Professional Documents
Culture Documents
94
A Thesis
Submitted to Department of Mathematics
College of Science
National Central University
in Partial Fulfillment of the Requirements
for the Degree of Master
in
Mathematics
June 2005
Jhongli, Taiwan, Republic of China
(93 5 )
/()
( V ) ()
(
) ()
) ()
:
:
92221001
94
15
1.
2.
3.
---dw(G)
---Dw(G)
---rw(G)---r*w(G)
k
d(G)dk(G)Dk(G)rk(G)r*k(G)
Abstract
Reliability, efficiency, security, and broadcasting are important criteria in the
design of interconnection networks.
(w 1)-fault diameter Dw (G), and the w-Rabin number rw (G) have been used
to determine reliability and efficiency of interconnection networks. In this thesis,
we study d(G), dk (G), Dk (G), rk (G), and rk (G) of generalized folded hypercube networks having connectivity k.
ii
Contents
Abstract (in English)
ii
Contents
iii
1 Introduction
3.1
3.2
18
References
21
iii
Introduction
Reliability, efficiency, security, and broadcasting are important criteria in the
for any w + 1 (not necessarily distinct) vertices x, y1 , y2 , , yw , there exist w vertexdisjoint paths of length at most l from x to y1 , y2 , , yw . This concept was first
defined by Liaw and Chang [7]. Clearly, we have the following.
Proposition 1.2 [7] The following statements hold for any network G of connectivity k.
(1) r1 (G) r2 (G) rk (G).
(2) dw (G) rw (G) and rw (G) rw (G) for 1 w k.
A generalized folded hypercube network GFn (b) is a graph whose vertices are
b-ary sequences x = (x1 , x2 , , xn ) with 0 xi b 1 for 1 i n, b 2,
and x adjacent to other vertices differ by exactly one coordinate and (x1 + m, x2 +
m, , xn + m) for 1 m b 1 where operations are taken modulo b. From the
definition of GFn (b), we have the fact that each vertex has degree (b 1)n + (b 1).
In section 3, we will show that the connectivity (GFn (b)) is the degree of GFn (b).
This graph was one of OGn (b) which first defined by Lakshmivarahan, Jwo, and
Dhall [6]. Note that GFn (b) is vertex-transitive.
If b = 2, denote GFn (2) by F H(n), was defined by El-Amawy and Latifi [2].
El-Amawy and Latifi [2] showed that the diameter d(F H(n)) = d n2 e; Duh et al. [1]
obtained that dn+1 (F H(n)) = d n2 e + 1 for n 2. Furthermore, Liaw and Chang [7]
proved the following proposition.
Proposition 1.3 [7] If n 2, then
Dw (F H(n)) = dw (F H(n)) =
d 2 e,
for 1 w d n2 e 1,
d n e + 1,
2
for d n2 e w n + 1.
rw (F H(n)) =
rw (F H(n))
d 2 e,
for 1 w d n2 e 1,
d n e + 1,
2
for d n2 e w n + 1.
d
X
l=1
d
X
l=1
So, we can find a path P 0 shorter than P by deleting e , e and adding em0 ,i from the
edge sequence of the path P , it is a contradiction. Hence e 6= e for all 1 , d,
6= .
If e = em1 ,i , e = em2 ,i for some 1 < d and m1 6= m2 , then
e + e = em1 ,i + em2 ,i = em1 +m2 ,i = em0 ,i , where m1 + m2 m0 (mod b). So we
can find a path P 0 shorter than P by deleting e , e and adding em0 ,i from the edge
sequence of the path P , it is a contradiction. Hence i1 6= i2 for all 1 i1 , i2 n + 1.
d
X
el = ~y be a
l=1
path from ~x to ~y . If we change the order of those el and denote them by e0l , then
P 0 : ~x ~x + e01 ~x + e01 + e02 ~x +
d
X
l=1
0,
1,
xi = 2,
..
b 1,
if 1 i r0 ;
if r0 + 1 i r0 + r1 ;
if r0 + r1 + 1 i r0 + r1 + r2 ;
if r0 + r1 + + rb2 + 1 i r0 + r1 + + rb1 = n.
r0X
+r1
i=r0 +1
r0X
+r1
i=r0 +1
b1
X
j=1
e1,i
e1,i +
r0X
+r1
i=r0 +1
r0 +r
1 +r2
X
e2,l
l=r0 +r1 +1
r0 ++rj
ej,q = ~x.
q=r0 ++rj1 +1
r0
X
i=1
r0
X
i=1
r0
X
eb1,i
eb1,i + e1,r0 +r1 +1
e1,l
l=r0 +r1 +1
r0 ++rj+1
b2
eb1,i +
j=1
q=r0 ++rj +1
i=1
e1,n+1 +
r0
X
r0 +r
1 +r2
X
eb1,i +
i=1
ej,q = ~x.
Then d(~0, ~x) 1+ro +r2 + +rb1 = 1+nr1 1+n(b nb c+1) = d (b1)n
e.
b
e.
By Case1 and Case2, d(GFn (b)) d (b1)n
b
Now we consider the other side. Given ~x V (GFn (b)), ~x = (x1 , x2 , , xn ),
and
xi =
0,
1,
if 1 i r0 ;
if r0 + 1 i r0 + r1 ;
if r0 + r1 + 1 i r0 + r1 + r2 ;
2,
..
b 1,
if r0 + r1 + + rb2 + 1 i r0 + r1 + + rb1 = n.
d
X
l=1
(b1)n
b
+ 1 > d (b1)n
e, a contradiction. Hence el 6= ej,n+1 , for all
b
3.1
0 e1 e1 + e2
el .
l=1
From the following proof of Theorem 3.1, we can find as many as degree
of GFn (b) vertex-disjoint paths, then (GFn (b)) is the degree of GFn (b), that is
(b 1)n + (b 1).
Theorem 3.1 For n 1, dk (GFn (b)) d (b1)n
e + 1.
b
Proof. We claim that between any two vertices in GFn (b), there exist (b 1)n +
(b 1) vertex-disjoint paths of length at most d (b1)n
e + 1. Since the graph is
b
vertex-transitive, it suffices to prove the claim for vertices ~0 = (0, 0, , 0) and
~x = (x1 , x2 , , xn ) with
0,
1,
xi = 2,
..
b 1,
if 1 i r0 ;
if r0 + 1 i r0 + r1 ;
if r0 + r1 + 1 i r0 + r1 + r2 ;
if r0 + r1 + + rb2 + 1 i r0 + r1 + + rb1 = n.
ii for 1 i h, 1 j b 1,
e;
having l(t(j1)n+jh+i ) = (b 1)h = d (b1)n
b
t(j1)n+ah+i : hh ej,ah+i , ej,ah+(i+1) , , ej,(a+1)h , ej+1,(a+1)h+1 , ,
eb1,(bj+a)h , e1,(bj+a+1)h+1 , ,
ej+(b1)a,(b1)h+1 , , ej+(b1)a,bh ,
ebj+a,n+1 , ej+ba,1 , , ej1,ah ,
ej,ah+1 , , ej,ah+i1
ii for 1 j b 1,
1 i h, 0 a b 1, a 6= j,
hh ej,ah+i , ej,ah+(i+1) , , ej,(a+1)h , ej+1,(a+1)h+1 , ,
eb1,(b1)h , eb1,n+1 , e1,1 , , ej1,ah ,
ej,ah+1 , , ej,ah+i1
ii for 1 a + 1 = j b 1, 1 i h,
and
hh ej,ah+i , ej,ah+(i+1) , , ej,(a+1)h , ej+1,(a+1)h+1 ,
ej+(b1)a,(b1)h+1 , , ej+(b1)a,bh , ebj+a,n+1 ,
ej+ba,1 , , eb1,(bj+a)h , e1,(bj+a+1)h+1 , ,
ej1,ah , ej,ah+1 , , ej,ah+i1
ii for 1 j < a b 1, 1 i h,
ii for 1 j b 1,
e + 1.
