• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xiao Canwen, Zhang Minxuan, Guo Feng. Multicast Algorithm Based on the Adaptive Dimensional Bubble Routing on 2-D Torus Network[J]. Journal of Computer Research and Development, 2010, 47(2): 353-360.
Citation: Xiao Canwen, Zhang Minxuan, Guo Feng. Multicast Algorithm Based on the Adaptive Dimensional Bubble Routing on 2-D Torus Network[J]. Journal of Computer Research and Development, 2010, 47(2): 353-360.

Multicast Algorithm Based on the Adaptive Dimensional Bubble Routing on 2-D Torus Network

More Information
  • Published Date: February 14, 2010
  • One novel multicast algorithm called 2-D torus dimensional bubble multicast routing (2DTDBMR) is presented in this paper. According to the idea of the unicast and multicast communication operations supported by the same underlying routing strategy, the 2DTDBMR multicast algorithm based on torus adaptive dimensional bubble routing (TADBR) algorithm is realized on the 2-D torus network. The multicast algorithm supports multicast packets to realize multi-destinations routing and packets replications by the router. Furthermore, 2DTDBMR multicasting algorithm is deadlock-free. By the analysis of all possible situations of routing packets in the 2-D torus network, it is concluded that all kinds of packets can arrive at their destinations when the 2DTDBMR multicasting algorithm is accepted. The detail proof is provided for these conclusions in the paper. Lastly, the 2-D torus simulator called RingNetSim is adapted. The simulator realized the 2DTDBMR multicasting algorithm. At the same time, some traditional multicast routing algorithms are also realized in the simulator such as BRCP-HL algorithm, Hamilton algorithm, Umesh algorithm and so on. The performance of the 2DTDBMR on RingNetSim is tested. The performance of those multicast routing algorithms are evaluated by adopting different buffering space, communication models and arbitration algorithms. The results show that the 2DTDBMR algorithm owns preferable performance.
  • Related Articles

    [1]Tan Tian, Ma Xiaoxing, Xu Chang, Ma Chunyan, Li Yue. Survey on Java Pointer Analysis[J]. Journal of Computer Research and Development, 2023, 60(2): 274-293. DOI: 10.7544/issn1000-1239.202220901
    [2]Wang Mingzhe, Jiang Yu, Sun Jiaguang. Static Instrumentation Techniques in Fuzzing Testing[J]. Journal of Computer Research and Development, 2023, 60(2): 262-273. DOI: 10.7544/issn1000-1239.202220883
    [3]Zhang Lei, Yang Zhemin, Li Mingqi, Yang Min. TipTracer: Detecting Android Application Vulnerabilities Based on the Compliance with Security Guidance[J]. Journal of Computer Research and Development, 2019, 56(11): 2315-2329. DOI: 10.7544/issn1000-1239.2019.20190348
    [4]Wang Lei, He Dongjie, Li Lian, Feng Xiaobing. Sparse Framework Based Static Taint Analysis Optimization[J]. Journal of Computer Research and Development, 2019, 56(3): 480-495. DOI: 10.7544/issn1000-1239.2019.20180071
    [5]Su Ning, Guo Junxia, Li Zheng, Zhao Ruilian. EFSM Amorphous Slicing Based Test Case Generation[J]. Journal of Computer Research and Development, 2017, 54(3): 669-680. DOI: 10.7544/issn1000-1239.2017.20151053
    [6]Ju Xiaolin, Jiang Shujuan, Chen Xiang, Zhang Yanmei, Shao Haoran. Factor Analysis of Influence for Fault Localization Framework Based on Slice Spectrum[J]. Journal of Computer Research and Development, 2014, 51(12): 2772-2787. DOI: 10.7544/issn1000-1239.2014.20131522
    [7]Wang Yawen, Yao Xinhong, Gong Yunzhan, Yang Zhaohong. A Method of Buffer Overflow Detection Based on Static Code Analysis[J]. Journal of Computer Research and Development, 2012, 49(4): 839-845.
    [8]Han Wei, He Yeping. Static Analysis of TOCTTOU Vulnerabilities in Unix-Style File System[J]. Journal of Computer Research and Development, 2011, 48(8): 1430-1437.
    [9]Ye Pengfei, Peng Xin, and Zhao Wenyun. Recovering the Use Case from Object-Oriented Programs by Static Analysis[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Bian Xiaofeng, Zhou Xuehai. Study on Modeling MIPS Processors for Static WCET Analysis[J]. Journal of Computer Research and Development, 2006, 43(10): 1828-1834.

Catalog

    Article views (831) PDF downloads (530) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return