57 nodes and 65 links as listed in Table I). Figure 1a depicts the network without any node removal; Figure 1b depicts the network snapshot with 10 highest-degree nodes being removed iteratively; Figure 1c depicts the network snapshot with 20 highest-degree nodes being removed iteratively; Figure 1d depicts the network snapshot with 30 highest-degree nodes being removed iteratively; and Figure 1e depicts the network snapshot with 50 highest-degree nodes being removed iteratively. Since the number of nodes in the Internet2 L1 topology is 57 and the attack strategy is based on degree removal, the final step included removal of 56 nodes, as shown in Figure 1f. The final step in evaluating backbone network connectivity is the computation of nls. To better visualize this spectrum and

4 how the network would break down under a targeted attack, we plot the RCF (relative cumulative frequency) as we iteratively and adaptively remove network components. We note that a discussion on RCF vs. RF (relative frequency) representation of deterministic eigenvalues is discussed in our earlier work, and that for multiple lines in a plot the information presented via RF can be noisy; therefore, we use RCF in this paper to represent the nls [18]. The example RCF for the Internet2 L1 backbone network is shown in Figure 2. Each line in Figure 2 represents the RCF of the eigenvalues after a particular number of components have been removed the removal scenario in this case is determined by the degree of nodes. We note important points about inferring conclusions in looking to RCF [18], [33]. First, the number of connected components is captured by the number of zero-valued eigenvalues. For example, when the last node is remaining in the network after 56 nodes are removed, the eigenvalue of that single node is 0. Second, the nls is quasi symmetric around eigenvalue multiplicity of 1. Third, the eigenvalue multiplicity of 1 represents that there are motifs in the graph [33]. An ideally connected full-mesh graph will have all of its eigenvalues around 1 (with the exception of one 0 eigenvalue). Finally, the eigenvalues closer to 2 means graph is closer to being a bipartite graph. (a) Internet2 L1 Fig. 2. Spectra of Internet2 L1 network based on node degree removal V. RESULTS To study the possible effects of potential targeted attack comprehensively, we generate RCF plots while using important graph metrics to systematically remove network components. For the five backbone networks (including physical (L1) and logical (L3) topologies) that we analyze the normalized Laplacian spectra (nls), we have removed components based on node betweenness as shown in Figure 3, node closeness as shown in Figure 4, node degree as shown in Figure 5, and link betweenness as shown in Figure 6. From our analysis of the RCF of backbone networks, we find that as the graph becomes disconnected, an increase in the number of zerovalued eigenvalues can be clearly seen. In other words, as more disconnected components appear in the graph after each step in the removal sequence, the zero-valued eigenvalue multiplicity dominates the spectra. The visible change in the RCF plots is that the quasisymmetric diagonal line converges to be a straight line across the top portion of the spectra plots as more network components are attacked and become inoperable. Furthermore, it is apparent that certain removal algorithms are more effective at disconnecting the graphs than others. This can be seen when comparing Figure 3a (removal based on node betweenness) with Figure 5a (removal based on node degree). Figure 5a shows that almost 30% more zero-valued eigenvalue multiplicity (at 50% RCF) after 100 nodes removed based on nodedegree removal than Figure 3a that shows (at 20% RCF) after the same number of nodes (100 nodes) removed based on betweenness. When reviewing the RCFs of networks across the different removal algorithms, we juxtapose them with one another in order to gain more insight on the properties of these topologies. For AT&T L1, with a nearly diagonal RCF plot before removals, we can see the plot become a horizontal line at 300 nodes removed for betweenness-based removals (Figure 3a), 382 nodes removed for closeness-based (Figure 4a), 200 nodes removed for degree-based (Figure 5a), and 488 links removed for link-betweenness-based removals (Figure 6a). The AT&T L3 topology, originally displaying an approximately 70% RCF of eigenvalue 1 multiplicity, becomes a horizontal line when 20 nodes are attacked based on node betweenness (Figure 3b), 30 nodes are attacked based on node closeness (Figure 4b), 20 nodes attacked based on node degree (Figure 5b), and 140 links attacked based on link betweenness removals (Figure 6b). The Level 3 L1 topology, exhibiting a tight clustering of plot lines around the diagonal for most of the removal algorithms, reaches a horizontal RCF line at 98 nodes removed for both node-betweenness-based removal (Figure 3c) and node-closeness-based removal (Figure 4c), and at 50 nodes removed for degree-based (Figure 5c); indicating that a node-degree based intelligent attack would succeed in fewer number of nodes being taken out of operation. The Level 3 L3 network, which features a large S-curve before removals around multiplicity of eigenvalue 1, becomes a horizontal line at 30 nodes removed for based on node betweenness (Figure 3d), based on node closeness (Figure 4d), and based on node degree removals (Figure 5d); thus attacking the nodes via a different strategy results in an almost identical impact for this 38 node, 376 links, and 19.8 average degree Level 3 L3 topology. For link-betweenness-based removals (Figure 6d), convergence of RCF to 1 occurs when all links are removed, and we can see that the Level 3 L1 topology is the nonbipartite since eigenvalues are farthest from 2. We can observe that the Sprint L1 topology has a tight diagonal clustering of plot lines for all of the algorithms, similar to that of the Level 3 L1 topology. Its RCF plot becomes horizontal when 200 nodes are attacked based on node betweenness (Figure 3e), 263 nodes

5 (a) AT&T L1 (b) AT&T L3 (a) AT&T L1 (b) AT&T L3 (c) Level 3 L1 (d) Level 3 L3 (c) Level 3 L1 (d) Level 3 L3 (e) Sprint L1 (f) Sprint L3 (e) Sprint L1 (f) Sprint L3 (g) TeliaSonera L1 (h) TeliaSonera L3 (g) TeliaSonera L1 (h) TeliaSonera L3 (i) Internet2 L1 (j) Internet2 L3 Fig. 3. Spectra of US backbone networks based on node betweenness removal (i) Internet2 L1 (j) Internet2 L3 Fig. 4. Spectra of US backbone networks based on node closeness removal are attacked based on node closeness (Figure 4e), 200 nodes are attacked based on node degree (Figure 5e), and 300 links nodes are attacked based on link betweenness (Figure 6e). The Sprint L3 topology, which appears to originally contain most eigenvalues valued between approximately 0.4 and 1.6, exhibits a horizontal RCF plot when 20 nodes are attacked based on node betweenness (Figure 3f), node closeness (Figure 4f), and node degree (Figure 5f). The intelligent attacks against the

6 (a) AT&T L1 (b) AT&T L3 (a) AT&T L1 (b) AT&T L3 (c) Level 3 L1 (d) Level 3 L3 (c) Level 3 L1 (d) Level 3 L3 (e) Sprint L1 (f) Sprint L3 (e) Sprint L1 (f) Sprint L3 (g) TeliaSonera L1 (h) TeliaSonera L3 (g) TeliaSonera L1 (h) TeliaSonera L3 (i) Internet2 L1 (j) Internet2 L3 (i) Internet2 L1 (j) Internet2 L3 Fig. 5. Spectra of US backbone networks based on node degree removal Fig. 6. Spectra of US backbone networks based on link betweenness removal TeliaSonera physical- and logical-level topologies require the minimal number of node and link removals (Figures 3g, 4g, 5g, 6g, 3h, 4h, 5h, 6h), since these topologies are relatively smaller compared to the other backbone networks. The Internet2 L1 topology, which can be observed to have a tight clustering of removal plots across the diagonal for most of the removal algorithms (similar to that of AT&T L1, Sprint L1, and Level 3 L1), exhibits a horizontal RCF plot at 56 nodes removed

7 for node-betweenness-based removals (Figure 3i), at 50 nodes removed for node-closeness-based removals (Figure 4i), at 30 nodes removed for node-degree-based removals (Figure 5i). The inferred conclusion is that degree-based attacks cause the most degrading impact in the case of Internet2 L1 topology. When comparing the Internet2 L1 spectra to that of Internet2 L3 spectra (Figures 3j, 4j, 5j, 6j), we observe that due to the smaller size of the Internet2 L3 network, it takes less effort to partition this network. We can observe this trait as one of the main discernible differences between L1 and L3 network structures; the logical topologies (L3) of the discussed networks have fewer nodes than the physical topologies (L1), requiring fewer node removals to cause significant partitioning in the network. Moreover, the star-like structures that many of the logical topologies contain are particularly vulnerable to node removals, due to the termination of numerous edge connections when a single node is removed as opposed to the two or three edge connections commonly seen for nodes in physical topologies. We can also observe that the logical topologies of several networks require fewer edge removals (Figure 6) than their physical topologies in order to cause significant partitioning, with the notable exception being Level 3 L3 (Figure 6d) and TeliaSonera L3 (Figure 6h). The Level 3 L3 (Figure 6d) has approximately 25% RCF of zero-valued eigenvalue multiplicity after 100 edge removals, compared to Level 3 L1 s (Figure 6c) approximately 75% RCF for zero-valued eigenvalue multiplicity after the same amount of edge removals. TeliaSonera L3 (Figure 6h) has approximately 50% RCF of zero-valued eigenvalue multiplicity after 20 edge removals, compared to TeliaSonera L1 s (Figure 6g) 75% RCF for zero-valued eigenvalue multiplicity after the same amount of removals. Comparing and contrasting these topologies and their normalized eigenvalue spectrums provides us with valuable visual information that can be used to understand connectivity behavior. Moreover, insights can help optimize backbone networks against targeted attacks. VI. CONCLUSIONS AND FUTURE WORK Single-valued graph metrics might be misleading to evaluate and compare network performance. The normalized Laplacian spectra (nls) can provide very useful visual information provider in how networks perform under attacks leading to hardening networks. We study the nls of five backbone networks under attack scenarios that are based on graph centrality metrics such as betweenness, closeness, and degree. We observe that the RCF line converges from a quasi-symmetric diagonal line to a straight line atop as more nodes (or links) are removed. Second, in some cases (e.g. Internet2 L1 topology), different attack strategies yield different results (node degree cause more degradation than node betweenness). In other cases (e.g. Level 3 L3 topology), the attack strategy yields identical results for 30 node removal based on betweenness, closeness, and degree. Third, we observe that removing the nodes have a greater degrading impact compared to removing the links, since removal of a node results in removal of all incident edges to that node. Since we utilize the nls, which is normalized based on degree of nodes, the level of connectivity is comparable across networks of different order and size. For our future work, we will investigate different attack strategies using different graph metrics. The bipartiteness and connectivity of the weighted graphs is also worth further investigation. Finally, we will utilize the methodology presented in this paper to harden networks against attacks. ACKNOWLEDGMENT We would like to acknowledge members of the Complex Networks and Systems (CoNetS) group for discussions on this work. Tristan A. Shatto is in part supported by Missouri University of Science and Technology (Missouri S&T) Opportunities for Undergraduate Research Experiences (OURE) Program. REFERENCES [1] J. C. Doyle, D. L. Alderson, L. Li, S. Low, M. Roughan, S. Shalunov, R. Tanaka, and W. Willinger, The robust yet fragile nature of the Internet, Proceedings of the National Academy of Sciences of the United States of America, vol. 102, no. 41, pp , [2] M. Roughan, W. Willinger, O. Maennel, D. Perouli, and R. Bush, 10 Lessons from 10 Years of Measuring and Modeling the Internet s Autonomous Systems, IEEE Journal on Selected Areas in Communications, vol. 29, no. 9, pp , [3] H. Haddadi, M. Rio, G. Iannaccone, A. Moore, and R. Mortier, Network topologies: Inference, modeling, and generation, IEEE Communications Surveys & Tutorials, vol. 10, no. 2, pp , [4] E. K. Çetinkaya, M. J. Alenazi, Y. Cheng, A. M. Peck, and J. P. Sterbenz, A comparative analysis of geometric graph models for modelling backbone networks, Optical Switching and Networking, vol. 14, Part 2, pp , August [5] J. P. G. Sterbenz, D. Hutchison, E. K. Çetinkaya, A. Jabbar, J. P. Rohrer, M. Schöller, and P. Smith, Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines, Computer Networks, vol. 54, no. 8, pp , [6] B. Donnet and T. Friedman, Internet topology discovery: a survey, IEEE Communications Surveys & Tutorials, vol. 9, no. 4, pp , [7] F. R. K. Chung, Spectral Graph Theory. American Mathematical Society, [8] P. Van Mieghem, Graph Spectra for Complex Networks. Cambridge University Press, [9] N. Biggs, Algebraic Graph Theory. Cambridge University Press, 2nd ed., [10] A. E. Brouwer and W. H. Haemers, Spectra of Graphs. Springer New York, [11] D. Cvetković, P. Rowlinson, and S. Simić, An Introduction to the Theory of Graph Spectra. London Mathematical Society, [12] D. Vukadinović, P. Huang, and T. Erlebach, On the Spectrum and Structure of Internet Topology Graphs, in Proceedings of the Second International Workshop on Innovative Internet Computing Systems (IICS), vol of Lecture Notes in Computer Science, pp , June [13] C. Gkantsidis, M. Mihail, and E. Zegura, Spectral Analysis of Internet Topologies, in Proceedings of the IEEE INFOCOM, vol. 1, (San Francisco, CA), pp , April [14] A. Jamaković and P. Van Mieghem, The Laplacian Spectrum of Complex Networks, in Proceedings of the European Conference on Complex Systems (ECCS), (Oxford), September [15] D. Fay, H. Haddadi, A. Thomason, A. Moore, R. Mortier, A. Jamakovic, S. Uhlig, and M. Rio, Weighted Spectral Distribution for Internet Topology Analysis: Theory and Applications, IEEE/ACM Transactions on Networking, vol. 18, no. 1, pp , [16] L. Trajković, Analysis of Internet Topologies, IEEE Circuits and Systems Magazine, vol. 10, no. 3, pp , 2010.

8 [17] E. K. Çetinkaya, M. J. F. Alenazi, J. P. Rohrer, and J. P. G. Sterbenz, Topology Connectivity Analysis of Internet Infrastructure Using Graph Spectra, in Proceedings of the 4th IEEE/IFIP International Workshop on Reliable Networks Design and Modeling (RNDM), (St. Petersburg), pp , October [18] E. K. Çetinkaya, M. J. F. Alenazi, A. M. Peck, J. P. Rohrer, and J. P. G. Sterbenz, Multilevel Resilience Analysis of Transportation and Communication Networks, Telecommunication Systems, vol. 60, pp , December [19] K. Wehmuth and A. Ziviani, Distributed Location of the Critical Nodes to Network Robustness based on Spectral Analysis, in Proceedings of the IEEE 7th Latin American Network Operations and Management Symposium (LANOMS), (Quito, Ecuador), pp. 1 8, October [20] M. J. Alenazi, E. K. Çetinkaya, and J. P. Sterbenz, Cost-efficient algebraic connectivity optimisation of backbone networks, Optical Switching and Networking, vol. 14, Part 2, pp , August [21] M. J. Alenazi and J. P. Sterbenz, Evaluation and Improvement of Network Resilience against Attacks using Graph Spectral Metrics, in Proceedings of the Resilience Week Symposia (RWS), (Philadelphia, PA), pp , August [22] B. Jiao and J. mai Shi, Graph perturbations and corresponding spectral changes in Internet topologies, Computer Communications, vol. 76, pp , February [23] J. P. Sterbenz, J. P. Rohrer, E. K. Çetinkaya, M. J. Alenazi, A. Cosner, and J. Rolfe, KU-Topview Network Topology Tool. ku.edu/resilinets/maps/, [24] The Internet Topology Zoo. [25] S. Knight, H. X. Nguyen, N. Falkner, R. Bowden, and M. Roughan, The Internet Topology Zoo, IEEE Journal on Selected Areas in Communications, vol. 29, no. 9, pp , [26] Rocketfuel: An ISP topology mapping engine. washington.edu/research/networking/rocketfuel/interactive, [27] N. Spring, R. Mahajan, D. Wetherall, and T. Anderson, Measuring ISP topologies with Rocketfuel, IEEE/ACM Transactions on Networking, vol. 12, pp. 2 16, February [28] S. van der Walt, S. C. Colbert, and G. Varoquaux, The NumPy Array: A Structure for Efficient Numerical Computation, Computing in Science & Engineering, vol. 13, pp , March [29] A. A. Hagberg, D. A. Schult, and P. J. Swart, Exploring Network Structure, Dynamics, and Function using NetworkX, in Proceedings of the 7th Python in Science Conference (SciPy), (Pasadena, CA), pp , August [30] J. D. Hunter, Matplotlib: A 2D Graphics Environment, Computing in Science & Engineering, vol. 9, pp , May [31] L. C. Freeman, Centrality in social networks conceptual clarification, Social Networks, vol. 1, no. 3, pp , [32] L. d. F. Costa, F. A. Rodrigues, G. Travieso, and P. R. Villas Boas, Characterization of complex networks: A survey of measurements, Advances in Physics, vol. 56, no. 1, pp , [33] A. Banerjee and J. Jost, Spectral characterization of network structures and dynamics, in Dynamics On and Of Complex Networks (N. Ganguly, A. Deutsch, and A. Mukherjee, eds.), Modeling and Simulation in Science, Engineering and Technology, pp , Birkhäuser Boston, 2009.

Resilient Networks Missouri S&T University CPE 6510 Graph Robustness and Algorithms

Resilient Networks Missouri S&T University CPE 6510 Graph Robustness and Algorithms Resilient Networks Missouri S&T University CPE 6510 Graph Robustness and Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science

More information

Multilevel Resilience Analysis of Transportation and Communication Networks

Multilevel Resilience Analysis of Transportation and Communication Networks Telecommunication Systems Multilevel Resilience Analysis of Transportation and Communication Networks Egemen K. Çetinkaya Mohammed J.F. Alenazi Andrew M. Peck Justin P. Rohrer* James P.G. Sterbenz Received:

More information

On the Fitness of Geographic Graph Generators for Modelling Physical Level Topologies

On the Fitness of Geographic Graph Generators for Modelling Physical Level Topologies This paper was presented at RNDM 2013-5 th International Workshop on Reliable Networks Design and Modeling, co-located with ICUMT 2013 Congress (Sept. 10-12, 2013, Almaty, KZ) On the Fitness of Geographic

More information

Analysis of Internet Topologies

Analysis of Internet Topologies Feature XIAOFAN LIU Ljiljana Trajković Analysis of Internet Topologies Abstract The discovery of power-laws and spectral properties of the Internet topology illustrates a complex underlying network infrastructure

More information

Network Resilience Improvement and Evaluation Using Link Additions Ph.D. Dissertation Defense

Network Resilience Improvement and Evaluation Using Link Additions Ph.D. Dissertation Defense Network Resilience Improvement and Evaluation Using Link Additions Ph.D. Dissertation Defense Mohammed J.F. Advisor: James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information

More information

POWER-LAWS AND SPECTRAL ANALYSIS OF THE INTERNET TOPOLOGY

POWER-LAWS AND SPECTRAL ANALYSIS OF THE INTERNET TOPOLOGY POWER-LAWS AND SPECTRAL ANALYSIS OF THE INTERNET TOPOLOGY Laxmi Subedi Communication Networks Laboratory http://www.ensc.sfu.ca/~ljilja/cnl/ School of Engineering Science Simon Fraser University Roadmap

More information

Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1

Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanfordedu) February 6, 2018 Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1 In the

More information

KU-LocGen: Location and Cost-Constrained Network Topology Generator

KU-LocGen: Location and Cost-Constrained Network Topology Generator The University of Kansas Technical Report KU-LocGen: Location and Cost-Constrained Network Topology Generator Abdul Jabbar, Qian Shi, Egeman Çetinkaya and James P. G. Sterbenz ITTC-FY29-TR--1 December

More information

Robustness of Mobile Ad Hoc Networks Under Centrality-Based Attacks

Robustness of Mobile Ad Hoc Networks Under Centrality-Based Attacks This paper was presented at RNDM 1-5 th International Workshop on Reliable Networks Design and Modeling, co-located with ICUMT 1 Congress (Sept. 1-1, 1, Almaty, KZ) Robustness of Mobile Ad Hoc Networks

More information

On the Vulnerability of Multi-level Communication Network under Catastrophic Events

On the Vulnerability of Multi-level Communication Network under Catastrophic Events On the Vulnerability of Multi-level Communication Network under Catastrophic Events Pankaz Das, Mahshid Rahnamay-Naeini, Nasir Ghani, and Majeed M. Hayat Department of Electrical and Computer Engineering,

More information

Deriving Network Topologies from Real World Constraints

Deriving Network Topologies from Real World Constraints IEEE Globecom 2010 Workshop on Complex and Communication Networks Deriving Network Topologies from Real World Constraints Mahmood A. Hameed, Abdul Jabbar, Egemen K. Çetinkaya, James P. G. Sterbenz Information

More information

Robustness of Centrality Measures for Small-World Networks Containing Systematic Error

Robustness of Centrality Measures for Small-World Networks Containing Systematic Error Robustness of Centrality Measures for Small-World Networks Containing Systematic Error Amanda Lannie Analytical Systems Branch, Air Force Research Laboratory, NY, USA Abstract Social network analysis is

More information

Keeping the Connectivity and Saving the Energy in the Internet

Keeping the Connectivity and Saving the Energy in the Internet IEEE INFOCOM 11 Workshop on Green Communications and Networking Keeping the Connectivity and Saving the Energy in the Internet Francesca Cuomo, Anna Abbagnale, Antonio Cianfrani, Marco Polverini DIET,

More information

Lecture 4. Does the Internet have an Achilles' heel?

Lecture 4. Does the Internet have an Achilles' heel? Lecture 4 Does the Internet have an Achilles' heel? Outline Definition Arguments for that the Internet have an Achilles' heel. Arguments against that the Internet have an Achilles' heel. Network throughput

More information

Structural Evolution of the Internet Topology

Structural Evolution of the Internet Topology Structural Evolution of the Internet Topology Hamed Haddadi Hamed.haddadi@cl.cam.ac.uk 9th November 2010 Mphil ACS Network Architecture Internet Topology Inference Characterisation Generation Evolution

More information

Distributed Location of the Critical Nodes to Network Robustness based on Spectral Analysis

Distributed Location of the Critical Nodes to Network Robustness based on Spectral Analysis Distributed Location of the Critical Nodes to Network Robustness based on Spectral Analysis Klaus Wehmuth and Artur Ziviani National Laboratory for Scientific Computing (LNCC) Av, Getúlio Vargas, 333 25651-075

More information

Algebraic Graph Theory- Adjacency Matrix and Spectrum

Algebraic Graph Theory- Adjacency Matrix and Spectrum Algebraic Graph Theory- Adjacency Matrix and Spectrum Michael Levet December 24, 2013 Introduction This tutorial will introduce the adjacency matrix, as well as spectral graph theory. For those familiar

More information

Available online at ScienceDirect. Procedia Computer Science 20 (2013 )

Available online at  ScienceDirect. Procedia Computer Science 20 (2013 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 20 (2013 ) 522 527 Complex Adaptive Systems, Publication 3 Cihan H. Dagli, Editor in Chief Conference Organized by Missouri

More information

ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT

ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT ALTERNATIVES TO BETWEENNESS CENTRALITY: A MEASURE OF CORRELATION COEFFICIENT Xiaojia He 1 and Natarajan Meghanathan 2 1 University of Georgia, GA, USA, 2 Jackson State University, MS, USA 2 natarajan.meghanathan@jsums.edu

More information

Clustering Using Graph Connectivity

Clustering Using Graph Connectivity Clustering Using Graph Connectivity Patrick Williams June 3, 010 1 Introduction It is often desirable to group elements of a set into disjoint subsets, based on the similarity between the elements in the

More information

Graphs, Zeta Functions, Diameters, and Cospectrality

Graphs, Zeta Functions, Diameters, and Cospectrality Graphs, Zeta Functions, Diameters, and Cospectrality Sarah Elghraoui University of California, San Diego Undergraduate Mathematics Honors Thesis June 1, 2010 Faculty Mentor: Professor Audrey Terras University

More information

The clustering in general is the task of grouping a set of objects in such a way that objects

The clustering in general is the task of grouping a set of objects in such a way that objects Spectral Clustering: A Graph Partitioning Point of View Yangzihao Wang Computer Science Department, University of California, Davis yzhwang@ucdavis.edu Abstract This course project provide the basic theory

More information

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University park.764@osu.edu yilmaz.15@osu.edu ABSTRACT Depending

More information

Graph drawing in spectral layout

Graph drawing in spectral layout Graph drawing in spectral layout Maureen Gallagher Colleen Tygh John Urschel Ludmil Zikatanov Beginning: July 8, 203; Today is: October 2, 203 Introduction Our research focuses on the use of spectral graph

More information

Social-Network Graphs

Social-Network Graphs Social-Network Graphs Mining Social Networks Facebook, Google+, Twitter Email Networks, Collaboration Networks Identify communities Similar to clustering Communities usually overlap Identify similarities

More information

An Introduction to Graph Theory

An Introduction to Graph Theory An Introduction to Graph Theory CIS008-2 Logic and Foundations of Mathematics David Goodwin david.goodwin@perisic.com 12:00, Friday 17 th February 2012 Outline 1 Graphs 2 Paths and cycles 3 Graphs and

More information

Weighted Algebraic Connectivity: An Application to Airport Transportation Network

Weighted Algebraic Connectivity: An Application to Airport Transportation Network Weighted Algebraic Connectivity: An Application to Airport Transportation Network Peng Wei Dengfeng Sun Purdue University, West Lafayette, IN 4797 USA (e-mail: {weip, dsun}@purdue.edu) Abstract: The airport

More information

Comparison of Centralities for Biological Networks

Comparison of Centralities for Biological Networks Comparison of Centralities for Biological Networks Dirk Koschützki and Falk Schreiber Bioinformatics Center Gatersleben-Halle Institute of Plant Genetics and Crop Plant Research Corrensstraße 3 06466 Gatersleben,

More information

ResTP A Transport Protocol for Future Internet Resilience

ResTP A Transport Protocol for Future Internet Resilience A Transport Protocol for Future Internet Resilience Anh Nguyen, Justin P. Rohrer, and James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Network Delay Model for Overlay Network Application

Network Delay Model for Overlay Network Application , 2009, 5, 400-406 doi:10.4236/ijcns.2009.25045 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Network Delay Model for Overlay Network Application Tian JIN, Haiyan JIN School of Electronics

More information

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1

More information

Mining Social Network Graphs

Mining Social Network Graphs Mining Social Network Graphs Analysis of Large Graphs: Community Detection Rafael Ferreira da Silva rafsilva@isi.edu http://rafaelsilva.com Note to other teachers and users of these slides: We would be

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

Estimating normal vectors and curvatures by centroid weights

Estimating normal vectors and curvatures by centroid weights Computer Aided Geometric Design 21 (2004) 447 458 www.elsevier.com/locate/cagd Estimating normal vectors and curvatures by centroid weights Sheng-Gwo Chen, Jyh-Yang Wu Department of Mathematics, National

More information

Experimental Node Failure Analysis in WSNs

Experimental Node Failure Analysis in WSNs Experimental Node Failure Analysis in WSNs Jozef Kenyeres 1.2, Martin Kenyeres 2, Markus Rupp 1 1) Vienna University of Technology, Institute of Communications, Vienna, Austria 2) Slovak University of

More information

Assessing and Safeguarding Network Resilience to Nodal Attacks

Assessing and Safeguarding Network Resilience to Nodal Attacks Assessing and Safeguarding Network Resilience to Nodal Attacks Pin-Yu Chen and Alfred O. Hero III, Fellow, IEEE Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor,

More information

REGULAR GRAPHS OF GIVEN GIRTH. Contents

REGULAR GRAPHS OF GIVEN GIRTH. Contents REGULAR GRAPHS OF GIVEN GIRTH BROOKE ULLERY Contents 1. Introduction This paper gives an introduction to the area of graph theory dealing with properties of regular graphs of given girth. A large portion

More information

Spectral Clustering X I AO ZE N G + E L HA M TA BA S SI CS E CL A S S P R ESENTATION MA RCH 1 6,

Spectral Clustering X I AO ZE N G + E L HA M TA BA S SI CS E CL A S S P R ESENTATION MA RCH 1 6, Spectral Clustering XIAO ZENG + ELHAM TABASSI CSE 902 CLASS PRESENTATION MARCH 16, 2017 1 Presentation based on 1. Von Luxburg, Ulrike. "A tutorial on spectral clustering." Statistics and computing 17.4

More information

A Study of Graph Spectra for Comparing Graphs

A Study of Graph Spectra for Comparing Graphs A Study of Graph Spectra for Comparing Graphs Ping Zhu and Richard C. Wilson Computer Science Department University of York, UK Abstract The spectrum of a graph has been widely used in graph theory to

More information

Spectral Clustering on Handwritten Digits Database

Spectral Clustering on Handwritten Digits Database October 6, 2015 Spectral Clustering on Handwritten Digits Database Danielle dmiddle1@math.umd.edu Advisor: Kasso Okoudjou kasso@umd.edu Department of Mathematics University of Maryland- College Park Advance

More information

Reducing the Size of Routing Tables for Large-scale Network Simulation

Reducing the Size of Routing Tables for Large-scale Network Simulation Reducing the Size of Routing Tables for Large-scale Network Simulation Akihito Hiromori, Hirozumi Yamaguchi, Keiichi Yasumoto, Teruo Higashino and Kenichi Taniguchi Graduate School of Engineering Science,

More information

Spectral Clustering. Presented by Eldad Rubinstein Based on a Tutorial by Ulrike von Luxburg TAU Big Data Processing Seminar December 14, 2014

Spectral Clustering. Presented by Eldad Rubinstein Based on a Tutorial by Ulrike von Luxburg TAU Big Data Processing Seminar December 14, 2014 Spectral Clustering Presented by Eldad Rubinstein Based on a Tutorial by Ulrike von Luxburg TAU Big Data Processing Seminar December 14, 2014 What are we going to talk about? Introduction Clustering and

More information

APD tool: Mining Anomalous Patterns from Event Logs

APD tool: Mining Anomalous Patterns from Event Logs APD tool: Mining Anomalous Patterns from Event Logs Laura Genga 1, Mahdi Alizadeh 1, Domenico Potena 2, Claudia Diamantini 2, and Nicola Zannone 1 1 Eindhoven University of Technology 2 Università Politecnica

More information

MVAPICH2 vs. OpenMPI for a Clustering Algorithm

MVAPICH2 vs. OpenMPI for a Clustering Algorithm MVAPICH2 vs. OpenMPI for a Clustering Algorithm Robin V. Blasberg and Matthias K. Gobbert Naval Research Laboratory, Washington, D.C. Department of Mathematics and Statistics, University of Maryland, Baltimore

More information

Parallel Evaluation of Hopfield Neural Networks

Parallel Evaluation of Hopfield Neural Networks Parallel Evaluation of Hopfield Neural Networks Antoine Eiche, Daniel Chillet, Sebastien Pillement and Olivier Sentieys University of Rennes I / IRISA / INRIA 6 rue de Kerampont, BP 818 2232 LANNION,FRANCE

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Statistical Physics of Community Detection

Statistical Physics of Community Detection Statistical Physics of Community Detection Keegan Go (keegango), Kenji Hata (khata) December 8, 2015 1 Introduction Community detection is a key problem in network science. Identifying communities, defined

More information

Network Theory: Social, Mythological and Fictional Networks. Math 485, Spring 2018 (Midterm Report) Christina West, Taylor Martins, Yihe Hao

Network Theory: Social, Mythological and Fictional Networks. Math 485, Spring 2018 (Midterm Report) Christina West, Taylor Martins, Yihe Hao Network Theory: Social, Mythological and Fictional Networks Math 485, Spring 2018 (Midterm Report) Christina West, Taylor Martins, Yihe Hao Abstract: Comparative mythology is a largely qualitative and

More information

Virtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements

Virtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements Proceedings of the Applied Telecommunication Symposium (part of Advanced Simulation Technologies Conference) Seattle, Washington, USA, April 22 26, 21 Virtual Circuit Blocking Probabilities in an ATM Banyan

More information

Centrality Measures to Identify Traffic Congestion on Road Networks: A Case Study of Sri Lanka

Centrality Measures to Identify Traffic Congestion on Road Networks: A Case Study of Sri Lanka IOSR Journal of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn: 2319-765X. Volume 13, Issue 2 Ver. I (Mar. - Apr. 2017), PP 13-19 www.iosrjournals.org Centrality Measures to Identify Traffic Congestion

More information

AS Router Connectedness Based on Multiple Vantage Points and the Resulting Topologies

AS Router Connectedness Based on Multiple Vantage Points and the Resulting Topologies AS Router Connectedness Based on Multiple Vantage Points and the Resulting Topologies Steven Fisher University of Nevada, Reno CS 765 Steven Fisher (UNR) CS 765 CS 765 1 / 62 Table of Contents 1 Introduction

More information

Graph Sampling Approach for Reducing. Computational Complexity of. Large-Scale Social Network

Graph Sampling Approach for Reducing. Computational Complexity of. Large-Scale Social Network Journal of Innovative Technology and Education, Vol. 3, 216, no. 1, 131-137 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/1.12988/jite.216.6828 Graph Sampling Approach for Reducing Computational Complexity

More information

Lecture 11: Clustering and the Spectral Partitioning Algorithm A note on randomized algorithm, Unbiased estimates

Lecture 11: Clustering and the Spectral Partitioning Algorithm A note on randomized algorithm, Unbiased estimates CSE 51: Design and Analysis of Algorithms I Spring 016 Lecture 11: Clustering and the Spectral Partitioning Algorithm Lecturer: Shayan Oveis Gharan May nd Scribe: Yueqi Sheng Disclaimer: These notes have

More information

Use of Eigenvector Centrality to Detect Graph Isomorphism

Use of Eigenvector Centrality to Detect Graph Isomorphism Use of Eigenvector Centrality to Detect Graph Isomorphism Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson MS 39217, USA E-mail: natarajan.meghanathan@jsums.edu

More information

Low-cost Enhancement of the Intra-domain Internet Robustness Against Intelligent Node Attacks

Low-cost Enhancement of the Intra-domain Internet Robustness Against Intelligent Node Attacks Low-cost Enhancement of the Intra-domain Internet Robustness Against Intelligent Node Attacks Panagiotis Pantazopoulos Ioannis Stavrakakis Department of Informatics and Telecommunications, Advanced Networking

More information

CS 229 Final Project - Using machine learning to enhance a collaborative filtering recommendation system for Yelp

CS 229 Final Project - Using machine learning to enhance a collaborative filtering recommendation system for Yelp CS 229 Final Project - Using machine learning to enhance a collaborative filtering recommendation system for Yelp Chris Guthrie Abstract In this paper I present my investigation of machine learning as

More information

Orthogonal representations, minimum rank, and graph complements

Orthogonal representations, minimum rank, and graph complements Orthogonal representations, minimum rank, and graph complements Leslie Hogben March 30, 2007 Abstract Orthogonal representations are used to show that complements of certain sparse graphs have (positive

More information

A Construction of Cospectral Graphs

A Construction of Cospectral Graphs Project Number: MA-PRC-3271 A Construction of Cospectral Graphs A Major Qualifying Project Report submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements

More information

On the relationship between the algebraic connectivity and graph s robustness to node and link failures

On the relationship between the algebraic connectivity and graph s robustness to node and link failures On the relationship between the algebraic connectivity and graph s robustness to node and link failures A. Jamakovic, S. Uhlig Delft University of Technology Electrical Engineering, Mathematics and Computer

More information

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry

More information

Maximizing Reliability in WDM Networks through Lightpath Routing

Maximizing Reliability in WDM Networks through Lightpath Routing Maximizing Reliability in WDM Networks through Lightpath Routing The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published

More information

An Approach to Identify the Number of Clusters

An Approach to Identify the Number of Clusters An Approach to Identify the Number of Clusters Katelyn Gao Heather Hardeman Edward Lim Cristian Potter Carl Meyer Ralph Abbey July 11, 212 Abstract In this technological age, vast amounts of data are generated.

