PROTOTYPE TO DESIGN A LEASED LINE TELEPHONE NETWORK CONNECTING LOCATIONS TO MINIMIZE THE INSTALLATION COST



Similar documents
On the k-path cover problem for cacti

Determination of the normalization level of database schemas through equivalence classes of attributes

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design

A Quantitative Decision Support Framework for Optimal Railway Capacity Planning

Building Alternate Multicasting Trees in MPLS Networks

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION

Competitive Analysis of On line Randomized Call Control in Cellular Networks

Social Media Mining. Graph Essentials

Chapter 6: Graph Theory

A Network Flow Approach in Cloud Computing

A Comparison of General Approaches to Multiprocessor Scheduling

A scalable multilevel algorithm for graph clustering and community structure detection

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Euler Paths and Euler Circuits

A Review And Evaluations Of Shortest Path Algorithms

Picture Maze Generation by Successive Insertion of Path Segment

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

An Empirical Study of Two MIS Algorithms

The Binary Blocking Flow Algorithm. Andrew V. Goldberg Microsoft Research Silicon Valley goldberg/

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs

Optical interconnection networks with time slot routing

Computational Approach for Assessment of Critical Infrastructure in Network Systems

IMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT

A MULTI-PERIOD INVESTMENT SELECTION MODEL FOR STRATEGIC RAILWAY CAPACITY PLANNING

The Binary Blocking Flow Algorithm. Andrew V. Goldberg Microsoft Research Silicon Valley goldberg/

Schedule Risk Analysis Simulator using Beta Distribution

Class One: Degree Sequences

A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy

Managing End-to-end Network performance via. Optimized Monitoring Strategies

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES

1 Introduction. Dr. T. Srinivas Department of Mathematics Kakatiya University Warangal , AP, INDIA

International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14

Lecture 7: NP-Complete Problems

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA

Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks

Topology-based network security

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

Weakly Secure Network Coding

Protracted Network: Quality of Service

Matthias F.M. Stallmann Department of Computer Science North Carolina State University Raleigh, NC

Connected Identifying Codes for Sensor Network Monitoring

An Evaluation of Network Survivability When Defense Levels Are Discounted by the Accumulated Experience of Attackers

DATA ANALYSIS II. Matrix Algorithms

Cycle transversals in bounded degree graphs

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

Graph Classification and Easy Reliability Polynomials

Clique coloring B 1 -EPG graphs

3D On-chip Data Center Networks Using Circuit Switches and Packet Switches

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

Boulder Dash is NP hard

Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.

Lower bounds for Howard s algorithm for finding Minimum Mean-Cost Cycles

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information

A New Marketing Channel Management Strategy Based on Frequent Subtree Mining

New Distributed Algorithm for Connected Dominating Set in Wireless Ad Hoc Networks

An Analysis on Density Based Clustering of Multi Dimensional Spatial Data

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis

International Journal of Advanced Research in Computer Science and Software Engineering

Mathematics for Algorithm and System Analysis

8.1 Min Degree Spanning Tree

Genetic Algorithm Based Interconnection Network Topology Optimization Analysis

Hadoop Technology for Flow Analysis of the Internet Traffic

Rising Rates in Random institute (R&I)

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010

The Classes P and NP. mohamed@elwakil.net

Fast Edge Splitting and Edmonds Arborescence Construction for Unweighted Graphs

Research on the UHF RFID Channel Coding Technology based on Simulink

P versus NP, and More

WOLLONGONG COLLEGE AUSTRALIA. Diploma in Information Technology

Optimal Bandwidth Reservation in Hose-Model VPNs with Multi-Path Routing

ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J.

Introduction to LAN/WAN. Network Layer

2 SYSTEM DESCRIPTION TECHNIQUES

Decentralized Utility-based Sensor Network Design

PROBABILITY AND STATISTICS. Ma To teach a knowledge of combinatorial reasoning.

An Integrated System Design for Telecom Operators Investment Management

A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK

AN APPROACH FOR TESTING THE DESIGN OF WEBSITE

Exact Polynomial-time Algorithm for the Clique Problem and P = NP for Clique Problem

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Link Identifiability in Communication Networks with Two Monitors

BOUNDARY EDGE DOMINATION IN GRAPHS

Comparative Analysis of Congestion Control Algorithms Using ns-2

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Using Adversary Structures to Analyze Network Models,

Multi-layer Structure of Data Center Based on Steiner Triple System

Locating Randomly Selected Destinations in Large Multi-hop Wireless Networks

Efficient Detection of Ddos Attacks by Entropy Variation

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Performance of networks containing both MaxNet and SumNet links

GameTime: A Toolkit for Timing Analysis of Software

Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks*

Midterm Practice Problems

Chapter 10: Network Flow Programming

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]

Transcription:

PROTOTYPE TO DESIGN A LEASED LINE TELEPHONE NETWORK CONNECTING LOCATIONS TO MINIMIZE THE INSTALLATION COST Abstract ARCHANA SHARMA Research Scholar, Computer Science and Enginering Department,, NIMS University, Jaipur, Rajasthan, India * adi_arch73@yahoo.co.in V.K.GUPTA University of Rajasthan, Jaipur, Rajasthan,, India vinodgupta02@gmail.com Network flows have many real-life applications and leased-line installation for telephone network is one of them. In the leased line a major concern is to provide connection of telephone to all the locations. It is required to install the leased line network that reaches all the locations at the minimum cost. This chapter deals with this situation with the help of a network diagram in which each node represents the locations and the edge between each node represents leased line. Each edge has a number attached to it which represents the cost associated with installing that link. Aim of the paper is to determine the leased line network connecting all the locations at minimum cost of installation. Keywords: Weighted network; Minimal spanning tree. 1. Introduction Gonery et.al (191) presented multiterminal network flows. Ford and Fulkerson (192) discussed flows in networks. Naylor et.al. (19) presented computer simulation techniques on simulation of inventory models. Jansson (19) discussed different methods of generating random numbers. Pritsker and Kiviat (199) studied computer simulation in network system. Frank et.al(1971) discussed communication, transmission and transportation networks. Edmonds and Karp(1972) presented theoretical improvements in algorithmic efficiency for network flow problems. Even and Tarjan(197) considered network flow and testing graph connectivity. Simulation with digital computer was dealt by Deo(1979). Kennington et.al(190) wrote a book on algorithms for network programming. Tarjan (193) discussed data structures and network algorithms. Orlin (19) presented a faster strongly polynomial minimum cost flow algorithm. Vaidya (19) discussed minimum spanning trees in k-dimensional space. Law and Kelton(1991) presented simulation, modeling and analysis. Ahuja et.al.(1993) discussed network flows: theory, algorithms, and applications. Chan(199) considered backward analysis of the Karger-Klien-Tarjan algorithm for minimum spanning trees. Stallings (02) discussed various minimum spanning tree algorithms in a book on Data and Computer Communications. Katriel et.al.(03) presented practical minimum spanning tree algorithm using the cycle property. Various network models have been presented by Sharma(03). Dementiev et.al.(04) discussed an external memory minimum spanning tree algorithm. Vaidyanathan et.al.(07) studied a network flow-based approaches to the railroad crew scheduling problem which assigns train operators to scheduled trains over a time horizon (generally a week) at minimal cost, while honoring several operational and contractual requirements. Aim of the chapter is to investigate simulation of leased line network to minimize the installation cost of leased line that reaches to all the locations. ISSN : 097-1 Vol. 2 No. 4 Aug -Sep 11 47

2. Model of Real-Life System A network can be represented by a graph or network diagram which consists of nodes and edges. Nodes are endpoints and are represented by numbered or labeled circles in the diagram. Fig.1 indicates two nodes i and j connected with the help of an edge. Fig.1. Nodes and edges Nodes represents points at which a flow originates, terminates or is relayed. Edges are used to connect pairs of nodes, and they indicate a relationship between the connected nodes. Airline routes, telephone wires, pipelines, roadways etc. can also be represented by edges. A sequence of nodes and edges connecting any two nodes is called a chain and when the direction is specified, then it is called a path. A cycle is a chain that connects a node to itself. A network K is said to be connected, if there is at least one path between every pair of vertices in network. A tree is a connected set of nodes containing no cycles. If there is a real number associated with each edge of the network, then it is called the weighted network(see Fig.2). A tree T is said to be spanning tree of a connected network K if T is a subnetwork of K and T contains all the nodes of K(see Fig.3). In a weighted network, spanning tree with the minimum weight is called a minimal spanning tree(see Fig.4). 1 1 Fig.2. Weighted network diagram 2 1 Fig.3. Spanning tree of the weighted network Fig.4. Minimal Spanning tree of the weighted network ISSN : 097-1 Vol. 2 No. 4 Aug -Sep 11 4

There are many algorithms for finding out the minimal spanning tree. One of them is Kruskals algorithm. The following notations are used: n = set of nodes, e = edge, M = set of edges so far incorporated by the algorithm, W(e i ) = weight of ith vertex, K = network, T = Spanning tree. The algorithm has three steps; step-1 and step-2 are repeated until number of edges in M is equal to n-1. Step-1: Choose an edge e 1 of the network K such that w(e 1 ) is the smallest and it is not a loop. M={e 1 } Step-2: If e 1,e 2,e 3..e i edges have been chosen, then choose an edge e i+1 not already chosen such that (i) the subgraphs having edges e 1,e 2,.e i+1 is acyclic, (ii) weight of e i+1, w(e i+1 ) is the smallest. Step-3: If there are n nodes, then repeat step-1 and step-2 till there are (n-1) edges in M. After completion of this algorithm, network diagram K gives a minimal spanning tree T which gives the minimum total cost. 3. Simulation of the Model In installation of leased line for telephone network, nodes are the locations and the leased-line are considered as edges. Every edge is attached with a real number which is the cost of installing leased line between the two cities. The cost includes cost of wire, labour and equipment. From the network diagram construct a minimal spanning tree which gives the minimum total cost. Start Read number of fields n, starting field and the destination field of the edge Generate cost associated with each egde randomly Create a network diagram based on the data Start creating a minimal spanning tree by selecting an edge Ei with the smallest cost. Add this edge to the spanning tree Select another edge Ek from the remaining edges with the smallest cost and which is not forming a circuit with the already selected edges. Add this edge to the spanning tree No Are edges selected = (n-1)? Yes Print the minimal spanning tree and the minimum total cost of leased-line installation Stop Fig.. Flowchart of Program ISSN : 097-1 Vol. 2 No. 4 Aug -Sep 11 49

To simulate the leased line model, a programme in C language is prepared. A flowchart of this program is shown in Fig.. In this model cost of installing leased line is stochastic. This cost is generated from the uniform distribution with the help of a random function. Present model is tested on various datasets. A particular dataset is considered in this paper in which there are locations. The results of the model are obtained and output is taken in Excel Worksheet which is used for generating various graphs from which conclusions are drawn. 4. Results and Discussion A network flow diagram showing all the connections between the locations is shown in Fig.. The nodes of the network indicates the locations and the edges indicates the link between the locations and the number represents the cost associated with that particular link. A minimal spanning tree is shown in Fig.7. This network covers all the nodes and the sum of all the costs of edges gives the total installation cost of leased line which is minimum. Table 1 shows the initial data for the network and the spanning tree data. 1 9 2 7 0 233 94 2 1 97 1 3 1 13 9 12 1 17 1 30 17 191 217 70 0 9 22 3 14 22 241 4 292 11 172 1 221 243 1 7 3 13 1 9 2 191 1 97 1 94 9 17 1 17 217 70 0 9 22 3 14 4 11 172 1 14 1 19 14 1 19 Fig.. Network diagram showing connections between locations Fig.7. Minimal spanning tree with minimum total cost ISSN : 097-1 Vol. 2 No. 4 Aug -Sep 11 0

Table 1. Network input information and the corresponding minimal spanning tree information Network input information Minimal spanning tree Edges Starting City Destination City Cost of installation Edges Starting City Destination City Cost of installation 1 1 2 9 1 4 2 1 1 2 2 17 9 3 1 7 3 9 3 4 1 1 97 4 17 1 1 2 3 17 1 3 7 191 1 2 9 7 7 0 7 9 70 7 1 233 13 9 9 1 94 9 1 94 3 22 1 1 97 11 3 4 14 11 9 0 217 3 4 14 13 4 241 13 2 3 17 14 292 14 14 19 1 1 4 1 172 1 9 3 1 3 7 191 17 1 13 1 17 11 1 1 1 1 217 19 9 70 19 14 22 13 9 21 17 9 22 13 17 12 23 17 1 1 Minimum installation cost=rs.2170/- 24 9 0 2 1 14 30 2 14 22 27 14 19 1 2 11 221 29 11 1 30 172 31 19 243. Summary and Conclusion This model can be practically implemented for reducing the cost of installation. Given n-locations and the cost of installation of leased line between every pair of locations, this model helps in finding out the minimum installation cost by constructing a minimal spanning tree of the corresponding network. This model can be used for reducing the cost of installation in many areas such as fibre optic line, pipeline for refineries, electrical lines in industries etc. References [1] Ahuja, R.K.; Magnanti, T.L.; Orlin, J.B(1993): Network Flows: Theory, Algorithms, and Applications, Prentice-Hall, NY. [2] Chan, T.M.(199): Backward analysis of the Karger-Klien-Tarjan algorithm for minimum spanning trees Information Processing Letters, 7, pp.303-304. [3] Dementiev, R.; Sanders, P; Schultes, D.; Sibeyn, J. (04): Engineering an external memory minimum spanning tree algorithm, In 3rd IFIP International Conference on Theoretical Computer Science. [4] Deo, N.(1979) : System Simulation with Digital Computer, Prentice-Hall of India Pvt. Ltd., New Delhi. [] Edmonds, J. ; Karp, R. M.(1972): Theoretical improvements in algorithmic efficiency for network flow problems, J. ACM, 19, pp.24-24. [] Even, S. ; Tarjan, R.E.(197): Network Flow and Testing Graph Connectivity SIAM J. Comput., 4, pp.07-1. [7] Ford, L. R. ; Fulkerson(192): D. R. Flows in Networks, Princeton University Press. [] Gonery, R. E.; Hu, T. C.(191): Multiterminal Network Flows, J. SIAM, 9, pp.1-70. [9] Jansson, B.(19): Random Number Generators, Victor Pettersons, Stockholm. ISSN : 097-1 Vol. 2 No. 4 Aug -Sep 11 1

[] Katriel, I.; Sanders, P. ; Traff, J.L.(03): A practical minimum spanning tree algorithm using the cycle property, In 11th European Symposium on Algorithms (ESA). [11] Law, A. ; Kelton, W.D.(1991): Simulation, Modeling and Analysis, McGraw-Hill, New York, 1991. [] Naylor, T.H.; Balintfy, J.L.; Burdick, D.S. ; Chu, K.(19): Computer Simulation Techniques, John Wiley & Sons, New York. [13] Orlin, J. B. (19): A faster strongly polynomial minimum cost flow algorithm, Proc. th ACM Symposium Theorem of Computing. [14] Pritsker, A.A.B. ; Kiviat, P.J.(199): Simulation with GASP II, Prentice-Hall, Englewood Cliffs, N.J. [1] Sharma, S.D.(03): Operations Research, Kedarnath Ramnath & Co., Meerut, India. [1] Tarjan, R. E.(193) : Data Structures and Network Algorithms, SIAM Press. [17] Vaidya, P.M.(19): Minimum spanning trees in k-dimensional space, SIAM Journal on Computing, 17, pp.72-2. ISSN : 097-1 Vol. 2 No. 4 Aug -Sep 11 2

ISSN : 097-1 Vol. 2 No. 4 Aug -Sep 11 3