SlideShare a Scribd company logo
Institut
Mines-Telecom
Topology of wireless
networks
L. Decreusefond
Also starring (by chronological order of
appearance)
P. Martins, E. Ferraz, F. Yan, A. Vergne, I.
Flint, N.K. Le
Séminaire Brillouin
Historique
Algebraic topology
Poisson homologies
Outline
Historique
Algebraic topology
Poisson homologies
2/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
History
1870 1970 2000
3/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Sensors : ambient or pervasive computing
4/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Applications : intelligent vehicle, agriculture, house,
...
5/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Outline
Historique
Algebraic topology
Poisson homologies
6/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Coverage
0 0.5 1 1.5 2 2.5 3 3.5 4
0
0.5
1
1.5
2
2.5
3
3.5
4
0 0.5 1 1.5 2 2.5 3 3.5 4
0
0.5
1
1.5
2
2.5
3
3.5
4
Figure 3: A sensors’ network and its associated ˘Cech complex.
Definition 9 (Vietoris-Rips complex) Given (X, d) a metric space, ! a fi-
nite set of points in X, and ✏ a real positive number. The Vietoris-Rips complex
of parameter ✏ of !, denoted R✏(!), is the abstract simplicial complex whose
k-simplices correspond to unordered (k + 1)-tuples of vertices in ! which are
pairwise within distance less than ✏ of each other.
7/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Mathematical framework
Geometry leads to a combinatorial object
Combinatorial object is equipped with a Linear
algebra structure
Coverage and connectivity reduce to compute the
rank of a matrix
Localisation of hole: reduces to the computation of a
basis of a vector matrix, obtained by matrix reduction
(as in Gauss algorithm).
8/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Cech complex
9/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Cech complex
9/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Cech complex
9/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Cech complex
9/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Cech complex
9/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Cech complex
9/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Cech complex
a
b
c
d
e
Vertices : a, b, c, d, e
Edges : ab, bc, ca, be, ec, ed
Triangles : bec
Tetrahedron : ∅
10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Cech complex
a
b
c
d
e
Vertices : a, b, c, d, e
Edges : ab, bc, ca, be, ec, ed
Triangles : bec
Tetrahedron : ∅
10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Cech complex
a
b
c
d
e
Vertices : a, b, c, d, e
Edges : ab, bc, ca, be, ec, ed
Triangles : bec
Tetrahedron : ∅
10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Cech complex
a
b
c
d
e
Vertices : a, b, c, d, e
Edges : ab, bc, ca, be, ec, ed
Triangles : bec
Tetrahedron : ∅
10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Cech complex
a
b
c
d
e
Vertices : a, b, c, d, e
Edges : ab, bc, ca, be, ec, ed
Triangles : bec
Tetrahedron : ∅
10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Cech complex
a
b
c
d
e
Vertices : { a, b, c, d, e } = C0
Edges : {ab, bc, ca, be, ec, ed } = C1
Triangles : {bec} = C2
Tetrahedron : ∅ = C3
Comput. Rips
10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Cech complex
k-simplices
Ck = {[x0, · · · , xk−1], xi ∈ ω, ∩k
i=0B(xi , ) = ∅}
Nerve theorem
We can read some topological properties of x∈ω B(x, ) on
(Ck, k ≥ 0)
Same nb of connected components
Same nb of holes
Same Euler characteristic
11/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Boundary operator
Definition
∂k : Ck −→ Ck−1
[v0, · · · , vk] −→
k
j=0
(−1)j
[v0, · · · , ˆvj , · · · ]
12/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Boundary operator
Definition
∂k : Ck −→ Ck−1
[v0, · · · , vk] −→
k
j=0
(−1)j
[v0, · · · , ˆvj , · · · ]
Example
∂2(bec) = ec − bc + be
12/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Boundary operator
Definition
∂k : Ck −→ Ck−1
[v0, · · · , vk] −→
k
j=0
(−1)j
[v0, · · · , ˆvj , · · · ]
Example
∂2(bec) = ec − bc + be
∂1∂2(bec) = c − e − (c − b) + e − b = 0
12/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Theorem
∂k ◦ ∂k+1 = 0
Consequence
Im ∂k+1 ⊂ ker∂k
Definition
Hk = ker ∂k/Im∂k+1 and βk = dim ker ∂k − range ∂k+1
13/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Interpretation : The magic
β0 : number of connected components
β1 : number of holes
β2 : number of voids
to be continued
14/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Example
∂0 ≡ 0, ∂1 =






−1 0 1 −1 0 0
1 −1 0 0 0 −1
0 1 −1 0 1 0
0 0 0 0 0 1
0 0 0 1 −1 0






Nb of connected components
dim ker ∂0 = 5, range ∂1 = 4 hence β0 = 1
15/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Number of holes
∂2 =








0
−1
0
1
1
0








Nb of holes
dim ker∂1 = 2, range ∂2 = 1 hence β1 = 1
16/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Polygons=cycles
β1 = Nb of independent polygons − Nb of independent triangles.
17/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Polygons=cycles
β1 = Nb of independent polygons − Nb of independent triangles.
17/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Polygons=cycles
β1 = Nb of independent polygons − Nb of independent triangles.
β1 = 2 − 1 = 1.
17/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Polygons=cycles
β1 = Nb of independent polygons − Nb of independent triangles.
β1 = 2 − 2 = 0.
17/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Definition
χ =
d
j=0
(−1)j
βj
Discrete Morse inequality
− |Ck−1| + |Ck| − |Ck+1| ≤ βk ≤ |Ck|
18/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Definition
χ =
d
j=0
(−1)j
βj =
∞
j=0
(−1)j
|Ck|
Discrete Morse inequality
− |Ck−1| + |Ck| − |Ck+1| ≤ βk ≤ |Ck|
18/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Alternative complex
Cech complex
[v0, · · · , vk] ∈ Ck ⇐⇒ ∩k
j=0B(xj , ) = ∅
Rips-Vietoris complex
[v0, · · · , vk] ∈ Rk ⇐⇒ B(xj , ) ∩ B(xk, ) = ∅
k simplex = clique of k + 1 points
19/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Difference RV vs Cech
For the l∞
distance
RV=Cech
Euclidean norm : false negative
Rips complex may miss some holes
20/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Difference RV vs Cech
For the l∞
distance
RV=Cech
Euclidean norm : false negative
Rips complex may miss some holes
20/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Cech vs Rips
R (V) ⊂ ˇC (V) ⊂ R2 (V) whenever ≥
d
2(d + 1)
Euclidean distance (D.-Feng-Martins)
Coverage radius RS
Communication radius RC = γRS
21/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Upper-bound of the error
Theorem (
√
3 ≤ γ ≤ 2)
p2dl (λ) =2πλ2
Rc /
√
3
Rs
r0dr0
ϕu(r0)
ϕl (r0)
dϕ1
R1(r0,ϕ1)
r0
e−λπr2
0
× e−λ|S+(r0,ϕ1)|
(1 − e−λ|S−(r0,r1,ϕ1)|
)r1dr1
(1)
where
ϕl (r0)=2 arccos(Rc /(2r0)), ϕu(r0)=2 arcsin(Rc /(2r0))−2 arccos(Rc /(2r0))
R1(r0,ϕ1)=min(
√
R2
c −r2
0 sin2 ϕ1−r0 cos ϕ1
√
R2
c −r2
0 sin2(ϕ1+ϕl (r0))+r0 cos(ϕ1+ϕl (r0)))
22/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
0 0.002 0.004 0.006 0.008 0.01 0.012 0.014 0.016 0.018 0.02
0
1
2
3
4
5
6
7
8
9
intensity λ
p2d(λ)(%)
simulation γ = 2.0
lower bound γ = 2.0
simulation γ = 2.2
lower bound γ = 2.2
simulation γ = 2.4
lower bound γ = 2.4
simulation γ = 2.6
lower bound γ = 2.6
simulation γ = 2.8
lower bound γ = 2.8
simulation γ = 3.0
lower bound γ = 3.0
Probability to miss a hole using RRS
and RRC
23/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Goals and related works
Evaluate Betti nb and Euler charac. in some random settings
Penrose : Asymptotics of E[|Ck|m] for Euclidian-RG Rips
complex on the whole space (m = 1, 2)
Kähle : Asymptotics of E[βk] for Euclidian-RG Cech complex
(deterministic number of points) and ER
24/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Goals and related works
Evaluate Betti nb and Euler charac. in some random settings
Penrose : Asymptotics of E[|Ck|m] for Euclidian-RG Rips
complex on the whole space (m = 1, 2)
Kähle : Asymptotics of E[βk] for Euclidian-RG Cech complex
(deterministic number of points) and ER
Our results
Exact expressions of all moments of |Ck| and χ in any dimension for
RG complex on a torus for the l∞ norm
24/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Outline
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
25/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Random setting
x1
a
a
a
a
x1
ε
[0, a] × [0, a]
T2
a×a
26/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Euler characteristic
d=1 : {χ = 0 ∩ β0 = 0} ⇔ { circle is covered }
d=2 : {χ = 0 ∩ β0 = β1} ⇔ { domain is covered }
d=3 : {χ = 0 ∩ β0 + β2 = β1} ⇔ { space is covered }
27/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Euler characteristic (D.-Ferraz-Randriam-Vergne)
Euler characteristic
E [χ] = −
λe−θ ad
θ
Bd (−θ ad
) where θ = λ
2
a
d
.
where Bd is the d-th Bell polynomial
Bd (x) =
d
1
x +
d
2
x2
+ ... +
d
d
xd
28/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
k simplices
The key remark
|Ck| = h(x1, · · · , xk)dω(k)
(x1, · · · , xk)
where
h(x1, · · · , xk)
1
k!
i=j
1{ xi −xj < }
First moments
E[|Ck|] = λad (k + 1)d
(k + 1)!
(ad
θ)k
29/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Dimension 5
30/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Depoissonization
k simplices
E[|Ck| | |C0| = n] =
n
k + 1
(k + 1)d 2
a
dk
Euler characteristic
E[χ | |C0| = n] =
n
k=0
n
k + 1
(−1)k
(k + 1)d 2
a
dk
31/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Second order moments
Cov(|Ck|, |Cl |) =
1
2
d l−1
i=0
1
i!(k − l + i)!(l − i)!
θk+i
× k + i + 2
i(k − l + i)
l − i + 1
d
.
32/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Second order moments
Cov(|Ck|, |Cl |) =
1
2
d l−1
i=0
1
i!(k − l + i)!(l − i)!
θk+i
× k + i + 2
i(k − l + i)
l − i + 1
d
.
Tools
Chaos decomposition of |Ck|
Chaos multiplication formula
32/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Poisson chaos
Theorem
In(f ⊗n
) = f (x1) (dω(x1) − λ dx1)
n
= . . .
k
j=1
f (xj ) ⊗n
j=1 ( dω(xj ) − λdxj )
=
n
k=0
n
k
(−1)n−k
×
k
j=1
f (xj ) dω(k)
(x1, · · · , xk) ( f (x)λ dx)n−k
33/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Chaos
Extension
Any symmetric f (x1, · · · , xk) is the limit of
gn =
i
αn,i
k
j=1
fn,i (xj )
Ik(f ) is defined by linearity
For f non symmetric, let
f s
(x1, · · · , xk) =
1
k!
σ∈Sk
f (xσ(1), · · · , xσ(k))
and
In(f ) := In(f s
)
34/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Chaos multiplication formula
Theorem
Ii (fi )Ij (fj )
=
2(i∧j)
s=0
Ii+j−s


s≤2t≤2(s∧i∧j)
t!
i
t
j
t
t
s − t
fi ◦s−t
t fj


35/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Euler characteristic
Euler characteristic
var[χ] =
a
2
d
∞
n=1
cd
n θn
,
where
cd
n = n
j= (n+1)/2
2
j
i=n−j+1
(−1)i+j
(n−j)!(n−i)!(i+j−n)!
n+
2(n−i)(n−j)
1+i+j−n
d
− 1
(n−j)!2(2j−n)!
n+
2(n−j)2
1+2j−n
d

.
36/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Euler characteristic
Euler characteristic
var[χ] =
a
2
d
∞
n=1
cd
n θn
,
where
cd
n = n
j= (n+1)/2
2
j
i=n−j+1
(−1)i+j
(n−j)!(n−i)!(i+j−n)!
n+
2(n−i)(n−j)
1+i+j−n
d
− 1
(n−j)!2(2j−n)!
n+
2(n−j)2
1+2j−n
d

.
In dimension 1,
Var(χ) = θe−θ
− 2θ2
e−2θ
36/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Asymptotic results
If λ → ∞, βi (ω)
p.s.
−→ βi (Td ) = d
i .
37/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Limit theorems
CLT for Euler characteristic
distanceTV
χ − E[χ]
Vχ
, N(0, 1) ≤
c
√
λ
·
38/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Limit theorems
CLT for Euler characteristic
distanceTV
χ − E[χ]
Vχ
, N(0, 1) ≤
c
√
λ
·
Method
Stein method
Malliavin calculus for Poisson process
38/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Concentration inequality
Discrete gradient Dx F(ω) = F(ω ∪ {x}) − F(ω)
Dx β0 ∈ {1, 0, −1, −2, −3}
39/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Concentration inequality
Discrete gradient Dx F(ω) = F(ω ∪ {x}) − F(ω)
Dx β0 ∈ {1, 0, −1, −2, −3}
39/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Concentration inequality
Discrete gradient Dx F(ω) = F(ω ∪ {x}) − F(ω)
Dx β0 ∈ {1, 0, −1, −2, −3}
c > E[β0]
P(β0 ≥ c) ≤ exp −
c − E[β0]
6
log 1 +
c − E[β0]
3λ
39/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Complexity
An important remark
Construction of the complex is exponential (worst case)
40/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Complexity
An important remark
Construction of the complex is exponential (worst case)
Computations of Betti numbers is polynomial
40/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Further application (D.-Martins-Vergne)
Green networking
Switch off some sensors keeping the coverage
Height of an edge
Rank of the highest simplex it belongs to
Index of a vertex
Infimum of the height of its adjacent edges
41/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
v0
v1
v2 v3
v4
D[v0, v1, v2]=D[v0, v1, v3]=D[v0, v2, v3]=D[v1, v2, v3]=3
D[v1, v3, v4] = 2
I[v0]=I[v2]=3 and I[v1]=I[v3]=I[v4]=2
42/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Example
We can see in Figure 5 the realisation of the coverage algorithm on a Vietoris-
Rips complex of parameter ✏ = 1 based on a Poisson point process of intensity
= 4.2 on a square of side length 2, with a fixed boundary of vertices on the
square perimeter. The boundary vertices are circled in red.
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
1.8
2
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
1.8
2
Figure 5: A Vietoris-Rips complex before and after the coverage reduction al-
gorithm.
For this configuration, on average on 200 runs, the algorithm removed 69.22%
of the non-boundary vertices, and computed in 206.01 seconds.
We can see in Figure 6 the realisation of the connectivity algorithm on a
Erdös-Rényi complex of parameter n = 15 and p = 0.3, with random active
vertices. We chose a small number of vertices for the figure to be readable.
A vertex is active with probability pa = 0.5 independantly from every other
vertices. The graph key is the same as before.
Complexity C bounded by 2H
43/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Complexity
θn = (rn/a)d
θk =
k
1+η−d
k−1
n
k
k−1
, θk =
k−1+η+d
k−1
n
k
k−1
θn ∈ [θk, θk] =⇒ C
n→∞
−−−→ k
44/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Other regimes
Theorem (Critical: nθn → 1)
C = O(n3 ln n).
45/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Other regimes
Theorem (Critical: nθn → 1)
C = O(n3 ln n).
Theorem (Super-critiqual: nθn → ∞)
Cn = O(2n
n3
)
45/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Improvement
Energy saving
Path loss
Received Power = K
Emitted power
distance(E, R)γ
46/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Improvement
Energy saving
Path loss
Received Power = K
Emitted power
distance(E, R)γ
Covering radius such that
Received Power ≥ Threshold
46/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Improvement
Energy saving
Path loss
Received Power = K
Emitted power
distance(E, R)γ
Covering radius such that
Received Power ≥ Threshold
Covering radius proportional to (Emitted power)1/γ
46/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Power saving algorithm I
get collection of cells C and corresponding vertice V;
build Čech complex for C;
compute Betti number β∗
0, β∗
1 and index ˆiv for each v ∈ V;
flag fence, critical cells as not reducible;
flag cells whose index ≤ 2 as not reducible;
ˆimax = max{ˆiv |v ∈ V};
while exist a reducible cell do
C∗ ← collection of cells whose index = ˆimax
c is a cell ∈ C∗ whose biggest radius;
Rold ← Rc;
if Rc − ∆Rc ≥ Rc,min then
Rc ← Rc − ∆Rc;
else
turn off cell c;
47/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Power saving algorithm II
end if
build Čech complex for C and compute β0, β1;
compute index for cell c;
if β0 = β∗
0 or β0 = β∗
0 or ˆic < 2 then
Rc = Rc + ∆Rc;
set cell c is not reducible and set index of c to −1;
end if
compute index for every cell ∈ C;
ˆimax = max{ˆiv |v ∈ V};
end while
48/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Around 60% of power saving
49/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Damaged wireless network
Quality of Service
Coverage
50/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Damaged wireless network
Quality of Service
Coverage
Disaster
Damaged nodes
Coverage holes
Several connected
components
51/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Damaged wireless network
Quality of Service
Coverage
Disaster
Damaged nodes
Coverage holes
Several connected
components
52/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Recovery
Addition of temporary nodes
Not in the same positions as the previous ones
Just enough to repair the network
Questions
How do we know that the network is repaired?
Where do we put the new nodes?
53/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Damaged wireless network
Addition of virtual
boundary nodes
To define the area to
cover
54/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Damaged wireless network
Addition of virtual
boundary nodes
To define the area to
cover
54/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Damaged wireless network
Addition of virtual
boundary nodes
To define the area to
cover
Computation of the
coverage complex
β0 = 2
β1 = 1
54/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Where do we put the new nodes?
Constraints
Add enough nodes to repair the network
Not too much
Last step
Remove superfluous nodes
55/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Where do we put the new nodes?
Virtual nodes addition methods
Grid
Uniform
Determinantal
56/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Classic addition methods
Grid method
Deterministic number
of nodes
Deterministic
positions
57/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Classic addition methods
Grid method
Deterministic number
of nodes
Deterministic
positions
57/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Classic addition methods
Grid method
Deterministic number
of nodes
Deterministic
positions
57/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Classic addition methods
Uniform method
Add nodes until the
square is covered
Random positions
following a uniform
law on the square
58/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Classic addition methods
Uniform method
Add nodes until the
square is covered
Random positions
following a uniform
law on the square
58/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Classic addition methods
Uniform method
Add nodes until the
square is covered
Random positions
following a uniform
law on the square
58/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Ginibre point process
Ginibre point process
Let K(x, y) = ∞
k=1 Bkφk(x)φk(y), where Bk, k = 1, 2, . . . ,
are k independent Bernoulli variables and
φk(x) = 1√
πk!
e
−|x|2
2 xk for x ∈ C and k ∈ N
The Ginibre point process is the point process with correlation
function given by
ρn(x1, . . . , xn) = det(K(xi , xj )1≤i,j≤n)
E[ξ(K)(ξ(K) − 1) . . . (ξ(K) − n + 1)]
=
Kn
ρn(x1, . . . , xn)dx1 . . . dxn
59/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Ginibre point process
Ginibre point process
Let K(x, y) = ∞
k=1 Bkφk(x)φk(y), where Bk, k = 1, 2, . . . ,
are k independent Bernoulli variables and
φk(x) = 1√
πk!
e
−|x|2
2 xk for x ∈ C and k ∈ N
The Ginibre point process is the point process with correlation
function given by
ρn(x1, . . . , xn) = det(K(xi , xj )1≤i,j≤n)
E[ξ(K)(ξ(K) − 1) . . . (ξ(K) − n + 1)]
=
Kn
ρn(x1, . . . , xn)dx1 . . . dxn
Relatively easy to simulate on a compact set [2]59/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Repulsion
Definition (Papangelou intensity)
c(x, ω) = P(x + ω ⊂ ξ | ω ⊂ ξ)
60/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Repulsion
Definition (Papangelou intensity)
c(x, ω) = P(x + ω ⊂ ξ | ω ⊂ ξ)
Theorem (For a Ginibre process)
c(x, {x1, · · · , xn}) =
det J({x1, · · · , xn, x})
det J({x1, · · · , xn})
where
J(x, y) =
n≥1
K◦(n)
(x, y)
K◦(n)
(x, y) = K◦(n−1)
(x, z)K(z, y) dz
60/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Repulsion
Definition (Papangelou intensity)
c(x, ω) = P(x + ω ⊂ ξ | ω ⊂ ξ)
Theorem (For a Ginibre process)
c(x, {x1, · · · , xn}) =
det J({x1, · · · , xn, x})
det J({x1, · · · , xn})
where
J(x, y) =
n≥1
K◦(n)
(x, y)
K◦(n)
(x, y) = K◦(n−1)
(x, z)K(z, y) dz
ω ⊂ η =⇒ c(x, η) ≤ c(x, ω)60/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Repulsion (in picture)
61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Repulsion (in picture)
61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Repulsion (in picture)
61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Repulsion (in picture)
61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Repulsion (in picture)
61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Repulsion (in picture)
61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Repulsion (in picture)
61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Repulsion (in picture)
61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Repulsion (in picture)
61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Ginibre determinantal point process
Figure : Poisson point process vs Ginibre determinantal point process
62/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Determinantal addition method
Determinantal method
Add nodes until the
square is covered
Random positions
using a Ginibre point
process
63/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Determinantal addition method
Determinantal method
Add nodes until the
square is covered
Random positions
using a Ginibre point
process
63/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Determinantal addition method
Determinantal method
Add nodes until the
square is covered
Random positions
using a Ginibre point
process
63/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Final configuration (with determinantal addition
method)
Reduction algorithm
Removal of
superfluous added
nodes
Optimized number of
added nodes
64/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Final configuration (with determinantal addition
method)
Reduction algorithm
Removal of
superfluous added
nodes
Optimized number of
added nodes
64/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Final configuration (with determinantal addition
method)
Reduction algorithm
Removal of
superfluous added
nodes
Optimized number of
added nodes
64/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Comparison between addition methods
Different scenarios depending on the percentage of area still
covered after the disaster
Square side of 1
Coverage radius of 0.25
Mean number of added vertices:
% of area initially covered 20% 40% 60% 80%
Grid method 9.00 9.00 9.00 9.00
Uniform method 32.51 29.34 24.64 15.63
Determinantal method 16.00 14.62 12.36 7.79
65/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Comparison with a greedy algorithm
Greedy algorithm
Lays nodes along a grid
Adds nodes from the furthest to the nearest
Until the furthest is already covered
Similar to our algorithm with the grid addition method
Mean final number of added vertices:
% of area initially covered 20% 40% 60% 80%
Greedy algorithm 3.69 3.30 2.84 1.83
Homology algorithm 4.42 3.87 2.97 1.78
66/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Robustness
% of area initially covered 20% 40% 60% 80%
Greedy algorithm 0.68 0.67 0.48 0.35
Homology algorithm 0.58 0.52 0.36 0.26
Table : Mean number of holes after a Gaussian perturbation
% of area initially covered 20% 40% 60% 80%
Greedy algorithm 40.7% 45.2% 58.8% 68.9%
Homology algorithm 54.0% 58.0% 68.8% 76.1%
Table : Probability that there is no hole after a Gaussian perturbation
67/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Conclusion
Disaster recovery algorithm
patches damaged wireless network
adds enough virtual nodes to repair the network
runs a reduction algorithm on the virtual added nodes
Simplicial homology representation
to compute the connectivity and the coverage of a wireless
network
Ginibre determinantal point process
to place nodes where they are needed
68/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Bibliography I
[1] L. Decreusefond, E. Ferraz, H. Randriam and A. Vergne.
Simplicial Homology of Random Configurations. In Advances in
Applied Probability, 46(2), 2014. hal-00578955
[2] L. Decreusefond, I. Flint, and A. Vergne. Efficient simulation of
the Ginibre process. hal-00869259, to appear in Adv. in Applied
Prob.
[3] A. Vergne, L. Decreusefond, and P. Martins. Reduction
algorithm for simplicial complexes. In INFOCOM, 2013
Proceedings IEEE, pages 475–479, 2013. hal-00864303
69/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
Historique
Algebraic topology
Poisson homologies
Euler characteristic
Asymptotic results
Robust estimate
Bibliography II
[4] A. Vergne, I. Flint, L. Decreusefond, and P. Martins. Disaster
Recovery in Wireless Networks: A Homology-Based Algorithm.
In International Conference on Telecommunications 2014
(ICT2014), May 2014. Best paper award. hal-00800520
[5] A. Vergne. Topologie algébrique appliquée aux réseaux de
capteurs, PhD (2013) Prix de thèse Futur et Ruptures, 2014
70/66 June, 2014 Institut Mines-Telecom Topology of wireless networks

