• DocumentCode
    3238751
  • Title

    Minimizing Eccentricity in Composite Networks via Constrained Edge Additions

  • Author

    Perumal, Senni ; Basu, Prithwish ; Ziyu Guan

  • Author_Institution
    Raytheon BBN Technol., Cambridge, MA, USA
  • fYear
    2013
  • fDate
    18-20 Nov. 2013
  • Firstpage
    1894
  • Lastpage
    1899
  • Abstract
    In practical military or first responder deployment scenarios, information flows need to adhere to specified policies regardless of the physical connectivity of nodes. Nodes in such networks are associated with various levels in a command-and-control hierarchy, and therefore typically form a logical hierarchical tree network that is used to route both command and data traffic. Associated with this logical hierarchical network is a communication network that represents the connectivity of these nodes in the deployed scenario. Such composite networks introduce constraints that can result in information flows having to traverse much longer paths in the underlying communication network. In this paper, we look at the problem of adding edges to a logical hierarchical network (or any other social network) so as to minimize the number of hops required to route data traffic in the underlying communication network from a node to other specified nodes. The edges added are a subset of all possible edges in the complementary logical hierarchical graph and have to satisfy specified hierarchical constraints. First, we consider the general problem of minimizing the eccentricity of a source node ´s´ (where eccentricity of ´s´ is the maximum of the shortest paths from ´s´ to all other nodes) in a metric graph on adding upto ´B´ unequal cost metric edges from the set of all edges in the complementary graph. We develop an efficient constant factor approximation algorithm for this case that outperforms existing constant factor algorithms for eccentricity minimization. Here the added edge metric cost as well as the graph edge metric cost correspond to the number of hops in the shortest path required to route traffic in the actual deployed topology (i.e., underlying communication network). Next, we consider the case where the set of possible added edges is a specified subset of the edges in the complementary graph and the set of destinations is a subset of the graph nodes. For th- s case, we develop heuristic algorithms based on the previous eccentricity minimizing algorithm that show good performance. We validate our algorithms using two realistic military deployment scenarios. We find that adding even a low number of hierarchically constrained edges (of the order of 10) can cause a significant decrease (around 50%) in the eccentricity of a node in the logical hierarchical network and thus can reduce the number of hops required for data traffic traversal.
  • Keywords
    computer networks; social networking (online); telecommunication traffic; trees (mathematics); command-and-control hierarchy; communication network; composite networks; constrained edge additions; data traffic traversal; heuristic algorithms; information flows; logical hierarchical tree network; physical connectivity; social network; Approximation algorithms; Approximation methods; Communication networks; Heuristic algorithms; Measurement; Minimization; Peer-to-peer computing; composite networks; constrained edge addition; metric edge addition; minimize eccentricity;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Military Communications Conference, MILCOM 2013 - 2013 IEEE
  • Conference_Location
    San Diego, CA
  • Type

    conf

  • DOI
    10.1109/MILCOM.2013.319
  • Filename
    6735901