Exploiting last idle periods of links for network power management

F. Li, G. Chen, M. Kandemir, M. Karakoy

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Network power optimization is becoming increasingly important as the sizes of the data manipulated by parallel applications and the complexity of inter-processor data communications are continuously increasing. Several hardware-based schemes have been proposed in the past for reducing network power consumption, either by turning off unused communication links or by lowering voltage/frequency in links with low usage. While the prior research shows that these schemes can be effective in certain cases, they share the common drawback of not being able to predict the link active and idle times very accurately. This paper, instead, proposes a compiler-based scheme that determines the last use of communication links at each loop nest and inserts explicit link turn-off calls in the application source. Specifically, for each loop nest, the compiler inserts a turn-off call per communication link. Each turned-off link is reactivated upon the next access to it. We automated this approach within a parallelizing compiler and applied it to eight array-intensive embedded applications.

Original languageEnglish (US)
Title of host publicationProceedings of the 5th ACM International Conference on Embedded Software, EMSOFT 2005
PublisherAssociation for Computing Machinery (ACM)
Pages134-137
Number of pages4
ISBN (Print)1595930914, 9781595930910
DOIs
StatePublished - 2005
Event5th ACM International Conference on Embedded Software, EMSOFT 2005 - Jersey City, NJ, United States
Duration: Sep 19 2005Sep 22 2005

Publication series

NameProceedings of the 5th ACM International Conference on Embedded Software, EMSOFT 2005

Other

Other5th ACM International Conference on Embedded Software, EMSOFT 2005
CountryUnited States
CityJersey City, NJ
Period9/19/059/22/05

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'Exploiting last idle periods of links for network power management'. Together they form a unique fingerprint.

  • Cite this

    Li, F., Chen, G., Kandemir, M., & Karakoy, M. (2005). Exploiting last idle periods of links for network power management. In Proceedings of the 5th ACM International Conference on Embedded Software, EMSOFT 2005 (pp. 134-137). (Proceedings of the 5th ACM International Conference on Embedded Software, EMSOFT 2005). Association for Computing Machinery (ACM). https://doi.org/10.1145/1086228.1086253