Modeling a shared medium access node with QoS distinction

Size: px
Start display at page:

Download "Modeling a shared medium access node with QoS distinction"

Transcription

1 Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland {gies,geutet}@tik.ee.ethz.ch TIK-Repot No. 86 Mach 30, 2000 Abstact This epot descibes a high-level design space exploation fo the implementation of an IP ove ATM shaed-medium access node with Quality of Sevice (QoS) distinction and outing functionality. The diffeent blocks of the achitectue ae modeled with diffeent optimization citeia in mind. The models povide thoughput, delay, costs, and memoy space wost-case bounds depending on a vaiety of paametes and implementation altenatives. We then eveal diffeent optimal designs fo the main memoy system of the access node and point out the hot spots of the achitectue and implementation. As a esult, a node suppoting a 155 Mbit line ate, a state of the at fai queuing schedule with up to 2 13 concuent connections, a buffe fo at least 2 15 packets, and a backbone oute with up to outing enties can be implemented using a single modeately clocked geneal pupose CPU coe with two memoy buses and fou to eight memoy chips. The esouces show a wost-case utilization of 75 % in tems of latency, so that thee is oom fo futhe building blocks and highe line ates. 1

2 Contents 1 System oveview 3 2 Memoy Model Model fo a single chip with bank inteleave Seveal chips foming a wide memoy bus Wide memoy bus with seveal modules Seveal sepaate memoy buses Memoy model paametes deived fom simulations Common paametes fo the building blocks of the access node 8 4 The wheel faming mechanism Requiements fo the fame stoage Requiements fo detemining the destination queue Example Destination queues and IP-ATM heade convesion Requiements of the destination queues Requiements of the heade convesion Example Packet schedule Fixed Pioity schedule WFQ schedule WFQ appoximation MD-SCFQ IP payload - IP heade split and stoage Payload and addess queue RAM Example VPI/VCI lookup fo cell emoval fom line VPI/VCI lookup Example ATM payload-heade split ATM cell split and stoage Reassembly Reassembly queues Example Enhanced IP oute IP oute/ fowading stage Example Design space exploation of the memoy subsystem Conclusion 38 2

3 1 System oveview The modeled netwok access node is pat of a netwok which uses a line topology (see Fig. 1). ATM connections ae established fo bundles of IP flows with the same souce and destination node on the line. Thus, the ATM line foms a tanspaent backbone fo IP flows. Incoming UBR taffic is always taken out fom the line at the input of a node and fed in the ATM taffic at the output of a node, povided that the node is not the destination of the UBR taffic. All othe kinds of taffic can pass though an ATM node on a diect data path with highest pioity to minimize the latency intoduced by the node fo line taffic. The line access abitation is implemented with a fame slot esevation scheme. In ode to keep the management easonably simple as well as access latencies shot, the numbe of slots and the fame length ae fixed. That is, a 100 % usage of the line with non-ubr taffic can only be achieved using paticula ates. Fo an abitay flow ate, line bandwidth must be ovebooked educing the usage of the line. Howeve, a 100 % usage of the line can still be eached by stuffing unused bandwidth with UBR taffic at the line access level. line segments ATM nodes ATM line bundled flows fo the same destination node IP-based souce and destination devices Figue 1: System oveview. The inne achitectue of a line node is displayed in Fig. 2. IP flows ae classified, outed, and scheduled on a packet basis. The ATM cell segmentation is pefomed aftewads. Fo each destination node thee is a schedule which bundles IP flows accoding to eithe fixed pioity o individual QoS classes. The modeled achitectue only consides components fo a static netwok scenaio, i.e., ATM connections ae established and fame slots have been assigned to connections. The models in paticula undepin the influence of the main memoy. Theefoe, models fo ecent RAM technologies (SDRAM, RDRAM, SRAM) have also been taken into account. Modeling methodology The chaacteistics of the building blocks of the access node, such as memoy space and memoy thoughput equiements, calculations, and intoduced delay have been detemined by the analysis of suitable algoithms. The following assumptions have been made: only aithmetic opeations have been counted, no banch o loop instuctions have been counted. Instuctions ae found in on-chip cache memoy and thus do not geneate additional delay due to fetching. Moeove, allocation and deallocation of memoy segments only need one futhe opeation. Since only memoy segments of fixed size ae equied, the fee memoy list can be implemented by a linked list togethe with distinct memoy aeas fo the list and the memoy segments. Moeove, memoy fagmentation does not affect system pefomance. In this configuation, only a couple of additional egistes ae equied to keep tack of the FILO-oganized 3

4 IP packets: souce add. dest. add. FIFO queue pe flow ATM cells + add. info: dest. physical pot IP flow id IP output... physical pots physical pots... IP flows eassembly flow split (48 byte ganulaity) addess queue payload DRAM (48 byte payload) (update) UBR taffic IP input IP flows enhanced IP oute IP payload - IP heade split and packet stoage (WFQ tag calculation if WFQ-type schedule used)... IP packet vitually stoed as linked list of 48 Byte units (= ATM payload) one FIFO queue pe flow, gouped pe dest. node IP packets: souce add. dest. add. IP packets + additional info: destination node on line QoS/context info fo flow VPI/VCI additional info: destination node on line QoS/context info fo flow payload stating addess VPI/VCI additional info: scheduling tag payload stating addess QoS/context info fo flow VPI/VCI packet packet packet schedule schedule schedule one schedule pe destination node to contol / management plane ATM payload - heade split and payload stoage ATM cells UBR taffic ATM heade geneation flow id -> VPI/VCI (seveal cells)... an IP packet is mapped onto seveal ATM cells one FIFO queue pe dest. node additional info: payload add. VPI/VCI ATM cell heades payload add. OAM / CAC cells fom contol / management plane OAM / CAC cells assigned fame slots "wheel" (destination eached) (UBR, othe destination) ATM cells ATM line in VPI/VCI lookup (othe destination, non-ubr taffic) ATM cells ATM line out Figue 2: ATM node achitectue: IP laye + ATM Plane / ATM Laye. fee list. The delay analysis consides thee kinds of easons: delay intoduced by memoy accesses, by calculations, and by algoithm chaacteistics such as pioity invesion if packet scheduling is pefomed. In the wost-case, data dependencies pevent the concuent execution of calculations and memoy accesses. Theefoe, the delay bounds fo the thee cases have been added. In the given examples, two diffeent memoy configuations have been investigated: an SDRAM unning at 100 MHz with an aveage access ovehead of fou cycles and an SRAM unning at 166 MHz with two cycles access ovehead. Both memoy subsystems use a 32 bit data bus. Finally, the thoughput analysis shows whethe the chosen memoy technology is suitable fo the coesponding task. The ecipocal of the delay bound divided by the size of an ATM cell (IP packet espectively) should be less than the ate that has to be suppoted. Othewise, the system can be oveloaded. The esults of this epot can thus be used to estimate the impact of a vaiety of paametes such as ATM ate, numbe of connections, packet sizes, etc. on the equiements of the memoy subsystem and the needed computing powe without the help of any special hadwae functional units. The analysis can be pefomed independently fo the building blocks of the node, e.g. fo a pipelined implementation of the system by a chain of pocesso modules. The case study in this epot howeve shaes a single 4

5 pocesso module in ode to implement all building blocks of the access node. This epot is oganized as follows: in the next section, diffeent main memoy models ae developed taking simulations of eal-wold applications into account. Section 3 summaizes the common modeling paametes used in the succeeding sections. Sections 4 to 11 descibe the models fo the diffeent building blocks of the access node. Each of these sections povides examples fo typical system settings. Section 12 finally shows optimal configuations of the main memoy system in tems of costs and latency fo an access node consideing the models of the peceding sections. Section 13 concludes the epot. 2 Memoy Model The models fo main memoy accesses deived in this section ae used in subsequent sections fo the detemination of ealistic thoughput and delay bounds fo the building blocks of the access node. Nomenclatue g [bit] ganulaity of data, i.e., smallest amount of data to be accessed and tansfeed by a bust f [MHz] clock fequency of the memoy bus cap [bit] capacity of a single memoy chip db [bit] data bus width of the memoy chip b numbe of memoy banks within a chip gd [bit] size of the data stuctue to be stoed c [$] costs pe chip bb [bit] width of the memoy bus cmc [$] costs of the memoy contolle m numbe of memoy modules bc numbe of independent memoy buses ov [cycles] ovehead fo pocessing a ead o wite equest dependent on memoy type, e.g, an SDRAM may need up to six exta clock cycles fo pepaing a bust tansfe. ps [bit] Rambus RAM specific paamete: size of a data packet Simplifications no distinction between ead and wite accesses and no consideation of the intenal state of the RAM. That is, all tansfes need the same latency. efesh cycles ae ignoed. the smallest amount of data to be accessed fits in a memoy ow. an ideal inteleave of memoy banks and modules is assumed. In eality, data dependencies usually pevent this behavio (see subsec. 2.5). 2.1 Model fo a single chip with bank inteleave A single memoy tansfe without inteleaving is shown in Fig. 3 a). The SDRAM needs g db clock cycles fo the tansfe of the data. Moeove, ov cycles must be spent fo pepaing the tansfe. Thus, a single bust tansfe needs ov + g db cycles fo completion. Howeve, the ov cycles can be hidden if moe than one memoy bank is available within the chip. Fig. 3 b) shows two tansfes using two memoy banks hiding some of the ovehead cycles. Finally, if enough memoy banks ae available, the ovehead cycles can be hidden completely as shown in Fig. 3 c). 5

6 ov g db a) single tansfe b) two banks available c) fou banks available clock cycles Figue 3: Memoy bank inteleave using an SDRAM. thoughput th: Paamete SDRAM RDRAM a) SRAM X g db g ps ps db 2 g db a) The RDRAM uses both edges of the clock. th = #bits tansfeed cycles needed = b g max (b X, ov + X) 1 f (1) costs: gd c + cmc cap 2.2 Seveal chips foming a wide memoy bus In this model, seveal memoy chips fom a wide memoy bus. All chips ae contolled by the same signals. Fo instance, using a single SIMM o DIMM memoy module is an example fo this configuation. RDRAMs ae usually not used in this configuation. thoughput th fo SDRAMs / SRAMs: th = b g max ( b g bb,ov+ g bb ) 1 f (2) costs: gd bb db cap bb db c + cmc 2.3 Wide memoy bus with seveal modules In this model, seveal memoy chips fom a wide memoy bus. All chips ae contolled by the same signals. Seveal memoy modules can be contolled concuently shaing the same memoy bus. Using 6

7 seveal SIMMs o DIMMs on a single memoy bus is an example fo this configuation when using SDRAMs o SRAMs. Fo RDRAMs (bb = db), seveal memoy chips ae contolled concuently using the same bus. The numbe of needed memoy modules can be detemined fom the size of the data stuctue gd o be given by the paamete m to enfoce a highe degee of paallelism. Basically, inceasing the numbe of memoy modules povides moe individual banks in this model. thoughput th: Paamete SDRAM RDRAM a) SRAM X g bb g ps ps db 2 g bb a) The RDRAM uses both edges of the clock and bb = db. th = ( max m, ( max gd bb db cap ) gd cap bb b g db ) b X, m b X, ov + X 1 f (3) costs: ( gd max bb db cap ),m bb c + cmc (4) db 2.4 Seveal sepaate memoy buses Using seveal memoy buses concuently simply means multiplying the cost and thoughput measues in subsection 2.3 by the numbe of buses bc. Note that a sepaate memoy contolle is needed fo each bus. 2.5 Memoy model paametes deived fom simulations In this subsection, aveage values fo the memoy access ovehead (ov) and the influence of bank inteleaving ae detemined. Simulations descibed in [13] have shown that the speedup of the memoy system is clealy less than a facto of two by applying bank inteleaving due to data dependencies and the amount of banches in eal-wold applications. The aveage ovehead ov fo the application mix and CPU configuation used in [13] has been detemined as follows, see Tab. 1. These esults suggest to simplify the fomula given in subsections 2.1 and 2.2. The effect of using seveal modules as descibed in subsection 2.3 has not been investigated in [13]. Equation 1 educes to th = g (ov + X) 1 f by emoving the influence of the numbe of banks b in favo of using the coesponding value of the memoy access ovehead ov given in Tab. 1. Similaly, equation 2 educes to th = g (ov + g bb ) 1 f 7

8 SDRAM, fou intenal banks, 100 MHz bus aveage ovehead ov [ns]/[cycles] closed-page policy 41.5 / 4.15 open-page, no bank inteleaving 36.8 / 3.68 open-page, bank inteleaving 30.1 / 3.01 RDRAM, 32 intenal banks, 400 MHz bus aveage ovehead ov [ns]/[cycles] closed-page policy 51.1 / open-page, no bank inteleaving 46.7 / open-page, bank inteleaving 31.3 / Table 1: Memoy access ovehead dependent on DRAM and contolle policy used. 3 Common paametes fo the building blocks of the access node The following paametes will be used in the succeeding sections to model the diffeent building blocks of the access node as shown in Fig. 2. N numbe of nodes along the ATM line cs [bit] ATM cell size hs [bit] ATM cell heade size [bit/s] ate of the ATM line clk [MHz] CPU clock fequency ipps max [bit] maximal IP packet size [bit] minimal IP packet size vis [bit] VPI/VCI field size con [bit] space needed fo stoing the context infomation of a connection, i.e., the max. packet length and the eseved (minimal) ate. nc max. numbe of connections pe ATM node 4 The wheel faming mechanism It is assumed that connections with the same destination node shae a fame slot. Specific paametes fs [slots] numbe of cell slots in a fame add fs [bit] numbe of addess bits needed fo andom accesses in the memoy used fo the fame implementation (can be calculated fom the size of the data stuctue gd and the memoy chip oganization) add hd [bit] addess bits fo heade queue accesses; the memoy fo fame and heade data stuctues may be shaed. lat wh [s] aveage memoy access latency fo wheel setting 4.1 Requiements fo the fame stoage Each fame enty consists of a souce node id and a destination node id. By the souce id the node identifies eseved fames. A compaison of log 2 N bit values is needed fo this task in each cell clock cycle. The destination id then detemines the coesponding FIFO queue fom which a cell can be put on the ATM line. 8

9 space equied: fs 2 log 2 N (souce + destination node id) bits of memoy space fo fame stoage. thoughput needed : cs 2 log 2 N fo eading out fame positions in each cell cycle. calculations fo a cell: two opeations Acompaisonof log 2 N bit values and a fame addess incement. delay fo a cell: 2 (lat wh + clk 1 )withg = max( log 2 N, add fs, add hd ). 4.2 Requiements fo detemining the destination queue p-tie implementation A complete multiway tie [18] with p pointes in each node needs log p N addess offset calculations fo detemining the destination queue of a fame slot. 1 space wost-case: p 1 (p log p N 1) p add fs + N add hd The fist tem consides the space needed fo the pointes at the next nodes in the tie and the second one stands fo the pointes to the FIFO queues. thoughput needed fo tavesing the tie: cs ( log ) p N add fs + add hd calculations: log p N addess offset calculations pe cell clock cycle delay fo a cell: ( log p N +1) lat wh + log p N clk Table lookup implementation space equied: N add hd thoughput needed fo eading out the table: cs add hd calculations: an offset addess calculation pe cell clock cycle delay fo a cell: lat wh + clk Example See Tab Destination queues and IP-ATM heade convesion The ATM cell heade data and the coesponding payload addesses ae stoed afte they have passed the schedules. 9

10 Fixed model paametes add 20 bit addesses fo heade and fame data stuctues cs 424 bit cell size clk 200 MHz CPU clock Model paametes 4-tie implementation Lookup implementation N fs lat wh sp th ops del sp th ops del [Mbit/s] [ns] [Kbit] [Mbit/s] [10 6 ] [ns] [Kbit] [Mbit/s] [10 6 ] [ns] Table 2: Wheel faming example. Specific paametes add pl [bit] numbe of addess bits needed fo andom accesses in the memoy used fo the payload stoage add hd [bit] addess bits fo heade queue accesses lat pl [s] aveage memoy access latency fo payload RAM lat hd [s] aveage memoy access latency fo ATM heade queue RAM lat ip [s] aveage memoy access latency fo packet heade queue RAM 5.1 Requiements of the destination queues Since the queues ae positioned afte the WFQ schedules and ovebooking is thus not possible, at most one packet must be buffeed fo each destination, i.e., ippsmax cs hs ATM cells must be stoed pe destination in the wost-case. The faming scheme, intoducing a maximal delay of two ATM cell peiods, equies that at least two ATM cells must be buffeed pe destination node. This condition is always satisfied if the minimal packet size is lage than 48 byte. space equied: (N 1) ippsmax cs hs (hs + add pl) Howeve, the space equied fo UBR taffic may be abitaily chosen. The IP packet payload emains unchanged in the shaed memoy. thoughput equied: cs (add pl + hs) is needed fo the ead out of the heades by the wheel. The thoughput cs hs cs needed fo eading 10

11 out the payload (using sepaate chips fo heade and payload) will be consideed in section 7. calculations: memoy enty fo heade is feed. delay fo a cell: lat hd + clk 1 fo a cell heade ead fom heade RAM. The ganulaity g is add pl + hs. The payload RAM will be consideed in section Requiements of the heade convesion The packet schedules detemine which IP packet has to be conveted next. The coesponding infomation (VPI/VCI and payload addesses) is ead fom the packet queues befoe the schedules and copied seveal times (dependent on the packet length) into the coesponding destination queue. thoughput demand of the packet queues (consideed in section 6): cs cs hs (vis + add pl) thoughput demand of the destination queues: cs (hs + add pl) memoy space needed: duing IP-ATM heade convesion only a single ATM heade must be stoed which is used as template fo the ATM heade geneation. Usually, egistes ae used fo this pupose. The space needed in the packet and destination queues is aleady consideed in the coesponding subsections. calculations: memoy enty fo the heade must be allocated. No additional calculations ae needed because the assignment of schedules to destination queues is fixed. delay: lat hd +clk 1 pe cell fo witing the heade into a heade queue, lat ip pe packet fo eading out a packet queue enty (consideed in section 6). Fo the packet queues, g is max(ts + add pl + vis + con, add ip ) in the WFQ case and add pl + vis fo the fixed pioity schedule espectively. 5.3 Example See Tab Packet schedule Due to quality of sevice (QoS) distinction equiements in access and coe netwoks, QoS must be distinguished fo goups of flows (DiffSev appoach [16]) classified by taffic chaacteistics, applications, oganizations, o potocols and even fo individual flows (IntSev appoach [16]). Scheduling algoithms fo output link shaing must theefoe be able to assign link bandwidth to classes of flows independently on the behavio of othe flows. The idea to adapt the behavio of an ideal fluid seve to the timemultiplex in packet netwoks has been the basis fo a vaiety of packet scheduling algoithms and has been used fist by Weighted Fai Queuing (WFQ) [9, 23]. An ideal fluid seve is able to seve seveal flows concuently accoding to weights. Excess bandwidth not eseved by any flow is distibuted in a fai manne on backlogged flows again accoding to the assigned weights. A WFQ seve then schedules packets accoding to the ode in which they would finish sevice in a fluid system. Fo this pupose a WFQ system labels each incoming packet by the time o amount of nomalized sevice at which the packet would leave the fluid seve. The aiving packets ae soted accoding to these scheduling tags in inceasing ode and the schedule chooses the packet with the minimum scheduling tag fo tansmission ove the output link. It has been shown that by applying WFQ the packet system can only be a packet 11

12 Fixed model paametes cs 424 bit cell size hs 40 bit cell heade size ipps max 1536 byte maximal packet size 40 byte minimal packet size vis 28 bit VPI/VCI field size add pl 22 bit payload addesses clk 200 MHz CPU clock Model paametes dest. queues and heade conv. N lat hd sp hd th hd ops del [Mbit/s] [ns] [Kbit] [Mbit/s] [10 6 ] [ns] Table 3: Destination queues and IP-ATM heade convesion example. length behind the sevice of the ideal fluid system in the wost-case. Howeve, thee is a temendous ovehead fo the calculation of the scheduling tags in WFQ because a WFQ schedule must intenally emulate a fluid seve in ode to calculate finish times o sevice levels. Moeove, events can appea fequently in the fluid system since vitually all backlogged flows may finish sevice at the same time. In ode to find a suitable tade-off between the complexity of the scheduling algoithm, the fainess fo the distibution of excess bandwidth, and the povision of shap delay bounds, diffeent appoaches have been applied in ode to implement WFQ. Self-clocked fai schedules So-called self-clocked methods no longe emulate a fluid system but estimate scheduling tags by the tags of packets which ae cuently queued in the packet system. Selfclocked fai queueing (SCFQ) [11] uses the finish time of the packet cuently in sevice fo the estimation of the state of the fluid seve. Contay to that, stat-time fai queuing (SFQ) as descibed in [12] uses the stat time of the packet cuently in sevice fo the estimation and seves packets in inceasing ode of thei stat times. Minimum stating-tag fai queueing (MSFQ) [6] seves packets in inceasing ode of thei finish times. The state of the fluid seve is estimated by the minimum of the stat times of backlogged flows. A second pioity queue is theefoe equied. The same appoach has been independently published in [7] unde the name time-shift scheduling. Self-clocked algoithms decease the implementation complexity of WFQ but usually povide wose delay bounds. Appoximation by potential functions Moe methodical appoaches of fai queuing designs ae based on the theoy of ate-popotional seves (RPS) [31]. A schedule of the type RPS keeps tack of the state of the fluid system by a system potential function (often also called vitual time o sevice). Scheduling tags can then be seen as the level of the system potential function nomalized to the weight of the coesponding flow at which the packet would depat the fluid system. Algoithms which do not 12

13 emulate the fluid seve pecisely use a so-called base potential function in ode to ecalibate the system potential at cetain points of time. The system potential then inceases linealy between ecalibations (assuming the system is not idle). Diffeent base potential functions as well as diffeent ecalibation time intevals can be chosen in ode to find a suitable tade-off between fainess and complexity of the schedule. RPS based schedules achieve the same wost-case delay bounds as WFQ. Stating potentialbased fai queueing (SPFQ) and fame-based fai queueing (FFQ) have been pesented in [30]. SPFQ ecalibates the system potential at evey packet depatue. The base potential is updated at evey packet aival and is set to the minimum stat potential of all backlogged flows, that is, the potential at which the coesponding packet would begin getting sevice in the fluid system. Thus, SPFQ is vey simila to MSFQ. MSFQ howeve does not use a system potential and ecalibates at packet aivals. FFQ uses a simple base potential than SPFQ and lage intevals between ecalibations at the expense of fainess. Minimum delay self-clocked fai queueing (MD-SCFQ) [4] uses the same ecalibation intevals as SPFQ togethe with a simplified base potential which does not need to maintain a second pioity queue in ode to manage stat potentials. Howeve, MD-SCFQ can achieve bette fainess than SPFQ fo cetain flow settings. Eligible packet selection Although the amount of sevice by which a WFQ system can be behind a fluid system is bounded, the WFQ system schedule can be quite ahead of the fluid system. This behavio shows undesied popeties if feedback congestion contol is used e.g. fo the egulation of best-effot taffic [2]. In ode to etain fainess between the flows shaing a link not only on the aveage but also on a fine time ganulaity, thee ae scheduling algoithms which use two distinct pioity queues fo soting. Wost-case fai weighted fai queueing (WF 2 Q) [2] and its moe efficient implementation WF 2 Q+ in [1] sot aiving packets accoding to thei stat time in the fluid system. Only packets which ae eligible fo tansmission, that is, fo which sevice would have been stated in the fluid system, ae then tansfeed to the second pioity queue which is soted accoding to the finish times. WF 2 Q+ does not need to emulate a fluid seve but uses an appoximation simila to SPFQ and MSFQ. Howeve, WF 2 Q+ consides only eligible packets fo tansmission. Leap Fowad Vitual Clock [33] tansfes packets fom backlogged but ovesubscibed flows to a second pioity queue. Packets esiding in this queue ae not eligible fo tansmission yet. Cae is taken that packets ae witten back to the fist pioity queue befoe any delay bound may be missed. Both algoithms have in common that the full contents of one pioity queue must be copied to the othe pioity queue between two scheduling decisions in the wost-case. Round-Robin vaiants Thee ae scheduling algoithms with vey low complexity which enhance the concept of a Round-Robin schedule with vitual sevice ideas. Howeve, the algoithms pesented in [5] and [27] cannot povide shap delay o fainess bounds as schedules which use a fluid seve as efeence model. Hieachical gouping If a single level of flows o flow classes is not detailed enough in ode to distinguish QoS, one may think about using seveal levels of schedules within a hieachy [1, 10, 32]. Howeve, the delay and fainess popeties of the schedules ae accumulated though the levels of the hieachy. Moeove, in the latte case, whee a schedule based on sevice cuves is used [26], one should be awae of the complexity ovehead involved by applying sevice cuves which model moe complex behavio than leaky bucket constaint souces. Modeled schedules The schedule stage consists of the scheduling tag calculation, enqueue and dequeue opeations on a pioity queue as well as context infomation updates of the vitual sevice 13

14 measue. Special hadwae such as [3, 24, 20] which acceleates the opeations of pioity queues unde specific constaints has not been consideed since we ae inteested in an implementation on geneal pupose, pogammable hadwae. We theefoe focus on the influence of a data stuctue fo pioity queues poposed in [29] on the pefomance of the schedules. The oiginal weighted fai queuing (WFQ) algoithm [23], a self-clocked vaiant MD-SCFQ [4], and a fixed pioity schedule ae consideed. We estict ou study on algoithms which only need a single pioity queue. It is assumed that the bandwidth of the output link is not ovebooked. Specific paametes min [bit/s] minimally esevable ate in a WFQ system max [bit/s] maximally esevable ate in the WFQ appoximation system pcs numbe of pioity classes (fixed pioity schedule only) npc pi,d i numbe of elements cuently stoed in the coesponding pioity class queue with pioity p i and destination node d i (fixed pioity schedule only) add ip [bit] numbe of addess bits needed fo andom accesses in the memoy used fo the IP heade stoage add ss [bit] numbe of addess bits needed fo andom accesses in the memoy used fo the scheduling tag stoage add pl [bit] numbe of addess bits needed fo andom accesses in the memoy used fo the payload stoage lat ip [s] aveage memoy access latency fo packet heade RAM lat ss [s] aveage memoy access latency fo scheduling tag RAM ts [bit] scheduling tag pecision pn di numbe of elements cuently stoed in the coesponding QoS queues fo destination node d i. (WFQ/WFQ appox. schedule only) cp [bit] backlog counte pecision (WFQ/WFQ appox. schedule only) nsic numbe of sevice inteval classes (WFQ appoximation only) x numbe of inteval subdivisions (WFQ appoximation only) 6.1 Fixed Pioity schedule Enqueue Since pioity classes ae statically detemined fo each IP flow, packet scheduling tag calculations ae not equied fo this schedule. Howeve, the packet must still be appended to the coesponding FIFO queue which collects packets of all flows of a paticula pioity class with the same destination node. Two possible implementations fo this lookup ae consideed hee. Simplification: additional opeations and data stuctues equied if a queue becomes backlogged o empty ae not consideed. lookup implemented as 2D-aay: the lookup table is oganized as a 2D-aay of pointes using the destination node and the pioity class as indices. The pointes diect to the end of the coesponding FIFO queue. space equied: (N 1) pcs add ip thoughput: add ip calculations: one 2D addess offset calculation fo evey packet delay pe packet: clk 1 + lat ip 14

15 lookup implemented as 2D-vecto: the lookup table is oganized as a vecto of pointes. The destination node is used as index. each pointe may point to anothe vecto of pointes that is indexed by the pioity class. The pointes in these vectos diect to the end of the coesponding FIFO queue. wost case space equied: (N 1) add ip (1 + pcs) thoughput: 2 add ip calculations: two addess offset calculations fo the vecto accesses fo evey packet ae needed. delay pe packet: 2 (clk 1 + lat ip )withg = add ip FIFO queues fo the diffeent pioity classes (linked lists): space: p i,d i npc pi,d i (add ip + add pl + vis) thoughput: (2 add ip + add pl + vis) calculations: allocate memoy fo new node and adjust two pointes fo evey packet. delay pe packet: clk 1 + lat ip with g = add ip + add pl + vis Dequeue Simplification: additional opeations and data stuctues equied if a queue becomes backlogged o empty ae not consideed. That is, all backlogged queues emain backlogged afte a dequeue opeation. space: aleady consideed at the enqueue opeation thoughput: (2 add ip + add pl + vis) calculations: deallocate memoy, adjust a pointe fo evey packet delay pe packet: intoduced by the scheduling algoithm: d m = ippsmax (1+ m p=1 j Sp 1) (1 m 1 p=1 µp) wost-case delay fo a packet in the class of pioity m using the bounds given in [37], assuming a constant inte-aival time fo packets of vaiable length (i.e. X ave X min in [37]), with S p the set of flows at pioity level p, i the minimal ate of flow i, withµ p = ippsmax ipps j S min p j and pcs p=1 µ p 1 (schedulable setting). intoduced by calculations: clk 1 intoduced by memoy accesses fo evey packet: lat ip with g = add ip + add pl + vis Example See Tab. 4. The column del.f ix summaizes the delay intoduced by calculations and memoy accesses. The column del.vaiation stands fo the wost-case delay bounds povided by fixed pioity scheduling fo the highest pioity IP flow compaed with the lowest pioity flow. The column sp vec only consides the amount of memoy needed fo the vecto lookup. The memoy space equied fo IP heades depends on the amount of UBR taffic and the chaacteistics of the IP flows such as bust lengths. Fo instance, suppoting up to 2 13 IP flows with an aveage of two maximum sized packets queued in the system equies 1.2 Mbit of IP heade stoage. 15

16 Fixed model paametes ipps max 1536 byte maximal packet size 40 byte minimal packet size vis 28 bit VPI/VCI field size add pl 22 bit payload addesses add ip 22 bit packet heade addesses clk 200 MHz CPU clock nc 2 13 max. numbe of connections pe ATM node Model paametes vecto lookup, FPS N lat ip,add + lat ip pcs sp vec th ops del.fix del.vaiation [Mbit/s] [ns] [Kbit] [Mbit/s] [10 6 ] [ns] [ms] WFQ schedule Detemination of the scheduling tag Table 4: Fixed pioity schedule example. A WFQ schedule [23, 36] uses a tag calculation of the fom V i =max(v (a i ),V i 1 )+ ipps i i with V (a i ): global vitual time measue at the packet aival time a i, V i 1 : tag of the peceding packet of the same connection, ipps i, i : packet size of cuent packet and the eseved ate of the connection espectively (the connection context). space: the global vitual time should be stoed in a egiste o on-chip RAM. A global vitual time egiste is needed fo evey active schedule in the node, i.e., up to (N-1) egistes may be needed. Moeove, the context infomation is aleady saved in egistes, since its value was detemined duing the IP oute lookup. That is, only the tags of the peceding packet must be stoed fo evey connection. tag lookup implemented as table: nc ts 16

17 1 tag lookup implemented as p-tie, p pointes pe node: p 1 (p log p nc 1) p add ss + nc ts thoughput: table lookup: 2 ts tie implementation: (( log p nc add ss + ts)+ts) fo eading and stoing tag values calculations: a maximum calculation of the global vitual time and the tag of the peceding packet, an addition of the context infomation fo evey packet (max. times pe second). table lookup: one addess offset calculation fo eading out the pevious tag. Fo stoing the new tag, the calculated addess can be eused. tie implementation, p pointes pe node: log p nc addess offset calculations fo eading out the pevious tag. Fo stoing the new tag, the last jump addess can be eused. delay fo a packet: table lookup: 3 clk 1 +2 lat ss with g = ts tie implementation: ( log p nc +2) clk 1 +( log p nc +2) lat ss with g = max(add ss,ts,cp) Enqueue opeation The IP heade must be inseted into a soted pioity queue accoding to its scheduling tag. The packets of connections with the same destination node on the ATM line use the same pioity queue. A wostcase situation could aise if all nc connections wee set up to the same destination node on the ATM line and theefoe had to shae a single pioity queue. The size of the pioity queue can be educed by only looking at the head elements of the connection queues, that is, only the head elements must be soted accoding to thei pioity tags. A heap oganized binay tee [18] is used fo the implementation of the pioity queue. We have chosen this simple, matue data stuctue since we do not depend on quick list mege opeations, since heaps can be analyzed well and have symmetic complexity fo enqueue and dequeue opeations and theefoe still compete easonably well with moe sophisticated pioity queue implementations [25, 17]. Moeove, since inset and delete opeations occu fequently, a heap is pefeed athe than a balanced tee implementation, since additional opeations fo maintaining a balanced data stuctue can cause noticeable ovehead. Howeve, a tee implementation is chosen instead of an aay, since the numbe of elements to be stoed cannot be statically detemined. The binay tee consists of nodes with the following fields: two pointes to the left and ight child and a value field. Globally, two values must be stoed: the numbe of elements stoed in the tee and a pointe to the oot node. The binay coding of the numbe of nodes is used to tavese the tee in ode to find the last inseted element o the new position fo insetions. Tavesing the tee, pointes to nodes along the path ae tempoaily saved (max. log 2 nc pointes) in egistes in ode to quickly find the nodes in the backwad diection. Note that the exchange of two tee nodes is done by copying the value fields and not by adjusting pointes. The copying only equies two memoy accesses. Adjusting pointes howeve would need up to five memoy accesses. space: lookup fo destination node: (N 1) add ip fo detemining the coesponding pioity queue with a simple table lookup. heap oganized binay tee (p-queue): d i (2 add ip +(ts + add pl + vis + con)) pn di 17

