• Title/Summary/Keyword: interconnection network

Search Result 444, Processing Time 0.028 seconds

Matrix-Star Graphs : A New Interconnection Network Based on Matrix Operation (행렬-스타그래프 : 행렬연산에 기반한 새로운 상호 연결망)

  • Lee, Hyeong-Ok;Im, Hyeong-Seok
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.4
    • /
    • pp.389-405
    • /
    • 1999
  • 본 논문에서는 상호 연결망의 노드를 행렬로 표현하고 행렬연산을 이용하여 에지를 정의한 새로운 상호 연결망으로 행렬-스타 그래프를 제안한다. 행렬-스타 그래프는 널리 알려진 스타 그래프를 일반화한 그래프이다. 먼저, 행렬-스타 그래프의 노드를 2 $\times$ n 행렬로 표현한 행렬-스타 그래프 MS2,n 에 대하여 주요 망 척도인 분지수, 연결도, 확장성, 대칭성, 리우팅 ,지름 방송등을 분석한다. 다음으로, 행렬-스타 그래프 MS2,n의 노드를 2차원과 3차원으로 일반화한 행렬-스타 그래크 MSk,n과 MS k,n,p를 정의하고 행렬-스타그래프 MSk,n,p 의 라우팅 알고리즘과 지름을 분석한다. 상호연결망의 중요 망 척도중 하나는 망 비용이고 상호연결망의 망 비용은 그 연결망의 분지수와 지름의 곱으로 정의된다. star 그래프는 다른 상호 연결망보다 작은 망 비용을 갖는다. 최근에 제안된 Macro-Star 그래픈 star 그래프에 비해 상대적으로 망 비용이 작은 값을 갖는 연결망이다. (n2)!개의 노드를 갖는 행렬-스타 그래프 MSk,k,k(k={{{{ `^{ 3} SQRT { n$^2$} }}}} )와 ((n-1)2 + 1)!개의 노드를 갖는 Macro-Star 그래프 MS(n-1, n-1)의 망 비용은 행렬-스타그래프 MSk,k,k(k={{{{ `^{ 3} SQRT { n$^2$} }}}})는 O(n2,7)이고, Macro-Star 그래프 MS(n-1 , n-1)은 O(n3) 이다. 이는 행렬-스타 그래프가 스타 그래프와 Macro-Star 그래프보다 망비용이 우수함을 의미한다.

Optimal Voltage Regulation Method for Distribution Systems with Distributed Generation Systems Using the Artificial Neural Networks

  • Kim, Byeong-Gi;Rho, Dae-Seok
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.4
    • /
    • pp.712-718
    • /
    • 2013
  • With the development of industry and the improvement of living standards, better quality in power electric service is required more than ever before. This paper deals with the optimal algorithms for voltage regulation in the case where Distributed Storage and Generation (DSG) systems are operated in distribution systems. It is very difficult to handle the interconnection issues for proper voltage managements, because the randomness of the load variations and the irregular operation of DSG should be considered. This paper proposes the optimal on-line real time voltage regulation methods in power distribution systems interconnected with the DSG systems. In order to deliver suitable voltage to as many customers as possible, the optimal sending voltage should be decided by the effective voltage regulation method by using artificial neural networks to consider the rapid load variation and random operation characteristics of DSG systems. The simulation results from a case study show that the proposed method can be a practical tool for the voltage regulation in distribution systems including many DSG systems.

Many-to-Many Disjoint Path Covers in Double Loop Networks (이중 루프 네트워크의 다대다 서로소인 경로 커버)

  • Park Jung-Heum
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.8
    • /
    • pp.426-431
    • /
    • 2005
  • A many-to-many k-disjoint path cover (k-DPC) of a graph G is a set of k disjoint paths joining k distinct source-sink pairs in which each vertex of G is covered by a path. In this paper, we investigate many-to-many 2-DPC in a double loop network G(mn;1,m), and show that every nonbipartite G(mn;1,m), $m{\geq}3$, has 2-DPC joining any two source-sink pairs of vertices and that every bipartite G(mn;1,m) has 2-DPC joining any two source-sink pairs of black-white vertices and joining any Pairs of black-black and white-white vertices. G(mn;l,m) is bipartite if and only if n is odd and n is even.

The Effect of Mesh Interconnection Network on the Performance of Manycore System. (다중코어 시스템의 메쉬구조 상호연결망이 성능에 미치는 영향)

  • Kim, Han-Yee;Kim, Young-Hwan;Suh, Taeweon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.116-119
    • /
    • 2011
  • 다중코어(Many-Core) 시스템은 많은 코어들이 상호연결망을 통해서 연결되어있는 시스템으로, 단일코어나 멀티코어 시스템에 비해 보다 많은 병렬 컴퓨팅 자원을 지원한다. Amdahl 의 법칙에 의하면 병렬화되어 처리하는 부분은 이론적으로 프로세서의 개수에 비례하게 가속화 될 수 있지만, 상호연결망에서의 전송 지연을 비롯한 많은 요인에 의해서 성능의 가속화가 저해된다. 특히 캐시 일관성 규약(Cache Coherence Protocol)을 지원하는 대부분의 다중코어 시스템에서는 병렬화를 함에 있어서 캐시 미스로 인해 발생하는 데이터의 전송 지연이 성능에 많은 영향을 미칠 수 있다. 따라서 효과적인 병렬 프로그램을 위해서는 캐시 구조에 대한 이해를 바탕으로 상호연결망에 대한 연구가 필요하다. 본 논문에서는 메쉬(Mesh) 구조의 64 코어 다중코어 시스템인 TilePro64 를 이용하여 상호연결망의 데이터 전송 지연에 따른 프로그램 성능의 민감도를 측정하였다. 결과적으로 코어간 거리(Hop)가 늘어날수록 작업의 수행시간이 평균적으로 4.27%씩 선형적으로 증가하는 관계가 있는 것으로 나타났다.

An Optimized Cache Coherence Protocol in Multiprocessor System Connected by Slotted Ring (슬롯링으로 연결된 다중처리기 시스템에서 최적화된 캐쉬일관성 프로토콜)

  • Min, Jun-Sik;Chang, Tae-Mu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3964-3975
    • /
    • 2000
  • There are two policies for maintaining consistency among the multiple processor caches in a multiprocessor system: Write invalidate and Write update. In the write invalidate policy, whenever a processor attempt to write its cached block, it has to invalidate all the same copies of the updated block in the system. As a results of this frequent invalidations, this policy results in high cache miss ratio. On the other hand, the write update policy renew them, instead of invalidating all the same copies. This policy has to transfer the updated contents through interconnection network, whether the updated block is ptivate or not. Therefore the network suffer from heavy transaction traffic. In this paper we present an efficient cache coherence protocol for shared memory multiprocessor system connected by slotted ring. This protocol is based on the write update policy, but the updated contents are transferred only in case of updating the shared block. Otherwise, if the updated block is private, the updated contents are not transferred. We analyze the proposed protocol and enforce simulation to compare it with previous version.

  • PDF

Embedding algorithm among star graph and pancake graph, bubblesort graph (스타 그래프와 팬케익, 버블정렬 그래프 사이의 임베딩 알고리즘)

  • Kim, Jong-Seok;Lee, Hyeong-Ok;Kim, Sung-Won
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.5
    • /
    • pp.91-102
    • /
    • 2010
  • Star graph is a well-known interconnection network to further improve the network cost of Hypercube and has good properties such as node symmetry, maximal fault tolerance and strongly hierarchical property. In this study, we will suggest embedding scheme among star graph and pancake graph, bubblesort graph, which are variations of star graph. We will show that bubblesort graph can be embedded into pancake and star graph with dilation 3, expansion 1, respectively and pancake graph can be embedded into bubblesort graph with dilation cost O($n^2$). Additionally, we will show that star graph can be embedded into pancake graph with dilation 4, expansion 1. Also, with dilation cost O(n) we will prove that star graph can be embedded into bubblesort graph and pancake graph can be embedded into star graph.

  • PDF

Analysis of Metastability for the Synchronizer of NoC (NoC 동기회로 설계를 위한 불안정상태 분석)

  • Chong, Jiang;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.12
    • /
    • pp.1345-1352
    • /
    • 2014
  • Bus architecture of SoC has been replaced by NoC in recent years. Noc uses the multi-clock domains to transmit and receive data between neighbor network interfaces and they have same frequency, but a phase difference because of clock skew. So a synchronizer is used for a mesochronous frequency in interconnection between network interfaces. In this paper the metastability is defined and analyzed in a D latch and a D flip-flop to search the possibilities that data can be lost in the process of sending and receiving data between interconnects when a local frequency and a transmitted frequency have a phase difference. 180nm CMOS model parameter and 1GHz are used to simulate them in HSpice. The simulation results show that the metastability happens in a latch and a flip-flop when input data change near the clock edges and there are intermediate states for a longer time as input data change closer at the clock edge. And the next stage can lose input data depending on environmental conditions such as temperature, processing variations, power supply, etc. The simulation results are very useful to design a mescochronous synchronizer for NoC.

Application of Wavelet-Based RF Fingerprinting to Enhance Wireless Network Security

  • Klein, Randall W.;Temple, Michael A.;Mendenhall, Michael J.
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.544-555
    • /
    • 2009
  • This work continues a trend of developments aimed at exploiting the physical layer of the open systems interconnection (OSI) model to enhance wireless network security. The goal is to augment activity occurring across other OSI layers and provide improved safeguards against unauthorized access. Relative to intrusion detection and anti-spoofing, this paper provides details for a proof-of-concept investigation involving "air monitor" applications where physical equipment constraints are not overly restrictive. In this case, RF fingerprinting is emerging as a viable security measure for providing device-specific identification (manufacturer, model, and/or serial number). RF fingerprint features can be extracted from various regions of collected bursts, the detection of which has been extensively researched. Given reliable burst detection, the near-term challenge is to find robust fingerprint features to improve device distinguishability. This is addressed here using wavelet domain (WD) RF fingerprinting based on dual-tree complex wavelet transform (DT-$\mathbb{C}WT$) features extracted from the non-transient preamble response of OFDM-based 802.11a signals. Intra-manufacturer classification performance is evaluated using four like-model Cisco devices with dissimilar serial numbers. WD fingerprinting effectiveness is demonstrated using Fisher-based multiple discriminant analysis (MDA) with maximum likelihood (ML) classification. The effects of varying channel SNR, burst detection error and dissimilar SNRs for MDA/ML training and classification are considered. Relative to time domain (TD) RF fingerprinting, WD fingerprinting with DT-$\mathbb{C}WT$ features emerged as the superior alternative for all scenarios at SNRs below 20 dB while achieving performance gains of up to 8 dB at 80% classification accuracy.

A Study on gateway authentication protocol in IoT (IoT에서 게이트웨이에 대한 인증 프로토콜에 관한 연구)

  • Lee, Jae-Young
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.91-96
    • /
    • 2017
  • IoT which is an abbreviation of Internet of Things refers to the communication network service among various objects such as people-people, objects-objects interconnection. The characteristic of IoT that enables direct connection among each device makes security to be considered as more emphasized factor. Though a security module such as an authentication protocol for resolving various security problems that may occur in the IoT environment has been developed, some weak points in security are still being revealed. Therefore, this paper proposes a method for including a protocol including gateway authentication procedure and mutual authentication between the devices and gateways. Protocols with additional authentication procedures can appropriately respond to attackers' spoofing attacks. In addition, important information in the message used for authentication process is protected by encryption or hash function so that it can respond to wiretapping attacks.

Paid Peering: Pricing and Adoption Incentives

  • Courcoubetis, Costas;Sdrolias, Kostas;Weber, Richard
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.975-988
    • /
    • 2016
  • Large access providers (ISPs) are seeking for new types of business agreements and pricing models to manage network costs and monetize better the provision of last-mile services. A typical paradigm of such new pricing norms is the proliferation of paid peering deals between ISPs and content providers (CPs), while on top of this, some ISPs are already experimenting with usage-based tariffs, usually through data-plans, instead of the typical fixed-based charging. In this work we define as common platform, the infrastructure in which a single ISP transacts with several CPs through peering agreements. In this context, we examine whether, and under which market conditions, the profitability of the involved stakeholders improves when the establishment of this platform is accompanied by a monetary compensation from the CPs to the ISP (paid peering), v.s. a scenario where their deal is a typical settlement-free one. In both cases, we assume that the ISP implements a usage-based access pricing scheme, implying that end-users will pay more for higher transaction rates with the CPs. Our framework captures some of the most important details of the current market, such as the various business models adopted by the CPs, the end-users' evaluation towards the ISP's and CPs' level of investments and the traffic rates per transaction for the offered services. By analysing the equilibrium derived by a leader-follower game, it turns out (among other practical takeaways) that whether or not the profitability of a CP improves, it highly depends on whether its business model is to sell content, or if it obtains its revenue from advertisements. Finally, we extract that consumer surplus is considerably higher under paid peering, which in turn implies improved levels of social welfare.