Essay PreviewMore ↓
Each IP core has two segments to operate in communication and computation modes separately . On-chip packet switched interconnection architectures, called as NoCs, have been proposed as a solution for the communication challenges in these networks . NoCs relate closely to interconnection networks for high-performance parallel computers with multiple processors, in which each processor is an individual chip.
A NoC is a group of routers and switches that are connected to each other on a point to point short link to provide a communication backbone of the IP cores of a SoC. The most common template that proposed for the communication of NoC is a 2-D mesh network topology where each resource is connected with a router . In these networks, source nodes (an IP-Core), generate packets that include headers as well as data, then routers transfer them through connected links to destination nodes .
The wormhole (WH) switching technique proposed by Dally and Seitz  has been widely used in the interconnections such as , . In the WH technique, a packet is divided into a series of fixed-size parts of data, called flits. Wormhole routing requires the least buffering (flits instead of packets) and allows low-latency communication. To avoid deadlocks among messages, multiple virtual channels (VC) are simulated on each physical link . Each unidirectional virtual channel is realized by an independently managed pair of message buffers .
This paper presents a new routing algorithm for irregular mesh networks by base that enhances a previously proposed technique. The primary distinction between the previous method and the method presented in this paper is passing messages from ONs in the network. Simulation results show that utilization of network by e-xy and OAPR algorithm is worse than the improved one, i-xy. We have been simulated every three algorithms for 5% and 10% of oversized nodes with uniform and hotspot traffic.
How to Cite this Page
"Networking and Telecommunications." 123HelpMe.com. 18 Jul 2018
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Dow Chemical's Networking and Telecommunications Dow Chemical (www.dow.com) is a multinational Fortune 100 organization that has offices in over 170 countries. The company is involved in a wide range of markets that provide a diversified revenue stream of over $30 billion annually. Their business plan includes a $2 billion return of operating expenses through the application of breakthrough technology in their information systems. The center of this initiative is called DowNET and it is the first global wide information system to converge data, e-mail, faxes, video, and voice into a single network.... [tags: Business Analysis]
931 words (2.7 pages)
- Telecommunications and Networking Report 1.“Free Web Services Challenge AOL’s Dominance” - Internet business analysts generally are not yet convinced of the viability of the free web service business model for bring profitable. None-the-less, most agree that the free access will probably take a significant chunk of AOL’s market share before running out of investor’s money. 2.“Visitalk.com Builds White Pages for Web Phone Calls” - Visitalk.com has unveiled plans to simplify the routing of phone calls over the Internet.... [tags: Telecommunications Technology Essays]
4420 words (12.6 pages)
- Abstract: This short answer paper will be describing different aspects of Windows networking word accounts. The answers to the given questions will be giving a better understanding on how these different accounts are managed on Windows Networking Word. There are different types of accounts on Window networking such as: Group Accounts, User accounts, created accounts and built-in accounts. All of these accounts work together in the network. They each play different roles when it comes to the way each one of the accounts are used and managed as well as their different purpose on a network.... [tags: Networking Telecommunications]
1010 words (2.9 pages)
- The World of Telecommunications We are in the midst of a global information revolution driven by the convergence and proliferation of information and communication technologies. The telecommunications sector is changing at warp speed, driven by technological innovation that results in new equipment and services, and also by new entrants and alliances between companies with experience in a wide range of information industries from telecommunications to broadcasting to computer hardware and software to publishing.... [tags: Telecommunications Technology Internet Essays]
4689 words (13.4 pages)
- Directions: Select a topic from the case studies in the text. You may choose any of the topics, except those covered in previous assignments. Examples of topics you might investigate include: using telecommunications to keep in touch with co-workers; telecommunications innovation; managing telecommunications; emerging telecommunications technologies; and so on. Do independent research on your topic and present your findings in a 15-20 page position paper (based on the body of the paper, excluding references, abstracts, table of contents, etc).... [tags: Telecommunications]
1774 words (5.1 pages)
- Ethernet Networking in a Nutshell: First, we have to understand how Ethernet works. For a nicely summarized history as well as an explanation of the type of media it can run on, you can click here. Assuming everything is on the same network....... When a computer wants to talk to another computer on your network it 'listens' to see if there is any other traffic on the wire it is attached to. If it detects that it is all clear, it will send its traffic. Sometimes (and the likelihood increases the more computers you have on your network and the more heavily it is used) two hosts will send their data at the same time.... [tags: Telecommunications]
1156 words (3.3 pages)
- Our Project demonstration is based solely on wireless internet technology. Basically, what we set out to do was to prove that a wireless internet connection could actually be made, and that it could made to be, at least somewhat, secure. Our goals are listed below: 1.-Setup a wireless connection to the internet. 2.-Ensure that the connection can be made and that the signal will remain constant. 3-Using WEP(wired equivalent privacy), ensure that the wireless connection can be made secure. 4.-Test signal strengths at different levels of bandwidth and distances.... [tags: Telecommunications]
1088 words (3.1 pages)
- At this juncture, it may be somewhat difficult to accept the proposition that a threat to the telecommunications grid, both wired and wireless, in the United States could potentially be subject to a catastrophic cyber attack. After careful research on the subject, it appears the potentiality of an event of such magnitude, which either disrupts one or the other grids for a long period or destroys either, is both theoretically and realistically impossible. It may be that proponents—those who advance such theories—equate such “doomsday” scenarios as if a cyber attack would or could be of the same magnitude as a conventional or nuclear military strike.... [tags: Telecommunications Cyber Attacks]
878 words (2.5 pages)
- The telecommunications field is a vast field that contains terms and acronyms which can be confusing to those who are not familiar with the terminology. Therefore, the following paragraphs will compare and explain some common terms used when referring to the telecommunications field and will entail some old technology with some new. To be included within the discussion is comparisons of telephone dialing sounds, Wide Area Telecommunications Services (WATS) versus leased lines, Private Branch Exchanges (PBX) or Centrex, and the International Organization for Standardization-Open Systems Interconnection (ISO-OSI) model.... [tags: Research Paper Telecommunications]
1024 words (2.9 pages)
- Networking and Telecommunications Table of Contents Introduction Technology Involved Telephone System Network Setup Cost Sampling of Companies Possible Future Trends Global Implications Conclusion Introduction We have been hired to design a small network for a company that will utilize the newest technology out there and give each person the capability to work from the office as well as on the road. This company has ten people and will be working from home and on the road quite often. The best solution would be to set up a wireless network with additional security and the use if Internet Protocol phones.... [tags: essays research papers]
2249 words (6.4 pages)
The rest of the paper is organized as follows. In section II some deterministic-based routing algorithms are discussed. Then the new i-xy irregular routing algorithm is explained followed by Section III in which our experimental results are discussed. Finally, Section IV summarizes and concludes the work.
2 Irregular Routing
Routing is the act of passing on data from one node to another in a given scheme . Currently, most of the proposed algorithms for routing in NoCs are based upon deterministic routing algorithms which in the case of oversized nodes, cannot route packets. Since adaptive algorithms are very complex for Network-on-Chips, a flexible deterministic algorithm is a suitable one . Deterministic routing algorithms establish the path as a function of the destination address, always applying the same path between every pair of nodes. This routing algorithm is known as dimension-order routing (x-y routing). This routing algorithm routes packets by crossing dimensions in strictly increasing (or decreasing) order, reducing to zero the offset in one dimension before routing in the next one . To avoid deadlocks among messages, multiple virtual channels (VC) are simulated on each physical channel . But in this paper, we use no VCs in proposed algorithm and introduced a deadlock and live lock-free irregular routing algorithm.
Many algorithms have been suggested to operate in faulty conditions without deadlock and livelock. We can modify these algorithms to use in irregular interconnection networks. Some of these algorithms like , ,  and  are based on deterministic algorithms. In , Wu proposed a deterministic algorithm. This proposed algorithm uses odd-even turn model to pass the block faults. Also, the algorithm proposed by Lin et al.  uses above mentioned method. Since our proposed algorithm is similar to these algorithms (uses no virtual channel), in the next section, we are going to describe how these deterministic algorithms work and how we have improved them. The main idea describes in the rest of this section.