SlideShare a Scribd company logo
1 of 9
Download to read offline
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

www.iiste.org

Synthesis and Performance Analysis of Network Topology using
Graph Theory
U N Bassey1* K N Bassey2 E N Bassey3
1 Department of Mathematics, University of Ibadan, Ibadan, Nigeria
2 IT/Telecom Infrastructure Projects, Shell Nig. P. O. Box 1259, Warri, Nigeria
3 Department of Chemical Engineering, Akwa Ibom State University, Ikot Akpaden.
P. O. Box 3864, Uyo,Nigeria
*
E-mail of the corresponding author: un.bassey@ui.edu.ng
Abstract
In this work, the peculiarities of network topology have been explored to evolve techniques for the solution of
practical problems which manifest in the form of graphs. They also give insight into the scope and possible
areas for improvement of existing networks and as well the cost implication of incorporating efficiciency factors
into new designs. The shortest route algorithm was applied in defining the topology that maximizes reliability
during resource transmission. The algorithm was implemented using TORA Software on an Excel platform.
Key words: topology, graphs, vertices, nodes, edges, telecommunication network
1. Introduction
1.1 Network Topology as a Graph
Large Scale Systems encountered in the industries constitute a network of related physical units and their
interconnections. The structure of such arrangements is referred to as Network Topology. The practical network
problems that generally conform to a graph structure include the following (Beasley 2004):
• Communication Networks- telecommunication systems, the internet among others
• Oil /Gas and Water Pipelines
• Road and Rail Networks etc.
1.2 Challenges
As the world economy is becoming very competitive there is a great drive to streamline and integrate
information flows between diverse businesses to achieve excellence and improved profitability. This has
therefore brought a tremendous pressure on the information and communication infrastructure leading to
occasional congestion, interferences, and sometimes outright failure. Again since at the moment, the Nigerian
economy derives the largest portion of its revenue from the oil and gas sector, the related infrastructure for the
operation of this sector is of paramount importance with respect to costs efficiencies and systems sustainability.
It may be noted that these systems are often complex by virtue of the large number of units involved and their
interactions. The complexity usually associated with practical
systems may be illustrated as in Figure 1 which shows an IT Integration Network in an oil and gas environment
where infrastructure like VSAT, Routers, Switches, Workstations etc are linked and integrated (Bassey 2001).
So the challenge the Engineer is constantly facing is the task of searching for innovative configurations to ensure
that the systems work together as desired, perform optimally and meet the requirements of the customers at
minimum costs. Consequently, the problems which must be overcome include creating models which are
amenable to computer manipulation, evolving algorithms for their implementation, and evaluating the
information flows for efficiency (Bassey 2000; Bassey et al. 2005). The relationship between network topology
and the associated information flows if explored, offers useful principles for tackling these problems.
1.3 Concepts of Graph
The synthesis and optimisation of practical networks can be greatly enhanced by simulating the network
topologies using graph models. Information flows represent the values of the variables in the models and are the
function of the network topology.
A graph is a set of vertices, V(v1, v2, …vn) -, nodes (N), points, elements, units subsystems, events etc. and a set
of lines joining the nodes called edges, E(e1, e2…en) – communication links, flows, streams etc. (Koryachko et al,
1970). Graphs can be directed (digraphs) or undirected.
1.4 Useful Properties of Graphs
The network structure affects the information flows within the system (i.e. network performance, throughput,
costs, etc). It is therefore necessary to keep the link as simple as possible, and also make connections, which
present the least operating costs. Various properties of graphs are helpful in the study of practical systems, and of
particular importance to a variety of networks are the properties such as Isomorphism, Subgraphs and Tree
Structures.

46
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

www.iiste.org

1.4.1 ISOMORPHISM
a1

a 1’

a2

a 2’

Figure 2, Isomorphic Graphs, a1 ≡ a1’ and a2 ≡ a2’
Two graphs G = (V, E) and G’ = (V’, E’) are Isomorphic when there is a one to one correspondence: ie V →V’,
E →E’ such that if (vi , vj ) ∈ V, (vi’, vj’) ∈ V’ then the edge
e = (ei, ej ) ∈ E, e’ = (ei’, ej’) ∈ E’. Figure 2, illustrates Isomorphic Graphs.
Isomorphism forms the basis for representing physical objects (or systems) such as telephone, process, data
communication networks, etc by graph models.
1.4.2 Subgraphs
Subgraphs (Kafarov et al. 1974) consist of subsets of vertices and subsets of edges both belonging to a
complete graph G. Thus for a graph, G = (V, E), G’ = (V’, E’) is the subgraph if : V’ ⊆ U and E’ ⊆ E and the
edges link the vertices V. Figure 3 shows the subgraphs G1 and G2 of the complete graph G.

G

G1

G2

Figure 3. Graph, G and its Subgraphs G1 and G2
To break a graph into its component parts is to split it at its cut vertex since at the cut vertex, there is minimum
interaction between the component parts. Subgraphs are particularly useful in establishing the concept of
decomposing systems into subsystems; links and nodes into segments, etc where each subsystem or segment can
be treated as an independent structure. Examples abound in the industry, for instance in the telecommunication
system, cut vertex may be the Port Interface Modules (PIM) where station transmission /signal cards are
interfaced. In process systems, cut vertex may be the boundaries between the individual units or operations.
1.4.3
Cyclic Graph and Tree Formation
Another property of importance is that every cyclic graph contains at least one loop, and that a graph without
loops is called a tree. The tree that links all the nodes

T2
T1
Figure 4. Cyclic Graph G1 and its Spanning Trees T1 and T2.
without allowing loops is called a spanning tree, (Linnhoff et al., 1979). Figure 4 shows a
tree structure G and its spanning trees T1 and T2 formed by breaking some edges. The spanning tree forms the
basis for the design of minimum cost networks expressed mathematically as follows:
E = V-1.
(1)
where: E , V – number of edges and vertices respectively in the network.
1.4.3
Graph Matrix
The Boolean Matrix is another interesting property of a graph by which information embodied in the graph can
easily be decoded and converted into a machine language (Scheid 1983; Aspen 2000).
Of particular interest in this work, is the Incidence Matrix which is shown in relation to the graph structure, G =
(V, E) in Figure 5.
G

47
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

A =

www.iiste.org

0
1
1
0
0

1
0
1
0
0

G
1
1
1
1
0

0
0
1
0
1

0
0
0
1
0

Figure 5. Graph and its Incidence Matrix.
The Incidence Matrix, of a graph, G with V vertices may be defined as │V│ by │V│ matrix , A = aij, whose
entries are chosen such that the entry, aij = 1 if ith vertex is joined by an edge to jth vertex in G, and 0 if
otherwise, (Nozari, et al. 1981). Other criteria (Ahuja 1982; Koryachko 1970; Kafarov 1974) for generating the
graph matrix may also apply. The Adjacency Matrix is a veritable tool in the development of simple solution
approaches to network problems.
2. Application of Graph Theory to Network Problems
The graph concepts allow for the configuration of units into a network and the reconfiguration of the existing
network into minimum cost or more reliable structure (Ahuja 1982; Steward 1987; Lucey 2002). It may also
permit the decomposition of networks into subsystems for better and easier analysis. In practical terms the
structures so evolved are known as network topologies. Thus network topologies may change with time via
addition or subtraction of nodes or links to allow for determination of suitable information routes or
implementation of flow control. Furthermore changes may occur on account of temporary failure of some nodes
or due to link congestion (Ahuja 1982). Various algorithms have therefore been developed to serve as tools for
appropriately defining network topologies depending on the specific problem objectives. These include minimal
spanning tree, shortest - route algorithm, maximum flow algorithm, minimum – cost capacitated network
algorithm. Application of these methods has been reported widely and may be found in the works of Wayne
(1999), Taha (2008) and Beasley (2004) for transportation, foreign exchange/multinational tax planning
networks, Nozari et al. (1981) for computerized facility layout etc.
2.1 Telecommunication Network Case Study
A typical telecommunication system (Bassey 2001), used for linking some oil and gas operational centres is
illustrated in Figure 6. It consists of a set of nodes which are the equipment such as radios, duplexers,
multiplexers, PABX, switches, bridges etc and edges which are links used for voice or data communication. The
designed link capacities are as given on the left hand side corners of the nodes where the nodes 1, 2 and 3 are
terminal concentrators. Figure 3, emphasizes the operational topology of the network for the connections at node
1 in which possible loops 1,4,5,1; 1,8,9,1 and 1,2,3,1 are indicated. Such loops are capable of causing
information recycle resulting in inefficient operation of the network. Figure 8 further shows the architecture of
the base case network when all the nodes are interconnected and the distances between the nodes are as indicated
on the edges
The objective of this paper, was to carry out performance analysis of the base case telecommunication network
and there from synthesize topology for the network which shall be the least prone to failure.
2.2 Performing the Analysis
It is always the desire of System designers /analysts to thrive to select the most effective architecture or design
constraints which drive a system to maximum performance. Network performance is concerned with measuring
or estimating the parameters that represent
the network behavior which in most cases is the benchmark of what a system is capable of doing. The
parameters of general interest are the network delays, throughput, link utilization etc. These parameters can
consequently be measured in terms of transmission efficiency / reliability and operational cost of the network
topology (Leino et al. 2006; Ekpenyong et al. 2009).

48
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

www.iiste.org

2.3 Estimating Network Parameters
2.3.1 Network Delay
This is estimated as the delay prior to start of transmission of information as well as the delay incurred in
processing same through the link and is given by the expression (Ahuja 1982) in equation (1):
M
T = ∑ ƛiƔ-1[1/(uLi - ƛi)]
i=1

(2)

where:
T - network delay, s
ƛi - information traffic in ith link, bits/s
Ɣ- total information traffic in the network (throughput), bits/s
Li-Link capacity, bits/s
1/u-average size of information, bits
M- total number of links
2.3.2 Network Throughput
Throughput may be defined as the magnitude of information in bits per second received correctly and it is
expressed as shown in equation (2):
N N
Ɣ =∑ ∑ Ɣjk
(3)
j=1 k=1
where:
Ɣ - network throughput, bits/s
Ɣjk - average traffic from node j to node k, bits/s
N - total number of nodes from j to k
2.3.3 Link Utilization
The Link Utilisation p, can be estimated by using the expression in equation (3):
p = ƛi/uLi
(4)
where all the notations remain as earlier defined.
2.3.4 Network Cost
Assuming the distance matrix D = djk, of dimension NxN for all the nodes of the assigned region and the cost
C(x), of communicating between the nodes j and k is proportional to the distance between the nodes, djk. Then
introducing Boolean variables we have as follows:
xj =

1, if the link djk,is within the network topology
(5)
0, if otherwise
N N
C(x) = ∑ ∑ djk xjk
j=1 k=1

(6)

Under the constraints:
N
N
∑xjk = 1, ∑ xjk =1,
j=1
k=1
j, k = 1,2,3…N

xjk =0 or1

(7)

3. Synthesis of Network Topology
From the analysis above it may be observed that synthesis of the network to evolve the topology that will satisfy
the needed objective shall invariably translate into estimating the variables, xjk ∈ {0,1} using a chosen criterion
that will minimize the goal function in equation (5) (Koryachko et al., 1970).
Assuming the associated probabilities for routes with successful transmission are P1, P2, … Pk, then probability
of successful transmission through the network is the product ∏Pi = P1 . P2 . … . Pk . By using the shortest route
algorithm this problem can be solved by converting elements of log∏Pi into log P1 + log P2 +…+ log Pk = ∑ log
Pk. (Taha, 2008).
For the most reliable topology, the objective is therefore to select the routes which maximize the probabilities of
successful transmission through the network. However since log Pk ≤ 0, then the maximization of log Pk is
replaced by the minimization of – log Pk`, which values are positive.

