簡易檢索 / 詳目顯示

研究生: 陳昭逸
Chen, Chao-Yi
論文名稱: 適用於高速交換網路中避免串音干擾之平行位元填充演算法分析與設計
Design and Analysis of a Parallel Bit-Stuffing Algorithm for Crosstalk Avoidance in High-Speed Switching
指導教授: 張正尚
Chang, Cheng-Shang
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 通訊工程研究所
Communications Engineering
論文出版年: 2010
畢業學年度: 98
語文別: 中文
論文頁數: 35
中文關鍵詞: 匯流排編碼
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著雲端運算技術的崛起,高速交換網路的需求已變得不可或缺。但由於製程的演進以及線距的縮短,導線之間的串音干擾效應(crosstalk effect)已變得不可忽視,其中我們對於在傳輸中避免出現特定位元樣式(bit patterns),以達到降低串音干擾的匯流排編碼(bus encoding)感到興趣。

    出於對於高速交換網路設計的研究,我們的研究團隊在先前的論文中提出了漸序位元填充演算法(sequential bit stuffing algorithm)。此演算法可以對1組輸入資料位元串流產生禁制躍遷編碼(forbidden transition code)以減輕匯流排中鄰近兩訊號線之間的串音干擾。在這篇論文中,我們更進一步地提出了平行位元填充演算法(parallel bit stuffing algorithm)。平行位元填充演算法可以對一組有n條導線的匯流排且有n組平行輸入資料位元串流產生禁制躍遷編碼,進而減輕匯流排中的串音干擾。本文將介紹平行位元填充演算法理論分析以及實作設計兩部分,同時我們也說明如何將此演算法應用到禁制重疊編碼上(forbidden overlap code)。

    在理論方面,藉著馬可夫鏈分析,我們可以證明平行位元填充演算法的編碼率(coding rate)是81.25%,與目前文獻上所能達到最佳的編碼率,也就是漸序位元填充演算法所能達到的82.84%編碼率僅有不到2%的差距。然而,對於實現一組有n條導線的匯流排的平行位元填充演算法的複雜度僅為O(n),並且於平行位元填充演算法中,我們可以達到n組輸入資料位元串流的編碼器以及解碼器同時平行運作。這也是平行位元填充演算法比起漸序位元填充演算法更可以被規模化(scalable)的原因。

    在實做設計中,我們用元件可程式邏輯閘陣列(Field Programmable Gate Array,FPGA)來實現我們的平行位元填充演算法,在我們的設計中,我們不只將匯流排上的資料做禁制躍遷編碼,同時也說明了實作架構中,用簡單的組合邏輯(combinational logic)來產生輸入以及輸出佇列(queue)的控制訊號。

    在本文最後,我們說明如何將平行位元填充演算法應用到其禁制重疊編碼,而透過類似的分析及數值運算,我們可以得出使用平行位元填充演算法於禁制重疊編碼的編碼率為95.44%,此編碼率雖比應用在禁制躍遷編碼的編碼率高,但由於限制條件較為寬鬆,因此對於串音干擾的抑制也較為有限。


    Contents List of Figures 1 Introduction 2 The Parallel Bit-stuffing Algorithm 3 CodingRates 3.1 An Internal Even-numberedWire 3.2 The Last Boundary Wire when n is an Even Number 3.3 Performance Comparisons 4 Rate Balancing 5 Hardware Implementation 5.1 Block Diagrams of the Encoder/Decoder 5.2 FIFO Queues 5.3 2 ×2 Crossbar Switches 5.4 Bit-stuffing Encoder 5.5 Bit-removing Decoder 6 Extension to Forbidden Overlap Codes 7 Conclusion

    [1] P. P. Sotiriadis, “Interconnect modeling and optimization in deep submicron technologies,”
    Ph.D. Dissertation, Massachusetts Institute of Technology, Cambridge,
    MA, USA, 2002.
    [2] J. D. Z. Ma and L. He, “Formulae and applications of interconnect estimation considering
    shield insertion and net ordering,” in Proceedings IEEE/ACM International
    Conference on Computer-Aided Design (ICCAD’01), San Jose, CA, USA, November
    4–8, 2001, pp. 327–332.
    [3] B. Victor and K. Keutzer, “Bus encoding to prevent crosstalk delay,” in Proceedings
    IEEE/ACM International Conference on Computer-Aided Design (ICCAD’01), San
    Jose, CA, USA, November 4–8, 2001, pp. 57–63.
    [4] M. Mutyam, “Preventing crosstalk delay using Fibonacci representation,” in Proceedings
    17th International Conference on VLSI Design (VLSID’04), Mumbai, India,
    January 5–9, 2004, pp. 685–688.
    [5] S. R. Sridhara and N. R. Shanbhag, “Coding for reliable on-chip buses: a class of
    fundamental bounds and practical codes,” IEEE Transactions on Computer-Aided
    Design of Integrated Circuits and Systems, vol. 26, pp. 977–982, May 2007.
    [6] C. Duan, C. Zhu, and S. P. Khatri, “Forbidden transition free crosstalk avoidance
    CODEC design,” in Proceedings 45th Annual Design Automation Conference
    (DAC’08), Anaheim, CA, USA, June 8–13, 2008, pp. 986–991.
    [7] X. Wu and Z. Yan, “Efficient CODEC designs for crosstalk avoidance codes based on
    numeral systems,” to appear in IEEE Transactions on Very Large Scale Integration
    (VLSI) Systems.
    [8] C.-S. Chang, J. Cheng, T.-K. Huang, X.-C. Huang, and D.-S. Lee, “A bit-stuffing
    algorithm for crosstalk avoidance in high speed switching,” in Proceedings 29th IEEE
    Annual Conference on Computer Communications (INFOCOM’10), San Diego, CA,
    USA, March 14–19, 2010.
    [9] C. E. Shannon, “A mathematical theory of communication,” Bell System Technical
    Journal, vol. 27, pp. 379–423 (Part I), 623–656 (Part II), July, October 1948.
    [10] T. M. Cover and J. A. Thomas, Elements of Information Theory, New York, NY:
    John Wiley & Sons, 1991.
    [11] C.-S. Chang, D.-S. Lee and Y.-S. Jou, “Load balanced Birkhoff-von Neumann
    switches, part I: one-stage buffering,” Computer Communications, vol. 25, pp. 611–
    622, April 2002.
    [12] I. Keslassy, S.-T. Chuang, K. Yu, D. Miller, M. Horowitz, O. Solgaard, and N. McKeown,
    “Scaling internet routers using optics,” in Proceedings ACM SIGCOMM 2003
    Conference on Applications, Technologies, Architectures, and Protocols for Computer
    Communications (SIGCOMM’03), Karlsruhe, Germany, August 25–29, 2003,
    pp. 189–200.
    [13] Y. Shen, S. Jiang, S. S. Panwar, and H. J. Chao, “Byte-focal: a practical load balanced
    switch,” in Proceedings 2005 IEEE Workshop on High Performance Switching
    and Routing (HPSR’05), Hong Kong, P. R. China, May 12–14, 2005, pp. 6–12.
    [14] J. J. Jaramillo, F. Milan, and R. Srikant, “Padded frames: a novel algorithm for stable
    scheduling in load-balanced switches,” IEEE/ACM Transactions on Networking,
    vol. 16, pp. 1212–1225, October 2008.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE