SlideShare a Scribd company logo
1 of 13
Network
Workflows:Maximising
the flow in a network
Theorem 4.2. If no augmenting path exists for some F(N), then the value of F(N) is a maximum.
Theorem 4.2
guarantees that
if no augmenting
path exists for
Fi(N) , then Fi(N)
has a maximum
value.
Proof. We first describe a labelling process for the vertices of N.
Initially no vertex is labelled and the labelling proceeds as follows:
(a) x is labelled.
(b) If for (u, v) ∈ E, u is labelled and v is unlabeled, then, provided
f(u, v) < c(u, v), v is labelled.
(c) If for (u, v) ∈ E, v is labelled and u is unlabeled, then, provided
f(u, v) > 0, u is labelled.
By a repetition of (b) and (c) as many vertices of N as possible are
labelled.
The labelling process defines a cut (P, P’) of N such that any labelled
vertex is a member of P and any unlabeled vertex is a member of P’.
• By corollary 4.1, F(N) must be a maximum.
• The well-known max-flow, min-cut theorem originally stated by
Ford & Fulkerson.
https://en.wikipedia.org/wiki/D._R._Fulkerson https://en.wikipedia.org/wiki/L._R._Ford_Jr.
"Consider a rail network connecting two cities by way of a number
of intermediate cities, where each link of the network has a number
assigned to it representing its capacity. Assuming a steady state
condition, find a maximal flow from one given city to the other."
Theorem 4.3 (max-flow, min-cut). For a given network the maximum
possible value of the flow is equal to the minimum capacity of all cuts:
max F(N) = min K(P, P’).
• How best to find an augmenting path at each step of the
maximum-flow algorithm.
• If each augmentation only increases the overall flow from
x to y by one unit, then the number of augmentations
required for maximization could be equal to min K(P, P’).
• This can be arbitrarily large and bear no relationship to the
size of the network.
• Starting with the zero flow, we could carry out a
succession of augmentations alternately using the paths P1
= (x, v1, v2, y) and P2 = (x, v2, v1, y). Each augmentation
enhances the flow by only one unit so that, overall, 2I
augmentations will be required.
• The maximum-flow problem can be solved in a time which is
polynomially dependent upon tile network size only.
• The complexity is independent of the edge capacities.
• Method of choosing augmentation paths due to Edmonds & Karp is
so natural that it is likely to be included unwittingly in any
implementation of the maximum-flow algorithm.
• Given a network N = (V, E) with a flow F, we first construct an
associated network NF = (V, E') such that there is a one-to-one
correspondence between augmentation paths in N for F and directed
paths from x to y in NF.
• N and NF have the same vertex set and if, for any two vertices u and
v, (u, v) is an edge of NF if and only if either:
• Thus the question of finding an augmentation path for N and F is
reduced to finding a directed path from x to y in NF.
• We denote a directed path in NF by PF and its corresponding path for
F(N) by P.
• Any edge of PF corresponding to a bottleneck-edge of F(N) is also
called a bottleneck-edge.
• In determining PF each vertex v of NF is first labelled L(v), where L(v)
is equal to the minimum distance (in edges) from x to v. If no such path
exists then L(v) = 0. This can be done using the breadth-first search for
shortest paths algorithms.
• If a path exists from x to y, then pF is chosen to be a path of minimum
length.
The breadth-first search for pk procedure, BFSPK.
• Line 1 represents the
labelling process.
• Line 2 simply determines
whether or not a path PF
exists.
• The breadth-first search for
Pk procedure executes in
O(IEI)-time.
• To establish the overall
complexity of the
maximum-flow algorithm,
using shortest
augmentation paths, we
require the following
theorem 4.4.
Theorem 4.4 :- If in the maximum-flow algorithm each augmentation is carried out along a
shortest path then a maximum flow will be obtained after no more than ½ |E|.n
augmentations.
The maximum-flow
algorithm.
Networks and flows2.pptx
Networks and flows2.pptx
Networks and flows2.pptx

More Related Content

Similar to Networks and flows2.pptx

Flow Network Talk
Flow Network TalkFlow Network Talk
Flow Network Talk
Imane Haf
 
Time-Variant Distortions in OFDM
Time-Variant Distortions in OFDMTime-Variant Distortions in OFDM
Time-Variant Distortions in OFDM
Ahmed Alshomi
 
1687 1499-2008-601346[1]
1687 1499-2008-601346[1]1687 1499-2008-601346[1]
1687 1499-2008-601346[1]
TARKI AOMAR
 

Similar to Networks and flows2.pptx (20)

International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Information Technology (IJMIT)
 
Lecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptLecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.ppt
 
Gprs
GprsGprs
Gprs
 
Aho corasick-lecture
Aho corasick-lectureAho corasick-lecture
Aho corasick-lecture
 
maxflow.ppt
maxflow.pptmaxflow.ppt
maxflow.ppt
 
Sequential and parallel algorithm to find maximum flow on extended mixed netw...
Sequential and parallel algorithm to find maximum flow on extended mixed netw...Sequential and parallel algorithm to find maximum flow on extended mixed netw...
Sequential and parallel algorithm to find maximum flow on extended mixed netw...
 
SEQUENTIAL AND PARALLEL ALGORITHM TO FIND MAXIMUM FLOW ON EXTENDED MIXED NETW...
SEQUENTIAL AND PARALLEL ALGORITHM TO FIND MAXIMUM FLOW ON EXTENDED MIXED NETW...SEQUENTIAL AND PARALLEL ALGORITHM TO FIND MAXIMUM FLOW ON EXTENDED MIXED NETW...
SEQUENTIAL AND PARALLEL ALGORITHM TO FIND MAXIMUM FLOW ON EXTENDED MIXED NETW...
 
1535 graph algorithms
1535 graph algorithms1535 graph algorithms
1535 graph algorithms
 
Chap10 slides
Chap10 slidesChap10 slides
Chap10 slides
 
Compactrouting
CompactroutingCompactrouting
Compactrouting
 
Network flows
Network flowsNetwork flows
Network flows
 
Flow Network Talk
Flow Network TalkFlow Network Talk
Flow Network Talk
 
Design and Analysis of Algorithms Exam Help
Design and Analysis of Algorithms Exam HelpDesign and Analysis of Algorithms Exam Help
Design and Analysis of Algorithms Exam Help
 
Time-Variant Distortions in OFDM
Time-Variant Distortions in OFDMTime-Variant Distortions in OFDM
Time-Variant Distortions in OFDM
 
Lecture7 channel capacity
Lecture7   channel capacityLecture7   channel capacity
Lecture7 channel capacity
 
ershov911
ershov911ershov911
ershov911
 
1687 1499-2008-601346[1]
1687 1499-2008-601346[1]1687 1499-2008-601346[1]
1687 1499-2008-601346[1]
 
Internet
InternetInternet
Internet
 
Art%3 a10.1155%2fs1110865704401036
Art%3 a10.1155%2fs1110865704401036Art%3 a10.1155%2fs1110865704401036
Art%3 a10.1155%2fs1110865704401036
 
DarwicheUAI00.ppt
DarwicheUAI00.pptDarwicheUAI00.ppt
DarwicheUAI00.ppt
 

Recently uploaded

Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
Kamal Acharya
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
drjose256
 
Microkernel in Operating System | Operating System
Microkernel in Operating System | Operating SystemMicrokernel in Operating System | Operating System
Microkernel in Operating System | Operating System
Sampad Kar
 

Recently uploaded (20)

AI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdfAI in Healthcare Innovative use cases and applications.pdf
AI in Healthcare Innovative use cases and applications.pdf
 
Lesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsxLesson no16 application of Induction Generator in Wind.ppsx
Lesson no16 application of Induction Generator in Wind.ppsx
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
 
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbineLow rpm Generator for efficient energy harnessing from a two stage wind turbine
Low rpm Generator for efficient energy harnessing from a two stage wind turbine
 
Artificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian ReasoningArtificial Intelligence Bayesian Reasoning
Artificial Intelligence Bayesian Reasoning
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
How to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdfHow to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdf
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
 
Introduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and ApplicationsIntroduction to Heat Exchangers: Principle, Types and Applications
Introduction to Heat Exchangers: Principle, Types and Applications
 
Piping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfPiping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdf
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptx
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Microkernel in Operating System | Operating System
Microkernel in Operating System | Operating SystemMicrokernel in Operating System | Operating System
Microkernel in Operating System | Operating System
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
 

Networks and flows2.pptx

  • 2. Theorem 4.2. If no augmenting path exists for some F(N), then the value of F(N) is a maximum. Theorem 4.2 guarantees that if no augmenting path exists for Fi(N) , then Fi(N) has a maximum value. Proof. We first describe a labelling process for the vertices of N. Initially no vertex is labelled and the labelling proceeds as follows: (a) x is labelled. (b) If for (u, v) ∈ E, u is labelled and v is unlabeled, then, provided f(u, v) < c(u, v), v is labelled. (c) If for (u, v) ∈ E, v is labelled and u is unlabeled, then, provided f(u, v) > 0, u is labelled. By a repetition of (b) and (c) as many vertices of N as possible are labelled. The labelling process defines a cut (P, P’) of N such that any labelled vertex is a member of P and any unlabeled vertex is a member of P’.
  • 3.
  • 4. • By corollary 4.1, F(N) must be a maximum. • The well-known max-flow, min-cut theorem originally stated by Ford & Fulkerson. https://en.wikipedia.org/wiki/D._R._Fulkerson https://en.wikipedia.org/wiki/L._R._Ford_Jr.
  • 5. "Consider a rail network connecting two cities by way of a number of intermediate cities, where each link of the network has a number assigned to it representing its capacity. Assuming a steady state condition, find a maximal flow from one given city to the other."
  • 6. Theorem 4.3 (max-flow, min-cut). For a given network the maximum possible value of the flow is equal to the minimum capacity of all cuts: max F(N) = min K(P, P’). • How best to find an augmenting path at each step of the maximum-flow algorithm. • If each augmentation only increases the overall flow from x to y by one unit, then the number of augmentations required for maximization could be equal to min K(P, P’). • This can be arbitrarily large and bear no relationship to the size of the network. • Starting with the zero flow, we could carry out a succession of augmentations alternately using the paths P1 = (x, v1, v2, y) and P2 = (x, v2, v1, y). Each augmentation enhances the flow by only one unit so that, overall, 2I augmentations will be required.
  • 7. • The maximum-flow problem can be solved in a time which is polynomially dependent upon tile network size only. • The complexity is independent of the edge capacities. • Method of choosing augmentation paths due to Edmonds & Karp is so natural that it is likely to be included unwittingly in any implementation of the maximum-flow algorithm. • Given a network N = (V, E) with a flow F, we first construct an associated network NF = (V, E') such that there is a one-to-one correspondence between augmentation paths in N for F and directed paths from x to y in NF. • N and NF have the same vertex set and if, for any two vertices u and v, (u, v) is an edge of NF if and only if either:
  • 8. • Thus the question of finding an augmentation path for N and F is reduced to finding a directed path from x to y in NF. • We denote a directed path in NF by PF and its corresponding path for F(N) by P. • Any edge of PF corresponding to a bottleneck-edge of F(N) is also called a bottleneck-edge. • In determining PF each vertex v of NF is first labelled L(v), where L(v) is equal to the minimum distance (in edges) from x to v. If no such path exists then L(v) = 0. This can be done using the breadth-first search for shortest paths algorithms. • If a path exists from x to y, then pF is chosen to be a path of minimum length.
  • 9. The breadth-first search for pk procedure, BFSPK. • Line 1 represents the labelling process. • Line 2 simply determines whether or not a path PF exists. • The breadth-first search for Pk procedure executes in O(IEI)-time. • To establish the overall complexity of the maximum-flow algorithm, using shortest augmentation paths, we require the following theorem 4.4.
  • 10. Theorem 4.4 :- If in the maximum-flow algorithm each augmentation is carried out along a shortest path then a maximum flow will be obtained after no more than ½ |E|.n augmentations. The maximum-flow algorithm.