scispace - formally typeset
Search or ask a question

Showing papers on "Network topology published in 2016"


Journal ArticleDOI
TL;DR: In this paper, the authors present OSMnx, a new tool to make the collection of data and creation and analysis of street networks simple, consistent, automatable and sound from the perspectives of graph theory, transportation, and urban design.
Abstract: Urban scholars have studied street networks in various ways, but there are data availability and consistency limitations to the current urban planning/street network analysis literature. To address these challenges, this article presents OSMnx, a new tool to make the collection of data and creation and analysis of street networks simple, consistent, automatable and sound from the perspectives of graph theory, transportation, and urban design. OSMnx contributes five significant capabilities for researchers and practitioners: first, the automated downloading of political boundaries and building footprints; second, the tailored and automated downloading and constructing of street network data from OpenStreetMap; third, the algorithmic correction of network topology; fourth, the ability to save street networks to disk as shapefiles, GraphML, or SVG files; and fifth, the ability to analyze street networks, including calculating routes, projecting and visualizing networks, and calculating metric and topological measures. These measures include those common in urban design and transportation studies, as well as advanced measures of the structure and topology of the network. Finally, this article presents a simple case study using OSMnx to construct and analyze street networks in Portland, Oregon.

738 citations


Journal ArticleDOI
TL;DR: This paper provides a comprehensive review of existing compensation topologies for the loosely coupled transformer and discusses the compensation requirements for achieving the maximum efficiency according to different WPT application areas.
Abstract: Wireless power transfer (WPT) is an emerging technology that can realize electric power transmission over certain distances without physical contact, offering significant benefits to modern automation systems, medical applications, consumer electronics, etc. This paper provides a comprehensive review of existing compensation topologies for the loosely coupled transformer. Compensation topologies are reviewed and evaluated based on their basic and advanced functions. Individual passive resonant networks used to achieve constant (load-independent) voltage or current output are analyzed and summarized. Popular WPT compensation topologies are given as application examples, which can be regarded as the combination of multiple blocks of resonant networks. Analyses of the input zero phase angle and soft switching are conducted as well. This paper also discusses the compensation requirements for achieving the maximum efficiency according to different WPT application areas.

659 citations


Proceedings ArticleDOI
14 Mar 2016
TL;DR: HULA is presented, a data-plane load-balancing algorithm that outperforms a scalable extension to CONGA in average flow completion time and is designed for emerging programmable switches and programed in P4 to demonstrate that HULA could be run on such programmable chipsets, without requiring custom hardware.
Abstract: Datacenter networks employ multi-rooted topologies (e.g., Leaf-Spine, Fat-Tree) to provide large bisection bandwidth. These topologies use a large degree of multipathing, and need a data-plane load-balancing mechanism to effectively utilize their bisection bandwidth. The canonical load-balancing mechanism is equal-cost multi-path routing (ECMP), which spreads traffic uniformly across multiple paths. Motivated by ECMP's shortcomings, congestion-aware load-balancing techniques such as CONGA have been developed. These techniques have two limitations. First, because switch memory is limited, they can only maintain a small amount of congestion-tracking state at the edge switches, and do not scale to large topologies. Second, because they are implemented in custom hardware, they cannot be modified in the field. This paper presents HULA, a data-plane load-balancing algorithm that overcomes both limitations. First, instead of having the leaf switches track congestion on all paths to a destination, each HULA switch tracks congestion for the best path to a destination through a neighboring switch. Second, we design HULA for emerging programmable switches and program it in P4 to demonstrate that HULA could be run on such programmable chipsets, without requiring custom hardware. We evaluate HULA extensively in simulation, showing that it outperforms a scalable extension to CONGA in average flow completion time (1.6 x at 50% load, 3 x at 90% load).

