scispace - formally typeset
Search or ask a question

Showing papers on "Network topology published in 2004"


Journal ArticleDOI
TL;DR: A distinctive feature of this work is to address consensus problems for networks with directed information flow by establishing a direct connection between the algebraic connectivity of the network and the performance of a linear consensus protocol.
Abstract: In this paper, we discuss consensus problems for networks of dynamic agents with fixed and switching topologies. We analyze three cases: 1) directed networks with fixed topology; 2) directed networks with switching topology; and 3) undirected networks with communication time-delays and fixed topology. We introduce two consensus protocols for networks with and without time-delays and provide a convergence analysis in all three cases. We establish a direct connection between the algebraic connectivity (or Fiedler eigenvalue) of the network and the performance (or negotiation speed) of a linear consensus protocol. This required the generalization of the notion of algebraic connectivity of undirected graphs to digraphs. It turns out that balanced digraphs play a key role in addressing average-consensus problems. We introduce disagreement functions for convergence analysis of consensus protocols. A disagreement function is a Lyapunov function for the disagreement network dynamics. We proposed a simple disagreement function that is a common Lyapunov function for the disagreement dynamics of a directed network with switching topology. A distinctive feature of this work is to address consensus problems for networks with directed information flow. We provide analytical tools that rely on algebraic graph theory, matrix theory, and control theory. Simulations are provided that demonstrate the effectiveness of our theoretical results.

11,658 citations


Journal ArticleDOI
TL;DR: This work represents communication/transportation systems as networks and studies their ability to resist failures simulated as the breakdown of a group of nodes of the network chosen at random (chosen accordingly to degree or load).
Abstract: Communication/transportation systems are often subjected to failures and attacks. Here we represent such systems as networks and we study their ability to resist failures (attacks) simulated as the breakdown of a group of nodes of the network chosen at random (chosen accordingly to degree or load). We consider and compare the results for two different network topologies: the Erdos–Renyi random graph and the Barabasi–Albert scale-free network. We also discuss briefly a dynamical model recently proposed to take into account the dynamical redistribution of loads after the initial damage of a single node of the network.

2,352 citations


Proceedings ArticleDOI
30 Aug 2004
TL;DR: This work forms the delay-tolerant networking routing problem, where messages are to be moved end-to-end across a connectivity graph that is time-varying but whose dynamics may be known in advance, and proposes a framework for evaluating routing algorithms in such environments.
Abstract: We formulate the delay-tolerant networking routing problem, where messages are to be moved end-to-end across a connectivity graph that is time-varying but whose dynamics may be known in advance. The problem has the added constraints of finite buffers at each node and the general property that no contemporaneous end-to-end path may ever exist. This situation limits the applicability of traditional routing approaches that tend to treat outages as failures and seek to find an existing end-to-end path. We propose a framework for evaluating routing algorithms in such environments. We then develop several algorithms and use simulations to compare their performance with respect to the amount of knowledge they require about network topology. We find that, as expected, the algorithms using the least knowledge tend to perform poorly. We also find that with limited additional knowledge, far less than complete global knowledge, efficient algorithms can be constructed for routing in such environments. To the best of our knowledge this is the first such investigation of routing issues in DTNs.

1,854 citations



Proceedings ArticleDOI
07 Mar 2004
TL;DR: A protocol is presented, HEED (hybrid energy-efficient distributed clustering), that periodically selects cluster heads according to a hybrid of their residual energy and a secondary parameter, such as node proximity to its neighbors or node degree, which outperforms weight-based clustering protocols in terms of several cluster characteristics.
Abstract: Prolonged network lifetime, scalability, and load balancing are important requirements for many ad-hoc sensor network applications. Clustering sensor nodes is an effective technique for achieving these goals. In this work, we propose a new energy-efficient approach for clustering nodes in ad-hoc sensor networks. Based on this approach, we present a protocol, HEED (hybrid energy-efficient distributed clustering), that periodically selects cluster heads according to a hybrid of their residual energy and a secondary parameter, such as node proximity to its neighbors or node degree. HEED does not make any assumptions about the distribution or density of nodes, or about node capabilities, e.g., location-awareness. The clustering process terminates in O(1) iterations, and does not depend on the network topology or size. The protocol incurs low overhead in terms of processing cycles and messages exchanged. It also achieves fairly uniform cluster head distribution across the network. A careful selection of the secondary clustering parameter can balance load among cluster heads. Our simulation results demonstrate that HEED outperforms weight-based clustering protocols in terms of several cluster characteristics. We also apply our approach to a simple application to demonstrate its effectiveness in prolonging the network lifetime and supporting data aggregation.

1,373 citations


Journal ArticleDOI
TL;DR: This work explains the main reason why significantly less local controllers are required by specifically pinning the most highly connected nodes in a scale-free network than those required by the randomly pining scheme, and why there is no significant difference between specifically and randomly pinning schemes for controlling random dynamical networks.
Abstract: It is now known that the complexity of network topology has a great impact on the stabilization of complex dynamical networks. In this work, we study the control of random networks and scale-free networks. Conditions are investigated for globally or locally stabilizing such networks. Our strategy is to apply local feedback control to a small fraction of network nodes. We propose the concept of virtual control for microscopic dynamics throughout the process with different pinning schemes for both random networks and scale-free networks. We explain the main reason why significantly less local controllers are required by specifically pinning the most highly connected nodes in a scale-free network than those required by the randomly pinning scheme, and why there is no significant difference between specifically and randomly pinning schemes for controlling random dynamical networks. We also study the synchronization phenomenon of controlled dynamical networks in the stabilization process, both analytically and numerically.

878 citations


Journal ArticleDOI
TL;DR: In this article, the authors provide an empirical analysis of the network structure of the Austrian interbank market based on Austrian Central Bank (OeNB) data and find that the degree distributions of the interbank network follow power laws.
Abstract: We provide an empirical analysis of the network structure of the Austrian interbank market based on Austrian Central Bank (OeNB) data. The interbank market is interpreted as a network where banks are nodes and the claims and liabilities between banks define the links. This allows us to apply methods from general network theory. We find that the degree distributions of the interbank network follow power laws. Given this result we discuss how the network structure affects the stability of the banking system with respect to the elimination of a node in the network, i.e. the default of a single bank. Further, the interbank liability network shows a community structure that exactly mirrors the regional and sectoral organization of the current Austrian banking system. The banking network has the typical structural features found in numerous other complex real-world networks: a low clustering coefficient and a short average path length. These empirical findings are in marked contrast to the network structures th...

836 citations


Journal ArticleDOI
TL;DR: In this paper, power quality problems associated with distributed power (DP) inverters, implemented in large numbers onto the same distribution network, are investigated, and a complete network simulation study on an existing residential network with large penetration of photovoltaics (PV) on rooftops of houses and commercial buildings is included.
Abstract: Power quality problems associated with distributed power (DP) inverters, implemented in large numbers onto the same distribution network, are investigated. Currently, these power quality problems are mainly found in projects with large penetration of photovoltaics (PV) on rooftops of houses and commercial buildings. The main object of this paper is to analyze the observed phenomena of harmonic interference of large populations of these inverters and to compare the network interaction of different inverter topologies and control options. These power quality phenomenons are investigated by using extensive laboratory experiments, as well as computer modeling of different inverter topologies. A complete network simulation study on an existing residential network with large penetration of PVs, is included.

801 citations


Proceedings ArticleDOI
07 Mar 2004
TL;DR: This paper presents a new variant of the MDS-MAP method, which it is shown that the new algorithm not only preserves the good performance of the original method on relatively uniform layouts, but also performs much better than the original on irregularly-shaped networks.
Abstract: It is often useful to know the geographic positions of nodes in a communications network, but adding GPS receivers or other sophisticated sensors to every node can be expensive. MDS-MAP is a recent localization method based on multidimensional scaling (MDS). It uses connectivity information - who is within communications range of whom - to derive the locations of the nodes in the network, and can take advantage of additional data, such as estimated distances between neighbors or known positions for certain anchor nodes, if they are available. However, MDS-MAP is an inherently centralized algorithm and is therefore of limited utility in many applications. In this paper, we present a new variant of the MDS-MAP method, which we call MDS-MAP(P) standing for MDS-MAP using patches of relative maps, that can be executed in a distributed fashion. Using extensive simulations, we show that the new algorithm not only preserves the good performance of the original method on relatively uniform layouts, but also performs much better than the original on irregularly-shaped networks. The main idea is to build a local map at each node of the immediate vicinity and then merge these maps together to form a global map. This approach works much better for topologies in which the shortest path distance between two nodes does not correspond well to their Euclidean distance. We also discuss an optional refinement step that improves solution quality even further at the expense of additional computation.

775 citations


Proceedings Article
Niels Provos1
13 Aug 2004
TL;DR: Honeyd is presented, a framework for virtual honeypots that simulates virtual computer systems at the network level and shows how the Honeyd framework helps in many areas of system security, e.g. detecting and disabling worms, distracting adversaries, or preventing the spread of spam email.
Abstract: A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after exploitation of a honeypot. Deploying a physical honeypot is often time intensive and expensive as different operating systems require specialized hardware and every honeypot requires its own physical system. This paper presents Honeyd, a framework for virtual honeypots that simulates virtual computer systems at the network level. The simulated computer systems appear to run on unallocated network addresses. To deceive network fingerprinting tools, Honeyd simulates the networking stack of different operating systems and can provide arbitrary routing topologies and services for an arbitrary number of virtual systems. This paper discusses Honeyd's design and shows how the Honeyd framework helps in many areas of system security, e.g. detecting and disabling worms, distracting adversaries, or preventing the spread of spam email.

729 citations


Journal ArticleDOI
TL;DR: A theoretical framework is developed to model the spatial and temporal correlations in WSN to enable the development of efficient communication protocols which exploit these advantageous intrinsic features of the WSN paradigm.

Book
01 Jan 2004
TL;DR: This paper presents UWB Channel Models, a Hierarchical Model for Modulation Schemes of Receiver Structures, and Integrated Circuit Topologies, which describe the construction of receiver structures and the role of antennas in this system.
Abstract: Introduction. UWB Channel Models. Modulation Schemes. Receiver Structures. Integrated Circuit Topologies. UWB Antennas. Medium Access Control. Positioning.

Proceedings ArticleDOI
07 Mar 2004
TL;DR: The focus of this paper is on characterizing the delay and determining the throughput-delay trade-off in such fixed and mobile ad hoc networks, and describing a scheme that achieves the optimal order of delay for any given throughput.
Abstract: Gupta and Kumar (2000) introduced a random network model for studying the way throughput scales in a wireless network when the nodes are fixed, and showed that the throughput per source-destination pair is /spl otimes/(1//spl radic/nlogn). Grossglauser and Tse (2001) showed that when nodes are mobile it is possible to have a constant or /spl otimes/(1) throughput scaling per source-destination pair. The focus of this paper is on characterizing the delay and determining the throughput-delay trade-off in such fixed and mobile ad hoc networks. For the Gupta-Kumar fixed network model, we show that the optimal throughput-delay trade-off is given by D(n) = /spl otimes/(nT(n)), where T(n) and D(n) are the throughput and delay respectively. For the Grossglauser-Tse mobile network model, we show that the delay scales as /spl otimes/(n/sup 1/2//v(n)), where v(n) is the velocity of the mobile nodes. We then describe a scheme that achieves the optimal order of delay for any given throughput. The scheme varies (i) the number of hops, (ii) the transmission range and (iii) the degree of node mobility to achieve the optimal throughput-delay trade-off. The scheme produces a range of models that capture the Gupta-Kumar model at one extreme and the Grossglauser-Tse model at the other. In the course of our work, we recover previous results of Gupta and Kumar, and Grossglauser and Tse using simpler techniques, which might be of a separate interest.

Proceedings ArticleDOI
07 Mar 2004
TL;DR: This paper explores the idea of using dimensionality reduction techniques to estimate sensors coordinates in two (or three) dimensional space, and proposes a distributed sensor positioning method based on multidimensional scaling technique to deal with these challenging conditions.
Abstract: Sensor Positioning is a fundamental and crucial issue for sensor network operation and management. In the paper, we first study some situations where most existing sensor positioning methods tend to fail to perform well, an example being when the topology of a sensor network is anisotropic. Then, we explore the idea of using dimensionality reduction techniques to estimate sensors coordinates in two (or three) dimensional space, and we propose a distributed sensor positioning method based on multidimensional scaling technique to deal with these challenging conditions. Multidimensional scaling and coordinate alignment techniques are applied to recover positions of adjacent sensors. The estimated positions of the anchors are compared with their true physical positions and corrected. The positions of other sensors are corrected accordingly. With iterative adjustment, our method can overcome adverse network and terrain conditions, and generate accurate sensor position. We also propose an on demand sensor positioning method based on the above method.

Journal ArticleDOI
TL;DR: This work compares four available databases that approximate the protein interaction network of the yeast, Saccharomyces cerevisiae, aiming to uncover the network's generic large‐scale properties and the impact of the proteins' function and cellular localization on the network topology.
Abstract: The elucidation of the cell’s large-scale organization is a primary challenge for post-genomic biology, and understanding the structure of protein interaction networks offers an important starting point for such studies. We compare four available databases that approximate the protein interaction network of the yeast, Saccharomyces cerevisiae, aiming to uncover the network’s generic large-scale properties and the impact of the proteins’ function and cellular localization on the network topology. We show how each database supports a scale-free, topology with hierarchical modularity, indicating that these features represent a robust and generic property of the protein interactions network. We also find strong correlations between the network’s structure and the functional role and subcellular localization of its protein constituents, concluding that most functional and/or localization classes appear as relatively segregated subnetworks of the full protein interaction network. The uncovered systematic differences between the four protein interaction databases reflect their relative coverage for different functional and localization classes and provide a guide for their utility in various bioinformatics studies.

Proceedings ArticleDOI
03 Nov 2004
TL;DR: This paper presents a general framework for achievingantly more accurate and reliable answers by combining energy-efficient multi-path routing schemes with techniques that avoid double-counting, and demonstrates the significant robustness, accuracy, and energy-efficiency improvements of synopsis diffusion over previous approaches.
Abstract: Previous approaches for computing duplicate-sensitive aggregates in sensor networks (e.g., in TAG) have used a tree topology, in order to conserve energy and to avoid double-counting sensor readings. However, a tree topology is not robust against node and communication failures, which are common in sensor networks. In this paper, we present synopsis diffusion, a general framework for achieving signi.cantly more accurate and reliable answers by combining energy-efficient multi-path routing schemes with techniques that avoid double-counting. Synopsis diffusion avoids double-counting through the use of order- and duplicate-insensitive (ODI) synopses that compactly summarize intermediate results during in-network aggregation. We provide a surprisingly simple test that makes it easy to check the correctness of an ODI synopsis. We show that the properties of ODI synopses and synopsis di.usion create implicit acknowledgments of packet delivery. We show that this property can, in turn, enable the system to adapt message routing to dynamic message loss conditions, even in the presence of asymmetric links. Finally, we illustrate, using extensive simulations, the significant robustness, accuracy, and energy-efficiency improvements of synopsis diffusion over previous approaches.

Journal ArticleDOI
TL;DR: It is shown that the Internet topology at the autonomous system (AS) level has a rich-club phenomenon, which is a simple qualitative way to differentiate between power law topologies and provides a criterion for new network models.
Abstract: We show that the Internet topology at the autonomous system (AS) level has a rich-club phenomenon. The rich nodes, which are a small number of nodes with large numbers of links, are very well connected to each other. The rich-club is a core tier that we measured using the rich-club connectivity and the node-node link distribution. We obtained this core tier without any heuristic assumption between the ASs. The rich-club phenomenon is a simple qualitative way to differentiate between power law topologies and provides a criterion for new network models. To show this, we compared the measured rich-club of the AS graph with networks obtained using the Baraba/spl acute/si-Albert (BA) scale-free network model, the Fitness BA model and the Inet-3.0 model.

Proceedings ArticleDOI
07 Mar 2004
TL;DR: It is shown that samples taken from consecutive steps of a random walk can achieve statistical properties similar to independent sampling if the second eigenvalue of the transition matrix is hounded away from 1, which translates to good expansion of the network.
Abstract: We quantify the effectiveness of random walks for searching and construction of unstructured peer-to-peer (P2P) networks. We have identified two cases where the use of random walks for searching achieves better results than flooding: a) when the overlay topology is clustered, and h) when a client re-issues the same query while its horizon does not change much. For construction, we argue that an expander can he maintained dynamically with constant operations per addition. The key technical ingredient of our approach is a deep result of stochastic processes indicating that samples taken from consecutive steps of a random walk can achieve statistical properties similar to independent sampling (if the second eigenvalue of the transition matrix is hounded away from 1, which translates to good expansion of the network; such connectivity is desired, and believed to hold, in every reasonable network and network model). This property has been previously used in complexity theory for construction of pseudorandom number generators. We reveal another facet of this theory and translate savings in random bits to savings in processing overhead.

Journal ArticleDOI
TL;DR: The state of the art in networks on chip is reviewed, an infrastructure called Hermes is described, targeted to implement packet-switching mesh and related interconnection architectures and topologies and the design validation of the Hermes switch is presented.

Journal ArticleDOI
TL;DR: Four key problems: membership maintenance, network awareness, buffer management,buffer management, and message filtering are described and some preliminary approaches to address them are suggested.
Abstract: Easy to deploy, robust, and highly resilient to failures, epidemic algorithms are a potentially effective mechanism for propagating information in large peer-to-peer systems deployed on Internet or ad hoc networks. It is possible to adjust the parameters of epidemic algorithm to achieve high reliability despite process crashes and disconnections, packet losses, and a dynamic network topology. Although researchers have used epidemic algorithms in applications such as failure detection, data aggregation, resource discovery and monitoring, and database replication, their general applicability to practical, Internet-wide systems remains open to question. We describe four key problems: membership maintenance, network awareness, buffer management, and message filtering, and suggest some preliminary approaches to address them.

Book
16 Jul 2004
TL;DR: A comparison of Energy Efficient (E2) Protocols for Wireless Sensor Networks, Q. Rao, R. Reuther, and D. reuther on Computational and Networking Problems in Distributed Sensor Networks.
Abstract: INTRODUCTION Opportunities and Challenges in Wireless Sensor Networks, M. Haenggi, Next Generation Technologies to Enable Sensor Networks, J. I. Goodman, A. I. Reuther, and D. R. Martinez Sensor Networks Management, L. B. Ruiz, J. M. Nogueira, and A. A. F. Loureiro Models for Programmability in Sensor Networks, A. Boulis Miniaturizing Sensor Networks with MEMS, Brett Warneke A Taxonomy of Routing Techniques in Wireless Sensor Networks, J. N. Al-Karaki and A. E. Kamal Artificial Perceptual Systems, A. Loutfi, M. Lindquist, and P. Wide APPLICATIONS Sensor Network Architecture and Applications, C. Shen, C. Jaikaeo, and C. Srisathapornphat, A Practical Perspective on Wireless Sensor Networks, Q. Wang, H. Hassanein, and K. Xu, Introduction to Industrial Sensor Networking, M. Sveda, P. Benes, R. Vrba, and F. Zezulka, A Sensor Networks for Biological Data Acquisition, T. Small, Z. J. Haas, A. Purgue, and K. Fristrup ARCHITECTURE Sensor Network Architecture, J. Feng, F. Koushanfar, and M. Potkonjak Tiered Architectures in Sensor Networks, M. Yarvis and W. Ye Energy Efficient Topologies for Wireless Sensor Networks, A. Salheih and L. Schwiebert, Architecture and Modeling of Dynamic Sensor Networks, S. Papavassiliou, and J. Zhu PROTOCOLS Overview of Communication Protocols for Sensor Networks, W. Su, E. Cayirci, and O. B. Akan A Communication Architecture and Programming Abstraction for Real - Time Embedded Sensor Networks, T. Abdelzaher, J. Stankovic, S. Son, B. Blum, T. He, A. Wood, and C. Lu, A Comparative Study of Energy Efficient (E2) Protocols for Wireless Sensor Networks, Q. Wang, and H. Hassanein TRACKING TECHNIQUES Coverage in Wireless Sensor Networks, M. Cardei, and J. Wu Location Management in Wireless Sensor Networks, J. Beutel, Positioning and Tracking in Wireless Sensor Networks, Y. C. Tseng, C. F. Huang, and S. P. Kuo Tracking Techniques in Air Vehicle Based Decentralized Sensor Networks, M. Ridley, L. L. Ong, E. Nettleton, and S. Sukkarieh, A DATA GATHERING AND PROCESSING Fundamental Protocols to Gather Information on Wireless Sensor Networks, J. Bordim, and K. Nakano Comparison of Data Processing Techniques in Sensor Networks, V. Gonzalez, and E. Sanchis On Computational and Networking Problems in Distributed Sensor Networks, Q. Wu, N. S. V. Rao, R. R. Brooks, S. S. Iyengar, and M. Zhu Cooperative Computing in Sensor Networks, L. Iftode, C. Borcea, and P. Kang ENERGY MANAGEMENT Dynamic Power Management in Sensor Networks, A. Sinha and A. Chandrakasan Design Challenges in Energy Efficient Medium Access Control for Wireless Sensor Networks, D. Dewasurendra, A. Mishra Techniques to Reduce Computation and Communication Energy in Wireless Sensor Networks, V. Swaminathan, Y. Zou, and K. Chakrabarty Energy Aware Routing and Data Funneling in Sensor Networks, R. C. Shah, D. Petrovic, and Jan M. Rabaey SECURITY, RELIABILITY AND FAULT-TOLERANCE Security and privacy Protection in Wireless Sensor Networks, S. Slijepcevic, J. L. Wong, and M. Potkonjak A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks, A. D. Wood, and J. A. Stankovic Reliability Support in Sensor Networks, A. Lim Reliable Energy-Constrained Routing in Sensor Networks, R. Kannan, L. Ray, and S. S. Iyenger Fault-Tolerant Interval Estimation in Sensor Networks, Y. Zhu, B. Li, and Z. You Fault-Tolerance in Wireless Sensor Networks, F. Koushanfar, M. Potkanjak, and A. Sangiovanni-Vincentelli PERFORMANCE AND DESIGN ASPECTS Low Power Design for Smart Dust Networks, Z. Karakehayou Energy Efficient Design for Distributed Sensor Networks, L. Yuan and G. Qu Wireless Sensor Networks and Computational Geometry, X. Y. Li, and Y. Wang Localized Algorithms for Sensor Networks, J. Feng, F. Koushanfar, and M. Potkonjak

Proceedings ArticleDOI
07 Mar 2004
TL;DR: A distributed algorithm is described, BOUNDHOLE, to build routes around holes, which are connected regions of the network with boundaries consisting of all the stuck nodes, and it is shown that these hole-surrounding routes can be used in many applications such as geographic routing, path migration, information storage mechanisms and identification of regions of interest.
Abstract: Many algorithms for routing in sensor networks exploit greedy forwarding strategies to get packets to their destinations. We study a fundamental difficulty such strategies face: the "local minimum phenomena" that can cause packets to get stuck. We give a definition of stuck nodes where packets may get stuck in greedy multi-hop forwarding, and develop a local rule, the TENT rule, for each node in the network to test whether a packet can get stuck at that node. To help the packets get out of stuck nodes, we describe a distributed algorithm, BOUNDHOLE, to build routes around holes, which are connected regions of the network with boundaries consisting of all the stuck nodes. We show that these hole-surrounding routes can be used in many applications such as geographic routing, path migration, information storage mechanisms and identification of regions of interest.

Journal ArticleDOI
TL;DR: The ASCENT algorithm is motivated and described and it is shown that the system achieves linear increase in energy savings as a function of the density and the convergence time required in case of node failures while still providing adequate connectivity.
Abstract: Advances in microsensor and radio technology enable small but smart sensors to be deployed for a wide range of environmental monitoring applications. The low-per node cost allows these wireless networks of sensors and actuators to be densely distributed. The nodes in these dense networks coordinate to perform the distributed sensing and actuation tasks. Moreover, as described in this paper, the nodes can also coordinate to exploit the redundancy provided by high density so as to extend overall system lifetime. The large number of nodes deployed in this systems preclude manual configuration, and the environmental dynamics precludes design-time preconfiguration. Therefore, nodes have to self-configure to establish a topology that provides communication under stringent energy constraints. ASCENT builds on the notion that, as density increases, only a subset of the nodes is necessary to establish a routing forwarding backbone. In ASCENT, each node assesses its connectivity and adapts its participation in the multihop network topology based on the measured operating region. This paper motivates and describes the ASCENT algorithm and presents analysis, simulation, and experimental measurements. We show that the system achieves linear increase in energy savings as a function of the density and the convergence time required in case of node failures while still providing adequate connectivity.

Proceedings ArticleDOI
30 Aug 2004
TL;DR: It is claimed that very simple models that incorporate hard technological constraints on router and link bandwidth and connectivity, together with abstract models of user demand and network performance, can successfully address this challenge and further resolve much of the confusion and controversy that has surrounded topology generation and evaluation.
Abstract: A detailed understanding of the many facets of the Internet's topological structure is critical for evaluating the performance of networking protocols, for assessing the effectiveness of proposed techniques to protect the network from nefarious intrusions and attacks, or for developing improved designs for resource provisioning. Previous studies of topology have focused on interpreting measurements or on phenomenological descriptions and evaluation of graph-theoretic properties of topology generators. We propose a complementary approach of combining a more subtle use of statistics and graph theory with a first-principles theory of router-level topology that reflects practical constraints and tradeoffs. While there is an inevitable tradeoff between model complexity and fidelity, a challenge is to distill from the seemingly endless list of potentially relevant technological and economic issues the features that are most essential to a solid understanding of the intrinsic fundamentals of network topology. We claim that very simple models that incorporate hard technological constraints on router and link bandwidth and connectivity, together with abstract models of user demand and network performance, can successfully address this challenge and further resolve much of the confusion and controversy that has surrounded topology generation and evaluation.

Journal ArticleDOI
TL;DR: An advanced NoC architecture, called Xpipes, targeting high performance and reliable communication for on-chip multi-processors is introduced, which consists of a library of soft macros that are design-time composable and tunable so that domain-specific heterogeneous architectures can be instantiated and synthesized.
Abstract: The growing complexity of embedded multiprocessor architectures for digital media processing will soon require highly scalable communication infrastructures. Packet switched networks-on-chip (NoC) have been proposed to support the trend for systems-on-chip integration. In this paper, an advanced NoC architecture, called Xpipes, targeting high performance and reliable communication for on-chip multi-processors is introduced. It consists of a library of soft macros (switches, network interfaces and links) that are design-time composable and tunable so that domain-specific heterogeneous architectures can be instantiated and synthesized. Links can be pipelined with a flexible number of stages to decouple link throughput from its length and to get arbitrary topologies. Moreover, a tool called XpipesCompiler, which automatically instantiates a customized NoC from the library of soft network components, is used in this paper to test the Xpipes-based synthesis flow for domain-specific communication architectures.

Journal ArticleDOI
TL;DR: In this article, a color level-set model is proposed for structural shape and topology optimization in a multi-material domain, which is an alternative approach to the popular homogenization-based methods of rule of mixtures for multiphase modeling.

Proceedings ArticleDOI
07 Jun 2004
TL;DR: SUNMAP automates NoC selection and generation, bridging an important design gap in building NoCs and explores various design objectives such as minimizing average communication delay, area, power dissipation subject to bandwidth and area constraints.
Abstract: Increasing communication demands of processor and memory cores in Systems on Chips (SoCs) necessitate the use of Networks on Chip (NoC) to interconnect the cores. An important phase in the design of NoCs is he mapping of cores onto the most suitable opology for a given application. In this paper, we present SUNMAP a tool for automatically selecting he best topology for a given application and producing a mapping of cores onto that topology. SUNMAP explores various design objectives such as minimizing average communication delay, area, power dissipation subject to bandwidth and area constraints. The tool supports different routing functions (dimension ordered, minimum-path, traffic splitting) and uses floorplanning information early in the topology selection process to provide feasible mappings. The network components of the chosen NoC are automatically generated using cycle-accurate SystemC soft macros from X-pipes architecture. SUNMAP automates NoC selection and generation, bridging an important design gap in building NoCs. Several experimental case studies are presented in the paper, which show the rich design space exploration capabilities of SUNMAP.

Journal ArticleDOI
TL;DR: The conformation space of a 20 residue antiparallel beta-sheet peptide, sampled by molecular dynamics simulations, is mapped to a network and provides a basis for understanding the heterogeneity of the TS and denatured state ensemble as well as the existence of multiple pathways.

Proceedings ArticleDOI
26 Apr 2004
TL;DR: This paper examines the fundamental relationship between the reduction in sensor duty cycle and the required level of redundancy for a fixed performance measure, and considers two types of mechanisms, the random sleep type where each sensor keeps an active-sleep schedule independent of another, and the coordinated sleeptype where sensors coordinate with each other in reaching an active.
Abstract: This paper investigates the problem of providing network coverage using wireless sensors that operate on low duty cycles (measured by the percentage time a sensor is on or active), i.e., each sensor alternates between active and sleep states to conserve energy with an average sleep period (much) longer than the active period. The dynamic change in topology as a result of such duty-cycling has potentially disruptive effect on the operation and performance of the network. This is compensated by adding redundancy in the sensor deployment. In this paper we examine the fundamental relationship between the reduction in sensor duty cycle and the required level of redundancy for a fixed performance measure, and explore the design of good sensor sleep schedules. In particular, we consider two types of mechanisms, the random sleep type where each sensor keeps an active-sleep schedule independent of another, and the coordinated sleep type where sensors coordinate with each other in reaching an active-sleep schedule. Both types are studied within the context of providing network coverage. We present specific scheduling algorithms within each type, and illustrate their coverage and duty cycle properties via both analysis and simulation. We show with either type of sleep schedule the benefit of added redundancy saturates at some point in that the reduction in duty cycles starts to diminish beyond a certain threshold in deployment redundancy. We also show that at the expense of extra control overhead, a coordinated sleep schedule is more robust and can achieve higher duty cycle reduction with the same amount of redundancy compared to a random sleep schedule.

Journal ArticleDOI
TL;DR: The proposed QRON algorithm adopts a hierarchical methodology that enhances its scalability and simulated the protocols based on the transit-stub topologies produced by GT-ITM, showing that the proposed algorithms perform well in providing a QoS-aware overlay routing service.
Abstract: Recently, many overlay applications have emerged in the Internet. Currently, each of these applications requires their proprietary functionality support. A general unified framework may be a desirable alternative to application-specific overlays. We introduce the concept of overlay brokers (OBs). We assume that each autonomous system in the Internet has one or more OBs. These OBs cooperate with each other to form an overlay service network (OSN) and provide overlay service support for overlay applications, such as resource allocation and negotiation, overlay routing, topology discovery, and other functionalities. The scope of our effort is the support of quality-of-service (QoS) in overlay networks. Our primary focus is on the design of QoS-aware routing protocols for overlay networks (QRONs). The goal of QRON is to find a QoS-satisfied overlay path, while trying to balance the overlay traffic among the OBs and the overlay links in the OSN. A subset of OBs, connected by the overlay paths, can form an application specific overlay network for an overlay application. The proposed QRON algorithm adopts a hierarchical methodology that enhances its scalability. We analyze two different types of path selection algorithms. We have simulated the protocols based on the transit-stub topologies produced by GT-ITM. Simulation results show that the proposed algorithms perform well in providing a QoS-aware overlay routing service.