More information

ITTC Science of Communication Networks The University of Kansas EECS 784 Graph Theory

ITTC Science of Communication Networks The University of Kansas EECS 784 Graph Theory Science of Communication Networks The University of Kansas EECS 784 Graph Theory James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

CSCI5070 Advanced Topics in Social Computing

CSCI5070 Advanced Topics in Social Computing CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Graphs Origins Definition Spectral Properties Type of

More information

My favorite application using eigenvalues: partitioning and community detection in social networks

My favorite application using eigenvalues: partitioning and community detection in social networks My favorite application using eigenvalues: partitioning and community detection in social networks Will Hobbs February 17, 2013 Abstract Social networks are often organized into families, friendship groups,

More information

Complementary Graph Coloring

Complementary Graph Coloring International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) Global Society of Scientific Research and Researchers http://ijcjournal.org/ Complementary Graph Coloring Mohamed Al-Ibrahim a*,

More information

Spectral Methods for Network Community Detection and Graph Partitioning

Spectral Methods for Network Community Detection and Graph Partitioning Spectral Methods for Network Community Detection and Graph Partitioning M. E. J. Newman Department of Physics, University of Michigan Presenters: Yunqi Guo Xueyin Yu Yuanqi Li 1 Outline: Community Detection

More information

A Genetic Algorithm for Graph Matching using Graph Node Characteristics 1 2

A Genetic Algorithm for Graph Matching using Graph Node Characteristics 1 2 Chapter 5 A Genetic Algorithm for Graph Matching using Graph Node Characteristics 1 2 Graph Matching has attracted the exploration of applying new computing paradigms because of the large number of applications

More information

Kirchhoff's theorem. Contents. An example using the matrix-tree theorem

Kirchhoff's theorem. Contents. An example using the matrix-tree theorem Kirchhoff's theorem From Wikipedia, the free encyclopedia In the mathematical field of graph theory, Kirchhoff's theorem or Kirchhoff's matrix tree theorem named after Gustav Kirchhoff is a theorem about

More information

The missing links in the BGP-based AS connectivity maps

The missing links in the BGP-based AS connectivity maps The missing links in the BGP-based AS connectivity maps Zhou, S; Mondragon, RJ http://arxiv.org/abs/cs/0303028 For additional information about this publication click this link. http://qmro.qmul.ac.uk/xmlui/handle/123456789/13070

More information

Graph Theory. Graph Theory. COURSE: Introduction to Biological Networks. Euler s Solution LECTURE 1: INTRODUCTION TO NETWORKS.

Graph Theory. Graph Theory. COURSE: Introduction to Biological Networks. Euler s Solution LECTURE 1: INTRODUCTION TO NETWORKS. Graph Theory COURSE: Introduction to Biological Networks LECTURE 1: INTRODUCTION TO NETWORKS Arun Krishnan Koenigsberg, Russia Is it possible to walk with a route that crosses each bridge exactly once,

More information

The number of spanning trees of plane graphs with reflective symmetry

The number of spanning trees of plane graphs with reflective symmetry Journal of Combinatorial Theory, Series A 112 (2005) 105 116 www.elsevier.com/locate/jcta The number of spanning trees of plane graphs with reflective symmetry Mihai Ciucu a, Weigen Yan b, Fuji Zhang c

More information

Introduction aux Systèmes Collaboratifs Multi-Agents

Introduction aux Systèmes Collaboratifs Multi-Agents M1 EEAII - Découverte de la Recherche (ViRob) Introduction aux Systèmes Collaboratifs Multi-Agents UPJV, Département EEA Fabio MORBIDI Laboratoire MIS Équipe Perception et Robotique E-mail: fabio.morbidi@u-picardie.fr

More information

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur Lecture : Graphs Rajat Mittal IIT Kanpur Combinatorial graphs provide a natural way to model connections between different objects. They are very useful in depicting communication networks, social networks

More information

GRAPH theory is a study in mathematical science that

GRAPH theory is a study in mathematical science that INTERNATIONAL JOURNAL OF COMPUTING SCIENCE AND APPLIED MATHEMATICS, VOL. 3, NO. 1, FEBRUARY 2017 11 A Study on Parthenogenesis of Petersen Graph Siti Amiroch and Danang Kiratama Abstract Genetics is the

More information

On the null space of a Colin de Verdière matrix

On the null space of a Colin de Verdière matrix On the null space of a Colin de Verdière matrix László Lovász 1 and Alexander Schrijver 2 Dedicated to the memory of François Jaeger Abstract. Let G = (V, E) be a 3-connected planar graph, with V = {1,...,

More information

arxiv: v1 [math.co] 7 Dec 2018

arxiv: v1 [math.co] 7 Dec 2018 SEQUENTIALLY EMBEDDABLE GRAPHS JACKSON AUTRY AND CHRISTOPHER O NEILL arxiv:1812.02904v1 [math.co] 7 Dec 2018 Abstract. We call a (not necessarily planar) embedding of a graph G in the plane sequential

More information

Taxonomy Dimensions of Complexity Metrics

Taxonomy Dimensions of Complexity Metrics 96 Int'l Conf. Software Eng. Research and Practice SERP'15 Taxonomy Dimensions of Complexity Metrics Bouchaib Falah 1, Kenneth Magel 2 1 Al Akhawayn University, Ifrane, Morocco, 2 North Dakota State University,

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete

More information

Data Mining and. in Dynamic Networks

Data Mining and. in Dynamic Networks Data Mining and Knowledge Discovery in Dynamic Networks Panos M. Pardalos Center for Applied Optimization Dept. of Industrial & Systems Engineering Affiliated Faculty of: Computer & Information Science

More information

Clustering. SC4/SM4 Data Mining and Machine Learning, Hilary Term 2017 Dino Sejdinovic

