Adaptive-trail routing and performance evaluation in irregular networks using cut-through switches

Wenjian Qiao*, Lionel M. Ni, Tomas Rokicki

*Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

18 Citations (Scopus)

Abstract

Cut-through switching promises low latency delivery and has been used in new generation switches, especially in high speed networks demanding low communication latency. The interconnection of cut-through switches provides an excellent network platform for high speed local area networks (LANs). For cost and performance reasons, irregular topologies should be supported in such a switch-based network. Switched irregular networks are truly incrementally scalable and have potential to be reconfigured to adapt to the dynamics of network traffic conditions. Due to the arbitrary topologies of networks, it is critical to develop an efficient deadlock-free routing algorithm. A novel deadlock-free adaptive routing algorithm called adaptive-trail routing is proposed to allow irregular interconnection of cut-through switches. The adaptive routing algorithm is based on two unidirectional adaptive trails constructed from two opposite unidirectional Eulerian trails. Some heuristics are suggested in terms of the selection of Eulerian trails, the avoidance of long routing paths, and the degree of adaptivity. Extensive simulation experiments are conducted to evaluate the performance of the proposed and two other routing algorithms under different topologies and traffic workloads.

Original languageEnglish
Pages (from-to)1138-1158
Number of pages21
JournalIEEE Transactions on Parallel and Distributed Systems
Volume10
Issue number11
DOIs
Publication statusPublished - 1999
Externally publishedYes

Keywords

  • Adaptive routing
  • Cut-through switches
  • Deadlock-free routing
  • Incremental scalability
  • Irregular networks
  • Performance evaluation

Fingerprint

Dive into the research topics of 'Adaptive-trail routing and performance evaluation in irregular networks using cut-through switches'. Together they form a unique fingerprint.

Cite this