Connective Fault Tolerance in Multiple-Bus System Hung-Kuei Ku and John P. Hayes IEEE Transactions on parallel and distributed System, VOL. 8, NO. 6, June.

Slides:



Advertisements
Similar presentations
Chapter 11 Trees Graphs III (Trees, MSTs) Reading: Epp Chp 11.5, 11.6.
Advertisements

Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Chapter Three: Interconnection Structure
Recovery Techniques in Mobile Databases Prepared by Ammar Hamamra.
Graph. -traffic modeling MAXIMUM FLOW -shortest (fastest) route SHORTEST PATH -efficient distribution, logistics, pickup/delivery HAMILTONIAN PATH/CYCLE,
Connectivity - Menger’s Theorem Graphs & Algorithms Lecture 3.
Covers, Dominations, Independent Sets and Matchings AmirHossein Bayegan Amirkabir University of Technology.
Chapter 8 Topics in Graph Theory
An Introduction to Channel Routing
Routing in a Parallel Computer. A network of processors is represented by graph G=(V,E), where |V| = N. Each processor has unique ID between 1 and N.
1 Fault-Tolerant Computing Systems #6 Network Reliability Pattara Leelaprute Computer Engineering Department Kasetsart University
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
EMIS 8374 Vertex Connectivity Updated 20 March 2008.
1 Wide-Sense Nonblocking Multicast in a Class of Regular Optical Networks From: C. Zhou and Y. Yang, IEEE Transactions on communications, vol. 50, No.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
Chapter 9 Connectivity 连通度. 9.1 Connectivity Consider the following graphs:  G 1 : Deleting any edge makes it disconnected.  G 2 : Cannot be disconnected.
Broadcasting Protocol for an Amorphous Computer Lukáš Petrů MFF UK, Prague Jiří Wiedermann ICS AS CR.
1 Interconnection Networks Direct Indirect Shared Memory Distributed Memory (Message passing)
Networks Types. Spring 2002Computer Network Applications Data Transfer During the ’70s: Minicomputers became affordable; Need to communicate information;
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
1 高等演算法 Homework One 暨南大學資訊工程學系 黃光璿 2004/11/11. 2 Problem 1.
Adaptive Web Caching: Towards a New Caching Architecture Authors and Institutions: Scott Michel, Khoi Nguyen, Adam Rosenstein and Lixia Zhang UCLA Computer.
7. Fault Tolerance Through Dynamic or Standby Redundancy 7.6 Reconfiguration in Multiprocessors Focused on permanent and transient faults detection. Three.
1 Tuesday, September 26, 2006 Wisdom consists of knowing when to avoid perfection. -Horowitz.
CSE 321 Discrete Structures Winter 2008 Lecture 25 Graph Theory.
A new predictive search area approach for fast block motion estimation Kuo-Liang Chung ( 鍾國亮 ) Lung-Chun Chang ( 張隆君 ) 國立台灣科技大學資訊工程系暨研究所 IEEE TRANSACTIONS.
Proxy Caching the Estimates Page Load Delays Roland P. Wooster and Marc Abrams Network Research Group, Computer Science Department, Virginia Tech 元智大學.
©Silberschatz, Korth and Sudarshan18.1Database System Concepts Centralized Systems Run on a single computer system and do not interact with other computer.
Evaluating Content Management Techniques for Web Proxy Caches Martin Arlitt, Ludmila Cherkasova, John Dilley, Rich Friedrich and Tai Jin Hewlett-Packard.
Network Topologies. Point-to-Point Topology Point-to-point (PTP) topology connects two nodes directly together. The following examples are pure point.
Multicomputers and Interconnection Networks Lecture for CPSC 5155 Edward Bosworth, Ph.D. Computer Science Department Columbus State University.
