SlideShare a Scribd company logo
• Each packet in a message is divided into flits (flow control digits)
• Size of a flit is at least log2 N in an N-processor multicomputer.
• Header flit governs the route, remaining flits follow in a pipeline fashion
• Channels in the path are reserved till the last flit in the packet traverses the channel.
• Each channel has enough storage to buffer only a few flits.
Advantages:
Lower Latency
Small flit Buffer at nodes
Channel can be shared by many
packets by Virtual channels
Disadvantages:
Deadlock
Solution :
Allow preemption of packets involved
in Deadlock & Reroute/discard
preempted packets.
Use deadlock free routing
Wormhole Routing
Handshaking and Latency
Adjacent nodes communicate requests and
acknowledgements using a one-bit ready/request (R/A)
line.
• When a receiver is ready, the R/A line low.
• When the sender is ready, R/A line is high &
next flit transmitted; the line is left high.
• After the receiver is done with the flit, R/A line is
lowered to indicate its ready to accept another flit.
The cycle repeats for transmission of other flits.
Latency:
• Store and forward latency is L/W (D+1),
• Wormhole latency is L/W + F/W D.
where
D = No. of intermediate nodes b/w source & destination
L = packet length (in bits)
F = flit length (in bits)
W = the channel bandwidth (in bits/sec)
F<<D, hence D has no significant effect on latency in
wormhole systems
Virtual Channels
 The channels between nodes in a wormhole-routed multicomputer are shared by many possible
source and destination pairs.
 A “virtual channel” is a pair of flit buffers (in nodes) connected by a shared physical channel.
 The physical channel is “time shared” by all the virtual channels.
 Other resources (including the R/A line) must be replicated for each of the virtual channels.
Deadl0ck Solutions:
Use deadlock free routing eg. TURN Model
Basis:
Analyze directions in which packets can turn in the network
Determine the cycles that such turns can form
Prohibit just enough turns to break all cycle
Resulting routing algorithms are:
Deadlock and livelock free
Minimal/Non-minimal
Highly Adaptive.
Ref: The Turn Model for Adaptive Routing by Christopher J. Glass and Lionel M. Ni

More Related Content

What's hot

Data link layer
Data link layerData link layer
Data link layer
dhanashrisabale1
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)
ZillayHuma Mehmood
 
Congestion control
Congestion controlCongestion control
Congestion control
Noushad Hasan
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
KalpanaC14
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
Siddique Ibrahim
 
Flow control in Computer Network
Flow control in Computer NetworkFlow control in Computer Network
Flow control in Computer Network
Ahtesham Ullah khan
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
meenamunesh
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
Threads .ppt
Threads .pptThreads .ppt
Threads .ppt
meet darji
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
Khushboo Pal
 
Cache memory
Cache memoryCache memory
Cache memory
Shailesh Tanwar
 
Data link layer
Data link layerData link layer
Data link layer
Hassanein Alwan
 
Slide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNsSlide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNs
Quang Do
 
Asynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer networkAsynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer network
MH Shihab
 
Framing
FramingFraming
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
ShouvikDhali
 
Congestion control
Congestion controlCongestion control
Congestion control
Nithin Raj
 

What's hot (20)

Data link layer
Data link layerData link layer
Data link layer
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Mk ppt chapter 5
Mk ppt chapter 5Mk ppt chapter 5
Mk ppt chapter 5
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
Transport layer
Transport layerTransport layer
Transport layer
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Flow control in Computer Network
Flow control in Computer NetworkFlow control in Computer Network
Flow control in Computer Network
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Threads .ppt
Threads .pptThreads .ppt
Threads .ppt
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
Cache memory
Cache memoryCache memory
Cache memory
 
Data link layer
Data link layerData link layer
Data link layer
 
Slide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNsSlide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNs
 
Asynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer networkAsynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer network
 
Framing
FramingFraming
Framing
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
 
Congestion control
Congestion controlCongestion control
Congestion control
 

Viewers also liked

Wipro
WiproWipro
WiproRS P
 
microsoft analysis
microsoft analysismicrosoft analysis
microsoft analysis
syedaaqsa512
 
Ibm ppt final (nilesah tadha)
Ibm ppt final (nilesah tadha)Ibm ppt final (nilesah tadha)
Ibm ppt final (nilesah tadha)nnpatel7391
 
WIPRO PRESENTATION
WIPRO PRESENTATIONWIPRO PRESENTATION
WIPRO PRESENTATION
Sunil G R
 
Microsoft company
Microsoft companyMicrosoft company
Microsoft company
ihab tarek
 
ppt IT industry
ppt IT industryppt IT industry
ppt IT industryYash Joshi
 
Wipro
WiproWipro
Microsoft company
Microsoft company Microsoft company
Microsoft company
Muhammad Imaaduddin
 
Renaissance
RenaissanceRenaissance
Renaissance
Arjun Tomar
 
Ibm company prsenation
Ibm company prsenationIbm company prsenation
Ibm company prsenationSana Khan
 
