The WK-Recursive Pyramid: An Efficient Network Topology



Similar documents
Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1

Topological Properties

Fault-Tolerant Routing Algorithm for BSN-Hypercube Using Unsafety Vectors

Novel Hierarchical Interconnection Networks for High-Performance Multicomputer Systems

Interconnection Networks Programmierung Paralleler und Verteilter Systeme (PPV)

Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!

Fault Tolerance in the Block-Shift Network

Interconnection Network

ON A NEW MULTICOMPUTER INTERCONNECTION TOPOLOGY FOR MASSIVELY PARALLEL SYSTEMS

Lecture 23: Interconnection Networks. Topics: communication latency, centralized and decentralized switches (Appendix E)

A RDT-Based Interconnection Network for Scalable Network-on-Chip Designs

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Chapter 2. Multiprocessors Interconnection Networks

HCC: Generalized Hierarchical Completely-Connected Networks

Components: Interconnect Page 1 of 18

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

Scalability and Classifications

Tolerating Multiple Faults in Multistage Interconnection Networks with Minimal Extra Stages

Interconnection Network Design

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Interconnection Networks

Linear Crossed Cube (LCQ): A New Interconnection Network Topology for Massively Parallel System

Introduction to Parallel Computing. George Karypis Parallel Programming Platforms

Lecture 2 Parallel Programming Platforms

Mixed-Criticality Systems Based on Time- Triggered Ethernet with Multiple Ring Topologies. University of Siegen Mohammed Abuteir, Roman Obermaisser

The Butterfly, Cube-Connected-Cycles and Benes Networks

A Fast Path Recovery Mechanism for MPLS Networks

Performance of networks containing both MaxNet and SumNet links

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS

Lecture 18: Interconnection Networks. CMU : Parallel Computer Architecture and Programming (Spring 2012)

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Graph Theory Problems and Solutions

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Chapter 15: Distributed Structures. Topology

MULTISTAGE INTERCONNECTION NETWORKS: A TRANSITION TO OPTICAL

International Journal of Advanced Research in Computer Science and Software Engineering

Full and Complete Binary Trees

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

DAG based In-Network Aggregation for Sensor Network Monitoring

Generalized DCell Structure for Load-Balanced Data Center Networks

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Offline sorting buffers on Line

Load Balancing between Computing Clusters

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Scaling 10Gb/s Clustering at Wire-Speed

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics

Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online

How To Balance Network Load In A Wireless Sensor Network

A Software Architecture for a Photonic Network Planning Tool

Interconnection Networks

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING

Why the Network Matters

Chapter 3. Enterprise Campus Network Design

TOPAS: a Web-based Tool for Visualization of Mapping Algorithms

How To Understand The Concept Of A Distributed System

Performance advantages of resource sharing in polymorphic optical networks

Load Balancing in Structured Peer to Peer Systems

Improvisation of The Quality Of Service In ZigBee Cluster Tree Network

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Load Balancing in Structured Peer to Peer Systems


Quality of Service Routing in Ad-Hoc Networks Using OLSR

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

Binary search tree with SIMD bandwidth optimization using SSE

Disjoint Path Algorithm for Load Balancing in MPLS network

Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE

Data Center Network Topologies: FatTree

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Optimizing Data Center Networks for Cloud Computing

Topology-based network security

COST MINIMIZATION OF RUNNING MAPREDUCE ACROSS GEOGRAPHICALLY DISTRIBUTED DATA CENTERS

Introduction to Exploration and Optimization of Multiprocessor Embedded Architectures based on Networks On-Chip

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

Architectural Level Power Consumption of Network on Chip. Presenter: YUAN Zheng

A SIMULATOR FOR LOAD BALANCING ANALYSIS IN DISTRIBUTED SYSTEMS

Level 2 Routing: LAN Bridges and Switches

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Analysis of QoS Routing Approach and the starvation`s evaluation in LAN

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Transcription:

The WK-Recursive Pyramid: An Efficient Network Topology M. Hoseiny Farahabady 1, 2, H. Sarbazi-Azad 2, 1 1 IPM School of Computer Science, Tehran, Iran. 2 Department of Computer Eng. of Sharif Uni. of Technology, Tehran, Iran. Hoseiny@{ ipm.ir, Azad@{ ipm.ir, sharif.edu Abstract In this paper, we present and evaluate a new topology for interconnection networks which we refer to as WK-pyramid. This network has a recursive definition quite similar to that of conventional pyramid networks, but is based on the WK-recursive mesh. The traditional pyramid, a desirable network topology, was employed as both software data structure and hardware architecture. However, the new network topology which we propose has, in addition to almost all the properties of the pyramid, a number of superior properties, such as expandability to any base size. We show that this hierarchical topology is of interesting topological characteristics, making it suitable for utilization as the base topology of large-scale multicomputer systems. Keywords: Interconnection networks, Pyramids, WKrecursive, hierarchical networks, Hamiltonian cycle. 1. Introduction Interconnection networks play a major role in the design of efficient parallel and distributed computing systems. Various topologies for static interconnection network have been proposed in the literature [1-9]. The tree, mesh, hypercube, k-ary n-cube, star graph, OTIS- Network and WK-recursive mesh are examples of common interconnection network topologies. Desirable properties of interconnection networks include symmetry, small node degree d, diameter D and high connectivity, scalability, modularity and fault tolerance. In general, there is a tradeoff between hardware cost and message transmission time, respectively corresponding to node degree and the diameter of the network. Thus, the product of node degree and network diameter can be defined as a metric of network cost, indicating a combined measure of hardware complexity and worst-case message routing complexity. The WK-recursive mesh, which was proposed in [1], is a class of recursively scalable networks, denoted by WK (d,t, that is constructed hierarchically by grouping basic modules. Any d-node complete graph can serve as the basic modules. WK (d,t is a network of t levels whose basic modules are K n. We formally define this topology in Section 2. Another useful network topology, which has been used as the base of both hardware architectures and software structures, is the pyramid. By exploiting the inherent hierarchy at each level, pyramids can handle various problems in graph theory, digital geometry, machine vision, and image processing [11]. Faulttolerant properties of this network [12] make it also a promising network for reliable computing. Pyramids have therefore gained much attention in past studies [15-19] and numerous properties of them have been studied. The present paper introduces a new topology, the definition of which is based on the WK-recursive mesh. This network preserves almost all of the desirable properties of the WK-recursive mesh and pyramid networks, and displays even better topological properties in some cases. For example, while being of low diameter, this network possesses a small number of edges. In addition, a pyramid network can easily be embedded onto this network. The rest of the paper is organized as follows. Section 2 defines the WK-recursive mesh and the pyramid network, some useful notation and definitions which will be used in subsequent sections. In Section 3, the WK-pyramid topology is defined and some of its basic properties such as node degree, diameter and its addressing scheme have been studied. In Section 4, the Hamiltonian properties of the new pyramid are studied. Finally, Section 5 concludes this study. 2. The Pyramid and WK-Recursive Mesh An interconnection network, which is based on the pyramid topology, consists of several layers of processing nodes. Each layer is arranged as a square mesh with half the dimensionality of the layer below it. Proceedings of the 8th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN 05

