• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zheng Yanfeng, Sun Shutao, He Simin, Gao Wen. A Dual Round-Robin Algorithm for Combined Input-Crosspoint-Queued Switches[J]. Journal of Computer Research and Development, 2006, 43(7): 1225-1232.
Citation: Zheng Yanfeng, Sun Shutao, He Simin, Gao Wen. A Dual Round-Robin Algorithm for Combined Input-Crosspoint-Queued Switches[J]. Journal of Computer Research and Development, 2006, 43(7): 1225-1232.

A Dual Round-Robin Algorithm for Combined Input-Crosspoint-Queued Switches

More Information
  • Published Date: July 14, 2006
  • The CICQ switch fabric is an ideal solution to multi-terabit switch implementation owing to its nice distributed scheduling property. Round-robin algorithms have been extensively studied because of their simplicity for hardware implementation. It is known that round-robin algorithms provide high throughput under uniform traffic; however, the performance is degraded under nonuniform traffic. In this paper, the reason for the performance degradation of the existing round-robin algorithms is pointed out and then a class of dual round-robin algorithms is proposed. For the proposed algorithms, each input arbiter is associated with dual round-robin pointers named the primary pointer and the secondary pointer respectively. The input queue corresponding to the primary pointer has the highest priority being scheduled, and the decision for updating the primary pointer can be dynamically made relying on the input queue status. When the input queue corresponding to the primary pointer is blocked, other input queues can be uniformly scheduled according to the secondary pointer position. Simulations show that the dual round-robin algorithms can significantly improve the performance of the CICQ switch under nonuniform traffic.
  • Related Articles

    [1]Zhang Huanhuan, An Congkai, Zhao Langcheng, Zhou Anfu, Ma Huadong, Yuan Yi, Cao Ning. Algorithmic Intelligence Right Management Method in Video Cloud-Network Platform[J]. Journal of Computer Research and Development, 2023, 60(4): 828-838. DOI: 10.7544/issn1000-1239.202330023
    [2]Huang Xiaohui, Li Dong, Shi Hailong, Cui Li. EasiRCC: A Method of Rule-Matching and Conflict Resolution for Smart Home[J]. Journal of Computer Research and Development, 2017, 54(12): 2711-2720. DOI: 10.7544/issn1000-1239.2017.20160646
    [3]Luo Jun, Zhao Chuanzhi, Wang Fei. An Efficient Privilege Manage Method Based on RBAC[J]. Journal of Computer Research and Development, 2016, 53(5): 1000-1008. DOI: 10.7544/issn1000-1239.2016.20148288
    [4]Wang Lina, Ren Zhengwei, Dong Yongfeng, Yu Rongwei, Deng Ruyi. A Management Approach to Key-Used Times Based on Trusted Platform Module in Cloud Storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1628-1636.
    [5]Bao Yibao, Yin Lihua, Fang Binxing, Guo Li. Logic-Based Dynamical Security Policy Language and Verification[J]. Journal of Computer Research and Development, 2013, 50(5): 932-941.
    [6]Hu Jun and Li Zhiang. A Policy-Oriented Cooperation Model in Agent Organization[J]. Journal of Computer Research and Development, 2012, 49(7): 1474-1493.
    [7]Ning Zhao, Shi Shengfei, Li Jianzhong, Wang Chaokun. Multi-resolution Data Storage Method for Region Query in Sensor Networks[J]. Journal of Computer Research and Development, 2012, 49(3): 589-597.
    [8]Tang Chenghua, Yu Shunzheng. Verifying Network Security Policy Based on Features[J]. Journal of Computer Research and Development, 2009, 46(11): 1854-1861.
    [9]Hu Ning, Zou Peng, and Zhu Peidong. A Cooperative Mechanism for Inter-Domain Routing Management[J]. Journal of Computer Research and Development, 2009, 46(8): 1251-1259.
    [10]Yao Jian, Mao Bing, and Xie Li. A DAG-Based Security Policy Conflicts Detection Method[J]. Journal of Computer Research and Development, 2005, 42(7): 1108-1114.

Catalog

    Article views (695) PDF downloads (528) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return