Tolerating Multiple Faults in Multistage Interconnection Networks with Minimal Extra Stages
|
|
|
- Eugene Hall
- 10 years ago
- Views:
Transcription
1 998 IEEE TRANSACTIONS ON COMPUTERS, VOL. 49, NO. 9, SEPTEMBER 2000 Tolerating Multiple Faults in Multistage Interconnection Networks with Minimal Extra Stages Chenggong Charles Fan, Student Member, IEEE, and Jehoshua Bruck, Senior Member, IEEE AbstractÐIn their 1982 paper, Adams and Siegel proposed an Extra Stage Cube Interconnection Network that tolerates one switch failure with one extra stage. We extend their results and discover a class of Extra Stage Interconnection Networks that tolerate multiple switch failures with a minimal number of extra stages. Adopting the same fault model as Adams and Siegel, the faulty switches can be bypassed by a pair of demultiplexer/multiplexer combinations. It is easy to show that, to maintain point to point and broadcast connectivities, there must be at least f extra stages to tolerate f switch failures. We present the first known construction of an Extra Stage Interconnection Network that meets this lower-bound. This n-dimensional Multistage Interconnection Network has n f stages and tolerates f switch failures. An n-bit label called mask is used for each stage that indicates the bit differences between the two inputs coming into a common switch. We designed the fault-tolerant construction such that it repeatedly uses the singleton basis of the n-dimensional vector space as the stage mask vectors. This construction is further generalized and we prove that an n-dimensional Multistage Interconnection Network is optimally fault-tolerant if and only if the mask vectors of every n consecutive stages span the n-dimensional vector space. Index TermsÐMultistage Interconnection Networks (MIN), fault tolerance, extrastage, switch faults, stage masks. 1 INTRODUCTION æ MULTISTAGE Interconnection Network (MIN) has enjoyed important applications in fields such as telecommunications and parallel computing in the past decades [1], [4], [10], [12], [13]. The faulttolerant capabilities of MIN have been widely studied. In 1982, Adams and Siegel introduced the Extra Stage Cube [2], a construction that tolerates one switch failure with one additional switching stage. In this paper, we study how to construct Multistage Interconnection Networks to tolerate multiple switch faults with extra stages. The main result of this paper is the discovery of a class of constructions that tolerates multiple switch faults with a minimal number of redundant switching stages. Many types of cube-type Multistage Interconnection Networks have been proposed, such as the baseline, delta, generalized cube, indirect binary n-cube, omega, and shuffleexchange. It has been proven that these cube-type MINs are topologically equivalent [3]. We will focus our attention on one particular construction, shown in Fig. 1. This MIN allows pointto-point connection from an input node to any output nodes. There is only one path between a pair of nodes. When there is a fault on that path, the communication will fail. A 2 2 switch is a common building block of this MIN. For point to point connections, the 2 2 switch operates in either the straight mode or the exchange mode, as illustrated by Fig. 2. Two additional broadcast modes of operations exist to enable one node to send a message simultaneously to all other nodes (Fig. 3). Two connectivity models are considered in this paper, namely, the point-to-point connectivity between any two nodes and the. The authors are with the Department of Electrical Engineering, California Institute of Technology, Pasadena, CA {fan, bruck}@paradise.caltech.edu. Manuscript received 27 Oct. 1997; revised 15 Mar. 1999; accepted 21 June For information on obtaining reprints of this article, please send to: [email protected], and reference IEEECS Log Number broadcast connectivity. In this paper, we will first prove the results for the point-to-point connections. The results will then be extended to the broadcast case. We assume the same fault model as the Adams and Siegel paper. When a switch is at fault, it is stuck in the straight mode. This fault model can be implemented by using two demultiplexor/ multiplexor pairs for each 2 2 switch. The multiplexors and the demultiplexors are assumed to be fault-free. In the solution proposed by Adams and Siegel, not all switches need to be accompanied by these demultiplexor/multiplexor pairs. Only the switches in the first and last stages need them. Similarly, for the solutions proposed in this paper, they may not be needed for all switches. Only the switches in the first and last f stages need them to tolerate f switch faults. For the MIN in Fig. 1, there are three stages of 2 2 switches that interconnect the eight nodes. Each node is labeled by a binary vector. The length of this vector, n, is the dimension of the MIN. Clearly, n ˆ log 2 N, where N is the number of nodes in the MIN. Each switch is also characterized by an n-bit vector, called a ªmask.º The mask indicates the difference between the two input nodes, B A. This difference is obtained by modular-2 vector subtraction. Notice that all switches in the same stage have the same masks, therefore we can associate the entire stage with a single stage mask, shown above each stage in the figure. In this example, The MIN has the singleton mask set: fm 1 ˆ 001;m 2 ˆ 010;m 3 ˆ 100g. This mask set forms a basis of the three-dimensional space, therefore all vectors in this space can be represented as a linear combination of the masks. In other words, this mask set spans the three-dimensional vector space. Consequently, we can find a path between any pair of nodes by using the following routing algorithm: To route a connection between node A and node B, we decompose the difference between A and B into a linear combination of the masks. B A ˆ Xn iˆ1 c i m i : The switches in stage