The highest layer, which has exactly one node, is called the apex (i.e. a 1 1 mesh. Definition 1. An a b mesh network, denoted M a,b, consists of a set of nodes V(M a,b = {(x,y 1 x a, 1 y b where nodes (x 1,y 1 and (x 2,y 2 are connected by an edge if x 1 -x 2 + y 1 -y 2 =1 [19]. Definition 2. A pyramid of n levels (layers, denoted P n, consists of a set of nodes V(P n = {(k,x,y 0 k n, 1 x,y 2 k. A node (k,x,y V(P n is said to be a node at level k. All the nodes in level k form a 2 k 2 k mesh, M 2 k 2 k. Hence, there are totally N = n k= 0 4k = (4 n+1-1/3 nodes in a P n. A node (k,x,y is connected, within the mesh at level k, to node (k,x-1,y if x>1, to node (k,x,y-1 if y>1, to node (k,x+1,y if x<2 k, and to node (k,x,y+1 if y<2 k, as neighbouring brother nodes (nodes at the same level. It is also connected to node (k+1,x-2,2y, node (k+1,2x,2y-1, node (k+1,2x-1,2y-1, and node(k+1,2x,2y, for 0 k n, in level k+1, as child nodes, and to node (k-1, [x/2],[y/2], in level k-1 as a father node [19]. The apex node in P n is the node with address (0, 1, 1. Definition 3. An -level WK-recursive mesh denoted as WK (C,,consists of a set of nodes V(WK (C, = {a a -1 a 1 a i for 1 i which = {0,1,2 C-1. The node with address scheme A= (a a -1 a 1 is connected to 1 all nodes with addresses (a a -1 a 2 k such that k, k a 1, as brother nodes and 2 to node (a a -1 a j+1 a j-1 (a j j, if there exists one j such that 1 j -1, a j-1 = a j-2 = = a 1 and a j a j-1 ; as cousin node. Notation (x j denotes j Figure 1. An WKP (4, 2 network. consecutive x s. It is apparent that the node with address (a a a a has no cousin. We call such a node an extern node. Therefore, all WK (C, networks have exactly C extern nodes. The degree of extern nodes in each WK (C, is C-1 and the degree of other nodes is C. As a result, the number of nodes in a WK (C, is equal to V(WK (C, = C [9]. The number of edges in a WK (C, is equal to E(WK (C, = C +1 -C. 3. The WK- Pyramid networks In this section, we present the proposed interconnection network topology. This topology eliminates some drawbacks of the conventional pyramid network, stemming from the fact that the connections within its layers form a mesh. Contrary to the pyramid, the connections within the layers of this network form a WK-recursive mesh, a sturdy topology. In view of this alteration, the base of this network can be of any size, not only 4 as is the case in the previous definition. Other properties of the network are also improved because of the superior property of the WKrecursive mesh compared to the mesh topology. Definition 4. A WK-Pyramid network, denoted as WKP (C,, consists of a set of nodes V(WKP (C, = {(k,(a k a k-1 a k-2 a 1 0 k, 0 a i C-1, 1 i k or k=0 and a 1 =1. A node with addressing scheme (k,(a k a k-1 a k-2 a 1 V(WKP (C, is said to be a node at level k, e.g. the apex is at level 0. The part (a k a k-1 a k-2 a 1 of the address determines the address of a node within the WK-recursive network at layer k. All the nodes in level k form a WK (C,,WK-recursive network. Hence, there exist totally of N = k= 0 Ck = (C +1-1/C-1 nodes in a WKP (C,. A node with address (k,(a k a k-1 a k-2 a 1 is connected, within the WK- Recursive network at level k>0, to node (k,(a k a k-1 a k-2 a 2 j V(WKP (C,, for 1 j C, j a 1, as the neighbouring brother nodes, and connected to a node with address schema (k,(a a -1 a j+1 a j-1 (a j j, if there exists one j such that 1 j -1, a j-1 = a j-2 = = a 1 and a j a j-1 ; as a cousin node (nodes at the same level. It is also connected to nodes (k+1,(a k a k-1 a k-2 a 2 a 1 j, for 1 j C, in level k+1, as a child node, and connected to node (k-1,(a k a k-1 a k-2 a 2, in level k-1, as a father node. Figure 1 illustrates a WK-pyramid network, WKP (4, 2. The main title (on the first page should begin 1-3/8 inches (3.49 cm from the top edge of the page, centered, and in Times 14-point, boldface type. Capitalize the first letter of nouns, pronouns, verbs, adjectives, and adverbs; do not capitalize articles, coordinate conjunctions, or prepositions (unless the title begins with such a word. eave two 12-point blank lines after the title. For example, in a WKP (4, 2 the node with address (2,(11, is connected to nodes with addresses of form (2, (12, (2, (13, (2, (14 and (1, (1. As well, The Proceedings of the 8th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN 05

