Next Article in Journal
Rebalancing Curriculum Learning via In-Batch Difficulty Reallocation for Neural Machine Translation
Previous Article in Journal
On the Structure of Uncertainty Inequalities for the Novel Quadratic-Phase Deformed Hankel Transform
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

When Does Domination Matter: A Structural and Computational Study of Spanning and Dominating Trees in Geometric Networks

Department of Electrical Engineering, Universidad de Santiago de Chile, Avenida Víctor Jara 3519, Santiago 9170124, Chile
Mathematics 2026, 14(10), 1605; https://doi.org/10.3390/math14101605
Submission received: 21 April 2026 / Revised: 4 May 2026 / Accepted: 6 May 2026 / Published: 9 May 2026

Abstract

In geometric communication networks, a backbone is useful only if it is inexpensive to build and, at the same time, close enough to the demand points it must serve. This paper studies a backbone design problem in geometric communication networks that explicitly captures this trade-off between connectivity and user coverage. Two classical combinatorial optimization paradigms—the minimum spanning tree (MST), which promotes low-cost connectivity, and the dominating tree (DT), which additionally enforces that every node either belongs to the backbone or is adjacent to an active backbone node—are considered. To compare both paradigms within a common framework, this paper proposes a unified mixed-integer optimization model that balances backbone-construction and user-assignment costs. Three classes of exact formulations, namely MTZ, single-flow, and cut-set formulations, are developed. In particular, the single-flow model with valid inequalities and root-aware connectivity cuts is strengthened. For larger instances, the exact approach is complemented with a local branching matheuristic. Finally, theoretical results on computational complexity, formulation structure, and dominance relations between the MST and DT models are provided. Computational experiments show that the single-flow formulation achieves the best scalability. Furthermore, a sensitivity analysis with respect to the communication radius and the weighting parameter α reveals a structural transition: as the network becomes denser or the objective becomes more coverage-oriented, MST and DT solutions tend to converge. The results give a concrete way to identify when domination constraints are worth imposing and when a simpler spanning tree design already captures the relevant structure.

1. Introduction

The main goal of this study is related to the usefulness of domination constraints as they change with the geometry of a network. If the communication radius increases, the underlying graph becomes denser; consequently, more links become available and the set of feasible backbone topologies expands. In such settings, the additional domination requirement may become less significant since an MST-based backbone can remain sufficiently close to the rest of the network. An equivalent effect arises when α decreases, since the objective function places more emphasis on user service than on the cost of the backbone. This creates the basic trade-off studied in this paper. Connectivity pushes the model toward small and inexpensive trees, whilst coverage pushes it toward backbones that are more spread out and closer to users [1,2,3].
The minimum spanning tree (MST) is a classical combinatorial optimization problem that allows for the construction of a backbone. More precisely, it consists of obtaining network connectivity at a minimum cost, making it attractive for applications related to communication, routing, and data collection. However, notice that MST-based designs focus only on connectivity among selected nodes and do not explicitly consider the coverage of the remaining nodes. In contrast, the dominating tree problem, which is another combinatorial optimization problem, requires that every node either belongs to the backbone or is adjacent to at least one of the active backbone nodes. This is particularly relevant in wireless networks since dominating and connected structures are commonly used as virtual backbones for routing, aggregation, and topology control [1,2,3,4,5]. Although both paradigms are natural in network design, their structural relationship in geometric networks remains only partially explored.
Recent work confirms the high relevance of virtual backbone construction and domination-based models in modern communication networks. Quality virtual backbones have been studied under cooperative communication and faulty link conditions [1,2,3], whilst connected, weakly connected, and multi-fold dominating variants have motivated the search for increasingly sophisticated local search, GRASP, and hybrid metaheuristic approaches [4,5,6,7]. In parallel, exact and mixed-integer optimization methods for domination-related problems have also evolved, including recent work on domination in general graphs, clustered dominating trees, and tree-based Euclidean communication structures [8,9,10]. Nevertheless, a unified exact framework that jointly studies spanning tree and dominating tree backbones in a common geometric communication network setting is still lacking effort.
This paper addresses this gap by studying the design of MST and DT backbones within a unified optimization framework for geometric communication networks. The proposed models combine backbone-construction and user-assignment costs into a single objective, which is especially important in communication frameworks where backbone nodes are expected not only to ensure connectivity but also to provide efficient access to nearby users or traffic sources. The integration of user-assignment costs sets the proposed framework apart from both classical facility location and standard network design models. Facility location models usually optimize facility opening and user assignment without requiring the selected facilities to form a connected backbone. In contrast, spanning tree and network design models often optimize connectivity without explicitly accounting for user-to-backbone service costs. Here, both dimensions are optimized simultaneously: selected nodes must form a connected tree, and users must be assigned to active nodes. This simultaneous approach makes it possible to study the trade-off between infrastructure cost and service proximity in MST- and DT-based backbone designs. To analyze both paradigms, three classes of mixed-integer formulations for each model are proposed. A Miller–Tucker–Zemlin (MTZ) formulation, a single-commodity flow, and a cut-set formulation are developed and compared. These models are further strengthened by valid cuts and root-aware connectivity inequalities, including constraints that can be dynamically separated through lazy constraint callbacks [11]. This allows us to assess not only solution quality but also formulation strength, separation behavior, and computational scalability. Notice that classical MST formulations usually assume that all relevant terminals are already fixed, and classical DT formulations focus primarily on domination and connectivity. In contrast, the proposed approach jointly decides which nodes should be activated, how they should be connected, and how users should be assigned to the resulting backbone. This integration is important because it allows for comparing connectivity-driven and domination-driven designs under exactly the same cost structure and geometric assumptions.
This paper also considers the structural properties of the networks obtained. More precisely, the communication radius and the weighting parameter that affect the objective function in terms of connectivity and coverage are also studied. Notice that small radii domination constraints play an active role, forcing the activation of additional nodes, which leads to more expensive backbone infrastructures. By contrast, if the radius increases, the graph becomes denser, and the MST and DT solutions tend to converge into the same output solution. To further examine this effect, the joint impact of the communication radius and the weighting parameter through a three-dimensional sensitivity study is realized to separate the regions in which domination is structurally relevant from those in which dominance becomes irrelevant. Thus, the contribution is not only to redefine MST or DT structures. Instead, it is to place them in the same mixed-integer model, solve them endogenously with comparable formulations, and use the results to locate the regimes in which domination actually changes the selected backbone. The contribution of this paper can be understood at three complementary levels. First, the modeling level, where a unified mixed-integer framework is established in which MST- and DT-based backbones are compared under the same geometric graphs. For this purpose, a user-assignment structure and a weighted objective function are introduced. At a second level, three exact modeling families, namely MTZ, single-flow, and cut-set formulations, are considered. Then, the computational behavior changes across both backbone paradigms are analyzed. Finally, at the structural level, a unified framework to empirically identify the regimes in the ( α , r ) parameter space where domination constraints are binding and the regimes where they become practically redundant is determined.
Consequently, the main contributions can be summarized as follows. A unified mixed-integer optimization approach is proposed for geometric backbone design that simultaneously determines node activation, backbone connectivity, and user assignment. This modeling step allows MST- and DT-based structures to be compared under the same objective function and the same geometric assumptions. Next, the MTZ, single-flow, and cut-set formulations are developed and compared for both MST and DT variants. This formulation-oriented step allows us to assess the computational strength, scalability, and practical limitations of each exact modeling strategy. Then, valid inequalities and root-aware connectivity cuts are derived and tested for the single-flow formulation, as it turns out to be the most effective exact model in our experiments. Lastly, a structural computational analysis of the ( α , r ) parameter space is needed to identify when domination constraints change the optimal backbone and when MST and DT solutions coincide or become nearly identical in practice. Notice that the proposed approach is neither a direct reformulation of a Steiner tree nor a connected dominating set problem, nor a classical coverage–connectivity deployment model. Instead, it simultaneously combines endogenous node activation, tree connectivity, domination constraints, and user-assignment costs, allowing for a direct comparison between MST- and DT-based backbone designs.
For this purpose, the present work aims to not only solve either an MST- or a DT-based problem in isolation. Instead, it provides a unified optimization and computational framework for comparing both paradigms under the same geometric, assignment, and weighting assumptions. This makes it possible to identify not only which formulation is computationally stronger but also the operating regimes in which domination constraints are structurally active or redundant.
The remainder of this paper is organized as follows. Section 2 reviews the most relevant literature on backbone design, dominating structures, spanning trees, and geometric network models. Section 3 presents the proposed optimization formulations; here, the MTZ, single-flow, and cut-set models for both MST and DT are considered. Section 4 provides theoretical analysis, including structural properties, formulation relationships, and valid inequalities. In Section 5, the computational experiments, including formulation comparisons, the impact of valid inequalities, cut-set connectivity cuts, and the three-dimensional analysis of the interaction between the communication radius and the weighting parameter, are reported. Finally, Section 6 provides a brief discussion of the implications of the results from a network design perspective and concludes the article with directions for future research.

2. Related Work

From the existing literature, notice that there are two key open issues. First, there is limited exact optimization work that compares the MST and DT backbones within a unified model that explicitly accounts for user service. Second, although formulation studies are common in network design, they have rarely been used to analyze when domination meaningfully changes the solution and when it becomes less relevant as the network becomes denser. This is precisely the gap addressed in this paper: both paradigms within the same optimization framework are studied and examined not only for their computational behavior but also for the regimes in which their solutions begin to overlap.
The present work is also related to, but different from, classical Steiner tree, connected dominating set, and coverage–connectivity models. In Steiner tree problems, the set of terminals is usually given in advance, and the main decision is to find a minimum-cost connected subgraph spanning those terminals, possibly using additional Steiner nodes. In contrast, the proposed MST-based model does not assume a fixed terminal set: active nodes are selected endogenously through the interaction between backbone-construction costs and user-assignment costs. Connected dominating set models are close to the DT problem of our work, as they impose both connectivity and domination. However, they usually study domination-based backbones as standalone structures, whereas our approach compares DT solutions directly with MST-based solutions under the same geometric graph, user set, and objective function. Finally, coverage–connectivity models in wireless networks capture related spatial trade-offs, but they are often designed for deployment, clustering, or topology control decisions rather than for a formulation-oriented comparison of MST and DT backbones. Therefore, the novelty of this paper lies in the integration of these lines into a single exact optimization and structural analysis framework.
In wireless sensor and ad hoc networks, connected dominating sets and related structures have long been used as virtual backbones because they provide compact routing infrastructures while preserving neighborhood coverage. Recent work has revisited this topic from several perspectives. Quality virtual backbones under faulty links [1], cooperative communication backbones [2,3], and dominating set variants with stronger connectivity requirements [4,5,6,7] reflect the same underlying design perspective: reducing backbone size or cost while maintaining adequate coverage, robustness, or routing quality. In addition, exact and heuristic approaches for domination-type structures have continued to evolve in both pure graph settings and network-oriented applications [8,9,12,13,14].
A second related research stream concerns simultaneous coverage–connectivity optimization in wireless sensor networks. In this literature, the goals are always focused on deployment, clustering, or energy-aware topology construction instead of exact backbone tree design. These studies are highly relevant because they formalize the same spatial trade-off that motivates our work. As the communication graph becomes denser, connectivity becomes easier to maintain, and the need for additional relay or dominating nodes decreases. This approach emerges in deployment models with simultaneous coverage and connectivity requirements [15], infrastructure-oriented topologies and smart metering applications [16], and more recent studies on coverage/connectivity maximization and network design surveys [17,18]. However, this line of work usually stops short of comparing, within a unified exact optimization framework, how connectivity-driven and coverage-driven backbones behave as the communication radius and the connectivity–coverage trade-off parameter vary.
A third topic is directly connected to our methodological contribution: mixed-integer formulations and polyhedral strengthening for tree and network design problems. Although many articles on virtual backbones give more relevance to heuristics or distributed protocols, fewer studies provide exact optimization models that enable systematic comparisons across formulations. Concerning the literature related to network design, recent computational studies on integer programming formulations [19,20], vulnerability-aware network design [21,22], and robustness enhancement through cut-set or connectivity-based techniques [23,24] highlight the importance of formulation strength and valid inequalities. Moreover, the literature on communication-oriented spanning trees helps position our contribution more precisely. In particular, studies in [25,26] show that routing and communication costs can significantly increase model complexity and that exact and polyhedral approaches are relevant for handling such types of problems. These works are closely related to ours because they also combine tree structure, communication costs, and exact optimization. However, they do not explicitly analyze the interaction between spanning trees and domination-based backbones altogether in geometric graphs, nor do they investigate the conditions under which both structures may become equivalent.
From the domination side, recent studies have also focused on richer variants such as two-connected, twofold-connected, weakly connected, capacitated, and fault-tolerant dominating structures [4,5,6,7,13,14]. These contributions reinforce the importance of robustness and service-oriented backbone requirements, but they still tend to study dominating structures in isolation. In contrast, our work places MST and DT models within a unified framework that explicitly incorporates user-assignment costs, allowing a direct structural and computational comparison between connectivity-driven and coverage-driven backbone designs.
In general, the gap addressed in this paper is twofold. On the one hand, despite substantial progress in virtual backbone construction, domination models, and coverage–connectivity deployment, there is still limited exact optimization work jointly comparing MST and DT backbones under a common objective that explicitly accounts for user service. However, although formulation comparisons are common in network design, they have not been systematically used to study the structural convergence between domination-based and spanning tree-based backbones, as the communication radius and the connectivity–coverage trade-off parameter vary. This comparison reveals an important distinction with respect to previous works. Existing studies have focused either on domination-based virtual backbones, spanning tree formulations, or coverage–connectivity models. In contrast, the present paper explicitly connects these three perspectives by embedding MST and DT backbones in the same geometric user-assignment approach and by evaluating their computational and structural behavior over the same parameter space.
To better position our contribution within the literature, Table 1 provides a structured comparison between recent related works and the present study. The main dimensions that are relevant to our setting include the backbone paradigm, geometric modeling, exact optimization, formulation diversity, polyhedral strengthening, and structural analysis. This table reveals not only the methodological differences but also the specific contributions of this paper in an attempt to bridge connectivity-driven and coverage-driven backbone design within a unified framework. The differences between these streams are relevant to positioning the present contribution. Works on connected dominating sets and virtual backbones mainly emphasize domination, robustness, or distributed construction mechanisms, but they often omit comparing the resulting structures with spanning tree-based backbones under a common objective. Conversely, studies on spanning tree and communication tree formulations provide strong exact optimization and polyhedral perspectives, but they generally do not impose domination requirements or analyze when such requirements are redundant in geometric graphs. Coverage–connectivity models in wireless networks capture related spatial trade-offs, but they are often formulated as deployment, clustering, or topology control problems rather than as a direct formulation-level comparison between MST and DT backbones. The present paper is positioned at the intersection of these lines: it combines MST and DT structures, user-assignment costs, multiple exact formulations, and an empirical structural analysis over the ( α , r ) space.
Thus, the findings of this paper should be understood as an integrative and comparative contribution: MST and DT are not introduced as new graph-theoretic objects but are embedded in a common optimization framework that enables a systematic formulation-level and structural comparison in geometric communication networks with user-assignment costs. Table 1 mentions the main dimensions of the literature that are closely related to our study. Notice that many contributions have addressed several of these aspects separately, including domination-based backbones, spanning tree models, geometric settings, exact optimization, and formulation-oriented analyses. However, it draws our attention that these dimensions are not integrated within a single framework. In particular, there is still limited exact optimization work that unifies MST- and DT-based backbones simultaneously with a single objective function that explicitly incorporates user-assignment costs while also examining the role of geometric density and the connectivity–coverage trade-off. In this sense, it can be said that our work is positioned at the intersection of these research directions by combining both backbone paradigms, multiple exact formulations, and a structural analysis of the network regimes in which domination remains relevant or becomes irrelevant. This positioning motivates the unified modeling and analysis framework introduced in the next section.

3. Proposed Optimization Formulations

A geometric communication network defined on a set of candidate nodes V embedded in the Euclidean plane is considered. Each node represents a potential backbone location, and a set of users K must be served by the selected backbone infrastructure. The users in K represent external demand points, traffic sources, or clients that must be served by the selected backbone. Notice that they are not necessarily candidate backbone nodes. This difference separates infrastructure decisions from service-quality decisions. In particular, the variables x i determine which candidate nodes should be activated, whereas the variables w k i determine how the user demand is linked to the active backbone of the output solution. Given a transmission radius r, the communication graph contains an edge ( i , j ) whenever the Euclidean distance between nodes i and j is at most r. The goal is to design a backbone that jointly accounts for connectivity and user service. To this end, two related paradigms are studied. The first is based on a minimum spanning tree (MST), which seeks a low-construction-cost connected backbone. The second is based on a dominating tree (DT), which additionally requires that every node belongs to the backbone or is adjacent to at least one active backbone node. In both cases, users are assigned to active nodes, which induces a trade-off between backbone-construction and user-assignment costs. This trade-off is controlled by the parameter α [ 0 , 1 ] , which balances the relative importance of the two terms in the objective function.
The difference between the two models can be seen directly from a small geometric instance. In the MST-based model, the selected active nodes must be connected through a tree, but nodes that are not selected do not need to be adjacent to the backbone. As a consequence, the MST solution may concentrate the active nodes in a compact region when this reduces the weighted cost. The DT-based model adds an additional domination condition. Every node of the communication graph must either be active or have at least one active neighbor. Thus, the DT model can activate nodes that the MST model would leave out, especially when the graph is sparse and many vertices would otherwise remain far from the selected tree. This difference is illustrated in Figure 1 and Figure 2. These figures clearly illustrate how variations in the weighting parameter and the communication radius affect the resulting structures of the network. These examples motivate the need for different exact modeling approaches. Next, the sets, parameters, and decision variables that are common to all formulations are introduced.
  • Sets
    • V = { 1 , , | V | } : set of candidate backbone nodes.
    • A = { ( i , j ) : i , j V , i j } : set of directed arcs of the communication graph.
    • K = { 1 , , | K | } : set of users.
  • Parameters
    • c i j : cost (or distance) associated with arc ( i , j ) A .
    • d k i : assignment cost (or distance) between user k K and node i V .
  • Decision variables
    • x i { 0 , 1 } : equals 1 if node i is selected as the active backbone node.
    • z i j { 0 , 1 } : equals 1 if the arc ( i , j ) A is selected in the backbone tree.
    • w k i { 0 , 1 } : equals 1 if user k K is assigned to node i V .

3.1. Miller–Tucker–Zemlin (MST and DT)

We first present Miller–Tucker–Zemlin (MTZ) formulations for the MST and DT models. These formulations enforce connectivity through ordering variables and provide a compact alternative to flow-based models, although they typically have weaker linear relaxations. For this reason, they are used mainly as benchmark formulations in our study.
M S T M : min { x , z , w , u } α ( i , j ) A c i j z i j + ( 1 α ) k K i V d k i w k i
s . t . ( i , j ) A z i j = i V x i 1
j : ( j , i ) A z j i x i i V
z i j x i ( i , j ) A
z i j x j ( i , j ) A
u j u i ( | V | 1 ) z i j ( | V | 3 ) z j i 2 | V | ( i , j ) A
i V w k i = 1 k K
w k i x i k K , i V
1 u i i V x i i V
x { 0 , 1 } | V | , z { 0 , 1 } | A | , w { 0 , 1 } | K | | V |
The objective function (1) minimizes a weighted combination of the cost of backbone construction and the cost of user assignment. The constraint (2) imposes the tree cardinality condition on the set of active nodes. Constraints (3)–(5) link arc selection to node activation, ensuring that selected arcs can only connect active nodes. The constraint (6) corresponds to the classical MTZ ordering constraints and is used to eliminate disconnected cycles among the selected nodes through the auxiliary ordering variables u. The constraint (9) defines the domain of these variables. Finally, constraints (7) and (8) model user assignment by requiring each user to be assigned to exactly one active node, while constraint (10) defines the binary nature of the decision variables.
D T M : min { x , z , w , u }         α ( i , j ) A c i j z i j + ( 1 α ) k K i V d k i w k i s . t .         x j + i N ( j ) x i 1 j V ( 2 ) ( 10 )
The formulation DTM extends MSTM by incorporating the domination constraints (11). These constraints require every node to be selected as an active backbone node or to be adjacent to at least one active backbone node. Therefore, DTM preserves the tree, activation, and user-assignment structure of MSTM, while also enforcing the coverage of the nodes through domination.

3.2. Single-Flow Formulations (MST and DT)

To enforce connectivity through flow conservation, the set of directed arcs A is increased by introducing a fictitious root node r connected to every node in V. The resulting augmented arc set is
A r = A { ( r , j ) : j V } .
The fictitious root acts only as a flow source and does not represent a physical network node. Based on this construction, the single-flow formulation for the MST model is given by
M S T F : min { x , z , w , f }         α ( i , j ) A c i j z i j + ( 1 α ) k K i V d k i w k i s . t .         ( 2 ) ( 5 ) , ( 7 )   and   ( 8 ) j : ( r , j ) A r z r j = 1
j : ( r , j ) A r f r j = i V x i
0 f i j | V | z i j ( i , j ) A r
j : ( j , i ) A r f j i j : ( i , j ) A f i j = x i i V
x { 0 , 1 } | V | ,   z { 0 , 1 } | A r | ,   w { 0 , 1 } | K | | V | ,   f [ 0 , ) | A r |
The formulation MSTF enforces connectivity through a single-commodity flow mechanism. Constraints inherited from the MTZ model preserve the tree cardinality condition, node–arc consistency, and user-assignment structure. The constraint (12) selects a unique root arc, while (13) injects an amount of flow equal to the number of active nodes. The constraint (14) links flow to arc selection, and (15) enforces flow conservation at each node, requiring that every active node absorbs one unit of flow. Together, these constraints guarantee that the selected active nodes are connected through a tree structure rooted at the fictitious source.
D T F : min { x , z , w , f }         α ( i , j ) A c i j z i j + ( 1 α ) k K i V d k i w k i s . t .         ( 2 ) ( 5 ) , ( 7 )   and   ( 8 ) , ( 11 ) ( 16 )
The formulation DTF extends MSTF by adding the domination constraints (11). Hence, DTF preserves the same flow-based connectivity mechanism and user-assignment structure as MSTF, while additionally requiring that every node be selected or adjacent to at least one active backbone node. The resulting solution is therefore a connected dominating tree.

3.3. Cut-Set Formulations

We finally consider cut-set formulations for the MST and DT models. In this family, connectivity is explicitly enforced through cut constraints defined on subsets of nodes. Although these formulations are often associated with strong linear relaxations, they involve exponentially many connectivity constraints and, therefore, require separation procedures in practice.
M S T C : min { x , z , w }       α ( i , j ) A c i j z i j + ( 1 α ) k K i V d k i w k i s . t .         ( 2 ) ( 5 ) , ( 7 )   and   ( 8 ) , ( 10 ) ( i , j ) δ ( S ) z i j x j S V , j S
The formulation MSTC enforces connectivity by requiring that every subset of nodes containing an active node be linked to the remainder of the network through at least one selected arc. In this way, disconnected active components are excluded by cut-off constraints (18).
D T C : min { x , z , w } α ( i , j ) A c i j z i j + ( 1 α ) k K i V d k i w k i s . t . ( 2 ) ( 5 ) , ( 7 )   and   ( 8 ) , ( 10 ) , ( 11 ) , ( 18 )
The formulation DTC extends MSTC by adding the domination constraints (11). Therefore, DTC maintains the same cut-set-based connectivity mechanism and user-assignment structure as MSTC, while also enforcing that every node is selected or adjacent to at least one active backbone node.

4. Theoretical Analysis, Valid Inequalities, and Algorithmic Components

In this section, the basic theoretical properties of the proposed models are first studied, including computational complexity and structural relations between the MST and DT formulations. Then, valid inequalities are introduced for the single-flow model, which provide the best balance between formulation strength and computational tractability in our experiments. Finally, two algorithmic components are presented, built on this formulation: a lazy-cut separation procedure for the exponential connectivity cuts and a local branching matheuristic for larger instances [27].

4.1. Complexity Results and Structural Relations

Although the proposed formulations are inspired by spanning tree and dominating tree structures, the optimization models studied in this paper are more general than their classical counterparts because they jointly determine node activation, backbone connectivity, and user assignment. As a result, both models inherit the combinatorial difficulty of well-known hard network design problems. The following results formalize this fact.
Theorem 1.
The MST-based model studied in this paper is NP-hard for any α ( 0 , 1 ) .
Proof. 
We prove the result by reduction from the Steiner tree problem (STP), which is NP-hard. Consider an instance of the STP defined on an undirected graph G = ( V , E ) with edge costs c ˜ i j 0 and a set of terminals R V . An instance of the MST-based model is constructed as follows. Let the node set be V, and define the directed arc set as the bi-directed version of E, that is,
A = { ( i , j ) , ( j , i ) : { i , j } E } .
For each ( i , j ) A , set c i j = c ˜ i j . Create one user for each terminal; that is, let K = R . For each k K , define the assignment costs
d k i = 0 , if i = k , M , otherwise ,
where M > 0 is a sufficiently large constant such that
( 1 α ) M > α { i , j } E c ˜ i j .
Consider the objective function
α ( i , j ) A c i j z i j + ( 1 α ) k K i V d k i w k i , α ( 0 , 1 ) .
Because assigning a user k to any node i k incurs a penalty M, any optimal solution must assign each user k to node k and therefore activate all nodes in R. Hence, all terminals must be included in the set of active nodes. The tree constraints enforce that the selected arcs form a connected tree over the active nodes. Additional non-terminal nodes may be activated only if they help reduce the total infrastructure cost. Therefore, once all terminals are forced to be active, the problem reduces to finding a minimum-cost tree connecting the terminals, possibly using additional non-terminal nodes. This is exactly the Steiner tree problem. Since the Steiner tree problem is NP-hard, the MST-based model is NP-hard.    □
Corollary 1.
For α = 1 , the problem reduces to a classical minimum spanning tree problem on active nodes and can be solved in polynomial time.
Corollary 2.
For α = 0 , the problem reduces to a coverage-oriented network design problem that remains combinatorial, as it captures elements of both the location of the facility and the dominant structures.
The computational complexity therefore arises from the interaction between connectivity and coverage, rather than from either component in isolation.
Theorem 2.
The DT-based model studied in this paper is NP-hard.
Proof. 
We prove the result by reduction from the Minimum Connected Dominating Set Problem, which is NP-hard. Consider an undirected graph G = ( V , E ) . Construct the corresponding DT instance on the same node set V and on the bi-directed arc set
A = { ( i , j ) , ( j , i ) : { i , j } E } .
Set
α = 1 , c i j = 1 ( i , j ) A .
Since α = 1 , the user-assignment term disappears from the objective function, and the model reduces to
min ( i , j ) A z i j .
By the DT constraints, the selected active nodes must satisfy two properties: (i) they form a dominating set since every node must be selected or adjacent to a selected node; and (ii) they induce a connected tree. Moreover, the tree cardinality condition is enforced
( i , j ) A z i j = i V x i 1 .
Since every selected arc has a unit cost, minimizing the objective is equivalent to minimizing
i V x i 1 ,
that is, minimizing the number of active nodes. Therefore, the DT-based model is exactly looking for a dominating set connected to minimum cardinality. This is precisely the Minimum Connected Dominating Set Problem. Since this problem is NP-hard, the DT-based model studied in this paper is NP-hard.    □
This remains true even for α = 1 , and therefore also for the general case.
Remark 1.
The previous results show that the difficulty of the proposed models does not come from the classical optimization of the spanning tree itself, but from the interaction between connectivity, node activation, and coverage requirements. In particular, the MST-based model becomes difficult because user-assignment decisions implicitly force terminal selection, while the DT-based model remains hard even when the user-assignment term is removed due to the connected domination structure.
Proposition 1.
Let z M S T F and z D T F denote the optimal objective values of models MSTF and DTF, respectively, defined on the same directed graph G = ( V , A ) , with the same parameter α [ 0 , 1 ] , the same user set K, and the same objective coefficients. Then
z M S T F z D T F .
Hence, the dominating tree formulation provides an upper bound on the optimal value of the spanning tree formulation.
Proof. 
We compare the feasible regions of both models. The formulation MSTF is defined by the same constraints as DTF, except that DTF includes the additional domination constraints. Both models share the same objective function and the same structural, flow, and assignment constraints. Therefore, every feasible solution of DTF is also feasible for MSTF. If  F M S T and F D T denote the feasible sets of MSTF and DTF, respectively, then
F D T F M S T .
Since both models are minimization problems with the same objective function, minimizing the smaller feasible set F D T cannot yield a value smaller than minimizing the larger feasible set F M S T . Hence,
z M S T F = min { f ( x , z , w , f ) : ( x , z , w , f ) F M S T }
min { f ( x , z , w , f ) : ( x , z , w , f ) F D T } = z D T F .
Thus, the optimal value of DTF is an upper bound on the optimal value of MSTF.    □

4.2. Structural Convergence Hypothesis

The previous results establish a basic dominance relation between the feasible regions and the objective values of the MST and DT formulations. A natural question is whether, under certain operating regimes, the domination constraints become effectively redundant. This allows us to write the following empirical hypothesis.
Hypothesis 1.
In the ( α , r ) parameter space, MST- and DT-based solutions are expected to become structurally similar when the communication radius r is sufficiently large and the weighting parameter α assigns enough importance to user-assignment costs. In such regimes, the optimal or near-optimal MST backbone may already satisfy, or nearly satisfy, the domination requirement. As such, the additional domination constraints for DT may become weakly binding or practically irrelevant.
This statement should be classified as an empirical structural hypothesis instead of a theoretical guarantee. The intuition is that decreasing α gives more importance to the user-assignment cost, allowing for the activation of spatially distributed nodes, while increasing r makes the communication graph denser and increases the likelihood that active nodes dominate the remaining vertices. In the computational section, this hypothesis is examined in more depth by considering the simultaneous effect of both α and r on objective values, solution structures, and collapse regions between MST and DT formulations.

4.3. Valid Inequalities for the Single-Flow Formulation

Since solving the models poses a challenging fact, strengthening the formulations emerges as an essential strategy to improve computational performance. Our preliminary experiments show that the single-flow formulation provides the best balance between scalability and solution quality, particularly for the larger ones. For this reason, the valid inequalities focus on the flow-based model. Although similar ideas could be extended to other formulations, the single-flow model is the most suitable setting due to its empirical strength and ability to accommodate additional cuts.
In concrete, the valid inequalities proposed exploit the interaction between node activation, connectivity, and flow conservation. Two types of cuts are considered: static and exponential inequalities. The former can be added from the outset, whereas the latter are better handled through dynamic separation within a branch-and-cut framework [11]. Let us A r = A { ( r , i ) : i V } , where r is the fictitious root. For any subset S V , define
A ( S ) : = { ( i , j ) A : i S , j S } , δ ( S ) : = { ( i , j ) A : i S , j S }
  • Family 1: Root-activation inequalities.
For every node i V ,
z r i x i i V .
Proposition 2.
Inequalities (19) are valid for single-flow MST and DT formulations.
Proof. 
If z r i = 1 , then the fictitious root sends the flow directly to node i through the arc ( r , i ) . In the single-flow model, flow is injected only to support the active nodes, and each active node absorbs one unit of flow. Therefore, any node incident to a selected root arc must belong to the active backbone, which implies x i = 1 . Hence, (19) is valid.    □
  • Family 2: Incident-support inequalities.
For every node i V ,
x i z r i + j : ( j , i ) A z j i + j : ( i , j ) A z i j i V .
Proposition 3.
Inequalities (20) are valid for single-flow MST and DT formulations.
Proof. 
If x i = 0 , then (20) holds trivially. Assume now that x i = 1 . Since active nodes must induce a connected backbone, node i must be incident to the selected structure. More precisely, either (i) the node i is the unique node adjacent to the fictitious root, in which case z r i = 1 ; or (ii) some selected structural arc enters i; or (iii) some selected structural arc leaves i. If none of these situations occur, then node i would be active but isolated from the backbone, contradicting connectivity. Therefore, the right-hand side of (20) must be at least one whenever x i = 1 , which proves the validity.    □
  • Family 3: Root-aware connectivity cuts.
For every nonempty subset S V and every node h S ,
( i , j ) δ ( S ) z i j + j S z r j x h .
Proposition 4.
Inequalities (21) are valid for single-flow MST and DT formulations.
Proof. 
Fix a nonempty subset S V and a node h S . If  x h = 0 , then (21) is trivially satisfied. Assume x h = 1 . Since node h is active, it must belong to the unique connected component of the selected backbone. Therefore, the subset S that contains h must be connected to the root-supported backbone in one of the following two ways: (i) some selected structural arc enters S from V S , that is,
( i , j ) δ ( S ) z i j 1 ;
or (ii) the unique selected root arc enters a node of S, that is,
j S z r j 1 .
If both terms on the left-hand side were zero, then no selected arc from V S would enter S, and no selected root arc would enter S. Hence, the active node h could not be reached from the root-supported component, contradicting the feasibility of the single-flow formulation. Therefore, (21) is valid.    □
Remark 2.
Inequalities (19) and (20) are static and can be added directly to the model. In contrast, the family (21) is exponential in the number of subsets S V and is therefore better handled through dynamic separation within a lazy-cut framework.

4.4. Separation Procedure and Matheuristic Framework

In addition to the exact formulations and valid inequalities presented above, two complementary algorithmic components for the single-flow model are considered. First, a lazy-cut separation procedure is incorporated to dynamically enforce the exponential family of root-aware connectivity inequalities only when violated by incumbent solutions. This avoids introducing all such constraints explicitly while preserving exactness. Second, motivated by the strong computational behavior of the single-flow formulation, a local branching matheuristic in the spirit of [27] is designed to intensify the search for high-quality incumbent solutions and improve scalability for larger instances.
The lazy-cut component strengthens the exact branch-and-cut procedure by eliminating disconnected incumbent solutions. In turn, the local branching approach allows restricting the search to a neighborhood around a reference solution through a Hamming-distance-type constraint on the node activation variables. The latter enables a focused exploration of promising regions of the solution space. From an algorithmic point of view, notice that the lazy-cut procedure preserves exactness while avoiding the explicit enumeration of exponentially many connectivity inequalities. The local branching approach is utilized as a scalable matheuristic for large or difficult instances in which full optimality certification becomes computationally prohibitive.
The separation procedure of Algorithm 1 does not enumerate the exponentially many inequalities. Instead of that, it checks only whether the current incumbent integer solution contains active components that are disconnected from the root-supported component. This can be performed by building the selected digraph induced by the arcs with z ¯ i j = 1 and performing a breadth-first or depth-first search from the unique node selected by the artificial root. Hence, each separation call requires O ( | V | + | A ¯ | ) time, where A ¯ = { ( i , j ) A : z ¯ i j = 1 } . Since | A ¯ | | A | , the worst-case complexity of one separation call is O ( | V | + | A | ) . Therefore, although the family of cuts is exponential, the implemented separation oracle is polynomial and computationally inexpensive compared with solving the underlying mixed-integer program.
Mathematics 14 01605 i001
The local branch constraint restricts the search to solutions whose activation pattern differs from the incumbent in at most k binary decisions, thus defining a compact and meaningful neighborhood around the current backbone structure. The scalability of Algorithm 2 comes from the fact that the local branching constraint is imposed on the activation vector x, which represents the main strategic layer of the problem. Once a neighborhood around the incumbent activation pattern is fixed, the remaining connectivity, flow, and assignment variables are optimized within a restricted but still meaningful subproblem. The parameter ϕ is used to control the size of the neighborhood: small values intensify the search around the incumbent. Larger values, on the other hand, allow for diversification when no improvement is obtained. By doing so, the method avoids exploring the full binary space at each iteration and instead solves a sequence of smaller, focused mixed-integer subproblems.
Mathematics 14 01605 i002
The following result establishes the correctness of the lazy-cut separation procedure associated with inequalities (21).
Theorem 3.
The lazy-cut separation procedure for inequalities (21) is valid and does not remove any feasible integer solution from the single-flow formulation.
Proof. 
The family of inequalities (21) is valid for the formulation, as shown above. Therefore, any feasible integer solution must satisfy all such inequalities. The separation procedure only adds cuts when a candidate integer solution ( x ¯ , z ¯ ) violates at least one inequality from the family. In particular, if there exists a subset C V containing at least one active node that is not reachable from the root-supported component, then
( i , j ) δ ( C ) z ¯ i j + j C z ¯ r j = 0 ,
violates (21). □
The separation procedure runs in linear time and is therefore computationally negligible compared to solving the underlying mixed-integer program.
In summary, the lazy-cut procedure is used as an exact branch-and-cut algorithm because it separates only valid connectivity inequalities and never removes feasible connected solutions. In contrast, the local branching procedure is used as a matheuristic component because it sacrifices full optimality certification in favor of faster exploration of high-quality neighborhoods. These two components, therefore, play complementary roles: the former improves exactness and formulation enforcement, whereas the latter enhances practical scalability for the largest and most challenging instances.

