SlideShare a Scribd company logo
1 of 5
Download to read offline
ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011




         A Fault-tolerant Switch for Next Generation
                     Computer Networks
                                                 V. S. Tripathi and S. Tiwari
                                      Department of E & C E, MNNIT, Allahabad, India.
                                            vst@mnnit.ac.in, stiwari@mnnit.ac.in

Abstract— In this paper, the architecture of a Multi-plane             network based switch is evaluated using a new analytical
Parallel Deflection-Routed Circular Banyan (PDCB) network              model based on Markov chain and simulation. The
based switching fabric is introduced. The PDCB network has             performance parameters studied are normalized throughput,
a cyclic, regular, self-routing, simple architecture and fairly        normalized delay and fault-detection coverage as they are
good performance. Its Performance is improved due to
reduction in blocking by two-dimensional path-multiplicity of
                                                                       fundamental parameters.
the proposed architecture. It consists of 4X4 Switching                   The remaining paper is organized as follows: Section 2
Elements.                                                              discusses the architecture of a PDCB network based switch
The proposed switch is shown to be fault-tolerant. A simple            and section 3 discusses analysis of the proposed switch.
analytical model based on Markov chain to evaluate the                 Finally the conclusion is given in section 4.
performance of proposed switch under uniform traffic
condition has also been presented in this paper. The                    II. PDCB NETWORK BASED SWITCHING ARCHITECTURE
performance parameters studied are Normalized Throughput
and Normalized Delay. Simulation study of the switch is also              The deflection-routed circular banyan network is a
performed to validate the model proposed.                              modified banyan network that can be realized by 4X4
                                                                       switching elements (SE) and augmented links as shown in
Index Terms— Fault-tolerant, Banyan, Markov chain,                     figures 1 and 2. The SE in simple banyan switch is a 2X2
Performance, Deflection-routed, Switch.                                crossbar type network, which is connected through links to
                                                                       form a specific topology. The SE is modified by addition of
                      I. INTRODUCTION                                  two pairs of lateral in and lateral out ports. The additional
   The next generation computer networks (NGN) require                 ports are used for lateral interconnection of the SEs in a
high speed integrated switches1. Many types of switches                stage.
presented in the literature are found to be suitable for the
purpose2, 3, 4, 5. The performance parameters to compare and




                                                                                                                      Outputs
characterize these switches are- throughput, delay, variance
                                                                         Inputs




                                                                                  0
of delay, buffer size, location of buffer, multicast
capability, cost, fault-tolerance, reliability and scalability.
Because of its regularity, modularity, self-routing property                      1
and simple architecture, a class of multistage
interconnection networks called Banyan network is
preferred for use in NGN7. It consists of 2X2 switching                                 Lateral-In    Lateral-out
elements and offers same latency for all input-output pairs.
It has path-uniqueness property that results in cell-sequence             Figure 1.      Modified Switching Element
preservation at one hand and giving rise to the problem of
blocking on the other. To solve this problem, various                     In a multi-plane parallel defection-routed circular
approaches have been proposed like- increasing the                     banyan (PDCB) network based switch the switching planes
bandwidth of internal links, providing internal buffers and            of figure 2 are used in parallel to make up a parallel plane
deflection routing8. Deflection routing needs multiple                 switch as shown in figure 3. A large number of equivalent
input-output paths within the switching fabric and adding              paths into the switching fabric exist and the packet is free
multiplicity may further result in increase of irregularity,           to choose any free path independently. Thus switch
loss of modularity and increase in complexity 9.                       becomes robust in the case of pathological traffic patterns.
   The parallel plane deflection-routed circular banyan                Fault-tolerance and reliability of the switch is further
network (PDCB) based switch proposed in this paper can                 improved. The advantages of the PDCB switch include
enhance the performance by offering a solution to the                  redundancy, augmented throughput and relaxed port speed
problem of blocking while maintaining the advantages of                and pin count. A switch that transmits a data packet
banyan architecture. This switch has self-routing property.            through k active planes can have one or more spare planes
It consists of 4X4 Switching Elements. Multiple paths are              to replace any faulty active plane.
available between any input-output pair along vertical as                 A practical spare distribution scheme with less than
well as horizontal axis. The packets are free to choose any            100% hardware redundancy with a three-dimensional
free path independently. Path-multiplicity supports                    system has been presented11. This methodology has been
multicasting. It also improves the fault-tolerance and                 shown to be faster and more cost effective than a duplex
reliability of the switch. The performance of PDCB                     system for a large switch since it can provide comparable
                                                                       availability of spares with less hardware redundancy. In our
                                                                  22
© 2011 ACEEE
DOI: 01.IJNS.02.01.133
ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011



switch, we adopt a similar architecture with spares in the z-                                                                               on each input is 0≤q(1)≤1. With a balanced load the state of
axis only for redundancy purposes because this sparing                                                                                      each switching network in stage k should be statistically
scheme allows a fast (i.e., concurrent) system re-                                                                                          the same.
configuration.                                                                                                                                 (ii) The states of the two buffers within a switching
                                                                                                                                            element are statistically independent. This assumption is
                                                                                                                                            justified by taking note that packets entering the input of a
       Internal
       Blocking
                                                       Input Nodes
                                                                                                     Self-Routing
                                                                                                                                            switching element originate from disjoint and independent
                                                  I0
                                                           •
                                                               1
                                                                                                                                            network inputs.
                                      •
                                                           •
                                                           •
                                                                                   •                                                           We can make some definitions as follows:
                  •
                                              •            •
                                                           •
                                                                           •
                                                                                                        •
                                                                                                                                               p0(k,t)=the probability that the switching element buffer
                      •
                                                  •        •
                                                           •           •                         •                  1                       at stage k is empty at the beginning of the tth clock.
   0                                                       •
         •
                              •                       •            •                   •
                                                                                                                •                              q(k,t)=the probability that a packet is ready to enter a
              •
                      •
                                          •                                    •
                                                                                                    •
                                                                                                            •           External
                                                                                                                        Blocking            switching element buffer at stage k during the tth clock
                              •                                                            •                                                period.
                                                                                                                        O15                    r(k,t)=the probability that a packet in a switching
   O0 • • • • • • • •                                                                          •• • • • •       •   •   Output Nodes        element buffer at stage k is able to move (forward) into the
                                  •                                                    •                                                    next stage during the tth clock period.
              •
                      •
                                          •                                    •
                                                                                                    •
                                                                                                            •                                  Now we can write a series of probabilistic equations,
                                                                                                                •
         •                    •                       •     •
                                                            •
                                                                   •                   •                                                    recursive in the stage number and in time for the above
                          •                                                                     •
                  •
                                                  •         •
                                                            •
                                                                       •
                                                                                                        •
                                                                                                                                            quantities:
                                              •             •              •
                                                            •
                                                            •
                                      •
                                                            •
                                                                                   •                                                              q(k,t)=8/9×p1(k-1,t).p1(k-1,t).p1(k-1,t).p1(k-1,t + 10/13
                                                          I15                                                                                         ×p1(k-1,t).p1(k-1,t). p1(k-1,t).p0(k-1,t)+ 9/12 ×p1(k-
                                                                                                                                                    1,t).p1(k-1,t). p0(k-1,t).p0(k-1,t)+ 1/2 ×p1(k-1,t).p1(k-
  Figure 2.                           A 32 X 32 MCRB or DCB Network based switch                                                                  1,t).p1(k-1,t).p0(k-1,t);             k=2, 3, 4………n
                                                                                                                                                                                                  ………(1)
                                                                                                                                            r(k,t)=[p0(k,t)+8/9p1(k,t)]×[p0(k+1,t)+p1(k+1,t) r(k+1,t)],
                                                                                                                                                      k=1,2,3,……,n-1                     r(n,t)=[p0(n,t)+8/9
                                                                                                                                              . p1(n,t)]
                                                                                                                                                                        ………(2)
                                                                                                                                                      p0(k,t+1)=[1-q(k,t)] [p0(k,t)+p1(k,t)r(k,t)],
                                                                                                                                                p1(k,t+1)=1-p0(k,t+1)
                                                                                                                                                                                      ………(3)
                                                                                                                                                          1
                                                                                                                                                                    PDCB Analysis
                                                                                                                                                      0.9           Banyan Analysis

                                                                                                                                                      0.8
                                                                                                                                                      0.7
                                                                                                                                            Normalized
                                                                                                                                            Throughput0.6

                                                                                                                                                      0.5
                                                                                                                                                      0.4
  Figure 3.                           A Parallel Plane DCB (PDCB) switch                                                                              0.3
                                                                                                                                                      0.2
                              III. SIMULATION AND ANALYSIS                                                                                            0.1

   Exact evaluation of high speed switch performance using                                                                                                0

simple stochastic methods is very difficult12. The situation                                                                                                  0    0.1   0.2   0.3   0.4
                                                                                                                                                                                Input Load
                                                                                                                                                                                           0.5   0.6   0.7   0.8

worsens with real-time traffic. This has led several
researchers to propose approximate analysis instead of                                                                                        Figure 4.           Plot of Normalized Throughput v/s Load
exact analysis13. Wu and Feng investigate a switch using a
new analytical model14. Chen provides a queuing analysis
that emphasizes delay for a switch with input port buffering
using the analysis of M/G/1 queue15. Jenq constructs a
recursive statistical model of a Banyan network with single
buffers for a uniform loading. Algorithms to calculate
Delay and blocking probability are also presented16.
A Performance Evaluation
  We have to make the following assumptions:
  (i) Loading is balanced. The arriving packets are
destined for each output with equal probability. The load
                                                                                                                                       23
© 2011 ACEEE
DOI: 01.IJNS.02.01.133
ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011



             100
                         PDCB Analysis       PDCB Simulation                   defined. Element-based fault analysis offers           better
             90          Banyan Analysis                                       accuracy, because it is highly unlikely that a failure in an
                                                                               SE will disable the entire SE, especially when efforts are
             80
                                                                               made in the design to avoid such an undesirable situation.
             70                                                                So, instead of total failures, we consider partial failure of
Normalized
  Delay
             60                                                                the SEs.
             50
                                                                                                                                  Lateral-in
             40                                                                                                                Element

             30
             20
             10
              0
                   0.1    0.2   0.3   0.4   0.5   0.6   0.7   0.8   0.9
                                                                                          Input                                      Output
                                                                                       Element                                    Element
  Figure 5.              Plot of Normalized Delay v/s Load

   The above equations can be solved iteratively for the
                                                                                                      Mod
equilibrium values. The two performance measures of most                                          l
interest, as usual, are throughput and delay. The normalized
throughput, Y or the average number of output packets per                                                                            Lateral-
                                                                                                                                 out Element
output link per slot is

   Y = p (k) r (k),  k=1, 2, 3,……, n                                             Figure 6.            Switching Element used in PDCB switching
                                     ………(4)                                                           fabric
The normalized average delay τnorm, is
                                                                                 1) Assumptions used
                                                                                       The following simplifying assumptions are made in
             1 n 1
τ norm =       ∑
             n k =1 r (k )
                                                                                       this analysis.
                                                                                            An element is considered to be faulty if any one
                                              ……….(5)                                       of its components fails.
                                                                                            The event that an element becomes faulty is an
B Fault Tolerance Analysis                                                                  independent event, and it occurs randomly.
   To study the fault tolerance property of such a fabric, we                               A fabric is considered failed when the number
first define a fault tolerance model, fault tolerance criterion                             and the locations of faulty elements prevent the
and fault tolerance method. The fault tolerance model                                       connection of any path between an arbitrary
characterizes all faults assumed to occur, stating the failure                              input-output pair of the fabric. The faults are
nodes (if any) for each component of the fabric. The fault                                  permanent.
tolerance criterion is the condition that must be met for the                               All faults are 100% detectable and can all be
fabric to be said to have tolerated a given fault or faults.                                successfully located.
   Each link coming in or going out of an SE has a module                                   Faults can occur at any stage except for the first
associated with it. A module contains all of the control                                    stage and output links. The elements at input
mechanism needed to route a request through the                                             and output stages are highly reliable.
connecting link. A module is called an input (or output)                                    The links connecting the SEs of the last stage to
module if its connecting link is an input (or output) link of                               the output buffers are highly reliable.
an SE. A lateral in (or lateral out) module can be similarly                        An output element in stage i can be regarded as an
named. An element is formed by an output module of an                          input element in stage i +1, so we consider only output
SE, an input module of an SE in the subsequent stage, and                      elements and lateral out elements in each stage along with
the link connecting them. The lateral out module of an SE,                     the input elements of stage 0 when the total number of
its connecting link, and the lateral in module of the                          elements is counted. Since a PDCB switching fabric has
connected SE also constitute an element. An element in the                     more than one path between each input-output pair, it can
first stage contains an input module and its connecting link                   tolerate at least one faulty element.
as shown in figure 3. Likewise, an output module (or a
lateral out module and its associated switch) together with                      2) Fault Model
the connecting link in the last stage also form an element.                      We use the fault models similar to those given by Chao17
An input (output) element in stage i, 0≤ i < log2N-1, is an                    and Abramovici18. They are suitable to digital logic
element which contains an input (output) module of an SE                       switching systems18. We have considered two faults in our
in stage i. A lateral in (lateral out) element can be similarly                model- input port controller (IPC) fault and switching
                                                                          24
© 2011 ACEEE
DOI: 01.IJNS.02.01.133
ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011



element (SE) fault. Some examples of the IPC faults are -                          log 2 N − 2
Multiple Grants, Lost Grant and Grant Stuck. Some
examples of SE fault models are- Idle Stuck SE, Active
                                                                           B=        ∑2  i =0
                                                                                                  i
                                                                                                      × ( N / 2 i − 1) = N (log 2 N − 3 / 2) + 1.
Stuck SE and 1/0 Stuck SE.
   A PDCB fabric comprises of superimposed binary trees                       3) Coverage of Fault Detection
rooted at SE's in the first stage with SE's as their nodes and                The detection and location of the fault in the planes
SE's in the last stage as their leaves. A path from the root to            depend upon coverage to detect a difference of bits
every leaf exists if all elements along the tree are fault-free.           transmitted during the test-sequence. These bits are termed
Since an input link of the first stage is shared by two                    as testing bits. The testing bits are passed through all planes
external components, it is sufficient for every external                   and a comparison of received bits reveals the fault, if any.
component to gain access to the fabric if one half of the                     The fault detection coverage can be estimated by
input elements in stage 0 are fault-free. The minimum                      analyzing the probabilities of a single bit being 1. The
number of fault-free elements required in a size N fabric                  probability of a legitimate bit as being of value 1is defined
can be given by:                                                           as P1(L) and the probability is P0(L) for a value of zero. We
                           ⎛ n−2    ⎞                                      study the coverage when a bit collision occurs, we define
   N / 2 + (N / 4 −1+ 2) + ⎜ ∑2× 2m ⎟ + N / 2 =        9N / 4 − 3          P1(C) as the probability of a colliding bit (or erroneous bit)
                           ⎝ m−1    ⎠                                      of having value “1”. We also assume that P1(L)= P1(C) and
                                                                           P0(L)= P0(C)
     The total number of elements in a fabric is E = N +                      The coverage is estimated as :
(3Nlog2N)/2. Hence, the maximum number of tolerable                          Π= PD / (PD+PU)
elements, denoted as BU, is {N(3.log2.N-5/2)/2+3}. An                         Where PD is the average probability of having a
PDCB switching fabric with size 8 has BU = 29 as seen                      detectable combination in n testing bits and PU is the
from figure 4. A conservative upper bound, denoted as B,                   average probability for an undetectable combination.
can be obtained for PDCB switching fabric based on the                        Here i and j are variables that depend on number of 1’s
following additional assumptions.                                          in a combination. k is the number of 1’s in the combination
              Mask 100       010             001                           of a test sequence. nCk is the number of combinations with
 Input port                                        Output
                                                                           n number of 1’s in a combination with k bits.
 addresses                                          port                      The results obtained from above equations are shown in
     000                                            000                    figure 7. Here best performance of the switch is seen for
                                                                           p(1) = p(0) = ½ and for other values of p(t), performance
     001                                            001                    degrades.
     010                                            010                            100
     011                                            011                             90

                                                                                    80
     100                                            100
                                                                       Coverage     70
     101                                            101                 of Fault    60
                                                                       Detection
     110                                            110                   (%)       50                                                       p=1/2
                                                                                    40                                                       p=1/4,3/4

   Figure 7.       Fault-tolerance by multiple paths in an 8X8 PDCB                 30
switching fabric                                                                    20

                                                                                    10
   Two faulty elements will cause the fabric to fail if
            Both faults are at the same SE and                                       0
            One of them is an output element and the other                                      1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

            is the lateral out element.                                                                          Number of Testing Bits, n
   A complete group with M/2 SE's has M output elements
                                                                             Figure 8.                 Coverage of fault detection
and M lateral out elements. The worst case a grouped fabric
can tolerate is when all but two of the output elements in
                                                                             4)    Terminal Reliability
the complete group are faulty, and all but one of the lateral
out elements are good. Thus, a complete group can tolerate                     Terminal Reliability (TR) is the probability that there
at most (M - 2) + 1 = M - 1 faulty elements. It can be seen                exists at least one fault free path from a particular input
that stage i, 0 ≤ i ≤ log 2 N − 1 , has 2i complete groups                 port to a particular output port. TR is normally used as a
each with N/2i+1 SE's. For stages between 0 and log2N-2,                   measure of the robustness of a switching fabric. The set of
the largest possible number of faults a fabric can tolerate is             paths in a fabric between a given input output pair is
given by:                                                                  represented as a directed graph, referred to as the
                                                                           redundancy graph (R-graph). Generally the reliability of a
                                                                           system is given by p=e-λt, given a constant failure rate λ for
                                                                           all the components, is. However, in the fault model
                                                                      25
© 2011 ACEEE
DOI: 01.IJNS.02.01.133
ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011



         considered in this work, the basic unit is an element, which                                                 REFERENCES
         takes the failure rate of both switching logics and the                            [1] Sadiku, N.O. Matthew, “Next Generation Network”, IEEE
         connecting link into account. Now, suppose that an element                              Potentials, 2002, pp. 6-8.
         has constant reliability r. The reliability of sub-graphs                          [2] Yuanyang; J. Wang; “A class of multistage conference
                                                                                                 switching networks for group communication”; Proceedings
         observed in the switch is given by:                                                     International Conference on, Pages (s) : 73-80, 18-21 Aug.
         ρ = r(1 - (1 - r)(1 – r2))n-2                                                           2002.
            Now the terminal reliability between S and D can be                             [3] Tzeng, N., “Multistage-based switching fabrics for scalable
         derived by applying the bridge network result. We have,                                 routers,” IEEE Transactions on Parallel and Distributed
         then,                                                                                   Systems, vol.15, no. 4, 2004, pp. 304-318.
            TR m = 2 ρ r − ( ρ r ) 2 + 2 (1 − ρ )(1 − r ) ρ r 2 ( 2 r − r 2 )               [4] W. Kabacinski, G. Danilewicz; “Wide-sense non-blocking
                                                                                                 multi-log2N         broadcast       switching       networks”;
             In order to compare we study the terminal reliability of                            Communications, 2000. ICC 2000, 2000 IEEE International
         an extra stage cube (ESC) fabric. In an ESC fabric built                                Conference on, Volume : 3, Page (s) 1440-1444 vol.3, 18-22
         from 2 x 2 SE’s (i.e. R = 2), a path from S (a source node)                             June 2000.
         to D (a destination node) consists of n+2 elements,                                [5] E. S. H. Tse, “Switch fabric architecture analysis for a
         including the two elements for connecting S and D. The                                  scalable bi-directionally reconfigurable IP router,” J. System
         terminal reliability between S and D in an ESC fabric is                                Architecture, vol. 50, no. 1, 2004, pp. 35-60.
                                                                                            [6] L. R Goke and G.J Lipovisky, “Banyan network to
         given as:
                                                                                                 partitioning processor systems”, Proc. 1st Annual Symp.
         TRESC = r2{1- (1- rn)2}                                                                 Computer Architecture, pp 21-28, Dec. 1973.
                                                                                            [7] S. K. Hui, K. Seman, Kim; “An augmented chained fault-
                                            MCRB.Switch.r=0.9                                    tolerant ATM switch”; Consumer Electronics, ICCE. 2002
                                            ESC.Switch.r=0.9                                     Digest of Technical Papers. International Conference on,
                                            MCRB.Switch.r=0.8                                    Page (s): 308-309, 2002.
                                            ESC.Switch.r=0.8                                [8] Nian-Feng Tzeng, Pen-Chung Yew, And Chuan-Qi Zhu;
                        1                                                                        “Realizing Fault-Tolerant Interconnection Networks via
                                                                                                 Chaining”; IEEE Transactions On Computers, Vol. 37, No.
                                                                                                 4. 458-462,April 1988.
                       0.8                                                                  [9] Cahit and J.Giglmayr, “Recirculating interconnection
Terminal.Reliability




                                                                                                 networks: Directed graph representations, routing and
                                                                                                 crossover minimization”, 1996 Internat. Topical Meeting on
                       0.6                                                                       Photonic in Switching, Sendai, Japan, April 1996.
                                                                                            [10] K. Padmanabhan, “An Efficient Architecture for Fault-
                                                                                                 Tolerant ATM Switches,” IEEE/ACM Transactions on
                       0.4                                                                       Networking, p527-537, 1995.
                                                                                            [11] S. S. Hussain, Y. Jenq, “Analysis and optimization of a
                                                                                                 Banyan based ATM switch by simulation”, Proc. IEEE Conf.
                       0.2                                                                       On local computer networks, pp 268, 1996.
                             0   20   40      60       80       100   120                   [12] L. Kleinrock, “On the Modeling and analysis of computer
                                           Network.Size                                          networks”, Proceeding of the IEEE, Vol. 81 No.8 pp. 1179-
                                                                                                 1190, August, 1993
             Figure 9.          Terminal Reliability for different values of failure
         rates of two switching fabric.
                                                                                            [13] C. Wu and T.Y. Feng. “On a class of multistage
                                                                                                 interconnection networks", IEEE Trans. Computer, Aug.
                                                                                                 1980, Page(s) 694-702, 1980.
                                           CONCLUSIONS                                      [14] Y. C. Jenq, “On calculations of a discrete queuing system
            In this paper, the PDCB switch is proposed for next                                  with independent general arrivals and geometric departures,”
                                                                                                 IEEE Trans on Communication, Vol.28, No.6, pp. 908-910,
         generation computer networks. It is a parallel plane
                                                                                                 June 1980.
         deflection-routed circular banyan network. The PDCB                                [15] Y. C. Jenq, “Performance analysis of a packet switch based
         switch can deflect a packet through an alternate path along                             on a single-buffered banyan network”, IEEE Journal on
         both the axes, if the desired path is not available, thereby                            Selected areas in communication, Vol. SAC-1 No. 6 pp.
         increasing the fault-tolerance and reliability of the switch.                           1014-1021, Dec, 1983.
         The PDCB network has a simple self-routing scheme same                             [16] F. Lombardi, C. Feng, and W.-K. Huang, “Detection and
         as that of banyan network and it is constructed of 4 X 4                                Location of Multiple Faults in Baseline Interconnection
         switching elements. Two pairs of input-output links in this                             Networks,” IEEE Transactions on Computers, vol. 41, No.
         SE are used for routing and two pairs for deflection of                                 10, pp. 1340-1344, October 1992.
                                                                                            [17] R. Rojas-Cessa, E. Oki, H. J. Chao; “Fast fault detection for
         packets within a cyclic group of the same stage. The PDCB
                                                                                                 a multiple-plane packet switch”; Global Telecommunications
         network has shown better throughput and delay                                           Conference,. GLOBECOM '01. IEEE Vol. 1, Page(s):102 –
         performance because it uses the principle of controlled                                 109, 2001.
         deflection. Thus average number of deflections is reduced                          [18] M. Abramovici, M. A. Breuer, and A. D. Friedman, “Digital
         and performance is improved.                                                            Systems Testing and Testable Design,” IEEE Press, 1990.




                                                                                       26
         © 2011 ACEEE
         DOI: 01.IJNS.02.01.133

More Related Content

What's hot

TCAD Based Analysis of Gate Leakage Current for High-k Gate Stack MOSFET
TCAD Based Analysis of Gate Leakage Current for High-k Gate Stack MOSFETTCAD Based Analysis of Gate Leakage Current for High-k Gate Stack MOSFET
TCAD Based Analysis of Gate Leakage Current for High-k Gate Stack MOSFETIDES Editor
 
24 15055 current steering ijeecs 1570310518(edit)
24 15055 current steering ijeecs  1570310518(edit)24 15055 current steering ijeecs  1570310518(edit)
24 15055 current steering ijeecs 1570310518(edit)nooriasukmaningtyas
 
Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...ijcisjournal
 
Designing Conservative Reversible N-Bit Binary Comparator for Emerging Quantu...
Designing Conservative Reversible N-Bit Binary Comparator for Emerging Quantu...Designing Conservative Reversible N-Bit Binary Comparator for Emerging Quantu...
Designing Conservative Reversible N-Bit Binary Comparator for Emerging Quantu...VIT-AP University
 
16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)IAESIJEECS
 
logical effort based dual mode logic gates by mallika
logical effort based dual mode logic gates by mallikalogical effort based dual mode logic gates by mallika
logical effort based dual mode logic gates by mallikaMallika Naidu
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
 
Extreme wareuserguide72
Extreme wareuserguide72Extreme wareuserguide72
Extreme wareuserguide72etrunk
 
A novel vedic divider based crypto-hardware for nanocomputing paradigm: An ex...
A novel vedic divider based crypto-hardware for nanocomputing paradigm: An ex...A novel vedic divider based crypto-hardware for nanocomputing paradigm: An ex...
A novel vedic divider based crypto-hardware for nanocomputing paradigm: An ex...VIT-AP University
 
Back track input vector algorithm for leakage reduction in cmos vlsi digital ...
Back track input vector algorithm for leakage reduction in cmos vlsi digital ...Back track input vector algorithm for leakage reduction in cmos vlsi digital ...
Back track input vector algorithm for leakage reduction in cmos vlsi digital ...VLSICS Design
 
Congestion Control by Load Balancing within the Data Network via Modified Dep...
Congestion Control by Load Balancing within the Data Network via Modified Dep...Congestion Control by Load Balancing within the Data Network via Modified Dep...
Congestion Control by Load Balancing within the Data Network via Modified Dep...IDES Editor
 
CMOS VLSI PROJECT || CMOS 3-Bit Binary to Square of the given Input || MULTIP...
CMOS VLSI PROJECT || CMOS 3-Bit Binary to Square of the given Input || MULTIP...CMOS VLSI PROJECT || CMOS 3-Bit Binary to Square of the given Input || MULTIP...
CMOS VLSI PROJECT || CMOS 3-Bit Binary to Square of the given Input || MULTIP...rameshreddybattini
 
Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...Alexander Decker
 
11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...Alexander Decker
 

What's hot (20)

TCAD Based Analysis of Gate Leakage Current for High-k Gate Stack MOSFET
TCAD Based Analysis of Gate Leakage Current for High-k Gate Stack MOSFETTCAD Based Analysis of Gate Leakage Current for High-k Gate Stack MOSFET
TCAD Based Analysis of Gate Leakage Current for High-k Gate Stack MOSFET
 
Ax24329333
Ax24329333Ax24329333
Ax24329333
 
Hx2413921400
Hx2413921400Hx2413921400
Hx2413921400
 
24 15055 current steering ijeecs 1570310518(edit)
24 15055 current steering ijeecs  1570310518(edit)24 15055 current steering ijeecs  1570310518(edit)
24 15055 current steering ijeecs 1570310518(edit)
 
Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...
 
Cw35552557
Cw35552557Cw35552557
Cw35552557
 
Designing Conservative Reversible N-Bit Binary Comparator for Emerging Quantu...
Designing Conservative Reversible N-Bit Binary Comparator for Emerging Quantu...Designing Conservative Reversible N-Bit Binary Comparator for Emerging Quantu...
Designing Conservative Reversible N-Bit Binary Comparator for Emerging Quantu...
 
16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)
 
logical effort based dual mode logic gates by mallika
logical effort based dual mode logic gates by mallikalogical effort based dual mode logic gates by mallika
logical effort based dual mode logic gates by mallika
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
Extreme wareuserguide72
Extreme wareuserguide72Extreme wareuserguide72
Extreme wareuserguide72
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 
A novel vedic divider based crypto-hardware for nanocomputing paradigm: An ex...
A novel vedic divider based crypto-hardware for nanocomputing paradigm: An ex...A novel vedic divider based crypto-hardware for nanocomputing paradigm: An ex...
A novel vedic divider based crypto-hardware for nanocomputing paradigm: An ex...
 
Back track input vector algorithm for leakage reduction in cmos vlsi digital ...
Back track input vector algorithm for leakage reduction in cmos vlsi digital ...Back track input vector algorithm for leakage reduction in cmos vlsi digital ...
Back track input vector algorithm for leakage reduction in cmos vlsi digital ...
 
Congestion Control by Load Balancing within the Data Network via Modified Dep...
Congestion Control by Load Balancing within the Data Network via Modified Dep...Congestion Control by Load Balancing within the Data Network via Modified Dep...
Congestion Control by Load Balancing within the Data Network via Modified Dep...
 
439 442
439 442439 442
439 442
 
CMOS VLSI PROJECT || CMOS 3-Bit Binary to Square of the given Input || MULTIP...
CMOS VLSI PROJECT || CMOS 3-Bit Binary to Square of the given Input || MULTIP...CMOS VLSI PROJECT || CMOS 3-Bit Binary to Square of the given Input || MULTIP...
CMOS VLSI PROJECT || CMOS 3-Bit Binary to Square of the given Input || MULTIP...
 
shashank_hpca1995_00386533
shashank_hpca1995_00386533shashank_hpca1995_00386533
shashank_hpca1995_00386533
 
Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...
 
11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...
 

Viewers also liked

Wireless Vision based Real time Object Tracking System Using Template Matching
Wireless Vision based Real time Object Tracking System Using Template MatchingWireless Vision based Real time Object Tracking System Using Template Matching
Wireless Vision based Real time Object Tracking System Using Template MatchingIDES Editor
 
Aspect-Oriented Instrumentation for Capturing Task- Based Event Traces
Aspect-Oriented Instrumentation for Capturing Task- Based Event TracesAspect-Oriented Instrumentation for Capturing Task- Based Event Traces
Aspect-Oriented Instrumentation for Capturing Task- Based Event TracesIDES Editor
 
3D Face Recognition Method Using 2DPCAEuclidean Distance Classification
3D Face Recognition Method Using 2DPCAEuclidean Distance Classification3D Face Recognition Method Using 2DPCAEuclidean Distance Classification
3D Face Recognition Method Using 2DPCAEuclidean Distance ClassificationIDES Editor
 
An Enhanced Inherited Crossover GA for the Reliability Constrained UC Problem
An Enhanced Inherited Crossover GA for the Reliability Constrained UC ProblemAn Enhanced Inherited Crossover GA for the Reliability Constrained UC Problem
An Enhanced Inherited Crossover GA for the Reliability Constrained UC ProblemIDES Editor
 
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
 
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesSIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesIDES Editor
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...IDES Editor
 

Viewers also liked (7)

Wireless Vision based Real time Object Tracking System Using Template Matching
Wireless Vision based Real time Object Tracking System Using Template MatchingWireless Vision based Real time Object Tracking System Using Template Matching
Wireless Vision based Real time Object Tracking System Using Template Matching
 
Aspect-Oriented Instrumentation for Capturing Task- Based Event Traces
Aspect-Oriented Instrumentation for Capturing Task- Based Event TracesAspect-Oriented Instrumentation for Capturing Task- Based Event Traces
Aspect-Oriented Instrumentation for Capturing Task- Based Event Traces
 
3D Face Recognition Method Using 2DPCAEuclidean Distance Classification
3D Face Recognition Method Using 2DPCAEuclidean Distance Classification3D Face Recognition Method Using 2DPCAEuclidean Distance Classification
3D Face Recognition Method Using 2DPCAEuclidean Distance Classification
 
An Enhanced Inherited Crossover GA for the Reliability Constrained UC Problem
An Enhanced Inherited Crossover GA for the Reliability Constrained UC ProblemAn Enhanced Inherited Crossover GA for the Reliability Constrained UC Problem
An Enhanced Inherited Crossover GA for the Reliability Constrained UC Problem
 
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
 
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesSIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
 

Similar to A Fault-tolerant Switch for Next Generation Computer Networks

emulation of wireless networks
emulation of wireless networksemulation of wireless networks
emulation of wireless networkssubhishanu
 
Local Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresLocal Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresEditor IJCATR
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPMODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPVLSICS Design
 
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...IRJET Journal
 
A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...eSAT Journals
 
IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...
IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...
IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...IRJET Journal
 
Review of crosstalk free Network
Review of crosstalk free NetworkReview of crosstalk free Network
Review of crosstalk free NetworkIJMER
 
International Journal of Computer Science and Security Volume (2) Issue (4)
International Journal of Computer Science and Security Volume (2) Issue (4)International Journal of Computer Science and Security Volume (2) Issue (4)
International Journal of Computer Science and Security Volume (2) Issue (4)CSCJournals
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Jaipal Dhobale
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...IJECEIAES
 
Dynamic classification in silicon-based forwarding engine environments
Dynamic classification in silicon-based forwarding engine environmentsDynamic classification in silicon-based forwarding engine environments
Dynamic classification in silicon-based forwarding engine environmentsTal Lavian Ph.D.
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of networkjpstudcorner
 
Instruction level power analysis
Instruction level power analysisInstruction level power analysis
Instruction level power analysisRadhegovind
 

Similar to A Fault-tolerant Switch for Next Generation Computer Networks (20)

emulation of wireless networks
emulation of wireless networksemulation of wireless networks
emulation of wireless networks
 
Local Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresLocal Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link Failures
 
A0520106
A0520106A0520106
A0520106
 
Ms2420992102
Ms2420992102Ms2420992102
Ms2420992102
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPMODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
 
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
 
A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...
 
IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...
IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...
IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay ...
 
Review of crosstalk free Network
Review of crosstalk free NetworkReview of crosstalk free Network
Review of crosstalk free Network
 
International Journal of Computer Science and Security Volume (2) Issue (4)
International Journal of Computer Science and Security Volume (2) Issue (4)International Journal of Computer Science and Security Volume (2) Issue (4)
International Journal of Computer Science and Security Volume (2) Issue (4)
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
 
Dynamic classification in silicon-based forwarding engine environments
Dynamic classification in silicon-based forwarding engine environmentsDynamic classification in silicon-based forwarding engine environments
Dynamic classification in silicon-based forwarding engine environments
 
Networks
NetworksNetworks
Networks
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
 
Instruction level power analysis
Instruction level power analysisInstruction level power analysis
Instruction level power analysis
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

A Fault-tolerant Switch for Next Generation Computer Networks

  • 1. ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011 A Fault-tolerant Switch for Next Generation Computer Networks V. S. Tripathi and S. Tiwari Department of E & C E, MNNIT, Allahabad, India. vst@mnnit.ac.in, stiwari@mnnit.ac.in Abstract— In this paper, the architecture of a Multi-plane network based switch is evaluated using a new analytical Parallel Deflection-Routed Circular Banyan (PDCB) network model based on Markov chain and simulation. The based switching fabric is introduced. The PDCB network has performance parameters studied are normalized throughput, a cyclic, regular, self-routing, simple architecture and fairly normalized delay and fault-detection coverage as they are good performance. Its Performance is improved due to reduction in blocking by two-dimensional path-multiplicity of fundamental parameters. the proposed architecture. It consists of 4X4 Switching The remaining paper is organized as follows: Section 2 Elements. discusses the architecture of a PDCB network based switch The proposed switch is shown to be fault-tolerant. A simple and section 3 discusses analysis of the proposed switch. analytical model based on Markov chain to evaluate the Finally the conclusion is given in section 4. performance of proposed switch under uniform traffic condition has also been presented in this paper. The II. PDCB NETWORK BASED SWITCHING ARCHITECTURE performance parameters studied are Normalized Throughput and Normalized Delay. Simulation study of the switch is also The deflection-routed circular banyan network is a performed to validate the model proposed. modified banyan network that can be realized by 4X4 switching elements (SE) and augmented links as shown in Index Terms— Fault-tolerant, Banyan, Markov chain, figures 1 and 2. The SE in simple banyan switch is a 2X2 Performance, Deflection-routed, Switch. crossbar type network, which is connected through links to form a specific topology. The SE is modified by addition of I. INTRODUCTION two pairs of lateral in and lateral out ports. The additional The next generation computer networks (NGN) require ports are used for lateral interconnection of the SEs in a high speed integrated switches1. Many types of switches stage. presented in the literature are found to be suitable for the purpose2, 3, 4, 5. The performance parameters to compare and Outputs characterize these switches are- throughput, delay, variance Inputs 0 of delay, buffer size, location of buffer, multicast capability, cost, fault-tolerance, reliability and scalability. Because of its regularity, modularity, self-routing property 1 and simple architecture, a class of multistage interconnection networks called Banyan network is preferred for use in NGN7. It consists of 2X2 switching Lateral-In Lateral-out elements and offers same latency for all input-output pairs. It has path-uniqueness property that results in cell-sequence Figure 1. Modified Switching Element preservation at one hand and giving rise to the problem of blocking on the other. To solve this problem, various In a multi-plane parallel defection-routed circular approaches have been proposed like- increasing the banyan (PDCB) network based switch the switching planes bandwidth of internal links, providing internal buffers and of figure 2 are used in parallel to make up a parallel plane deflection routing8. Deflection routing needs multiple switch as shown in figure 3. A large number of equivalent input-output paths within the switching fabric and adding paths into the switching fabric exist and the packet is free multiplicity may further result in increase of irregularity, to choose any free path independently. Thus switch loss of modularity and increase in complexity 9. becomes robust in the case of pathological traffic patterns. The parallel plane deflection-routed circular banyan Fault-tolerance and reliability of the switch is further network (PDCB) based switch proposed in this paper can improved. The advantages of the PDCB switch include enhance the performance by offering a solution to the redundancy, augmented throughput and relaxed port speed problem of blocking while maintaining the advantages of and pin count. A switch that transmits a data packet banyan architecture. This switch has self-routing property. through k active planes can have one or more spare planes It consists of 4X4 Switching Elements. Multiple paths are to replace any faulty active plane. available between any input-output pair along vertical as A practical spare distribution scheme with less than well as horizontal axis. The packets are free to choose any 100% hardware redundancy with a three-dimensional free path independently. Path-multiplicity supports system has been presented11. This methodology has been multicasting. It also improves the fault-tolerance and shown to be faster and more cost effective than a duplex reliability of the switch. The performance of PDCB system for a large switch since it can provide comparable availability of spares with less hardware redundancy. In our 22 © 2011 ACEEE DOI: 01.IJNS.02.01.133
  • 2. ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011 switch, we adopt a similar architecture with spares in the z- on each input is 0≤q(1)≤1. With a balanced load the state of axis only for redundancy purposes because this sparing each switching network in stage k should be statistically scheme allows a fast (i.e., concurrent) system re- the same. configuration. (ii) The states of the two buffers within a switching element are statistically independent. This assumption is justified by taking note that packets entering the input of a Internal Blocking Input Nodes Self-Routing switching element originate from disjoint and independent I0 • 1 network inputs. • • • • We can make some definitions as follows: • • • • • • p0(k,t)=the probability that the switching element buffer • • • • • • 1 at stage k is empty at the beginning of the tth clock. 0 • • • • • • • q(k,t)=the probability that a packet is ready to enter a • • • • • • External Blocking switching element buffer at stage k during the tth clock • • period. O15 r(k,t)=the probability that a packet in a switching O0 • • • • • • • • •• • • • • • • Output Nodes element buffer at stage k is able to move (forward) into the • • next stage during the tth clock period. • • • • • • Now we can write a series of probabilistic equations, • • • • • • • • recursive in the stage number and in time for the above • • • • • • • • quantities: • • • • • • • • q(k,t)=8/9×p1(k-1,t).p1(k-1,t).p1(k-1,t).p1(k-1,t + 10/13 I15 ×p1(k-1,t).p1(k-1,t). p1(k-1,t).p0(k-1,t)+ 9/12 ×p1(k- 1,t).p1(k-1,t). p0(k-1,t).p0(k-1,t)+ 1/2 ×p1(k-1,t).p1(k- Figure 2. A 32 X 32 MCRB or DCB Network based switch 1,t).p1(k-1,t).p0(k-1,t); k=2, 3, 4………n ………(1) r(k,t)=[p0(k,t)+8/9p1(k,t)]×[p0(k+1,t)+p1(k+1,t) r(k+1,t)], k=1,2,3,……,n-1 r(n,t)=[p0(n,t)+8/9 . p1(n,t)] ………(2) p0(k,t+1)=[1-q(k,t)] [p0(k,t)+p1(k,t)r(k,t)], p1(k,t+1)=1-p0(k,t+1) ………(3) 1 PDCB Analysis 0.9 Banyan Analysis 0.8 0.7 Normalized Throughput0.6 0.5 0.4 Figure 3. A Parallel Plane DCB (PDCB) switch 0.3 0.2 III. SIMULATION AND ANALYSIS 0.1 Exact evaluation of high speed switch performance using 0 simple stochastic methods is very difficult12. The situation 0 0.1 0.2 0.3 0.4 Input Load 0.5 0.6 0.7 0.8 worsens with real-time traffic. This has led several researchers to propose approximate analysis instead of Figure 4. Plot of Normalized Throughput v/s Load exact analysis13. Wu and Feng investigate a switch using a new analytical model14. Chen provides a queuing analysis that emphasizes delay for a switch with input port buffering using the analysis of M/G/1 queue15. Jenq constructs a recursive statistical model of a Banyan network with single buffers for a uniform loading. Algorithms to calculate Delay and blocking probability are also presented16. A Performance Evaluation We have to make the following assumptions: (i) Loading is balanced. The arriving packets are destined for each output with equal probability. The load 23 © 2011 ACEEE DOI: 01.IJNS.02.01.133
  • 3. ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011 100 PDCB Analysis PDCB Simulation defined. Element-based fault analysis offers better 90 Banyan Analysis accuracy, because it is highly unlikely that a failure in an SE will disable the entire SE, especially when efforts are 80 made in the design to avoid such an undesirable situation. 70 So, instead of total failures, we consider partial failure of Normalized Delay 60 the SEs. 50 Lateral-in 40 Element 30 20 10 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 Input Output Element Element Figure 5. Plot of Normalized Delay v/s Load The above equations can be solved iteratively for the Mod equilibrium values. The two performance measures of most l interest, as usual, are throughput and delay. The normalized throughput, Y or the average number of output packets per Lateral- out Element output link per slot is Y = p (k) r (k), k=1, 2, 3,……, n Figure 6. Switching Element used in PDCB switching ………(4) fabric The normalized average delay τnorm, is 1) Assumptions used The following simplifying assumptions are made in 1 n 1 τ norm = ∑ n k =1 r (k ) this analysis. An element is considered to be faulty if any one ……….(5) of its components fails. The event that an element becomes faulty is an B Fault Tolerance Analysis independent event, and it occurs randomly. To study the fault tolerance property of such a fabric, we A fabric is considered failed when the number first define a fault tolerance model, fault tolerance criterion and the locations of faulty elements prevent the and fault tolerance method. The fault tolerance model connection of any path between an arbitrary characterizes all faults assumed to occur, stating the failure input-output pair of the fabric. The faults are nodes (if any) for each component of the fabric. The fault permanent. tolerance criterion is the condition that must be met for the All faults are 100% detectable and can all be fabric to be said to have tolerated a given fault or faults. successfully located. Each link coming in or going out of an SE has a module Faults can occur at any stage except for the first associated with it. A module contains all of the control stage and output links. The elements at input mechanism needed to route a request through the and output stages are highly reliable. connecting link. A module is called an input (or output) The links connecting the SEs of the last stage to module if its connecting link is an input (or output) link of the output buffers are highly reliable. an SE. A lateral in (or lateral out) module can be similarly An output element in stage i can be regarded as an named. An element is formed by an output module of an input element in stage i +1, so we consider only output SE, an input module of an SE in the subsequent stage, and elements and lateral out elements in each stage along with the link connecting them. The lateral out module of an SE, the input elements of stage 0 when the total number of its connecting link, and the lateral in module of the elements is counted. Since a PDCB switching fabric has connected SE also constitute an element. An element in the more than one path between each input-output pair, it can first stage contains an input module and its connecting link tolerate at least one faulty element. as shown in figure 3. Likewise, an output module (or a lateral out module and its associated switch) together with 2) Fault Model the connecting link in the last stage also form an element. We use the fault models similar to those given by Chao17 An input (output) element in stage i, 0≤ i < log2N-1, is an and Abramovici18. They are suitable to digital logic element which contains an input (output) module of an SE switching systems18. We have considered two faults in our in stage i. A lateral in (lateral out) element can be similarly model- input port controller (IPC) fault and switching 24 © 2011 ACEEE DOI: 01.IJNS.02.01.133
  • 4. ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011 element (SE) fault. Some examples of the IPC faults are - log 2 N − 2 Multiple Grants, Lost Grant and Grant Stuck. Some examples of SE fault models are- Idle Stuck SE, Active B= ∑2 i =0 i × ( N / 2 i − 1) = N (log 2 N − 3 / 2) + 1. Stuck SE and 1/0 Stuck SE. A PDCB fabric comprises of superimposed binary trees 3) Coverage of Fault Detection rooted at SE's in the first stage with SE's as their nodes and The detection and location of the fault in the planes SE's in the last stage as their leaves. A path from the root to depend upon coverage to detect a difference of bits every leaf exists if all elements along the tree are fault-free. transmitted during the test-sequence. These bits are termed Since an input link of the first stage is shared by two as testing bits. The testing bits are passed through all planes external components, it is sufficient for every external and a comparison of received bits reveals the fault, if any. component to gain access to the fabric if one half of the The fault detection coverage can be estimated by input elements in stage 0 are fault-free. The minimum analyzing the probabilities of a single bit being 1. The number of fault-free elements required in a size N fabric probability of a legitimate bit as being of value 1is defined can be given by: as P1(L) and the probability is P0(L) for a value of zero. We ⎛ n−2 ⎞ study the coverage when a bit collision occurs, we define N / 2 + (N / 4 −1+ 2) + ⎜ ∑2× 2m ⎟ + N / 2 = 9N / 4 − 3 P1(C) as the probability of a colliding bit (or erroneous bit) ⎝ m−1 ⎠ of having value “1”. We also assume that P1(L)= P1(C) and P0(L)= P0(C) The total number of elements in a fabric is E = N + The coverage is estimated as : (3Nlog2N)/2. Hence, the maximum number of tolerable Œ = PD / (PD+PU) elements, denoted as BU, is {N(3.log2.N-5/2)/2+3}. An Where PD is the average probability of having a PDCB switching fabric with size 8 has BU = 29 as seen detectable combination in n testing bits and PU is the from figure 4. A conservative upper bound, denoted as B, average probability for an undetectable combination. can be obtained for PDCB switching fabric based on the Here i and j are variables that depend on number of 1’s following additional assumptions. in a combination. k is the number of 1’s in the combination Mask 100 010 001 of a test sequence. nCk is the number of combinations with Input port Output n number of 1’s in a combination with k bits. addresses port The results obtained from above equations are shown in 000 000 figure 7. Here best performance of the switch is seen for p(1) = p(0) = ½ and for other values of p(t), performance 001 001 degrades. 