18 thoughput: lookup: add ip fo detemining the pioity queue. heap oganized binay tee: (( log 2 (nc +1) +1) add ip + log 2 (nc +1) 2 (ts + add pl + vis + con)+(ts + add pl + vis + con)) (find the insetion point, adjust pointe, wost case numbe of enty exchanges, wite value field of new enty) calculations (pe packet): lookup: an addess offset calculation fo detemining the pioity queue. heap oganized binay tee: incement node counte fo d i s pioity queue, allocate memoy fo new node, detemine the position fo insetion (almost no ovehead, since a bit in the numbe of node decides, whethe the left o ight child node must be chosen), max. log 2 (nc+ 1) compaisons of ts bit values delay: ( log 2 (nc +1) +2) clk 1 +(3 log 2 (nc +1) +2) lat ip with g = ts + add pl + vis + con. Accesses may be divided into small addess field accesses (g = add ip ) and lage infomation field accesses. Then, the fomula can be efined to ( log 2 (nc +1) +2) clk 1 +( log 2 (nc +1) +1) lat ip,add +(2 log 2 (nc +1) +1) lat ip Dequeue opeation The schedules of the pioity queues all togethe must schedule packets at most times pe second. A WFQ schedule needs to find the packet with the highest pioity in the pioity queue what usually means finding the packet with the smallest scheduling tag. space: the space equiements ae aleady consideed at the enqueue opeation. thoughput (needed by the p-queue): (( log 2 nc +1) add ip + log 2 (nc 1) 2 (ts + add pl + vis + con)+(ts + add pl + vis + con)+(add pl + vis + con)) (find the deletion point, eset pointe, wost case numbe of enty exchanges, wite value field, ead value field of top element) calculations (needed by p-queue): the packet enty with the smallest scheduling tag can be found quickly at the oot of the binay tee. Howeve, the enty at the last inseted position is exchanged with the oot and enqueued again in the binay tee to maintain the heap oganization. The last inseted position can be detemined fom the numbe of nodes in the tee. The needed opeations fo evey packet ae: log 2 nc compaisons of ts bit values, decement node counte, deallocate memoy of last inseted node. delay fo the head of line packet of a flow, coesponds to total delay if the IP souces would be constant bit-ate souces: caused by calculations and memoy accesses: ( log 2 nc +1) clk 1 +( log 2 nc +2 log 2 (nc 1) +3) lat ip. Again, accesses may be divided into small addess field accesses and lage infomation field accesses. Then, the fomula can be efined to ( log 2 nc +1) clk 1 +( log 2 nc +1) lat ip,add +(2 log 2 (nc 1) +2) lat ip. 18

19 ipps i scheduling algoithm chaacteistics: i + ippsmax. The tem ipps i i esults fom the guaanteed tanspot delay. The second tem consides the situation whee a maximum-sized packet has been chosen fo tansmission befoe the aival of the cuent packet Context infomation update Maintaining and updating the global vitual time V of the coesponding emulated fluid fai queuing system basically needs fou egistes pe schedule (i.e. active destination node): a egiste fo stoing V, a egiste fo stoing the sum of the eseved ates ( B(t) i) of all backlogged connections, a egiste fo stoing the system time of the last vitual clock update, and a egiste fo stoing the time at which V must be updated next because a packet has been seved in the fluid system. An update of V is pefomed as follows: V (t + dt) :=V (t) + dt B(t) i. B(t) is the set of backlogged connections in the fluid system at time t. The time fo the next update of V if no moe packets aive is given by next(t) =t +(V i,min V (t)) B(t) i. Note that the schedule needs its own pioity queue fo the emulation of the fluid system since the contents of the fluid system pioity queue and the WFQ pioity queue may diffe. Moeove, only aveage bounds ae detemined since they ae calculated on a pe packet basis. In the wost-case all vitually backlogged connections in the fluid system may be eleased at the same point of time and geneate consideable busts of events. space: counte lookup: nc cp. Lookup in a vecto of countes which states how many packets ae still in the coesponding packet queue of the connection. pioity queue fo detemining V i,min in the fluid system (heap oganized binay tee): d i (2 add ss + ts) pn di thoughput: countes: 4 cp (enqueue and dequeue). It is assumed that at least one byte must be ead o witten. p-queue enqueue and dequeue opeations: 2 (( log 2 (nc +1) +1) add ss + log 2 (nc +1) 2 ts + ts) calculations: afte each calculation of next(t) a time is set with the diffeence of next(t) andthecuent system time. enqueue (packet aival): in the wost-case, a (vitual) connection queue becomes backlogged which was empty befoe. In ode to detemine the backlog state, an addess offset calculation is needed. Moeove, the backlog counte must be incemented. Then, the sum egiste might be updated by the amount of the eseved ate of that connection if the queue was empty befoe. An addition opeation is needed fo that. Moeove, the atio egiste must be ecalculated with a division. V can be updated by anothe addition. Last, the calculation of next(t) needs a subtaction, a multiplication, and an addition. dequeue (in the emulated fluid system): afte the dequeue opeation, a (vitual) connection queue may no longe be backlogged. The backlog state must be adjusted accodingly. The backlog counte must be updated and theefoe an addess offset calculation and a decement opeation ae equied. The egistes must be updated accodingly, that means, two subtactions, a division, a multiplication, and two additions ae needed in the wost case. 19

20 p-queue opeations: 2 ( log 2 (nc +1) +1) (compaisons of ts values and incement/decement of the nodes counte) delay pe packet: ( ( log 2 (nc +1) +1)) clk 1 +(4+2 (3 log 2 (nc +1) +2)) lat ss Example See Tab. 5. The additional delay (besides the tanspot delay) intoduced by the chaacteistics of the scheduling algoithm ( ippsmax )isabout80µs fo a line ate of 155 Mbit and has not been consideed in the column del. Again, two access types have been distinguished. Shot accesses fo tavesing the tee stuctue of the heap only equie a lat ip,add delay. Long tansfes which access the value fields of the tee nodes need a lat ip delay. Two packets pe connection ae queued in the system on the aveage. 6.3 WFQ appoximation Connections ae gouped accoding to thei sevice intevals, as suggested in [29], which ae defined by Φ i := ipps i i. ipps i is the size of the packet at the head of the FIFO queue of connection i. In ode to estict the numbe of goups, the set of all possible sevice intevals must be educed to a bounded set accepting a cetain penalty in tems of delay and fainess. The ange of possible sevice intevals is unifomly exponentially spanned by a set of G goups with a ganulaity : Φ max = G 1 Φ min. Φ The coesponding goup g of a packet is theefoe detemined by g = log i Φ min +1. Thus, whena packet of a connection has been seved, the connection might belong to anothe sevice inteval goup. Howeve, using this gouping scheme and accepting a cetain delay penalty, soting the heads of the connection queues within a goup accoding to scheduling tags can be easily achieved by a simple linked list and two additional pointes, see Fig. 4. Moeove, the schedule only needs to look at the scheduling tags of one packet of each goup (the gay elements in Fig. 4), not at the tags of all packets in the system. The scheduling tags within a sevice inteval goup can span the ange ippsmax Φ g which also is sevice intevals flow queues Figue 4: Soting data stuctue. the maximum delay penalty intoduced by this gouping scheme. This value can be deceased by futhe 20

21 Fixed model paametes 40 byte minimal packet size vis 28 bit VPI/VCI field size con 14 bit flow context infomation add pl 22 bit payload addesses add ip 22 bit packet heade addesses clk 200 MHz CPU clock min 128 Kbit minimal suppoted ate of a flow cp 16 bit backlog counte pecision ts 32 bit scheduling tag size Model paametes WFQ, aveage case N nc lat ss lat ip,add +lat ip sp ip sp ss th ip th ss ops ip ops ss del ip del ss [Mbit/s] [ns] [ns] [Kbit] [Kbit] [Mbit/s] [Mbit/s] [10 6 ] [10 6 ] [µs] [µs] Table 5: WFQ schedule example. subdividing the ange of scheduling tags within a goup linealy into x subgoups. The coesponding 21

22 subgoup can be detemined by anothe division opeation. A pioity queue pe goup keeps tack of the head elements of the subgoups Scheduling tag calculation The descibed data stuctue can be applied fo a vaiety of WFQ vaiants Enqueue opeation Using the connection identifie (VPI/VCI pai) a lookup is pefomed which detemines the position of the end of the connection queue. If the connection queue is empty, the packet is added at the end of the linked list of the coesponding sevice inteval goup/subgoup to be the head element in its connection queue. The lookup vecto must be adjusted to point to the new end of the coesponding connection queue as well as the pointe which diects to the end of the linked list of a sevice inteval goup. Moeove, the packet may be enqueued in the goup s pioity queue and the schedule s pioity queue in the wost-case. These tansfes have been consideed in the dequeue opeation. space: lookup vecto (destination node): (N 1) add ip fo detemining the esponsible schedule lookup vecto (end of flow queue): nc add ip sevice inteval class lookup: 2 add ip nsic (N 1) list and queue elements: d i (2 add ip +(add pl +vis+con+ts)) max(pn di nsic nsic x, 0) pioity queue elements (schedule), heap oganized aay [18]: (N 1) nsic (ts + add ip + vis + con + log 2 nsic ) subgoup pioity queues (x enties pe goup): (N 1) nsic x (ts+add ip +vis+con+ log 2 x ) thoughput: detemining the schedule: add ip queuing: (2 add ip +(add pl + vis + con + ts)+2 add ip ) (two lookups, witing of the value field, pointe updates) calculations fo evey packet: an addess offset calculation fo detemining the esponsible schedule, an addess offset calculation fo detemining the state of the coesponding connection queue, calculation of the matching sevice inteval class (a division, a log opeation (counted as 10 calculations), a floo opeation and an incement) and subgoup (a division), an addess offset calculation fo detemining the end of the linked list if connection queue empty, allocate memoy fo new enty, update pointes in class lookup vecto and at the end of the list. delay pe packet: 18 clk 1 +6 lat ip with g = max(add ip, add pl + vis + con + ts). Accesses may be divided into small addess field accesses (g = add ip ) and lage infomation field accesses. Then, the fomula can be efined to 18 clk 1 +5 lat ip,add + lat ip. 22

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

COSC 6385 Computer Architecture. - Pipelining

COSC 6385 Computer Architecture. - Pipelining COSC 6385 Compute Achitectue - Pipelining Sping 2012 Some of the slides ae based on a lectue by David Culle, Pipelining Pipelining is an implementation technique wheeby multiple instuctions ae ovelapped

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

DYNAMIC STORAGE ALLOCATION. Hanan Samet

DYNAMIC STORAGE ALLOCATION. Hanan Samet ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu

More information

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson Lectue 8 Intoduction to Pipelines Adapated fom slides by David Patteson http://www-inst.eecs.bekeley.edu/~cs61c/ * 1 Review (1/3) Datapath is the hadwae that pefoms opeations necessay to execute pogams.

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining

More information

DYNAMIC STORAGE ALLOCATION. Hanan Samet

DYNAMIC STORAGE ALLOCATION. Hanan Samet ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

UCB CS61C : Machine Structures

UCB CS61C : Machine Structures inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Lecture #22 Pipelining II, Cache I

Lecture #22 Pipelining II, Cache I inst.eecs.bekeley.edu/~cs61c CS61C : Machine Stuctues Lectue #22 Pipelining II, Cache I Wiewold cicuits 2008-7-29 http://www.maa.og/editoial/mathgames/mathgames_05_24_04.html http://www.quinapalus.com/wi-index.html

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Exploring non-typical memcache architectures for decreased latency and distributed network usage.

Exploring non-typical memcache architectures for decreased latency and distributed network usage. Syacuse Univesity SURFACE Electical Engineeing and Compute Science Technical Repots College of Engineeing and Compute Science 9-5-20 Exploing non-typical memcache achitectues fo deceased latency and distibuted

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines 1 COEN-4730 Compute Achitectue Lectue 2 Review of nstuction Sets and Pipelines Cistinel Ababei Dept. of Electical and Compute Engineeing Maquette Univesity Cedits: Slides adapted fom pesentations of Sudeep

More information

CS 61C: Great Ideas in Computer Architecture. Pipelining Hazards. Instructor: Senior Lecturer SOE Dan Garcia

CS 61C: Great Ideas in Computer Architecture. Pipelining Hazards. Instructor: Senior Lecturer SOE Dan Garcia CS 61C: Geat Ideas in Compute Achitectue Pipelining Hazads Instucto: Senio Lectue SOE Dan Gacia 1 Geat Idea #4: Paallelism So9wae Paallel Requests Assigned to compute e.g. seach Gacia Paallel Theads Assigned

More information

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies Acceleating Stoage with RDMA Max Gutovoy Mellanox Technologies 2018 Stoage Develope Confeence EMEA. Mellanox Technologies. All Rights Reseved. 1 What is RDMA? Remote Diect Memoy Access - povides the ability

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

Introduction To Pipelining. Chapter Pipelining1 1

Introduction To Pipelining. Chapter Pipelining1 1 Intoduction To Pipelining Chapte 6.1 - Pipelining1 1 Mooe s Law Mooe s Law says that the numbe of pocessos on a chip doubles about evey 18 months. Given the data on the following two slides, is this tue?

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Ethernet PON (epon): Design and Analysis of an Optical Access Network.

Ethernet PON (epon): Design and Analysis of an Optical Access Network. Ethenet PON epon: Design and Analysis of an Optical Access Netwo. Glen Kame Depatment of Compute Science Univesity of Califonia, Davis, CA 9566, USA Tel:.530.297.527; Fax:.530.297.530 E-mail: ame@cs.ucdavis.edu

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Method of controlling access to intellectual switching nodes of telecommunication networks and systems

Method of controlling access to intellectual switching nodes of telecommunication networks and systems ISSN (e): 2250 3005 Volume 05 Issue 05 ay 2015 Intenational Jounal of Computational Engineeing eseach (IJCE) ethod of contolling access to intellectual switching nodes of telecommunication netwoks and

More information

Computer Architecture. Pipelining and Instruction Level Parallelism An Introduction. Outline of This Lecture

Computer Architecture. Pipelining and Instruction Level Parallelism An Introduction. Outline of This Lecture Compute Achitectue Pipelining and nstuction Level Paallelism An ntoduction Adapted fom COD2e by Hennessy & Patteson Slide 1 Outline of This Lectue ntoduction to the Concept of Pipelined Pocesso Pipelined

More information

Computer Science 141 Computing Hardware

Computer Science 141 Computing Hardware Compute Science 141 Computing Hadwae Fall 2006 Havad Univesity Instucto: Pof. David Books dbooks@eecs.havad.edu [MIPS Pipeline Slides adapted fom Dave Patteson s UCB CS152 slides and May Jane Iwin s CSE331/431

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics Wost-Case Delay Bounds fo Unifom Load-Balanced Switch Fabics Spyidon Antonakopoulos, Steven Fotune, Rae McLellan, Lisa Zhang Bell Laboatoies, 600 Mountain Ave, Muay Hill, NJ 07974 fistname.lastname@alcatel-lucent.com

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

GARBAGE COLLECTION METHODS. Hanan Samet

GARBAGE COLLECTION METHODS. Hanan Samet gc0 GARBAGE COLLECTION METHODS Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu

More information

dc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc

dc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc - CentOS 5.2 - Linux Uses Guide - Linux Command SYNOPSIS [-V] [--vesion] [-h] [--help] [-e sciptexpession] [--expession=sciptexpession] [-f sciptfile] [--file=sciptfile] [file...] DESCRIPTION is a evese-polish

More information

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs IAENG Intenational Jounal of Compute Science, 403, IJCS_40_3_02 Efficient Execution Path Exploation fo Detecting Races in Concuent Pogams Theodous E. Setiadi, Akihiko Ohsuga, and Mamou Maekaa Abstact Concuent

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

CS 2461: Computer Architecture 1 Program performance and High Performance Processors

CS 2461: Computer Architecture 1 Program performance and High Performance Processors Couse Objectives: Whee ae we. CS 2461: Pogam pefomance and High Pefomance Pocessos Instucto: Pof. Bhagi Naahai Bits&bytes: Logic devices HW building blocks Pocesso: ISA, datapath Using building blocks

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

CISC 662 Graduate Computer Architecture Lecture 6 - Hazards

CISC 662 Graduate Computer Architecture Lecture 6 - Hazards CISC 662 Gaduate Compute Achitectue Lectue 6 - Hazads Michela Taufe http://www.cis.udel.edu/~taufe/teaching/cis662f07 Powepoint Lectue Notes fom John Hennessy and David Patteson s: Compute Achitectue,

More information

The concept of PARPS - Packet And Resource Plan Scheduling

The concept of PARPS - Packet And Resource Plan Scheduling The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.

More information

On the throughput-cost tradeoff of multi-tiered optical network architectures

On the throughput-cost tradeoff of multi-tiered optical network architectures 1 On the thoughput-cost tadeoff of multi-tieed optical netwok achitectues Guy Weichenbeg, Vincent W. S. Chan, and Muiel Médad Laboatoy fo Infomation and Decision Systems Massachusetts Institute of Technology

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC Using SPEC SFS with the SNIA Emeald Pogam fo EPA Enegy Sta Data Cente Stoage Pogam Venon Mille IBM Nick Pincipe Dell EMC v6 Agenda Backgound on SNIA Emeald/Enegy Sta fo block Intoduce NAS/File test addition;

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

Fifth Wheel Modelling and Testing

Fifth Wheel Modelling and Testing Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les

More information

CSE4201. Computer Architecture

CSE4201. Computer Architecture CSE 4201 Compute Achitectue Pof. Mokhta Aboelaze Pats of these slides ae taken fom Notes by Pof. David Patteson at UCB Outline MIPS and instuction set Simple pipeline in MIPS Stuctual and data hazads Fowading

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

CMCS Mohamed Younis CMCS 611, Advanced Computer Architecture 1

CMCS Mohamed Younis CMCS 611, Advanced Computer Architecture 1 CMCS 611-101 Advanced Compute Achitectue Lectue 6 Intoduction to Pipelining Septembe 23, 2009 www.csee.umbc.edu/~younis/cmsc611/cmsc611.htm Mohamed Younis CMCS 611, Advanced Compute Achitectue 1 Pevious

More information

User Visible Registers. CPU Structure and Function Ch 11. General CPU Organization (4) Control and Status Registers (5) Register Organisation (4)

User Visible Registers. CPU Structure and Function Ch 11. General CPU Organization (4) Control and Status Registers (5) Register Organisation (4) PU Stuctue and Function h Geneal Oganisation Registes Instuction ycle Pipelining anch Pediction Inteupts Use Visible Registes Vaies fom one achitectue to anothe Geneal pupose egiste (GPR) ata, addess,

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

ECE331: Hardware Organization and Design

ECE331: Hardware Organization and Design ECE331: Hadwae Oganization and Design Lectue 16: Pipelining Adapted fom Compute Oganization and Design, Patteson & Hennessy, UCB Last time: single cycle data path op System clock affects pimaily the Pogam

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Administrivia. CMSC 411 Computer Systems Architecture Lecture 5. Data Hazard Even with Forwarding Figure A.9, Page A-20

Administrivia. CMSC 411 Computer Systems Architecture Lecture 5. Data Hazard Even with Forwarding Figure A.9, Page A-20 Administivia CMSC 411 Compute Systems Achitectue Lectue 5 Basic Pipelining (cont.) Alan Sussman als@cs.umd.edu as@csu dedu Homewok poblems fo Unit 1 due today Homewok poblems fo Unit 3 posted soon CMSC

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Monte Carlo Simulation for the ECAT HRRT using GATE

Monte Carlo Simulation for the ECAT HRRT using GATE Monte Calo Simulation fo the ECAT HRRT using GATE F. Bataille, C. Comtat, Membe, IEEE, S. Jan, and R. Tébossen Abstact The ECAT HRRT (High Resolution Reseach Tomogaph, CPS Innovations, Knoxville, TN, U.S.A.)

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

Journal of Network and Computer Applications

Journal of Network and Computer Applications Jounal of Netwok and Compute Applications 34 (211) 135 142 Contents lists available at ScienceDiect Jounal of Netwok and Compute Applications jounal homepage: www.elsevie.com/locate/jnca Optimization of

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

An effective hop-by-hop Interest shaping mechanism for CCN communications

An effective hop-by-hop Interest shaping mechanism for CCN communications An effective hop-by-hop Inteest shaping mechanism fo CCN communications Natalya Rozhnova, Sege Fdida To cite this vesion: Natalya Rozhnova, Sege Fdida. An effective hop-by-hop Inteest shaping mechanism

More information

OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO

OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO Zeeshan A. Shaikh 1 and T.Y. Badguja 2 1,2 Depatment of Mechanical Engineeing, Late G. N. Sapkal

More information

MAC Protocol for Supporting QoS in All-IP HiperLAN2

MAC Protocol for Supporting QoS in All-IP HiperLAN2 MAC Potocol fo Suppoting QoS in All-IP HipeLAN Chistos E. Politis, Rahim Tafazolli Univesity of Suey Cente fo Communication Systems Reseach Guildfod, GU 7XH, Suey, UK Tel.: +44 483 683463, FAX: +44 483

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Persistent Memory what developers need to know Mark Carlson Co-chair SNIA Technical Council Toshiba

Persistent Memory what developers need to know Mark Carlson Co-chair SNIA Technical Council Toshiba Pesistent Memoy what developes need to know Mak Calson Co-chai SNIA Technical Council Toshiba 2018 Stoage Develope Confeence EMEA. All Rights Reseved. 1 Contents Welcome Pesistent Memoy Oveview Non-Volatile

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information