• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Yongqing, Xie Lunguo, Fu Qingchao. Moveable Bubble Flow Control and Adaptive Routing Mechanism in Torus Networks[J]. Journal of Computer Research and Development, 2014, 51(8): 1854-1862. DOI: 10.7544/issn1000-1239.2014.20121097
Citation: Wang Yongqing, Xie Lunguo, Fu Qingchao. Moveable Bubble Flow Control and Adaptive Routing Mechanism in Torus Networks[J]. Journal of Computer Research and Development, 2014, 51(8): 1854-1862. DOI: 10.7544/issn1000-1239.2014.20121097

Moveable Bubble Flow Control and Adaptive Routing Mechanism in Torus Networks

More Information
  • Published Date: August 14, 2014
  • Bubble flow control is an efficient and buffer occupancy-based technique to avoid deadlock in torus networks. Critical bubble scheme can avoid intra-dimension deadlock with just one packet buffer by marking and tracking as “critical” a certain number of free packet-sized buffers, but has a risk of blocking. A false packet protocol and the design of a non-blocking moveable bubble scheme are presented to solve the block induced by critical bubble. False packet protocol adopts simple request-acknowledge, and the whole scheme is implemented on typical credit flows, and no other special requirement is needed. Unlike the typical bubble scheme, which is locally aware, this scheme is also an efficient implementation of a globally-aware flow control mechanism. Combing an escape channel based on moveable bubble scheme and a fully adaptive channel brings a fully adaptive router with minimal two virtual channels, with one packet buffer per virtual channel. To show the advantage of this scheme, the performance of various bubble-based schemes is compared. Network simulation results show that the moveable bubble scheme outperforms traditional bubble scheme, whereas adaptive scheme performs apparently better than the other non-adaptive methods. It avoids blocking, leads to much lower average packet latency, and displays a throughput improvement of more than 20%, maximally up to 100%.
  • Related Articles

    [1]Li Chunfeng, Karim Soliman, Ji Weixing, Shi Feng. Deadlock-Free Strategies Based on Synchronized Hamiltonian Ring in Triplet-Based Many-Core Architecture[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202331042
    [2]Zhao Chuan, Xu Jun. Secure Multi-Party Computation Based on Cut-and-Choose Technology[J]. Journal of Computer Research and Development, 2022, 59(8): 1800-1818. DOI: 10.7544/issn1000-1239.20210664
    [3]Yu Zhen, Su Xiaohong, Qiu Jing. Dynamically Detecting Multiple Types of Deadlocks Using Lock Allocation Graphs[J]. Journal of Computer Research and Development, 2017, 54(7): 1557-1568. DOI: 10.7544/issn1000-1239.2017.20160369
    [4]Yu Zhen, Su Xiaohong, Qi Peng, Ma Peijun. Deadlock Avoiding Based on Future Lockset[J]. Journal of Computer Research and Development, 2017, 54(2): 428-445. DOI: 10.7544/issn1000-1239.2017.20150701
    [5]Yu Tao, Bi Jun, Wu Jianping. Research on the Virtualization of Future Internet[J]. Journal of Computer Research and Development, 2015, 52(9): 2069-2082. DOI: 10.7544/issn1000-1239.2015.20140207
    [6]Hu Kai, Wang Zhe, Jiang Shu, and Yin Baolin. A Performance Model of k-Ary n-Cube Under Communication Locality[J]. Journal of Computer Research and Development, 2011, 48(11): 2083-2093.
    [7]Ye Songtao, Lin Yaping, Hu Yupeng, Zhou Siwang, You Zhiqiang. A Faulty Sensor Node Tolerance Algorithm Based on Cut Point Set[J]. Journal of Computer Research and Development, 2009, 46(12): 2117-2125.
    [8]Xiao Canwen, Zhang Minxuan, Guo Feng. Dimensional Bubble Flow Control and Adaptive Routing Algorithm in Torus Networks[J]. Journal of Computer Research and Development, 2007, 44(9): 1510-1517.
    [9]Cheng Xin, Liu Hongwei, Dong Jian, Yang Xiaozong. A Fault Tolerance Deadlock Detection/Resolution Algorithm for the AND-OR Model[J]. Journal of Computer Research and Development, 2007, 44(5): 798-805.
    [10]Wang Zhaofei and Huang Chun. Static Detection of Deadlocks in OpenMP Fortran Programs[J]. Journal of Computer Research and Development, 2007, 44(3).

Catalog

    Article views (1165) PDF downloads (462) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return