SlideShare a Scribd company logo
Network on Chip
Structure and Design Methodologies1
• Introduction
• Network-on-Chip Architecture and Function Layers
• Network-on-Chip Design Methodologies
• Bidirectional Network-on-Chip (BiNoC)
Architecture
• Conclusion
2
Content
•The next generation of multiprocessor system on
chip (MPSoC) and chip multiprocessors (CMPs)
will contain hundreds or thousands of cores.
Such a many-core system requires high-
performance interconnections to transfer data
among the cores on the chip.
3
Abstract
•As the density of VLSI design increases, the
complexity of each component in a system
raises rapidly.
•Today’s SoC designers face a new challenge
in the design of the on-chip interconnects
beyond the evolution of an increasing
number of processing elements
4
Introduction
Why we need of it ?..
• Power efficient processors combined with hardware
accelerators are the preferred choice for most
designers to deliver the best trade off between
performance and power consumption.
• Hoc methods of selecting few blocks may work based
on a designer’s experience, this may not work as
today’s MPSoC and CMP designs which becomes more
and more complex.
5
Content
Network-on-Chip Architecture and Function Layers
•A typical NoC architecture consists of
multiple segments of wires and routers.
•The NoC function can be classified into
several layers: application, transport,
network, data link, and physical layers.
6
NI-Network Interface R-Routers
7
Typical NoC architecture in a mesh topology.
• Application Layer: At the application layer, target applications will
be broken down into a set of computation.
• Transport Layer: Prevent buffer overflow and avoid traffic
congestion.
• Network Layer: Deal with the routing data between processing
elements.
• Data Link: Increase the reliability of the link up to a minimum
required level.
• Physical Layers: Transfer the data from node to node.
8
Network-on-Chip Function Layers
9
Typical NoC Router Architecture
10
Network-on-Chip Design Methodologies
• Problem Description: Waist of Bandwidth
• Example: 2*2 Two-Dimensional Mesh NOC
11
Bidirectional Network-on-Chip (BiNoC) Architecture
• Channel Bandwidth Utilization:
• Bandwidth Utilization Analysis of a conventional NOC router
• NOC with Virtual Channel Control
12
Bidirectional Network-on-Chip (BiNoC) Architecture Cont.
• NoC (BiNoC) backbone architecture, which can be
easily integrated into most conventional NoC designs
and successfully improve the NoC performance with a
reasonable cost.
13
Conclusion
• Hindawi Publishing Corporation
Journal of Electrical and Computer Engineering
Volume 2012, Article ID 509465
14
Reference
THANK’S
’S

More Related Content

What's hot

TRACK B: Multicores & Network On Chip Architectures/ Oren Hollander
TRACK B: Multicores & Network On Chip Architectures/ Oren HollanderTRACK B: Multicores & Network On Chip Architectures/ Oren Hollander
TRACK B: Multicores & Network On Chip Architectures/ Oren Hollanderchiportal
 
Performance Analysis of OLSR routing protocol In MANET Considering different ...
Performance Analysis of OLSR routing protocol In MANET Considering different ...Performance Analysis of OLSR routing protocol In MANET Considering different ...
Performance Analysis of OLSR routing protocol In MANET Considering different ...
Koay Yong Cett
 
3 Phase NFV/SDN Virtualizartion Road Map
3 Phase NFV/SDN Virtualizartion Road Map3 Phase NFV/SDN Virtualizartion Road Map
3 Phase NFV/SDN Virtualizartion Road Map
Mettle Networks
 
Network topologies
Network topologies Network topologies
Network topologies
Yash Aggrawal
 
Microprocessor presentation
Microprocessor presentationMicroprocessor presentation
Microprocessor presentation
TanmayShete4
 
Scope of parallelism
Scope of parallelismScope of parallelism
Scope of parallelism
Syed Zaid Irshad
 
2014 - Durando Manuel - Presentazione
2014 - Durando Manuel - Presentazione2014 - Durando Manuel - Presentazione
2014 - Durando Manuel - PresentazioneManuel Durando
 
Overlay networks
Overlay networksOverlay networks
Overlay networks
Mayank Chaudhari
 
Fundamentals of Communication Networks
Fundamentals ofCommunication NetworksFundamentals ofCommunication Networks
Fundamentals of Communication Networks
Hossein Shafieirad
 
Operating system 15 micro kernel based os
Operating system 15 micro kernel based osOperating system 15 micro kernel based os
Operating system 15 micro kernel based os
Vaibhav Khanna
 
Open Source Carrier Networking
Open Source Carrier NetworkingOpen Source Carrier Networking
Open Source Carrier Networking
Dirk Kutscher
 
Vienna SLS overview
Vienna SLS overviewVienna SLS overview
Vienna SLS overview
Mohamed Marzban
 
Tossim
Tossim Tossim
Tossim
crew1274
 
Chapter03
Chapter03Chapter03
Chapter03
Muhammad Ahad
 

What's hot (14)

TRACK B: Multicores & Network On Chip Architectures/ Oren Hollander
TRACK B: Multicores & Network On Chip Architectures/ Oren HollanderTRACK B: Multicores & Network On Chip Architectures/ Oren Hollander
TRACK B: Multicores & Network On Chip Architectures/ Oren Hollander
 
Performance Analysis of OLSR routing protocol In MANET Considering different ...
Performance Analysis of OLSR routing protocol In MANET Considering different ...Performance Analysis of OLSR routing protocol In MANET Considering different ...
Performance Analysis of OLSR routing protocol In MANET Considering different ...
 
3 Phase NFV/SDN Virtualizartion Road Map
3 Phase NFV/SDN Virtualizartion Road Map3 Phase NFV/SDN Virtualizartion Road Map
3 Phase NFV/SDN Virtualizartion Road Map
 
Network topologies
Network topologies Network topologies
Network topologies
 
Microprocessor presentation
Microprocessor presentationMicroprocessor presentation
Microprocessor presentation
 
Scope of parallelism
Scope of parallelismScope of parallelism
Scope of parallelism
 
2014 - Durando Manuel - Presentazione
2014 - Durando Manuel - Presentazione2014 - Durando Manuel - Presentazione
2014 - Durando Manuel - Presentazione
 
Overlay networks
Overlay networksOverlay networks
Overlay networks
 
Fundamentals of Communication Networks
Fundamentals ofCommunication NetworksFundamentals ofCommunication Networks
Fundamentals of Communication Networks
 
Operating system 15 micro kernel based os
Operating system 15 micro kernel based osOperating system 15 micro kernel based os
Operating system 15 micro kernel based os
 
Open Source Carrier Networking
Open Source Carrier NetworkingOpen Source Carrier Networking
Open Source Carrier Networking
 
Vienna SLS overview
Vienna SLS overviewVienna SLS overview
Vienna SLS overview
 
Tossim
Tossim Tossim
Tossim
 
Chapter03
Chapter03Chapter03
Chapter03
 

Similar to Vaibhav (2)

www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
network design and administration
network design and administrationnetwork design and administration
network design and administration
erick chuwa
 
Unit 1
Unit 1Unit 1
Unit 1
sasi
 
Trends and challenges in IP based SOC design
Trends and challenges in IP based SOC designTrends and challenges in IP based SOC design
Trends and challenges in IP based SOC design
AishwaryaRavishankar8
 
Networking lec1 4
Networking lec1 4Networking lec1 4
Networking lec1 4
Vasanti Dutta
 
Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...
eSAT Journals
 
Performance and Flexibility for Mmultiple-Processor SoC Design
Performance and Flexibility for Mmultiple-Processor SoC DesignPerformance and Flexibility for Mmultiple-Processor SoC Design
Performance and Flexibility for Mmultiple-Processor SoC Design
Yalagoud Patil
 
Noise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc ModelNoise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc Model
IJMER
 
Design and Implementation of JPEG CODEC using NoC
Design and Implementation of JPEG CODEC using NoCDesign and Implementation of JPEG CODEC using NoC
Design and Implementation of JPEG CODEC using NoC
IRJET Journal
 
Network on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyNetwork on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A survey
IJRES Journal
 
Low power network on chip architectures: A survey
Low power network on chip architectures: A surveyLow power network on chip architectures: A survey
Low power network on chip architectures: A survey
CSITiaesprime
 
Cloud RAN for Mobile Networks_Final
Cloud RAN for Mobile Networks_FinalCloud RAN for Mobile Networks_Final
Cloud RAN for Mobile Networks_FinalSumedh Deshpande
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Vcs standard ccna 2 ch-1.1
Vcs standard ccna 2 ch-1.1Vcs standard ccna 2 ch-1.1
Vcs standard ccna 2 ch-1.1
mrinmoykumarmahato1
 
Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)
Yasir Bashir
 
ITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdfITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdf
ssuser2d7235
 
20607-39024-1-PB.pdf
20607-39024-1-PB.pdf20607-39024-1-PB.pdf
20607-39024-1-PB.pdf
IjictTeam
 
Data Center for Cloud Computing - DC3X
Data Center for Cloud Computing - DC3XData Center for Cloud Computing - DC3X
Data Center for Cloud Computing - DC3X
Renaud Blanchette
 

Similar to Vaibhav (2) (20)

www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
network design and administration
network design and administrationnetwork design and administration
network design and administration
 
Unit 1
Unit 1Unit 1
Unit 1
 
Trends and challenges in IP based SOC design
Trends and challenges in IP based SOC designTrends and challenges in IP based SOC design
Trends and challenges in IP based SOC design
 
Networking lec1 4
Networking lec1 4Networking lec1 4
Networking lec1 4
 
Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...
 
Performance and Flexibility for Mmultiple-Processor SoC Design
Performance and Flexibility for Mmultiple-Processor SoC DesignPerformance and Flexibility for Mmultiple-Processor SoC Design
Performance and Flexibility for Mmultiple-Processor SoC Design
 
Noise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc ModelNoise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc Model
 
Design and Implementation of JPEG CODEC using NoC
Design and Implementation of JPEG CODEC using NoCDesign and Implementation of JPEG CODEC using NoC
Design and Implementation of JPEG CODEC using NoC
 
Network on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyNetwork on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A survey
 
Low power network on chip architectures: A survey
Low power network on chip architectures: A surveyLow power network on chip architectures: A survey
Low power network on chip architectures: A survey
 
Cloud RAN for Mobile Networks_Final
Cloud RAN for Mobile Networks_FinalCloud RAN for Mobile Networks_Final
Cloud RAN for Mobile Networks_Final
 
Link_NwkingforDevOps
Link_NwkingforDevOpsLink_NwkingforDevOps
Link_NwkingforDevOps
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Vcs standard ccna 2 ch-1.1
Vcs standard ccna 2 ch-1.1Vcs standard ccna 2 ch-1.1
Vcs standard ccna 2 ch-1.1
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)Networking (CCNA 1st Chapter)
Networking (CCNA 1st Chapter)
 
ITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdfITN3052_04_Switched_Networks.pdf
ITN3052_04_Switched_Networks.pdf
 
20607-39024-1-PB.pdf
20607-39024-1-PB.pdf20607-39024-1-PB.pdf
20607-39024-1-PB.pdf
 
Data Center for Cloud Computing - DC3X
Data Center for Cloud Computing - DC3XData Center for Cloud Computing - DC3X
Data Center for Cloud Computing - DC3X
 

More from vaibhav jindal

Ammeter&voltmeter
Ammeter&voltmeterAmmeter&voltmeter
Ammeter&voltmeter
vaibhav jindal
 
Hay's bridge phasor diagram draw
Hay's bridge phasor diagram drawHay's bridge phasor diagram draw
Hay's bridge phasor diagram draw
vaibhav jindal
 
Voltmeter
VoltmeterVoltmeter
Voltmeter
vaibhav jindal
 
Basics of Computer hardware and Software
Basics of Computer hardware and SoftwareBasics of Computer hardware and Software
Basics of Computer hardware and Software
vaibhav jindal
 
Layout design on MICROWIND
Layout design on MICROWINDLayout design on MICROWIND
Layout design on MICROWIND
vaibhav jindal
 
Circuit on bread board
Circuit on bread boardCircuit on bread board
Circuit on bread board
vaibhav jindal
 
Stability of Control System
Stability of Control SystemStability of Control System
Stability of Control System
vaibhav jindal
 
Basic Electronics components
Basic Electronics componentsBasic Electronics components
Basic Electronics components
vaibhav jindal
 
Vedic
VedicVedic
Project report of designing VCO
Project report of designing VCOProject report of designing VCO
Project report of designing VCOvaibhav jindal
 
Auto dial-er Home security
Auto dial-er Home securityAuto dial-er Home security
Auto dial-er Home securityvaibhav jindal
 
Gailtel
GailtelGailtel
Fabrication of passive elements
Fabrication of passive elementsFabrication of passive elements
Fabrication of passive elementsvaibhav jindal
 
design and analysis of voltage controlled oscillator
design and analysis of voltage controlled oscillatordesign and analysis of voltage controlled oscillator
design and analysis of voltage controlled oscillator
vaibhav jindal
 
Fabrication of passive elements
Fabrication of passive elementsFabrication of passive elements
Fabrication of passive elementsvaibhav jindal
 

More from vaibhav jindal (17)

Ammeter&voltmeter
Ammeter&voltmeterAmmeter&voltmeter
Ammeter&voltmeter
 
Hay's bridge phasor diagram draw
Hay's bridge phasor diagram drawHay's bridge phasor diagram draw
Hay's bridge phasor diagram draw
 
Voltmeter
VoltmeterVoltmeter
Voltmeter
 
Basics of Computer hardware and Software
Basics of Computer hardware and SoftwareBasics of Computer hardware and Software
Basics of Computer hardware and Software
 
Layout design on MICROWIND
Layout design on MICROWINDLayout design on MICROWIND
Layout design on MICROWIND
 
Circuit on bread board
Circuit on bread boardCircuit on bread board
Circuit on bread board
 
Stability of Control System
Stability of Control SystemStability of Control System
Stability of Control System
 
Basic Electronics components
Basic Electronics componentsBasic Electronics components
Basic Electronics components
 
Vedic
VedicVedic
Vedic
 
Project report of designing VCO
Project report of designing VCOProject report of designing VCO
Project report of designing VCO
 
Auto dial-er Home security
Auto dial-er Home securityAuto dial-er Home security
Auto dial-er Home security
 
Gailtel
GailtelGailtel
Gailtel
 
Ppt final (1)
Ppt final (1)Ppt final (1)
Ppt final (1)
 
Buffer op amplifier
Buffer op amplifierBuffer op amplifier
Buffer op amplifier
 
Fabrication of passive elements
Fabrication of passive elementsFabrication of passive elements
Fabrication of passive elements
 
design and analysis of voltage controlled oscillator
design and analysis of voltage controlled oscillatordesign and analysis of voltage controlled oscillator
design and analysis of voltage controlled oscillator
 
Fabrication of passive elements
Fabrication of passive elementsFabrication of passive elements
Fabrication of passive elements
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

Vaibhav (2)

  • 1. Network on Chip Structure and Design Methodologies1
  • 2. • Introduction • Network-on-Chip Architecture and Function Layers • Network-on-Chip Design Methodologies • Bidirectional Network-on-Chip (BiNoC) Architecture • Conclusion 2 Content
  • 3. •The next generation of multiprocessor system on chip (MPSoC) and chip multiprocessors (CMPs) will contain hundreds or thousands of cores. Such a many-core system requires high- performance interconnections to transfer data among the cores on the chip. 3 Abstract
  • 4. •As the density of VLSI design increases, the complexity of each component in a system raises rapidly. •Today’s SoC designers face a new challenge in the design of the on-chip interconnects beyond the evolution of an increasing number of processing elements 4 Introduction
  • 5. Why we need of it ?.. • Power efficient processors combined with hardware accelerators are the preferred choice for most designers to deliver the best trade off between performance and power consumption. • Hoc methods of selecting few blocks may work based on a designer’s experience, this may not work as today’s MPSoC and CMP designs which becomes more and more complex. 5 Content
  • 6. Network-on-Chip Architecture and Function Layers •A typical NoC architecture consists of multiple segments of wires and routers. •The NoC function can be classified into several layers: application, transport, network, data link, and physical layers. 6
  • 7. NI-Network Interface R-Routers 7 Typical NoC architecture in a mesh topology.
  • 8. • Application Layer: At the application layer, target applications will be broken down into a set of computation. • Transport Layer: Prevent buffer overflow and avoid traffic congestion. • Network Layer: Deal with the routing data between processing elements. • Data Link: Increase the reliability of the link up to a minimum required level. • Physical Layers: Transfer the data from node to node. 8 Network-on-Chip Function Layers
  • 9. 9 Typical NoC Router Architecture
  • 11. • Problem Description: Waist of Bandwidth • Example: 2*2 Two-Dimensional Mesh NOC 11 Bidirectional Network-on-Chip (BiNoC) Architecture
  • 12. • Channel Bandwidth Utilization: • Bandwidth Utilization Analysis of a conventional NOC router • NOC with Virtual Channel Control 12 Bidirectional Network-on-Chip (BiNoC) Architecture Cont.
  • 13. • NoC (BiNoC) backbone architecture, which can be easily integrated into most conventional NoC designs and successfully improve the NoC performance with a reasonable cost. 13 Conclusion
  • 14. • Hindawi Publishing Corporation Journal of Electrical and Computer Engineering Volume 2012, Article ID 509465 14 Reference