Network of banking machines accessing client information

Assignment Help Computer Engineering
Reference no: EM133197379

Imagine that we have a network of processors, each one of which needs access to a common database in order to carry out its work (for example, a network of banking machines accessing client information). To simplify, assume all operations are queries (no operation changes the data). Our problem is to determine which processor(s) should store the database (these processors will be called "servers") in order to have reasonably fast access time (including the load on each server), as well as having as little duplication of the database as possible.

At one extreme, each processor could store its own copy of the database. This would ensure the fastest possible access time, but at the cost of replicating the database many times. At the other extreme, the database could be stored in a single server (all other processors would connect to the server to access the data). This would ensure the smallest amount of duplication, but at the cost of longer access times and server load. In either case, there is a significant cost if the network is large.

A reasonable middle ground between the two extremes would be to fix a distance parameter d and to store the database on as few servers as possible, chosen so that every processor is within distance d of at least one server (the distance is measured as the minimum number of links required to send communications from one processor to the next). Unfortunately, it seems impossible to solve this problem efficiently.

Formally, show that the following SERVERLOCATION problem is NP-complete by first showing that SERVERLOCATION  is in NP and then showing that it is NP-hard. You may use the NP-complete problem from the following SUBSET-SUM for your reduction where the SUBSET-SUM is an NP-Complete problem defined as follows: 

SUBSET-SUM:

Input: Set of Integers S= {w1, ... , wn}, integer W

Output: Is there S'  S that adds up exactly to W?

And the SERVERLOCATION problem is defined as follows:

Input: An undirected graph G (the network of processors) and non-negative integers k and d.

Output: Is there some subset S of no more than k vertices (the "servers") such that every processor is within distance d of some server in S? (The "distance" between vertices u, v is measured as the number of edges on a shortest path from u to v, or infinity (∞) if there is no path from u to v.)

Formally, show that the following SERVERLOCATION problem is NP-complete by first showing that SERVERLOCATION  is in NP and then showing that it is NP-hard

Reference no: EM133197379

Questions Cloud

Explain the link between economic growth : Explain the link between economic growth and increasing carbon dioxide emissions. Central Florida Institute Palm Harbor.
Discuss the critics large corporations see the policy : Discuss Critics of large corporations see the policy as unfair public support of those who need it least. What do you think?
Summarize how the ponzi scheme began and how it worked : The University of New Orleans - What standard should an individual investor be held to in these circumstances? Is it the government's job to ensure
What questions about human culture does this work prompt : 1. Identify a creator from the twentieth or twenty-?rst century who you think made an important contribution to art and culture in the form of cultural works th
Network of banking machines accessing client information : Imagine that we have a network of processors, each one of which needs access to a common database in order to carry out its work (for example, a network of bank
Identify the central organization in the article : BUS 497 Capstone: Strategic Management Assignment - Telling the "Strategy Story" - Business Paper, California State University Northridge
Will tina be subject to any other special requirements : University of the Cumberlands - she is looking to raise that money through the internet and still fall under an SEC exemption. How should Tina go about raising
Describe how global warming is linked to extreme heat : please use some real-life examples that you learned from the textbook to describe how global warming is linked to each of these four symptoms
Identify a specific theory of cognitive or moral development : Identify a specific theory of cognitive or moral development, and in 2-3 sentences summarize the major assumptions.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe cybersecurity training programs

Describe Cybersecurity Training programs at your own organization (frequency, use of automation, certification after finishing, etc).

  Write one assignment statement that would accomplish

Write one assignment statement that would accomplish the same thing. Assume that mat is a matrix variable that has been initialized.

  Analyse the components of a computer system

H/601/6768 -Computing Fundamentals -BH027165 – Edexcel BTEC Levels 4 and 5 Higher Nationals specification in Art and Design.

  Why twitter is a unidirectional network and facebook is not

The tributaries of the Mississippi River follow a Power Law. Can you explain which variables should go on each axis?

  Provide the menu interface to get to all the rest

Square foot to acreage and acreage to square foot conversion, this function must take a numeric value and an alphabetic value and convert from one to the other. use calculations in square footage for final pricing.

  How the concepts affect business intelligence programs

Target measures, probability mining, and econometric modeling are three concepts that are associated with data mining and business decisions.

  Implement converter convert six-bit binary number into bcd

Implement a converter to convert six-bit binary numbers into BCD, using a ROM of the appropriate size.

  Write down the object code for the following program

Write down the object code for the following program, assuming that it is not necessary to force extended addressing.

  Discuss what kind of attack is

a wireless access point that is configured to look exactly like a company's valid wireless access point by using the same SSID

  Who makes up an incident response team

No matter how well your data is protected, eventually there will be a breach of security or a natural disaster. It could be the result of a human error.

  Write a c program to solve a single quadratic equation

Reading of coefficients a, b, c shall be done by calling a function named readCoeffs(), once for each coefficient.

  Describe the general physical inspection phase

Fire is one of the most devastating elements that can destroy the physical components of an entity quickly. Explain some of the fire protocols that should be.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd