SUPPLEMENT TO CHAPTER 6 MINIMUM SPANNING-TREE PROBLEMS

Size: px
Start display at page:

Download "SUPPLEMENT TO CHAPTER 6 MINIMUM SPANNING-TREE PROBLEMS"

Transcription

1 S h 6- SUPPLMNT TO HPTR 6 MINIMUM SPNNIN-TR PROLMS hapter 6 focuses on network optimization problems. These are problems that can be described in terms of a complete network that has both nodes and links (or arcs) and the objective is to optimize the operation of the network. We now turn our attention to a different kind of problem where the objective is to design the network. The nodes are given, but we must decide which links to give to the network. Specifically, each potential link has a cost (different for different links) for inserting it into the network. We are required to provide enough links to provide a path between every pair of nodes. The objective is to do this in a way that minimizes the total cost of the links. Such a problem is referred to as a minimum spanning-tree problem, as illustrated by the following example. n xample: The Modern orp. Problem Management of the Modern orporation has decided to have a state-of-the-art fiber-optic network installed to provide high-speed communications (data, voice, and video) between its major centers. The nodes in igure show the geographical layout of the corporation's major centers (which include corporate headquarters, a supercomputer facility, and a research park, as well as production and distribution centers). The dashed lines are the potential locations of fiber-optic cables. (Other cables between pairs of centers also are possible but have been ruled out as uneconomical.) The number next to each dashed line gives the cost (in millions of dollars) if that particular cable is chosen as one to be installed. igure display of Modern orp.'s major centers (the nodes), the possible locations for fiber-optic cables (the dashed lines), and the cost in millions of dollars for those cables (the numbers). ny pair of centers does not need to have a cable directly connecting them in order to take full advantage of the fiber-optic technology for high-speed communications between these centers. ll that is necessary is to have a series of cables that connect the centers.

2 S h 6- The problem is to determine which cables should be installed to minimize the total cost of providing high-speed communications between every pair of centers. This is, in fact, a minimum spanning-tree problem. The optimal solution for this problem is shown in igure, where the links in this network correspond to the possible cables in igure that should be chosen for installation. (Note that there is indeed a path between every pair of centers.) The resulting cost of this fiber-optic network is Total cost = = ($ million). ny other design of the network that connects every pair of centers would cost at least $ million more. igure The fiber-optic network that provides the optimal solution for Modern's minimum spanning-tree problem. What is the reason for the strange name, minimum spanning-tree problem? Here is the explanation. In the terminology of network theory, the network in igure is a tree because it does not have any paths that begin and end at the same node without backtracking (i.e., no paths that cycle). It also is a spanning tree because it is a tree that provides a path between every pair of nodes (so it "spans" all the nodes). inally, it is a minimum spanning tree because it minimizes the total cost among all spanning trees. eneral haracteristics Just as for Modern's problem, every minimum spanning-tree problem satisfies the following assumptions.

3 S h 6- ssumptions Of Minimum Spanning-Tree Problem. You are given the nodes of a network but not the links. Instead, you are given the potential links and the positive cost (or a similar measure) for each if it is inserted into the network.. You wish to design the network by inserting enough links to satisfy the requirement that there be a path between every pair of nodes.. The objective is to satisfy this requirement in a way that minimizes the total cost of doing so. n optimal solution for this problem always is a spanning tree. Here is an easy way to recognize a spanning tree. The number of links in a spanning tree always is one less than the number of nodes. urthermore, each node is directly connected by a single link to at least one other node. See that this description fits the spanning tree in igure, where there are six links and seven nodes (all directly connected to at least one other node). Remove any one of these links and assumption above would be violated (no spanning tree). (heck this.) Incur the needless extra cost of adding another link instead (without removing one) and you again no longer have a spanning tree. (heck that adding any unused link from igure into igure would create a path that begins and ends at the same node without backtracking, which violates the definition of a tree.) inally, we should point out that, in contrast to transportation, assignment, maximum flow, and shortest path problems, a minimum spanning tree-problem is not a special type of minimum cost flow problem. (It is not even a special type of linear programming problem.) urthermore, it cannot be solved easily by Solver. That is the bad news. The good news is that you can solve it very easily by the algorithm described below without even using a computer. Remarkably Simple lgorithm Starting with no links in the network, each step of the algorithm selects one new link to insert from the list of potential links. s described below, the algorithm continues in this way until every node is touched by a link, at which point the selected nodes form a minimum spanning tree. lgorithm for a Minimum Spanning-Tree Problem. hoice of the first link: Select the cheapest potential link.. hoice of the next link: Select the cheapest potential link between a node that already is touched by a link and a node that does not yet have such a link.. Repeat step over and over until every node is touched by a link (perhaps more than one). t that point, an optimal solution (a minimum spanning tree) has been obtained. [Tie breaking: Ties for the cheapest potential link may be broken arbitrarily without affecting the optimality of the final solution. However, ties in step signal that there may also be (but need not be) other optimal solutions that would be obtained by breaking ties in another way.] pplication of the lgorithm to the Modern orp. Problem Now let us apply this algorithm to Modern's minimum spanning-tree problem as displayed in igure. mong all the potential links (the dashed lines), the one between node and node ties with the one between node and node as the cheapest (a cost of ). Therefore, for step, we

4 S h 6- need to select one of these two potential links to be the first link inserted into the network. reaking the tie arbitrarily, let us select the one between node and node (the other will be chosen later), as shown below. Next, we apply step for the first time. The two nodes that are touched by a link are nodes and, so we need to compare the costs of the potential links between either of these nodes and a node that does not yet have a touching link. These potential links and their costs are : ost = : ost = : ost = : ost = : ost = : ost = Since the cheapest of these is the one between node and node, with a cost of, it is selected to be the next link inserted into the network, as displayed below.

5 S h 6- Now, nodes,, and each are touched by a link (or two links in the case of node ), so the next execution of step requires comparing the costs of the potential links between one of these nodes and one of the others. : ost = : ost = : ost = : ost = : ost = : ost = : ost = The cheapest of these is the potential link between node and node, so it becomes the next link added to the network.

6 S h 6-6 Nodes,,, and now all have touching links, so we next compare the costs of the potential links between one of these nodes and one of the others. (ctually, none of these potential links involve node, since it does not have any potential links that go to a node that is not yet touched by a link.) : ost = : ost = : ost = : ost = The cheapest is the potential link between node and node, so it is added next. ll but nodes and now are touched by a link. Therefore, the only potential links that need to be considered next are between either node or and one of the other nodes.

7 S h 6- : ost = : ost = : ost = : ost = The cheapest by far is the potential link between node and node, so it finally gets inserted into the network. (Remember that this potential link was tied to be the initial link in step.) Since node now is the only node untouched by a link, the only potential links to consider next are those between this node and the others. : ost = : ost = The cheaper one is the potential link between node and node, so we insert it into the network.

8 S h 6-8 very node now is touched by a link, so the algorithm is done and this is our optimal solution. ll the links that have been inserted into the network form a minimum spanning tree with a total cost of = ($ million). ll the remaining potential links (dashed lines) are rejected because the inserted links provide a path between every pair of nodes. Notice that this optimal solution is the same as the one given in igure. (There is only one optimal solution for this particular problem.) What would have happened if the tie had been broken the other way in step by selecting the potential link between node and node to be the initial link inserted into the network instead of the potential link between node and node? o ahead and check this out by cranking through the algorithm from this point. You will find that exactly the same links get selected, but in a different order from before. This algorithm is referred to as a greedy algorithm because it simply grabs the most favorable choice (the cheapest potential link) at each step without worrying about the effect of this choice on subsequent decisions. It is remarkable that such a quick and simple-minded procedure still is guaranteed to find an optimal solution. Rejoice this time, but beware. reedy algorithms normally will not necessarily find optimal solutions for other management science problems.

9 S h 6-9 Some pplications In this age of the information superhighway, applications similar to the Modern orp. example have become increasingly important. However, minimum spanning-tree problems have several other types of applications as well. Here is a list of some key types of applications.. esign of telecommunication networks (computer networks, leased-line telephone networks, cable television networks, etc.). esign of a lightly used transportation network to minimize the total cost of providing the links (rail lines, roads, etc.).. esign of a network of high-voltage electrical power transmission lines.. esign of a network of wiring on electrical equipment (e.g., a digital computer system) to minimize the total length of the wire.. esign of a network of pipelines to connect a number of locations. RVIW QUSTIONS. In a minimum spanning tree problem, what part of the network is given and what part remains to be designed?. What kind of network is being designed in the Modern orp. example?. In the terminology of network theory, what is a tree? spanning tree? minimum spanning tree?. What is an easy way to recognize a spanning tree?. What is the objective of a minimum spanning tree problem? 6. Is a minimum spanning tree problem a special type of minimum cost flow problem?. What kind of algorithm will solve a minimum spanning tree problem (but very few other management science problems)? 8. What are a few types of applications of minimum spanning tree problems? lossary reedy algorithm: n algorithm that simply grabs the most favorable choice at each step without worrying about the effect of this choice on subsequent decisions. Minimum spanning tree: One among all spanning trees that minimizes total cost. Spanning tree: tree that provides a path between every pair of nodes. Tree: network that does not have any paths that begin and end at the same node without backtracking. Problems 6s.. Reconsider the Modern orp. problem. When the algorithm for a minimum spanning-tree problem was applied to this problem, there was a tie at step for choosing the first link. This tie was broken arbitrarily by selecting the potential link between node and node. Now break the tie the other way by selecting the potential link between node and node to be the first link and then reapply the rest of the algorithm. Show each step. (You again should obtain the minimum spanning tree shown in igure.)

10 S h 6-0 6s.. Use the greedy algorithm to find a minimum spanning tree for a network with the following nodes and with the links still to be chosen. The dashed lines between pairs of nodes represent potential links and the number next to each dashed line represents the cost (in thousands of dollars) of inserting that link into the network. 6s.. Use the greedy algorithm to find a minimum spanning tree for a network with the following nodes and with the links still to be chosen. The dashed lines between pairs of nodes represent potential nodes and the number next to each dashed line represents the cost (in millions of dollars) of inserting that link into the network.

11 S h 6-6s. The Wirehouse Lumber ompany will soon begin logging eight groves of trees in the same general area. Therefore, it must develop a system of dirt roads that makes each grove accessible from every other grove. The distance (in miles) between every pair of groves is as follows: istance between Pairs of roves rove Management now wants to determine between which pairs of groves the roads should be constructed to connect all groves with a minimum total length of road. a. escribe how this problem fits the network description of a minimum spanning tree problem. b. Use the greedy algorithm to solve the problem. 6s.. The Premiere ank soon will be hooking up computer terminals at each of its branch offices to the computer at its main office, using special phone lines with telecommunications devices. The phone line from a branch office need not be connected directly to the main office. It can be connected indirectly by being connected to another branch office that is connected (directly or indirectly) to the main office. The only requirement is that every branch office be connected by some route to the main office. The charge for the special phone lines is $00 times the number of miles involved, where the distance (in miles) between every pair of offices is as follows: istance between Pairs of Offices Main..... Main Office ranch ranch ranch ranch ranch Management wishes to determine which pairs of offices should be directly connected by special phone lines in order to connect every branch office (directly or indirectly) to the main office at a minimum total cost.

12 S h 6- a. escribe how this problem fits the network description of a minimum spanning tree problem. b. Use the greedy algorithm to solve the problem. What is the total cost for the special phone lines? 6s.6. Reconsider ase 6-. Suppose now that the following scenario arises with this case. ven before all merican troops and supplies had reached Saint Petersburg, Moscow, and Rostov, infighting among ommander Votachev s troops about whether to make the next attack against Saint Petersburg or against Moscow split the revolutionaries. Troops from Moscow easily overcame the vulnerable revolutionaries. ommander Votachev was imprisoned, and the next step became rebuilding the seven cities razed by his armies. The President s top priority is to help the Russian government to re-establish communications between the seven Russian cities and Moscow at minimum cost. The price of installing communication lines between any two Russian cities varies given the cost of shipping wire to the area, the level of destruction in the area, and the roughness of the terrain. Luckily, a city is able to communicate with all others if it is connected only indirectly to every other city. Saint Petersburg and Rostov are already connected to Moscow, so if any of the seven cities is connected to Saint Petersburg or Rostov, it will also be connected to Moscow. The cost of replacing communication lines between two given cities for which this is possible is shown below. etween ost to Re-establish ommunication Lines Saint Petersburg and Kazan $0,000 Saint Petersburg and Perm $8,000 Saint Petersburg and Ufa $,000 Moscow and Ufa $0,000 Moscow and Samara $9,000 Moscow and Orenburg $0,000 Moscow and Saratov $0,000 Rostov and Saratov $00,000 Rostov and Orenburg $0,000 Kazan and Perm $0,000 Kazan and Ufa $0,000 Kazan and Samara $9,000 Perm and Yekaterinburg $8,000 Perm and Ufa $,000 Yekaterinburg and Ufa $,000 Ufa and Samara $00,000 Ufa and Orenburg $,000 Saratov and Samara $00,000 Saratov and Orenburg $9,000 Where should communication lines be installed to minimize the total cost of re-establishing communications between Moscow and all seven Russian cities?

VPN Technologies: Definitions and Requirements

VPN Technologies: Definitions and Requirements VPN Technologies: Definitions and Requirements 1. Introduction VPN Consortium, January 2003 This white paper describes the major technologies for virtual private networks (VPNs) used today on the Internet.

More information

MATHEMATICAL THOUGHT AND PRACTICE. Chapter 7: The Mathematics of Networks The Cost of Being Connected

MATHEMATICAL THOUGHT AND PRACTICE. Chapter 7: The Mathematics of Networks The Cost of Being Connected MATHEMATICAL THOUGHT AND PRACTICE Chapter 7: The Mathematics of Networks The Cost of Being Connected Network A network is a graph that is connected. In this context the term is most commonly used when

More information

Chapter 6: Graph Theory

Chapter 6: Graph Theory Chapter 6: Graph Theory Graph theory deals with routing and network problems and if it is possible to find a best route, whether that means the least expensive, least amount of time or the least distance.

More information

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch Network Infrastructure or building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater

More information

Week_11: Network Models

Week_11: Network Models Week_11: Network Models 1 1.Introduction The network models include the traditional applications of finding the most efficient way to link a number of locations directly or indirectly, finding the shortest

More information

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and NETWORK By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Network A network is a group of devices (Nodes) connected by media

More information

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti

More information

CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team

CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team Lecture Summary In this lecture, we learned about the ADT Priority Queue. A

More information

Binary Search Trees. Data in each node. Larger than the data in its left child Smaller than the data in its right child

Binary Search Trees. Data in each node. Larger than the data in its left child Smaller than the data in its right child Binary Search Trees Data in each node Larger than the data in its left child Smaller than the data in its right child FIGURE 11-6 Arbitrary binary tree FIGURE 11-7 Binary search tree Data Structures Using

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

More information

Development of FIDO - A Network Design Tool for Fibre Cable Layout

Development of FIDO - A Network Design Tool for Fibre Cable Layout Development of FIDO - A Network Design Tool for Fibre Cable Layout Andrew J Mason Andy B Philpott Operations Research Group University of Auckland New Zealand a.mason@auckland.ac.nz a.philpott@auckland.ac.nz

More information

Greatest Common Factor and Least Common Multiple

Greatest Common Factor and Least Common Multiple Greatest Common Factor and Least Common Multiple Intro In order to understand the concepts of Greatest Common Factor (GCF) and Least Common Multiple (LCM), we need to define two key terms: Multiple: Multiples

More information

20-30 minutes, can be used within a longer activity

20-30 minutes, can be used within a longer activity Locked-in 1 Age group successfully used with: Abilities assumed: Time: Size of group: 11 adult None 20-30 minutes, can be used within a longer activity anything from 2 to hundreds Focus What is an algorithm?

More information

Enumerating possible Sudoku grids

Enumerating possible Sudoku grids Enumerating possible Sudoku grids Bertram Felgenhauer Department of Computer Science TU Dresden 00 Dresden Germany bf@mail.inf.tu-dresden.de Frazer Jarvis Department of Pure Mathematics University of Sheffield,

More information

SONET and DWDM: Competing Yet Complementary Technologies for The Metro Network

SONET and DWDM: Competing Yet Complementary Technologies for The Metro Network and : Competing Yet Complementary Technologies for The Metro Network Introduction The next generation of equipment has been well accepted by service providers and is being usefully deployed into networks

More information

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8] Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)

More information

C20.0001 Information Systems for Managers Fall 1999

C20.0001 Information Systems for Managers Fall 1999 New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in

More information

Institute of Southern Punjab, Multan

Institute of Southern Punjab, Multan Institute of Southern Punjab, Multan Network Security Brief Introduction Lecture#1 Mazhar Hussain E-mail: mazhar.hussain@isp.edu.pk Blog https://mazharhussainatisp.wordpress.com/ Grading Policy Classification

More information

Computer Networks. By Hardeep Singh

Computer Networks. By Hardeep Singh Computer Networks Contents Introduction Basic Elements of communication systemnetwork Topologies Network types Introduction A Computer network is a network of computers that are geographically distributed,

More information

Chapter 10: Network Flow Programming

Chapter 10: Network Flow Programming Chapter 10: Network Flow Programming Linear programming, that amazingly useful technique, is about to resurface: many network problems are actually just special forms of linear programs! This includes,

More information

Kings of War (2015) - Official Errata

Kings of War (2015) - Official Errata Kings of War (2015) - Official Errata Page 56 - Proximity to Enemies: The Gamer s Edition text is wrong. The hardback book is correct. The hardback book text is: Remember that when charging, units don

More information

Chinese postman problem

Chinese postman problem PTR hinese postman problem Learning objectives fter studying this chapter, you should be able to: understand the hinese postman problem apply an algorithm to solve the problem understand the importance

More information

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.

More information

Understanding Device Level Connection Topologies

Understanding Device Level Connection Topologies July 2013 Understanding Device Level Connection Topologies Author: Advantech E-mail: eainfo@advantech.com July 2013 Even ten years ago, most factory floor sensors were connected directly to a PLC or other

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

Random Map Generator v1.0 User s Guide

Random Map Generator v1.0 User s Guide Random Map Generator v1.0 User s Guide Jonathan Teutenberg 2003 1 Map Generation Overview...4 1.1 Command Line...4 1.2 Operation Flow...4 2 Map Initialisation...5 2.1 Initialisation Parameters...5 -w xxxxxxx...5

More information

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

CITS1231 Web Technologies. Client, Server, the Internet, and the Web CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the

More information

CMPT 165: The Internet, Part 3

CMPT 165: The Internet, Part 3 CMPT 165: The Internet, Part 3 Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission

More information

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing

More information

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

More information

1 Introduction to Internet Content Distribution

1 Introduction to Internet Content Distribution OS 521: Advanced Algorithm Design Hashing / ontent Distribution 02/09/12 Scribe: Shilpa Nadimpalli Professor: Sanjeev Arora 1 Introduction to Internet ontent Distribution 1.1 The Hot-Spot Problem 1 ertain

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015

ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015 ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1

More information

Good VoIP vs. Bad VoIP

Good VoIP vs. Bad VoIP Good VoIP vs. Bad VoIP The term Voice over IP, or VoIP has been thrown around in a lot of different cirlces around the telecom industry. There seems to be growing confusion about what it is, whether or

More information

Advanced Software Test Design Techniques Use Cases

Advanced Software Test Design Techniques Use Cases Advanced Software Test Design Techniques Use Cases Introduction The following is an excerpt from my recently-published book, Advanced Software Testing: Volume 1. This is a book for test analysts and test

More information

6.02 Practice Problems: Routing

6.02 Practice Problems: Routing 1 of 9 6.02 Practice Problems: Routing IMPORTANT: IN ADDITION TO THESE PROBLEMS, PLEASE SOLVE THE PROBLEMS AT THE END OF CHAPTERS 17 AND 18. Problem 1. Consider the following networks: network I (containing

More information

Graph Theory and Topology Design

Graph Theory and Topology Design raph Theory and Topology esign avid Tipper ssociate Professor raduate Telecommunications and Networking Program University of Pittsburgh tipper@tele.pitt.edu Slides http://www.sis.pitt.edu/~dtipper/0.html

More information

The number of marks is given in brackets [ ] at the end of each question or part question. The total number of marks for this paper is 72.

The number of marks is given in brackets [ ] at the end of each question or part question. The total number of marks for this paper is 72. ADVANCED SUBSIDIARY GCE UNIT 4736/01 MATHEMATICS Decision Mathematics 1 THURSDAY 14 JUNE 2007 Afternoon Additional Materials: Answer Booklet (8 pages) List of Formulae (MF1) Time: 1 hour 30 minutes INSTRUCTIONS

More information

WRITING PROOFS. Christopher Heil Georgia Institute of Technology

WRITING PROOFS. Christopher Heil Georgia Institute of Technology WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this

More information

Contents. Corporate profile 4. Merchant Acquiring 12. Cooperation with Banks 18. Development Strategy 22. UCS Management 6.

Contents. Corporate profile 4. Merchant Acquiring 12. Cooperation with Banks 18. Development Strategy 22. UCS Management 6. United Card Service United Card Service Contents Corporate profile 4 UCS Management 6 Company History 8 UCS Today 9 Business Geography 10 UCS Team 11 Merchant Acquiring 12 Loyalty Programs 14 Gift Cards

More information

Speech Performance Solutions

Speech Performance Solutions Malden Electronics Speech Performance Solutions The REFERENCE for Speech Performance ssessment Speech Performance Solutions Issue 1.0 Malden Electronics Ltd. 2005 1 Product Overview Overview Malden Electronics

More information

Residence Hall Telecommunications Services

Residence Hall Telecommunications Services STUDENT AFFAIRS LEADERSHIP COUNCIL Residence Hall Telecommunications Services Custom Research Brief TABLE OF CONTENTS RESEARCH ASSOCIATE David Godow RESEARCH MANAGER Katie Sue Zellner I. Research Methodology

More information

Advantages of Broadband Phone Services

Advantages of Broadband Phone Services CHAPTER3 Advantages of Broadband Phone Services Why are so many people subscribing to broadband phone services, either as an additional phone line or as a complete replacement to their traditional phone

More information

- Easy to insert & delete in O(1) time - Don t need to estimate total memory needed. - Hard to search in less than O(n) time

- Easy to insert & delete in O(1) time - Don t need to estimate total memory needed. - Hard to search in less than O(n) time Skip Lists CMSC 420 Linked Lists Benefits & Drawbacks Benefits: - Easy to insert & delete in O(1) time - Don t need to estimate total memory needed Drawbacks: - Hard to search in less than O(n) time (binary

More information

Network Structure or Topology

Network Structure or Topology Volume 1, Issue 2, July 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Network Structure or Topology Kartik

More information

PUSH BUTTON START INSTALLATION MANUAL

PUSH BUTTON START INSTALLATION MANUAL PUSH BUTTON START INSTALLATION MANUAL ALTHOUGH THIS PRODUCT HAS BEEN THOROUGHLY TESTED KPIERSON TECHNOLOGIES ASSUMES NO RESPONSIBILITY FOR ANY DAMAGE THAT MAY RESULT BY THE INSTALLATION OF THIS PRODUCT.

More information

Don t Buy a VoIP Phone System Before You Read This Report

Don t Buy a VoIP Phone System Before You Read This Report Don t Buy a VoIP Phone System Before You Read This Report VoIP means Voice over Internet Protocol Not Voice over the Internet By Greg Eicke Introducing Greg Eicke My name is Greg Eicke and I ve been working

More information

Binary Search Trees CMPSC 122

Binary Search Trees CMPSC 122 Binary Search Trees CMPSC 122 Note: This notes packet has significant overlap with the first set of trees notes I do in CMPSC 360, but goes into much greater depth on turning BSTs into pseudocode than

More information

A Tutorial on the Decibel

A Tutorial on the Decibel A Tutorial on the Decibel This tutorial combines information from several authors, including Bob DeVarney, W1ICW; Walter Bahnzaf, WB1ANE; and Ward Silver, NØAX Decibels are part of many questions in the

More information

Meraki Stacking. White Paper

Meraki Stacking. White Paper White Paper Meraki Stacking OCTOBER 2015 This document describes the benefits of Meraki Stacking technology and how it can be used to manage a distributed network. In addition, this document will cover

More information

14 Day Speed Training Challenge! Instructions. by AthleticQuickness.com

14 Day Speed Training Challenge! Instructions. by AthleticQuickness.com 1 14 Day Speed Training Challenge! Instructions by AthleticQuickness.com 2 Dr. Larry Van Such (the Author and Publisher), the Sales Agents and the Distributors of this program individually and collectively

More information

J son & Partners Consulting presents short summary of research «2012-2017 Pay-TV Market Current Status and Forecasts».

J son & Partners Consulting presents short summary of research «2012-2017 Pay-TV Market Current Status and Forecasts». J son & Partners Consulting presents short summary of research «2012-2017 Pay-TV Market Current Status and Forecasts». Russia s pay-tv market is one of the largest in the world, totaling 31.9 million households

More information

1. Introduction. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 11

1. Introduction. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 11 1. Introduction VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 11 1.1 Telephone and Data Networks...3 1.2 The classic Telecommunication System and Connections...4 1.3 The Voice over IP Concept

More information

Internet and Services

Internet and Services 3 Internet and Services 3.1 INTRODUCTION The Internet began way back in 1969 when it was called ARPANet (Advanced Research Project Agency Network) and was used exclusively for military purposes. It soon

More information

Settling the VoIP Debate. Hosted VoIP vs. VoIP PBX

Settling the VoIP Debate. Hosted VoIP vs. VoIP PBX Settling the VoIP Debate Hosted VoIP vs. VoIP PBX Introduction As high-speed Internet access is fast becoming omnipresent, the lure of Voice over Internet Protocol (VoIP) phone systems is growing in popularity

More information

Disaster Recovery Strategy for T1 circuits. One in a series of white papers published by AHK & Associates.

Disaster Recovery Strategy for T1 circuits. One in a series of white papers published by AHK & Associates. Disaster Recovery Strategy for T1 circuits One in a series of white papers published by AHK & Associates. Disaster Recovery Strategy for T1 circuits Copyright 2002 by AHK Associates, Inc Unlimited right

More information

PCB ROUTERS AND ROUTING METHODS

PCB ROUTERS AND ROUTING METHODS PCB ROUTERS AND ROUTING METHODS BY: LEE W. RITCHEY, SPEEDING EDGE, COPYRIGHT SPEEDING EDGE DECEMBER 1999 FOR PUBLICATION IN FEBRUARY ISSUE OF PC DESIGN MAGAZINE INTRODUCTION Routing of printed circuit

More information

Data Structures Fibonacci Heaps, Amortized Analysis

Data Structures Fibonacci Heaps, Amortized Analysis Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:

More information

Digital Voice Services User Guide

Digital Voice Services User Guide Digital Voice Services User Guide * Feature Access Codes *72 Call Forwarding Always Activation *73 Call Forwarding Always Deactivation *90 Call Forwarding Busy Activation *91 Call Forwarding Busy Deactivation

More information

When we rolled out The Big Plan this fall we stressed that it was our philosophy and guidepost for what we do in the next 3 years for Minnesota.

When we rolled out The Big Plan this fall we stressed that it was our philosophy and guidepost for what we do in the next 3 years for Minnesota. 1 When we rolled out The Big Plan this fall we stressed that it was our philosophy and guidepost for what we do in the next 3 years for Minnesota. Now we have some specifics: One step in creating healthy,

More information

Chapter 15: Dynamic Programming

Chapter 15: Dynamic Programming Chapter 15: Dynamic Programming Dynamic programming is a general approach to making a sequence of interrelated decisions in an optimum way. While we can describe the general characteristics, the details

More information

Cox Digital Telephone Quick Guide

Cox Digital Telephone Quick Guide Cox Digital Telephone Quick Guide Managing Your Calls Voice Mail Phone Tools Quick Reference Guides 2010 CoxCom, Inc. dba Cox Communications Arizona. All rights reserved. Welcome People love choices. Digital

More information

ET225 Networking Concepts. Chapter 1 What is a Computer Network?

ET225 Networking Concepts. Chapter 1 What is a Computer Network? ET225 Networking Concepts Chapter 1 What is a Computer Network? Objectives Identify the advantages of connecting computers and devices on a network. Recognize common network components in a lab setting.

More information

Introduction to Computer Networks and Data Communications

Introduction to Computer Networks and Data Communications Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the

More information

Graph Theory Problems and Solutions

Graph Theory Problems and Solutions raph Theory Problems and Solutions Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles November, 005 Problems. Prove that the sum of the degrees of the vertices of any finite graph is

More information

TWISTED PAIR CABLING FOR DIGITAL AV SIGNALS

TWISTED PAIR CABLING FOR DIGITAL AV SIGNALS TWISTED PAIR CABLING FOR DIGITAL AV SIGNALS By Brian Morris CTS August 2010 KRAMER WHITE PAPER WWW.KRAMERELECTRONICS.COM TABLE OF CONTENTS SOLID AND STRANDED CABLES...1 CONNECTORS...2 SHIELDINGS...2 CONCLUSION...3

More information

Decision Making under Uncertainty

Decision Making under Uncertainty 6.825 Techniques in Artificial Intelligence Decision Making under Uncertainty How to make one decision in the face of uncertainty Lecture 19 1 In the next two lectures, we ll look at the question of how

More information

Load Planning for Less-than-truckload Carriers. Martin Savelsbergh

Load Planning for Less-than-truckload Carriers. Martin Savelsbergh Load Planning for Less-than-truckload Carriers Martin Savelsbergh Centre for Optimal Planning and Operations School of Mathematical and Physical Sciences University of Newcastle Optimisation in Industry,

More information

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6) reas for Discussion Direct Link Networks Joseph Spring School of Computer Science Sc - Computer Network Protocols & rch s ased on Chapter 2, Peterson & Davie, Computer Networks: Systems pproach, 5 th Ed

More information

why fixed.plan? We only connect to Tier 1 partners, including Openreach, BT and Talk Talk Business, ensuring a robust and reliable service.

why fixed.plan? We only connect to Tier 1 partners, including Openreach, BT and Talk Talk Business, ensuring a robust and reliable service. fixed.plan Operating directly with tier 1 suppliers including Openreach, BT and TalkTalk Business plan com provides you with access to the biggest and most reliable telecommunications networks in the UK.

More information

Mutual Fund Expense Information on Quarterly Shareholder Statements

Mutual Fund Expense Information on Quarterly Shareholder Statements June 2005 Mutual Fund Expense Information on Quarterly Shareholder Statements You may have noticed that beginning with your March 31 quarterly statement from AllianceBernstein, two new sections have been

More information

Chapter 15: Distributed Structures. Topology

Chapter 15: Distributed Structures. Topology 1 1 Chapter 15: Distributed Structures Topology Network Types Operating System Concepts 15.1 Topology Sites in the system can be physically connected in a variety of ways; they are compared with respect

More information

Professor: Ian Foster TAs: Xuehai Zhang, Yong Zhao. Winter Quarter. www.classes.cs.uchicago.edu/classes/archive/2003/winter/54001-1

Professor: Ian Foster TAs: Xuehai Zhang, Yong Zhao. Winter Quarter. www.classes.cs.uchicago.edu/classes/archive/2003/winter/54001-1 Professor: Ian oster Ts: Xuehai Zhang, Yong Zhao Winter Quarter www.classes.cs.uchicago.edu/classes/archive//winter/541-1 alculate the total time required to transfer a 1 KB file (RTT=1 ms, packet size

More information

KKC main lines of business

KKC main lines of business KKC main lines of business KKC Group of Companies KKC Group of Companies Founded: 1991 HQ: Moscow, Russia Number of employees: 240 Turnover: US $50,000,000 (2011) Subsidiaries: Saint-Petersburg, Sochi,

More information

NAME DATE PERIOD. Study Guide and Intervention

NAME DATE PERIOD. Study Guide and Intervention opyright Glencoe/McGraw-Hill, a division of he McGraw-Hill ompanies, Inc. 5-1 M IO tudy Guide and Intervention isectors, Medians, and ltitudes erpendicular isectors and ngle isectors perpendicular bisector

More information

Cpt S 223. School of EECS, WSU

Cpt S 223. School of EECS, WSU The Shortest Path Problem 1 Shortest-Path Algorithms Find the shortest path from point A to point B Shortest in time, distance, cost, Numerous applications Map navigation Flight itineraries Circuit wiring

More information

Network Design Best Practices for Deploying WLAN Switches

Network Design Best Practices for Deploying WLAN Switches Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone

More information

Voice and Delivery Data Networks

Voice and Delivery Data Networks Voice and Delivery Data Networks Chapter 11 Learning Objectives After reading this chapter, you should be able to: Identify the basic elements of a telephone system Describe the composition of the telephone

More information

Trimming Trees Near Electric Lines. Understanding Niagara Mohawk s Role and Responsibilities

Trimming Trees Near Electric Lines. Understanding Niagara Mohawk s Role and Responsibilities Trimming Trees Near Electric Lines Understanding Niagara Mohawk s Role and Responsibilities Staying Connected If you ve called Niagara Mohawk with a tree-trimming request, you know we ask a lot of questions.

More information

New protocol concept for wireless MIDI connections via Bluetooth

New protocol concept for wireless MIDI connections via Bluetooth Wireless MIDI over Bluetooth 1 New protocol concept for wireless MIDI connections via Bluetooth CSABA HUSZTY, GÉZA BALÁZS Dept. of Telecommunications and Media Informatics, Budapest University of Technology

More information

A Quick Reference to Telephone Features and Services

A Quick Reference to Telephone Features and Services A Quick Reference to Telephone Features and Services Table of Contents I. Individual Features A. Call Waiting B. Cancel Call Waiting C. Three-Way Calling D. Speed Calling E. Call Return F. Repeat Dialing

More information

Changing locations every day. Can service be as mobile as a locomotive?

Changing locations every day. Can service be as mobile as a locomotive? Changing locations every day. Can service be as mobile as a locomotive? Railcover the flexible service concept for increased vehicle availability and optimized maintenance for your locomotives. Answers

More information

InfiniBand Clustering

InfiniBand Clustering White Paper InfiniBand Clustering Delivering Better Price/Performance than Ethernet 1.0 Introduction High performance computing clusters typically utilize Clos networks, more commonly known as Fat Tree

More information

Topology and Topological Rules Geometric properties that are maintained in spatial databases

Topology and Topological Rules Geometric properties that are maintained in spatial databases Topology and Topological Rules Geometric properties that are maintained in spatial databases The definition of topology Topology is a term used around GIS that is sometimes confused with the term topography.

More information

How DSL Works. by Curt Franklin

How DSL Works. by Curt Franklin by Curt Franklin How DSL Works When you connect to the Internet, you might connect through a regular modem, through a localarea network connection in your office, through a cable modem or through a digital

More information

[PRIVATE LABEL TELEPHONY SOLUTION]

[PRIVATE LABEL TELEPHONY SOLUTION] POWERED BY: [PRIVATE LABEL TELEPHONY SOLUTION] DISTRIBUTION UNDER 3NG NETWORKS NON-DISCLOSURE AGREEMENT ONLY Table of Contents INTRODUCTION:... 3 MISSION:... 4 OVERVIEW:... 5 WHAT DO OUR PARTNERS GET WITH

More information

Speed bump. Acceleration-ramp blues on the information superhighway

Speed bump. Acceleration-ramp blues on the information superhighway Speed bump Acceleration-ramp blues on the information superhighway The signs on the Infobahn say, Full Speed Ahead... but some bumps in the road might send unlucky travelers hurtling off the edge and into

More information

UniCredit Leasing. Right partner for expanding your business. Sales Department

UniCredit Leasing. Right partner for expanding your business. Sales Department UniCredit Leasing Right partner for expanding your business Sales Department Moscow, 31 December, 2015 Table of contents 1. UNICREDIT LEASING AT A GLANCE Leading market player Solid leasing expertise Consistent

More information

VEHICLE ROUTING PROBLEM

VEHICLE ROUTING PROBLEM VEHICLE ROUTING PROBLEM Readings: E&M 0 Topics: versus TSP Solution methods Decision support systems for Relationship between TSP and Vehicle routing problem () is similar to the Traveling salesman problem

More information

Ultra High-Speed SONET Fiber-Optic Transmission System

Ultra High-Speed SONET Fiber-Optic Transmission System Ultra High-Speed Fiber-Optic Transmission System Takashi Mori Hirokuni Tsuji Hiroyuki Nakano, D.E. Shigeo Shinada ABSTRACT: Recently, there have been numerous demands not only on voice but also data/image

More information

Bandwidth Optimization Solutions: Building Cost-Effective Backup Protection Networks. Application Note

Bandwidth Optimization Solutions: Building Cost-Effective Backup Protection Networks. Application Note Bandwidth Optimization Solutions: Building Cost-Effective Protection Networks Executive Summary Ensuring service and revenue generation in the event of technical failures or external events presents challenges

More information

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses IP Telephony Basics Part of The Technology Overview Series for Small and Medium Businesses What is IP Telephony? IP Telephony uses the Internet Protocol (IP) to transmit voice or FAX traffic over a public

More information

KVM Cable Length Best Practices Guide

KVM Cable Length Best Practices Guide Infrastructure Management & Monitoring for Business-Critical Continuity TM KVM Cable Length Best Practices Guide What Customers Need to Know About Cable Length and Video Quality Cable Length and Video

More information

why fixed.plan? We only connect to Tier 1 partners, including Openreach, BT and Talk Talk Business, ensuring a robust and reliable service.

why fixed.plan? We only connect to Tier 1 partners, including Openreach, BT and Talk Talk Business, ensuring a robust and reliable service. fixed.plan Operating directly with tier 1 suppliers including Openreach, BT and TalkTalk Business plan.com provides you with access to the biggest and most reliable telecommunications networks in the UK.

More information

Introduction to Java and Eclipse

Introduction to Java and Eclipse Algorithms and Data-Structures Exercise Week 0 Outline 1 Introduction Motivation The Example 2 Setting things up Setting command line parameters in Eclipse 3 Debugging Understanding stack traces Breakpoints

More information

Information Systems Infrastructure. Learning Objectives. Components of Campus Telecommunications Infrastructure

Information Systems Infrastructure. Learning Objectives. Components of Campus Telecommunications Infrastructure Information Systems Infrastructure APPA-Institute for Facilities Management J. Craig Klimczak, D.V.M., M.S. 321 South Mosley Road St. Louis, MO 63141 compuvet@aol.com Learning Objectives Become familiar

More information

CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.

CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92. Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure

More information

The Conversion Technology Experts. Media Conversion: Cost-Effectively Integrating T1 into your Fiber Network

The Conversion Technology Experts. Media Conversion: Cost-Effectively Integrating T1 into your Fiber Network The Conversion Technology Experts Media Conversion: Cost-Effectively Integrating T1 into your Fiber Network Media Conversion: Cost Effectively Integrating T1 into Your Fiber Network Revealing some simple

More information

GOD S BIG STORY Week 1: Creation God Saw That It Was Good 1. LEADER PREPARATION

GOD S BIG STORY Week 1: Creation God Saw That It Was Good 1. LEADER PREPARATION This includes: 1. Leader Preparation 2. Lesson Guide GOD S BIG STORY Week 1: Creation God Saw That It Was Good 1. LEADER PREPARATION LESSON OVERVIEW Exploring the first two chapters of Genesis provides

More information