184 J. Comput. Sci. & Technol., Mar. 2004, Vol.19, No.2 On the other hand, however, the probability of the above situations is very small: it should b

Size: px
Start display at page:

Download "184 J. Comput. Sci. & Technol., Mar. 2004, Vol.19, No.2 On the other hand, however, the probability of the above situations is very small: it should b"

Transcription

1 Mar. 2004, Vol.19, No.2, pp J. Comput. Sci. & Technol. On Fault Tolerance of 3-Dimensional Mesh Networks Gao-Cai Wang 1;2, Jian-Er Chen 1;3, and Guo-Jun Wang 1 1 College of Information Science and Engineering, Central South University, Changsha , P.R. China 2 School of Computer and Electrical Information, Guangxi University, Nanning , P.R. China 3 Department of Computer Science, Texas A&M University, U.S.A. wanggaocai@yahoo.com.cn Received May 15, 2003; revised August 29, Abstract In this paper, the concept of k-submesh and k-submesh connectivity fault tolerance model is proposed. And the fault tolerance of 3-D mesh networks is studied under a more realistic model in which each network node has an independent failure probability. It is first observed that if the node failure probability is fixed, then the connectivity probability of 3-D mesh networks can be arbitrarily small when the network size is sufficiently large. Thus, it is practically important formulticomputer system manufacturer to determine the upper bound for node failure probability when the probability of network connectivity and the network size are given. A novel technique is developed to formally derive lower bounds on the connectivity probability for 3-D mesh networks. The study shows that 3-D mesh networks of practical size can tolerate a large number of faulty nodes thus are reliable enough for multicomputer systems. A number of advantages of 3-D mesh networks over other popular network topologies are given. Compared to 2-D mesh networks, 3-D mesh networks are much stronger in tolerating faulty nodes, while for practical network size, the fault tolerance of 3-D mesh networks is comparable with that of hypercube networks but enjoys much lower node degree. Keywords 1 Introduction interconnection network, 3-D mesh network, fault tolerance, parallel processing With the size of computer networks increasing rapidly, dealing with networks with faulty components has become unavoidable. In particular, the problem of keeping all non-faulty nodes in a network connected and developing efficient and reliable routing algorithms in a network with faults has been extensively studied in the last two decades. In this paper, we will concentrate on the fault tolerance of 3-D mesh networks. Mesh networks are among the most important and popular interconnection network topologies for large multicomputer systems. The advantages of mesh networks include their simplicity, regularity and good scalability. A number of large research and commercial multicomputer systems have been built based on mesh topologies, including Illiac IV, Goodyear MPP, Intel Paragon, Intel Touchstone Delta, Stanford DASH, MIT Alewife, MasPar series, Tera Computer System, Cray T3D, and Blue Gene Supercomputer. In particular, Tera Computer System [1], Cray T3D [2], and Blue Gene Supercomputer in IBM Research [3] are based on 3-D meshes. Fault tolerance of mesh networks has been extensively studied. Some researches focused on how to design processor allocation schemes to find a subset of nodes of a given size in the mesh networks such that all nodes in the subset are nonfaulty [4 7]. It is also an interesting research topic to consider how to make the communication between non-faulty nodes available and efficient in a mesh network with faulty nodes [8 10]. There is an extensive research line that studies fault tolerant routing algorithms in mesh networks with faults (see, for example, [11 14]). We say that a network M with faulty nodes is disconnected (by faulty nodes) if there are nonfaulty nodes u and v in M such that no fault-free path from u to v can be found in M. Following the common definition [15], define the fault tolerance of a network to be the maximum number k such that any k faulty nodes in the network do not disconnect the network. According to this definition, the fault tolerance of mesh networks is very poor in the view of worst-case analysis: two faulty nodes in a 2-D mesh network and three faulty nodes in a 3-D mesh network are already sufficient to disconnect the networks. This trivial fact has made it uninteresting to consider the traditional worst-case analysis on mesh network fault tolerance. Λ Correspondence This research is supported in part by the National Natural Science Foundation of China for Distinguished Young Scholars under Grant No , the Major Research Plan of National Natural Science Foundation of China, Grant No , and by the National Science Foundation of USA under Grant No.CCR

2 184 J. Comput. Sci. & Technol., Mar. 2004, Vol.19, No.2 On the other hand, however, the probability of the above situations is very small: it should be very rare that the only two or three faulty nodes in a mesh network are just the neighbors of a corner node. It should be much more realistic to consider the mesh network fault tolerance based on a somehow uniform" fault distribution in the networks. The difficulty for this approach is that a mesh network may contain a large variety of connected subparts. Enumeration and characterization of these connected subparts can be very difficult. In this paper, we introduce new techniques to analyze the fault tolerance of 3-D mesh networks. We assume a realistic fault tolerance model in which each node in a 3-D mesh network has an independent failure probability, and study the probability of network connectivity in terms of node failure probability. We first observe that if the node failure probability is fixed, then the connectivity probability of 3-D mesh networks can be arbitrarily small when the network size is sufficiently large. Therefore, in order to keep a high connectivity probability for 3-D mesh networks of large size, the network node failure probability must be controlled. This then raises practically a very important problem for multicomputer system manufacture: suppose we need to build a multicomputer system based on a 3-D mesh network of given size, what probability for node failures we must achieve in order to satisfy a required probability for network connectivity? We have developed new techniques to deal with this problem. We first introduce the concept of k- submesh and k-submesh connectivity fault tolerance model, which divides a 3-D mesh network into ksubmeshes" and requires a special connectivity on each k-submesh (the precise definition will be given in Section 3). We prove that if all k-submeshes are connected in this sense, then the entire 3-D mesh network is connected. The advantage of this concept is that we reduce the difficult task of determining the connectivity of the entire large network to the easier task of determining the connectivity of much smaller submeshes. Now we calculate the probability of k-submesh connectivity for each k- submesh. Since the k-submeshes are small, this can be done either by a simple combinatorial analysis or by an exhaustive enumeration. From the probability of k-submesh connectivity, we will be able to derive lower bounds of the probability for the connectivity of the entire 3-D mesh network. From the above analysis, we will be able to derive upper bounds of the node failure probability when the size and the connectivity probability of a 3-D mesh network are given. Our results show that the 3-D mesh networks of practical size under this realistic fault model can actually tolerate a large number of faulty nodes. For example, we present formal proofs showing that as long as the node failure probability is bounded by 0:5%, a 3-D mesh network of up to a million nodes can remain connected with a probability larger than 99%. Our techniques also enable us to demonstrate a number of advantages of 3-D mesh networks over other popular network topologies. For example, compared with 2-D mesh networks, 3-D mesh networks are much stronger in tolerating faulty nodes, while for practical network size, the fault tolerance of 3-D mesh networks is comparable with that of hypercube networks but enjoys much lower node degree in the networks. 2 On Disconnectivity of 3-D Meshes In this paper, M m n q denotes the 3-D mesh network of size m n q with mnq nodes. Each node in M m n q is given by a coordinate triple (x; y; z), where 1 6 x 6 m, 1 6 y 6 n, and 1 6 z 6 q. To simplify our discussion, we assume without loss of generality that the values of m, n, and q are all divisible by k. Two nodes v = (x; y; z) and v 0 = (x 0 ;y 0 ;z 0 ) in M m n q are neighboring if jx x 0 j + jy y 0 j + jz z 0 j = 1, i.e., if v and v 0 are identical in two coordinates while the values for the other coordinate differ by 1. Definition 1. A k-submesh M k (or sometimes more specifically M (k) ) in the 3-D mesh network M m n q is determined by three integers a, b and c, 0 6 a < m=k, 0 6 b < n=k, and 0 6 c < q=k such that M (k) contains the following k3 nodes (x; y; z) in M m n q, where ak +16 x 6 (a +1)k, bk +16 y 6 (b +1)k, and ck +16 z 6 (c +1)k. We assume that each node in a 3-D mesh network fails independently with a probability p. We first show that when the node failure probability p is a fixed constant, then the probability that a 3-D mesh network is disconnected can be arbitrarily close to 1 when the network size is sufficiently large. Theorem 2. If the node failure probability p > 0 is a fixed constant, then the probability that the 3-D mesh network M m n q is disconnected can This model has been studied on the hypercube networks [16;17] and 2-D mesh networks [18].

3 Gao-Cai Wang et al.: On Fault Tolerance of 3-Dimensional Mesh Networks 185 be arbitrarily close to 1 when the network size mnq is sufficiently large. Proof. For a 3-submesh M 3 in M m n q, if the node v in the center of M 3 is non-faulty and all six neighbors of v are faulty, we call M 3 a bad 3- submesh. Obviously, a bad 3-submesh disconnects the center node from the rest of the mesh network. Since the nodes fail independently, the probability that a 3-submesh is bad is equal to p 6 (1 p). Since the 3-D mesh M m n q contains mnq=27 disjoint 3-submeshes and the node failure probability is independent, the probability that there is at least one bad 3-submesh in M m n q is at least 1 (1 p 6 (1 p)) mnq=27. Now the fact that p > 0 is a constant implies that 1 p 6 (1 p) < 1 is also a fixed constant. Thus, when mnq=27 (thus mnq) is sufficiently large, 1 (1 p 6 (1 p)) mnq=27 can be arbitrarily close to 1. Moreover, the probability that M m n q contains at least two non-faulty nodes can obviously be arbitrarily close to 1 when the mesh size mnq is sufficiently large. Now the conditions that M m n q contains at least one bad 3-submesh and that M m n q contains at least two non-faulty nodes imply immediately that M m n q is disconnected. That is, the probability that the 3-D mesh network M m n q is disconnected can be arbitrarily close to 1 when the network size mnq is sufficiently large. 2 Theorem 2 reveals that, in order to keep a high connectivity probability for 3-D mesh networks of large size, the network node failure probability must be controlled. To build a multicomputer system based on a 3-D mesh network of a given size, what probability for node failures we must achieve in order to satisfy a required probability for network connectivity? The rest of this paper will develop techniques to answer this question. 3 The k-submesh Connectivity According to the definition of k-submeshes, the 3-D mesh network M m n q can be divided into (m=k) (n=k) (q=k) k-submeshes. Two k- submeshes M (k) (k) and M a 0 ;b 0 ;c are neighboring if 0 ja a 0 j + jb b 0 j + jc c 0 j = 1. Each k-submesh M k is a 3-D mesh of size k k k. If we regard a k-submesh M k as a 3-D cube, then naturally, M k has six faces", each consisting of k 2 nodes. Definition 3. The 3-D mesh M m n q is k- submesh connected if for each k-submesh M k in M m n q, all non-faulty nodes in M k make a connected graph, and each face of M k has more than k 2 =2 non-faulty nodes. We have the following theorem. Theorem 4. The non-faulty nodes in a k- submesh connected 3-D mesh network M m n q make a connected graph. Proof. Suppose that the 3-D mesh network M m n q is k-submesh connected. We first prove that all non-faulty nodes in any two neighboring k-submeshes in M m n q are connected. Each face of a k-submesh has k 2 nodes, so k 2 pairs of neighboring nodes are formed at the two adjacent faces of two neighboring k-submeshes. According to the definition, more than k 2 =2 nodes on each face of each k-submesh are non-faulty, so one pair of non-faulty neighboring nodes must exist in the k 2 pairs of neighboring nodes on the adjacent faces of the two neighboring k-submeshes, which provides a bridge" from one k-submesh to the other k-submesh. Since the non-faulty nodes in each k- submesh are connected, we derive that all nonfaulty nodes in the two neighboring k-submeshes are connected. Now we prove that the non-faulty nodes in the k-submesh connected 3-D mesh M m n q make a connected graph. For this, we only need to show that for any two non-faulty nodes u and v in M m n q, there is a fault-free path between u and v. Assume that the node u lies in the k-submesh M (k) and the node v lies in the k- submesh M (k) a 0 ;b 0 ;c 0. Without loss of generality, we assume a 6 a 0, b 6 b 0, and c 6 c 0 (other cases can be proved similarly). We consider the following k- submesh sequence: M (k) ;M(k) a+1;b;c ;:::;M(k) a 0 ;b;c ;M(k) a 0 ;b+1;c ;:::; M (k) a 0 ;b 0 ;c ;M(k) a 0 ;b 0 ;c+1 ;:::;M(k) a 0 ;b 0 ;c 0 Any two consecutive k-submeshes in the above sequence are neighboring k-submeshes. As proved above, all non-faulty nodes in any two consecutive k-submeshes in the sequence are connected. In consequence, all non-faulty nodes in the above sequence are connected. Since the node u lies in the k-submesh M (k) while the node v lies in the k- submesh M (k) a 0 ;b 0 ;c, there must be a fault-free path 0 starting from u in the k-submesh M (k) and ending at v in the k-submesh M (k) a 0 ;b 0 ;c. 2 0 According to the definition, the k k k 3-D mesh M k k k is k-submesh connected if all nonfaulty nodes in M k k k are connected, and each face of M k k k has more than k 2 =2 non-faulty

4 186 J. Comput. Sci. & Technol., Mar. 2004, Vol.19, No.2 nodes. In particular, a 3-D mesh M m n q is k- submesh connected if and only if every k-submesh in M m n q is k-submesh connected. For the 3-D mesh M k k k, we define the following event: Event C(M k ): The 3-D mesh M k k k is k- submesh connected. Lemma 5. Suppose that the node failure probability is p, then the probability of the event C(M k ) is Pr[p; C(M k )] = Xk 3 i=0 N k;i (1 p) k3 i p i where N k;i is the the number of ways by which we remove i nodes from M k k k and the remaining graph is connected and each face of M k k k has more than k 2 =2 nodes left in the remaining graph. Proof. Fix i nodes in M k k k such that removal of these i nodes from M k k k leaves a connected graph and each face of M k k k has more than k 2 =2 nodes left. Note that the probability that exactly these i nodes are faulty while all other nodes are non-faulty is (1 p) k3 i p i (recall that M k k k has exactly k 3 nodes). Note that in this situation, the mesh M k k k is k-submesh connected. If we enumerate all these possible situations for all i = 0; 1;:::;k 3, and add the probabilities together, we get the probability that M k k k is k-submesh connected. By the assumption, there are N k;i ways to remove i nodes from M k k k while maintaining the conditions. Thus, the probability that M k k k is k-submesh connected is P k 3 i=0 N k;i(1 p) k3 i p i. 2 4 Fault Tolerance of 3-D Meshes Theorem 4 seems simple but in fact is very powerful for the following reason: each k-submesh M k has much fewer nodes than the original 3-D mesh network M m n q. Thus, analysis and discussion on each k-submesh are much easier than that for the original 3-D mesh network M m n q. On the other hand, Theorem 4 says that if every k-submesh is k-submesh connected, then the original 3-D mesh network M m n q is connected. Therefore, using Lemma 5 we can compute the probability of k- submesh connectivity for each k-submesh. Then by Theorem 4 and from the probability of k-submesh connectivity for each k-submesh, we will be able to derive a lower bound on the connectivity probability for the original 3-D mesh network M m n q. We implement this idea in the following theorem. Theorem 6. Suppose the node failure probability is p. Then the probability that the 3-D mesh network M m n q is connected is at least (Pr[p; C(M k )]) mnq=k3, where Pr[p; C(M k )] is given in Lemma 5. Proof. There are mnq=k 3 k-submeshes in the 3-D mesh M m n q. Since all k-submeshes in M m n q are disjoint and the nodes in M m n q fail independently, the probability that all k-submeshes in M m n q are k-submesh connected is equal to (Pr[p; C(M k )]) mnq=k3. Therefore, the probability that the 3-D mesh M m n q is k-submesh connected is equal to (Pr[p; C(M k )]) mnq=k3. Now by Theorem 4, k-submesh connectivity of M m n q implies that all non-faulty nodes in M m n q are connected, and we conclude that the probability that the 3-D mesh network M m n q is connected is at least (Pr[p; C(M k )]) mnq=k3. 2 To apply Theorem 6, we let k = 3 and consider the probability Pr[p; C(M 3 )]. The 3-D mesh M has 27 nodes. Note that the values N 3;i can be computed in a straightforward way: we pick every possible selection of i faulty nodes in the 3-D mesh M 3 3 3, and record the number of selections by which M is 3-submesh connected (i.e., the remaining nodes make a connected graph and each face of M has at least d3 2 =2e = 5 nodes left). This process can be easily programmed and executed by a computer. Thus, we wrote a computer program for this purpose that computed all values N 3;i. The computational results are summarized in the following lemma. Lemma 7. Suppose that the node failure probability is p, then the probability of the event C(M 3 ) is Pr[p;C(M 3)] = (1 p) p(1 p) p 2 (1 p) p 3 (1 p) p 4 (1 p) p 5 (1 p) p 6 (1 p) p 7 (1 p) p 8 (1 p) p 9 (1 p) p 10 (1 p) p 11 (1 p) p 12 (1 p) p 13 (1 p) p 14 (1 p) 13 +4p 15 (1 p) 12 Combining Theorem 6 and Lemma 7, for each node failure probability p, we can derive a lower bound (Pr[p; C(M 3 )]) mnq=27 for the connectivity probability for the 3-D mesh M m n q. Moreover, suppose we are given a requirement that the connectivity probability of the 3-D mesh M m n q be at least p 0. Then by letting p 0 6 (Pr[p; C(M 3 )]) mnq=27

5 Gao-Cai Wang et al.: On Fault Tolerance of 3-Dimensional Mesh Networks 187 we can derive an upper bound p on the node failure probability such that as long as the node failure probability p is bounded by p, the connectivity probability of the 3-D mesh M m n q is at least p 0. Note that all results are derived based on the above formal mathematical analysis. We apply the above method to 3-D mesh networks of different sizes. We obtain two groups of results: one is under the condition that the node failure probability is p = 1% and we compute the corresponding connectivity probability for the 3-D mesh networks; and the other is under the required connectivity probability p 0 = 99% for the networks, we compute the corresponding node failure probability p that meets the requirement for network connectivity probability. The results are given in Table 1. Table 1. Results Based on Pr[p; C(M 3 )] 3-D mesh #nodes connectivity prob :98% ; :95% ; :83% ; :61% ; :39% ; :71% (a) Network connectivity probability when node failure probability is p = 1%: 3-D mesh #nodes node failure prob :46% ; :63% ; :77% ; :89% ; :44% ; :32% (b) Node failure probability when network connectivity probability is p 0 = 99%. Table 1 provides us with the bounds that are mathematically proven when we consider 3-D mesh network connectivity. For example, from Table 1(a), we conclude that as long as the node failure probability is bounded by 1%, 3-D mesh networks of up to 46,656 nodes (e.g., the 3-D mesh network M ) remain connected with a probability larger than 98:5%. On the other hand, from Table 1(b), we can see, for example, that if we are building a 3-D mesh network M , and want to keep a probability of network connectivity of at least 99%, we only need to bound the individual node failure probability under 0:89%. For further larger 3-D mesh networks, such as M of around one million nodes, the results given in Table 1 are not very satisfying. For example, when the node failure probability p is equal to 1%, Table 1(a) can only claim a connectivity probability of 74:71%. We indicate that the bounds given in Table 1(a) are only lower bounds, which are based on 3-submesh connectivity. Thus, a more thorough analysis may further improve the bounds presented in Table 1. In the following, we describe a method to achieve such an improvement. It is intuitive to see that for two integers k and k 0 with k < k 0, the probability of k 0 -submesh connectivity is at least as large as the probability of k-submesh connectivity. In fact, it is easy to see that for any integer k, if the 3-D mesh network M m n q is k-submesh connected, then M m n q is also 2k-submesh connected. Note that by Theorem 4, the k-submesh connectivity of M m n q for any k would imply the connectivity of the mesh M m n q. Therefore, it is reasonable to consider the probability of k-submesh connectivity for k > 3, in order to improve the results given in Table 1. However, there is a technical challenge for this approach. Consider 5-submesh connectivity. The 3-D mesh M has nodes. In order to compute the values N 5;i for all i, 1 6 i 6, we need to enumerate all 2 ways of removing a subset of nodes from the 3-D mesh M 5 5 5, which would not be very feasible even using a computer program. Therefore, we need to develop new analyses and computational techniques to overcome the difficulties. In the following, we take 5-submesh connectivity as an example and propose a new technique to solve the problem. We observe that when the node failure probability p is small, the probability that the 3-D mesh M contains many faulty nodes is also very small, thus can be neglected in our discussion. This observation is formulated in the following lemma. Lemma 8. Suppose that the node failure probability is p, then the probability that any 5-submesh in the 3-D mesh M m n q contains more than h faulty nodes is bounded by (mnq=) h+1 ph+1. Proof. A 5-submesh has nodes. Thus, the probability that the 5-submesh contains more than h faulty nodes is equal to X p i (1 p) i i i=h+1 i=h+1 From Theorem C.2 of [19], we get X p i (1 p) 6 p i h+1 i h +1 Now since the 3-D mesh M m n q contains mnq= 5-submeshes, the probability that any

6 188 J. Comput. Sci. & Technol., Mar. 2004, Vol.19, No.2 of these 5-submeshes contains more than h faulty nodes is bounded by (mnq=) h+1 ph+1. 2 Corollary 9. Suppose that the node failure probability is p, then the probability that any 5-submesh in the 3-D mesh M m n q contains more than 7 faulty nodes is bounded by (mnq=) p8. 8 Therefore, as long as the value (mnq=) 8 p 8 is very small, we can neglect the cases in which there are more than 7 faulty nodes but concentrate on the cases where there are at most 7 faulty nodes in a 5-submesh M 5. Note that this will significantly reduce the number of enumerated cases. We define the following event: Event [C7(M 5 )]: The 5-submesh M 5 has at most 7 faulty nodes, and all non-faulty nodes in M 5 are connected. Note that event C7(M 5 ) implies event C(M 5 ). In fact, since each face of the 5-submesh M 5 has 5 2 = 25 nodes, if the total number of faulty nodes is bounded by 7, then automatically each face of M 5 has at least 13 non-faulty nodes. Lemma 10. Suppose that the node failure probability is p, then the probability of the event C7(M 5 ) is Pr[p; C7(M 5 )] = 7X i=0 N 5;i (1 p) i p i where N 5;i is the same as defined in Lemma 5, i.e., N 5;i is the number of ways by which we remove i nodes from M and the remaining graph is connected. Proof. The proof is similar to that of Lemma 5. Note that here the condition that each face has more than 5 2 =2 nodes is not required, because the condition is implied by the fact that M 5 has no more than 7 faulty nodes. 2 Now the computation becomes feasible and we have written a computer program to compute all the values N 5;i for 0 6 i 6 7. The computational results are given as follows. N 5;0 = 1 N 5;1 = N 5;2 = 7750 N 5;3 = N 5;4 = N 5;5 = N 5;6 = N 5;7 = : Since Pr[p; C7(M 5 )] 6 Pr[p; C(M 5 )], combining the above numerical data with Theorem 6, we get the following theorem. Theorem 11. Suppose that node failure probability is p, then the connectivity probability of the mesh network M m n q is at least (Pr[p; C7(M 5 )]) (mnq)=, where Pr[p;C7(M 5 )] = 7X i=0 N 5;i (1 p) i p i =(1 p) + p(1 p) p 2 (1 p) p 3 (1 p) p 4 (1 p) p 5 (1 p) p 6 (1 p) (1 p) 118 6Pr[p; C(M 5 )] = X i=0 N 5;i (1 p) i p i As we did in Table 1, we apply Theorem 11 to 3-D mesh networks of different sizes. We again obtain two groups of results: one is under the condition that the node failure probability is p = 1% and we compute the corresponding connectivity probability for the 3-D mesh networks; the other is under the required connectivity probability p 0 = 99% for the networks, we compute the corresponding node failure probability p that meets the requirement of network connectivity probability. The results are given in Table 2. Table 2. Results Based on Pr[p; C7(M 5 )] 3-D mesh #nodes connectivity prob ; :99% ; :96% ; :87% ; :38% ; :92% ; 000; :14% (a) Network connectivity probability when node failure probability is p = 1%. 3-D mesh #nodes node failure prob ; :50% ; :87% ; :57% ; :15% ; :77% ; 000; :56% (b) Node failure probability when network connectivity probability is p 0 = 99%. Compare Table 1 with Table 2, we observe that the results in Table 2 provide us with more precise information. For example, when the node failure probability is 1%, a 3-D mesh network of one million nodes (i.e., M ) remains connected with a probability larger than 95%, instead of the

7 Gao-Cai Wang et al.: On Fault Tolerance of 3-Dimensional Mesh Networks 189 probability 74:71% claimed in Table 1(a). Moreover, the data in Table 2 now seem to be sufficiently good and useful for practical multicomputer system manufacturing. For example, suppose we are building a multicomputer system based on 3-D meshes of up to one million nodes (e.g., the 3-D mesh M ). From Table 2(b), we are guaranteed that the network connectivity probability is 99% if we can control the node failure probability under 0:56%. Note that according to today's VLSI technology, building network nodes with failure probability under 0:5% is achievable. Thus, Table 2 provides formally proven and achievable bounds on node failure probability, in terms of the currently available technology. This shows the feasibility of building highly fault tolerant 3-D mesh networks of very large size. 5 Comparing 3-D Mesh with Other Networks 3-D mesh networks seem to have a number of advantages over other popular network topologies. In this section, we compare 3-D mesh networks with 2-D mesh networks and hypercube networks. Based on similar techniques, lower bounds have been derived on the network connectivity for 2-D mesh networks [18]. We set node failure probability p = 0:1%, and use the formula in [18] to compute the network connectivity for 2-D meshes of various sizes. The results are given in Table 3 (compare it with the table in Fig.3 in [18]). Table 3. Results for 2-D Meshes 2-D mesh #nodes connectivity prob ; :8% ; :4% ; :5% ; :4% 1; 001 1; 001 1; 002; :9% Network connectivity probability when node failure probability is p = 0:1%. Consider 2-D meshes and 3-D meshes of similar size, and compare the data in Table 2 and Table 3, we can see a significant difference between the power of fault tolerance of 2-D meshes and that of 3-D meshes. For example, consider mesh networks of around one million nodes, then with node failure probability p = 1%, the 3-D mesh network M can maintain a connectivity probability larger than 95%. On the other hand, in order to maintain the similar connectivity probability, the 2-D mesh network M of similar size requires that the node failure probability be bounded by 0:1%, a much tougher condition on the robustness of network nodes. In fact, using Theorem 11, we can verify that for the node failure probability 0:1%, the connectivity probability ofthe3-d mesh M is larger than 99:99%. We conclude that compared with 2-D mesh networks, 3-D mesh networks seem to be much stronger in tolerating faulty nodes. This result matches the intuition. Moreover, our discussion and conclusion are based on more precise and quantitative calculation and analysis. Now we compare 3-D mesh networks with the popular hypercube networks. Based on the results in [16], we set a probability 99% for the network connectivity, and calculate the required node failure probability for hypercube networks of various sizes. The results are given in Table 4. Compared with 3-D mesh networks of similar sizes, we can see that hypercube networks are stronger in tolerating faulty nodes while maintaining non-faulty nodes connected. However, the results seem to be comparable. For example, for a network of around one million nodes, in order to achieve a network connectivity probability 99%, the results in [16] requires the hypercube network (i.e., the 20-dimensional hypercube H 20 ) to keep the node failure probability bounded by 2:49% (see Table 4), while the results of the current paper requires a 3-D mesh network (e.g., the M mesh) to keep the node failure probability bounded by 0:56% (see Table 2(b)). Our impression is that having the node failure probability bounded by 0:5% is already quite achievable by today's technology. Thus, allowing much higher node failure probability seems not to be among the most critical issues in the current development of multicomputer systems. On the other hand, the 3-D mesh networks enjoy a much lower node degree compared with the hypercube networks: the node degree of a 3-D mesh network is always bounded by 6, while the large size hypercube networks such as the 20-dimensional hypercube H 20 would have a much higher node degree in the network. Table 4. Results for Hypercube hypercube degree #nodes node failure prob ; :71% ; :33% ; :28% ; 048; :49% Node failure probability when network connectivity probability is p 0 = 99%.

8 190 J. Comput. Sci. & Technol., Mar. 2004, Vol.19, No.2 6 Conclusions The mesh network is a very popular interconnection topology for multicomputer systems. Many research and commercial multicomputer systems have been built based on mesh networks of many thousands of processors. For this kind of multicomputer systems with a large number of nodes, fault tolerance is among the most important and interesting issues. In this paper, we have studied the fault tolerance of 3-D mesh networks under the probabilistic model in which each node has an independent failure probability. Our research provides formally proven results that show the possibility of building highly fault tolerant 3-D mesh networks of very large size. To the authors' knowledge, these are the first group of results for 3-D mesh network fault tolerance obtained by formal and thorough mathematical proofs. References [1] Alverson R. The Tera computer system. In Proc. Int. Conf. Supercomputing, 1990, pp.1 6. [2] Cray T3D System Architecture Overview. Technical Report, Cray Research Inc. HR-04033, March, [3] Allen F, Almasi G, Andreoni W et al. Blue Gene: A vision for protein science using a petaflop supercomputer. IBM Systems Journal, 2001, 40: [4] Chuang P, Tzeng N. Allocating precise submesh in mesh-connected systems. IEEE Trans. Parallel and Distributed Systems, 1994, 5(2): [5] Liu T, Huang W, Lombardi F et al. A submesh allocation scheme for mesh-connected multiprocessor systems. In Proc. Int. Conf. Parallel Processing II, 1995, pp [6] Chang C, Mohapatra P. An efficient method for approximating submesh reliability of two-dimensional meshes. IEEE Trans. Parallel and Distributed Systems, 1998, 9(11): [7] Yoo B, Das C. A fast and efficient processor allocation scheme for mesh-connected multicomputers. IEEE Trans. Computers, 2002, 51(1): [8] Almohammand B F A, Bose Bella. Fault-tolerant communication algorithms in toroidal networks. IEEE Trans. Parallel and Distributed Systems, 1999, 10(10): [9] Cang S, Wu J. Time-step optimal broadcasting in 3- D meshes with minimum total communication distance. Journal of Parallel and Distributed Computing, 2000, 60: [10] Wu J. A simple fault-tolerant adaptive and minimal routing approach in 3-D meshes. Journal of Computer Science and Technology, 2003, 18(1): [11] Boppana R, Chalasani S. Fault-tolerant wormhole routing algorithms for mesh networks. IEEE Trans. Computers, 1995, 44(7): [12] Chen C, Chiu G. A fault-tolerant routing scheme for meshes with nonconvex faults. IEEE Trans. Parallel and Distributed Systems, 2001, 12(5): [13] Kim S, Han T. Fault-tolerant wormhole routing in mesh with overlapped solid fault regions. Parallel Computing, 1997, 23: [14] Wu J, Chen X. Fault-tolerant tree-based multicasting in mesh multicomputers. Journal of Computer Science and Technology, 2001, 16(5): [15] Leighton F T. Introduction to Parallel Algorithms and Architectures: Arrays, Trees, Hypercubes. Morgan Kaufmann Publishers, San Mateo, CA, [16] Chen J, Kang I, Wang G. Hypercube network fault tolerance: A probabilistic approach. In Proc. Int. Conf. Parallel Processing (ICPP'2002), 2002, pp [17] Najjar W, Gaudiot J. Network resilience: A measure of network fault tolerance. IEEE Trans. Computers, 1990, 39(2): [18] Chen J, Wang T. Probabilistic analysis on mesh network fault tolerance. In Proc. 14th International Conference onparallel and Distributed Computing and Systems (PDCS'02), 2002, pp [19] Cormen T H, Leiserson C E, Rivest R L et al. Introduction to Algorithms. 2nd Ed., McGraw-Hill, Gao-Cai Wang received the M.S. degree in geographic information system from Central South University, China, in Currently, he is a Ph.D. candidate in the Department of Computer Science, College of Information Science and Engineering at Central South University. His research interests include computer networks, routing algorithms, computer fault tolerance. He has published more than 15 papers in these areas. Jian-Er Chen received the Ph.D. degree in computer science from the Courant Institute of Mathematical Science, New York University (NYU), in After graduation from NYU, he went to the Department of Mathematics at Columbia University, where he received the Ph.D. degree in mathematics in Since then, he has been with the Department of Computer Science at Texas A&M University, where he is currently a professor. He also holds a ChangJiang Scholar Professorship at Central South University, China. His research interests include computational complexity and optimization, graph theory and algorithms, parallel processing and networks, and computer graphics. He has published more than 100 papers in these areas. Guo-Jun Wang received the M.S. degree and Ph.D. degree in computer science from Central South University, China, in 1996 and 2002, respectively. Currently, he is an associate professor in the Department of Computer Science, College of Information Science and Engineering at Central South University. His research interests include computer networks, routing algorithms, computer fault tolerance, and software engineering. He has published more than 40 papers in these areas.

