AN ALGORITHM OF LOW-COST MULTICAST BASED ON DELAY AND DELAY VARIATION CONSTRAINT

Size: px
Start display at page:

Download "AN ALGORITHM OF LOW-COST MULTICAST BASED ON DELAY AND DELAY VARIATION CONSTRAINT"

Transcription

1 INTERNATIONAL JOURNAL OF INFORMATION AND SYSTEMS SCIENCES Volume 2, Number 1, Pages c 2006 Institute for Scientific Computing and Information AN ALGORITHM OF LOW-COST MULTICAST BASED ON DELAY AND DELAY VARIATION CONSTRAINT DAN-MEI ZHU, YAN-RUI SUN, HONG-XIA GAO, AND LIN LI Abstract. To meet the quality of service requirements of real-time multimedia, multicast communication is becoming a new approach of communication. Research on how to construct an effective multicast routing algorithm is therefore a hot topic. This paper first introduces a definition of crucial points and proposes a method of dividing the interval of delay, by which establishing an algorithm of minimum cost multicast based on delay and delay variation constraints. The new algorithm is shown to be effective by analyzing time complexity and comparison with other algorithms. Key Words. bounded multicast tree, crucial points, dividing the interval of delay. 1. Introduction In multicast communication, messages are concurrently sent to multiple destinations and all members of the same multicast group. With the development of multimedia applications, there has been a lot of interest in providing real-time multimedia services like audio and video over high-performance networks. These services require certain quality of service (QoS) from the networks. Supporting multimedia applications is a major objective of future high speed networks. Meanwhile, multicast services have been used by various continuous media applications. Multicast routing is a central problem in multicast communication. A typical approach to multicast routing requires the transmission of packets along the branches of a tree spanning the source and destination nodes, which is a problem of how to construct multicast a tree. One frequently considered optimization objective is the minimization of the total cost of the tree, which is taken as the sum of the costs on the links of the multicast tree. The minimum cost tree is known as the Steiner tree and finding such a tree is a well-known NP-hard problem [1,2]. Several heuristic multicast routing algorithms have been proposed recently [3,4]. To meet the quality of service requirements of real-time multimedia, it is necessary to satisfy the bounds of not only delay from source node to destination nodes but also delay variation in destination nodes, namely, we should find a Steiner tree accounting for delay and delay variation constraints. Apparently, it is also an NP-hard problem. The traditional algorithm on the above problem mostly neglect some crucial points in looking for Steiner trees [3-6], which often act as a crucial status in constructing Steiner tree. This paper first introduces a definition of crucial points and propose a method of dividing the area of delay, by which establishing an algorithm of minimum cost multicast based on delay and delay variation constraints. Received by the editors January 1, 2004 and, in revised form, March 22, Mathematics Subject Classification. 35R35, 49J40, 60G40. 51

2 52 DAN-MEI ZHU, YAN-RUI SUN, HONG-XIA GAO, AND LIN LI 2. Notation G(V, E): a weighted digraph. V denotes the set of nodes, and E the set of arcs corresponding to the set of communication links which connect the nodes. C(e): a link-cost function C:e R + which assigns a nonnegative weight to each link in the network; D(e): a link-delay function D:e R + which assigns a nonnegative weight to each link in the network; s : source node; M: destination set M = {V 1, V 2,, V n }; T = (V T, E T ) : multicast tree, V T V, E T E; i : source of the i th destination delay tolerance; : source-destination delay tolerance; δ: the maximum inter-destination delay variation in a tree T; P T s, v: the path from source s to destination v in a tree; e P T (s,v) D(e): a total delay from source s to destination v in path of tree. 3. Network model for multicasting Consider a communication network represented by a directed graph G=(V, E). The network is assumed to be full duplex. In other words, the existence of link e = (u, v) E implies the existence of link e = (v, u) E. Each link e E is assigned a cost value C(e), where C(e) R +. A link cost value can be the utilization of the link or a monetary cost, for example. We assume that the messages are concurrently sent to multiple destinations from a source node. A network model of minimum cost multicast tree based on delay and delay variation constraints is the tree that satisfies the following: Minimize Cost(T ) = C(e) e T subject to e P T (s,v i) e P T (s,v i ) D(e) D(e) v i M (1) e P T (s,v j) D(e) δ, v i, v j M (2) This problem is NP-complete. Therefore, efficient heuristics that build low-cost multicast trees with bounded end-to-end delay and delay variation are needed. 4. Heuristics for the constrained Steiner tree We now present an algorithm to construct a tree satisfying constraints (1) and (2) for the given values of the path delay and the interdestination delay variation tolerances. We assume that the source has all the information necessary to construct the multicast tree. Such information may be collected and updated using an existing topology-broadcast algorithm [9]. The algorithm is given as follows. Step 1: Divide the interval of delay. To satisfy constraints (1) and (2), we change constraint (2) into constraint (1). We can let H = {(x ɛ, x + δ ɛ) x (0, ), ɛ (0, δ) and x, ɛ R}, Let ɛ be a certain real number, and r i a random number, let x = r i and i = 1, 2,, n. We can get a certain interval H i = (x ɛ, x + δ ɛ), i = 1, 2,, n.

3 LOW-COST MULTICAST BASED ON DELAY VARIATION CONSTRAINT 53 If H i does not belong to [0, ], we discard it. Initialize n = 1, then go to Step 2. Step 2: Find a lowest cost source-destination path satisfying delay in H 1 with a k-shortest path algorithm. If some does not satisfy the delay given in H 1, then replace this path with the second lowest path, and so on. We can gain an effective path set P 1 = {p 1, p 2,, p m }. Step 3: Find crucial points. Counting the frequency of the relay nodes (not source nor destination nodes) arising on effective paths. Taking out high frequency nodes whose degrees are more than 3 in networks. We define these nodes as crucial points. Step 4: Construct closure graph G. The closure graph G is a complete graph with source, destination nodes and crucial points as its set of nodes. Its set of edges consists of the lowest cost path satisfying constraints(1) and(2). Step 5: Constructing a multicast constrained tree. In the closure graph G, we use the Prim algorithm to construct a multicast constrained tree. Firstly, initialize a multicast tree with the source node; secondly, we use a greedy approach to add edges to a subtree of the constrained spanning tree until all the destination nodes are covered and then record the total cost of this tree. Finally, expand the edges of the constrained spanning tree into the constrained lowest paths they present, and remove any loops that may be caused by this expansion. In this process, assume v is in the tree constructed so far, and we consider whether to include some edges adjacent to v. Adding edges subject to two selection functions which are given in Ref. [3] and revising the selection function. Those two selection functions are: P C (v, w) f CD (v, w) = if P D (s, v) H H i (P (v) + P D (v, w)) i ; f C (v, w) = P C (v, w). In the above functions, P C (v, w),p D (v, w) respectively denote the cost of link and the delay of link from node v to w; P (v) denotes the delay of link from source s to node v in tree; H i, H i respectively denote the maximum and minimum convergence points in H i. Step 6: When n = k, compare the total cost of all trees, choose a tree which has a lowest cost. If there are more than one trees of lowest cost, we then get a satisfied solution through increasing the value of k. 5. Performance analysis of the new heuristic algorithm 5.1. Analysis of algorithm rationality Theorem 1: The new heuristic algorithm can find a solution if a solution exists. Proof: If the heuristic is able to find a feasible solution covering all the k nodes, then we know two facts. Firstly, the algorithm produces a tree that spans all the k nodes. Secondly, no constraints conditions has been violated. Thus, there must be a path from s to each destination with delay and delay variation constraint, indicating that a solution exists. Step 4 and Step 5 in the new heuristic algorithm can ensure that this algorithm satisfies the first condition because we use the Prim algorithm in the closure graph whose nodes are consisted of source, destination nodes and crucial points. Meantime, Step 1 ensures this algorithm satisfies the second condition. Therefore, the new heuristic algorithm finds a feasible solution if a solution exists.

4 54 DAN-MEI ZHU, YAN-RUI SUN, HONG-XIA GAO, AND LIN LI Rationality of introducing crucial points. Constructing a multicast tree is a central problem for solving a multicast routing problem, and finding Steiner tree is the main method for constructing a multicast tree. This paper constructs multicast tree through heuristic seeking a bounded Steiner tree. There are some points that should not be neglected, which is often crucial in constructing a Steiner tree. The existence of these points usually can greatly decrease the total cost of the tree. Rayward -Smith once tried to seek these points in solving the Steiner tree problem and defined them as Steiner points [7]. He tried to find some potential Steiner points through iterations of functions. Generally speaking, Steiner points exist in rally nodes whose degrees are more than three in a Steiner tree [8]. This paper is also based on this idea. Selected crucial points satisfies the necessary condition of Steiner points, meanwhile, counting the frequency of the relay nodes (not source nor destination nodes) which arise on effective paths. Taking out high frequency nodes whose degree more than 3 in networks. We define these points as crucial points. Because crucial points are high frequency nodes on effective paths, these points must have a crucial effect on the optimization of a multicast routing tree. Accordingly, these points are important in constructing a Steiner tree. Therefore, we introduce these points and define them as crucial points Rationality of dividing the interval of delay. There usually is a conflict between constraints (1), (2) [6] in a multicast model. Constraint (1) seeks a shortest source-destination delay path, while as constraint (2) generally gives up a shortest source-destination delay path. Therefore, this paper changes two constraints into one constraint and divides the delay interval, by which make multicast routing satisfying constraints (1),(2). Theorem 2: The new heuristic algorithm finds a feasible solution in finite steps if a solution exists. Proof: The delay of the source-destination path should be 0 i when it satisfies constraint (1). This paper converts constraint( 2) into constraint (1) through restraining the delay interval. Assumed H is an open covering of the interval [0, ], and H = {(x ɛ, x + δ ɛ) x (0, ), ɛ (0, δ) and x, ɛ R}, Based on Heine- Borel-Lebesgue theorem of the finite open covering, we know that there are finite open intervals in H, which constitutes an open covering of the interval [0, ]. Because the solution satisfying constraint (1) can only appear in [0, ], meantime, the solution satisfying constraint (2) can only appear in H. According to the theorem of finite open covering, there must exist finite open intervals in H, which constitutes an open covering of the interval [0, ]. Therefore, we conclude that the solution must be found in finite steps while concurrently satisfying constraints (1),(2) Analyzing complexity of the Heuristics. Consider a communication network with n nodes and the number of multicast member is assumed m. In heuristics, k-shortest path algorithm takes O(n 3 ) time in Step 2; finding crucial points takes O((n m 1) 2 ) time in Step 3; As for the construction of closure graph G in Step 4, if there are h nodes in the closure graph G, it will take Oh 3 time; the Prim algorithm takes O(n 2 ) time in Step5, and expanding the edges of the constrained spanning tree into the constrained lowest paths they present, and removing any loops that may be caused by this expansion will cost O(hn). Summarize above, whole algorithm will take O(n 3 ) time.

5 LOW-COST MULTICAST BASED ON DELAY VARIATION CONSTRAINT 55 Figure 1. a multicast routing illustration 5.3. Comparing with others algorithm. Consider a communication network with n nodes, and suppose the number of multicast member is m. We compare this heuristic algorithm with SPT[5], DDVBM[10], DVMA[6], BMSTA[5]. The complexity of DDVBM is O(n 3 ), DVMA is O(mn 3 ), BMSTA is O(mn 4 ) and complexity of this heuristic algorithm is O(n 3 ). We adopt the illustration in paper [5] to compare with other algorithms as shown if Figure 1. In Figure 1, the source node is s and destination set is M = c, e, f, g; the weight is (C, D), where C denotes the cost of link and D denotes the delay of link. The result of different algorithm shows as Table 1. the maximum the maximum the cost of algorithm interdestination interdestination delay multicast delay max variation δ max tree Cost(T) SPT DDVBM DVMA BMSTA Algorithm in this paper Table 1: Comparison with other algorithms From above comparison, we can see that the proposed algorithm here shows a better performance. Compared with other algorithms, the value of cost if our algorithm is better. Although the cost of multicast tree in our algorithm is a little higher than the algorithm of BMSTA s, the value of max and the time complexity of BMSTA is even more high than this algorithm. Therefore, this algorithm is better. 6. Conclusions This paper has introduced a definition of crucial points and proposed to divide the interval of delay, by which establishing a new algorithm of low-cost multicast based on delay and delay variation constraints. Through performance analysis of the new heuristic algorithm and comparison with other algorithms, it has been shown that this algorithm has better performance.

6 56 DAN-MEI ZHU, YAN-RUI SUN, HONG-XIA GAO, AND LIN LI Acknowledgments The author thanks the anonymous authors whose work largely constitutes this sample file. This research was supported by???. References [1] Hakkimi S L. Steiner s problem in graphs and its implications[j], Networks,1971,(1): [2] Garey M R, Graham R L, Johnson D S. The complexity of computing Steiner minimal tree[j]. SIAM J. Of Applied mathematics, 1977, 32(4): [3] Kompella V P, Pasquale J C, Polyzos G C. Multicast Routing for Multimedia Communication [J]. IEEE/ACM Transactions on Networking, 1993, 1(3): [4] Ravikumar C P, Rajneesh Bajpai. Sourcebased delaybounded multicasting in multimedia networks [J]. Computer Communications, 1998, 21(2): [5] Fan Xiu-meiChen Chang-jia.Research on minimum cost multicast tree based on delay and delay variation constraints[j]. Journal of the China Railway 2000, 22(4): [6] Rouskas G N, Baldine I. Multicast Routing with End-to End Delay and Delay Variation Constraints[J]. IEEE JSAC , 15(3): [7] V. J. Rayward - Smith and A. Clare. On finding Steiner vertices. Networks, vol.16, pp , [8] Bernard M. Waxman. Routing of multipoint connections. IEEE JSAC.1988, vol.6, no.9, [9] D. Bertsekas and R. Gallager, Data Networks. Englewood Cliffs, NJ: Prentice Hall,1992. [10] C.P.Low, Y.J.Lee. Distributed multicast routing, with end-to-end delay and delay variation constraints. Computer Communication. 23(2000) Appendix: The Constrained Steiner Tree Algorithm / LetG = (V, E) describe the network topology s=source node M=mluticast group C=crucial points = source destination delay constraint δ =the maximum interdestination delay variation in a tree T / 1. Begin 2. ɛ = ɛ 0, = 0,δ = δ 0 3. for i = 1 to k 4. x = r i / r i = random(0, 1) / 5. H i = (x ɛ, x + δ ɛ) Else 8. Multicast(G(V, E), s, M, C,, δ) 9. if C Ti+1 < C Ti then C T = C Ti+1 / Record the cost of T i as C Ti / 10. end if 11. end if 12. i = i end for 14. Output T and C T 15. End 16. Multicast(G(V, E), s, M, C,, δ) / ConstructM ulticastroutingtree / 17. Begin / Compute the cheapest constrained Steiner Tree in M C {s} / 18. V M C {s} 19. for each v, w V do 20. begin 21. P C [V, W ] cost of cheapest constrained path from v to w

7 LOW-COST MULTICAST BASED ON DELAY VARIATION CONSTRAINT P D [V, W ] path delay along cheapest constrained path from v to w 23. end / Q = set of nodes already visited / / P [v] =path delay from s to v in the tree / / T =spanning tree on the closure graph whose nodes is consisted of V / 24. Q = {s} 25. P [s] = T = / until all nodes in have been spanned / 27. while (Q V ) do 28. begin 29. min = 30. for eachv Q do 31. begin 32. for eachw V \Q do 33. begin / if delay from s to w is within limits, consider edge (v, w) as a candidate and compute the selection function f s (v, w) = f CD (v, w) or f C (v, w) f CD (v, w) = P C (v,w) H i (P (v)+p D (v,w)) if P D (s, v) H i ; f C (v, w) = P C (v, w) / 34. if (f s (v, w) < min) then 35. begin 36. nextedge = (v, w) 37. min = f s (v, w) 38. end if 39. end for 40 end for 41. Q = Q w P [w] = P [v] + P D [v, w] T = T {nextedge} 44. end / while / 45. end / Multicast / 46. Crucial points(h) / find crucial points / 47. Begin 48. h = h for i = 1 to m 50. P j i = Dijkstra(i) original graph / find the first k- shortest paths from s to v i in the 51. Q i = {Pi 1,, P j i,, P i k} / G(V, E), such that the delay from s to v i over these paths belong to H i. / 52. P i = minq i / Pick out a shortest path P j from them, label this path and record the relay nodes of degree3 in this path / 53. If P i = then go to End 54. else 55. record P i 56. end if 57. i = i end for 59. P = {P 1, P 2,, P m } / construct a effective path set /

8 58 DAN-MEI ZHU, YAN-RUI SUN, HONG-XIA GAO, AND LIN LI 60. if Statistics (RN) > h / the statistic frequency of relay nodes of degree 3 in P / 61. C = Statistics(RN) 62. end if College of Science, Northeastern University, Shenyang, , P. R. China zhudanmei@126.com College of Science, Northeastern University, Shenyang, , P. R. China yanruisun@126.com and yanggao0910@126.com and LL @126.com

IN multicast communication, messages are concurrently sent

IN multicast communication, messages are concurrently sent 346 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 15, NO. 3, APRIL 1997 Multicast Routing with End-to-End Delay and Delay Variation Constraints George N. Rouskas, Member, IEEE, and Ilia Baldine

More information

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC Zhou Ling 1, 2, Ding Wei-xiong 2 and Zhu Yu-xi 2 1 Department of Information Science and Engineer, Central South University,

More information

AN EFFICIENT ALGORITHM FOR SHORTEST PATH MULTICAST ROUTING UNDER DELAY AND DELAY VARIATION CONSTRAINTS

AN EFFICIENT ALGORITHM FOR SHORTEST PATH MULTICAST ROUTING UNDER DELAY AND DELAY VARIATION CONSTRAINTS AN EFFICIENT ALGORITHM FOR SHORTEST PATH MULTICAST ROUTING UNDER DELAY AND DELAY VARIATION CONSTRAINTS Mohamed F. Mokbel Department of Computer Science Purdue University West Lafayette, Indiana 47907 e-mail:

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

QoS Constraints Multicast Routing for Residual Bandwidth Optimization using Evolutionary Algorithm

QoS Constraints Multicast Routing for Residual Bandwidth Optimization using Evolutionary Algorithm QoS Constraints Multicast Routing for Residual Bandwidth Optimization using Evolutionary Algorithm Sushma Jain* and J.D. Sharma Abstract For the real time multimedia applications, the routing algorithms

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

23.2 Minimum Spanning Trees

23.2 Minimum Spanning Trees 23.2 Minimum Spanning Trees Kruskal s algorithm: Kruskal s algorithm solves the Minimum Spanning Tree problem in O( E log V ) time. It employs the disjoint-set data structure that is similarly used for

More information

An Evolutionary Algorithm for the Multi-objective Shortest Path Problem

An Evolutionary Algorithm for the Multi-objective Shortest Path Problem An Evolutionary Algorithm for the Multi-objective Shortest Path Problem Fangguo He Huan Qi Qiong Fan Institute of Systems Engineering, Huazhong University of Science & Technology, Wuhan 430074, P. R. China

More information

Multicast routing Draft

Multicast routing Draft Multicast routing Draft Lucia Tudose Nokia Research Center E-mail: tudose@research.nokia.com Abstract Multicast routing is establishing a tree which is routed from the source node and contains all the

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

Min-Cost Multicast Networks in Euclidean Space

Min-Cost Multicast Networks in Euclidean Space Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue 1 Zongpeng Li 23 1 Fudan University Shanghai, China 2 University of Calgary Alberta, Canada 3 Institute of Network Coding, Chinese University of Hong Kong,

More information

MANY multimedia communication applications require

MANY multimedia communication applications require IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 3, NO. 1, APRIL 1999 53 An Orthogonal Genetic Algorithm for Multimedia Multicast Routing Qingfu Zhang and Yiu-Wing Leung, Senior Member, IEEE Abstract

More information

Lecture 19. Broadcast routing

Lecture 19. Broadcast routing Lecture 9 Broadcast routing Slide Broadcast Routing Route a packet from a source to all nodes in the network Possible solutions: Flooding: Each node sends packet on all outgoing links Discard packets received

More information

The Join the Club Interpretation of Some. Graph Algorithms

The Join the Club Interpretation of Some. Graph Algorithms The Join the Club Interpretation of Some Graph Algorithms Harold Reiter Isaac Sonin June 8, 2000 Abstract Several important tree construction algorithms of graph theory are described and discussed using

More information

Performance Analysis of Routing Techniques in Networks

Performance Analysis of Routing Techniques in Networks International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012 1 Performance Analysis of Routing Techniques in Networks J.Mahesh, M.Antony Kumar P.M.R.Engineering College

More information

ALEXANDRIA UNIVERSITY FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE AND AUTOMATIC CONTROL

ALEXANDRIA UNIVERSITY FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE AND AUTOMATIC CONTROL ALEXANDRIA UNIVERSITY FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE AND AUTOMATIC CONTROL NEW ALGORITHMS FOR MULTICAST ROUTING IN REAL TIME NETWORKS A thesis submitted in partial fulfillment for

More information

Multicast Communications. Tarik Čičić, 4. March. 2016

Multicast Communications. Tarik Čičić, 4. March. 2016 Multicast Communications Tarik Čičić, 4. March. 06 Overview One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic concepts in multicast

More information

Optimal network flow allocation

Optimal network flow allocation Optimal network flow allocation EE384Y Project intermediate report Almir Mutapcic and Primoz Skraba Stanford University, Spring 2003-04 May 10, 2004 Contents 1 Introduction 2 2 Background 2 3 Problem statement

More information

Routing. Information Networks p.1/35

Routing. Information Networks p.1/35 Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual

More information

Multicast Routing Based on Genetic Algorithms

Multicast Routing Based on Genetic Algorithms JOURNAL OF INFORMATION MULTICAST SCIENCE ROUTING AND ENGINEERING BASED ON GENETIC 16, 885-901 ALGORITHMS (2000) 885 Multicast Routing Based on Genetic Algorithms Department of Computer Science and Information

More information

The Memetic Algorithm for The Minimum Spanning Tree Problem with Degree and Delay Constraints

The Memetic Algorithm for The Minimum Spanning Tree Problem with Degree and Delay Constraints The Memetic Algorithm for The Minimum Spanning Tree Problem with Degree and Delay Constraints Minying Sun*,Hua Wang* *Department of Computer Science and Technology, Shandong University, China Abstract

More information

Multicast Routing with Delay and Delay Variation Constraints for Multimedia Applications

Multicast Routing with Delay and Delay Variation Constraints for Multimedia Applications Multicast Routing with Delay and Delay Variation Constraints for Multimedia Applications Shankar M. Banik 1, Sridhar Radhakrishnan 1, and Chandra N. Sekharan 2 1 School of Computer Science, University

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

A Network Topology With Efficient Balanced Routing

A Network Topology With Efficient Balanced Routing A Network Topology With Efficient Balanced Routing Dionysios Kountanis Vatsal Sharadbhai Gandhi Wasim El-Hajj Ghassen Ben Brahim email: {kountan, vsgandhi, welhajj, gbenbrah}@cs.wmich.edu Department of

More information

Performance Analysis of Multicast and Priority-Based Routing under a Failure in Differentiated-Services Internet*

Performance Analysis of Multicast and Priority-Based Routing under a Failure in Differentiated-Services Internet* Performance Analysis of Multicast and Priority-Based Routing under a Failure in Differentiated-Services Internet* Gerald Rogers! Deep Medhif Wen-Jung Hsin, Suresh Muppala Department of Computer Networking

More information

Min-Cost Multicast Networks in Euclidean Space

Min-Cost Multicast Networks in Euclidean Space Min-Cost Multicast Networks in Euclidean Space Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue School of Computer Science Fudan University {09110240030,11110240029,xinw,xyxue}@fudan.edu.cn Zongpeng Li Dept.

More information

IN distributed random multiple access, nodes transmit

IN distributed random multiple access, nodes transmit 414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and

More information

Directed Graph and Binary Trees

Directed Graph and Binary Trees and Dr. Nahid Sultana December 19, 2012 and Degrees Paths and Directed graphs are graphs in which the edges are one-way. This type of graphs are frequently more useful in various dynamic systems such as

More information

TSDLMRA: an efficient multicast routing algorithm based on Tabu search

TSDLMRA: an efficient multicast routing algorithm based on Tabu search Journal of Network and Computer Applications 27 (2004) 77 90 www.elsevier.com/locate/jnca TSDLMRA: an efficient multicast routing algorithm based on Tabu search Heng Wang*, Jie Fang, Hua Wang, Ya-Min Sun

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

A Heuristic Algorithm for Core Selection in Multicast Routing

A Heuristic Algorithm for Core Selection in Multicast Routing Kabat MR, Patel MK, Tripathy CR. A heuristic algorithm for core selection in multicast routing. JOURNAL OF COM- PUTER SCIENCE AND TECHNOLOGY 26(6): 954 961 Nov. 2011. DOI 10.1007/s11390-011-1192-x A Heuristic

More information

tree follows. Game Trees

tree follows. Game Trees CPSC-320: Intermediate Algorithm Design and Analysis 113 On a graph that is simply a linear list, or a graph consisting of a root node v that is connected to all other nodes, but such that no other edges

More information

The Full Survey on The Euclidean Steiner Tree Problem

The Full Survey on The Euclidean Steiner Tree Problem The Full Survey on The Euclidean Steiner Tree Problem Shikun Liu Abstract The Steiner Tree Problem is a famous and long-studied problem in combinatorial optimization. However, the best heuristics algorithm

More information

Javier Cordova. Abstract. In this paper the following problem is considered: given a root node R in a

Javier Cordova. Abstract. In this paper the following problem is considered: given a root node R in a TR94025 A Heuristic Algorithm for the Rectilinear Steiner Arborescence Problem Javier Cordova Computer Science Department University of Puerto Rico Arecibo, PR 0013 YannHang Lee Computer and Information

More information

Approximation Basics

Approximation Basics Milestones, Concepts, and Examples Xiaofeng Gao Department of Computer Science and Engineering Shanghai Jiao Tong University, P.R.China Spring 2015 Spring, 2015 Xiaofeng Gao 1/53 Outline History NP Optimization

More information

Polynomial-time Algorithm for Determining the Graph Isomorphism

Polynomial-time Algorithm for Determining the Graph Isomorphism American Journal of Information Science and Computer Engineering Vol. 3, No. 6, 2017, pp. 71-76 http://www.aiscience.org/journal/ajisce ISSN: 2381-7488 (Print); ISSN: 2381-7496 (Online) Polynomial-time

More information

Bottleneck Steiner Tree with Bounded Number of Steiner Vertices

Bottleneck Steiner Tree with Bounded Number of Steiner Vertices Bottleneck Steiner Tree with Bounded Number of Steiner Vertices A. Karim Abu-Affash Paz Carmi Matthew J. Katz June 18, 2011 Abstract Given a complete graph G = (V, E), where each vertex is labeled either

More information

of optimization problems. In this chapter, it is explained that what network design

of optimization problems. In this chapter, it is explained that what network design CHAPTER 2 Network Design Network design is one of the most important and most frequently encountered classes of optimization problems. In this chapter, it is explained that what network design is? The

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

M 3 DDVC: Multi-source Multicasting using Multi-cores with Delay and Delay Variation Constraints on Overlay Networks

M 3 DDVC: Multi-source Multicasting using Multi-cores with Delay and Delay Variation Constraints on Overlay Networks 2011 Eighth International Conference on Information Technology: New Generations M 3 DDVC: Multi-source Multicasting using Multi-cores with Delay and Delay Variation Constraints on Overlay Networks Shankar

More information

Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks

Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks Mihaela Cardei, Jie Wu, and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 {mihaela,jie}@cse.fau.edu,

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks 1682 IEEE TRANSACTIONS ON COMPUTERS, VOL. 63, NO. 7, JULY 2014 Community-Aware Opportunistic Routing in Mobile Social Networks Mingjun Xiao, Member, IEEE, Jie Wu, Fellow, IEEE, and Liusheng Huang, Member,

More information

CS261: Problem Set #2

CS261: Problem Set #2 CS261: Problem Set #2 Due by 11:59 PM on Tuesday, February 9, 2016 Instructions: (1) Form a group of 1-3 students. You should turn in only one write-up for your entire group. (2) Submission instructions:

More information

Open Access Research on the Prediction Model of Material Cost Based on Data Mining

Open Access Research on the Prediction Model of Material Cost Based on Data Mining Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining

More information

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services Zhiyong Liu, CATR Prof. Zhili Sun, UniS Dr. Dan He, UniS Denian Shi, CATR Agenda Introduction Background Problem Statement

More information

Graph Theory. Part of Texas Counties.

Graph Theory. Part of Texas Counties. Graph Theory Part of Texas Counties. We would like to visit each of the above counties, crossing each county only once, starting from Harris county. Is this possible? This problem can be modeled as a graph.

More information

Data Caching in Networks with Reading, Writing and Storage Costs

Data Caching in Networks with Reading, Writing and Storage Costs Data Caching in Networks with Reading, Writing and Storage Costs Bin Tang a, Himanshu Gupta b a Department of Electrical Engineering and Computer Science, Wichita State University, Wichita, KS 67260 b

More information

Network optimization: An overview

Network optimization: An overview Network optimization: An overview Mathias Johanson Alkit Communications 1 Introduction Various kinds of network optimization problems appear in many fields of work, including telecommunication systems,

More information

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Thomas Erlebach Department of Computer Science University of Leicester, UK te17@mcs.le.ac.uk Ambreen Shahnaz Department of Computer

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

OPTIMIZATION PROBLEMS IN MULTICAST TREE CONSTRUCTION

OPTIMIZATION PROBLEMS IN MULTICAST TREE CONSTRUCTION OPTIMIZATION PROBLEMS IN MULTICAST TREE CONSTRUCTION C.A.S. OLIVEIRA, P.M. PARDALOS, AND M.G.C. RESENDE ABSTRACT. Multicasting is a technique for data routing in networks that allows multiple destinations

More information

Instituto Nacional de Pesquisas Espaciais - INPE/LAC Av. dos Astronautas, 1758 Jd. da Granja. CEP São José dos Campos S.P.

Instituto Nacional de Pesquisas Espaciais - INPE/LAC Av. dos Astronautas, 1758 Jd. da Granja. CEP São José dos Campos S.P. XXXIV THE MINIMIZATION OF TOOL SWITCHES PROBLEM AS A NETWORK FLOW PROBLEM WITH SIDE CONSTRAINTS Horacio Hideki Yanasse Instituto Nacional de Pesquisas Espaciais - INPE/LAC Av. dos Astronautas, 1758 Jd.

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

A Note on the Separation of Subtour Elimination Constraints in Asymmetric Routing Problems

A Note on the Separation of Subtour Elimination Constraints in Asymmetric Routing Problems Gutenberg School of Management and Economics Discussion Paper Series A Note on the Separation of Subtour Elimination Constraints in Asymmetric Routing Problems Michael Drexl March 202 Discussion paper

More information

Multicast Routing and Wavelength Assignment in WDM Networks with Limited Drop-offs

Multicast Routing and Wavelength Assignment in WDM Networks with Limited Drop-offs Multicast Routing and Wavelength Assignment in WDM Networks with Limited Drop-offs X.-D. Hu and T.-P. Shuai Inst. of Applied Math. Chinese Academy of Sciences Beijing, China {xdhu, shuaitp}@mail.amss.ac.cn

More information

Cost-based Pricing for Multicast Streaming Services

Cost-based Pricing for Multicast Streaming Services Cost-based Pricing for Multicast Streaming Services Eiji TAKAHASHI, Takaaki OHARA, Takumi MIYOSHI,, and Yoshiaki TANAKA Global Information and Telecommunication Institute, Waseda Unviersity 29-7 Bldg.,

More information

In this lecture, we ll look at applications of duality to three problems:

In this lecture, we ll look at applications of duality to three problems: Lecture 7 Duality Applications (Part II) In this lecture, we ll look at applications of duality to three problems: 1. Finding maximum spanning trees (MST). We know that Kruskal s algorithm finds this,

More information

Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks

Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Franz Rambach Student of the TUM Telephone: 0049 89 12308564 Email: rambach@in.tum.de

More information

Scheduling Algorithms to Minimize Session Delays

Scheduling Algorithms to Minimize Session Delays Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of

More information

On Core Selection Algorithm for Reducing Delay Variation of Many-to-Many Multicasts with Delay-Bounds*

On Core Selection Algorithm for Reducing Delay Variation of Many-to-Many Multicasts with Delay-Bounds* On Core Selection Algorithm for Reducing Delay Variation of Many-to-Many Multicasts with Delay-Bounds* Moonseong Kiml, Young-Cheol Bang2, and Hyunseung Choo 1 1 School of Information and Communication

More information

Algorithms for minimum m-connected k-tuple dominating set problem

Algorithms for minimum m-connected k-tuple dominating set problem Theoretical Computer Science 381 (2007) 241 247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem Weiping Shang a,c,, Pengjun Wan b, Frances Yao c, Xiaodong

More information

Ruled Based Approach for Scheduling Flow-shop and Job-shop Problems

Ruled Based Approach for Scheduling Flow-shop and Job-shop Problems Ruled Based Approach for Scheduling Flow-shop and Job-shop Problems Mohammad Komaki, Shaya Sheikh, Behnam Malakooti Case Western Reserve University Systems Engineering Email: komakighorban@gmail.com Abstract

More information

Constrained Minimum Spanning Tree Algorithms

Constrained Minimum Spanning Tree Algorithms December 8, 008 Introduction Graphs and MSTs revisited Minimum Spanning Tree Algorithms Algorithm of Kruskal Algorithm of Prim Constrained Minimum Spanning Trees Bounded Diameter Minimum Spanning Trees

More information

THE FIRST APPROXIMATED DISTRIBUTED ALGORITHM FOR THE MINIMUM DEGREE SPANNING TREE PROBLEM ON GENERAL GRAPHS. and

THE FIRST APPROXIMATED DISTRIBUTED ALGORITHM FOR THE MINIMUM DEGREE SPANNING TREE PROBLEM ON GENERAL GRAPHS. and International Journal of Foundations of Computer Science c World Scientific Publishing Company THE FIRST APPROXIMATED DISTRIBUTED ALGORITHM FOR THE MINIMUM DEGREE SPANNING TREE PROBLEM ON GENERAL GRAPHS

More information

A New Multicast Wavelength Assignment Algorithm in Wavelength-Converted Optical Networks

A New Multicast Wavelength Assignment Algorithm in Wavelength-Converted Optical Networks Int J Communications, Network and System Sciences, 2009, 2, 912-916 doi:104236/ijcns200929106 Published Online December 2009 (http://wwwscirporg/journal/ijcns/) A New Multicast Waelength Assignment Algorithm

More information

5072 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 8, AUGUST 2011

5072 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 8, AUGUST 2011 5072 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 8, AUGUST 2011 Peer-to-Peer Streaming Capacity Sudipta Sengupta, Senior Member, IEEE, Shao Liu, Minghua Chen, Mung Chiang, Senior Member, IEEE,

More information

Multicast Network Coded Flow in Grid Graphs

Multicast Network Coded Flow in Grid Graphs Multicast Network Coded Flow in Grid Graphs John Gormley and Eric Manley Department of Mathematics and Computer Science Drake University Des Moines, IA 50311 March 9, 014 Abstract Network coding, a relatively

More information

CURRENT routing schemes typically focus on discovering

CURRENT routing schemes typically focus on discovering IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 413 Multipath Routing Algorithms for Congestion Minimization Ron Banner, Senior Member, IEEE, and Ariel Orda, Fellow, IEEE Abstract Unlike

More information

Minimum Cost Edge Disjoint Paths

Minimum Cost Edge Disjoint Paths Minimum Cost Edge Disjoint Paths Theodor Mader 15.4.2008 1 Introduction Finding paths in networks and graphs constitutes an area of theoretical computer science which has been highly researched during

More information

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department

More information

February 24, :52 World Scientific Book - 9in x 6in soltys alg. Chapter 3. Greedy Algorithms

February 24, :52 World Scientific Book - 9in x 6in soltys alg. Chapter 3. Greedy Algorithms Chapter 3 Greedy Algorithms Greedy algorithms are algorithms prone to instant gratification. Without looking too far ahead, at each step they make a locally optimum choice, with the hope that it will lead

More information

13 Sensor networks Gathering in an adversarial environment

13 Sensor networks Gathering in an adversarial environment 13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,

More information

Network Design for QoS under IEEE ( Zigbee ) CSMA/CA for Internet of Things Applications

Network Design for QoS under IEEE ( Zigbee ) CSMA/CA for Internet of Things Applications Network Design for QoS under IEEE 802.15.4 ( Zigbee ) CSMA/CA for Internet of Things Applications EECS Symposium Abhijit Bhattacharya Advisor: Prof. Anurag Kumar Dept. of ECE, IISc, Bangalore April 28,

More information

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point International Journal of Computational Engineering Research Vol, 03 Issue5 Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point Shalu Singh

More information

Lecture 3: Totally Unimodularity and Network Flows

Lecture 3: Totally Unimodularity and Network Flows Lecture 3: Totally Unimodularity and Network Flows (3 units) Outline Properties of Easy Problems Totally Unimodular Matrix Minimum Cost Network Flows Dijkstra Algorithm for Shortest Path Problem Ford-Fulkerson

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E-mail: sjkoh@pec.etri.re.kr Abstract In this paper, we propose a simple practical

More information

A comparison of two optimal approaches for the MCOP problem

A comparison of two optimal approaches for the MCOP problem A comparison of two optimal approaches for the MCOP problem Foucia PM Geelani, PG Scholar, Master of Computer Application, Francis Xavier Engineering College, Vannarpettai. D.Louisa Mary MCA.,M.Phil.,M.Tech.,

More information

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks 336 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks Vincent W. S. Wong, Member, IEEE, Mark E. Lewis,

More information

AN EVOLUTIONARY APPROACH TO DISTANCE VECTOR ROUTING

AN EVOLUTIONARY APPROACH TO DISTANCE VECTOR ROUTING International Journal of Latest Research in Science and Technology Volume 3, Issue 3: Page No. 201-205, May-June 2014 http://www.mnkjournals.com/ijlrst.htm ISSN (Online):2278-5299 AN EVOLUTIONARY APPROACH

More information

Data Migration on Parallel Disks

Data Migration on Parallel Disks Data Migration on Parallel Disks Leana Golubchik 1, Samir Khuller 2, Yoo-Ah Kim 2, Svetlana Shargorodskaya, and Yung-Chun (Justin) Wan 2 1 CS and EE-Systems Departments, IMSC, and ISI, University of Southern

More information

HEURISTIC ALGORITHMS FOR THE GENERALIZED MINIMUM SPANNING TREE PROBLEM

HEURISTIC ALGORITHMS FOR THE GENERALIZED MINIMUM SPANNING TREE PROBLEM Proceedings of the International Conference on Theory and Applications of Mathematics and Informatics - ICTAMI 24, Thessaloniki, Greece HEURISTIC ALGORITHMS FOR THE GENERALIZED MINIMUM SPANNING TREE PROBLEM

More information

Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks

Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks Quan Chen, Hong Gao, Yingshu Li, Siyao Cheng, and Jianzhong Li Harbin Institute of Technology, China Quan Chen@ Harbin Institute

More information

Greedy Algorithms. At each step in the algorithm, one of several choices can be made.

Greedy Algorithms. At each step in the algorithm, one of several choices can be made. Greedy Algorithms At each step in the algorithm, one of several choices can be made. Greedy Strategy: make the choice that is the best at the moment. After making a choice, we are left with one subproblem

More information

A Distributed Algorithm for Delay-Constrained Unicast Routing

A Distributed Algorithm for Delay-Constrained Unicast Routing A Distributed Algorithm for Delay-Constrained Unicast Routing H.F. Salama D.S. Reeves Y. Viniotis Center for Advanced Computing and Communication North Carolina State University Box 79, Raleigh, NC 27695

More information

Introduction to Internet Routing

Introduction to Internet Routing Introduction to Internet Routing (RCSE) Lecture Based on Slides by Prof. Dr. Günter Schäfer Page Topics of Special course on planning aspects in communication networks Prior attendance of courses Telematics

More information

Some Approximation Algorithms for Constructing Combinatorial Structures Fixed in Networks

Some Approximation Algorithms for Constructing Combinatorial Structures Fixed in Networks Some Approximation Algorithms for Constructing Combinatorial Structures Fixed in Networks Jianping Li Email: jianping@ynu.edu.cn Department of Mathematics Yunnan University, P.R. China 11 / 31 8 ¹ 1 3

More information

A Novel Performance-Driven Topology Design Algorithm

A Novel Performance-Driven Topology Design Algorithm A Novel Performance-Driven Topology Design Algorithm Min Pan, Chris Chu Priyadarshan Patra Electrical and Computer Engineering Dept. Intel Corporation Iowa State University, Ames, IA 50011 Hillsboro, OR

More information

1 The Traveling Salesperson Problem (TSP)

1 The Traveling Salesperson Problem (TSP) CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures 3 Definitions an undirected graph G = (V, E) is a

More information

William Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing

William Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing William Stallings Data and Computer Communications 7 th Edition Chapter 12 Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route

More information

Alternate Routing Diagram

Alternate Routing Diagram 68 0 Computer Networks Chapter Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone switches

More information

Robust time-varying shortest path with arbitrary waiting time at vertices

Robust time-varying shortest path with arbitrary waiting time at vertices Croatian Operational Research Review 525 CRORR 8(2017), 525 56 Robust time-varying shortest path with arbitrary waiting time at vertices Gholamhassan Shirdel 1, and Hassan Rezapour 1 1 Department of Mathematics,

More information

CSE331 Introduction to Algorithms Lecture 15 Minimum Spanning Trees

CSE331 Introduction to Algorithms Lecture 15 Minimum Spanning Trees CSE1 Introduction to Algorithms Lecture 1 Minimum Spanning Trees Antoine Vigneron antoine@unist.ac.kr Ulsan National Institute of Science and Technology July 11, 201 Antoine Vigneron (UNIST) CSE1 Lecture

More information

A note on distributed multicast routing in point-to-point networks

A note on distributed multicast routing in point-to-point networks Computers & Operations Research 28 (2001) 1149}1164 A note on distributed multicast routing in point-to-point networks Roman Novak*, Jozye Rugelj, Gorazd Kandus Department of Digital Communications and

More information

GA-Based Heuristic Algorithms for Bandwidth- Delay-Constrained Least-Cost Multicast Routing

GA-Based Heuristic Algorithms for Bandwidth- Delay-Constrained Least-Cost Multicast Routing GA-Based Heuristic Algorithms for Bandwidth- Delay-Constrained Least-Cost Multicast Routing A. T. Haghighat 1, K. Faez 2, M. Dehghan 3,4, A. Mowlaei 2, Y. Ghahremani 2 1 Atomic Energy Organization of Iran

More information

LEAST COST ROUTING ALGORITHM WITH THE STATE SPACE RELAXATION IN A CENTRALIZED NETWORK

LEAST COST ROUTING ALGORITHM WITH THE STATE SPACE RELAXATION IN A CENTRALIZED NETWORK VOL., NO., JUNE 08 ISSN 896608 00608 Asian Research Publishing Network (ARPN). All rights reserved. LEAST COST ROUTING ALGORITHM WITH THE STATE SPACE RELAXATION IN A CENTRALIZED NETWORK Y. J. Lee Department

More information

Light-tree routing under optical power budget constraints

Light-tree routing under optical power budget constraints Light-tree routing under optical power budget constraints Yufeng Xin MCNC-RDI, RTP, 3021 Cornwallis Road, Research Triangle Park, North Carolina 27709-3910 yxin@anrmcncorg George N Rouskas Department of

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

A Genetic Approach for Solving Minimum Routing Cost Spanning Tree Problem

A Genetic Approach for Solving Minimum Routing Cost Spanning Tree Problem A Genetic Approach for Solving Minimum Routing Cost Spanning Tree Problem Quoc Phan Tan Abstract Minimum Routing Cost Spanning Tree (MRCT) is one of spanning tree optimization problems having several applications

More information

Learning Objectives. c D. Poole and A. Mackworth 2010 Artificial Intelligence, Lecture 3.3, Page 1

Learning Objectives. c D. Poole and A. Mackworth 2010 Artificial Intelligence, Lecture 3.3, Page 1 Learning Objectives At the end of the class you should be able to: devise an useful heuristic function for a problem demonstrate how best-first and A search will work on a graph predict the space and time

More information