More Related Content

Viewers also liked

Revisiting Constitutive Rules
Revisiting Constitutive RulesRevisiting Constitutive Rules
Revisiting Constitutive Rules
Giovanni Sileno
 
Networking Topologies in Computers
Networking Topologies in ComputersNetworking Topologies in Computers
Networking Topologies in ComputersAnkur Pandey
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
mc aa
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
Siddique Ibrahim
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
Karthik
 

Viewers also liked (6)

Revisiting Constitutive Rules
Revisiting Constitutive RulesRevisiting Constitutive Rules
Revisiting Constitutive Rules
 
04 transmission media
04 transmission media04 transmission media
04 transmission media
 
Networking Topologies in Computers
Networking Topologies in ComputersNetworking Topologies in Computers
Networking Topologies in Computers
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 

Similar to Topological algebra for wireless networks

ListOfTechProjsWITHSphinxV1
ListOfTechProjsWITHSphinxV1ListOfTechProjsWITHSphinxV1
ListOfTechProjsWITHSphinxV1Carlo Fanara
 
Transferring quantum information through the
Transferring quantum information through theTransferring quantum information through the
Transferring quantum information through the
ijngnjournal
 
Transferring Quantum Information through the Quantum Channel using Synchronou...
Transferring Quantum Information through the Quantum Channel using Synchronou...Transferring Quantum Information through the Quantum Channel using Synchronou...
Transferring Quantum Information through the Quantum Channel using Synchronou...
josephjonse
 
SMART TRANSMITTER AND RECEIVER FOR UNDERWATER
SMART TRANSMITTER AND RECEIVER FOR UNDERWATERSMART TRANSMITTER AND RECEIVER FOR UNDERWATER
SMART TRANSMITTER AND RECEIVER FOR UNDERWATER
Ritu Bharti
 
ASP-Lecture-KadriDiallo.pdf
ASP-Lecture-KadriDiallo.pdfASP-Lecture-KadriDiallo.pdf
ASP-Lecture-KadriDiallo.pdf
ssuser86a7cf
 
Behalf Of Pamela Collaboration
Behalf Of Pamela CollaborationBehalf Of Pamela Collaboration
Behalf Of Pamela Collaboration
ahmad bassiouny
 
Design and Implementation of Log-Periodic Antenna
Design and Implementation of Log-Periodic AntennaDesign and Implementation of Log-Periodic Antenna
Design and Implementation of Log-Periodic AntennaShruti Nadkarni
 
Single photon sources and detectors
Single photon sources and detectorsSingle photon sources and detectors
Single photon sources and detectors
Gabriel O'Brien
 
Invited review article single photon sources and detectors
Invited review article single photon sources and detectorsInvited review article single photon sources and detectors
Invited review article single photon sources and detectors
Gabriel O'Brien
 
A wideband hybrid plasmonic fractal patch nanoantenn
A wideband hybrid plasmonic fractal patch nanoantennA wideband hybrid plasmonic fractal patch nanoantenn
A wideband hybrid plasmonic fractal patch nanoantenn
IAEME Publication
 
[Erik g. larsson,_petre_stoica]_space-time_block
[Erik g. larsson,_petre_stoica]_space-time_block[Erik g. larsson,_petre_stoica]_space-time_block
[Erik g. larsson,_petre_stoica]_space-time_block
thuhienptit2003
 
PPT.pptx
PPT.pptxPPT.pptx
Harish presentation
Harish presentationHarish presentation
Harish presentationpikuldash9
 
Multi Qubit Transmission in Quantum Channels Using Fibre Optics Synchronously...
Multi Qubit Transmission in Quantum Channels Using Fibre Optics Synchronously...Multi Qubit Transmission in Quantum Channels Using Fibre Optics Synchronously...
Multi Qubit Transmission in Quantum Channels Using Fibre Optics Synchronously...
researchinventy
 
Overview of carbon nanotubes cnts novelof applications as microelectronics op...
Overview of carbon nanotubes cnts novelof applications as microelectronics op...Overview of carbon nanotubes cnts novelof applications as microelectronics op...
Overview of carbon nanotubes cnts novelof applications as microelectronics op...
IAEME Publication
 
46 Complete Photoproduction Experiments - AIP Conference Proceedings, October...
46 Complete Photoproduction Experiments - AIP Conference Proceedings, October...46 Complete Photoproduction Experiments - AIP Conference Proceedings, October...
46 Complete Photoproduction Experiments - AIP Conference Proceedings, October...
Cristian Randieri PhD
 
Abc pso optimization technique for parameter optimization in circular log per...
Abc pso optimization technique for parameter optimization in circular log per...Abc pso optimization technique for parameter optimization in circular log per...
Abc pso optimization technique for parameter optimization in circular log per...
eSAT Journals
 
Abc pso optimization technique for parameter optimization in circular log per...
Abc pso optimization technique for parameter optimization in circular log per...Abc pso optimization technique for parameter optimization in circular log per...
Abc pso optimization technique for parameter optimization in circular log per...
eSAT Journals
 
A new dynamic single row routing for channel
A new dynamic single row routing for channelA new dynamic single row routing for channel
A new dynamic single row routing for channel
eSAT Publishing House
 

Similar to Topological algebra for wireless networks (20)

ListOfTechProjsWITHSphinxV1
ListOfTechProjsWITHSphinxV1ListOfTechProjsWITHSphinxV1
ListOfTechProjsWITHSphinxV1
 
Transferring quantum information through the
Transferring quantum information through theTransferring quantum information through the
Transferring quantum information through the
 
Transferring Quantum Information through the Quantum Channel using Synchronou...
Transferring Quantum Information through the Quantum Channel using Synchronou...Transferring Quantum Information through the Quantum Channel using Synchronou...
Transferring Quantum Information through the Quantum Channel using Synchronou...
 
SMART TRANSMITTER AND RECEIVER FOR UNDERWATER
SMART TRANSMITTER AND RECEIVER FOR UNDERWATERSMART TRANSMITTER AND RECEIVER FOR UNDERWATER
SMART TRANSMITTER AND RECEIVER FOR UNDERWATER
 
ASP-Lecture-KadriDiallo.pdf
ASP-Lecture-KadriDiallo.pdfASP-Lecture-KadriDiallo.pdf
ASP-Lecture-KadriDiallo.pdf
 
Behalf Of Pamela Collaboration
Behalf Of Pamela CollaborationBehalf Of Pamela Collaboration
Behalf Of Pamela Collaboration
 
Design and Implementation of Log-Periodic Antenna
Design and Implementation of Log-Periodic AntennaDesign and Implementation of Log-Periodic Antenna
Design and Implementation of Log-Periodic Antenna
 
Single photon sources and detectors
Single photon sources and detectorsSingle photon sources and detectors
Single photon sources and detectors
 
Invited review article single photon sources and detectors
Invited review article single photon sources and detectorsInvited review article single photon sources and detectors
Invited review article single photon sources and detectors
 
A wideband hybrid plasmonic fractal patch nanoantenn
A wideband hybrid plasmonic fractal patch nanoantennA wideband hybrid plasmonic fractal patch nanoantenn
A wideband hybrid plasmonic fractal patch nanoantenn
 
[Erik g. larsson,_petre_stoica]_space-time_block
[Erik g. larsson,_petre_stoica]_space-time_block[Erik g. larsson,_petre_stoica]_space-time_block
[Erik g. larsson,_petre_stoica]_space-time_block
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
Harish presentation
Harish presentationHarish presentation
Harish presentation
 
Multi Qubit Transmission in Quantum Channels Using Fibre Optics Synchronously...
Multi Qubit Transmission in Quantum Channels Using Fibre Optics Synchronously...Multi Qubit Transmission in Quantum Channels Using Fibre Optics Synchronously...
Multi Qubit Transmission in Quantum Channels Using Fibre Optics Synchronously...
 
Overview of carbon nanotubes cnts novelof applications as microelectronics op...
Overview of carbon nanotubes cnts novelof applications as microelectronics op...Overview of carbon nanotubes cnts novelof applications as microelectronics op...
Overview of carbon nanotubes cnts novelof applications as microelectronics op...
 
46 Complete Photoproduction Experiments - AIP Conference Proceedings, October...
46 Complete Photoproduction Experiments - AIP Conference Proceedings, October...46 Complete Photoproduction Experiments - AIP Conference Proceedings, October...
46 Complete Photoproduction Experiments - AIP Conference Proceedings, October...
 
Abc pso optimization technique for parameter optimization in circular log per...
Abc pso optimization technique for parameter optimization in circular log per...Abc pso optimization technique for parameter optimization in circular log per...
Abc pso optimization technique for parameter optimization in circular log per...
 
Abc pso optimization technique for parameter optimization in circular log per...
Abc pso optimization technique for parameter optimization in circular log per...Abc pso optimization technique for parameter optimization in circular log per...
Abc pso optimization technique for parameter optimization in circular log per...
 
A new dynamic single row routing for channel
A new dynamic single row routing for channelA new dynamic single row routing for channel
A new dynamic single row routing for channel
 
JingLi_Resume
JingLi_ResumeJingLi_Resume
JingLi_Resume
 

Recently uploaded

The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
Health Advances
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
muralinath2
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
Lokesh Patil
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
muralinath2
 
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptxBody fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
muralinath2
 
Cancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate PathwayCancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate Pathway
AADYARAJPANDEY1
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
muralinath2
 
Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.
Nistarini College, Purulia (W.B) India
 
Lateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensiveLateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensive
silvermistyshot
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
AlaminAfendy1
 
4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf
4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf
4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf
ssuserbfdca9
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
muralinath2
 
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
Scintica Instrumentation
 
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCINGRNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
AADYARAJPANDEY1
 
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
NathanBaughman3
 
Richard's entangled aventures in wonderland
Richard's entangled aventures in wonderlandRichard's entangled aventures in wonderland
Richard's entangled aventures in wonderland
Richard Gill
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
Columbia Weather Systems
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Sérgio Sacani
 
Citrus Greening Disease and its Management
Citrus Greening Disease and its ManagementCitrus Greening Disease and its Management
Citrus Greening Disease and its Management
subedisuryaofficial
 
erythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptxerythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptx
muralinath2
 

Recently uploaded (20)

The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
 
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptxBody fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
 
Cancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate PathwayCancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate Pathway
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
 
Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.
 
Lateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensiveLateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensive
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
 
4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf
4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf
4. An Overview of Sugarcane White Leaf Disease in Vietnam.pdf
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
 
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
 
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCINGRNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
 
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
 
Richard's entangled aventures in wonderland
Richard's entangled aventures in wonderlandRichard's entangled aventures in wonderland
Richard's entangled aventures in wonderland
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
 
Citrus Greening Disease and its Management
Citrus Greening Disease and its ManagementCitrus Greening Disease and its Management
Citrus Greening Disease and its Management
 
erythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptxerythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptx
 

Topological algebra for wireless networks

  • 1. Institut Mines-Telecom Topology of wireless networks L. Decreusefond Also starring (by chronological order of appearance) P. Martins, E. Ferraz, F. Yan, A. Vergne, I. Flint, N.K. Le Séminaire Brillouin
  • 2. Historique Algebraic topology Poisson homologies Outline Historique Algebraic topology Poisson homologies 2/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 3. Historique Algebraic topology Poisson homologies History 1870 1970 2000 3/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 4. Historique Algebraic topology Poisson homologies Sensors : ambient or pervasive computing 4/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 5. Historique Algebraic topology Poisson homologies Applications : intelligent vehicle, agriculture, house, ... 5/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 6. Historique Algebraic topology Poisson homologies Outline Historique Algebraic topology Poisson homologies 6/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 7. Historique Algebraic topology Poisson homologies Coverage 0 0.5 1 1.5 2 2.5 3 3.5 4 0 0.5 1 1.5 2 2.5 3 3.5 4 0 0.5 1 1.5 2 2.5 3 3.5 4 0 0.5 1 1.5 2 2.5 3 3.5 4 Figure 3: A sensors’ network and its associated ˘Cech complex. Definition 9 (Vietoris-Rips complex) Given (X, d) a metric space, ! a fi- nite set of points in X, and ✏ a real positive number. The Vietoris-Rips complex of parameter ✏ of !, denoted R✏(!), is the abstract simplicial complex whose k-simplices correspond to unordered (k + 1)-tuples of vertices in ! which are pairwise within distance less than ✏ of each other. 7/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 8. Historique Algebraic topology Poisson homologies Mathematical framework Geometry leads to a combinatorial object Combinatorial object is equipped with a Linear algebra structure Coverage and connectivity reduce to compute the rank of a matrix Localisation of hole: reduces to the computation of a basis of a vector matrix, obtained by matrix reduction (as in Gauss algorithm). 8/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 9. Historique Algebraic topology Poisson homologies Cech complex 9/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 10. Historique Algebraic topology Poisson homologies Cech complex 9/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 11. Historique Algebraic topology Poisson homologies Cech complex 9/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 12. Historique Algebraic topology Poisson homologies Cech complex 9/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 13. Historique Algebraic topology Poisson homologies Cech complex 9/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 14. Historique Algebraic topology Poisson homologies Cech complex 9/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 15. Historique Algebraic topology Poisson homologies Cech complex a b c d e Vertices : a, b, c, d, e Edges : ab, bc, ca, be, ec, ed Triangles : bec Tetrahedron : ∅ 10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 16. Historique Algebraic topology Poisson homologies Cech complex a b c d e Vertices : a, b, c, d, e Edges : ab, bc, ca, be, ec, ed Triangles : bec Tetrahedron : ∅ 10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 17. Historique Algebraic topology Poisson homologies Cech complex a b c d e Vertices : a, b, c, d, e Edges : ab, bc, ca, be, ec, ed Triangles : bec Tetrahedron : ∅ 10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 18. Historique Algebraic topology Poisson homologies Cech complex a b c d e Vertices : a, b, c, d, e Edges : ab, bc, ca, be, ec, ed Triangles : bec Tetrahedron : ∅ 10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 19. Historique Algebraic topology Poisson homologies Cech complex a b c d e Vertices : a, b, c, d, e Edges : ab, bc, ca, be, ec, ed Triangles : bec Tetrahedron : ∅ 10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 20. Historique Algebraic topology Poisson homologies Cech complex a b c d e Vertices : { a, b, c, d, e } = C0 Edges : {ab, bc, ca, be, ec, ed } = C1 Triangles : {bec} = C2 Tetrahedron : ∅ = C3 Comput. Rips 10/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 21. Historique Algebraic topology Poisson homologies Cech complex k-simplices Ck = {[x0, · · · , xk−1], xi ∈ ω, ∩k i=0B(xi , ) = ∅} Nerve theorem We can read some topological properties of x∈ω B(x, ) on (Ck, k ≥ 0) Same nb of connected components Same nb of holes Same Euler characteristic 11/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 22. Historique Algebraic topology Poisson homologies Boundary operator Definition ∂k : Ck −→ Ck−1 [v0, · · · , vk] −→ k j=0 (−1)j [v0, · · · , ˆvj , · · · ] 12/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 23. Historique Algebraic topology Poisson homologies Boundary operator Definition ∂k : Ck −→ Ck−1 [v0, · · · , vk] −→ k j=0 (−1)j [v0, · · · , ˆvj , · · · ] Example ∂2(bec) = ec − bc + be 12/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 24. Historique Algebraic topology Poisson homologies Boundary operator Definition ∂k : Ck −→ Ck−1 [v0, · · · , vk] −→ k j=0 (−1)j [v0, · · · , ˆvj , · · · ] Example ∂2(bec) = ec − bc + be ∂1∂2(bec) = c − e − (c − b) + e − b = 0 12/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 25. Historique Algebraic topology Poisson homologies Theorem ∂k ◦ ∂k+1 = 0 Consequence Im ∂k+1 ⊂ ker∂k Definition Hk = ker ∂k/Im∂k+1 and βk = dim ker ∂k − range ∂k+1 13/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 26. Historique Algebraic topology Poisson homologies Interpretation : The magic β0 : number of connected components β1 : number of holes β2 : number of voids to be continued 14/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 27. Historique Algebraic topology Poisson homologies Example ∂0 ≡ 0, ∂1 =       −1 0 1 −1 0 0 1 −1 0 0 0 −1 0 1 −1 0 1 0 0 0 0 0 0 1 0 0 0 1 −1 0       Nb of connected components dim ker ∂0 = 5, range ∂1 = 4 hence β0 = 1 15/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 28. Historique Algebraic topology Poisson homologies Number of holes ∂2 =         0 −1 0 1 1 0         Nb of holes dim ker∂1 = 2, range ∂2 = 1 hence β1 = 1 16/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 29. Historique Algebraic topology Poisson homologies Polygons=cycles β1 = Nb of independent polygons − Nb of independent triangles. 17/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 30. Historique Algebraic topology Poisson homologies Polygons=cycles β1 = Nb of independent polygons − Nb of independent triangles. 17/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 31. Historique Algebraic topology Poisson homologies Polygons=cycles β1 = Nb of independent polygons − Nb of independent triangles. β1 = 2 − 1 = 1. 17/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 32. Historique Algebraic topology Poisson homologies Polygons=cycles β1 = Nb of independent polygons − Nb of independent triangles. β1 = 2 − 2 = 0. 17/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 33. Historique Algebraic topology Poisson homologies Euler characteristic Definition χ = d j=0 (−1)j βj Discrete Morse inequality − |Ck−1| + |Ck| − |Ck+1| ≤ βk ≤ |Ck| 18/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 34. Historique Algebraic topology Poisson homologies Euler characteristic Definition χ = d j=0 (−1)j βj = ∞ j=0 (−1)j |Ck| Discrete Morse inequality − |Ck−1| + |Ck| − |Ck+1| ≤ βk ≤ |Ck| 18/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 35. Historique Algebraic topology Poisson homologies Alternative complex Cech complex [v0, · · · , vk] ∈ Ck ⇐⇒ ∩k j=0B(xj , ) = ∅ Rips-Vietoris complex [v0, · · · , vk] ∈ Rk ⇐⇒ B(xj , ) ∩ B(xk, ) = ∅ k simplex = clique of k + 1 points 19/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 36. Historique Algebraic topology Poisson homologies Difference RV vs Cech For the l∞ distance RV=Cech Euclidean norm : false negative Rips complex may miss some holes 20/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 37. Historique Algebraic topology Poisson homologies Difference RV vs Cech For the l∞ distance RV=Cech Euclidean norm : false negative Rips complex may miss some holes 20/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 38. Historique Algebraic topology Poisson homologies Cech vs Rips R (V) ⊂ ˇC (V) ⊂ R2 (V) whenever ≥ d 2(d + 1) Euclidean distance (D.-Feng-Martins) Coverage radius RS Communication radius RC = γRS 21/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 39. Historique Algebraic topology Poisson homologies Upper-bound of the error Theorem ( √ 3 ≤ γ ≤ 2) p2dl (λ) =2πλ2 Rc / √ 3 Rs r0dr0 ϕu(r0) ϕl (r0) dϕ1 R1(r0,ϕ1) r0 e−λπr2 0 × e−λ|S+(r0,ϕ1)| (1 − e−λ|S−(r0,r1,ϕ1)| )r1dr1 (1) where ϕl (r0)=2 arccos(Rc /(2r0)), ϕu(r0)=2 arcsin(Rc /(2r0))−2 arccos(Rc /(2r0)) R1(r0,ϕ1)=min( √ R2 c −r2 0 sin2 ϕ1−r0 cos ϕ1 √ R2 c −r2 0 sin2(ϕ1+ϕl (r0))+r0 cos(ϕ1+ϕl (r0))) 22/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 40. Historique Algebraic topology Poisson homologies 0 0.002 0.004 0.006 0.008 0.01 0.012 0.014 0.016 0.018 0.02 0 1 2 3 4 5 6 7 8 9 intensity λ p2d(λ)(%) simulation γ = 2.0 lower bound γ = 2.0 simulation γ = 2.2 lower bound γ = 2.2 simulation γ = 2.4 lower bound γ = 2.4 simulation γ = 2.6 lower bound γ = 2.6 simulation γ = 2.8 lower bound γ = 2.8 simulation γ = 3.0 lower bound γ = 3.0 Probability to miss a hole using RRS and RRC 23/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 41. Historique Algebraic topology Poisson homologies Goals and related works Evaluate Betti nb and Euler charac. in some random settings Penrose : Asymptotics of E[|Ck|m] for Euclidian-RG Rips complex on the whole space (m = 1, 2) Kähle : Asymptotics of E[βk] for Euclidian-RG Cech complex (deterministic number of points) and ER 24/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 42. Historique Algebraic topology Poisson homologies Goals and related works Evaluate Betti nb and Euler charac. in some random settings Penrose : Asymptotics of E[|Ck|m] for Euclidian-RG Rips complex on the whole space (m = 1, 2) Kähle : Asymptotics of E[βk] for Euclidian-RG Cech complex (deterministic number of points) and ER Our results Exact expressions of all moments of |Ck| and χ in any dimension for RG complex on a torus for the l∞ norm 24/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 43. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Outline Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate 25/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 44. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Random setting x1 a a a a x1 ε [0, a] × [0, a] T2 a×a 26/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 45. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Euler characteristic d=1 : {χ = 0 ∩ β0 = 0} ⇔ { circle is covered } d=2 : {χ = 0 ∩ β0 = β1} ⇔ { domain is covered } d=3 : {χ = 0 ∩ β0 + β2 = β1} ⇔ { space is covered } 27/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 46. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Euler characteristic (D.-Ferraz-Randriam-Vergne) Euler characteristic E [χ] = − λe−θ ad θ Bd (−θ ad ) where θ = λ 2 a d . where Bd is the d-th Bell polynomial Bd (x) = d 1 x + d 2 x2 + ... + d d xd 28/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 47. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate k simplices The key remark |Ck| = h(x1, · · · , xk)dω(k) (x1, · · · , xk) where h(x1, · · · , xk) 1 k! i=j 1{ xi −xj < } First moments E[|Ck|] = λad (k + 1)d (k + 1)! (ad θ)k 29/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 48. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Dimension 5 30/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 49. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Depoissonization k simplices E[|Ck| | |C0| = n] = n k + 1 (k + 1)d 2 a dk Euler characteristic E[χ | |C0| = n] = n k=0 n k + 1 (−1)k (k + 1)d 2 a dk 31/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 50. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Second order moments Cov(|Ck|, |Cl |) = 1 2 d l−1 i=0 1 i!(k − l + i)!(l − i)! θk+i × k + i + 2 i(k − l + i) l − i + 1 d . 32/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 51. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Second order moments Cov(|Ck|, |Cl |) = 1 2 d l−1 i=0 1 i!(k − l + i)!(l − i)! θk+i × k + i + 2 i(k − l + i) l − i + 1 d . Tools Chaos decomposition of |Ck| Chaos multiplication formula 32/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 52. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Poisson chaos Theorem In(f ⊗n ) = f (x1) (dω(x1) − λ dx1) n = . . . k j=1 f (xj ) ⊗n j=1 ( dω(xj ) − λdxj ) = n k=0 n k (−1)n−k × k j=1 f (xj ) dω(k) (x1, · · · , xk) ( f (x)λ dx)n−k 33/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 53. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Chaos Extension Any symmetric f (x1, · · · , xk) is the limit of gn = i αn,i k j=1 fn,i (xj ) Ik(f ) is defined by linearity For f non symmetric, let f s (x1, · · · , xk) = 1 k! σ∈Sk f (xσ(1), · · · , xσ(k)) and In(f ) := In(f s ) 34/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 54. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Chaos multiplication formula Theorem Ii (fi )Ij (fj ) = 2(i∧j) s=0 Ii+j−s   s≤2t≤2(s∧i∧j) t! i t j t t s − t fi ◦s−t t fj   35/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 55. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Euler characteristic Euler characteristic var[χ] = a 2 d ∞ n=1 cd n θn , where cd n = n j= (n+1)/2 2 j i=n−j+1 (−1)i+j (n−j)!(n−i)!(i+j−n)! n+ 2(n−i)(n−j) 1+i+j−n d − 1 (n−j)!2(2j−n)! n+ 2(n−j)2 1+2j−n d  . 36/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 56. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Euler characteristic Euler characteristic var[χ] = a 2 d ∞ n=1 cd n θn , where cd n = n j= (n+1)/2 2 j i=n−j+1 (−1)i+j (n−j)!(n−i)!(i+j−n)! n+ 2(n−i)(n−j) 1+i+j−n d − 1 (n−j)!2(2j−n)! n+ 2(n−j)2 1+2j−n d  . In dimension 1, Var(χ) = θe−θ − 2θ2 e−2θ 36/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 57. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Asymptotic results If λ → ∞, βi (ω) p.s. −→ βi (Td ) = d i . 37/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 58. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Limit theorems CLT for Euler characteristic distanceTV χ − E[χ] Vχ , N(0, 1) ≤ c √ λ · 38/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 59. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Limit theorems CLT for Euler characteristic distanceTV χ − E[χ] Vχ , N(0, 1) ≤ c √ λ · Method Stein method Malliavin calculus for Poisson process 38/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 60. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Concentration inequality Discrete gradient Dx F(ω) = F(ω ∪ {x}) − F(ω) Dx β0 ∈ {1, 0, −1, −2, −3} 39/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 61. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Concentration inequality Discrete gradient Dx F(ω) = F(ω ∪ {x}) − F(ω) Dx β0 ∈ {1, 0, −1, −2, −3} 39/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 62. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Concentration inequality Discrete gradient Dx F(ω) = F(ω ∪ {x}) − F(ω) Dx β0 ∈ {1, 0, −1, −2, −3} c > E[β0] P(β0 ≥ c) ≤ exp − c − E[β0] 6 log 1 + c − E[β0] 3λ 39/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 63. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Complexity An important remark Construction of the complex is exponential (worst case) 40/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 64. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Complexity An important remark Construction of the complex is exponential (worst case) Computations of Betti numbers is polynomial 40/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 65. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Further application (D.-Martins-Vergne) Green networking Switch off some sensors keeping the coverage Height of an edge Rank of the highest simplex it belongs to Index of a vertex Infimum of the height of its adjacent edges 41/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 66. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate v0 v1 v2 v3 v4 D[v0, v1, v2]=D[v0, v1, v3]=D[v0, v2, v3]=D[v1, v2, v3]=3 D[v1, v3, v4] = 2 I[v0]=I[v2]=3 and I[v1]=I[v3]=I[v4]=2 42/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 67. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Example We can see in Figure 5 the realisation of the coverage algorithm on a Vietoris- Rips complex of parameter ✏ = 1 based on a Poisson point process of intensity = 4.2 on a square of side length 2, with a fixed boundary of vertices on the square perimeter. The boundary vertices are circled in red. 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 Figure 5: A Vietoris-Rips complex before and after the coverage reduction al- gorithm. For this configuration, on average on 200 runs, the algorithm removed 69.22% of the non-boundary vertices, and computed in 206.01 seconds. We can see in Figure 6 the realisation of the connectivity algorithm on a Erdös-Rényi complex of parameter n = 15 and p = 0.3, with random active vertices. We chose a small number of vertices for the figure to be readable. A vertex is active with probability pa = 0.5 independantly from every other vertices. The graph key is the same as before. Complexity C bounded by 2H 43/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 68. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Complexity θn = (rn/a)d θk = k 1+η−d k−1 n k k−1 , θk = k−1+η+d k−1 n k k−1 θn ∈ [θk, θk] =⇒ C n→∞ −−−→ k 44/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 69. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Other regimes Theorem (Critical: nθn → 1) C = O(n3 ln n). 45/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 70. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Other regimes Theorem (Critical: nθn → 1) C = O(n3 ln n). Theorem (Super-critiqual: nθn → ∞) Cn = O(2n n3 ) 45/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 71. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Improvement Energy saving Path loss Received Power = K Emitted power distance(E, R)γ 46/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 72. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Improvement Energy saving Path loss Received Power = K Emitted power distance(E, R)γ Covering radius such that Received Power ≥ Threshold 46/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 73. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Improvement Energy saving Path loss Received Power = K Emitted power distance(E, R)γ Covering radius such that Received Power ≥ Threshold Covering radius proportional to (Emitted power)1/γ 46/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 74. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Power saving algorithm I get collection of cells C and corresponding vertice V; build Čech complex for C; compute Betti number β∗ 0, β∗ 1 and index ˆiv for each v ∈ V; flag fence, critical cells as not reducible; flag cells whose index ≤ 2 as not reducible; ˆimax = max{ˆiv |v ∈ V}; while exist a reducible cell do C∗ ← collection of cells whose index = ˆimax c is a cell ∈ C∗ whose biggest radius; Rold ← Rc; if Rc − ∆Rc ≥ Rc,min then Rc ← Rc − ∆Rc; else turn off cell c; 47/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 75. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Power saving algorithm II end if build Čech complex for C and compute β0, β1; compute index for cell c; if β0 = β∗ 0 or β0 = β∗ 0 or ˆic < 2 then Rc = Rc + ∆Rc; set cell c is not reducible and set index of c to −1; end if compute index for every cell ∈ C; ˆimax = max{ˆiv |v ∈ V}; end while 48/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 76. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Around 60% of power saving 49/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 77. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Damaged wireless network Quality of Service Coverage 50/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 78. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Damaged wireless network Quality of Service Coverage Disaster Damaged nodes Coverage holes Several connected components 51/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 79. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Damaged wireless network Quality of Service Coverage Disaster Damaged nodes Coverage holes Several connected components 52/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 80. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Recovery Addition of temporary nodes Not in the same positions as the previous ones Just enough to repair the network Questions How do we know that the network is repaired? Where do we put the new nodes? 53/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 81. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Damaged wireless network Addition of virtual boundary nodes To define the area to cover 54/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 82. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Damaged wireless network Addition of virtual boundary nodes To define the area to cover 54/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 83. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Damaged wireless network Addition of virtual boundary nodes To define the area to cover Computation of the coverage complex β0 = 2 β1 = 1 54/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 84. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Where do we put the new nodes? Constraints Add enough nodes to repair the network Not too much Last step Remove superfluous nodes 55/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 85. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Where do we put the new nodes? Virtual nodes addition methods Grid Uniform Determinantal 56/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 86. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Classic addition methods Grid method Deterministic number of nodes Deterministic positions 57/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 87. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Classic addition methods Grid method Deterministic number of nodes Deterministic positions 57/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 88. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Classic addition methods Grid method Deterministic number of nodes Deterministic positions 57/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 89. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Classic addition methods Uniform method Add nodes until the square is covered Random positions following a uniform law on the square 58/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 90. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Classic addition methods Uniform method Add nodes until the square is covered Random positions following a uniform law on the square 58/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 91. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Classic addition methods Uniform method Add nodes until the square is covered Random positions following a uniform law on the square 58/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 92. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Ginibre point process Ginibre point process Let K(x, y) = ∞ k=1 Bkφk(x)φk(y), where Bk, k = 1, 2, . . . , are k independent Bernoulli variables and φk(x) = 1√ πk! e −|x|2 2 xk for x ∈ C and k ∈ N The Ginibre point process is the point process with correlation function given by ρn(x1, . . . , xn) = det(K(xi , xj )1≤i,j≤n) E[ξ(K)(ξ(K) − 1) . . . (ξ(K) − n + 1)] = Kn ρn(x1, . . . , xn)dx1 . . . dxn 59/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 93. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Ginibre point process Ginibre point process Let K(x, y) = ∞ k=1 Bkφk(x)φk(y), where Bk, k = 1, 2, . . . , are k independent Bernoulli variables and φk(x) = 1√ πk! e −|x|2 2 xk for x ∈ C and k ∈ N The Ginibre point process is the point process with correlation function given by ρn(x1, . . . , xn) = det(K(xi , xj )1≤i,j≤n) E[ξ(K)(ξ(K) − 1) . . . (ξ(K) − n + 1)] = Kn ρn(x1, . . . , xn)dx1 . . . dxn Relatively easy to simulate on a compact set [2]59/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 94. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Repulsion Definition (Papangelou intensity) c(x, ω) = P(x + ω ⊂ ξ | ω ⊂ ξ) 60/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 95. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Repulsion Definition (Papangelou intensity) c(x, ω) = P(x + ω ⊂ ξ | ω ⊂ ξ) Theorem (For a Ginibre process) c(x, {x1, · · · , xn}) = det J({x1, · · · , xn, x}) det J({x1, · · · , xn}) where J(x, y) = n≥1 K◦(n) (x, y) K◦(n) (x, y) = K◦(n−1) (x, z)K(z, y) dz 60/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 96. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Repulsion Definition (Papangelou intensity) c(x, ω) = P(x + ω ⊂ ξ | ω ⊂ ξ) Theorem (For a Ginibre process) c(x, {x1, · · · , xn}) = det J({x1, · · · , xn, x}) det J({x1, · · · , xn}) where J(x, y) = n≥1 K◦(n) (x, y) K◦(n) (x, y) = K◦(n−1) (x, z)K(z, y) dz ω ⊂ η =⇒ c(x, η) ≤ c(x, ω)60/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 97. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Repulsion (in picture) 61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 98. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Repulsion (in picture) 61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 99. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Repulsion (in picture) 61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 100. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Repulsion (in picture) 61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 101. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Repulsion (in picture) 61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 102. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Repulsion (in picture) 61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 103. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Repulsion (in picture) 61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 104. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Repulsion (in picture) 61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 105. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Repulsion (in picture) 61/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 106. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Ginibre determinantal point process Figure : Poisson point process vs Ginibre determinantal point process 62/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 107. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Determinantal addition method Determinantal method Add nodes until the square is covered Random positions using a Ginibre point process 63/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 108. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Determinantal addition method Determinantal method Add nodes until the square is covered Random positions using a Ginibre point process 63/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 109. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Determinantal addition method Determinantal method Add nodes until the square is covered Random positions using a Ginibre point process 63/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 110. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Final configuration (with determinantal addition method) Reduction algorithm Removal of superfluous added nodes Optimized number of added nodes 64/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 111. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Final configuration (with determinantal addition method) Reduction algorithm Removal of superfluous added nodes Optimized number of added nodes 64/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 112. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Final configuration (with determinantal addition method) Reduction algorithm Removal of superfluous added nodes Optimized number of added nodes 64/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 113. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Comparison between addition methods Different scenarios depending on the percentage of area still covered after the disaster Square side of 1 Coverage radius of 0.25 Mean number of added vertices: % of area initially covered 20% 40% 60% 80% Grid method 9.00 9.00 9.00 9.00 Uniform method 32.51 29.34 24.64 15.63 Determinantal method 16.00 14.62 12.36 7.79 65/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 114. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Comparison with a greedy algorithm Greedy algorithm Lays nodes along a grid Adds nodes from the furthest to the nearest Until the furthest is already covered Similar to our algorithm with the grid addition method Mean final number of added vertices: % of area initially covered 20% 40% 60% 80% Greedy algorithm 3.69 3.30 2.84 1.83 Homology algorithm 4.42 3.87 2.97 1.78 66/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 115. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Robustness % of area initially covered 20% 40% 60% 80% Greedy algorithm 0.68 0.67 0.48 0.35 Homology algorithm 0.58 0.52 0.36 0.26 Table : Mean number of holes after a Gaussian perturbation % of area initially covered 20% 40% 60% 80% Greedy algorithm 40.7% 45.2% 58.8% 68.9% Homology algorithm 54.0% 58.0% 68.8% 76.1% Table : Probability that there is no hole after a Gaussian perturbation 67/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 116. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Conclusion Disaster recovery algorithm patches damaged wireless network adds enough virtual nodes to repair the network runs a reduction algorithm on the virtual added nodes Simplicial homology representation to compute the connectivity and the coverage of a wireless network Ginibre determinantal point process to place nodes where they are needed 68/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 117. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Bibliography I [1] L. Decreusefond, E. Ferraz, H. Randriam and A. Vergne. Simplicial Homology of Random Configurations. In Advances in Applied Probability, 46(2), 2014. hal-00578955 [2] L. Decreusefond, I. Flint, and A. Vergne. Efficient simulation of the Ginibre process. hal-00869259, to appear in Adv. in Applied Prob. [3] A. Vergne, L. Decreusefond, and P. Martins. Reduction algorithm for simplicial complexes. In INFOCOM, 2013 Proceedings IEEE, pages 475–479, 2013. hal-00864303 69/66 June, 2014 Institut Mines-Telecom Topology of wireless networks
  • 118. Historique Algebraic topology Poisson homologies Euler characteristic Asymptotic results Robust estimate Bibliography II [4] A. Vergne, I. Flint, L. Decreusefond, and P. Martins. Disaster Recovery in Wireless Networks: A Homology-Based Algorithm. In International Conference on Telecommunications 2014 (ICT2014), May 2014. Best paper award. hal-00800520 [5] A. Vergne. Topologie algébrique appliquée aux réseaux de capteurs, PhD (2013) Prix de thèse Futur et Ruptures, 2014 70/66 June, 2014 Institut Mines-Telecom Topology of wireless networks