neighbour set of node (2, (23 is {(2, (21, (2, (22, (2, (24, (2, (32, (1, (2. The node degree (N D is defined as the number of physical channels emanating from a node. This attribute is a measure of a node s I/O complexity. For the WKP (C,, node degree is independent of the network size. Each node in the intern layers has exactly 2C+1 neighbours, each node in layer 1 has just 2C channels and each node in the bottom layer has C+1 neighbours. The node at level 0 has just C neighbours, and each extern nodes at any layer has one neighbour less than the other nodes in the same layer. The Diameter and average distance are commonly used to measure and to compare the static network performance of a system. The diameter of a network is the maximum internodes distance i.e. is the maximum number of links that must be traversed to send a message to all nodes along a shortest path. The smaller the diameter of a network is, the less time it takes to send a message from one node to the farthest away node. The diameter of WKP (C, with N = (C +1-1/(C-1 nodes is D = 2-1 2log C N. So the diameter of the WKP (C, is O(log N. Figure 2 (a shows a comparison of network cost, which is defined as diameter node degree, for several different network topologies. Each curve of it represents a particular family of these networks. It is observed that the WKP (C, is of much less network cost than conventional mesh, hypercube, k-ary n-cube and WK-Recursive networks. Average distance is the mean distance between all pairs of nodes in a network. A small average distance allows small communication latency, especially for distance-sensitive switching, such as store and forward [10]. But it is also crucial for distance-insensitive switching, such as wormhole switching, since short distance results in the use of fewer links and buffers, and therefore less communication contention and latency. We evaluate the average distance in different conventional topologies with that of WK-Pyramid networks with different numbers of levels by the use of simulation. Figure 2 (b shows a comparison of average distance in several different network topologies, including WK-pyramids of different sizes and of different numbers of levels. From these results, it is obvious that the WKP (C, is of smaller average distance than the other networks except hypercube networks. 4. Routing in the WK-pyramid network Recall that every node in the WKP (C, has a node identifier address (k,(a k a k-1 a k-2 a 1 which 0 k, 0 a i C-1, 1 i k or k=0 and a 1 =1. We propose a routing algorithm for WKP (C, using the routing algorithm already proposed for WK-recursive networks in [1]. The routing algorithm in a WKP (C,, is denoted by the self-routing algorithm, SR WKP(C, (S,D, where S is the source node and D is the destination node. It exploits a deterministic routing in each layer to find the shortest path in these layers and so do the WKP (C, network. More precisely, the algorithm gets the message from the source node, deliver it to the every ancestors of the source node, then route it, with a routing algorithm we will state it later, through the related layer to the ancestor of the destination node, and finally delivers it to the destination node. The routing algorithm decides when stop to send the message to the higher layer. It is determined with comparison between the length of paths which was selected by the routing algorithm of each layers. et us first declare the routing algorithm in a WK-recursive mesh [1]. SR WK(C, (S,D //the self-routing algorithm in WK-Recursive { Say S=(a a -1 a 1 and D=(b b -1 b 1 are consecutively the source and destination nodes. If =1 {SR = <S D> Else if (a =b {SR = SR WK(C,-1 (S,D; Else if (a b { Say S =(a b b b b and D =(b a a a. SR = <SR WK(C,-1 (S,S <S,D > SR WK(C,-1 (D,D > //end of function On the basis of the SR WK(C, (S,D algorithm, we define the routing algorithm in WK-Pyramid network, named SR WKP(C, (S,D. This algorithm will examine whether the level of the source and the destination nodes are identical or not. If they are equal, the algorithm recursively calls itself and finds the minimum path between two candidate paths, first the path which starts from the source node, would go to its father node and would go along a path between source s father and destination s father node which is returned by calling SR WKP(C, (the father of S, the father of D, would go to the destination s father and finally ends in the destination node. The second path is one that is located on layer k of pyramid and is returned by calling the SR WK(C, (S,D algorithm on the WK-recursive network. When the levels of these nodes are not identical, the algorithm first checks whether the Proceedings of the 8th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN 05

source node is an ancestor of the destination or not. If so, the source node sends the message directly to its child and this is repeated until it reaches the destination node. In the other situation, the source node is not an ancestor of the destination node. To solve this case, two paths must be compared. First, we assume that the level of source node and that of the father of destination node is identical. So, the first path is between the source node and the father of the destination node, added up to the link between the father of destination node and itself. The second path is one that go through the source and its father, along a path between the source s father node and the destination node which gain from calling SR WKP(C, (S,D algorithm recursively. A minimal path between these two paths is returned as a desired path. Therefore, the routing algorithm in WKP(C, network can be stated as follows: SR WKP(C, (S,D { Say S=(k,(a k a k-1 a 1 and D=(k,(b k b k -1 b 1, for 1 k, k, are consecutively the source and destination nodes. If (k = k { S =(k-1,(a k a k-1 a 1 // the father of S D =(k -1,(b k b k -1 b 1 // the father of D SR WKP = min(<ss SR WKP(C, (S,D D D>,SR WK(C,k (S,D else { D =(k,(b k b k -1 b k -k+2 b k -k+1 // the ancestor of D in level k S =(k-1,(a k a k-1 a 3 a 2 // the father of S SR WKP =min(<sr WK(C,k (S,D SR WKP(C, (D,D>,<SS SR WKP(C, (S,D> 5. Hamiltonian properties In this section, we show that the WKP (C, network is Hamiltonian. Definition 5. A Hamiltonian path between nodes u and v is a path that leads from u to v and visits each node of graph exactly once. A Hamiltonian cycle is a Hamiltonian path from one node to itself. A graph G is Hamiltonian if it contains a Hamiltonian cycle [19]. Theorem 1. Any WK-Recursive network is Hamiltonian-connected [7]. Theorem 2. Every WK-pyramid network of level, WKP (C,, contains a Hamiltonian path starting from any node x B={(0,1, (,(k 1 j, k C and ending at any node y B - {x. Proof. With induction on, the following paths determine the Hamiltonian path between two nodes (0, Network cost 1200 800 Mesh 2D Squre Hyper cube Torus 2D Mesh 3D Squre WK-Recrsive (4, Mesh-Based Pyramids Average Network Distance 100 WK-Recrsive (4, Mesh 2D Squre Torus 2D Mesh 3D Squre wk pyramid (4, Hyper cube Wk-pyramid (5, 400 0 0 10000 20000 30000 40000 50000 60000 The Node Number 1 0 2000 4000 The Node Number Figure 2. Comparison of WK-pyramid with other important networks; a Network cost, b Average inter-node distance. Else if (k < k { If((a k a k-1 a 1 =(b k b k -1 b k -k+2 b k -k+1 // S is an ancestor of D { S =(k+1,(a k a k-1 a 1 b k -k // the child of S that is an ancestor of D SR WKP = <SS SR WKP(C, (S,D> 1 and (1, j or between (1, k and (1, k + j, for some 1 k C and k+1 j C-k, which proves the theorem when =1. HP 1 (0, 1, (1, j = < (0, 1 (1, j + 1 mod C (1, j +2 mod C (1, j - 1 mod C (1, j > HP 1 (1, k, (1, j = < (1, k (0, 1 (1, k +1 mod C (1, k +2 mod C... (1, k + j - 1 mod C. Proceedings of the 8th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN 05

(1, k + j + 1 mod C (1, k + j +2 mod C... (1, k - 1 mod C (1, k + j mod C > When is greater than 1, two different cases must be considered: 1 When the source node address is (0, 1 and the destination node address is (, (k. 2 When neither the source nor the destination node has address of the form (0, 1, i.e. both of them have addresses of the form (, (j. Case 1. We construct the Hamiltonian path, denoted with HP, as follows: HP (0,1,(, k (0,1,(, k : < (0, 1 HP 1 (-1, (k + 1 (0,1,(, k + 1 mod C -1 (, (k + 1 mod C WK HP [ ] k >. WK The HP [ ] (, k + 1,(, k (, k + 1,(, k (, notation represents the Hamiltonian path in a WK-recursive network, the layer of WK-pyramid network, between nodes (, (k + 1 mod C and (, k. As a result of Theorem 1, such a Hamiltonian path exists. Case 2. Without loss of generality, let us assume that address x is (,( j and address y is (,( j + k for some 1 j C and j+1 k C - j. We only present proof of the case in which k and C are even; the other cases, in which either k or C is odd, can be determined in a similar manner. In this case, the following path determines a Hamiltonian path between these nodes. HP (, j,(,( j+ k (0, 1 (1, j + 1 HP = < (, j HP (1, j+ 1,(, j+ 1( j+ 2 (, j,(1, j (1, j (, j+1(j+2-1 (, j+2(j+1-1 (1, j + 2 (1, j + 3 HP (, j+3(j+4-1 (, j+4(j+3-1 HP (1, j+ 3,(, j+ 3( j+ 4 (, j+ 4( j+ 3,(1, j+ 4 (1, j+ k 1,(, j+ k 1( j+ k+ 1 (, j+k+1(j+k-1-1 HP j+k+1 HP (1, j+k-1 HP (, j+k-1(j+k+1-1 (, j+ k+ 1( j+ k 1,(1, j+ k+ 1 (1, j+ k+ 1,(, j+ k+ 1( j+ k+ 2 (1, (, j+k+1(j+k+2-1 (, j+k+2(j+k+1-1 (1, j- 2 HP (, j-2(j-1-1 (, j-1(j-2-1 HP (1, j + k,(,( j+ k (1, j 2,(, j 2( j 1 (, j 1( j 2,(1, j-1 = y >. (1, j - 1 (1, j + k HP Considering the two above cases, the proof of our theorem is completed. Figure 3 graphically displays the construction method used above for a WKP (6,. This Figure displays the instance in which the address of the source node is (, 0 and the address of destination node is (, 4. Theorem 3. Any WKP (C, is Hamiltonian. Proof. We use Theorem 2 to prove this theorem. In a WKP (C, network, the following cycle (denoted as HC, is a Hamiltonian cycle: WKP C (, HC WKP( C = < (0, 1 (1, 1 HP 1, (1,1,(,12 (, 12-1 (, 21-1 HP 1 (, 23-1 (, (,21,(,23 32-1 HP 1 (, 34-1 (, 43-1 (,32,(,34 (, j(j-1-1 HP 1 (, j(j+1-1 (, j ( j 1,(, j ( j+ 1 (, C(C-1-1 HP 1 (1, C (0,1 >. (, C ( C 1,(1, C In this cycle, the notation HP x, y 1 represents a Hamiltonian path in a WKP (C,-1 network which starts from the node x and ends at node y. The second and following pages should begin 1.0 inch (2.54 cm from the top edge. On all pages, the bottom margin should be 1-1/8 inches (2.86 cm from the bottom edge of the page for 8.5 x 11-inch paper; for A4 paper, approximately 1-5/8 inches (4.13 cm from the bottom edge of the page. 6. Conclusion We have presented a new hierarchical interconnection network, called WK-pyramid network (WKP (C, for massively parallel computers. The issues presented the architecture of the WKP (C,, a routing algorithm, determining of the network cost, and discussion about some topological properties and finally a proof of existence of network s Hamiltonian cycle and path. Because of the desirable properties of this network, WKP (C, is suitable for medium or large sized networks. It is shown that although the network degree of WKP (C, is small, the average distance and diameter of this network is rather low, a property that it is desirable under wormhole and packet switching performance. This topology can be utilized in many software applications that are traditionally implemented on the pyramid network, such as in graph theory, digital geometry, machine vision, and image processing [6]. This remains a subject for further exploration. Proceedings of the 8th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN 05

The conjecture of the authors is that the WKP (C, possesses two other important properties, the Hamiltonian-connectedness and Pancyclicity properties. Proving these properties is the aim of future work. 7. References [1]Della Vecchia, G.,C. Sanges, Recursively Scalable Networks for Message Passing Architectures, Proc. Conf. Parallel Processing and Applications, (1987 pp. 33-40. [2]Day, K. and A. Al-Ayyoub, Topological Properties of OTIS-Networks, IEEE Trans. Parallel and Distributed Systems, Vol. 13, No. 4, (April 2002 pp. 359-366. [3]Ghose, K. and K.R. Desai, Hierarchical Cubic Networks, IEEE Trans. Parallel and Distributed Systems, Vol. 6, No. 4, (April 1995 pp. 427-435. [4]Hwang, K. and J. Ghosh, Hyper net: A Communication Efficient Architecture for Constructing Massively Parallel Computers, IEEE Trans. Computers, Vol. 36, No. 12, (1987 pp. 1450-1466. [5]Kwai, D.-M. and B. Parhami, Pruned Three-Dimensional Toroidal Networks, Information Processing etters, Vol. 68, No. 4, (November1998 pp. 179-183. [6]Parhami, B. and D.-M. Kwai, Periodically Regular Chordal Rings, IEEE Trans. Parallel and Distributed Systems, Vol. 10, No. 6, (June 1999 pp. 658-672. [7]Yeh, C.-H. and B. Parhami, Recursively Fully-Connected Networks: A Class of High- Performance ow-degree Interconnection Networks, Proc. 11th Int l Conf. Computers and Their Applications, (1996 pp.227-230. [8]Yeh, C.-H. and B. Parhami, Hierarchical Swapped Networks: Efficient ow-degree Alternatives to Hypercube and Generalized Hypercube, Proc. Int l Symp. Parallel Architectures, Algorithms, and Networks, (1996 pp. 90-96. [9]Jung-sheng Fu, B., Hamiltonian-connectedness of the WK-Recursive network the 7 th international Symposium on parallel architecture, algorithms, & Networks. (May 2004 pp.569-574. [10]Chen,G.H.,Duh, D.R.: Topological properties, communication and computation on WK-recursive, Networks 24, No.6 (1994 pp. 303 317. [11]R. Miller, Q. Stout, Data movement techniques for the pyramid computer, SIAM Journal of Computing 16 (1987 pp. 38-60. [12]F. Cao, D.F. Hsu, Fault-tolerance properties of pyramid networks, IEEE Transactions on Computers 48 (1999 pp. 88-93. [13]Della Vecchia, G., Sanges, C.: An optimized broadcasting technique for WK-recursive topologies. Future Gen. Comput. Syst 4. No. 3, (1990 pp. 353 358. [14]Duh, D. R., Chen, G. H. Topological properties of WKrecursive networks J. Parallel Distr.Comput. 23, (1994 pp. 468 474. [15]A. Dingle, H. Barada, Optimum embedding of endaround meshes into pyramid networks, Proc. Int'l Symp. Parallel Processing (1991 pp. 112-118. [16]A. Dingle, et all, Simulation of binary trees and x-trees on pyramid networks, Proc. IEEE Symp. Parallel & Distributed Processing (May 1992 pp. 220-229. [17]T.H. ai, W. White, Mapping pyramid algorithms into hypercubes Journal of Parallel & Distributed Computing 9 (1990 pp. 42-54. [18]C.K.Y Ng, Embedding pyramids into 3D meshes, Journal of Parallel & Distributed Computing 36 (1996 pp. 173-184. [19]H. Sarbazi-Azad, M. Ould-khaoua,.M. Mackenzie, Algorithmic construction of Hamiltonians in Pyramids, Information Processing etters 80 (2001 pp. 75-79. [20]M. Hoseiny Farahabady, H. Sarbazi-Azad, The RTCCpyramid: A Versatile Pyramid network, HPC Asia 2005, (December 2005, Beijing, China, to be appeared. [21]M. Hoseiny Farahabady, H. Sarbazi-Azad, TheGrid- Pyramid: A Generalized Pyramid Network, Journal of Supercomputing, to be appeared. ( 4 Figure 3. A Hamiltonian path between two nodes (, 0 and (, 4 according to the method used in the proof of Theorem 2. Proceedings of the 8th International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN 05