5. Computational Experiments

The computational experiment is designed to ensure reproducibility and fair comparisons across the proposed models. For each instance, the node coordinates are generated uniformly at random in the unit square [ 0 , 1 ] 2 . A fixed random seed is used for each instance size, and the same seeds are used for all MST and DT formulations. The cost matrices C and D are calculated using the coordinates of the nodes to compute the Euclidean distances between the nodes and between the users and the nodes, respectively. To ensure a fair comparison, all models are solved on the same input graphs. The exact approaches are solved on instances with up to 100 nodes, both with and without valid inequalities, while the local branching approach is applied to instances with up to 150 nodes.
In general, the number of users is set to | K | = 5 N , unless otherwise stated. This value | K | = 5 N is used to represent a demand that is denser than the candidate backbone. Notice that this is commonly done in communication settings where a limited number of infrastructure nodes must serve a larger number of users. The solver time limit is arbitrarily fixed at 3600 s, and all reported objective function values, CPU times in seconds, number of branch-and-bound nodes, and optimality gaps correspond to the same computational experiments for all the instances. The communication graph is constructed by connecting two nodes if their Euclidean distance is at most the radius r. Only connected graphs are saved for the experiments. The weighting parameter is varied in α { 0.25 , 0.50 , 0.75 , 0.95 } , and the baseline communication radius is set to r = 0.20 , unless another specific sensitivity analysis with respect to r is mentioned. The number of lazy constraints is also reported. For the joint sensitivity analysis in the ( α , r ) space, the same instance-generation procedure is utilized, and both parameters are varied over a grid of values. This design allows us to isolate the effect of α and r on the structural similarity between MST and DT solutions since all other data-generation components remain fixed across the compared models. In summary, this section measures the performances of the proposed formulations and algorithmic enhancements through a comprehensive computational study. The analysis is organized according to the following questions: (i) how the different exact formulations compare in terms of solution quality and computational effort, (ii) how much the proposed valid inequalities strengthen the single-flow models, (iii) whether the local branching matheuristic improves performance on the hardest instances, and (iv) under which parameter regimes MST and DT solutions become structurally similar or clearly different. All the experiments were conducted on a machine using Windows 11 Pro Version 25H2, an Intel Core i7-12700H processor (2.30 GHz), and 16 GB of RAM. In addition, all models were implemented in Python 3.13.9 and solved with the Gurobi solver [11].

5.1. Comparison of Exact Formulations

Initially, the MTZ, single-flow, and cut-set models are compared for both MST and DT. For each model, the objective value, the number of branch-and-bound nodes explored (B&B), the CPU time in seconds, and the optimality gaps are reported. For the cut-set formulations, the number of dynamically generated lazy connectivity cuts is also present. These metrics allow us to assess both formulation strength and computational scalability.
Table 2, Table 3, Table 4 and Table 5 report the performance of MTZ formulations for different values of α with a fixed radius r = 0.2 . From a structural point of view, MST and DT typically produce identical or very similar objective values, especially for small and moderate values of α . However, the computational behavior of the MTZ models deteriorates rapidly as the size of the problem increases. Both the number of branch-and-bound nodes and the CPU time grow sharply, and several medium- and large-scale instances reach the time limit with nonzero optimality gaps. This confirms that, although MTZ formulations are compact, they do not provide sufficiently strong relaxations for the larger instances considered here.
Table 6, Table 7, Table 8 and Table 9 report the performance of the single-flow formulations. In contrast to MTZ models, flow-based formulations exhibit substantially better computational behavior. Most instances are solved to optimality with zero gap, and the number of explored nodes remains comparatively small even as the instance size increases. This suggests that the single-flow model provides a much tighter relaxation and a better trade-off between formulation size and strength. As in the MTZ case, MST and DT often produce identical or nearly identical objective values for a broad range of instances, which already provides computational evidence of their structural proximity in some operating regimes. Although neither MSTF nor DTF uniformly dominates the other computationally, the general message is clear: among the exact models tested, the single-flow formulation is the most scalable and robust.
Table 10, Table 11, Table 12 and Table 13 report the performance of cut-set formulations, including lazy constraint separation. From a modeling perspective, these formulations provide an explicit connectivity representation and are often associated with strong relaxations. In practice, however, they are significantly more expensive than the single-flow model in this setting. As instance size increases, both MST and DT cut-set formulations show rapid growth in branch-and-bound nodes, CPU time, and the number of lazy cuts. In several large instances, the solver reaches the time limit or fails to find a feasible solution within one hour. The objective values remain broadly consistent with those of the other formulations, but the computational burden is clearly much higher.
Taken together, Table 2, Table 3, Table 4, Table 5, Table 6, Table 7, Table 8, Table 9, Table 10, Table 11, Table 12 and Table 13 lead to two main conclusions. First, MST and DT frequently produce very similar objective values, especially in coverage-oriented or denser regimes. Second, from a computational perspective, the single-flow formulation is the most effective exact approach, clearly outperforming MTZ and cut-set models in terms of tractability and scalability. For this reason, the remainder of the computational analysis focuses on the flow-based formulation.
This behavior suggests that, for the geometric backbone design problems studied here, the strength of the cut-set representation is offset by the cost of dynamic separation and by the large number of cuts required in practice.

5.2. Impact of Valid Inequalities

Next, the impact of the proposed valid inequalities on the single-flow formulation is evaluated. In this part of the study, both the strengthened and unstrengthened flow models are compared in terms of solution quality and computational effort. Since the exponential family of cuts proved computationally expensive and offered limited practical benefits, only the static valid inequalities are considered hereafter.
Table 14, Table 15, Table 16 and Table 17 report the computational performance of the MST and DT flow formulations, plus the valid inequalities for different values of α , with a fixed radius r = 0.2 . In general, the incorporation of valid inequalities improves tractability and helps maintain very small optimality gaps, especially for moderate values of α . For α = 0.25 and α = 0.5 (Table 14 and Table 15), many instances are solved almost at the root node, indicating that the relaxation becomes significantly tighter once the additional inequalities are included. Also, notice that the CPU times remain moderate and grow smoothly with instance size.
For α = 0.75 , the search becomes noticeably harder: both models require larger branch-and-bound trees and longer solution times. However, most of the instances are still solved optimally or near-optimally with reasonable computational effort, which confirms that the valid inequalities are useful in more challenging regimes.
For α = 0.95 (Table 17), the difficulty increases considerably. Several instances reach the time limit and the resulting optimality gaps are no longer negligible. In this regime, the DT formulation appears slightly more stable than the MST formulation, although both models become significantly harder to solve.
This is expected, since a larger α shifts the objective toward infrastructure cost and leaves less room for the assignment term to guide the selection of active nodes.
Finally, it is observed that these results confirm that the valid inequalities improve the single-flow formulations. They reduce the size of the search tree, improve lower bounds, and extend the range of instances that can be solved efficiently. At the same time, the experiments show that the computational difficulty still strongly depends on α , playing a central role in shaping the complexity of the problem.

5.3. Local Branching Matheuristic

The single-flow formulation is the most reliable exact model in the experiments, but the hardest instances are still difficult to certify as optimal. Figure 3 reports this behavior by showing the evolution of the upper and lower bounds over time for representative MST and DT flow instances. In both cases, the MIP gap closes rapidly in the early phase of the search, suggesting that the model structure is well captured by the formulation. However, certifying optimality becomes increasingly difficult in more challenging instances. This motivates the use of a matheuristic designed specifically for the largest and most demanding cases.
Remark 3.
The activation vector x acts as the main structural decision layer of the problem, while the remaining variables are adjusted once x is fixed. This makes x a natural candidate for defining local branching neighborhoods.
Table 18 reports the computational performance of the proposed local branching matheuristic for the hardest instances, with up to | V | = 150 nodes, fixed r = 0.20 and α = 0.95 . The table reports the quality of the initial solution, the best solution found, the relative improvement, the time used to generate the initial solution, the time limit per local branching subproblem, the total CPU time, the number of iterations, the number of improving iterations, and the final neighborhood size.
From a scalable point of view, the results report that the local branching procedure keeps the computational cost relatively stable as the instance size increases. Notice that each run uses a fixed number of iterations and a fixed time limit per neighborhood subproblem. The latter makes the total computational cost predictable. Moreover, the procedure continues to produce improvements for the largest instances. For N = 150 , the improvement reaches 28.32 % for MSTF and 27.85 % for DTF. This indicates that the restricted neighborhoods remain effective even when the full exact model becomes harder. The role of local branching is therefore complementary: it is used when good feasible solutions are more useful than spending the full time on closing the final gap.
Notice that the results also show that the matheuristic significantly improves the initial solutions obtained for all tested instances. In particular, the largest ones. The relative improvement is often notable, exceeding 25 % . The total CPU time remains stable through the tested instance sizes, and the number of successful iterations is relatively high, indicating that the local branching strategy explores the solution space effectively. This is especially relevant in the most difficult operation schemes, where the exact solver alone may fail to produce high-quality solutions within the time limit. Furthermore, the comparison between MSTF and DTF reveals an important difference. Although both models benefit from mathematical simplicity, DTF remains harder because domination constraints restrict the feasible region more. As expected from the theoretical dominance relation established in Section 4, the best objective values obtained for DTF are systematically higher than those for MSTF. In addition, the percentage improvements achieved for DTF are often slightly smaller or more difficult to obtain, reflecting the greater combinatorial burden imposed by domination. In general, Table 18 shows that the proposed local branching framework is a robust and scalable complement to the exact method, particularly for large and difficult instances where direct branch-and-bound becomes impractical.