Microsoft corporation
Microsoft corporationMicrosoft corporation
Microsoft corporation
Thomas Liquori
 
Nokia's downfall
Nokia's downfallNokia's downfall
Nokia's downfallnooramingad
 
The history of microsoft
The history of microsoftThe history of microsoft
The history of microsoft
Jo Patrick Mabelin
 
Information technology industry of india
Information technology industry of indiaInformation technology industry of india
Information technology industry of india
Ajay Kumar
 

Viewers also liked (20)

Wipro
WiproWipro
Wipro
 
Wipro
WiproWipro
Wipro
 
microsoft analysis
microsoft analysismicrosoft analysis
microsoft analysis
 
microsoft company
microsoft companymicrosoft company
microsoft company
 
Ibm ppt final (nilesah tadha)
Ibm ppt final (nilesah tadha)Ibm ppt final (nilesah tadha)
Ibm ppt final (nilesah tadha)
 
WIPRO PRESENTATION
WIPRO PRESENTATIONWIPRO PRESENTATION
WIPRO PRESENTATION
 
Microsoft company
Microsoft companyMicrosoft company
Microsoft company
 
Microsoft corporation
Microsoft corporationMicrosoft corporation
Microsoft corporation
 
ppt IT industry
ppt IT industryppt IT industry
ppt IT industry
 
Wipro
WiproWipro
Wipro
 
Microsoft company
Microsoft company Microsoft company
Microsoft company
 
Renaissance
RenaissanceRenaissance
Renaissance
 
Azim premji
Azim premjiAzim premji
Azim premji
 
Ibm company prsenation
Ibm company prsenationIbm company prsenation
Ibm company prsenation
 
Microsoft corporation
Microsoft corporationMicrosoft corporation
Microsoft corporation
 
Nokia's downfall
Nokia's downfallNokia's downfall
Nokia's downfall
 
Ibm co -yang han
Ibm co -yang hanIbm co -yang han
Ibm co -yang han
 
The history of microsoft
The history of microsoftThe history of microsoft
The history of microsoft
 
IT Industry in India
IT Industry in IndiaIT Industry in India
IT Industry in India
 
Information technology industry of india
Information technology industry of indiaInformation technology industry of india
Information technology industry of india
 

Similar to Warmhole routing ppt

Wormhole switching : Notes
Wormhole switching : NotesWormhole switching : Notes
Wormhole switching : Notes
Subhajit Sahu
 
Dcn lecture 3
Dcn lecture 3Dcn lecture 3
Dcn lecture 3
mahpara saaleem
 
Lec - 1_Chapter_1.ppt
Lec - 1_Chapter_1.pptLec - 1_Chapter_1.ppt
Lec - 1_Chapter_1.ppt
sirishavipparthi
 
Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02
arifur rahman
 
multipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdfmultipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdf
GauravWankar2
 
Medium range protocol and multiple access
Medium range protocol and multiple accessMedium range protocol and multiple access
Medium range protocol and multiple access
sushmitjivtode4
 
Lec 4 and_5
Lec 4 and_5Lec 4 and_5
Lec 4 and_5
hz3012
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
Priya Kaushal
 
3_pstn2.ppt
3_pstn2.ppt3_pstn2.ppt
3_pstn2.ppt
usmanEhsan8
 
Progress seminar
Progress seminarProgress seminar
Progress seminarBarnali Dey
 
3- Lec 3 - Packet-Circuit Switching.pptx
3-  Lec 3  - Packet-Circuit Switching.pptx3-  Lec 3  - Packet-Circuit Switching.pptx
3- Lec 3 - Packet-Circuit Switching.pptx
ShahdAbdElsamea2
 
Introduction to multiplexing, packet switching.pptx
Introduction to multiplexing, packet switching.pptxIntroduction to multiplexing, packet switching.pptx
Introduction to multiplexing, packet switching.pptx
namrata110808
 
Sonet fall2011
Sonet fall2011Sonet fall2011
Sonet fall2011
kongara
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
sazia7
 
Chapter10 switching
Chapter10 switchingChapter10 switching
Chapter10 switching
Suneel Varma
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
SushmaShivani
 

Similar to Warmhole routing ppt (20)

Wormhole switching : Notes
Wormhole switching : NotesWormhole switching : Notes
Wormhole switching : Notes
 
Dcn lecture 3
Dcn lecture 3Dcn lecture 3
Dcn lecture 3
 
Lec - 1_Chapter_1.ppt
Lec - 1_Chapter_1.pptLec - 1_Chapter_1.ppt
Lec - 1_Chapter_1.ppt
 
Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02Multipleaccessprotocol 140213082552-phpapp02
Multipleaccessprotocol 140213082552-phpapp02
 
multipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdfmultipleaccessprotocol-140213082552-phpapp02.pdf
multipleaccessprotocol-140213082552-phpapp02.pdf
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Week3.1
Week3.1Week3.1
Week3.1
 
Topic5
Topic5Topic5
Topic5
 
Medium range protocol and multiple access
Medium range protocol and multiple accessMedium range protocol and multiple access
Medium range protocol and multiple access
 
Lec 4 and_5
Lec 4 and_5Lec 4 and_5
Lec 4 and_5
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 
3_pstn2.ppt
3_pstn2.ppt3_pstn2.ppt
3_pstn2.ppt
 
Progress seminar
Progress seminarProgress seminar
Progress seminar
 
3- Lec 3 - Packet-Circuit Switching.pptx
3-  Lec 3  - Packet-Circuit Switching.pptx3-  Lec 3  - Packet-Circuit Switching.pptx
3- Lec 3 - Packet-Circuit Switching.pptx
 
Gprs
GprsGprs
Gprs
 
Introduction to multiplexing, packet switching.pptx
Introduction to multiplexing, packet switching.pptxIntroduction to multiplexing, packet switching.pptx
Introduction to multiplexing, packet switching.pptx
 
Sonet fall2011
Sonet fall2011Sonet fall2011
Sonet fall2011
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
 
Chapter10 switching
Chapter10 switchingChapter10 switching
Chapter10 switching
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
 

More from Meenakshi Tripathi

Cryptoppt
CryptopptCryptoppt
Thorup zwick compactrouting scheme
Thorup zwick compactrouting schemeThorup zwick compactrouting scheme
Thorup zwick compactrouting scheme
Meenakshi Tripathi
 
Cowen2006 vrsn1
Cowen2006 vrsn1Cowen2006 vrsn1
Cowen2006 vrsn1
Meenakshi Tripathi
 
Compact routing peleg paper
Compact routing peleg paperCompact routing peleg paper
Compact routing peleg paper
Meenakshi Tripathi
 
Linear programming ppt
Linear programming pptLinear programming ppt
Linear programming ppt
Meenakshi Tripathi
 
Internet hyperbolic mapping paper by Krioukov
Internet hyperbolic mapping paper by KrioukovInternet hyperbolic mapping paper by Krioukov
Internet hyperbolic mapping paper by KrioukovMeenakshi Tripathi
 

More from Meenakshi Tripathi (7)

Cryptoppt
CryptopptCryptoppt
Cryptoppt
 
Compactrouting
CompactroutingCompactrouting
Compactrouting
 
Thorup zwick compactrouting scheme
Thorup zwick compactrouting schemeThorup zwick compactrouting scheme
Thorup zwick compactrouting scheme
 
Cowen2006 vrsn1
Cowen2006 vrsn1Cowen2006 vrsn1
Cowen2006 vrsn1
 
Compact routing peleg paper
Compact routing peleg paperCompact routing peleg paper
Compact routing peleg paper
 
Linear programming ppt
Linear programming pptLinear programming ppt
Linear programming ppt
 
Internet hyperbolic mapping paper by Krioukov
Internet hyperbolic mapping paper by KrioukovInternet hyperbolic mapping paper by Krioukov
Internet hyperbolic mapping paper by Krioukov
 

Warmhole routing ppt

  • 1. • Each packet in a message is divided into flits (flow control digits) • Size of a flit is at least log2 N in an N-processor multicomputer. • Header flit governs the route, remaining flits follow in a pipeline fashion • Channels in the path are reserved till the last flit in the packet traverses the channel. • Each channel has enough storage to buffer only a few flits. Advantages: Lower Latency Small flit Buffer at nodes Channel can be shared by many packets by Virtual channels Disadvantages: Deadlock Solution : Allow preemption of packets involved in Deadlock & Reroute/discard preempted packets. Use deadlock free routing Wormhole Routing
  • 2. Handshaking and Latency Adjacent nodes communicate requests and acknowledgements using a one-bit ready/request (R/A) line. • When a receiver is ready, the R/A line low. • When the sender is ready, R/A line is high & next flit transmitted; the line is left high. • After the receiver is done with the flit, R/A line is lowered to indicate its ready to accept another flit. The cycle repeats for transmission of other flits. Latency: • Store and forward latency is L/W (D+1), • Wormhole latency is L/W + F/W D. where D = No. of intermediate nodes b/w source & destination L = packet length (in bits) F = flit length (in bits) W = the channel bandwidth (in bits/sec) F<<D, hence D has no significant effect on latency in wormhole systems
  • 3. Virtual Channels  The channels between nodes in a wormhole-routed multicomputer are shared by many possible source and destination pairs.  A “virtual channel” is a pair of flit buffers (in nodes) connected by a shared physical channel.  The physical channel is “time shared” by all the virtual channels.  Other resources (including the R/A line) must be replicated for each of the virtual channels. Deadl0ck Solutions: Use deadlock free routing eg. TURN Model Basis: Analyze directions in which packets can turn in the network Determine the cycles that such turns can form Prohibit just enough turns to break all cycle Resulting routing algorithms are: Deadlock and livelock free Minimal/Non-minimal Highly Adaptive. Ref: The Turn Model for Adaptive Routing by Christopher J. Glass and Lionel M. Ni