{"id":"https://openalex.org/W2953944968","doi":"https://doi.org/10.1504/ijnvo.2019.10022272","title":"Topology-aware approach for reducing power consumption in backbone networks","display_name":"Topology-aware approach for reducing power consumption in backbone networks","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2953944968","doi":"https://doi.org/10.1504/ijnvo.2019.10022272","mag":"2953944968"},"language":"en","primary_location":{"id":"doi:10.1504/ijnvo.2019.10022272","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijnvo.2019.10022272","pdf_url":null,"source":{"id":"https://openalex.org/S176261709","display_name":"International Journal of Networking and Virtual Organisations","issn_l":"1470-9503","issn":["1470-9503","1741-5225"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Networking and Virtual Organisations","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101704700","display_name":"Mohammed Hussein","orcid":null},"institutions":[{"id":"https://openalex.org/I94800806","display_name":"Birzeit University","ror":"https://ror.org/0256kw398","country_code":"PS","type":"education","lineage":["https://openalex.org/I94800806"]}],"countries":["PS"],"is_corresponding":true,"raw_author_name":"Mohammed Hussein","raw_affiliation_strings":["Electrical and Computer Engineering Department, Birzeit University, Birzeit, P.O. Box 14, Palestine"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, Birzeit University, Birzeit, P.O. Box 14, Palestine","institution_ids":["https://openalex.org/I94800806"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041872569","display_name":"Abdallatif Abu Issa","orcid":null},"institutions":[{"id":"https://openalex.org/I94800806","display_name":"Birzeit University","ror":"https://ror.org/0256kw398","country_code":"PS","type":"education","lineage":["https://openalex.org/I94800806"]}],"countries":["PS"],"is_corresponding":false,"raw_author_name":"Abdallatif Abu Issa","raw_affiliation_strings":["Electrical and Computer Engineering Department, Birzeit University, Birzeit, P.O. Box 14, Palestine"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, Birzeit University, Birzeit, P.O. Box 14, Palestine","institution_ids":["https://openalex.org/I94800806"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101704700"],"corresponding_institution_ids":["https://openalex.org/I94800806"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07890933,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":"4","first_page":"356","last_page":"356"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10847","display_name":"Advanced Optical Network Technologies","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9703999757766724,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7885578870773315},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.642096996307373},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.4985222816467285},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4709404706954956},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4690228998661041},{"id":"https://openalex.org/keywords/algebraic-connectivity","display_name":"Algebraic connectivity","score":0.42450448870658875},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.4128063917160034},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.37683162093162537},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3632281422615051},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.2933829426765442},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.20503991842269897},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09963035583496094},{"id":"https://openalex.org/keywords/laplacian-matrix","display_name":"Laplacian matrix","score":0.08773717284202576}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7885578870773315},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.642096996307373},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.4985222816467285},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4709404706954956},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4690228998661041},{"id":"https://openalex.org/C7948225","wikidata":"https://www.wikidata.org/wiki/Q4723998","display_name":"Algebraic connectivity","level":4,"score":0.42450448870658875},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.4128063917160034},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.37683162093162537},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3632281422615051},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.2933829426765442},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.20503991842269897},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09963035583496094},{"id":"https://openalex.org/C115178988","wikidata":"https://www.wikidata.org/wiki/Q772067","display_name":"Laplacian matrix","level":3,"score":0.08773717284202576},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1504/ijnvo.2019.10022272","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijnvo.2019.10022272","pdf_url":null,"source":{"id":"https://openalex.org/S176261709","display_name":"International Journal of Networking and Virtual Organisations","issn_l":"1470-9503","issn":["1470-9503","1741-5225"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Networking and Virtual Organisations","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:ids:ijnvor:v:20:y:2019:i:4:p:356-376","is_oa":false,"landing_page_url":"http://www.inderscience.com/link.php?id=100598","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.9100000262260437}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1496222301","https://openalex.org/W3207760230","https://openalex.org/W1590307681","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703","https://openalex.org/W41015297","https://openalex.org/W2138547065"],"abstract_inverted_index":{"According":[0],"to":[1,20,50,63,90,150,172,176],"several":[2,122],"studies,":[3],"line":[4],"cards":[5],"are":[6,34,170],"the":[7,23,65,76,92,103,106,111,137,143],"major":[8],"source":[9],"of":[10,22,27,39,69,94,145],"energy":[11,25,52],"savings":[12],"in":[13,71,88,152],"green":[14],"networks":[15,33,87],"because":[16],"they":[17],"contribute":[18],"up":[19],"42%":[21],"total":[24],"consumption":[26],"a":[28,47,59,177],"backbone":[29],"router.":[30],"Since":[31],"these":[32],"over":[35],"provisioned,":[36],"during":[37],"periods":[38],"low-demands":[40],"shutting":[41,114],"down":[42,115],"network":[43,104],"links":[44,70],"seems":[45],"like":[46],"good":[48],"approach":[49,62],"reduce":[51],"consumption.":[53],"In":[54],"this":[55,155],"paper,":[56],"we":[57,120],"propose":[58,121],"novel":[60],"topology-aware":[61],"exploit":[64],"sleep":[66],"mode":[67],"capabilities":[68],"IP":[72,86],"networks.":[73],"We":[74],"leverage":[75],"algebraic":[77],"connectivity":[78,105],"metric,":[79],"adopted":[80],"from":[81],"spectral":[82,134],"graph":[83],"theory":[84],"on":[85,131,163],"order":[89],"identify":[91],"set":[93],"links,":[95],"that":[96,124,167],"can":[97],"be":[98,159],"powered":[99],"off":[100],"by":[101],"decreasing":[102],"least.":[107],"Exhaustive":[108],"searching":[109],"for":[110,128],"optimal":[112],"link":[113,127],"is":[116],"computationally":[117],"infeasible.":[118],"Hence,":[119],"strategies":[123],"select":[125],"single":[126],"removal,":[129],"based":[130],"topological":[132],"and":[133,190],"metrics.":[135],"Moreover,":[136],"proposed":[138],"algorithms":[139,169],"do":[140],"not":[141,158],"require":[142],"knowledge":[144],"traffic":[146,181],"matrix,":[147],"being":[148],"able":[149,171],"run":[151],"real-time,":[153],"where":[154],"information":[156],"would":[157],"available.":[160],"Results,":[161],"obtained":[162],"real":[164],"topologies":[165],"prove":[166],"our":[168],"achieve":[173],"performance":[174],"comparable":[175],"pioneering":[178],"more":[179],"complex":[180],"aware":[182],"approaches,":[183],"called":[184],"benchmark":[185],"(Zhang":[186],"et":[187,193],"al.,":[188,194],"2010)":[189],"least-flow":[191],"(Chiaraviglio":[192],"2009).":[195]},"counts_by_year":[],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