010 010 100 011 011 90 80 100 100 Coverage 70 101 101 of Fault 60 Detection 110 110 (%) 50 p=1/2 40 p=1/4,3/4 Figure 7. Fault-tolerance by multiple paths in an 8X8 PDCB 30 switching fabric 20 10 Two faulty elements will cause the fabric to fail if Both faults are at the same SE and 0 One of them is an output element and the other 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 is the lateral out element. Number of Testing Bits, n A complete group with M/2 SE's has M output elements Figure 8. Coverage of fault detection and M lateral out elements. The worst case a grouped fabric can tolerate is when all but two of the output elements in 4) Terminal Reliability the complete group are faulty, and all but one of the lateral out elements are good. Thus, a complete group can tolerate Terminal Reliability (TR) is the probability that there at most (M - 2) + 1 = M - 1 faulty elements. It can be seen exists at least one fault free path from a particular input that stage i, 0 ≤ i ≤ log 2 N − 1 , has 2i complete groups port to a particular output port. TR is normally used as a each with N/2i+1 SE's. For stages between 0 and log2N-2, measure of the robustness of a switching fabric. The set of the largest possible number of faults a fabric can tolerate is paths in a fabric between a given input output pair is given by: represented as a directed graph, referred to as the redundancy graph (R-graph). Generally the reliability of a system is given by p=e-λt, given a constant failure rate λ for all the components, is. However, in the fault model 25 © 2011 ACEEE DOI: 01.IJNS.02.01.133
  • 5. ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011 considered in this work, the basic unit is an element, which REFERENCES takes the failure rate of both switching logics and the [1] Sadiku, N.O. Matthew, “Next Generation Network”, IEEE connecting link into account. Now, suppose that an element Potentials, 2002, pp. 6-8. has constant reliability r. The reliability of sub-graphs [2] Yuanyang; J. Wang; “A class of multistage conference switching networks for group communication”; Proceedings observed in the switch is given by: International Conference on, Pages (s) : 73-80, 18-21 Aug. ρ = r(1 - (1 - r)(1 – r2))n-2 2002. Now the terminal reliability between S and D can be [3] Tzeng, N., “Multistage-based switching fabrics for scalable derived by applying the bridge network result. We have, routers,” IEEE Transactions on Parallel and Distributed then, Systems, vol.15, no. 4, 2004, pp. 304-318. TR m = 2 ρ r − ( ρ r ) 2 + 2 (1 − ρ )(1 − r ) ρ r 2 ( 2 r − r 2 ) [4] W. Kabacinski, G. Danilewicz; “Wide-sense non-blocking multi-log2N broadcast switching networks”; In order to compare we study the terminal reliability of Communications, 2000. ICC 2000, 2000 IEEE International an extra stage cube (ESC) fabric. In an ESC fabric built Conference on, Volume : 3, Page (s) 1440-1444 vol.3, 18-22 from 2 x 2 SE’s (i.e. R = 2), a path from S (a source node) June 2000. to D (a destination node) consists of n+2 elements, [5] E. S. H. Tse, “Switch fabric architecture analysis for a including the two elements for connecting S and D. The scalable bi-directionally reconfigurable IP router,” J. System terminal reliability between S and D in an ESC fabric is Architecture, vol. 50, no. 1, 2004, pp. 35-60. [6] L. R Goke and G.J Lipovisky, “Banyan network to given as: partitioning processor systems”, Proc. 1st Annual Symp. TRESC = r2{1- (1- rn)2} Computer Architecture, pp 21-28, Dec. 1973. [7] S. K. Hui, K. Seman, Kim; “An augmented chained fault- MCRB.Switch.r=0.9 tolerant ATM switch”; Consumer Electronics, ICCE. 2002 ESC.Switch.r=0.9 Digest of Technical Papers. International Conference on, MCRB.Switch.r=0.8 Page (s): 308-309, 2002. ESC.Switch.r=0.8 [8] Nian-Feng Tzeng, Pen-Chung Yew, And Chuan-Qi Zhu; 1 “Realizing Fault-Tolerant Interconnection Networks via Chaining”; IEEE Transactions On Computers, Vol. 37, No. 4. 458-462,April 1988. 0.8 [9] Cahit and J.Giglmayr, “Recirculating interconnection Terminal.Reliability networks: Directed graph representations, routing and crossover minimization”, 1996 Internat. Topical Meeting on 0.6 Photonic in Switching, Sendai, Japan, April 1996. [10] K. Padmanabhan, “An Efficient Architecture for Fault- Tolerant ATM Switches,” IEEE/ACM Transactions on 0.4 Networking, p527-537, 1995. [11] S. S. Hussain, Y. Jenq, “Analysis and optimization of a Banyan based ATM switch by simulation”, Proc. IEEE Conf. 0.2 On local computer networks, pp 268, 1996. 0 20 40 60 80 100 120 [12] L. Kleinrock, “On the Modeling and analysis of computer Network.Size networks”, Proceeding of the IEEE, Vol. 81 No.8 pp. 1179- 1190, August, 1993 Figure 9. Terminal Reliability for different values of failure rates of two switching fabric. [13] C. Wu and T.Y. Feng. “On a class of multistage interconnection networks", IEEE Trans. Computer, Aug. 1980, Page(s) 694-702, 1980. CONCLUSIONS [14] Y. C. Jenq, “On calculations of a discrete queuing system In this paper, the PDCB switch is proposed for next with independent general arrivals and geometric departures,” IEEE Trans on Communication, Vol.28, No.6, pp. 908-910, generation computer networks. It is a parallel plane June 1980. deflection-routed circular banyan network. The PDCB [15] Y. C. Jenq, “Performance analysis of a packet switch based switch can deflect a packet through an alternate path along on a single-buffered banyan network”, IEEE Journal on both the axes, if the desired path is not available, thereby Selected areas in communication, Vol. SAC-1 No. 6 pp. increasing the fault-tolerance and reliability of the switch. 1014-1021, Dec, 1983. The PDCB network has a simple self-routing scheme same [16] F. Lombardi, C. Feng, and W.-K. Huang, “Detection and as that of banyan network and it is constructed of 4 X 4 Location of Multiple Faults in Baseline Interconnection switching elements. Two pairs of input-output links in this Networks,” IEEE Transactions on Computers, vol. 41, No. SE are used for routing and two pairs for deflection of 10, pp. 1340-1344, October 1992. [17] R. Rojas-Cessa, E. Oki, H. J. Chao; “Fast fault detection for packets within a cyclic group of the same stage. The PDCB a multiple-plane packet switch”; Global Telecommunications network has shown better throughput and delay Conference,. GLOBECOM '01. IEEE Vol. 1, Page(s):102 – performance because it uses the principle of controlled 109, 2001. deflection. Thus average number of deflections is reduced [18] M. Abramovici, M. A. Breuer, and A. D. Friedman, “Digital and performance is improved. Systems Testing and Testable Design,” IEEE Press, 1990. 26 © 2011 ACEEE DOI: 01.IJNS.02.01.133