Accelerating Network Coding on Graphics Processors

2014 ◽  
Vol 513-517 ◽  
pp. 1573-1576
Author(s):  
Xiao Hui Pan

Network coding has recently been widely applied in various distributed systems for throughput improvement and/or resilience to network dynamics. However, the computational overhead introduced by network coding operations is not negligible and has become the obstacle for practical deployment of network coding. In this paper, I exploit the computing power of commodity many-core Graphic Processing Units (GPUs) and multi-core CPUs to accelerate the network coding computation. With the implementation of the algorithms, significant encoding and decoding throughput can be achieved.

2009 ◽  
Vol 4 (11) ◽  
Author(s):  
Xiaowen Chu ◽  
Kaiyong Zhao ◽  
Mea Wang
Keyword(s):  

Electronics ◽  
2021 ◽  
Vol 10 (3) ◽  
pp. 238
Author(s):  
Sadia Moriam ◽  
Elke Franz ◽  
Paul Walther ◽  
Akash Kumar ◽  
Thorsten Strufe ◽  
...  

Many-core system-on-chips, together with their established communication infrastructures, Networks-on-Chip (NoC), are growing in complexity, which encourages the integration of third-party components to simplify and accelerate production processes. However, this also adversely exposes the surface for attacks through the injection of hardware Trojans. This work addresses active attacks on NoCs and focuses on the integrity and availability of transmitted data. In particular, we consider the modification and/or dropping of data during transmission as active attacks that might be performed by malicious routers. To mitigate the impact of such active attacks, we propose two lightweight solutions that respect the performance constraints of NoCs. Assuming the presence of symmetric keys, these approaches combine lightweight authentication codes for integrity protection with network coding for increased efficiency and robustness. The proposed solutions prevent undetected modifications and significantly increase availability through a reliable detection of attacks. The efficiency of these solutions is investigated in different scenarios using cycle-accurate simulations and the area overhead is analyzed relative to state-of-the-art many-core system. The results demonstrate that one authentication scheme with network coding protects the integrity of data to a low residual error of 1.36% at 0.2 attack probability with an area overhead of 2.68%. For faster and more flexible evaluation, an analytical approach is developed which is validated against the cycle-accurate simulations. The analytical approach is more than 1000× faster while having a maximum estimation error of 5%. Moreover, the analytical model provides a deeper insight into the system’s behavior. For example, it reveals which factors influence the performance parameters.


2013 ◽  
Vol 39 (2) ◽  
pp. 79-93 ◽  
Author(s):  
Abhinav Sarje ◽  
Srinivas Aluru

Sign in / Sign up

Export Citation Format

Share Document