Elektrotehniški vestnik 84(1-2): 24-29, 2017 Original scientific paper A new method for complexity determination to be used in new hyper-hybrid AD HOC cloud computing Matej Babic Jozef Stefan Institute, Slovenia, E-Mail: babicster@gmail.com Abstract. The paper presents a new method for complexity determination to be used in new hyper-hybrid AD HOC cloud computing. A large body of research has been devoted to identifying the complexity of network structures. The study of complex networks is a young and active area of scientific research inspired largely by the empirical study of real-world networks, such as computer and social networks. The new method enables quantifying the complexity of a new hyper hybrid AD HOC cloud network based on presenting the network nodes in the Cartesian coordinates, converting to polar coordinates, and calculating the fractal dimension. The results suggest that the method can be used to determine the complexity for any type of the network. Keywords: complexity, cloud computing, AD HOC network, hyper hybrid network Nova metoda za določitev kompleksnosti in njena uporaba v novem hiper hibridnem AD HOC računalništvu v oblaku V prispevku predstavljamo novo metodo za določitev kompleksnostim njeno uporabo v novem hiper-hibridnem AD HOC oblačnem računalništvu. Velik raziskav je bilo namenjeno ugotavljanju kompleksnosti struktur v omrežjih. Študija kompleksnih mrež je mlada in aktivno področje znanstvenih raziskav v veliki meri zgleduje po empiričnih raziskavah v realnem svetu omrežij, kot so računalniška omrežja in socialna omrežja. V tem prispevku bomo predstavili novo metodo za računanje kompleksnosti novega hiper hibrida AD HOC omrežja, ki temelji na predstavitvi vozlišča omrežja v kartezičnih koordinatah, pretvorbo v polarne koordinate in izračun fraktalne dimenzije. Naši rezultati kažejo, da je ta pristop mogoče uporabiti za določitev kompleksnosti za vsak tip omrežja. 1 Introduction In computer networking, an AD HOC network [1-4] refers to a network connection established for a single session and does not require a router or a wireless base station. Many ad hoc networks are local area networks where computers or other devices are enabled to send data directly to one another rather than going through a centralized access point. A wireless network transmits from computer to computer. Instead of using a central base station (access point) to which all computers must communicate, this peer-to-peer mode of operation can greatly extend the distance of the wireless network. To gain access to the Internet, one of the computers can be connected via wire or wireless to an ISP. Basically, an ad hoc network is a temporary network connection created for a specific purpose, such as transferring data from one computer to another. Networks are a ubiquitous way to represent complex systems, including those in the social and economic sciences. Understanding complexity and broad systems-level frameworks in the life, physical and social sciences have turned, in recent decades, to issues of network dynamics. The growth of the World Wide Web, staggering advances in computing the power and diminishing the computational complexity of network algorithms, and demonstrations of the robustness and ubiquity of networks fitting small-world models have helped to spark much of the recent cross-disciplinary explosion in network analysis and modelling. Figure 1. Internet, the global communication network It has been shown that many real complex networks [57] share distinctive characteristic properties that differ in many ways from the random and regular networks. Received 16August 2016 Accepted 13 February 2017 A NEW METHOD FOR COMPLEXITY DETERMINATION TO BE USED IN NEW HYPER-HYBRID AD HOC CLOUD COMPUTING 25 Fig. 1 presents a network of the global communication network, namely internet. The size and nature of data collected on an AD HOC network and wireless have led to a rapid growth of interest in the graph theory [8-10] and modern techniques for describing, characterizing and comparing networks. Traditionally, complex networks have been described with the random graph theory of Erdos and Renyi, for which each pair of nodes is connected at random with probability (p). A graph is a bunch of vertices and edges (also known as nodes and arcs). Each edge joins two vertices. That's all a graph is. A hybrid network [11] is a network that contains two or more communication standards in one network design. A hybrid network can also refer to a network design that combines two or more types of basic physical topologies, such as multiple star topologies connected by a bus topology. We are looking for a perfect network solution, utilizing the advantages of the public and private networks and the one that uses the advantages of both and VPN. A hyper hybrid network presents a new method and solution to this problem. Fig. 2 presents a hybrid network. Satellite ifi ^L Enterprise Emergency Response Business /N. ^ Continuity _____ » ^ * ' ReuOr ^Hfe Om/tatlrnt. Figure 2. Hybrid network In this paper we introduce a new method for quantifying the complexity of a new hyper hybrid AD HOC cloud computing [12-13] network based on presenting the nodes of the network in the Cartesian coordinates, converting to polar coordinates, and using fractal geometry. In the fractal geometry [14-15], the fractal dimension, D, is a statistical quantity that gives an indication of how completely a fractal appears to fill the space as one zooms down to finer and finer scales. Also, the key of the fractal geometry is the fractal dimension which describes the complexity of self-similar objects. An object is self-similar if it is exactly or approximately similar to a part of itself, i.e it looks the same on all length scales. As self-similarity is a typical property of fractals, to unravel the self-similar property of some networks, we use the methods introduced to investigate fractals. Figure 3. Self-similar network Our results suggest that this approach can be used to determine the complexity for any type of the network. Our most striking finding is that all networks have complexity D~2. 1.1 Open Problems and Challenges In the today's world of information science, some of the most popular, fascinating and useful structures are the AD HOC networks. However they have also given rise to many open problems. Some of them are: Problem 1. The characteristics of large AD HOC networks vary if examined at different magnifications. The Questions is: Can we find a relationship between magnification of large networks and their topological properties? What is the impact of a small network on a large one? And can we gain an insight into the network properties by researching small networks inside the large ones? Figure 4. Fractal graph 26 BABIC Problem 2. An AD HOC network of spacecraft around and in transit between the Earth and Mars. Direct communication between the Earth and Mars can be strongly disturbed and even blocked by the Sun for weeks at a time, cutting off any future human mission to the Red Planet. The Questions is: How to ensure a reliable radio communication even when the line up at opposite sides of the Sun, which then blocks any signal between mission controllers on the Earth and astronauts on the red surface. Problem 4. Without a fixed infrastructure, the AD HOC networks have to rely on portable, limited power sources. A node in an AD HOC network has to relay messages for other nodes in the same network. The issue of energy-efficiency therefore becomes one of the most important problems in the AD HOC networks. Opportunity Figure 5. MER Telecommunication Architecture Fig. Figure 7. Energy-Efficient Data Center Networking: Virtual Machine and Network Flow Consolidation Problem 5. A wireless mesh of rooftop-mounted AD HOC routers; an AD HOC network of cars for instant traffic and other information. Problem 3. Security is a critical issue of the AD HOC networks that is still a largely unexplored area. Traditional methods of protecting the data with cryptographic methods face a challenging task of key distribution and refresh. The main objectives of the proposed research are to develop secure authentication and key management protocols specific to the needs of the AD HOC networks and to design highly-efficient hardware architectures of the proposed protocols. Figure 6. Wireless AD HOC Network Characteristics Figure 8. Mesh Network Therefore, the proposed studies for all open problems would involve novel approaches to the AD HOC network modeling and could contribute to predicting the behavior of the AD HOC networks in future. All these problems can be solved with a mathematical tool; the graph theory. Representing a problem as a graph can make a problem much simple. A graph is a way of specifying relationships among a collection of items. In mathematics and computer science, the graph theory is a study of graphs which are mathematical structures used to model pair-wise relations between objects. A graph consists of a set of objects, called nodes, with certain pairs of these objects connected by links called edges. Nodes represent computing hosts, and there is an edge joining two nodes in this picture if there is a direct communication link between them. Graphs are useful because they serve as mathematical models of network structures. The Graph theory is a suitable play ground for exploration of proof techniques in discrete mathematics, and its results have applications in many areas such as computing, social, and natural sciences. A NEW METHOD FOR COMPLEXITY DETERMINATION TO BE USED IN NEW HYPER-HYBRID AD HOC CLOUD COMPUTING 27 Network analysis has been developing and flourishing for several decades. Network analysis is popular in every type of academic social science, AD DOV network, applied social science (such as marketing), studies of nonhuman social life, branches of mathematics, computer science, and even physics. 2 Methods In this paper we introduce a new method for quantifying the network complexity based on presenting the nodes of the network in the Cartesian coordinates, converting to polar coordinates, and calculating the fractal dimension. r =/x2 + y2 tan O = - x O = arctan(-) x Also, transformation of the nodes (x,y) into (r, O) can be described: P(r, O) = x2 + y2, arctan^)) x Figure 9. Hyper hybrid AD HOC network First of all, all nodes of the network are presented in the Cartesian coordinate system. Also, coordinates (x,y) of every node of the network (Step 1) are determined. Figure 11. Step 2 Also, in the polar coordinate system, the points (nodes) are presented as Ti (r,, n). For all r,, the number of nodes is denoted as nt for all i. All points Ti (r,, n) represent linear graph r(r, n). Figure 10. Step 1 In Step 2, the nodes of the graph are transformated into a polar coordinate system (Step 2). This means that all nodes have two coordinates (r, O). So, to convert from the Cartesian coordinates (x,y) to the Polar coordinates (r, O): Figure 12. Linear graph r(r, n) of the network A random process is statistically evaluated using Hurst parameter H [16] or by determining the distribution function. Hurst parameter H as a self-similarity criterion 28 BABIC can not be accurately calculated; it can only be estimated. There are several different methods [17] to produce estimates of parameter H, which together more or less deviate. In doing so, there is no criterion to determine which method gives us the best result. We use the R/S method for estimating Hurst exponent H. The R/S method which adjusts the rescaled range method or the scale is also a graphic method based on the properties of the Hurst phenomenon. The adjusted scale of the partial summation area is a time series deviation from the mean. For graph r(r, n), the Hurst exponent H (Step 3) is estimated. The rescaled range is calculated for a time series or space component, X=Xl,X2,...,Xn as follows: Calculate m by equation (1), calculate cumulative deviate series Z by equation (2), create range series R(n) by equation (3), create standard deviation series S by equation (4), and calculate the rescaled range series (R/S) by equation (5). Figure 13. Step 3 Fig. 13 presents different graphs and Hurst exponent H. Now, the fractal dimension can be calculated with equation D=2-H (Step 4). Hurst exponent He (0,1), thus the fractal dimension of complex networks, is De(1,2). 3 RESULTS AND DISCUSSION We present a random network with 111 nodes. This network is very complex and has fractal characteristics. (1) 1 " m =1 «t? (2) Z, = Ž (X - m) i=i (3) R(n) = max( Z?, Z 2,..., Z«) - min( Z?, Z 2,..., Z«) (4) * = J1Ž (X - m)2 (5) R = («)h S 2) Figure 14. Random network with 111 nodes Complexity of the presented random network is calculated with R/S method to estimate Hurst exponent H. Hurst exponent H for the network is 0.15, thus its fractal dimension is 1.85 and its complexity is 1.85. Fig. 16. presents linear graph r(r, n) of the network. Also, for each r, we number n of the nodes is determined. i=? A NEW METHOD FOR COMPLEXITY DETERMINATION TO BE USED IN NEW HYPER-HYBRID AD HOC CLOUD COMPUTING 29 Figure 15. Linear graph r(r, n) of the random network with 111 nodes In this paper, we introduce a new method for quantifying the complexity of a new hyper hybrid AD HOC cloud network based on presenting the nodes of the network in the Cartesian coordinates, converting to polar coordinates, and calculating the fractal dimension. 4 CONCLUSION In this work we present a new method for network complexity determination to be applied in cloud computing and AD HOC networks. Ten challenging problems are highlighted. One of them can be solved by using the presented method of the network complexity. Our results suggest that using the presented method, complexity of any network can be determined. REFERENCES [1] K.U. R. Khan, R. U. Zaman, and A. V. G. Reddy, "Integrating Mobile Ad Hoc Networks and the Internet challenges and a review of strategies," presented at the 3rd International Conference on Communication Systems Software and Middleware and Workshops, COMSWARE, 2008. [2] M.Suguna and P. Subathra, " Establishment of stable certificate chains for authentication in mobile ad hoc networks," presented at the International Conference on Recent Trends in Information Technology (ICRTIT), 2011. [3] H.Nishiyama, T. Ngo, N. Ansari, and N. Kato, "On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks," Wireless Communications, IEEE Transactions, 2012. [4] X.Lv and H. Li, "Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks," Information Security, IET, vol. 7, 2013. [5] R. Albert and A.-L. Barabâsi. Statistical mechanics of complex networks. Rev. Modern Phys.,74(1):47{97, (2002). [6] MAROLT, Rok, ŽEMVA, Andrej. A polyphase DSP-based electricity measurement system with network analyzer. Elektrotehniški vestnik, ISSN 0013-5852. 2009, letn. 76, št. 1/2, str. 1-6, ilustr. [7] S.N. Dorogovtsev. Lectures on complex networks, volume 20 of Oxford Master Series in Physics. Oxford University Press, Oxford, (2010). Oxford Master Series in Statistical Computational, and Theoretical Physics. [8] D. Achlioptas, A. Clauset, D. Kempe, and C. Moore. On the bias of traceroute sampling or, power-law degree distributions in regular graphs. In STOC'05: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, (2005). [9] L. Addario-Berry, N. Broutin, and C. Goldschmidt. Critical random graphs: limiting constructions and distributional properties. Electron. J. Probab., 15(25):741-775, (2010). [10] W. Aiello, F. Chung, and L. Lu. Random evolution in massive graphs. In Handbook of massive data sets, volume 4 of Massive Comput., pages 97-122. Kluwer Acad. Publ., Dordrecht, (2002). [11] S. Sarkar, S. Dixit, and B. Mukherjee, "Hybrid Wireless-Optical Broadband Access Network (WOBAN): A review of relevant challenges," IEEE/OSA Journal of Lightwave Technology, Special Issue on Convergence of Optical Wireless Access Networks, vol. 25, no. 11, Nov. 2007, pp. 3329-3340. [12] National Institute of Standard and US Department of Commerce Technology, "The NIST Definition of Cloud Computing," 12 October 2012. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145 .pdf [13] A. Greenberg, J. Hamilton, D. A. Maltz and P. Patel, "The Cost of a Cloud: Research Problems in Data Center Networks," SIGCOMM Computer Communication Re- view, Vol. 39, No. 1, 2008, pp. 68-73. doi:10.1145/1496091.1496103 [14] B. B. Mandelbrot, The Fractal Geometry of Nature (W. H. Freeman, New York, 1982). [15] M. F. Barnsley, Fractals everywhere, 2ed ed (Academic Press, New York, 1993). [16] Bhattacharya, R. N., Gupta, V. K., and Waymire, E. (1983). The Hurst effect under trend. Journal of Applied Probability 20, 649662. [17] J. Beran, R. Sherman, M. S. Taqqu, in W. Willinger, Long-range dependence in variable bit rate video traffic, IEEE Transactions on Communications, vol. 43, 1566-1579, 1995. Matej Babic received his Ph.D. degree in Computer Science from the Faculty of Electrical Engineering and Computer Science of the University of Maribor, Slovenia. He studied Mathematics at the Faculty of Education in Maribor. His research interest is in fractal geometry, graph theory, network, intelligent systems, hybrid machine learning and topography of materials after hardening.