On Frequency Assignment in Cellular Networks


 Maximillian Singleton
 2 years ago
 Views:
Transcription
1 On Frequency ssignment in ellular Networks Sanguthevar Rajasekaran Dept.ofISE,Univ. offlorida Gainesville, FL David Wei Dept. of S, Fordham University New York, NY K. Naik Dept. of S, Univ. of izu bstract In this paper we consider the problem of frequency assignment in cellular networks. The model we consider is general. We present an algorithm for frequency assignment and analyze its performance. 1 Introduction Frequency assignment is an important problem in the operation of mobile networks. The area available for the network is typically partitioned into hexagonal cells (see Figure 1for an example). base station is located at the center of each cell. This station is incharge of handling calls arising from mobile hosts situated in its cell. The problem of frequency assignment is to allocate a frequency to each call for communication such that the interference among different calls is minimized and the total number of distinct frequencies used is minimized. ellular networks are usually represented as planar graphs where the nodes correspond to cell centers. There is an edge between two nodes if the corresponding hexagons have at least one common side. The graph G corresponding to the cells of Figure 1is shown with dotted lines. Mobile hosts in any cell communicate with the base station in the cell to serve their various needs. Each node of the graph G can be weighted with the number of hosts in the corresponding cell. Each host should be assigned a frequency for communication in such a way that interference with the other hosts in the network is minimized. The hosts in the same cell should be assigned different frequencies. lso, any two hosts that are at a distance of d or This work is supported in part by an NSF ward R and an EP Grant R
2 ... b g R r r b g b g r b g r b r b g r b g. Figure 1: onfiguration of cells less should be assigned different frequencies (where d is chosen appropriately to minimize the interference). fourth power attenuation law is typically assumed [1]. It is conceivable that a host can dynamically migrate from one cell to another. Thus the weighted graph G also changes dynamically. If one assumes that possible interferences are restricted to adjacent cells, then the frequency assignment problem reduces to weighted graph coloring. In this case, the graph G is refered to as the interference graph. The static frequency assignment problem refers to the problem of assigning frequencies to the hosts given a snapshot of the network at a specified time. The online (or dynamic) frequency assignment refers to the problem of continuous frequency assignment taking into account the changes that might occur in the graph G. In this case, the state of the network can be modeled with an ordered sequence of graphs G t,t 0. The problem corresponding to G t should be solved before considering G t+1. The static frequency assignment problem has been studied extensively. Even for the case when the interference is restricted to adjacent cells, it has been shown that the problem of optimal coloring of the interference graph G is NPcomplete [6]. Several approximation algorithms have been devised for this version. For example, a simple algorithm called Fixed llocation (F) uses no more than three times the optimal number of frequencies (or colors). Janssen et. al. s algorithm [2] uses no more than 1.5 times the optimal number of colors. The number of colors used by Narayanan and Shende s algorithm [5] is no more than 4 3 times the optimal. Janssen et. al. [3] obtain the same performance for the dynamic version of the problem also. Several dynamic algorithms are known for the general version of the problem as well. Four of these algorithms are: the geometric strategy; orrowing with Directional hannellocking (DL) [7]; NandaGoodman [4]; and the TwoStep DynamicPriority (TSDP) [1]. These algorithms have been demonstrated to do well in practice. However no bounds have been proven on their performances. 2
3 In this paper we consider a general version of the frequency assignment problem and present an algorithm that uses no more than three times the optimal number of colors. This is the first algorithm with a proven bound on the number of colors. We also illustrate how to use this algorithm to develop dynamic frequency assignment algorithms. The rest of the paper is organized as follows. In Section 2 we provide a summary of known techniques. In Section 3 we present a coloring algorithm and analyze its performance. In this section we also extend our coloring algorithm to obtain dynamic frequency assignment algorithms. Section 4 concludes the paper. 2 Literature Survey Static frequency assignment problem where interference is restricted to adjacent cells (call this version unitdistance frequency assignment problem) can be stated as follows. Input is a graph G(V,E,w) wherev is a set of nodes (cell centers), E is a set of edges (there is an edge from node u to node v if they are adjacent cells), and w is the weight function. In particular, w(u) stands for the number of hosts that the cell u has to handle. The problem is to multicolor the graph with as few colors as possible such that 1) for any u V, w(u) distinct colors are assigned to node u, and 2) for any edge (u, v) E, the colors assigned to the nodes u and v are disjoint. Let χ(g) be the minimum number of colors needed to color G. In the general frequency assignment problem, there cannot be a common frequency between two cells if they are separated by a distance of d (for some specified d). We can think of the space available for the mobile network as consisting of rows and columns of cells where the leftmost bottom cell is denoted as (0, 0) whose center is located at (0, 0). Let R be the radius of each cell (see Figure 1). The cell in row i and column j (denoted as (i, j)) ( has its center at 3Rj Ri, 3 2 ). Ri Thus in the case of unitdistance frequency assignment, the value of d is 3R. For the general case, d could take on any value. We can also define an interference graph corresponding to the general frequency assignment problem. This graph has the cell centers as its nodes. There is an edge from node u to node v if these nodes are at a distance of d. The performance of any coloring algorithm is measured using its competitive ratio which is the ratio of the number of colors used to χ(g). n algorithm is said to be ccompetitive if its competitive ratio is c or better. 