Supporting Fully Adaptive Routing in InfiniBand Networks

Size: px
Start display at page:

Download "Supporting Fully Adaptive Routing in InfiniBand Networks"

Transcription

1 XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar for communication between processing noes an I/O evices as well as for interprocessor communication. The InfiniBan Architecture (IBA) supports istribute routing. However, routing in IBA is eterministic because forwaring tables store a single per estination ID. This prevents packets from using alternative paths when the requeste is busy. Despite the fact that alternative paths coul be selecte at the source noe to reach the same estination noe, this is not effective enough to improve network performance. However, using aaptive routing coul help to circumvent the congeste areas in the network, leaing to an increment in performance. In this paper, we propose a simple strategy to implement forwaring tables for IBA switches that support aaptive routing while still maintaining compatibility with the IBA specs. Aaptive routing can be enable or isable iniviually for each packet at the source noe. Also, the propose strategy enables the use in IBA of fully aaptive routing algorithms without using aitional network resources to improve network performance. Evaluation results show that extening IBA switch capabilities with fully aaptive routing noticeably increases network performance. In particular, network throughput increases up to an average factor of.9. Palabras clave SANs, InfiniBan, aaptive routing, virtual aressing. I. INTRODUCTION NFINIBAND [11] is a new interconnect stanar for communication between processing noes an I/O evices, as well as for interprocessor communication (IPC). The InfiniBan Architecture (IBA) [12] is esigne aroun a switch-base interconnect technology with high-spee serial point-to-point links. IBA supports any topology efine by the user in orer to provie wiring flexibility an incremental expansion capability. More than 180 companies, incluing the leaing computer manufacturers, support the InfiniBan initiative. It was esigne to solve the lack of high banwith, reliability, availability an scalability of existing server I/O technologies. However, the spectrum of possible application omains for InfiniBan is wier, incluing I/O interconnect, system area networks (SAN), storage area networks (STAN), an local area networks (LAN). InfiniBan coul be use as a SAN fabric for high performance server clusters or commoity clusters forme by PCs or workstations. In particular, InfiniBan can provie the high banwith an low en-to-en latency require for enhancing commoity clusters that can be use as a cost-effective alternative to parallel This work was supporte by the Spanish Ministry of Science an Technology uner Grants TIC C07 an 1FD , by Generalitat Valenciana uner Grant GV , an by JJ.CC. e Castilla-La Mancha uner Grant PBC Dept. of Computer Engineering (DISCA). Universia Politécnica e Valencia. Camino e Vera, 14, Valencia, Spain. jc@isca.upv.es computers. Routing in IBA subnets is istribute an eterministic, base on forwaring tables store in each switch an which only consier the packet estination ID for routing packets [12]. The routing tables only store one output link per estination. Deterministic routing is use in many network interconnects ue to its simplicity [1], [14]. However, eterministic routing algorithms o not make effective use of network links because a unique path is provie for each source-estination pair. IBA allows the use of alternative paths between any source-estination pair 1. The final path can be selecte at each source noe accoring to certain criterion (ranom, roun-robin, etc). However, by using alternative paths selecte at the source noe, the network performance is harly improve [5], [6]. On the other han, aaptive routing [] ynamically buils the path use by a packet, selecting the channels along the path consiering network status information. With aaptive routing, each switch selects the output port to forwar a packet from a set of routing options, avoiing congeste areas an increasing network performance. Several aaptive routing algorithms have been propose in the literature [2], [16], [10], showing that network performance can be strongly increase. However, aaptive routing has some rawbacks. The first one is that it increases switch complexity. The secon one is the fact that it cannot guarantee in-orer packet elivery. However, in most MPI-base parallel applications, there exists a certain percentage of traffic that may be elivere out-of-orer. Moreover, in-orer packets coul also use aaptive routing if packets were reorere at the estination host before being elivere. II. MOTIVATION At first glance, InfiniBan specifications [12] o not support istribute aaptive routing. Effectively, IBA specs state that forwaring tables must provie only one physical per estination noe. However, IBA specs o not efine the internal architecture of a switch. Inee, IBA switches alreay support istribute routing. Thus, enhancing switch capabilities to support aaptive routing coul be feasible. In [1], we propose a simple strategy to allow aaptive routing in IBA while still maintaining compatibility with the IBA specs. Inee, this proposal can be consiere as an extension of IBA specs, aing more functionality to them. In this paper, we provie support to fully aaptive routing algorithms [4] in IBA switches. In particular, we implement an extension to virtual cut-through of the MA routing algorithm [16] for networks with irregular By means of the virtual aressing scheme of IBA [12].