having l(t(b1)n+j ) = (b 1)h + 1 = d (b1)n
b
Case2. If r0 is the largest one, say r0 > b nb c, then r1 + + rb1 = n r0 <
d (b1)n
e. We can choose the following paths:
b
t(j1)n+i : hhej,i , e1,r0 +1 , , eb1,r0 ++rb1 , ebj,i ii for 1 i r0 , 1 j b 1,
10
e + 1;
having l(t(j1)n+i ) = r1 + + rb1 + 2 d (b1)n
b
t(j1)n+(r0 +r1 ++rj1 )+i : hh ej,(r0 ++rj1 )+i , ej,(r0 ++rj1 )+i+1 , ,
ej,r0 ++rj1 +rj , ej+1,r0 ++rj +1 , ,
eb1,(r0 ++rb2 )+1 , , eb1,r0 ++rb2 +rb1 ,
e1,r0 +1 , , e1,r0 +r1 , e2,r0 +r1 +1 , ,
ej,(r0 ++rj1 )+i1
ii for 1 i rj , 1 j b 1,
e;
having l(t(j1)n+(r0 +r1 ++rj1 )+i ) = r1 + + rb1 < d (b1)n
b
t(b1)n+j : hh ej,n+1 , ej,r0 ++rj1 +1 , , eb1,r0 ++rb1 , e1,r0 +1 , ,
ej1,r0 ++rj1 , ebj,n+1
ii for 1 j b 1,
e + 1;
having l(t(b1)n+j ) = r1 + + rb1 + 2 d (b1)n
b
t(j1)n+(r0 ++ra1 )+i : hh ej,(r0 ++ra1 )+i , ea,(r0 ++ra1 )+i+1 , ,
ea,r0 ++ra , ea+1,(r0 ++ra )+1 , ,
eb1,r0 ++rb1 , e1,r0 +1 , ,
ea,(r0 ++ra1 )+i1 , ebj+a,(r0 ++ra1 )+i
ii
ii,
11
e + 1.
having l(t(j1)n+i ) = r0 + r2 + + rb1 + 2 d (b1)n
b
For p = r0 + i, 1 i r1 , we divide paths into two subcases:
Subcase1, if r1 b nb c + 2, then r0 + r2 + + rb1 d (b1)n
e 2. We can
b
choose the following paths:
tr0 +i : hh e1,r0 +i , eb1,1 , , eb1,r0 , e1,r0 +r1 +1 , ,
eb2,r0 ++rb1 , e1,n+1 , eb1,r0 +i
ii,
ii
ii
e + 1.
if rj = b nb c + 1 for some j, having l(tr0 +i ) = n rj + 2 = d (b1)n
b
For p = (j 1)n + r0 + i, 1 i r1 , 2 j b 1, we divide paths into two
subcases:
Subcase1, if r1 b nb c + 2, then r0 + r2 + + rb1 d (b1)n
e 2. We can
n
choose the following paths:
t(j1)n+r0 +i : hh ej,r0 +i , eb1,1 , , eb1,r0 , e1,r0 +r1 +1 , ,
eb2,r0 ++rb1 , e1,n+1 , ebj,r0 +i
12
ii,
e + 1.
having l(t(j1)n+r0 +i ) = r0 + r2 + + rb1 + 3 d (b1)n
b
Subcase2, if r1 = b nb c + 1, then r0 + r2 + + rb1 = d (b1)n
e 1, r0 < b nb c + 1
b
(If r0 = b nb c + 1, use Case 2), and rj b nb c + 1 for 2 j b 1.
