scispace - formally typeset
Search or ask a question
Topic

Network topology

About: Network topology is a research topic. Over the lifetime, 52259 publications have been published within this topic receiving 1006627 citations.


Papers
More filters
Proceedings ArticleDOI
21 Mar 1999
TL;DR: This paper explores the problem of inferring the internal structure of a multicast distribution tree using only observations made at the end hosts and shows that the algorithm is robust and appears to converge to the correct tree with high probability.
Abstract: The efficacy of end-to-end multicast transport protocols depends critically upon their ability to scale efficiently to a large number of receivers. Several research multicast protocols attempt to achieve this high scalability by identifying sets of co-located receivers in order to enhance loss recovery, congestion control and so forth. A number of these schemes could be enhanced and simplified by some level of explicit knowledge of the topology of the multicast distribution tree, the value of the bottleneck bandwidth along the path between the source and each individual receiver and the approximate location of the bottlenecks in the tree. In this paper, we explore the problem of inferring the internal structure of a multicast distribution tree using only observations made at the end hosts. By noting correlations of loss patterns across the receiver set and by measuring how the network perturbs the fine-grained timing structure of the packets sent from the source, we can determine both the underlying multicast tree structure as well as the bottleneck bandwidths. The simulations show that the algorithm is robust and appears to converge to the correct tree with high probability.

192 citations

Proceedings ArticleDOI
01 May 2007
TL;DR: The first proof that whenever demand lambda + epsiv is feasible for epsv > 0, a simple local-control algorithm is stable under demand lambda, and as a corollary a famous theorem of Edmonds is given.
Abstract: We consider the problem of broadcasting a live stream of data in an unstructured network. The broadcasting problem has been studied extensively for edge-capacitated networks. We give the first proof that whenever demand lambda + epsiv is feasible for epsiv > 0, a simple local-control algorithm is stable under demand lambda, and as a corollary a famous theorem of Edmonds. We then study the node-capacitated case and show a similar optimality result for the complete graph. We study through simulation the delay that users must wait in order to playback a video stream with a small number of skipped packets, and discuss the suitability of our algorithms for live video streaming.

192 citations

Journal ArticleDOI
TL;DR: Pinning stabilization problem of linearly coupled stochastic neural networks (LCSNNs) is studied and some criteria are derived to judge whether the LCSNNs can be controlled in mean square by using designed controllers.
Abstract: Pinning stabilization problem of linearly coupled stochastic neural networks (LCSNNs) is studied in this paper. A minimum number of controllers are used to force the LCSNNs to the desired equilibrium point by fully utilizing the structure of the network. In order to pinning control the LCSNNs to a certain desired state, only one controller is required for strongly connected network topology, and m controllers, which will be shown to be the minimum number, are needed for LCSNNs with m -reducible coupling matrix. The isolate node of the LCSNNs can be stable, periodic, or even chaotic. The coupling Laplacian matrix of the LCSNNs can be symmetric irreducible, asymmetric irreducible, or m-reducible, which means that the network topology can be strongly connected, weakly connected, or even unconnected. There is no constraint on the network topology. Some criteria are derived to judge whether the LCSNNs can be controlled in mean square by using designed controllers. The given criteria are expressed in terms of strict linear matrix inequalities, which can be easily checked by resorting to recently developed algorithm. Moreover, numerical examples including small-world and scale-free networks are also given to demonstrate that our theoretical results are valid and efficient for large systems.

191 citations

Proceedings ArticleDOI
20 Mar 2003
TL;DR: A novel source-based Steiner tree algorithm is proposed for constructing the multicast tree that gradually adapts to the changes in underlying network topology in a fully distributed manner.
Abstract: Overlay multicast protocol builds a virtual mesh spanning all member nodes of a multicast group. It employs standard unicast routing and forwarding to fulfill multicast functionality. The advantages of this approach are robustness and low overhead. However, efficiency is an issue since the generated multicast trees are normally not optimized in terms of total link cost and data delivery delay. In this paper, we propose an efficient overlay multicast protocol to tackle this problem in MANET environment. The virtual topology gradually adapts to the changes in underlying network topology in a fully distributed manner. A novel source-based Steiner tree algorithm is proposed for constructing the multicast tree. The multicast tree is progressively adjusted according to the latest local topology information. Simulations are conducted to evaluate the tree quality. The results show that our approach solves the efficiency problem effectively.

191 citations

Journal ArticleDOI
TL;DR: Transfer entropy analysis of MEG source-level signals detected changes in the network between the different task types that prominently involved the left temporal pole and cerebellum--structures that have previously been implied in auditory short-term or working memory.
Abstract: The analysis of cortical and subcortical networks requires the identification of their nodes, and of the topology and dynamics of their interactions. Exploratory tools for the identification of nodes are available, e.g. magnetoencephalography (MEG) in combination with beamformer source analysis. Competing network topologies and interaction models can be investigated using dynamic causal modelling. However, we lack a method for the exploratory investigation of network topologies to choose from the very large number of possible network graphs. Ideally, this method should not require a pre-specified model of the interaction. Transfer entropy--an information theoretic implementation of Wiener-type causality--is a method for the investigation of causal interactions (or information flow) that is independent of a pre-specified interaction model. We analysed MEG data from an auditory short-term memory experiment to assess whether the reconfiguration of networks implied in this task can be detected using transfer entropy. Transfer entropy analysis of MEG source-level signals detected changes in the network between the different task types. These changes prominently involved the left temporal pole and cerebellum--structures that have previously been implied in auditory short-term or working memory. Thus, the analysis of information flow with transfer entropy at the source-level may be used to derive hypotheses for further model-based testing.

191 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
91% related
Wireless network
122.5K papers, 2.1M citations
87% related
Wireless sensor network
142K papers, 2.4M citations
87% related
Optimization problem
96.4K papers, 2.1M citations
87% related
Wireless
133.4K papers, 1.9M citations
87% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20231,292
20223,051
20212,286
20202,746
20192,992
20183,259