Next Article in Journal
Privacy-Preserving Feature Selection with Fully Homomorphic Encryption
Previous Article in Journal
Learning-Based Online QoE Optimization in Multi-Agent Video Streaming
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On Edge Pruning of Communication Networks under an Age-of-Information Framework

Department of Computer and Information Sciences, Temple University, Philadelphia, PA 19122, USA
*
Authors to whom correspondence should be addressed.
Algorithms 2022, 15(7), 228; https://doi.org/10.3390/a15070228
Submission received: 4 June 2022 / Revised: 22 June 2022 / Accepted: 26 June 2022 / Published: 29 June 2022
(This article belongs to the Section Combinatorial Optimization, Graph, and Network Algorithms)

Abstract

:
Effective non-repetitive routing among nodes in a network is an essential function in communication networks. To achieve that, pruning the links of the network is helpful with the trade-off of making the network less robust in transmitting messages while reducing redundancy to increase flow with limited network bandwidth, so we enhance the quality of service (QoS). In our paper, we study the case that if a link removal has either no effect or an insignificant effect on the Age of Information (AoI) of the messages delivered in the communication network. The pruning of such links can be applied to the k least significant links in terms of their impact on the AoI of the messages transmitted in the system. The objective of our work is to study the effect of pruning a number of links in a network on the AoI, in order to reduce the redundancy of the messages that may be received at the destination many times while transmitted only once. In our context, the objective of the communication system would be to maintain the information from the source as fresh as possible when it arrives at the destination while reducing the redundancy of messages. In this work, we introduce an efficient reduction method designed for series-parallel networks with links of exponentially distributed wait times. In addition, we consider the deterministic case and present the pruning technique when link removal would not affect the AoI. Lastly, we present a comprehensive simulation to study the effect of pruning the links on the AoI of the network and the redundancy of messages received by the destination.

1. Introduction

It is an important functionality in communication networks to achieve efficient non-repetitive routing among nodes. In our context, the objective of the communication system would be to maintain the information from the source as fresh as possible when it arrives at the destination while reducing the redundancy of messages. Ensuring that the average Age of Information (AoI) of such a system is small corresponds to maintaining the freshness of information about the status of the source at the destination.
The effect of removing nodes or links from a communication network is widely studied [1,2,3,4,5,6]. We can rank the significance of links depending on the effect of removing them from the network. An important application of doing that is to protect the most significant links of the network by deploying more resources there or enforcing specific policies in order to secure those most important links. This is the reason why some studies analyzed different link-removal strategies and their impact on many applications of communication networks that spawn different research areas [1,2,7,8,9,10,11,12,13,14]. On the other hand, we may utilize the ranking of the importance of the links in order to identify the least important link in the network, which will have the least effect in case of removing it, as we do in our work here.
Various criteria are adopted to determine the importance of links in communication networks. One of those criteria is the AoI which determines the freshness of the messages transmitted through the network. The new metric of AoI, which has spawned relevant performance metrics, has opened new research fields. In the context of timely updates, it is widely considered that those relevant performance metrics are desired to have values that guarantee some kind of high freshness of the information of the message when they arrive at the destination [15,16,17,18].
We investigate the two cases when a link removal either has no effect or insignificantly affects the AoI of the messages delivered in the network; we consider that link an insignificant link which we may prune. The pruning can be applied on the least k significant links in terms of their impact on the AoI of the messages transmitted in the system. In our model, we consider that each node forwards the messages toward the direction of the destination node once it receives the message.
The objective of our work is to study the effect of pruning a number of links in a network on the AoI in order to reduce the redundancy of the messages that may be received at the destination many times while transmitted only once. Thus, improving the quality of service (QoS). This duplicate of receiving the same messages would happen, for example, in general gossip networks [19].
Our results are summarized as follows:
  • An efficient reduction method designed for series-parallel networks with links of exponentially distributed wait times or with links of deterministic periodic wait time.
  • A pruning algorithm that determines the least significant link in the network, in terms of its effect on the AoI, and prunes it.
  • A comprehensive simulation to study the effect of pruning the links on the AoI of the network and the redundancy of messages received by the destination.
The remainder of the paper is organized as follows. In Section 2, related work is reviewed. In Section 3, the general model of the problem is proposed. In Section 4, the network reduction method for our model is introduced. Section 5 discusses the characterization of the AoI under our model. Section 6 briefly visits the periodic case. Section 7 shows the simple pruning techniques. Section 8 presents the simulation results. Section 9 gives the conclusion.

2. Related Work

General simple multi-hop communication networks are widely studied [20,21,22]. For those networks, many routing schemes are designed in order to optimize over the minimum count of the hops for the message to get transferred or the minimum cost of the transmission through the links of the network [23]. Those metrics are not necessarily the best to consider. That is due to the fact that the new metric of AoI for the freshness of messages is recently used often to refer to as a good metric for the QoS of the network [24].
One of the simplest and most natural communication network models is the gossip network model which simply lets the nodes broadcast the messages that they receive to their neighbor set through the available directed links [19,20,21]. This model is different than the more typical method of routing that depends on choosing a path to route the message and evaluates the best possible route depending on the metric used, whether the metric is cost or time delay, or another metric. One of those standards is the best worst link in the path of the network. The best worst link is considered to be the link that is the most unreliable (in case of having unreliable links) over the path chosen by the routing scheme. This link is called the bottleneck link. Those routing schemes choose the path that has the best bottleneck link [19,21,22].
In contrast to the criterion of pruning in our work, the research in [25] considered the criterion of pruning to be the simplicity of the network by reducing the number of edges while introducing a trade-off between connectivity and simplicity. In addition, the approach introduced in [26] keeps important edges without losing connectivity by setting a criterion that depends on the best path function standard which assigns a different priority to each edge so that they can prune the edges with low priorities.
Other pruning methods were introduced before. For example, structural pruning was introduced in [27] which prunes subgraphs of the network while maintaining the hubs and brokers of the network. In addition, descriptive pruning in [27] basically assigns a specific attribute value to each node related to its connectivity and edge degree, and prunes the parts with lower attribute values. This is different than our work here in which we consider the expected AoI of the whole network as the metric for pruning.
In this work, we consider a transmission model similar to the gossip network model for transmitting messages by flooding the network, in which nodes broadcast the messages to their neighbors. This model has a huge drawback, which is the fact that the messages often are duplicated when they reach the destination node [19,23,24]. To the best of our knowledge, this is the first work that studies the effect of pruning the gossip network on the repetition of the messages and the AoI at the same time.