322 citations


Posted Content
TL;DR: A new secure, private, and lightweight architecture for IoT, based on BC technology that eliminates the overhead of BC while maintaining most of its security and privacy benefits is proposed.
Abstract: The Internet of Things IoT is experiencing exponential growth in research and industry, but it still suffers from privacy and security vulnerabilities. Conventional security and privacy approaches tend to be inapplicable for IoT, mainly due to its decentralized topology and the resource-constraints of the majority of its devices. BlockChain BC that underpin the crypto-currency Bitcoin have been recently used to provide security and privacy in peer-to-peer networks with similar topologies to IoT. However, BCs are computationally expensive and involve high bandwidth overhead and delays, which are not suitable for IoT devices. This position paper proposes a new secure, private, and lightweight architecture for IoT, based on BC technology that eliminates the overhead of BC while maintaining most of its security and privacy benefits. The described method is investigated on a smart home application as a representative case study for broader IoT applications. The proposed architecture is hierarchical, and consists of smart homes, an overlay network and cloud storages coordinating data transactions with BC to provide privacy and security. Our design uses different types of BCs depending on where in the network hierarchy a transaction occurs, and uses distributed trust methods to ensure a decentralized topology. Qualitative evaluation of the architecture under common threat models highlights its effectiveness in providing security and privacy for IoT applications.

304 citations


Journal ArticleDOI
Abstract: Middleboxes or network appliances like firewalls, proxies, and WAN optimizers have become an integral part of today’s ISP and enterprise networks Middlebox functionalities are usually deployed on expensive and proprietary hardware that require trained personnel for deployment and maintenance Middleboxes contribute significantly to a network’s capital and operation costs In addition, organizations often require their traffic to pass through a specific sequence of middleboxes for compliance with security and performance policies This makes the middlebox deployment and maintenance tasks even more complicated Network function virtualization (NFV) is an emerging and promising technology that is envisioned to overcome these challenges It proposes to move packet processing from dedicated hardware middleboxes to software running on commodity servers In NFV terminology, software middleboxes are referred to as virtualized network functions (VNFs) It is a challenging problem to determine the required number and placement of VNFs that optimizes network operational costs and utilization, without violating service level agreements We call this the VNF orchestration problem (VNF-OP) and provide an integer linear programming formulation with implementation in CPLEX We also provide a dynamic programming-based heuristic to solve larger instances of VNF-OP Trace driven simulations on real-world network topologies demonstrate that the heuristic can provide solutions that are within 13 times of the optimal solution Our experiments suggest that a VNF-based approach can provide more than $ {4\times }$ reduction in the operational cost of a network

269 citations


Journal ArticleDOI
TL;DR: Simulation results show that GEDAR significantly improves the network performance when compared with the baseline solutions, even in hard and difficult mobile scenarios of very sparse and very dense networks and for high network traffic loads.
Abstract: Underwater wireless sensor networks (UWSNs) have been showed as a promising technology to monitor and explore the oceans in lieu of traditional undersea wireline instruments. Nevertheless, the data gathering of UWSNs is still severely limited because of the acoustic channel communication characteristics. One way to improve the data collection in UWSNs is through the design of routing protocols considering the unique characteristics of the underwater acoustic communication and the highly dynamic network topology. In this paper, we propose the GEDAR routing protocol for UWSNs. GEDAR is an anycast, geographic and opportunistic routing protocol that routes data packets from sensor nodes to multiple sonobuoys (sinks) at the sea's surface. When the node is in a communication void region, GEDAR switches to the recovery mode procedure which is based on topology control through the depth adjustment of the void nodes, instead of the traditional approaches using control messages to discover and maintain routing paths along void regions. Simulation results show that GEDAR significantly improves the network performance when compared with the baseline solutions, even in hard and difficult mobile scenarios of very sparse and very dense networks and for high network traffic loads.

265 citations


Journal ArticleDOI
TL;DR: A comprehensively survey hypervisors for SDN networks and exhaustively compare the network attribute abstraction and isolation features of the existing SDN hypervisors is exhaustively compared.
Abstract: Software defined networking (SDN) has emerged as a promising paradigm for making the control of communication networks flexible. SDN separates the data packet forwarding plane, i.e., the data plane, from the control plane and employs a central controller. Network virtualization allows the flexible sharing of physical networking resources by multiple users (tenants). Each tenant runs its own applications over its virtual network, i.e., its slice of the actual physical network. The virtualization of SDN networks promises to allow networks to leverage the combined benefits of SDN networking and network virtualization and has therefore attracted significant research attention in recent years. A critical component for virtualizing SDN networks is an SDN hypervisor that abstracts the underlying physical SDN network into multiple logically isolated virtual SDN networks (vSDNs), each with its own controller. We comprehensively survey hypervisors for SDN networks in this paper. We categorize the SDN hypervisors according to their architecture into centralized and distributed hypervisors. We furthermore sub-classify the hypervisors according to their execution platform into hypervisors running exclusively on general-purpose compute platforms, or on a combination of general-purpose compute platforms with general- or special-purpose network elements. We exhaustively compare the network attribute abstraction and isolation features of the existing SDN hypervisors. As part of the future research agenda, we outline the development of a performance evaluation framework for SDN hypervisors.

261 citations


Journal ArticleDOI
TL;DR: The results suggest that, in the case of networks with multiple servers, type of network topology can be exploited to reduce service delay.
Abstract: In this paper, we consider multiple cache-enabled clients connected to multiple servers through an intermediate network. We design several topology-aware coding strategies for such networks. Based on the topology richness of the intermediate network, and types of coding operations at internal nodes, we define three classes of networks, namely, dedicated, flexible, and linear networks. For each class, we propose an achievable coding scheme, analyze its coding delay, and also compare it with an information theoretic lower bound. For flexible networks, we show that our scheme is order-optimal in terms of coding delay and, interestingly, the optimal memory-delay curve is achieved in certain regimes. In general, our results suggest that, in the case of networks with multiple servers, type of network topology can be exploited to reduce service delay.

255 citations


Journal ArticleDOI
TL;DR: In this paper, the authors compare two routing algorithms for ad hoc networks: optimized link-state routing (OLSR) and predictive OLSR (P-OLSR), which takes advantage of the Global Positioning System (GPS) information available on board.
Abstract: This paper reports experimental results on self-organizing wireless networks carried by small flying robots. Flying ad hoc networks (FANETs) composed of small unmanned aerial vehicles (UAVs) are flexible, inexpensive, and fast to deploy. This makes them a very attractive technology for many civilian and military applications. Due to the high mobility of the nodes, maintaining a communication link between the UAVs is a challenging task. The topology of these networks is more dynamic than that of typical mobile ad hoc networks (MANETs) and of typical vehicle ad hoc networks. As a consequence, the existing routing protocols designed for MANETs partly fail in tracking network topology changes. In this paper, we compare two different routing algorithms for ad hoc networks: optimized link-state routing (OLSR) and predictive OLSR (P-OLSR). The latter is an OLSR extension that we designed for FANETs; it takes advantage of the Global Positioning System (GPS) information available on board. To the best of our knowledge, P-OLSR is currently the only FANET-specific routing technique that has an available Linux implementation. We present results obtained by both media-access-control (MAC) layer emulations and real-world experiments. In the experiments, we used a testbed composed of two autonomous fixed-wing UAVs and a node on the ground. Our experiments evaluate the link performance and the communication range, as well as the routing performance. Our emulation and experimental results show that P-OLSR significantly outperforms OLSR in routing in the presence of frequent network topology changes.

242 citations


Journal ArticleDOI
TL;DR: This paper designs a data gathering optimization algorithm for dynamic sensing and routing (DoSR), and proposes a distributed sensing rate and routing control (DSR2C) algorithm to jointly optimize data sensing and data transmission, while guaranteeing network fairness.
Abstract: In rechargeable sensor networks (RSNs), energy harvested by sensors should be carefully allocated for data sensing and data transmission to optimize data gathering due to time-varying renewable energy arrival and limited battery capacity. Moreover, the dynamic feature of network topology should be taken into account, since it can affect the data transmission. In this paper, we strive to optimize data gathering in terms of network utility by jointly considering data sensing and data transmission. To this end, we design a data gathering optimization algorithm for dynamic sensing and routing (DoSR), which consists of two parts. In the first part, we design a balanced energy allocation scheme (BEAS) for each sensor to manage its energy use, which is proven to meet four requirements raised by practical scenarios. Then in the second part, we propose a distributed sensing rate and routing control (DSR2C) algorithm to jointly optimize data sensing and data transmission, while guaranteeing network fairness. In DSR2C, each sensor can adaptively adjust its transmit energy consumption during network operation according to the amount of available energy, and select the optimal sensing rate and routing, which can efficiently improve data gathering. Furthermore, since recomputing the optimal data sensing and routing strategies upon change of energy allocation will bring huge communications for information exchange and computation, we propose an improved BEAS to manage the energy allocation in the dynamic environments and a topology control scheme to reduce computational complexity. Extensive simulations are performed to demonstrate the efficiency of the proposed algorithms in comparison with existing algorithms.

237 citations


Journal ArticleDOI
TL;DR: In this article, a meta-heuristic cuckoo search algorithm (CSA) inspired from the obligate brood parasitism of some Cuckoo species which lay their eggs in the nests of other birds of other species for solving optimization problems is adapted to simultaneously reconfigure and identify the optimal location and size of DG units in a distribution network.

Journal ArticleDOI
TL;DR: In this article, a multi-temporal simulation model is presented to carry out integrated analysis of electricity, heat and gas distribution networks, with specific applications to multi-vector district energy systems.

Journal ArticleDOI
TL;DR: This paper studies the scalability limitations of large-scale vehicular platoons moving in rigid formation, and proposes two basic ways to improve stability margins, i.e., enlarging information topology and employing asymmetric control.
Abstract: The platooning of autonomous vehicles has the potential to significantly improve traffic capacity, enhance highway safety, and reduce fuel consumption. This paper studies the scalability limitations of large-scale vehicular platoons moving in rigid formation, and proposes two basic ways to improve stability margins, i.e., enlarging information topology and employing asymmetric control. A vehicular platoon is considered as a combination of four components: 1) node dynamics; 2) decentralized controller; 3) information flow topology; and 4) formation geometry. Tools, such as the algebraic graph theory and matrix factorization technique, are employed to model and analyze scalability limitations. The major findings include: 1) under linear identical decentralized controllers, the stability thresholds of control gains are explicitly established for platoons under undirected topologies. It is proved that the stability margins decay to zero as the platoon size increases unless there is a large number of following vehicles pinned to the leader and 2) the stability margins of vehicular platoons under bidirectional topologies using asymmetric controllers are always bounded away from zero and independent of the platoon size. Simulations with a platoon of passenger cars are used to demonstrate the findings.

Journal ArticleDOI
TL;DR: This paper develops a sample-path-based approach to find the information source in a network in which the spread of information follows the popular Susceptible-Infected-Recovered (SIR) model, and proves that for infinite-trees, the estimator is a node that minimizes the maximum distance to the infected nodes and a reverse-infection algorithm is proposed to find such an estimator in general graphs.
Abstract: This paper studies the problem of detecting the information source in a network in which the spread of information follows the popular Susceptible-Infected-Recovered (SIR) model. We assume all nodes in the network are in the susceptible state initially, except one single information source that is in the infected state. Susceptible nodes may then be infected by infected nodes, and infected nodes may recover and will not be infected again after recovery. Given a snapshot of the network, from which we know the graph topology and all infected nodes but cannot distinguish susceptible nodes and recovered nodes, the problem is to find the information source based on the snapshot and the network topology. We develop a sample-path-based approach where the estimator of the information source is chosen to be the root node associated with the sample path that most likely leads to the observed snapshot. We prove for infinite-trees, the estimator is a node that minimizes the maximum distance to the infected nodes. A reverse-infection algorithm is proposed to find such an estimator in general graphs. We prove that for g + 1-regular trees such that gq > 1, where g + 1 is the node degree and is the infection probability, the estimator is within a constant distance from the actual source with a high probability, independent of the number of infected nodes and the time the snapshot is taken. Our simulation results show that for tree networks, the estimator produced by the reverse-infection algorithm is closer to the actual source than the one identified by the closeness centrality heuristic. We then further evaluate the performance of the reverse infection algorithm on several real-world networks.

Proceedings ArticleDOI
01 Jun 2016
TL;DR: Simulation results confirm that QAR outperforms the existing learning solution and provides fast convergence with QoS provisioning, facilitating the practical implementations in large-scale software service-defined networks.
Abstract: Software-defined networks (SDNs) have been recognized as the next-generation networking paradigm that decouples the data forwarding from the centralized control. To realize the merits of dedicated QoS provisioning and fast route (re-)configuration services over the decoupled SDNs, various QoS requirements in packet delay, loss, and throughput should be supported by an efficient transportation with respect to each specific application. In this paper, a QoS-aware adaptive routing (QAR) is proposed in the designed multi-layer hierarchical SDNs. Specifically, the distributed hierarchical control plane architecture is employed to minimize signaling delay in large SDNs via three-levels design of controllers, i.e., the super, domain (or master), and slave controllers. Furthermore, QAR algorithm is proposed with the aid of reinforcement learning and QoS-aware reward function, achieving a time-efficient, adaptive, QoS-provisioning packet forwarding. Simulation results confirm that QAR outperforms the existing learning solution and provides fast convergence with QoS provisioning, facilitating the practical implementations in large-scale software service-defined networks.

Journal ArticleDOI
TL;DR: Mashup as discussed by the authors combines multiple heterogeneous networks, each having different connectivity patterns, to achieve more accurate inference, which enables deeper insights into the structure of rapidly accumulating and diverse biological network data and can be broadly applied to other network science domains.
Abstract: The topological landscape of molecular or functional interaction networks provides a rich source of information for inferring functional patterns of genes or proteins. However, a pressing yet-unsolved challenge is how to combine multiple heterogeneous networks, each having different connectivity patterns, to achieve more accurate inference. Here, we describe the Mashup framework for scalable and robust network integration. In Mashup, the diffusion in each network is first analyzed to characterize the topological context of each node. Next, the high-dimensional topological patterns in individual networks are canonically represented using low-dimensional vectors, one per gene or protein. These vectors can then be plugged into off-the-shelf machine learning methods to derive functional insights about genes or proteins. We present tools based on Mashup that achieve state-of-the-art performance in three diverse functional inference tasks: protein function prediction, gene ontology reconstruction, and genetic interaction prediction. Mashup enables deeper insights into the structure of rapidly accumulating and diverse biological network data and can be broadly applied to other network science domains.

Journal ArticleDOI
TL;DR: This paper proposes to establish a taxonomy of the attacks against this protocol, considering three main categories including attacks targeting network resources, attacks modifying the network topology and attacks related to network traffic.
Abstract: The growing interest for the Internet of Things is contributing to the large-scale deployment of Low power and Lossy Networks (LLN). These networks support communications amongst objects from the real world, such as home automation devices and embedded sensors, and their interconnection to the Internet. An open standard routing protocol, called RPL, has been specified by the IETF in order to address the specific properties and constraints of these networks. However, this protocol is exposed to a large variety of attacks. Their consequences can be quite significant in terms of network performance and resources. In this paper, we propose to establish a taxonomy of the attacks against this protocol, considering three main categories including attacks targeting network resources, attacks modifying the network topology and attacks related to network traffic. We describe these attacks, analyze and compare their properties, discuss existing counter-measures and their usage from a risk management perspective.

Journal ArticleDOI
TL;DR: This paper proposes an asynchronous distributed ADMM (AD-ADMM), which can effectively improve the time efficiency of distributed optimization, and analyzes the convergence conditions of the AD- ADMM, under the popular partially asynchronous model, which is defined based on a maximum tolerable delay of the network.
Abstract: Aiming at solving large-scale optimization problems, this paper studies distributed optimization methods based on the alternating direction method of multipliers (ADMM). By formulating the optimization problem as a consensus problem, the ADMM can be used to solve the consensus problem in a fully parallel fashion over a computer network with a star topology. However, traditional synchronized computation does not scale well with the problem size, as the speed of the algorithm is limited by the slowest workers. This is particularly true in a heterogeneous network where the computing nodes experience different computation and communication delays. In this paper, we propose an asynchronous distributed ADMM (AD-ADMM), which can effectively improve the time efficiency of distributed optimization. Our main interest lies in analyzing the convergence conditions of the AD-ADMM, under the popular partially asynchronous model, which is defined based on a maximum tolerable delay of the network. Specifically, by considering general and possibly non-convex cost functions, we show that the AD-ADMM is guaranteed to converge to the set of Karush–Kuhn–Tucker (KKT) points as long as the algorithm parameters are chosen appropriately according to the network delay. We further illustrate that the asynchrony of the ADMM has to be handled with care, as slightly modifying the implementation of the AD-ADMM can jeopardize the algorithm convergence, even under the standard convex setting.

Journal ArticleDOI
TL;DR: Stochastic geometry is used to analyze the performance of mmWave networks with a finite number of interferers in a finite network region and concludes that mmWave frequencies can provide gigabits per second throughput even with omni-directional transceiver antennas, and larger, more directive antenna arrays give better system performance.
Abstract: Emerging applications involving device-to-device communication among wearable electronics require gigabits per second throughput, which can be achieved by utilizing millimeter-wave (mmWave) frequency bands. When many such communicating devices are indoors in close proximity, such as in a train, car, or airplane cabin, interference can be a serious impairment. This paper uses stochastic geometry to analyze the performance of mmWave networks with a finite number of interferers in a finite network region. Prior work considered either lower carrier frequencies with different antenna and channel assumptions, or a network with an infinite spatial extent. In this paper, human users not only carry potentially interfering devices, but also act to block interfering signals. Using a sequence of simplifying assumptions, accurate expressions for coverage and rate are developed that capture the effects of key antenna characteristics, such as directivity and gain, and are a function of the finite area and number of users. The assumptions are validated through a combination of analysis and simulation. The main conclusions are that mmWave frequencies can provide gigabits per second throughput even with omni-directional transceiver antennas, and larger, more directive antenna arrays give better system performance.

Journal ArticleDOI
01 Aug 2016
TL;DR: The pinning adaptive synchronization problem is investigated, and a general criterion for ensuring network synchronization is established and a numerical example is provided to illustrate the effectiveness of the proposed criteria.
Abstract: This paper proposes a directed complex dynamical network consisting of ${N}$ linearly and diffusively coupled identical reaction-diffusion neural networks. Based on the Lyapunov functional method and the pinning control technique, some sufficient conditions are obtained to guarantee the synchronization of the proposed network model. In addition, an adaptive strategy is proposed to obtain appropriate coupling strength for achieving network synchronization. Furthermore, the pinning adaptive synchronization problem is also investigated in this paper, and a general criterion for ensuring network synchronization is established. Finally, a numerical example is provided to illustrate the effectiveness of the proposed criteria.

Proceedings Article
09 Jul 2016
TL;DR: This work proposes a novel nonlinear reconstruction method by adopting deep neural networks for representation and extends the method to a semi-supervised community detection algorithm by incorporating pairwise constraints among graph nodes.
Abstract: Identification of module or community structures is important for characterizing and understanding complex systems. While designed with different objectives, i.e., stochastic models for regeneration and modularity maximization models for discrimination, both these two types of model look for low-rank embedding to best represent and reconstruct network topology. However, the mapping through such embedding is linear, whereas real networks have various nonlinear features, making these models less effective in practice. Inspired by the strong representation power of deep neural networks, we propose a novel nonlinear reconstruction method by adopting deep neural networks for representation. We then extend the method to a semi-supervised community detection algorithm by incorporating pairwise constraints among graph nodes. Extensive experimental results on synthetic and real networks show that the new methods are effective, outperforming most state-of-the-art methods for community detection.

Journal ArticleDOI
TL;DR: A new cascade topology for multilevel converter is introduced in this paper which comprises series connection of several submultilevel units and it is shown that the total peak voltage on switches in the proposed topology is less than other structures.
Abstract: A new cascade topology for multilevel converter is introduced in this paper which comprises series connection of several submultilevel units. To determine the magnitudes of the dc sources, two new methods are described. The proposed topology is optimized to generate any levels with minimum number of components and peak voltage on switches. The presented topology can be used in high-voltage applications due to using the switches with low voltage rating. To indicate the merits of the proposed structure, comparison studies are provided with other topologies in terms of the number of elements and peak voltage on switches. The comparison results prove that the presented cascade multilevel converter requires fewer components. Moreover, it is shown that the total peak voltage on switches in the proposed topology is less than other structures. Experimental work is presented to demonstrate the performance of the presented multilevel converter.

Journal ArticleDOI
TL;DR: It is proved that two proposed event-triggered algorithms are exponentially convergent if the design parameters are chosen properly and the network topology is strongly connected and weight-balanced.

Journal ArticleDOI
TL;DR: This paper proposes an energy-efficient multi-constraint rerouting algorithm, E2MR2, which uses the energy consumption model to set up the link weight for maximum energy efficiency and exploits rerouted strategy to ensure network QoS and maximum delay constraints.
Abstract: Many researches show that the power consumption of network devices of ICT is nearly 10% of total global consumption. While the redundant deployment of network equipment makes the network utilization is relatively low, which leads to a very low energy efficiency of networks. With the dynamic and high quality demands of users, how to improve network energy efficiency becomes a focus under the premise of ensuring network performance and customer service quality. For this reason, we propose an energy consumption model based on link loads, and use the network’s bit energy consumption parameter to measure the network energy efficiency. This paper is to minimize the network’s bit energy consumption parameter, and then we propose the energy-efficient minimum criticality routing algorithm, which includes energy efficiency routing and load balancing. To further improve network energy efficiency, this paper proposes an energy-efficient multi-constraint rerouting (E2MR2) algorithm. E2MR2 uses the energy consumption model to set up the link weight for maximum energy efficiency and exploits rerouting strategy to ensure network QoS and maximum delay constraints. The simulation uses synthetic traffic data in the real network topology to analyze the performance of our method. Simulation results that our approach is feasible and promising.

Journal ArticleDOI
TL;DR: The extended linear matrix inequalities (LMIs) are used to reduce the conservativeness of the SFDCC results by introducing additional matrix variables to eliminate the couplings of Lyapunov matrices with the system matrices.

Journal ArticleDOI
TL;DR: With this approach users are enabled to detect stable states, recurring states, outlier topologies, and gain knowledge about the transitions between states and the network evolution in general, by applying it to artificial and real-world dynamic networks.
Abstract: We propose a visual analytics approach for the exploration and analysis of dynamic networks. We consider snapshots of the network as points in high-dimensional space and project these to two dimensions for visualization and interaction using two juxtaposed views: one for showing a snapshot and one for showing the evolution of the network. With this approach users are enabled to detect stable states, recurring states, outlier topologies, and gain knowledge about the transitions between states and the network evolution in general. The components of our approach are discretization, vectorization and normalization, dimensionality reduction , and visualization and interaction , which are discussed in detail. The effectiveness of the approach is shown by applying it to artificial and real-world dynamic networks.

Journal ArticleDOI
TL;DR: It is proven that, the limits of all the nodes states exist, and the absolute values of the node states reach consensus if the switching interaction graph is uniformly jointly strongly connected for unidirectional topologies, or infinitely jointly connected for bidirectionalTopologies.

Proceedings Article
12 Feb 2016
TL;DR: A novel nonnegative matrix factorization (NMF) model with two sets of parameters, the community membership matrix and community attribute matrix is proposed and the use of node attributes improves upon community detection and provides a semantic interpretation to the resultant network communities.
Abstract: Identification of modular or community structures of a network is a key to understanding the semantics and functions of the network. While many network community detection methods have been developed, which primarily explore network topologies, they provide little semantic information of the communities discovered. Although structures and semantics are closely related, little effort has been made to discover and analyze these two essential network properties together. By integrating network topology and semantic information on nodes, e.g., node attributes, we study the problems of detection of communities and inference of their semantics simultaneously. We propose a novel nonnegative matrix factorization (NMF) model with two sets of parameters, the community membership matrix and community attribute matrix, and present efficient updating rules to evaluate the parameters with a convergence guarantee. The use of node attributes improves upon community detection and provides a semantic interpretation to the resultant network communities. Extensive experimental results on synthetic and real-world networks not only show the superior performance of the new method over the state-of-the-art approaches, but also demonstrate its ability to semantically annotate the communities.

Journal ArticleDOI
TL;DR: In this article, the authors identify a generic mechanism to route information on top of collective dynamical reference states in complex networks, and demonstrate the power of this mechanism specifically for oscillatory dynamics and analyse how individual unit properties, the network topology and external inputs co-act to systematically organize information routing.
Abstract: Flexible information routing fundamentally underlies the function of many biological and artificial networks. Yet, how such systems may specifically communicate and dynamically route information is not well understood. Here we identify a generic mechanism to route information on top of collective dynamical reference states in complex networks. Switching between collective dynamics induces flexible reorganization of information sharing and routing patterns, as quantified by delayed mutual information and transfer entropy measures between activities of a network's units. We demonstrate the power of this mechanism specifically for oscillatory dynamics and analyse how individual unit properties, the network topology and external inputs co-act to systematically organize information routing. For multi-scale, modular architectures, we resolve routing patterns at all levels. Interestingly, local interventions within one sub-network may remotely determine nonlocal network-wide communication. These results help understanding and designing information routing patterns across systems where collective dynamics co-occurs with a communication function.

Journal ArticleDOI
TL;DR: A disease identification framework is designed based on the estimated temporal networks, and group level network property differences and classification results demonstrate the importance of including temporally dynamic R-fMRI scan information to improve diagnosis accuracy of mild cognitive impairment patients.
Abstract: In conventional resting-state functional MRI (R-fMRI) analysis, functional connectivity is assumed to be temporally stationary, overlooking neural activities or interactions that may happen within the scan duration. Dynamic changes of neural interactions can be reflected by variations of topology and correlation strength in temporally correlated functional connectivity networks. These connectivity networks may potentially capture subtle yet short neural connectivity disruptions induced by disease pathologies. Accordingly, we are motivated to utilize disrupted temporal network properties for improving control-patient classification performance. Specifically, a sliding window approach is firstly employed to generate a sequence of overlapping R-fMRI sub-series. Based on these sub-series, sliding window correlations, which characterize the neural interactions between brain regions, are then computed to construct a series of temporal networks. Individual estimation of these temporal networks using conventional network construction approaches fails to take into consideration intrinsic temporal smoothness among successive overlapping R-fMRI sub-series. To preserve temporal smoothness of R-fMRI sub-series, we suggest to jointly estimate the temporal networks by maximizing a penalized log likelihood using a fused sparse learning algorithm. This sparse learning algorithm encourages temporally correlated networks to have similar network topology and correlation strengths. We design a disease identification framework based on the estimated temporal networks, and group level network property differences and classification results demonstrate the importance of including temporally dynamic R-fMRI scan information to improve diagnosis accuracy of mild cognitive impairment patients.