SlideShare a Scribd company logo
1 of 7
Download to read offline
Full Paper
ACEEE Int. J. on Communications, Vol. 4, No. 2, Nov 2013

Analysis of Latency and Throughput of 2D Torus
Topology using Modified XY Routing Algorithm
Ms. Priyanka N. Chopkar1 and Dr. Mahendra A. Gaikwad2
1

PG Student, M-Tech (Electronics), B. D. College of Engineering Sewagram (Wardha), Maharashtra, India
priyachopkar@gmail.com
2
Professor & Dean R & D, B. D. College of Engineering Sewagram (Wardha), Maharashtra, India
gaikma@rediffmail.com

Abstract - Network-on-Chip (NoC) is a packet switched onchip communication network designed using a layered
methodology i.e. “routes packets, not wires”. It is an efficient
on chip communication architecture for System on Chip (SoC)
architectures. NoCs solved the disadvantages of SoCs and are
scalable. Each route in NoC includes some routers and it takes
a few clock periods by passing a router.
When the network is in congestion, the package transmission
will produce much more time delay. So adopting an appropriate
routing algorithm to get the balance between the time delay
and throughput rate becomes the key problem. In this paper
we tried to solve that problem using torus topology with our
modified XY routing algorithm.
We used NIRGAM simulator for analysis of latency and
throughput of modified XY routing algorithm for 2D torus
topology. 3x3 network size used for analyze the performance.
We consider all tiles as source, all tiles as destination and
vary the packet size & traffic used is Constant Bit Rate (CBR)
random traffic. It is found that packet size increases then
latency/packet increases and throughput (in Gbps) also
increases but latency/flit decreases.

routing algorithms. Communication performance of a NoC
depends heavily on the routing algorithm used.
Routing is one of the most crucial key factors which will
decide over the success of NoC architecture based systems
or their failure. There are different routing algorithms such as
XY routing algorithm, odd even routing algorithm and source
routing algorithm etc. Modified XY routing algorithm is simple
and widely used. It is static, deterministic and deadlock free
routing algorithm. In deterministic routing algorithm the path
between source to destination is fixed.
In modified XY routing algorithm [1], a packet must always
be routed along horizontal or X axis until it reaches the same
column as that of destination then it should be routed along
vertical or Y axis and towards the location of destination
resource.
Routing is in deadlock when two packets are waiting each
other to be routed forward. Both of the packets are waiting
each other to release the resources. Routers do not release
the recourses before they get the new recourses and so the
routing is locked.
Topology is a very important feature in the design of
NoC because design of a router depends upon it. There are
different types of topologies such as mesh, torus, folded
torus, star, octagon, tree, etc. Among this topology, torus
topology was proposed to reduce the latency of mesh and
keep its simplicity.
The main problem with the mesh topology is its long
diameter that has negative effect on communication latency.
The only difference between torus and mesh topologies is
that the switches on the edges are connected to the switches
on the opposite edges through wrap-around channels. The
performance parameters are latency and throughput. Latency
is defined as time taken to deliver a packet from source to
destination. Throughput is defined as a fraction of packets
delivered from sources to destinations in a given amount of
time.

Keywords – 2D torus topology, modified XY routing algorithm,
Network on Chip (NoC), NIRGAM simulator.

I. INTRODUCTION
NoC is an approach to design the communication
subsystem between IP cores in a SoC. NoCs are expected to
overcome scalability and performance limitations of Pointto-Point (P2P) and bus-based communication systems.
NoCs use packets to route data from the source to the
destination Processing Elements (PE) via a network fabric
that consists of switches (routers) and interconnection links
(wires). The wires in the links of the NoC are shared by
many signals. A high level of parallelism is achieved, because
all links in the NoC can operate simultaneously on
different data packets. Therefore, as the complexity
of integrated systems keeps growing, a NoC provides
enhanced performance (such
as throughput)
and scalability in comparison with communication
architectures (e.g., dedicated point-to- point signal wires,
shared buses, or segmented buses with bridges).
NoCs are an attempt to scale down the concepts of large
scale networks, and apply them to the embedded system-onchip (SoC) domain. The main difference between SoC and
NoC is the sharing of links. The most important features that
distinguish NoC architectures are network topology and
© 2013 ACEEE
DOI: 01.IJCOM.4.2.10

II. RELATED WORK
Mohsen Nickray et al. [2] have described an adaptive
routing algorithm which is based on deterministic XY routing
algorithm. In their model a switch is a context-aware agent
and a network is a society of context-aware agents which are
ever learning and adapting to distribute the congestion
uniformly and isolate the malformed switches (agents). In
conventional XY routing, first, the load in the center of a
1
Full Paper
ACEEE Int. J. on Communications, Vol. 4, No. 2, Nov 2013
latency is improved. To dynamically react to continuously
changing traffic conditions, the shortest path computation
procedure is invoked periodically. Because this procedure is
based on the ball-and-string model, the hardware overhead
and computational times are minimal. Experimental results
based on an actual Verilog implementation demonstrate that
the proposed adaptive routing algorithm improves significantly the network throughput compared to traditional XY
routing and DyXY adaptive algorithms.
A.H. Borhani et al. [7] described a new fault tolerant
routing algorithm, which is based on dimension order routing,
is proposed for k-ary 2-cubes. Packets are sent to their
destination through XY routing algorithm and if this
transmission is not possible, YX routing algorithm is applied.
The result shows that these method is preferred, especially
in the environments where the fault probability is low and
the message generation rate is high.
Yonghui Li & HuaxiGu [8] described a new model called
the XY-turn model for designing partially adaptive or
deterministic routing algorithms for honeycomb networks on
chip without adding virtual channels. The model prohibits
two turns in opposite directions at some particular nodes so
that the deadlock can be avoided. The restricted turns result
in simplified router architectures especially for photonic
NoCs. They have implemented a deterministic routing
algorithm is carried out to test the performance of the
algorithm in end to end delay and throughput under the
conditions that messages length are 128 bytes, 256 bytes
and 512 bytes respectively, as well as the network size varies
from 36 cores to 64 cores and 98 cores. The results
deterministic that the honeycomb NoCs would benefits from
the XY-turn model in terms of communication efficiency.
Masood Dehyadgari et al. [9] have described a pseudo
adaptive routing which is an extension of classic XY routing.
They consider mesh topology for evaluating proposed
routing. Their switches use Pseudo adaptive XY routing
algorithm. The load in the center of a network in ordinary XY
routing is much higher rather than total average. This extra
load on the center of mesh can cause spot hot. The main
objective of their routing algorithm is to distribute network
load. One of the advantages of distributing network load is
balanced temperature on the mesh. Their routing algorithm
has two modes that is deterministic and adaptive Packets are
routed with classic XY routing (deterministic mode), when
congestion in the network is low. When congestion is high,
packets will be routed through less congested route adaptively
(adaptive mode).
Mehrdad Seyrafi et al. [10] has been described a new
fault tolerant routing algorithm with minimum hardware
requirements and extremely high fault tolerance for 2D-mesh
based NoCs is proposed. The LCFT (Low Cost Fault Tolerant)
algorithm, removes the main limitations (forbidden turns) of
the famous XY. So not only many new routes will be added to
the list of selectable paths as well as deadlock freedom, but
also it creates high level of fault tolerance. All these things
are yielded only by the cost of adding one more virtual
channel (for a total of two). Results show that LCFT algorithm