3. Proposed Model

In this section, we introduce the details of the network model we use in this paper as well as the AoI model that characterizes the freshness of the messages.

3.1. Series-Parallel Networks

In this work, we restrict our study to consider topologies of the network to be exclusively series-parallel topologies. Despite this restriction, the general approach can be applied to any topology. However, the network reduction that is studied later in this work can not be done unless it is a series-parallel network. This class of topologies arises naturally in many communication network applications [28]. Following we demonstrate briefly the definition of a series-parallel graph (graph means a general multigraph in this context) with the basic operations for constructing such graphs. The definition follows the convention of Eppstein in [29].
First, we need to name a more general class of graphs that is referred to as two-terminal graphs, which are any connected graphs with exactly two unique nodes called the source node s and the destination node d—that is, the simplest two-terminal graph is a pair of source-destination nodes linked through one edge.
The first graphs-composition operation is composition in parallel C p operation that performs on exactly two operands, a two-terminal graph G 1 and another two-terminal graph G 2 . The composed graph G p = C p ( G 1 , G 2 ) is another two-terminal graph that is the disjoint union of graphs G 1 and G 2 after unifying the source nodes of G 1 and G 2 to form the source node of G p , and unifying the destination nodes of G 1 and G 2 to form the destination node of G p as well. Note that C p ( G 1 , G 2 ) = C p ( G 2 , G 1 ) . An example is demonstrated in Figure 1a.
The second graphs-composition operation is composition in series C s operation that performs on exactly two operands, a two-terminal graph G 1 and another two-terminal graph G 2 . The composed graph G s = C s ( G 1 , G 2 ) is another two-terminal graph that is the disjoint union of graphs G 1 and G 2 after unifying the destination node of G 1 with the source node of G 2 . The source node of G s is the source node of G 1 , and the destination node of G s is the destination node of G 2 . Note that C s ( G 1 , G 2 ) C s ( G 2 , G 1 ) . An example is demonstrated in Figure 1b.
Now, we have everything set up to define series-parallel graphs.
Definition 1.
A series-parallel (SP) graph is a two-terminal graph that may be assembled from a set of connected pairs of nodes (source and destination nodes) with one edge using a specific order of the C p and C s operations.
It is worth mentioning that all the nodes in an SP graph that are not the source node or the destination node must have a degree of at least 2. Furthermore, the SP graph is always a planar graph. Figure 1c shows an example of the SP graph. For the sake of simplicity, we will represent C s ( G 1 , G 2 ) by [ G 1 , G 2 ] , and  C p ( G 1 , G 2 ) by [ G 1 G 2 ] .

3.2. Age of Information

In this subsection, we briefly visit the standard definition of AoI used in this work, which is the metric used to measure the freshness of messages.
Consider a source-destination network. Now, consider t k to be the times at which the source node s receives a message. Let t k be the times at which this message is received by the destination node d. We then introduce the indexing function that takes t as an input and gives the index of the most recently received message at the destination node d. So that, the indexing function N ( t ) is shown as follows:
N ( t ) = m a x { k | t k t }
To this end, we have everything set up to define the standard AoI of any message at time t. The AoI that a system has which depends on the generation and receiving time of messages is given as follows [30]:
Δ ( t ) = t t N ( t )
In Figure 2, we see the basic representation of the AoI model that we use as the metric of message freshness. From now on in the paper, when we mention the AoI, we refer to the average AoI value that can be evaluated depending on the distribution of the generation times and delay of the network.
In this work, we consider the case at which the time taken for a link (indexed i) to be activated, in order to transfer the message awaiting at one of its nodes, to follow the exponential distribution where the average time taken for activation is 1 λ i units of times counted from the moment the message arrives at one of its nodes. For now, we study the case where the time taken for the message to be transferred through the link is always insignificant compared to the average wait time 1 λ i . The activation times of the links are modeled as independent random variables.

3.3. Phase-Type Distribution

In this subsection, we introduce the Phase-type distribution. A phase-type distribution is a probability distribution that we may construct by a mixture of independent exponential distributions. It arises out in a natural way from a setting of sequence inter-related Poisson processes. One of the standard applications in which Phase-type distribution appears is when we model a representative random variable related to a Markov chain with one absorbing state. This random variable describes the total elapsed time until absorption. Each one of the states in the Markov process is represented by one phase [31].
Furthermore, an important characteristic of phase-type distributions is that they are dense on the field of analytical probability distributions. This means that this distribution closely approximates all positive-valued analytical distributions. It is worth mentioning that in our context here, we make use of a continuous-time Markov process with exactly m + 1 states. All states are transient states except state 0. State 0 is the sole absorbing state of the Markov process.
To start defining the parameters of the distribution, consider that the Markov process has an initial probability distribution to start at any one of the different m + 1 phases. This distribution of probabilities can be represented as the vector ( α 0 , α ) such that α is a 1 × m vector. From there, The phase-type distribution is used for a random variable that represents the time elapsed from the starting of such a process until the end, i.e., the absorption state 0.
To this end, The transition rate matrix of the Markov process is:
Q = 0 0 S 0 S
such that the size of S is m × m , and that S 0 = S × 1 , where 1 is the m × 1 vector of unity elements.
Now, we define the random variable Z which has the probability distribution of the elapsed time the Markov process takes until absorption. The phase-type distributed to this end is typically denoted as P H ( α , S ) [32].
The cumulative distribution function (CDF) of the random variable Z is given by F ( z ) = 1 α exp ( S z ) 1 . The probability density function is given by f ( z ) = α exp ( S z ) S 0 for all x > 0 , where exp(·) is the matrix exponential operation. This operation is defined as e x p ( X ) = Σ k = 0 1 k ! X k .
Typically, the trivial case of starting at the absorption state is discarded by setting the probability of starting there to zero (setting α 0 = 0 ). Furthermore, We may derive the moments of the distribution by E [ X n ] = ( 1 ) n n ! α S n 1 . The Laplace transform of the distribution can be derived as well by M ( s ) = α 0 + α ( s I S ) 1 S 0 where I is the identity matrix with the proper dimensions.
Now, we introduce the first example of the phase-type distribution, which is the hyperexponential distribution. This distribution is a mixture of exponential distributions too that arises when you add up independent exponential distributions with different parameters λ 1 , λ 2 , , λ n . We may represent this distribution as a phase-type one with:
α = ( α 1 , α 2 , , α n ) , i = 1 n α i = 1
S = λ 1 0 0 0 λ 2 0 0 0 λ n
Hence, this mixture of independent exponentially distributed random variables can be characterized through f ( x ) = i = 1 n α i λ i e λ i x = i = 1 n α i f X i ( x ) . The CDF would be F ( x ) = 1 i = 1 n α i e λ i x = i = 1 n α i F X i ( x ) , where X i e x p ( λ i ) .
Another more special distribution is the Erlang distribution which represents the mixture of adding up k identical and independent random distributions with parameter λ . It is denoted as E r l ( k , λ ) . We can write the Erlang distribution in the form of a phase-type distribution by making S a k × k matrix with diagonal elements λ and super-diagonal elements λ , with the probability of starting in state 1 equal to 1. For example, E r l ( 6 , λ ) is
α = ( 1 , 0 , 0 , 0 , 0 , 0 )
and
S = λ λ 0 0 0 0 0 λ λ 0 0 0 0 0 λ λ 0 0 0 0 0 λ λ 0 0 0 0 0 λ λ 0 0 0 0 0 λ
Another special case of the phase-type distribution is the hypoexponential distribution which generalizes the Erlang distribution by having different rates for each one of the transitions. So, considering the mixture of Erlang distributions makes us see that the mixture of two Erlang distributions with parameters E r l ( 3 , β 1 ) , E ( 3 , β 2 ) and ( α 1 , α 2 ), for example, can be written as a phase-type distribution with [33]:
α = ( α 1 , 0 , 0 , α 2 , 0 , 0 )
and
S = β 1 β 1 0 0 0 0 0 β 1 β 1 0 0 0 0 0 β 1 0 0 0 0 0 0 β 2 β 2 0 0 0 0 0 β 2 β 2 0 0 0 0 0 β 2
Finally, the last example is the Coxian distribution, which generalizes the Erlang distribution even more. In this distribution, the Markov process allows entering the absorbing state from any phase. The phase-type distribution format of it is given by:
S = λ 1 p 1 λ 1 0 0 0 0 λ 2 p 2 λ 2 0 0 0 0 λ k 2 p k 2 λ k 2 0 0 0 0 λ k 1 p k 1 λ k 1 0 0 0 0 λ k
and
α = ( 1 , 0 , , 0 )
such that p 1 , , p k 1 1 are positive and less than one. A special case is having all p i = 1 , which reduces to the Erlang distribution.
We now need to introduce the Kronecker product and the Kronecker sum to simplify the presentation of the properties of the phase-type distribution. Those Kronecker compositions of matrices are often used when manipulating matrices.
Let A = ( a i j ) be a n 1 × m 1 matrix, and let B = ( b i j ) be a n 2 × m 2 matrix. The Kronecker product of A and B is the ( n 1 n 2 ) × ( m 1 m 2 ) matrix:
A B = a 11 B a 12 B a 1 m 1 B a 21 B a 22 B a 2 m 1 B a n 1 1 B a n 1 2 B a n 1 m 1 B
If A and B are square matrices, i.e.,  n k = m k for k = 1 , 2 , and  I n denotes the n × n identity matrix, then the Kronecker sum, which we will use in the continuous setting, is defined as the ( n 1 n 2 ) × ( m 1 m 2 ) matrix:
A B = A I n 2 + I n 1 B
We now introduce the two most important properties of the phase-type distribution for our paper [34]:

3.3.1. Closure under Addition

Let Z i P H ( α ( i ) , S ( i ) ) be two independent phase-type distributed random variables of dimension m i for i = 1 , 2 . Then their sum Z = Z 1 + Z 2 P H ( α sum , S sum ) has a phase-type distribution of dimension m = m 1 + m 2 with representation:
α sum = ( α ( 1 ) , α ( 2 ) α m 1 + 1 ( 1 ) )
and
S sum = S ( 1 ) S ( 1 ) α ( 2 ) 0 S ( 2 )

3.3.2. Closure under Minima

Let Z i P H ( α ( i ) , S ( i ) ) be two independent phase-type distributed random variables of dimension m i for i = 1 , 2 . Then their minimum Z = min { Z 1 , Z 2 } P H ( α min , S min ) has a phase-type distribution of dimension m = m 1 × m 2 with representation:
α min = ( α ( 1 ) α ( 2 ) , α ( 1 ) α m 2 + 1 ( 2 ) , α ( 2 ) α m 1 + 1 ( 1 ) )
and
S min = S ( 1 ) S ( 2 )
Those two properties will be used later in the reduction in the SP graphs with independent exponentially distributed wait times of the links of the network.

4. Problem Reduction

In this section, we show how to reduce an SP graph, with exponentially distributed link activation times, into a corresponding single source-destination pair of nodes with a single link with phase-type distributed time as well so that we characterize the corresponding AoI in such graphs later. We demonstrate the correctness of this reduction.

4.1. Parallel Links Reduction

Here, we simply show that a two-terminal graph that consists of a simple pair of source-destination nodes connected through n links (i.e., consists solely of the operation C p performed on a set of connected pair of nodes).
In this case, a message waiting at the source node will be transmitted to the destination node instantly once the first one of the n links gets activated. That is it, the distribution of the wait time, in this case, will follow the distribution min { X 1 , X 2 , , X n } , where X i is the exponential distribution of the wait time for link i characterized with an average λ i wait time.
Now we prove the simplest case, that min { X 1 , X 2 , , X n } follows the exponential distribution too, yielding a total distribution of X p with a reciprocal of average value λ p = λ 1 + + λ n . First, we know that the cumulative distribution function (CDF) of X i is F X i ( x ) = 1 e λ i x . Since the CDF of min { X 1 , X 2 , , X n } generally equals 1 Π i = 1 n ( 1 F X i ( x ) ) , which yields to 1 Π i = 1 n ( e λ i x ) = 1 e Σ i = 1 n λ i x = 1 e λ p x where λ p = λ 1 + + λ n . Hence, the result distribution is exponential with average 1 / λ p . Hence, a simple pair of nodes connected through multiple links in parallel can be reduced to a single pair of source and destination nodes with an average of 1 / λ p and exponential distribution X p . Figure 3 shows the reduction.
For the general case when you have a distribution that represents any mixture of independent exponentially distributed links that would result from the SP reduction operations, we use the general phase-type distribution with applying the reduction shown in Equations (16) and (17).