5.4. Structural Analysis of Flow Solutions

The structural plots are interpreted through five quantities: the number of active nodes, the total tree length, the tree diameter, the average degree, and the average user distance. The structural properties of the solutions produced by MSTF and DTF are considered next. The goal of this analysis is to better understand how the trade-off between backbone-construction cost and user-assignment cost influences the topology of the resulting network structures. Figure 4, Figure 5, Figure 6, Figure 7 and Figure 8 report the behavior of several structural metrics as the number of nodes N increases. In all cases, both formulations are evaluated in the same set of instances.
The metrics considered are as follows. The size of the backbone, defined as | { i V : x i = 1 } | , measures the number of active nodes and, therefore, the size of the deployed infrastructure. The total length of the tree, given by ( i , j ) A c i j z i j , measures the total cost of building the structure. The tree diameter is the maximum shortest-path distance between any pair of selected nodes in the induced tree and reflects how spread out the backbone is. The average degree measures the mean number of incident selected edges per active node and helps distinguish between chain-like and hub-like structures. Finally, the average user distance, computed as 1 | K | k K i V d k i w k i , captures the average assignment cost and, therefore, the quality of user service. Smaller values suggest better proximity between users and active nodes.
Figure 4 illustrates the comparison between MSTF and DTF for different values of α . It can be observed that for small values of α , both formulations emphasize user service and therefore produce relatively large and spatially distributed backbones. In this network regime, the two solutions are visually similar. As α increases, the cost of the backbone becomes significantly more important, and the structural gap between the two models becomes more evident. MSTF generates smaller and more compact backbones, whilst DTF remains more spatially distributed because of the domination constraints. The figure already shows the main pattern that will appear in the larger experiments: small α values produce similar trees. Larger values separate the MSTF and DTF designs.
Figure 5 reports the structural metrics for α = 0.25 . In this coverage regime, MSTF and DTF exhibit nearly identical behaviors across all metrics. The backbone sizes increase approximately linearly with N. The average user distances decrease as the network becomes denser, and both the length and the diameter of the trees increase similarly.
The average degree is nearly two, which is compatible with the tree-like nature of the output solutions. The close overlap of the curves suggests that for small values of α , the domination constraints become redundant, and both models produce almost the same network structures. Figure 6 presents the structural behavior for α = 0.5 , where the backbone-construction cost and the user-assignment cost seem to be more balanced. Under this network operating regime, a mild divergence appears from the solutions of DTF as they start activating slightly more nodes and therefore produce somewhat larger backbones and longer trees than MSTF. The diameter of the tree is slightly larger under DTF. This also reflects a more distributed structure. Although the differences remain moderate, the two models still present the same qualitative behavior. This regime can be interpreted as an intermediate zone in which domination starts to affect but has not yet become the main structural characteristic of the obtained solution.
For α = 0.75 , Figure 7 reports a significantly clearer divergence between the two formulations. MSTF produces more compact solutions with smaller backbones and lower total tree lengths, whereas DTF requires additional active nodes to satisfy the domination constraints. As a consequence, the DT backbones become larger and more dispersed, and their diameters are greater. At the same time, DTF achieves slightly lower average user distance, reflecting better spatial service at the expense of more expensive infrastructure. This figure presents evidence of a regime in which domination has a clear structural effect and changes the backbone design.
Figure 8 corresponds to the extreme regime where the objective is dominated by backbone-construction costs. The structural differences between MSTF and DTF are more systematic and pronounced. MSTF activates the minimum number of nodes needed to form a low-cost connected structure, whereas DTF remains substantially larger because it must also dominate the network. The latter produces clear differences in the size of the backbone, the total length of the tree, and the diameter of the tree. Simultaneously, DTF continues to provide better user proximity, as this is reflected by its smaller average user distance.
In general, the figure confirms that domination is far from redundant in this regime and leads to fundamentally different network designs.
Taken together, Figure 4, Figure 5, Figure 6, Figure 7 and Figure 8 reveal a consistent structural pattern. For small values of α , MST and DT are almost indistinguishable both visually and quantitatively. As α increases, the two formulations separate: MST favors compactness and low infrastructure cost, while DT preserves broader spatial coverage through a larger active backbone. This supports the idea that the practical relevance of domination is strongly dependent on the operating regime.

5.5. Joint Sensitivity with Respect to r and α

The joint effect of the radius r and the weighting parameter α is analyzed on the behavior of the flow models. This part of the numerical experiment aims to find the regions of the ( α , r ) space where MSTF and DTF coincide, are similar, or clearly diverge. For each pair ( α , r ) , the objective function value, the CPU time in seconds, and the difference between the objective function values of the two formulations are evaluated. In this subsection, α is varied for the full interval [ 0 ,   1 ] . This complements the representative values used in the previous tables and allows us to examine the MST-DT relationship across the complete weighting range. Figure 9 presents a three-dimensional sensitivity analysis on ( α , r ) . The left panel reports the objective surfaces of MSTF and DTF. The right panel reports the corresponding CPU time surfaces. Notice that a clear pattern emerges. For small values of α and moderate-to-large values of r, the objective surfaces of the two models overlap or remain very close. This indicates that in dense graphs and coverage-oriented operating network regimes, the domination constraints become much less restrictive. In contrast, as α increases and/or r decreases, the gap between the surfaces tends to be more pronounced, and DTF consistently yields higher objective values.
The CPU time surfaces show a related but distinct effect. Both formulations remain computationally tractable in denser regimes, but DTF tends to require more computational effort in sparse graphs and for larger values of α . This reflects the combined effect of a more constrained feasible region and a more difficult combinatorial structure. Rather than interpreting this pattern as a formal phase transition, this is viewed as strong empirical evidence of a transition region separating operating regimes in which domination is practically negligible from regimes in which it has a substantial structural and computational impact.
Figure 10 shows the region in which both formulations produce identical objective function values. This region is concentrated mainly in the lower- α and larger-r parameter space. The main idea is that domination may become effectively redundant in dense and coverage-oriented settings. Outside of this region, the difference between MSTF and DTF increases steadily. Finally, Figure 11 shows the empirical boundary that separates the regions of coincidence from the regions of divergence in the ( α , r ) space. For small α and sufficiently large r, both models coincide. Beyond this frontier, domination induces a systematic gap between the two formulations. This boundary should be interpreted as empirical rather than theoretical; however, it provides a useful operational summary of when domination matters and when it does not.
Notice that the boundary shown in Figure 11 should not be regarded as a proven threshold but as an empirical summary of the tested instances, indicating where the domination constraints appear to be active and where they appear to be redundant. In general, computational experiments support four main conclusions. First, the single-flow formulation is the most effective exact model among those considered. Second, the proposed valid inequalities substantially strengthen this formulation, especially in moderate regimes. Third, the local branching methodology provides a practical mechanism for handling the hardest large-scale instances. Fourth, the structural similarity between MST and DT depends strongly on the pair ( α , r ) : in dense and coverage-oriented regimes, the two models are often nearly indistinguishable, whereas in sparse and backbone-cost-dominated regimes, they lead to clearly different network designs.
Figure 9, Figure 10 and Figure 11 should be read as complementary views of the same structural phenomenon. Figure 9 shows how the objective and CPU time vary jointly with α and r. Whilst Figure 10 highlights the region where the MST and DT objective values coincide, Figure 11 summarizes the empirical boundary between coincidence and divergence. These figures indicate that domination tends to be less restrictive for larger radii and smaller values of α , whilst it becomes more relevant in sparse and infrastructure-oriented network regimes.
It is important to emphasize that the computational study is designed as a controlled formulation-level and structural analysis rather than as a complete benchmarking exercise against all existing heuristics and metaheuristics for related backbone problems. Consequently, synthetic Euclidean instances are used because they allow the number of nodes, radius, and weighting parameter to be varied systematically, preserving a fair comparison between MST- and DT-based models under identical data. This controlled setting is particularly useful for identifying the regime zones in which domination constraints are structurally active or redundant. To support this analysis, explicit similarity metrics are computed between MSTF and DTF solutions. Let X MST = { i V : x i MST = 1 } and X DT = { i V : x i DT = 1 } denote the active-node sets selected by the two models. The active-node Jaccard similarity metric is defined as
J X = | X MST X DT | | X MST X DT | .
The metric satisfies 0 J X 1 , where J X = 1 means that both models select exactly the same active nodes, whilst the smaller values indicate lower structural overlaps. In addition, the relative objective function difference is computed by
Δ obj = | z DT z MST | max { 1 , | z MST | } .
Thus, J X measures structural similarity with respect to the selected backbone nodes. Similarly, Δ obj measures how close the two optimal objective function values are.
The similarity metrics indicate that in dense and service-oriented regions, J X is high and Δ obj is close to zero. This suggests that the two formulations select similar active backbones and obtain nearly identical objective function values. In contrast, in sparse and infrastructure-oriented network regimes, J X decreases and Δ obj increases, clearly showing that the domination constraints significantly modify the selected backbone. Therefore, the observed transition is supported by visual inspection of the solution surfaces.
To complement the visual analysis of the ( α , r ) space, Table 19 presents the proposed similarity metrics obtained for representative parameter values. The experiment uses an instance of size N = 50 and compares MSTF and DTF for two communication radii, r = 0.20 and r = 0.30 , and four values of the weighting parameter α . The metric J X measures the overlap between the active-node sets selected by both formulations, while Δ obj measures the relative difference between their optimal objective values.
The results show that for α { 0.25 , 0.50 , 0.75 } , both formulations are almost indistinguishable in the tested instances. In these cases, J X is equal to or very close to one, and Δ obj is zero, indicating that MSTF and DTF select nearly the same active nodes and achieve the same objective value. This provides quantitative support for the collapse behavior observed in the solution surfaces and structural plots.
The only clear divergence appears for α = 0.95 , where the objective becomes strongly infrastructure-oriented. In this regime, J X decreases to 0.391 for r = 0.20 and 0.368 for r = 0.30 , while Δ obj increases to 0.116 and 0.059 , respectively. This confirms that domination constraints become structurally relevant mainly when the model prioritizes backbone-construction cost over user proximity. Therefore, the structural transition is supported not only by visual inspection but also by explicit similarity indicators.

5.6. Sensitivity with Respect to the Number of Users

To evaluate the effect of the user layer, an additional sensitivity analysis is performed by varying the number of users as | K | { N , 3 N , 5 N , 10 N } . In these experiments, the number of candidate backbone nodes is fixed at N = 50 , while the communication radius r and the weighting parameter α are varied across representative values. This design allows us to assess whether the baseline choice | K | = 5 N affects the structural relation between MSTF and DTF solutions. The users are interpreted as external demand points, traffic sources, or clients that must be assigned to the selected backbone. Therefore, increasing | K | increases the density of the demand layer and the aggregate contribution of the user-assignment term in the objective function. This experiment separates the effect of user density from the effects of r and α , and shows how the demand layer changes the objective value, the number of active nodes, the average assignment distance, and J X .
Table 20, Table 21, Table 22, Table 23, Table 24, Table 25, Table 26 and Table 27 show that the number of users has a visible effect on the magnitude of the objective value and on the average user distance, as expected, because both quantities depend directly on the assignment layer. For small and moderate values of α , the MSTF and DTF solutions remain almost identical across most values of | K | . In particular, for α = 0.25 and α = 0.50 , the Jaccard similarity J X is equal to or very close to one in most cases, indicating that both formulations select essentially the same active backbone nodes. Using larger values of α , say α = 0.95 , and smaller values of | K | leads to clear structural differences between MSTF and DTF. The low values of J X and significantly different backbone sizes confirm that domination constraints become relevant in infrastructure-oriented network regimes. However, as | K | increases, the assignment component of the objective becomes more influential in aggregate, and the MSTF trends are activating additional nodes to reduce user-assignment costs. As a result, the similarity between MSTF and DTF may increase for larger user sets, especially when | K | = 10 N .
Notice that these results make | K | = 5 N a reasonable baseline for the main experiments. This value creates a demand that is dense enough to make the assignment term meaningful while still preserving the structural differences between MSTF and DTF in infrastructure-oriented network regimes. The sensitivity analysis also refines the interpretation of the previous results: the MSTF-DTF transition is mainly dominated by α and r, but it is also influenced by the number of users. In particular, a larger number of users can make MSTF behave more similarly to DTF because the assignment-cost component encourages the activation of more spatially distributed backbone nodes.

6. Discussion and Conclusions

The main conclusion of this study is that the role of domination in the design of the backbone network is not fixed but strongly depends on the network’s operating regime. In sparse environments, domination plays a significant structural role because it forces the backbone to remain close to the rest of the network, typically requiring the activation of additional nodes and, consequently, increasing infrastructure costs. In contrast, in denser networks, this requirement may become much less restrictive, and the backbones produced by the DT model tend to coincide with or remain very close to those obtained by the classical spanning tree model (MST). The additional sensitivity analysis with respect to the number of users further indicates that this transition is also modulated by the density of the demand layer, since larger user sets increase the aggregate importance of the assignment-cost component.
From a computational perspective, the experiments show that single-flow formulations provide the best balance between formulation strength and tractability. The latter advantage becomes even more useful when the proposed valid inequalities are included. For the hardest instances, the local branching matheuristic also proves effective, delivering high-quality solutions in network regimes where direct exact methods become computationally prohibitive. Putting it all together, these results provide both a practical modeling framework and a clearer structural understanding of when domination constraints meaningfully affect backbone design in geometric communication networks.
Quantitatively, the computational results show that the single-flow formulation is the most effective exact model among the tested alternatives. In the main benchmark experiments, it solved instances with up to N = 100 nodes with a zero optimality gap in most regimes, while the strengthened flow formulation allowed the analysis to be extended up to N = 150 nodes. In the most difficult regime, corresponding to α = 0.95 and r = 0.20 , the local branching matheuristic produced substantial improvements over the initial feasible solutions. For the largest tested instances with N = 150 , the improvement reached 28.32 % for MSTF and 27.85 % for DTF. The new similarity and user-sensitivity metrics also confirm that MSTF and DTF tend to coincide in service-oriented regimes, whereas their divergence becomes clearer when the objective is dominated by infrastructure cost. These numerical results support the practical value of the proposed formulation and matheuristic components.
Several directions for future research naturally arise. These include extensions to dynamic or multi-period settings, the incorporation of uncertainty in connectivity or user-demand patterns, and the study of richer backbone structures under robustness, reliability, or survivability requirements. Another important direction is to validate the proposed framework using real-world or carefully calibrated realistic communication network data. In addition, future work should compare the proposed exact and matheuristic approaches with specialized heuristics and metaheuristics from the literature under a common benchmarking protocol. Such extensions would further assess the practical applicability and competitiveness of the framework beyond the controlled synthetic Euclidean setting considered in this study.

