Analysis of Various Crosstalk Avoidance Techniques in Optical Multistage Interconnection Network



Similar documents
MULTISTAGE INTERCONNECTION NETWORKS: A TRANSITION TO OPTICAL

Improved Irregular Augmented Shuffle Multistage Interconnection Network


Chapter 12: Multiprocessor Architectures. Lesson 04: Interconnect Networks

Chapter 2. Multiprocessors Interconnection Networks

Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!

Interconnection Networks Programmierung Paralleler und Verteilter Systeme (PPV)

Architectural Level Power Consumption of Network on Chip. Presenter: YUAN Zheng

Design and FPGA Implementation of a Novel Square Root Evaluator based on Vedic Mathematics

AN EFFICIENT TASK SCHEDULING ALGORITHM TO OPTIMIZE RELIABILITY IN MOBILE COMPUTING

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1

An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks

Optical Network Traffic Control Algorithm under Variable Loop Delay: A Simulation Approach

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors

Tolerating Multiple Faults in Multistage Interconnection Networks with Minimal Extra Stages

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

Interconnection Networks

INTRODUCTION TO DIGITAL SYSTEMS. IMPLEMENTATION: MODULES (ICs) AND NETWORKS IMPLEMENTATION OF ALGORITHMS IN HARDWARE

Design of Bidirectional Coupling Circuit for Broadband Power-Line Communications

JOURNAL OF TELECOMMUNICATIONS, VOLUME 2, ISSUE 2, MAY Simulink based VoIP Analysis. Hardeep Singh Dalhio, Jasvir Singh, M.

IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS

Implementation of Full -Parallelism AES Encryption and Decryption

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

Reconfigurable Low Area Complexity Filter Bank Architecture for Software Defined Radio

SAN Conceptual and Design Basics

Efficient Service Broker Policy For Large-Scale Cloud Environments

Load Balancing Between Heterogenous Computing Clusters

Conceptual Framework Strategies for Image Compression: A Review

A Dynamic Link Allocation Router

Behavior Analysis of Multilayer Multistage Interconnection Network With Extra Stages

Performance Evaluation of Mobile Agent-based Dynamic Load Balancing Algorithm

Chapter 5. Data Communication And Internet Technology

Interconnection Networks

Interconnection Network Design

TOPOLOGIES NETWORK SECURITY SERVICES

Data Communications Competence Center

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Broadband access. Nils Holte, NTNU. NTNU Department of Telecommunications Kursdagene ved NTNU, Digitale telenett, 9. januar

Load Balancing between Computing Clusters

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE

It explains the differences between the Plesiochronous Digital Hierarchy and the Synchronous Digital Hierarchy.

Scalability and Classifications

Implementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid 60

Influence of Load Balancing on Quality of Real Time Data Transmission*

Storage and Retrieval of Data for Smart City using Hadoop

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

IT4405 Computer Networks (Compulsory)

Optical interconnection networks with time slot routing

)454 6 ")43 0%2 3%#/.$ $50,%8 -/$%- 34!.$!2$):%$ &/2 53% ). 4(% '%.%2!, 37)4#(%$ 4%,%0(/.%.%47/2+ $!4! #/--5.)#!4)/. /6%2 4(% 4%,%0(/.%.

Disjoint Path Algorithm for Load Balancing in MPLS network

NETWORK DELAY: HOW RELIABLE NETWORK ANALYZER SOFTWARE DEVELOPMENT

How To Fix A 3 Bit Error In Data From A Data Point To A Bit Code (Data Point) With A Power Source (Data Source) And A Power Cell (Power Source)

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Lecture 18: Interconnection Networks. CMU : Parallel Computer Architecture and Programming (Spring 2012)

Image Compression through DCT and Huffman Coding Technique

Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration

Performance advantages of resource sharing in polymorphic optical networks

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

Designing the NEWCARD Connector Interface to Extend PCI Express Serial Architecture to the PC Card Modular Form Factor

IT Data Communication and Networks (Optional)

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK

Simulation and Best Design of an Optical Single Channel in Optical Communication Network

EECC694 - Shaaban. Transmission Channel

Telephony Solution for Local Multi-Point Distribution Service

Nexus Technology Review -- Exhibit A

Research on the UHF RFID Channel Coding Technology based on Simulink

Optical Interconnect Technology for High-bandwidth Data Connection in Next-generation Servers

Boeing B Introduction Background. Michael J. Morgan

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip

Performance Gathering and Implementing Portability on Cloud Storage Data

Data Transmission Using Laser Light

Course 1. General view on the fixed telephone network. Digital networks. General aspects. Definitions.

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

AN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS

Network Design. Yiannos Mylonas

A Novel Switch Mechanism for Load Balancing in Public Cloud

NETWORKING TECHNOLOGIES

Asynchronous Bypass Channels

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

Cabling & Test Considerations for 10 Gigabit Ethernet LAN

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

Introduction to Optical Networks

2011, The McGraw-Hill Companies, Inc. Chapter 3

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Modeling and Performance Analysis of DWDM Based 100 Gbps Low Power Inter-satellite Optical Wireless Communication (LP-IsOWC) System

Load Distribution on a Linux Cluster using Load Balancing

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

hp ProLiant network adapter teaming

Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Virtual Cloud Environment

Lecture 23: Interconnection Networks. Topics: communication latency, centralized and decentralized switches (Appendix E)

Chapter 16: Distributed Operating Systems

Transcription:

International Journal of P2P Network Trends and Technology- VolumeIssue2-2 Analysis of Various Crosstalk Avoidance Techniques in Optical Multistage Interconnection Network Sehajpal Kaur, Rajan Vohra 2, Sandeep Kaur 2 Department of Electronics Technology Guru Nanak Dev University Amritsar, Punjab, India Abstract- This paper presents the various crosstalk avoidance algorithms in optical multistage interconnection network. The major problem introduced by optical multistage interconnection networks is crosstalk which is caused by the coupling of two signals within same switching element. To avoid a crosstalk, many approaches have been proposed such as time domain and space domain approaches. One way to solve this problem is to avoid coupling of two signals within same switching element. In this paper, various algorithms such as Window method, Improved Window method and Bitwise window method are implemented to avoid crosstalk. Window Method is used to find out which messages have conflict and it is also used to find the message that are not in same group because it causes crosstalk in the network. Then Improved window method is used in which first window is eliminated. Then Bitwise window method in which all the binary bits of single row in each window are converted to decimal so complexity is reduced. Keywords- Optical Multistage Interconnection Networks, Window Method, Improved window method, Bitwise Window Method, Crosstalk Algorithm. I. INTRODUCTION Interconnection Networks play a major role in the performance of modern parallel computers. Many aspects of interconnection networks, such as implementation complexity, routing algorithms, performance evaluation, and fault tolerance, have been the subject of research over the years. There are many factors that may affect the choice of appropriate interconnection network for the underlying parallel computing environment. Multistage interconnection networks (MINs) consist of more than one stages of small interconnection elements called switching elements and links interconnecting them. The number of stages and the connection patterns between stages determine the routing capability of the networks. MINs were initially proposed for telephone networks and later they are used in multiprocessing systems to provide costeffective, high-bandwidth communication between processors and/or memory modules. In electronic MINs electricity is used, where as in Optical MINs light is used to transmit the messages. This advantage makes the signal transmission in optical network faster. The electronic MINs and the optical MINs have many similarities, but there are some fundamental differences between them such as the optical-loss during switching and the crosstalk problem in the optical switches [,2]. In electrical multistage interconnection network, in which optical signal is converted to/from electrical signal at the network input/output. Available optical MINs were built mainly on banyan or its equivalent baseline and omega networks because they are fast in switch setting (self-routing) and also have a small number of switches between an inputoutput pair. There are two ways to solve crosstalk problem in Optical Networks:. Space Domain Approach 2. Time Domain Approach With the time domain method, two connections will be launched at different times if they use the same SE. Whenever the limitation of the network size is reached, the time domain method may be used as a feasible way to trade the maximal bandwidth available to each particular input and output pair for enhanced connectivity. Second, it is useful when future technology let the transmission rate to expand faster than the network size or when the cost of expanding the bandwidth of each connection becomes as cheap as the cost of building a network of twice its original size. The crosstalk occurs when two signal channels interact with each other. When a crosstalk happens, a small fraction of the input signal power may be detected at another output although the main signal is injected at the right output. For this reason, when a signal passes many switching elements, the input signal will be distorted at the output due to the loss and crosstalk ISSN: 2249-265 http://www.internationaljournalssrg.org Page 26

International Journal of P2P Network Trends and Technology- VolumeIssue2-2 introduced on the path. This was not a big issue in electrical MINs, but because the more stringent bit error rate in optical network, it has become a big problem. In this paper, various algorithms such as Window method, Improved Window method and Bitwise window method are implemented to avoid crosstalk[9,]. message & have conflict message & have conflict message & have conflict message & have conflict II. WINDOW METHOD its corresponding destination address is combined to produce a combination matrix. The window is used in the combination matrix from left to right except first and last column. two messages have the same bit pattern, they will cause conflict in the network. Hence, they must be routed in different passes[6]. To see how the WM works, refer to the following example. Consider the network Window Method is a technique used to find which messages should not be in the same group because they introduce crosstalk in the network. It can be described as, for network size N*N, there are N source and N destination address[7]. Each source and size is 8x8 and permutation is shown in figure 4.5 Source Destination Figure Permutation in binary format Using the window method shown in Figure 2, the window size is M-=2 (M= log 2 8=3) and the number of windows is M=3 (w, w, w 2 ). Figure 2 Optical window & Conflicts between different windows For the first row message with, with have a conflict, so the value of these columns is assigned to and the value of other columns is assigned to because,,,, and do not have any conflict with. This function is a same for other rows[3,4]. After using a window method, the conflict matrix is generated at the output is shown Table I below. TABLE I Conflict Matrix for Window Method Message N message & have conflict message & have conflict message & have conflict message & have conflict In the above table, represents the conflict between message and represents the message which do not have conflict. The flow chart of Algorithm are shown in figure 3. III. IMPROVD WINDOW METHOD message & have conflict message & have conflict message & have conflict message & have conflict The number of windows in WM is equal to the number of stages (M= log 2 N, Where M is the number of stages). In Improved WM (IWM) to find the conflicts among the messages the comparison of the first window is eliminated. The number of windows are M-(M is number of stages) after eliminating first window i.e the number of windows is only two because of eliminating the first window (w ).Messages,, and pass same switch with messages,, and respectively in the first stage. As a result the number of steps is reduced approximately by /M compared to WM. It takes less time ISSN: 2249-265 http://www.internationaljournalssrg.org Page 27

International Journal of P2P Network Trends and Technology- VolumeIssue2-2 to find the conflicts than the windows method, so complexity is reduced further. The conversion of WM to IWM is shown in Figure 4 Table II Conflict matrix for Window Improved Method Message Figure 4 Shows the conversion of WM to IWM The flow chart of improved window method are shown below in figure 5. Declare variables Declare variables Read input[i] t =input[i] [k] t 2 =input [i] [k+] Read inputs t =input[i] [k] t 2 =input [i] [k+] For j=i+ to n- For j= i+ to n In[j][k]=t & In[j] [k+]=t 2 In[j] [k]= t & In[j] [k+]=t 2 Conf[j i] Conf[ji] Conf [i j] =Conflit Conf [i j] = Conf [i j] =Conflict Conf [i j] = c stop c stop Figure 3 Flow chart for window method Figure 5 Flow Chart for Improved Window method IV. BITWISE WINDOW METHOD To reduce the complexity of Window method (WM), bitwise operations are applied in WM. In order to apply bitwise operations all binary bits in each window are ISSN: 2249-265 http://www.internationaljournalssrg.org Page 28

International Journal of P2P Network Trends and Technology- VolumeIssue2-2 converted to decimal. When all of these are converted to decimal, the number of columns is reduced to n. In WM for N*N size of the network, there are 2*n (n= log 2 N) columns to produce a combination matrix [4,5,7]. In contrast, BWM has only n columns. As a result, when comparing the messages to find conflicts, only n columns is compared instead of 2*n columns. There are only one decimal number in each row and each window for comparison and finding a conflict. The bitwise combination matrix and conflict matrix for 8x8 network size is demonstrated in figure 6 & 7. large. The flow chart of Bitwise window method is shown in figure 8. Declare i, j, k, w Call n, Cnt,Flag for i= to7 for j= to5 Read Input[i] [j] for i= to n- Figure 6 Bitwise combination matrix for 8*8 ON WinDec[i][]=2*Input[i][]+Input[i][2] WinDec[i][]=2*Input[i][2]+Input[i][3] WinDec[i][2]=2*Input[i][3]+Input[i][4] for w = to 2 for i= to n- For k= to Cnt+ Figure 7 Window method based on bitwise operations Table III Conflict matrix for bitwise window method x[k]!=windec[i] [w] Cnt++, x[cnt]=windec[i][w] Message For j=i+ to n- x[cnt]=windec[j][w] Conf[i][j]= C Thus bitwise Window Method reduces the time taken than the other two algorithms even when the network size is Stop ISSN: 2249-265 http://www.internationaljournalssrg.org Page 29

International Journal of P2P Network Trends and Technology- VolumeIssue2-2 Figure 8 Flow chart for Bitwise Window method V. COMPARATIVE ANALYSIS This section discusses about the evaluation of the proposed three algorithms i.e. WM, IWM & BWM.As comparing above three algorithms, in the IWM the number of windows is decrease by one than that of WM. So, it takes less time to calculate the conflicts among messages. As compare WM and BWM, the comparison is done for n columns and in decimal format for BWM instead of 2*n columns in WM, which means that the columns is reduced to half. For comparison the messages, there is only one bit instead of n- bits in the window. Thus comparison time of other bits is eliminated. Hence, totally the execution time is decreased, table IV shows the comparison of number of columns in windows for different size of network that are use to find out conflicts. Table IV Comparison of number of columns in windows use to find out conflicts in WM, IWM, BWM Network WM IWM BWM Size 8 6 4 3 6 8 6 4 32 8 5 64 2 6 28 4 2 7 Avg 8 5 window is, IWM is 8 & in BWM it is 5.Therefore it is clear that number of column is reduced to half in BWM. Therefore total time of execution is also reduced. Hence efficient message routing algorithms directly affect the performance of communication networks. REFERENCES [] Christopher Tocci, H. John Caufield Optical interconnection foundation and applications Artech house, Norwood, 994. [2] Pan, Y. Qiao, Yang Y., Optical multistage interconnection networks: new challenges and approaches, IEEE communications magazine, feature topic on optical networks, communication systems and devices, vol. 37, no. 2, 999, pp. 5. [3] Pan, Y. Ji, C. Lin, X. Jia, X. Evolutionary Approach for Message Scheduling in Optical Omega Networks, Fifth International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), (22). [4] Siu-Cheung Chau and Tiehong Xiao, A new algorithm for routing and Scheduling in optical multistage interconnection networks, Proceedings of the 4th international multi-conference on wireless and optical Communications, 24, pp. 749-755. [5] Mohammad,.A. A. Mohamed, O., Rozita, J., Shamala, S., New algorithm to avoid crosstalk in optical multistage interconnection networks, Proceeding of IEEE international conference on network, vol., 25, pp.5-54. [6] Munir, A, mohamed, O., Rozita, J., An efficient approach to avoid crosstalk in optical omega network. International journal of the computer, the internet and management, vol.4, no., 25, pp.5-6. [7] Farzaneh Abed, Mohamed Othman, Efficient window method in optical multistage interconnection networks, Proceedings of the IEEE international conference on telecommunications and Malaysia international conference on communications, May 26, pp.4-7. [8] F.Abed, M.Othman, Fast method to find conflicts in optical multistage interconnection networks International journal of the computer, the internet and management,vol. 6.no., April 28, pp. 8-25. [9] Tengku Dian Shahida, Mohamed Othman, Mohamad Khazani A fast and efficient crosstalk-free algorithm for routing in optical multistage interconnection networks, IEEE,28. [] Mohamed Othman, Farzaneh Abed, Fast four heuristic routing algorithms in optical Multistage interconnection switch networks, Journal of information & communication technology, vol. 2, no., 28, pp. 4-48. [] Er. Sandeep kaur, Er. Anantdeep, Er. Deepak Aggarwal, Effect of crosstalk on permutation in optical multistage interconnection networks, Journal of computing, vol. 2, Issue 4, April 2, issue 25-967. Figure 9 Number of columns in windows Vs. Network size VI.CONCLUSION In this paper, various methods have been compared and all are implemented. All the algorithms are implemented in C. It has been observed that the improved window method take lesser time to find conflicts as compared to window method. The average number of columns for comparison in ISSN: 2249-265 http://www.internationaljournalssrg.org Page 3