The Token Flow Model 22 of 22

نویسندگان

  • D. G. Messerschmitt
  • E. A. Lee
چکیده

Dataflow graphs that are strongly consistent and have finite complete cycles can always be scheduled statically and executed in bounded memory. Some strongly consistent graphs without finite complete cycles can also be executed in bounded memory. We have described a clustering technique that can identify such graphs and construct their schedules. However, some perfectly correct graphs may not fit the models described. To execute these, we must resort to the much more costly methods of dynamic scheduling and memory allocation. Nonetheless, even within such uncooperative graphs, large subgraphs are likely to be consistent and have finite complete cycles. These subgraphs should be statically scheduled and memory should be statically allocated. The cost of dynamic scheduling and memory allocation should be incurred only where absolutely necessary. do { fire ; } while (= TRUE); Treated as a unit, the cluster always consumes and produces exactly one token, so the resulting schedule is. For this purpose, the " state " of a dataflow graph has two components, the number of tokens on each arc, and the value of any Boolean tokens on Boolean arcs. An alternative approach is to construct a schedule with the repetition vector given by (34) with , and observe that two possible states can result from executing this schedule. One of these states is the original state, denoted. The second is a new state, , shown in figure 17. If a schedule with repetition vector (34) is applied to the starting state , then exactly two ending states are possible, and. Consequently, a schedule with repetition vector (34) can be repeated indefinitely with no difficulty. Yet a third alternative approach is to construct a preamble, or initial schedule that transforms the graph into one that has no delays on Boolean arcs. For the graph in figure 16, firing actors 1 and 2 constitute such a preamble. After the preamble has executed, then ordinary scheduling methods can be applied. All three methods fail, however, for the graph in figure 13. The number of states that would need to be considered is unbounded. For this graph, we offer no alternative to dynamic scheduling with dynamic memory allocation. However, the clustering algorithm still finds well-behaved substructures in the graph; by clustering the graph as much as possible, we reduce the amount of dynamic memory allocation and scheduling that is required. Some complex and irregular graphs will not be successfully clustered by …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An NoC Traffic Compiler for Efficient FPGA Implementation of Sparse Graph-Oriented Workloads

Parallel graph-oriented applications expressed in the Bulk-Synchronous Parallel (BSP) and Token Dataflow compute models generate highly-structured communication workloads from messages propagating along graph edges. We can statially expose this structure to traffic compilers and optimization tools to reshape and reduce traffic for higher performance (or lower area, lower energy, lower cost). Su...

متن کامل

A Fast Token-Chasing Mutual Exclusion Algorithm in Arbitrary Network Topologies

Since this problem was first studied by Lann [8] and Lamport [7], it has been extensively investigated for about 20 years. Many algorithms have been proposed to reduce the number of messages, to minimize the access time to the critical region (CR), or to enhance reliability (e.g., [5, 12, 16, 22, 26, 27]). In general, mutual exclusion algorithms are divided into two classes: the permission-base...

متن کامل

Estimating the Parameters for Linking Unstandardized References with the Matrix Comparator

This paper discusses recent research on methods for estimating configuration parameters for the Matrix Comparator used for linking unstandardized or heterogeneously standardized references. The matrix comparator computes the aggregate similarity between the tokens (words) in a pair of references. The two most critical parameters for the matrix comparator for obtaining the best linking results a...

متن کامل

Network Traffic Characterization Using Token Bucket Model

This paper investigated the problem of deriving token bucket parameters from the observed traffic patterns of computer network flows in two cases. In the basic case, we identified the set of token bucket parameters for any given flow so that all the packets in the flow will be delivered immediately without incurring any delay or loss. Then, we extended the basic case by adding a queue to the to...

متن کامل

The Security Advantages of Hardware Tokens over Software Tokens for PKI Applications

.......................................................................................................3 Background ..................................................................................................4 Soft Tokens and Their Vulnerabilities ..........................................................5 Hardware Tokens and Smart Cards ......................................................

متن کامل

An Improved Token-Based and Starvation Free Distributed Mutual Exclusion Algorithm

Distributed mutual exclusion is a fundamental problem of distributed systems that coordinates the access to critical shared resources. It concerns with how the various distributed processes access to the shared resources in a mutually exclusive manner. This paper presents fully distributed improved token based mutual exclusion algorithm for distributed system. In this algorithm, a process which...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1992