2 2 J.C. MARTÍNEZ Y COL. topology. The mechanism propose in this paper oes not nee to a resources to the IBA switches. Only, the existing resources must be appropriately arrange. The rest of the paper is organize as follows. Section III escribes the propose mechanism. In Section IV some performance evaluation results are shown. Finally, in Section V some conclusions are rawn. III. SUPPORTING ADAPTIVE ROUTING IN IBA This section contains a short escription of the propose mechanism. A more etaile escription can be foun at [1]. An IBA network is compose by en noes interconnecte by switches. Each en noe contains one or more channel aapters (CA). Each channel aapter contains one or more ports. Each port has a local ientifier (LID) assigne by the local subnet manager, which is unique within the subnet. IBA switches route packets base on forwaring tables store at each switch, aresse by the packet estination local ientifier (which is referre to as the estination LID or DLID). As this table only returns one to forwar the packet towars its estination, IBA switches o not support aaptive routing. A. Proviing Multiple Routing Options In orer to support aaptivity, each switch shoul supply several feasible s when a packet is route. We can use a trick to provie multiple routing options in IBA switches. IBA allows a single estination to be assigne not only a unique aress but a range of them by efining a LID Mask Control or LMC [12]. The LMC specifies the number of least significant bits of the LID that a physical port masks (ignores) when it valiates that a packet DLID matches its assigne LID. As these bits are not ignore by the switches from the subnet point of view, each CA port has been assigne up to consecutive aresses. Each CA port will accept all packets estine for any vali aress within its range. Notice that IBA specifications allow for a maximum of 128 ifferent aresses per estination port. Thus, a maximum of 128 ifferent routing options coul be provie with the propose scheme, which seems more than require. The iea is to assign to each port the same number of aresses as the number of routing options at each switch. In this case, there will be a range of consecutive aresses assigne to the same host. When the switch has to select the for any packet, it selects all the s that are assigne to the packet estination host, espite selecting only one. In this way, the forwaring table will provie more than one output port for each packet. This mechanism allows source hosts to select eterministic or aaptive routing, on a per packet basis. When a source host selects the least virtual aress ( ) of the estination host, only an will be selecte at each switch. This will be always the same for each estination host in orer to provie eterministic routing (in-orer elivering). When a source host selects the aress, all the s will be provie in orer to provie aaptive routing. In orer to access several entries in the forwaring table, they can be accesse sequentially or a multi-port memory can be use. However, if a linear forwaring table 2 [12] is use at switches, a simple implementation can be one by organizing the forwaring table as an interleave memory compose by several moules that are selecte by the least significant bits. To sum up, Figure 1 shows the implementation of the mechanism when two routing options are provie at each switch. The estination fiel of the packet (the DLID) is use to access the forwaring table, obtaining simultaneously two s. To allow these two simultaneous accesses, the forwaring table is organize as two interleave moules. In orer to select the switch that will be finally use, the least significant bit of the DLID is first checke. If it is set to zero, eterministic routing is require for the packet, so the that correspons to the first aress is selecte. Otherwise, two routing options are selecte. The final selection can be one either immeiately or at the internal switch arbitration time, an either consiering the status of the s or performing a static selection. B. Support for Aaptive Routing with Escape Paths The mechanism allows the use of aaptive routing algorithms with escape paths. Therefore, the fully aaptive routing algorithm [4] can be use in IBA. We coul split each IBA VL into two queues, the aaptive an the escape queues. Both queues are multiplexe onto the corresponing VL. However, we have not support to ientify from which queue ata is being transferre or to manage the buffer space available at each queue. To solve this problem, we propose (see Figure 2) to ivie the physical buffer assigne to each VL into two logical queues that will implement the aaptive an the escape queue, respectively. The first part of the physical buffer correspons to the aaptive queue, whereas the secon part of it is the escape queue. Notice that the entire VL is treate as a unique queue. Therefore, the escape queue will be use only when the aaptive queue is full. However, the packets store in the escape queue must be able to be route an forware inepenently of the ones store in the aaptive one. This can be accomplishe in the propose organization by arranging two connections from each VL to the internal switch, one locate at the hea of the aaptive queue an another locate at the hea of the escape queue. In Figure 2, a multiplexer is use in orer to select a packet either from the aaptive or the escape queue. Since escape an aaptive queues are parts of the same queue, a packet may be transfere from the escape queue to the aaptive queue. As can be seen in [4], this oes not lea to ealock. Once the forwaring table offers the aaptive an escape routing options (leaing to s an The linear forwaring table provies a simple map from LID to. In other wors, the table contains only s an the LID acts as an inex into the table.

3 XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 ata Forwaring table s status Selection logic selecte LSB () +1 1 LSB () Fig. 1. Proviing multiple routing options in IBA switches. in Figure 2), the switch, base on the information about the number of creits (, an in Figure 2), can properly select the to use. The aaptive routing option will be use only if there are enough creits available ( ) at the aaptive queue. The escape routing option can be use at any time. Notice that packets forware through this routing option will be store either in the aaptive or the escape queues epening on the number of available creits ( an ). Finally, in the case both routing options have no creits available for the packet, the switch can either ecie to forwar the packet through the escape queue (once there are enough available creits) or to take the ecision later. As the buffer associate to VLs is now ivie into two logical queues (aaptive an escape) an virtual cutthrough is use, each one of them shoul be able to store an entire packet. This can be accomplishe either by increasing buffer size accoringly or by reucing the Maximum Transfer Unit (MTU). As switches may extract a packet from the hea of the escape queue, a packet may overtake another packet that has been place at the aaptive queue in the same VL. This may prouce out-of-orer elivering even when using always the same routing option per estination. Switches may avoi this problem using a pointer to the first eterministic packet in the VL. The packet pointe by this pointer is consiere as the hea of the escape queue. Therefore, eterministic packets cannot bypass other eterministic ones. IV. PERFORMANCE EVALUATION In this section we will evaluate the impact on network performance of the propose strategy. For this purpose, we have evelope a etaile simulator that allows us to moel the network at the register transfer level following the IBA specifications [12]. First, we will escribe the IBA subnet moel efine in the specs together with the simulator parameters an the moeling consierations we have use in all the evaluations. Then, we will evaluate the aaptive technique propose uner ifferent topologies an ifferent traffic patterns. A. The IBA Subnet Moel The IBA specification efines a switch-base network with point-to-point links, allowing the user to efine any topology. The network allows the communication between en-noes. The en-noes are attache to switches using the same kin of links use between switches. Packets are route at each switch by accessing the forwaring table, that contains the to be use at the switch for each possible estination. Several routing options are provie base on the strategy propose in this paper. In particular, the routing options will be compute by using the FA routing algorithm propose in [4], which uses the up*/own* routing for computing the escape paths. The is selecte at arbitration time consiering the status of the requeste s an the number of creits available. Switches can support up to 16 virtual lanes. VLs can be use to form separate virtual networks. We will use a non-multiplexe crossbar on each switch. This crossbar supplies separate ports for each VL. Buffers will be use both at the input an the output sie of the crossbar. Buffer size will be fixe in both cases to 1KB. Hence, the aaptive an escape queues implemente on each buffer will be 512 bytes epth. The switch routing time will be set to 100ns, incluing the time to access the forwaring tables, the crossbar arbiter time, an the time to set up the crossbar connections. Links in InfiniBan are serial. 10/8 coing [12] is use. In the simulator, the link rate will be fixe to the 1X an 4X configuration [12] (2.5 an 10 Gbps). We will moel 20m copper cables with a propagation elay of 5ns/m. The IBA specification efines a creit-base flow control scheme for each virtual lane with inepenent buffer resources. A packet will be transmitte over the link if there is enough buffer space (measure in creits of 64 bytes) to store the entire packet. IBA allows the efinition of ifferent MTU values for packets, ranging from 256 to 4096 bytes. We use a MTU of 256 bytes. Aitionally, the virtual cut-through switching technique is use. Several packet estination istributions will be use: uniform, bit-reversal, an hot-spot. In the latter case, a noe is ranomly selecte an a percentage (we use 5%, 1, an 2) of traffic is sent to this host. 2 an 256-byte packets will be use. In all the presente results, we will plot the average packet latency measure in nanosecons versus the average accepte Latency is the elapse time between the generation of a packet at the source host until it is elivere at the estination en-noe.

4 4 J.C. MARTÍNEZ Y COL. Switch C XY creits escape output port aaptive output port Available creits VL0 C 00 C 00E Buffer #!# $!$ for! VL0 "!" at next switch escape queue 1k byte buffer op 0 16 cre. -!-!-!-!-!- )!) *!* +!+!+,!,!, /!/!/!/!/!/!/ 0!0!0!0!0!0!0-!-!-!-!-!-.!.!.!.!.!. /!/!/!/!/!/!/ 0!0!0!0!0!0!0.!.!.!.!.!. Buffer for VL0 +1 FT op 0 op 1 C 00A Available creits VL0 C 10 C 10E C 10A op 1 %!% &!& '!'!' (!( Buffer for VL0 at next switch tail 8 cre. 8 cre. 512 bytes 512 bytes C XYE creits aaptive queue hea C XYA creits MUX internal switch C XY creits stans for creits at VL "Y" of channel "X" C XYE creits stans for creits at the escape channel of VL "Y" of channel "X" C stans for creits at the aaptive channel of VL "Y" of channel "X" XYA creits Fig. 2. Supporting aaptive routing with escape paths. traffic 4 measure in bytes/ns/switch. We will analize irregular networks of 8, 16, 2, an 64 switches ranomly generate following some restrictions. First, we will assume that every switch in the network has the same number of ports (we use 8 or 10) an the same number of noes connecte to every switch (4 in our simulations). An secon, neighboring switches will be interconnecte by just one link. Ten ifferent topologies will be ranomly generate for each network size. Thus, we will also show minimum, maximum an average results. In aition, we will also plot the results for some representative topologies for every network size. B. Evaluation Results In this section we analyze the influence on network performance when using IBA switches with aaptive routing capabilities First, we analyze the influence of the percentage of aaptive traffic on network performance. Then, we analyze how the network connectivity affects network performance. B.1 Influence of the Percentage of Aaptive Traffic Figures.a,.b,.c, an. show the simulation results for the FA routing when varying the percentage of aaptive traffic from (eterministic traffic) up to 10 for network sizes of 8, 16, 2, an 64 switches, respectively. In this case, forwaring tables provie two routing options at most an four links (4X each one) are use in each switch to connenct to other switches. Uniform packet estination istribution an 2- byte packets are use. As it can be seen, the improvement on performance achieve by using IBA switches with support for aaptive routing linearly increases with the percentage of applie aaptive traffic. However, for the 8-switch network, when or 10 of aaptive traffic is injecte, the FA routing algorithm almost obtains the same network throughput. On the contrary, for the 64-switch network, the ifference in network throughput when injecting an 10 of aaptive traffic is greater. Table I shows minimum, maximum, an average factors of throughput increase for ifferent network sizes an ifferent packet sizes when using 10 aaptive 1 Accepte traffic is the amount of information elivere by the network per time unit. traffic an 4X links 5. As we can see, network throughput benefits increase as network size increases. In particular, a uniform traffic pattern with 2-byte packets, when using networks with two routing options an 4 links connecting switches, network throughput is increase, on average, from 1. to.28, epening on network size. The higher throughput increase observe for large networks with respect to small networks is ue to the fact that the up*/own* routing oes not scale well. Therefore, with of aaptive traffic, as network size increases, the up*/own* routing tens to use longer non-minimal paths an also to unbalance the traffic, congesting the switches near the root switch [7]. Hence, packets benefit more from using aaptive routing. Table I shows results for other traffic paterns. The higher the percentage of hot-spot traffic, the lower the factors of throughput improvement. This is because traffic aroun the hot-spot tens to concentrate, spreaing the congestion through the network. Better results are obtaine for other traffic patterns (See Table I). Inee, for the bit-reversal traffic pattern (which creates some local congestion areas), similar results to the uniform traffic pattern are obtaine, as shown in Table I. We can observe that the use of aaptive routing causes throughput to increase, on average, by a factor of 1.58 for 8-switch networks an 2.8 for 64-switch networks. Finally, we can observe that qualitatively similar results were obtaine for long packets. B.2 Influence of Increasing the Number of Routing Options an Network Connectivity With a connectivity of 4 links per switch, it is not worth proviing more than two routing options per switch (See Table III). For instance, only 17.48% of the estinations provie more than two routing options in a 64-switch network. However, when using 6 links to connect to other switches we can observe that this percentage is increase. Table I (right sie) shows the throughput improvement results when switches have 6 ports available to connect to other switches an forwaring tables provie up to four routing options for uniform traffic. With 4 links connecting switches an up to three routing options per estination at each switch, throughput is slightly increase (.28 vs.50 for 64-switch networks an 2-2 Table II shows results when using 1X links. As can be observe, the same conclusions can be euce.

5 XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE (a) (b) (c) () Fig.. Average packet latency vs. traffic. 1 Virtual lane an 4 links connecting switches. 4X links. Uniform traffic pattern. Network size is (a) 8, (b) 16, (c) 2, an () 64 switches. Packet size is 2 bytes. TABLA I MINIMUM, MAXIMUM, AND AVERAGE FACTORS OF THROUGHPUT INCREASE WHEN USING 10 ADAPTIVE TRAFFIC VS. 10 DETERMINISTIC TRAFFIC. 4X LINKS. 1 VL. AT MR/LS COLUMN, MR STANDS FOR MAXIMUM NUMBER OF ROUTING OPTIONS AT EACH SWITCH FOR EACH DESTINATION PORT. LS STANDS FOR CONNECTING LINKS BETWEEN SWITCHES. 2-byte packets 256-byte packets 2-byte packets 256-byte packets Sw MR/LS Traffic Min/Max/Avg Min/Max/Avg Sw MR/LS Traffic Min/Max/Avg Min/Max/Avg 8 2/4 Unif. 1.15/1.42/ /1.52/1.8 8 /4 Unif. 1.15/1.52/ /1.60/ /4 Unif. 1.41/2.0/ /1.62/ /4 Unif. 1.2/2.04/ /1.82/ /4 Unif. 1.77/.16/ /2.2/ /4 Unif. 1.77/2.26/ /2.51/ /4 Unif. 2.82/4.2/ /2.60/ /4 Unif. 2.97/4.47/ /2.79/ /4 HS 5% 1.2/1.76/ /1.69/ /4 HS 5% 1.25/2.01/ /1.77/ /6 Unif. 1.18/1.68/ /2.08/ /4 HS 5% 1.50/2.21/ /2.08/ /6 Unif. 1.51/2.4/ /2.40/ /4 HS 5% 1.70/2.28/ /2.28/ /6 Unif. 2.49/.11/ /2.91/ /4 HS /1.55/ /1.46/ /4 HS /1.4/ /1.48/1. 16 /6 Unif. 1.20/1.74/ /2.2/ /4 HS /1.57/ /1.62/ /6 Unif. 1.56/2.4/ /2.62/ /4 HS /1.57/ /1.56/ /6 Unif. 2.56/.47/ /.20/ /4 BR 1.06/1.69/ /1.82/ /4 BR 1.25/1.91/ /1.61/ /6 Unif. 1.20/1.74/ /2./ /4 BR 1.51/2.95/ /2.20/ /6 Unif. 1.56/2.57/ /1.67/ /4 BR 1.69/.5/ /2.71/ /6 Unif. 2.88/2.48/ /.28/.02 byte packets). However, as network becomes more connecte (with 6 links connecting switches), Tables I an II show some ifferences for 2-byte packets. The higher the banwisth link, the lower the factor of throughput increase. This is ue to the better behaviour of eterministic traffic in 4X links. In this case, contention is reuce because of the higher connectivity an the higher banwith. However, when using 256-byte packets an eterministic traffic, contention is increase. Therefore, higher benefits are achieve when using aaptive traffic. V. CONCLUSIONS We have propose a simple mechanism to enhance IBA switch capabilities to support aaptive routing while maintaining compatibility with IBA specs. For this aim, forwaring tables are arrange in such a way that they can provie several routing options at the same time. Also, the logic circuitry necessary to support fully aaptive routing algorithms (aaptive an escape queues an the proper utilization of creits to avoi ealock) has been propose. Also, aaptive routing can be enable or isable on a per-packet basis by the running application. The propose mechanism has been evaluate using the fully aaptive routing scheme propose in [4]. Results show that enhancing IBA switches with aaptive routing noticeably increases network performance. This is specially significant for large networks. As network connectivity increases, higher throughput improvement is obtaine. In particular, network can be improve up to a factor of.9.

