This document discusses wormhole routing in multicomputers. In wormhole routing, packets are divided into fixed-size units called flits. The header flit determines the route and reserves channels as subsequent flits follow in a pipeline. Each channel can buffer only a few flits. Wormhole routing has lower latency than store-and-forward but can cause deadlock. Deadlock is addressed through preemption and rerouting of blocked packets or using deadlock-free routing algorithms like the turn model. Virtual channels allow sharing of physical channels among packets through time-division multiplexing of flit buffers.
ATM is a packet-oriented transfer mode. It allows multiple logical connections to be multiplexed over a single physical interface. The information flow on each logical connection is organized into fixed-size packets, called cells. As with frame relay, there is no link-by-link error control or flow control.
The sender initializes the checksum to 0 and adds all data items and the checksum. However, 36 cannot be expressed in 4 bits. The extra two bits are wrapped and added with the sum to create the wrapped sum value 6. The sum is then complemented, resulting in the checksum value 9 (15 − 6 = 9).
ATM is a packet-oriented transfer mode. It allows multiple logical connections to be multiplexed over a single physical interface. The information flow on each logical connection is organized into fixed-size packets, called cells. As with frame relay, there is no link-by-link error control or flow control.
The sender initializes the checksum to 0 and adds all data items and the checksum. However, 36 cannot be expressed in 4 bits. The extra two bits are wrapped and added with the sum to create the wrapped sum value 6. The sum is then complemented, resulting in the checksum value 9 (15 − 6 = 9).
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking.Carrier-sense multiple access with collision detection is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting.
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking.Carrier-sense multiple access with collision detection is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting.
intoduction
description
History overview
Products
sales, Distribution, marketing
CEO,s
distributors and Resellers
online
SWOT Analysis
strength and weakness
Threat and opportunities
description of microsoft :global computer technology corporation
headquarters in Redmond Washington
Employs 90% & -60% work in U.S
world’s #1 software company
History of microsoft:Company founded by Bill gates and paul Allen on April 4, 1975
window 3.0 is a success
Continued success for Microsoft
Gates awarded national medal of technology
products:
computers, windows , windows phone, xbox, office , office for apps..
Wipro helps customers do business better by leveraging our industry-wide experience, deep technology expertise, comprehensive portfolio of services and vertically aligned business model.
Wipro also gives high importance to Human Resource Management. The company is India’s 6th top employer. But the company is not even in the top 20 best employers of the country while their competitors like TCS, Infosys etc. are always in the top ten . Therefore it can be judged that the HR functions in the company need to be thoroughly reviewed.Wipro also gives high importance to Human Resource Management. The company is India’s 6th top employer. But the company is not even in the top 20 best employers of the country while their competitors like TCS, Infosys etc. are always in the top ten . Therefore it can be judged that the HR functions in the company need to be thoroughly reviewed.
A brief description of Europe during Renaissance. It tells about main causes, main features, Age of Discovery, New Explorers and Symbols of Renaissance.
This paper Microsoft Corporation was written for my Strategic Management class (TM583) back in the Sping of June 2011. The objective of the project was to come up with a comprehensive strategic business plan for a new or existing company. The Microsoft project covers seven course objectives which include, Microsoft's strategy, Microsoft's core competencies, Microsoft's industry dynamics, Microsoft's technology sourcing and internal innovations, Microsoft's product development strategy, Microsoft's strategy to protect innovations, and a Microsoft's project bibliography. Unfortunately, there is no Power Point associated with this project either, but it would have been a great project to make one for this topic.
Highlighted notes while studying Advanced Computer Networks:
Wormhole switching
Source: Wikipedia
Wormhole flow control, also called wormhole switching or wormhole routing, is a system of simple flow control in computer
networking based on known fixed links. It is a subset of flow control methods called Flit-Buffer Flow Control.
Wikipedia is a free online encyclopedia, created and edited by volunteers around the world and hosted by the Wikimedia Foundation.
1. • Each packet in a message is divided into flits (flow control digits)
• Size of a flit is at least log2 N in an N-processor multicomputer.
• Header flit governs the route, remaining flits follow in a pipeline fashion
• Channels in the path are reserved till the last flit in the packet traverses the channel.
• Each channel has enough storage to buffer only a few flits.
Advantages:
Lower Latency
Small flit Buffer at nodes
Channel can be shared by many
packets by Virtual channels
Disadvantages:
Deadlock
Solution :
Allow preemption of packets involved
in Deadlock & Reroute/discard
preempted packets.
Use deadlock free routing
Wormhole Routing
2. Handshaking and Latency
Adjacent nodes communicate requests and
acknowledgements using a one-bit ready/request (R/A)
line.
• When a receiver is ready, the R/A line low.
• When the sender is ready, R/A line is high &
next flit transmitted; the line is left high.
• After the receiver is done with the flit, R/A line is
lowered to indicate its ready to accept another flit.
The cycle repeats for transmission of other flits.
Latency:
• Store and forward latency is L/W (D+1),
• Wormhole latency is L/W + F/W D.
where
D = No. of intermediate nodes b/w source & destination
L = packet length (in bits)
F = flit length (in bits)
W = the channel bandwidth (in bits/sec)
F<<D, hence D has no significant effect on latency in
wormhole systems
3. Virtual Channels
The channels between nodes in a wormhole-routed multicomputer are shared by many possible
source and destination pairs.
A “virtual channel” is a pair of flit buffers (in nodes) connected by a shared physical channel.
The physical channel is “time shared” by all the virtual channels.
Other resources (including the R/A line) must be replicated for each of the virtual channels.
Deadl0ck Solutions:
Use deadlock free routing eg. TURN Model
Basis:
Analyze directions in which packets can turn in the network
Determine the cycles that such turns can form
Prohibit just enough turns to break all cycle
Resulting routing algorithms are:
Deadlock and livelock free
Minimal/Non-minimal
Highly Adaptive.
Ref: The Turn Model for Adaptive Routing by Christopher J. Glass and Lionel M. Ni