nocs 2 0 0 8
play

NoCs 2 0 0 8 Zheng Shi and Alan Burns Real-time system group - PowerPoint PPT Presentation

Real-Time Communication Analysis for NoCs with Wormhole Switching NoCs 2 0 0 8 Zheng Shi and Alan Burns Real-time system group Department of computer science The University of York Outline 1 QoS in NoC 2 Priority based w orm hole sw


  1. Real-Time Communication Analysis for NoCs with Wormhole Switching NoCs 2 0 0 8 Zheng Shi and Alan Burns Real-time system group Department of computer science The University of York

  2. Outline 1 QoS in NoC 2 Priority based w orm hole sw itching 3 W orst case netw ork latency analysis 4 Conclusion LOGO Your site here

  3. Netw orks on Chip ( NoC) � On-chip Communication: � Point-to-Point � Bus � NoC: packet-switched, shared, optimized for communications � Resource efficiency � High scalability � IP reusability � High performance LOGO Your site here

  4. NoC needs QoS � Differentiated Service Requirement � Best Effort � Guaranteed Service � Performance parameters: latency, bandwidth, bounded jitter and loss probability, in- order data, etc. � Real-Time Service: � The correctness relies on not only the communication result but also the completion time bound (deadline). � For hard real-time service, it is necessary that all the packets must be delivered before their deadlines even under worst case scenario. LOGO Your site here

  5. Several Solutions � Contradiction : The network gives more efficiency and flexibility but introduces the unpredictable delay due to the contention. Real-time service, requires the timing to be predictable even under the worst case situation � Contention avoidable � Circuit Switching : aSoC � TDM : AEtheral, Nostrum � Contention acceptable � Priority based Wormhole Switching LOGO Your site here

  6. W orm hole Sw itching � Advantages (with Virtual Channels) � Small Buffer Size � High Throughput � Low Average Latency LOGO Your site here

  7. Priority Router Structure � There are sufficient VCs at each router � Each VC is assigned distinct global priority � Each flow also has distinct priority � Flow only requests the VC with same priority � At any time, only the flit with highest priority can access the output link � Flit-level priority preemption between different VCs LOGO Your site here

  8. System Model � Characterize traffic-flow � A traffic-flow is packet stream which traverses the same route from source to destination and requires the same grade of service. � Attribute � P : Priority � C : Basic network latency � T : Period for periodic flow or minimal interval for sporadic flow � D : Deadline R : Release Jitter J � � Interrelationship τ ∩ τ ≠ φ � Direct competing: ( ) ( ) Path Path i j = ∀ τ τ ∩ τ ≠ φ > direct interference set: D { | ( ) ( ) , } S Path Path P P i j i j j i � Indirect competing: τ ∩ τ ≠ φ τ ∩ τ ≠ φ τ ∩ τ = φ ( ) ( ) , ( ) ( ) , ( ) ( ) Path Path Path Path Path Path i j j k i k indirect interference set = ∀ τ τ ∩ τ ≠ φ τ ∩ τ ≠ φ τ ∩ τ = φ > > I { | ( ) ( ) , ( ) ( ) , ( ) ( ) , } S Path Path Path Path Path Path P P P i k i j j k i k k j i LOGO Your site here

  9. W orm hole Sw itching- A Case τ τ 1 3 τ 2 = φ = φ D I , Priority ordering: S S 1 1 > > P P P = τ = φ D I { }, S S 1 2 3 2 1 2 = τ = τ D I { }, { } S S 3 2 3 1 LOGO Your site here

  10. Characterize Netw ork Latency � Worst case network latency R : � The maximum length of time the packet could take to travel from source to destination R ≤ � The flow is schedulable if D � Basic network latency C : the network latency happens when there no traffic-flow contention exists. ⎡ ⎤ + L L = ⋅ + ⋅ max add ⎢ ⎥ / C f B Hop S size link ⎢ ⎥ f size LOGO Your site here

  11. Model and Assum ption � The physical communication links are treated as shared competition resource � At any time, only one traffic-flow is permitted to access the shared path � The packet moves ahead when gets highest priority along the path � The arrivals of higher priority flows are considered as preemption interference � The allowable service time for a flow is all the time interval at which no higher priority flow competes for the same physical link LOGO Your site here

  12. Netw ork Latency Evaluation( 1 ) � Worst Case Network Latency: = + R C I i i i R : worst case latency i I : maximum interference i the packets is supposed with maximum length and released at maximum rate ⎡ ⎤ + R R J ∑ = i j ⎢ ⎥ I C i j ⎢ ⎥ T ⎢ ⎥ ∀ ∈ D j S j i LOGO Your site here

  13. Netw ork Latency Evaluation( 2 ) � Worst case network latency equation ⎡ ⎤ + R ∑ R J = + ⎢ ⎥ i i R C C i i j ⎢ ⎥ T ⎢ ⎥ ∀ ∈ D j S j i The eqaution is solved using iterative technique ⎡ ⎤ + n R R J ∑ + = + n 1 ⎢ ⎥ i i R C C i i j ⎢ ⎥ T ⎢ ⎥ ∀ ∈ D j S j i = 0 Iterative starts with R C i i + 1 = and terminates when n n R R i i + 1 > n or which denotes the deadline miss for this flow. R D i i LOGO Your site here

  14. Consider I ndirect I nterference ( 1 ) � Minimal interval between subsequent preemption is less than period τ 1 T i τ 2 R i τ 3 � This could happen only when indirect interference is considered. LOGO Your site here

  15. Consider I ndirect I nterference ( 2 ) � Preemption interference upper bound T j T T T j j j R j τ j C R I J J j j j R i τ i ⎡ ⎤ + + − R R J R C ∑ = i j j j ⎢ ⎥ I C i j ⎢ ⎥ T ⎢ ⎥ ∀ ∈ D j S j i � Worst case latency ⎡ ⎤ + + − R R J R C ∑ = + i i j j ⎢ ⎥ R C C i i j ⎢ ⎥ T ⎢ ⎥ ∀ ∈ D j S j i LOGO Your site here

  16. Case Exam ple τ � Trafffic- C P T D For : there is no higher priority flow 1 τ Flow s = C = than , so 2 R 1 1 1 τ 2 1 6 6 1 τ τ � τ For : shares the physical link with 2 3 2 7 7 2 τ = τ = φ D I 2 { }, higher priority flow and S S 1 2 1 2 τ 3 3 13 13 = 0 3 R 3 2 τ ⎡ ⎤ 3 = + = � 1 suffers both direct and indirect 3 2 5 R ⎢ ⎥ 3 2 ⎢ ⎥ 6 = τ = τ D I { }, { } interference with S S 3 2 3 1 ⎡ ⎤ 5 = + = 2 3 2 5 R ⎢ ⎥ τ 2 ⎢ ⎥ 6 The interference jitter of referred to 2 τ − C = − = equals 5 3 2 R 3 2 2 So ⎡ ⎤ + − R R C = + 3 2 2 ⎢ ⎥ R C C 3 3 2 ⎢ ⎥ T 2 3 = 9 which stops at R LOGO Your site here

  17. Tightness of analysis ( 1 ) τ τ 1 2 τ 3 = φ = φ D I , S S Priority ordering: 1 1 > > = φ = φ P P P D I , S S 1 2 3 2 2 = τ τ = φ D I { , }, S S 3 1 2 3 LOGO Your site here

  18. Tightness of analysis ( 2 ) � Parallel Interference τ 1 τ 2 τ 3 � When parallel interference exists, the real worst case network latency is no more than the analysis result. � When parallel interference exists, finding worst case network latency is NP-hard (the proof details refers the paper). � Our analysis is safe but pessimistic. LOGO Your site here

  19. Conclusion � Real time communication service can be supported by priority based wormhole switching technique. � The schedulable test is derived by worst case network latency analysis. � Both direct and indirect interferences are taken into account. � When parallel interference exists, finding worst case network latency is NP-hard, but our analysis still form an upper bound. LOGO Your site here

  20. and Question Thank you…

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend