Near-optimal allocation of delay requirements on multicast trees

合集下载

讲价好处英文作文

讲价好处英文作文

讲价好处英文作文Title: The Benefits of Haggling: A Persuasive Essay。

In the realm of commerce, negotiation, or haggling asit's colloquially termed, often gets a bad rap. It's sometimes viewed as an uncomfortable dance, a confrontation between buyer and seller, each trying to outmaneuver the other. However, beneath the surface, haggling holds amyriad of benefits for both parties involved. In this essay, I will expound upon the advantages of negotiation in transactions.Firstly, haggling fosters a sense of empowerment forthe buyer. When one engages in negotiation, they areactively participating in the determination of the value of a product or service. This involvement instills a feelingof control and agency, as opposed to the passivity of accepting a fixed price without question. By advocating for a lower price, the buyer asserts their autonomy and challenges the notion that prices are immutable.Secondly, haggling encourages financial responsibility and prudence. When faced with the opportunity to negotiate, buyers are compelled to assess the true worth of the item in question. This evaluation involves considering factors such as quality, utility, and market value. Through this process, individuals become more discerning consumers, less prone to impulse purchases and more inclined to make informed decisions based on value for money.Moreover, negotiation cultivates interpersonal skills essential for navigating the complexities of social interactions. Effective haggling requires active listening, communication, and persuasion. It necessitates the ability to articulate one's needs and desires while also understanding the perspective of the other party. These interpersonal skills are invaluable, extending beyond the realm of commerce to enrich various aspects of personal and professional life.Furthermore, haggling promotes economic efficiency by fostering competition and driving prices towards theirequilibrium point. In a competitive market, sellers are compelled to offer the best possible price to attract customers. This dynamic creates an environment where prices are reflective of actual supply and demand forces, leadingto optimal allocation of resources. In essence, negotiation serves as a mechanism for market correction, ensuring fairness and efficiency in transactions.Additionally, haggling fosters cultural exchange and appreciation. In many cultures around the world,negotiation is not just a means to an end but a cherished tradition embedded in social interactions. Through haggling, individuals gain insights into different cultural norms, customs, and etiquettes. It serves as a bridge thatconnects people from diverse backgrounds, fostering mutual understanding and respect.Critics of haggling often argue that it can lead to conflict or discomfort. However, when approached with tact and respect, negotiation can be a harmonious and mutually beneficial endeavor. By focusing on common interests and exploring creative solutions, buyers and sellers can reachagreements that satisfy both parties. Conflict resolution skills developed through haggling can prove invaluable in resolving disputes in various contexts.In conclusion, haggling is not merely a tool for securing a better deal but a multifaceted practice withfar-reaching benefits. It empowers buyers, cultivates financial prudence, enhances interpersonal skills, promotes economic efficiency, fosters cultural exchange, and facilitates conflict resolution. Rather than shying away from negotiation, individuals should embrace it as a means to enrich their lives and enhance their interactions with others.。

two-stage stochastic programming

two-stage stochastic programming

two-stage stochastic programmingTwo-stage stochastic programming is a mathematical optimization approach used to solve decision-making problems under uncertainty. It is commonly applied in various fields such as operations research, finance, energy planning, and supply chain management. In this approach, decisions are made in two stages: the first stage involves decisions made before uncertainty is realized, and the second stage involves decisions made after observing the uncertain events.In two-stage stochastic programming, the decision-maker aims to optimize their decisions by considering both the expected value and the risk associated with different outcomes. The problem is typically formulated as a mathematical program with constraints and objective functions that capture the decision variables, uncertain parameters, and their probabilistic distributions.The first stage decisions are typically made with theknowledge of the uncertain parameters, but without knowing their actual realization. These decisions are usually strategic and long-term in nature, such as investment decisions, capacity planning, or resource allocation. The objective in the first stage is to minimize the expected cost or maximize the expected profit.The second stage decisions are made after observing the actual realization of the uncertain events. These decisions are typically tactical or operational in nature, such as production planning, inventory management, or scheduling. The objective in the second stage is to minimize the cost or maximize the profit given the realized values of the uncertain parameters.To solve two-stage stochastic programming problems, various solution methods can be employed. One common approach is to use scenario-based methods, where a set of scenarios representing different realizations of the uncertain events is generated. Each scenario is associated with a probability weight, and the problem is then transformed into a deterministic equivalent problem byreplacing the uncertain parameters with their corresponding scenario values. The deterministic problem can be solved using traditional optimization techniques such as linear programming or mixed-integer programming.Another approach is to use sample average approximation, where the expected value in the objective function is approximated by averaging the objective function valuesover a large number of randomly generated scenarios. This method can be computationally efficient but may introduce some approximation errors.Furthermore, there are also robust optimization techniques that aim to find solutions that are robust against the uncertainty, regardless of the actualrealization of the uncertain events. These methods focus on minimizing the worst-case cost or maximizing the worst-case profit.In summary, two-stage stochastic programming is a powerful approach for decision-making under uncertainty. It allows decision-makers to consider both the expected valueand the risk associated with uncertain events. By formulating the problem as a mathematical program and employing various solution methods, optimal or near-optimal solutions can be obtained to guide decision-making in a wide range of applications.。

用蚁群算法在刀库索引位置的优化配置外文翻译、英汉互译、中英对照

用蚁群算法在刀库索引位置的优化配置外文翻译、英汉互译、中英对照

Optimal allocation of index positions on tool magazines using an ant colony algorithmAbstract Generation of optimal index positions of cutting tools is an important task to reduce the non-machining time of CNC machines and for achievement of optimal process plans. The present work proposes an application of an ant colony algorithm, as a global search technique, for a quick identification of optimal or near optimal index positions of cutting tools to be used on the tool magazines of CNC machines for executing a certain set of manufacturing operations. Minimisation of total indexing time is taken as the objective function.Keywords Indexing time . Automatic tool change .CNC machine . Optimization . Ant colony algorithm1 IntroductionIn today’s manufacturing environment, several industries are adapting flexible manufacturing systems (FMS) to meet the ever-changing competitive market requirements. CNC machines are widely used in FMS due to their high flexibility in processing a wide range of operations of various parts and compatibility to be operated under a computer controlled system. The overall efficiency of the system increases when CNC machines are utilized to their maximum extent. So to improve the utilization, there is a need to allocate the positions of cutting tools optimally on the tool magazines.The cutting tools on CNC machines can be changed or positioned automatically when the cutting tools are called within the part program. To do this turrets are used in CNC lathe machines and automatic tool changers (ATC) in CNC milling machines. The present model can be used either for the ATC magazines or turrets on CNC machines.The indexing time is defined as the time elapsed in which a turret magazine/ATC moves between the two neighbouring tool stations or pockets. Bi-directional indexing of the tool magazine is always preferred over uni-directional indexing to reduce the non-machining time of the machine. In this the magazine rotates in both directions to select automatically the nearer path between the current station and target station. The present work considers bi-directional movement of the magazine. In bidirectional indexing, the difference between the index numbers of current station and target station is calculated in such a way that its value is smaller than or equal to half of the magazine capacity.Dereli et al. [1] formulated the present problem as a “traveling salesman problem” (TSP), which is NP complete. They applied genetic algorithms (GA) to solve the problem. Dorigo et al. [2, 3] introduced the ant colony algorithm (ACA) for solving the NP-complete problems. ACA can find the superior solution to other methods such as genetic algorithms, simulated annealing and evolutionary programming for large-sized NP-complete problems with minimum computational time. So, ACA hasbeen extended to solve the present problem.2 MethodologyDetermination of the optimal sequence of manufacturing operations is a prerequisite for the present problem. This sequence is usually determined based on minimum total set-up cost. The authors [4] suggested an application of ACA to find the optimal sequence of operations. Once the sequence of operations is determined, the following approach can be used to get the optimal arrangement of the tools on the magazine.Step 1 Initially a set of cutting tools required to execute the fixed (optimal) sequence of the manufacturing operations is assigned. Each operation is assigned a single cutting tool. Each tool is characterized by a certain number. For example, let the sequence of manufacturing operations{M1-M4-M3-M2-M6-M8-M9-M5-M7-M10} be assigned to the set of cutting tools {T8-T1-T6-T4-T3-T7-T8-T2-T6-T5}. The set of tools can be decoded as {8-1-6-4-3-7-8-2-6-5}. Here the manufacturing operation M1 requires cutting tool 8, M4 requires 1 and so on. In total there are eight different tools and thus eight factorial ways of tool sequences possible on the tool magazine.Step 2 ACA is applied as the optimization tool to find the best tool sequence that corresponds to the minimum total indexing time. For every sequence that is generated by the algorithm the same sequence of indexpositions (numbers) is assigned. For example, let the sequence of tools {4-6-7-8-2-5-3-1} be generated and hence assigned to the indexing positions {1-2-3-4-5-6-7-8} in the sequential order, i.e. tool 4 is assigned to the 1st position, tool 6 to the 2nd position and so on.Step 3 The differences between the index numbers of subsequent cutting tools are calculated and then totaled to determine the total number of unit rotations for each sequence of cutting tools. Absolute differences are to be taken while calculating the number of unit rotations required from current tool to target tool. This following section describes an example in detail.The first two operations M1 and M4 in the pre-assumed fixed sequence of operations require the cutting tools 8 and 1, respectively. The tool sequence generated by the algorithm is {4-6-7-8-2-5-3-1}. In this sequence tools 8 and 1 are placed in the 4th and 8th indexing positions of the turret/ ATC. Hence the total number of unit rotations required to reach from current tool 8 to target tool 1 is | 4-8 |= 4. Similarly the total number of unit rotations required for the entire sequence is | 4-8 |+| 8-2 |+| 2-1 |+| 1-7 |+| 7-3 |+| 3-4 |+|4-5 |+| 5-2 |+| 2-6 |=30.Step 4 Minimization of total indexing time is taken as the objective function. The value of the objective function is calculated by multiplying the total number of unit rotations with the catalogue value of turret/ATC index time. If an index time of 4 s is assumed then the total index timerequired for the tool sequence becomes 120 s.Step 5 As the number of iterations increases ACA converges to the optimal solution.3 Allocation policyThe following are the three cases where the total number of available positions can be related with the total number of cutting tools employed.Case 1 The number of index positions is equal to the number of cutting toolsCase 2 The number of index positions is greater than the number of cutting tools (a) without duplication of tools, (b) with duplication tools Case 3 The number of index positions is smaller than the number of cutting toolsIf the problem falls into case 1, duplication of cutting tools in the tooling set is not required as the second set-up always increases the non-machining time of the machine.Table 1 List of features and their abbreviationsIn case 2, the effect of duplication of cutting tools should be tested carefully. Most of the times the duplication of tooling is too expensive. Case 3 leads to finding the cutting tools to be used in the second set-up. However, other subphases are possible in cases 2(b) and 3. The duplicated tools may be used in such a way that no unloaded index is left on ATC or some indexing positions are left unloaded.Table 2 Operations assigned to the features4 Ant colony algorithmThe ant colony algorithm (ACA) is a population-based optimization approach that has been applied successfully to solve different combinatorial problems like traveling salesman problems [2, 3], quadratic assignment problems [5, 6], and job shop scheduling problems [7]. This algorithm is inspired by the foraging behaviour of real life ant colonies in which individual ants deposit a substance called pheromone on the path while moving from one point to another. The paths with higher pheromone would be more likely to be selected by the other ants resultingin further amplification of current pheromone trails. Because of this nature, after some time ants will select the shortest path. The algorithm as applicable to the present problem is described in the following section.It is assumed that there is ‘k’ number of ants and each ant corresponds to a particular node. The number of ants is taken as equal to the number of nodes required to execute the fixed set of manufacturing operations. The task of eachant is to generate a feasible solution by adding a new cutting\ tool at a time to the current one, till all operations are completed. An ant ‘k’ situated in state ‘r’ moves to state ‘s’ using the following state transition rule:Table 3 Cutting tools assigned to optimal sequence of operationsWhere τ (r, s) is called a pheromone level. τ (r, s)’s are changed at run time and are intended to indicate how useful it is to make move ‘s’ when in state ‘r’. η(r, s) is a heuristic function, which evaluates the utility of move ‘s’ when at ‘r’. In the present work, it is the inverse of the number of unit rotations required to move from ‘r’ to ‘s’.Parameter ‘β’ weighs the relative importance of the heuristic function. ‘q’ is a value chosen randomly with uniform probability in [0,1], and ‘q0’ e0 q0 1T is a parameter. The smaller the ‘q0’, the higher the probability to make a random choice. In short ‘q0’ determines the relative importance of exploitation versus exploration in Eq. 1.Jk(r) represents the number of states still to be visited by the ‘k’ antwhen at ‘r’.S is a random variable selected according to the distribution given by Eq. 2, which gives the probability with which an ant in operation ‘r’ chooses ‘s’ to move to.This state transition rule will favour transitions towards nodes connected by short edges with high amount of trail.4.1 Local updating ruleWhile building a solution, ants change their trails by applying the following local updating rule:Where τ0 represents the initial pheromone value.4.2 Global updating ruleGlobal trail updating provides a higher amount of trail to shorter solutions. In a sense this is similar to a reinforcement learning scheme in which better solutions get a higher reinforcement.Once all ants have completed their solutions, edges (r, s) belonging to the shortest solution made by an ant have their trail changed by applying the following global updating rule.Where Lbest-iter is the best solution obtained in an iteration that has the minimum total indexing time. ‘α’ is the pheromone decay parameter, which is a value in between 0 and 1. The parameter values [3] are set as β=2, q0=0.9, and..4.3 Local search mechanismMany ant systems are hybrid algorithms employing some kind of local optimization techniques such as 2-opt technique, tabu search, simulated annealing etc. Once each ant has constructed a solution, a local search mechanism is used to further improve the solution to its localoptimum and finally the pheromone levels are updated based on its solution. This integration significantly increases the effectiveness and efficiency of ant colony algorithms. In the present work, the 2-opt technique is used as the local search.Fig. 3 Convergence of ACA5 Case studyThe example part taken for the present work is shown in Fig. 1. It contains 18 features. The features and their abbreviations are listed in Table 1. The operations required to execute the features are exhibited in Table 2. The preassumed fixed sequence of operations and the assignment of a cutting tool to each operation are shown in Table 3. The maximum number of cutting tools and the indexing time of ATC are taken as 28 and 0.69 s, respectively. The objective lies in finding the positions of cutting tools on the tool magazine for completing the sequence of operations: M1-M2-M3-M4-M5-M6-M7-M8-M9-M10-M11-M12-M13-M14-M15-M16-M17-M18-M19-M20-M21-M22-M23-M24-M25-M26-M27. The corresponding tools required to perform the above operations in the sequential order are T1-T1-T2-T3-T4-T2-T2-T2-T2-T5-T6-T5-T7-T5-T5-T8-T9-T5-T10-T5-T11-T5-T12-T5-T13-T5-T14.The total number of different tools required here are 14and hence there are 14 (!) ways of sequencing the cutting tools.The problem described here falls into case 2(a) where the total number of index positions is greater than the number of cutting tools without duplication of tools. ACA is applied to get the set of positions of cutting tools that results in the minimum total indexing time to complete the above stated fixed sequence of operations.execution time has been reduced to 14 s. It is observed that ACA gets the optimal solution in quicker time than GA. Figure 3 exhibits the convergence of ACA. The best solution obtained in each iteration is plotted against the iteration number. The optimal solution is obtained in the 10th iteration. To ensure the optimal solution, the graph is extended for a maximum of 18 iterations.7 ConclusionSince the present problem can be modeled as a traveling salesman problem, the present work deals with the development of an ACA-based system for the optimization of turret index positions of cutting tools to be used on the turret or ATC magazine of the CNC machine tools. Even asmall saving in the total turret indexing time will cause a significant increase in machining time in high-volume production. This leads to increased utilization of CNC machine tools and hence the overall efficiency of the system.References1. Dereli T, Filiz H (2000) Allocating optimal index positions ontool magazines using genetic algorithms. Robotics Auton Syst33:155–1672. Dorigo M, Maniezzo V, Colorni A (1996) The ant system: optimisation by a colony of cooperating agents. IEEE TransSyst Man Cybern 26(1):29–413. Dorigo M, Gambardella LM (1997) Ant colony system: A cooperative learning approach to the traveling salesman problem.IEEE Trans Evol Comput 1(1)53–664. Krishna AG, Rao KM (2004) Optimisation of operationssequence in CAPP using ant colony algorithm. Int J Adv Manuf Technol (in press)5. Gambardella LM, Taillard ED, Dorigo M (1999) Ant coloniesfor the QAP. J Oper Res Soc 50:167–1766. Stutzle T, Dorigo M (1999) ACO algorithms for the quadratic assignment problems. In: Corne D, Dorigo M, Glover F (eds)New ideas in optimization. McGraw-Hill, New York7. Colorni A, Dorigo M, Maniezzo V, Trubian M (1994) Ant system for job-shop scheduling. Belg J Oper Res Stat Comput Sci 34(1):39–53用蚁群算法在刀库索引位置的优化配置摘要:生成最优的索引位置切割工具是一个重要的任务,以减少非加工时间数控机床和成就的最佳工艺计划.目前的工作提出了蚂蚁的应用蚁群算法,作为一个全球性的搜索技术,为迅速确定的最优或接近最优的索引位置刀具上使用数控刀库机器执行一组特定的制造业务。

