You are on page 1of 53

Big Data and Computational

Intelligence in Networking 1st Edition


Yulei Wu
Visit to download the full and correct content document:
https://textbookfull.com/product/big-data-and-computational-intelligence-in-networking
-1st-edition-yulei-wu/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Computational Intelligence Applications in Business


Intelligence and Big Data Analytics 1st Edition Vijayan
Sugumaran

https://textbookfull.com/product/computational-intelligence-
applications-in-business-intelligence-and-big-data-analytics-1st-
edition-vijayan-sugumaran/

Data Science and Big Data An Environment of


Computational Intelligence 1st Edition Witold Pedrycz

https://textbookfull.com/product/data-science-and-big-data-an-
environment-of-computational-intelligence-1st-edition-witold-
pedrycz/

5g-Enabled Internet of Things 1st Edition Yulei Wu

https://textbookfull.com/product/5g-enabled-internet-of-
things-1st-edition-yulei-wu/

Machine Intelligence and Big Data in Industry 1st


Edition Dominik Ry■ko

https://textbookfull.com/product/machine-intelligence-and-big-
data-in-industry-1st-edition-dominik-ryzko/
Computational Intelligence in Data Mining Himansu
Sekhar Behera

https://textbookfull.com/product/computational-intelligence-in-
data-mining-himansu-sekhar-behera/

Artificial Intelligence for Big Data Complete guide to


automating Big Data solutions using Artificial
Intelligence techniques Anand Deshpande

https://textbookfull.com/product/artificial-intelligence-for-big-
data-complete-guide-to-automating-big-data-solutions-using-
artificial-intelligence-techniques-anand-deshpande/

AI and Big Datas Potential for Disruptive Innovation


Advances in Computational Intelligence and Robotics 1st
Edition Moses Strydom

https://textbookfull.com/product/ai-and-big-datas-potential-for-
disruptive-innovation-advances-in-computational-intelligence-and-
robotics-1st-edition-moses-strydom/

Artificial Intelligence for Fashion Industry in the Big


Data Era Sébastien Thomassey

https://textbookfull.com/product/artificial-intelligence-for-
fashion-industry-in-the-big-data-era-sebastien-thomassey/

Microbial Data Intelligence and Computational


Techniques for Sustainable Computing 1st Edition Aditya
Khamparia

https://textbookfull.com/product/microbial-data-intelligence-and-
computational-techniques-for-sustainable-computing-1st-edition-
aditya-khamparia/
Big Data and
Computational Intelligence
in Networking

T&F Cat #K30172 — K30172 C000 — page i — 10/31/2017 — 6:59


Big Data and
Computational Intelligence
in Networking
Edited by
YU L E I W U
F E I HU
G E YONG M I N
AL BE R T Y. ZOM AYA

T&F Cat #K30172 — K30172 C000 — page iii — 10/31/2017 — 6:59


CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742

© 2018 by Taylor & Francis Group, LLC


CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works

Printed on acid-free paper

International Standard Book Number-13: 978-1-4987-8486-3 (Hardback)

This book contains information obtained from authentic and highly regarded sources. Reasonable
efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and
publishers have attempted to trace the copyright holders of all material reproduced in this publication
and apologize to copyright holders if permission to publish in this form has not been obtained. If any
copyright material has not been acknowledged please write and let us know so we may rectify in any
future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.
copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC),
222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that
provides licenses and registration for a variety of users. For organizations that have been granted a
photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and
are used only for identification and explanation without intent to infringe.

Library of Congress Cataloging-in-Publication Data

Names: Wu, Yulei, editor.


Title: Big data and computational intelligence in networking / Yulei Wu, Fei Hu,
Geyong Min, Albert Y. Zomaya.
Description: Boca Raton, FL : CRC Press, [2018] | Includes bibliographical
references and index.
Identifiers: LCCN 2017028407| ISBN 9781498784863 (hardback : acid-free paper)
| ISBN 9781315155678 (e-book) | ISBN 9781498784870 (e-book) | ISBN
9781351651721 (e-book) | ISBN 9781351642200 (e-book)
Subjects: LCSH: Big data. | Cloud computing. | Computer networks--Management.
| Computational intelligence.
Classification: LCC QA76.9.B45 W824 2018 | DDC 005.7--dc23
LC record available at https://lccn.loc.gov/2017028407

Visit the Taylor & Francis Web site at


http://www.taylorandfrancis.com

and the CRC Press Web site at


http://www.crcpress.com

T&F Cat #K30172 — K30172 C000 — page iv — 10/31/2017 — 6:59


Contents

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix

Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii

PART I: BASICS OF NETWORKED BIG DATA 1


1. A Survey of Big Data and Computational Intelligence
in Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Yujia Zhu, Yulei Wu, Geyong Min, Albert Zomaya, and Fei Hu

2. Some Mathematical Properties of Networks for Big Data . . . . . 27


Marcello Trovati

3. Big Geospatial Data and the Geospatial Semantic Web:


Current State and Future Opportunities . . . . . . . . . . . . . . 43
Chuanrong Zhang, Tian Zhao, and Weidong Li

4. Big Data over Wireless Networks (WiBi) . . . . . . . . . . . . . . 65


Immanuel Manohar and Fei Hu

PART II: NETWORK ARCHITECTURE FOR


BIG DATA TRANSMISSIONS 85
5. Efficient Big Data Transfer Using Bandwidth Reservation Service
in High-Performance Networks . . . . . . . . . . . . . . . . . . . 87
Liudong Zuo and Michelle Mengxia Zhu

T&F Cat #K30172 — K30172 C000 — page v — 10/31/2017 — 6:59


vi  Contents

6. A Dynamic Cloud Computing Architecture for Cloud-Assisted


Internet of Things in the Era of Big Data . . . . . . . . . . . . . . 107
Mehdi Bahrami and Mukesh Singhal

7. Bicriteria Task Scheduling and Resource Allocation for


Streaming Big Data Processing in Geo-Distributed Clouds . . . . 125
Deze Zeng, Chengyu Hu, Guo Ren, and Lin Gu

PART III: ANALYSIS AND PROCESSING OF


NETWORKED BIG DATA 149

8. The ADMM and Its Application to Network Big Data . . . . . . . 151


Nan Lin and Liqun Yu

9. Hyperbolic Big Data Analytics for Dynamic Network


Management and Optimization . . . . . . . . . . . . . . . . . . . 177
Vasileios Karyotis and Eleni Stai

10. Predictive Analytics for Network Big Data Using


Knowledge-Based Reasoning for Smart Retrieval of Data,
Information, Knowledge, and Wisdom (DIKW) . . . . . . . . . . 209
Aziyati Yusoff, Norashidah Md. Din, Salman Yussof, Assad Abbas,
and Samee U. Khan

11. Recommendation Systems . . . . . . . . . . . . . . . . . . . . . . 227


Joonseok Lee

12. Coordinate Gradient Descent Methods . . . . . . . . . . . . . . . 265


Ion Necoara

13. Data Locality and Dependency for MapReduce . . . . . . . . . . 293


Xiaoqiang Ma, Xiaoyi Fan, and Jiangchuan Liu

14. Distributed Machine Learning for Network Big Data . . . . . . . 331


Seunghak Lee

15. Big Data Security: Toward a Hashed Big Graph . . . . . . . . . . 351


Yu Lu and Fei Hu

T&F Cat #K30172 — K30172 C000 — page vi — 10/31/2017 — 6:59


Contents  vii

PART IV: EMERGING APPLICATIONS OF


NETWORKED BIG DATA 371
16. Mobile Augmented Reality to Enable Intelligent Mall Shopping
by Network Data . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Vincent W. Zheng and Hong Cao

17. Toward Practical Anomaly Detection in Network Big Data . . . . 411


Chengqiang Huang, Yulei Wu, Zuo Yuan, and Geyong Min

18. Emerging Applications of Spatial Network Big Data


in Transportation . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Reem Y. Ali, Venkata M.V. Gunturi, Zhe Jiang, and Shashi Shekhar

19. On Emerging Use Cases and Techniques in Large Networked


Data in Biomedical and Social Media Domain . . . . . . . . . . . 453
Vishrawas Gopalakrishnan and Aidong Zhang

20. Big Data Analysis for Smart Manufacturing . . . . . . . . . . . . 499


Z. Y. Liu and Y. B. Guo

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515

T&F Cat #K30172 — K30172 C000 — page vii — 10/31/2017 — 6:59


Preface

Recent years have witnessed a deluge of network data propelled by the emerging
online social media, user-generated video contents, and global-scale communi-
cations, bringing people into the era of big data. Such network big data holds
much critical and valuable information including customer experiences, user
behaviors, service levels, and other contents, which could significantly improve
the efficiency, effectiveness, and intelligence on the optimization of the current
Internet, facilitate the smart network operation and management, and help service
providers and content providers reduce capital expenditure (CapEx) and opera-
tional expenditure (OpEx) while maintaining a relatively high-level quality of
service (QoS) and quality of experience (QoE).
Typical examples of network intelligence received from network big data
include rapid QoE impairment detection and mitigation, optimization of network
asset utilization, proactive maintenance, rapid outage restoration, and graceful
disaster recovery. These aims can be achieved from high-level computational
intelligence based on emerging analytical techniques such as big data pro-
cessing, Web analytics, and network analytics employing software tools from
advanced analytics disciplines such as machine learning, data mining, and pre-
dictive analytics. The computational intelligence for big data analysis is playing
an ever-increasingly important role in supporting the evolution of the current
Internet toward the next-generation intelligent Internet.
However, the unstructured, heterogeneous, sheer volume and complex nature
of network big data pose great challenges on the computational intelligence
of these emerging analytical techniques due to high computational overhead
and communication cost, non-real-time response, sparse matrix-vector multi-
plications, and high convergence time. It is therefore of critical importance
to understand network big data and design novel solutions of computational
intelligence, scaling up for big data analytics of large-scale networks to auto-
matically discover the hidden and valuable information available for smart
network operations, management, and optimization. This has been established as

ix

T&F Cat #K30172 — K30172 C000 — page ix — 10/31/2017 — 6:59


x  Preface

a new cross-discipline research topic in computer science, requiring anticipation


of technical and practical challenges faced by mixed methods across multiple
disciplines.
In this book, we have invited world experts in this area to contribute the
chapters that cover the following four parts:
1. Part 1: Basics of Networked Big Data: This part helps understand the prop-
erties, characteristics, challenges, and opportunities of networked big data,
geospatial data, and wireless big data. This part covers the following:
a. Mathematical properties: A variety of aspects related to networks,
including their topological and dynamical properties, as well as their
applications to real-world examples
b. Geospatial data and geospatial semantic web: Challenges and
opportunities of the geospatial semantic web brought for sharing and
utilizing big geospatial data
c. Big data over wireless networks: Typical scenarios, various chal-
lenges, and potential solutions for wireless transmission of big
data
2. Part 2: Network Architecture for Big Data Transmissions: This part
presents new proposals and network architectures to ensure efficient big
data transmissions and streaming big data processing.
a. Big data transfer: Challenges of bandwidth reservation service for
efficient big data transfer and the potential solutions
b. Internet of Things (IoT): A dynamic and independent Cloud com-
puting architecture based on a service-oriented architecture for IoT
devices, to allow users to freely transfer their IoT devices from one
vendor to another
c. Streaming big data processing: How to maximize QoS and minimize
OpEx when performing task scheduling and resource allocation in
geo-distributed Clouds
3. Part 3: Analysis and Processing of Networked Big Data: This part explains
how to perform big data analytics based on emerging analytical techniques
such as big data analytics, Web analytics, network analytics, and advanced
analytics disciplines such as machine learning, data mining, and predictive
analytics. This part covers the following areas:
a. Alternating direction method of multiplier (ADMM): Its applications
to large-scale network optimizations
b. Dynamic network management and optimization: Rethink of current
network analysis, management and operation practices; impact of

T&F Cat #K30172 — K30172 C000 — page x — 10/31/2017 — 6:59


Preface  xi

network evolution on the computation of key network metrics;


hyperbolic big data analytics
c. Predictive analytics and smart retrieval: Utilize the network big data
by performing a data, information, knowledge, and wisdom (DIKW)
hierarchy to the product of its processes
d. Recommendation systems: Key challenges and solutions for data
sparsity problem, data scale issue, and cold-start problem
e. Coordinate gradient descent methods: Unconstrained convex mini-
mization problems with differentiable objective function in network
problems
f. MapReduce: Data locality and dependency analysis; dependency-
aware locality for MapReduce
g. Distributed machine learning: Big data and big models for network
big data; how to parallelize parameter updates on multiple work-
ers; how to synchronize concurrent parameter updates performed by
multiple workers
h. Big graph: Big graph decomposition; real-time and large-scale graph
processing; big data security
4. Part 4: Emerging Applications of Networked Big Data: This part covers
some emerging applications on the following:
a. Intelligent mall shopping: Location-based mobile augmented real-
ity applications; using network data to enable intelligent shopping;
robust feature learning in cold-start heterogeneous-device localiza-
tion; learning to query in the cold-start retailer content
b. Network anomaly detection: How to efficiently use network big data
to perform accurate anomaly detection
c. Transportation: Advances of spatial network big data (SNBD) tech-
niques; challenges posed by SNBD in transportation applications
and the potential solutions
d. Biomedical and social media domain: Graph as a representation
schema for big data; graph-based models and analyses in social text
mining, and bioinformatics and biomedical
e. Smart manufacturing: Big data characteristics in manufacturing;
data collection and data mining in manufacturing; applications of
big data in manufacturing.
This book presents the state-of-the-art solutions to the theoretical and prac-
tical challenges stemming from the leverage of big data and its computational
intelligence in supporting smart network operation, management, and optimiza-
tion. In particular, the technical focus covers the comprehensive understanding

T&F Cat #K30172 — K30172 C000 — page xi — 10/31/2017 — 6:59


xii  Preface

of network big data, efficient collection and management of network big data,
distributed and scalable online analytics for network big data, and emerging
applications of network big data for computational intelligence.
Targeted audiences: This book targets both academia and industry readers. Grad-
uate students can select promising research topics from this book that are suitable
for their thesis or dissertation research. Researchers will have a deep under-
standing of the challenging issues and opportunities of network big data and
can thus easily find an unsolved research problem to pursue. Industry engineers
from IT companies, service providers, content providers, network operators, and
equipment manufacturers can get to know the engineering design issues and cor-
responding solutions after reading some practical schemes described in some
chapters.
We have required all chapter authors to provide as much technical detail as
possible. Each chapter also includes references for readers’ further studies and
investigations. If you have any comments or questions on certain chapters, please
contact the chapter authors for more information.
Thank you for reading this book. We wish that this book will help you with
the scientific research and practical problems of network big data.

T&F Cat #K30172 — K30172 C000 — page xii — 10/31/2017 — 6:59


Contributors

Assad Abbas Lin Gu


North Dakota State University Huazhong University of Science and
Fargo, North Dakota Technology
Wuhan, China
Reem Y. Ali
Department of Computer Science Venkata M.V. Gunturi
University of Minnesota Department of Computer Science
Minneapolis, Minnesota Indraprastha Institute of Information
Technology
Mehdi Bahrami Delhi, India
Cloud Lab
University of California, Merced Y. B. Guo
Merced, California Department of Mechanical
Engineering
Hong Cao University of Alabama
Analytics & Enterprise Intelligence Tuscaloosa, Alabama
Ernst & Young Advisory Pte. Ltd
Singapore Chengyu Hu
China University of Geosciences
Xiaoyi Fan Wuhan, China
School of Computing Science
Simon Fraser University Fei Hu
Burnaby, British Columbia, Canada Electrical and Computer Engineering
University of Alabama
Vishrawas Gopalakrishnan Tuscaloosa, Alabama
Department of Computer Science and
Engineering Chengqiang Huang
State University of New York University of Exeter
Buffalo, New York Exeter, United Kingdom

xiii

T&F Cat #K30172 — K30172 C000 — page xiii — 10/31/2017 — 6:59


xiv  Contributors

Zhe Jiang Yu Lu
Department of Computer Science Electrical and Computer Engineering
University of Alabama University of Alabama
Tuscaloosa, Alabama Tuscaloosa, Alabama

Vasileios Karyotis
Xiaoqiang Ma
School of Electrical and Computer
School of Electronic Information and
Engineering
Communications
National Technical University of
Huazhong University of Science and
Athens (NTUA)
Technology
Athens, Greece
Wuhan, China
Samee U. Khan
North Dakota State University Immanuel Manohar
Fargo, North Dakota Electrical and Computer Engineering
University of Alabama
Joonseok Lee Tuscaloosa, Alabama
Google Research
Video Understanding Team, Machine
Norashidah Md. Din
Perception
Universiti Tenaga Nasional
Mountain View, California
Selangor, Malaysia
Seunghak Lee
Human Longevity, Inc., Geyong Min
San Diego, California University of Exeter
Exeter, United Kingdom
Weidong Li
Department of Geography & Center
Ion Necoara
for Environmental Sciences and
Automatic Control and Systems
Engineering
Engineering Department
University of Connecticut
University Politehnica Bucharest
Storrs, Connecticut
Bucharest, Romania
Nan Lin
Department of Mathematics Guo Ren
Washington University in St. Louis China University of Geosciences
St. Louis, Missouri Wuhan, China

Jiangchuan Liu
Shashi Shekhar
School of Computing Science
Department of Computer Science
Simon Fraser University
University of Minnesota
Burnaby, British Columbia, Canada
Minneapolis, Minnesota
Z. Y. Liu
Department of Mechanical Mukesh Singhal
Engineering Cloud Lab
University of Alabama University of California, Merced
Tuscaloosa, Alabama Merced, California

T&F Cat #K30172 — K30172 C000 — page xiv — 10/31/2017 — 6:59


Contributors  xv

Eleni Stai Chuanrong Zhang


School of Computer & Department of Geography & Center
Communication Sciences for Environmental Sciences and
École Polytechnique Fédérale de Engineering
Lausanne University of Connecticut
Lausanne, Switzerland Storrs, Connecticut

Marcello Trovati Tian Zhao


Department of Computer Science Department of Computer Science
Edge Hill University University of Wisconsin-Milwaukee
Ormskirk, United Kingdom Milwaukee, Wisconsin

Yulei Wu Vincent W. Zheng


University of Exeter Advanced Digital Sciences Center
Exeter, United Kingdom Singapore

Liqun Yu Michelle Mengxia Zhu


Department of Mathematics Department of Computer Science
Washington University in St. Louis Montclair State University
St. Louis, Missouri Montclair, New Jersey

Zuo Yuan Yujia Zhu


University of Exeter University of Exeter
Exeter, United Kingdom Exeter, United Kingdom

Aziyati Yusoff Albert Zomaya


Universiti Tenaga Nasional The University of Sydney
Selangor, Malaysia Sydney, Australia

Salman Yussof Liudong Zuo


Universiti Tenaga Nasional Computer Science Department
Selangor, Malaysia California State University,
Dominguez Hills
Deze Zeng Carson, California
China University of Geosciences
Wuhan, China

Aidong Zhang
Department of Computer Science and
Engineering
State University of New York
Buffalo, New York

T&F Cat #K30172 — K30172 C000 — page xv — 10/31/2017 — 6:59


BASICS OF I
NETWORKED
BIG DATA

T&F Cat #K30172 — K30172 S001 — page 1 — 9/28/2017 — 14:37


Chapter 1

A Survey of Big Data and


Computational
Intelligence in
Networking

Yujia Zhu, Yulei Wu, and Geyong Min


University of Exeter
Exeter, United Kingdom

Albert Zomaya
The University of Sydney
Sydney, Australia

Fei Hu
University of Alabama
Tuscaloosa, Alabama

CONTENTS
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 Comprehensive Understanding of Networked Big Data . . . . . . . . . . . . . . 5
1.2.1 Challenges for networked big data . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.2.1.1 Distributed and decentralized data collection
and storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.2.1.2 Distributed and parallel data processing . . . . . . 7

T&F Cat #K30172 — K30172 C001 — page 3 — 11/1/2017 — 19:55


4  Big Data and Computational Intelligence in Networking

1.2.1.3 More complex and evolving relationships


among data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2.1.4 Heterogeneous data representation . . . . . . . . . . . 8
1.2.2 Requirement engineering of networked big data for
computational intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2.3 Representation and modeling of networked big data . . . . . . . . 9
1.2.3.1 Graph representation . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.2.3.2 Dynamic representation . . . . . . . . . . . . . . . . . . . . . . 10
1.2.3.3 Tensor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.2.4 Security and privacy issues on networked big data . . . . . . . . . . 11
1.2.5 Wireless big data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.3 Network Architecture for Big Data Transmissions . . . . . . . . . . . . . . . . . . . 13
1.3.1 Novel collection protocols for networked big data . . . . . . . . . . 13
1.3.2 Efficient management of networked big data and distributed
data systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.3.3 Context-aware networked big data processing for
computational intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.4 Analysis and Processing of Networked Big Data . . . . . . . . . . . . . . . . . . . . 16
1.4.1 Distributed machine learning algorithms for networked
big data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.4.2 Distributed data mining with networked big data . . . . . . . . . . . . 17
1.4.3 Online prediction with networked big data . . . . . . . . . . . . . . . . . 18
1.4.4 Sparse matrix vector multiplication on distributed
architectures for networked big data . . . . . . . . . . . . . . . . . . . . . . . . 19
1.4.5 High-performance analytics platform for networked
big data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

1.1 Introduction
With the rapid development of computing capabilities and storage techniques,
there is no doubt that we are facing a series of opportunities and challenges
brought about by the big data era. Simply put, big data not only injects wis-
dom into decision-making and performance improvement but also poses a great
threat to traditional data processing techniques. For example, NeteaseMusic is
a popular musical software among Chinese teenagers and it is well known
for a particular function, Daily Recommendation, which aims to provide users
with the songs in which they may be interested. It tracks what songs indi-
vidual users listen to most frequently and what pages they look at; it usually
develops some relevant tags for each song, such as “sad,” “pleasure,” “Country
music,” and “Quiet.” Besides these tags, it is able to utilize some initial infor-
mation like similar singers and albums. This software develops algorithms to

T&F Cat #K30172 — K30172 C001 — page 4 — 11/1/2017 — 19:55


A Survey of Big Data and Computational Intelligence in Networking  5

better understand the customers by taking advantage of the digital data men-
tioned above. Customers can respond to each song with “like” or “dislike” by
highlighting, or not, a heart tag beneath the song. This process is similar to a
training process in machine learning. According to these valuable data, indicat-
ing users’ preference NeteaseMusic can recommend songs to users with very
high accuracy.
The success of NeteaseMusic can showcase the benefits that big data brings—
smarter decisions and better predictions. By utilizing it appropriately, we can
explore some fresh areas so far dominated by intuition and gut. Big data spreads
to every aspect in people’s daily lives, changing long-standing ideas about the
value of experience, the nature of expertise, and the practice of management [1].
Networking has become an indispensable part of the modern world, pro-
viding convenient access to the Internet, remote communication, information
exchange, etc. As mentioned above, big data also has a great influence on net-
working. The amount of data has exploded in recent years, with a transformation
from traditional simple-structured physical networks to complex-structured vir-
tual networks. Considering network management, a novel method is to collect
unstructured system logs (which can reach the magnitude of terabytes (TB) per
day) and analyze these valuable data to evaluate system performance or tackle
faults. So far, we have explored what opportunities networked big data brings,
but the challenges are also significant. In the next chapter, a variety of challenges
will be discussed.

1.2 Comprehensive Understanding of Networked


Big Data
Networked big data, in fact, is not simply another way of saying “analytics” or
large amount of data. In addition to the common features of veracity and value,
networked big data has higher volume, velocity, and variety compared with other
forms of big data.
1. Volume: According to a recent report from IBM, 2.5 quintillion bytes of
data are created every day [2]. The Web includes various sources of data
like cookies, browsing history, and so on, which makes it an extraordinary
data set. Many search engines like Google and Yahoo are responsible for
dealing with billions of user access requests every day. When entering
the keyword “big data” in Google Chrome, about 341,000,000 results are
returned in 0.59 seconds (as of May 2017).
2. Velocity: The large volume of data has increased the complexity of pro-
cessing and storing, while for some applications, real-time or nearly
real-time data analysis is much more important given the high speed of
data creation. Given troubleshooting in networks, this has been an open
question in academic and industrial fields. From traditional faults in the

T&F Cat #K30172 — K30172 C001 — page 5 — 11/1/2017 — 19:55


6  Big Data and Computational Intelligence in Networking

hardware components like routers or links down to virtual machines, there


are a number of fault management tools such as HP Openview and Open-
NMS, which focus on real-time fault localization or prediction. Thus,
how to quickly and accurately handle faults in order to reduce human
intervention is critical to making a company more competitive.
3. Variety: Networked big data comes from various sources: for instance,
messages, images or videos from social networks, event logs and con-
figuration parameters from systems, measurements from sensors, and
many more. Specifically speaking, every second, on average, around
6000 tweets are posted on Twitter, which corresponds to over 350,000
tweets sent per minute, 500 million tweets per day, and around 200 billion
tweets per year [3]. On 4 October 2012, the first presidential debate
between President Barack Obama and Governor Mitt Romney triggered
more than 10 million tweets within 2 hours [4]. A vast number of users
post tweets in various formats such as texts, images, or videos contributing
to data diversity.

1.2.1 Challenges for networked big data


A network application in the era of big data usually involves data sources from
different geographically distributed data centers. Thus, in addition to the general
nature of big data such as large volume, high velocity, and high variety, net-
worked big data possesses many unique features, which are summarized below.
These unique features also bring some research issues of networked big data, as
shown in Figure 1.1.

1.2.1.1 Distributed and decentralized data collection and storage


An emerging wave of Internet deployments, most notably the Internet of Things
(IoT) [5] and the integration of IoT and fog computing [6], often depend on
a distributed networking system to collect data from geographically distributed

How to maximize big data transmission throughput?

Big data
sources Big data
(sender) destination
(receiver)

Security and privacy issues


How to minimize end-to-end delay?

Figure 1.1: Networked big data: Research issues.

T&F Cat #K30172 — K30172 C001 — page 6 — 11/1/2017 — 19:55


A Survey of Big Data and Computational Intelligence in Networking  7

sources, such as sensors and data centers. For example, visualizing data collected
within the IoT are geo-related and sparsely distributed. Internet geographic infor-
mation system (GIS)-based solutions are required to cope with this challenge.
Apache Hadoop [7] is well known for its distributed storage and processing of
big data. Hadoop Distributed File System (HDFS) [8] is the core part of the
storage system in Hadoop, which is a distributed file system that stores data on
commodity machines, providing very high aggregate bandwidth across the clus-
ters. HDFS was inspired by Google file system (GFS) [9], which is the most
widely adopted mechanism for distributed file systems.

1.2.1.2 Distributed and parallel data processing


In light of the way the networked big data are collected, it is straightforward
to process these data in a distributed and parallel manner. There have been
several well-known frameworks available for distributed big data processing,
e.g., Apache Hadoop [7], Apache Storm [10], Apache Spark [11], and Apache
Flink [12]. Hadoop is the first major big data processing framework that provides
batch processing based on its MapReduce processing engine. Since it heavily
leverages permanent storage, each task involves multiple instances of reading
and writing operations. When using Hadoop, time should not be a significant
factor. In contrast to batch processing, stream processing systems compute over
data as it enters the system, and thus could well serve the processing with near
real-time demands. Storm is the first major stream processing framework for big
data analytics that focuses on extremely low latency, but does not provide a batch
processing mode. Apache Spark provides a hybrid processing system, where it is
a batch processing framework with stream processing capabilities. Spark focuses
on speeding up batch processing workloads by offering full in-memory compu-
tation and processing optimization. It provides a good candidate for those with
diverse processing workloads. Apache Flink offers a stream processing frame-
work with the support for traditional batch processing models. It treats batch
processing as an extension of stream processing by reading a bounded data set
off persistent storage.

1.2.1.3 More complex and evolving relationships among data


Under the distributed and decentralized control of large volume, heterogeneous,
autonomous sources, big data seeks to explore the complex and ever-changing
relationship among data. Apart from the great challenges that large volume poses
to big data, how to effectively extract the relationships underneath data has
attracted particular attention not only in academic but also in industrial fields.
People establish friendship circles based on common hobbies, biological rela-
tionships, and many more in human society, while these social connections also
exist in the cyber world. For example, a majority of social networks recom-
mend people or messages by utilizing social functions such as friend-connections

T&F Cat #K30172 — K30172 C001 — page 7 — 11/1/2017 — 19:55


8  Big Data and Computational Intelligence in Networking

and followers. Mining the correlations between users’ behavior and preference
can reveal some underlying but valuable information for these social network
operators. In this dynamic world, there is no doubt that these relationships
evolve all the time, temporally and spatially. Another example is troubleshoot-
ing in networks, where topology graphs can be regarded as spatial information
while key performance indicators (KPI) or traffic records represented in time
series can be regarded as temporal information. Kimura et al. [13] once claimed
that log messages should be characterized as spatial-temporal data, since event
logs are usually generated from distributed hosts, routers, or switches spanning
across several geographical locations (spatial information) and include times-
tamps indicating generating time (temporal information). Based on deep insights
of spatial-temporal features of logs, they proposed two novel techniques, sta-
tistical template extraction (STE) and log tensor factorization (LTF), to capture
particular patterns of log messages which provide useful knowledge into root
cause analysis.

1.2.1.4 Heterogeneous data representation


Traditional data mining algorithms usually require inputs to be homogeneous,
that is to say, inputs should possess similar formats. However, as mentioned
above, big data comes from heterogeneous sources, making traditional min-
ing algorithms inapplicable to handle this problem in the forthcoming big
data revolution. Most objects and data in the real world are of multiple types
and interconnected, forming complex, heterogeneous but often semistructured
information networks [14]. There are three main challenges that make mining
heterogeneous networks a new game:
1. Information propagates across heterogeneous nodes and links.
2. Rich semantic information should be carefully and effectively parsed to
extract the representative network structures.
3. User demands should be taken into consideration to automatically select
the right relationships.
Sun and Han [14] proposed a novel semistructured heterogeneous network
modeling focusing on the objects and the interactions among them. In this
way, rich semantic information and valuable schema-level information can be
retained. A directed graph with an object-type mapping function and a link-type
mapping function is utilized to represent the heterogeneous information networks
effectively.

1.2.2 Requirement engineering of networked big data for


computational intelligence
Intelligent computation techniques can be translated into “machine learning”
algorithms that are employed in a range of computing tasks where designing and

T&F Cat #K30172 — K30172 C001 — page 8 — 11/1/2017 — 19:55


A Survey of Big Data and Computational Intelligence in Networking  9

programming explicit algorithms with good performance is difficult or unfea-


sible. There is a large amount of research taking place to combine advanced
machine learning techniques with networked big data analysis. Shang et al. [15]
suggested a novel fault diagnosis model of computer networks based on rough
set and back-propagation (BP) neural networks. They retrieved faults as a series
of rules and reduced them to a minimum diagnosis rules by rough set theory;
then a neural network was designed to learn from these rules in order to identify
and localize faults quickly and accurately. Sankaran et al. [16] designed a hard-
ware framework embedded with a machine learning coprocessor to emphasize
intrusion detection in case of attacks unknown for the signature library. They
chose a vector space model with a K-nearest neighbors (K-NN) classifier and
a radial basis function (RBF)-based classifier, concluding that machine learning
processors enable improvement in energy saving, processing speed, and detec-
tion accuracy, especially dealing with big data sets. Chung et al. [17] addressed
the significant advantages that deep neural networks (DNNs) demonstrate in pat-
tern recognition applications, regardless of the biggest drawback of computation
resource consumption and training time reaching a tenfold addition compared
to traditional techniques. In order to cope with this, a data-parallel Hessian-free
second-order optimization algorithm is used to train DNN and implemented by
a large-scale speech task on Blue Gene/Q computer system due to the excellent
interprocessor communication ability of this system. The results show that per-
formance on Blue Gene/Q scales up to 4096 processes lossless in accuracy and
that enables the training of DNN using billions of inputs in just a few hours.

1.2.3 Representation and modeling of networked big data


Networked big data possesses unstructured, semistructured, and structured
formats. This nature hinders its representation and modeling, which are of
paramount importance in the process of big data analytics. Several existing
representation and modeling methods have been reported in the current litera-
ture, e.g., graph representation, dynamic representation, and matrix representa-
tion [18].

1.2.3.1 Graph representation


Graphs consisting of nodes and edges can be applied to a variety of situations.
For example, in social networks, nodes can be regarded as individuals and con-
nected edges representing two users build a relationship. Network topology can
be represented as nodes for hosts (or switches, routers) and edges for links
among them. With a rapid increase in the amount of data, the corresponding
scale of graphs dramatically expands to even millions of nodes and edges. Coping
with such large graphs can be an extremely complex task considering efficiently
extracting valuable underlying knowledge encoded into graphs. There are a lot

T&F Cat #K30172 — K30172 C001 — page 9 — 11/1/2017 — 19:55


10  Big Data and Computational Intelligence in Networking

of techniques to simplify and refine graphs summed up in three categories: graph


spectra [19], graph summarization, and graph compression.
Graphs can be represented by an adjacency matrix and mapped into its
spectrum domain, filtering out small elements by exploiting application-aware
thresholds. Finally, a smaller graph can be obtained by means of an inverse trans-
form. Sahneh et al. [20] utilized Laplacian spectra to represent transition rate
graphs in spreading process modeling of complex networks.
The original concept of graph summarization comes from the database com-
munity [21] and aims to provide users with small and informative graphs based
on attributes and relationships of interest.
Shi et al. [22] addressed an Influence Graph Summarization (IGS) problem
abstracting individual influence from complex citation networks. They proposed
a summarization scheme based on matrix factorization techniques to handle this
problem and tested it on real-world citation networks to prove that this method
outperforms the previous method in visual effects and quantitative IGS objective
optimization.
Redundancies are hidden in nodes belonging to similar communities; graph
compression in fact focuses on identifying communities. Lim et al. [23] discov-
ered the importance of hubs or high-degree nodes disconnecting graphs, gradu-
ally removed them from graphs and finally acquired a smaller giant connected
component. This compression method proves more suitable for real-world issues
than a conventional “caveman community.”

1.2.3.2 Dynamic representation


Graph representation can be regarded as a static representation of valid net-
work topology and properties, while in practice a large number of networks are
dynamically characterized. How to efficiently represent dynamic features of net-
works such as topology and configuration has received notable attention from
researchers and practitioners. A majority of current approaches take advantage
of visualization techniques. Burch et al. [24] chose a series of timesteps and rep-
resented each stage as a single graph contributing to a dynamic and hierarchically
organized graph set for visualization. Mashima et al. [25] visualized user traffic
on radio station and TV-viewing patterns from an Internet Protocol Television
(IPTV) service under the assistance of a geographic map metaphor in coping
with large-scale dynamic data sets.

1.2.3.3 Tensor
Although many studies have been performed on networked big data processing,
very few have addressed the problems of representing the various formats of
data with a simple model and extracting the core data sets that are smaller but
still contain valuable information. Kuang et al. [26] targeted these issues and pro-
posed a unified tensor model to represent data with various formats. With the help

T&F Cat #K30172 — K30172 C001 — page 10 — 11/1/2017 — 19:55


A Survey of Big Data and Computational Intelligence in Networking  11

of tensor extension operators, the authors represented the various types of data
as subtensors and merged them to a unified tensor. They further devised an incre-
mental high-order singular value decomposition method (IHOSVD) to extract
the core tensor, which is able to update the orthogonal bases and compute the
new core tensor by recursively applying the incremental matrix decomposition
algorithm. In comparison with the traditional approaches of data dimensionality
reduction—e.g., principal component analysis (PCA) [27], incremental singu-
lar value decomposition (SVD) [28], and dynamic tensor analysis (DTA) [29],
which are mainly used for low dimension reduction—IHOSVD is particularly
suitable for handling high-dimensional data and extracting the core data sets from
streaming networked big data with a relatively low time consumption.

1.2.4 Security and privacy issues on networked big data


Every day, people surf the Internet, browse websites, post messages, and share
personal information like cookies through their own digital devices. This can
pose a potential threat to privacy issues through identity theft, online banking
abuse, password leakage, and so on. Information security suffers from the prolif-
eration of devices connected to the Internet and connected with each other. Big
data security issues are related to a set of risk areas, which includes information
lifecycle, data creation, and collection processes. Despite complex initial char-
acteristics, ultimately, the objective remains the same as traditional data types,
devoted to preserving confidentiality, integrity, and availability. Due to user/data
mobility requirements, conventional security measures such as firewalls are no
longer suitable for big data scenarios. Cloud Security Alliance (CSA) [30],
a non-profit organization with a mission to promote the use of best practices
for providing security assurance within Cloud Computing and provide education
on the uses of Cloud Computing to help secure all other forms of computing, has
created a Big Data Working Group, which has focused on the major challenges
to implement secure Big Data services. According to CSA, security and privacy
challenges can be categorized according to four aspects: infrastructure security
(e.g., secure distributed computation using MapReduce), data privacy (e.g., data
mining that preserves privacy/granular access), data management (e.g., secure
data provenance and storage), and integrity and reactive security (e.g., real-time
monitoring of anomalies and attacks).
When considering reasonable solutions to secure networked big data,
in-depth inquiry should be focused on different data sources, complex relation-
ships, and unstructured data formats. Encryption, masking, and tokenization are
regular approaches for sensitive data protection. Modern security networking
issues gradually expand from enterprise to the public Cloud. The internal behav-
ior model of Cloud computing consists of a big data storage service retrieval layer
(where users match and invoke resources from Cloud service packages according
to specific demands), a data refinement task decomposition layer (where complex
tasks will be split and disseminated to proper locations to maximize resource

T&F Cat #K30172 — K30172 C001 — page 11 — 11/1/2017 — 19:55


12  Big Data and Computational Intelligence in Networking

leveraging rate), a Cloud computing optimization combination evaluation layer


(which will optimize and integrate results under thoughtful resource utilizing
plans to achieve the best Quality of Service (QoS) target), and a big data
Cloud computing algorithm selection layer (where optimal execution strategy
will be selected according to different requirements). Considering these features
of Cloud computing systems, a four-level security framework was proposed by
Cui [31], involving copyright authentication, virtual task decomposition, collab-
orative network password protection, disaster recovery scheme development, and
so on.

1.2.5 Wireless big data


First, as demonstrated in Ref. [32], wireless big data can be simply explained as a
wide range of massive data generated, collected, and stored in wireless networks
by wireless devices and users. Wireless big data has a significant influence over
network deployment and service quality, and poses a big challenge to traditional
solutions due to its dynamic data sets and stochastic nature. Lijun et al. [32]
categorized wireless big data through two aspects: socioecological and specific
application. From the socioecological perspective, big data can be explained as
three types: primordial wireless big data (data sets generated by massive wireless
network users such as wireless access behavior), derived wireless big data (spec-
trum, transmission, access, and network data served for reliable communication
such as resource allocation of transmission signals), and developing wireless big
data (data collected from performance testing and evaluation processes). From
the specific application perspective, categories can be simply described as cel-
lular networks, Wi-Fi hotspots, smart grids, wireless sensor networks (WSNs),
IoT, and so on.
Researches have explored massive efficient data representation as a solution
in wireless networking domain. He et al. [33] proposed a unified data analytic
model based on the random matrix theory for tackling problems of dynamic
data collected from multiple sources. A variety of data types such as signaling
data, traffic data, and heterogeneous data are studied to evaluate model perfor-
mance in mobile cellular networks. As demonstrated in Ref. [34], large-scale
random matrices are applied to model distributed spectrum sensing and network
monitoring in a multiple-input multiple-output (MIMO) system. According to
specific features such as the large scale and the heterogeneous nature which indi-
cate complex interrelationships among data, unstructured data should be taken
into consideration as demonstrated in Ref. [34]. A number of subtensors are
leveraged to transform various data types into unified tensor representation, then
dimension reduction is implemented by SVD method, and, finally, a real case
study is simulated on intelligent transportation to evaluate the performance of
the proposed model.
Considering separate temporal, spatial characteristics, and complicated
spatial-temporal interconnection relationships of wireless big data, some novel

T&F Cat #K30172 — K30172 C001 — page 12 — 11/1/2017 — 19:55


Another random document with
no related content on Scribd:
⁵And the greater house he cieled with fir ¹ tree,
which he overlaid with fine gold, and wrought
thereon palm trees and chains.
¹ Or, cypress.

5. the greater house] i.e. the holy place. It was forty cubits long (1
Kings vi. 17), whereas the shrine was twenty (1 Kings vi. 16, 20).

he cieled] i.e. lined or boarded. The same Hebrew word is


translated overlaid in this same verse.

wrought thereon] perhaps in the form of reliefs.

palm trees and chains] The “chains” perhaps connected one


palm tree with another. In 1 Kings vi. 29, “cherubim and palm trees
and open flowers.”

⁶And he garnished the house with precious


stones for beauty: and the gold was gold of
Parvaim.
6. precious stones] Not mentioned in the parallel account, but
according to 1 Kings v. 17 costly stones (the same expression in
Hebrew) were used for the foundations of the house, their costliness
being due presumably to their immense size. Here, however, the
phrase “for beauty” suggests that the Chronicler is thinking of rare
and precious stones to be set in the walls—an exaggeration not out
of keeping with the references to “pure gold” in verses 4, 7, etc.

Parvaim] Apparently the name of a place, but nothing certain is


known about it.

⁷He overlaid also the house, the beams, the


thresholds, and the walls thereof, and the
doors thereof, with gold; and graved cherubim
on the walls.
7. cherubim] The cherubim (plural of cherub) were the Hebrew
adaptation of the winged bulls which are so striking a figure in
Babylonian and Assyrian art. Nothing, however, can be ascertained
as to the exact form in which they were depicted in the Temple. In
the Old Testament they appear as guardians of sacred things
(Genesis iii. 24; Ezekiel xxviii.) and as sustainers of the Deity (e.g.
Psalms lxxx. 1 “Thou that sittest upon the cherubim”; compare
Psalms xviii. 10). The figures were therefore emblematic of the
presence of Jehovah.

The graving of the cherubim was not felt to be a breach of the


Second Commandment, for they were not put up to “bow down to” or
to “serve.”

8, 9 (compare 1 Kings vi. 16‒20).


The Holy of Holies.

⁸And he made the most holy house; the length


thereof, according to the breadth of the house,
was twenty cubits, and the breadth thereof
twenty cubits: and he overlaid it with fine gold,
amounting to six hundred talents. ⁹And the
weight of the nails was fifty shekels of gold.
And he overlaid the upper chambers with gold.
8. the most holy house] Called the oracle in 1 Kings vi. 16, 19,
etc., Hebrew dĕbīr, which means rather the hinder part. The Lord
“dwells” in the inmost recess of the house.

amounting to six hundred talents] This detail is not found


elsewhere. The weight of gold would be over 64,000 lbs., or, on a
less probable reckoning, 27,000 lbs.; incredible quantities in either
case, but in keeping with the vast amounts stated in 1 Chronicles
xxix. 4.

10‒13 (compare 1 Kings vi. 23‒28).


The Cherubim.

¹⁰And in the most holy house he made two


cherubim of image work; and they overlaid
them with gold. ¹¹And the wings of the
cherubim were twenty cubits long: the wing of
the one cherub was five cubits, reaching to the
wall of the house; and the other wing was
likewise five cubits, reaching to the wing of the
other cherub. ¹²And the wing of the other
cherub was five cubits, reaching to the wall of
the house: and the other wing was five cubits
also, joining to the wing of the other cherub.
10. of image work; and they overlaid] The phrase “of image work”
is meaningless. Following the LXX. ἔρηον ἐκ ξύλων καὶ ἐχρύσωσεν,
render woodwork, and he overlaid.

¹³The wings of these cherubim spread


themselves forth twenty cubits: and they stood
on their feet, and their faces were toward the
house ¹.
¹ Or, inward.

13. twenty cubits] Extending across the width of the whole house.
on their feet] Not “couchant” nor “rampant” but standing, as the
winged bulls of Assyria stand.

toward the house] as though to protect the Holiest Place from


violation by anyone advancing through the house.

14 (compare Exodus xxvi. 31, 32).


The Veil.

¹⁴And he made the veil of blue, and purple,


and crimson, and fine linen, and wrought
cherubim thereon.
No veil for Solomon’s Temple is mentioned in 1 Kings, but (1
Kings vi. 31, 32) doors of olive wood with cherubim carved upon
them stood at the entrance of the Holy of Holies. The description of
the veil seems to have been borrowed by the Chronicler from the
account of the tabernacle given in Exodus.

15‒17 (compare 1 Kings vii. 15‒22).


The Pillars Jachin and Boaz.

¹⁵Also he made before the house two pillars of


thirty and five cubits high, and the chapiter
that was on the top of each of them was five
cubits.
15. before the house two pillars] Compare 1 Kings vii. 21, he set
up the pillars at the porch of the temple, and Jeremiah lii. 17
(translate, the pillars ... that belonged to the house). These pillars
were immediately in front of the porch, but (it seems) detached from
it. They were cast in brass (iv. 11‒17), were hollow (Jeremiah lii. 21),
and were crowned with “chapiters” (capitals) in shape like bowls (1
Kings vii. 41). A pair of lofty frontal pillars, detached from the main
building, was a not uncommon feature of temples in Western Asia
and Egypt—e.g. at the Temple of Hercules (Melkart) at Tyre
(Herodotus II. 44), the Temple of Paphos in Cyprus (see W. R.
Smith, Religion of the Semites², p. 488), at Karnak in Egypt
(compare Perrot and Chipiez, Egyptian Art, II. 170). In Solomon’s
Temple these twin columns may have been conventional imitations
of the prevailing type of temple building, but it is rather to be
supposed that there also they were considered to be symbolic of the
presence of God, and were developments of the ancient stone pillars
(maṣṣeboth) which were a constant feature at Semitic shrines and
had originally been regarded as the abode of the Deity.

thirty and five cubits high] 35 is also given in the LXX. of


Jeremiah lii. 21; but is almost certainly an error. Read eighteen, as in
1 Kings vii. 15; Jeremiah lii. 21 (Hebrew).

¹⁶And he made chains in the oracle, and put


them on the tops of the pillars; and he made
an hundred pomegranates, and put them on
the chains.
16. he made chains in the oracle] The words, in the oracle,
though found in LXX., are a gloss introduced from 1 Kings vi. 21
(chains ... before the oracle), or, more probably, a corruption of a
word meaning “like a necklace.” The Chronicler is here speaking of
the outside of the Temple, having already described the “oracle,” i.e.
the Holy of Holies, in verses 8‒14. The Hebrew word dĕbīr was
translated “oracle” because it was supposed to be derived from a
word meaning “to speak.” It means, however, simply “the hindermost
part” of the house (compare iv. 20, v. 7, 9).

¹⁷And he set up the pillars before the temple,


one on the right hand, and the other on the
left; and called the name of that on the right
hand Jachin ¹, and the name of that on the left
Boaz ².
¹ That is, He shall establish.

² That is, perhaps, In it is strength.

17. Jachin ... Boaz] Margin translates the two words; Jachin “He
shall establish,” Boaz perhaps “In it is strength.” LXX. gives
Κατόρθωσις “setting up”) and Ἰσχύς (“strength”). The meaning of Boaz
is uncertain. It may be only a pious correction of an original Baal.
(For the avoidance of the word Baal, see the notes on xvii. 3, 1
Chronicles viii. 33; and for further comments on “Jachin” and “Boaz”
see Encyclopedia Biblia II. 2. 304, and Barnes in Journal of
Theological Studies, v. 447 ff.)
Chapter IV.
1.
The Altar of Brass.

¹Moreover he made an altar of brass, twenty


cubits the length thereof, and twenty cubits the
breadth thereof, and ten cubits the height
thereof.
1. an altar of brass, twenty cubits] The brasen altar is referred to
in 1 Kings viii. 64; 2 Kings xvi. 14 ff., but it is (strangely) not
mentioned among the furnishings of the Temple described in the
present text of 1 Kings vii. It is impossible therefore to say whether
the Chronicler derives the measurements he here gives from a text
of Kings which did contain a description of the brasen altar, or from
the altar of the Temple of his own period. The latter is more probable.
Some scholars consider it possible that at first Solomon’s Temple
contained no artificial altar, the sacrifices being offered on the great
natural rock which is now covered by the famous building popularly
known as the Mosque of Omar (properly “The Dome of the Rock”).

The great altar was probably a flat oblong expanse, the highest of
a series of terraces, of which the base measurement is given by the
Chronicler—compare the description of Ezekiel’s altar (Ezekiel xliii.
13 ff.).

2‒5 (= 1 Kings vii. 23‒26).


The Molten Sea.
²Also he made the molten sea of ten cubits
from brim to brim, round in compass, and the
height thereof was five cubits; and a line of
thirty cubits compassed it round about.
2. he made the molten sea] Render, he made the sea of molten
metal. The “sea” or great laver was a well-known feature in temples
(compare Revelation iv. 6), and, originally at least, is likely to have
had religious significance, as a symbol of Jehovah’s power over the
seas and the rain, or over the primeval Deep upon which His might
was exercised in the creation of the world (Genesis i.; Psalms xxiv.
2). For the Chronicler’s view of its purpose, see verse 6.

ten cubits from brim to brim ... and a line of thirty cubits
compassed it] The mathematical inaccuracy in the measurements
here given—10 in diameter, 30 in circumference—has often been
pointed out. But the literal Hebrew is “ten with the cubit ... and thirty
with the cubit,” and F. C. Burkitt in a communication to the
Cambridge Review for May 13, 1914 offers an interesting vindication
of the phrase. He writes “... What the verse says about the
circumference of the ‘sea’ is that they stretched a string round it, and
when they laid the string out flat they had to go thirty times with the
cubit, i.e. a man had to put his elbow down thirty times before he got
to the end.” [The distance from the point of the elbow to the tip of the
longest finger is 1 cubit.] “No doubt the last time he put his elbow
down the string came short: in other words, the ‘sea’ was nine-and-
a-bittock across and twenty-nine-and-a-bittock round. As a matter of
fact, if a circle be 9 ft. 6 in. across, it is just over 29 ft. 10 in. round.
Such a circle I think would be described in Hebrew as ‘ten with the
foot-rule’ across and ‘thirty with the foot-rule’ in circumference.”

a line of thirty cubits compassed it] i.e. it was thirty cubits in


circumference.

³And under it was the similitude of oxen ¹,


which did compass it round about, for ten
cubits ², compassing the sea round about. The
oxen ¹ were in two rows, cast when it was cast.
¹ In 1 Kings vii. 24, knops. ² Or, ten in a cubit.

3. under it was the similitude of oxen] This reading has the


support of the LXX., but can hardly be correct. Read (compare 1
Kings vii. 24), under it there were knops, “knops” being embossed
ornaments, imitating probably the fruit or the flowers of the gourd.

for ten cubits] Obviously an error, for the “knops” encircle the sea,
and its circumference was thirty not ten cubits. The rendering of the
margin “ten in a cubit” gives good sense, but is not a fair translation.
Whatever the mistake in the Hebrew may be, it appears in 1 Kings
vii. 24 also.

The oxen were in two rows, cast when it was cast] Correct the
reading as before and render, The knops were in two rows, cast
when it was cast. It is mentioned as a triumph of the founder’s art
that the laver was cast complete, with its ornaments, from the first.

⁴It stood upon twelve oxen, three looking


toward the north, and three looking toward the
west, and three looking toward the south, and
three looking toward the east: and the sea
was set upon them above, and all their hinder
parts were inward.
4. three ... and three ... and three ... and three] Thus the base
stood “foursquare,” satisfying the Hebrew idea of completeness;
compare Revelation xxi. 12‒16.

⁵And it was an handbreadth thick; and the


brim thereof was wrought like the brim of a
cup, like the flower of a lily: it received and
held three thousand baths.
5. three thousand baths] In 1 Kings vii. 26, two thousand baths.
Whether the textual corruption is to be attributed to 1 Kings or to
Chronicles cannot be determined, and further even two thousand
baths is an amount exceeding the capacity of a vessel with the
measurements given for the sea above. The bath was a measure for
liquids equal to about 8¼ gallons.

6 (compare verse 14 and 1 Kings vii. 38, 39).


The Lavers.

⁶He made also ten lavers, and put five on the


right hand, and five on the left, to wash in
them; such things as belonged to the burnt
offering they washed in them: but the sea was
for the priests to wash in.
6. the sea was for the priests to wash in] See, however, the note
on verse 2 above regarding its probable significance in early times.
For this, the Chronicler’s view of its purpose (as also that of the
lavers), compare Exodus xxx. 18‒21. The sea in particular would be
singularly awkward as a vessel for cleansing purposes, unless all
that is meant is that it was used as the receptacle from which water
for purification was drawn.

7 (= 1 Kings vii. 49).


The Golden Candlesticks.

⁷And he made the ten candlesticks of gold


according to the ordinance concerning them;
and he set them in the temple, five on the right
hand, and five on the left.
7. ten candlesticks] Rather, the ten lamp-stands. Allusion to ten
lamp-stands or candlesticks is found elsewhere only in 1 Kings vii.
49, a late passage. In view of the frequent references to one
candlestick with seven lamps (compare Zechariah iv.; Exodus xxv.
31 ff.), the question arises whether the ten ever had historical reality,
or were simply a fiction of tradition. The reference to candlesticks of
gold and of silver in 1 Chronicles xxviii. 15 does not help us, for it
depends on the same evidence, sound or unsound, which the
Chronicler had for the present passage. Some scholars feel that
there must be some ground for the statement; but no positive
conclusion is yet possible.

according to the ordinance] Compare Exodus xxv. 31‒37, xl. 4.

in the temple] In 1 Kings vii. 49 more precisely, before the oracle,


i.e. before the Holy of Holies.

8.
The Tables and Basons.

⁸He made also ten tables, and placed them in


the temple, five on the right side, and five on
the left. And he made an hundred basons of
gold.
8. ten tables] In verse 19 “the tables (plural) whereon was the
shewbread” are mentioned (compare 1 Chronicles xxviii. 16), but the
parallel passage (1 Kings vii. 48) has “the table” (singular), and
elsewhere both in Chronicles and in the rest of the Old Testament
one table only is assigned to the shewbread (2 Chronicles xiii. 11,
xxix. 18). Probably therefore the ten tables here mentioned were not
for the shewbread, although the Chronicler may have thought so.
The same uncertainty attaches to this tradition of ten tables as to
that of the ten candlesticks (see previous note); and it is held by
some that these tables were for the support of the candlesticks.
basons] These were used for dashing the blood of the sacrifices
against the altar.

9, 10.
The Two Courts.

⁹Furthermore he made the court of the priests,


and the great court, and doors for the court,
and overlaid the doors of them with brass.
9. the court of the priests, and the great court] The phrases
reflect the conditions of the second Temple with which the Chronicler
was familiar, when the inner court was confined to the use of the
priests, the outer one being for the people. Solomon’s Temple,
strictly speaking, had only one court, for in “the other court” stood
Solomon’s house (1 Kings vii. 8). This “other court” seems to be
called the “middle court” (2 Kings xx. 4, margin), and the “upper
court” (Jeremiah xxxvi. 10). The “great court” (1 Kings vii. 12) was
perhaps a third court containing not only the king’s house, but all the
royal buildings as well. The Hebrew word for “court” in all the above
passages is ḥāṣēr, but here the “court (ḥāṣēr) of the priests” is
distinguished from a court called the “great court” (Hebrew “great
‘azārāh”). Perhaps the Chronicler wishes to make the same
distinction when he says that Solomon’s great prayer was offered (vi.
13) in “the court” (Hebrew ’azārāh). Compare xx. 5 (note).

¹⁰And he set the sea on the right side of the


house eastward, toward the south.
10. the sea] See verses 2‒5. Its position is stated in accordance
with 1 Kings vii. 39.

11‒18 (= 1 Kings vii. 40‒47).


The Works of Huram.
This section is taken from the parallel passage of 1 Kings. The
variations are few.

¹¹And Huram made the pots, and the shovels,


and the basons. So Huram made an end of
doing the work that he wrought for king
Solomon in the house of God:
11. Huram] For the form of the name see note on ii. 3.

¹²the two pillars, and the bowls, and the two


chapiters which were on the top of the pillars;
and the two networks to cover the two bowls
of the chapiters that were on the top of the
pillars; ¹³and the four hundred pomegranates
for the two networks; two rows of
pomegranates for each network, to cover the
two bowls of the chapiters that were upon ¹ the
pillars.
¹ Hebrew upon the face of the pillars.

12. two pillars] See iii. 15‒17.

the bowls] i.e. the bowl-shaped part of the capital of a pillar.

the chapiters] In modern English “capitals.”

¹⁴He made also the bases, and the lavers


made he upon the bases; ¹⁵one sea, and the
twelve oxen under it.
14. He made also the bases, and the lavers made he upon the
bases] A simple correction of the Hebrew text gives, And the ten
bases and the ten lavers on the bases, as in 1 Kings vii. 43.

¹⁶The pots also, and the shovels, and the


fleshhooks, and all the vessels thereof, did
Huram his father make for king Solomon for
the house of the Lord of bright brass.
16. the fleshhooks] Hebrew mizlāgōth. In verse 11 and 1 Kings
vii. 45 (the parallel passages) the basons (Hebrew mizrāḳōth).

Huram his father] See note on ii. 13.

¹⁷In the plain of Jordan did the king cast them,


in the clay ground between Succoth and
Zeredah.
17. in the clay ground] G. A. Smith (Historical Geography, p. 488)
speaks of traces of old brick-fields found by Sir C. Warren in the
Jordan valley. It is possible, however, that the Hebrew is defective
and that the true reading is at the ford of Adamah, but on the whole
it is best to keep the reading in the text (see Barnes on 1 Kings vii.
46).

Succoth] Succoth is probably Tell Deir ‘Alla, east of Jordan, about


one mile north of the Jabbok.

Zeredah] (1 Kings xi. 26); but in 1 Kings vii. 46 (Revised Version)


Zarethan (compare Joshua iii. 6, Revised Version). Its site is not
known, beyond the obvious inference that it was near the Jordan and
not very far from Succoth. Joshua iii. 16 states that it was near Adam
(the modern el Damieh).
¹⁸Thus Solomon made all these vessels in
great abundance: for the weight of the brass
could not be found out ¹.
¹ Or, was not searched out.

18. Thus Solomon made all these vessels in great abundance] In


1 Kings vii. 47, And Solomon left all the vessels unweighed, because
they were exceeding many.

19‒V. 1 (= 1 Kings vii. 48‒51).


The Vessels of Gold.

The Completion of the Work.

¹⁹And Solomon made all the vessels that were


in the house of God, the golden altar also, and
the tables whereon was the shewbread;
19. the golden altar] This was the altar of incense (compare 1
Maccabees i. 21 ff.), which according to Exodus xxx. 1 ff. stood
within the tabernacle and was made of acacia wood (compare
however, Exodus xxxix. 38). Both passages in Exodus are of late,
post-exilic, date, and as no mention of this altar is made by Ezekiel,
it was probably a feature not of the first but of the second Temple.

the tables whereon was the shewbread] In 1 Kings vii. 48


(parallel passage), the table (singular); a reading probably to be
accepted here also; compare note on verse 8.

²⁰and the candlesticks with their lamps, that


they should burn according to the ordinance
before the oracle, of pure gold;
20. the oracle] See note on iii. 16.

²¹and the flowers, and the lamps, and the


tongs, of gold, and that perfect gold;
21. the flowers] These were ornaments on the golden
candlesticks; compare Exodus xxxvii. 19.

²²and the snuffers, and the basons, and the


spoons, and the firepans, of pure gold: and as
for the entry of the house, the inner doors
thereof for the most holy place, and the doors
of the house, to wit, of the temple, were of
gold.
22. the firepans] in which fire was carried to and from the altar.

the doors of the house, to wit, of the temple] The “[greater]


house” or “temple” is here distinguished from the “most holy place”
or “shrine.” Compare iii. 5, 8.

were of gold] According to the more probable reading of 1 Kings


vii. 50 the hinges were of gold; the doors themselves were of olive
wood overlaid with gold (1 Kings vi. 31, 32).

¹Thus all the work that Solomon wrought for


the house of the Lord was finished. And
Solomon brought in the things that David his
father had dedicated; even the silver, and the
gold, and all the vessels, and put them in the
treasuries of the house of God.
Chapter V. 1. all the vessels] the word may be taken to include
weapons, spoils of war, compare 2 Samuel viii. 7 ff.; 1 Chronicles
xviii. 11.

V. 2‒VIII. 10.
The Dedication of the Temple.

Chapter V.
2‒10 (= 1 Kings viii. 1‒9).
The Ark brought into the Sanctuary.

This section is taken almost verbatim from 1 Kings.

²Then Solomon assembled the elders of


Israel, and all the heads of the tribes, the
princes of the fathers’ houses of the children
of Israel, unto Jerusalem, to bring up the ark
of the covenant of the Lord out of the city of
David, which is Zion.
2. Then Solomon assembled] The same verb in the Hebrew as in
1 Chronicles xv. 3 (see note there) and in 1 Chronicles xxviii. 1.

the city of David] See 1 Chronicles xi. 5, note on the strong hold
of Zion.
³And all the men of Israel assembled
themselves unto the king at the feast, which
was in the seventh month.
3. the feast] i.e. the Feast of Tabernacles, i.e. after the fruit
harvest.

in the seventh month] In 1 Kings the name of the month is given


as Ethanim, but this word was perhaps obsolete when the Chronicler
wrote; at any rate we know that in post-biblical times the seventh
month was regularly called Tisri.

⁴And all the elders of Israel came, and the


Levites took up the ark.
4. the Levites took up the ark] According to 1 Kings the priests
performed this duty. In the days of David and Solomon all Levites
were possible priests, Levi being the name of the priestly clan and
not of a lower order of priests. At a later period the Levites were
regarded as a class subordinate to the priests, having duties distinct
from those of the priests—e.g. the task of bearing the tabernacle and
all its furniture (see Numbers i. 50, etc.). The Chronicler believing
that this distinction had been in force from the time of Moses
onwards “corrects” the text of Kings by changing “priests” into
“Levites”: compare 1 Chronicles xv. 2, 12, 13. See the special note
on 1 Chronicles vi., pp. 51 f.

⁵And they brought up the ark, and the tent of


meeting, and all the holy vessels that were in
the Tent; these did the priests the Levites
bring up. ⁶And king Solomon and all the
congregation of Israel, that were assembled
unto him, were before the ark, sacrificing
sheep and oxen, that could not be told nor
numbered for multitude.
5. the tent of meeting] i.e. the Mosaic tabernacle, which the
Chronicler believed to have been in existence in the time of David
and Solomon, and to have been at Gibeon (i. 3 f.). The parallel
statement in Kings comes not from the early sources but from the
hand of a late reviser.

the priests the Levites] here the older phrase, which does not
indicate a distinction between Priests and Levites, has been allowed
to stand, perhaps “because certain utensils might well have been
borne by the priests” (so Curtis), or possibly through slight
carelessness on the Chronicler’s part. The parallel in Kings has “the
priests and the Levites.”

⁷And the priests brought in the ark of the


covenant of the Lord unto its place, into the
oracle of the house, to the most holy place,
even under the wings of the cherubim. ⁸For
the cherubim spread forth their wings over the
place of the ark, and the cherubim covered the
ark and the staves thereof above.
7. the priests brought in the ark] Only the priests might lawfully
place the Ark within the Holy of Holies (compare Numbers iv. 5 ff.).
The Chronicler therefore had no cause for changing priests into
Levites here.

into the oracle] See iii. 16, note.

⁹And the staves ¹ were so long that the ends of


the staves were seen from the ark before the
oracle; but they were not seen without: and
there it is, unto this day.
¹ Or, they drew out the staves, so that &c.

9. from the ark] Read (with LXX. and 1 Kings viii. 8) from the
holy place. One standing in the Holy Place and looking towards the
Holy of Holies could see the heads of the staves.

and there it is, unto this day] These words are taken over with the
loss of one letter (which here makes the difference between singular
and plural) from 1 Kings viii. 8, but they are out of place in
Chronicles, for when the Chronicler wrote the Ark had long ago
disappeared. The vessels which were brought back from the
Babylonian captivity are specified in Ezra i. 9, 10, but the Ark of the
covenant is not reckoned among them.

¹⁰There was nothing in the ark save the two


tables which Moses put there at Horeb, when ¹
the Lord made a covenant with the children
of Israel, when they came out of Egypt.
¹ Or, where.

10. which Moses put there] Exodus xl. 20.

at Horeb] Deuteronomy v. 2.

11‒14 (= 1 Kings viii. 10, 11).


The Descent of the Glory of the Lord.

¹¹And it came to pass, when the priests were


come out of the holy place, (for all the priests

You might also like