2018
DOI: 10.1142/s0219525918500066
|View full text |Cite
|
Sign up to set email alerts
|

Time-Varying Network Modeling and Its Optimal Routing Strategy

Abstract: Since all the existing real world networks are evolving, the study of traffic dynamics is a challenging task. Avoidance of traffic congestion, system utility maximization and enhancement of network capacity are prominent issues. Network capacity may be improved either by optimizing network topology or enhancing in routing approach. In this context, we propose and design a model of the time-varying data communication networks (TVCN) based on the dynamics of inflowing links. Traffic congestion can be avoided by … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…At each time instant, few nodes appear and some links are also getting added into the network. A TVCN model is proposed by us 21 where, three operations are performed at each time instants; addition of nodes and links, removal and rewiring of links. Addition and rewiring of links are based on the preferential attachment where, probability Π that a node i will be selected through preferential attachment is proportional to its degree and is given by, Π = ki j∈N kj .…”
Section: Time Varying Communication Network Modelmentioning
confidence: 99%
“…At each time instant, few nodes appear and some links are also getting added into the network. A TVCN model is proposed by us 21 where, three operations are performed at each time instants; addition of nodes and links, removal and rewiring of links. Addition and rewiring of links are based on the preferential attachment where, probability Π that a node i will be selected through preferential attachment is proportional to its degree and is given by, Π = ki j∈N kj .…”
Section: Time Varying Communication Network Modelmentioning
confidence: 99%
“…Like the terrorist network, the deception method can be used to hide the status of the participants in the social network and so on. 11,16,17 Similarly, we may apply deception technique to hide internet of things (IoT) devices in cloud computing environment [18][19][20][21][22][23][24] from the CDAs. By doing that we can preserve the identity of such devices and it will be helpful to perform some analysis on such environments.…”
Section: Introductionmentioning
confidence: 99%
“…The security agents deploy themselves in the network associated with terrorist activities, who pretend themselves as a part of the terrorist community to get the information about the terrorist activities; however, they do not want to be revealed by the outside world. Like the terrorist network, the deception method can be used to hide the status of the participants in the social network and so on 11,16,17 . Similarly, we may apply deception technique to hide internet of things (IoT) devices in cloud computing environment 18–24 from the CDAs.…”
Section: Introductionmentioning
confidence: 99%
“…Network structure may be optimized by redistributing the traffic of heavily loaded [6], removing some congested nodes or links [7], adding some network resources [8] and so on. In real networks, the resources such as capacity, queue size are finite.…”
Section: Introductionmentioning
confidence: 99%