Computing Submesh Reliability in Two-Dimensional Meshes

Computing Submesh Reliability in Two-Dimensional Meshes Computing Submesh Reliability in Two-Dimensional Meshes Chung-yen Chang and Prasant Mohapatra Department of Electrical and Computer Engineering Iowa State University Ames, Iowa 511 E-mail: prasant@iastate.edu

More information

A Distributed Formation of Orthogonal Convex Polygons in Mesh-Connected Multicomputers

A Distributed Formation of Orthogonal Convex Polygons in Mesh-Connected Multicomputers A Distributed Formation of Orthogonal Convex Polygons in Mesh-Connected Multicomputers Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343 Abstract The

More information

Fault-Tolerant Routing Algorithm in Meshes with Solid Faults

Fault-Tolerant Routing Algorithm in Meshes with Solid Faults Fault-Tolerant Routing Algorithm in Meshes with Solid Faults Jong-Hoon Youn Bella Bose Seungjin Park Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science Oregon State University

More information

Fault-Tolerant Routing in Fault Blocks. Planarly Constructed. Dong Xiang, Jia-Guang Sun, Jie. and Krishnaiyan Thulasiraman. Abstract.

Fault-Tolerant Routing in Fault Blocks. Planarly Constructed. Dong Xiang, Jia-Guang Sun, Jie. and Krishnaiyan Thulasiraman. Abstract. Fault-Tolerant Routing in Fault Blocks Planarly Constructed Dong Xiang, Jia-Guang Sun, Jie and Krishnaiyan Thulasiraman Abstract A few faulty nodes can an n-dimensional mesh or torus network unsafe for

More information

Fault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults

Fault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults Fault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults Seungjin Park Jong-Hoon Youn Bella Bose Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science

More information

Node-Disjoint Paths in Hierarchical Hypercube Networks

Node-Disjoint Paths in Hierarchical Hypercube Networks Node-Disjoint aths in Hierarchical Hypercube Networks Ruei-Yu Wu 1,GerardJ.Chang 2,Gen-HueyChen 1 1 National Taiwan University 2 National Taiwan University Dept. of Computer Science and Information Engineering

More information

Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes and Tori

Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes and Tori The Computer Journal, 46(6, c British Computer Society 2003; all rights reserved Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes Tori KEQIN LI Department of Computer Science,

More information

Component Connectivity of Generalized Petersen Graphs

Component Connectivity of Generalized Petersen Graphs March 11, 01 International Journal of Computer Mathematics FeHa0 11 01 To appear in the International Journal of Computer Mathematics Vol. 00, No. 00, Month 01X, 1 1 Component Connectivity of Generalized

More information

A New Fault Information Model for Fault-Tolerant Adaptive and Minimal Routing in 3-D Meshes

A New Fault Information Model for Fault-Tolerant Adaptive and Minimal Routing in 3-D Meshes A New Fault Information Model for Fault-Tolerant Adaptive and Minimal Routing in 3-D Meshes hen Jiang Department of Computer Science Information Assurance Center West Chester University West Chester, PA

More information

Recursive Dual-Net: A New Universal Network for Supercomputers of the Next Generation

Recursive Dual-Net: A New Universal Network for Supercomputers of the Next Generation Recursive Dual-Net: A New Universal Network for Supercomputers of the Next Generation Yamin Li 1, Shietung Peng 1, and Wanming Chu 2 1 Department of Computer Science Hosei University Tokyo 184-8584 Japan

More information

Communication in Multicomputers with Nonconvex Faults

Communication in Multicomputers with Nonconvex Faults Communication in Multicomputers with Nonconvex Faults Suresh Chalasani Rajendra V. Boppana Technical Report : CS-96-12 October 1996 The University of Texas at San Antonio Division of Computer Science San

More information

Communication in Multicomputers with Nonconvex Faults?

Communication in Multicomputers with Nonconvex Faults? In Proceedings of EUROPAR 95 Communication in Multicomputers with Nonconvex Faults? Suresh Chalasani 1 and Rajendra V. Boppana 2 1 Dept. of ECE, University of Wisconsin-Madison, Madison, WI 53706-1691,

More information

The Transformation of Optimal Independent Spanning Trees in Hypercubes

The Transformation of Optimal Independent Spanning Trees in Hypercubes The Transformation of Optimal Independent Spanning Trees in Hypercubes Shyue-Ming Tang, Yu-Ting Li, and Yue-Li Wang Fu Hsing Kang School, National Defense University, Taipei, Taiwan, R.O.C. Department

More information

Adaptive Routing in Hexagonal Torus Interconnection Networks

Adaptive Routing in Hexagonal Torus Interconnection Networks Adaptive Routing in Hexagonal Torus Interconnection Networks Arash Shamaei and Bella Bose School of Electrical Engineering and Computer Science Oregon State University Corvallis, OR 97331 5501 Email: {shamaei,bose}@eecs.oregonstate.edu

More information

Hamiltonicity of The Graph G(n, k) of The Johnson Scheme

Hamiltonicity of The Graph G(n, k) of The Johnson Scheme Hans Riyono Ho Jurusan Sistem Informasi Fakultas Teknologi Informasi ~ Universitas Kristen Maranatha Jl. Prof. Drg. Suria Sumantri No. 65 Bandung 40164 Email: hans.rh@eng.maranatha.edu, hansriyonoho@yahoo.com

More information

Optimal Subcube Fault Tolerance in a Circuit-Switched Hypercube

Optimal Subcube Fault Tolerance in a Circuit-Switched Hypercube Optimal Subcube Fault Tolerance in a Circuit-Switched Hypercube Baback A. Izadi Dept. of Elect. Eng. Tech. DeV ry Institute of Technology Columbus, OH 43209 bai @devrycols.edu Fiisun ozgiiner Department

More information

Hyper-Butterfly Network: A Scalable Optimally Fault Tolerant Architecture

Hyper-Butterfly Network: A Scalable Optimally Fault Tolerant Architecture Hyper-Butterfly Network: A Scalable Optimally Fault Tolerant Architecture Wei Shi and Pradip K Srimani Department of Computer Science Colorado State University Ft. Collins, CO 80523 Abstract Bounded degree

More information

The Postal Network: A Versatile Interconnection Topology

The Postal Network: A Versatile Interconnection Topology The Postal Network: A Versatile Interconnection Topology Jie Wu Yuanyuan Yang Dept. of Computer Sci. and Eng. Dept. of Computer Science Florida Atlantic University University of Vermont Boca Raton, FL

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

Super Connectivity of Iterated Line Digraphs

Super Connectivity of Iterated Line Digraphs Super Connectivity of Iterated Line Digraphs Ding-Zhu Du Hung Q. Ngo Lu Ruan Jianhua Sun Abstract Many interconnection networks can be constructed with line digraph iterations. In this paper, we will establish

More information

Reliable Unicasting in Faulty Hypercubes Using Safety Levels

Reliable Unicasting in Faulty Hypercubes Using Safety Levels IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 2, FEBRUARY 997 24 Reliable Unicasting in Faulty Hypercubes Using Safety Levels Jie Wu, Senior Member, IEEE Abstract We propose a unicasting algorithm for faulty

More information

For example, in the widest-shortest path heuristic [8], a path of maximum bandwidth needs to be constructed from a structure S that contains all short

For example, in the widest-shortest path heuristic [8], a path of maximum bandwidth needs to be constructed from a structure S that contains all short A Note on Practical Construction of Maximum Bandwidth Paths Navneet Malpani and Jianer Chen Λ Department of Computer Science Texas A&M University College Station, TX 77843-3112 Abstract Constructing maximum

More information

All-port Total Exchange in Cartesian Product Networks

All-port Total Exchange in Cartesian Product Networks All-port Total Exchange in Cartesian Product Networks Vassilios V. Dimakopoulos Dept. of Computer Science, University of Ioannina P.O. Box 1186, GR-45110 Ioannina, Greece. Tel: +30-26510-98809, Fax: +30-26510-98890,

More information

The super connectivity of augmented cubes

The super connectivity of augmented cubes Information Processing Letters 106 (2008) 59 63 www.elsevier.com/locate/ipl The super connectivity of augmented cubes Meijie Ma a,, Guizhen Liu b, Jun-Ming Xu c a Department of Mathematics, Zhejiang Normal

More information

An Improved Upper Bound for the Sum-free Subset Constant

An Improved Upper Bound for the Sum-free Subset Constant 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 13 (2010), Article 10.8.3 An Improved Upper Bound for the Sum-free Subset Constant Mark Lewko Department of Mathematics University of Texas at Austin

More information

The Recursive Dual-net and its Applications

The Recursive Dual-net and its Applications The Recursive Dual-net and its Applications Yamin Li 1, Shietung Peng 1, and Wanming Chu 2 1 Department of Computer Science Hosei University Tokyo 184-8584 Japan {yamin, speng}@k.hosei.ac.jp 2 Department

More information

The Fibonacci hypercube

The Fibonacci hypercube AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 40 (2008), Pages 187 196 The Fibonacci hypercube Fred J. Rispoli Department of Mathematics and Computer Science Dowling College, Oakdale, NY 11769 U.S.A. Steven

More information

Data Communication and Parallel Computing on Twisted Hypercubes

Data Communication and Parallel Computing on Twisted Hypercubes Data Communication and Parallel Computing on Twisted Hypercubes E. Abuelrub, Department of Computer Science, Zarqa Private University, Jordan Abstract- Massively parallel distributed-memory architectures

More information

ON THE CONDITIONAL EDGE CONNECTIVITY OF ENHANCED HYPERCUBE NETWORKS

ON THE CONDITIONAL EDGE CONNECTIVITY OF ENHANCED HYPERCUBE NETWORKS Ann. of Appl. Math. 34:3(2018), 319-330 ON THE CONDITIONAL EDGE CONNECTIVITY OF ENHANCED HYPERCUBE NETWORKS Yanjuan Zhang, Hongmei Liu, Dan Jin (College of Science China Three Gorges University, Yichang

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information

A FAST AND EFFICIENT ISOMORPHIC TASK ALLOCATION SCHEME FOR K-ARY N-CUBE SYSTEMS

A FAST AND EFFICIENT ISOMORPHIC TASK ALLOCATION SCHEME FOR K-ARY N-CUBE SYSTEMS A FAST AND EFFICIENT ISOMORPHIC TASK ALLOCATION SCHEME FOR K-ARY N-CUBE SYSTEMS D.Doreen Hephzibah Miriam 1, T.Srinivasan 2 1 Postgraduate Student, Sri Venkateswara College Of Engineering 2 Assistant Professor,

More information

MANY experimental, and commercial multicomputers

MANY experimental, and commercial multicomputers 402 IEEE TRANSACTIONS ON RELIABILITY, VOL. 54, NO. 3, SEPTEMBER 2005 Optimal, and Reliable Communication in Hypercubes Using Extended Safety Vectors Jie Wu, Feng Gao, Zhongcheng Li, and Yinghua Min, Fellow,

More information

On Super and Restricted Connectivity of Some Interconnection Networks

On Super and Restricted Connectivity of Some Interconnection Networks On Super and Restricted Connectivity of Some Interconnection Networks Jun-Ming Xu Jian-Wei Wang Wei-Wei Wang Department of Mathematics University of Science and Technology of China Hefei, Anhui, 230026,

More information

Efficient Prefix Computation on Faulty Hypercubes

Efficient Prefix Computation on Faulty Hypercubes JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 1-21 (21) Efficient Prefix Computation on Faulty Hypercubes YU-WEI CHEN AND KUO-LIANG CHUNG + Department of Computer and Information Science Aletheia

More information

The strong chromatic number of a graph

The strong chromatic number of a graph The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same

More information

Constructions of hamiltonian graphs with bounded degree and diameter O(log n)

Constructions of hamiltonian graphs with bounded degree and diameter O(log n) Constructions of hamiltonian graphs with bounded degree and diameter O(log n) Aleksandar Ilić Faculty of Sciences and Mathematics, University of Niš, Serbia e-mail: aleksandari@gmail.com Dragan Stevanović

More information

Resource Deadlocks and Performance of Wormhole Multicast Routing Algorithms

Resource Deadlocks and Performance of Wormhole Multicast Routing Algorithms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 9, NO. 6, JUNE 1998 535 Resource Deadlocks and Performance of Wormhole Multicast Routing Algorithms Rajendra V. Boppana, Member, IEEE, Suresh

More information

The Connectivity and Diameter of Second Order Circuit Graphs of Matroids

The Connectivity and Diameter of Second Order Circuit Graphs of Matroids Graphs and Combinatorics (2012) 28:737 742 DOI 10.1007/s00373-011-1074-6 ORIGINAL PAPER The Connectivity and Diameter of Second Order Circuit Graphs of Matroids Jinquan Xu Ping Li Hong-Jian Lai Received:

More information

Embedding Large Complete Binary Trees in Hypercubes with Load Balancing

Embedding Large Complete Binary Trees in Hypercubes with Load Balancing JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING 35, 104 109 (1996) ARTICLE NO. 0073 Embedding Large Complete Binary Trees in Hypercubes with Load Balancing KEMAL EFE Center for Advanced Computer Studies,

More information

Department of Computer Science. a vertex can communicate with a particular neighbor. succeeds if it shares no edge with other calls during

Department of Computer Science. a vertex can communicate with a particular neighbor. succeeds if it shares no edge with other calls during Sparse Hypercube A Minimal k-line Broadcast Graph Satoshi Fujita Department of Electrical Engineering Hiroshima University Email: fujita@se.hiroshima-u.ac.jp Arthur M. Farley Department of Computer Science

More information

Discrete Wiskunde II. Lecture 6: Planar Graphs

Discrete Wiskunde II. Lecture 6: Planar Graphs , 2009 Lecture 6: Planar Graphs University of Twente m.uetz@utwente.nl wwwhome.math.utwente.nl/~uetzm/dw/ Planar Graphs Given an undirected graph (or multigraph) G = (V, E). A planar embedding of G is

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

ON THE EMPTY CONVEX PARTITION OF A FINITE SET IN THE PLANE**

ON THE EMPTY CONVEX PARTITION OF A FINITE SET IN THE PLANE** Chin. Ann. of Math. 23B:(2002),87-9. ON THE EMPTY CONVEX PARTITION OF A FINITE SET IN THE PLANE** XU Changqing* DING Ren* Abstract The authors discuss the partition of a finite set of points in the plane

More information

Combinatorial Problems on Strings with Applications to Protein Folding

Combinatorial Problems on Strings with Applications to Protein Folding Combinatorial Problems on Strings with Applications to Protein Folding Alantha Newman 1 and Matthias Ruhl 2 1 MIT Laboratory for Computer Science Cambridge, MA 02139 alantha@theory.lcs.mit.edu 2 IBM Almaden

More information

RESEARCH ON FAULT-TOLERANT ROUTING WITH HIGH SUCCESS PROBABILITY IN MESH INTERCONNECTION NETWORKS AND IMAGE

RESEARCH ON FAULT-TOLERANT ROUTING WITH HIGH SUCCESS PROBABILITY IN MESH INTERCONNECTION NETWORKS AND IMAGE RESEARCH ON FAULT-TOLERANT ROUTING WITH HIGH SUCCESS PROBABILITY IN MESH INTERCONNECTION NETWORKS AND IMAGE 1 WANG QI, 2 WANG ZILI 1 Department of Electrical Engineering, School of Normal, Beijing Union

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

MESH-CONNECTED multicomputers, especially those

MESH-CONNECTED multicomputers, especially those IEEE TRANSACTIONS ON RELIABILITY, VOL. 54, NO. 3, SEPTEMBER 2005 449 On Constructing the Minimum Orthogonal Convex Polygon for the Fault-Tolerant Routing in 2-D Faulty Meshes Jie Wu, Senior Member, IEEE,

More information

Fault-tolerant Routing for Irregular Faulty Patterns in 2D-Mesh without Virtual Channel

Fault-tolerant Routing for Irregular Faulty Patterns in 2D-Mesh without Virtual Channel 01 International Symposium on Pervasive Systems, Algorithms and Networks Fault-tolerant Routing for Irregular Faulty Patterns in D-Mesh without Virtual Channel Savio S.H. Tse, Jipeng Zhou, and Francis

More information

On the Parameterized Max-Leaf Problems: Digraphs and Undirected Graphs

On the Parameterized Max-Leaf Problems: Digraphs and Undirected Graphs On the Parameterized Max-Leaf Problems: Digraphs and Undirected Graphs Jianer Chen and Yang Liu Department of Computer Science Texas A&M University College Station, TX 77843, USA {chen,yangliu}@cs.tamu.edu

More information

PANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS

PANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS Discussiones Mathematicae Graph Theory xx (xxxx) 1 13 doi:10.7151/dmgt.2106 PANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS Vladislav Taranchuk Department of Mathematics and Statistics California State

More information

Minimizing Total Communication Distance of a Time-Step Optimal Broadcast in Mesh Networks

Minimizing Total Communication Distance of a Time-Step Optimal Broadcast in Mesh Networks Minimizing Total Communication Distance of a Time-Step Optimal Broadcast in Mesh Networs Songluan Cang and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton,

More information

Distance-Hereditary Embeddings of Circulant Graphs

Distance-Hereditary Embeddings of Circulant Graphs Distance-Hereditary Embeddings of Circulant Graphs Carmen Martínez, Ramón Beivide Universidad de Cantabria Dept. Electrónica y Computadores Los Castros s/n. 39005. Santander. Spain {carmenmf, mon}@atc.unican.es

More information

A Note on Vertex Arboricity of Toroidal Graphs without 7-Cycles 1

A Note on Vertex Arboricity of Toroidal Graphs without 7-Cycles 1 International Mathematical Forum, Vol. 11, 016, no. 14, 679-686 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.1988/imf.016.667 A Note on Vertex Arboricity of Toroidal Graphs without 7-Cycles 1 Haihui

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

On Constructing the Minimum Orthogonal Convex Polygon in 2-D Faulty Meshes

On Constructing the Minimum Orthogonal Convex Polygon in 2-D Faulty Meshes On Constructing the Minimum Orthogonal Convex Polygon in 2-D Faulty Meshes Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 E-mail: jie@cse.fau.edu

More information

Super Connectivity of Line Graphs and Digraphs

Super Connectivity of Line Graphs and Digraphs Acta Mathematicae Applicatae Sinica, English Series Vol. 22, No. 1 (2006) 43 48 Super Connectivity of Line Graphs and Digraphs Min Lü 1, Jun-Ming Xu 2 1 Department of Computer Science and Technology, University

More information

ON THE SUM OF THE SQUARES OF ALL DISTANCES IN SOME GRAPHS

ON THE SUM OF THE SQUARES OF ALL DISTANCES IN SOME GRAPHS ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS N. 38 017 (137 144) 137 ON THE SUM OF THE SQUARES OF ALL DISTANCES IN SOME GRAPHS Xianya Geng Zhixiang Yin Xianwen Fang Department of Mathematics and Physics

More information

Cache-Oblivious Traversals of an Array s Pairs

Cache-Oblivious Traversals of an Array s Pairs Cache-Oblivious Traversals of an Array s Pairs Tobias Johnson May 7, 2007 Abstract Cache-obliviousness is a concept first introduced by Frigo et al. in [1]. We follow their model and develop a cache-oblivious

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 10

CPSC 536N: Randomized Algorithms Term 2. Lecture 10 CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very

More information

VERY large scale integration (VLSI) design for power

VERY large scale integration (VLSI) design for power IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 7, NO. 1, MARCH 1999 25 Short Papers Segmented Bus Design for Low-Power Systems J. Y. Chen, W. B. Jone, Member, IEEE, J. S. Wang,

More information

Acyclic Subgraphs of Planar Digraphs

Acyclic Subgraphs of Planar Digraphs Acyclic Subgraphs of Planar Digraphs Noah Golowich Research Science Institute Department of Mathematics Massachusetts Institute of Technology Cambridge, Massachusetts, U.S.A. ngolowich@college.harvard.edu

More information

An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem

An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem An Optimal Algorithm for the Euclidean Bottleneck Full Steiner Tree Problem Ahmad Biniaz Anil Maheshwari Michiel Smid September 30, 2013 Abstract Let P and S be two disjoint sets of n and m points in the

More information

Multicasting in the Hypercube, Chord and Binomial Graphs

Multicasting in the Hypercube, Chord and Binomial Graphs Multicasting in the Hypercube, Chord and Binomial Graphs Christopher C. Cipriano and Teofilo F. Gonzalez Department of Computer Science University of California, Santa Barbara, CA, 93106 E-mail: {ccc,teo}@cs.ucsb.edu

More information

Component connectivity of crossed cubes

Component connectivity of crossed cubes Component connectivity of crossed cubes School of Applied Mathematics Xiamen University of Technology Xiamen Fujian 361024 P.R.China ltguo2012@126.com Abstract: Let G = (V, E) be a connected graph. A r-component

More information

FOUR EDGE-INDEPENDENT SPANNING TREES 1

FOUR EDGE-INDEPENDENT SPANNING TREES 1 FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem

More information

Restricted edge connectivity and restricted connectivity of graphs

Restricted edge connectivity and restricted connectivity of graphs Restricted edge connectivity and restricted connectivity of graphs Litao Guo School of Applied Mathematics Xiamen University of Technology Xiamen Fujian 361024 P.R.China ltguo2012@126.com Xiaofeng Guo

More information

AVALANCHE: A NETWORK CODING ANALYSIS

AVALANCHE: A NETWORK CODING ANALYSIS COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application

More information

Properly Colored Paths and Cycles in Complete Graphs

Properly Colored Paths and Cycles in Complete Graphs 011 ¼ 9 È È 15 ± 3 ¾ Sept., 011 Operations Research Transactions Vol.15 No.3 Properly Colored Paths and Cycles in Complete Graphs Wang Guanghui 1 ZHOU Shan Abstract Let K c n denote a complete graph on

More information

On the Complexity of Broadcast Scheduling. Problem

On the Complexity of Broadcast Scheduling. Problem On the Complexity of Broadcast Scheduling Problem Sergiy Butenko, Clayton Commander and Panos Pardalos Abstract In this paper, a broadcast scheduling problem (BSP) in a time division multiple access (TDMA)

More information

Adaptive Multimodule Routers

Adaptive Multimodule Routers daptive Multimodule Routers Rajendra V Boppana Computer Science Division The Univ of Texas at San ntonio San ntonio, TX 78249-0667 boppana@csutsaedu Suresh Chalasani ECE Department University of Wisconsin-Madison

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

NP-completeness of generalized multi-skolem sequences

NP-completeness of generalized multi-skolem sequences Discrete Applied Mathematics 155 (2007) 2061 2068 www.elsevier.com/locate/dam NP-completeness of generalized multi-skolem sequences Gustav Nordh 1 Department of Computer and Information Science, Linköpings

More information

Diversity Coloring for Distributed Storage in Mobile Networks

Diversity Coloring for Distributed Storage in Mobile Networks Diversity Coloring for Distributed Storage in Mobile Networks Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Abstract: Storing multiple copies of files is crucial for ensuring

More information

General Models for Optimum Arbitrary-Dimension FPGA Switch Box Designs

General Models for Optimum Arbitrary-Dimension FPGA Switch Box Designs General Models for Optimum Arbitrary-Dimension FPGA Switch Box Designs Hongbing Fan Dept. of omputer Science University of Victoria Victoria B anada V8W P6 Jiping Liu Dept. of Math. & omp. Sci. University

More information

An Algorithm for k-pairwise Cluster-fault-tolerant Disjoint Paths in a Burnt Pancake Graph

An Algorithm for k-pairwise Cluster-fault-tolerant Disjoint Paths in a Burnt Pancake Graph 2015 International Conference on Computational Science and Computational Intelligence An Algorithm for k-pairwise Cluster-fault-tolerant Disjoint Paths in a Burnt Pancake Graph Masato Tokuda, Yuki Hirai,

More information

Number Theory and Graph Theory

Number Theory and Graph Theory 1 Number Theory and Graph Theory Chapter 6 Basic concepts and definitions of graph theory By A. Satyanarayana Reddy Department of Mathematics Shiv Nadar University Uttar Pradesh, India E-mail: satya8118@gmail.com

More information

SPERNER S LEMMA MOOR XU

SPERNER S LEMMA MOOR XU SPERNER S LEMMA MOOR XU Abstract. Is it possible to dissect a square into an odd number of triangles of equal area? This question was first answered by Paul Monsky in 970, and the solution requires elements

More information

A New Combinatorial Design of Coded Distributed Computing

A New Combinatorial Design of Coded Distributed Computing A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA

More information

(i,j,k) North. Back (0,0,0) West (0,0,0) 01. East. Z Front. South. (a) (b)

(i,j,k) North. Back (0,0,0) West (0,0,0) 01. East. Z Front. South. (a) (b) A Simple Fault-Tolerant Adaptive and Minimal Routing Approach in 3-D Meshes y Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Abstract In this paper

More information

Discrete Applied Mathematics. A revision and extension of results on 4-regular, 4-connected, claw-free graphs

Discrete Applied Mathematics. A revision and extension of results on 4-regular, 4-connected, claw-free graphs Discrete Applied Mathematics 159 (2011) 1225 1230 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam A revision and extension of results

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

REDUCING GRAPH COLORING TO CLIQUE SEARCH

REDUCING GRAPH COLORING TO CLIQUE SEARCH Asia Pacific Journal of Mathematics, Vol. 3, No. 1 (2016), 64-85 ISSN 2357-2205 REDUCING GRAPH COLORING TO CLIQUE SEARCH SÁNDOR SZABÓ AND BOGDÁN ZAVÁLNIJ Institute of Mathematics and Informatics, University

More information

Interleaving Schemes on Circulant Graphs with Two Offsets

Interleaving Schemes on Circulant Graphs with Two Offsets Interleaving Schemes on Circulant raphs with Two Offsets Aleksandrs Slivkins Department of Computer Science Cornell University Ithaca, NY 14853 slivkins@cs.cornell.edu Jehoshua Bruck Department of Electrical

More information

Connectivity, Graph Minors, and Subgraph Multiplicity

Connectivity, Graph Minors, and Subgraph Multiplicity Connectivity, Graph Minors, and Subgraph Multiplicity David Eppstein Department of Information and Computer Science University of California, Irvine, CA 92717 Tech. Report 92-06 January 10, 1992 Abstract

More information

THE INSULATION SEQUENCE OF A GRAPH

THE INSULATION SEQUENCE OF A GRAPH THE INSULATION SEQUENCE OF A GRAPH ELENA GRIGORESCU Abstract. In a graph G, a k-insulated set S is a subset of the vertices of G such that every vertex in S is adjacent to at most k vertices in S, and

More information

GRAPHS WITH 1-FACTORS

GRAPHS WITH 1-FACTORS proceedings of the american mathematical society Volume 42, Number 1, January 1974 GRAPHS WITH 1-FACTORS DAVID P. SUMNER Abstract. In this paper it is shown that if G is a connected graph of order 2n (n>

More information

EULER S FORMULA AND THE FIVE COLOR THEOREM

EULER S FORMULA AND THE FIVE COLOR THEOREM EULER S FORMULA AND THE FIVE COLOR THEOREM MIN JAE SONG Abstract. In this paper, we will define the necessary concepts to formulate map coloring problems. Then, we will prove Euler s formula and apply

More information

On Request-Partitioning-Based Processor Allocation in Two-Dimensional Mesh-based Multicomputers Sulieman Bani Ahmad

On Request-Partitioning-Based Processor Allocation in Two-Dimensional Mesh-based Multicomputers Sulieman Bani Ahmad On Request-Partitioning-Based Processor Allocation in Two-Dimensional Mesh-based Multicomputers Sulieman Bani Ahmad Department of Information Technology. Al Balqa Applied University. Jordan sulieman@bau.edu.jo

More information

Deduction and Logic Implementation of the Fractal Scan Algorithm

Deduction and Logic Implementation of the Fractal Scan Algorithm Deduction and Logic Implementation of the Fractal Scan Algorithm Zhangjin Chen, Feng Ran, Zheming Jin Microelectronic R&D center, Shanghai University Shanghai, China and Meihua Xu School of Mechatronical

More information

Approximation Algorithms for Wavelength Assignment

Approximation Algorithms for Wavelength Assignment Approximation Algorithms for Wavelength Assignment Vijay Kumar Atri Rudra Abstract Winkler and Zhang introduced the FIBER MINIMIZATION problem in [3]. They showed that the problem is NP-complete but left

More information

Super connectivity of line graphs

Super connectivity of line graphs Information Processing Letters 94 (2005) 191 195 www.elsevier.com/locate/ipl Super connectivity of line graphs Jun-Ming Xu a,,minlü a, Meijie Ma a, Angelika Hellwig b a Department of Mathematics, University

More information

VISUALIZING NP-COMPLETENESS THROUGH CIRCUIT-BASED WIDGETS

VISUALIZING NP-COMPLETENESS THROUGH CIRCUIT-BASED WIDGETS University of Portland Pilot Scholars Engineering Faculty Publications and Presentations Shiley School of Engineering 2016 VISUALIZING NP-COMPLETENESS THROUGH CIRCUIT-BASED WIDGETS Steven R. Vegdahl University

More information

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1

More information

The Geometry of Carpentry and Joinery

The Geometry of Carpentry and Joinery The Geometry of Carpentry and Joinery Pat Morin and Jason Morrison School of Computer Science, Carleton University, 115 Colonel By Drive Ottawa, Ontario, CANADA K1S 5B6 Abstract In this paper we propose

More information

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PAUL BALISTER Abstract It has been shown [Balister, 2001] that if n is odd and m 1,, m t are integers with m i 3 and t i=1 m i = E(K n) then K n can be decomposed

More information

Analysis and Comparison of Torus Embedded Hypercube Scalable Interconnection Network for Parallel Architecture

Analysis and Comparison of Torus Embedded Hypercube Scalable Interconnection Network for Parallel Architecture 242 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.1, January 2009 Analysis and Comparison of Torus Embedded Hypercube Scalable Interconnection Network for Parallel Architecture

More information

Spanning tree congestion critical graphs

Spanning tree congestion critical graphs Spanning tree congestion critical graphs Daniel Tanner August 24, 2007 Abstract The linear or cyclic cutwidth of a graph G is the minimum congestion when G is embedded into either a path or a cycle respectively.

More information

Simultaneous Diagonal Flips in Plane Triangulations

Simultaneous Diagonal Flips in Plane Triangulations @ _ d j 5 6 5 6 Simultaneous Diagonal Flips in Plane Triangulations Prosenjit Bose Jurek Czyzowicz Zhicheng Gao Pat Morin David R. Wood Abstract Simultaneous diagonal flips in plane triangulations are

More information