Funding

The APC was funded by: DICYT2026 VRIIC PROGRAMA OPEN ACCESS.

Data Availability Statement

The data presented in this study are available on request from the corresponding author due to the internal intellectual property of the university.

Acknowledgments

The author acknowledge the support of the Departamento de Ingeniería Eléctrica de la Universidad de Santiago de Chile.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Liang, J.; He, F.; Wang, D.; Li, Q. On the reconstruction of a quality virtual backbone in a wireless sensor network with faulty links. IEEE Trans. Netw. Sci. Eng. 2024, 11, 1277–1292. [Google Scholar] [CrossRef]
  2. Wang, J.; Liang, J.; Li, Q. On construction of quality virtual backbone in wireless networks using cooperative communication. Comput. Commun. 2024, 228, 107952. [Google Scholar] [CrossRef]
  3. Wang, J.; Liang, J.; Li, Q. On the construction of quality extended virtual backbones in wireless sensor networks using cooperative communication. J. Supercomput. 2024, 80, 9115–9139. [Google Scholar] [CrossRef]
  4. Luo, M.; Li, R.; Wang, Y.; Wang, Y.; Yin, M. A novel local search approach for the minimum 2-connected dominating set problem. J. Comb. Optim. 2024, 47, 72. [Google Scholar] [CrossRef]
  5. Nie, X.; Zhang, Q.; Qiao, Y.; Qi, Z.; Zhang, L.; Niu, D.; Zhang, H. A GRASP for minimum 2-fold connected dominating set problem. Appl. Soft Comput. 2024, 158, 112122. [Google Scholar] [CrossRef]
  6. Niu, D.; Nie, X.; Zhang, L.; Zhang, H.; Yin, M. A GRASP for minimum weakly connected dominating set problem. Expert Syst. Appl. 2023, 215, 119338. [Google Scholar] [CrossRef]
  7. Li, R.; He, J.; Lin, C.; Liu, Y.; Hu, S.; Yin, M. A frequency and two-hop configuration checking-driven local search algorithm for the minimum weakly connected dominating set problem. Neural Comput. Appl. 2024, 36, 13833–13852. [Google Scholar] [CrossRef]
  8. Parra Inza, E.; Vakhania, N.; Almira, J.M.S.; Mira, F.A.H. Exact and heuristic algorithms for the domination problem. Eur. J. Oper. Res. 2024, 313, 926–936. [Google Scholar] [CrossRef]
  9. Adasme, P.; Castro de Andrade, R. Minimum weight clustered dominating tree problem. Eur. J. Oper. Res. 2023, 306, 535–548. [Google Scholar] [CrossRef]
  10. Rusnak, I.; Segal, M. Finding minimum cost data collection tree with aggregation. J. Optim. Theory Appl. 2025, 206, 19. [Google Scholar] [CrossRef]
  11. Gurobi Optimization, LLC. Gurobi Optimizer Reference Manual, Version 13.0.1; Gurobi Optimization, LLC: Beaverton, OR, USA, 2025; Available online: https://www.gurobi.com/ (accessed on 1 April 2025).
  12. Gunasekaran, S.; Anantharajan, S. Connected dominating set construction using the Hunger Games search optimisation algorithm in wireless sensor networks. IETE J. Res. 2024, 70, 8645–8655. [Google Scholar] [CrossRef]
  13. Arapoglu, O.; Cabuk, U.C.; Dagdeviren, O.; Challenger, M. ACapDS: An energy-efficient and fault-tolerant distributed capacitated dominating set algorithm for industrial IoT. IEEE Access 2024, 12, 38816–38829. [Google Scholar] [CrossRef]
  14. Di Puglia Pugliese, L.; Guerriero, F.; Mitton, N. Optimizing wireless sensor networks deployment with coverage and connectivity requirements. Ann. Oper. Res. 2025, 346, 1997–2008. [Google Scholar] [CrossRef]
  15. Arslan, O.; Laporte, G. Network design with vulnerability constraints and probabilistic edge reliability. Networks 2024, 84, 181–199. [Google Scholar] [CrossRef]
  16. Inga, E.; Dai, Y.; Inga, J.; Zhang, K. Connectivity-oriented optimization of scalable wireless sensor topologies for urban smart water metering. Smart Cities 2025, 8, 167. [Google Scholar] [CrossRef]
  17. Ojha, A.; Gupta, B. Evolving landscape of wireless sensor networks: A survey of trends, timelines, and future perspectives. Discov. Appl. Sci. 2025, 7, 825. [Google Scholar] [CrossRef]
  18. Fakhri, I.S.; Marhoon, H.A.; Hussein, M.H. Optimization of routing and cluster head selection in WSN: A survey. In Networks and Sustainability in the AIoT Era; Springer: Berlin/Heidelberg, Germany, 2024; pp. 409–422. [Google Scholar] [CrossRef]
  19. Abdel-Hakim, A.E.; Deabes, W.; Bouazza, K.E.; Hedar, A.-R. Dynamic deployment of mobile roadside units in Internet of Vehicles. IEEE Access 2024, 12, 155534–155548. [Google Scholar] [CrossRef]
  20. Gudapati, N.V.C.; Malaguti, E.; Monaci, M.; Paronuzzi, P. A computational study on integer programming formulations for hop-constrained survivable network design. Discret. Appl. Math. 2025, 362, 71–81. [Google Scholar] [CrossRef]
  21. Wei, W.; Sun, G.; Li, P.; Zhang, Q. Employing the cluster of node cut sets to improve the robustness of the network measured by connectivity. Reliab. Eng. Syst. Saf. 2025, 254, 110612. [Google Scholar] [CrossRef]
  22. Wei, W.; Huang, J.; Zhang, Q.; Ma, T.; Li, P. Hybrid connectivity-oriented efficient shielding for robustness enhancement in large-scale networks. J. Netw. Comput. Appl. 2025, 243, 104325. [Google Scholar] [CrossRef]
  23. Wei, W.; Hu, Q.; Zhang, Q. Improving node connectivity by optimized dual tree-based effective node consolidation. Reliab. Eng. Syst. Saf. 2024, 242, 109747. [Google Scholar] [CrossRef]
  24. Qiao, Y.; Song, R.; Li, S.; Qi, Z.; Zhang, L.; Niu, D.; Zhang, H. A genetic algorithm with graph reconstruction and Boolean_OR crossover for minimum 2-edge connected m-dominating set problem. Appl. Soft Comput. 2025, 189, 114534. [Google Scholar] [CrossRef]
  25. Zetina, C.A.; Contreras, I.; Fernández, E.; Luna-Mota, C. Solving the optimum communication spanning tree problem. Eur. J. Oper. Res. 2019, 273, 108–117. [Google Scholar] [CrossRef]
  26. Agarwal, Y.K.; Venkateshan, P. New valid inequalities for the optimal communication spanning tree problem. INFORMS J. Comput. 2019, 31, 268–284. [Google Scholar] [CrossRef]
  27. Fischetti, M.; Lodi, A. Local branching. Math. Program. Ser. B 2003, 98, 23–47. [Google Scholar] [CrossRef]
Figure 1. Comparison of MST and DT solutions for the same connected input graph using colored grey nodes with α = 0.9 and r = 0.2 . Active backbone nodes are shown in orange, users in green, and selected tree edges in red. In this setting, the two solutions remain structurally different. The node coordinates are randomly generated in the square [ 0 , 1 ] 2 .
Figure 1. Comparison of MST and DT solutions for the same connected input graph using colored grey nodes with α = 0.9 and r = 0.2 . Active backbone nodes are shown in orange, users in green, and selected tree edges in red. In this setting, the two solutions remain structurally different. The node coordinates are randomly generated in the square [ 0 , 1 ] 2 .
Mathematics 14 01605 g001
Figure 2. Comparison of MST and DT solutions for the same connected input graph using colored grey nodes with α = 0.7 and r = 0.3 . Active backbone nodes are shown in orange, users in green, and selected tree edges in red. In this setting, both solutions become structurally similar. The node coordinates are randomly generated in the square [ 0 , 1 ] 2 .
Figure 2. Comparison of MST and DT solutions for the same connected input graph using colored grey nodes with α = 0.7 and r = 0.3 . Active backbone nodes are shown in orange, users in green, and selected tree edges in red. In this setting, both solutions become structurally similar. The node coordinates are randomly generated in the square [ 0 , 1 ] 2 .
Mathematics 14 01605 g002
Figure 3. Evolution of the incumbent and lower bound over CPU time for the MST and DT flow formulations using valid inequalities, illustrating the rapid convergence of the branch-and-cut algorithm (100 nodes, 500 users, α = 0.5 ), and r a d i u s = 0.2 .
Figure 3. Evolution of the incumbent and lower bound over CPU time for the MST and DT flow formulations using valid inequalities, illustrating the rapid convergence of the branch-and-cut algorithm (100 nodes, 500 users, α = 0.5 ), and r a d i u s = 0.2 .
Mathematics 14 01605 g003
Figure 4. Illustrative comparison between MSTF (top) and DTF (bottom) solutions for different values of α { 0.1 , 0.3 , 0.5 , 0.7 } . For each case, the left panel shows the input graph with users, while the right panel highlights the selected backbone (orange nodes) and the induced tree structure (red edges).
Figure 4. Illustrative comparison between MSTF (top) and DTF (bottom) solutions for different values of α { 0.1 , 0.3 , 0.5 , 0.7 } . For each case, the left panel shows the input graph with users, while the right panel highlights the selected backbone (orange nodes) and the induced tree structure (red edges).
Mathematics 14 01605 g004
Figure 5. Structural metrics for α = 0.25 as a function of the number of nodes N, comparing MSTF and DTF. The plots report backbone size, total tree length, tree diameter, average degree, and average user distance.
Figure 5. Structural metrics for α = 0.25 as a function of the number of nodes N, comparing MSTF and DTF. The plots report backbone size, total tree length, tree diameter, average degree, and average user distance.
Mathematics 14 01605 g005
Figure 6. Structural metrics for α = 0.5 as a function of the number of nodes N, comparing MSTF and DTF. The plots report backbone size, total tree length, tree diameter, average degree, and average user distance.
Figure 6. Structural metrics for α = 0.5 as a function of the number of nodes N, comparing MSTF and DTF. The plots report backbone size, total tree length, tree diameter, average degree, and average user distance.
Mathematics 14 01605 g006
Figure 7. Structural metrics for α = 0.75 as a function of the number of nodes N, comparing MSTF and DTF. The plots report backbone size, total tree length, tree diameter, average degree, and average user distance.
Figure 7. Structural metrics for α = 0.75 as a function of the number of nodes N, comparing MSTF and DTF. The plots report backbone size, total tree length, tree diameter, average degree, and average user distance.
Mathematics 14 01605 g007
Figure 8. Structural metrics for α = 0.95 as a function of the number of nodes N, comparing MSTF and DTF. The plots report backbone size, total tree length, tree diameter, average degree, and average user distance.
Figure 8. Structural metrics for α = 0.95 as a function of the number of nodes N, comparing MSTF and DTF. The plots report backbone size, total tree length, tree diameter, average degree, and average user distance.
Mathematics 14 01605 g008
Figure 9. 3D sensitivity analysis over ( α , r ) for MSTF and DTF. Left: Optimal objective surfaces, highlighting regions where both formulations coincide and where they diverge. Right: CPU time surfaces, illustrating the computational effort required by each model across the parameter space.
Figure 9. 3D sensitivity analysis over ( α , r ) for MSTF and DTF. Left: Optimal objective surfaces, highlighting regions where both formulations coincide and where they diverge. Right: CPU time surfaces, illustrating the computational effort required by each model across the parameter space.
Mathematics 14 01605 g009
Figure 10. Collapse region where | M S T F D T F | = 0 over the ( α , r ) space.
Figure 10. Collapse region where | M S T F D T F | = 0 over the ( α , r ) space.
Mathematics 14 01605 g010
Figure 11. Empirical collapse boundary separating the regions where MSTF and DTF coincide from those where they diverge in the ( α , r ) space.
Figure 11. Empirical collapse boundary separating the regions where MSTF and DTF coincide from those where they diverge in the ( α , r ) space.
Mathematics 14 01605 g011
Table 1. Positioning of the present study with respect to the most closely related literature.
Table 1. Positioning of the present study with respect to the most closely related literature.
ReferencesDT/CDSMSTGeometricExact MIPMulti-FormulationStructural Analysis
[1,2,3]
[4,5,6,7]
[8,9]
[10]
[12,13,14]
[19,20]
[15]
[21,22,23,24]
[16,17,18]
[25,26]
This paper
Table 2. Comparison between MST and dominating tree MTZ formulations using α = 0.25 and number of users 5 N .
Table 2. Comparison between MST and dominating tree MTZ formulations using α = 0.25 and number of users 5 N .
NMST ObjMST B&BCPU (s)Gap (%)DT ObjB&BCPU (s)Gap (%)
107.3510.020.007.3510.020.00
158.386320.390.008.388730.380.00
209.4710.510.009.4710.300.00
2512.61650,73156.490.0012.61679,24955.530.00
3012.06296,611106.070.0012.061,290,107619.640.00
3512.368,110,6453600.140.6812.367,711,1933600.140.65
4013.623,455,3011289.350.0013.622,308,009726.510.00
4516.103,580,2343600.290.7616.103,858,9493600.420.76
5014.384,027,0433600.620.6614.384,457,4663600.270.67
Table 3. Comparison between MST and dominating tree MTZ formulations using α = 0.5 and number of users 5 N .
Table 3. Comparison between MST and dominating tree MTZ formulations using α = 0.5 and number of users 5 N .
NMST ObjMST B&BCPU (s)Gap (%)DT ObjB&BCPU (s)Gap (%)
106.1410.030.006.2610.020.00
156.6953040.820.006.6914920.300.00
207.551781.060.007.55410.930.00
259.411,237,964593.180.009.41723,656374.420.00
309.92586,156709.680.009.92104,40058.750.00
359.651,989,3063600.361.819.651,720,7603600.431.94
4010.561,849,5913600.160.5610.561,764,9423600.330.67
4512.361,700,9683600.272.1812.361,476,8403600.432.11
5011.25680,3133600.541.9211.25735,6063600.531.88
Table 4. Comparison between MST and dominating tree MTZ formulations using α = 0.75 and number of users 5 N .
Table 4. Comparison between MST and dominating tree MTZ formulations using α = 0.75 and number of users 5 N .
NMST ObjMST B&BCPU (s)Gap (%)DT ObjB&BCPU (s)Gap (%)
103.9910.030.005.1310.030.00
154.7545550.710.004.836800.320.00
205.3155761.310.005.419250.630.00
256.05909,2741107.130.006.051,342,7501743.810.00
307.261,276,1243600.261.517.442,953,8303600.345.49
356.821,201,2663600.334.896.841,111,2713600.705.22
407.39951,0223600.902.847.39829,9053600.532.58
458.44676,8903601.206.118.46686,9703601.116.31
507.82531,3113601.133.767.82519,3483601.033.47
Table 5. Comparison between MST and dominating tree MTZ formulations using α = 0.95 and number of users 5 N .
Table 5. Comparison between MST and dominating tree MTZ formulations using α = 0.95 and number of users 5 N .
NMST ObjMST B&BCPU (s)Gap (%)DT ObjB&BCPU (s)Gap (%)
101.0610.030.004.2210.030.00
151.6012970.530.003.037330.340.00
201.8414330.770.003.3810.540.00
252.0836,50627.380.002.83481,430330.800.00
302.59156,406181.020.004.54277,233240.890.00
353.041,397,5633600.599.963.701,468,0433601.088.73
403.16631,2443600.7614.743.58888,5503600.657.82
453.21482,0323600.309.533.97544,4423600.3318.08
503.43340,9093600.4312.143.83486,3833600.8111.15
Table 6. Comparison between MST and dominating tree flow formulations using α = 0.25 and number of users 5 N .
Table 6. Comparison between MST and dominating tree flow formulations using α = 0.25 and number of users 5 N .
NMST ObjMST B&BCPU (s)Gap (%)DT ObjB&BCPU (s)Gap (%)
107.351.00.030.007.351.00.030.00
158.381.00.120.008.381.00.100.00
209.471.00.120.009.471.00.100.00
2512.611.00.180.0012.611.00.210.00
3012.061.00.370.0012.061.00.220.00
3512.361.00.780.0012.36106.00.470.00
4013.621.00.820.0013.621.00.470.00
4516.101.00.500.0016.101.00.470.00
5014.382378.01.560.0014.384336.01.100.00
5516.342523.01.390.0016.34423.01.980.00
6016.96169.05.400.0016.963601.03.780.00
6517.361.06.360.0017.364291.05.190.00
7017.81550.05.970.0017.811096.08.040.00
7517.497478.08.910.0017.494301.04.990.00
8019.4311,654.09.430.0019.436554.08.210.00
8519.8823,361.024.560.0019.882593.014.790.00
9021.033249.011.500.0021.033284.012.010.00
9521.2419,950.015.700.0021.243775.011.520.00
10022.053103.014.860.0022.053357.015.040.00
Table 7. Comparison between MST and dominating tree flow formulations using α = 0.5 and number of users 5 N .
Table 7. Comparison between MST and dominating tree flow formulations using α = 0.5 and number of users 5 N .
NMST ObjMST B&BCPU (s)Gap (%)DT ObjB&BCPU (s)Gap (%)
106.141.00.040.006.261.00.030.00
156.691.00.240.006.691.00.120.00
207.551.00.250.007.551.00.210.00
259.411.00.480.009.411.00.300.00
309.921.00.520.009.921.00.390.00
359.651.01.880.009.651.00.430.00
4010.561.01.540.0010.561.00.730.00
4512.361.01.680.0012.361.01.050.00
5011.251.03.190.0011.251.01.890.00
5512.821.03.980.0012.821719.01.750.00
6013.201.05.740.0013.20654.02.480.00
6513.274043.010.230.0013.274100.09.110.00
7013.981.024.460.0013.981.012.460.00
7513.543627.09.090.0013.549833.08.860.00
8014.812435.014.880.0014.814498.023.490.00
8515.266871.027.990.0015.263229.042.170.00
9016.335561.036.280.0016.333270.045.460.00
9516.273007.044.760.0016.2710,852.042.250.00
10016.824198.052.630.0016.829620.054.200.00
Table 8. Comparison between MST and dominating tree flow formulations using α = 0.75 and number of users 5 N .
Table 8. Comparison between MST and dominating tree flow formulations using α = 0.75 and number of users 5 N .
NMST ObjMST B&BCPU (s)Gap (%)DT ObjB&BCPU (s)Gap (%)
103.991.00.050.005.131.00.030.00
154.751.00.330.004.831.00.230.00
205.3153.01.060.005.411.00.250.00
256.051636.03.130.006.051.00.770.00
307.261.03.290.007.4429.03.670.00
356.821752.06.370.006.84328.01.200.00
407.391263.010.110.007.391.01.950.00
458.443003.030.210.008.444194.026.780.00
507.822786.062.590.007.822707.020.290.00
558.5613,868.077.500.009.142921.015.220.00
609.182753.0107.610.009.182584.031.750.00
658.975018.0185.500.008.979622.0142.210.00
709.942598.0207.230.009.943163.088.870.00
759.312521.0123.050.009.312366.058.790.00
809.943268.0238.750.009.9410,222.0264.940.00
8510.2927,903.0619.840.0010.2935,403.0712.720.00
9011.1813,083.0787.260.0011.363270.0482.260.00
9511.022489.0518.750.0011.022479.0563.810.00
10011.3439,039.01901.190.0011.3431,457.01604.260.00
Table 9. Comparison between MST and dominating tree flow formulations using α = 0.95 and number of users 5 N .
Table 9. Comparison between MST and dominating tree flow formulations using α = 0.95 and number of users 5 N .
NMST ObjMST B&BCPU (s)Gap (%)DT ObjB&BCPU (s)Gap (%)
101.061.00.080.004.221.00.030.00
151.6075.00.350.003.031.00.130.00
201.84174.02.440.003.381.00.470.00
252.082485.06.100.002.831.03.030.00
302.592260.013.520.004.541.02.230.00
353.043441.022.930.003.7099.02.080.00
403.169965.059.770.003.581.02.730.00
453.2136,494.0383.580.003.976818.090.970.00
503.4358,426.01593.830.003.8312,135.0108.960.00
553.5338,874.03600.455.684.813719.053.670.00
603.91156,541.03600.726.164.4348,655.01227.120.00
653.8639,073.03600.6211.964.1380,663.03416.430.00
704.4359,629.03600.744.654.9140,342.01060.460.00
Table 10. Comparison between MST and dominating tree cut-set formulations using α = 0.25 and number of users 5 N .
Table 10. Comparison between MST and dominating tree cut-set formulations using α = 0.25 and number of users 5 N .
NMST ObjMST B&BCPU (s)Gap (%)MST LazyDT ObjDT B&BCPU (s)Gap (%)DT Lazy
107.3510.030.0037.3510.020.003
158.3810.130.00378.38970.110.0051
209.47470.230.00599.471860.230.00103
2512.6113,0507.360.0090912.6110,7775.960.00870
3012.0610,3997.240.00139912.0613,3719.180.001848
3512.3619,60724.730.00305312.3675,197261.810.008424
4013.62124,060809.000.0011,27113.62113,155752.200.0014,454
4565.64184,5013603.6975.9424,277-188,7533602.77-22,511
5044.07173,1793603.9768.1518,426-192,6313602.93-17,729
-: No solution found in 1 h of CPU time.
Table 11. Comparison between MST and dominating tree cut-set formulations using α = 0.5 and number of users 5 N .
Table 11. Comparison between MST and dominating tree cut-set formulations using α = 0.5 and number of users 5 N .
NMST ObjMST B&BCPU (s)Gap (%)MST LazyDT ObjDT B&BCPU (s)Gap (%)DT Lazy
106.1410.040.0046.2610.030.003
156.6910.330.00626.812320.190.0086
207.573340.350.001177.5610000.350.00315
259.4412,20010.370.0012939.5022,97011.830.001686
309.9215,82913.560.0025689.9211,99410.010.002738
359.6693,945415.630.0010,3269.65211,2262216.360.0020,930
4010.56179,4801896.390.0013,623-158,3613604.53-27,529
4552.82172,3933603.0477.7723,914-170,7023603.10-22,556
5017.59164,4573603.3439.9119,080-167,5633603.99-19,853
-: No solution found in 1 h of CPU time.
Table 12. Comparison between MST and dominating tree cut-set formulations using α = 0.75 and number of users 5 N .
Table 12. Comparison between MST and dominating tree cut-set formulations using α = 0.75 and number of users 5 N .
NMST ObjMST B&BCPU (s)Gap (%)MST LazyDT ObjDT B&BCPU (s)Gap (%)DT Lazy
103.9930.160.0055.1310.030.003
154.853630.320.00924.832310.250.00112