If rs = b nb c + 1 for some s, we can choose the following paths:
t(j1)n+r0 +i : hh ej,r0 +i , ebs+1,r0 +i+1 , , ebs+1,r0 +r1 , ebs+2,r0 +r1 +1 , ,
eb1,r0 ++rs1 , e1,(r0 ++rs )+1 , , ebs1,r0 ++rb1 , ebs,1 , ,
ii,
ii,
e + 1.
having l(t(j1)n+r0 +i ) = n ru + 1 = d (b1)n
b
(b.) If rq = b nb c 1 for some 2 q b 1, and r0 = rs = b nb c for s 6= q,
2 s b 1. We choose:
t(j1)n+r0 +i : hh ej,r0 +i , e1,r0 +i+1 , , e1,r0 +r1 , e2,r0 +r1 +1 , ,
eb1,r0 ++rb1 , e1,r0 +1 , , e1,r0 +i1 , eb+1j,r0 +i
having l(t(j1)n+r0 +i ) = n r0 + 1 = d (b1)n
e + 1.
b
13
ii,
ii
ii
ii,
e;
having l(r(b1)n+1 ) = r0 + r2 + + rb1 + 1 d (b1)n
b
t(b1)n+j : hh ej,n+1 , e1,r0 +r1 +1 , , eb2,r0 ++rb1 ,
eb1,1 , , eb1,r0 , ebj+1,n+1
ii for 2 j b 1,
14
Note that from the above process we have k(= (b 1)n + (b 1)) vertexdisjoint paths, say Q1 , Q2 , , Qk , from x to y for any two distinct vertices x, y in
V (GFn (b)). Each path, Qj , is either l(Qj ) 2 or Qj [x, zj ] is one of the shortest
(x, zj )-path in GFn (b) NG [y], where zj is the vertex of Qj with l(Qj [zj , y]) = 2.
The above observation will be useful for counting length in the proof of Lemma 4.1.
15
3.2
e + 1.
Theorem 3.2 For n 1, Dk (GFn (b)) d (b1)n
b
Proof. For convenience, let G = GFn (b). Given ~x V (GFn (b)), ~x = (x1 , x2 , , xn ),
and
0,
1,
xi = 2,
..
b 1,
if 1 i r0 ;
if r0 + 1 i r0 + r1 ;
if r0 + r1 + 1 i r0 + r1 + r2 ;
if r0 + r1 + + rb2 + 1 i r0 + r1 + + rb1 = n.
We will divide our proof into two cases depending upon the value of n.
Case1. If n = bh, h N.
Let r0 = h + 1, r1 = h 1, and r2 = r3 = = rb1 = h. If we choose
S = {e1,i |1 i n} {ep,j |2 p b 1, 1 j n + 1}, then ~0 is only adjacent
to e1,n+1 in G S. We have dGS (e1,n+1 , ~x) = (b 1)h that implies Dk (G)
e + 1. Note that
(b 1)h + 1 = d (b1)n
b
hhe1,r0 +1 , , e1,r0 +r1 , e2,r0 +r1 +1 , , eb1,r0 ++rb1 , eb1,n+1 ii
is one of the shortest paths between e1,n+1 and ~x.
Case2. If n = bh + c, h N {0}, 1 c b 1.
Let r0 = h + 1, r1 = h, r2 = r3 = = rc = h + 1, and rc+1 = = rb1 = h.
If we choose S = {e1,i |1 i n} {ep,j |2 p b 1, 1 j n + 1}, then ~0 is
only adjacent to e1,n+1 in G S. We have dGS (e1,n+1 , ~x) = (b 1)h + c that implies
Dk (G) (b 1)h + c + 1 d (b1)n
e + 1. Note that
b
hhe1,r0 +r1 +1 , , e1,r0 +r1 +r2 , e2,r0 +r1 +r2 +1 , , eb2,r0 ++rb1 , eb1,1 , , eb1,r0 ii
is one of the shortest paths between e1,n+1 and ~x.
16
e + 1, for all n.
Hence Dk (GFn (b)) d (b1)n
b
From Proposition 1.1(4), Theorem 3.1 and 3.2, we have the following Theorem.
Theorem 3.3 For n 1,
&
'
(b 1)n
dk (GFn (b)) = Dk (GFn (b)) =
+ 1.
b
17
cube networks
Let G be a graph, P = v0 v1 v2 vp be a path of G. An edge vi vj E(G) E(P )
(i < j) is called a chord of P in G. A path P is said to be chordless in G if P has
no chord in G. If P has some chords in G, then let i be the minimum value such
that vi vj is a chord of P in G. Then, by replacing the subpath P [vi , vj ] by an edge
vi vj , we get a new (v0 , vp )-path P 0 = v0 v1 vi vj vj+1 vp such that V (P 0 ) V (P )
and the number of chords of P 0 is less than of P . Repeating this process, we finally
get a chordless (v0 , vp )-path Q from P such that V (Q) V (P ) and l(Q) l(P ).
We call this path Q a chordless path of P in G.
e + 1.
Lemma 4.1 If n 1, then rk (GFn (b)) d (b1)n
b
Proof. Let x be a vertex of GFn (b) and let y1 , y2 , , yk (not necessarily distinct)
be vertices of GFn (b) satisfying x 6= yi for i = 1, 2, , k. Suppose that there is
only w < k vertex-disjoint path, say P1 , P2 , , Pw , such that Pi is either xyi or a
e+1 for i = 1, 2, , w. We
chordless (x, yi )-path in GFn (b)xyi with l(Pi ) d (b1)n
b
choose w vertex-disjoint paths P1 , P2 , , Pw among such paths so that
w
X
l(Pi ) is
i=1
w
X
i=1
If
l(Pi [v, yi ]) 2, then we have V (Pi [x, v]) NG [yw+1 ] = . Suppose that V (Pi [x, v])
18
NG [yw+1 ] 6= , let b V (Pi [x, v]) NG [yw+1 ] and let Pw+1 be a chordless path
of Pi [x, b] byw+1 in GFn (b) xyw+1 . Then P1 , P2 , , Pi1 , Pi+1 , , Pw , Pw+1 are
w vertex-disjoint paths from x to y1 , y2 , , yi1 , yi+1 , , yw , yw+1 and l(Pw+1 ) <
l(Pi ), a contradiction to minimize
w
X
i=1
k
[
V (Qj )
w
[
i=1
j=1
choose a V (Q1 ) {
w
[
i=1
w
[
i=1
k
[
j=1
k
[
j=1
k
[
E(Qj ). If
j=1
w
[
E(Pi )
i=1
k
[
E(Qj )| at least one. So after finite many this process, we obtain w+1
j=1
20
References
[1] D. R. Duh, G. H. Chen and J. F. Fang, Algorithms and properties of a new
two-level network with folded hypercubes as basic modules, IEEE Transactions
on Parallel and Distributed Systems 6 (1995), 714-723.
[2] A. El-Amawy and S. Latifi, Properties and performance of folded hypercubes,
IEEE Transactions on Parallel and Distributed Systems 2 (1991), 31-42.
[3] D. F. Hsu, On container width and length in graphs, groups, and networks, IEICE Transaction on Fundamentals of Electronics, Communications and Computer Science E77-A (1994), 668-680.
[4] T. Kojima, On Rabin numbers of graphs and digraphs, preprint.
[5] M. S. Krishnamoorthy and B. Krishnamurthy, Fault diameter of interconnection
networks, Computers and Mathematics with Applications 13 (1987), 577-582.
[6] S. Lakshmivarahan, J. S. Jwo, and S. K. Dhall, Symmetry in interconnection
networks based on Caley graphs of permutation groups, Parallel Compution 19
(1993), 361-407.
[7] S. C. Liaw and G. J. Chang, Generalized diameters and Rabin numbers of
networks, Journal of Combinatorial Optimization 4 (1999), 371-384.
[8] S. C. Liaw, G. J. Chang, F. Cao, and D. F. Hsu, Fault-tolerant routing in circulant networks and cycle prefix networks, Annals of Combimatorics 2 (1998),
165-172.
[9] M. O. Rabin, Efficient dispersal of information for security, load balancing, and
fault tolerance, J. Association for Computing Machinery 36 (1989), 335-348.
21