13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

On the Interaction of Bandwidth Constra<strong>in</strong>ts and Energy Efficiency 21529: if (R[x] > capacity and D[x][y] >D[x][u] − D[u][v]) then30: E = E\(x, y)31: end if32: end for33: end for34: end if35: end if36: until (!reconstruct)37: T ← T \T i,j38: end while39: return (F EASIBLE)Psuedocode 1: Successive M<strong>in</strong>imum Energy PathsIn the first algorithm we create one (for each source-dest<strong>in</strong>ation pair) m<strong>in</strong>imumenergy path at a time. Such path construction can employ the shortestpath algorithm, e.g. the Bellman Ford algorithm, with the transmitt<strong>in</strong>g energyas the cost. We cont<strong>in</strong>ue add<strong>in</strong>g paths, until the capacity constra<strong>in</strong>t of one nodeis exceeded. We will reduce the maximum transmission power level of each nodewhose transmission violated the capacity of the node <strong>in</strong> question. The reductionof the transmission power is captured <strong>by</strong> remov<strong>in</strong>g the correspond<strong>in</strong>g edges and,subsequently, rerunn<strong>in</strong>g the shortest path. Hypothetically, it is still possible thatthe new path will <strong>in</strong>fluence the load of the removed edges, due to the near<strong>by</strong>nodes relay<strong>in</strong>g its traffic. Subsequently, we remove nodes as relays from considerationand re-run the shortest-path algorithm. The process cont<strong>in</strong>ues until a pathcan be found that does not exceed the capacity constra<strong>in</strong>ts of any of the nodes ittraverses through and of any of the nodes that overhear its transmission. Therefore,the order of path construction is critical to the outcome. We also note thatcerta<strong>in</strong> traffic load matrices are simply <strong>in</strong>feasible they cannot be accommodated,because one or more source-dest<strong>in</strong>ation paths cannot be established.2.2 All Pairs M<strong>in</strong>imum Energy PathsAll_Pairs_M<strong>in</strong>imum_Energy_Paths(Input: G(V,E),D,P,T; Output Ps)1: All P airs Shortest P aths(G, P, P s)2: for all u ∈ V do3: C[u] ← capacity4: end for5: for all T i,j ∈ T do6: for all (u, v) ∈ Ps i,j do7: for all x ∈ V do8: if (P [u][v] ≤ P [u][x]) then9: C[x] ← C[x] − T i,j10: end if11: end for

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!