205.4745441.300.0012055.4940160.830.00801
256.0682,843141.980.0052956.2694,344190.750.005766
307.32197,0592055.330.0021,5927.65147,4731974.860.0023,660
357.18160,6473605.489.2734,683-149,8763607.57-32,457
408.04137,0253603.6115.7029,134-131,1823603.46-33,462
4512.99173,3383603.6242.6719,494-170,5853603.17-19,322
5020.27162,2013603.4265.7219,959-150,5983603.69-23,212
-: No solution found in 1 h of CPU time.
Table 13. Comparison between MST and dominating tree cut-set formulations using α = 0.95 and number of users 5 N .
Table 13. Comparison between MST and dominating tree cut-set formulations using α = 0.95 and number of users 5 N .
NMST ObjMST B&BCPU (s)Gap (%)MST LazyDT ObjDT B&BCPU (s)Gap (%)DT Lazy
101.0610.170.0014.2210.030.005
151.601170.380.00283.036050.340.00253
201.872521.260.00483.4778232.910.002048
252.1938,99657.740.0044363.07318,9822772.200.0022,241
302.8879,269397.220.0098294.62148,4633606.6826.7734,103
353.1798,263913.510.0015382-148,6963605.86-29,871
403.26197,6093612.644.1325104-148,5313604.40-31,406
453.34193,8903601.3813.9913732-147,6193603.49-21,376
504.01166,8743603.0528.009619-157,0083602.72-13,219
-: No solution found in 1 h of CPU time.
Table 14. Comparison between MST and dominating tree flow formulations using α = 0.25 , r = 0.2 and number of users 5 N using valid inequalities.
Table 14. Comparison between MST and dominating tree flow formulations using α = 0.25 , r = 0.2 and number of users 5 N using valid inequalities.
NMST ObjMST B&BCPU (s)Gap (%)DT ObjB&BCPU (s)Gap (%)
7017.81243.280.0017.8112.380.00
7517.4912.020.0017.491631.630.00
8019.4313.300.0019.43753.200.00
8519.884904.650.0019.8814.430.00
9021.0314.500.0021.0314.020.00
9521.2414.860.0021.2414.720.00
10022.0515.830.0022.0516.820.00
12023.472211.040.0023.4736910.890.00
14025.7577317.610.0025.7529917.650.00
15026.71120.420.0026.712719.660.00
Table 15. Comparison between MST and dominating tree flow formulations using α = 0.5 , r = 0.2 and number of users 5 N using valid inequalities.
Table 15. Comparison between MST and dominating tree flow formulations using α = 0.5 , r = 0.2 and number of users 5 N using valid inequalities.
NMST ObjMST B&BCPU(s)Gap (%)DT ObjB&BCPU (s)Gap (%)
7013.9818.340.0013.98110.670.00
7513.5415.240.0013.5412.960.00
8014.8193310.810.0014.8193312.360.00
8515.2686820.760.0015.26605519.960.00
9016.33115.230.0016.33115.540.00
9516.273015.520.0016.2743318.740.00
10016.8234520.580.0016.82121023.390.00
12017.997926.480.0017.99124.880.00
14019.70311778.790.0019.70247472.380.00
15020.42407980.470.0020.42865284.110.00
Table 16. Comparison between MST and dominating tree flow formulations using α = 0.75 , r = 0.2 and number of users 5 N using valid inequalities.
Table 16. Comparison between MST and dominating tree flow formulations using α = 0.75 , r = 0.2 and number of users 5 N using valid inequalities.
NMST ObjMST B&BCPU (s)Gap (%)DT ObjB&BCPU (s)Gap (%)
709.943355152.630.009.942556129.360.00
759.312397109.420.009.31234044.210.00
809.9412,301303.960.009.942357411.790.00
8510.2925,036395.190.0010.299627347.780.00
9011.183694498.730.0011.363532426.210.00
9511.022382212.320.0011.022290215.380.00
10011.3440,7301280.780.0011.3428,979724.070.00
12012.223037527.250.0012.222646497.250.00
14013.2339,8413600.330.0913.2338,8593600.520.20
15013.6930,1373600.360.2613.6938,9693600.390.13
Table 17. Comparison between MST and dominating tree flow formulations using α = 0.95 , r = 0.2 , M I P G a p = 1 % , and number of users 5 N using valid inequalities.
Table 17. Comparison between MST and dominating tree flow formulations using α = 0.95 , r = 0.2 , M I P G a p = 1 % , and number of users 5 N using valid inequalities.
NMST ObjMST B&BCPU (s)Gap (%)DT ObjB&BCPU (s)Gap (%)
704.43155,7263600.263.164.9118,323384.880.96
754.0940,3433600.4714.174.2543,0601885.920.97
804.4439,3983600.5517.574.6139,7443600.469.80
Table 18. Performance of the local branching matheuristic.
Table 18. Performance of the local branching matheuristic.
ModelNr α Init.Obj.Best.Obj.Imp. (%) t init τ CPU (s)Iter.Impv. ϕ f
MSTF700.200.954.66174.44274.702030264.668413
DTF700.200.955.02484.90842.322030264.698315
MSTF750.200.954.18534.09522.152030265.30869
DTF750.200.954.30924.24611.462030261.978315
MSTF800.200.954.54344.44122.252030265.878217
DTF800.200.954.68104.60061.722030265.588413
MSTF1000.200.956.29294.984520.792030268.02869
DTF1000.200.955.98065.170913.542030268.09877
MSTF1200.200.956.18225.461411.662030271.23869
DTF1200.200.956.77845.449619.602030270.94885
MSTF1500.200.958.37236.001228.322030247.42885
DTF1500.200.958.51086.140627.852030276.32885
Table 19. Similarity metrics between MSTF and DTF solutions for representative values of α and r. Instance of size N = 50 .
Table 19. Similarity metrics between MSTF and DTF solutions for representative values of α and r. Instance of size N = 50 .
α r J X Δ obj Interpretation
0.250.201.0000.000High similarity
0.500.201.0000.000High similarity
0.750.201.0000.000High similarity
0.950.200.3910.116Clear divergence
0.250.300.9800.000High similarity
0.500.301.0000.000High similarity
0.750.301.0000.000High similarity
0.950.300.3680.059Clear divergence
Table 20. Sensitivity with respect to the number of users ( N = 50 ; α = 0.25 , r a d i u s = 0.2 ) .
Table 20. Sensitivity with respect to the number of users ( N = 50 ; α = 0.25 , r a d i u s = 0.2 ) .
| K | ModelObj.Backbone SizeAvg. User Dist. J X CPU (s)
NMSTF3.672300.06921.0001.65
NDTF3.672300.06921.0001.52
3 N MSTF9.009450.06911.0000.72
3 N DTF9.009450.06911.0000.62
5 N MSTF14.379490.06991.0000.73
5 N DTF14.379490.06991.0000.61
10 N MSTF28.580500.07271.0000.94
10 N DTF28.580500.07271.0000.61
Table 21. Sensitivity with respect to the number of users ( N = 50 ; α = 0.5 , r a d i u s = 0.2 ) .
Table 21. Sensitivity with respect to the number of users ( N = 50 ; α = 0.5 , r a d i u s = 0.2 ) .
| K | ModelObj.Backbone SizeAvg. User Dist. J X CPU (s)
NMSTF3.632220.08280.8408.29
NDTF3.654240.07920.84016.92
3 N MSTF7.619380.07111.0003.48
3 N DTF7.619380.07111.0001.69
5 N MSTF11.250440.07031.0002.17
5 N DTF11.250440.07031.0001.19
10 N MSTF20.805500.07271.0001.91
10 N DTF20.805500.07271.0001.15
Table 22. Sensitivity with respect to the number of users ( N = 50 ; α = 0.75 , r a d i u s = 0.2 ) .
Table 22. Sensitivity with respect to the number of users ( N = 50 ; α = 0.75 , r a d i u s = 0.2 ) .
| K | ModelObj.Backbone SizeAvg. User Dist. J X CPU (s)
NMSTF3.044160.10720.63694.29
NDTF3.321200.10260.63610.90
3 N MSTF5.594290.08411.000102.27
3 N DTF5.594290.08411.00014.48
5 N MSTF7.823350.08241.00048.35
5 N DTF7.823350.08241.00032.10
10 N MSTF12.954460.07391.00024.93
10 N DTF12.954460.07391.0007.16
Table 23. Sensitivity with respect to the number of users ( N = 50 ; α = 0.95 , r a d i u s = 0.2 ) .
Table 23. Sensitivity with respect to the number of users ( N = 50 ; α = 0.95 , r a d i u s = 0.2 ) .
| K | ModelObj.Backbone SizeAvg. User Dist. J X CPU (s)
NMSTF0.98810.39510.0004.69
NDTF2.608180.13050.0002.93
3 N MSTF2.47380.21170.350176.30
3 N DTF3.205190.12320.35017.17
5 N MSTF3.426110.17090.391387.29
5 N DTF3.825210.11400.39126.17
10 N MSTF5.213190.12170.6921552.80
10 N DTF5.292250.10170.692120.93
Table 24. Sensitivity with respect to the number of users ( N = 50 ; α = 0.25 , r a d i u s = 0.3 ) .
Table 24. Sensitivity with respect to the number of users ( N = 50 ; α = 0.25 , r a d i u s = 0.3 ) .
| K | ModelObj.Backbone SizeAvg. User Dist. J X CPU (s)
NMSTF3.528280.06911.0003.45
NDTF3.528280.06911.0002.93
3 N MSTF8.915450.06911.0001.54
3 N DTF8.916450.06911.0001.18
5 N MSTF14.286480.06990.9801.42
5 N DTF14.285490.06990.9801.31
10 N MSTF28.486500.07271.0001.58
10 N DTF28.488500.07271.0001.35
Table 25. Sensitivity with respect to the number of users ( N = 50 ; α = 0.5 , r a d i u s = 0.3 ) .
Table 25. Sensitivity with respect to the number of users ( N = 50 ; α = 0.5 , r a d i u s = 0.3 ) .
| K | ModelObj.Backbone SizeAvg. User Dist. J X CPU (s)
NMSTF3.495220.07711.00016.18
NDTF3.495220.07711.00019.92
3 N MSTF7.431380.07111.0006.56
3 N DTF7.431380.07111.0003.94
5 N MSTF11.062440.07031.0004.44
5 N DTF11.062440.07031.0003.65
10 N MSTF20.617500.07271.0003.30
10 N DTF20.617500.07271.0003.40
Table 26. Sensitivity with respect to the number of users ( N = 50 ; α = 0.75 , r a d i u s = 0.3 ) .
Table 26. Sensitivity with respect to the number of users ( N = 50 ; α = 0.75 , r a d i u s = 0.3 ) .
| K | ModelObj.Backbone SizeAvg. User Dist. J X CPU (s)
NMSTF2.940140.11160.933547.00
NDTF2.944150.10440.933190.01
3 N MSTF5.504260.08301.00085.04
3 N DTF5.504260.08301.000100.36
5 N MSTF7.629320.07701.000197.12
5 N DTF7.629320.07701.00047.14
10 N MSTF12.672460.07391.00031.89
10 N DTF12.672460.07391.00016.74
Table 27. Sensitivity with respect to the number of users ( N = 50 ; α = 0.95 , r a d i u s = 0.3 ) .
Table 27. Sensitivity with respect to the number of users ( N = 50 ; α = 0.95 , r a d i u s = 0.3 ) .
| K | ModelObj.Backbone SizeAvg. User Dist. J X CPU (s)
NMSTF0.98810.39510.0007.17
NDTF1.93280.17270.00053.94
3 N MSTF2.37780.19850.2141241.83
3 N DTF2.73890.16010.214849.83
5 N MSTF3.334110.16360.3893600.30
5 N DTF3.529140.12670.3892142.90
10 N MSTF5.123180.12390.9473600.51
10 N DTF5.155190.11590.9473600.36
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Adasme, P. When Does Domination Matter: A Structural and Computational Study of Spanning and Dominating Trees in Geometric Networks. Mathematics 2026, 14, 1605. https://doi.org/10.3390/math14101605

AMA Style

Adasme P. When Does Domination Matter: A Structural and Computational Study of Spanning and Dominating Trees in Geometric Networks. Mathematics. 2026; 14(10):1605. https://doi.org/10.3390/math14101605

Chicago/Turabian Style

Adasme, Pablo. 2026. "When Does Domination Matter: A Structural and Computational Study of Spanning and Dominating Trees in Geometric Networks" Mathematics 14, no. 10: 1605. https://doi.org/10.3390/math14101605

APA Style

Adasme, P. (2026). When Does Domination Matter: A Structural and Computational Study of Spanning and Dominating Trees in Geometric Networks. Mathematics, 14(10), 1605. https://doi.org/10.3390/math14101605

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop