2015/7/2Deadlock-free Packet Switching1 Introduction to Distributed Algorithm Part One: Protocols Chapter 5- Deadlock-free Packet Switching Teacher: Chun-Yuan.

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

Communication Networks Recitation 3 Bridges & Spanning trees.
Chapter 4 Distributed Bellman-Ford Routing
Fundamentals of Computer Networks ECE 478/578 Lecture #13: Packet Switching (2) Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Jaringan Komputer Lanjut Packet Switching Network.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
High Performance Router Architectures for Network- based Computing By Dr. Timothy Mark Pinkston University of South California Computer Engineering Division.
1 I.S Introduction to Telecommunication in Business Chapter 6 Network Hardware Components Dr. Jan Clark FALL, 2002.
Routing So how does the network layer do its business?
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 23 Introduction to Computer Networks.
Teknik Routing Pertemuan 20 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Acyclic orientations do not lead to optimal deadlock-free packet routing algorithms. Daniel Štefankovič.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Quickest path and Quickest routing: A dynamic routing method Research Topic: Jiang, XidongMS candidate in computer science at California State University,
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
Delivery, Forwarding, and Routing
1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Distributed process management: Distributed deadlock
Energy Aware Directed Diffusion for Wireless Sensor Networks Jisul Choe, 2Keecheon Kim Konkuk University, Seoul, Korea
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
MULTICOMPUTER 1. MULTICOMPUTER, YANG DIPELAJARI Multiprocessors vs multicomputers Interconnection topologies Switching schemes Communication with messages.
Connecting LANs, Backbone Networks, and Virtual LANs
Switching, routing, and flow control in interconnection networks.
The Zone Routing Protocol (ZRP)
Chapter 4.  Understand network connectivity.  Peer-to-Peer network & Client-Server network  Understand network topology  Star, Bus & Ring topology.
1 The Turn Model for Adaptive Routing. 2 Summary Introduction to Direct Networks. Deadlocks in Wormhole Routing. System Model. Partially Adaptive Routing.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 8: Bridging Slides used with permissions.
Chapter 4: Managing LAN Traffic
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
University of the Western Cape Chapter 11: Routing Aleksandar Radovanovic.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
Distributed Routing Algorithms. In a message passing distributed system, message passing is the only means of interprocessor communication. Unicast, Multicast,
High-Level Interconnect Architectures for FPGAs An investigation into network-based interconnect systems for existing and future FPGA architectures Nick.
Data Communications & Computer Networks, Second Edition1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks.
Deadlock CEG 4131 Computer Architecture III Miodrag Bolic.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
The Network Layer.
Multiplexing FDM & TDM. Multiplexing When two communicating nodes are connected through a media, it generally happens that bandwidth of media is several.
CSC 311 CHAPTER TEN CONNECTING NETWORKS. CSC 311 We have looked at several different network topologies Why do we have different types of networks? Why.
Chapter 8-2 : Multicomputers Multiprocessors vs multicomputers Multiprocessors vs multicomputers Interconnection topologies Interconnection topologies.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
BZUPAGES.COM Presentation On SWITCHING TECHNIQUE Presented To; Sir Taimoor Presented By; Beenish Jahangir 07_04 Uzma Noreen 07_08 Tayyaba Jahangir 07_33.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
1 Data Link Layer Lecture 23 Imran Ahmed University of Management & Technology.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
M. Veeraraghavan (originals by J. Liebeherr) 1 Need for Routing in Ethernet switched networks What do bridges do if some LANs are reachable only in multiple.
1 Computer Communication & Networks Lecture 25 Transport Layer: Congestion Control Waleed Ejaz
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 CH. 8: SWITCHING & DATAGRAM NETWORKS 7.1.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
5: DataLink Layer 5a-1 Bridges and spanning tree protocol Reference: Mainly Peterson-Davie.
Lecture 7. Building Forwarding Tables There are several methods Static Method Dynamic Methods Centralized Distributed Distance Vector Link State.
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
4. Interconnecting Networks: Routers. © Tallal Elshabrawy 2 Bridges Vs Routers BRIDGES DO WELL IN SMALL (FEW HUNDRED HOSTS) WHILE ROUTERS USED IN LARGE.
COMP8330/7330/7336 Advanced Parallel and Distributed Computing Communication Costs in Parallel Machines Dr. Xiao Qin Auburn University
Packet Switching Datagram Approach Virtual Circuit Approach
Chapter 6 Delivery & Forwarding of IP Packets
Deadlock-free Packet Switching
Routing: Distance Vector Algorithm
ECE 544 Protocol Design Project 2016
ECE 544 Protocol Design Project 2016
PRESENTATION COMPUTER NETWORKS
CEG 4131 Computer Architecture III Miodrag Bolic
Delivery, Forwarding, and Routing of IP Packets
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Presentation transcript:

2015/7/2Deadlock-free Packet Switching1 Introduction to Distributed Algorithm Part One: Protocols Chapter 5- Deadlock-free Packet Switching Teacher: Chun-Yuan Lin

2015/7/2Deadlock-free Packet Switching2 Deadlock-free Packet Switching(1) Messages (packets) traveling through a packet-switched communication network must be stored at each node before being forwarded to the next node on the path to their destination. An important problem in the design of packet-switching networks is how to deal with store-and-forward deadlocks.

2015/7/2Deadlock-free Packet Switching3 Deadlock-free Packet Switching(2) An important problem in the design of packet-switching networks is how to deal with store-and-forward deadlocks. In this chapter we shall treat several methods, referred to as controllers, that can be used to avoid the possibility of store-and- forward deadlocks by introducing restrictions on when a packet can be generated or forwarded. Methods of avoiding store-and­forward deadlocks are found in the network layer of the OSI reference model.

2015/7/2Deadlock-free Packet Switching4 Deadlock-free Packet Switching(3) Two kinds of method will be discussed, based on structured and unstructured buffer pools. Methods using structured buffer pools (Section 5.2) will identify for a node and a packet a specific buffer that must be taken if a packet is generated or received. In methods using unstructured buffer pools (Section 5.3) all buffers are equal; the method only prescribes whether or not a packet can be accepted, but does not determine in which buffer it must be placed. Some notations and definitions are introduced in Section 5.1. We conclude the chapter with a discussion of further issues in Section 5.4.

2015/7/2Deadlock-free Packet Switching5 Introduction(1) The handling of packets by the nodes is described by the following three types of moves that can occur in the network. Generation A node u "creates" a new packet p and places it in an empty buffer in u. The node u is called the source of p in this case. Forwarding A packet p is forwarded from a node u to an empty buffer in the next node w on its route. As a result of the move the buffer previously occupied by p becomes empty.

2015/7/2Deadlock-free Packet Switching6 Introduction(2) Consumption A packet p occupying a buffer in its destination node is removed from the buffer.

2015/7/2Deadlock-free Packet Switching7 Introduction(3)

2015/7/2Deadlock-free Packet Switching8 Structured Solutions We shall now discuss a class of controllers relying on so-called buffer graphs, introduced by Merlin and Schweitzer. The principle of these buffer graphs is based on the observation that a deadlock is due to a cyclic wait situation. Cyclic waits are avoided by moving the packets along paths in an acyclic graph (the buffer graph). (no simple cycle)

2015/7/2Deadlock-free Packet Switching9 Buffer Graphs (1)

2015/7/2Deadlock-free Packet Switching10 Buffer Graphs (2) The buffer-graph controller. A buffer graph BG can be used to implement a deadlock-free controller bgc BG provided that the buffer nb(p, b) is encoded in each packet and/or the state of the node where presides.

2015/7/2Deadlock-free Packet Switching11 Buffer Graphs (3) Two examples of the use of buffer graphs, namely the destination scheme and the hops-so-far scheme. For a specific destination d

2015/7/2Deadlock-free Packet Switching12 Buffer Graphs (4) The controller dest is very simple to use, but has the disadvantage that a large number of buffers is required in each node, namely N.

2015/7/2Deadlock-free Packet Switching13 Buffer Graphs (5) diameter

2015/7/2Deadlock-free Packet Switching14 Orientations of G (1) In the hops-so­far controller the index of the buffer in which a packet is stored increases with every hop. We shall now allow a slower growth of the buffer index by assuming an increase in the buffer index with certain, but not necessarily all, hops.

2015/7/2Deadlock-free Packet Switching15 Orientations of G (2) We refer to the resulting class of controllers as acyclic orientation cover controllers, or AOC controllers, for short.

2015/7/2Deadlock-free Packet Switching16 Orientations of G (3) Packet switching on a ring. Acyclic orientation covers can be used to give deadlock-free controllers for several classes of networks.

2015/7/2Deadlock-free Packet Switching17 Orientations of G (4) Packet switching on a tree. Acyclic orientation covers can be used to construct a controller using only two buffers per node for a network that is a tree.

2015/7/2Deadlock-free Packet Switching18 Unstructured Solutions We shall now discuss a class of controllers proposed by Toueg and Ullman. These controllers do not prescribe in which buffer a packet must be placed, and they use only simple local information such as the hop count or the number of occupied buffers in a node.

2015/7/2Deadlock-free Packet Switching19 Forward-count Controllers

2015/7/2Deadlock-free Packet Switching20 Forward-state Controllers

2015/7/2Deadlock-free Packet Switching21 Backward-count Controllers

2015/7/2Deadlock-free Packet Switching22 Backward-state Controllers

2015/7/2Deadlock-free Packet Switching23 Further Issues (1) In the results of this chapter the number of buffers needed by a controller has always played a role. It is usually the case that the throughput is increased if more buffers are available. In the unstructured solutions only a lower bound on the number of buffers is given; a larger number can be used without any modification. In the structured solutions additional buffers must somehow be inserted into the buffer graph, which call be done either statically or dynamically.

2015/7/2Deadlock-free Packet Switching24 Further Issues (2) Topological Changes After the occurrence of such a change the routing tables of each node will be updated and the packet is then forwarded using the changed values of these tables. The controller dest. Hop-counting controllers.

2015/7/2Deadlock-free Packet Switching25 Further Issues (3) Other Types of Deadlock Only store-and-forward deadlocks have been considered in this chapter. Merlin and Schweitzer consider four types, Progeny deadlock may arise when a packet p in the network can create another packet q, Copy-release deadlock may arise when the source holds a copy of the packet until an acknowledgement for the packet is received from the destination. Pacing deadlock may arise when the network contains nodes, with limited internal storage, that may refuse to consume messages until some other messages have been generated.

2015/7/2Deadlock-free Packet Switching26 Further Issues (4) Reassembly deadlock may arise in networks where large messages are divided into smaller packets for transmission and no packet can be removed from the network until all packets of the message have reached the destination.

2015/7/2Deadlock-free Packet Switching27 Further Issues (5) Livelock The definition of deadlocked packets implies that under a deadlock-free controller there exists for each packet at least one computation in which the packet is consumed.

2015/7/2Deadlock-free Packet Switching28 Further Issues (6)

2015/7/2Deadlock-free Packet Switching29 Further Issues (7)