tsi
DESCRIPTION
Intercambiador de ranuras de tiempoTRANSCRIPT
![Page 1: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/1.jpg)
Chapter 2Circuit Switch Design Principles
IEG4020Telecommunication Switching and Network Systems
![Page 2: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/2.jpg)
Fig. 2.1. An N x N switch used to interconnect N inputsand N outputs
12
N
12
N
......
Inputs Outputs
2
Space-Domain Circuit Switching
![Page 3: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/3.jpg)
Fig. 2.2. Bar and cross states of 2 x 2 switching elements
Bar State Cross State
3
Strictly Nonblocking
![Page 4: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/4.jpg)
Fig. 2.3. (a) Crossbar switch
1
2
3
4
1 2 3 4
Inputs
Outputs
Connections:Input 1 to Output 3Input 2 to Output 4
4
Strictly Nonblocking
![Page 5: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/5.jpg)
Fig. 2.3. (b) banyan switch
Blocking: Input 2 cannot be connected to output 2 if input 1 is already connected to output 1
12
34
12
34
5
Blocking
![Page 6: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/6.jpg)
RNB RNB
WSNBWSNB
SNBSNB
RNB — Rearrangeably Nonblocking WSNB — Wide-sense NonblockingSNB — Strictly Nonblocking
6
Nonblocking Properties
![Page 7: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/7.jpg)
Fig. 2.4. (a) A 4 x 4 rearrangeably nonblocking switch
1
2
3
4
1
2
3
4
7
Rearrangeably Nonblocking
![Page 8: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/8.jpg)
Fig. 2.4. (b) a connection request from input 4 to output 1 is blocked
Fig. 2.4. (c) Same connection request can be satisfied by rearrangingthe existing connection from input 2 to output 2
1234
1234
Connection cannot be set up between input 4 and output 1
Connection can now be set up between input 4 and output 1
1234
1234
8
Rearrangements
![Page 9: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/9.jpg)
Two states corresponding to the same mapping :
1234
1234
1234
1234
Input 1 2 3 4Output 1 2 3 4
9
![Page 10: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/10.jpg)
Complexity of nonblocking switches :How to build large switch from smaller switches?
Problems with two-stage networks :
1
2
m
1
2
m
......
(a)
N = mn# lines = m2n
= mN
Bandwidth expansion factor = m
(b)
1
2
m
1
2
m
......
nn
10
![Page 11: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/11.jpg)
Fig. 2.5. (a) An example of one-to-one mapping from input to output
1.2.3.4.
. 1. 2. 3. 4
11
![Page 12: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/12.jpg)
Fig. 2.5. (b) Number of crosspoints needed for nonblocking switch
12
N
12
N
.
.
....
N! mappingsM crosspoints
2
2
# states # mappings
2 ! log ! log for large
M NM N
N NN
12
![Page 13: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/13.jpg)
Fig. 2.6. A three-stage clos switch architecture
13
Clos Switching Network
n1 × r2
n1 × r2
n1 × r2
r1 × r3
r1 × r3
r1 × r3
r2 × n3
r2 × n3
r2 × n3
...
...
...
...
...
...
(1)
(2)
(r1)
(1)
(2)
(r2)
(1)
(2)
(r3)
......
n1r1 = n3r3 = N for N × N switch
ri — # switch modules in column in1 — # inputs in column 1 modulen3 — # outputs in column 3 module
Necessary condition for nonblocking:
2 1 3,r n n
![Page 14: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/14.jpg)
Fig. 2.7. An example of blocking in a three-stage switch
Key:Find a commonly accessible middle node from both input and output nodes
A
F
G B
123456789
123456789
H
A request for connection from input 9 to output 4 is blockedSA = middle-stage nodes used by A = { F, G }SB = middle-stage nodes used by B = { H }
14
![Page 15: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/15.jpg)
Fig. 2.8. The connection matrix of the three-stage network
A B
F
G
H
F,G,H
21
A
r1
1 2 B r2
Stage 1 switch
Stage 3 switch
15
![Page 16: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/16.jpg)
Conditions of a Legitimate connection Matrix :
1
3
2 1
2 3
1. , number of symbols in row A
2. , number of symbols in row B
3. necessary condition for nonblocking property
4. Symbols
A A
B B
S n S
S n S
r nr n
2
in each row (column) must be distinct
,A BS S r
16
Fundamental Conditions
![Page 17: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/17.jpg)
1 3
1 3
1
3
Proof: Trivial case 1If 1Worst case: all other inputs of A and outputs of B are busy
1
1
A
B
: N n n n n N :
S n
nS
1 3
2 1 3
2 if 1 there is at least one available middle-stage no
A B A B A B
A B
S S S S S S
S S
n nr n n ,
de17
Condition for Strictly NonblockingClos network is strictly nonblocking iff
2 1 3min 1r n n ,N
![Page 18: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/18.jpg)
Rearrangeability allows condition to be reduced to
Rearrangement —— Substituting symbols in connection matrix such that
1.) Matrix remains legitimate
2.) An unused symbol in row A and column B can be found
18
Condition for Rearrangeably Nonblocking
2 1 3max ,r n n
![Page 19: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/19.jpg)
A 1
B 3
A 2
A 2
Proof: i) "Only if " part trivial ii) "if " part
S 1 S 1
a.) S an unused symbol
b.) S
B
B
nn
S r
S r
A A
2 3
B 2 1
S S
( 1) 1
S ( 1) 1
a symbol C in row A, not in column B a
B B B
A
S S S
r n
S r n
symbol D not in row A, but in column B
SB
‧D
SA
. C
19
Condition for Rearrangeably Nonblocking
![Page 20: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/20.jpg)
Fig. 2.9. (a) A chain of C and D originating from B
Fig. 2.9. (b) Physical connections corresponding to the chain
..
20
C
D
D
D
C
CA’
A
B’ B
A’’
A’”
B”
Connection between A and B is blocked
B
A
C SD S
2A BS S rChain terminates at A” because
AC S
A’
A”
A
A”’
..
..
..
..
B’
B
B”
..
..
..
C
D
..
..
..
A already connected to all middle-stage nodes except D
B already connected to all middle-stage nodes except C
Only links used by connections in the chain are shown
..
![Page 21: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/21.jpg)
Fig. 2.10. Illustration showing loops in chains are notpermitted in legitimate connection matrix
C D
C D
CD
A loop in the chain
D occurs twice in this column, making the matrix illegitimate (i.e. physically impossible in associated switch)
There should be two end points in a chain
21
![Page 22: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/22.jpg)
Fig. 2.11. (a) Rearrangement of the chain in Fig. 2.9.
Fig. 2.11. (b) Corresponding rearrangement of connections
C
C
C
C
D
DA’
A”AA”’
B’ B B”
D can now be put in entry (A, B)
A’
A”
A
A”’
..
..
..
..
..
B’
B
B”
..
..
..
..
C
D
..
..
..
22
![Page 23: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/23.jpg)
Fig. 2.12. (a) Two chains, one originates from B, one from A
Fig. 2.12. (b) Illustration that the two chains cannot be connected
D
D
C
C D
D C
D
C
......A
B
D
D
C
C DC
...
A
BThis column search ends in C, which is not possible
Start searching from B. Column search always looks for D
23
![Page 24: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/24.jpg)
How many rearrangements?o A new row/column is covered each time a point is
includedo (r1 + r3 – 2) other rows and columns
o At most (r1 + r3 – 1) rearrangements (loose)
o Basic: consider two chains, one originates from row A, one from column B Choose the shorter chain for rearrangement
o A composite move: a move in chain 1 with a move in chain 2 At most r1 – 2 moves before all rows exhausted
At most r3 – 2 moves before all columns exhausted
1 3Can do better: # rearrangements min( ) 1r , r
24
![Page 25: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/25.jpg)
Fig. 2.13. Recursive decomposition of a rearrangeably nonblocking network
2 x 2
2 x 2
2 x 2
2 x 2
2 x 2
2 x 2
..... ...
..
..
..
12
34
N-1N
12
34
N-1N
The x network is rearrangeably nonblocking if
the networks are rearrangeably nonblocking2 2
N NN N
25
2 2N N
2 2N N
Benes Switching Network
![Page 26: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/26.jpg)
Number of 2x2 elements in Benes Network :
-1
-2
-
2
Let 2 and # stages in x Benes Network, then
( ) ( ) 22
(2 ) (2 ) 2
(2 ) 4.
.
(2 ) 2 (2) 2( -1) 1 2( -1) 2 -1 2log
n
n n
n
n j
N f(k) k kN
f N f
ff
f
fjf n
nn 1N
26
Benes Network - Complexity
![Page 27: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/27.jpg)
Fig. 2.14. An 8x8 Benes Network
12
34
56
78
12
34
56
78
Baseline Network Reverse
Baseline Network
27
Benes Network - Structure
![Page 28: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/28.jpg)
Baseline Network
Reverse Baseline Network
28
Baseline and Reverse Baseline Networks
![Page 29: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/29.jpg)
Fig. 2.15. Illustration of a looping connection setup algorithm
12
34
56
78
12
34
56
78
Set up paths for input-output pairs :(1, 4), (2, 5), (3, 6), (4, 3)(5, 7), (6, 8), (7, 1), (8, 2)Central Algorithm: # steps = N logN
1 2 3 4 5 6 7 8inputoutput 4 5 6 3 7 8 1 2
29
Looping Algorithm
![Page 30: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/30.jpg)
1.) Unique path property of underlying baseline and reverse baseline networks
2.) Binary tree to middle-stage nodes An input can reach 2j-1 nodes at stage j, j <= log2N
3.) Reachability of nodes in baseline/reverse baseline networks: A node in stage i can be reached by 2i inputs and can reach 2n-j+1 outputs
4.) Middles nodes blocked by an existing path
30
Properties of Benes Network
![Page 31: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/31.jpg)
Fig. 2.16. Cantor network
.
.
.
..
..
..
..
..
..
.
.
.
1
2
N
1
2
N
m = 1
m = log N
..
31
Cantor Network
![Page 32: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/32.jpg)
Cantor Network is SNB :1.) Let m be # of Benes Network required2.) Worst case: all other N-1 inputs/outputs busy
→ there are (N-1) paths to middle nodes3.) One path meets the binary tree at stage 1
Two paths at stage 2
2log
1
Let the # paths meeting the binary trees at stage be
2 1
Check: 1
i
ii
N
ii
i A
A -
A N
32
Cantor Network – Strictly Nonblocking
An example of 8 x8 Benes network
Stage 1 Stage 2 …
![Page 33: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/33.jpg)
4.) A node in stage i blocks
2
1
log 1
21
2 middle nodes
# middle nodes(log 1)
eliminated 4
n ii
N
i ii
B
NA B N
2
2
# middle nodes eliminated# middle nodes >
by inputs and outputs
2 (log -1)2 4
log -1
Nm NN
m N
33
Cantor Network – Strictly Nonblocking
5.)
-2(e.g. 1, half the nodes or 2 nodes are blocked)ni
![Page 34: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/34.jpg)
Fig. 2.17. Binary tree extended from an input to all middle-stage nodes
12
34
56
78
12
34
56
78
Connection paths from inputs 1 and 2 intersect with binary tree from the first time in stage 2
If input 4 is connected to this link: a subtree is formed by the three subsequent nodes
Therefore the two lower middle-stage nodes are eliminated from connection by input 3
34
![Page 35: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/35.jpg)
2
Total number of middle1 2 ... 1 0
nodes blocked from inputs 4 8 4 2
(log 1)4
N N N N
NN
Number of paths Number of middle-stage nodes blocked
1 4
2 8
N
N
4 16N
... ...
35
# middle nodes blocked from inputs
![Page 36: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/36.jpg)
Fig. 2.18. Performing time-slot interchange using space-division switch
DEMUX
DEMUX
Space division switch
36
Time-Domain Switching
![Page 37: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/37.jpg)
Fig. 2.19. Direct time slot interchange using random access memory (switching in the time domain)
TSI
Write Read
abc
RAMSwitching in time domain
Write Address Sequence = a, b, c
Read Address Sequence = b, a, c
37
Time-Domain Switching
![Page 38: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/38.jpg)
Example: memory access time 1 rate 1.5Mbps 24 Each data source is 64 kbps One byte per time-slot
24 x 64,000 bps Arrival rate =
8 bits/time-slot =192,000 time-slots/s
TN
ec A read and a write required per time-slot
1 memory access time 2.6
2 x 192,000s
38
Example for Time-Domain Switching
![Page 39: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/39.jpg)
Fig. 2.20. A time-space-time switch
TSI
TSI
TSI
r x r
TSI
TSI
TSI
......
n m m n
n, m : number of time slots per frame at various points
39
Time-Space-Time Switching
![Page 40: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/40.jpg)
Fig. 2.25 A time-space time switch
C(1,3) B(1,2) A(1,1)
F(2,3) E(2,2) D(2,1)
L(3,3) H(3,2) G(3,1)
3 x 3
TSI
TSI
TSI
TSI
TSI
TSI
1
3
3
3 2
1 1
22
Frame
Targeted Outputs
( i, j ) — data on input i at time-slot j
40
Time-Space-Time Switching
![Page 41: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/41.jpg)
Fig. 2.21. Equivalent of time-space-time switching and three-stage space switching
MUX
MUX
MUX
TSI
TSI
TSI
TSI
TSI
TSI
MUX
MUX
MUX
(1)
(2)
(3)
(1)
(2)
(3)
A(1,1)
D(2,1)
C(1,3)B(1,2)
F(2,3)E(2,2)
L(3,3)H(3,2)G(3,1)
A(1,1)
D(2,1)
C(1,3)
B(1,2)F(2,3)
E(2,2)
L(3,3)H(3,2)
G(3,1)
CBA
FED
LHG
BAC
EDF
HGL
EDC
HAL
BGF
CED
LHA
GBF
41
Time-Space-Time Switching
![Page 42: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/42.jpg)
Fig. 2.21. Input-output mapping changes from slot to slot inspace-division switch in time-space-time switching
C(1,3)B(1,2) A(1,1)
F(2,3)E(2,2) D(2,1)
L(3,3)H(3,2) G(3,1)
3 x 3
C(1,3)E(2,2) D(2,1)
L(3,3)H(3,2) A(1,1)
F(2,3)B(1,2) G(3,1)
( i, j ) — data on input i at time slot j
Time Slot 1 Time Slot 2 Time Slot 3
42
![Page 43: TSI](https://reader035.vdocuments.us/reader035/viewer/2022070419/55cf9004550346703ba257ee/html5/thumbnails/43.jpg)
Fig. 2.22. Equivalent of time-space-time switching and three-stage space switching
These lines correspond to time slot 1
(1) (1) (1)
(2) (2) (2)
(3) (3) (3)
Module (i) correspondsto input TSI (i) intime-space-time switch
Module (i) correspondsto time slot i ofspace-division switch intime-space-time switch
Module (i) correspondsto output TSI (i) intime-space-time switch
A(1,1)
D(2,1)C(1,3)B(1,2)
F(2,3)E(2,2)
L(3,3)H(3,2)G(3,1)
A(1,1)
D(2,1)
C(1,3)
B(1,2)F(2,3)
E(2,2)
L(3,3)H(3,2)
G(3,1)
43~END~