6 6 J.C. MARTÍNEZ Y COL. TABLA II 4 MINIMUM, MAXIMUM, AND AVERAGE FACTORS OF THROUGHPUT INCREASE WHEN USING 10 ADAPTIVE TRAFFIC VS. 10 DETERMINISTIC TRAFFIC. 1X LINKS. 1 VL. AT MR/LS COLUMN, MR STANDS FOR MAXIMUM NUMBER OF ROUTING OPTIONS AT EACH SWITCH FOR EACH DESTINATION PORT. LS STANDS FOR CONNECTING LINKS BETWEEN SWITCHES. 2-byte packets 256-byte packets 2-byte packets 256-byte packets Sw MR/LS Traffic Min/Max/Avg Min/Max/Avg Sw MR/LS Traffic Min/Max/Avg Min/Max/Avg 8 2/4 Unif. 1.0/1.69/ /1.51/1.7 8 /4 Unif. 1.0/1.77/ /1.58/ /4 Unif. 1.26/2.04/ /1.79/ /4 Unif. 1.0/2.16/ /1.88/ /4 Unif. 1.77/.11/ /2.24/ /4 Unif. 1.77/.9/ /2.5/ /4 Unif. 2.75/.94/ /2.87/ /4 Unif. 2.87/4.28/ /.25/ /4 HS 5% 1.15/1.71/ /1.50/ /4 HS 5% 1.2/1.91/ /1.82/ /6 Unif. 1.40/2.0/ /2.05/ /4 HS 5% 1.8/2.17/ /2.00/ /6 Unif. 1.76/2.98/ /2.47/ /4 HS 5% 1.62/2.20/ /2.00/ /6 Unif. 2.58/4.00/ /.19/ /4 HS 1 1.0/1.45/ /1.5/ /4 HS /1.7/ /1.8/ /6 Unif. 1.42/2.52/ /2.2/ /4 HS /1.50/ /1.41/ /6 Unif. 1.98/.27/ /2.69/ /4 HS /1.48/ /1./ /6 Unif. 2.85/4.1/ /.52/ /4 BR 1.21/1.90/ /1.89/ /4 BR 1.12/1.81/ /1.66/ /6 Unif. 1.42/2.55/ /2.27/ /4 BR 1.41/.1/ /2.46/ /6 Unif. 1.94/.40/ /2.69/ /4 BR 2.16/4.09/ /2.99/ /6 Unif. 2.99/4.45/ /.52/.25 TABLA III AVERAGE PERCENTAGE OF ROUTING OPTIONS AT EACH SWITCH FOR EACH DESTINATION PORT. MR STANDS FOR MAXIMUM NUMBER OF ROUTING OPTIONS AT EACH SWITCH FOR EACH DESTINATION. 4 links 6 links Routing options Routing options Sw MR Although the propose mechanism consumes a virtual aress per routing option, the number of require aresses remains low an it is not a scarce resource. Also, evaluation results show that by using only two routing options per estination port at each switch, roughly 9 of the maximum throughput improvement is achieve. We recently propose some effective strategies to improve IBA network performance [8], [9] by allowing most packets to be route through minimal paths an proviing better traffic balance. These strategies make an efficient use of virtual lanes that are not use by QoS purposes. As future work we plan to combine this mechanism with these strategies in orer to boost network performance further. REFERENCIAS [1] N.J. Boen, D. Cohen, R.E. Felerman, A.E. Kulawik, C.L. Seitz, J. Seizovic an W. Su, Myrinet - A gigabit per secon local area network, IEEE Micro, pp. 29 6, February [2] W.J. Dally an H. Aoki, Dealock-free Aaptive Routing in Multiprocessor Networks Using Virtual Channels, IEEE Trans. Parallel an Distribute Systems, vol. 4, no. 4, pp , April 199. [] J. Duato, S. Yalamanchili, an L. Ni, Interconnection Networks, An Engineering Approach, IEEE Computer Society Press, [4] J. Duato, A. Robles, F. Silla, an R. Beivie, A comparison of router architecture for virtual cut-through an wormhole switching in a NOW environment, in Jour. of Parallel an Distribute Computing 61, (2001). [5] J. Flich, M.P. Malumbres, P. Lopez, an J. Duato, Improving Routing Performance in Myrinet Networks, in Proc. of Int. Parallel an Distribute Processing Symp., May [6] J. Flich, Improving performance of networks of workstations with source routing, Ph. D. Thesis, March [7] J. Flich, P. López, M.P. Malumbres, an J. Duato, Boosting the Performance of Myrinet Networks, IEEE Trans. Parallel an Distribute Systems, vol. 1, no. 7, July [8] J. Flich, P. López, J.C. Sancho, A. Robles, an J. Duato, Improving InfiniBan Routing through Multiple Virtual Networks, in Int. Symp. High Performance Computing, May [9] J. C. Sancho, A. Robles, J. Flich, P. López an J. Duato, Effective Methoology for Dealock-Free Minimal Routing in InfiniBan Networks, to be presente in Int. Conf. on Parallel Processing, August [10] C.J. Glass an L.M. Ni, A Turn Moel for Aaptive Routing, in Proc. Int. Symp. on Computer Architecture, May [11] InfiniBan SM Trae Association. [12] InfiniBan SM Trae Association, InfiniBan576 Architecture. Specification Volume 1. Release 1.0. Available at [1] J. Martínez, J. Flich, A. Robles, P. López, an J. Duato Supporting Fully Aaptive Routing in InfiniBan Networks in Proc. of the International Parallel an Distribute Processing Symposium, April 200. [14] M.D. Schroeer et al., Autonet: A high-spee, self-configuring local area network using point-to-point links, IEEE Jour. on Selecte Areas in Communications, 9(8):118-15, October [15] F. Silla, M.P. Malumbres, A. Robles, P. Lopez, an J. Duato, Efficient aaptive routing in networks of workstations with irregular topology, in Proc. of the Workshop on Communications an Architectural Support for Network-base Parallel Computing, [16] F. Silla an J. Duato, Improving the Efficiency of Aaptive Routing in Networks with Irregular Topology, 1997 Int. Conf. on High Performance Computing, December [17] Y. Tamir, H.C. Chi, Symetric Crossbar Arbiters for VLSI Communication Switches, in IEEE Trans. on Parallel an Distribute Systems, vol. 2, n. 1, January 199.

Combining In-Transit Buffers with Optimized Routing Schemes to Boost the Performance of Networks with Source Routing?

Combining In-Transit Buffers with Optimized Routing Schemes to Boost the Performance of Networks with Source Routing? Combining In-Transit Buffers with Optimized Routing Schemes to Boost the Performance of Networks with Source Routing? J. Flich 1,P.López 1, M. P. Malumbres 1, J. Duato 1, and T. Rokicki 2 1 Dpto. Informática

More information

Deadlock-free Routing in InfiniBand TM through Destination Renaming Λ

Deadlock-free Routing in InfiniBand TM through Destination Renaming Λ Deadlock-free Routing in InfiniBand TM through Destination Renaming Λ P. López, J. Flich and J. Duato Dept. of Computing Engineering (DISCA) Universidad Politécnica de Valencia, Valencia, Spain plopez@gap.upv.es

More information

Combining In-Transit Buffers with Optimized Routing Schemes to Boost the Performance of Networks with Source Routing

Combining In-Transit Buffers with Optimized Routing Schemes to Boost the Performance of Networks with Source Routing Combining In-Transit Buffers with Optimized Routing Schemes to Boost the Performance of Networks with Source Routing Jose Flich 1,PedroLópez 1, Manuel. P. Malumbres 1, José Duato 1,andTomRokicki 2 1 Dpto.

More information

Performance Evaluation of a New Routing Strategy for Irregular Networks with Source Routing

Performance Evaluation of a New Routing Strategy for Irregular Networks with Source Routing Performance Evaluation of a New Routing Strategy for Irregular Networks with Source Routing J. Flich, M. P. Malumbres, P. López and J. Duato Dpto. Informática de Sistemas y Computadores Universidad Politécnica

More information

Removing the Latency Overhead of the ITB Mechanism in COWs with Source Routing Λ

Removing the Latency Overhead of the ITB Mechanism in COWs with Source Routing Λ Removing the Latency Overhead of the ITB Mechanism in COWs with Source Routing Λ J. Flich, M. P. Malumbres, P. López and J. Duato Dpto. of Computer Engineering (DISCA) Universidad Politécnica de Valencia

More information

A Simple and Efficient Mechanism to Prevent Saturation in Wormhole Networks Λ

A Simple and Efficient Mechanism to Prevent Saturation in Wormhole Networks Λ A Simple and Efficient Mechanism to Prevent Saturation in Wormhole Networks Λ E. Baydal, P. López and J. Duato Depto. Informática de Sistemas y Computadores Universidad Politécnica de Valencia, Camino

More information

Improving Network Performance by Reducing Network Contention in Source-Based COWs with a Low Path-Computation Overhead Λ