2.1 Unitdistance Frequency ssignment learly, the total weight on any maximal clique of the interference graph is a lower bound on χ(g). The only maximal cliques in the interference graph are edges and triangles. If D2 G and D3 G denote the maximum weight of any edge or triangle, respectively, then DG =max{d2 G,DG 3 } is a lower bound on χ(g). 3
4 simple coloring algorithm that is 3competitive can be devised using the fact that the interference graph (where the weight of each node is 1) is 3colorable. Figure 1 shows this coloring. The three colors used are red, blue, and green. Let the colors to be used be called 0, 1, 2,... To color new calls, the red, blue, and green nodes use the smallest integers available from the sets of integers that are mod 0, 1, and 2, respectively. For example, the sequence of colors used by any red node will be 0, 3, 6,... learly, there cannot be any interference between adjacent cells under this coloring. This algorithm is known as the Fixed llocation (F) algorithm. The competitive ratio of the above algorithm can be improved to 3 2 as has been shown by Janssen et. al. [2]. For any node v consider all the triangles in which v is a vertex. Let D 1 (v) denote the maximum total weight of any of these triangles. D 1 (v) is also known as 1local maximum clique weight [3]. The colors are divided into three palettes. Red colors are integers that are mod 0. lue and green colors are integers that are mod 1and 2, respectively. Let v be any node. The node v employs three local spectra consisting of red, blue, and green colors each spectrum being of size D 1 (v)/2. If v s base color is red it uses the first w(v)/2 colors from its red spectrum and the last w(v)/2 colors from its blue spectrum. If v s color is blue it uses the first w(v)/2 colors from its blue spectrum and the last w(v)/2 colors from its green spectrum. Finally, if v s color is green it uses the first w(v)/2 colors from its green spectrum and the last w(v)/2 colors from its red spectrum. learly, the number of colors used by any node is no more than 3 2χ(G). It is easy to verify that no two adjacent cells will access the same color. Narayanan and Shende [5] have given an intricate algorithm for coloring that is 4 3 competitive. ased on this algorithm, Janssen et. al. [3] have offered a dynamic frequency assignment algorithm that is 4 3competitive. In this algorithm, at any given time, a node has to have a view of only a small neighborhood around it. 2.2 General Frequency ssignment Several works have been done that address the problem of dynamic general frequency assignment under both TDM and FDM multiplexing schemes. The problem of frequency assignment is also refered to as the carrier allocation problem (see e.g., [1]). The bandwidth available for communication is partitioned into carriers by frequency division. Each carrier is divided into certain number of channels by time division. channel is used to support a call. In this section we give a brief summary of four techniques for carrier allocation, namely, the geometric strategy, borrowing with directional channellocking (DL), NandaGoodman strategy, and the twostep dynamicpriority (TSDP). Let D min be the minimum distance between two cells in order for them not to interfere with each other. If c is any cell, let IN(c) stand for the interference region of c, i.e., IN(c) is the set of cells that are at a distance of less than D min from c. The status of a carrier r in a cell c, denoted as status(r, c), is defined as 4
5 follows [1]. 1) We say r is a used carrier for c if at least one channel in r is used by some user in c. Inthiscasestatus(r, c) =U.2)Wesayr is an interfered carrier for c if there is a cell c IN(c) such that status(r, c )=U.Inthiscase,status(r, c) =I. 3)Otherwise,wesay r is available for c. Inthiscasestatus(r, c) =. Geometric Strategy. Here the cells are partitioned into k sets S 0,S 1,...,S k 1 as evenly as possible. These sets are such that no two cells in the same set are D min or less apart, i.e., no two cells interfere with each other. The set of available carriers is also divided into k sets P 0,P 1,...,P k 1 as evenly as possible. arriers in each P i are ordered. When a cell in S i needs a carrier, it chooses the first available carrier in the sequence P i,p i+1,...,p k 1,P 0,P 1,...,P i 1. Thus the cells in S i prefer the carriers in P i the most and hence P i are called the firstchoice or nominal carriers for S i. orrowing with Directional hannellocking (DL). This technique [7] is closely related to the geometric strategy. Here also the cells are partitioned into S 0,S 1,..., S k 1 and the carriers are partitioned into P 0,P 1,...,P k 1. arriers in P i are the nominal carriers for cells in S i. When a cell c in S i needs a carrier, it chooses the first available carrier in the sequence P i. (Note that P i is a list ordered according to priority, with the first carrier having the highest priority.) If no nominal carrier is available, the cell borrows the carrier of lowest priority from the richest cell in IN(c), i.e., the cell with the largest number of unassigned nominal carriers. NandaGoodman Technique. In this technique [4] each carrier is assigned an acquisition priority and a release priority. These priorities are assigned dynamically. For any cell c and a carrier r available for c, c s acquisition priority for r is defined as the number of cells in IN(c) in which r is an interfered carrier. In other words, acquisition priority(r, c) = {c IN(c) :status(r, c )=I}. Let r be used in c. Then the release priority of r is defined as the number of cells in IN(c) in which r will become available if r is released by c. Inotherwords, release priority(r, c) = {c IN(c) :ζ(r, c )=1} where ζ(r, c ) is the number of cells in IN(c ) that are currently using r. TwoStep Dynamic Priority (TSDP) Technique. This algorithm [1] is based on an optimal reuse pattern of the carriers. Let the reuse pattern S(r) of a carrier r be defined as S(r) ={c status(r, c) = U}. yoptimal reuse pattern of a carrier we mean the largest reuse pattern possible for that carrier. ny carrier that is used in a cell c canbereusedinanother cell c provided that these two cells are at least D min apart. Dong and Lai [1] show that an 5
6 Figure 2: Equivalence classes when D min =3 3R optimal way of using a carrier is to employ it in cells that are regularly placed in the plane such that the distance between adjacent cells in any column (or row) is exactly equal to D min. This notion can be formalized as follows. Define an equivalence relation Γ on the collection of cells. For any c 1,c 2, (c 1,c 2 ) Γ if and only if one of the following is true: 1) c 1 = c 2 ;2)dist(c 1,c 2 )=D min ;or3)thereexists a c such that (c 1,c) Γand(c, c 2 ) Γ. Dong and Lai [1] have shown that an optimal reuse pattern for any carrier is an equivalence class of Γ. When D min =3 3R, there arise nine equivalence classes as shown in Figure 2. The TSDP algorithm partitions the cells into optimal reuse patterns G 0,G 1,...,G k 1 using the equivalence relation Γ. onsider only the case D min =3 3R. For any cell c G i, define LOP (c) ={c : dist(c, c )=D min }. When D min =3 3R, there are six cells in LOP (c). The algorithm also has an adjustable parameter λ which is an integer in the range [0, 7]. ny carrier r is called a primary carrier for cell c if r is currently used by at least λ cells in LOP (c). Otherwise, r is said to be a secondary carrier for c. y appropriately choosing λ, one can make sure that the carriers are used according to maximal reuse patterns as much as possible. The algorithm description will be complete if we specify the acquisition and release priorities for the various carriers. For any cell c and a primary carrier r for c, the acquisition priority is defined as follows. acquisition priority(r, c) = weight(r, c ) c LOP (c) where weight(r, c )isn if status(r, c )=U;1ifstatus(r, c )=; and0ifstatus(r, c )= I. HereN is a positive number greater than the number of cells in IN(c). lso, release priority(r, c) = acquisition priority(r, c) 6
7 Dong and Lai [1] show that this priority scheme results in the primary carriers being used in close approximation to their optimal reuse patterns. For the secondary carriers they employ the priority schemes of NandaGoodman in order to use these carriers in a compact manner. If r is a secondary carrier for c, then acquisition priority(r, c) = {c IN(c) :status(r, c )=I}. lso, release priority(r, c) = {c IN(c) :ζ(c,r)=1} where ζ(r, c ) is the number of cells in IN(c ) in which the carrier r is currently used. The experimental results of [1] indicate that the TSDP algorithm performs better than the other three techniques namely, geometric, DL, and NandaGoodman. In [1] they also present some variants of the algorithm TSDP. 3 The New lgorithm ll the carrier allocation algorithms we have seen thus far have the following common theme: Partition the cells as well as carriers into groups. For each group of cells and each groups of carriers assign acquisition as well as release priorities. The TSDP algorithm performs well because of the way the cells are partitioned and also because of the priority schemes. ell partition corresponds to optimal reuse patterns of the carriers and the priority scheme for primary carriers is such that they are used according to their optimal reuse patterns as much as possible. onsider the case D min = k 3R, for some positive integer k. For this case, there will be k 2 equivalence classes in the relation Γ. all the intersection of k successive columns and k successive rows of cells a k krectangle. How many colors are needed to multicolor the interference graph? The optimal reuse pattern suggests that a different palette be used for each cell in a k krectangle. lower bound on the number of colors needed is the maximum of total weight on any circle of diameter (k 1) 3R. Figure 3 shows the case when k =3. The total weight of all the cells whose centers lie within a circle of diameter 2 3R is a lower bound. Thus the TSDP algorithm uses no more than k 2 times the optimal number of colors. Example 1. onsider the following instance. Similar to the cells, name the rectangles also as (0, 0), (0, 1), etc. Rectangle (0, 0) has q requests in its cell (0, 0). The rest of the cells in the rectangle do not have any calls. Rectangle (0, 1) has q calls in its cell (0, 1)andtherest of the cells do not have any calls, and so on. lso assume that this pattern persists for a long time. For this instance, the TSDP algorithm will use k 2 colors. Thus the TSDP algorithm is k 2 competitive. 7
8 E E h t D Figure 3: n efficient coloring of the graph Our algorithm is based on the fact that the interference graph can be colored with no more than 3 colors. We begin with a 5competitive scheme. Figure 3 shows this coloring for the case k = 3. ut the result holds for any value of k. Lemma 3.1 There exists a coloring scheme that is 5competitive. Proof. The idea is to partition the cells as illustrated in Figure 3. In particular we draw circles of diameter (k 1) 3R. ll the cells whose centers lie on or inside a circle constitute a class. We label these classes as follows. The classes that are in the same rows will be labeled,,,... The classes immediately below will be labeled,d,,... There are cells that are not covered by these circles. These are grouped such that all the cells in between two successive circles belong to the same class. Label these classes E. We use five palettes. Four palettes are used to color the classes labeled,,, and D. The fifth palette is used to color the class E. Let each of the five spectra be of size. learly, there won t be any conflicts among the classes,,, and D. Two classes that are labeled E might have some conflicts, since there are nodes from two adjacent classes labeled E that are at a distance of <D min. In order to avoid these conflicts, for any class labeled E, the cells in the top half (E h ) will use the spectrum from one end and the cells in the bottom half (E t ) will use the spectrum from the other end. This scheme reverses for the E classes that are in rows below. 8
9 It is easy to verify now that there won t be any conflicts among the E classes also. Our algorithm will partition the cells according to the coloring imposed by Lemma 3.1. There are many possibilities. If we know in advance the value of, then we can use five spectra each of size and there won t be any interferences or failures. nother possibility is that the number of colors (i.e., carriers) available may be fixed. In this case we partition the available carriers into five: P 0,P 1,P 2,P 3, and P 4. all the cell partitions S 0,S 1,S 2,S 3, and S 4 (corresponding to,,, D, and E, respectively). We say P i are the primary carriers for S i, 0 i 4. Depending on the priority schemes to be used, we can derive many dynamic carrier allocation strategies. We list below some of them. lgorithm1 The priority scheme is similar to the geometric strategy. If a cell c S i requires a channel it picks the first available channel from the list P i,p i+1,...,p 4,P 0,..., P i 1,for 0 i 4. lgorithm2 Here the priority scheme corresponds to that of DL. lgorithm3 For each group S i, primary carriers are P i,0 i 4. For the secondary carriers, use the priority scheme of NandaGoodman. Useful Heuristic for lgorithm1. lgorithm1is based on the geometric strategy. Here we mention a heuristic that has the potential of improving the performance. ccording to the geometric strategy, a cell m labelled will look for a carrier in the ordered list,,. If there is no available carrier in, it will look for one from the palettes and. Say a carrier q is available in. Ifq is assigned to m, q cannot then be assigned to any cell in the interference region of m. This will affect the reusability of the carrier. Instead we can do the following. When the cell m does not find a carrier in, it first checks the carriers in and that are currently used by cells that are outside m s interference region. This way we can make sure that we are not using any new carriers from either or. Lemma 3.2 There exists a coloring scheme that is 3competitive. Proof. The cells are partitioned into three classes as shown in Figure 4. The labeling of these classes correspond to the palettes that will be used to color them. It is easy to see that there won t be any conflicts among the three classes. 4 onclusions In this paper we have provided a summary of known algorithms for the frequency assignment problem. We have considered both unitdistance and general versions. coloring algorithm that is threecompetitive for the general interference graph has been given. ased on this coloring scheme we have developed many dynamic carrier allocation algorithms. 9
10 References Figure 4: 3competitive coloring of the graph [1] X. Dong and T. H. Lai, Dynamic arrier llocation Strategies for Mobile ellular Networks, Technical Report OSUISR10/96TR48, Dept. of omputer and Information Science, The Ohio State University, [2] J. Janssen, K. Kilakos, and O. Marcotte, Fixed Preference Frequency llocation for ellular Telephone Systems, unpublished manuscript, pril [3] J. Janssen, D. Krizanc, L. Narayanan, and S. Shende, Distributed Online Frequency ssignment in ellular Networks, Manuscript, [4] S. Nanda and D. Goodman, Dynamic Resource cquisition: Distributed arrier llocation for TDM ellular Systems, IEEE Globecom, 1991, pp [5] L. Narayanan and S. Shende, Static Frequency ssignment in ellular Networks, Technical Report, Dept. of omputer Science, oncordia University, [6]. McDiarmid and. Reed, hannel ssignment and Weighted olouring, manuscript,
11 [7] M. Zhang and T.S. Yum, omparisons of hannelssignment Strategies in ellular Mobile Telephone Systems, IEEE Transactions on Vehicular Technology 38(4), 1989, pp
Frequency Allocation in Wireless Communication Networks
Frequency Allocation in Wireless Communication Networks Joseph WunTat Chan King s College London Joint work with: Francis Y. L. Chin University of Hong Kong Yong Zhang University of Hong Kong Deshi Ye
More informationCompetitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
More informationLabeling outerplanar graphs with maximum degree three
Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics
More informationBasic Notions on Graphs. Planar Graphs and Vertex Colourings. Joe Ryan. Presented by
Basic Notions on Graphs Planar Graphs and Vertex Colourings Presented by Joe Ryan School of Electrical Engineering and Computer Science University of Newcastle, Australia Planar graphs Graphs may be drawn
More informationCOLORED GRAPHS AND THEIR PROPERTIES
COLORED GRAPHS AND THEIR PROPERTIES BEN STEVENS 1. Introduction This paper is concerned with the upper bound on the chromatic number for graphs of maximum vertex degree under three different sets of coloring
More informationApproximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NPCompleteness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
More informationPlanarity Planarity
Planarity 8.1 71 Planarity Up until now, graphs have been completely abstract. In Topological Graph Theory, it matters how the graphs are drawn. Do the edges cross? Are there knots in the graph structure?
More informationSystem Design in Wireless Communication. Ali Khawaja
System Design in Wireless Communication Ali Khawaja University of Texas at Dallas December 6, 1999 1 Abstract This paper deals with the micro and macro aspects of a wireless system design. With the growing
More informationReductions & NPcompleteness as part of Foundations of Computer Science undergraduate course
Reductions & NPcompleteness as part of Foundations of Computer Science undergraduate course Alex Angelopoulos, NTUA January 22, 2015 Outline Alex Angelopoulos (NTUA) FoCS: Reductions & NPcompleteness
More information! Solve problem to optimality. ! Solve problem in polytime. ! Solve arbitrary instances of the problem. #approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NPhard problem What should I do? A Theory says you're unlikely to find a polytime algorithm Must sacrifice one of three
More informationSHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
More informationLecture 4: The Chromatic Number
Introduction to Graph Theory Instructor: Padraic Bartlett Lecture 4: The Chromatic Number Week 1 Mathcamp 2011 In our discussion of bipartite graphs, we mentioned that one way to classify bipartite graphs
More informationLoad Balancing. Load Balancing 1 / 24
Load Balancing Backtracking, branch & bound and alphabeta pruning: how to assign work to idle processes without much communication? Additionally for alphabeta pruning: implementing the youngbrotherswait
More information1. Determine all real numbers a, b, c, d that satisfy the following system of equations.
altic Way 1999 Reykjavík, November 6, 1999 Problems 1. etermine all real numbers a, b, c, d that satisfy the following system of equations. abc + ab + bc + ca + a + b + c = 1 bcd + bc + cd + db + b + c
More informationInterference Reduction in Wireless Networks Using Graph Coloring Methods
Interference Reduction in Wireless Networks Using Graph Coloring Methods Andrew Chickadel Computing Research Department of Computer Science Villanova University Villanova, PA 19085 Andrew.Chickadel@villanova.edu
More informationDefinition. A graph is a collection of vertices, and edges between them. They are often represented by a drawing:
1. GRAPHS AND COLORINGS Definition. A graph is a collection of vertices, and edges between them. They are often represented by a drawing: 3 vertices 3 edges 4 vertices 4 edges 4 vertices 6 edges A graph
More informationDiversity Coloring for Distributed Data Storage in Networks 1
Diversity Coloring for Distributed Data Storage in Networks 1 Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Pasadena, CA 9115, U.S.A. {jax, bruck}@paradise.caltech.edu Abstract
More informationPlanar Tree Transformation: Results and Counterexample
Planar Tree Transformation: Results and Counterexample Selim G Akl, Kamrul Islam, and Henk Meijer School of Computing, Queen s University Kingston, Ontario, Canada K7L 3N6 Abstract We consider the problem
More informationA Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System
A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System Young Sil Choi Email: choiys@mobile.snu.ac.kr Illsoo Sohn Email: sohnis@mobile.snu.ac.kr Kwang Bok Lee Email: klee@snu.ac.kr Abstract
More informationEE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed
More informationDO NOT REDISTRIBUTE THIS SOLUTION FILE
Professor Kindred Math 04 Graph Theory Homework 7 Solutions April 3, 03 Introduction to Graph Theory, West Section 5. 0, variation of 5, 39 Section 5. 9 Section 5.3 3, 8, 3 Section 7. Problems you should
More information2.3 Scheduling jobs on identical parallel machines
2.3 Scheduling jobs on identical parallel machines There are jobs to be processed, and there are identical machines (running in parallel) to which each job may be assigned Each job = 1,,, must be processed
More informationDiameter and Treewidth in MinorClosed Graph Families, Revisited
Algorithmica manuscript No. (will be inserted by the editor) Diameter and Treewidth in MinorClosed Graph Families, Revisited Erik D. Demaine, MohammadTaghi Hajiaghayi MIT Computer Science and Artificial
More informationGSM Network and Services
GSM Network and Services Cellular networks GSM Network and Services 2G1723 Johan Montelius 1 The name of the game The number one priority for mobile/cellular networks is to implement fullduplex voice
More informationThe Clar Structure of Fullerenes
The Clar Structure of Fullerenes Liz Hartung Massachusetts College of Liberal Arts June 12, 2013 Liz Hartung (Massachusetts College of Liberal Arts) The Clar Structure of Fullerenes June 12, 2013 1 / 25
More information2000 Solutions Fermat Contest (Grade 11)
anadian Mathematics ompetition n activity of The entre for Education in Mathematics and omputing, University of Waterloo, Waterloo, Ontario 000 s Fermat ontest (Grade ) for The ENTRE for EDUTION in MTHEMTIS
More informationChapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NPhard problem. What should I do? A. Theory says you're unlikely to find a polytime algorithm. Must sacrifice one
More informationApplied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
More informationApproximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and HingFung Ting 2 1 College of Mathematics and Computer Science, Hebei University,
More informationChapter 15 Introduction to Linear Programming
Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2014 WeiTa Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of
More informationHOMEWORK #3 SOLUTIONS  MATH 3260
HOMEWORK #3 SOLUTIONS  MATH 3260 ASSIGNED: FEBRUARY 26, 2003 DUE: MARCH 12, 2003 AT 2:30PM (1) Show either that each of the following graphs are planar by drawing them in a way that the vertices do not
More informationAN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC W. T. TUTTE. Introduction. In a recent series of papers [l4] on graphs and matroids I used definitions equivalent to the following.
More informationLecture 7: NPComplete Problems
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NPComplete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit
More informationThe number of generalized balanced lines
The number of generalized balanced lines David Orden Pedro Ramos Gelasio Salazar Abstract Let S be a set of r red points and b = r + 2δ blue points in general position in the plane, with δ 0. A line l
More informationA Randomized Saturation Degree Heuristic for Channel Assignment in Cellular Radio Networks
364 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 50, NO. 2, MARCH 2001 A Randomized Saturation Degree Heuristic for Channel Assignment in Cellular Radio Networks Roberto Battiti, Member, IEEE, Alan
More informationRamsey numbers for bipartite graphs with small bandwidth
Ramsey numbers for bipartite graphs with small bandwidth Guilherme O. Mota 1,, Gábor N. Sárközy 2,, Mathias Schacht 3,, and Anusch Taraz 4, 1 Instituto de Matemática e Estatística, Universidade de São
More information! Solve problem to optimality. ! Solve problem in polytime. ! Solve arbitrary instances of the problem. !approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NPhard problem What should I do? A Theory says you're unlikely to find a polytime algorithm Must sacrifice one of
More informationEnergy Efficient Monitoring in Sensor Networks
Energy Efficient Monitoring in Sensor Networks Amol Deshpande, Samir Khuller, Azarakhsh Malekian, Mohammed Toossi Computer Science Department, University of Maryland, A.V. Williams Building, College Park,
More informationOffline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com
More informationElementary triangle geometry
Elementary triangle geometry Dennis Westra March 26, 2010 bstract In this short note we discuss some fundamental properties of triangles up to the construction of the Euler line. ontents ngle bisectors
More informationNetwork Algorithms for Homeland Security
Network Algorithms for Homeland Security Mark Goldberg and Malik MagdonIsmail Rensselaer Polytechnic Institute September 27, 2004. Collaborators J. Baumes, M. Krishmamoorthy, N. Preston, W. Wallace. Partially
More informationIntroduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (55.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues StoreandForward Packet Switching Services
More informationPh.D. Thesis. Judit NagyGyörgy. Supervisor: Péter Hajnal Associate Professor
Online algorithms for combinatorial problems Ph.D. Thesis by Judit NagyGyörgy Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai
More informationFrequency Assignment in Mobile Phone Systems
KonradZuseZentrum für Informationstechnik Berlin Takustraße 7 D14195 BerlinDahlem Germany MARTIN GRÖTSCHEL Frequency Assignment in Mobile Phone Systems ZIBReport 0058 (Dezember 2000) Frequency Assignment
More information1. Relevant standard graph theory
Color identical pairs in 4chromatic graphs Asbjørn Brændeland I argue that, given a 4chromatic graph G and a pair of vertices {u, v} in G, if the color of u equals the color of v in every 4coloring
More informationSmall Maximal Independent Sets and Faster Exact Graph Coloring
Small Maximal Independent Sets and Faster Exact Graph Coloring David Eppstein Univ. of California, Irvine Dept. of Information and Computer Science The Exact Graph Coloring Problem: Given an undirected
More informationWeighted Sum Coloring in Batch Scheduling of Conflicting Jobs
Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs Leah Epstein Magnús M. Halldórsson Asaf Levin Hadas Shachnai Abstract Motivated by applications in batch scheduling of jobs in manufacturing
More informationNetwork (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,
More informationMatthias F.M. Stallmann Department of Computer Science North Carolina State University Raleigh, NC 276958206
Matthias F.M. Stallmann Department of Computer Science North Carolina State University Raleigh, NC 276958206 August, 1990 UNIFORM PLANAR EMBEDDING IS NPCOMPLETE* MATTHIAS F.M. STALLMANN Key Words. planar
More informationColoring Eulerian triangulations of the projective plane
Coloring Eulerian triangulations of the projective plane Bojan Mohar 1 Department of Mathematics, University of Ljubljana, 1111 Ljubljana, Slovenia bojan.mohar@unilj.si Abstract A simple characterization
More information1 Location Management in Cellular
1 Location Management in Cellular Networks JINGYUAN ZHANG Abstract In a cellular network, a service coverage area is divided into smaller areas of hexagonal shape, referred to as cells. The cellular concept
More informationFairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
More information1. LINEAR EQUATIONS. A linear equation in n unknowns x 1, x 2,, x n is an equation of the form
1. LINEAR EQUATIONS A linear equation in n unknowns x 1, x 2,, x n is an equation of the form a 1 x 1 + a 2 x 2 + + a n x n = b, where a 1, a 2,..., a n, b are given real numbers. For example, with x and
More informationMining SocialNetwork Graphs
342 Chapter 10 Mining SocialNetwork Graphs There is much information to be gained by analyzing the largescale data that is derived from social networks. The bestknown example of a social network is
More informationOpt p ic i al a l Netw t or o k r s k Bas a ic i Concepts (Part 1)
Optical Networks Basic Concepts (Part 1) Introduction What is an optical network? Optical devices and components Basic concepts in optical networking Optimization of optical network design How to handle
More informationCS268: Geometric Algorithms Handout #5 Design and Analysis Original Handout #15 Stanford University Tuesday, 25 February 1992
CS268: Geometric Algorithms Handout #5 Design and Analysis Original Handout #15 Stanford University Tuesday, 25 February 1992 Original Lecture #6: 28 January 1991 Topics: Triangulating Simple Polygons
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationUniform Multicommodity Flow through the Complete Graph with Random Edgecapacities
Combinatorics, Probability and Computing (2005) 00, 000 000. c 2005 Cambridge University Press DOI: 10.1017/S0000000000000000 Printed in the United Kingdom Uniform Multicommodity Flow through the Complete
More informationA Novel Approach for Load Balancing In Heterogeneous Cellular Network
A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1
More informationA novel load balancing scheme for the teletraffic hot spot problem in cellular networks
Wireless Networks 4 1998 325 340 325 A novel load balancing scheme for the teletraffic hot spot problem in cellular networks Sajal K. Das Sanjoy K. Sen and Rajeev Jayaram Center for Research in Wireless
More informationIntroduction to Scheduling Theory
Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France arnaud.legrand@imag.fr November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling
More informationEuclidean Geometry. We start with the idea of an axiomatic system. An axiomatic system has four parts:
Euclidean Geometry Students are often so challenged by the details of Euclidean geometry that they miss the rich structure of the subject. We give an overview of a piece of this structure below. We start
More informationGraph Theory Problems and Solutions
raph Theory Problems and Solutions Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles November, 005 Problems. Prove that the sum of the degrees of the vertices of any finite graph is
More informationCHANNEL ASSIGNMENT ALGORITHMS
UNIVERSITÀ DEGLI STUDI DI TRENTO DOTTORATO DI RICERCA IN MATEMATICA XI CICLO Mauro Brunato CHANNEL ASSIGNMENT ALGORITHMS IN CELLULAR NETWORKS Relatore Prof. Alan A. Bertossi Contents 1 Introduction 1
More informationChapter 4. Trees. 4.1 Basics
Chapter 4 Trees 4.1 Basics A tree is a connected graph with no cycles. A forest is a collection of trees. A vertex of degree one, particularly in a tree, is called a leaf. Trees arise in a variety of applications.
More informationGeneralizing the Ramsey Problem through Diameter
Generalizing the Ramsey Problem through Diameter Dhruv Mubayi Submitted: January 8, 001; Accepted: November 13, 001. MR Subject Classifications: 05C1, 05C15, 05C35, 05C55 Abstract Given a graph G and positive
More informationBasic Network Design
Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex twoway radio system between the mobile unit and the wireless network. It uses radio frequencies
More information136 CHAPTER 4. INDUCTION, GRAPHS AND TREES
136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics
More informationKaleidoscopes, Hubcaps, and Mirrors Problem 1.1 Notes
Problem 1.1 Notes When part of an object or design is repeated to create a balanced pattern, we say that the object or design has symmetry. You can find examples of symmetry all around you. rtists use
More informationeach college c i C has a capacity q i  the maximum number of students it will admit
n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i  the maximum number of students it will admit each college c i has a strict order i
More informationFrom Perfect Matchings to the Four Colour Theorem
From Perfect Matchings to the Four Colour Theorem Aguilar (Cinvestav), Flores (UNAM), Pérez (HP), Santos (Cantabria), Zaragoza (UAMA) Universidad Autónoma Metropolitana Unidad Azcapotzalco Departamento
More informationThe Minimum Consistent Subset Cover Problem and its Applications in Data Mining
The Minimum Consistent Subset Cover Problem and its Applications in Data Mining Byron J Gao 1,2, Martin Ester 1, JinYi Cai 2, Oliver Schulte 1, and Hui Xiong 3 1 School of Computing Science, Simon Fraser
More informationClass One: Degree Sequences
Class One: Degree Sequences For our purposes a graph is a just a bunch of points, called vertices, together with lines or curves, called edges, joining certain pairs of vertices. Three small examples of
More informationThe Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
More informationFast approximation of the maximum area convex. subset for starshaped polygons
Fast approximation of the maximum area convex subset for starshaped polygons D. Coeurjolly 1 and J.M. Chassery 2 1 Laboratoire LIRIS, CNRS FRE 2672 Université Claude Bernard Lyon 1, 43, Bd du 11 novembre
More informationResource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach
Resource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach Patrik Björklund, Peter Värbrand and Di Yuan Department of Science and Technology, Linköping University SE601
More informationA Joinless Approach for Mining Spatial Colocation Patterns
IEEE TRNSTIONS ON KNOWLEDGE ND DT ENGINEERING DRFT 1 Joinless pproach for Mining Spatial olocation Patterns Jin Soung Yoo, Student Member, IEEE, and Shashi Shekhar, Fellow, IEEE bstract Spatial colocations
More informationChannel Allocation in Cellular Telephone. Systems. Lab. for Info. and Decision Sciences. Cambridge, MA 02139. bertsekas@lids.mit.edu.
Reinforcement Learning for Dynamic Channel Allocation in Cellular Telephone Systems Satinder Singh Department of Computer Science University of Colorado Boulder, CO 803090430 baveja@cs.colorado.edu Dimitri
More informationGraph DistanceDependent Labeling Related to Code Assignment in Computer Networks
Graph DistanceDependent Labeling Related to Code Assignment in Computer Networks Xiaohua Teresa Jin, 1 Roger K. Yeh 2, * 1 Department of Mathematics, University of South Carolina, Columbia, South Carolina
More informationCOMS4236: Introduction to Computational Complexity. Summer 2014
COMS4236: Introduction to Computational Complexity Summer 2014 Mihalis Yannakakis Lecture 17 Outline conp NP conp Factoring Total NP Search Problems Class conp Definition of NP is nonsymmetric with respect
More informationDistributed Coordinatefree Hole Recovery
Distributed Coordinatefree Hole Recovery Xiaoyun Li Department of Computing and Electronic Systems University of Essex Colchester, UK CO4 3SQ xliw@essex.ac.uk Abstract This paper proposes a distributed
More informationLattice Point Geometry: Pick s Theorem and Minkowski s Theorem. Senior Exercise in Mathematics. Jennifer Garbett Kenyon College
Lattice Point Geometry: Pick s Theorem and Minkowski s Theorem Senior Exercise in Mathematics Jennifer Garbett Kenyon College November 18, 010 Contents 1 Introduction 1 Primitive Lattice Triangles 5.1
More informationINTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2
ISSN 22772685 IJESR/June 2014/ Vol4/Issue6/333337 Y. Naveena et al./ International Journal of Engineering & Science Research INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena
More informationOn the independence number of graphs with maximum degree 3
On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs
More informationExponential time algorithms for graph coloring
Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A klabeling of vertices of a graph G(V, E) is a function V [k].
More information13. Write the decimal approximation of 9,000,001 9,000,000, rounded to three significant
æ If 3 + 4 = x, then x = 2 gold bar is a rectangular solid measuring 2 3 4 It is melted down, and three equal cubes are constructed from this gold What is the length of a side of each cube? 3 What is the
More informationMeasuring the Optimal Transmission Power of GSM Cellular Network: A Case Study
216 Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study Dr Basil M Kasasbeh, Applied Science University,
More informationExistence of Simple Tours of Imprecise Points
Existence of Simple Tours of Imprecise Points Maarten Löffler Department of Information and Computing Sciences, Utrecht University Technical Report UUCS00700 www.cs.uu.nl ISSN: 097 Existence of Simple
More informationAnalysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadthfirst search (BFS) 4 Applications
More informationNetwork File Storage with Graceful Performance Degradation
Network File Storage with Graceful Performance Degradation ANXIAO (ANDREW) JIANG California Institute of Technology and JEHOSHUA BRUCK California Institute of Technology A file storage scheme is proposed
More informationIntercell Interference Mitigation Reduction in LTE Using Frequency Reuse Scheme
International Journal of Scientific and Research Publications, Volume 5, Issue 8, August 2015 1 Intercell Interference Mitigation Reduction in LTE Using Frequency Reuse Scheme Rupali Patil 1, R.D.Patane
More informationPacket Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Abstract  Cellular frequency reuse is known to be an efficient method to allow many wireless telephone
More informationTenacity and rupture degree of permutation graphs of complete bipartite graphs
Tenacity and rupture degree of permutation graphs of complete bipartite graphs Fengwei Li, Qingfang Ye and Xueliang Li Department of mathematics, Shaoxing University, Shaoxing Zhejiang 312000, P.R. China
More informationCSC 373: Algorithm Design and Analysis Lecture 16
CSC 373: Algorithm Design and Analysis Lecture 16 Allan Borodin February 25, 2013 Some materials are from Stephen Cook s IIT talk and Keven Wayne s slides. 1 / 17 Announcements and Outline Announcements
More informationHigh degree graphs contain largestar factors
High degree graphs contain largestar factors Dedicated to László Lovász, for his 60th birthday Noga Alon Nicholas Wormald Abstract We show that any finite simple graph with minimum degree d contains a
More informationAn Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems
ICWMC 211 : The Seventh International Conference on Wireless and Mobile Communications An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2 1x EVDO and LTE Systems Xinsheng
More informationOutline. NPcompleteness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NPcompleteness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2pairs sum vs. general Subset Sum Reducing one problem to another Clique
More informationON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu
ON THE COMPLEXITY OF THE GAME OF SET KAMALIKA CHAUDHURI, BRIGHTEN GODFREY, DAVID RATAJCZAK, AND HOETECK WEE {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ABSTRACT. Set R is a card game played with a
More informationCAD Algorithms. P and NP
CAD Algorithms The Classes P and NP Mohammad Tehranipoor ECE Department 6 September 2010 1 P and NP P and NP are two families of problems. P is a class which contains all of the problems we solve using
More informationUPPER BOUNDS ON THE L(2, 1)LABELING NUMBER OF GRAPHS WITH MAXIMUM DEGREE
UPPER BOUNDS ON THE L(2, 1)LABELING NUMBER OF GRAPHS WITH MAXIMUM DEGREE ANDREW LUM ADVISOR: DAVID GUICHARD ABSTRACT. L(2,1)labeling was first defined by Jerrold Griggs [Gr, 1992] as a way to use graphs
More information