Skip to main content Accessibility help
×
Hostname: page-component-84b7d79bbc-fnpn6 Total loading time: 0 Render date: 2024-07-30T04:19:49.321Z Has data issue: false hasContentIssue false

6 - Solving the rainbow network flow problem

from Part II - The lossy scenario

Published online by Cambridge University Press:  07 October 2011

Nima Sarshar
Affiliation:
University of Regina, Saskatchewan, Canada
Xiaolin Wu
Affiliation:
McMaster University, Ontario
Jia Wang
Affiliation:
Shanghai Jiao Tong University, China
Sorina Dumitrescu
Affiliation:
McMaster University, Ontario
Get access

Summary

The methods proposed in the previous chapter rely on our ability to find a, perhaps approximate, solution to the RNF problem, and in particular the CRNF problem. Once such a solution is found, the design of the MDC codes with PET technique is straightforward. This chapter is a more detailed algorithmic account of RNF and in particular the CRNF problem.

We start by proving the CRNF problem to be NP-Hard in Section 6.1, even on Directed Acyclic Graph (DAG) network topologies. In Section 6.2, we show that the CRNF problem can be posed as an integer linear program for DAGs. The problem can therefore be solved for moderate network sizes using existing numerical optimization packages.

For large networks, the results in Section 6.1 suggest that the exact solution to the linear integer program formulated in Section 6.2 can not be found efficiently. While the CRNF problem is NP-Hard even on DAGs, we find a polynomial-time solution for a generalized tree topology. If the network graph can be appropriately decomposed into tree components, then a dynamic programming algorithm can be applied to solve the CRNF problem exactly for a general distortion function δ(k). The development of this algorithm is the subject of Section 6.3.

Complexity results of the CRNF problem

In this section, we prove that the CRNF problem is NP-Hard. The proof is constructed by reducing the well-known NP-hard problem of graph 3-colorability [42] to a special instance of CRNF on a DAG, where there is only a single server node.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×