49
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

www.iiste.org

Accordingly, Table 1 gives the probability matrix for the network shown in Figure 8. These were obtained from
estimates of the operation statistics for the telecommunication
network in Figure 6. The figures in brackets in Table 1 are the – log Pk values for the links.
4. Analysis of Results.
The shortest route algorithm due to Dijkstra was employed in solving the problem using the data in Table 1. The
solution output from TORA software (Taha 2005) for transmission from node 1 to node 10 is as shown in Figure
9. From the result, it was found that the most reliable network topology is defined by the links 1-2, 1-3, 1-5-6, 17, 1-4-8, 1-9 and 1-10 with the maximum probability of 84.1 percent.
5. Conclusion
The properties of graphs useful for the analysis and synthesis of practical networks have been enunciated.
Examples of algorithms based on graph structures capable of providing cost effective solutions to the synthesis
of networks as well as permitting incorporation of efficiency factors to drive network performance, have been
given . The study of an existing Telecommunication network where the probabilities for successful transmission
through the links varied from 0.93 to 1, has shown that the most reliable topology that can be synthesized for the
network using Dijkstra’s shortest route algorithm gives a maximum performance probability of 0.841 for a
destination from nodes 1 to 10.
References
Ahuja, V. (1982). Design and Analysis of Computer Communication Networks. Mc Graw - Hill Coy, New York
Aspen – Products – Integration (2000). http:/www.aspenntech.com/index.asp? menuchoice. (December 4.)
Bassey, K. N. (2001). An overview of IT Infrastructure in SPDC: Identification of Bottlenecks and Possible
Solutions. Technical Report -SSIN-TSSW, SPDC Warri.Nigeria.
Bassey, E.N. (2000). Of Process Network Topology and Information Flow: The Theoretical Framework.
Technical Presentation. September Meeting of the Nigerian Society of Chemical Engineers, Warri.
Bassey, E. N., Bassey, O. B., & Bassey, U. N. (2005). The Design and Analysis of Process Networks using
Spanning Tree Technology. Global Journal of Mechanical Engineering, 6, (1), 59-68
Beasley, J. E. (2004). “OR-Notes”. mscmga.ms.ic.ac.uk/jeb/or/graph.html.
Kafarov, V. V. et al. (1974). Principles of Mathematical Modelling of Chemical Process Systems. Khimia,
Moscow
Koryachko, V. et al. (1970) CAD Basics. Mir Publisher, Moscow
Leino, J., Penttinen, A., & Virtamo, J. (2006). “Flow Level Performance Analysis of Wireless DataNetworks: A
Case Study”, Proceedings of the 2006 IEEE International Conference on Communications (Reprint 6 pages)
Linnhoff, B. et al. (1979). “Understanding Heat Exchanger Network”. Computers and Chemical Engineering, 3,
295-302
Lucey, T. (2002 ). Quantitative Technique. (6th Ed.). Thompson Learning High Holborn House, 50-51 Bedford
Row, London WC1R 4LR, 374-413
Nozari, A. and Enscore (Jr), E. E. (1981). “Computerised Facility Layout with Graph Theory”, Computer &
Industrial Engineering. 5, (3), 183-193
Scheid, F. (1983). Theory and Problems of Computers and Programming. Schaum’s Outline Series, McGraw –
Hill Book Company, Singapore
Steward D. V. (1987). Software Engineering with Systems Analysis and Design. Brooks Cole Pub. Coy.
California.
Taha H.A. (2005). Operations Research: An Introduction. (7th ed.). Prentice-Hall of India Private Limited, New
Delhi.
Taha H.A. (2008). Operations Research: An Introduction. (8th Ed.). PHI Learning Private Limited. New Delhi.
Wayne, K. D. (1999). “Generalized Maximum Flow Algorithms”. PhD Dissertation, Cornell University, USA.
Winston, W. L. (1994). Operations Research: Application and Algorithnms. Wordsworth Publishing Coy,
Belmont, California, USA.

50
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

www.iiste.org

PSTN
ISDN

TCP/IP
SNMP
DHCP

Catalyst 7500

Exploration

CISCO ROUTER

Group

Ethernet
LAN
UNIX
SERVER

250 199
[23]

220 150
[26]

1200

PSTN

PSTN

864

PSTN

2000

300 264
[24]

[2]

100 25
[25]

PSTN

1921

3000
[1]
TRANSIT

[1]
200 197
[4]

200 142
[5]

300 200
[8]

200 188
[10]

200 168
[9]

100 [11]
100 [12]

[3]
ITRANSIT

3033
[3]

200 70
[6]

100 828
[15]

100 45
[19]

100 [7]

300 304
[16]

100 52
[20]

100 [13]

200 99
[17]

100 100
[21]

200 181
[18]

250 240
[22]

100 [14]

Figure 6. Typical Practical Telecommunication Network

51
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

www.iiste.org

Figure 7. Structural Configuration of the Base Case Network.

Figure 8. Network Architecture for Base Case with all nodes interconnected
Table1. Probability Matrix for the Telecommunication Network.
From
/ To
1
2

2

3

4

5

6

7

8

9

10

1
[0]

1
[0]
0.99
[0.0044]

0.99
[0.0044]

0.99
[0.0044]

0.90
[0.0458]

0.99
[0.0044]

0.93
[0.0315]

0.97
[0.0132]

0.99
[0.0044]

3
4
5

0.99
[0.0044]
0.95
[0.0223]

0.95
[0.0223]
0.95
[0.0223]

6

0.95
[0.0223]

7

0.99
[0.0044]

8

0.95
[0.0223]

9

0.95
[0.0223]

52
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

www.iiste.org

Figure 9. ‘Tora’ Solution of the most reliable Network Topology

53
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/journals/
The IISTE
editorial team promises to the review and publish all the qualified submissions in a
fast manner. All the journals articles are available online to the readers all over the
world without financial, legal, or technical barriers other than those inseparable from
gaining access to the internet itself. Printed version of the journals is also available
upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
Recent conferences: http://www.iiste.org/conference/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

More Related Content

What's hot

Concurrency Within Ternary Galois Processing of Highly-regular 3D Networks Vi...
Concurrency Within Ternary Galois Processing of Highly-regular 3D Networks Vi...Concurrency Within Ternary Galois Processing of Highly-regular 3D Networks Vi...
Concurrency Within Ternary Galois Processing of Highly-regular 3D Networks Vi...AIRCC Publishing Corporation
 
A Dependent Set Based Approach for Large Graph Analysis
A Dependent Set Based Approach for Large Graph AnalysisA Dependent Set Based Approach for Large Graph Analysis
A Dependent Set Based Approach for Large Graph AnalysisEditor IJCATR
 
An experimental evaluation of similarity-based and embedding-based link predi...
An experimental evaluation of similarity-based and embedding-based link predi...An experimental evaluation of similarity-based and embedding-based link predi...
An experimental evaluation of similarity-based and embedding-based link predi...IJDKP
 
11 construction productivity and cost estimation using artificial
11 construction productivity and cost estimation using artificial 11 construction productivity and cost estimation using artificial
11 construction productivity and cost estimation using artificial Vivan17
 
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...Kashif Mehmood
 
Spectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolationSpectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolationiaemedu
 
Dual Tree Complex Wavelet Transform, Probabilistic Neural Network and Fuzzy C...
Dual Tree Complex Wavelet Transform, Probabilistic Neural Network and Fuzzy C...Dual Tree Complex Wavelet Transform, Probabilistic Neural Network and Fuzzy C...
Dual Tree Complex Wavelet Transform, Probabilistic Neural Network and Fuzzy C...IJAEMSJORNAL
 
Ijarcet vol-2-issue-7-2230-2231
Ijarcet vol-2-issue-7-2230-2231Ijarcet vol-2-issue-7-2230-2231
Ijarcet vol-2-issue-7-2230-2231Editor IJARCET
 
An approach for color image compression of bmp and tiff images using dct and dwt
An approach for color image compression of bmp and tiff images using dct and dwtAn approach for color image compression of bmp and tiff images using dct and dwt
An approach for color image compression of bmp and tiff images using dct and dwtIAEME Publication
 
IRJET - Exploring Agglomerative Spectral Clustering Technique Employed for...
IRJET - 	  Exploring Agglomerative Spectral Clustering Technique Employed for...IRJET - 	  Exploring Agglomerative Spectral Clustering Technique Employed for...
IRJET - Exploring Agglomerative Spectral Clustering Technique Employed for...IRJET Journal
 

What's hot (13)

Concurrency Within Ternary Galois Processing of Highly-regular 3D Networks Vi...
Concurrency Within Ternary Galois Processing of Highly-regular 3D Networks Vi...Concurrency Within Ternary Galois Processing of Highly-regular 3D Networks Vi...
Concurrency Within Ternary Galois Processing of Highly-regular 3D Networks Vi...
 
A Dependent Set Based Approach for Large Graph Analysis
A Dependent Set Based Approach for Large Graph AnalysisA Dependent Set Based Approach for Large Graph Analysis
A Dependent Set Based Approach for Large Graph Analysis
 
An experimental evaluation of similarity-based and embedding-based link predi...
An experimental evaluation of similarity-based and embedding-based link predi...An experimental evaluation of similarity-based and embedding-based link predi...
An experimental evaluation of similarity-based and embedding-based link predi...
 
11 construction productivity and cost estimation using artificial
11 construction productivity and cost estimation using artificial 11 construction productivity and cost estimation using artificial
11 construction productivity and cost estimation using artificial
 
A280108
A280108A280108
A280108
 
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
 
Spectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolationSpectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolation
 
Dual Tree Complex Wavelet Transform, Probabilistic Neural Network and Fuzzy C...
Dual Tree Complex Wavelet Transform, Probabilistic Neural Network and Fuzzy C...Dual Tree Complex Wavelet Transform, Probabilistic Neural Network and Fuzzy C...
Dual Tree Complex Wavelet Transform, Probabilistic Neural Network and Fuzzy C...
 
Ijarcet vol-2-issue-7-2230-2231
Ijarcet vol-2-issue-7-2230-2231Ijarcet vol-2-issue-7-2230-2231
Ijarcet vol-2-issue-7-2230-2231
 
Planes de negocios paper
Planes de negocios paperPlanes de negocios paper
Planes de negocios paper
 
Vector data model
Vector data modelVector data model
Vector data model
 
An approach for color image compression of bmp and tiff images using dct and dwt
An approach for color image compression of bmp and tiff images using dct and dwtAn approach for color image compression of bmp and tiff images using dct and dwt
An approach for color image compression of bmp and tiff images using dct and dwt
 
IRJET - Exploring Agglomerative Spectral Clustering Technique Employed for...
IRJET - 	  Exploring Agglomerative Spectral Clustering Technique Employed for...IRJET - 	  Exploring Agglomerative Spectral Clustering Technique Employed for...
IRJET - Exploring Agglomerative Spectral Clustering Technique Employed for...
 

Viewers also liked

Parking challenges facing urban cities in tanzania evidence from dar es salaa...
Parking challenges facing urban cities in tanzania evidence from dar es salaa...Parking challenges facing urban cities in tanzania evidence from dar es salaa...
Parking challenges facing urban cities in tanzania evidence from dar es salaa...Alexander Decker
 
Parent child communication and adolescent sexual behaviour among the yoruba e...
Parent child communication and adolescent sexual behaviour among the yoruba e...Parent child communication and adolescent sexual behaviour among the yoruba e...
Parent child communication and adolescent sexual behaviour among the yoruba e...Alexander Decker
 
Relative effectiveness of water hyacinth, bacteria and fungi in purifying sewage
Relative effectiveness of water hyacinth, bacteria and fungi in purifying sewageRelative effectiveness of water hyacinth, bacteria and fungi in purifying sewage
Relative effectiveness of water hyacinth, bacteria and fungi in purifying sewageAlexander Decker
 
Paradigmatic appraisal of techniques and technology of adire in the last five...
Paradigmatic appraisal of techniques and technology of adire in the last five...Paradigmatic appraisal of techniques and technology of adire in the last five...
Paradigmatic appraisal of techniques and technology of adire in the last five...Alexander Decker
 
株式投資は恋愛シュミレーションである!?
株式投資は恋愛シュミレーションである!?株式投資は恋愛シュミレーションである!?
株式投資は恋愛シュミレーションである!?東証ソーシャルかぶコン
 
Parental education level positively affects self esteem of turkish adolescents
Parental education level positively affects self esteem of turkish adolescentsParental education level positively affects self esteem of turkish adolescents
Parental education level positively affects self esteem of turkish adolescentsAlexander Decker
 

Viewers also liked (7)

Parking challenges facing urban cities in tanzania evidence from dar es salaa...
Parking challenges facing urban cities in tanzania evidence from dar es salaa...Parking challenges facing urban cities in tanzania evidence from dar es salaa...
Parking challenges facing urban cities in tanzania evidence from dar es salaa...
 
ejer 7
ejer 7ejer 7
ejer 7
 
Parent child communication and adolescent sexual behaviour among the yoruba e...
Parent child communication and adolescent sexual behaviour among the yoruba e...Parent child communication and adolescent sexual behaviour among the yoruba e...
Parent child communication and adolescent sexual behaviour among the yoruba e...
 
Relative effectiveness of water hyacinth, bacteria and fungi in purifying sewage
Relative effectiveness of water hyacinth, bacteria and fungi in purifying sewageRelative effectiveness of water hyacinth, bacteria and fungi in purifying sewage
Relative effectiveness of water hyacinth, bacteria and fungi in purifying sewage
 
Paradigmatic appraisal of techniques and technology of adire in the last five...
Paradigmatic appraisal of techniques and technology of adire in the last five...Paradigmatic appraisal of techniques and technology of adire in the last five...
Paradigmatic appraisal of techniques and technology of adire in the last five...
 
株式投資は恋愛シュミレーションである!?
株式投資は恋愛シュミレーションである!?株式投資は恋愛シュミレーションである!?
株式投資は恋愛シュミレーションである!?
 
Parental education level positively affects self esteem of turkish adolescents
Parental education level positively affects self esteem of turkish adolescentsParental education level positively affects self esteem of turkish adolescents
Parental education level positively affects self esteem of turkish adolescents
 

Similar to Synthesis and performance analysis of network topology using graph theory

Analysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer ApplicationAnalysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer ApplicationIRJET Journal
 
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network A Modified Diagonal Mesh Shuffle Exchange Interconnection Network
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network IJECEIAES
 
5G Coupler Design for Intelligent Transportation System (ITS) Application
5G Coupler Design for Intelligent Transportation System (ITS) Application 5G Coupler Design for Intelligent Transportation System (ITS) Application
5G Coupler Design for Intelligent Transportation System (ITS) Application IJECEIAES
 
IRJET - Rain Technology
IRJET - Rain TechnologyIRJET - Rain Technology
IRJET - Rain TechnologyIRJET Journal
 
Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...IJCNCJournal
 
Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)
Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)
Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)CSCJournals
 
Statistical performance analysis of wireless communication in public transports
Statistical performance analysis of wireless communication in public transportsStatistical performance analysis of wireless communication in public transports
Statistical performance analysis of wireless communication in public transportsIAEME Publication
 
An overview on application of machine learning techniques in optical networks
An overview on application of machine learning techniques in optical networksAn overview on application of machine learning techniques in optical networks
An overview on application of machine learning techniques in optical networksKhaleda Ali
 
Application of MUSIC Algorithm for Adaptive Beamforming Smart Antenna
Application of MUSIC Algorithm for Adaptive Beamforming Smart AntennaApplication of MUSIC Algorithm for Adaptive Beamforming Smart Antenna
Application of MUSIC Algorithm for Adaptive Beamforming Smart AntennaIRJET Journal
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
 
Analysis of Hill Road Network Structure in Developing Countries
Analysis of Hill Road Network Structure in Developing CountriesAnalysis of Hill Road Network Structure in Developing Countries
Analysis of Hill Road Network Structure in Developing CountriesIJRTEMJOURNAL
 
Reliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh NetworkReliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh NetworkIRJET Journal
 
Reliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh NetworkReliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh NetworkIRJET Journal
 
The hybrid evolutionary algorithm for optimal planning of hybrid woban
The hybrid evolutionary algorithm for optimal planning of hybrid wobanThe hybrid evolutionary algorithm for optimal planning of hybrid woban
The hybrid evolutionary algorithm for optimal planning of hybrid wobanIAEME Publication
 
Reconfigurable intelligent surface passive beamforming enhancement using uns...
Reconfigurable intelligent surface passive beamforming  enhancement using uns...Reconfigurable intelligent surface passive beamforming  enhancement using uns...
Reconfigurable intelligent surface passive beamforming enhancement using uns...IJECEIAES
 
A NOVEL ROBUST AND LOW-COMPLEXITY SPACETIME CODES FOR INDUSTRY 4.0 SYSTEMS
A NOVEL ROBUST AND LOW-COMPLEXITY SPACETIME CODES FOR INDUSTRY 4.0 SYSTEMSA NOVEL ROBUST AND LOW-COMPLEXITY SPACETIME CODES FOR INDUSTRY 4.0 SYSTEMS
A NOVEL ROBUST AND LOW-COMPLEXITY SPACETIME CODES FOR INDUSTRY 4.0 SYSTEMSijwmn
 
Use of Geographic Information Systems to Build and Management a Geometric Net...
Use of Geographic Information Systems to Build and Management a Geometric Net...Use of Geographic Information Systems to Build and Management a Geometric Net...
Use of Geographic Information Systems to Build and Management a Geometric Net...ijtsrd
 

Similar to Synthesis and performance analysis of network topology using graph theory (20)

Analysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer ApplicationAnalysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer Application
 
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network A Modified Diagonal Mesh Shuffle Exchange Interconnection Network
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network
 
5G Coupler Design for Intelligent Transportation System (ITS) Application
5G Coupler Design for Intelligent Transportation System (ITS) Application 5G Coupler Design for Intelligent Transportation System (ITS) Application
5G Coupler Design for Intelligent Transportation System (ITS) Application
 
IRJET - Rain Technology
IRJET - Rain TechnologyIRJET - Rain Technology
IRJET - Rain Technology
 
Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...
 
50120130406009 2
50120130406009 250120130406009 2
50120130406009 2
 
Umts
UmtsUmts
Umts
 
Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)
Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)
Interoperator Dynamic Spectrum Sharing (Analysis, Costs and Implications)
 
Statistical performance analysis of wireless communication in public transports
Statistical performance analysis of wireless communication in public transportsStatistical performance analysis of wireless communication in public transports
Statistical performance analysis of wireless communication in public transports
 
An overview on application of machine learning techniques in optical networks
An overview on application of machine learning techniques in optical networksAn overview on application of machine learning techniques in optical networks
An overview on application of machine learning techniques in optical networks
 
Planning and Optimization of LTE Radio Access Network for Urban Area at Taiz ...
Planning and Optimization of LTE Radio Access Network for Urban Area at Taiz ...Planning and Optimization of LTE Radio Access Network for Urban Area at Taiz ...
Planning and Optimization of LTE Radio Access Network for Urban Area at Taiz ...
 
Application of MUSIC Algorithm for Adaptive Beamforming Smart Antenna
Application of MUSIC Algorithm for Adaptive Beamforming Smart AntennaApplication of MUSIC Algorithm for Adaptive Beamforming Smart Antenna
Application of MUSIC Algorithm for Adaptive Beamforming Smart Antenna
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
 
Analysis of Hill Road Network Structure in Developing Countries
Analysis of Hill Road Network Structure in Developing CountriesAnalysis of Hill Road Network Structure in Developing Countries
Analysis of Hill Road Network Structure in Developing Countries
 
Reliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh NetworkReliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh Network
 
Reliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh NetworkReliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh Network
 
The hybrid evolutionary algorithm for optimal planning of hybrid woban
The hybrid evolutionary algorithm for optimal planning of hybrid wobanThe hybrid evolutionary algorithm for optimal planning of hybrid woban
The hybrid evolutionary algorithm for optimal planning of hybrid woban
 
Reconfigurable intelligent surface passive beamforming enhancement using uns...
Reconfigurable intelligent surface passive beamforming  enhancement using uns...Reconfigurable intelligent surface passive beamforming  enhancement using uns...
Reconfigurable intelligent surface passive beamforming enhancement using uns...
 
A NOVEL ROBUST AND LOW-COMPLEXITY SPACETIME CODES FOR INDUSTRY 4.0 SYSTEMS
A NOVEL ROBUST AND LOW-COMPLEXITY SPACETIME CODES FOR INDUSTRY 4.0 SYSTEMSA NOVEL ROBUST AND LOW-COMPLEXITY SPACETIME CODES FOR INDUSTRY 4.0 SYSTEMS
A NOVEL ROBUST AND LOW-COMPLEXITY SPACETIME CODES FOR INDUSTRY 4.0 SYSTEMS
 
Use of Geographic Information Systems to Build and Management a Geometric Net...
Use of Geographic Information Systems to Build and Management a Geometric Net...Use of Geographic Information Systems to Build and Management a Geometric Net...
Use of Geographic Information Systems to Build and Management a Geometric Net...
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Synthesis and performance analysis of network topology using graph theory