1 Fast and selection algorithms with application to median filtering Instructor : T.-Y. Liang Reporter : Shiuh-Pyng Yang.
1 Next Few Classes Networking basics Protection & Security.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
Minimal Fault Diameter for Highly Resilient Product Networks Khaled Day, Abdel-Elah Al-Ayyoub IEEE Trans. On Parallel and Distributed Systems 2000 vol.
7.1 and 7.2: Spanning Trees. A network is a graph that is connected –The network must be a sub-graph of the original graph (its edges must come from the.
4.1 Connectivity and Paths: Cuts and Connectivity
Multiprossesors Systems.. What are Distributed Databases ? “ A Logically interrelated collection of shared data ( and a description of this data) physically.
1 Multicasting in a Class of Multicast-Capable WDM Networks From: Y. Wang and Y. Yang, Journal of Lightwave Technology, vol. 20, No. 3, Mar From:
Embedding long paths in k-ary n-cubes with faulty nodes and links
1 Job Scheduling for Grid Computing on Metacomputers Keqin Li Proceedings of the 19th IEEE International Parallel and Distributed Procession Symposium.
Complex Contagions Models in Opportunistic Mobile Social Networks Yunsheng Wang Dept. of Computer Science, Kettering University Jie Wu Dept. of Computer.
Week 1 – Introduction to Graph Theory I Dr. Anthony Bonato Ryerson University AM8002 Fall 2014.
Chapter 6 Connectivity and Flow 大葉大學 資訊工程系 黃鈴玲
CFTP - A Caching FTP Server Mark Russell and Tim Hopkins Computing Laboratory University of Kent Canterbury, CT2 7NF Kent, UK 元智大學 資訊工程研究所 系統實驗室 陳桂慧.
The Measured Access Characteristics of World-Wide-Web Client Proxy Caches Bradley M. Duska, David Marwood, and Michael J. Feeley Department of Computer.
Graph Theory. undirected graph node: a, b, c, d, e, f edge: (a, b), (a, c), (b, c), (b, e), (c, d), (c, f), (d, e), (d, f), (e, f) subgraph.
Hopfield Neural Networks for Optimization 虞台文 大同大學資工所 智慧型多媒體研究室.
Byzantine Agreement in the Presence of Mixed Faults on Processor and Links Hin-Sing Siu, Yeh-Hao Chin, Wei-Pang Yang Senior Member, IEEE Computer Society,
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Copyright 2007 Koren & Krishna, Morgan-Kaufman Part.12.1 FAULT TOLERANT SYSTEMS Part 12 - Networks.
In: Pattern Analysis and Machine Intelligence, IEEE Transactions on, Vol. 30, Nr. 1 (2008), p Group of Adjacent Contour Segments for Object Detection.
A General Method For Maximizing the Error-Detecting Ability of Distributed Algorithms Martina Schollmeyer and Bruce McMillin IEEE Transactions on parallel.
Improving the WWW: Caching or Multicast? Pablo RodriguezErnst W. BiersackKeith W. Ross Institut EURECOM 2229, route des Cretes. BP , Sophia Antipolis.
1 Fault-tolerant cycle embedding in the hypercube Jung-Sheng Fu Department of Electronics Engineering, National Lien-Ho Institute of Technology Parallel.
Interconnection Networks Communications Among Processors.
Overview Parallel Processing Pipelining
Interconnection topologies
Minimum Spanning Tree 8/7/2018 4:26 AM
Chi Zhang, Yang Song and Yuguang Fang
Graph Operations And Representation
High Performance Computing & Bioinformatics Part 2 Dr. Imad Mahgoub
Problem Solving 4.
3.3 Network-Centric Community Detection
SPQR Tree.
Interconnection Networks
Miniconference on the Mathematics of Computation
Hopfield Neural Networks for Optimization
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
Locality In Distributed Graph Algorithms
Presentation transcript:

Connective Fault Tolerance in Multiple-Bus System Hung-Kuei Ku and John P. Hayes IEEE Transactions on parallel and distributed System, VOL. 8, NO. 6, June 1997 元智大學 資訊工程所 陳桂慧

Outline PBL Graph model Connectivity and faults –Processor fault tolerance –Bus fault tolerance –Link fault tolerance Application –M-LANs –Spanning Bus Hypercubes Conclusion

A Representative multiple-bus system P1P2P3P4 memory l1 l2l3l4l5l6l9l8l7 b1 b3 b2 Processors Links Buses

Processor-Bus-Link (PBL) Graph When there is no fault PBL graph G’ P1P4P3P2 b1b2b3 l1 l2 l3 l4 l5 l6l9 l8 l7 P1P4P2 b1b3 l1 l3 l5 l9 P-nodes B-nodes when processor p3, bus b2, and link l8 are faulty

Component Adjacency Graph processor adjacency graph (PAG) Gp’ BAG Gb’ LAG Gl’ l1 l2 l3 l4 l5 l6 l9 l8 l7 b1 b3 b2 p1 p4 p2 p3

A PBL Graph G’’ P1P4P3P2P4 b1b2b3 l1 l2 l3 l4 l5 l6 l9 l8 l7 l10 l11 l12 p1 p4 p2 p3 P5 BAG Gb’’ b1 b3 b2 l1 l2l3 l4 l5 l6 l9 l8 l7 l11 l10 l12 LAG Gl’’ PAG Gp’’ b4

Processor Fault Tolerance P-nodes are connected in a PBL graph if and only if its PAG is connected. THEOREM 1. A PBL graph G is (K(Gp)-1)-PFT where Gp is the PAG of G. –Kp-PFT, Kp is the degrees of processor fault tolerances of G. –The (node) connectivity K(G) of G is the cardinality of a smallest node cut of G, a node cut of G is a set of nodes whose result in a disconnected or trivial graph. COROLLARY 1. The minimum critical processor-fault sets of a PBL graph G are the minimum node cuts of its PAG Gp.

LEMMA 1. Let G be a PBL graph with no isolated P-node or B-node, and let G contain at least two P-nodes and B-nodes. The P-nodes of G are connected if and only if its B-nodes are connected. THEOREM 2. Let G be a PBL graph that contain b B-nodes. If ßp(G)<b, then G is (min{K(Gb),ßp(G)}-1)-BFT, where Gb is the BAG of G; otherwise, G is (ßp(G)-1)-BFT. Bus Fault Tolerance

Bus Fault Tolerance (2) COROLLARY 2. Let G be the BAG of a PBL graph G. Then the minimum critical bus-fault set of G are given by the following three cases: –the minimum node cuts of Gb, if ßp(G)<b and K(Gb)<ßp(G); –the minimum neighborhoods of the P-nodes of G, if ßp(G)=b, K(Gp)>ßp(G), or K(Gb)=ßp(G)=b-1; –all the minimum critical bus-fault sets described in the precious two cases, if K(Gb)=ßp(G)<b-1.

LEMMA 2. The P-nodes of a PBL graph G with no isolate P- node are connected if and only if the edges of G are connected. THEOREM 3. A PBL Graph G is (min{K(Gl), ðp(G)}-1)-LFT where Gl is the LAG of G Link Fault Tolerance

COROLLARY 3. Let Gl be the LAG of a PBL graph G. Then the minimum critical link-fault sets of G are given by the following three cases: –the minimum node cuts of Gl, if K(Gl)<ðp(G); –edge sets, each of which contains all the edges incident with a P-node of degree ðp(G), if K(Gl)>ðp(G); –all the minimum critical link-fault sets described in the previous two cases, if K(Gl)=ðp(G).

Application - M-LAN M-LAN, multi-channel local area network, every processor is connected to all buses. P1P3P2 b1b2b3 LAG of K3,4 The complete graph K3,4

PAG of Kp,b is the complete graph Kb of p nodes, => Kp,b is (p-2)-PFT, –ßp(Kp,b) = b, => (b-1)-BFT. LEMMA 3. The LAG Gl of the complete bipartite graph Kp,b is (p+b-2)-connected. THEOREM 4. An M-LAN with p>=2 processors and b buses is (p-2,b-1,b-1)-FT Application - M-LAN

Application - Spanning Bus Hypercubes

A w-wide d-dimensional spanning-bus hypercube is (d(w-1), d-1, d-1)-FT

Conclusion The PBL model is straightforward but very general. –The B-node can represent any communication medium that transfers signals/data to all the components connect to it. The PBL graph model can efficiently model a wide variety of faults such as processor, bus, and link faults. –The component adjacency graphs derived from the PBL graph are particularly useful for identifying a network’s “weak” point, such as its minimum critical fault sets.