• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ouyang Yiming, Sun Chenglong, Li Jianhua, Liang Huaguo, Huang Zhengfeng, Du Gaoming. Addressing Transient and Intermittent Link Faults in NoC with Fault-Tolerant Method[J]. Journal of Computer Research and Development, 2017, 54(5): 1109-1120. DOI: 10.7544/issn1000-1239.2017.20151017
Citation: Ouyang Yiming, Sun Chenglong, Li Jianhua, Liang Huaguo, Huang Zhengfeng, Du Gaoming. Addressing Transient and Intermittent Link Faults in NoC with Fault-Tolerant Method[J]. Journal of Computer Research and Development, 2017, 54(5): 1109-1120. DOI: 10.7544/issn1000-1239.2017.20151017

Addressing Transient and Intermittent Link Faults in NoC with Fault-Tolerant Method

More Information
  • Published Date: April 30, 2017
  • As the link is the critical path between routers in NoC,it will seriously affect the network performance when faults occur in the link. For this reason, we propose a high reliable fault-tolerant method addressing transient and intermittent link faults. The method can detect real-time data error occurring in the network, and then define that whether the fault is transient fault or intermittent fault, thereby realizing fault-tolerance. As a result, it not only alleviates the network congestion and decreases the data delay, but also ensures the correct transmission of data, effectively guaranteeing the high reliability of the system. It is well known that when a transient fault occurs in the link, the fault link will result in a data error, which cannot be corrected properly. Therefore, the proposed method set up the retransmission buffer and then the backup data will be retransmitted. If an intermittent fault occurs, the packet transmission is truncated. To solve this problem, the proposed method adds a pseudo head flit and a pseudo tail flit to the truncated data, then re-routing begins and the occupied resource is released. Experimental results show that, in different fault conditions, this method outperforms the comparison objects with significant reduction in average packet latency and obvious improvement in throughput. In a word, this scheme can effectively improve network reliability in addition to ensuring network performance.
  • Related Articles

    [1]Zhou Quan, Chen Minhui, Wei Kaijun, Zheng Yulong. Traceable Attribute-Based Signature for SM9-Based Support Policy Hidden[J]. Journal of Computer Research and Development, 2025, 62(4): 1065-1074. DOI: 10.7544/issn1000-1239.202330744
    [2]Liu Yongzhi, Qin Guiyun, Liu Pengtao, Hu Chengyu, Guo Shanqing. Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX[J]. Journal of Computer Research and Development, 2023, 60(12): 2709-2724. DOI: 10.7544/issn1000-1239.202220478
    [3]An Haoyang, He Debiao, Bao Zijian, Peng Cong, Luo Min. Ring Signature Based on the SM9 Digital Signature And Its Application in Blockchain Privacy Protection[J]. Journal of Computer Research and Development, 2023, 60(11): 2545-2554. DOI: 10.7544/issn1000-1239.202330265
    [4]Li Jiguo, Zhu Liufu, Liu Chengdong, Lu Yang, Han Jinguang, Wang Huaqun, Zhang Yichen. Provably Secure Traceable Attribute-Based Sanitizable Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2021, 58(10): 2253-2264. DOI: 10.7544/issn1000-1239.2021.20210669
    [5]Fu Wei, Wu Xiaoping, Ye Qing, Xiao Nong, Lu Xicheng. A Multiple Replica Possession Proving Scheme Based on Public Key Partition[J]. Journal of Computer Research and Development, 2015, 52(7): 1672-1681. DOI: 10.7544/issn1000-1239.2015.20140353
    [6]Ma Chunguang, Wang Jiuru, Wu Peng, Zhang Hua. M-IBE Based Key Management Protocol for Heterogeneous Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(10): 2109-2116.
    [7]Long Yu, Xu Xian, Chen Kefei. Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG[J]. Journal of Computer Research and Development, 2012, 49(5): 932-938.
    [8]Ren Yongjun, Wang Jiandong, Xu Dazhuan, Zhuang Yi, Wang Jian. Key Agreement Protocol for Wireless Sensor Networks Using Self-Certified Public Key System[J]. Journal of Computer Research and Development, 2012, 49(2): 304-311.
    [9]Chen Shaozhen, Wang Wenqiang, Peng Shujuan. Efficient AttributeBased Ring Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Chen Huiyan, Wang Lianqiang, Lü Shuwang. A Study of Key Problems of HFE Cryptosystem[J]. Journal of Computer Research and Development, 2007, 44(7): 1205-1210.

Catalog

    Article views (1647) PDF downloads (648) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return