network is much higher rather than total average and this
leads to hot spot in the center of network. And second, a
malfunction in switches could make part of network out of
access. But in their proposed routing, first, all agents are
aware from their neighbor’s congestion and collaboratively
try to route their input packets through less congested route,
according to their experiences learned before and second,
when a new malfunction takes place in the network, all agents
collaborate each other to recognize the malformed agent and
learn the best route. The main objective of their routing
algorithm is to distribute network load uniformly throughout
the network. They developed a NOC environment using
SystemC.
Manas Kumar Puthal et al. [3] have described a new
hierarchical cluster based adaptive routing called „C-Routing
in 2D mesh NoC. The solution reduces routing table size and
provides deadlock freedom without use of virtual channels
while ensuring live lock free routing. Routers in this method
use intelligent routing to route information between the
processing elements ensuring the correctness, deadlock
freeness, and congestion handling. This method has been
evaluated against other adaptive algorithms such as PROM,
and Q-Routing etc. C-routing uses adaptively to avoid
congestion by uniform distribution of traffic among the cores
by sending flits over two different paths to the destination.
Proposed technique achieves two objectives, as inferred from
the results, reduction in area and higher throughput. These
benefits are achieved at a marginal increase in power
consumption and latency while preserving deadlock freedom
with no extra virtual channels. Fault tolerance is another major
issue in NoC design.
Jin-xiang Wang et al. [4] have described a new fault model,
defines separately node-fault and link-fault, reduces
situations classified as node-fault effectively and
consequently improves the performance of the network. By
defining some new paths to substitute failure paths, data
packets can be routed along the new paths which are formed
by the neighbor nodes of node-fault or link-fault. A faulttolerant wormhole router based on XY routing algorithm is
designed according to the solution. The evaluation results
show that network performance can be improved by 15%
when link-fault occurs in the network.
Ruizhe Wu et al. [5] have been described a new on-chip
communication system & dubbed Wireless Network on- Chip
(WNoC). This work centers on the design of a high-efficient,
low-cost, deadlock-free routing scheme for domain-specific
irregular mesh WNoCs. A distributed minimal table based
routing scheme is designed to facilitate segmented XYrouting. Deadlock-free data transmission is achieved by
implementing a new turn class’s based buffer ordering scheme.
Hamed S. Kia and Cristinel Ababei [6] have described
algorithm is based on the balland-string model and employs
a distributed approach based on partitioning of the regular
NoC architecture into regions controlled by local monitoring
units. Each local monitoring unit runs a shortest path computation procedure to identify the best routing path so that
highly congested routers and faulty links are avoided while
© 2013 ACEEE
DOI: 01.IJCOM.4.2.10

2
Full Paper
ACEEE Int. J. on Communications, Vol. 4, No. 2, Nov 2013
can work well under almost bad conditions of faults in
comparison with the Modified-XY, Modified-YX algorithms.
Yang Quansheng & Wu Zhekai [11] have described an
improved topology called Tmesh, which is based on standard
mesh network by inserting four long links to connect the
vertices to reduce the communication delay between some
remote nodes. They also present a deadlock-free routing
algorithm for Tmesh named TXY algorithm. The results of
this algorithm show a certain reduction in the average packet
delay and routing hops. When the network has 64 nodes, the
average delay and routing hops of Tmesh are 2.92% and
3.53% lower than those of mesh respectively.
Shu Yan Jiang et al. [12] describe an online detection
method of interconnection for 2D torus structure of NoC
system. This method can detect the data errors during
transmission and identify the error results from the routing
switch failure or the data transmission interconnection line
failure. They design a sub-router based on the wormhole
exchange using E-cube routing algorithm and a check module
which is suitable for the original routing node functions and
work feature. They simulate the method by Verilog HDL and
quart us II software. The experiment results show that the
method can detect data errors caused by the router failure or
interconnect failure and can locate the fault.
Xiaohang Wang et al. [13] described a simple, yet efficient
hardware based multicasting scheme is proposed for irregular
mesh based NoC. First, an irregular oriented multicast strategy
is proposed. Following this strategy, an irregular oriented
multicast routing algorithm can be designed based on any
regular mesh based multicast routing algorithm. One such
algorithm, namely, Alternative XY (AL+XY), is proposed
based on XY routing. Experimental results show that AL+XY
achieve significant reduction in power consumption and
packet latency compared with existing solutions. AL+XY
saves 29% power consumption than that of multiple unicast.
In terms of average packet latency, when injection rate is
high (e.g. near 0.15), the latency of AL+XY is only 50%.
Slavisa Jovanovic et al. [14] has been described a new
deadlock free fault tolerant adaptive routing algorithm for 2D
mesh NoC interconnection. The main contribution of this
routing algorithm is that it allows both, routing of messages
in the networks incorporating the regions not necessarily
rectangular and routing to all nodes which are not completely
blocked by faulty nodes. The proposed routing algorithm is
based on a modified turn model and well known XY algorithm.
The basic principle of this routing algorithm, prove its
deadlock freeness, its feasibility and efficiency through the
simulation results.
Xiaoqiang Yang et al. [15] described node coding and
routing methods are important to the design of NoC. By the
combination of network topology with corresponding, a two
dimensional code based on Johnson code in Torus topology
is proposed. The node coding implies the relation between
neighboring nodes and has a good scalable characteristic.
The two methods for code compressing are also presented
to reduce the storage space of node address and increase
the utilization rate of channel bandwidth. The improved
© 2013 ACEEE
DOI: 01.IJCOM.4.2.10

