Application of graph theory in computer networking, assignment help

User Generated

fyl1

Mathematics

Description

Assignment: Applications of Graph Theory

In 1736, a famous Swiss mathematician Leonhard Euler (1707 – 1783) started the work in the area of Graph Theory through his successful attempt in solving the problem of “Seven Bridges of Konigsberg.” Graph Theory solved many problems in multiple fields (Chinese Postman Problem, DNA fragment assembly, and aircraft scheduling.) In Chemistry, Graph Theory is used in the study of molecules, construction of bonds in chemistry, and the study of atoms. In Biology, Graph Theory is used in the study of breeding patterns or tracking the spread of disease.

Write a three to five (3-5) page paper in which you:

  1. Choose two (2) applications for graph theory within your area of specialization (Networking, Security, Databases, Data Mining, Programming, etc.).
  2. Examine how these applications are being used in your specialization.
  3. Determine how graph theory has advanced the knowledge in your area of specialization.
  4. Conclude how you will apply graph theory in your area of specialization.
  5. Use at least three (3) quality academic resources in this assignment. Note: Wikipedia and other Websites do not quality as academic resources.

The specific course learning outcomes associated with this assignment are:

  • Model relationships with graphs, functions, and trees.
  • Use technology and information resources to research issues in discrete math.
  • Write clearly and concisely about discrete math using proper writing mechanics.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: Applications of Graph Theory

1

APPLICATIONS OF GRAPH THEORY

Student’s name:

Professor’s name:

Date

Applications of Graph Theory

2

The quick development in Global Mobile correspondence systems has requested for new
answers for taking care of the current issues. Such issues incorporate lessened data transfer
capacity in cell phones and the consistent change in their related system topologies. This makes a
requirement for system calculations with:
1. Slightest conceivable correspondence activity
2. Rapid execution.
The two difficulties can be overcome by use of chart hypothesis in creating neighborhood
calculations. Here, we investigate uses of diagram hypothesis in cell systems with an
accentuation on the 'four-shading' hypothesis and system coding and their pertinent applications
in remote portable systems.
Applying of the four shading hypothesis in a remote cell tower situation arrangement.
Consider the phone tower situation map appeared above, where every phone tower
communicate channel is compared to a shading, and channel–colors are constrained to four, the
assignment of finding where to financially position communicate towers for most extreme scope
is impartial to the four-shading map issue.
The two difficulties are:
1. Disposal of the no-scope spots
2. Portion of an alternate direct in the spots where channel cover happens (set apart in blue). In
relationship, hues must be distinctive, with the goal that mobile phone signs are given off to an
alternate channel.

Applications of Graph Theory

3

Every cell area along these lines utilizes one control tower with a particular channel and
the locale or control tower contiguous it will utilize another tower and another channel. It is not
hard to perceive how by utilizing 4 channels, a hub shading calculation can be utilized to
effectively arrange towers and diverts in a versatile system, an exceptionally mainstream
technique being used by portable administration suppliers today.
Node Coloring Theorem
Wireless Service suppliers utilize node shading to make a to a great degree complex
system delineate more sensible.
Network CODING
Networkcoding is another procedure where diagram hypothesis discovers application in
versatile correspondence systems. In a customary system, hubs can just recreate or forward
approaching parcels. Utilizing Network coding, in any case, hubs can arithmetically consolidate
got parcels to make new bundles.

Network coding opens up new potential outcomes in the fields of systems administration.
Such would include:
Remote multi-jump systems:


Wireless cross section systems



Wireless sensor systems

Applications of Graph Theory



Mobile impromptu systems



Cellular hand-off systems

Shared record conveyance


Peer-to-peer gushing



Distributed capacity
Utilization of system coding in a content distribution situation
For this application, the accompanying suspicions are made:

1. The system is a multicast framework where all goals wish to get comparative data from the
source.
2. That all Links have a unit limit of a solitary parcel for each time opening
3. That the connections be coordinated with the end goal that movement can just stream in one
bearing.

1st time slot

4

Applications of Graph Theory

As per the first time slot:Destination t1 will have received the information traffic A
whereas Destination t2 will have received both the traffic A and traffic B as shown below.

2nd time slot
In the 2ndtime slot:Both Destination t1 and t2 will have received traffic A and traffic B
and C as shown below.

Over the long haul, when Destination t1 gets An and An (EX-OR)B, it will have the
capacity to figure B by B=A (EX-OR){ A(EX-OR)B}
Similarly, when Destination t2 gets B and An (EX-OR) B, it will have the capacity to process A
by:

5

Applications of Graph Theory

A= {A (EX-OR) B} (EX-OR) B as demonstrated as follows

Graph hypothesis has propelled the information in my general vicinity of specialization in the
accompanying ways
1.

Avoiding Stealth Worms by Using Vertex Covering Algorithm
The vertex spread calculation is utilized to reenact the engendering of stealth worms on

expansive PC systems and configuration ideal methodologies to ensure the system against
infection assaults progressively. The significance of finding the worm proliferation is to prevent
them continuously.
The principle thought connected here is to locate a base vertex spread in the diagram
whose vertices are the directing servers and the edges are the associations between the steering
servers. At that point an ideal arrangement is found for worm engendering.
2.

Reducing the Algorithms complex...


Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags