Graph Theoretic Approaches for Analyzing Routes, Flows, and Subnetworks in Communication Networks PDF Download

Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download Graph Theoretic Approaches for Analyzing Routes, Flows, and Subnetworks in Communication Networks PDF full book. Access full book title Graph Theoretic Approaches for Analyzing Routes, Flows, and Subnetworks in Communication Networks by Zohre Ranjbar-Mojaveri. Download full books in PDF and EPUB format.

Graph Theoretic Approaches for Analyzing Routes, Flows, and Subnetworks in Communication Networks

Graph Theoretic Approaches for Analyzing Routes, Flows, and Subnetworks in Communication Networks PDF Author: Zohre Ranjbar-Mojaveri
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages :

Book Description
Modeling networks as different graph types and discovering novel route finding strategies, as well as avoiding congestion in dense subnetworks via graph-theoretic approaches, contribute to overall blocking probability reduction in communication networks. We develop methods for modeling congested subnetworks and graph density measures to identify routes that avoid dense subgraphs for local or global congestion avoidance. We thoroughly review various concepts of graph density, as well as associated theorems and algorithms to identify and extract a densest subgraph from an input graph, according to different definitions of graph density. The Disjoint Connecting Paths problem, and its capacitated generalization, called Unsplittable Flow problem, play an important role in practical applications such as communication network design and routing. These tasks are NP-hard in general, but various polynomialtime approximations and efficiently solvable special cases are known. We present a solution that provides a relatively simple, efficient algorithm for the Unsplittable Flow problem in large, general directed graphs, where the task is NP-hard, and is known to remain NP-hard even to approximate up to a large factor. The efficiency of our algorithm is achieved by sacrificing a small part of the solution space. This also represents a novel paradigm for approximation: rather than giving up the search for an exact solution, we restrict the solution space to a subset that is the most important for applications, and excludes only a small part that is marginal in some well-defined sense. Specifically, the sacrificed part only contains scenarios where some edges are very close to saturation. Since nearly saturated links are undesirable in practical applications, therefore, excluding near-saturation is quite reasonable from the practical point of view. Referring the solutions that contain no nearly saturated edges as safe solutions, and call the approach safe approximation we prove that this safe approximation can be carried out efficiently. That is, once we restrict ourselves to safe solutions, but keeping the graph completely general, finding the exact optimum by a randomized polynomial time algorithm is feasible. As a further piece of graph theory based analysis, we study random graphs instances in which the edges are allowed to be dependent. The importance of random graphs in networking is provided by the fact that they are frequently used to model the network topology of radio networks. However, the most studied variant of random graph models, the Erd ̋os-Rényi random graph, is insufficient for this purpose, because of its strong simplifying assumption that the edges are stochastically independent. We generalize this model by allowing edge dependence, in a quite general way. We call our model p-robust random graph. It means that every edge is present at least with a given probability p, regardless of the presence/absence of other edges. This allows significant dependencies, but keeping independent edges as a special case. For our main result, we consider monotone graph properties: properties that are preserved whenever more edges are added. Many important graph properties are monotone. Our main result, which requires a rather sophisticated proof, is that for any monotone graph property, the p-robust random graph has at least as high probability to have the property as an Erd ̋os-Rényi random graph with edge probability p. This provides a useful general tool, as it allows the adaptation of many results from classical Erd ̋os-Rényi random graphs to a non-independent setting, via using them as lower bounds. Finally, to complement the theoretical investigations with a practical approach, we consider a fundamental component for packet traffic filtering in computer networks, called Access Control List (ACL). Packet filtering via ACL controls inbound or outbound packet traffic and provides the ability to manage the network traffic flow through a network element to optimize quality of service (QoS), network security, as well as network performance. In general, filtering packet traffic and applying rules of permit/denial to data packets flowing into network nodes are facilitated by ACL. As an industry use case, we propose a procedure of adding a link load threshold value to the Access Control List rules option, which acts on the basis of a threshold value. This enhanced ACL is helps to avoid congestion in targeted subnetworks via the link load threshold value, which allows to decide that the packet traffic is rerouted by the router to avoid congestion, or packet drop is initiated on the basis of packet priorities. We demonstrate the system operation via numerical simulation.

Graph Theoretic Approaches for Analyzing Routes, Flows, and Subnetworks in Communication Networks

Graph Theoretic Approaches for Analyzing Routes, Flows, and Subnetworks in Communication Networks PDF Author: Zohre Ranjbar-Mojaveri
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages :

Book Description
Modeling networks as different graph types and discovering novel route finding strategies, as well as avoiding congestion in dense subnetworks via graph-theoretic approaches, contribute to overall blocking probability reduction in communication networks. We develop methods for modeling congested subnetworks and graph density measures to identify routes that avoid dense subgraphs for local or global congestion avoidance. We thoroughly review various concepts of graph density, as well as associated theorems and algorithms to identify and extract a densest subgraph from an input graph, according to different definitions of graph density. The Disjoint Connecting Paths problem, and its capacitated generalization, called Unsplittable Flow problem, play an important role in practical applications such as communication network design and routing. These tasks are NP-hard in general, but various polynomialtime approximations and efficiently solvable special cases are known. We present a solution that provides a relatively simple, efficient algorithm for the Unsplittable Flow problem in large, general directed graphs, where the task is NP-hard, and is known to remain NP-hard even to approximate up to a large factor. The efficiency of our algorithm is achieved by sacrificing a small part of the solution space. This also represents a novel paradigm for approximation: rather than giving up the search for an exact solution, we restrict the solution space to a subset that is the most important for applications, and excludes only a small part that is marginal in some well-defined sense. Specifically, the sacrificed part only contains scenarios where some edges are very close to saturation. Since nearly saturated links are undesirable in practical applications, therefore, excluding near-saturation is quite reasonable from the practical point of view. Referring the solutions that contain no nearly saturated edges as safe solutions, and call the approach safe approximation we prove that this safe approximation can be carried out efficiently. That is, once we restrict ourselves to safe solutions, but keeping the graph completely general, finding the exact optimum by a randomized polynomial time algorithm is feasible. As a further piece of graph theory based analysis, we study random graphs instances in which the edges are allowed to be dependent. The importance of random graphs in networking is provided by the fact that they are frequently used to model the network topology of radio networks. However, the most studied variant of random graph models, the Erd ̋os-Rényi random graph, is insufficient for this purpose, because of its strong simplifying assumption that the edges are stochastically independent. We generalize this model by allowing edge dependence, in a quite general way. We call our model p-robust random graph. It means that every edge is present at least with a given probability p, regardless of the presence/absence of other edges. This allows significant dependencies, but keeping independent edges as a special case. For our main result, we consider monotone graph properties: properties that are preserved whenever more edges are added. Many important graph properties are monotone. Our main result, which requires a rather sophisticated proof, is that for any monotone graph property, the p-robust random graph has at least as high probability to have the property as an Erd ̋os-Rényi random graph with edge probability p. This provides a useful general tool, as it allows the adaptation of many results from classical Erd ̋os-Rényi random graphs to a non-independent setting, via using them as lower bounds. Finally, to complement the theoretical investigations with a practical approach, we consider a fundamental component for packet traffic filtering in computer networks, called Access Control List (ACL). Packet filtering via ACL controls inbound or outbound packet traffic and provides the ability to manage the network traffic flow through a network element to optimize quality of service (QoS), network security, as well as network performance. In general, filtering packet traffic and applying rules of permit/denial to data packets flowing into network nodes are facilitated by ACL. As an industry use case, we propose a procedure of adding a link load threshold value to the Access Control List rules option, which acts on the basis of a threshold value. This enhanced ACL is helps to avoid congestion in targeted subnetworks via the link load threshold value, which allows to decide that the packet traffic is rerouted by the router to avoid congestion, or packet drop is initiated on the basis of packet priorities. We demonstrate the system operation via numerical simulation.

A Graph-Theoretic Approach to Enterprise Network Dynamics

A Graph-Theoretic Approach to Enterprise Network Dynamics PDF Author: Horst Bunke
Publisher: Springer Science & Business Media
ISBN: 0817645195
Category : Computers
Languages : en
Pages : 230

Book Description
This monograph treats the application of numerous graph-theoretic algorithms to a comprehensive analysis of dynamic enterprise networks. Network dynamics analysis yields valuable information about network performance, efficiency, fault prediction, cost optimization, indicators and warnings. Based on many years of applied research on generic network dynamics, this work covers a number of elegant applications (including many new and experimental results) of traditional graph theory algorithms and techniques to computationally tractable network dynamics analysis to motivate network analysts, practitioners and researchers alike.

Graphs and Algorithms in Communication Networks

Graphs and Algorithms in Communication Networks PDF Author: Arie Koster
Publisher: Springer Science & Business Media
ISBN: 3642022502
Category : Computers
Languages : en
Pages : 442

Book Description
Algorithmic discrete mathematics plays a key role in the development of information and communication technologies, and methods that arise in computer science, mathematics and operations research – in particular in algorithms, computational complexity, distributed computing and optimization – are vital to modern services such as mobile telephony, online banking and VoIP. This book examines communication networking from a mathematical viewpoint. The contributing authors took part in the European COST action 293 – a four-year program of multidisciplinary research on this subject. In this book they offer introductory overviews and state-of-the-art assessments of current and future research in the fields of broadband, optical, wireless and ad hoc networks. Particular topics of interest are design, optimization, robustness and energy consumption. The book will be of interest to graduate students, researchers and practitioners in the areas of networking, theoretical computer science, operations research, distributed computing and mathematics.

Network flows and network design in theory and practice

Network flows and network design in theory and practice PDF Author: Jannik Matuschke
Publisher: Jannik Matuschke
ISBN:
Category :
Languages : en
Pages : 172

Book Description
Network flow and network design problems arise in various application areas of combinatorial optimization, e.g., in transportation, production, or telecommunication. This thesis contributes new results to four different problem classes from this area, providing models and algorithms with immediate practical impact as well as theoretical insights into complexity and combinatorial structure of network optimization problems: (i) We introduce a new model for tactical transportation planning that employs a cyclic network expansion to integrate routing and inventory decisions into a unified capacitated network design formulation. We also devise several algorithmic approaches to solve the resulting optimization problem and demonstrate the applicability of our approach on a set of real-world logistic networks. (ii) We present approximation algorithms for combined location and network design problems, including the first constant factor approximation for capacitated location routing. (iii) We derive a max-flow/min-cut theorem for abstract flows over time, a generalization of the well-known work of Ford and Fulkerson that restricts to a minimal set of structural requirements. (iv) We devise algorithms for finding orientations of embedded graphs with degree constraints on vertices and faces, answering an open question by Frank.

Graphs and Networks

Graphs and Networks PDF Author: Philippe Mathis
Publisher: Wiley-ISTE
ISBN: 9780470394342
Category : Mathematics
Languages : en
Pages : 428

Book Description


Graph Theoretic Methods in Multiagent Networks

Graph Theoretic Methods in Multiagent Networks PDF Author: Mehran Mesbahi
Publisher: Princeton University Press
ISBN: 0691140618
Category : Computers
Languages : en
Pages : 423

Book Description
An introduction to the analysis & design of dynamic multiagent networks. These have a wide range of applications in science & engineering, including mobile sensor networks, distributed robotics, quantum networks, networked economics, biological synchronization & social networks.

Graphs and Networks

Graphs and Networks PDF Author: Philippe Mathis
Publisher: Wiley-ISTE
ISBN: 9781118595404
Category : Mathematics
Languages : en
Pages : 428

Book Description


Graph Theory in Operations Research

Graph Theory in Operations Research PDF Author: T. B. Boffey
Publisher: Scholium International
ISBN:
Category : Mathematics
Languages : en
Pages : 320

Book Description
Textbook on network analysis and graph theory in operational research - intended for advanced students of computer science and transport studies, covers methodologys for solving shortest route and location problems, flow in distribution networks, heuristic mathematical models, linear programming, etc. Bibliography pp. 288 to 297 and illustrations.

Graph and Network Theory

Graph and Network Theory PDF Author: Mike Henning
Publisher:
ISBN: 9783031038587
Category : Discrete mathematics
Languages : en
Pages : 0

Book Description
This textbook covers a diversity of topics in graph and network theory, both from a theoretical standpoint, and from an applied modelling point of view. Mathematica® is used to demonstrate much of the modelling aspects. Graph theory and model building tools are developed in tandem with effective techniques for solving practical problems via computer implementation. The book is designed with three primary readerships in mind. Individual syllabi or suggested sequences for study are provided for each of three student audiences: mathematics, applied mathematics/operations research, and computer science. In addition to the visual appeal of each page, the text contains an abundance of gems. Most chapters open with real-life problem descriptions which serve as motivation for the theoretical development of the subject matter. Each chapter concludes with three different sets of exercises. The first set of exercises are standard and geared toward the more mathematically inclined reader. Many of these are routine exercises, designed to test understanding of the material in the text, but some are more challenging. The second set of exercises is earmarked for the computer technologically savvy reader and offer computer exercises using Mathematica. The final set consists of larger projects aimed at equipping those readers with backgrounds in the applied sciences to apply the necessary skills learned in the chapter in the context of real-world problem solving. Additionally, each chapter offers biographical notes as well as pictures of graph theorists and mathematicians who have contributed significantly to the development of the results documented in the chapter. These notes are meant to bring the topics covered to life, allowing the reader to associate faces with some of the important discoveries and results presented. In total, approximately 100 biographical notes are presented throughout the book. The material in this book has been organized into three distinct parts, each with a different focus. The first part is devoted to topics in network optimization, with a focus on basic notions in algorithmic complexity and the computation of optimal paths, shortest spanning trees, maximum flows and minimum-cost flows in networks, as well as the solution of network location problems. The second part is devoted to a variety of classical problems in graph theory, including problems related to matchings, edge and vertex traversal, connectivity, planarity, edge and vertex coloring, and orientations of graphs. Finally, the focus in the third part is on modern areas of study in graph theory, covering graph domination, Ramsey theory, extremal graph theory, graph enumeration, and application of the probabilistic method.

Telecommunications and Networking

Telecommunications and Networking PDF Author: Udo W. Pooch
Publisher: CRC Press
ISBN: 1351094009
Category : Computers
Languages : en
Pages : 354

Book Description
As the dividing line between traditional computing science and telecommunications quickly becomes blurred or disappears in today's rapidly changing environment, there is an increasing need for computer professionals to possess knowledge of telecommunications principles. Telecommunications and Networking presents a comprehensive overview of the interaction and relationship between telecommunications and data processing. The book's early chapters cover basic telecommunications vocabulary, common nomenclature, telecommunications fundamentals, as well as the important relationships among coding, error detection and correction, and noise. Later chapters discuss such topics as switching, timing, topological structures, routing algorithms, and teleprocessing. Other topics covered in detail include specific concerns inherent to computer communications, such as protocols, error detection and correction, network monitoring and security, and system validation. System designers and programmers can no longer be effective simply by understanding the tradeoffs between hardware and software. Telecommunications and Networking provides both computing professionals and students the fundamental computer communications concepts necessary to function in today's computer industry.