• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Wei, Qiao Lin, Yang Guangwen, Tang Zhizhong. Performance Analysis of the 2-D Networks-On-Chip for Local Uniform Random Communication Pattern[J]. Journal of Computer Research and Development, 2010, 47(3): 532-540.
Citation: Wang Wei, Qiao Lin, Yang Guangwen, Tang Zhizhong. Performance Analysis of the 2-D Networks-On-Chip for Local Uniform Random Communication Pattern[J]. Journal of Computer Research and Development, 2010, 47(3): 532-540.

Performance Analysis of the 2-D Networks-On-Chip for Local Uniform Random Communication Pattern

More Information
  • Published Date: March 14, 2010
  • As the continuity and penetrability to the 2-D networks-on-chip performance analysis based on the global uniform random communication pattern, the model of the local uniform random communication pattern, as well as that of the global one, are described; and the relationship between the two models is analyzed. Then, based on the unique interconnection networks-on-chip router as well as the communication protocol, which are both raised by the authors, using the link number to indicate the cost, the regular pattern of the changes of those different structures performance with the changes of the probability of local communications is pointed out. Finally, those different structures are classified simply according to the relative performance. The results show that the global uniform random communication pattern is just a special case of the local uniform random communication pattern, and the performance of each kind of structures is improved with the increasing of the probability of local communications. Correspondingly, the quadrilateral and the triangle mesh networks and their deformations are more suitable for small probability of local communications or communication-intensive applications; and the hexagonal mesh, the multi-ring and their deformations may achieve better overall performance when the probability of local communications is larger or the amount of traffic is smaller.
  • Related Articles

    [1]Huang Kezhen, Lian Yifeng, Feng Dengguo, Zhang Haixia, Liu Yuling, Ma Xiangliang. Cyber Security Threat Intelligence Sharing Model Based on Blockchain[J]. Journal of Computer Research and Development, 2020, 57(4): 836-846. DOI: 10.7544/issn1000-1239.2020.20190404
    [2]Deng Li, Wu Weinan, Zhu Zhengyi, Chen Ming. DiffSec: A Differentiated Intelligent Network Security Service Model[J]. Journal of Computer Research and Development, 2019, 56(5): 955-966. DOI: 10.7544/issn1000-1239.2019.20190019
    [3]Liu Yuling, Feng Dengguo, Lian Yifeng, Chen Kai, Wu Di. Network Situation Prediction Method Based on Spatial-Time Dimension Analysis[J]. Journal of Computer Research and Development, 2014, 51(8): 1681-1694. DOI: 10.7544/issn1000-1239.2014.20121050
    [4]Bu Ning, Liu Yuling, Lian Yifeng, Huang Liang. UML-Based Modeling Method of Network Security Infrastructure[J]. Journal of Computer Research and Development, 2014, 51(7): 1578-1593.
    [5]Wu Yue, Li Jianhua, Lin Chuang. Survey of Security and Trust in Opportunistic Networks[J]. Journal of Computer Research and Development, 2013, 50(2): 278-290.
    [6]Hu Jianli, Zhou Bin, Wu Quanyuan, Li Xiaohua. A Reputation Based Attack-Resistant Distributed Trust Management Model for P2P Networks[J]. Journal of Computer Research and Development, 2011, 48(12): 2235-2241.
    [7]Chen Feng, Liu Dehui, Zhang Yi, Su Jishu. A Hierarchical Evaluation Approach for Network Security Based on Threat Spread Model[J]. Journal of Computer Research and Development, 2011, 48(6): 945-954.
    [8]Lin Wangqun, Wang Hui, Liu Jiahong, Deng Lei, Li Aiping, Wu Quanyuan, and Jia Yan. Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory[J]. Journal of Computer Research and Development, 2011, 48(2): 306-316.
    [9]Luo Junhai and Fan Mingyu. Research on Trust Model Based on Game Theory in Mobile Ad-Hoc Networks[J]. Journal of Computer Research and Development, 2008, 45(10): 1704-1710.
    [10]Zhang Haixia, Su Purui, and Feng Dengguo. A Network Security Analysis Model Based on the Increase in Attack Ability[J]. Journal of Computer Research and Development, 2007, 44(12): 2012-2019.

Catalog

    Article views (635) PDF downloads (556) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return