Analysis of true fully adaptive routing with software-based deadlock recovery

A. Khonsari, H. Sarbazi-Azad, M. Ould-Khaoua

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

Several analytical models of fully adaptive routing (AR) in wormhole-routed networks have recently been reported in the literature. All these models, however, have been discussed for routing algorithms with deadlock avoidance. Recent studies have revealed that deadlocks are quite rare in the network, especially when enough routing freedom is provided. Thus the hardware resources, e.g. virtual channels, dedicated for deadlock avoidance are not utilised most of the time. This consideration has motivated researchers to introduce fully adaptive routing algorithms with deadlock recovery. This paper describes a new analytical model of a true fully AR algorithm with software-based deadlock recovery, proposed in Martinez et al. (Software-based deadlock recovery techniques for true fully AR in wormhole networks, Proc. Int. Conf. Parallel Processing (ICPP'97), 1997, p. 182) for k-ary n-cubes. The proposed model uses the results from queueing systems with impatient customers to capture the effects of the timeout mechanism used in this routing algorithm for deadlock detection. Results obtained through simulation experiments confirm that the model predicts message latency with a good degree of accuracy under different working conditions.

Original languageEnglish
Pages (from-to)259-270
Number of pages12
JournalThe Journal of Systems and Software
Volume71
Issue number3
DOIs
Publication statusPublished - May 2004

Keywords

  • Interconnection networks
  • k-ary n-cube
  • Message latency
  • Multicomputers
  • Parallel architectures
  • Performance analysis
  • Performance modelling
  • Routing algorithm

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems
  • Software

Fingerprint Dive into the research topics of 'Analysis of true fully adaptive routing with software-based deadlock recovery'. Together they form a unique fingerprint.

  • Cite this