algorithm for XY routing based on the code is presented and
node structure is designed. The experimental results show
combination of the code can simplify the routing algorithm in
the implementation of NoC, decrease silicon resource
consumption and greatly improve communication
performance.
III. PROBLEM IDENTIFICATION
We observed in related work on design of NoC architecture
that maximum paper used deterministic XY routing or adaptive
XY routing with 2D-Mesh topology to reduce the latency &
improve the throughput. Up to yet no one used 2D torus
topology to improve the throughput.
In NIRGAM simulator the existing XY routing algorithm
only works on 2D Mesh topology, it cannot work on 2D Torus
topology. We propose and execute the application of XY
routing algorithm is modified for 2D torus topology.
To simulate modified XY – routing algorithm for two
dimensional torus topology of Network on Chip architecture
for constant bit rate random traffic in NIRGAM simulator to
reduce the average latency per flit, increase average latency
per packet & increase average throughput per channel basis
only for 3x3 network size.
IV. MODIFIED XY ROUTING ALGORITHM FOR 2D MESH AND 2D
T ORUS T OPOLOGY
Modified XY routing is a dimension order routing which
routes packets first in x- or horizontal direction to the correct
column and then in y- or vertical direction to the receiver.
Modified XY routing suits well on a network using mesh or
torus topology. Addresses of the routers are their xy-coordinates. Modified XY routing never runs into deadlock. The
fig. 1 and fig. 2 shows the comparison of 2D mesh and 2D
torus topology. The mesh and torus topology are the same
with only one difference, in torus the corner and border nodes
are directly connected. Following figures represents the
popular mesh and torus topology. Here the rectangular boxes
represent the routers while arrow represents a bi-directional
link.
In order to describe working of modified XY routing
algorithm, consider an example of modified XY routing
algorithm for 2D mesh and 2D torus in 3x3 network size as
shown in fig. 1 and fig. 2. Assume that a tile-3 acts as source
and its co-ordinates are (1, 0), wants to send a packet to the
destination tile-8 and its co-ordinates are (2, 2).
The route of packet for mesh topology is tile-0 to tile-4,
tile-4 to tile-5, and tile-5 to tile-8, the three hopes are required
for moving packet from source to destination. Similarly, for
torus topology the packet route is tile-3 to tile-5 and, tile-5 to
tile-8, the two hopes are required for moving packet from
source to destination. The number of hopes increases the
overall latency increases. The overall latency is high in 2D
mesh topology as compared to 2D torus topology.

3
Full Paper
ACEEE Int. J. on Communications, Vol. 4, No. 2, Nov 2013
Dimension order routing (DOR) is a typical minimal turn
algorithm. The algorithm determines to what direction packets
are routed during every stage of the routing. Modified XY
routing is a deterministic and static routing which routes
packets first in X or horizontal direction to the correct column
and then in Y or vertical direction to the destination.
Fig. 2 shows the 3x3 network size by using torus topology,
considered all tiles i. e. tile-0 to tile-8 as source and all tiles i.e.
tile-0 to tile-8 considered as destination, that means all tiles
sends packets and all tiles received packets.
VI. FLOWCHART OF MODIFIED XY ROUTING ALGORITHM FOR
3X3 2D T ORUS TOPOLOGY

Figure 1. 2D Mesh topology

A Torus network is an improved version of basic mesh
network. A simple torus network is a mesh in which the heads
of the columns are connected to the tails of the columns and
the left sides of the rows are connected to the right sides of
the rows. Following fig. 3 shows flowchart of modified XY
routing algorithm for 3x3 2D torus topology.
In order to demonstrate working of modified XY routing
algorithm, consider an example of modified XY routing
algorithm for 2D torus in 3x3 network size as shown in fig. 4.
Assume that a tile-0 acts as source and its co-ordinates
are (0, 0), wants to send a packet to the destination tile-5 and
its co-ordinates are (1, 2). Packet route of source to destination
is indicated by black arrow in the fig. 4.
Developed algorithm first calculates difference between
destination y-coordinates and source y-coordinates. In this
case the y-distance is ‘2’ thus the packet travel in west
direction i.e along x-axis. After that it calculates difference
between destination x-coordinates and source x-coordinates,
the difference is ‘1’ then packet move in south direction i.e
along y-axis.
In this way the modified XY routing algorithm run on 2D
torus topology.
VII. SIMULATION RESULTS AND ANALYSIS

Figure 2. 2D Torus topology

V. MODIFIED XY ROUTING ALGORITHM FOR 2D TORUS
T OPOLOGY
Success & failure of NOCs architecture is decided by
routing algorithm. It determines the path selected by a packet
to reach its destination. It must decide within each
intermediate router which output channels are to be selected
for incoming packets. Routing on NoC is quite similar to
routing on any network. A routing algorithm determines how
the data is routed from source to destination.
Modified XY routing algorithm routes packets every time
from source to destination along a fixed path. It is used in
both regular and irregular networks. In congestion free
networks this algorithm is reliable and has low latency. It
suits well on real time systems because packets always reach
the destination in correct order and so a reordering is not
necessary. It has better latency at low traffic.
4
© 2013 ACEEE
DOI: 01.IJCOM.4.2.10

The simulation has been performed on NIRGAM
simulator, a simulator for NoC Interconnect Routing and
Application Modeling version 2.1. NIRGAM is an extensible
and modular systemC based simulator [16].
All tiles used as source and all tiles used as destinations.
All tiles send packets and all tiles receive packets by using
Constant Bit Rate (CBR) traffic generator. The packet size is
vary from 8 bytes to 128 bytes with a random destination
mode. The load percentage is 50% which means that 50% of
maximum bandwidth is used. The simulation runs 1000 clock
cycles and clock frequency is 1GHz. The synthetic traffic
generators generate traffic in 300 clock cycles with warm up
period of 5 clock cycles. The flit interval between successive
flits is 2 clock cycles.
Simulation performance of routing algorithm is measured
on a per-channel basis. The performance metrics are average
latency (in clock cycles) per flit, average latency (in clock
cycles) per packet and average throughput (in Gbps) for each
channel.
Full Paper
ACEEE Int. J. on Communications, Vol. 4, No. 2, Nov 2013
Table I shows simulation results of modified XY routing
algorithm for 2D torus topology of NoC architecture for 3x3
network size. Packet size increases from 8 byte to 128 bytes
and measured average latency per flit (in clock cycles), average latency per packet (in clock cycles) and average throughput (in Gbps) per channel.
We can conclude that in fig. 5, if packet size increases
then average latency per packets increase.
If packet size increases then total no. of flit generated
increases and average latency per packet increases which is
shown in fig. 6. The flit size is constant i. e. 5 bytes (1 byte for
head payload and 4 bytes for data payload) and flit generated increases. Because packet size increases the number of
flit generated in a packet increases.
It is observed from fig. 7, total number of packet is large
then latency per flit large because time taken to deliver a
packet from source to destination is large. If packet size (in
bytes) increases then average throughput (in Gbps) per channel also increases which is observed in fig. 8.
In fig. 9 concluded that the average throughput (in Gbps)
per channel increases then average latency per packet also
increases.

Figure 3. Flowchart of modified XY routing algorithm for 2D torus
topology
Figure 5. Packet size (in bytes) versus average latency per packet
(in clock cycles)

Figure 6. Total flit generated versus average latency per packet (in
clock cycles)

Figure 4. Example of modified XY routing algorithm for 2D torus
in 3x3 network size

© 2013 ACEEE
DOI: 01.IJCOM.4.2.10

5
Full Paper
ACEEE Int. J. on Communications, Vol. 4, No. 2, Nov 2013
TABLE I. SIMULATION RESULTS O F MODIFIED XY R OUTING FOR 2D TORUS TOPOLOGY IN 3X3 N ETWORK SIZE

Packet
Size
(in bytes)

Total
Flit
Generated

Total
Flit
Received

Total No.
of Packet
Generated

Total No.
of Packets
Received

Total
Packet
Loss

Average
Latency per
flit (in Clock
cycles)

Average
Latency per
packet (in
Clock cycles)

Average
Throughput
(in Gbps)

8

443

195

147

65

82

4.9021

14.7592

8.6095

16

462

220

92

44

48

3.4593

17.4534

8.9

24

480

245

68

35

33

3.5038

22.8161

9.9512

32

562

288

62

32

30

2.9296

26.7428

10.1806

40

575

308

52

28

24

2.5492

28.5377

11.5718

48

579

286

44

22

22

2.3042

30.5749

12.7597

56

591

300

39

20

19

1.99305

30.4917

12.8768

64

663

425

39

25

20

1.7364

30.7042

13.9108

72

656

380

34

20

14

1.4883

30.7049

13.8341

80

671

357

32

17

15

1.3676

32.9186

14.6887

88

725

460

31

20

11

1.333

34.3359

15.4938

96

675

450

27

18

9

1.2998

34.9846

15.1962

104

672

351

25

13

12

1.07157

36.6

15.2526

112

748

427

25

14

11

1.17859

38.5294

15.1196

120

738

465

24

15

9

1.11835

39.2667

15.3165

128

781

429

23

13

10

1.101943

39.81

15.7006

Figure 7. Total no. of packets generated (in bytes) versus average
latency per flit (in clock cycles)
Figure 9. Average throughput (in Gbps) versus average latency per
packet (in clock cycles)

CONCLUSION
In this paper, we designed modified XY routing algorithm
on regular 2D torus topology of NoC architecture. NIRGAM
simulator is used for analyze the performance of 3x3 network
size. Parameters consider are, all tiles as source and all tiles
as destination, that means all tiles send packets and all tiles
receive packets by using CBR random traffic generator. The
packet sizes vary from 8 bytes to 128 bytes and all other
parameters are constant. The performance parameters are latency and throughput. Simulation performance of routing
algorithm is measured on a per-channel basis. It is observed
from the result that if packet size increases then average latency per packet (in clock cycles) increases and average

Figure 8. Packet size (in bytes) versus average throughput (in
Gbps)

© 2013 ACEEE
DOI: 01.IJCOM.4.2.10

6
Full Paper
ACEEE Int. J. on Communications, Vol. 4, No. 2, Nov 2013
[8] Yonghui Li, HuaxiGu, “XY-Turn Model for Deadlock Free
Routing in Honeycomb Networks on Chip”, IEEE, 2009, pp.
900 – 903.
[9] Masood Dehyadgari, Mohsen Nickray, Ali Afzali-kusha,
Zainalabein Navabi,”Evaluation of Pseudo Adaptive XY
Routing Using an Object Oriented Model for NOC”, IEEE,
2005, pp. 204-206.
[10] Mehrdad Seyrafi, Arghavan Asad, Amir Ehsani Zonouz, Reza
Berangi, Mahmood Fathy, Mohsen Soryani, “A New Low
Cost Fault Tolerant Solution for Mesh based NoCs”, 2010
International Conference on Electronics and Information
Engineering (ICEIE 2010), pp. V2-207 - V2-213.
[11] Yang Quansheng, Wu Zhekai, “An Improved Mesh Topology
and Its Routing Algorithm for NoC”, IEEE, 2010, pp. 1-4.
[12] Shu Yan Jiang, Hao Liang, Shuo Li, Yong Le Xie, “A Test
Method of Interconnection Online Detection of NoC Based
on 2D Torus Topology”, IEEE, 2011, pp. 183 – 187.
[13] Xiaohang Wang, Mei Yang, Yingtao Jiang, Peng Liu, “Efficient
Multicasting Scheme for Irregular Mesh-Based NoCs”, IEEE,
2010, pp. 384 – 387.
[14] Slavisa Jovanovic, Camel Tanougast, Serge Weber, Christophe
Bobda, “A New Deadlock-Free Fault-Tolerant Routing
Algorithm For NoC Interconnections”, IEEE, 2009, pp. 326 –
331.
[15] Xiaoqiang Yang, Huimin Du, Jungang Han, “A Node Coding
and the Improved Routing Algorithm in Torus Topology”,
IEEE, 2008, pp. 443 – 447.
[16] Wang Zhang, Wuchen Wu, Lei Zuo, Xiaohong Peng, “The
Buffer Depth Analysis of 2-Dimention Mesh Topology
Network-on-Chip With Odd-Even Routing Algorithm”,IEEE,
December 2009.

throughput (in Gbps) also increases but average latency per
flit (in clock cycles) decreases. All tiles act as source and all
tiles act as destination, then congestion in the network therefore average latency per packet increases.
REFERENCES
[1] Priyanka N. Chopkar and Mahendra A. Gaikwad, “Review of
XY routing algorithm for 2D torus topology of NoC
architecture”, 2013, International Journal of Computer
Applications (0975 – 8887), pp. 22-26.
[2] Mohsen Nickray, Masood Dehyadgari & Ali Afzali- kusha,
“Adaptive Routing Using Context-Aware Agents for Networks
on Chips “, IEEE, 2009, pp. 1-6.
[3] Manas Kumar Puthal, Virendra Singh, M. S. Gaur, Vijay Laxmi,
“C-Routing: An Adaptive Hierarchical NoC Routing
Methodology”, 2011, IEEE/IFIP 19th International
Conference on VLSI and System on Chip, pp. 392 – 397.
[4] Jin-xiang Wang, Fang-fa Fu, Tian-Sheng Zhang & Yu-Ping
Chen,”A Small-Granularity Solution on Fault Tolerant in 2DMesh Network-on-Chip”, IEEE, 2010, pp. 382-384.
[5] Ruizhe Wu, Yi Wang & Dan Zhao,”A Low Cost Deadlock-free
Design of Minimal-Table Rerouted XY-Routing for Irregular
Wireless NOCs”, 2010, Fourth ACM/IEEE International
Symposium on Networks-on-Chip, pp. 199 – 206.
[6] Hamed S. Kia and Cristinel Ababei,”A new Fault tolerant and
Congestion-aware Adaptive Routing Algorithm for Regular
Networks-on-Chip”, IEEE, 2011,pp. 2465-2472.
[7] A.H. Borhani, A. Movaghar, R. G. Cole, “A New Deterministic
Fault Tolerant Wormhole Routing Strategy For k-ary 2-cubes”,
IEEE, 2010, pp. 1 – 7.