i operates in the straight mode if c i ˆ 0 and in the exchange mode if c i 6ˆ 0. Shown in the bottom half of Fig. 1 is the Bar Diagram [8] representation of the same MIN. Each node in the MIN is represented by a horizontal bar in the Bar Diagram and each switch is represented by a vertical bar. A broken vertical bar in the diagram indicates a faulty switch in the MIN. Connectivity exists between two nodes if and only if a path can be found between these two nodes. Such a path must use at most one switch at each stage and must not change direction inside the MIN, as shown in the figure. Tolerating f switch faults in the MIN is equivalent to tolerating f broken vertical bars in the Bar Diagram. To tolerate broken vertical bars in the Bar Diagram, we need to find disjoint paths between any pair of nodes. Two paths are disjoint in a Bar Diagram if they share no vertical bars. To tolerate f broken vertical bars, it is sufficient and necessary to find f 1 mutually disjoint paths between all pairs of nodes. It is sufficient because f broken vertical bars can at most break f disjoint paths and there is at least one path left between each pair of nodes. It is necessary because if only f disjoint paths can be found between some pair, f broken vertical bars can break all of them, and destroy the connectivity between that pair. In the MIN shown in Fig. 1, one and only one path can be found between any pair of nodes. Therefore, it cannot tolerate switch faults. To make this MIN single-fault-tolerant, redundant stages need to be added. This problem of tolerating a single switch fault with extra stages has been investigated extensively in the past. Adams and Siegel first proposed a solution, called Extra Stage Cube (ESC) [2]. Xu and Shen proposed a solution, which can be viewed as adding an extra stage with an all-1 mask [16]. An /00/$10.00 ß 2000 IEEE
2 IEEE TRANSACTIONS ON COMPUTERS, VOL. 49, NO. 9, SEPTEMBER Fig. 1. A three-dimensional Multistage Interconnection Network using 2 2 switches. example of single-fault-tolerant MIN with eight nodes is shown in Fig. 4. Adams and Siegel showed that the ESC tolerates one switch fault by finding two disjoint paths between all pairs of nodes. There is another simple way to see that ESC is one-fault-tolerant. After a switch fault occurs, even if we discard the entire stage that contains the faulty switch, the masks of the remaining three stages still span the space. Therefore, the difference between any pair of nodes can still be decomposed into a linear combination of the remaining three masks and a correct routing is therefore available by using the three surviving stages. Two disjoint paths between 000 and 110 are outlined in the figure. This scheme, in essence, tolerates a stage fault, i.e., it tolerates any number of switch faults if all of them occur in the same stage. The ESC solution does not, however, tolerate two switch faults when they occur in different stages. This is not a unique solution to the single-fault-tolerant problem. There exist other solutions that tolerate a single switch fault. We present one of these solutions in Fig. 5. This is also a one-extra-stage construction and the extra stage is masked 001. This MIN does not tolerate a stage fault since erasing stage 010 or stage 100, the masks of the three remaining stages, does not span the space. But, this MIN can indeed tolerate a single switch fault. The two disjoint paths between 000 and 110 are outlined in the figure as an example. The problem of tolerating stage faults has been investigated in previous research works [5], [14]. Bruck and Ho correlated the problem of fault-tolerant MIN to the results in the field of Error- Correcting Codes and proved that a MIN constructed according to a (n, k, d) code can tolerate d-1 switch faults, as well as stage faults [5]. It showed that a fault-tolerant MIN constructed according to an MDS code uses an optimum number of extra stages to tolerate f stage faults. Despite extensive research in the field [6], [7], [9], [11], [12], [15], constructions that use a minimal number of extra stages to tolerate f switch faults, f>1, had not been proposed. The two examples we showed led us to consider the following questions: Are the existing solutions the best we can do in tolerating switch faults? If not, what is? Furthermore, if we are able to find optimal constructions, are those constructions the only solutions? The answers to all of these questions are the main contributions of this paper. In Section 2, we propose a construction of fault-tolerant Multistage Interconnection Networks that uses an optimal number of extra stages to tolerate f switch faults. In that section, we first prove that, to tolerate f switch faults, at least f extra stages must be added. None of the previously proposed constructions meets this Fig. 2. The modes of operation for point to point connection on a 2 2 switch.
3 1000 IEEE TRANSACTIONS ON COMPUTERS, VOL. 49, NO. 9, SEPTEMBER 2000 Fig. 3. The modes of operation for broadcast connection on a 2 2 switch. Fig. 4. Three-dimensional one-extra-stage Extra Stage Cube (ESC) Network. Fig. 5. Three-dimensional one-extra-stage Cyclic Multistage Interconnection Network. lower bound when f is greater than 1. We then propose a new construction that meets this lower bound. The routing algorithm is also given in that section. We will also show that this construction is easy to implement in practice. In Section 3, we generalize the construction proposed in Section 2 and prove a necessary and sufficient condition for MINs to tolerate any given number of switch faults with an optimal number of extra stages. While we focus on the MINs that use 2 2 switches under the point to point connection model in Section 2 and Section 3, we extend the results to the Mulstistage Interconnection Networks that use t t switches and MINs under the broadcast model in Section 4. In Section 5, we conclude.
4 IEEE TRANSACTIONS ON COMPUTERS, VOL. 49, NO. 9, SEPTEMBER Fig. 6. Three-dimensional four-extra-stage Cyclic Multistage Interconnection Network. 2 AN OPTIMAL CONSTRUCTION We first present the following theorem which states the lower bound on the number of extra stages required to tolerate f switch faults for MINs with t t switches. Theorem 1. To tolerate f switch faults in an n-dimensional Multistage Interconnection Network with t t switches, at least f extra stages must be added. Proof. (by contradiction) Suppose only f 1 extra stages were added. When f failures occur at the switches that are connected to node 0 in the first f stages, the first f stages are completely paralyzed in connecting node 0 to other nodes. Only n 1 stages can be used to connect node 0 to the other t n 1 nodes. It is clearly not possibl, since, with n 1 stages, at most t n 1 nodes can be reached. tu None of the previously proposed MINs meets this lower bound for any given f. For example, the ESC solution only works for f ˆ 1 [2]; the number of switch faults that the Error-Correcting Code solutions tolerate is in general less than the redundant stages required [5]. Now, we present a new construction of MINs with 2 2 switches that meets this lower bound. Definition 1 (Cyclic Multistage Interconnection Networks). An n; f Cyclic Multistage Interconnection Network is an n-dimensional f-extra-stage MIN which has the singleton basis of the n-dimensional binary vector space as the masks of its first n stages and m n i ˆ m i for 1 i f, where m i is the mask vector of stage i. A (3, 4) cyclic Multistage Interconnection Network is illustrated in Fig. 6. The following theorem implies that this MIN tolerates four faults, therefore meets the lower bound stated in Theorem 1. The five mutually disjoint paths can be found between any pair of nodes. In the figure, the paths between node 000 and node 110 are outlined. Theorem 2. An n; f Cyclic Multistage Interconnection Network with 2 2 switches tolerates f switch faults. Proof. We will prove the theorem by explicitly showing that between any two nodes, A and B, A 6ˆ B, there are f 1 mutually disjoint paths in the Bar Diagram. Two paths are disjoint if they share no vertical bars in the Bar diagram. In other words, there is a conflict if and only if one switch operates in the exchange mode in two different paths. Please note that, in this proof, the nodes A and B and the masks fm 1 ;m 2 ;...;m n f g are n-bit binary vectors and all arithmatic operations between them are bitwise mod-2 additions. We construct the f 1 paths as follows: In path i, 1 i f, the switch in stage i operates in the exchange mode. Stages i 1 through i n are used to route the path to destination B. This is possible because every n consecutive masks in the Cyclic MIN span the n-dimensional binary vector space by definition. The switches in all other stages operate in the straight mode. In the last path, path f 1, the switches in stages 1 through f operate in the straight mode and the switches in stages f 1 through n f route the path from node A to node B. Fig. 7 illustrates this construction. Now, we need to show that these paths are mutually disjoint from each other. To prove that, we will prove that path i, 1 i f 1, is disjoint from path j, 1 j<i. Three cases are considered: Case 1: j<i n, there are no common stages in which both paths operate in the exchange mode. Therefore, path i and path j are disjoint. Case 2: j ˆ i n, the only stage of possible conflict is in stage i if both path j and path i perform the exchange operation on the same switch in this stage. We know that, in stage i, by construction, path i is switching from node A to some node and path j is switching from some node to node B. Given A 6ˆ B, the only possibility of conflict is that both paths are switching from A to B. It is not possible. Path j switches from A to some other node at stage j and, because of the fact that n consecutive masks in a Cyclic MIN are linearly independant, path j will not reach A until after stage i. Therefore, path i and path j are disjoint. For i n<j<i, the two paths are disjoint until stage j n since path j exchanges at stage j while path i goes straight and they differ at bit j mod n. After stage j n, they must agree on bit j mod n since they must reach the same destination B. Therefore, only one of the two paths will use the switch at stage j n. Consequently, path i and path j are disjoint. Hence, the f 1 paths from A to B are mutually disjoint and a n; f Cyclic Multistage Interconnection Networks tolerates f switch faults. tu Theorem 2 shows that the performance of Cyclic Multistage Interconnection Networks meets the lower bound stated in Theorem 1. In other words, this construction is optimal in the number of extra stages used to tolerate any given number of switch faults. Notice that, in the construction of the Cyclic Multistage Interconnection Networks, the f 1 paths share horizontal lines only in the first f and last f stages. This indicates that the demultiplexor/multiplexor pairs that enable the stuck in straight fault model are only needed for those stages. Routing in the Cyclic Multistage Interconnection Network is performed by routing tags. [2]. The routing tag is a binary vector composed of the coefficients obatained by decomposing the difference between the source and destination into the linear combinations of the stage masks. The tag is computed at the source node only once and is attached to each message. The ith bit in the tag in turn determines whether the switch in ith stage operates in the exchange or the straight mode. The proof for Theorem 2
5 1002 IEEE TRANSACTIONS ON COMPUTERS, VOL. 49, NO. 9, SEPTEMBER 2000 Fig. 7. Construction of f 1 disjoint paths. Fig. 8. Three-dimensional 4-extra-stage Generalized Cyclic Multistage Interconnection Network. explicitly gives the construction of f 1 disjoint paths between any two nodes. Therefore, for a source node in a failure-free situation, there are f 1 sets of routing tags to each destination. A message can be sent by selecting any one out of the f 1 tags. When a switch failure occurs, it should be detected by the source node and the route that uses the faulty switch is eliminated from the tag selections. This tag elimination process only occurs once for each failure, thus it is not computationally intensive for the source node. In practice, it is easy to use the advantage of the Cyclic Multistage Interconnection Networks. For example, the manufacturer can build demultiplexor/multiplexor pairs around each 2 2 switch for the n-dimensional MIN, then, by putting two of them together head-to-tail, you have an n-fault-tolerant MIN. 3 A NECESSARY AND SUFFICIENT CONDITION FOR OPTIMAL FAULT TOLERANCE In Section 2, we introduced the Cyclic Multistage Interconnection Network that demonstrates optimal performance in tolerating any number of switch faults. The construction, however, is not unique. In this section, we extend the results to a more general class of fault-tolerant Multistage Interconnection Networks, named Generalized Cyclic Multistage Interconnection Networks. Definition 2 (The Generalized Cyclic Multistage Interconnection Network). An n; f Generalized Cyclic Multistage Interconnection Network is an n-dimensional f-extra-stage Multistage Interconnection Network which has the property that the masks of every n consecutive stages span the n-dimensional vector space. Fig. 8 illustrates a (3, 4) generalized cyclic MIN using a nonsingleton and nonrepetitive mask set. The five disjoint paths between node 000 and node 110 are shown in the illustration. Clearly, the Cyclic MINs is a subclass of the Generalized Cyclic MINs. We will prove that the Generalized Cyclic MINs have the same fault tolerance capabilities as the Cyclic MINs, namely, they tolerate f faults with f extra stages. In addition, it is the necessary condition for a Multistage Interconnection Networks to demonstrate the optimal fault-tolerance capability. Theorem 3. An n-dimensional f-extra-stage Multistage Interconnection Network with 2 2 switches tolerates f switch faults if and only if the masks of every n consecutive stages span the n-dimensional vector space. Proof. We prove the forward direction of the theorem by contradiction. Suppose an n-dimensional f-extra-stage Multistage Interconnection Network does not have the property that the masks of any n consecutive stages span the space. There exists n consecutive stages in the MIN whose masks do not span the n-dimensional space. We can find node A and B, between which a path cannot be found in the nonspanning n stages. Suppose the faults happen on the switches of the remaining f stages at both sides of these n nonspanning stages in such a way that all the faults before the n stages happen at switches connected to node A and all the faults after the n stages
6 IEEE TRANSACTIONS ON COMPUTERS, VOL. 49, NO. 9, SEPTEMBER Fig. 9. Extension to the MINs with 3 3 Switching Elements. Fig. 10. Survived broadcast tree in the presence of four faults in a (3,4) Cyclic MIN. happen at switches connected to node B. The communication between A and B fails. Therefore, an n-dimensional f-extrastage MIN tolerates f switch faults only if the masks of every n consecutive stages span the n-dimensional vector space. The proof of the backward direction is similar to the proof of Theorem 2. The construction of the f 1 paths from node A to node B are the same. We need to show that these paths are all mutually disjoint from each other. Again, we prove that path i, i f 1, is disjoint from path j, j<i, by considering three cases: Case 1: j<i n, there are no common stages that the switch in the stage operates in exchange mode for both paths. Therefore, path i and path j are disjoint. Case 2: j ˆ i n, the two paths share stage i. We know that path j exchanges at stage j, while path i goes straight. Since any n consecutive masks are linearly independent, m j cannot be represented by a linear combination of m j 1 through m i 1. Therefore, the two paths are disjoint until stage i and the only way that the two paths conflict is that, at stage i, path j exchanges from A m i to A while path i exchanges from A to A m i. But, it is not possible since path j must reach B after ith stage and A 6ˆ B. Therefore path i and path j are disjoint. For i n<j<i, since path j exchanges at stage j while path i goes straight, the two paths are disjoint until stage j n with the same reasoning as the previous case. At stage j n, only one of the two paths exchanges since they must reach the same destination. Therefore, path i and path j are disjoint. tu 4 EXTENSIONS In this section, we will make two extensions to the results presented in the previous sections. First, instead of looking at Multistage Interconnection Networks with 2 2 Switching Elements, we will show that the theorems presented in the previous sections also apply to the MINs consisting of t t Switching Elements. Following that, we will show that the results are also valid if we are to guarantee the broadcast capabilities of the network. Let us look at a 9-node 3-extra stage 2; 3 generalized cyclic Multistage Interconnection Network consisting of 3 3 switches.