Clustering. SC4/SM4 Data Mining and Machine Learning, Hilary Term 2017 Dino Sejdinovic Clustering SC4/SM4 Data Mining and Machine Learning, Hilary Term 2017 Dino Sejdinovic Clustering is one of the fundamental and ubiquitous tasks in exploratory data analysis a first intuition about the

More information

Distributed Detection in Sensor Networks: Connectivity Graph and Small World Networks

Distributed Detection in Sensor Networks: Connectivity Graph and Small World Networks Distributed Detection in Sensor Networks: Connectivity Graph and Small World Networks SaeedA.AldosariandJoséM.F.Moura Electrical and Computer Engineering Department Carnegie Mellon University 5000 Forbes

More information

Large System Decomposition and Simulation Methodology Using Axiomatic Analysis

Large System Decomposition and Simulation Methodology Using Axiomatic Analysis 1 Large System Decomposition and Simulation Methodology Using Axiomatic Analysis L. Spenner, P. Krier, M. Thornton, S. Nair, S. Szygenda, and T. Manikas High Assurance Computing and Networking Laboratories

More information

1. Discovering Important Nodes through Graph Entropy The Case of Enron Database

1. Discovering Important Nodes through Graph Entropy The Case of Enron  Database 1. Discovering Important Nodes through Graph Entropy The Case of Enron Email Database ACM KDD 2005 Chicago, Illinois. 2. Optimizing Video Search Reranking Via Minimum Incremental Information Loss ACM MIR

More information

Simplicial Complexes of Networks and Their Statistical Properties

Simplicial Complexes of Networks and Their Statistical Properties Simplicial Complexes of Networks and Their Statistical Properties Slobodan Maletić, Milan Rajković*, and Danijela Vasiljević Institute of Nuclear Sciences Vinča, elgrade, Serbia *milanr@vin.bg.ac.yu bstract.

More information

Social Network Analysis

Social Network Analysis Social Network Analysis Mathematics of Networks Manar Mohaisen Department of EEC Engineering Adjacency matrix Network types Edge list Adjacency list Graph representation 2 Adjacency matrix Adjacency matrix

More information

A Recursive Construction of the Regular Exceptional Graphs with Least Eigenvalue 2

A Recursive Construction of the Regular Exceptional Graphs with Least Eigenvalue 2 Portugal. Math. (N.S.) Vol. xx, Fasc., 200x, xxx xxx Portugaliae Mathematica c European Mathematical Society A Recursive Construction of the Regular Exceptional Graphs with Least Eigenvalue 2 I. Barbedo,

More information

Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction

Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction Journal of Physics: Conference Series PAPER OPEN ACCESS Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction To cite this article: I Mardhiyah et al 2016 J. Phys.: Conf. Ser. 725

More information

Defending MANET against Blackhole Attackusing Modified AODV

Defending MANET against Blackhole Attackusing Modified AODV IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 2 August 214 ISSN(online) : 2349-784X Defending MANET against Blackhole Attackusing Modified AODV Devang S. Patel P.G. Student

More information

Orthogonal representations, minimum rank, and graph complements

Orthogonal representations, minimum rank, and graph complements Orthogonal representations, minimum rank, and graph complements Leslie Hogben November 24, 2007 Abstract Orthogonal representations are used to show that complements of certain sparse graphs have (positive

More information

AS Connectedness Based on Multiple Vantage Points and the Resulting Topologies

AS Connectedness Based on Multiple Vantage Points and the Resulting Topologies AS Connectedness Based on Multiple Vantage Points and the Resulting Topologies Steven Fisher University of Nevada, Reno CS 765 Steven Fisher (UNR) CS 765 CS 765 1 / 28 Table of Contents 1 Introduction

More information

A DISCUSSION ON SSP STRUCTURE OF PAN, HELM AND CROWN GRAPHS

A DISCUSSION ON SSP STRUCTURE OF PAN, HELM AND CROWN GRAPHS VOL. 10, NO. 9, MAY 015 ISSN 1819-6608 A DISCUSSION ON SSP STRUCTURE OF PAN, HELM AND CROWN GRAPHS R. Mary Jeya Jothi Department of Mathematics, Sathyabama University, Chennai, India E-Mail: jeyajothi31@gmail.com

More information

Math 170- Graph Theory Notes

Math 170- Graph Theory Notes 1 Math 170- Graph Theory Notes Michael Levet December 3, 2018 Notation: Let n be a positive integer. Denote [n] to be the set {1, 2,..., n}. So for example, [3] = {1, 2, 3}. To quote Bud Brown, Graph theory

More information

Comparison Of Network Topologies For Optical Fiber Communication

Comparison Of Network Topologies For Optical Fiber Communication Comparison Of Network Topologies For Optical Fiber Communication Mr. Bhupesh Bhatia Department of Electronics and Communication, Ms. Ashima Bhatnagar Bhatia Department of Computer Science, Guru Prem Sukh

More information

Visual Representations for Machine Learning

Visual Representations for Machine Learning Visual Representations for Machine Learning Spectral Clustering and Channel Representations Lecture 1 Spectral Clustering: introduction and confusion Michael Felsberg Klas Nordberg The Spectral Clustering

More information

Quantifying Internet End-to-End Route Similarity

Quantifying Internet End-to-End Route Similarity Quantifying Internet End-to-End Route Similarity Ningning Hu and Peter Steenkiste Carnegie Mellon University Pittsburgh, PA 523, USA {hnn, prs}@cs.cmu.edu Abstract. Route similarity refers to the similarity

More information

BMI/STAT 768: Lecture 06 Trees in Graphs

BMI/STAT 768: Lecture 06 Trees in Graphs BMI/STAT 768: Lecture 06 Trees in Graphs Moo K. Chung mkchung@wisc.edu February 11, 2018 Parts of this lecture is based on [3, 5]. Many objects and data can be represented as networks. Unfortunately networks

More information

Chapter 2 Graphs. 2.1 Definition of Graphs

Chapter 2 Graphs. 2.1 Definition of Graphs Chapter 2 Graphs Abstract Graphs are discrete structures that consist of vertices and edges connecting some of these vertices. Graphs have many applications in Mathematics, Computer Science, Engineering,

More information