A traffic-aware memory-cube network using bypassing

نویسندگان

چکیده

Three-dimensional stack memory which provides both high-bandwidth access and large capacity is a promising technology for next-generation computer systems. While number of cubes increase the aggregate capacity, communication latency power consumption significantly owing to its low-radix large-diameter packet network. In this context, we propose memory-cube network called Diagonal Memory Network (DMN). A diagonal topology, floor layout, lightweight router were designed low-latency low-voltage memory-read communication. DMN routing efficiently avoids deadlocks packets, although it allows each transmitted processor use bypassing original datapaths. Our evaluation results show that decreases hardware resources by more than 31% compared with conventional virtual channel router. The reduces energy 13% 67% transit along datapath datapath, respectively. Furthermore, using flit-level discrete event simulation, topology achieves high throughput lower existing topologies routers.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Traffic-redundancy aware network design

We consider network design problems for information networks where routers can replicate data but cannot alter it. This functionality allows the network to eliminate data-redundancy in traffic, thereby saving on routing costs. We consider two problems within this framework and design approximation algorithms. The first problem we study is the traffic-redundancy aware network design (RAND) probl...

متن کامل

Privacy-aware contextual localization using network traffic analysis

The rise of location-based services has enabled many opportunities for content service providers to optimize the content delivery to user’s wireless devices based on her location. Since the sharing precise location remains a major privacy concern among the users, certain location-based services rely on contextual location (e.g. residence, work, etc.) as opposed to acquiring user’s exact physica...

متن کامل

Bypassing Network Flooding Attacks using FastPass

We describe the design and implementation of FastPass, a next-generation network architecture that thwarts bandwidth flooding attacks by providing destinations with finegrained control over their upstream network capacity. Prior attempts to achieve network flood resilience have required destinations to successfully receive an initial unprotected packet (capability-based designs) or have relied ...

متن کامل

Optimal Memory - aware Sensor Network

Gossiping is an important problem in Radio Networks that has been well studied, leading to many important results. However, due to the strong resource limitations of sensor nodes, previous solutions are frequently not feasible in Sensor Networks. In this paper, we study the gossiping problem in the restrictive context of Sensor Networks. By exploiting the geometry of sensor node distributions, ...

متن کامل

NPA-BT: A Network Performance Aware BitTorrent Traffic Optimization Mechanism

More than half of today’s Internet traffic is generated by P2P applications, and most of which is the BitTorrent file sharing traffic. The random neighbor selection mechanism of BT puts unprecedented pressure on the network operators and service providers. In this paper firstly we give a theoretical analysis on the impact of neighbor selection mechanism on BitTorrent performance as well as netw...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Microprocessors and Microsystems

سال: 2022

ISSN: ['0141-9331', '1872-9436']

DOI: https://doi.org/10.1016/j.micpro.2022.104471