2003
DOI: 10.1109/tpds.2003.1225056
|View full text |Cite
|
Sign up to set email alerts
|

Fc3d: flow control-based distributed deadlock detection mechanism for true fully adaptive routing in wormhole networks

Abstract: Two general approaches have been proposed for deadlock handling in wormhole networks. Traditionally, deadlockavoidance strategies have been used. In this case, either routing is restricted so that there are no cyclic dependencies between channels or cyclic dependencies between channels are allowed provided that there are some escape paths to avoid deadlock. More recently, deadlock recovery strategies have begun to gain acceptance. These strategies allow the use of unrestricted fully adaptive routing, usually o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2004
2004
2013
2013

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 23 publications
0
13
0
Order By: Relevance
“…This section presents simulation results of the proposed schemes and the scheme in [8] which is considered, to our knowledge, as most efficient in reducing the number of false deadlock detections. The simulations are run on 16x16 and 8x8x8 mesh and torus networks.…”
Section: Performancementioning
confidence: 99%
See 4 more Smart Citations
“…This section presents simulation results of the proposed schemes and the scheme in [8] which is considered, to our knowledge, as most efficient in reducing the number of false deadlock detections. The simulations are run on 16x16 and 8x8x8 mesh and torus networks.…”
Section: Performancementioning
confidence: 99%
“…Although these schemes can detect all deadlocks, they may misinterpret simply-congested packets as deadlocked. A more sophisticated method to determine deadlock was proposed in [8], which, to our knowledge, performs best in detecting deadlocks accurately. It notices a sequence of blocked packets as a tree whose root is a packet that is advancing.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations