for high-speed

for high-speed
for high-speed

Modelling and simulation of o?-chip communication architectures

for high-speed packet processors

Jacob Engel *,Daniel Lacks,Taskin Kocak

Department of Electrical and Computer Engineering,University of Central Florida,4000Central Florida Blvd.,Orlando,FL 32816,United States

Received 19September 2005;received in revised form 27January 2006;accepted 31January 2006

Available online 6May 2006

Abstract

In this work,we propose a visual,custom-designed,event-driven interconnect simulation framework to evaluate the performance of o?-chip multi-processor/memory communications architectures for line cards.The simulator uses the state-of-the-art software design techniques to provide the user with a ?exible,robust and comprehensive tool that can evaluate k -ary n -cube based network topologies under non-uniform tra?c patterns.The simulator provides full control over essential network parameters and ?ow control mechanisms such as virtual channels and sub-channeling.We compare three low-dimensional k -ary n -cube based interconnects that can ?t into the physical limitations on line cards,where each one of these interconnects has multiple processor-memory con?gurations.Performance results show that k -ary n -cube architectures perform better than existing interconnects,and they can sustain current line rates and higher.In addition,we provide performance tradeo?s between multiple ?ow control mechanisms and performance metrics such as throughput,routing accuracy,failure rate and interconnect utilization.ó2006Elsevier Inc.All rights reserved.

Keywords:Network processors;Memory management;Linecards;Interconnect systems;k -Ary n -cube networks;Shared-bus

1.Introduction

Increasing line rates and deep packet processing opera-tions place heavy strain on the memory bandwidth require-ments between the line card network processing elements (PE)and memory modules (M).In order to support new services,line cards are required to perform multiple func-tions simultaneously.Moreover,as the network expands,lookup table entries and parameters consume more memory space to store data.As a result,the memory band-width requirements,which are greatly limited by the inter-connection mechanism used to communicate between PEs and memories,are raised.Although new router architec-tures and packet processing techniques improve the perfor-mance,they still cannot keep up with network capacity growth rates in order to avoid a major tra?c bottleneck.

In the heart of every line card there is a network proces-sor unit (NPU)which performs multiple processes in order to analyze the ?ow of incoming packets.The nature of packet processing requires frequent read/write operations to memories distributed around the NPU.The simulator described in this work replicates the physical and func-tional environments by imitating di?erent con?gurations in which the PEs and memories are physically located on the line card.The simulator generates random messages with explicitly random parameters such as source/destina-tion addresses,size of messages,and arrival/departure times from PEs to memory modules and vice versa.

There are many candidates in the area of interconnects that can be used to provide a communication link between processors and https://www.360docs.net/doc/ef12620454.html,works such as k -ary n -cubes include hypercubes,mesh and torus networks.But the uniqueness of the interconnect architecture we seek is con-tained by the physical constraints characterizing the line card board.Area and I/O pins are limited on the line card.Hence,the number of alternative designs that can physically

0164-1212/$-see front matter ó2006Elsevier Inc.All rights reserved.doi:10.1016/j.jss.2006.01.033

*

Corresponding author.Tel.:+14078234758;fax:+14078235835.E-mail addresses:jengel@https://www.360docs.net/doc/ef12620454.html, (J.Engel),dlacks@https://www.360docs.net/doc/ef12620454.html, (https://www.360docs.net/doc/ef12620454.html,cks),tkocak@https://www.360docs.net/doc/ef12620454.html, (T.Kocak).

https://www.360docs.net/doc/ef12620454.html,/locate/jss

The Journal of Systems and Software 79(2006)

1701–1714

and functionally?t,given those constraints,is limited.Each embedded chip has?xed and limited number of I/O pins. Therefore,a low-dimensional,packet-switched network may be a good solution.

Our objective is to explore k-ary n-cube networks in the context of line card designs.One of our goals is to?nd which k-ary n-cube based interconnect architecture can be the best candidate to replace existing line card commu-nication mechanisms,such as shared-bus or crossbars. Both shared-bus and the crossbar cannot scale well as the number of modules(PEs or memories)connected to it increases.In addition,the shared-bus requires a distributed arbitration mechanism,as the number of modules con-nected to it grows,thus,adding latency and space to the overall system.Pin constraints bound the bus size that can be interfaced with the NPU(Kumar et al.,2005). Hence,only a packet-based network-on-board can provide the required performance improvement between the NPU and o?-chip memory modules.

Our simulation model includes statistical data such as IP length distribution(Test Procedures,2001)and physical measures of PCB placement and spacing,as well as network properties such as IP packet size,in order to increase the accuracy of our calculations.In addition,we apply true IP network properties such as switching,propa-gation and routing latencies.The simulator provides real time performance analysis with detailed metrics on packets processed at each simulation cycle and overall detailed results at the end of each simulation.The user inputs param-eters using an easy to use GUI or command line interface.

1.1.Related work

There are many discrete event network simulation and modelling tools available that contain some of the architec-tural features and functionalities we incorporate in our model.However,to the best of our knowledge,none of these simulation frameworks are capable of delivering the physical and functional attributes required to emulate o?-chip communications on line cards.We would like to con-sider three of these simulators(NS-2,Qualnet and OPNET)and make the distinction between their applica-tions and ours.We chose NS-2,Qualnet and OPNET since they are well known network simulators currently deployed by universities and network design companies.

NS-2is an object-oriented,discrete,event-driven net-work simulator developed at UC Berkeley,written in C++and OTcl.NS2is primarily useful for simulating local and wide area networks and it supports simulation of TCP, UDP,routing,and multicast protocols over wired and wireless networks(Jung et al.,2003;Kornblit et al., 2004).The Qualnet is a real-time simulation framework, developed by Scalable Network Technologies(SNT),to emulate the communications of multiple network models. Qualnet includes a rich3D-visualization interface to pro-vide the user with control over data packets,network topology and performance evaluation.Qualnet supports wireless and ad hoc networks as well as parallel and distrib-uted architectures(Hsu et al.,2003).In addition,it sup-ports multiple routing protocols such as BGP,SIP,RIP, ARP,and BRP.Some related applications that can bene?t by using this network simulator include:microwave tech-nologies,high frequency radio communications or satellite communications.OPNET’s network modelling and simu-lation environment delivers a scalable simulation engine that can emulate wireless,point-to-point and multi-point network links.It has the capability to support routing pro-tocols such as voice,HTTP,TCP,IP,Ethernet,frame relay and more(Wu et al.,2001).Some of the application best suit for this simulator are mobile,cellular,ad hoc,wireless LAN,and satellite networks.The OPNET simulator allows the user to custom design tra?c models since it sup-ports?nite state machines and object-oriented modelling (Chang,1999).

These network simulators are not designed to emulate o?-chip communication environment required for our application based on the following di?erentiations:?Physical attributes:none of these simulators include spe-ci?c PCB physical properties which have a great e?ect on the interconnect performance.Physical properties are crucial to meet the stringent area restrictions on line cards.

?Applications:all three simulators?t better for LAN, WAN,mobile and ad hoc communications,not small scale interconnects which require di?erent routing algo-rithms and?ow control mechanisms.The line card sim-ulator must include message?ow enhancement features such as virtual channels and sub-channeling.?Message control:our interconnect simulator provides control of how to deliver messages,perform statistics, gather data,route the packets through the network and run auto test cases.Furthermore,the user has more control of how to save and re-run data using the simu-lator options menus,rather than learning OTcl or Parsec.

?Participants:while our simulator models communica-tion among PEs and memories,the other simulators include other participants such as PCs,satellite commu-nication,routers or other moving objects.?Communication medium:most of communication medi-ums used in these simulators have di?erent signal prop-agation characteristics and performance.Our o?-chip interconnect model is a small scale network in which packets propagate from point-to-point via PCB buses no longer than1inch in length.

2.Preliminaries

2.1.k-Ary n-cube networks

A k-ary n-cube network consists of N=k n nodes,where n represents the dimension of the network and k represents

1702J.Engel et al./The Journal of Systems and Software79(2006)1701–1714

the number of nodes in each dimension.Fig.1presents 8-ary2-cube and4-ary3-cube networks as captured from the interconnect simulator.Each node in k-ary n-cube interconnect is uniquely labeled and elements of the same plane are connected together.We also introduce a modi?-cation of2-ary3-cube interconnect architecture by extend-ing it in the x-direction(Fig.2).PEs and memories are distributed throughout the interconnect in di?erent con?g-urations and allow each PE to use multiple memories as storage as well as data sharing with other processing elements.

Each node is connected to all of its nearest neighbors via bi-directional channels.The address/location of a node can be represented as a vector consists of two bit-vector?elds (Dally,1990).Fig.2represents the3D-mesh interconnect architecture,which is based on a2-ary3-cube network, that is extended in the x-direction.The3D-mesh intercon-nect is a packet-based multiple path interconnect that allows network packets to be shared by di?erent processing elements(PE)and memory modules(M)on the network line card.Memories are distributed around processing elements,such as tra?c manager,QoS co-processor or classi?cation processor,to allow data sharing among mod-ules and direct processor memory storage.If a link goes down,not only should the fault be limited to the link, the additional links from the intermediate nodes should ensure the connectivity continues.

Processors and memories communicate by using mes-sage passing mechanisms.Each message is transmitted independently.Each message is partitioned into smaller data segments,also called?its,which contain the maxi-mum amount of data(in bits)that can be transmitted in one cycle from one node to another.Each cycle another?it of the same message is transmitted.Flits of the same mes-sage follow one another in a pipeline manner.Therefore,a message is also referred to as a worm since the movement of the message within the interconnect resembles a worm movement.Virtual channels(VCs)allow worms to be stored within a node if all of the output ports of that node are busy transferring other messages.This technique pre-vents worm transmission failures by holding a worm within a node until one of its ports becomes

available.

Fig.1.(a)4-Ary3-cube and(b)8-ary

2-cube.

Fig.2.3D-mesh interconnect architecture.

J.Engel et al./The Journal of Systems and Software79(2006)1701–17141703

Channels can change their con?guration by dividing their width into two or four sub-channels (shown in Fig.3).Sub-channeling (SC)permits worms to share the same channel simultaneously.Although per-worm the channel has smaller capacity when sub-divided,it provides worms with extra ?exibility in routing through the inter-connect instead of being bu?ered or retransmitted.

The message passing algorithm adaptively routes worms according to prede?ned guidelines and by incorporating interconnect tra?c conditions.The ?rst guideline ensures that a worm will always attempt to take the shortest path possible to its destination.If the port required to be taken by the shortest path rule is occupied as a result of high traf-?c load,it will test the availability of other ports.The movement of each worm is recorded by the worm manager.Therefore,the second guideline utilizes past moves to determine the next node that a worm will take towards its destination and avoids certain consecutive moves to inhibit deadlock/livelock situations.The last guideline pre-serves the worm relative movement from its source node towards its destination.That is it will never reverse its direction towards its source.

PEs and memories can be physically located in many di?erent con?gurations depending on the number of PEs and memories required to complete packet processing tasks.The location and ratio between the number of PEs to memory modules will determine the average distance that a message has to pass in order to reach destination.Average distance has a direct e?ect on the interconnect per-formance.Intuitively,as network dimensions increase more con?gurations can be formed.During performance evaluation we used the con?guration that result in the shortest average path to get the best performance.

One objective,which can be gained by utilizing the sim-ulator,is to ?nd the optimal value of k and n to achieve best performance.The optimal con?guration depends on many design constraints as well,such as channel width/density,number of elements connected to the network,and cost.In general,when node delays are neglected and constant bisection width is assumed,a network with lower dimensions has lower latency than higher dimensional net-works (Agarwal,1991).

3.k -Ary n -cube interconnect simulator architecture The simulator architecture,shown in Fig.4,depicts the interconnect interaction with the control modules which adjust,collect and modify the interconnect settings,data ?ow,and performance metrics.These architectural attri-butes are built in the functionalities of the modules.The simulator con?guration manager sets the interconnect type,its properties (wire propagation delay,switching delay or routing delay)and enable/disable enhanced fea-tures such as channel width,VC on/o?,and bidirectional channel.

The interconnect properties are set by the user interface and are recorded to allow the con?guration manager to be updated via the worm manager.The worm manager uti-lizes interconnect properties and con?guration parameters in order to set other modules accordingly in the system that participate in the simulation.The tra?c sampler continu-ously records performance data such as throughput,latency,routing accuracy,interconnect bandwidth utiliza-tion and interconnect resources utilization.This informa-tion is feedback to the worm manager which adjusts worm generation rate and load balances the tra?c.The routing algorithm receives each individual worm location and its destination node from the worm manager.Then,it determines the shortest route possible for each worm by avoiding spots of heavy tra?c.

The worm jar is a storage module that contains worms.In the simulator we use two instances of the worm jar:one jar is for worms waiting to enter the interconnect and the other jar contains worms that were processed.The total number of worms during simulation are initially deter-mined by the user.The scheduler is responsible to inject worms into the interconnect taking into account the total network capacity and tra?c load.Since the worm manager knows the total number of worms that are modelled throughout the simulation,it must inform the scheduler the end of the simulation (when there are no more worms to model).

The simulator accounts for all practical parameters characterizing o?-chip interconnect architectures such as switching delays (T s ),routing delays (T r )and propagation delays (T w )as well as the complete functionality of each system components (nodes,links,PE/Memory,interfaces,virtual channels,and channel partitioning)(Zhang,2003).The user has the option to change each of these parameters in case new technology introduces higher standards.Simu-lation time is based on a unit cycle which is equal to one clock cycle (T w +T r ).All other delays are calculated as multiples of it.That provides the advantage of having sin-gle uniform simulation

clock.

Fig.3.Four sub-channels containing four worms simultaneously.

1704J.Engel et al./The Journal of Systems and Software 79(2006)1701–1714

Message size in bytes and message generation-time are obtained by using pseudo-random number generator,which is utilized to resemble the randomness of packet transmission by both processors and memories.Each worm is linked to performance-bookkeeping function which records its latency,throughput,simulation cycles,failures,and route-taken from the moment the worm enters the interconnect until it completely reaches its https://www.360docs.net/doc/ef12620454.html,prehensive performance results are provided at the end of each simulation in a spreadsheet.3.1.Simulator modelling approach

The high-level design of the simulator is comprised of four sets of C++classes (Fig.5a)supporting:the intercon-nect topology and con?guration (Interconnect),user inter-face (Interface),worm controller and administrator (WormManager),and worm structure and characteristics class (Worm).The worm contains a header ?eld and data payload.

The cyclic diagram (Fig.5b)depicts the relationship between the interconnect architecture,the simulator and the physical properties of the available resources.The interconnect architecture represents the physical structure and includes all the hardware required to implement it.The properties represent two types of parameters:physical parameters of electrical components comprising the inter-connect (such as wire delays,switching delays,routing delays),and parameters of additional features,which enhance the interconnect performance (for example,channel partitioning,virtual channels,interconnect con?guration).The simulator emulates the interconnect functionality in order to evaluate and compare di?erent con?gurations and settings.

Interconnect properties a?ect worm routing ?exibility and resources it can use while propagating through the interconnect,such as VCs and SC.The port class contains VCs and SCs which are modelled as logical topologies on top of the physical network architecture.VCs as well as SCs have a great e?ect on the worms transmission success/failure rates and deadlock/livelock avoidance.Although VCs improve routing accuracy and reduce worm transmission failure rate,they also increase the worm latency and interconnect implementation costs.The worm manager class records worm data,arrival and depar-ture time stamps of worms,and controls the worm genera-tion rate in order to load balance the number of worms processed simultaneously within the interconnect.The worm class encapsulates the properties of a worm such as the header with source/destination ?elds and the route that the worm takes through the interconnect.

The worm routes itself through the interconnect while continuously being monitored by the worm manager.The adaptive routing algorithm is used by the worm to deter-mine the best available path that it can take to reach desti-nation.The routing algorithm is derived and based on Chiu (2000),Dally (1992),and Lysne (1999).The worm updates its shortest path coordinates with each movement to ensure its optimal path even when it is required to take a detour as a result of hot-spot node.Fig.6shows a UML

class

Fig.4.Simulation control modules.

J.Engel et al./The Journal of Systems and Software 79(2006)1701–17141705

diagram of the interconnect architecture (Cope,2005;Nak-ata et al.,2002).A single type of interconnect is a set of faces which each comprise of multiple nodes.Within each node there are multiple ports.A node can be modelled as either a memory or a PE.Hence,the node still possess the same structure and functionality as any node,but it reserves one port as an I/O port to the device.

The simulation setup shown in Fig.7is an abstract view of the high level system components and their interaction in order to initialize and execute the simulation.

First,the simulation properties are set by the user.These properties are crucial for worm generation,timing delays,

and other simulation aspects.Then,the messages (worms)are created and are placed in a data structure (jar).Since the interconnect con?gurations can be changed,PE and memory locations will be changed accordingly.Therefore,source/destination addresses must be correctly set before the worms can be generated.When the user chooses to run the simulation,the properties and the data of the worms in the jar are recorded in separate ?les.The inter-connect receives worms from the jar of generated worms according to a probability called worm generation rate (GR)which is controlled by the user.In addition,the user can determine how many worms can occupy the intercon-nect at all simulation cycles by changing the value of the max worms in interconnect variable (MWII).If no value is set for this variable,the default value is unlimited num-ber of worms.The worms that enter the interconnect are modelled until they reach their destination.All runtime worm data is collected in a separate output ?le which provides individual details about each worm.After the complete simulation is modelled,several spreadsheet ?les are generated recording the performance of the simulation.4.Software components

Fig.8portrays a dynamic model (action oriented)of the routing algorithm class and its subclasses with interconnect system components and the worm manager class.

This model determines the actions performed by the routing algorithm in order to maneuver each worm

within

Fig.5.(a)Class relationship diagram and (b)cyclical relationship

diagram.

Fig.6.UML class diagram of interconnect

architecture.

Fig.7.Simulation setup.

1706J.Engel et al./The Journal of Systems and Software 79(2006)1701–1714

the interconnect with respect to its current position,its des-tination and tra?c conditions (Schach,1996).The routing algorithm is closely coupled with the worm manager since the worm manager controls worms entering and leaving the interconnect while the routing algorithm controls the worms within the interconnect.First,the routing algorithm analyzes the source node type (where the worm is gener-ated)and the enabled interconnect features such as virtual channels,bidirectional channels and PE–M con?guration.Then,it checks the preferred (shortest path)direction in which the worm needs to move.The routing algorithm scans each node’s port and dictate the movement of the worm giving priority to ports which are pointing in direc-tion towards its destination.If none of the ports are avail-able,the routing algorithm will check the availability of virtual channels.If enabled,the worm will be queued into one of the virtual channels until one of the ports clears.If virtual channels are not available then the routing algo-rithm noti?es the worm manager of a worm failure.This will result in a retransmission of the same worm.

Fig.9depicts a data ?ow diagram (DFD)of the user interface module.DFD charts assisted us in determining what to automate in the simulator design and which data must be inputted exclusively by the user (Fritz and Sargent,1995;Schach,1996).The user has two choices:using default settings or changing settings/properties in order to simulate the interconnect with di?erent con?guration.Once the interconnect type and con?guration are de?ned,the user must complete the following steps before the sim-ulation execution:

?Select if new worms will be generated or worms should be restored from an existing ?le.

?Determine the number of worms to simulate.

?Decide if worms are generated randomly or manually.?Input the number of sampled throughput points (include the initial sampling point and the number of simulation cycles between samples).

?Select if the newly generated worms will be saved or not.

5.Optimization strategies

Object-oriented software design optimization strategies such as STL,singleton and pure virtual functions

have

Fig.8.(a)Dynamic model of routing algorithm and (b)data ?ow diagram of the user interface

module.

Fig.9.Sequence diagram of user–simulator interaction.

J.Engel et al./The Journal of Systems and Software 79(2006)1701–17141707

been employed to provide a?exible,extensible,and robust means to establish network hardware structures.These optimization strategies are vital implementation methodol-ogies to our network benchmark model in order to obtain higher modularity and lower integration complexity.A systematic usage of these functionalities throughout the simulator design lead to a better model which improves system performance and supports future upgrades such as additional types of networks,protocols and/or?ow con-trol mechanisms.

5.1.The Singleton class

The singleton classes(Townsend,2002)such as Worm-Manager and Interconnect shown in Fig.10,guarantee that only one class instantiation is created.The single instance is held as a static variable as a private member of the class.These singleton classes are not automatically initialized.Instead,initialization occurs the?rst time that singleton class’create method is called by the client.The create method also allows the callers to access methods of that singleton class.In a similar manner it can destroy the object by calling destroy.The interconnect is a single-ton class,that is only one interconnect is created per simu-lation.The WormManager creates a new interconnect for each simulation and destroys it when done.The reason for this is that there might be di?erent con?gurations which require construction of the object in di?erent ways.Fig.10 shows all the objects and functions(public and private) included in each of these singleton classes.

5.2.Pure virtual functions

The SaveRestoreInterface class provides save and restore functions which are pure virtual functions which forces derived classes to override(Pure Virtual Functions and Abstract Classes,2005).The following is an example of pure virtual function signatures:

class SaveRestoreInterface{

public:

virtual File&save(File&?le)=0;

virtual File&restore(File&?le)=0};

In the save/restore functionality,we utilize a sentinel as a safeguard to assure that the correct version of code is used. The sentinel is recorded in the saved?le.Upon restore,it is veri?ed that the saved?le matches the current software version.

const int save_restore_sentinel=3;

File&WormManager::save(File&?le){

?le.save(save_restore_sentinel);

Properties::save(?le);

return?le.save(worms_to_process);}

File&WormManager::restore(File&?le){

int tmp_save_restore_sentinel;

?le.restore(tmp_save_restore_sentinel);

if(tmp_save_restore_sentinel!=save_restore_senti-nel){

std::cerr ’’cannot restore?le

tmp_save_restore_sentinel std::endl;

restored=false;

else{Properties::restore(?le);

Interconnect::create;()

?le.restore(worms_to_process);

restored=true;

return?le;}

5.3.System design with Standard Template Library (STL)functions

The interconnect is modelled using a map data structure from the Standard Template Library(STL).The STL is a general purpose library of algorithms and data structures. The STL enables generic programming where reusable functions,data structures and algorithms are

available

Fig.10.(a)WormManager singleton and(b)interconnect singleton.

1708J.Engel et al./The Journal of Systems and Software79(2006)1701–1714

for the programmer(Introduction to the Standard Template Library,2003).The interconnect is basically con-structed of three main components:a face,a node,and a port(Fig.11).For the3D-mesh interconnect,each face has four nodes at the corners.Each node has four ports. Therefore,a map is created for each component to orga-nize the connectivity and construct the interconnect struc-ture.Each component has an ID and an integer variable which represents the number of instances available (Meyers,2001).

Face#ID to face map:

typedef std::map h int,Face i FaceMap;

Node#ID to node map:

typedef std::map h int,Node i NodeMap;

Port#ID to port map:

typedef std::map h int,Port i PortMap;

VC#ID to VC map:

typedef std::map h int,VirtualChannel i MemoryManager;6.Evaluation and results

During execution,the network simulator provides two windows to control simulation pace and collect simulation data.The runtime data window(bottom right side of Fig.12)shows performance metrics which are updated on-the-?y.In addition,runtime data is also recorded in the output spreadsheet?les.The pacing window(on the bottom left side of Fig.12)allows the user to control the pace of simulation and if required to pause it completely.

https://www.360docs.net/doc/ef12620454.html,tency and throughput analysis

Latency represents the time it takes for a worm to reach its destination.Depending on the worm movement,latency sums wire transfer,switching and routing delays at each cycle.The resulting latency is an average of latencies col-lected from all worms modelled at the end of the simulation.

We chose three representative k-ary n-cube intercon-nects for our simulations:8-ary2-cube,4-ary3-cube and 3D-mesh(all three interconnects have64nodes).Fig.13 shows a comparison among all three interconnects with VC and channel partitioning enabled.The results shown are an average of10di?erent simulations with both short (128B–1KB)and long(1KB–8KB)worms and identical interconnect settings.The lowest latency was recorded for the3D-mesh,while the4-ary3-cube network has slightly higher latency than the3D-mesh.Throughput is measured by taking samples of the total bits processed within the interconnect at each cycle.Throughput signi?cantly increases when VC are enabled since VC allow more worms to occupy the interconnect without transmission

failures. Fig.11.Structural hierarchy of classes:face,node,

port.

Fig.12.Simulation execution with runtime data and pacing windows.

J.Engel et al./The Journal of Systems and Software79(2006)1701–17141709

Fig.14shows that the highest throughput was reached by the 3D-mesh interconnect for both short and long messages.

6.2.Worm allocation and distribution

Worm allocation and distribution measurements,depicted in Fig.15,show three groups of worms:worms that are currently propagating in the interconnect,worms that are waiting in jar to be modelled and worms that are ?nished and reached their destinations.Fig.15provides a good indication of the worm manager functionality.The ?gure shows that the number of currently modelled worms (worms in the interconnect)increases as the number of worms waiting in the jar and the number of already mod-elled worms (?nished)decreases.

When VCs are enabled,more worms occupy the inter-connect with faster rate than presented in Fig.15.Fig.16shows that as more worms are modelled,the number of worms waiting to be modelled diminishes.It is also notice-able that when VCs are enabled more simulation cycles are required.

6.3.Routing accuracy

Routing accuracy measures how close the actual path of each worm is to its shortest path.Routing accuracy is cal-culated by taking the ratio between the shortest path possible to the actual path taken,which signi?es the worm’s deviation from its shortest path.Fig.17shows a simulation of 100worms using 3D-mesh interconnect with VC disabled and no sub-channelling.At the top of the ?g-ure the line portrays the number of additional links

passed

https://www.360docs.net/doc/ef12620454.html,tency

comparison.Fig.14.Throughput

comparison.

Fig.15.Worm allocation and

distribution.

Fig.16.Worm distribution with VC =8KB.

1710J.Engel et al./The Journal of Systems and Software 79(2006)1701–1714

by each worm until it reaches its destination.On the bot-tom part we see the deviation of each worm (top line)from its shortest path (bottom line).If both lines overlap,then the worm has taken its shortest path.The path worm takes depends on the tra?c load at certain nodes of the intercon-nect.As the load increases,most worms deviate from their shortest path and adaptively propagate to their destination avoiding areas of hot-spots (Lysne,1999).

Fig.17shows the number of channels passed for each worm modelled using 3D-mesh interconnect.The top line shows the percentage of deviation from the shortest path.For example,if the top line points for a certain worm #ID to 100,that means the worm has taken the shortest path possible.If the value of the line is equal to 20,the worm deviated from its shortest path by 80%(more chan-nel links).At the bottom of the ?gure there are two over-lapping lines.The thin line represents the actual path taken (measured in channel links).The thick line represents the shortest path.Therefore,when both line completely overlap each other for a certain worm,that worm has taken the shortest path.As the number of channel links passed increases with respect to the shortest path possible,the thin line becomes further apart from the thick line.In Fig.17neither VC nor SC were enabled.Therefore,more worms deviated from their shortest path due to high tra?c load at certain interconnect nodes.6.4.Interconnect and bandwidth utilization

Interconnect bandwidth utilization measures the num-ber of occupied channels (or sub-channels)with respect to the total number of channels available in the intercon-nect.Fig.18portrays that the highest bandwidth utiliza-tion is achieved by using the 4-ary 3-cube network,while the 8-ary 2-cube has the lowest utilization rate.Sub-

channelling improves bandwidth utilization as the channel is partitioned into more sub-channels.The combination of VC and SC brings all interconnects close to their full capacity.

Interconnect utilization counts the number of busy ports within each tra?c controller per simulation cycle.At the end of the simulation it provides the average number of ports that were set to busy status out of the total number of ports available in the interconnect throughout simula-tion.The results of interconnect utilization show very close relationship to bandwidth utilization (Fig.19).Again,4-ary 3-cube ports are set to busy status more often than the 3D-mesh or 8-ary 2-cube.Although interconnect utili-zation seems an equivalent measure to bandwidth utiliza-tion,it is a little di?erent since the port status is not directly related to the channel usage.An output port can stay in the not-busy state if a worm that intends to use it is bu?ered into virtual channels.Since each

tra?c

Fig.17.3D-mesh worm deviation from shortest

path.

Fig.18.Bandwidth utilization rate.

J.Engel et al./The Journal of Systems and Software 79(2006)1701–17141711

controller has four ports,the channel connected to the non-busy port can be utilized by a worm entering from a di?er-ent direction.6.5.Failure rate

Failure rate is a measure of the number of worms,out of the total worms generated,that were retransmitted during simulation.Retransmission takes place when a worm is blocked and it cannot obtain the resources it required to maintain an active status within the interconnect.For example,when VCs are disabled,then a worm will require retransmission if it cannot be routed to any output port within a certain node for more than one simulation cycle.Fig.20depicts a failure rate comparison for all intercon-nect types with VC switched to enabled/disabled.This ?g-ure show that using VCs signi?cantly reduces failure rate.Moreover,the size of the VC has a major e?ect on failure rate as well (Fig.21).As the size of the VC increases more worms can be bu?ered for longer periods of time within each node instead of failing and being retransmitted (Dally,1992).

At each cycle there is a random number of worms gen-erated in which only a fraction of those worms enter the interconnect.The software interface provides the user with a variable called generation rate (in units of %)which determines what percentage of worms generated each cycle will enter the interconnect.The rest of the worms are left in the jar.For example,if at a certain simulation cycle 10worms were generated and the parameter g is set to 70%then each worm has a 70%chance to enter the interconnect until the maximum occupancy of the interconnect is reached.The value of g is shown in Figs.20and 21in the x -axis.The combination of VCs and SCs reduces fail-ure rate dramatically,on average,to less than 10%for all interconnects.This is a 75%reduction since VCs allow worms to be bu?ered within a node until one of the ports becomes available.SCs provide worms with additional alternative paths to surpass areas of tra?c congestion.6.6.Routing accuracy vs.hot-spot nodes

In this simulation the paths taken by all worms,using 3D-mesh,8-ary 2-cube and 4-ary 3-cube interconnects,were recorded.Then,the paths were analyzed to collect the nodes which were most frequently used and as a result caused other worms to deviate from their shortest path to avoid transmission failure.

Results given in Figs.22and 23for all interconnects show that some hot-spot nodes caused approaching worms to deviate from their shortest path by 50–60%more channel links.For example,Fig.22depicts that hot-spot in face 11node 3(F[11],n[3])caused six approaching worms to devi-ate from their shortest path by 62.5%.Hot-spots patterns are not repeated in the same locations.Tra?c is randomly generated with random message lengths and from random nodes.Since the adaptive routing algorithm changes the path the worms take in each simulation,every simulation creates hot-spots in di?erent locations and in di?erent fre-quencies.Fig.23shows a hot-spot which occurred in face 3node 6(F[3],n[6]),that caused approaching worms

to

Fig.19.Interconnect utilization

rate.

Fig.20.Failure rate with VC switched

on/o?.

Fig.21.Failure rate vs.VC size.

1712J.Engel et al./The Journal of Systems and Software 79(2006)1701–1714

deviate from their shortest path by an average of 85%.Although only few hot-spots occur per simulation,their

e?ects on performance were signi?cant.As the rate of hot-spot increases (a function of tra?c load),worms tend to deviate from their shortest path more frequently and,as a result,the overall interconnect latency increases.6.7.K-Ary n-cube interconnects performance comparison with common interconnects

In this section,we compare 3D-mesh,8-ary 2-cube,and 4-ary 3-cube interconnects with other currently used high-performance interconnect technologies such as Hypertransport (HyperTransport Consortium,2005),In?niband (In?niband Trade Association,2000)and PCI-Express (PCI Special Interest Group,2003;Sassone,2003).

We used reported results provided by each individual vendor to compare with our results.In addition,the perfor-mance properties of these technologies take into account a constant channel size of 32-bits and a single communica-tion link.For the 3D-mesh interconnect the settings are:channel width is 32bits,interconnect size is 16cubes,num-ber of worms generated is 10,each worm is 1KB in size.Virtual channels as well as channel partitions were enabled.The throughput comparison results are shown in Fig.24.The throughput values of the 3D-mesh,8-ary 2-cube and 4-ary 3-cube interconnects represent the average through-put of each interconnect.3D-mesh shows superior results compared to all of its competitors reaching a peak through-put of 452Gbps (about twice the throughput of the best interconnect available not including the other types of k -ary n -cubes tested).7.Conclusions

We presented an event-driven,custom-designed interconnect simulation environment to evaluate

the

Fig.22.3D-mesh routing accuracy vs.hot-spot

nodes.

Fig.23.4-Ary 3-cube routing accuracy vs.hot-spot

nodes.

Fig.24.Throughput comparison:k -ary n -cube interconnects https://www.360docs.net/doc/ef12620454.html,mon interconnect technologies.

J.Engel et al./The Journal of Systems and Software 79(2006)1701–17141713

performance of o?-chip k-ary n-cube interconnect architec-tures for line cards.The interconnects are examined using our network simulator in order to?nd which of the inter-connects can provide the highest performance and memory bandwidth to replace the existing shared-bus systems.The simulator uses the state-of-the-art software design tech-niques to provide the user with a?exible yet robust tool that can emulate multiple interconnect architectures under non-uniform tra?c patterns.The simulator o?ers the user with extensive control over network parameters,perfor-mance enhancing features and simulation time frames that make the platform as close as possible to the physical line card features.Performance results show that k-ary n-cube topologies can sustain higher tra?c load than the currently used interconnects.We demonstrated that the?ow control mechanisms such as virtual channels(VC)and sub-chan-neling(SC)have an important impact on the interconnect performance.VC and SC mechanisms,together,reduce the transmission failure rate signi?cantly by75%and increase the interconnects bandwidth utilization in the range of15–25%depending on the topology.We included a variation of2-ary3-cube,called3D-mesh that provides a better processor-memory distribution under non-uniform tra?c.The combination of the3D-mesh interconnect and our adaptive routing algorithm facilitate to reach the highest throughput of452Gbps,this is better than twice the throughput of the leading solution in the marketplace. 3D-mesh meets both the stringent performance requirements and the physical constraints on the line card while enabling future scalability to adopt higher line rates.

References

Agarwal, A.,1991.Limits on interconnection network performance.

IEEE Transactions on Parallel and Distributed Systems2(4),398–412.

Chang,X.,https://www.360docs.net/doc/ef12620454.html,work simulations with OPNET.In:Proceedings of the1999Winter Simulation Conference,pp.307–314.

Chiu,G.M.,2000.The odd–even turn model for adaptive routing.IEEE Transactions on Parallel and Distributed Systems11(7),729–738. Cope,M.C.,2005.Object Oriented Analysis and Design Using UML, white paper,Ratio group.Available from:.

Dally,W.J.,1990.Performance analysis of k-ary n-cube interconnection networks.IEEE Transactions on Computers39(6),775–785. Dally,W.J.,1992.Virtual-channel?ow control.IEEE Transactions on Parallel and Distributed Systems3(2),194–199.Fritz,D.G.,Sargent,R.G.,1995.An overview of hierarchical control?ow graph models.In:Proceedings of the IEEE Simulation Conference,pp.

1347–1355.

HyperTransport Consortium,HyperTransport Technology Speci?ca-tions,2005.Available from:.

Hsu,J.,Bhatia,S.,Takai,M.,Bagrodia,R.,Acriche,M.J.,2003.

Performance of mobile ad hoc networking routing protocols in realistic scenarios.In:Proceedings of the Military Communications Confer-ence,vol.2,pp.1268–1273.

In?niband Trade Association,2000.In?niband architecture speci?cation, rev. 1.0,October2000.Available from:

org>.

Introduction to the Standard Template Library,2003.SGI,white paper.

Available from:. Jung,J.W.,Mudumbai,R.,Montgomery, D.,Kahng,H.K.,2003.

Performance evaluation of two layered mobility management using mobile IP and session initiation protocol.In:Proceedings of the Global Telecommunications Conference,vol.3,pp.1190–1194. Kornblit,R.,Schwartzmann,E.,2004.Multicast Protocols Evaluation in Wireless Domains,Project report,Technion,Israel.

Kumar,R.,Zyuban,V.,Tullsen,D.M.,2005.Interconnections in multi-core architectures:understanding mechanisms,overheads and scaling.

In:Proceedings of the IEEE32nd International Symposium on Computer Architecture,June2005.

Lysne,O.,1999.Deadlock avoidance for switches based on wormhole networks.In:Proceedings of the Annual International Conference of Parallel Processing,pp.68–74.

Meyers,S.,2001.E?ective STL:50Speci?c Ways to Improve Your Use of the Standard Template Library.Addison-Wesley,Boston,Mass. Nakata,T.,Kuwamura,S.,Zhu,Q.,Matsuda,A.,Shoji,M.,2002.An object-oriented design process for system-on-chip using UML.In: Proceedings of the15th international symposium on System Synthesis, pp.249–254.

PCI Special Interest Group,2003.PCI express base speci?cation rev.1.0a, April2003.

Pure Virtual Functions and Abstract Classes,Microsoft corp.,MSDN library,2005.Available from:.

Sassone,P.,https://www.360docs.net/doc/ef12620454.html,mercial trends in o?-chip communication,Tech-nical Report,Georgia Institute of Technology,May2003. Schach,S.R.,1996.Classical and Object-Oriented Software Engineering, third ed.Irwin group.

Test Procedures,March5,2001.Available from:

com>.

Townsend,M.,2002.The Singleton Design Pattern,Microsoft corp., MSDN library,February2002.Available from:https://www.360docs.net/doc/ef12620454.html,/library/default.asp?url=/library/en-us/dnbda/html/singleton-despatt.asp.

Wu,H.,Fujimoto,R.M.,Riley,G.,2001.Experiences parallelizing a commercial network simulator.In:Proceedings of the2001Winter Simulation Conference,pp.1353–1360.

Zhang,Y.,2003.Microstrip-multilayer delay line on printed-circuit board, Technical Report,University of Nebraska,Lincoln,April2003.

1714J.Engel et al./The Journal of Systems and Software79(2006)1701–1714

人教版新目标英语(GOFORIT)七年级上册全册教案

Unit one My name is Gina. 1.话题: Making new friends 2.功能目标: 1)使学生学会用英语介绍自己。 2)使学生学会用英语和别人打招呼。 3.文化目标: 1)让学生初步体会用英语和别人交流的感受,培养学生学习英语的兴趣。 2)通过对英文名字的介绍,对比中西方表达名字的不同,了解中西方文化的差异。 3)通过对西方一些成功人士英文名字的介绍,使学生了解成功是由不懈的努力和艰苦的奋斗得来的。 4)通过介绍英文名字的由来,使学生产生对西方文化的好奇及兴趣。 4.认知目标: 1)词汇: clock, hello, hi, and, question, answer, look, first name, last name 2) 语法项目:一般现在时be的用法 以特殊疑问词what开头的问句 形容词性物主代词my, your, his, her What’s=What is I’m=I am My name’s=My name is 3) 语言目标: What’s your name? My name is Gina. I’m G ina. Nice to meet you. Period one I.教材分析:这是课本的第一部分,题目是My mane is Gina. 有很多学生第一次学习接触英语,为了调动他们的积极性,不产畏难情绪,尽量简单的处理教材。 Language topic: What’s your name? My name is Gina. Language strategies: Talk about the names Main vocabulary: name is, meet, his, first name, last name, answer, boy , girl. II.语言结构: present tense to be, what questions, Possessive adj. my, your, his, her. 。 III.语言功能:询问姓名及怎样回答. IV.活动设计:采访调查What’s your first name? V. Teaching steps: Step 1:Greetings. Step 2: Words: Learn the new words A: first, listen to the recorder, the students read after the recorder. B: read the new words after the teacher. Step 3: 1a Write English words for the things in the picture. How many things do you know?

易语言-从入门到精通(零基础)

汉语编程工具易语言

目录 目录.......................................................................................................................... - 3 - 第一部分易语言入门.................................................................................................... - 4 - 第一课走进“易”世界........................................................................................ - 4 - 一、打开“易语言”设计窗口 ........................................................................ - 4 - 二、认识“易语言”........................................................................................ - 4 - 三、第一个易程序............................................................................................ - 6 - 四、小结............................................................................................................ - 7 - 第二课简单的人机交互........................................................................................ - 8 - 一、第一个交互程序........................................................................................ - 8 - 二、小结............................................................................................................ - 9 - 第三课按钮与标签的综合运用 .......................................................................... - 10 - 第四课图文并茂.................................................................................................. - 12 - 第五课看看计算机的计算能力 .......................................................................... - 15 - 第六课让世界丰富多彩...................................................................................... - 18 - 第七课顺序程序结构.......................................................................................... - 20 - 第八课猜数(选择程序结构) .......................................................................... - 23 - 第九课多分支控制结构语句 .............................................................................. - 28 - 第十课练习.......................................................................................................... - 30 - 一、选择题:.................................................................................................. - 30 - 二、编程题:.................................................................................................. - 30 - 第十一课循环程序结构...................................................................................... - 32 - 第十二课循环程序结构练习 .............................................................................. - 36 - 一、选择题...................................................................................................... - 36 - 二、编程题...................................................................................................... - 37 - 第十三课菜单的设计.......................................................................................... - 39 - 一、菜单的基本概念...................................................................................... - 39 - 二、菜单编辑器的打开 .................................................................................. - 39 - 三、设计下拉式菜单...................................................................................... - 40 - 第十四课对话框.................................................................................................. - 44 - 一、提示类对话框.......................................................................................... - 44 - 二、自定义对话框.......................................................................................... - 45 - 三、通用对话框.............................................................................................. - 46 - 附录实例应用荟萃.............................................................................................. - 48 -

excel if函数 if函数嵌套用法

excel if函数 if函数嵌套用法 excel函数中 if函数的使用非常广泛,特别是在单条件判断的时候,用好 if 函数可以帮我们完成很多功能。 最简单的 excel if函数应用 例子:下图数据在d列显示如下结果:如果数据1大于60则显示合格,否则显示不合格。 那么在d2单元格输入以下公式: =if(a2>60,"合格","不合格") 然后向下拖拽,自动生成数据,如下图D列效果。 if函数必须的条件: 每一个 if函数必须使用英文的括号括起来; 括号内为三个数据,第一个数据是条件(如上例中的a2>60),第二数据为满足第一个数据后返回的结果,通常使用英文的引号括起来,第三个数据是不满足第一个数据时需要返回的结果;(如果不输入第三个数据可以吗,当然可以,返回什么结果自己试试吧) 经常出现的错误: 其中的符号如逗号和引号皆为英文(也就是所谓的半角);

if的右括号放在了条件的后面;(这是在多个条件使用if函数进行嵌套时非常容易犯的错误) if函数嵌套用法 例子:下图数据,在e列显示如下结果:如果数据1小于60则显示不合格,如果大于等于60而小于80则显示合格,如果大于等于80而小于90显示良好,如果大于等于90则显示优秀。 这是经典的if嵌套应用例子,需要我们使用 if函数的嵌套。 if嵌套书写前,首先你要理解要求,并将要求数学化,也就是使用数学的模式表达出来,if函数多重嵌套一般情况下我们可以将它看做分段函数,那么问题就很容易解决了。例子可以在E2单元格使用如下代码: =if(a2<60,"不合格",if(a2<80,"合格",if(a2<90,"良好","优秀"))) 当数据1小于60时,显示不合格,这时在“不合格”逗号的右侧默认就是>=60的情况,那么根据题意,只需再满足<80即可显示合格,于是我们将最简单的 if 函数的第三个数据变成了一个if函数,依次类推,每一次可以将一个if函数作为每一个基本函数的第三个数据,从而形成多种嵌套。 (图例中多余在最后一个 if前后加了一个括号,当然这种方法也正确,但不是最简单的。) 其实还有另一种写法,也就是将嵌套的if写在基本if函数的第二个数据的位置,如下图,不过这种写法不常用,也比较不好理解,并且容易写错,不推荐大家使用。

【新手必看】易语言各种错误及解决办法

您下载的易语言正式版,需要购买加密狗后才能正常编译。 在删除您当前版本后下载免费版、或者破解版 在调试或编译出现图中提示的(图中红色表示为命令) 在易语言的菜单栏上【工具 - 支持库配置 - 全选 - 确认】即可。 您打开的源码缺少了某些支持库(图中红色的是支持库名称及文件名 {}中的是支持库的数字签名) 打开官方论坛下载支持库或https://www.360docs.net/doc/ef12620454.html,自行需找支持库安放在易语言目录下的lib文件夹内,如C:\易语言\lib\ 然后在易语言的菜单栏上【工具 - 支持库配置 - 全选 - 确认】即可。 此提示一般在Vista或更高的系统中出现。如:Vista/7/8 偶尔在XP中出现。向易语言程序发送内存代码时出现问题(跟Excel出现的错误一样) 很简单,在打开就可以了(偶尔打开会多次这样) 取消管理员权限就可以完美解决了

出现此提示的错误原因很多,各位要一个一个排除 1、要编译的程序正在运行,无法覆盖(关闭被编译的程序在编译一次) 2、杀毒软件搞的鬼(编译时杀毒软件拦截,关闭杀毒重新编译) 3、被编译的目录权限不够(换个目录重新编译) 4、版本问题(删除现在易语言重新下一个后编译) 5、调试文件在运行(打开任务管理器终止.tmp的临时程序然后在编译) 此问题有些答案来自互联网 有的时候重启也行 打开任务管理器终止.tmp的临时程序然后在编译这个给力了 重启 调试或编译运行时出现360提示(红色为随机文件名) 关闭您的360然后在试试 出现此提示一般是你复制过易语言目录或安装时安装包未写出link.ini的链接地址

打开易语言目录下\tools\link.ini文件 找到: ;linker="" 将“”的内容改为易语言安装目录+\VC98linker\Bin\LINK.EXE 如易语言安装 在C盘那么改为;linker="C:\易语言\VC98linker\Bin\LINK.EXE" 然后: Link.ini往下拉,最后有一个linker=和之前不一样的就是这个少了个;和两个分 号,然后把linker=后的地址也改为和上面地址一样 即可 通俗点: 打开易语言目录下\tools\link.ini 找到;linker=""和linker=把""和=后的内容改为易语言目录 +\VC98linker\Bin\LINK.EXE 这不是易语言本身的问题,这是Windows权限的问题 开始-运行-输入gpedit.msc会出现“组策略”然后依次打开【用户配置-管理模板-系统-不要运行指定的 Windows 应用程序】然后双击打开选择【已禁用】 提示:Windows7系统:Win+R键即可打开运行,然后操作和上面相同

go-for-it-人教版(新目标)英语-七年级-上册-单词-词汇表-带英标

Unit1 my[mai]我的 name['neim]名字,名称 is[iz]是(be的现在式第三人称 clock[kl?k]时钟 I[ai]我 am[?m]是 nice[nais]美好的;令人愉快的 to[tu:]用于与动词原形一起构成动词不定式prep. meet[mi:t]遇见,相逢 you[ju:]你(们) what[w?t]什么 your[j?:]你(们)的 hello[he'l?u]喂,哈罗 hi[hai]嗨!(表示问候或用以 his[hiz]pron.他的 and[?nd]conj.和,与 her[h?:]pron.她的 question['kwest??n]n.问题,疑问 answer['ɑ:ns?]v.回答 look[luk]v.看 first[f?:st]a.第一的 first name[f?:st neim]名字 last[lɑ:st]a.最后的;最近的 last name[lɑ:st neim]姓氏 boy[b?i]n.男孩 girl[g?:l]n.女孩 zero['zi?r?u]num.零 one[w?n]num.一 two[tu:]num.二 three[θri:]num.三 four[f?:]num.四; five[faiv]num.五; six[siks]num.六 seven['sev?n]num.七 eight[eit]num.八; nine[nain]num.九; telephone['telif?un]n.电话 number['n?mb?]n.号码;数字 telephone number[telif?un n?mb?]电话号码phone[f?un]n.电话

go for it七年级上册英语单词表

七年级上册英语单词表Starter Unit1 1.好的 2.早晨上午 3.早上好 4.嗨喂 5.你好喂 6.下午 7.下午好 8.晚上傍晚 9.晚上好 10.怎样如何 11.是 12.你你们 13. 你好吗 14.我 15. 是 16.健康的美好的 17.感谢谢谢 18 .好可以 19. 硬黑 20.光盘激光唱片

Starter Unit2 1. 什么 2.是 3.这这个 4.用以 5.英语英格兰人英语的 6.用英语 7.地图 8.杯子 9.尺尺子 10.笔钢笔 11.桔子 12.夹克衫短上衣 13. 钥匙 14. 被子床罩 15. 它 16. 一 17. 那那个 18. 用字母拼拼写 19. 请 20.美国全国篮球协会

21. 停车场停车位 22. 千克公斤 Starter Unit3 1. 颜色 2. 红色 3.黄色 4. 绿色 5.蓝色 6.黑色 7.白色 8.紫色 9.棕色褐色 10.指已提到或者易领会到的人或事物 11.现在目前 12.理解明白 13.能会 14. 说讲 15.我的 16. 小号的 17. 大号的 18 .中号的

19.不明飞行物 20.中国中央电视台 第一单元单词及短语 1. 名字n. 2. 好的令人愉快的adj. 3. 用于与动词原形一起构成动词不定式 4. 遇见相逢v. 5.也又太_ 6你的你们的pron. 7.女士不指明婚否 8.他的pron. 9.和又而conj. 10.她的pron. 11.是的可以interj 12 她pron. 13. 他pron. 14.不没有不是interj 15.不没有adv. 16 零num. 17. 一num. 18. 二num.

块IF语句嵌套

一、学情分析:高一的学生在之前的五堂面向对象程序设 计课程中已经基本掌握了面形对象的概念,控件的使用,对象的属性修改,数据类型,常见函数,变量的定义,以及表达式、赋值的使用。在这样的一个基础上,他们已经能够编写简单的VB程序段,并且也学习了选择结构中的If语句,并能接受更深层次的知识。 二、教学目标:巩固块If语句中的双分支和多分支两种形 式,学习If语句中的嵌套句式,能够针对不同的情况使用相应的句式。 三、教学重点:块If语句中嵌套的使用。 四、教学难点:读懂块If语句中的嵌套。 五、教学过程: ?1)上一堂课我们已经学习了If语句的两种形式,分别是行If语句和块If语句(PPT展示两种语句),请同学们仔细观察这两种语句的不同。除了语句长短,不知道大家有没有发现,行If语句的Then之后是有语句的,而块If语句中,Then之后是没有语句,语句是写在下一行的。这是他们最大的不同之处。而这一点也是导致上一堂课同学们编写的代码运行的时候出现“ELSE没有IF”这样的错误的原因。上一堂课我们的作业是计算一元二次方程ax2+bx+c=0的实数跟,结果存储到变量x1和x2中。我们来看这个题目的流程图

? 如果d小于0成立,那么方程没有实数根,k就等于0; 如果d小于0不成立,这里又有两种情况,等于0或者大于0。大于0那么有两个不相等的实数根,k就为2,x1有一个表达式,x2也有一个表达式。否则,方程只有一个实数根,k就等于1,x1和x2的表达式一样,在计算机中我们不能写成x1=x2,这样的形式计算机读不懂,我们要先把x1的表达式写出来,然后x2=x1。 那么接下来请先同学们完成上一堂课没有完成的作业,半成品在桌面名为“作业”的文件夹中的半成品1。完成之后只需上交执行文件。 2)通过刚才的练习相信同学们对块If语句中有多个分支 的情况已经掌握了,那么接下来我们学习块If语句中的

go for it 七年级英语上册Unit2单元整合资料

I【词汇】 家庭成员:family, grandfather, grandpa ,grandmother, grandma, grandparent(s), father, dad, mother, mom(mum),parent(s) ,son, brother, daughter, sister, uncle, aunt ,cousin 代词: this复数 these, that复数those, who, he复数they 同义词:picture-photo, bye-goodbye, mom-mum, parent-father/mother ,grandparent-grand-mother/ grandfather 对应词:grandfather-grandmother, grandpa-grandma, father-mother ,dad-mom/mum, daughter-son, brother-sister, uncle-aunt, these-those, boy-girl 其他: have, day,here, of, next, dog, well, oh II.【词组】 1.my parents 2.my sister 3.my brothers 4.my family 5.your parents 6.my father 7.my mother 8.in the first photo 9.in the next picture 10.a family photo=a photo of family11.in my family 12.the name of my dog=my dog’s name III.【句型】 介绍人物: 1.单数句:This / That is... 这是...... (那是......) 2.复数句:These/Those are...这些是......(那些是......) Who引导的特殊疑问句及其答语形式: 3.单数句-Who’s he/she ? 他是谁?(她是谁?) -He’s/She’s...他是......(她是......) 4.复数句-Who’re these/those/they? 这些(那些、他们)是谁? -They’re...他们是...... 5.Here is/are +主语. 这有......,这是...... IV.【交际用语】 1.This/That is my ... 2.-Nice to meet you. -Nice to meet you, too. 3.-Who’s he/she?-He /She is my ... 4.–Who’re these/those/they?-They’re my... 5.–Have a good day!-Thanks!You ,too. V.【语法】 1.指示代词

goforit七年级英语上册Unit单元整合

g o f o r i t七年级英语上 册U n i t单元整合 文档编制序号:[KK8UY-LL9IO69-TTO6M3-MTOL89-FTT688]

I【词汇】 家庭成员:family, grandfather, grandpa ,grandmother, grandma, grandparent(s), father, dad, mother, mom(mum),parent(s) ,son, brother, daughter, sister, uncle, aunt ,cousin 代词: this复数 these, that复数those, who, he复数they 同义词:picture-photo, bye-goodbye, mom-mum, parent- father/mother ,grandparent-grand-mother/ grandfather 对应词:grandfather-grandmother, grandpa-grandma, father-mother ,dad-mom/mum, daughter-son, brother-sister, uncle-aunt, these-those, boy-girl 其他: have, day,here, of, next, dog, well, oh II.【词组】 1.my parents sister brothers family parents father mother the first photo the next picture family photo=a photo of family my family name of my dog=my dog’s name

义务教育教科书《英语(Go for it!)》七年级上册单词表

义务教育教科书《英语(Go for it!)》七年级上册单词表 Starter Unit 1 good 好的 morning 早晨;上午 Good morning! 早上好! hi 嗨;喂 hello 你好;喂 afternoon 下午 Good afternoon! 下午好 evening 晚上;傍晚 Good evening! 晚上好! how 怎样;如何 are 是 you 你;你们 How are you? 你好吗? I 我 am 是 fine 健康的;美好的 thanks 感谢;谢谢 OK 好;可以 HB (铅笔芯)硬黑 CD 光盘;激光唱片 BBC 英国广播公司 Alice 艾丽斯(女名) Starter Unit 2 what 什么 is 是 this 这;这个 in 用(表示使用语音;材料等)用;以 English 英语;英格兰的;英语的 in English 用英语 map 地图 cup 杯子 ruler 尺;直尺 pen 笔;钢笔 orange 橙子 jacket 夹克衫 key 钥匙 quilt 被子;床罩 it 它 a(an) (用于单数可数名词前,表示未曾提到的) 一(人、事、物)that 那;那个 spell 用字母拼;拼写 please 请

NBA (美国)全国篮球协会 P 停车场;停车位 Kg 千克;公斤 Starter Unit 3 color (=colour) 颜色 red 红色(的) yellow 黄色(的) green 绿色(的) blue 蓝色(的) black 黑色(的) white 白色(的) purple 紫色(的) brown 棕色(的);褐色(的) the 指已提到或易领会到的人或事物 now 现在;目前 see 理解;明白 can 能;会 say 说,讲 my 我的 S (尤指服装的尺码)小号的 M (尤指服装的尺码)中号的 L (尤指服装的尺码)大号的 UFO 不明飞行物 CCTV 中国中央电视台 Unit 1 name 名字;名称 nice 令人愉快的;宜人的 to 常用语原形动词前,表示该动词为不定式 meet 遇见;相逢 too 也;又;太 your 你的;你们的 Ms. (用于女子的姓氏或姓名前,不指明婚否)女士his 他的 and 和,又,而 her 她的 yes 是的;可以 she 她 he 他 no 不;没有;不是 not 不;没有 zero 零 one 一 two 二 three 三 four 四 five 五

2017年新版人教版go_for_it_七年级上册英语单词

七年级上英语单词表 Starter Unit 1 good /gud/ adj. 好的 morning /'m?:ni?/ n. 早晨;上午 Good morning! 早上好! hi /hai/ interj. (用于打招呼)嗨;喂 hello /h?'l?u/ interj. 你好;喂 afternoon /,a:ft?'nu:n/ n. 下午 Good afternoon! 下午好! evening /'i:vni?/ n. 晚上;傍晚 Good evening! 晚上好! how /hau/ adv. 怎样;如何 are /a:/ v. 是 you /ju:/ pron. 你;你们 How are you? 你好吗? I /ai/ pron. 我 am /?m/ v. 是 fine /fain/ adj. 健康的;美好的 thanks /θ??ks/ interj.&n. 感谢;谢谢 OK /?u'kei/ interj.& adv. 好;可以 Starter Unit 2 what /w?t/ pron.&adj. 什么 is /iz/ v. 是 this /eis/ pron. 这;这个 in /in/ prep. (表示使用语言、材料等)用;以 English /'i?gli?/ n. 英语 adj. 英格兰的;英语的 in English 用英语 map /m?p/ n. 地图 cup /k?p/ n. 杯子 ruler /'ru:l?/ n. 尺;直尺 pen /pen/ n. 笔;钢笔 orange /'?rind?/ n. 橙子 jacket /'d??kit/ n. 夹克衫;短上衣 key /ki:/ n. 钥匙 quilt /kwilt/ n. 被子;床罩 it /it/ pron. 它 a /?/ art. (用于单数可数名词前,表示未曾提到的)一(人、事、物) that /e?t/ pron. 那;那个 spell /spel/ v. 用字母拼;拼写 please /pli:z/ interj. (用于客气地请求或吩咐)请 Starter Unit 3 color /'k?l?/ n. (=colour) 颜色red /red/ adj.& n. 红色(的) yellow /'jel?u/ adj.& n. 黄色(的) green /gri:n/ adj.& n. 绿色(的) blue /blu:/ adj.& n. 蓝色(的) black /bl?k/ adj.& n. 黑色(的) white /wait/ adj.& n. 白色(的) purple /'p?:pl/ adj.& n. 紫色(的) brown /braun/ adj.& n. 棕色(的);褐色(的) the /ei; e?/ art. 指已提到或易领会到的人或事物 now /nau/ adv. 现在;目前 see /si:/ v. 理解;明白 can /k?n/ modal v. 能;会 say /sei/ v. 说;讲 my /mai/ pron. 我的 Unit 1 name /neim/ n. 名字;名称 nice /nais/ adj. 令人愉快的;宜人的 to /tu:/ 常用于原形动词之前,表示该动词为不定式meet /mi:t/ v. 遇见;相逢 too /tu:/ adv. 也;又;太 your /j?:/ pron. 你的;你们的 Ms. /miz/ (用于女子的姓氏或姓名前,不指明婚否)女士his /hiz/ pron. 他的 and /?nd/ conj. 和;又;而 her /h?:/ pron, 她的 yes /jes/ interj. 是的;可以 she /?i:/ pron. 她 he /hi:/ pron. 他 no /n?u/ interj. 不;没有;不是 not /n?t/ adv. 不;没有 zero /'zi?r?u/ num. 零 one /w?n/ num. 一 two /tu:/ num. 二 three /θri:/ num. 三 four /f?:/ num. 四 five /faiv/ num. 五 six /siks/ num. 六 seven /'sevn/ num. 七 eight /eit/ num. 八 nine /nain/ num. 九 telephone /'telif?un/ n. 电话;电话机 number /'n?mb?/ n. 号码;数字 phone /f?un/ n. 电话;电话机 telephone/phone number 电话号码 first /f?:st/ adj. 第一 first name 名字 last /la:st/ adj. 最后的;末尾的 last name 姓

人教版go-for-it-英语七年级上重点短语及句型

英语七年级上册重点句型归纳Starter Unit 1-3 1.Good morning/afternoon/evening(to sb)!早上好,下午好, 晚上好! 2.–How are you? –I’m fine, thanks.你好吗?我很好,谢谢。 3.–How is he? – He is fine. 4.–Hello! –Hi !你好! 5.–What’s this/that in English ? 这个/那个用英语怎么说? It’s a jacket./an orange. 它是一件夹克/一个橘子。 6.Spell it, please. 请拼写。 7.--What color is it ? – It’s yellow. 它是什么颜色?它是黄 色的。 Unit1 My name is Gina. 1.-What’s your name? -My name's Gina. = I’m Gina. 你的名字是什么? 我的名字是吉娜。我是吉娜。 2.-What’s his/her name? 他/她的名字是什么? - His /Her name’s Tom/ Gina. 他/她的名字是汤姆/吉娜。 = He’s /She’s Tom/ Gina. 他/她叫汤姆/吉娜。 3.- Is she Mary? –Yes, she is./ No, she isn’t. 她是玛丽吗?是的,她是。不,她不是。 4.-Are you Helen? –Yes, I am。/ No, I’m not. 你是海伦吗?是的,我是。不,我不是。 5. A: What's your telephone number? 你的电话号码是多少?B: My phone number is 281-917 6. 我的电话号码是 281-9176。 6.-Nice to meet/see you. -Nice to meet/see you, too. 见到你很高兴。见到你也很高兴. 7. last name=family name=last name姓氏 first name = given name名字 8.telephone number=phone number电话号码 Unit2 This is my sister. 1. This/That is my friend Jane. 这是/那是我的朋友简。 2. These/Those are my brothers. 这些/哪些是我的哥哥。 3. Have a good day! 玩得开心。 4. Here are two nice photos of my family. 这儿有两张我漂亮的全家照。 Here is a photo of my family. 这儿有一张我的全家福。5.in the next picture.在下一张照片里6.in the first photo 在第一张照片里 7.a photo of your family 你家人的照片 Unit3 Is this your pencil? 1.-Is this/that your pencil? 这/那时你的铅笔吗? -Yes, it is./ No, it isn’t.是的,它是。/不,它不是。 2. Are these/those her keys? 这/那些是她的钥匙吗? -Yes, they are ./ No, they aren’t. 是,它们是。/不,它们不是。 3. It’s mine. /hers./his. 它是我的。/她的。/他的。 They’re mine.它们是我的。 4. Excuse me 打扰一下。 5. what about…=how about…怎么样 What about this dictionary? 这本字典怎么样呢? 6. Thanks for+n./doing sth为…而感谢 Thank you for your help.谢谢你的帮助。 Thanks for helping me .谢谢你帮助我。 7. You’re welcome. 不用谢。 9.How do you spell it? 你怎么拼写它。 10.in the school library. 在学校图书馆里 11.ask …for …向某人要某物 Ask the teacher for it 向老师那里拿它 12.call/e-mail sb at …打电话/发邮件给某人。 13.I must find it.我必须找到它。 14.I lost/ found sth. 我丢失/ 找到某物 15.a set of…一副/套 a set of keys一串钥匙 16.Lost and Found失物招领 Unit4 Where’s my schoolbag? 1.-Where’s the map? 地图在哪里? -Where’re my books? 我的书在哪里? Is it on your desk? 2. on the sofa 在沙发上 in the schoolbag 在书包里 under the bed 在床下 3.I don’t know.我不知道。 4 ,On one’s head 5,model plane 6,tape player 7,in the bookcase 8 In the schoolbag ‘ 9 On the desk 10 On the bed 11.I’m tidy, but Gina is not.我很整洁,但吉娜不。 12.in our room 在我们的房间 13.books and tapes 书和磁带 14.Gina’s books are everywhere. 吉娜的书到处都是。 15.Gina always asks.吉娜总是问。 16 , come on 17 On your head Unit5 Do you have a soccer ball? 1.- Do you have a soccer ball?你有一个足球吗? -Yes, I do./ No, I don't. 有,我有。/不,我没有。 2.- Does she have a tennis ball? 她有一个网球吗? -Yes,she does./ No, she doesn't 有,她有。/不,她没有。 3.I have a volleyball./ I don’t have a volleyball. 我有/没有一个 排球。 4. He has two ping-pong bats. 他有两个乒乓球拍。 He doesn’t have two ping-pong bats. 他没有两个乒乓球拍。 5.let’s = let us + do sth 让我们做某事 Let’s go. 让我们走。Let me get it.我去拿它。 6.play basketball打篮球play volleyball打排球 play soccer 踢足球play ping-pong打乒乓球 play baseball 打棒球play tennis 打网球 play computer games打电子游戏 7. We’re late. 我们要迟到了。be late for 迟到 8. That sounds good.那听起来很不错。 That sounds interesting/fun/relaxing/boring/difficult. 那听起来很有趣/放松/无聊/困难。 9. watch TV 看电视 10.play sports with our classmates 和我的同学做运动 11.go to the same school 去同一间学校上学。 12.at school 在学校 13.only watch them on TV 只在电视上看它们 14.It’s adj(形容词)for sb.对某人来时怎么样。 It’s easy for me. 对我来说它很容易。 15.after class 下课后after school 放学后 Unit6 Do you like bananas? 1.A: Do you like tomatoes? 你喜欢西红柿吗? B: Yes, I do./No, I don't. I don't like tomatoes 是的,我喜欢。不,我不喜欢。我不喜欢西红柿。 -Does your father like carrots? 你的爸爸喜欢胡萝卜吗? - Yes, he does./ No, he doesn't. He doesn’t like carrots. 是的,他喜欢。/不,他不喜欢。他不喜欢胡萝卜。 2.sb’s birthday dinner 某人的生日晚宴 3.next week 下周 4. think about 考虑 4.some fruit/food 一些水果/食物 5.Let’s have ice-cream. 让我们吃冰激凌吧。 6.eat well 吃得好 7.ask…about …向某人询问某物 8.eating habits 饮食习惯 9.What fruit do you like?你喜欢什么水果? 10.for breakfast/lunch/dinner 就早/午/晚餐而言 11.It’s healthy. 它是健康的。 12.I really like it. 我真的喜欢它。 13.I like chicken for dinner. 晚餐我喜欢吃鸡肉。 14.one last question 最后一个问题 15.after dinner 晚饭后 16.I don’t want to be fat.我不想变胖。 Unit7 How much are these socks? 1.Can I help you ?= What can I do for you ? 我能帮助你 吗? 2.(单数)It looks nice.它看起来很漂亮。 (复数)They look nice.它们看起来漂亮。 3.three dollars for two pairs 两双三美元 4.Here you are. 给你。 5.I’ll take it/ them .我将买下它/它们。 6.-How much is the hat? 帽子多少钱? -It’s five dollars. 它五美元。 6.-How much are these socks ? - They’re two dollars. 这双袜 子多少钱?两美元。 https://www.360docs.net/doc/ef12620454.html,e and buy sth 来买某物 Come/go to do sth 来/去做某事 17.at our great sale 商品大减价、大甩卖 18.at good prices (复数)/ at a good price(单数) 以优惠的价格 19.green sweaters for only 15$ 绿色毛衣仅售15美元 20.skirts in purple 紫色的短裙 sb/sth in + 颜色着某颜色的人/物 21.clothes store 服装店 22.a pair of shorts/ trousers/ socks/ shoes 一双短裤/长裤/短裤/鞋子 14.基数词ten, eleven, twelve, thirteen, fifteen, nineteen, twenty, twenty-one, thirty thirty-nine. 10 ,11,12,13,15,19,20,21,30,39 精选

相关文档
最新文档