CS 622 Distributed Networks

Size: px
Start display at page:

Download "CS 622 Distributed Networks"

Transcription

1 CS 622 Distributed Networks Access Network Design Dr. Xiaobo Zhou Department of Computer Science CS622 AccessNetwork.1 Review: Traffic Normalization Traffic Generators Uniform traffic Random traffic Realistic traffic (in relation with population and distance) Traffic Normalization Total normalization Row normalization Row & Column normalization Different applications have difference characteristics CS622 AccessNetwork.2

2 What is Access Network Backbone network Access network Backbone link Access link A Backbone network connects major sites Access networks connect small sites to the backbone network CS622 AccessNetwork.3 Access Network Design How to decide which sites should be in the backbone network? Traffic volume Close to multiple small sites Access network collect traffic from small sites into the high speed backbone network. Sharing high speed links, enjoy economic of scale benefit. Examples of local access networks Local subscriber loop connects users of a central office. Lottery network ATM network ISP s local access network. CS622 AccessNetwork.4

3 A Simple Access Design Example Consider a problem with 6 access locations and 1 backbone site N1 is the backbone site, the traffic is all from and to N1 Symmetric traffic CS622 AccessNetwork.5 The Cost Matrix for 56 Kbps links Linear Cost model: fixed cost = $400/month, and $3.00/km/month for the first 300km, and then a cost of $1.75/km/month after that Cost if distance-dependent. CS622 AccessNetwork.6

4 A Star Design Cost=$9650; Max. Utilization=23.2% CS622 AccessNetwork.7 A Cheaper Local-Access Design N2 serves as a concentrator for N6 and N7. Local link can use shorter less expensive link Cost $8666 CS622 AccessNetwork.8

5 A Even Cheaper Local-Access Design Two concentrators: N2 for N6 and N7; N4 for N3 Cost: $8158 CS622 AccessNetwork.9 Move to MST the cost is optimal Choose N7 as concentrator instead of N2 The design becomes an MST T2-1+T6-1+T7-1 = /56000=46.4% CS622 AccessNetwork.10

6 MSTs not always Optimal Access Designs The MST was the optimal, because the traffic volumes were moderate When the traffic grows 50%, the MST costs $10,616 and the links to concentrators N4 and N7, i.e, N1 - N4 and N1 - N7, must have two links to keep utilization below 50% CS622 AccessNetwork.11 An Optimal Design with Increased Traffic A Constraint MST Problem N3 connects directly to N1 since through N4 will violate the utilization constraint CS622 AccessNetwork.12

7 Frame Relay Design Frame Relay is a relatively new service Frame relay is accomplished by connecting each site into a frame relay cloud provided by the service carrier, just like plain old phone service is accomplished by attaching the phone into PSTN cloud. Packets exceed Committed Information Rate (CIR) will be discardable by having discard eligibility (DE) bit set Three classes of charges: access link costs, provider port costs (cost to frame relay), and CIR costs. It is volume dependent and not distance-bw-nodes dependent Port Charges CIR charges per PVC (permanent virtual circuits) CS622 AccessNetwork.13 Frame Relay Design Cost Model Each node is 20 km from the provider point of presence (POP) Access link cost is same for all 7 nodes: 7 * ( * 20) N3 PVC port POP POP PVC port: 56/64 kbps N2 Frame Relay Cloud PVC port N4 POP POP PVC port: 128 kbps Σi T i ->1 = 59 bps; 50% N1 CS622 AccessNetwork.14

8 Frame Relay vs. Lease-Line Cost Let x be the distance from the site to the center Fixed cost=$400/month; $3.00/km/month; Leased-line Cost Model 6 * * 3.00 * x Frame Relay Cost Model: Assume frame relay provider has point of presence (pop) at each site (20km away). Each site connects to the frame relay network N1 uses a 128 kbps link port (59 bps total traffic on way, 50%) Other nodes use 56kbps links - Port charges: 6 * = 2000 Access charges: 7 * ( * 20) = 7*460 = 3220 CIR charges: 4 * * 25 = 170, if 4 PVCs with 16kbps CIR and 2PVCs with 8kbps Frame relay cost: = $5390/mo Solve * x = 5390 x = km, Break even point Most WAN are larger than this Frame Relay is a good candidate CS622 AccessNetwork.15 Choosing Backbone Nodes If the division between large sites and small sites is distinct, there is usually no problem in deciding backbone nodes Definition 5.1: Given a set of sites Ni and traffic matrix T(i,j), weight(ni) = Σ j(t(i,j)+t(j,i)) Sometimes, the weights of nodes indicate the choices of backbone nodes or traffic centers. Design Principle 5.3 It is acceptable for small nodes to route their traffic via big nodes, but generally we do not want to route the traffic between big nodes via the small nodes In airline networks, there are four kind of nodes Hubs Cities with enough traffic to have nonstop flights to cities other than hubs Cities with enough traffic to have nonstop flights to their hubs Little cities CS622 AccessNetwork.16

9 3 Types of Local Access Problems 1. Access node s traffic are considerably smaller than the smallest link. But occasionally, they may need to download huge file Use frame relay or access tree capacitated spanning tree building problem 2. Access node s traffic is comparable to the capacity of the smallest link Choice 1: connect them directly to the hub/center Choice 2: put a concentrator between hub and those nodes Concentrator placement problem, local access tree problem 3. Access node s traffic can fill several low-speed access lines Choice 1: multiple links to multiple backbone nodes Choice: a high speed link to a backbone node - Multiple low-speed links give better reliability - The high-speed link gives better performance and lower cost CS622 AccessNetwork.17 One-speed One-Center Design and Capacitated Trees Example: 19 nodes to be connected to a hub, N14 (total 20 nodes) Requirement: 4 sites can share a line Symmetric traffic: to and from each node Ni to N14 is 1200 bps Capacity of the one-speed link: 9600 bps Link utilization limitation: < 50% The problem becomes a capacitated access tree building problem Solutions: SPT by Dijkstra s algorithm MST by Prim s algorithm Intermediate trees by Prim-Dijkstra with 0<α<1 Exhaustive search for an optimal tree Other new algorithms? CS622 AccessNetwork.18

10 SPT(Star) High cost: $26358 Max_uitlization is 12.5% (12000 / 56000) How about aggregate traffic of nodes and connect to the center? CS622 AccessNetwork.19 MST Cost: $18, sites from N12 4 parallel links CS622 AccessNetwork.20

11 Prim-Dijkstra with α=0.3 Lower cost: $15930 Potential improvements: N11 can go through N4; Two clusters with N18 and N9 as concentrators ( a double link -> 2 single links). A double D96 link CS622 AccessNetwork.21 How Many Trees to Search for Optimal Designs? Exhaustive search for an optimal design is usually infeasible. Cayley s Theorem: Given n nodes, there are n n-2 different spanning tree For 20 nodes, there are =2.621*10 23 trees. CS622 AccessNetwork.22

12 Constraint Minimum Spanning Tree Problem CMST problem: Given a central node N0 and a set of other nodes (N1,, Nn), a set of weights(w1,,wn) for each node, the capacity of a link, W, and a cost matrix Cost(i, j), find a set of trees T1,, Tk such that each Ni belongs to exactly one Tj and each Tj contains N0, and i T j w i, i> 0 min < W Trees l Links Cost ( end1, end2 ) l l CS622 AccessNetwork.23 A Greedy CMST Algorithm Sort the edges/links according to the cost take the lowest cost edge from sorted list; add it to the solution subtrees if the addition does not violated the constraint w < W; go to s1. Assume W=3, each node has wi = 1, and the following topology: i i T j, i> 0 T1 T2 CS622 AccessNetwork.24

13 Esau-William Algorithm Initially, each node starts off in a tree with itself Compute the tradeoff function: Tradeoff(Ni) = min j Cost(i, j) - Cost(Comp(N i ), Center) // attractive if 0 saving by linking Ni to Nj, rather than linking directly to Center (STAR) Cost(Comp(i),Center) is the cost of connecting the component with Node Ni to the Center. It is equivalent to the cost of the shortest path from the Center to any node in the component. Cost(i,j) is the link cost from Node Ni to Node Nj min j Cost(N i,n j ) suggests pick the closest neighboring Node Nj Maintain a sorted list of links based on the Tradeoff() value Tradeoff() is attractive if negative, smaller -> more attractive Actually, in each iteration, we only consider the shortest link out of a node to a neighbor that does not belong the component of the node L1: adds the top link (min Tradeoff) in the list to the solution if the weight constraint of the component is satisfied; otherwise, reject it update the tradeoffs in other links due to the newly added link and resort the list go to L1 CS622 AccessNetwork.25 Apply Esau-William Algorithm Assume W=3, each node has wi = 1, and the following topology: Tradeoff(1) = min j Cost(1, j) - Cost(Comp(1),Center) = Cost(1,3) - 7 //comp(1) contains Node 1 = 5 7 = -2 // pick closest neighbor, Node 3 Tradeoff(2,0) = 6-8 = -2 Tradeoff(3,1) = 5 11 = -6 Tradeoff(4,2) = 7 14 = -7 Tradeoff(5,3) = 8 17 = -9 Tradeoff(5) is lowest one Accept link(5,3) to the solution since weight constraint on component with nodes 5 and 3 are not violated. Σwi = w 5 + w 3 = 2 <= W=3 Effectively this picks the faraway node with short link to its neighbor and group them as component. CS622 AccessNetwork.26

14 Apply Esau-William Algorithm(2) Update the tradeoffs in other links due to the newly added link and resort the Tradeoff() list Tradeoff(5,4) = 9 11 = -2 // Next shortest link out of 5 is (5,4) // (Comp(5)=11,node 5 goes through node 3 to center) // 3 is already in the component, not considered Tradeoff(3,1) = 5 11 = -6 // not changed Tradeoff(1,3) = 5 7 = -2 Tradeoff(2,4) = 6 8 = -2 Tradeoff(4,2) = 7 14 = -7 Tradeoff(5,4) = 9 11 = -2 Pick Tradeoff(4,2) since it is smallest Accept link(4,2) since weight constraint on component with nodes 4 and 2 are not violated: Σwi = w 4 + w 2 = 2 <= W=3 CS622 AccessNetwork.27 Apply Esau-William Algorithm(3) Tradeoff(4,3) = 8 8 = 0 // Tradeoff(2,1)= -2 not changed Tradeoff(3,1) = 5 11 = -6, not changed Tradeoff(5,4) = 9 11 = -2 Tradeoff(1,3) = 5 7 = -2 Tradeoff(2,1) = 6-8 = -2 Tradeoff(4,3) = 8 8 = 0 Pick Tradeoff(3,1) Accept link (3,1) since weight constraint on component with nodes 1, 3 and 5 are not violated Σwi = w 1 + w 3 + w 5 = 3 <= W=3 CS622 AccessNetwork.28

15 Apply Esau-William Algorithm (4) and (5) Since nodes 5 and 3 now go through node 1 to the Center 0, Tradeoff(5,4) = 9 7 = 2 Tradeoff(3,4) = 8 7 = 1 Tradeoff(1,2) = 6 7 = -1 Tradeoff(2,1) = 6-8 = -2 Tradeoff(4,3) = 8-8 = 0 Tradeoff(2,1) is lowest but adding link(2,1) result a component with 5 nodes violate Σwi <= 3 Reject(2,1) recompute Tradeoff(2,0) = 8 8 = 0 Reject(1,2) due to the same reason Recompute Tradeoff(1,0) = 7 7 =0 Pick link(1,0) Pick link(2,0) completes the access network CS622 AccessNetwork.29 Creditability of Esau-Williams Algorithm The Esau-Williams Algorithm is heuristic, though works quite well Example: an Esau-Williams design with up to 7 sites per line CS622 AccessNetwork.30

16 Creditability of Esau-Williams Algorithm (Cont.) Given a set of sites N and a capacitated tree T, 1-exchange test: no cheaper link can be substituted for an existing link without violating the capacity constraints Example: for homogeneous traffic, up to 4 sites on a line For homogeneous traffic, the Esau-Williams does well on 1-change test CS622 AccessNetwork.31 Esau-Williams and InHomogenous Traffic One-speed link, but different sites have different traffic Link capacity is 9600 bps, 50% of sites have a requirement of 2400 bps, and the other 50% have a requirement of 4800 bps CS622 AccessNetwork.32

17 Line Crossing and Esau-Williams Are crossings an indication of a lack of creditability in capacitated trees? In tours, yes! CS622 AccessNetwork.33 Line Crossing in Access Designs: Sharma s Algorithm 1. Compute the angle θ s from each site S to the central site C. If S and C have the same coordinate, set θ s =0 2. Sort the angles θ s 3. Beginning at a site S first, create a set of nodes clockwise (or counterclockwise) from S first A set is complete when adding the next node would put Σ set w(site) > W. The next set starts with that node. 4. The design is completed by building a MST on each set with the addition of the central node C. Theorem 5.2 Sharma s algorithm builds CMSTs withour line crossings CS622 AccessNetwork.34

18 Sharma s Algorithm Result A better solution CS622 AccessNetwork.35 Creditability of Sharma Algorithm Much higher failure rate than Esau-Williams by 1-change test CS622 AccessNetwork.36

19 Sharma vs. Esau-Williams EW_Ratio = SharmaCost/EWCost; S_Ratio = 1/EW_Ratio CS622 AccessNetwork.37

There are two ways to establish VCs:

There are two ways to establish VCs: Virtual Circuits 1 Virtual Circuits The connection through a Frame Relay network between two DTEs is called a virtual circuit (VC). The circuits are virtual because there is no direct electrical connection

More information

Intranets and Virtual Private Networks (VPNs)

Intranets and Virtual Private Networks (VPNs) Intranets and Virtual Private Networks (VPNs) Definition Private networking involves securely transmitting corporate data across multiple sites throughout an entire enterprise. Creating a truly private

More information

Graph Applications, Class Notes, CS 3137 1 Traveling Salesperson Problem Web References: http://www.tsp.gatech.edu/index.html http://www-e.uni-magdeburg.de/mertens/tsp/tsp.html TSP applets A Hamiltonian

More information

Routing. Information Networks p.1/35

Routing. Information Networks p.1/35 Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual

More information

Wide Area Networks (WANs) Slide Set 6

Wide Area Networks (WANs) Slide Set 6 Wide Area Networks (WANs) Slide Set 6 Wide Area Networks (WANs) WAN Purposes Link sites (usually) within the same corporation Remote access for individuals who are off-site Internet access for individuals

More information

Frame Relay Topologies and Designs

Frame Relay Topologies and Designs Frame Relay Topologies and Designs Frame Relay Topologies and Design As we learned in the Frame Relay - Introduction and Concepts lesson, Frame Relay introduces some cost savings benefits over point-to-point

More information

CSS 343 Data Structures, Algorithms, and Discrete Math II. Graphs II. Yusuf Pisan

CSS 343 Data Structures, Algorithms, and Discrete Math II. Graphs II. Yusuf Pisan CSS 343 Data Structures, Algorithms, and Discrete Math II Graphs II Yusuf Pisan 2 3 Shortest Path: Dijkstra's Algorithm Shortest path from given vertex to all other vertices Initial weight is first row

More information

CSC 421: Algorithm Design & Analysis. Spring 2015

CSC 421: Algorithm Design & Analysis. Spring 2015 CSC 421: Algorithm Design & Analysis Spring 2015 Greedy algorithms greedy algorithms examples: optimal change, job scheduling Prim's algorithm (minimal spanning tree) Dijkstra's algorithm (shortest path)

More information

Precept 4: Traveling Salesman Problem, Hierarchical Clustering. Qian Zhu 2/23/2011

Precept 4: Traveling Salesman Problem, Hierarchical Clustering. Qian Zhu 2/23/2011 Precept 4: Traveling Salesman Problem, Hierarchical Clustering Qian Zhu 2/23/2011 Agenda Assignment: Traveling salesman problem Hierarchical clustering Example Comparisons with K-means TSP TSP: Given the

More information

The Shortest Path Problem. The Shortest Path Problem. Mathematical Model. Integer Programming Formulation

The Shortest Path Problem. The Shortest Path Problem. Mathematical Model. Integer Programming Formulation The Shortest Path Problem jla,jc@imm.dtu.dk Department of Management Engineering Technical University of Denmark The Shortest Path Problem Given a directed network G = (V,E,w) for which the underlying

More information

WAN Technologies CCNA 4

WAN Technologies CCNA 4 WAN Technologies CCNA 4 Overview Note: Most of this will be described in more detail in later chapters. Differentiate between a LAN and WAN Identify the devices used in a WAN List WAN standards Describe

More information

Lecture 19. Broadcast routing

Lecture 19. Broadcast routing Lecture 9 Broadcast routing Slide Broadcast Routing Route a packet from a source to all nodes in the network Possible solutions: Flooding: Each node sends packet on all outgoing links Discard packets received

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

looking ahead to see the optimum

looking ahead to see the optimum ! Make choice based on immediate rewards rather than looking ahead to see the optimum! In many cases this is effective as the look ahead variation can require exponential time as the number of possible

More information

CSC Design and Analysis of Algorithms. Lecture 4 Brute Force, Exhaustive Search, Graph Traversal Algorithms. Brute-Force Approach

CSC Design and Analysis of Algorithms. Lecture 4 Brute Force, Exhaustive Search, Graph Traversal Algorithms. Brute-Force Approach CSC 8301- Design and Analysis of Algorithms Lecture 4 Brute Force, Exhaustive Search, Graph Traversal Algorithms Brute-Force Approach Brute force is a straightforward approach to solving a problem, usually

More information

COMP 182: Algorithmic Thinking Prim and Dijkstra: Efficiency and Correctness

COMP 182: Algorithmic Thinking Prim and Dijkstra: Efficiency and Correctness Prim and Dijkstra: Efficiency and Correctness Luay Nakhleh 1 Prim s Algorithm In class we saw Prim s algorithm for computing a minimum spanning tree (MST) of a weighted, undirected graph g. The pseudo-code

More information

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

More information

Greedy Algorithms. At each step in the algorithm, one of several choices can be made.

Greedy Algorithms. At each step in the algorithm, one of several choices can be made. Greedy Algorithms At each step in the algorithm, one of several choices can be made. Greedy Strategy: make the choice that is the best at the moment. After making a choice, we are left with one subproblem

More information

Routing Outline. EECS 122, Lecture 15

Routing Outline. EECS 122, Lecture 15 Fall & Walrand Lecture 5 Outline EECS, Lecture 5 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Definition/Key Questions Distance Vector Link State Comparison Variations EECS - Fall

More information

UNIT 5 GRAPH. Application of Graph Structure in real world:- Graph Terminologies:

UNIT 5 GRAPH. Application of Graph Structure in real world:- Graph Terminologies: UNIT 5 CSE 103 - Unit V- Graph GRAPH Graph is another important non-linear data structure. In tree Structure, there is a hierarchical relationship between, parent and children that is one-to-many relationship.

More information

CAD Algorithms. Categorizing Algorithms

CAD Algorithms. Categorizing Algorithms CAD Algorithms Categorizing Algorithms Mohammad Tehranipoor ECE Department 2 September 2008 1 Categorizing Algorithms Greedy Algorithms Prim s Algorithm (Minimum Spanning Tree) A subgraph that is a tree

More information

CS/COE

CS/COE CS/COE 1501 www.cs.pitt.edu/~lipschultz/cs1501/ Weighted Graphs Last time, we said spatial layouts of graphs were irrelevant We define graphs as sets of nodes and edges However, we ll certainly want to

More information

Greedy Approach: Intro

Greedy Approach: Intro Greedy Approach: Intro Applies to optimization problems only Problem solving consists of a series of actions/steps Each action must be 1. Feasible 2. Locally optimal 3. Irrevocable Motivation: If always

More information

DESIGN AND ANALYSIS OF ALGORITHMS GREEDY METHOD

DESIGN AND ANALYSIS OF ALGORITHMS GREEDY METHOD 1 DESIGN AND ANALYSIS OF ALGORITHMS UNIT II Objectives GREEDY METHOD Explain and detail about greedy method Explain the concept of knapsack problem and solve the problems in knapsack Discuss the applications

More information

Dijkstra s algorithm for shortest paths when no edges have negative weight.

Dijkstra s algorithm for shortest paths when no edges have negative weight. Lecture 14 Graph Algorithms II 14.1 Overview In this lecture we begin with one more algorithm for the shortest path problem, Dijkstra s algorithm. We then will see how the basic approach of this algorithm

More information

Dijkstra s Algorithm. Dijkstra s algorithm is a natural, greedy approach towards

Dijkstra s Algorithm. Dijkstra s algorithm is a natural, greedy approach towards CPSC-320: Intermediate Algorithm Design and Analysis 128 CPSC-320: Intermediate Algorithm Design and Analysis 129 Dijkstra s Algorithm Dijkstra s algorithm is a natural, greedy approach towards solving

More information

UNIT 3. Greedy Method. Design and Analysis of Algorithms GENERAL METHOD

UNIT 3. Greedy Method. Design and Analysis of Algorithms GENERAL METHOD UNIT 3 Greedy Method GENERAL METHOD Greedy is the most straight forward design technique. Most of the problems have n inputs and require us to obtain a subset that satisfies some constraints. Any subset

More information

Week 11: Minimum Spanning trees

Week 11: Minimum Spanning trees Week 11: Minimum Spanning trees Agenda: Minimum Spanning Trees Prim s Algorithm Reading: Textbook : 61-7 1 Week 11: Minimum Spanning trees Minimum spanning tree (MST) problem: Input: edge-weighted (simple,

More information

Lecture Summary CSC 263H. August 5, 2016

Lecture Summary CSC 263H. August 5, 2016 Lecture Summary CSC 263H August 5, 2016 This document is a very brief overview of what we did in each lecture, it is by no means a replacement for attending lecture or doing the readings. 1. Week 1 2.

More information

Network Topologies & LAN,MAN and WAN. By: Mr. Binesh Kr. Singh. What is Topology

Network Topologies & LAN,MAN and WAN. By: Mr. Binesh Kr. Singh. What is Topology http://bineshsingh.yolasite.com Network Topologies & LAN,MAN and WAN By: Mr. Binesh Kr. Singh What is Topology NW Topology Defines how various computers or nodes they are connected to each other Or It

More information

Greedy Algorithms. Previous Examples: Huffman coding, Minimum Spanning Tree Algorithms

Greedy Algorithms. Previous Examples: Huffman coding, Minimum Spanning Tree Algorithms Greedy Algorithms A greedy algorithm is one where you take the step that seems the best at the time while executing the algorithm. Previous Examples: Huffman coding, Minimum Spanning Tree Algorithms Coin

More information

Chapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved.

Chapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved. Chapter 9 Greedy Technique Copyright 2007 Pearson Addison-Wesley. All rights reserved. Greedy Technique Constructs a solution to an optimization problem piece by piece through a sequence of choices that

More information

CSE 100: GRAPH ALGORITHMS

CSE 100: GRAPH ALGORITHMS CSE 100: GRAPH ALGORITHMS Dijkstra s Algorithm: Questions Initialize the graph: Give all vertices a dist of INFINITY, set all done flags to false Start at s; give s dist = 0 and set prev field to -1 Enqueue

More information

Shortest Paths. Nishant Mehta Lectures 10 and 11

Shortest Paths. Nishant Mehta Lectures 10 and 11 Shortest Paths Nishant Mehta Lectures 0 and Communication Speeds in a Computer Network Find fastest way to route a data packet between two computers 6 Kbps 4 0 Mbps 6 6 Kbps 6 Kbps Gbps 00 Mbps 8 6 Kbps

More information

MST & Shortest Path -Prim s -Djikstra s

MST & Shortest Path -Prim s -Djikstra s MST & Shortest Path -Prim s -Djikstra s PRIM s - Minimum Spanning Tree - A spanning tree of a graph is a tree that has all the vertices of the graph connected by some edges. - A graph can have one or more

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

CS200: Graphs. Rosen Ch , 9.6, Walls and Mirrors Ch. 14

CS200: Graphs. Rosen Ch , 9.6, Walls and Mirrors Ch. 14 CS200: Graphs Rosen Ch. 9.1-9.4, 9.6, 10.4-10.5 Walls and Mirrors Ch. 14 Trees as Graphs Tree: an undirected connected graph that has no cycles. A B C D E F G H I J K L M N O P Rooted Trees A rooted tree

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, Approximation Algorithms

Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, Approximation Algorithms Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 Approximation Algorithms 1 Bike Tour Suppose you decide to ride a bicycle around

More information

Module 6 NP-Complete Problems and Heuristics

Module 6 NP-Complete Problems and Heuristics Module 6 NP-Complete Problems and Heuristics Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 397 E-mail: natarajan.meghanathan@jsums.edu Optimization vs. Decision

More information

tree follows. Game Trees

tree follows. Game Trees CPSC-320: Intermediate Algorithm Design and Analysis 113 On a graph that is simply a linear list, or a graph consisting of a root node v that is connected to all other nodes, but such that no other edges

More information

Shortest Paths. CSE 373 Data Structures Lecture 21

Shortest Paths. CSE 373 Data Structures Lecture 21 Shortest Paths CSE 7 Data Structures Lecture Readings and References Reading Section 9., Section 0.. Some slides based on: CSE 6 by S. Wolfman, 000 //0 Shortest Paths - Lecture Path A path is a list of

More information

Algorithms for Minimum Spanning Trees

Algorithms for Minimum Spanning Trees Algorithms & Models of Computation CS/ECE, Fall Algorithms for Minimum Spanning Trees Lecture Thursday, November, Part I Algorithms for Minimum Spanning Tree Sariel Har-Peled (UIUC) CS Fall / 6 Sariel

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures 3 Definitions an undirected graph G = (V, E) is a

More information

1.264 Lecture 23. Telecom Enterprise networks MANs, WANs

1.264 Lecture 23. Telecom Enterprise networks MANs, WANs 1.264 Lecture 23 Telecom Enterprise networks MANs, WANs Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners

More information

Module 6 NP-Complete Problems and Heuristics

Module 6 NP-Complete Problems and Heuristics Module 6 NP-Complete Problems and Heuristics Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu P, NP-Problems Class

More information

Undirected Graphs. Hwansoo Han

Undirected Graphs. Hwansoo Han Undirected Graphs Hwansoo Han Definitions Undirected graph (simply graph) G = (V, E) V : set of vertexes (vertices, nodes, points) E : set of edges (lines) An edge is an unordered pair Edge (v, w) = (w,

More information

On Routing Performance of MENTOR Algorithm

On Routing Performance of MENTOR Algorithm 1769 On Routing Performance of MENTOR Algorithm KAIRAT JAROENRAT, PISIT CHARNKEITKONG Faculty of Information Technology Rangsit University 52/347 Muang-Ake, Phaholyothin Rd., Lak-Hok, Pathumtani, THAILAND

More information

Math 3012 Combinatorial Optimization Worksheet

Math 3012 Combinatorial Optimization Worksheet Math 3012 Combinatorial Optimization Worksheet Combinatorial Optimization is the way in which combinatorial thought is applied to real world optimization problems. Optimization entails achieving the sufficient

More information

Lecture 4: Graph Algorithms

Lecture 4: Graph Algorithms Lecture 4: Graph Algorithms Definitions Undirected graph: G =(V, E) V finite set of vertices, E finite set of edges any edge e = (u,v) is an unordered pair Directed graph: edges are ordered pairs If e

More information

Integrated t Services Digital it Network (ISDN) Digital Subscriber Line (DSL) Cable modems Hybrid Fiber Coax (HFC)

Integrated t Services Digital it Network (ISDN) Digital Subscriber Line (DSL) Cable modems Hybrid Fiber Coax (HFC) Digital Local Loop Technologies Integrated t Services Digital it Network (ISDN) Handles voice and data Relatively l high h cost for low bandwidth (Skip) Digital Subscriber Line (DSL) Cable modems Hybrid

More information

Competitive Public Switched Telephone Network (PSTN) Wide- Area Network (WAN) Access Using Signaling System 7 (SS7)

Competitive Public Switched Telephone Network (PSTN) Wide- Area Network (WAN) Access Using Signaling System 7 (SS7) Competitive Public Switched Telephone Network (PSTN) Wide- Area Network (WAN) Access Using Signaling System 7 (SS7) Definition Using conventional Internet access equipment, service providers may access

More information

DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI. Department of Computer Science and Engineering CS6301 PROGRAMMING DATA STRUCTURES II

DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI. Department of Computer Science and Engineering CS6301 PROGRAMMING DATA STRUCTURES II DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI Department of Computer Science and Engineering CS6301 PROGRAMMING DATA STRUCTURES II Anna University 2 & 16 Mark Questions & Answers Year / Semester: II / III

More information

Lecture (08, 09) Routing in Switched Networks

Lecture (08, 09) Routing in Switched Networks Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.

More information

UNIT Name the different ways of representing a graph? a.adjacencymatrix b. Adjacency list

UNIT Name the different ways of representing a graph? a.adjacencymatrix b. Adjacency list UNIT-4 Graph: Terminology, Representation, Traversals Applications - spanning trees, shortest path and Transitive closure, Topological sort. Sets: Representation - Operations on sets Applications. 1. Name

More information

10. Network dimensioning

10. Network dimensioning Partly based on slide material by Samuli Aalto and Jorma Virtamo ELEC-C7210 Modeling and analysis of communication networks 1 Contents Introduction Parameters: topology, routing and traffic Dimensioning

More information

Computers Are Your Future

Computers Are Your Future Computers Are Your Future Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and

More information

Lecture 11: Analysis of Algorithms (CS ) 1

Lecture 11: Analysis of Algorithms (CS ) 1 Lecture 11: Analysis of Algorithms (CS583-002) 1 Amarda Shehu November 12, 2014 1 Some material adapted from Kevin Wayne s Algorithm Class @ Princeton 1 2 Dynamic Programming Approach Floyd-Warshall Shortest

More information

Graph Algorithms. A Brief Introduction. 高晓沨 (Xiaofeng Gao) Department of Computer Science Shanghai Jiao Tong Univ.

Graph Algorithms. A Brief Introduction. 高晓沨 (Xiaofeng Gao) Department of Computer Science Shanghai Jiao Tong Univ. Graph Algorithms A Brief Introduction 高晓沨 (Xiaofeng Gao) Department of Computer Science Shanghai Jiao Tong Univ. 目录 2015/5/7 1 Graph and Its Applications 2 Introduction to Graph Algorithms 3 References

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

Computer Networks. ENGG st Semester, 2010 Hayden Kwok-Hay So

Computer Networks. ENGG st Semester, 2010 Hayden Kwok-Hay So Computer Networks ENGG1015 1 st Semester, 2010 Hayden Kwok-Hay So Where are we in the semester? High Level Applications Systems Digital Logic Image & Video Processing Computer & Embedded Systems Computer

More information

ITU Regional Seminar. Belgrade, Serbia and Montenegro, June Session 5.2. Service and applications matrix forecasting

ITU Regional Seminar. Belgrade, Serbia and Montenegro, June Session 5.2. Service and applications matrix forecasting ITU Regional Seminar Belgrade, Serbia and Montenegro, 20-24 24 June 2005 Session 5.2 Service and applications matrix forecasting Evolving infrastructures to NGN and related Planning Strategies and Tools

More information

Notes for Lecture 24

Notes for Lecture 24 U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined

More information

Trees, Trees and More Trees

Trees, Trees and More Trees Trees, Trees and More Trees August 9, 01 Andrew B. Kahng abk@cs.ucsd.edu http://vlsicad.ucsd.edu/~abk/ How You ll See Trees in CS Trees as mathematical objects Trees as data structures Trees as tools for

More information

managing an evolving set of connected components implementing a Union-Find data structure implementing Kruskal s algorithm

managing an evolving set of connected components implementing a Union-Find data structure implementing Kruskal s algorithm Spanning Trees 1 Spanning Trees the minimum spanning tree problem three greedy algorithms analysis of the algorithms 2 The Union-Find Data Structure managing an evolving set of connected components implementing

More information

Optimal tour along pubs in the UK

Optimal tour along pubs in the UK 1 From Facebook Optimal tour along 24727 pubs in the UK Road distance (by google maps) see also http://www.math.uwaterloo.ca/tsp/pubs/index.html (part of TSP homepage http://www.math.uwaterloo.ca/tsp/

More information

Routing. 4. Mar INF-3190: Switching and Routing

Routing. 4. Mar INF-3190: Switching and Routing Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines

More information

Routing & Congestion Control

Routing & Congestion Control WIDE AREA NETWORK Routing & Congestion Control Introduction Congestion control and routing are major issues to be handled in Wide Area Networks. Congestion is handled at transport layer and routing is

More information

The Shortest Path Problem

The Shortest Path Problem The Shortest Path Problem 1 Shortest-Path Algorithms Find the shortest path from point A to point B Shortest in time, distance, cost, Numerous applications Map navigation Flight itineraries Circuit wiring

More information

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11 Types of Computer Networks ICS 614: Computer Networks Concepts and Principles 11 Types of networks Networks are categorized by distribution, size, and architecture. A network can be as simple as a single

More information

(the bubble footer is automatically inserted into this space)

(the bubble footer is automatically inserted into this space) CS 2150 Final Exam, Fall 2016 Page 1 of 10 UVa userid: CS 2150 Final Exam Name You MUST write your e-mail ID on EACH page and bubble in your userid at the bottom of this first page. And put your name on

More information

CMPSC 250 Analysis of Algorithms Spring 2018 Dr. Aravind Mohan Shortest Paths April 16, 2018

CMPSC 250 Analysis of Algorithms Spring 2018 Dr. Aravind Mohan Shortest Paths April 16, 2018 1 CMPSC 250 Analysis of Algorithms Spring 2018 Dr. Aravind Mohan Shortest Paths April 16, 2018 Shortest Paths The discussion in these notes captures the essence of Dijkstra s algorithm discussed in textbook

More information

Module 6 NP-Complete Problems and Heuristics

Module 6 NP-Complete Problems and Heuristics Module 6 NP-Complete Problems and Heuristics Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 97 E-mail: natarajan.meghanathan@jsums.edu Optimization vs. Decision

More information

Computer Networks and Internet

Computer Networks and Internet Computer Networks and Internet Objectives Computer Networks Internet 2 Computer Networks Introducing Computer Networks A computer network consists of two or more computers linked together to exchange data

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information

Minimum-Spanning-Tree problem. Minimum Spanning Trees (Forests) Minimum-Spanning-Tree problem

Minimum-Spanning-Tree problem. Minimum Spanning Trees (Forests) Minimum-Spanning-Tree problem Minimum Spanning Trees (Forests) Given an undirected graph G=(V,E) with each edge e having a weight w(e) : Find a subgraph T of G of minimum total weight s.t. every pair of vertices connected in G are

More information

CS6301 Programming and Data Structures II Unit -5 REPRESENTATION OF GRAPHS Graph and its representations Graph is a data structure that consists of following two components: 1. A finite set of vertices

More information

Lecture 6 Basic Graph Algorithms

Lecture 6 Basic Graph Algorithms CS 491 CAP Intro to Competitive Algorithmic Programming Lecture 6 Basic Graph Algorithms Uttam Thakore University of Illinois at Urbana-Champaign September 30, 2015 Updates ICPC Regionals teams will be

More information

Frame Relay Network Performance

Frame Relay Network Performance Lab 4 Frame Relay Network Performance Overview Frame Relay is a connection-oriented, unreliable technology based on virtual circuits. A virtual circuit must be set up between a source and destination before

More information

Module 6 P, NP, NP-Complete Problems and Approximation Algorithms

Module 6 P, NP, NP-Complete Problems and Approximation Algorithms Module 6 P, NP, NP-Complete Problems and Approximation Algorithms Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu

More information

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load Dynamic Routing Overview Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph C

More information

AT&T OPERATING COMPANIES TARIFF NO. 1 Original Page 4-1 ADVANCED SERVICES

AT&T OPERATING COMPANIES TARIFF NO. 1 Original Page 4-1 ADVANCED SERVICES Original Page 4-1 4.1 Service Description SECTION 4 PremierSERV SM FRAME RELAY SERVICE PremierSERV SM Frame Relay Service (FRS) is a public, metropolitan wide-area data service that provides high throughput

More information

Chapter 7 Slicing and Dicing

Chapter 7 Slicing and Dicing 1/ 22 Chapter 7 Slicing and Dicing Lasse Harju Tampere University of Technology lasse.harju@tut.fi 2/ 22 Concentrators and Distributors Concentrators Used for combining traffic from several network nodes

More information

Graph Algorithms: Part 2. Dr. Baldassano Yu s Elite Education

Graph Algorithms: Part 2. Dr. Baldassano Yu s Elite Education Graph Algorithms: Part 2 Dr. Baldassano chrisb@princeton.edu Yu s Elite Education Graphs In Computer Science we describe pairwise relationships as a graph Graphs are made up of two types of things: Nodes

More information

Mathematical Thinking

Mathematical Thinking Mathematical Thinking Chapter 2 Hamiltonian Circuits and Spanning Trees It often happens in mathematics that what appears to be a minor detail in the statement of a problem can have a profound effect on

More information

Chapter 4. Greedy Algorithms. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.

Chapter 4. Greedy Algorithms. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. Chapter 4 Greedy Algorithms Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. 1 4.5 Minimum Spanning Tree Minimum Spanning Tree Minimum spanning tree. Given a connected

More information

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (1 st Week) Outline Course Information and Policies Course Syllabus 1. Data Communications, Data Networks, and the Internet

More information

Dr./ Ahmed Mohamed Rabie Sayed

Dr./ Ahmed Mohamed Rabie Sayed 1 Dr./ Ahmed Mohamed Rabie Sayed 2 A network is a group of two or more computer systems linked together to exchange data and share resources, including expensive peripherals. 3 A local area network (LAN)

More information

is the Capacitated Minimum Spanning Tree

is the Capacitated Minimum Spanning Tree Dynamic Capacitated Minimum Spanning Trees Raja Jothi and Balaji Raghavachari Department of Computer Science, University of Texas at Dallas Richardson, TX 75083, USA raja, rbk @utdallas.edu Abstract Given

More information

Very Large Scale Neighborhood Search. Collaborators include: Ravi Ahuja, Ozlem Ergun, Abraham Punnen, Dushyant Sharma

Very Large Scale Neighborhood Search. Collaborators include: Ravi Ahuja, Ozlem Ergun, Abraham Punnen, Dushyant Sharma Very Large Scale Neighborhood Search Collaborators include: Ravi Ahuja, Ozlem Ergun, Abraham Punnen, Dushyant Sharma Neighborhood Search Combinatorial Optimization: minimize (f(s) : S F) f is typically

More information

CSE 100 Minimum Spanning Trees Prim s and Kruskal

CSE 100 Minimum Spanning Trees Prim s and Kruskal CSE 100 Minimum Spanning Trees Prim s and Kruskal Your Turn The array of vertices, which include dist, prev, and done fields (initialize dist to INFINITY and done to false ): V0: dist= prev= done= adj:

More information

1 Minimum Spanning Trees (MST) b 2 3 a. 10 e h. j m

1 Minimum Spanning Trees (MST) b 2 3 a. 10 e h. j m Minimum Spanning Trees (MST) 8 0 e 7 b 3 a 5 d 9 h i g c 8 7 6 3 f j 9 6 k l 5 m A graph H(U,F) is a subgraph of G(V,E) if U V and F E. A subgraph H(U,F) is called spanning if U = V. Let G be a graph with

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be slow if not careful with data structures 3 Definitions an undirected graph G = (V, E)

More information

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing In this lecture we will discuss about Routing algorithms Congestion algorithms Lecture 19 The routing algorithm is that part of the network layer software, which is responsible for deciding which output

More information

CSE 202: Design and Analysis of Algorithms Lecture 3

CSE 202: Design and Analysis of Algorithms Lecture 3 CSE 202: Design and Analysis of Algorithms Lecture 3 Instructor: Kamalika Chaudhuri Announcement Homework 1 out Due on Mon April 11 in class No late homeworks will be accepted Greedy Algorithms Direct

More information

Basic Switch Organization

Basic Switch Organization NOC Routing 1 Basic Switch Organization 2 Basic Switch Organization Link Controller Used for coordinating the flow of messages across the physical link of two adjacent switches 3 Basic Switch Organization

More information

Search and Optimization

Search and Optimization Search and Optimization Search, Optimization and Game-Playing The goal is to find one or more optimal or sub-optimal solutions in a given search space. We can either be interested in finding any one solution

More information

ALGORITHM DESIGN GREEDY ALGORITHMS. University of Waterloo

ALGORITHM DESIGN GREEDY ALGORITHMS. University of Waterloo ALORITHM DSIN RDY ALORITHMS University of Waterloo LIST OF SLIDS - List of Slides reedy Approaches xample: Making Change 4 Making Change (cont.) 5 Minimum Spanning Tree 6 xample 7 Approaches that Don t

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms CSE 101, Winter 2018 Design and Analysis of Algorithms Lecture 9: Minimum Spanning Trees Class URL: http://vlsicad.ucsd.edu/courses/cse101-w18/ Goal: MST cut and cycle properties Prim, Kruskal greedy algorithms

More information