28【1】 - 《IJSS》【SCI、EI】

28【1】 - 《IJSS》【SCI、EI】
Kai Liab*, Shan-Lin Yangab and Ming-Lun Renab
aSchool of Management, Hefei University of Technology, Hefei 230009, P.R. China; bKey Laboratory of Process Optimization and Intelligent Decision-making, Ministry of Education, Hefei 230009, P.R. China
(Received 28 April 2009; final version received 22 January 2010)
This article considers the single-machine scheduling problem to minimise the total resource consumption under the constraint that the makespan does not exceed a given limit, in which the release date of a job is a linear decreasing continuous function of the resource consumption. This problem is NP-hard in the strong sense. We design a simulated annealing (SA) algorithm to obtain the near-optimal solution with high quality. Two operators, right-move and left-move, are defined and their influences on the resource consumption are analysed. We use two operations, insert and swap, to generate the neighbourhood, and discuss how to calculate the change of total resource consumption. To evaluate the performance of the proposed algorithm, we relax the problem to an assignment problem, and obtain a lower bound by the Hungary method. And then, we improve its quality by Chu’s method. Based on the settings that Janiak provided, we generate the random test data in our experiments to simulate the ingot preheating and hot-rolling process in steel mills. The accuracy and efficiency of the proposed SA algorithm are tested based on those data with problem sizes varying from 50 to 200 jobs. The computational results indicate that the SA approach is promising and capable of solving large-scale problems in a reasonable time.

唐铭杰——XCP Congestion Control

唐铭杰——XCP Congestion Control

Introduction
(4)TCP SACK是有M.Mathis等人在1995年提出的。也是关注一个窗口内
多个数据包丢失的情况。实现在一个RTT内选择重传多个丢失的数据包, 提高了TCP性能,是目前最好的ACK反馈机制。缺点为要修改TCP发接代码, 增加了TCP复杂性,不能大规模的应用
(5)TCP Vegas是由L.S.Brakmo等在1994年提出的一种新的拥塞控制策
RTT = XXXX Congestion window = yyyy Feedback = +10 RTT = XXXX
RTT = XXXX Congestion window = yyyy Feedback = +5
Congestion window = yyyy
Feedback = +10
The Protocol
bandwidth, Q persistent queue size
Proportional to spare bandwidth Also want to drain the persistent queue
Fairness controller
Convergence to min-max fairness If > 0, increase all flow with same throughput If < 0, decrease all flow the same portion of
Per-packet feedback
H_feedback = pi – ni pi is the positive feedback
ni is the negative feedback

最新新发展研究生英语1综合教程1-6单元翻译

最新新发展研究生英语1综合教程1-6单元翻译

Unit 1 Human ReflectionsTranslationPart A1.对一些人来说,婚姻是爱情的坟墓;而对另一些人来说,婚姻是拯救那些过着孤单生活的人的好办法。

译:For some, marriage is the grave of love, while for others, marriage is an effective salvation for those who lead a solitary life.2.此次会议肩负着重大的历史责任,必然将对该组织的发展产生深远影响。

译:Blessed with a great historical responsibility, the Conference is destined to have far-reaching impact on the development of the organization.3.所有这些都寄寓着人们对美好生活的向往,因此得以代代流传。

译:All of these show people’s yearning for a better life, so they have been carried forward generation after generation.4.总统警告说,如果国会现在通过这一法案,那么他一直努力维护的脆弱的和平进程可能就会破裂。

译:If Congress approved the bill now, the president warned, the fragile peace process that he is trying to keep could fall apart.5.夫妻之间必须能够容忍彼此性格上的一些瑕疵,否则的话她们的婚姻很可能会以离婚而告终。

译:The couple must be tolerant of the little imperfections in each other’s character, otherwise their marriage may end up in divorce.Part B爱情是一部电话机,渴望它响起时,它却总是悄无声息;不经心留意时,它又叮铃铃地响起。

赛灵思给出的LTE中数字上下变频CFR和DPD解决方案_Xilinx LTE DUC DDC PC-CFR and DPD

赛灵思给出的LTE中数字上下变频CFR和DPD解决方案_Xilinx LTE DUC DDC PC-CFR and DPD

5MHz - 7.68Msps 10MHz - 15.36Msps 15MHz - 23.04Msps 20MHz - 30.72Msps
30.72Msps 61.44Msps 92.16Msps 122.88Msps
61.44Msps 122.88Msps
122.88MspsBiblioteka Channel Filter
4, Performance can be improved by using a detection threshold that is slightly higher than the desired clipping threshold. 5, This allows the algorithm to ignore peaks that are just barely crossing the threshold and focus on peaks that exceed the threshold by some delta.
Xilinx Confidential
Reduced PAPR Signal
Detailed Architecture (2nd iteration)
High PAPR Signal
Peak Detect
Peak Locations
Allocator
LLooccaatetemmaaggnnitiutuddee totopprorodduucceeloloccaatitoionn ininddicicaatotorr++mmaaggnnitiutuddee &&pphhaasseefoforreeaacchhppeeaakk. .
PC-CFR Solution Overview

agency problem and residual claims(代理问题和剩余索取权)

agency problem and residual claims(代理问题和剩余索取权)

