ebook img

Evolutionary Dynamics of Complex Communications Networks PDF

318 Pages·2013·5.689 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Evolutionary Dynamics of Complex Communications Networks

(cid:105) (cid:105) “K15155” — 2013/9/10 — 9:05 (cid:105) (cid:105) Evolutionary Dynamics of Complex Communications Networks (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) “K15155” — 2013/9/10 — 9:05 (cid:105) (cid:105) OTHER cOmmunicaTiOns BOOKs FROm auERBacH Ad Hoc Mobile Wireless Networks: Linear Programming and Algorithms for Principles, Protocols, and Applications, Communication Networks: A Practical Guide Second Edition to Network Design, Control, and Management Subir Kumar Sarkar, T.G. Basavaraju, Eiji Oki and C. Puttamadappa ISBN 978-1-4665-5263-0 ISBN 978-1-4665-1446-1 Multihomed Communication with SCTP Building Next-Generation Converged Networks: (Stream Control Transmission Protocol) Theory and Practice Victor C.M. Leung, Eduardo Parente Ribeiro, Al-Sakib Khan Pathan, Mostafa Monowar, Alan Wagner, and Janardhan Iyengar and Zubair Md. Fadlullah (Editors) ISBN 978-1-4665-6698-9 ISBN 978-1-4665-0761-6 Next-Generation Mobile Broadcasting Game Theory in Communication Networks: David Gómez-Barquero Cooperative Resolution of Interactive ISBN 978-1-4398-9866-6 Networking Scenarios Optimal Resource Allocation for Josephina Antoniou and Andreas Pitsillides Distributed Video Communication ISBN 978-1-4398-4808-1 Yifeng He and Ling Guan ISBN 978-1-4398-7514-8 Green Communications and Networking F. Richard Yu, Xi Zhang, and Victor C.M. Leung (Editors) SC-FDMA for Mobile Communications ISBN 978-1-4398-9913-7 Fathi E. Abd El-Samie, Faisal S. Al-kamali, Azzam Y. Al-nahary, and Moawad I. Dessouky Handbook on Mobile and Ubiquitous ISBN 978-1-4665-1071-5 Computing: Status and Perspective Laurence T. Yang, Evi Syukur, and Seng W. Loke (Editors) Security and Privacy in Smart Grids ISBN 978-1-4398-4811-1 Yang Xiao (Editor) ISBN 978-1-4398-7783-8 Identification and Management of Distributed Data: NGN, Content-Centric Networks and Security for Wireless Sensor Networks the Web using Identity-Based Cryptography Giovanni Bartolomeo and Tatiana Kováčiková Harsh Kupwade Patil and Stephen A. Szygenda ISBN 978-1-4398-7907-8 ISBN 978-1-4398-6901-7 Intelligent Sensor Networks: The Integration Transmission Techniques for 4G Systems of Sensor Networks, Signal Processing and Mário Marques da Silva, Americo Correia, Nuno Souto, Machine Learning and Joao Carlos Silva Fei Hu (Editor) ISBN 978-1-4665-1233-7 ISBN 978-1-4398-9281-7 Wireless Sensor Networks: Current Status The Internet of Things in the Cloud: and Future Trends A Middleware Perspective Shafiullah Khan, Nabil Ali Alrajeh, and Honbo Zhou Al-Sakib Khan Pathan (Editors) ISBN 978-1-4398-9299-2 ISBN 978-1-4665-0606-0 auERBacH PuBLicaTiOns www.auerbach-publications.com To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401 E-mail: [email protected] (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) “K15155” — 2013/9/10 — 9:05 (cid:105) (cid:105) Evolutionary Dynamics of Complex Communications Networks Vasileios Karyotis Eleni Stai Symeon Papavassiliou (cid:105) (cid:105) (cid:105) (cid:105) CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2014 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20130806 International Standard Book Number-13: 978-1-4665-1841-4 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit- ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright. com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com (cid:105) (cid:105) “K15155” — 2013/9/10 — 9:05 (cid:105) (cid:105) Contents Preface ix 1 Introduction 1 1.1 Approach and Objectives . . . . . . . . . . . . . . . . . . . . . 2 1.2 Fundamentals of Complex Networks . . . . . . . . . . . . . . . 5 1.2.1 Complex Networks Fundamentals . . . . . . . . . . . . . 10 1.2.2 Complex Network Taxonomy and Examples . . . . . . . 12 1.3 Network Science . . . . . . . . . . . . . . . . . . . . . . . . . . 18 1.3.1 Content and Promise of Network Science . . . . . . . . 21 1.3.2 Networks and Network Research in the 21st Century . . 23 1.3.3 Status and Challenges of Network Science . . . . . . . . 25 2 Basic Network Graph Models and Their Properties 29 2.1 Graph Theory Fundamentals . . . . . . . . . . . . . . . . . . . 30 2.1.1 Basic Definitions and Notation . . . . . . . . . . . . . . 31 2.1.2 Additional Definitions . . . . . . . . . . . . . . . . . . . 35 2.1.3 Connectivity . . . . . . . . . . . . . . . . . . . . . . . . 38 2.1.4 Paths and Cycles . . . . . . . . . . . . . . . . . . . . . . 46 2.1.5 Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 2.1.6 Planarity . . . . . . . . . . . . . . . . . . . . . . . . . . 50 2.1.7 Coloring (Covering) . . . . . . . . . . . . . . . . . . . . 53 2.1.8 Algebraic Graph Theory . . . . . . . . . . . . . . . . . . 55 2.2 Random Graphs . . . . . . . . . . . . . . . . . . . . . . . . . . 59 2.2.1 Basic Random Graph Models . . . . . . . . . . . . . . . 60 2.3 Notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 3 Cognitive Methods and Evolutionary Computing 65 3.1 Brief History of Evolutionary Computing . . . . . . . . . . . . 66 3.2 Elements from Evolution Theory . . . . . . . . . . . . . . . . . 66 3.3 Evolutionary Computing . . . . . . . . . . . . . . . . . . . . . . 68 3.3.1 Components of Evolutionary Algorithms . . . . . . . . . 70 3.3.2 Representation . . . . . . . . . . . . . . . . . . . . . . . 72 3.3.3 Fitness Function . . . . . . . . . . . . . . . . . . . . . . 73 v (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) “K15155” — 2013/9/10 — 9:05 (cid:105) (cid:105) vi Contents 3.3.4 Population . . . . . . . . . . . . . . . . . . . . . . . . . 73 3.3.5 Parent Selection . . . . . . . . . . . . . . . . . . . . . . 74 3.3.6 Variation Operators: Recombination and Mutation . . . 74 3.3.7 Survivor Selection . . . . . . . . . . . . . . . . . . . . . 75 3.3.8 Initialization and Termination Conditions . . . . . . . . 75 3.3.9 Operation of Evolutionary Algorithm . . . . . . . . . . 76 3.4 Evolutionary Computing Approaches . . . . . . . . . . . . . . . 79 3.4.1 Genetic Algorithms. . . . . . . . . . . . . . . . . . . . . 79 3.4.2 Evolutionary Strategy . . . . . . . . . . . . . . . . . . . 91 3.4.3 Genetic Programming . . . . . . . . . . . . . . . . . . . 95 3.4.4 Evolutionary Programming . . . . . . . . . . . . . . . . 98 3.4.5 Evolutionary Computing at a Glance . . . . . . . . . . . 100 3.4.6 Parameter Control in Evolutionary Algorithms . . . . . 100 3.4.7 Special Forms of Evolution . . . . . . . . . . . . . . . . 105 4 Complex and Social Network Analysis Metrics and Features 109 4.1 Degree Distribution . . . . . . . . . . . . . . . . . . . . . . . . 110 4.2 Strength . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 4.3 Average Path Length . . . . . . . . . . . . . . . . . . . . . . . . 114 4.4 Clustering Coefficient . . . . . . . . . . . . . . . . . . . . . . . 115 4.4.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . 115 4.4.2 Extension to Weighted Graphs . . . . . . . . . . . . . . 116 4.4.3 Extension to Directed Graphs . . . . . . . . . . . . . . . 118 4.5 Centrality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 4.5.1 Degree Centrality. . . . . . . . . . . . . . . . . . . . . . 123 4.5.2 Closeness (Path) Centrality . . . . . . . . . . . . . . . . 125 4.5.3 Betweenness Centrality . . . . . . . . . . . . . . . . . . 128 4.5.4 Betweenness Centrality Approximation Methods . . . . 130 4.5.5 Eigenvector Centrality . . . . . . . . . . . . . . . . . . . 135 4.5.6 Example of Centralities’ Computation . . . . . . . . . . 136 4.6 Prestige . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 4.6.1 Degree Prestige . . . . . . . . . . . . . . . . . . . . . . . 139 4.6.2 Influence Domain . . . . . . . . . . . . . . . . . . . . . . 139 4.6.3 Proximity Prestige . . . . . . . . . . . . . . . . . . . . . 140 4.7 Curvature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 4.8 Metrics at a Glance . . . . . . . . . . . . . . . . . . . . . . . . 143 5 Distinctive Structure and Features of Complex Networks 145 5.1 Network Structure and Evolution . . . . . . . . . . . . . . . . . 145 5.2 Small-world Paradigm . . . . . . . . . . . . . . . . . . . . . . . 146 5.2.1 Prolegomena—Description of a Small-World Network . 146 5.2.2 Large-scale Experiments—“Six Degrees of Separation” . 148 5.2.3 Watts and Strogatz Model (WS Model) . . . . . . . . . 150 5.2.4 Kleinberg’s Model . . . . . . . . . . . . . . . . . . . . . 153 (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) “K15155” — 2013/9/10 — 9:05 (cid:105) (cid:105) Contents vii 5.2.5 Examples and Applications . . . . . . . . . . . . . . . . 155 5.3 Scale-free Networks . . . . . . . . . . . . . . . . . . . . . . . . . 158 5.3.1 Definition and Properties . . . . . . . . . . . . . . . . . 158 5.3.2 Examples and Applications . . . . . . . . . . . . . . . . 161 5.3.3 Barab´asi–Albert Model . . . . . . . . . . . . . . . . . . 162 5.3.4 Extensions of the Barab´asi–Albert Model . . . . . . . . 168 5.4 Hyperbolic Structure of Complex Networks . . . . . . . . . . . 176 5.4.1 Background on Hyperbolic Geometry . . . . . . . . . . 176 5.4.2 Evolutionary Models Developed on Hyperbolic Geometry . . . . . . . . . . . . . . . . . . . . . . . . . . 178 5.5 Expansion Properties. . . . . . . . . . . . . . . . . . . . . . . . 180 5.5.1 Definition and Analytical Properties . . . . . . . . . . . 180 5.5.2 Applications of Expander Graphs . . . . . . . . . . . . . 184 5.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 6 Evolutionary Approaches 187 6.1 A Brief Description of Wireless Multi-hop Communications . . 188 6.2 Topology Control (TC) and Inverse Topology Control (iTC) . . 191 6.3 Spatial Graphs and Small-World Phenomenon . . . . . . . . . . 192 6.4 Inverse Topology Control-Based Approaches . . . . . . . . . . . 195 6.4.1 Early Approaches Using Wired Shortcuts . . . . . . . . 196 6.4.2 Approaches Using Wireless Shortcuts . . . . . . . . . . 202 6.5 Holistic Topology Modification Framework . . . . . . . . . . . . 208 6.5.1 Weighted Edge Churn Framework . . . . . . . . . . . . 209 6.5.2 Weighted Node Churn Framework . . . . . . . . . . . . 216 6.5.3 Combined Mechanism (WEC and WNC) . . . . . . . . 220 6.5.4 Optimization Methodology . . . . . . . . . . . . . . . . 221 6.6 Special Cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 6.6.1 Example 1: Elimination to Binary Graphs (SETM) . . . 229 6.6.2 Example 2: Trust Management in Wireless Multi-Hop Networks . . . . . . . . . . . . . . . . . . . . . . . . . . 236 6.7 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 7 Conclusion 247 7.1 Lessons Learned . . . . . . . . . . . . . . . . . . . . . . . . . . 247 7.1.1 Emerging Trends and Their Benefits . . . . . . . . . . . 248 7.1.2 Discussion on Evolutionary Topology Modification Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . 251 7.2 The Road Ahead . . . . . . . . . . . . . . . . . . . . . . . . . . 251 7.2.1 Route Covered Already . . . . . . . . . . . . . . . . . . 251 7.2.2 Open Problems . . . . . . . . . . . . . . . . . . . . . . . 253 7.3 Epilogue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Appendices 257 (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) “K15155” — 2013/9/10 — 9:05 (cid:105) (cid:105) viii Contents A Geometric Probability 259 A.1 Probability Theory Elements . . . . . . . . . . . . . . . . . . . 259 A.2 Probabilistic Modeling of the Deployment of a Wireless Multi- Hop Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 B Semirings and Path Problems 263 B.1 Monoids . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 B.2 Semirings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264 B.3 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 References 267 Author Index 277 Subject Index 283 (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) (cid:105) “K15155” — 2013/9/10 — 9:05 (cid:105) (cid:105) Preface In this book, we start the exploration of evolutionary dynamics for complex networkswithaworkingexamplethatmightlookfamiliartomanypeople,at least partially. The specific example intends to highlight the various aspects of everyday life and work where humans encounter, use, act on and obtain information from their interaction with complex communications networks, as well as numerous other emerging functions. Such an example will drive the following steps of the exploration of this book into a research domain currently shaping and even expanding rapidly. Then we provide a more elab- oratedoverviewofthetopic,relatedgoals,andfeaturesprovidedbythisbook. Finally, we provide potential alternative strategies for studying the material provided, depending on whether the book is intended as a research reference, an undergraduate or graduate course reference manual, or simply a reference of broader interest. Working Example An executive of a multi-national company hires a taxi from Tokyo Financial CentertogotowardstheInternationalairport,tocatchherreturnflighttothe United States. The driver quickly consults the GPS device of the vehicle for thetrafficstreetmap,inordertoidentifythefastestroutetotheairport.The executive has requested a speedy lift, which will ensure she boards on time. Theroutedurationestimationis40min,safelyenablingtheexecutivetocheck her email through her mobile handheld device in the meantime, rather than worryaboutcatchingherflight.BoththeaccuracyoftheGPSapplicationand theluxuryofagoodinternationalroamingplanallowhertofocusonherjob, whilenotwastingenergyonlogistics.Thelatestemailrequireshertocomplete areport,thus,shealsoopensuphertabletdevice,connectstothe4Gnetwork of the local provider, and via roaming and VPN, she connects safely to the intranet of her corporation, in order to complete the short report online and make it accessible to her supervisor in Philadelphia as soon as possible. Incidentally,assoonasthetaxireachestheairport,theexecutivereceives an emergency call, informing her that she needs to reschedule her flight and visitthecorporateofficesinLosAngelesforacoupleofdaysbeforereturning ix (cid:105) (cid:105) (cid:105) (cid:105)

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.