Improving Network Performance by Reducing Network Contention in Source-Based COWs with a Low Path-Computation Overhead Λ Improving Network Performance by Reducing Network Contention in Source-Based COWs with a Low Path-Computation Overhead Λ J. Flich, P. López, M. P. Malumbres, and J. Duato Dept. of Computer Engineering

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

In-Order Packet Delivery in Interconnection Networks using Adaptive Routing

In-Order Packet Delivery in Interconnection Networks using Adaptive Routing In-Order Packet Delivery in Interconnection Networks using Adaptive Routing J.C. Martínez, J. Flich, A. Robles, P. López, and J. Duato Dept. of Computer Engineering Universidad Politécnica de Valencia

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

A First Implementation of In-Transit Buffers on Myrinet GM Software Λ

A First Implementation of In-Transit Buffers on Myrinet GM Software Λ A First Implementation of In-Transit Buffers on Myrinet GM Software Λ S. Coll, J. Flich, M. P. Malumbres, P. López, J. Duato and F.J. Mora Universidad Politécnica de Valencia Camino de Vera, 14, 46071

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

A Multiple LID Routing Scheme for Fat-Tree-Based InfiniBand Networks

A Multiple LID Routing Scheme for Fat-Tree-Based InfiniBand Networks A Multiple LID Routing Scheme for Fat-Tree-Based InfiniBand Networks Xuan-Yi Lin, Yeh-Ching Chung, and Tai-Yi Huang Department of Computer Science National Tsing-Hua University, Hsinchu, Taiwan 00, ROC

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Boosting the Performance of Myrinet Networks

Boosting the Performance of Myrinet Networks IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. XX, NO. Y, MONTH 22 1 Boosting the Performance of Myrinet Networks J. Flich, P. López, M. P. Malumbres, and J. Duato Abstract Networks of workstations

More information

Deterministic versus Adaptive Routing in Fat-Trees

Deterministic versus Adaptive Routing in Fat-Trees Deterministic versus Adaptive Routing in Fat-Trees C. Gómez, F. Gilabert, M.E. Gómez, P. López and J. Duato Dept. of Computer Engineering Universidad Politécnica de Valencia Camino de Vera,, 07 Valencia,

More information

Dynamic Network Reconfiguration for Switch-based Networks

Dynamic Network Reconfiguration for Switch-based Networks Dynamic Network Reconfiguration for Switch-based Networks Ms. Deepti Metri 1, Prof. A. V. Mophare 2 1Student, Computer Science and Engineering, N. B. N. Sinhgad College of Engineering, Maharashtra, India

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 7, JULY Applying In-Transit Buffers to Boost the Performance of Networks with Source Routing

IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 7, JULY Applying In-Transit Buffers to Boost the Performance of Networks with Source Routing IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 7, JULY 2003 1 Applying In-Transit Buffers to Boost the Performance of Networks with Source Routing José Flich, Member, IEEE, Pedro López, Member, IEEE Computer

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

DUE to the increasing computing power of microprocessors

DUE to the increasing computing power of microprocessors IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 13, NO. 7, JULY 2002 693 Boosting the Performance of Myrinet Networks José Flich, Member, IEEE, Pedro López, M.P. Malumbres, Member, IEEE, and

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Optimal Topology for Distributed Shared-Memory. Multiprocessors: Hypercubes Again? Jose Duato and M.P. Malumbres

Optimal Topology for Distributed Shared-Memory. Multiprocessors: Hypercubes Again? Jose Duato and M.P. Malumbres Optimal Topology for Distributed Shared-Memory Multiprocessors: Hypercubes Again? Jose Duato and M.P. Malumbres Facultad de Informatica, Universidad Politecnica de Valencia P.O.B. 22012, 46071 - Valencia,

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

ACE: And/Or-parallel Copying-based Execution of Logic Programs

ACE: And/Or-parallel Copying-based Execution of Logic Programs ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Software-Based Deadlock Recovery Technique for True Fully Adaptive Routing in Wormhole Networks

Software-Based Deadlock Recovery Technique for True Fully Adaptive Routing in Wormhole Networks Software-Based Deadlock Recovery Technique for True Fully Adaptive Routing in Wormhole Networks J. M. Martínez, P. López, J. Duato T. M. Pinkston Facultad de Informática SMART Interconnects Group Universidad

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Congestion in InfiniBand Networks

Congestion in InfiniBand Networks Congestion in InfiniBand Networks Philip Williams Stanford University EE382C Abstract The InfiniBand Architecture (IBA) is a relatively new industry-standard networking technology suited for inter-processor

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment Comparison of Wireless Network Simulators with Multihop Wireless Network Testbe in Corrior Environment Rabiullah Khattak, Anna Chaltseva, Laurynas Riliskis, Ulf Boin, an Evgeny Osipov Department of Computer

More information

A New Proposal to Fill in the InfiniBand Arbitration Tables Λ

A New Proposal to Fill in the InfiniBand Arbitration Tables Λ A New Proposal to Fill in the InfiniBand Arbitration Tables Λ F. J. Alfaro, JoséL.Sánchez ept. de Informática Escuela Politécnica Superior Universidad de Castilla-La Mancha 071- Albacete, Spain ffalfaro,

More information

A Hierarchical P2PSIP Architecture to support Skype-like services

A Hierarchical P2PSIP Architecture to support Skype-like services A Hierarchical P2PSIP Architecture to support Skype-like services Isaias Martinez-Yelmo, Carmen Guerrero, Ruben Cuevas Departamento e Ingeniería Telemática Universia Carlos III e Mari Av. Universia 30.

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

A Framework for Dialogue Detection in Movies

A Framework for Dialogue Detection in Movies A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Two Dimensional-IP Routing

Two Dimensional-IP Routing Two Dimensional-IP Routing Mingwei Xu Shu Yang Dan Wang Hong Kong Polytechnic University Jianping Wu Abstract Traitional IP networks use single-path routing, an make forwaring ecisions base on estination

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

Design Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity

Design Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 10, OCTOBER 1997 1 Design Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity Te H. Szymanski, Member, IEEE

More information

Control of Scalable Wet SMA Actuator Arrays

Control of Scalable Wet SMA Actuator Arrays Proceeings of the 2005 IEEE International Conference on Robotics an Automation Barcelona, Spain, April 2005 Control of Scalable Wet SMA Actuator Arrays eslie Flemming orth Dakota State University Mechanical

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

PART 2. Organization Of An Operating System

PART 2. Organization Of An Operating System PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Waleed K. Al-Assadi. Anura P. Jayasumana. Yashwant K. Malaiya y. February Colorado State University

Waleed K. Al-Assadi. Anura P. Jayasumana. Yashwant K. Malaiya y. February Colorado State University Dierential I DDQ Testable Static RAM Architecture Walee K. Al-Assai Anura P. Jayasumana Yashwant K. Malaiya y Technical Report CS-96-102 February 1996 Department of Electrical Engineering/ y Department

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

36 IEEE POTENTIALS /07/$ IEEE

36 IEEE POTENTIALS /07/$ IEEE INTERCONNECTION NETWORKS ARE A KEY ELEMENT IN a wide variety of systems: massive parallel processors, local and system area networks, clusters of PCs and workstations, and Internet Protocol routers. They

More information

Clustering using Particle Swarm Optimization. Nuria Gómez Blas, Octavio López Tolic

Clustering using Particle Swarm Optimization. Nuria Gómez Blas, Octavio López Tolic 24 International Journal Information Theories an Applications, Vol. 23, Number 1, (c) 2016 Clustering using Particle Swarm Optimization Nuria Gómez Blas, Octavio López Tolic Abstract: Data clustering has

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

University of Castilla-La Mancha

University of Castilla-La Mancha University of Castilla-La Mancha A publication of the Department of Computer Science Evaluating the Effectiveness of Traffic Balancing Algorithms by J.E. Villalobos, J.L. Sánchez, J.A. Gámez, J.C. Sancho,

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,

More information

A Measurement Framework for Pin-Pointing Routing Changes

A Measurement Framework for Pin-Pointing Routing Changes A Measurement Framework for Pin-Pointing Routing Changes Renata Teixeira Univ. Calif. San Diego La Jolla, CA teixeira@cs.ucs.eu Jennifer Rexfor AT&T Labs Research Florham Park, NJ jrex@research.att.com

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services MODULE V Internetworking: Concepts, Aressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, An En-To-En Services Computer Networks an Internets -- Moule 5 1 Spring, 2014 Copyright

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Finite Automata Implementations Considering CPU Cache J. Holub

Finite Automata Implementations Considering CPU Cache J. Holub Finite Automata Implementations Consiering CPU Cache J. Holub The finite automata are mathematical moels for finite state systems. More general finite automaton is the noneterministic finite automaton

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

6.823 Computer System Architecture. Problem Set #3 Spring 2002

6.823 Computer System Architecture. Problem Set #3 Spring 2002 6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem

More information

University of Castilla-La Mancha

University of Castilla-La Mancha University of Castilla-La Mancha A publication of the Computing Systems Department Implementing the Advanced Switching Fabric Discovery Process by Antonio Robles-Gomez, Aurelio Bermúdez, Rafael Casado,

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Implementation and Evaluation of NAS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA

Implementation and Evaluation of NAS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA Implementation an Evaluation of AS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA Kazuya Matsumoto 1, orihisa Fujita 2, Toshihiro Hanawa 3, an Taisuke Boku 1,2 1 Center for Computational

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Detour Planning for Fast and Reliable Failure Recovery in SDN with OpenState

Detour Planning for Fast and Reliable Failure Recovery in SDN with OpenState Detour Planning for Fast an Reliable Failure Recovery in SDN with OpenState Antonio Capone, Carmelo Cascone, Alessanro Q.T. Nguyen, Brunile Sansò Dipartimento i Elettronica, Informazione e Bioingegneria,

More information

THE InfiniBand Architecture (IBA) [8], [14] is a new

THE InfiniBand Architecture (IBA) [8], [14] is a new IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 17, NO. 3, MARCH 2006 215 Fast Routing Computation on InfiniBand Networks Aurelio Bermúdez, Member, IEEE, Rafael Casado, Member, IEEE, Francisco

More information

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In

More information