代理问题和剩余请求权社会和经济活动,如宗教、娱乐、教育、研究及商品和服务的生产和提供活动,是通过不同种类的组织进行的。

如公司、业主制企业、互助(基金)和非赢利组织等。

为了生存,各种组织形式间存在竞争关系。

在一项活动中,能够生存的组织形式应该能够以最低的价格,提供消费者需要的产品。

剩余索取权的特征是重要的,它既能够把一个组织和另外一个组织区别开来,又能够解释专门活动中组织形式的生存状况。

本文提出了用一套理论把不同组织形式的剩余索取权的专门特征解释为控制代理问题的有效的方法。

I. 介绍A. 组织生存社会和经济的活动, 例如宗教、娱乐、教育、研究、商品和服务的生产和提供,是通过不同种类的组织进行的。

如公司、业主制企业、互助(基金)和非赢利组织等。

大多数的商品与服务是通过某一组织形式生产的,而且,为了生存,组织形式之间存在竞争。

在任何活动中,能够生存的组织形式应该能以最低的价格提供消费者需要的产品。

这就告诉我们在组织形式中,经济环境选择的方向。

组织生存中一个重要的因素是代理问题的控制。

之所以产生这些问题是因为合同不能无代价的去签订和执行。

代理成本包括设计、监督和约束利益冲突的代理人之间的一组契约所必须付出的成本,加上执行契约时,成本超过利益所造成的剩余损失。

在这篇文章中,我们把不同组织形式的剩余索取权的专门特征描述为控制专门代理问题的有效的方法。

我们只分析私人组织。

在有关的论文中我们已经考察了有助于不同组织形式生存的合同结构的其它特征。

特别是,(1)、在所有权和控制权分离的组织中存在的代理问题的控制。

(2)、剩余索取权专门特征对资源分配决策规则的影响。

B. 剩余索取权:一般讨论通过规定固定的支付或制定与专门业绩考核相联系的刺激性支付的方式,组织的契约结构减少了由大多数代理人承担的风险。

剩余风险——指的是资源的随机流入和对代理人的承诺支付之间的差别风险。

剩余风险由那些为得到净现金流而签订合同的人承担。

我们称这些代理人为剩余索取人或剩余风险的承担者。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

NEAR-OPTIMAL ALLOCATION OF DELAY REQUIREMENTS ON MULTICAST TREESHieu T.TranCATT CentreSchool of Electrical and Computer Engineering,RMIT University,Australiahieu@.auRichard J.HarrisCATT CentreSchool of Electrical and Computer Engineering,RMIT University,Australiarichard@.auAbstract Knowing the QoS requirement for each link involved in a multicast con-nection,such that overall QoS requirement is satisfied,would greatlyassist both QoS-based multicast routing and resource reservation pro-cesses.In the case of delay,the question of what delay requirementsshould be imposed on each link of a source-based multicast tree,suchthat the overall source-to-destination delay and inter-destination delayvariation requirements are satisfied at minimum total tree cost,is thefocal point of this paper.A major contribution of this paper is thedevelopment of a number of heuristic algorithms for(near-)optimal al-location of delay requirements using Genetic Algorithms(GAs).Initialtests,with multicast trees of different sizes(10-and30-node trees),con-figurations(in terms of number of destinations and destination distribu-tion),and overall delay requirements,show the ability of the algorithmsin providing good solutions within a reasonable amount of time.Keywords:Multicasting,QoS,resource allocation,source-to-destination delay,inter-destination delay variation,Genetic Algorithms,Mixed integer pro-gramming.1.IntroductionQoS-based multicast routing has attracted a lot of interest due to in-creasing demand in group-based real-time applications that require strin-gent quality of service constraints,such as teleconferencing and distance12learning.For applications involving group communication,multicasting is more efficient than unicasting as it allows for transmission of a single copy of data to a group of destinations instead of sending a separate copy to each destination as in unicast routing.As far as real-time applications are concerned,delay is one of the most important QoS monly,the delay from a source to all destinations should be bounded[Kompella et al.,1993][Salama et al., 1997][Rouskas and Baldin,1997][Wang and Hou,2000][Ergun et al., 2000][Lorenz et al.,2000][Lorenz and Orda,2002].In addition,the need for an upper bound on inter-destination delay variation(the maximum time difference between delay values from the source to different desti-nations)also arises for applications that require a certain level of group synchronization among various destinations[Akyildiz and Yen,1996] [Rouskas and Baldin,1997].In exchange for having a delay bounded connection,the users must incur a connection cost and minimizing this cost is an important issue.This paper deals with the problem of opti-mal allocation of delay requirements over a source-based multicast tree given upper bounds on source-to-destination delay and inter-destination delay variation,and under the assumption that link cost function is non-increasing and(weakly)convex with delay requirements allocated to the link.The rest of the paper is organized as follows.Section2describes models for link delays and link costs,and formally states the delay re-quirement allocation problem.Related work is provided in Section3. The mathematical basis and three heuristic algorithms are presented in Section4.Section5discusses the test results for the algorithms on a number of different test trees and different overall delay requirements. Section6concludes the paper.2.Problem FormulationA source-based multicast tree is represented as a directed tree T= {V,E}rooted at a source node s,where V and E represent the set of nodes and the set of directed links in the tree.M is the set of destinations (M⊆V−{s}).In the tree T,a unique path from a node u to a node v,if one exists,is denoted by p uv.A node v is defined as a downstream node of a node u if u∈p sv;in that case,u is the upstream node of v.A branch point between p su and p sv,denoted by B(u,v),is defined as a node t on the two paths of which all the downstream nodes lying on this path must not be on the other path.A destination node having no upstream destination nodes is said to be the multicast branch root of a multicast subgroup that consists of the branch root and all of the branchNear-Optimal Allocation of Delay Requirements on Multicast Trees 3root’s downstream destination nodes.The subtree of T rooted at the branch root u spanning the multicast subgroup is defined as a multicast branch and denoted by T u .Set of all branch roots in T is denoted by R .The i -th branch root is R (i ).The number of multicast branches in the tree T is denoted by b (i.e.,|R |=b ).In a real network,packets traversing a link l experience 3types of delay:propagation delay,queueing delay,and transmission delay.Prop-agation delay for a given link l is constant,and is denoted by δl .Queue-ing and transmission delays may vary from time to time as they depend on network load.Assuming that it is possible to impose on a link l a delay requirement d l ,then all packets traversing the link would take no more than d l time.Hence,d l may be considered as the maximum delay of a link l .Furthermore,in order to account for the variation of packet delay across the link l ,we define a delay variation bound ∆l :packets will take no less than d l −∆l time to traverse link l .It is also assumed that the value of ∆l for a given link l is constant during the time of interest (i.e.,∆l may have a different value at some other time).In our model,all delays are assumed to take integral values only.A delay partition is defined as S ={d l }l ∈E .The delay requirement from a node u to a downstream node v is simply D p uv = l ∈p uv d l .Delay variation bound of p uv is computed by ∆p uv = l ∈p uv ∆l .Instantaneous delay of a path p is guaranteed to be within the range [D p −∆p ,D p ].A longest path ,p ∗,in the tree T is defined as a path from the source to a destination that has the largest maximum delay,i.e.p ∗≡p sv such that D p sv ≥D p sv (∀v ∈M ).Given source-to-destination delay bound D e ,and inter-destination variation delay bound D i ,a feasible delay partition ,S D e D i ={d l }l ∈E ,is a set of delay requirements allocated to the links of the multicast tree T such that:D p su ≤D e ∀u ∈M (1)D p tu −(D p tv −∆p tv )≤D i ∀u,v ∈M ,t =B (u,v )(2)δl +∆l ≤d l ∀l ∈E(3)The constraints above have the following interpretation:(1)requires that the delay from the source to a destination must not exceed the source-to-destination delay bound,(2)ensures that the difference in de-lays from the source to any pair of destinations will not be greater than the inter-destination delay variation bound,(3)simply requires that the delay requirement allocated to a link is feasible.Total cost of the multicast tree T for a given S D e D i is defined by c (S D e D i )= l ∈E c l (d l )where c l (d l )is the cost for imposing a delay4requirement d l on a link l .We assume that c l (d l )is a non-increasing convex function (i.e.,the link cost for a smaller bound is higher than the cost for a larger bound and cost savings due to requesting larger bound will diminish as the bound increases).The problem of optimal delay allocation over a source-based multicast tree (MODA)can be formally stated as follows:Problem MODA.Given a multicast tree T =(V ,E )rooted at s ,{δl ,∆l ,c l (d l )}l ∈E ,a set of destinations M ⊆V −{s },a source-to-destination delay bound D e ,and an inter-destination delay variationbound D i ,find a feasible partition S ∗D e D isuch that c (S ∗D e D i )≤c (S D e D i )for all (other)feasible partition S D e D i .3.Related WorkThe problem of partitioning end-to-end QoS requirements on unicast paths and multicast trees has been investigated in [Lorenz and Orda,1998][Ergun et al.,2000][Lorenz et al.,2000][Lorenz and Orda,2002].Exact and approximate algorithms have been developed.Among those,[Lorenz and Orda,2002]is most relevant to our problem,hence,we present a brief overview of their problem in this section.Several assumptions ,which are similar to ours,were made:1)addi-tive QoS;2)integer QoS;3)convex cost functions (link cost increases with level of QoS imposed on the link).The problems of optimally partitioning QoS over a unicast path and a multicast tree are defined below.Please note that although [Lorenz and Orda,2002]considers general additive QoS,in our discussion,we assume that the QoS is delay ,which makes the following discussion more relevant to our problem without loss of generality.Problem OPQ (Optimal Partition of QoS).Given a path p and an end-to-end delay requirement D ,find a feasible partition S ∗(p )={d ∗l }l ∈p ,such that c (S ∗(p ))≤c (S (p ))for all feasible partitions S (p ),where a fea-sible partition is a partition for which l ∈p d l ≤D .Problem MOPQ (Multicast OPQ).Given a multicast tree T rooted at s spanning a group of destinations M and an end-to-end delay require-ment D ,find a feasible partition S ∗(T ),such that c (S ∗(T ))≤c (S (T ))for all feasible partitions S (T ),where a feasible partition is a partition for which l ∈p sv d l ≤D (∀v ∈M ).Near-Optimal Allocation of Delay Requirements on Multicast Trees5 It is easy to see that OPQ is,in essence,a resource allocation problem: each link of the path can be considered as an“activity”and the end-to-end delay requirement can be seen as the available“resource”.Hence, OPQ can be solved using any of the algorithms for the resource allocation problem SCDR described in Chapter4of[Ibaraki and Katoh,1998].A greedy algorithm GREEDY-ADD provided in[Lorenz and Orda,2002]is exactly the same as the Algorithm INCREMENT in[Ibaraki and Katoh, 1998].GREEDY-ADD starts with a partition S(p)={d l=0}l∈p,and iter-atively adds a unit of delay to a link such that the total cost is reduced the most at each iteration,until total delay along the path reaches D.A faster algorithm,GREEDY-MOVE,starts with any feasible partition and gradually changes the current partition(by moving a unit of delay from one link to another link such that the cost is reduced the most)un-til no move could further lower the cost.A truly polynomial algorithm, BINARY-OPQ,finds an optimal partition in truly polynomial time by repeatedly executing GREEDY-MOVE with units of delay being halved after each iteration until the unit reaches1.Lorenz and Orda showed that MOPQ can also be solved in a greedy fashion.Let r denote the only link originating from the source node. The branches1of T are denoted byˆT=T−{r}.c T(D)denotes the cost of optimally allocating a delay D on a(sub-)tree T.Theyfirst showed that,for any tree having depth of2,c T(D)is convex as long as D is optimally allocated over T.This property was then proven for a tree T of arbitrary depth.They then proved the optimal substructure of the problem by showing that the delay partition on each and every subtree must be optimal in order for the delay partition on the tree to be optimal.Consequently,the optimal delay for link r can be found by running the greedy algorithms for the Problem OPQ on the2-link path(r,ˆT),whereˆT is a“link”representing the optimally allocatedˆT(because cˆT (d)is convex).Algorithm TREE-ADD,which performs an augmentation(i.e.,opti-mally adds a unit of delay to a tree)or a removal(i.e.,optimally removes a unit of delay offa tree)given the current delay partition,was provided.Algorithm BALANCE solves MOPQ with the help of TREE-ADD. The algorithm starts with any feasible partition.It iteratively moves a unit of delay between parts of the tree such that tree cost is maximally re-duced at each iteration(it uses TREE-ADD to compute the cost changes due to augmentation or removal of delay from each subtree).1The term branch in this subsection is not the same as the term multicast branch defined previously.64.An Optimal Delay Allocation Algorithm4.1Properties of an optimal solution to MODAAn optimal solution to the Problem MODA possesses several inter-esting properties as stated in a number of lemmas given below.We shall informally prove the straightforward ones and will provide more formal proofs for ones that are less obvious.Lemma4.1If there are optimal solutions to MODA,there must be at least one optimal solution for which the longest path(s)of the tree has a maximum total delay of D e,i.e.,D∗p∗=D e.We now informally prove this lemma.Let us assume that there is an optimal solution for which the longest path(s)of the tree is less than D e.By adding the same amount of delay to all of the links stemmed from the source node such that the longest path(s)in the tree now has a total delay of D e,we shall have another optimal solution that has the aforementioned property.The reasons for that are:1)since the longest path having total delay of D e,other paths must not have larger delay,hence,the source-to-destination delay requirement is satisfied;2) the addition of the same amount of delay to all of the links stemmed from the source node does not affect inter-destination delay variation between any pair of destinations,hence,inter-destination delay variation requirement is also satisfied;3)adding more delay to those links does not increase the total cost as link cost functions are non-increasing. Lemma4.2There must be an optimal partition(if optimal solutions exist)for which the delay requirement from the source node to all the leaf nodes within the same multicast branch are the same.Assuming there is an optimal solution that does not have that property, consider adding more delay to incoming links of every leaf node(except leaf node v currently having the largest total delay from the source), such that the total delay from source to every leaf node is the same as that from source to node v.The new solution is also optimal because: 1)source-to-destination delay is satisfied;2)the inter-destination delay variation requirement between leaf nodes on different multicast branches is satisfied as delay variation between the branch roots and leaf nodes of other multicast branches has not been changed.Inter-destination delay variation requirement between leaf nodes on the same multicast branch is obviously satisfied;3)adding more delay to those links does not increase the total cost as link cost functions are non-increasing.Near-Optimal Allocation of Delay Requirements on Multicast Trees7Lemma4.3Let u i=R(i)(i∈[1,b]).Let v i∈T ui be the node to whichthe delay from the source is largest compared to other destinations in T ui.The necessary and sufficient condition for S to be feasible is:D psv i ≤D e∀i∈[1,b](4)l∈p ui v i (δl+∆l)≤D pu i v i≤min{D i,min{D psv i −D psv j−∆ptu i+D i|1≤i≤b,1≤j≤b,i=j,t=B(u i,u j)}}(5) Proof:(4)is by definition the necessary and sufficient condition for S to meet the source-to-destination delay constraint.Let us consider the inter-destination delay variation constraint fordestinations within a multicast branch T ui (Please note that for all u,v∈T ui and t=B(u,v),D psv≤D psv iand D psu−∆ptu≥D pst≥D psu i)D ptv−(D ptu−∆ptu)≤D i∀u,v∈T ui,u=v,t=B(u,v)⇔D psv−(D psu−∆ptu)≤D i∀u,v∈T ui,u=v,t=B(u,v)⇔D psv i−D psu i≤D i⇔D pu i v i≤D i(6)Now let us consider the delay variation constraint for destinations in different multicast branches.D ptv −(D ptu−∆ptu)≤D i∀u∈T ui,∀v∈T uj,∀i=j,t=B(u,v)⇔D psv −(D psu−∆ptu)≤D i∀u∈T ui,∀v∈T uj,∀i=j,t=B(u,v)⇔D psv j −(D psu i−∆ptu i)≤D i∀i=j,t=B(u,v)=B(u i,v j)⇔D psv j −(D psv i−D pu i v i−∆ptu i)≤D i∀i=j,t=B(u i,v j)=B(u i,u j)⇔D pu i v i ≤D psv i−D psv j−∆ptu i+D i∀i=j,t=B(u i,u j)(7)Remember that for all v∈T uj ,D psv≤D psv j,and the order of nodes onpath p su is s→t→u i→u,hence,D psu −∆pu i u≥D psu i(∀u∈T ui).(6)and(7)hold if and only if(5)holds.The result follows. Lemma4.4Let u i=R(i).The optimal delay requirement from thesource node s to any leaf node v i∈T ui (i∈[1,b]),for at least one ofthe optimal solutions(if optimal solutions exist),is either equal to D e8or bounded byD e−D i+∆ptv i +l∈p ui v iδl≤D∗psv i≤D e+D i−∆ptv j−l∈p uj v jδl(8) and,l∈p svi(∆l+δl)≤D∗psv i≤D e(9)where t is the branch point between path p sui and a path,p svj,havingtotal delay requirement of D e.Proof:Let us consider the optimal solution mentioned in Lemma4.1.If D∗psv i =D e then the lemma holds.Now let us assume that D∗psv i=D e.From Lemma4.2,it is clear that D∗psv =D e(∀v∈T ui).Lemma4.1shows that there exists a v j∈T uj (j=i)such that D∗psv j=D e.Lett=B(v i,v j);it is obvious that t≡B(u i,u j).From(7),we havel∈p ui v i (δl+∆l)≤D∗pu i v i≤D∗psv i−D∗psv j−∆ptu i+D i∴D e+∆ptu i −D i+l∈p ui v i(δl+∆l)≤D∗psv i∴D e−D i+∆ptv i +l∈p ui v iδl≤D∗psv iSimilarly,l∈p uj v j (δl+∆l)≤D∗pu j v j≤D∗psv j−D∗psv i−∆ptu j+D i∴D∗psv i ≤D e−∆ptu j+D i−l∈p uj v j(δl+∆l)∴D∗psv i ≤D e+D i−∆ptv j−l∈p uj v jδlConsequently,(8)holds.In the meantime,(9)obviously holds.4.2Problem Bounded-MOPQLet u i=R(i)(i∈[1,b]).Let v i be the node to which delay from the source is largest compared to other destinations in the multicast branch T ui.The Problem Bounded-MOPQ(MOPQ-B)is stated as follows.Near-Optimal Allocation of Delay Requirements on Multicast Trees9 Problem MOPQ-B.Given a tree T rooted at s,{δl,∆l,c l(d l)}l∈E,{D maxp svi }i∈[1,b],and{D maxp ui v i}i∈[1,b],find S={d l}l∈E such that c(S)isminimum,subject to:D psv i =D maxp svi∀i∈[1,b](10)D pu i v i ≤D maxp ui v i∀i∈[1,b](11)δl+∆l≤d l∀l∈E(12) Problem MOPQ-B is different from MOPQ because not only does it specifies delay requirements from the source to all leaf nodes but also im-poses a bound on the delay requirement from the root of each multicast branch to the leaf nodes of the branch.An exact algorithm for MOPQ-B is given below.Please note that:1) information including branch roots,multicast branches,branch points, and the total propagation delay and the total delay variation bound from the source to every node in the tree must be determined priorto running this algorithm;2)GAIN+T l denotes the(negative)gain inthe cost of a subtree T l stemmed from a link l(including l)due to opti-mal augmentation of a single unit of delay to the current delay partition.Algorithm TREE-INCREMENTfor each link l∈E(traversing in post-order)d l←δl+∆lmark l as“not-full”compute GAIN+T lend loopif(D psv i ≤D maxp svi∀i∈[1,b])if(D pu i v i ≤D maxp ui v i∀i∈[1,b])if(D psv i =D maxp svifor some i∈[1,b])mark all links on those p svi as“full”if(D pu i v i =D maxp ui v ifor some i∈[1,b])mark all links on those p ui v i as“full”while(not all links“full”)call TREE-AUGMENT/*see below*/ end whilereturn cost of the solutionend ifend ifreturn infinite costEnd.10Algorithm TREE-AUGMENT is a modified version of TREE-ADD. Different from TREE-ADD,TREE-AUGMENT:1)marks links that have become“full”(i.e.,can no longer be augmented);2)considers in-crement gain of a link as0if the link is already“full”.Theorem4.1TREE-INCREMENT accurately solves Problem MOPQ-B in O(|E|(max i∈[1,b]{D maxp svi −min v∈Tu il∈p sv(δl+∆l)}))time.Proof:The existence of an upper bound on delay requirement from a branch root to the leaf nodes in the branch does not affect convex-ity of the cost of an optimally allocated subtree.A bounded sub-tree is equivalent to a unbounded subtree with a(convex)cost func-tion that is the same as the cost function in the unbounded case for delay requirement less than or equal to the bound but remains con-stant(equal to the cost at the bound)for delay requirement larger than the bound.Hence,the greedy algorithm TREE-INCREMENT does provide an optimal solution.Since TREE-AUGMENT requires a depth-first-search,the computational complexity of TREE-AUGMENT is obviously O(|E|).Furthermore,because TREE-AUGMENT is calledmax i∈[1,b]{D maxp svi −min v∈Tu il∈p sv(δl+∆l)}times before all edges be-come“full”,the result follows.4.3Heuristic algorithms for MODATheorem4.2Let{S∗D e D i }denote a set of optimal solutions to theProblem MODA having the same{D∗psv i }.{S∗D e D i}must also be the setof all optimal solutions the following Problem MOPQ-B with the bounds constructed as follows(MOPQ-BE):D maxp svi =D∗psv i(13)D maxp ui v i =min{D i,min{D∗psv i−D∗psv j−∆ptu i+D i|1≤i≤b,1≤j≤b,i=j,t=B(u i,u j)}}(14)Proof:Since S∗D e D i is an optimal solution to the Problem MODA,D∗psv ≤D e(∀v∈M),hence,a feasible solution to the Problem MOPQ-BE,which satisfies(10),must satisfy the source-to-destination constraint of MODA.In addition,from Lemma4.3and by the way that upper bounds on delay requirements from u i to v i on multicast branches are constructed as in(14),a feasible solution to MOPQ-BE also meets inter-destination delay variation constraint of MODA.Thus,a feasible solu-tion to MOPQ-BE is a feasible solution to MODA.In other words,a set of feasible solutions to MOPQ-BE is a subset of the feasible solution set of MODA.Near-Optimal Allocation of Delay Requirements on Multicast Trees11Following the same argument,we could prove that{S∗D e D i }is a subsetof the set of feasible solutions to MOPQ-BE:1)requirement(10)is obviously satisfied;2)(11)is met due to Lemma4.3.As{S∗D e D i }ensure that the tree cost is minimum(as compared to allother S D e D i),{S∗D e D i }must also be the optimal solution set of MOPQ-BE.Theorem4.2implies that Problem MODA can be solved byfindingthe set{D psv i }i∈[1,b]for which the optimal solution to the correspond-ing MOPQ-BE(as described in Theorem4.2)would result in least cost compared to other{D psv i}i∈[1,b].The optimal solution to that instance of MOPQ-BE is also an optimal solution to MODA.Based on that ob-servation,we structure our heuristic algorithm for MODA as below.Algorithm MODAdetermine branch roots,branches,branch points of the treecompute delay variation bound from the source to every nodecompute propagation delay from the source to every nodebestCost←infinityfor j=1to b doset upper and lower bounds on D psv jto D efor all i=j docompute upper and lower bounds on D psv i /*see(8,9)*/end loop iinitialize D-GENERATOR with these boundswhile(D-GENERATOR can still generate{D psv i }i∈[1,b]){D maxp svi }i∈[1,b]←{D psv i}i∈[1,b]compute{D maxp ui v i }i∈[1,b]/*see(14)*/cost←TREE-INCREMENT({D maxp svi },{D maxp ui v i})if(cost<bestCost)bestCost←costsave the solutionend ifend whileend loop jEnd.In the above algorithm,we make use of a D-GENERATOR.Its task isto generate vectors{D psv i }i∈[1,b]and to terminate the algorithm(by stopgenerating the“next”vector).Based on the results of Lemmas4.1,4.2, and4.4,we limit the search space,which the generator will explore,with12the lower and upper bounds on{D psv i }i∈[1,b]and{D pu i v i}i∈[1,b]duringinitialization of the generator.This algorithm structure allows us to try different techniques in im-plementing the D-GENERATOR.A naive generator would enumerateall possible combinations{D psv i }i∈[1,b],which may work for small prob-lems but will take a prohibitively long time for larger ones.We choose to implement a number of D-GENERATORs using Genetic Algorithms (GAs)2and a greedy approach.In our GA implementation,we use a SIMPLE GA which is simi-lar to that described in[Goldberg,1989].In order to code the vector{D psv i }i∈[1,b]as a binary string,we consider two alternative methods:1)converting each element to a binary number,and combining these bi-nary numbers together to create a binary string;2)reducing the vector to a scalar value,then,converting this scalar value to a binary number. Besides,TREE-INCREMENT is used for evaluating of the“fitness”ofa{D psv i }i∈[1,b].Our greedy D-GENERATOR generates2vectors.Thefirst vector represents a partition for which the delay requirement from the source to each destination is at a maximum,whereas the second one represents a partition for which the upper bounds on delay requirements along all multicast branches are the same(in most cases).5.Numerical ResultsWe implemented the Algorithm MODA in C++using the following libraries:1)GAlib(GA component library)[Wall,1999],2)Graph Tem-plate Library(GTL)[Forster et al.,1999],3)BRITE(topology genera-tion library)[QNLB,2001].Employing the two coding schemes,we built two GA-based algorithms,namely,MODA-GA Coding1and MODA-GA Coding2.MODA-Greedy is an algorithm using the greedy ap-proach.For benchmarking,we also developed an LP-based algorithm, MODA-LP,that uses ILOG TM CPLEX7.1LP solver in solving the MIP model of the Problem MODA.Four randomly generated trees were used for testing:two10-node trees,and two30-node trees.Propagation delay and delay variation bound of each link were assigned random values from1(ms)to4(ms) and from1(ms)to10(ms)respectively.Links were randomly assigned a cost function from a set of3different cost functions.In each tree,the root represented the source node and all leaf nodes represented the des-2For a full account of GAs,the reader is referred to the books by Holland[Holland,1975] and Goldberg[Goldberg,1989].Near-Optimal Allocation of Delay Requirements on Multicast Trees13 Table1.Tree cost produced by the MODA algorithms.The percentage shows the difference between the cost and the optimal cost.Tree Configuration LP Greedy Coding1Coding2optimal Best Worst Best Worst |V|=10;|M|=4;b=4 1.89 1.89 1.90 1.91 1.9 1.91D e=300;D i=300.0%0.0%0.6% 1.0%0.4% 1.0%|V|=10;|M|=5;b=3 1.92 2.18 1.94 2.08 1.92 2.12D e=300;D i=300.0%13.5%0.9%8.2%0.0%10.0% |V|=30;|M|=16;b=7N/A 4.39 4.79 5.55 4.90 6.53D e=500;D i=200|V|=30;|M|=17;b=5N/A 4.22 4.54 5.66 4.77 6.29D e=500;D i=200tinations.In addition,we also randomly selected other in-tree nodes as destinations.The source-destination delay bound and inter-destination delay variation bound were chosen to be300(ms)and30(ms)for the10-node trees and500(ms)and200(ms)for the30-node trees respectively.We tested the algorithms with the test trees and settings as described above on a Pentium II550MHz computer with384MB RAM.MODA-LP was run one for each tree in order to obtain the optimal solution. MODA-Greedy was run one,whereas MODA-GA Coding1and MODA-GA Coding2were run5times alternatively for each tree.The test results are summarized in the Table1.For the10-node trees,MODA-LP took approximately15seconds to complete while the greedy algorithm took a fraction of a second and the two GA-based algorithms took about10seconds.As the tree size increased to30nodes,MODA-LP failed after running for20minutes (due to memory shortage)whereas the greedy algorithm took about1 second and the other two algorithms needed about60seconds in order to provide good solutions.We also tested our algorithms with a10-node tree(|V|=10;|M|= 5;b=3;D e=300)for different value of D i.As the problem became infeasible for D i<19(ms),we varied D i from19(ms)to29(ms).The costs of the solutions found by the algorithms and the costs after nor-malization by the MODA-LP(optimal)cost,for different values of D i, were shown in Figure1.As can be seen from the test results,GA-based algorithms consis-tently provided good solutions,whereas,the greedy algorithm was able to come up with very good solutions in some cases but provided less good solutions in other cases.。

相关文档
最新文档