Deterministic k Routing on Meshes With Applications to Worm Hole Routing

نویسندگان

  • Jop F Sibeyn
  • Michael Kaufmann
چکیده

In k routing each of the n processing units of an n n mesh connected computer initially holds packet which must be routed such that any processor is the destination of at most k packets This problem re ects practical desire for routing better than the popular routing of permutations k routing also has implications for hot potato worm hole routing which is of great importance for real world systems We present a near optimal deterministic algorithm run ning in p k n O n steps We give a second algo rithm with slightly worse routing time but working queue size three Applying this algorithm considerably reduces the routing time of hot potato worm hole routing Non trivial extensions are given to the general l k routing problem and for routing on higher dimensional meshes Fi nally we show that k k routing can be performed in O k n steps with working queue size four Hereby the hot potato worm hole routing problem can be solved in O k n

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Worm-Hole Gossiping on Meshes

Several algorithms for performing gossiping on one-and higher dimensional meshes are presented. As a routing model, we assume the practically important worm-hole routing. For one-dimensional arrays, we give a novel lower bound and an asymptotically optimal gossiping algorithm. For two-dimensional meshes, we present a simple algorithm composed of one-dimensional phases. For an important range of...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

A Note on Deflection Worm Routing on Meshes

We prove the existence of asymptotically optimal routing schedules for deflection worm routing of permutations on n× n meshes. We achieve this by deriving an off-line algorithm which routes permutations in O(kn) steps where k is the number of flits of a worm. The best to date off-line algorithms for deflection worm routing of permutations were due to Newman and Schuster (1995) and Sibeyn and Ka...

متن کامل

A General Method for Deflection Worm Routing on Meshes Based on Packet Routing Algorithms

| In this paper, we consider the deeection worm routing problem on n n meshes. In deeection routing a message cannot be queued and it is always moving until it reaches its destination. In worm routing, the message is considered to be a worm; a sequence of k its which, during the routing, follow the head of the worm which knows the destination address. We show how to derive a deeection worm rout...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013