Channel Assignment Problem
Last Updated :
31 Jan, 2023
There are M transmitter and N receiver stations. Given a matrix that keeps track of the number of packets to be transmitted from a given transmitter to a receiver. If the (i; j)-th entry of the matrix is k, it means at that time the station i has k packets for transmission to station j.
During a time slot, a transmitter can send only one packet and a receiver can receive only one packet. Find the channel assignments so that maximum number of packets are transferred from transmitters to receivers during the next time slot.
Example:
0 2 0
3 0 1
2 4 0
The above is the input format. We call the above matrix M. Each value M[i; j] represents the number of packets Transmitter 'i' has to send to Receiver 'j'. The output should be:
The number of maximum packets sent in the time slot is 3
T1 -> R2
T2 -> R3
T3 -> R1
Note that the maximum number of packets that can be transferred in any slot is min(M, N).
Algorithm:
The channel assignment problem between sender and receiver can be easily transformed into Maximum Bipartite Matching(MBP) problem that can be solved by converting it into a flow network.
Step 1: Build a Flow Network
There must be a source and sink in a flow network. So we add a dummy source and add edges from source to all senders. Similarly, add edges from all receivers to dummy sink. The capacity of all added edges is marked as 1 unit.
Step 2: Find the maximum flow.
We use Ford-Fulkerson algorithm to find the maximum flow in the flow network built in step 1. The maximum flow is actually the maximum number of packets that can be transmitted without bandwidth interference in a time slot.
Implementation:
Let us first define input and output forms. Input is in the form of Edmonds matrix which is a 2D array ‘table[M][N]‘ with M rows (for M senders) and N columns (for N receivers). The value table[i][j] is the number of packets that has to be sent from transmitter ‘i’ to receiver ‘j’. Output is the maximum number of packets that can be transmitted without bandwidth interference in a time slot.
A simple way to implement this is to create a matrix that represents adjacency matrix representation of a directed graph with M+N+2 vertices. Call the fordFulkerson() for the matrix. This implementation requires O((M+N)*(M+N)) extra space.
Extra space can be reduced and code can be simplified using the fact that the graph is bipartite. The idea is to use DFS traversal to find a receiver for a transmitter (similar to augmenting path in Ford-Fulkerson). We call bpm() for every applicant, bpm() is the DFS based function that tries all possibilities to assign a receiver to the sender. In bpm(), we one by one try all receivers that a sender ‘u’ is interested in until we find a receiver or all receivers are tried without luck.
For every receiver we try, we do following:
If a receiver is not assigned to anybody, we simply assign it to the sender and return true. If a receiver is assigned to somebody else say x, then we recursively check whether x can be assigned some other receiver. To make sure that x doesn’t get the same receiver again, we mark the receiver ‘v’ as seen before we make recursive call for x. If x can get other receiver, we change the sender for receiver ‘v’ and return true. We use an array maxR[0..N-1] that stores the senders assigned to different receivers.
If bmp() returns true, then it means that there is an augmenting path in flow network and 1 unit of flow is added to the result in maxBPM().
Time and space complexity analysis:
In case of bipartite matching problem, F ? |V| since there can be only |V| possible edges coming out from source node. So the total running time is O(m’n) = O((m + n)n). The space complexity is also substantially reduced from O ((M+N)*(M+N)) to just a single dimensional array of size M thus storing the mapping between M and N.
C++
#include <iostream>
#include <string.h>
#include <vector>
#define M 3
#define N 4
using namespace std;
// A Depth First Search based recursive function that returns true
// if a matching for vertex u is possible
bool bpm(int table[M][N], int u, bool seen[], int matchR[])
{
// Try every receiver one by one
for (int v = 0; v < N; v++)
{
// If sender u has packets to send to receiver v and
// receiver v is not already mapped to any other sender
// just check if the number of packets is greater than '0'
// because only one packet can be sent in a time frame anyways
if (table[u][v]>0 && !seen[v])
{
seen[v] = true; // Mark v as visited
// If receiver 'v' is not assigned to any sender OR
// previously assigned sender for receiver v (which is
// matchR[v]) has an alternate receiver available. Since
// v is marked as visited in the above line, matchR[v] in
// the following recursive call will not get receiver 'v' again
if (matchR[v] < 0 || bpm(table, matchR[v], seen, matchR))
{
matchR[v] = u;
return true;
}
}
}
return false;
}
// Returns maximum number of packets that can be sent parallelly in 1
// time slot from sender to receiver
int maxBPM(int table[M][N])
{
// An array to keep track of the receivers assigned to the senders.
// The value of matchR[i] is the sender ID assigned to receiver i.
// the value -1 indicates nobody is assigned.
int matchR[N];
// Initially all receivers are not mapped to any senders
memset(matchR, -1, sizeof(matchR));
int result = 0; // Count of receivers assigned to senders
for (int u = 0; u < M; u++)
{
// Mark all receivers as not seen for next sender
bool seen[N];
memset(seen, 0, sizeof(seen));
// Find if the sender 'u' can be assigned to the receiver
if (bpm(table, u, seen, matchR))
result++;
}
cout << "The number of maximum packets sent in the time slot is "
<< result << "\n";
for (int x=0; x<N; x++)
if (matchR[x]+1!=0)
cout << "T" << matchR[x]+1 << "-> R" << x+1 << "\n";
return result;
}
// Driver program to test above function
int main()
{
int table[M][N] = {{0, 2, 0}, {3, 0, 1}, {2, 4, 0}};
int max_flow = maxBPM(table);
return 0;
}
Java
import java.util.*;
class GFG
{
static int M = 3;
static int N = 3;
// A Depth First Search based recursive function
// that returns true if a matching for vertex u is possible
static boolean bpm(int table[][], int u,
boolean seen[], int matchR[])
{
// Try every receiver one by one
for (int v = 0; v < N; v++)
{
// If sender u has packets to send
// to receiver v and receiver v is not
// already mapped to any other sender
// just check if the number of packets is
// greater than '0' because only one packet
// can be sent in a time frame anyways
if (table[u][v] > 0 && !seen[v])
{
seen[v] = true; // Mark v as visited
// If receiver 'v' is not assigned to
// any sender OR previously assigned sender
// for receiver v (which is matchR[v]) has an
// alternate receiver available. Since v is
// marked as visited in the above line,
// matchR[v] in the following recursive call
// will not get receiver 'v' again
if (matchR[v] < 0 || bpm(table, matchR[v],
seen, matchR))
{
matchR[v] = u;
return true;
}
}
}
return false;
}
// Returns maximum number of packets
// that can be sent parallelly in
// 1 time slot from sender to receiver
static int maxBPM(int table[][])
{
// An array to keep track of the receivers
// assigned to the senders. The value of matchR[i]
// is the sender ID assigned to receiver i.
// The value -1 indicates nobody is assigned.
int []matchR = new int[N];
// Initially all receivers are
// not mapped to any senders
Arrays.fill(matchR, -1);
int result = 0; // Count of receivers assigned to senders
for (int u = 0; u < M; u++)
{
// Mark all receivers as not seen for next sender
boolean []seen = new boolean[N];
Arrays.fill(seen, false);
// Find if the sender 'u' can be
// assigned to the receiver
if (bpm(table, u, seen, matchR))
result++;
}
System.out.println("The number of maximum packets" +
" sent in the time slot is " + result);
for (int x = 0; x < N; x++)
if (matchR[x] + 1 != 0)
System.out.println("T" + (matchR[x] + 1) +
"-> R" + (x + 1));
return result;
}
// Driver Code
public static void main(String[] args)
{
int table[][] = {{0, 2, 0},
{3, 0, 1},
{2, 4, 0}};
maxBPM(table);
}
}
// This code is contributed by Rajput-Ji
Python3
# A Depth First Search based recursive
# function that returns true if a matching
# for vertex u is possible
def bpm(table, u, seen, matchR):
global M, N
# Try every receiver one by one
for v in range(N):
# If sender u has packets to send to
# receiver v and receiver v is not
# already mapped to any other sender
# just check if the number of packets
# is greater than '0' because only one
# packet can be sent in a time frame anyways
if (table[u][v] > 0 and not seen[v]):
seen[v] = True # Mark v as visited
# If receiver 'v' is not assigned to any
# sender OR previously assigned sender
# for receiver v (which is matchR[v]) has
# an alternate receiver available. Since
# v is marked as visited in the above line,
# matchR[v] in the following recursive call
# will not get receiver 'v' again
if (matchR[v] < 0 or bpm(table, matchR[v],
seen, matchR)):
matchR[v] = u
return True
return False
# Returns maximum number of packets
# that can be sent parallelly in 1
# time slot from sender to receiver
def maxBPM(table):
global M, N
# An array to keep track of the receivers
# assigned to the senders. The value of
# matchR[i] is the sender ID assigned to
# receiver i. The value -1 indicates nobody
# is assigned.
# Initially all receivers are not mapped
# to any senders
matchR = [-1] * N
result = 0 # Count of receivers assigned to senders
for u in range(M):
# Mark all receivers as not seen
# for next sender
seen = [0] * N
# Find if the sender 'u' can be assigned
# to the receiver
if (bpm(table, u, seen, matchR)):
result += 1
print("The number of maximum packets sent",
"in the time slot is", result)
for x in range(N):
if (matchR[x] + 1 != 0):
print("T", matchR[x] + 1, "-> R", x + 1)
return result
# Driver Code
M = 3
N = 4
table = [[0, 2, 0], [3, 0, 1], [2, 4, 0]]
max_flow = maxBPM(table)
# This code is contributed by PranchalK
C#
// C# implementation of the above approach
using System;
class GFG
{
static int M = 3;
static int N = 3;
// A Depth First Search based recursive function
// that returns true if a matching for vertex u is possible
static Boolean bpm(int [,]table, int u,
Boolean []seen, int []matchR)
{
// Try every receiver one by one
for (int v = 0; v < N; v++)
{
// If sender u has packets to send
// to receiver v and receiver v is not
// already mapped to any other sender
// just check if the number of packets is
// greater than '0' because only one packet
// can be sent in a time frame anyways
if (table[u, v] > 0 && !seen[v])
{
seen[v] = true; // Mark v as visited
// If receiver 'v' is not assigned to
// any sender OR previously assigned sender
// for receiver v (which is matchR[v]) has an
// alternate receiver available. Since v is
// marked as visited in the above line,
// matchR[v] in the following recursive call
// will not get receiver 'v' again
if (matchR[v] < 0 || bpm(table, matchR[v],
seen, matchR))
{
matchR[v] = u;
return true;
}
}
}
return false;
}
// Returns maximum number of packets
// that can be sent parallelly in
// 1 time slot from sender to receiver
static int maxBPM(int [,]table)
{
// An array to keep track of the receivers
// assigned to the senders. The value of matchR[i]
// is the sender ID assigned to receiver i.
// The value -1 indicates nobody is assigned.
int []matchR = new int[N];
// Initially all receivers are
// not mapped to any senders
for(int i = 0; i < N; i++)
matchR[i] = -1;
int result = 0; // Count of receivers assigned to senders
for (int u = 0; u < M; u++)
{
// Mark all receivers as not seen for next sender
Boolean []seen = new Boolean[N];
// Find if the sender 'u' can be
// assigned to the receiver
if (bpm(table, u, seen, matchR))
result++;
}
Console.WriteLine("The number of maximum packets" +
" sent in the time slot is " + result);
for (int x = 0; x < N; x++)
if (matchR[x] + 1 != 0)
Console.WriteLine("T" + (matchR[x] + 1) +
"-> R" + (x + 1));
return result;
}
// Driver Code
public static void Main(String[] args)
{
int [,]table = {{0, 2, 0},
{3, 0, 1},
{2, 4, 0}};
maxBPM(table);
}
}
// This code is contributed by 29AjayKumar
JavaScript
<script>
let M = 3;
let N = 3;
// A Depth First Search based recursive function
// that returns true if a matching for vertex u is possible
function bpm(table,u,seen,matchR)
{
// Try every receiver one by one
for (let v = 0; v < N; v++)
{
// If sender u has packets to send
// to receiver v and receiver v is not
// already mapped to any other sender
// just check if the number of packets is
// greater than '0' because only one packet
// can be sent in a time frame anyways
if (table[u][v] > 0 && !seen[v])
{
seen[v] = true; // Mark v as visited
// If receiver 'v' is not assigned to
// any sender OR previously assigned sender
// for receiver v (which is matchR[v]) has an
// alternate receiver available. Since v is
// marked as visited in the above line,
// matchR[v] in the following recursive call
// will not get receiver 'v' again
if (matchR[v] < 0 || bpm(table, matchR[v],
seen, matchR))
{
matchR[v] = u;
return true;
}
}
}
return false;
}
// Returns maximum number of packets
// that can be sent parallelly in
// 1 time slot from sender to receiver
function maxBPM(table)
{
// An array to keep track of the receivers
// assigned to the senders. The value of matchR[i]
// is the sender ID assigned to receiver i.
// The value -1 indicates nobody is assigned.
let matchR = new Array(N);
// Initially all receivers are
// not mapped to any senders
for(let i=0;i<N;i++)
{
matchR[i]=-1;
}
let result = 0; // Count of receivers assigned to senders
for (let u = 0; u < M; u++)
{
// Mark all receivers as not seen for next sender
let seen = new Array(N);
for(let i=0;i<N;i++)
{
seen[i]=false;
}
// Find if the sender 'u' can be
// assigned to the receiver
if (bpm(table, u, seen, matchR))
result++;
}
document.write("The number of maximum packets" +
" sent in the time slot is " + result+"<br>");
for (let x = 0; x < N; x++)
if (matchR[x] + 1 != 0)
document.write("T" + (matchR[x] + 1) +
"-> R" + (x + 1)+"<br>");
return result;
}
// Driver Code
let table= [[0, 2, 0],
[3, 0, 1],
[2, 4, 0]];
maxBPM(table);
// This code is contributed by rag2127
</script>
OutputThe number of maximum packets sent in the time slot is 3
T3-> R1
T1-> R2
T2-> R3
Time Complexity:O((M + N) * N), Where M and N is the number of senders and number of receivers respectively.
Space Complexity: O(M) , here M is the number of senders.
Similar Reads
Graph Algorithms
Graph algorithms are methods used to manipulate and analyze graphs, solving various range of problems like finding the shortest path, cycles detection. If you are looking for difficulty-wise list of problems, please refer to Graph Data Structure.BasicsGraph and its representationsBFS and DFS Breadth
3 min read
Introduction to Graph Data Structure
Graph Data Structure is a non-linear data structure consisting of vertices and edges. It is useful in fields such as social network analysis, recommendation systems, and computer networks. In the field of sports data science, graph data structure can be used to analyze and understand the dynamics of
15+ min read
Graph and its representations
A Graph is a non-linear data structure consisting of vertices and edges. The vertices are sometimes also referred to as nodes and the edges are lines or arcs that connect any two nodes in the graph. More formally a Graph is composed of a set of vertices( V ) and a set of edges( E ). The graph is den
12 min read
Types of Graphs with Examples
A graph is a mathematical structure that represents relationships between objects by connecting a set of points. It is used to establish a pairwise relationship between elements in a given set. graphs are widely used in discrete mathematics, computer science, and network theory to represent relation
9 min read
Basic Properties of a Graph
A Graph is a non-linear data structure consisting of nodes and edges. The nodes are sometimes also referred to as vertices and the edges are lines or arcs that connect any two nodes in the graph. The basic properties of a graph include: Vertices (nodes): The points where edges meet in a graph are kn
4 min read
Applications, Advantages and Disadvantages of Graph
Graph is a non-linear data structure that contains nodes (vertices) and edges. A graph is a collection of set of vertices and edges (formed by connecting two vertices). A graph is defined as G = {V, E} where V is the set of vertices and E is the set of edges. Graphs can be used to model a wide varie
7 min read
Transpose graph
Transpose of a directed graph G is another directed graph on the same set of vertices with all of the edges reversed compared to the orientation of the corresponding edges in G. That is, if G contains an edge (u, v) then the converse/transpose/reverse of G contains an edge (v, u) and vice versa. Giv
9 min read
Difference Between Graph and Tree
Graphs and trees are two fundamental data structures used in computer science to represent relationships between objects. While they share some similarities, they also have distinct differences that make them suitable for different applications. Difference Between Graph and Tree What is Graph?A grap
2 min read
BFS and DFS on Graph
Breadth First Search or BFS for a Graph
Given a undirected graph represented by an adjacency list adj, where each adj[i] represents the list of vertices connected to vertex i. Perform a Breadth First Search (BFS) traversal starting from vertex 0, visiting vertices from left to right according to the adjacency list, and return a list conta
15+ min read
Depth First Search or DFS for a Graph
In Depth First Search (or DFS) for a graph, we traverse all adjacent vertices one by one. When we traverse an adjacent vertex, we completely finish the traversal of all vertices reachable through that adjacent vertex. This is similar to a tree, where we first completely traverse the left subtree and
13 min read
Applications, Advantages and Disadvantages of Depth First Search (DFS)
Depth First Search is a widely used algorithm for traversing a graph. Here we have discussed some applications, advantages, and disadvantages of the algorithm. Applications of Depth First Search:1. Detecting cycle in a graph: A graph has a cycle if and only if we see a back edge during DFS. So we ca
4 min read
Applications, Advantages and Disadvantages of Breadth First Search (BFS)
We have earlier discussed Breadth First Traversal Algorithm for Graphs. Here in this article, we will see the applications, advantages, and disadvantages of the Breadth First Search. Applications of Breadth First Search: 1. Shortest Path and Minimum Spanning Tree for unweighted graph: In an unweight
4 min read
Iterative Depth First Traversal of Graph
Given a directed Graph, the task is to perform Depth First Search of the given graph.Note: Start DFS from node 0, and traverse the nodes in the same order as adjacency list.Note : There can be multiple DFS traversals of a graph according to the order in which we pick adjacent vertices. Here we pick
10 min read
BFS for Disconnected Graph
In the previous post, BFS only with a particular vertex is performed i.e. it is assumed that all vertices are reachable from the starting vertex. But in the case of a disconnected graph or any vertex that is unreachable from all vertex, the previous implementation will not give the desired output, s
14 min read
Transitive Closure of a Graph using DFS
Given a directed graph, find out if a vertex v is reachable from another vertex u for all vertex pairs (u, v) in the given graph. Here reachable means that there is a path from vertex u to v. The reach-ability matrix is called transitive closure of a graph. For example, consider below graph: GraphTr
8 min read
Difference between BFS and DFS
Breadth-First Search (BFS) and Depth-First Search (DFS) are two fundamental algorithms used for traversing or searching graphs and trees. This article covers the basic difference between Breadth-First Search and Depth-First Search.Difference between BFS and DFSParametersBFSDFSStands forBFS stands fo
2 min read
Cycle in a Graph
Detect Cycle in a Directed Graph
Given the number of vertices V and a list of directed edges, determine whether the graph contains a cycle or not.Examples: Input: V = 4, edges[][] = [[0, 1], [0, 2], [1, 2], [2, 0], [2, 3]]Cycle: 0 â 2 â 0 Output: trueExplanation: The diagram clearly shows a cycle 0 â 2 â 0 Input: V = 4, edges[][] =
15+ min read
Detect cycle in an undirected graph
Given an undirected graph, the task is to check if there is a cycle in the given graph.Examples:Input: V = 4, edges[][]= [[0, 1], [0, 2], [1, 2], [2, 3]]Undirected Graph with 4 vertices and 4 edgesOutput: trueExplanation: The diagram clearly shows a cycle 0 â 2 â 1 â 0Input: V = 4, edges[][] = [[0,
8 min read
Detect Cycle in a directed graph using colors
Given a directed graph represented by the number of vertices V and a list of directed edges, determine whether the graph contains a cycle.Your task is to implement a function that accepts V (number of vertices) and edges (an array of directed edges where each edge is a pair [u, v]), and returns true
9 min read
Detect a negative cycle in a Graph | (Bellman Ford)
Given a directed weighted graph, your task is to find whether the given graph contains any negative cycles that are reachable from the source vertex (e.g., node 0).Note: A negative-weight cycle is a cycle in a graph whose edges sum to a negative value.Example:Input: V = 4, edges[][] = [[0, 3, 6], [1
15+ min read
Cycles of length n in an undirected and connected graph
Given an undirected and connected graph and a number n, count the total number of simple cycles of length n in the graph. A simple cycle of length n is defined as a cycle that contains exactly n vertices and n edges. Note that for an undirected graph, each cycle should only be counted once, regardle
10 min read
Detecting negative cycle using Floyd Warshall
We are given a directed graph. We need compute whether the graph has negative cycle or not. A negative cycle is one in which the overall sum of the cycle comes negative. Negative weights are found in various applications of graphs. For example, instead of paying cost for a path, we may get some adva
12 min read
Clone a Directed Acyclic Graph
A directed acyclic graph (DAG) is a graph which doesn't contain a cycle and has directed edges. We are given a DAG, we need to clone it, i.e., create another graph that has copy of its vertices and edges connecting them. Examples: Input : 0 - - - > 1 - - - -> 4 | / \ ^ | / \ | | / \ | | / \ |
12 min read