© 2013 ACEEE
DOI: 01.IJCOM.4.2.10

7

More Related Content

What's hot

Optimization Algorithm to Control Interference-based Topology Control for De...
 Optimization Algorithm to Control Interference-based Topology Control for De... Optimization Algorithm to Control Interference-based Topology Control for De...
Optimization Algorithm to Control Interference-based Topology Control for De...IJCSIS Research Publications
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 
Enhancenig OLSR routing protocol using K-means clustering in MANETs
Enhancenig OLSR routing protocol using K-means clustering  in MANETs Enhancenig OLSR routing protocol using K-means clustering  in MANETs
Enhancenig OLSR routing protocol using K-means clustering in MANETs IJECEIAES
 
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...IOSR Journals
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...ijmnct
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
 
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKS
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKSADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKS
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKSijasuc
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsIOSR Journals
 
Solving QoS multicast routing problem using ACO algorithm
Solving QoS multicast routing problem using ACO algorithmSolving QoS multicast routing problem using ACO algorithm
Solving QoS multicast routing problem using ACO algorithmAbdullaziz Tagawy
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...ijait
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routingijsrd.com
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11eSAT Publishing House
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 eteSAT Journals
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
 

What's hot (20)

Optimization Algorithm to Control Interference-based Topology Control for De...
 Optimization Algorithm to Control Interference-based Topology Control for De... Optimization Algorithm to Control Interference-based Topology Control for De...
Optimization Algorithm to Control Interference-based Topology Control for De...
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
Enhancenig OLSR routing protocol using K-means clustering in MANETs
Enhancenig OLSR routing protocol using K-means clustering  in MANETs Enhancenig OLSR routing protocol using K-means clustering  in MANETs
Enhancenig OLSR routing protocol using K-means clustering in MANETs
 
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKS
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKSADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKS
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKS
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing Protocols
 
Solving QoS multicast routing problem using ACO algorithm
Solving QoS multicast routing problem using ACO algorithmSolving QoS multicast routing problem using ACO algorithm
Solving QoS multicast routing problem using ACO algorithm
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
 
A02100108
A02100108A02100108
A02100108
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 et
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
 

Similar to Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Routing Algorithm

Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms IJECEIAES
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...cscpconf
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...GiselleginaGloria
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...ijafrc
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...IOSR Journals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemIOSR Journals
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
Iaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd Iaetsd
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSgraphhoc
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backupcsandit
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
 

Similar to Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Routing Algorithm (20)

Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
 
C0351725
C0351725C0351725
C0351725
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
 
G1063841
G1063841G1063841
G1063841
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet System
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
Iaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection in
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backup
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 

Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Routing Algorithm

  • 1. Full Paper ACEEE Int. J. on Communications, Vol. 4, No. 2, Nov 2013 Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Routing Algorithm Ms. Priyanka N. Chopkar1 and Dr. Mahendra A. Gaikwad2 1 PG Student, M-Tech (Electronics), B. D. College of Engineering Sewagram (Wardha), Maharashtra, India priyachopkar@gmail.com 2 Professor & Dean R & D, B. D. College of Engineering Sewagram (Wardha), Maharashtra, India gaikma@rediffmail.com Abstract - Network-on-Chip (NoC) is a packet switched onchip communication network designed using a layered methodology i.e. “routes packets, not wires”. It is an efficient on chip communication architecture for System on Chip (SoC) architectures. NoCs solved the disadvantages of SoCs and are scalable. Each route in NoC includes some routers and it takes a few clock periods by passing a router. When the network is in congestion, the package transmission will produce much more time delay. So adopting an appropriate routing algorithm to get the balance between the time delay and throughput rate becomes the key problem. In this paper we tried to solve that problem using torus topology with our modified XY routing algorithm. We used NIRGAM simulator for analysis of latency and throughput of modified XY routing algorithm for 2D torus topology. 3x3 network size used for analyze the performance. We consider all tiles as source, all tiles as destination and vary the packet size & traffic used is Constant Bit Rate (CBR) random traffic. It is found that packet size increases then latency/packet increases and throughput (in Gbps) also increases but latency/flit decreases. routing algorithms. Communication performance of a NoC depends heavily on the routing algorithm used. Routing is one of the most crucial key factors which will decide over the success of NoC architecture based systems or their failure. There are different routing algorithms such as XY routing algorithm, odd even routing algorithm and source routing algorithm etc. Modified XY routing algorithm is simple and widely used. It is static, deterministic and deadlock free routing algorithm. In deterministic routing algorithm the path between source to destination is fixed. In modified XY routing algorithm [1], a packet must always be routed along horizontal or X axis until it reaches the same column as that of destination then it should be routed along vertical or Y axis and towards the location of destination resource. Routing is in deadlock when two packets are waiting each other to be routed forward. Both of the packets are waiting each other to release the resources. Routers do not release the recourses before they get the new recourses and so the routing is locked. Topology is a very important feature in the design of NoC because design of a router depends upon it. There are different types of topologies such as mesh, torus, folded torus, star, octagon, tree, etc. Among this topology, torus topology was proposed to reduce the latency of mesh and keep its simplicity. The main problem with the mesh topology is its long diameter that has negative effect on communication latency. The only difference between torus and mesh topologies is that the switches on the edges are connected to the switches on the opposite edges through wrap-around channels. The performance parameters are latency and throughput. Latency is defined as time taken to deliver a packet from source to destination. Throughput is defined as a fraction of packets delivered from sources to destinations in a given amount of time. Keywords – 2D torus topology, modified XY routing algorithm, Network on Chip (NoC), NIRGAM simulator. I. INTRODUCTION NoC is an approach to design the communication subsystem between IP cores in a SoC. NoCs are expected to overcome scalability and performance limitations of Pointto-Point (P2P) and bus-based communication systems. NoCs use packets to route data from the source to the destination Processing Elements (PE) via a network fabric that consists of switches (routers) and interconnection links (wires). The wires in the links of the NoC are shared by many signals. A high level of parallelism is achieved, because all links in the NoC can operate simultaneously on different data packets. Therefore, as the complexity of integrated systems keeps growing, a NoC provides enhanced performance (such as throughput) and scalability in comparison with communication architectures (e.g., dedicated point-to- point signal wires, shared buses, or segmented buses with bridges). NoCs are an attempt to scale down the concepts of large scale networks, and apply them to the embedded system-onchip (SoC) domain. The main difference between SoC and NoC is the sharing of links. The most important features that distinguish NoC architectures are network topology and © 2013 ACEEE DOI: 01.IJCOM.4.2.10 II. RELATED WORK Mohsen Nickray et al. [2] have described an adaptive routing algorithm which is based on deterministic XY routing algorithm. In their model a switch is a context-aware agent and a network is a society of context-aware agents which are ever learning and adapting to distribute the congestion uniformly and isolate the malformed switches (agents). In conventional XY routing, first, the load in the center of a 1
  • 2. Full Paper ACEEE Int. J. on Communications, Vol. 4, No. 2, Nov 2013 latency is improved. To dynamically react to continuously changing traffic conditions, the shortest path computation procedure is invoked periodically. Because this procedure is based on the ball-and-string model, the hardware overhead and computational times are minimal. Experimental results based on an actual Verilog implementation demonstrate that the proposed adaptive routing algorithm improves significantly the network throughput compared to traditional XY routing and DyXY adaptive algorithms. A.H. Borhani et al. [7] described a new fault tolerant routing algorithm, which is based on dimension order routing, is proposed for k-ary 2-cubes. Packets are sent to their destination through XY routing algorithm and if this transmission is not possible, YX routing algorithm is applied. The result shows that these method is preferred, especially in the environments where the fault probability is low and the message generation rate is high. Yonghui Li & HuaxiGu [8] described a new model called the XY-turn model for designing partially adaptive or deterministic routing algorithms for honeycomb networks on chip without adding virtual channels. The model prohibits two turns in opposite directions at some particular nodes so that the deadlock can be avoided. The restricted turns result in simplified router architectures especially for photonic NoCs. They have implemented a deterministic routing algorithm is carried out to test the performance of the algorithm in end to end delay and throughput under the conditions that messages length are 128 bytes, 256 bytes and 512 bytes respectively, as well as the network size varies from 36 cores to 64 cores and 98 cores. The results deterministic that the honeycomb NoCs would benefits from the XY-turn model in terms of communication efficiency. Masood Dehyadgari et al. [9] have described a pseudo adaptive routing which is an extension of classic XY routing. They consider mesh topology for evaluating proposed routing. Their switches use Pseudo adaptive XY routing algorithm. The load in the center of a network in ordinary XY routing is much higher rather than total average. This extra load on the center of mesh can cause spot hot. The main objective of their routing algorithm is to distribute network load. One of the advantages of distributing network load is balanced temperature on the mesh. Their routing algorithm has two modes that is deterministic and adaptive Packets are routed with classic XY routing (deterministic mode), when congestion in the network is low. When congestion is high, packets will be routed through less congested route adaptively (adaptive mode). Mehrdad Seyrafi et al. [10] has been described a new fault tolerant routing algorithm with minimum hardware requirements and extremely high fault tolerance for 2D-mesh based NoCs is proposed. The LCFT (Low Cost Fault Tolerant) algorithm, removes the main limitations (forbidden turns) of the famous XY. So not only many new routes will be added to the list of selectable paths as well as deadlock freedom, but also it creates high level of fault tolerance. All these things are yielded only by the cost of adding one more virtual channel (for a total of two). Results show that LCFT algorithm network is much higher rather than total average and this leads to hot spot in the center of network. And second, a malfunction in switches could make part of network out of access. But in their proposed routing, first, all agents are aware from their neighbor’s congestion and collaboratively try to route their input packets through less congested route, according to their experiences learned before and second, when a new malfunction takes place in the network, all agents collaborate each other to recognize the malformed agent and learn the best route. The main objective of their routing algorithm is to distribute network load uniformly throughout the network. They developed a NOC environment using SystemC. Manas Kumar Puthal et al. [3] have described a new hierarchical cluster based adaptive routing called „C-Routing in 2D mesh NoC. The solution reduces routing table size and provides deadlock freedom without use of virtual channels while ensuring live lock free routing. Routers in this method use intelligent routing to route information between the processing elements ensuring the correctness, deadlock freeness, and congestion handling. This method has been evaluated against other adaptive algorithms such as PROM, and Q-Routing etc. C-routing uses adaptively to avoid congestion by uniform distribution of traffic among the cores by sending flits over two different paths to the destination. Proposed technique achieves two objectives, as inferred from the results, reduction in area and higher throughput. These benefits are achieved at a marginal increase in power consumption and latency while preserving deadlock freedom with no extra virtual channels. Fault tolerance is another major issue in NoC design. Jin-xiang Wang et al. [4] have described a new fault model, defines separately node-fault and link-fault, reduces situations classified as node-fault effectively and consequently improves the performance of the network. By defining some new paths to substitute failure paths, data packets can be routed along the new paths which are formed by the neighbor nodes of node-fault or link-fault. A faulttolerant wormhole router based on XY routing algorithm is designed according to the solution. The evaluation results show that network performance can be improved by 15% when link-fault occurs in the network. Ruizhe Wu et al. [5] have been described a new on-chip communication system & dubbed Wireless Network on- Chip (WNoC). This work centers on the design of a high-efficient, low-cost, deadlock-free routing scheme for domain-specific irregular mesh WNoCs. A distributed minimal table based routing scheme is designed to facilitate segmented XYrouting. Deadlock-free data transmission is achieved by implementing a new turn class’s based buffer ordering scheme. Hamed S. Kia and Cristinel Ababei [6] have described algorithm is based on the balland-string model and employs a distributed approach based on partitioning of the regular NoC architecture into regions controlled by local monitoring units. Each local monitoring unit runs a shortest path computation procedure to identify the best routing path so that highly congested routers and faulty links are avoided while © 2013 ACEEE DOI: 01.IJCOM.4.2.10 2
  • 3. Full Paper ACEEE Int. J. on Communications, Vol. 4, No. 2, Nov 2013 can work well under almost bad conditions of faults in comparison with the Modified-XY, Modified-YX algorithms. Yang Quansheng & Wu Zhekai [11] have described an improved topology called Tmesh, which is based on standard mesh network by inserting four long links to connect the vertices to reduce the communication delay between some remote nodes. They also present a deadlock-free routing algorithm for Tmesh named TXY algorithm. The results of this algorithm show a certain reduction in the average packet delay and routing hops. When the network has 64 nodes, the average delay and routing hops of Tmesh are 2.92% and 3.53% lower than those of mesh respectively. Shu Yan Jiang et al. [12] describe an online detection method of interconnection for 2D torus structure of NoC system. This method can detect the data errors during transmission and identify the error results from the routing switch failure or the data transmission interconnection line failure. They design a sub-router based on the wormhole exchange using E-cube routing algorithm and a check module which is suitable for the original routing node functions and work feature. They simulate the method by Verilog HDL and quart us II software. The experiment results show that the method can detect data errors caused by the router failure or interconnect failure and can locate the fault. Xiaohang Wang et al. [13] described a simple, yet efficient hardware based multicasting scheme is proposed for irregular mesh based NoC. First, an irregular oriented multicast strategy is proposed. Following this strategy, an irregular oriented multicast routing algorithm can be designed based on any regular mesh based multicast routing algorithm. One such algorithm, namely, Alternative XY (AL+XY), is proposed based on XY routing. Experimental results show that AL+XY achieve significant reduction in power consumption and packet latency compared with existing solutions. AL+XY saves 29% power consumption than that of multiple unicast. In terms of average packet latency, when injection rate is high (e.g. near 0.15), the latency of AL+XY is only 50%. Slavisa Jovanovic et al. [14] has been described a new deadlock free fault tolerant adaptive routing algorithm for 2D mesh NoC interconnection. The main contribution of this routing algorithm is that it allows both, routing of messages in the networks incorporating the regions not necessarily rectangular and routing to all nodes which are not completely blocked by faulty nodes. The proposed routing algorithm is based on a modified turn model and well known XY algorithm. The basic principle of this routing algorithm, prove its deadlock freeness, its feasibility and efficiency through the simulation results. Xiaoqiang Yang et al. [15] described node coding and routing methods are important to the design of NoC. By the combination of network topology with corresponding, a two dimensional code based on Johnson code in Torus topology is proposed. The node coding implies the relation between neighboring nodes and has a good scalable characteristic. The two methods for code compressing are also presented to reduce the storage space of node address and increase the utilization rate of channel bandwidth. The improved © 2013 ACEEE DOI: 01.IJCOM.4.2.10 algorithm for XY routing based on the code is presented and node structure is designed. The experimental results show combination of the code can simplify the routing algorithm in the implementation of NoC, decrease silicon resource consumption and greatly improve communication performance. III. PROBLEM IDENTIFICATION We observed in related work on design of NoC architecture that maximum paper used deterministic XY routing or adaptive XY routing with 2D-Mesh topology to reduce the latency & improve the throughput. Up to yet no one used 2D torus topology to improve the throughput. In NIRGAM simulator the existing XY routing algorithm only works on 2D Mesh topology, it cannot work on 2D Torus topology. We propose and execute the application of XY routing algorithm is modified for 2D torus topology. To simulate modified XY – routing algorithm for two dimensional torus topology of Network on Chip architecture for constant bit rate random traffic in NIRGAM simulator to reduce the average latency per flit, increase average latency per packet & increase average throughput per channel basis only for 3x3 network size. IV. MODIFIED XY ROUTING ALGORITHM FOR 2D MESH AND 2D T ORUS T OPOLOGY Modified XY routing is a dimension order routing which routes packets first in x- or horizontal direction to the correct column and then in y- or vertical direction to the receiver. Modified XY routing suits well on a network using mesh or torus topology. Addresses of the routers are their xy-coordinates. Modified XY routing never runs into deadlock. The fig. 1 and fig. 2 shows the comparison of 2D mesh and 2D torus topology. The mesh and torus topology are the same with only one difference, in torus the corner and border nodes are directly connected. Following figures represents the popular mesh and torus topology. Here the rectangular boxes represent the routers while arrow represents a bi-directional link. In order to describe working of modified XY routing algorithm, consider an example of modified XY routing algorithm for 2D mesh and 2D torus in 3x3 network size as shown in fig. 1 and fig. 2. Assume that a tile-3 acts as source and its co-ordinates are (1, 0), wants to send a packet to the destination tile-8 and its co-ordinates are (2, 2). The route of packet for mesh topology is tile-0 to tile-4, tile-4 to tile-5, and tile-5 to tile-8, the three hopes are required for moving packet from source to destination. Similarly, for torus topology the packet route is tile-3 to tile-5 and, tile-5 to tile-8, the two hopes are required for moving packet from source to destination. The number of hopes increases the overall latency increases. The overall latency is high in 2D mesh topology as compared to 2D torus topology. 3
  • 4. Full Paper ACEEE Int. J. on Communications, Vol. 4, No. 2, Nov 2013 Dimension order routing (DOR) is a typical minimal turn algorithm. The algorithm determines to what direction packets are routed during every stage of the routing. Modified XY routing is a deterministic and static routing which routes packets first in X or horizontal direction to the correct column and then in Y or vertical direction to the destination. Fig. 2 shows the 3x3 network size by using torus topology, considered all tiles i. e. tile-0 to tile-8 as source and all tiles i.e. tile-0 to tile-8 considered as destination, that means all tiles sends packets and all tiles received packets. VI. FLOWCHART OF MODIFIED XY ROUTING ALGORITHM FOR 3X3 2D T ORUS TOPOLOGY Figure 1. 2D Mesh topology A Torus network is an improved version of basic mesh network. A simple torus network is a mesh in which the heads of the columns are connected to the tails of the columns and the left sides of the rows are connected to the right sides of the rows. Following fig. 3 shows flowchart of modified XY routing algorithm for 3x3 2D torus topology. In order to demonstrate working of modified XY routing algorithm, consider an example of modified XY routing algorithm for 2D torus in 3x3 network size as shown in fig. 4. Assume that a tile-0 acts as source and its co-ordinates are (0, 0), wants to send a packet to the destination tile-5 and its co-ordinates are (1, 2). Packet route of source to destination is indicated by black arrow in the fig. 4. Developed algorithm first calculates difference between destination y-coordinates and source y-coordinates. In this case the y-distance is ‘2’ thus the packet travel in west direction i.e along x-axis. After that it calculates difference between destination x-coordinates and source x-coordinates, the difference is ‘1’ then packet move in south direction i.e along y-axis. In this way the modified XY routing algorithm run on 2D torus topology. VII. SIMULATION RESULTS AND ANALYSIS Figure 2. 2D Torus topology V. MODIFIED XY ROUTING ALGORITHM FOR 2D TORUS T OPOLOGY Success & failure of NOCs architecture is decided by routing algorithm. It determines the path selected by a packet to reach its destination. It must decide within each intermediate router which output channels are to be selected for incoming packets. Routing on NoC is quite similar to routing on any network. A routing algorithm determines how the data is routed from source to destination. Modified XY routing algorithm routes packets every time from source to destination along a fixed path. It is used in both regular and irregular networks. In congestion free networks this algorithm is reliable and has low latency. It suits well on real time systems because packets always reach the destination in correct order and so a reordering is not necessary. It has better latency at low traffic. 4 © 2013 ACEEE DOI: 01.IJCOM.4.2.10 The simulation has been performed on NIRGAM simulator, a simulator for NoC Interconnect Routing and Application Modeling version 2.1. NIRGAM is an extensible and modular systemC based simulator [16]. All tiles used as source and all tiles used as destinations. All tiles send packets and all tiles receive packets by using Constant Bit Rate (CBR) traffic generator. The packet size is vary from 8 bytes to 128 bytes with a random destination mode. The load percentage is 50% which means that 50% of maximum bandwidth is used. The simulation runs 1000 clock cycles and clock frequency is 1GHz. The synthetic traffic generators generate traffic in 300 clock cycles with warm up period of 5 clock cycles. The flit interval between successive flits is 2 clock cycles. Simulation performance of routing algorithm is measured on a per-channel basis. The performance metrics are average latency (in clock cycles) per flit, average latency (in clock cycles) per packet and average throughput (in Gbps) for each channel.
  • 5. Full Paper ACEEE Int. J. on Communications, Vol. 4, No. 2, Nov 2013 Table I shows simulation results of modified XY routing algorithm for 2D torus topology of NoC architecture for 3x3 network size. Packet size increases from 8 byte to 128 bytes and measured average latency per flit (in clock cycles), average latency per packet (in clock cycles) and average throughput (in Gbps) per channel. We can conclude that in fig. 5, if packet size increases then average latency per packets increase. If packet size increases then total no. of flit generated increases and average latency per packet increases which is shown in fig. 6. The flit size is constant i. e. 5 bytes (1 byte for head payload and 4 bytes for data payload) and flit generated increases. Because packet size increases the number of flit generated in a packet increases. It is observed from fig. 7, total number of packet is large then latency per flit large because time taken to deliver a packet from source to destination is large. If packet size (in bytes) increases then average throughput (in Gbps) per channel also increases which is observed in fig. 8. In fig. 9 concluded that the average throughput (in Gbps) per channel increases then average latency per packet also increases. Figure 3. Flowchart of modified XY routing algorithm for 2D torus topology Figure 5. Packet size (in bytes) versus average latency per packet (in clock cycles) Figure 6. Total flit generated versus average latency per packet (in clock cycles) Figure 4. Example of modified XY routing algorithm for 2D torus in 3x3 network size © 2013 ACEEE DOI: 01.IJCOM.4.2.10 5
  • 6. Full Paper ACEEE Int. J. on Communications, Vol. 4, No. 2, Nov 2013 TABLE I. SIMULATION RESULTS O F MODIFIED XY R OUTING FOR 2D TORUS TOPOLOGY IN 3X3 N ETWORK SIZE Packet Size (in bytes) Total Flit Generated Total Flit Received Total No. of Packet Generated Total No. of Packets Received Total Packet Loss Average Latency per flit (in Clock cycles) Average Latency per packet (in Clock cycles) Average Throughput (in Gbps) 8 443 195 147 65 82 4.9021 14.7592 8.6095 16 462 220 92 44 48 3.4593 17.4534 8.9 24 480 245 68 35 33 3.5038 22.8161 9.9512 32 562 288 62 32 30 2.9296 26.7428 10.1806 40 575 308 52 28 24 2.5492 28.5377 11.5718 48 579 286 44 22 22 2.3042 30.5749 12.7597 56 591 300 39 20 19 1.99305 30.4917 12.8768 64 663 425 39 25 20 1.7364 30.7042 13.9108 72 656 380 34 20 14 1.4883 30.7049 13.8341 80 671 357 32 17 15 1.3676 32.9186 14.6887 88 725 460 31 20 11 1.333 34.3359 15.4938 96 675 450 27 18 9 1.2998 34.9846 15.1962 104 672 351 25 13 12 1.07157 36.6 15.2526 112 748 427 25 14 11 1.17859 38.5294 15.1196 120 738 465 24 15 9 1.11835 39.2667 15.3165 128 781 429 23 13 10 1.101943 39.81 15.7006 Figure 7. Total no. of packets generated (in bytes) versus average latency per flit (in clock cycles) Figure 9. Average throughput (in Gbps) versus average latency per packet (in clock cycles) CONCLUSION In this paper, we designed modified XY routing algorithm on regular 2D torus topology of NoC architecture. NIRGAM simulator is used for analyze the performance of 3x3 network size. Parameters consider are, all tiles as source and all tiles as destination, that means all tiles send packets and all tiles receive packets by using CBR random traffic generator. The packet sizes vary from 8 bytes to 128 bytes and all other parameters are constant. The performance parameters are latency and throughput. Simulation performance of routing algorithm is measured on a per-channel basis. It is observed from the result that if packet size increases then average latency per packet (in clock cycles) increases and average Figure 8. Packet size (in bytes) versus average throughput (in Gbps) © 2013 ACEEE DOI: 01.IJCOM.4.2.10 6
  • 7. Full Paper ACEEE Int. J. on Communications, Vol. 4, No. 2, Nov 2013 [8] Yonghui Li, HuaxiGu, “XY-Turn Model for Deadlock Free Routing in Honeycomb Networks on Chip”, IEEE, 2009, pp. 900 – 903. [9] Masood Dehyadgari, Mohsen Nickray, Ali Afzali-kusha, Zainalabein Navabi,”Evaluation of Pseudo Adaptive XY Routing Using an Object Oriented Model for NOC”, IEEE, 2005, pp. 204-206. [10] Mehrdad Seyrafi, Arghavan Asad, Amir Ehsani Zonouz, Reza Berangi, Mahmood Fathy, Mohsen Soryani, “A New Low Cost Fault Tolerant Solution for Mesh based NoCs”, 2010 International Conference on Electronics and Information Engineering (ICEIE 2010), pp. V2-207 - V2-213. [11] Yang Quansheng, Wu Zhekai, “An Improved Mesh Topology and Its Routing Algorithm for NoC”, IEEE, 2010, pp. 1-4. [12] Shu Yan Jiang, Hao Liang, Shuo Li, Yong Le Xie, “A Test Method of Interconnection Online Detection of NoC Based on 2D Torus Topology”, IEEE, 2011, pp. 183 – 187. [13] Xiaohang Wang, Mei Yang, Yingtao Jiang, Peng Liu, “Efficient Multicasting Scheme for Irregular Mesh-Based NoCs”, IEEE, 2010, pp. 384 – 387. [14] Slavisa Jovanovic, Camel Tanougast, Serge Weber, Christophe Bobda, “A New Deadlock-Free Fault-Tolerant Routing Algorithm For NoC Interconnections”, IEEE, 2009, pp. 326 – 331. [15] Xiaoqiang Yang, Huimin Du, Jungang Han, “A Node Coding and the Improved Routing Algorithm in Torus Topology”, IEEE, 2008, pp. 443 – 447. [16] Wang Zhang, Wuchen Wu, Lei Zuo, Xiaohong Peng, “The Buffer Depth Analysis of 2-Dimention Mesh Topology Network-on-Chip With Odd-Even Routing Algorithm”,IEEE, December 2009. throughput (in Gbps) also increases but average latency per flit (in clock cycles) decreases. All tiles act as source and all tiles act as destination, then congestion in the network therefore average latency per packet increases. REFERENCES [1] Priyanka N. Chopkar and Mahendra A. Gaikwad, “Review of XY routing algorithm for 2D torus topology of NoC architecture”, 2013, International Journal of Computer Applications (0975 – 8887), pp. 22-26. [2] Mohsen Nickray, Masood Dehyadgari & Ali Afzali- kusha, “Adaptive Routing Using Context-Aware Agents for Networks on Chips “, IEEE, 2009, pp. 1-6. [3] Manas Kumar Puthal, Virendra Singh, M. S. Gaur, Vijay Laxmi, “C-Routing: An Adaptive Hierarchical NoC Routing Methodology”, 2011, IEEE/IFIP 19th International Conference on VLSI and System on Chip, pp. 392 – 397. [4] Jin-xiang Wang, Fang-fa Fu, Tian-Sheng Zhang & Yu-Ping Chen,”A Small-Granularity Solution on Fault Tolerant in 2DMesh Network-on-Chip”, IEEE, 2010, pp. 382-384. [5] Ruizhe Wu, Yi Wang & Dan Zhao,”A Low Cost Deadlock-free Design of Minimal-Table Rerouted XY-Routing for Irregular Wireless NOCs”, 2010, Fourth ACM/IEEE International Symposium on Networks-on-Chip, pp. 199 – 206. [6] Hamed S. Kia and Cristinel Ababei,”A new Fault tolerant and Congestion-aware Adaptive Routing Algorithm for Regular Networks-on-Chip”, IEEE, 2011,pp. 2465-2472. [7] A.H. Borhani, A. Movaghar, R. G. Cole, “A New Deterministic Fault Tolerant Wormhole Routing Strategy For k-ary 2-cubes”, IEEE, 2010, pp. 1 – 7. © 2013 ACEEE DOI: 01.IJCOM.4.2.10 7