7 1004 IEEE TRANSACTIONS ON COMPUTERS, VOL. 49, NO. 9, SEPTEMBER 2000 Fig. 9 shows the four mutually disjoint paths from node 00 to node 20. Theorem 4. An n-dimensional f-extra-stage Multistage Interconnection Network with t t switches tolerates f switch faults if and only if the masks of every n consecutive stages span the n-dimensional vector space. Proof. The proof of the forward direction is the same as the proof for the 2 2 case. To prove the backward direction, we similarly construct f 1 paths from node A to node B and prove that they are disjoint. The difference lies in the construction of the first f paths. The reason for the modification is that a 2 2 switch can only go straight or exchange, while a t t switch has t ways of switching. We say a switch is in mode s if, for that switch: output ˆ input s mask 0 s t 1: 2 In this proof, all vector operations are mod-t. In the construction of path i, i f, we decompose the n-dimensional vector B A into a linear combinations of the masks fm i ;m i 1 ;...;m i n 1 g: i n 1 B A ˆ X c j m j : jˆi Since fm i ;m i 1 ;...;m i n 1 g span the space, such a decomposition is always possible. If the coefficient c i 6ˆ 0, the switches in stage i are forced to be in mode c i, i.e., output ˆ input c i m i ;ifc i ˆ 0, we only need to make sure that the switches in stage i exchange to some output, as long as they do not go straight. The path i will reach the destination B by a regular routing in the next n stages, i.e., stages i 1 through i n. The construction of path f 1 and the proof that these f 1 paths are disjoint to each other are the same as the proof for the 2 2 case. tu In the previous sections, we have shown that, in an f-extrastage Cyclic MIN, there exist f 1 disjoint paths between any pair of nodes. It follows that, in the presense of f faults, at least one path remains intact between any pair of nodes. The broadcast from any node A is achieved by picking a survived path between node A and every other node. If a switch is used by more than one path and the two paths enter the switch from two different inputs, we collapse the part of the two paths before the switch so that the switch will operate in one of the legal modes. It is obvious that, after such collapses, the connections between the node pairs remain. Therefore, an f-extra-stage Cyclic Multistage Interconnection Network guarantees broadcast connectivity in the presense of f switch faults. As an example, Fig. 10 shows the survived broadcast switch faults. 3 ACKNOWLEDGMENTS The authors wish to thank the editor and the reviewers for their valuable input to this paper. This research was supported in part by US National Science Foundation (NSF) Young Investigator Award CCR , by the NSF Graduate Fellowship, by the Sloan Research Fellowship, and by DARPA and BMDO through an agreement with NASA/OSAT. REFERENCES [1] G. Adams, D. Agrawal, and H. Siefel, ªA Survey and Comparison of Fault- Tolerant Multistage Interconnection Networks,º Computer, pp , June [2] G. Adams and H. Siegel, ªThe Extra Stage Cube: A Fault-Tolerant Interconnection Network for Supersystems,º IEEE Trans. Computers, vol. 31, no. 5, pp , May [3] D.P. Agrawal, ªGraph Theoretical Analysis and Design of Multistage Interconnection Networks,º IEEE Trans. Computers, vol. 32, no. 7, pp , July [4] V.E. Benes, ªOptimal Rearrangeable Multistage Connecting Networks,º Bell System Technical J., no. 4, II, July [5] J. Bruck and C. Ho, ªFault-Tolerant Cube Graphs and Coding Theory,º IEEE Trans. Information Theory, Nov [6] H. Cam and J. Fortes, ªRearrangeability of Shuffle-Exchange Networks,º Proc. Third Symp. Frontiers of Massively Parallel Computation, pp , Oct [7] P.J. Chuang, ªCGIN: A Fault Tolerant Modified Gamma Interconnection Network,º IEEE Trans. Parallel and Distributed Systems, vol. 7, no. 12, pp. 1,303-1,308, Dec [8] D. Knuth, The Art of Computer Programming: Sorting and Search. Reading, Mass.: Addison-Wesley, [9] V.P. Kumar and S.M. Reddy, ªAugmented Shuffle-Exchange Multistage Interconnection Networks,º Computer, pp , June [10] F. Leighton, Introduction to Parallel Algorithms and Architectures: Arrays, Trees, Hypercubes. San Mateo, Calif.: Morgan Kaufmann, [11] Y. Liao, M. Lu, and N.F. Tzeng, ªThe Palindrome Network for Fault- Tolerant Interconnection,º Proc. Eighth IEEE Symp. Parallel and Distributed Processing, pp , Oct [12] N. Linial and M. Tarsi, ªInterpolation between Bases and the Shuffle Exchange Network,º European J. Combinatorics, pp , Oct [13] M. Pease, ªThe Indirect Binary n-cube Microprocessor Array,º IEEE Trans. Computers, vol. 26, no. 5, pp , May [14] C. Shih and K. Batcher, ªAdding Multiple-Fault Tolerance to Generalized Cube Networks,º IEEE Trans. Parallel and Distributed Systems, vol. 5, no. 8, pp , Aug [15] A. Varma and C.S. Raghavendra, ªFault-Tolerant Routing in Multistage Interconnection Networks,º IEEE Trans. Computers, vol. 38, no. 3, pp , Mar [16] M. Xu and X. Shen, ªA New Fault-Tolerant Generalized Cube with an Extra Stage,º Proc. Int'l Computer Science Conference (ICSC '92), pp , Dec CONCLUSION In this paper, we studied the fault tolerance capabilities of Multistage Interconnection Networks. The fault model we used is the stuck-in straight model and the fault tolerance criterion is to guarantee point-to-point and broadcast connections. We constructed the first known fault-tolerant Multistage Interconnection Network that is optimal in the number of redundant stages. In addition, we proved the general condition that is both sufficient and necessary for MINs to achieve this optimal performance in tolerating switch faults.
Fault Tolerance in the Block-Shift Network
IEEE TRANSACTIONS ON RELIABILITY, VOL. 50, NO. 1, MARCH 2001 85 Fault Tolerance in the Block-Shift Network Yi Pan, Member, IEEE Abstract The Block Shift Network (BSN) is a new topology for interconnection
System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1
System Interconnect Architectures CSCI 8150 Advanced Computer Architecture Hwang, Chapter 2 Program and Network Properties 2.4 System Interconnect Architectures Direct networks for static connections Indirect
Chapter 4 Multi-Stage Interconnection Networks The general concept of the multi-stage interconnection network, together with its routing properties, have been used in the preceding chapter to describe
Interconnection Networks Programmierung Paralleler und Verteilter Systeme (PPV)
Interconnection Networks Programmierung Paralleler und Verteilter Systeme (PPV) Sommer 2015 Frank Feinbube, M.Sc., Felix Eberhardt, M.Sc., Prof. Dr. Andreas Polze Interconnection Networks 2 SIMD systems
Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!
Interconnection Networks Interconnection Networks Interconnection networks are used everywhere! Supercomputers connecting the processors Routers connecting the ports can consider a router as a parallel
Chapter 12: Multiprocessor Architectures. Lesson 04: Interconnect Networks
Chapter 12: Multiprocessor Architectures Lesson 04: Interconnect Networks Objective To understand different interconnect networks To learn crossbar switch, hypercube, multistage and combining networks
Fault-Tolerant Routing Algorithm for BSN-Hypercube Using Unsafety Vectors
Journal of omputational Information Systems 7:2 (2011) 623-630 Available at http://www.jofcis.com Fault-Tolerant Routing Algorithm for BSN-Hypercube Using Unsafety Vectors Wenhong WEI 1,, Yong LI 2 1 School
MULTISTAGE INTERCONNECTION NETWORKS: A TRANSITION TO OPTICAL
MULTISTAGE INTERCONNECTION NETWORKS: A TRANSITION TO OPTICAL Sandeep Kumar 1, Arpit Kumar 2 1 Sekhawati Engg. College, Dundlod, Dist. - Jhunjhunu (Raj.), [email protected], 2 KIIT, Gurgaon (HR.), Abstract
Load Balancing between Computing Clusters
Load Balancing between Computing Clusters Siu-Cheung Chau Dept. of Physics and Computing, Wilfrid Laurier University, Waterloo, Ontario, Canada, NL 3C5 e-mail: [email protected] Ada Wai-Chee Fu Dept. of Computer
Interconnection Networks
CMPT765/408 08-1 Interconnection Networks Qianping Gu 1 Interconnection Networks The note is mainly based on Chapters 1, 2, and 4 of Interconnection Networks, An Engineering Approach by J. Duato, S. Yalamanchili,
Topological Properties
Advanced Computer Architecture Topological Properties Routing Distance: Number of links on route Node degree: Number of channels per node Network diameter: Longest minimum routing distance between any
Chapter 2. Multiprocessors Interconnection Networks
Chapter 2 Multiprocessors Interconnection Networks 2.1 Taxonomy Interconnection Network Static Dynamic 1-D 2-D HC Bus-based Switch-based Single Multiple SS MS Crossbar 2.2 Bus-Based Dynamic Single Bus
A RDT-Based Interconnection Network for Scalable Network-on-Chip Designs
A RDT-Based Interconnection Network for Scalable Network-on-Chip Designs ang u, Mei ang, ulu ang, and ingtao Jiang Dept. of Computer Science Nankai University Tianjing, 300071, China [email protected],
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
A Direct Numerical Method for Observability Analysis
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 625 A Direct Numerical Method for Observability Analysis Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper presents an algebraic method
On the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China [email protected], [email protected] Abstract In this paper we
STUDY OF MULTISTAGE SIMD INTERCONNECTION NETWORKS
SDY OF MLISAGE SIMD INERCONNECION NEWORKS Howard Jay Siegel and S. Diane Smith urdue niversity, Electrical Engineering School West Lafayette, Indiana 47907 Abstract Four SIMD multistage networks - Feng's
Behavior Analysis of Multilayer Multistage Interconnection Network With Extra Stages
Behavior Analysis of Multilayer Multistage Interconnection Network With Extra Stages Thesis submitted in partial fulfillment of the requirements for the award of degree of Master of Engineering in Computer
Functional-Repair-by-Transfer Regenerating Codes
Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can
Interconnection Network Design
Interconnection Network Design Vida Vukašinović 1 Introduction Parallel computer networks are interesting topic, but they are also difficult to understand in an overall sense. The topological structure
Components: Interconnect Page 1 of 18
Components: Interconnect Page 1 of 18 PE to PE interconnect: The most expensive supercomputer component Possible implementations: FULL INTERCONNECTION: The ideal Usually not attainable Each PE has a direct
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
The Pairwise Sorting Network
The Pairwise Sorting Network Ian Parberry Center for Research in Parallel and Distributed Computing Department of Computer Sciences University of North Texas Abstract A new sorting network with exactly
Generalized DCell Structure for Load-Balanced Data Center Networks
Generalized DCell Structure for Load-Balanced Data Center Networks Markus Kliegl, Jason Lee,JunLi, Xinchao Zhang, Chuanxiong Guo,DavidRincón Swarthmore College, Duke University, Fudan University, Shanghai
Interconnection Network
Interconnection Network Recap: Generic Parallel Architecture A generic modern multiprocessor Network Mem Communication assist (CA) $ P Node: processor(s), memory system, plus communication assist Network
TRAINING A 3-NODE NEURAL NETWORK IS NP-COMPLETE
494 TRAINING A 3-NODE NEURAL NETWORK IS NP-COMPLETE Avrim Blum'" MIT Lab. for Computer Science Cambridge, Mass. 02139 USA Ronald L. Rivest t MIT Lab. for Computer Science Cambridge, Mass. 02139 USA ABSTRACT
Novel Hierarchical Interconnection Networks for High-Performance Multicomputer Systems
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 20, 1213-1229 (2004) Short Paper Novel Hierarchical Interconnection Networks for High-Performance Multicomputer Systems GENE EU JAN, YUAN-SHIN HWANG *, MING-BO
ON A NEW MULTICOMPUTER INTERCONNECTION TOPOLOGY FOR MASSIVELY PARALLEL SYSTEMS
ON A NEW MULTICOMPUTER INTERCONNECTION TOPOLOGY FOR MASSIVELY PARALLEL SYSTEMS C. R. Tripathy 1 and N. Adhikari 2 Professor, Department of CSE, VSS University of Technology, Burla, Orissa, India [email protected]
Analysis of Various Crosstalk Avoidance Techniques in Optical Multistage Interconnection Network
International Journal of P2P Network Trends and Technology- VolumeIssue2-2 Analysis of Various Crosstalk Avoidance Techniques in Optical Multistage Interconnection Network Sehajpal Kaur, Rajan Vohra 2,
The Butterfly, Cube-Connected-Cycles and Benes Networks
The Butterfly, Cube-Connected-Cycles and Benes Networks Michael Lampis [email protected] NTUA The Butterfly, Cube-Connected-Cycles and Benes Networks p.1/16 Introduction Hypercubes are computationally
A Practical Scheme for Wireless Network Operation
A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving
Lecture 23: Interconnection Networks. Topics: communication latency, centralized and decentralized switches (Appendix E)
Lecture 23: Interconnection Networks Topics: communication latency, centralized and decentralized switches (Appendix E) 1 Topologies Internet topologies are not very regular they grew incrementally Supercomputers
Improved Irregular Augmented Shuffle Multistage Interconnection Network
Improved Irregular Augmented Shuffle Multistage Interconnection Network Sandeep Sharma Department of Computer Science & Engineering Guru Nanak Dev University, Amritsar, 4, India Dr. K.S.Kahlon Department
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
Dr Markus Hagenbuchner [email protected] CSCI319. Distributed Systems
Dr Markus Hagenbuchner [email protected] CSCI319 Distributed Systems CSCI319 Chapter 8 Page: 1 of 61 Fault Tolerance Study objectives: Understand the role of fault tolerance in Distributed Systems. Know
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
A Dynamic Programming Approach for Generating N-ary Reflected Gray Code List
A Dynamic Programming Approach for Generating N-ary Reflected Gray Code List Mehmet Kurt 1, Can Atilgan 2, Murat Ersen Berberler 3 1 Izmir University, Department of Mathematics and Computer Science, Izmir
Effective Data Mining Using Neural Networks
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 8, NO. 6, DECEMBER 1996 957 Effective Data Mining Using Neural Networks Hongjun Lu, Member, IEEE Computer Society, Rudy Setiono, and Huan Liu,
Compression algorithm for Bayesian network modeling of binary systems
Compression algorithm for Bayesian network modeling of binary systems I. Tien & A. Der Kiureghian University of California, Berkeley ABSTRACT: A Bayesian network (BN) is a useful tool for analyzing the
Customer Classification And Prediction Based On Data Mining Technique
Customer Classification And Prediction Based On Data Mining Technique Ms. Neethu Baby 1, Mrs. Priyanka L.T 2 1 M.E CSE, Sri Shakthi Institute of Engineering and Technology, Coimbatore 2 Assistant Professor
InfiniBand Clustering
White Paper InfiniBand Clustering Delivering Better Price/Performance than Ethernet 1.0 Introduction High performance computing clusters typically utilize Clos networks, more commonly known as Fat Tree
Efficient Recovery of Secrets
Efficient Recovery of Secrets Marcel Fernandez Miguel Soriano, IEEE Senior Member Department of Telematics Engineering. Universitat Politècnica de Catalunya. C/ Jordi Girona 1 i 3. Campus Nord, Mod C3,
Fairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS
Volume 2, No. 3, March 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE
Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems
Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems Melanie Berg 1, Kenneth LaBel 2 1.AS&D in support of NASA/GSFC [email protected] 2. NASA/GSFC [email protected]
ISSCC 2003 / SESSION 10 / HIGH SPEED BUILDING BLOCKS / PAPER 10.5
ISSCC 2003 / SESSION 10 / HIGH SPEED BUILDING BLOCKS / PAPER 10.5 10.5 Broadband ESD Protection Circuits in CMOS Technology Sherif Galal, Behzad Razavi Electrical Engineering Department, University of
Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Adaptive Linear Programming Decoding
Adaptive Linear Programming Decoding Mohammad H. Taghavi and Paul H. Siegel ECE Department, University of California, San Diego Email: (mtaghavi, psiegel)@ucsd.edu ISIT 2006, Seattle, USA, July 9 14, 2006
Network File Storage with Graceful Performance Degradation
Network File Storage with Graceful Performance Degradation ANXIAO (ANDREW) JIANG California Institute of Technology and JEHOSHUA BRUCK California Institute of Technology A file storage scheme is proposed
Reliability Guarantees in Automata Based Scheduling for Embedded Control Software
1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,
SECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004
Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February
Analysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
A simple algorithm with no simple verication
A simple algorithm with no simple verication Laszlo Csirmaz Central European University Abstract The correctness of a simple sorting algorithm is resented, which algorithm is \evidently wrong" at the rst
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Data quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
Architectural Level Power Consumption of Network on Chip. Presenter: YUAN Zheng
Architectural Level Power Consumption of Network Presenter: YUAN Zheng Why Architectural Low Power Design? High-speed and large volume communication among different parts on a chip Problem: Power consumption
THE Walsh Hadamard transform (WHT) and discrete
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 54, NO. 12, DECEMBER 2007 2741 Fast Block Center Weighted Hadamard Transform Moon Ho Lee, Senior Member, IEEE, Xiao-Dong Zhang Abstract
CHAPTER 5 FINITE STATE MACHINE FOR LOOKUP ENGINE
CHAPTER 5 71 FINITE STATE MACHINE FOR LOOKUP ENGINE 5.1 INTRODUCTION Finite State Machines (FSMs) are important components of digital systems. Therefore, techniques for area efficiency and fast implementation
FALSE ALARMS IN FAULT-TOLERANT DOMINATING SETS IN GRAPHS. Mateusz Nikodem
Opuscula Mathematica Vol. 32 No. 4 2012 http://dx.doi.org/10.7494/opmath.2012.32.4.751 FALSE ALARMS IN FAULT-TOLERANT DOMINATING SETS IN GRAPHS Mateusz Nikodem Abstract. We develop the problem of fault-tolerant
Topology-based network security
Topology-based network security Tiit Pikma Supervised by Vitaly Skachek Research Seminar in Cryptography University of Tartu, Spring 2013 1 Introduction In both wired and wireless networks, there is the
Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas
I.J.Computer Network and Information Security, 21, 2, 26-32 Published Online December 21 in MECS (http://www.mecs-press.org/) Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
The Open University s repository of research publications and other research outputs
Open Research Online The Open University s repository of research publications and other research outputs The degree-diameter problem for circulant graphs of degree 8 and 9 Journal Article How to cite:
Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors
2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,
arxiv:1112.0829v1 [math.pr] 5 Dec 2011
How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly
ETHERNET ENCRYPTION MODES TECHNICAL-PAPER
1 ETHERNET ENCRYPTION MODES TECHNICAL-PAPER The CN series encryption platform is designed to secure information transmitted over a number of network protocols. The CN series encryptors secure Ethernet
If A is divided by B the result is 2/3. If B is divided by C the result is 4/7. What is the result if A is divided by C?
Problem 3 If A is divided by B the result is 2/3. If B is divided by C the result is 4/7. What is the result if A is divided by C? Suggested Questions to ask students about Problem 3 The key to this question
Scalability and Classifications
Scalability and Classifications 1 Types of Parallel Computers MIMD and SIMD classifications shared and distributed memory multicomputers distributed shared memory computers 2 Network Topologies static
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor
THE DESIGN OF AN EFFICIENT LOAD BALANCING ALGORITHM EMPLOYING BLOCK DESIGN. Ilyong Chung and Yongeun Bae. 1. Introduction
J. Appl. Math. & Computing Vol. 14(2004), No. 1-2, pp. 343-351 THE DESIGN OF AN EFFICIENT LOAD BALANCING ALGORITHM EMPLOYING BLOCK DESIGN Ilyong Chung and Yongeun Bae Abstract. In order to maintain load
Revised Version of Chapter 23. We learned long ago how to solve linear congruences. ax c (mod m)
Chapter 23 Squares Modulo p Revised Version of Chapter 23 We learned long ago how to solve linear congruences ax c (mod m) (see Chapter 8). It s now time to take the plunge and move on to quadratic equations.
How To Understand The Concept Of A Distributed System
Distributed Operating Systems Introduction Ewa Niewiadomska-Szynkiewicz and Adam Kozakiewicz [email protected], [email protected] Institute of Control and Computation Engineering Warsaw University of
Lumousoft Visual Programming Language and its IDE
Lumousoft Visual Programming Language and its IDE Xianliang Lu Lumousoft Inc. Waterloo Ontario Canada Abstract - This paper presents a new high-level graphical programming language and its IDE (Integration
Compact Representations and Approximations for Compuation in Games
Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan
RSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
Analysis of Internet Topologies: A Historical View
Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,
FAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING
FAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING Hussain Al-Asaad and Alireza Sarvi Department of Electrical & Computer Engineering University of California Davis, CA, U.S.A.
Solving Geometric Problems with the Rotating Calipers *
Solving Geometric Problems with the Rotating Calipers * Godfried Toussaint School of Computer Science McGill University Montreal, Quebec, Canada ABSTRACT Shamos [1] recently showed that the diameter of
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
Fault Tolerance & Reliability CDA 5140. Chapter 3 RAID & Sample Commercial FT Systems
Fault Tolerance & Reliability CDA 5140 Chapter 3 RAID & Sample Commercial FT Systems - basic concept in these, as with codes, is redundancy to allow system to continue operation even if some components
Weakly Secure Network Coding
Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this