  • 1. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 www.iiste.org Synthesis and Performance Analysis of Network Topology using Graph Theory U N Bassey1* K N Bassey2 E N Bassey3 1 Department of Mathematics, University of Ibadan, Ibadan, Nigeria 2 IT/Telecom Infrastructure Projects, Shell Nig. P. O. Box 1259, Warri, Nigeria 3 Department of Chemical Engineering, Akwa Ibom State University, Ikot Akpaden. P. O. Box 3864, Uyo,Nigeria * E-mail of the corresponding author: un.bassey@ui.edu.ng Abstract In this work, the peculiarities of network topology have been explored to evolve techniques for the solution of practical problems which manifest in the form of graphs. They also give insight into the scope and possible areas for improvement of existing networks and as well the cost implication of incorporating efficiciency factors into new designs. The shortest route algorithm was applied in defining the topology that maximizes reliability during resource transmission. The algorithm was implemented using TORA Software on an Excel platform. Key words: topology, graphs, vertices, nodes, edges, telecommunication network 1. Introduction 1.1 Network Topology as a Graph Large Scale Systems encountered in the industries constitute a network of related physical units and their interconnections. The structure of such arrangements is referred to as Network Topology. The practical network problems that generally conform to a graph structure include the following (Beasley 2004): • Communication Networks- telecommunication systems, the internet among others • Oil /Gas and Water Pipelines • Road and Rail Networks etc. 1.2 Challenges As the world economy is becoming very competitive there is a great drive to streamline and integrate information flows between diverse businesses to achieve excellence and improved profitability. This has therefore brought a tremendous pressure on the information and communication infrastructure leading to occasional congestion, interferences, and sometimes outright failure. Again since at the moment, the Nigerian economy derives the largest portion of its revenue from the oil and gas sector, the related infrastructure for the operation of this sector is of paramount importance with respect to costs efficiencies and systems sustainability. It may be noted that these systems are often complex by virtue of the large number of units involved and their interactions. The complexity usually associated with practical systems may be illustrated as in Figure 1 which shows an IT Integration Network in an oil and gas environment where infrastructure like VSAT, Routers, Switches, Workstations etc are linked and integrated (Bassey 2001). So the challenge the Engineer is constantly facing is the task of searching for innovative configurations to ensure that the systems work together as desired, perform optimally and meet the requirements of the customers at minimum costs. Consequently, the problems which must be overcome include creating models which are amenable to computer manipulation, evolving algorithms for their implementation, and evaluating the information flows for efficiency (Bassey 2000; Bassey et al. 2005). The relationship between network topology and the associated information flows if explored, offers useful principles for tackling these problems. 1.3 Concepts of Graph The synthesis and optimisation of practical networks can be greatly enhanced by simulating the network topologies using graph models. Information flows represent the values of the variables in the models and are the function of the network topology. A graph is a set of vertices, V(v1, v2, …vn) -, nodes (N), points, elements, units subsystems, events etc. and a set of lines joining the nodes called edges, E(e1, e2…en) – communication links, flows, streams etc. (Koryachko et al, 1970). Graphs can be directed (digraphs) or undirected. 1.4 Useful Properties of Graphs The network structure affects the information flows within the system (i.e. network performance, throughput, costs, etc). It is therefore necessary to keep the link as simple as possible, and also make connections, which present the least operating costs. Various properties of graphs are helpful in the study of practical systems, and of particular importance to a variety of networks are the properties such as Isomorphism, Subgraphs and Tree Structures. 46
  • 2. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 www.iiste.org 1.4.1 ISOMORPHISM a1 a 1’ a2 a 2’ Figure 2, Isomorphic Graphs, a1 ≡ a1’ and a2 ≡ a2’ Two graphs G = (V, E) and G’ = (V’, E’) are Isomorphic when there is a one to one correspondence: ie V →V’, E →E’ such that if (vi , vj ) ∈ V, (vi’, vj’) ∈ V’ then the edge e = (ei, ej ) ∈ E, e’ = (ei’, ej’) ∈ E’. Figure 2, illustrates Isomorphic Graphs. Isomorphism forms the basis for representing physical objects (or systems) such as telephone, process, data communication networks, etc by graph models. 1.4.2 Subgraphs Subgraphs (Kafarov et al. 1974) consist of subsets of vertices and subsets of edges both belonging to a complete graph G. Thus for a graph, G = (V, E), G’ = (V’, E’) is the subgraph if : V’ ⊆ U and E’ ⊆ E and the edges link the vertices V. Figure 3 shows the subgraphs G1 and G2 of the complete graph G. G G1 G2 Figure 3. Graph, G and its Subgraphs G1 and G2 To break a graph into its component parts is to split it at its cut vertex since at the cut vertex, there is minimum interaction between the component parts. Subgraphs are particularly useful in establishing the concept of decomposing systems into subsystems; links and nodes into segments, etc where each subsystem or segment can be treated as an independent structure. Examples abound in the industry, for instance in the telecommunication system, cut vertex may be the Port Interface Modules (PIM) where station transmission /signal cards are interfaced. In process systems, cut vertex may be the boundaries between the individual units or operations. 1.4.3 Cyclic Graph and Tree Formation Another property of importance is that every cyclic graph contains at least one loop, and that a graph without loops is called a tree. The tree that links all the nodes T2 T1 Figure 4. Cyclic Graph G1 and its Spanning Trees T1 and T2. without allowing loops is called a spanning tree, (Linnhoff et al., 1979). Figure 4 shows a tree structure G and its spanning trees T1 and T2 formed by breaking some edges. The spanning tree forms the basis for the design of minimum cost networks expressed mathematically as follows: E = V-1. (1) where: E , V – number of edges and vertices respectively in the network. 1.4.3 Graph Matrix The Boolean Matrix is another interesting property of a graph by which information embodied in the graph can easily be decoded and converted into a machine language (Scheid 1983; Aspen 2000). Of particular interest in this work, is the Incidence Matrix which is shown in relation to the graph structure, G = (V, E) in Figure 5. G 47
  • 3. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 A = www.iiste.org 0 1 1 0 0 1 0 1 0 0 G 1 1 1 1 0 0 0 1 0 1 0 0 0 1 0 Figure 5. Graph and its Incidence Matrix. The Incidence Matrix, of a graph, G with V vertices may be defined as │V│ by │V│ matrix , A = aij, whose entries are chosen such that the entry, aij = 1 if ith vertex is joined by an edge to jth vertex in G, and 0 if otherwise, (Nozari, et al. 1981). Other criteria (Ahuja 1982; Koryachko 1970; Kafarov 1974) for generating the graph matrix may also apply. The Adjacency Matrix is a veritable tool in the development of simple solution approaches to network problems. 2. Application of Graph Theory to Network Problems The graph concepts allow for the configuration of units into a network and the reconfiguration of the existing network into minimum cost or more reliable structure (Ahuja 1982; Steward 1987; Lucey 2002). It may also permit the decomposition of networks into subsystems for better and easier analysis. In practical terms the structures so evolved are known as network topologies. Thus network topologies may change with time via addition or subtraction of nodes or links to allow for determination of suitable information routes or implementation of flow control. Furthermore changes may occur on account of temporary failure of some nodes or due to link congestion (Ahuja 1982). Various algorithms have therefore been developed to serve as tools for appropriately defining network topologies depending on the specific problem objectives. These include minimal spanning tree, shortest - route algorithm, maximum flow algorithm, minimum – cost capacitated network algorithm. Application of these methods has been reported widely and may be found in the works of Wayne (1999), Taha (2008) and Beasley (2004) for transportation, foreign exchange/multinational tax planning networks, Nozari et al. (1981) for computerized facility layout etc. 2.1 Telecommunication Network Case Study A typical telecommunication system (Bassey 2001), used for linking some oil and gas operational centres is illustrated in Figure 6. It consists of a set of nodes which are the equipment such as radios, duplexers, multiplexers, PABX, switches, bridges etc and edges which are links used for voice or data communication. The designed link capacities are as given on the left hand side corners of the nodes where the nodes 1, 2 and 3 are terminal concentrators. Figure 3, emphasizes the operational topology of the network for the connections at node 1 in which possible loops 1,4,5,1; 1,8,9,1 and 1,2,3,1 are indicated. Such loops are capable of causing information recycle resulting in inefficient operation of the network. Figure 8 further shows the architecture of the base case network when all the nodes are interconnected and the distances between the nodes are as indicated on the edges The objective of this paper, was to carry out performance analysis of the base case telecommunication network and there from synthesize topology for the network which shall be the least prone to failure. 2.2 Performing the Analysis It is always the desire of System designers /analysts to thrive to select the most effective architecture or design constraints which drive a system to maximum performance. Network performance is concerned with measuring or estimating the parameters that represent the network behavior which in most cases is the benchmark of what a system is capable of doing. The parameters of general interest are the network delays, throughput, link utilization etc. These parameters can consequently be measured in terms of transmission efficiency / reliability and operational cost of the network topology (Leino et al. 2006; Ekpenyong et al. 2009). 48
  • 4. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 www.iiste.org 2.3 Estimating Network Parameters 2.3.1 Network Delay This is estimated as the delay prior to start of transmission of information as well as the delay incurred in processing same through the link and is given by the expression (Ahuja 1982) in equation (1): M T = ∑ ƛiƔ-1[1/(uLi - ƛi)] i=1 (2) where: T - network delay, s ƛi - information traffic in ith link, bits/s Ɣ- total information traffic in the network (throughput), bits/s Li-Link capacity, bits/s 1/u-average size of information, bits M- total number of links 2.3.2 Network Throughput Throughput may be defined as the magnitude of information in bits per second received correctly and it is expressed as shown in equation (2): N N Ɣ =∑ ∑ Ɣjk (3) j=1 k=1 where: Ɣ - network throughput, bits/s Ɣjk - average traffic from node j to node k, bits/s N - total number of nodes from j to k 2.3.3 Link Utilization The Link Utilisation p, can be estimated by using the expression in equation (3): p = ƛi/uLi (4) where all the notations remain as earlier defined. 2.3.4 Network Cost Assuming the distance matrix D = djk, of dimension NxN for all the nodes of the assigned region and the cost C(x), of communicating between the nodes j and k is proportional to the distance between the nodes, djk. Then introducing Boolean variables we have as follows: xj = 1, if the link djk,is within the network topology (5) 0, if otherwise N N C(x) = ∑ ∑ djk xjk j=1 k=1 (6) Under the constraints: N N ∑xjk = 1, ∑ xjk =1, j=1 k=1 j, k = 1,2,3…N xjk =0 or1 (7) 3. Synthesis of Network Topology From the analysis above it may be observed that synthesis of the network to evolve the topology that will satisfy the needed objective shall invariably translate into estimating the variables, xjk ∈ {0,1} using a chosen criterion that will minimize the goal function in equation (5) (Koryachko et al., 1970). Assuming the associated probabilities for routes with successful transmission are P1, P2, … Pk, then probability of successful transmission through the network is the product ∏Pi = P1 . P2 . … . Pk . By using the shortest route algorithm this problem can be solved by converting elements of log∏Pi into log P1 + log P2 +…+ log Pk = ∑ log Pk. (Taha, 2008). For the most reliable topology, the objective is therefore to select the routes which maximize the probabilities of successful transmission through the network. However since log Pk ≤ 0, then the maximization of log Pk is replaced by the minimization of – log Pk`, which values are positive. 49
  • 5. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 www.iiste.org Accordingly, Table 1 gives the probability matrix for the network shown in Figure 8. These were obtained from estimates of the operation statistics for the telecommunication network in Figure 6. The figures in brackets in Table 1 are the – log Pk values for the links. 4. Analysis of Results. The shortest route algorithm due to Dijkstra was employed in solving the problem using the data in Table 1. The solution output from TORA software (Taha 2005) for transmission from node 1 to node 10 is as shown in Figure 9. From the result, it was found that the most reliable network topology is defined by the links 1-2, 1-3, 1-5-6, 17, 1-4-8, 1-9 and 1-10 with the maximum probability of 84.1 percent. 5. Conclusion The properties of graphs useful for the analysis and synthesis of practical networks have been enunciated. Examples of algorithms based on graph structures capable of providing cost effective solutions to the synthesis of networks as well as permitting incorporation of efficiency factors to drive network performance, have been given . The study of an existing Telecommunication network where the probabilities for successful transmission through the links varied from 0.93 to 1, has shown that the most reliable topology that can be synthesized for the network using Dijkstra’s shortest route algorithm gives a maximum performance probability of 0.841 for a destination from nodes 1 to 10. References Ahuja, V. (1982). Design and Analysis of Computer Communication Networks. Mc Graw - Hill Coy, New York Aspen – Products – Integration (2000). http:/www.aspenntech.com/index.asp? menuchoice. (December 4.) Bassey, K. N. (2001). An overview of IT Infrastructure in SPDC: Identification of Bottlenecks and Possible Solutions. Technical Report -SSIN-TSSW, SPDC Warri.Nigeria. Bassey, E.N. (2000). Of Process Network Topology and Information Flow: The Theoretical Framework. Technical Presentation. September Meeting of the Nigerian Society of Chemical Engineers, Warri. Bassey, E. N., Bassey, O. B., & Bassey, U. N. (2005). The Design and Analysis of Process Networks using Spanning Tree Technology. Global Journal of Mechanical Engineering, 6, (1), 59-68 Beasley, J. E. (2004). “OR-Notes”. mscmga.ms.ic.ac.uk/jeb/or/graph.html. Kafarov, V. V. et al. (1974). Principles of Mathematical Modelling of Chemical Process Systems. Khimia, Moscow Koryachko, V. et al. (1970) CAD Basics. Mir Publisher, Moscow Leino, J., Penttinen, A., & Virtamo, J. (2006). “Flow Level Performance Analysis of Wireless DataNetworks: A Case Study”, Proceedings of the 2006 IEEE International Conference on Communications (Reprint 6 pages) Linnhoff, B. et al. (1979). “Understanding Heat Exchanger Network”. Computers and Chemical Engineering, 3, 295-302 Lucey, T. (2002 ). Quantitative Technique. (6th Ed.). Thompson Learning High Holborn House, 50-51 Bedford Row, London WC1R 4LR, 374-413 Nozari, A. and Enscore (Jr), E. E. (1981). “Computerised Facility Layout with Graph Theory”, Computer & Industrial Engineering. 5, (3), 183-193 Scheid, F. (1983). Theory and Problems of Computers and Programming. Schaum’s Outline Series, McGraw – Hill Book Company, Singapore Steward D. V. (1987). Software Engineering with Systems Analysis and Design. Brooks Cole Pub. Coy. California. Taha H.A. (2005). Operations Research: An Introduction. (7th ed.). Prentice-Hall of India Private Limited, New Delhi. Taha H.A. (2008). Operations Research: An Introduction. (8th Ed.). PHI Learning Private Limited. New Delhi. Wayne, K. D. (1999). “Generalized Maximum Flow Algorithms”. PhD Dissertation, Cornell University, USA. Winston, W. L. (1994). Operations Research: Application and Algorithnms. Wordsworth Publishing Coy, Belmont, California, USA. 50
  • 6. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 www.iiste.org PSTN ISDN TCP/IP SNMP DHCP Catalyst 7500 Exploration CISCO ROUTER Group Ethernet LAN UNIX SERVER 250 199 [23] 220 150 [26] 1200 PSTN PSTN 864 PSTN 2000 300 264 [24] [2] 100 25 [25] PSTN 1921 3000 [1] TRANSIT [1] 200 197 [4] 200 142 [5] 300 200 [8] 200 188 [10] 200 168 [9] 100 [11] 100 [12] [3] ITRANSIT 3033 [3] 200 70 [6] 100 828 [15] 100 45 [19] 100 [7] 300 304 [16] 100 52 [20] 100 [13] 200 99 [17] 100 100 [21] 200 181 [18] 250 240 [22] 100 [14] Figure 6. Typical Practical Telecommunication Network 51
  • 7. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 www.iiste.org Figure 7. Structural Configuration of the Base Case Network. Figure 8. Network Architecture for Base Case with all nodes interconnected Table1. Probability Matrix for the Telecommunication Network. From / To 1 2 2 3 4 5 6 7 8 9 10 1 [0] 1 [0] 0.99 [0.0044] 0.99 [0.0044] 0.99 [0.0044] 0.90 [0.0458] 0.99 [0.0044] 0.93 [0.0315] 0.97 [0.0132] 0.99 [0.0044] 3 4 5 0.99 [0.0044] 0.95 [0.0223] 0.95 [0.0223] 0.95 [0.0223] 6 0.95 [0.0223] 7 0.99 [0.0044] 8 0.95 [0.0223] 9 0.95 [0.0223] 52
  • 8. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 www.iiste.org Figure 9. ‘Tora’ Solution of the most reliable Network Topology 53
  • 9. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ Recent conferences: http://www.iiste.org/conference/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar