Load Balanced Short Path Routing in Wireless Networks Jie Gao, Stanford University Li Zhang, Hewlett-Packard Labs
|
|
- Elmer Fisher
- 5 years ago
- Views:
Transcription
1 Load Balanced Short Path Routing in Wireless Networks Jie Gao, Stanford University Li Zhang, Hewlett-Packard Labs Aravind Ranganathan University of Cincinnati February 22, 2007
2 Motivation Routing in wireless networks - ad-hoc, sensor, mesh networks Multi-hop communication Energy constrained nodes Shortest Path Routing Minimizes Latency Energy needed to transmit a packet depends on path length Good for overall energy efficiency Heavily loads nodes on the shortest path Holes, disconnections in the network Ideally, minimize both - latency and the maximum load
3 Motivation Routing in wireless networks - ad-hoc, sensor, mesh networks Multi-hop communication Energy constrained nodes Shortest Path Routing Minimizes Latency Energy needed to transmit a packet depends on path length Good for overall energy efficiency Heavily loads nodes on the shortest path Holes, disconnections in the network Ideally, minimize both - latency and the maximum load
4 Motivation Routing in wireless networks - ad-hoc, sensor, mesh networks Multi-hop communication Energy constrained nodes Shortest Path Routing Minimizes Latency Energy needed to transmit a packet depends on path length Good for overall energy efficiency Heavily loads nodes on the shortest path Holes, disconnections in the network Ideally, minimize both - latency and the maximum load
5 Motivation Routing in wireless networks - ad-hoc, sensor, mesh networks Multi-hop communication Energy constrained nodes Shortest Path Routing Minimizes Latency Energy needed to transmit a packet depends on path length Good for overall energy efficiency Heavily loads nodes on the shortest path Holes, disconnections in the network Ideally, minimize both - latency and the maximum load
6 Short Path Routing v.s. Load Balanced Routing Short Path Routing and Load Balanced Routing are contradictory to each other Example: Any short path from p to q has to pass o.
7 Contributions Contributions: Routing algorithm in a narrow strip of width utmost 3/2 Near optimum: stretch factor: 4, load balancing ratio: 3 Distributed and local Why narrow strip? Practical model for vehicles on highway, people on street Solvable!! Outline Load balanced routing on a line Load balanced routing on a narrow strip
8 Contributions Contributions: Routing algorithm in a narrow strip of width utmost 3/2 Near optimum: stretch factor: 4, load balancing ratio: 3 Distributed and local Why narrow strip? Practical model for vehicles on highway, people on street Solvable!! Outline Load balanced routing on a line Load balanced routing on a narrow strip
9 Contributions Contributions: Routing algorithm in a narrow strip of width utmost 3/2 Near optimum: stretch factor: 4, load balancing ratio: 3 Distributed and local Why narrow strip? Practical model for vehicles on highway, people on street Solvable!! Outline Load balanced routing on a line Load balanced routing on a narrow strip
10 Stretch Factor Unit disk graph U(S) = (S, E) Length of a path P = number of hops = P Shortest path between p and q is d(p, q), where, p, q S Stretch factor: s(p) = P /d(p, q) If s(p) α, then P is called α-short Routing request, r = (s, t, l r ) = (source, dest, pkt size) Path P r routes the request r between s and t Set of requests R, if π = {P r r R}, Path set π satisfies R s(π) = maximum stretch factor of paths in π π is called α-short if, every path in P is α-short.
11 Stretch Factor Unit disk graph U(S) = (S, E) Length of a path P = number of hops = P Shortest path between p and q is d(p, q), where, p, q S Stretch factor: s(p) = P /d(p, q) If s(p) α, then P is called α-short Routing request, r = (s, t, l r ) = (source, dest, pkt size) Path P r routes the request r between s and t Set of requests R, if π = {P r r R}, Path set π satisfies R s(π) = maximum stretch factor of paths in π π is called α-short if, every path in P is α-short.
12 Stretch Factor Unit disk graph U(S) = (S, E) Length of a path P = number of hops = P Shortest path between p and q is d(p, q), where, p, q S Stretch factor: s(p) = P /d(p, q) If s(p) α, then P is called α-short Routing request, r = (s, t, l r ) = (source, dest, pkt size) Path P r routes the request r between s and t Set of requests R, if π = {P r r R}, Path set π satisfies R s(π) = maximum stretch factor of paths in π π is called α-short if, every path in P is α-short.
13 Load Balancing Ratio For set of requests R satisfied by π, load on vertex v l(v) = r v P r l r Maximum load: l(π) = max v S l(v) Load of optimal balanced routing: l (R) = min π l(π) Load balancing ratio = l(π)/l (R) Algorithm is β-balanced, if load balancing ratio is utmost β Goal is to design wireless routing algorithms with: Small stretch factor, Small load-balancing ratio
14 Load Balancing Ratio For set of requests R satisfied by π, load on vertex v l(v) = r v P r l r Maximum load: l(π) = max v S l(v) Load of optimal balanced routing: l (R) = min π l(π) Load balancing ratio = l(π)/l (R) Algorithm is β-balanced, if load balancing ratio is utmost β Goal is to design wireless routing algorithms with: Small stretch factor, Small load-balancing ratio
15 Load Balancing Ratio For set of requests R satisfied by π, load on vertex v l(v) = r v P r l r Maximum load: l(π) = max v S l(v) Load of optimal balanced routing: l (R) = min π l(π) Load balancing ratio = l(π)/l (R) Algorithm is β-balanced, if load balancing ratio is utmost β Goal is to design wireless routing algorithms with: Small stretch factor, Small load-balancing ratio
16 Load balanced Routing on a line Consider simple case when Nodes are placed on a line Direction of routing known Case 1: All requests have unit packet size 2-short, 2-balanced algorithm Case 2: Requests have variable packet size Previous algorithm fails 2-short, 3-balanced algorithm Problem is still NP-Hard
17 Hardness of the problem Packets: x i y i of size l i Each node chooses either z 1 or z 2 to relay the packet Optimal load balancing achieved when packets distributed evenly over z 1, z 2 NP-hard: Variant of Subset Sum Problem In a given set of integers, does any subset sum to exactly half of the total sum?
18 Minimizing both Stretch Factor and LB Ratio Packets: x i y i Shortest path passes node z But, can evenly divide packets (as shown) Impossible to minimize both the stretch factor and LB ratio.
19 Requests with unit packet size - GREEDY1 Nodes on a line, x p is the coordinate of node p Communication range (visibility) of node p: V (p) = [x p 1, x p +1], V l (p) = [x p 1, x p ), V r (p) = (x p, x p +1] A route request r adds 1 to load l(v), v P r GREEDY1: Loads for node p: l(p), l l (p), l r (p) If destination reachable from p, forward to destination Else, forward to node j, farthest in V r (p), such that l(j) < l r (p)
20 Requests with unit packet size - GREEDY1 Nodes on a line, x p is the coordinate of node p Communication range (visibility) of node p: V (p) = [x p 1, x p +1], V l (p) = [x p 1, x p ), V r (p) = (x p, x p +1] A route request r adds 1 to load l(v), v P r GREEDY1: Loads for node p: l(p), l l (p), l r (p) If destination reachable from p, forward to destination Else, forward to node j, farthest in V r (p), such that l(j) < l r (p)
21 Requests with unit packet size - GREEDY1 GREEDY1: Send the packet to the furthest node in the communication range whose load is NOT the maximum. Claim: For 4 adjacent nodes a, b, c, d along the routing path, d is not visible to a. Since, l(c) < l(d) l r (a), node a must forward to node c
22 Requests with unit packet size - GREEDY2 GREEDY2: Add one look-ahead to GREEDY1 a finds next hop b by GREEDY1, asks b to find next hop c If c is visible to a, it shortcuts b. Else, sends to b GREEDY2 is 2-short Any non-adjacent nodes a and b are not visible to each other Any unit interval has at least one node in shortest path routing, utmost two nodes in GREEDY2
23 Requests with unit packet size - GREEDY2 GREEDY2: Add one look-ahead to GREEDY1 a finds next hop b by GREEDY1, asks b to find next hop c If c is visible to a, it shortcuts b. Else, sends to b GREEDY2 is 2-short Any non-adjacent nodes a and b are not visible to each other Any unit interval has at least one node in shortest path routing, utmost two nodes in GREEDY2
24 Requests with unit packet size - GREEDY2 GREEDY2 is 2-balanced Suppose after k sends packet to i, i has the max load l(i) = l(π) = l(greedy 2) The immediate right neighbor j of i is NOT visible to k All m nodes in V l (j) of j, except i, has load exactly l(i) 1. Total load in V l (j) = (m 1)(l(i) 1) + l(i) GREEDY2 uses utmost 2 nodes in V l (j) No. requests through V l (j) (m.l(i) m + 1)/2 l(opt ) (ml(i) m + 1)/(2m) l(greedy 2) 2l(OPT ) + 1
25 Requests with variable packet size GREEDY2 cannot guarantee good load balancing ratio 3n nodes distributed on a line n requests: First request is r n = (x n, z n, 1),, Next n 1 requests are r i = (x i, z i, 2), i = 1... n 1 Optimum load balanced routing algorithm routes r i though y i, maximum load = 2 GREEDY2 routes requests alternatively on y n and y n 1 Maximum load by GREEDY2 is (n 1)/2 x2 + 1 Load balancing ratio of GREEDY2 in this case is Ω(n)
26 Requests with variable packet size GREEDY2 cannot guarantee good load balancing ratio 3n nodes distributed on a line n requests: First request is r n = (x n, z n, 1),, Next n 1 requests are r i = (x i, z i, 2), i = 1... n 1 Optimum load balanced routing algorithm routes r i though y i, maximum load = 2 GREEDY2 routes requests alternatively on y n and y n 1 Maximum load by GREEDY2 is (n 1)/2 x2 + 1 Load balancing ratio of GREEDY2 in this case is Ω(n)
27 Requests with variable packet size - GREEDY3 For each d S, a pair of nodes b, c form a bridge over d if: b V l (d), c V r (d), b and c are visible to each other The load of a bridge L(bc) is defined as max(l(b), l(c)) GREEDY3: If destination is not reachable by a, it asks furthest node d Uses the lightest bridge φ(d) = bc to route the request Node c makes the next routing decision Add look-ahead to shortcut the path if two non-adjacent nodes can see each other in the path
28 Requests with variable packet size - GREEDY3 For each d S, a pair of nodes b, c form a bridge over d if: b V l (d), c V r (d), b and c are visible to each other The load of a bridge L(bc) is defined as max(l(b), l(c)) GREEDY3: If destination is not reachable by a, it asks furthest node d Uses the lightest bridge φ(d) = bc to route the request Node c makes the next routing decision Add look-ahead to shortcut the path if two non-adjacent nodes can see each other in the path
29 GREEDY3 - Stretch Factor Stretch factor of GREEDY3 is 2 Clearly, a cannot see the node c For any four adjacent nodes x, y, z, w on the path produced by GREEDY3: x and w are separated by a bridge Because of look ahead, any two non-adjacent nodes on the path, must be at least distance one apart Hence, stretch factor of 2
30 GREEDY3 - LB Ratio GREEDY3 is 3-balanced, i.e., l(π) 3l (R) (Proof by Induction) Let l(π i 1 ) 3OPT i 1. Show l(π i ) 3OPT i by contradiction Let i th packet (size l i ), through bridge bc over d, violate condition. L(bc) > 3OPT i l i Note: A node u is heavy if its load is the load of a bridge uv Total load on m heavy nodes in V (d) m.l(bc) GREEDY3 uses utmost 2 heavy nodes Size of requests through d m.l(bc)/2 OPT i algorithm uses at least 1 heavy node distributes m.l(bc)/2 over m nodes OPT i 1 L(bc) 2 OPT i 1 L(bc) 2 > (3OPT i l i ) 2 > OPT i, contradiction.
31 Load balanced Routing on a narrow strip Inside narrow strip with width 3/2, there is a rough linear order of the nodes For any three nodes u, v, w from left to right, if u, w are visible, then one of them is visible to v So, routing direction is obvious Question: to achieve load balancing, which node to route to?
32 Load balanced Routing on a narrow strip - GREEDY4 GREEDY4: p routes through the lightest bridge bc GREEDY4 guarantees delivery - cannot be stuck at p GREEDY4 has a stretch factor of 4 and load balancing factor of 3
33 Routing in a wide strip For routing in a strip with width more than 3/2, any routing algorithm with only local information does NOT have bounded load balancing ratio. With only local information, s doesnt know which one of P 1, P 2 is more heavily loaded.
34 Simulation under random traffic 1000 random nodes in [0, 100], communication radius: 5 Maximum load in GREEDY3 v.s. Shortest path routing 5
35 Simulation under random traffic 1000 random nodes in [0, 100], communication radius: [1, 10] Worst and average stretch factors of GREEDY3 Little sacrifice on the stretch factor, huge gain on load balancing
36 Limited energy, random traffic 1000 random nodes in [0, 100], energy per node: [0, 90]. Number of packets delivered in GREEDY3 v.s. Shortest path routing, before the first node dies.
37 References Load Balanced Short Path Routing in Wireless Networks Jie Gao and Li Zhang IEEE Transactions on Parallel and Distributed Systems, Special Issue on Localized Communication, vol. 17, no. 4, , April, 2006.
Geometric Routing: Of Theory and Practice
Geometric Routing: Of Theory and Practice PODC 03 F. Kuhn, R. Wattenhofer, Y. Zhang, A. Zollinger [KWZ 02] [KWZ 03] [KK 00] Asymptotically Optimal Geometric Mobile Ad-Hoc Routing Worst-Case Optimal and
More information1 The Traveling Salesperson Problem (TSP)
CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation
More informationSimulations of the quadrilateral-based localization
Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution
More informationTraveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost
Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R
More informationChapter 8 DOMINATING SETS
Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationChapter 8 DOMINATING SETS
Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationTopology Control in Wireless Networks 4/24/06
Topology Control in Wireless Networks 4/4/06 1 Topology control Choose the transmission power of the nodes so as to satisfy some properties Connectivity Minimize power consumption, etc. Last class Percolation:
More informationAlgorithms, Spring 2014, CSE, OSU Greedy algorithms II. Instructor: Anastasios Sidiropoulos
6331 - Algorithms, Spring 2014, CSE, OSU Greedy algorithms II Instructor: Anastasios Sidiropoulos Greedy algorithms Fast Easy to implement At every step, the algorithm makes a choice that seems locally
More informationLecture 7: Asymmetric K-Center
Advanced Approximation Algorithms (CMU 18-854B, Spring 008) Lecture 7: Asymmetric K-Center February 5, 007 Lecturer: Anupam Gupta Scribe: Jeremiah Blocki In this lecture, we will consider the K-center
More information/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang
600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 9.1 Linear Programming Suppose we are trying to approximate a minimization
More informationAn Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks
An Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks Peng Zeng Cuanzhi Zang Haibin Yu Shenyang Institute of Automation Chinese Academy of Sciences Target Tracking
More informationSolutions for the Exam 6 January 2014
Mastermath and LNMB Course: Discrete Optimization Solutions for the Exam 6 January 2014 Utrecht University, Educatorium, 13:30 16:30 The examination lasts 3 hours. Grading will be done before January 20,
More informationApproximation Algorithms
Approximation Algorithms Given an NP-hard problem, what should be done? Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one of three desired features. Solve problem to optimality.
More informationCommunication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1
Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a
More informationGraph Theory and Optimization Approximation Algorithms
Graph Theory and Optimization Approximation Algorithms Nicolas Nisse Université Côte d Azur, Inria, CNRS, I3S, France October 2018 Thank you to F. Giroire for some of the slides N. Nisse Graph Theory and
More informationOptimal tour along pubs in the UK
1 From Facebook Optimal tour along 24727 pubs in the UK Road distance (by google maps) see also http://www.math.uwaterloo.ca/tsp/pubs/index.html (part of TSP homepage http://www.math.uwaterloo.ca/tsp/
More informationLinear Programming in Small Dimensions
Linear Programming in Small Dimensions Lekcija 7 sergio.cabello@fmf.uni-lj.si FMF Univerza v Ljubljani Edited from slides by Antoine Vigneron Outline linear programming, motivation and definition one dimensional
More informationCS 372: Computational Geometry Lecture 10 Linear Programming in Fixed Dimension
CS 372: Computational Geometry Lecture 10 Linear Programming in Fixed Dimension Antoine Vigneron King Abdullah University of Science and Technology November 7, 2012 Antoine Vigneron (KAUST) CS 372 Lecture
More informationGeometric Spanners for Routing in Mobile Networks
1 Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas J Guibas, John Hershberger, Li Zhang, An Zhu Abstract We propose a new routing graph, the Restricted Delaunay Graph (RDG), for mobile
More informationExample of a Demonstration that a Problem is NP-Complete by reduction from CNF-SAT
20170926 CNF-SAT: CNF-SAT is a problem in NP, defined as follows: Let E be a Boolean expression with m clauses and n literals (literals = variables, possibly negated), in which - each clause contains only
More informationProblem Set 2 Solutions
Problem Set 2 Solutions Graph Theory 2016 EPFL Frank de Zeeuw & Claudiu Valculescu 1. Prove that the following statements about a graph G are equivalent. - G is a tree; - G is minimally connected (it is
More information11. APPROXIMATION ALGORITHMS
11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005
More informationHeterogeneous Community-based Routing in Opportunistic Mobile Social Networks
Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Yunsheng Wang Kettering University Jie Wu Temple University Mingjun Xiao University of Science and Tech. of China Daqiang Zhang
More informationFall CS598CC: Approximation Algorithms. Chandra Chekuri
Fall 2006 CS598CC: Approximation Algorithms Chandra Chekuri Administrivia http://www.cs.uiuc.edu/homes/chekuri/teaching/fall2006/approx.htm Grading: 4 home works (60-70%), 1 take home final (30-40%) Mailing
More informationUsing Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions
Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College
More informationDO NOT RE-DISTRIBUTE THIS SOLUTION FILE
Professor Kindred Math 104, Graph Theory Homework 2 Solutions February 7, 2013 Introduction to Graph Theory, West Section 1.2: 26, 38, 42 Section 1.3: 14, 18 Section 2.1: 26, 29, 30 DO NOT RE-DISTRIBUTE
More informationChapter 6 DOMINATING SETS
Chapter 6 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2003 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking
More informationApproximation Basics
Milestones, Concepts, and Examples Xiaofeng Gao Department of Computer Science and Engineering Shanghai Jiao Tong University, P.R.China Spring 2015 Spring, 2015 Xiaofeng Gao 1/53 Outline History NP Optimization
More informationCS612 Algorithms for Electronic Design Automation
CS612 Algorithms for Electronic Design Automation Lecture 8 Network Flow Based Modeling 1 Flow Network Definition Given a directed graph G = (V, E): Each edge (u, v) has capacity c(u,v) 0 Each edge (u,
More informationThe Capacity of Wireless Networks
The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of
More informationCompact and Low Delay Routing Labeling Scheme for Unit Disk. Graphs
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang and Feodor F. Dragan Algorithmic Research Laboratory, Department of Computer Science Kent State University, Kent,
More informationNear Optimal Broadcast with Network Coding in Large Sensor Networks
in Large Sensor Networks Cédric Adjih, Song Yean Cho, Philippe Jacquet INRIA/École Polytechnique - Hipercom Team 1 st Intl. Workshop on Information Theory for Sensor Networks (WITS 07) - Santa Fe - USA
More informationNP-Hard (A) (B) (C) (D) 3 n 2 n TSP-Min any Instance V, E Question: Hamiltonian Cycle TSP V, n 22 n E u, v V H
Hard Problems What do you do when your problem is NP-Hard? Give up? (A) Solve a special case! (B) Find the hidden parameter! (Fixed parameter tractable problems) (C) Find an approximate solution. (D) Find
More informationGeographical routing 1
Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes
More informationThe k-center problem Approximation Algorithms 2009 Petros Potikas
Approximation Algorithms 2009 Petros Potikas 1 Definition: Let G=(V,E) be a complete undirected graph with edge costs satisfying the triangle inequality and k be an integer, 0 < k V. For any S V and vertex
More informationDesign and Analysis of Algorithms
CSE 101, Winter 018 D/Q Greed SP s DP LP, Flow B&B, Backtrack Metaheuristics P, NP Design and Analysis of Algorithms Lecture 8: Greed Class URL: http://vlsicad.ucsd.edu/courses/cse101-w18/ Optimization
More informationDirect Routing: Algorithms and Complexity
Direct Routing: Algorithms and Complexity Costas Busch, RPI Malik Magdon-Ismail, RPI Marios Mavronicolas, Univ. Cyprus Paul Spirakis, Univ. Patras 1 Outline 1. Direct Routing. 2. Direct Routing is Hard.
More informationData-Centric Query in Sensor Networks
Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed
More informationGenetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks
Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Jing He, Shouling Ji, Mingyuan Yan, Yi Pan, and Yingshu Li Department of Computer Science Georgia State University,
More informationCOMP Analysis of Algorithms & Data Structures
COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Approximation Algorithms CLRS 35.1-35.5 University of Manitoba COMP 3170 - Analysis of Algorithms & Data Structures 1 / 30 Approaching
More informationOn Covering a Graph Optimally with Induced Subgraphs
On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number
More informationApproximation Algorithms
Chapter 8 Approximation Algorithms Algorithm Theory WS 2016/17 Fabian Kuhn Approximation Algorithms Optimization appears everywhere in computer science We have seen many examples, e.g.: scheduling jobs
More information[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations
Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer
More informationAN AD HOC network consists of a collection of mobile
174 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 1, JANUARY 2005 Geometric Spanners for Routing in Mobile Networks Jie Gao, Member, IEEE, Leonidas J. Guibas, John Hershberger, Li Zhang,
More informationCSE 417 Network Flows (pt 4) Min Cost Flows
CSE 417 Network Flows (pt 4) Min Cost Flows Reminders > HW6 is due Monday Review of last three lectures > Defined the maximum flow problem find the feasible flow of maximum value flow is feasible if it
More informationTheory of Computing. Lecture 10 MAS 714 Hartmut Klauck
Theory of Computing Lecture 10 MAS 714 Hartmut Klauck Seven Bridges of Königsberg Can one take a walk that crosses each bridge exactly once? Seven Bridges of Königsberg Model as a graph Is there a path
More informationLoad Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department RPI Mobile Wireless Networks Wireless nodes
More informationMathematical and Algorithmic Foundations Linear Programming and Matchings
Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis
More informationGiven a graph, find an embedding s.t. greedy routing works
Given a graph, find an embedding s.t. greedy routing works Greedy embedding of a graph 99 Greedy embedding Given a graph G, find an embedding of the vertices in R d, s.t. for each pair of nodes s, t, there
More informationCombinatorial Optimization - Lecture 14 - TSP EPFL
Combinatorial Optimization - Lecture 14 - TSP EPFL 2012 Plan Simple heuristics Alternative approaches Best heuristics: local search Lower bounds from LP Moats Simple Heuristics Nearest Neighbor (NN) Greedy
More informationBasic Approximation algorithms
Approximation slides Basic Approximation algorithms Guy Kortsarz Approximation slides 2 A ρ approximation algorithm for problems that we can not solve exactly Given an NP-hard question finding the optimum
More informationTheorem 2.9: nearest addition algorithm
There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More information1. Lecture notes on bipartite matching February 4th,
1. Lecture notes on bipartite matching February 4th, 2015 6 1.1.1 Hall s Theorem Hall s theorem gives a necessary and sufficient condition for a bipartite graph to have a matching which saturates (or matches)
More informationUsing Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks. Wang Wei Vikram Srinivasan Chua Kee-Chaing
Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wang Wei Vikram Srinivasan Chua Kee-Chaing Overview The motivation of mobile relay The performance analysis for mobile relay in the
More informationCopyright 2000, Kevin Wayne 1
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationSingle Source Shortest Path
Single Source Shortest Path A directed graph G = (V, E) and a pair of nodes s, d is given. The edges have a real-valued weight W i. This time we are looking for the weight and the shortest path from s
More informationOblivious Routing on Geometric Networks
Oblivious Routing on Geometric Networks Costas Busch, Malik Magdon-Ismail and Jing Xi {buschc,magdon,xij2}@cs.rpi.edu July 20, 2005. Outline Oblivious Routing: Background and Our Contribution The Algorithm:
More informationDirect Routing: Algorithms and Complexity
Direct Routing: Algorithms and Complexity Costas Busch Malik Magdon-Ismail Marios Mavronicolas Paul Spirakis December 13, 2004 Abstract Direct routing is the special case of bufferless routing where N
More informationThe complement of PATH is in NL
340 The complement of PATH is in NL Let c be the number of nodes in graph G that are reachable from s We assume that c is provided as an input to M Given G, s, t, and c the machine M operates as follows:
More informationCS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018
CS 580: Algorithm Design and Analysis Jeremiah Blocki Purdue University Spring 2018 Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved.
More informationGreedy algorithms is another useful way for solving optimization problems.
Greedy Algorithms Greedy algorithms is another useful way for solving optimization problems. Optimization Problems For the given input, we are seeking solutions that must satisfy certain conditions. These
More informationCOL351: Analysis and Design of Algorithms (CSE, IITD, Semester-I ) Name: Entry number:
Name: Entry number: There are 6 questions for a total of 75 points. 1. Consider functions f(n) = 10n2 n + 3 n and g(n) = n3 n. Answer the following: (a) ( 1 / 2 point) State true or false: f(n) is O(g(n)).
More informationCS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem
CS61: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem Tim Roughgarden February 5, 016 1 The Traveling Salesman Problem (TSP) In this lecture we study a famous computational problem,
More informationApproximation Algorithms
Approximation Algorithms Group Members: 1. Geng Xue (A0095628R) 2. Cai Jingli (A0095623B) 3. Xing Zhe (A0095644W) 4. Zhu Xiaolu (A0109657W) 5. Wang Zixiao (A0095670X) 6. Jiao Qing (A0095637R) 7. Zhang
More informationAnalysis of Link Reversal Routing Algorithms for Mobile Ad Hoc Networks
Analysis of Link Reversal Routing Algorithms for Mobile Ad Hoc Networks Seminar of Distributed Computing WS 04/05 ETH Zurich, 1.2.2005 Nicolas Born nborn@student.ethz.ch Paper Analysis of Link Reversal
More informationCSE 417 Branch & Bound (pt 4) Branch & Bound
CSE 417 Branch & Bound (pt 4) Branch & Bound Reminders > HW8 due today > HW9 will be posted tomorrow start early program will be slow, so debugging will be slow... Review of previous lectures > Complexity
More informationChallenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning
Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast
More informationIntroduction to Approximation Algorithms
Introduction to Approximation Algorithms Dr. Gautam K. Das Departmet of Mathematics Indian Institute of Technology Guwahati, India gkd@iitg.ernet.in February 19, 2016 Outline of the lecture Background
More informationBasic Combinatorics. Math 40210, Section 01 Fall Homework 4 Solutions
Basic Combinatorics Math 40210, Section 01 Fall 2012 Homework 4 Solutions 1.4.2 2: One possible implementation: Start with abcgfjiea From edge cd build, using previously unmarked edges: cdhlponminjkghc
More informationImplementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)
CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal
More informationarxiv: v3 [cs.dm] 12 Jun 2014
On Maximum Differential Coloring of Planar Graphs M. A. Bekos 1, M. Kaufmann 1, S. Kobourov, S. Veeramoni 1 Wilhelm-Schickard-Institut für Informatik - Universität Tübingen, Germany Department of Computer
More informationStanford University CS261: Optimization Handout 1 Luca Trevisan January 4, 2011
Stanford University CS261: Optimization Handout 1 Luca Trevisan January 4, 2011 Lecture 1 In which we describe what this course is about and give two simple examples of approximation algorithms 1 Overview
More informationApproximation Algorithms for Geometric Intersection Graphs
Approximation Algorithms for Geometric Intersection Graphs Subhas C. Nandy (nandysc@isical.ac.in) Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 700108, India. Outline
More informationNetwork Design for QoS under IEEE ( Zigbee ) CSMA/CA for Internet of Things Applications
Network Design for QoS under IEEE 802.15.4 ( Zigbee ) CSMA/CA for Internet of Things Applications EECS Symposium Abhijit Bhattacharya Advisor: Prof. Anurag Kumar Dept. of ECE, IISc, Bangalore April 28,
More informationModule 7. Independent sets, coverings. and matchings. Contents
Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................
More informationApproximation Algorithms
Approximation Algorithms Subhash Suri June 5, 2018 1 Figure of Merit: Performance Ratio Suppose we are working on an optimization problem in which each potential solution has a positive cost, and we want
More informationApproximation slides 1. An optimal polynomial algorithm for the Vertex Cover and matching in Bipartite graphs
Approximation slides 1 An optimal polynomial algorithm for the Vertex Cover and matching in Bipartite graphs Approximation slides 2 Linear independence A collection of row vectors {v T i } are independent
More informationThe External Network Problem
The External Network Problem Jan van den Heuvel and Matthew Johnson CDAM Research Report LSE-CDAM-2004-15 December 2004 Abstract The connectivity of a communications network can often be enhanced if the
More informationData Gathering Tours in Sensor Networks. Alexandra Meliou. B.S. (National Technical University of Athens) 2003
Data Gathering Tours in Sensor Networks by Alexandra Meliou B.S. (National Technical University of Athens) 2003 A thesis submitted in partial satisfaction of the requirements for the degree of Master of
More informationGreedy Homework Problems
CS 1510 Greedy Homework Problems 1. (2 points) Consider the following problem: INPUT: A set S = {(x i, y i ) 1 i n} of intervals over the real line. OUTPUT: A maximum cardinality subset S of S such that
More informationLandmark-based routing
Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer Science, 2004. Using
More informationAnalyze the obvious algorithm, 5 points Here is the most obvious algorithm for this problem: (LastLargerElement[A[1..n]:
CSE 101 Homework 1 Background (Order and Recurrence Relations), correctness proofs, time analysis, and speeding up algorithms with restructuring, preprocessing and data structures. Due Thursday, April
More informationGLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks. Stanford University. HP Labs
GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks Qing Fang Jie Gao Leonidas J. Guibas Vin de Silva Li Zhang Stanford University HP Labs Point-to-Point Routing in Sensornets Routing
More informationName: Lirong TAN 1. (15 pts) (a) Define what is a shortest s-t path in a weighted, connected graph G.
1. (15 pts) (a) Define what is a shortest s-t path in a weighted, connected graph G. A shortest s-t path is a path from vertex to vertex, whose sum of edge weights is minimized. (b) Give the pseudocode
More informationTreewidth and graph minors
Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under
More informationFractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University
Fractional Cascading in Wireless Sensor Networks Jie Gao Computer Science Department Stony Brook University 1 Sensor Networks Large number of small devices for environment monitoring 2 My recent work Lightweight,
More informationLecture and notes by: Sarah Fletcher and Michael Xu November 3rd, Multicommodity Flow
Multicommodity Flow 1 Introduction Suppose we have a company with a factory s and a warehouse t. The quantity of goods that they can ship from the factory to the warehouse in a given time period is limited
More informationEnergy aware geographic routing in wireless sensor networks with anchor nodes. Mircea Cretu Stancu Utrecht University Computing Science May 2013
Energy aware geographic routing in wireless sensor networks with anchor nodes Mircea Cretu Stancu Utrecht University Computing Science May 2013 Overview Introduction Current paradigm EAGR preliminaries
More informationPolynomial-Time Approximation Algorithms
6.854 Advanced Algorithms Lecture 20: 10/27/2006 Lecturer: David Karger Scribes: Matt Doherty, John Nham, Sergiy Sidenko, David Schultz Polynomial-Time Approximation Algorithms NP-hard problems are a vast
More informationSolving NP-hard Problems on Special Instances
Solving NP-hard Problems on Special Instances Solve it in poly- time I can t You can assume the input is xxxxx No Problem, here is a poly-time algorithm 1 Solving NP-hard Problems on Special Instances
More informationApproximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks
Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Thomas Erlebach Department of Computer Science University of Leicester, UK te17@mcs.le.ac.uk Ambreen Shahnaz Department of Computer
More informationExtended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication
Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication Jie Wu, Mihaela Cardei, Fei Dai, and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic
More informationOn the Minimum k-connectivity Repair in Wireless Sensor Networks
On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu
More informationNumber Theory and Graph Theory
1 Number Theory and Graph Theory Chapter 6 Basic concepts and definitions of graph theory By A. Satyanarayana Reddy Department of Mathematics Shiv Nadar University Uttar Pradesh, India E-mail: satya8118@gmail.com
More informationVoronoi Diagrams and Delaunay Triangulations. O Rourke, Chapter 5
Voronoi Diagrams and Delaunay Triangulations O Rourke, Chapter 5 Outline Preliminaries Properties and Applications Computing the Delaunay Triangulation Preliminaries Given a function f: R 2 R, the tangent
More informationApproximation Algorithms
Approximation Algorithms Subhash Suri November 27, 2017 1 Bin Packing Algorithms A classical problem, with long and interesting history. One of the early problems shown to be intractable. Lends to simple
More informationData Caching in Networks with Reading, Writing and Storage Costs
Data Caching in Networks with Reading, Writing and Storage Costs Bin Tang a, Himanshu Gupta b a Department of Electrical Engineering and Computer Science, Wichita State University, Wichita, KS 67260 b
More informationMidpoint Routing algorithms for Delaunay Triangulations
Midpoint Routing algorithms for Delaunay Triangulations Weisheng Si and Albert Y. Zomaya Centre for Distributed and High Performance Computing School of Information Technologies Prologue The practical
More information