scispace - formally typeset
Search or ask a question

Showing papers on "Network topology published in 2011"


Journal ArticleDOI
TL;DR: This review presents the emergent field of temporal networks, and discusses methods for analyzing topological and temporal structure and models for elucidating their relation to the behavior of dynamical systems.
Abstract: A great variety of systems in nature, society and technology -- from the web of sexual contacts to the Internet, from the nervous system to power grids -- can be modeled as graphs of vertices coupled by edges The network structure, describing how the graph is wired, helps us understand, predict and optimize the behavior of dynamical systems In many cases, however, the edges are not continuously active As an example, in networks of communication via email, text messages, or phone calls, edges represent sequences of instantaneous or practically instantaneous contacts In some cases, edges are active for non-negligible periods of time: eg, the proximity patterns of inpatients at hospitals can be represented by a graph where an edge between two individuals is on throughout the time they are at the same ward Like network topology, the temporal structure of edge activations can affect dynamics of systems interacting through the network, from disease contagion on the network of patients to information diffusion over an e-mail network In this review, we present the emergent field of temporal networks, and discuss methods for analyzing topological and temporal structure and models for elucidating their relation to the behavior of dynamical systems In the light of traditional network theory, one can see this framework as moving the information of when things happen from the dynamical system on the network, to the network itself Since fundamental properties, such as the transitivity of edges, do not necessarily hold in temporal networks, many of these methods need to be quite different from those for static networks

2,452 citations


Journal ArticleDOI
TL;DR: The Internet Topology Zoo is a store of network data created from the information that network operators make public, and is the most accurate large-scale collection of network topologies available, and includes meta-data that couldn't have been measured.
Abstract: The study of network topology has attracted a great deal of attention in the last decade, but has been hampered by a lack of accurate data. Existing methods for measuring topology have flaws, and arguments about the importance of these have overshadowed the more interesting questions about network structure. The Internet Topology Zoo is a store of network data created from the information that network operators make public. As such it is the most accurate large-scale collection of network topologies available, and includes meta-data that couldn't have been measured. With this data we can answer questions about network structure with more certainty than ever before - we illustrate its power through a preliminary analysis of the PoP-level topology of over 140 networks. We find a wide range of network designs not conforming as a whole to any obvious model.

1,333 citations


Journal ArticleDOI
Olaf Sporns1
TL;DR: Current empirical efforts toward generating a network map of the human brain, the human connectome, are reviewed, and how the connectome can provide new insights into the organization of the brain's structural connections and their role in shaping functional dynamics are explored.
Abstract: The human brain is a complex network. An important first step toward understanding the function of such a network is to map its elements and connections, to create a comprehensive structural description of the network architecture. This paper reviews current empirical efforts toward generating a network map of the human brain, the human connectome, and explores how the connectome can provide new insights into the organization of the brain's structural connections and their role in shaping functional dynamics. Network studies of structural connectivity obtained from noninvasive neuroimaging have revealed a number of highly nonrandom network attributes, including high clustering and modularity combined with high efficiency and short path length. The combination of these attributes simultaneously promotes high specialization and high integration within a modular small-world architecture. Structural and functional networks share some of the same characteristics, although their relationship is complex and nonlinear. Future studies of the human connectome will greatly expand our knowledge of network topology and dynamics in the healthy, developing, aging, and diseased brain.

1,173 citations


Journal ArticleDOI
TL;DR: In this article, the authors present the concept of heterogeneous networks and also describe the major technical challenges associated with such network architecture, focusing in particular on the standardization activities within the 3GPP related to enhanced intercell interference coordination.
Abstract: 3GPP LTE-Advanced has recently been investigating heterogeneous network (HetNet) deployments as a cost effective way to deal with the unrelenting traffic demand. HetNets consist of a mix of macrocells, remote radio heads, and low-power nodes such as picocells, femtocells, and relays. Leveraging network topology, increasing the proximity between the access network and the end users, has the potential to provide the next significant performance leap in wireless networks, improving spatial spectrum reuse and enhancing indoor coverage. Nevertheless, deployment of a large number of small cells overlaying the macrocells is not without new technical challenges. In this article, we present the concept of heterogeneous networks and also describe the major technical challenges associated with such network architecture. We focus in particular on the standardization activities within the 3GPP related to enhanced intercell interference coordination.

945 citations


Journal ArticleDOI
TL;DR: This paper proposes a new topology, based on the H-bridge with a new ac bypass circuit consisting of a diode rectifier and a switch with clamping to the dc midpoint, which achieves high conversion efficiency and low leakage current.
Abstract: There is a strong trend in the photovoltaic inverter technology to use transformerless topologies in order to acquire higher efficiencies combining with very low ground leakage current. In this paper, a new topology, based on the H-bridge with a new ac bypass circuit consisting of a diode rectifier and a switch with clamping to the dc midpoint, is proposed. The topology is simulated and experimentally validated, and a comparison with other existing topologies is performed. High conversion efficiency and low leakage current are demonstrated.

743 citations


Proceedings ArticleDOI
15 Aug 2011
TL;DR: This work proposes using Multipath TCP as a replacement for TCP in large-scale data centers, as it can effectively and seamlessly use available bandwidth, giving improved throughput and better fairness on many topologies.
Abstract: The latest large-scale data centers offer higher aggregate bandwidth and robustness by creating multiple paths in the core of the net- work. To utilize this bandwidth requires different flows take different paths, which poses a challenge. In short, a single-path transport seems ill-suited to such networks.We propose using Multipath TCP as a replacement for TCP in such data centers, as it can effectively and seamlessly use available bandwidth, giving improved throughput and better fairness on many topologies. We investigate what causes these benefits, teasing apart the contribution of each of the mechanisms used by MPTCP.Using MPTCP lets us rethink data center networks, with a different mindset as to the relationship between transport protocols, rout- ing and topology. MPTCP enables topologies that single path TCP cannot utilize. As a proof-of-concept, we present a dual-homed variant of the FatTree topology. With MPTCP, this outperforms FatTree for a wide range of workloads, but costs the same.In existing data centers, MPTCP is readily deployable leveraging widely deployed technologies such as ECMP. We have run MPTCP on Amazon EC2 and found that it outperforms TCP by a factor of three when there is path diversity. But the biggest benefits will come when data centers are designed for multipath transports.

721 citations


Journal ArticleDOI
TL;DR: This work introduces interaction profiles of drugs (and of targets) in a network, which are binary vectors specifying the presence or absence of interaction with every target (drug) in that network, and defines a kernel on these profiles, called the GIP kernel, and uses a simple classifier, (kernel) Regularized Least Squares (RLS), for prediction drug-target interactions.
Abstract: Motivation: The in silico prediction of potential interactions between drugs and target proteins is of core importance for the identification of new drugs or novel targets for existing drugs. However, only a tiny portion of all drug–target pairs in current datasets are experimentally validated interactions. This motivates the need for developing computational methods that predict true interaction pairs with high accuracy. Results: We show that a simple machine learning method that uses the drug–target network as the only source of information is capable of predicting true interaction pairs with high accuracy. Specifically, we introduce interaction profiles of drugs (and of targets) in a network, which are binary vectors specifying the presence or absence of interaction with every target (drug) in that network. We define a kernel on these profiles, called the Gaussian Interaction Profile (GIP) kernel, and use a simple classifier, (kernel) Regularized Least Squares (RLS), for prediction drug–target interactions. We test comparatively the effectiveness of RLS with the GIP kernel on four drug–target interaction networks used in previous studies. The proposed algorithm achieves area under the precision–recall curve (AUPR) up to 92.7, significantly improving over results of state-of-the-art methods. Moreover, we show that using also kernels based on chemical and genomic information further increases accuracy, with a neat improvement on small datasets. These results substantiate the relevance of the network topology (in the form of interaction profiles) as source of information for predicting drug–target interactions. Availability: Software and Supplementary Material are available at http://cs.ru.nl/~tvanlaarhoven/drugtarget2011/. Contact:tvanlaarhoven@cs.ru.nl; elenam@cs.ru.nl Supplementary Information:Supplementary data are available at Bioinformatics online.

696 citations


Journal ArticleDOI
TL;DR: In this paper, the authors present the concept of heterogeneous networks and also describe the major technical challenges associated with such network architecture, focusing in particular on the standardization activities within the 3GPP related to enhanced inter-cell interference coordination.
Abstract: 3GPP LTE-Advanced has started a new study item to investigate Heterogeneous Network (HetNet) deployments as a cost effective way to deal with the unrelenting traffic demand. HetNets consist of a mix of macrocells, remote radio heads, and low-power nodes such as picocells, femtocells, and relays. Leveraging network topology, increasing the proximity between the access network and the end-users, has the potential to provide the next significant performance leap in wireless networks, improving spatial spectrum reuse and enhancing indoor coverage. Nevertheless, deployment of a large number of small cells overlaying the macrocells is not without new technical challenges. In this article, we present the concept of heterogeneous networks and also describe the major technical challenges associated with such network architecture. We focus in particular on the standardization activities within the 3GPP related to enhanced inter-cell interference coordination.

643 citations


Journal ArticleDOI
TL;DR: It is discussed how dynamic operation of cellular base stations, in which redundant base stations are switched off during periods of low traffic such as at night, can provide significant energy savings, and quantitatively estimate these potential savings through a first-order analysis.
Abstract: The operation of cellular network infrastructure incurs significant electrical energy consumption. From the perspective of cellular network operators, reducing this consumption is not only a matter of showing environmental responsibility, but also of substantially reducing their operational expenditure. We discuss how dynamic operation of cellular base stations, in which redundant base stations are switched off during periods of low traffic such as at night, can provide significant energy savings. We quantitatively estimate these potential savings through a first-order analysis based on real cellular traffic traces and information regarding base station locations in a part of Manchester, United Kingdom. We also discuss a number of open issues pertinent to implementing such energy-efficient dynamic base station operation schemes, such as various approaches to ensure coverage, and interoperator coordination.

587 citations


Journal ArticleDOI
TL;DR: A taxonomy of the ad hoc routing protocols is created to uncover the requirements considered by the different protocols, the resource limitations under which they operate, and the design decisions made by the authors.

554 citations


Journal ArticleDOI
TL;DR: Simulations show that rumor centrality outperforms distance centrality in finding rumor sources in networks which are not tree-like, and it is proved that on trees, the rumor center and distance center are equivalent, but on general networks, they may differ.
Abstract: We provide a systematic study of the problem of finding the source of a rumor in a network. We model rumor spreading in a network with the popular susceptible-infected (SI) model and then construct an estimator for the rumor source. This estimator is based upon a novel topological quantity which we term rumor centrality. We establish that this is a maximum likelihood (ML) estimator for a class of graphs. We find the following surprising threshold phenomenon: on trees which grow faster than a line, the estimator always has nontrivial detection probability, whereas on trees that grow like a line, the detection probability will go to 0 as the network grows. Simulations performed on synthetic networks such as the popular small-world and scale-free networks, and on real networks such as an internet AS network and the U.S. electric power grid network, show that the estimator either finds the source exactly or within a few hops of the true source across different network topologies. We compare rumor centrality to another common network centrality notion known as distance centrality. We prove that on trees, the rumor center and distance center are equivalent, but on general networks, they may differ. Indeed, simulations show that rumor centrality outperforms distance centrality in finding rumor sources in networks which are not tree-like.

Journal ArticleDOI
TL;DR: The topology of the network completely characterizes the resilience of linear iterative strategies to this kind of malicious behavior and it is shown that node xi is guaranteed to be able to calculate any arbitrary function of all node values when the number of malicious nodes is f or less.
Abstract: Given a network of interconnected nodes, each with its own value (such as a measurement, position, vote, or other data), we develop a distributed strategy that enables some or all of the nodes to calculate any arbitrary function of the node values, despite the actions of malicious nodes in the network. Our scheme assumes a broadcast model of communication (where all nodes transmit the same value to all of their neighbors) and utilizes a linear iteration where, at each time-step, each node updates its value to be a weighted average of its own previous value and those of its neighbors. We consider a node to be malicious or faulty if, instead of following the predefined linear strategy, it updates its value arbitrarily at each time-step (perhaps conspiring with other malicious nodes in the process). We show that the topology of the network completely characterizes the resilience of linear iterative strategies to this kind of malicious behavior. First, when the network contains 2f or fewer vertex-disjoint paths from some node xj to another node xi , we provide an explicit strategy for f malicious nodes to follow in order to prevent node xi from receiving any information about xj's value. Next, if node xi has at least 2f+1 vertex-disjoint paths from every other (non-neighboring) node, we show that xi is guaranteed to be able to calculate any arbitrary function of all node values when the number of malicious nodes is f or less. Furthermore, we show that this function can be calculated after running the linear iteration for a finite number of time-steps (upper bounded by the number of nodes in the network) with almost any set of weights (i.e., for all weights except for a set of measure zero).

01 Aug 2011
TL;DR: In this article, the authors provide a systematic study of the problem of finding the source of a rumor in a network and construct an estimator for the rumor source based upon a novel topological quantity which they termed rumor centrality.
Abstract: We provide a systematic study of the problem of finding the source of a rumor in a network. We model rumor spreading in a network with the popular susceptible-infected (SI) model and then construct an estimator for the rumor source. This estimator is based upon a novel topological quantity which we term rumor centrality. We establish that this is a maximum likelihood (ML) estimator for a class of graphs. We find the following surprising threshold phenomenon: on trees which grow faster than a line, the estimator always has nontrivial detection probability, whereas on trees that grow like a line, the detection probability will go to 0 as the network grows. Simulations performed on synthetic networks such as the popular small-world and scale-free networks, and on real networks such as an internet AS network and the U.S. electric power grid network, show that the estimator either finds the source exactly or within a few hops of the true source across different network topologies. We compare rumor centrality to another common network centrality notion known as distance centrality. We prove that on trees, the rumor center and distance center are equivalent, but on general networks, they may differ. Indeed, simulations show that rumor centrality outperforms distance centrality in finding rumor sources in networks which are not tree-like.

Journal ArticleDOI
TL;DR: This brief studies distributed containment control for double-integrator dynamics in the presence of both stationary and dynamic leaders to derive conditions on the network topology and the control gains to guarantee asymptotic containment control in any dimensional space.
Abstract: This brief studies distributed containment control for double-integrator dynamics in the presence of both stationary and dynamic leaders. In the case of stationary leaders, we propose a distributed containment control algorithm and study conditions on the network topology and the control gains to guarantee asymptotic containment control in any dimensional space. In the case of dynamic leaders, we study two cases: leaders with an identical velocity and leaders with nonidentical velocities. For the first case, we propose two distributed containment control algorithms to solve, respectively, asymptotic containment control under a switching directed network topology and finite-time containment control under a fixed directed network topology. In particular, asymptotic containment control can be achieved for any dimensional space if the network topology is fixed and for only the 1-D space if the network topology is switching. For the second case, we propose a distributed containment control algorithm under a fixed network topology where the communication patterns among the followers are undirected and derive conditions on the network topology and the control gains to guarantee asymptotic containment control for any dimensional space. Both simulation results and experimental results on a multi-robot platform are provided to validate some theoretical results.

Proceedings ArticleDOI
25 Jul 2011
TL;DR: Experiments are presented on a real bibliographic network, the DBLP network, which show that metapath-based heterogeneousTopological features can generate more accurate prediction results as compared to homogeneous topological features.
Abstract: The problem of predicting links or interactions between objects in a network, is an important task in network analysis. Along this line, link prediction between co-authors in a co-author network is a frequently studied problem. In most of these studies, authors are considered in a homogeneous network, \i.e., only one type of objects(author type) and one type of links (co-authorship) exist in the network. However, in a real bibliographic network, there are multiple types of objects (\e.g., venues, topics, papers) and multiple types of links among these objects. In this paper, we study the problem of co-author relationship prediction in the heterogeneous bibliographic network, and a new methodology called\emph{Path Predict}, \i.e., meta path-based relationship prediction model, is proposed to solve this problem. First, meta path-based topological features are systematically extracted from the network. Then, a supervised model is used to learn the best weights associated with different topological features in deciding the co-author relationships. We present experiments on a real bibliographic network, the DBLP network, which show that metapath-based heterogeneous topological features can generate more accurate prediction results as compared to homogeneous topological features. In addition, the level of significance of each topological feature can be learned from the model, which is helpful in understanding the mechanism behind the relationship building.

Journal ArticleDOI
01 Feb 2011
TL;DR: Time-domain (Lyapunov theorems) and frequency-domain approaches are used to study leaderless and leader-following consensus algorithms with communication and input delays under a directed network topology.
Abstract: In this paper, time-domain (Lyapunov theorems) and frequency-domain (the Nyquist stability criterion) approaches are used to study leaderless and leader-following consensus algorithms with communication and input delays under a directed network topology. We consider both the first-order and second-order cases and present stability or boundedness conditions. Several interesting phenomena are analyzed and explained. Simulation results are presented to support the theoretical results.

Journal ArticleDOI
TL;DR: A harmony search algorithm (HSA) is proposed to solve the network reconfiguration problem to get optimal switching combination in the network which results in minimum loss and is observed that the proposed method performed well compared to the other methods in terms of the quality of solution.
Abstract: Electrical distribution network reconfiguration is a complex combinatorial optimization process aimed at finding a radial operating structure that minimizes the system power loss while satisfying operating constraints. In this paper, a harmony search algorithm (HSA) is proposed to solve the network reconfiguration problem to get optimal switching combination in the network which results in minimum loss. The HSA is a recently developed algorithm which is conceptualized using the musical process of searching for a perfect state of harmony. It uses a stochastic random search instead of a gradient search which eliminates the need for derivative information. Simulations are carried out on 33- and 119-bus systems in order to validate the proposed algorithm. The results are compared with other approaches available in the literature. It is observed that the proposed method performed well compared to the other methods in terms of the quality of solution.

Proceedings ArticleDOI
10 Apr 2011
TL;DR: Mahout is presented, a low-overhead yet effective traffic management system that follows OpenFlow-like central controller approach for network management but augments the design with the authors' novel end host mechanism.
Abstract: Datacenters need high-bandwidth interconnection fabrics. Several researchers have proposed highly-redundant topologies with multiple paths between pairs of end hosts for datacenter networks. However, traffic management is necessary to effectively utilize the bisection bandwidth provided by these topologies. This requires timely detection of elephant flows—flows that carry large amount of data—and managing those flows. Previously proposed approaches incur high monitoring overheads, consume significant switch resources, and/or have long detection times. We propose, instead, to detect elephant flows at the end hosts. We do this by observing the end hosts's socket buffers, which provide better, more efficient visibility of flow behavior. We present Mahout, a low-overhead yet effective traffic management system that follows OpenFlow-like central controller approach for network management but augments the design with our novel end host mechanism. Once an elephant flow is detected, an end host signals the network controller using in-band signaling with low overheads. Through analytical evaluation and experiments, we demonstrate the benefits of Mahout over previous solutions.

Journal ArticleDOI
TL;DR: This paper presents a comprehensive study on state of art of power factor corrected single-phase AC-DC converters configurations, control strategies, selection of components and design considerations, performance evaluation, power quality considerations, selection criteria and potential applications, latest trends, and future developments.
Abstract: Solid-state switch mode AC-DC converters having high-frequency transformer isolation are developed in buck, boost, and buck-boost configurations with improved power quality in terms of reduced total harmonic distortion (THD) of input current, power-factor correction (PFC) at AC mains and precisely regulated and isolated DC output voltage feeding to loads from few Watts to several kW. This paper presents a comprehensive study on state of art of power factor corrected single-phase AC-DC converters configurations, control strategies, selection of components and design considerations, performance evaluation, power quality considerations, selection criteria and potential applications, latest trends, and future developments. Simulation results as well as comparative performance are presented and discussed for most of the proposed topologies.

Journal ArticleDOI
TL;DR: This paper argues in this paper for a careful treatment of the constraints imposed by space on network topology and proposes a modularity function adapted to spatial networks for community detection and focuses on the problem of community detection.
Abstract: Many complex systems are organized in the form of a network embedded in space. Important examples include the physical Internet infrastucture, road networks, flight connections, brain functional networks, and social networks. The effect of space on network topology has recently come under the spotlight because of the emergence of pervasive technologies based on geolocalization, which constantly fill databases with people’s movements and thus reveal their trajectories and spatial behavior. Extracting patterns and regularities from the resulting massive amount of human mobility data requires the development of appropriate tools for uncovering information in spatially embedded networks. In contrast with most works that tend to apply standard network metrics to any type of network, we argue in this paper for a careful treatment of the constraints imposed by space on network topology. In particular, we focus on the problem of community detection and propose a modularity function adapted to spatial networks. We show that it is possible to factor out the effect of space in order to reveal more clearly hidden structural similarities between the nodes. Methods are tested on a large mobile phone network and computer-generated benchmarks where the effect of space has been incorporated.

01 Jan 2011
TL;DR: A graph-theoretic definition of connectivity is provided, as well as an equivalent definition based on algebraic graph theory, which employs the adjacency and Laplacian matrices of the graph and their spectral properties.
Abstract: In this paper, we provide a theoretical framework for controlling graph connectivity in mobile robot networks. We discuss proximity-based communication models composed of disk-based or uniformly-fading-signal-strength communica- tion links. A graph-theoretic definition of connectivity is pro- vided, as well as an equivalent definition based on algebraic graph theory, which employs the adjacency and Laplacian matrices of the graph and their spectral properties. Based on these results, we discuss centralized and distributed algorithms to maintain, increase, and control connectivity in mobile robot networks. The various approaches discussed in this paper range from convex optimization and subgradient-descent algo- rithms, for the maximization of the algebraic connectivity of the network, to potential fields and hybrid systems that main- tain communication links or control the network topology in a least restrictive manner. Common to these approaches is the use of mobility to control the topology of the underlying com- munication network. We discuss applications of connectivity control to multirobot rendezvous, flocking and formation con- trol, where so far, network connectivity has been considered an assumption.

Journal ArticleDOI
12 Jul 2011
TL;DR: In this paper, a graph-theoretic definition of connectivity is provided, as well as an equivalent definition based on algebraic graph theory, which employs the adjacency and Laplacian matrices of the graph and their spectral properties.
Abstract: In this paper, we provide a theoretical framework for controlling graph connectivity in mobile robot networks. We discuss proximity-based communication models composed of disk-based or uniformly-fading-signal-strength communication links. A graph-theoretic definition of connectivity is provided, as well as an equivalent definition based on algebraic graph theory, which employs the adjacency and Laplacian matrices of the graph and their spectral properties. Based on these results, we discuss centralized and distributed algorithms to maintain, increase, and control connectivity in mobile robot networks. The various approaches discussed in this paper range from convex optimization and subgradient-descent algorithms, for the maximization of the algebraic connectivity of the network, to potential fields and hybrid systems that maintain communication links or control the network topology in a least restrictive manner. Common to these approaches is the use of mobility to control the topology of the underlying communication network. We discuss applications of connectivity control to multirobot rendezvous, flocking and formation control, where so far, network connectivity has been considered an assumption.

Journal ArticleDOI
TL;DR: In this paper, the consensus problem of heterogeneous multi-agent systems is considered and sufficient conditions for consensus are established when the communication topologies are undirected connected graphs and leader-following networks.
Abstract: In this study, the consensus problem of heterogeneous multi-agent system is considered. First, the heterogeneous multi-agent system is proposed which is composed of first-order and second-order integrator agents in two aspects. Then, the consensus problem of heterogeneous multi-agent system is discussed with the linear consensus protocol and the saturated consensus protocol, respectively. By applying the graph theory and Lyapunov direct method, some sufficient conditions for consensus are established when the communication topologies are undirected connected graphs and leader-following networks. Finally, some examples are presented to illustrate the theoretical results.

Journal ArticleDOI
24 Jan 2011
TL;DR: Reliable physical layer network coding takes this idea one step further: using judiciously chosen linear error-correcting codes, intermediate nodes in a wireless network can directly recover linear combinations of the packets from the observed noisy superpositions of transmitted signals.
Abstract: When two or more users in a wireless network transmit simultaneously, their electromagnetic signals are linearly superimposed on the channel. As a result, a receiver that is interested in one of these signals sees the others as unwanted interference. This property of the wireless medium is typically viewed as a hindrance to reliable communication over a network. However, using a recently developed coding strategy, interference can in fact be harnessed for network coding. In a wired network, (linear) network coding refers to each intermediate node taking its received packets, computing a linear combination over a finite field, and forwarding the outcome towards the destinations. Then, given an appropriate set of linear combinations, a destination can solve for its desired packets. For certain topologies, this strategy can attain significantly higher throughputs over routing-based strategies. Reliable physical layer network coding takes this idea one step further: using judiciously chosen linear error-correcting codes, intermediate nodes in a wireless network can directly recover linear combinations of the packets from the observed noisy superpositions of transmitted signals. Starting with some simple examples, this paper explores the core ideas behind this new technique and the possibilities it offers for communication over interference-limited wireless networks.

Journal ArticleDOI
TL;DR: In this article, the authors developed a distributed control algorithm that will regulate the power output of multiple photovoltaic generators (PVs) in a distribution network, where the cooperative control methodology from network control theory is used to make a group of PV generators converge and operate at the same ratio of available power, which is determined by the status of the distribution network and the PV generators.
Abstract: The focus of this paper is to develop a distributed control algorithm that will regulate the power output of multiple photovoltaic generators (PVs) in a distribution network. To this end, the cooperative control methodology from network control theory is used to make a group of PV generators converge and operate at certain (or the same) ratio of available power, which is determined by the status of the distribution network and the PV generators. The proposed control only requires asynchronous information intermittently from neighboring PV generators, making a communication network among the PV units both simple and necessary. The minimum requirement on communication topologies is also prescribed for the proposed control. It is shown that the proposed analysis and design methodology has the advantages that the corresponding communication networks are local, their topology can be time varying, and their bandwidth may be limited. These features enable PV generators to have both self-organizing and adaptive coordination properties even under adverse conditions. The proposed method is simulated using the IEEE standard 34-bus distribution network.

Journal ArticleDOI
TL;DR: In this paper, the authors simulate disease spread using SI and SIR models on an empirical temporal network of sexual contacts in high-end prostitution, and find that the temporal correlations among sexual contacts can significantly change simulated outbreaks in a large empirical sexual network.
Abstract: Sexual contact patterns, both in their temporal and network structure, can influence the spread of sexually transmitted infections (STI). Most previous literature has focused on effects of network topology; few studies have addressed the role of temporal structure. We simulate disease spread using SI and SIR models on an empirical temporal network of sexual contacts in high-end prostitution. We compare these results with several other approaches, including randomization of the data, classic mean-field approaches, and static network simulations. We observe that epidemic dynamics in this contact structure have well-defined, rather high epidemic thresholds. Temporal effects create a broad distribution of outbreak sizes, even if the per-contact transmission probability is taken to its hypothetical maximum of 100%. In general, we conclude that the temporal correlations of our network accelerate outbreaks, especially in the early phase of the epidemics, while the network topology (apart from the contact-rate distribution) slows them down. We find that the temporal correlations of sexual contacts can significantly change simulated outbreaks in a large empirical sexual network. Thus, temporal structures are needed alongside network topology to fully understand the spread of STIs. On a side note, our simulations further suggest that the specific type of commercial sex we investigate is not a reservoir of major importance for HIV.

Posted Content
TL;DR: In this paper, the authors explore the core ideas behind linear network coding and the possibilities it offers for communication over interference-limited wireless networks, and present some simple examples of such a technique.
Abstract: When two or more users in a wireless network transmit simultaneously, their electromagnetic signals are linearly superimposed on the channel. As a result, a receiver that is interested in one of these signals sees the others as unwanted interference. This property of the wireless medium is typically viewed as a hindrance to reliable communication over a network. However, using a recently developed coding strategy, interference can in fact be harnessed for network coding. In a wired network, (linear) network coding refers to each intermediate node taking its received packets, computing a linear combination over a finite field, and forwarding the outcome towards the destinations. Then, given an appropriate set of linear combinations, a destination can solve for its desired packets. For certain topologies, this strategy can attain significantly higher throughputs over routing-based strategies. Reliable physical layer network coding takes this idea one step further: using judiciously chosen linear error-correcting codes, intermediate nodes in a wireless network can directly recover linear combinations of the packets from the observed noisy superpositions of transmitted signals. Starting with some simple examples, this survey explores the core ideas behind this new technique and the possibilities it offers for communication over interference-limited wireless networks.

Journal ArticleDOI
TL;DR: Key communication infrastructure design aspects are looked into, and the key role of the telecommunications provision when upgrading and deploying distributed control solutions, as part of future ANM systems are focused on.
Abstract: Power distribution networks with distributed generators (DGs) can exhibit complex operational regimes which makes conventional management approaches no longer adequate. This paper looks into key communication infrastructure design aspects, and analyzes two representative evolution cases of Active Network Management (ANM) for distributed control. Relevant standard initiatives, communication protocols and technologies are introduced and underlying engineering challenges are highlighted. By analyzing two representative case networks (meshed and radial topologies) at different voltage levels (33 and 11 kV), this paper discusses the design considerations and presents performance results based on numerical simulations. This study focuses on the key role of the telecommunications provision when upgrading and deploying distributed control solutions, as part of future ANM systems.

Journal ArticleDOI
TL;DR: This paper presents a probabilistic analysis of the survivability of NG-PONs and hybrid fiber-wireless (FiWi) access networks, taking both optical and wireless protection into account, and proposes different selection schemes to wirelessly upgrade a subset of ONUs.
Abstract: Passive optical networks (PONs) are currently evolving into next-generation PONs (NG-PONs) which aim at achieving higher data rates, wavelength channel counts, number of optical network units (ONUs), and extended coverage compared to their conventional counterparts. Due to the increased number of stages and ONUs, NG-PONs face significant challenges to provide the same level of survivability like conventional PONs without exceeding the budget constraints of cost-sensitive access networks. Toward this end, partial optical protection, in combination with interconnecting a subset of ONUs through a wireless mesh network (WMN) front-end, are promising solutions to render NG-PONs survivable in a cost-effective manner. In this paper, we present a probabilistic analysis of the survivability of NG-PONs and hybrid fiber-wireless (FiWi) access networks, taking both optical and wireless protection into account. In addition, we propose different selection schemes to wirelessly upgrade a subset of ONUs, and investigate their performance for a wide range of fiber link failure scenarios and different NG-PON topologies.

Patent
30 Nov 2011
TL;DR: In this paper, a method and apparatus for centralized control of a network is described, which includes creating a database and storing the database on a master node of the network, with each node coupled to at least one other node, with the master node being one of the nodes.
Abstract: A method and apparatus for centralized control of a network is described. The network includes a number of nodes. The method includes creating a database and storing the database on a master node of the network. The database contains topology information regarding a topology of the network. Each of the nodes is coupled to at least one other of the nodes, with the master node being one of the nodes.