Question: 2 . [ Spanning Trees Over Small Perturbations ] : Minimum Spanning Trees play a vital role in routing TCP / IP packages. Joey runs
Spanning Trees Over Small Perturbations: Minimum Spanning Trees play a vital role in routing TCPIP packages. Joey runs the IT Division for a local hospital. He has represented all computers, switches, and routers within the hospital intranet as nodes and their connections physical and wireless as edges. He used communication time, ie the time it takes to send a package from a node to a connected node, between neighboring nodes, as the edge weight. He then ran Prim's algorithm to find an MST of the resulting graph. He routes the intranet packages between the nodes using the MST
However, he did not like running Prim's algorithm for reasons nobody could understand and was adamant about never running any MST algorithm covered in any Algorithm course again. Let us suppose the original network was GV E W and the resulting spanning tree was TleftV Eprime Wprimeright Note: Joey can still use the 'blue' rule and the 'red' rule just not on the whole graph, as that corresponds to the Greedy Algorithm we discussed in the class
a
It was working great for Joey until a new computer was added to the network. Let us represent the new node being added as v When node v is added to G edges incident on v are also added to G Help Joey avoid rerunning an MST algorithm by designing an approach to update T efficiently. Describe your approach and give a pseudocode.
b Joey has run into trouble again. This time, a physical cable between two nodes in the MST got damaged. The cable vendor was not able to replace the cable. Help Joey update T efficiently again. Describe your approach and give a pseudocode.
c Joey's selfinflicted nobody is forcing him not to rerun the MST algorithms troubles do not seem to end. This time, a cable that was not in the tree was damaged and replaced by a much faster cable, thus decreasing the cost of the edge. Help Joey update T efficiently again. Describe your approach and give a pseudocode.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