4.2. Series Links Reduction

Here, we simply show a two-terminal graph that consists of a simple line of nodes connected in series with exactly one link connecting each node with its neighbor. (i.e., consists solely of the operation C s performed on a set of connected pairs of nodes).
Since each link i 1 , 2 , , n transfers the message instantly after a wait time that follows the exponential distribution, the resulting total wait time for the message to be transferred from the source node to the destination node would not be the direct simple addition of the random variables, it will not preserve the exponential distribution of the wait time. Hence, we use the most general distribution that represents the summation of independent exponential distributions. A simple line of nodes connected in series can be reduced to a single pair of source and destination nodes with a wait time characterized using Equations (14) and (15). Figure 3b shows an example of the reduction.

5. Average AoI Characterization

In this section, we demonstrate the complete characterization of the total time taken by a network that follows the SP topology and how the AoI behaves in such topologies.
After applying the reduction introduced in the previous section, our system becomes a system with a single source-destination link in which messages are delivered with the first-come-first-serve policy. Here, we consider the case in which messages are generated at the source node following to a Poisson process characterized with an average arrival rate of μ .
Going back to Figure 2, considering the Poisson process specifically is due to the fact that the time intervals between the generation of the messages Y are independent exponentially distributed random variables. Those independent variables are characterized with an average of 1 μ .
In addition to that the delivery times of the messages our network supports at each time are independent exponentially distributed random variables as well characterized with an average of 1 / λ total that is the result of applying both the parallel and series reductions.
We now show the characterization of the average age of information in this system. We can directly infer from Figure 2 that the average AoI will be
Δ = E [ Q ] / E [ Y ]
Since Q i represents the area of a trapezoidal shape that is the result of the difference of two right-angle isosceles triangles with congruent sides T i + Y i and T i . We conclude that Q i = 0.5 ( T i + Y i ) 2 0.5 T i 2 = Y i T i + 0.5 Y i 2 .
Hence,
Δ = E [ Y T ] + 0.5 E [ Y 2 ] E [ Y ]
However, we may divide the system time T i into a wait time W i and delivery time D i , and since the delivery time D i is independent from the interarrival time Y i , we get
E [ T i Y i ] = E [ ( W i + D i ) Y i ] = E [ W i Y i ] + E [ D i ] E [ Y i ]
where E [ D i ] = 1 / λ total in the case of a reduced network into a source-destination system with an exponentially distributed link, and  E [ Y i ] = 1 μ . However, the waiting time W i = T i 1 Y i . This means that the expected waiting time given a specific interarrival time Y i = y will equal
E [ ( T i y | Y i = y ] = E [ T y ] = y ( t y ) f T ( t ) d t
In the special case when the probability density function (PDF) f T ( t ) of such a system is given by [35]:
f T ( t ) = ( λ total μ ) e ( μ λ total ) t
Therefore, this yields in having
E [ W i Y i ] = 0 y E [ W i | Y i = y ] f Y i ( y ) d y = μ λ total 3 λ total 2 μ
Now we have everything set up to directly get the average AoI under in case that our system reduces into the simplest case, which is a source-destination system with a single exponentially distributed link:
Δ = 1 λ total + 1 μ + μ λ total 3 λ total 2 μ

6. Periodic Case

In this section, we consider the case at which link i gets activated at a certain frequency with a time period τ i , where the time periods are always integers.
We will represent the activation signal with a time period of τ by the activation function g ( τ ) . This means that we can represent the activation function g as following:
g ( τ ) = Σ n = 0 δ ( t n τ )
where δ ( . ) is the Dirac delta function [36].
This will yield the following cases of reduction in the network:
  • When we have multiple links in parallel, they may be reduced to one link with an activation signal that is simply the summation of the activation signals of all the links. The following equation represents the aggregated function in the parallel case.
    g ( τ total ) = g ( τ 1 ) + g ( τ 2 ) + + g ( τ n )
  • When we have multiple signals added together in series, the reduced link of all of them is the activation function of the least common multiple (LCM) of the time periods of the links. The following equation represents the aggregated function in the series case.
    g ( τ total ) = g ( L C M { τ 1 , τ 2 , , τ n } )
Those simple reductions result in the possibility of pruning the links in the deterministic case depending on their activation functions. For example, in Figure 4, the fourth link is activated in a periodic way by which the activation occurs at time t, where t is an integer multiple of 2 or an integer multiple of 3. This results in the case that the fourth link will be activated always at the time at which the first or the second link is activated.
Theorem 1.
In the periodic case, we may reduce any SP network into one link using Equations (26) and (27). This reduction can be used to determine the weakest link in the network.
Proof of Theorem 1. 
In this case, the delivery times of the messages an SP network supports at each time are independent Bernoulli-distributed random variables as well characterized with an average of τ that is the result of applying both the parallel and series reductions.
Furthermore, a message waiting at the source node will be transmitted to the destination node instantly once the first one of the n links gets activated. That is it, the distribution of the wait time, in this case, will follow the distribution min { X 1 , X 2 , , X n } , where X i is the distribution of the wait time for link i characterized with Equation (26).
However, in the case of series connection, the distribution of the wait time will follow the distribution X 1 + X 2 + + X n , where X i is the distribution of the wait time for link i characterized with Equation (27). Including both the series and parallel cases would include all the possible cases since we restricted the study to SP graphs. This reduces directly to the ability to reduce the whole network into one link.    □

7. Pruning the Network

In this section, we discuss the algorithms for cutting off edges from the network such that minimal effect is incurred on the AoI. We discuss both the deterministic and probabilistic cases.

7.1. Pruning in the Deterministic Case

For the deterministic case in which links are activated in a deterministic way under the activation function g ( τ ) , we can identify links that are completely covered by the rest of the network so that their pruning will not have any effect on the AoI.
To illustrate an example, Figure 4 shows the fourth link, which has an activation function of g ( 2 ) + g ( 3 ) being completely covered by the first and second link in the sense that when the source node s is ready to send a message to destination node d, whatever the time is, we may completely prune the fourth link without affecting the AoI. Equations (26) and (27) represent the reduction formulas.

7.2. Pruning in the Probabilistic Case

In order to prune the weakest link in the network, we need to run an algorithm that identifies the least important link in the network. The definition of such a link is that it is the link in the network which when removed from the network, the total expected AoI of messages transmitted through the network increases the least.
In order to identify such a link, the algorithm checks each link individually and when we have multiple links in parallel, they may be reduced to one link with an activation signal that is simply the summation of the activation signals of all the links. Equations (16) and (17) represent the aggregated function in the parallel case.
When we have multiple signals added together in series, the reduced link of all of them is the activation function of the least common multiple of the time periods of the links. Equations (14) and (15) represent the aggregated function in the series case.
Theorem 2.
The link determined by Algorithm 1 is the weakest link which affects the total AoI of the network the least in the probabilistic case. The time complexity of the algorithm is O ( | E | 3 ) .
Algorithm 1 Determining the weakest link in the probabilistic case
Require: G. //SP Graph.
Ensure: Identifying the weakest link.
Initialization: A = { } . //List of AoI values.
1: for k from 1 | E | do
2: Remove the link e k .
3: for remaining e k E do
4:  Apply the series-parallel reduction.
5: Evaluate the new average Δ value from Equation (18).
6: Add the new value to the list A.
7: Add the link e k back into the graph.
8: return the minimum value in A and the corresponding link.
Proof of Theorem 2. 
The proof is straightforward, as the algorithm simply iterates over all the links of the network and removes them so that it evaluates the value of the average AoI with those links removed. After reporting all the AoI values with their corresponding removed links, the algorithm simply reports the link that resulted in the lowest increase in the AoI.    □
We can directly show from the iterations that Algorithm 1 takes O ( | E | 3 ) time, which can be observed from the nested loops, each one iterates O ( | E | ) times. Hence, Algorithm 2 takes O ( k × | E | 3 ) . The flowchart in Figure 5 shows the method in a flowchart.
Algorithm 2 Summary of the pruning method
Require: G , k . //SP Graph and number of links to be pruned.
Ensure: Pruning the network to reduce redundancy.
1: for x from 1 k do
2: Run Algorithm 1.
3: Prune the corresponding weakest link returned by it.
4: Obtain the new pruned SP graph G
5: Evaluate the new average Δ value from Equation (18).
6: return the new pruned network G and its corresponding AoI.

8. Simulation

In this section, we present the simulation that shows the effect of the pruning process on the total AoI of the system and the redundancy of messages.

8.1. Experimental Settings

We use a machine with a processor of Intel(R) Core(TM) i5-7200U CPU at 2.50 GHz with an installed memory (RAM) of 16.0 GB. We employ a Python 3.7 environment in order to make the simulation of the network.
For the deterministic case, we randomly generate a large number of different series-parallel networks with certain parameters to determine the specifications of the graphs. First, the size of the network is determined depending on the number of nodes n and the expected number of average parallel edges L, we will call this factor the degree of parallelism. This factor introduces the redundancy in the parallel links of the network. Furthermore, the deterministic time gap τ of each one of the links is assigned randomly to be an integer from [ 1 , m ] . Lastly, to construct each one of the random series-parallel graphs, we have another parameter p that may introduce a bias towards having a parallel combination over a series combination, where p is the probability for each node to be inserted as a parallel combination. In addition, we insert additional random shortcuts to the graphs after their generation. We define a shortcut as a link which the graph remains a series-parallel graph with exactly the designated two terminals (nodes s and d) after removing it. The number of additional random shortcuts is represented as a percentage of the total number of original links s. We will examine the case of removing the shortcuts originally generated from the graphs too.
To examine the probabilistic case, we construct two simple representative series-parallel networks, one with high clustering distribution of nodes, and another one with low clustering of nodes. The wait time associated with the links of the networks are distributed independently and exponentially. The total number of nodes is 50 nodes, and the total number of links is 60 links. The distribution of the λ values of the links that characterize the average wait time of each link is normally distributed over the links of the network where λ N ( λ mean , σ 2 ) . The topologies are illustrated in Figure 6. The messages are generated in a way that follows the Poisson process where the average generation rate is μ . The wait time on the nodes is negligible while the order of the messages is important. We use two values of μ , we consider μ = 2 and μ = 4 . Furthermore, we study the model under λ mean = 1 , 2 , 3 . In addition, we study the model under two different values of the standard deviation for the distribution of wait times, we consider σ = 1 , 2 . For the deterministic case, the topologies are randomly generated SP topologies.

8.2. Experimental Results

First, we discuss the deterministic case. The simulation covers a wide range of randomly generated SP graphs. The example in Figure 7 shows a case where a number of links is pruned where m = 10 . An instance is the connection between nodes A and B where the link of g ( L C M { 1 , 2 } ) activation function would completely cover the pruned link of g ( 8 ) activation function. The left plot of Figure 8 shows how the pruning rate deteriorates as the range of the frequencies [ 1 , m ] becomes wider. This is due to the fact that as the frequencies range becomes wider, the possibility of getting a link with a τ value that is divisible by the τ value of its parallel link (or combination of links) becomes lower. The figure presents a comparison between different percentages of added shortcuts.
The right plot of Figure 8 shows how the pruning rate slightly increases as the size of the network (represented by the number of link insertions n) becomes larger. This is due to the fact that the average pruning rate of a larger network would not be worse than the average pruning rates of the smaller sub-networks that compromise it. However, combining those small networks to form a larger one would give the chance of having intermediate connecting links that have a chance to be pruned. Eliminating the shortcuts from the network would reduce the pruning rate slightly as those shortcuts typically cover more cases where the links are pruned. For example, having a shortcut with τ = 1 makes the whole network parallel to it pruned. Furthermore, the left plot of Figure 9 shows how the expected average degree of parallelism L improves the pruning rate drastically as it would produce a large number of parallel redundant links that would be pruned. The right plot of Figure 9 shows how increasing the number of expected parallel connections in the network with respect to the series connections would increase the pruning rate as most of the pruned links would typically be in a parallel connection.
Now, we discuss the results of the simulation in the probabilistic case.

8.2.1. The High-Clustered Topology

Starting from the simulation results of the high-clustered topology, we see from Figure 10 and Figure 11 the demonstration of the trade-off between the average AoI value and the number of duplicate messages (after a significant time, which is defined as the time until the first copy of the next message is received at the destination node d). This trade-off is shown when we apply the algorithm that prunes the least significant link of the network k times shown on the x-axis.
We find that as the number of links pruned from the network increases, the total average AoI value increases so that the messages are not fresh enough anymore. However, this pruning process leads to avoiding duplicating the messages received at the destination node d within a significant time of the arrival of the first message. The figures in the simulation show that the correlation between the number of pruned links and the average AoI of the network is very strong and near the exponential in the high-cluster topology case. In contrast, the number of duplicate messages decreases in a near-linear proportion.
For the yellow region highlighted in the plots of the simulation, the highlighted area spawns the region of an empirical balance between the number of repeated messages and the total average AoI that the network supports. If the chosen number of the pruned links is within the range of 6–12% of the total number of links in the network.
Even though the shape of the relationship is nearly the same between different values of σ and μ , we observe that the higher the value of the standard deviation σ , the more sensitive the AoI and number of duplicate messages become for the pruning of the network. Furthermore, the sensitivity increases slightly with the increase in the value of μ .

8.2.2. The Low-Clustered Topology

Now, we observe the simulation results of the low-clustered topology. Figure 12 and Figure 13 too demonstrate the trade-off between the average AoI value and the number of duplicate messages received at the destination node d after the time until the first copy of the next message is received at the destination node. Again, the simulation is conducted by running the pruning algorithm multiple times and observing the critical area at which the trade-off settles at balance.
In this case too, the total average AoI value increases in an exponential fashion as the number of links pruned from the network increases. This increase in the number of pruned links makes the network need more time to deliver the messages from node s to node d in a way that renders the received messages less fresh. On the other hand, pruning the messages reduces the number of paths between node s to node d. This reduction in paths leads to reduce the number of duplicate messages received at the destination node d. Figure 12 and Figure 13 show that the correlation between the number of pruned links and the average AoI of the network is near the exponential in the low-cluster topology case, while the number of duplicate messages decreases in a more steep near-linear fashion compared with the reduction in the high-cluster case.
We here too highlight the plots of the simulation to show a region of trade-off that achieves a relatively good reduction in the number of duplicate messages received at d and the total average AoI of the network. This highlighted area spawns the region of this empirical balance between AoI and message redundancy. We see again that the number of pruned links with relative to the total number of links in the network is within the same range shown in the high-clustered topology case.
Furthermore, in this case, we see that the total average AoI becomes more sensitive to the number of pruned links as the value of the standard deviation σ increases. On the other hand, we see too that the number of duplicate messages after the significant time becomes more sensitive to the number of pruned links with high values of σ . Regarding the effect of μ , we see that increasing its value increases the sensitivity of the change of the AoI and the number of duplicate messages too.

8.3. Simulation Summary

After running the simulation that shows the effect of pruning the least significant k links from the network under various different settings, we see in effect the usefulness of our algorithm and its impact on the repetitiveness of the messages delivered at the destination. At the same time, we see the impact of the pruning process on the total AoI of the network and we observe the trade-off between those two characteristics of the network under the different settings.
From the results in Figure 10 and Figure 11, we observe that pruning a small number of links from the network would not impact the total AoI in a drastic way while the impact on the number of duplicate messages is of the same severity that it would be for a higher number of links to be pruned. These results would make it clear that the number of links to be pruned is a parameter to be tuned independently in a way that would sacrifice the AoI for the sake of getting rid of the duplicate messages.

9. Conclusions

Effective non-repetitive routing among nodes in a network is an important function in communication networks. In order to achieve that, pruning the links of the network would be helpful. However, this operation comes with a caveat: it makes the network worse in terms of maintaining the freshness of messages as the defining QoS of the network. In our paper, we studied the case that if a link removal affects the AoI of the messages insignificantly or has no effect, we prune that link. The pruning can be applied to the k least significant links in terms of their impact on the AoI of the messages transmitted in the system. We studied the effect of pruning a number of links on the AoI to reduce the redundancy of the messages that would be received at the destination many times while transmitted only once. We introduced an efficient reduction method designed for series-parallel networks with links of exponentially distributed wait times. In addition, we considered the deterministic case and presented the pruning technique when link removal would not affect the AoI. We showed a pruning algorithm that determines the least significant link in the network, in terms of its effect on the AoI, and prunes it. Lastly, we presented a comprehensive simulation to study the effect of pruning the links on the AoI of the network and the redundancy of messages received by the destination. The main limitation of this work can be concluded in narrowing the study exclusively to SP networks. A potential future direction would be to study the effect of pruning for more general networks.

Author Contributions

Conceptualization, A.S. and J.W.; methodology, A.S. and J.W.; software, A.S.; validation, A.S.; formal analysis, A.S.; investigation, A.S.; resources, A.S. and J.W.; data curation, A.S.; writing—original draft preparation, A.S.; writing—review and editing, A.S. and J.W.; visualization, A.S.; supervision, J.W.; project administration, J.W.; funding acquisition, J.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported in part by NSF grants CPS 2128378, CNS 2107014, CNS 2150152, CNS 1824440, CNS 1828363, and CNS 1757533.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

References

  1. Pajevic, S.; Plenz, D. The organization of strong links in complex networks. Nat. Phys. 2012, 8, 429–436. [Google Scholar] [CrossRef] [PubMed]
  2. Latora, V.; Marchiori, M. Efficient behavior of small-world networks. Phys. Rev. Lett. 2001, 87, 198701. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Albert, R.; Jeong, H.; Barabási, A.L. Error and attack tolerance of complex networks. Nature 2000, 406, 378–382. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Bellingeri, M.; Cassi, D.; Vincenzi, S. Efficiency of attack strategies on complex model and real-world networks. Phys. Stat. Mech. Its Appl. 2014, 414, 174–180. [Google Scholar] [CrossRef] [Green Version]
  5. Wandelt, S.; Sun, X.; Feng, D.; Zanin, M.; Havlin, S. A comparative analysis of approaches to network-dismantling. Sci. Rep. 2018, 8, 13513. [Google Scholar] [CrossRef]
  6. Iyer, S.; Killingback, T.; Sundaram, B.; Wang, Z. Attack robustness and centrality of complex networks. PLoS ONE 2013, 8, e59613. [Google Scholar] [CrossRef] [Green Version]
  7. Bellingeri, M.; Bodini, A. Threshold extinction in food webs. Theor. Ecol. 2013, 6, 143–152. [Google Scholar] [CrossRef] [Green Version]
  8. Caldu-Primo, J.L.; Alvarez-Buylla, E.R.; Davila-Velderrain, J. Structural robustness of mammalian transcription factor networks reveals plasticity across development. Sci. Rep. 2018, 8, 13922. [Google Scholar] [CrossRef]
  9. Bellingeri, M.; Cassi, D.; Vincenzi, S. Increasing the extinction risk of highly connected species causes a sharp robust-to-fragile transition in empirical food webs. Ecol. Model. 2013, 251, 1–8. [Google Scholar] [CrossRef]
  10. Zanin, M.; Lillo, F. Modelling the air transport with complex networks: A short review. Eur. Phys. J. Spec. Top. 2013, 215, 5–21. [Google Scholar] [CrossRef] [Green Version]
  11. Gallos, L.K.; Cohen, R.; Argyrakis, P.; Bunde, A.; Havlin, S. Stability and topology of scale-free networks under attack and defense strategies. Phys. Rev. Lett. 2005, 94, 188701. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  12. Chen, Y.; Paul, G.; Havlin, S.; Liljeros, F.; Stanley, H.E. Finding a better immunization strategy. Phys. Rev. Lett. 2008, 101, 058701. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  13. Bellingeri, M.; Bevacqua, D.; Scotognella, F.; Zhe-Ming, L.U.; Cassi, D. Efficacy of local attack strategies on the Beijing road complex weighted network. Phys. Stat. Mech. Its Appl. 2018, 510, 316–328. [Google Scholar] [CrossRef] [Green Version]
  14. Tejedor, A.; Longjas, A.; Zaliapin, I.; Ambroj, S.; Foufoula-Georgiou, E. Network robustness assessed within a dual connectivity framework: Joint dynamics of the Active and Idle Networks. Sci. Rep. 2017, 7, 8567. [Google Scholar] [CrossRef] [Green Version]
  15. Yates, R.D.; Kaul, S.K. The age of information: Real-time status updating by multiple sources. IEEE Trans. Inf. Theory 2018, 65, 1807–1827. [Google Scholar] [CrossRef] [Green Version]
  16. Tang, H.; Wang, J.; Song, L.; Song, J. Minimizing age of information with power constraints: Multi-user opportunistic scheduling in multi-state time-varying channels. IEEE J. Sel. Areas Commun. 2020, 38, 854–868. [Google Scholar] [CrossRef] [Green Version]
  17. Yates, R.D.; Sun, Y.; Brown, D.R.; Kaul, S.K.; Modiano, E.; Ulukus, S. Age of information: An introduction and survey. IEEE J. Sel. Areas Commun. 2021, 39, 1183–1210. [Google Scholar] [CrossRef]
  18. Costa, M.; Codreanu, M.; Ephremides, A. Age of information with packet management. In Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, 29 June–4 July 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 1583–1587. [Google Scholar]
  19. Yates, R.D. The Age of Gossip in Networks. arXiv 2021, arXiv:2102.02893. [Google Scholar]
  20. Li, Z.; Shen, H. Utility-based distributed routing in intermittently connected networks. In Proceedings of the 2008 37th International Conference on Parallel Processing, Portland, OR, USA, 8–12 September 2008; IEEE: Piscataway, NJ, USA, 2008; pp. 604–611. [Google Scholar]
  21. Xiao, M.; Wu, J.; Liu, C.; Huang, L. Tour: Time-sensitive opportunistic utility-based routing in delay tolerant networks. In Proceedings of the 2013 Proceedings IEEE Infocom, Turin, Italy, 14–19 April 2003; pp. 2085–2091. [Google Scholar]
  22. Xue, Y.; Cui, Y.; Nahrstedt, K. A utility-based distributed maximum lifetime routing algorithm for wireless networks. In Proceedings of the Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE’05), Lake Buena Vista, FL, USA, 22–24 August 2005; IEEE: Piscataway, NJ, USA, 2005; p. 10. [Google Scholar]
  23. Toh, C.K. A novel distributed routing protocol to support ad hoc mobile computing. In Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications, Scottsdale, AZ, USA, 27–29 March 1996; IEEE: Piscataway, NJ, USA, 1996; pp. 480–486. [Google Scholar]
  24. Ye, Z.; Krishnamurthy, S.V.; Tripathi, S.K. A framework for reliable routing in mobile ad hoc networks. In Proceedings of the IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428), San Franciso, CA, USA, 30 March–3 April 2003; IEEE: Piscataway, NJ, USA, 2003; Volume 1, pp. 270–280. [Google Scholar]
  25. Zhou, F.; Malher, S.; Toivonen, H. Network simplification with minimal loss of connectivity. In Proceedings of the 2010 IEEE International Conference on Data Mining, Sydney, Australia, 13–17 December 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 659–668. [Google Scholar]
  26. Zhou, F.; Mahler, S.; Toivonen, H. Simplification of networks by edge pruning. In Bisociative Knowledge Discovery; Springer: Berlin/Heidelberg, Germany, 2012; pp. 179–198. [Google Scholar]
  27. Singh, L. Pruning social networks using structural properties and descriptive attributes. In Proceedings of the Fifth IEEE International Conference on Data Mining (ICDM’05), Houston, TX, USA, 27–30 November 2005; IEEE: Piscataway, NJ, USA, 2005; p. 4. [Google Scholar]
  28. Colbourn, C.J.; Xue, G. A linear time algorithm for computing the most reliable source on a series-parallel graph with unreliable edges. Theor. Comput. Sci. 1998, 209, 331–345. [Google Scholar] [CrossRef] [Green Version]
  29. Eppstein, D. Parallel recognition of series-parallel graphs. Inf. Comput. 1992, 98, 41–55. [Google Scholar] [CrossRef] [Green Version]
  30. Kosta, A.; Pappas, N.; Angelakis, V. Age of information: A new concept, metric, and tool. Found. Trends Netw. 2017, 12, 162–259. [Google Scholar] [CrossRef] [Green Version]
  31. Bladt, M. A review on phase-type distributions and their use in risk theory. ASTIN Bull. J. IAA 2005, 35, 145–161. [Google Scholar] [CrossRef]
  32. O’Cinneide, C.A. Phase-type distributions and invariant polytopes. Adv. Appl. Probab. 1991, 23, 515–535. [Google Scholar] [CrossRef]
  33. Commault, C.; Mocanu, S. Phase-type distributions and representations: Some results and open problems for system theory. Int. J. Control 2003, 76, 566–580. [Google Scholar] [CrossRef]
  34. Komárková, Z. Phase-Type Approximation Techniques. Ph.D. Thesis, Masarykova Univerzita, Fakulta Informatiky, Brno, Czechia, 2012. [Google Scholar]
  35. Papoulis, A.; Saunders, H. Probability, Random Variables and Stochastic Processes; Tata McGraw-Hill Education: New York, NY, USA, 1989. [Google Scholar]
  36. Raju, C.K. Products and compositions with the Dirac delta function. J. Phys. Math. Gen. 1982, 15, 381. [Google Scholar] [CrossRef]
Figure 1. (a) The operation composition in parallel denoted by C p . (b) The operation composition in series denoted by C s . (c) a sample SP graph that is represented as three parallel paths: P 1 P 2 P 3 , where P 1 : [ 1 , 2 3 , [ [ 4 , 5 6 ] [ 7 , 8 ] ] , 9 ] . P 2 : [ 10 11 , 12 ] . P 3 : [ 13 ] .
Figure 1. (a) The operation composition in parallel denoted by C p . (b) The operation composition in series denoted by C s . (c) a sample SP graph that is represented as three parallel paths: P 1 P 2 P 3 , where P 1 : [ 1 , 2 3 , [ [ 4 , 5 6 ] [ 7 , 8 ] ] , 9 ] . P 2 : [ 10 11 , 12 ] . P 3 : [ 13 ] .
Algorithms 15 00228 g001
Figure 2. The progression of AoI in our model.
Figure 2. The progression of AoI in our model.
Algorithms 15 00228 g002
Figure 3. Links deliver probabilistically under the exponential distribution with expected delivery times of 1 / λ 1 , , 1 / λ n after the arrival of the message to the source node. (a) is parallel links reduction. (b) is series links reduction.
Figure 3. Links deliver probabilistically under the exponential distribution with expected delivery times of 1 / λ 1 , , 1 / λ n after the arrival of the message to the source node. (a) is parallel links reduction. (b) is series links reduction.
Algorithms 15 00228 g003
Figure 4. The complete coverage in the deterministic case, link 4 is completely covered by both links 1 and 2 together. Hence, it can be completely pruned. (a) shows a simple source-destination network resembling an example. (b) shows the times at which each link transmits where the fourth one is completely covered by the rest.
Figure 4. The complete coverage in the deterministic case, link 4 is completely covered by both links 1 and 2 together. Hence, it can be completely pruned. (a) shows a simple source-destination network resembling an example. (b) shows the times at which each link transmits where the fourth one is completely covered by the rest.
Algorithms 15 00228 g004
Figure 5. Flowchart showing the process of determining the weakest link in the probabilistic case.
Figure 5. Flowchart showing the process of determining the weakest link in the probabilistic case.
Algorithms 15 00228 g005
Figure 6. The topologies used in the probabilistic example. (a) is the low-clustered topology. (b) is the high-clustered topology.
Figure 6. The topologies used in the probabilistic example. (a) is the low-clustered topology. (b) is the high-clustered topology.
Algorithms 15 00228 g006
Figure 7. An example of pruning in the deterministic case.
Figure 7. An example of pruning in the deterministic case.
Algorithms 15 00228 g007
Figure 8. The pruning rate in the deterministic case where L = 1.5 , p = 50 % . For the left plot n = 20 , for the right plot m = 10 .
Figure 8. The pruning rate in the deterministic case where L = 1.5 , p = 50 % . For the left plot n = 20 , for the right plot m = 10 .
Algorithms 15 00228 g008
Figure 9. The pruning rate in the deterministic case where n = 20 , s = 0 % . For the left plot p = 50 % , for the right plot L = 1.5 .
Figure 9. The pruning rate in the deterministic case where n = 20 , s = 0 % . For the left plot p = 50 % , for the right plot L = 1.5 .
Algorithms 15 00228 g009
Figure 10. The simulation results from running the pruning algorithm on the high-clustered topology when μ = 1 . The left column is the result after running the algorithm when σ = 1 and the right column is the result after running the algorithm when σ = 2 .
Figure 10. The simulation results from running the pruning algorithm on the high-clustered topology when μ = 1 . The left column is the result after running the algorithm when σ = 1 and the right column is the result after running the algorithm when σ = 2 .
Algorithms 15 00228 g010
Figure 11. The simulation results from running the pruning algorithm on the high-clustered topology when μ = 2 . The left column is the result after running the algorithm when σ = 1 and the right column is the result after running the algorithm when σ = 2 .
Figure 11. The simulation results from running the pruning algorithm on the high-clustered topology when μ = 2 . The left column is the result after running the algorithm when σ = 1 and the right column is the result after running the algorithm when σ = 2 .
Algorithms 15 00228 g011
Figure 12. The simulation results from running the pruning algorithm on the low-clustered topology when μ = 1 . The left column is the result after running the algorithm when σ = 1 and the right column is the result after running the algorithm when σ = 2 .
Figure 12. The simulation results from running the pruning algorithm on the low-clustered topology when μ = 1 . The left column is the result after running the algorithm when σ = 1 and the right column is the result after running the algorithm when σ = 2 .
Algorithms 15 00228 g012
Figure 13. The simulation results from running the pruning algorithm on the low-clustered topology when μ = 2 . The left column is the result after running the algorithm when σ = 1 and the right column is the result after running the algorithm when σ = 2 .
Figure 13. The simulation results from running the pruning algorithm on the low-clustered topology when μ = 2 . The left column is the result after running the algorithm when σ = 1 and the right column is the result after running the algorithm when σ = 2 .
Algorithms 15 00228 g013
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Sawwan, A.; Wu, J. On Edge Pruning of Communication Networks under an Age-of-Information Framework. Algorithms 2022, 15, 228. https://doi.org/10.3390/a15070228

AMA Style

Sawwan A, Wu J. On Edge Pruning of Communication Networks under an Age-of-Information Framework. Algorithms. 2022; 15(7):228. https://doi.org/10.3390/a15070228

Chicago/Turabian Style

Sawwan, Abdalaziz, and Jie Wu. 2022. "On Edge Pruning of Communication Networks under an Age-of-Information Framework" Algorithms 15, no. 7: 228. https://doi.org/10.3390/a15070228

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop