Information Storage Capacity of Crossbar Switching Networks

Similar documents
RECENT advances in nanotechnology have enabled the development

Test Generation for Designs with Multiple Clocks

Total Ordering on Subgroups and Cosets

1.1.1 Algebraic Operations

Codes for Partially Stuck-at Memory Cells

On Application of Output Masking to Undetectable Faults in Synchronous Sequential Circuits with Design-for-Testability Logic

Maximum Achievable Gain of a Two Port Network

Blame and Coercion: Together Again for the First Time

Implementing Memristor Based Chaotic Circuits

Copyright 1996, by the author(s). All rights reserved.

REPRESENTATION THEORY OF S n

Extension of continuous functions in digital spaces with the Khalimsky topology

CS 436 HCI Technology Basic Electricity/Electronics Review

Short cycles in random regular graphs

Counting Matrices Over a Finite Field With All Eigenvalues in the Field

Integer Least Squares: Sphere Decoding and the LLL Algorithm

Tight Bounds on the Diameter of Gaussian Cubes

ON THE SET OF REDUCED φ-partitions OF A POSITIVE INTEGER

Decomposing dense bipartite graphs into 4-cycles

Copyright 1972, by the author(s). All rights reserved.

Geometric interpretation of signals: background

Regular Sparse Crossbar Concentrators

On Detecting Multiple Faults in Baseline Interconnection Networks

We say that the base of the decimal number system is ten, represented by the symbol

Maximal Symmetric Difference-Free Families of Subsets of [n]

Decomposing planar cubic graphs

Adaptive Online Gradient Descent

Explicit Constructions of Memoryless Crosstalk Avoidance Codes via C-transform

IMPLEMENTATION OF PROGRAMMABLE LOGIC DEVICES IN QUANTUM CELLULAR AUTOMATA TECHNOLOGY

Capacitors. Chapter How capacitors work Inside a capacitor

arxiv: v2 [math.fa] 27 Sep 2016

Asymptotic redundancy and prolixity

directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time

Improved High-Order Conversion From Boolean to Arithmetic Masking

CONWAY S COSMOLOGICAL THEOREM

Decomposing oriented graphs into transitive tournaments

Security in Locally Repairable Storage

On-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins.

Security Level of Cryptography Integer Factoring Problem (Factoring N = p 2 q) December Summary 2

Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming

Basic counting techniques. Periklis A. Papakonstantinou Rutgers Business School

THE LOGIC OF COMPOUND STATEMENTS

Electric-Energy Generation Using Variable-Capacitive Resonator for Power-Free LSI: Efficiency Analysis and Fundamental Experiment

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

PATH BUNDLES ON n-cubes

K K.OA.2 1.OA.2 2.OA.1 3.OA.3 4.OA.3 5.NF.2 6.NS.1 7.NS.3 8.EE.8c

Conjecture 4. f 1 (n) = n

David Sagan. The standard analysis for a coupled lattice is based upon the formalism of Edwards

The Channel Capacity of One and Two-Dimensional Constrained Codes. Xuerong Yong Department of Computer Science Hong Kong UST

Title. Citation Information Processing Letters, 112(16): Issue Date Doc URLhttp://hdl.handle.net/2115/ Type.

The Singapore Copyright Act applies to the use of this document.

MITOCW Lec 11 MIT 6.042J Mathematics for Computer Science, Fall 2010

Asymptotic enumeration of sparse uniform linear hypergraphs with given degrees

On Optimal Physical Synthesis of Sleep Transistors

Approximation Metrics for Discrete and Continuous Systems

Low complexity two-dimensional weight-constrained codes

Boolean Algebra CHAPTER 15

Stability Analysis of Predator- Prey Models via the Liapunov Method

Counting k-marked Durfee Symbols

A Viability Approach to Liapunov's Second Method

Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation

On Locating-Dominating Codes in Binary Hamming Spaces

Part III. 10 Topological Space Basics. Topological Spaces

BOOLEAN ALGEBRA INTRODUCTION SUBSETS

Feasibility Study of Capacitive Tomography

ENEE 457: Computer Systems Security 09/19/16. Lecture 6 Message Authentication Codes and Hash Functions

Math Precalculus I University of Hawai i at Mānoa Spring

CHAPTER 1. Relations. 1. Relations and Their Properties. Discussion

IN this paper, we consider the capacity of sticky channels, a

I. INTRODUCTION. CMOS Technology: An Introduction to QCA Technology As an. T. Srinivasa Padmaja, C. M. Sri Priya

Partitions, permutations and posets Péter Csikvári

Copyright 1984, by the author(s). All rights reserved.

FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES

THE COMMUNICATIONS COMPLEXITY HIERARCHY IN DISTRIBUTED COMPUTING. J. B. Sidney + and J. Urrutia*

Integrated CME Project Mathematics I-III 2013

Chapter12. Relations, Functions, and Induction

Optimum Circuits for Bit Reversal

SCHUR-WEYL DUALITY FOR U(n)

DocumentToPDF trial version, to remove this mark, please register this software.

A Novel LUT Using Quaternary Logic

Week No. 06: Numbering Systems

THE information capacity is one of the most important

On Powers of some Intersection Graphs

THE REPRESENTATION THEORY, GEOMETRY, AND COMBINATORICS OF BRANCHED COVERS

Optimization Methods in Management Science

CDM. Recurrences and Fibonacci

An Optimal Control Approach to National Settlement System Planning

Analysis and Synthesis of Weighted-Sum Functions

Characterizing Geometric Designs

A Note on the Recursive Calculation of Incomplete Gamma Functions

Common Knowledge and Sequential Team Problems

ADVANCED CALCULUS - MTH433 LECTURE 4 - FINITE AND INFINITE SETS

CDM. Recurrences and Fibonacci. 20-fibonacci 2017/12/15 23:16. Terminology 4. Recurrence Equations 3. Solution and Asymptotics 6.

arxiv: v2 [cs.ds] 3 Oct 2017

Math 564 Homework 1. Solutions.

Multiple-Valued Logic Memory System Design Using Nanoscale Electrochemical Cells

CIS 2033 Lecture 5, Fall

Statistical process control of the stochastic complexity of discrete processes

Testing Problems with Sub-Learning Sample Complexity

Transcription:

Information Storage Capacity of Crossbar Switching etworks ABSTRACT In this work we ask the fundamental uestion: How many bits of information can be stored in a crossbar switching network? The answer is trivial when the switches of the network are in series with diodes (semi-conductive) but it is complicated when the switches are regular contacts. Exact explicit expressions and simple asymptotic bounds of the storage capacity (in bits) are derived for the general crossbar switching network with regular contact switches. Keywords Capacity, Crossbar, Device, Information, Memory, etwork, anotechnology, anotube, anowire, Storage, Switching. Paul P. Sotiriadis Department of Electrical and Computer Engineering Johns Hopkins University Baltimore MD 8,USA pps@hu.edu asymptotic bounds are given. A more compact exact expression as well as an asymptotic expression of the storage capacity can be found in a follow up work [9]. We consider general crossbar switching networks whose switches between each horizontal and each vertical wire are regular contacts with two possible states, one of high and one of low resistance. This is in contrast to crossbar switching networks whose switches have semi-conductive properties as that shown in Figure.. ITRODUCTIO Crossbar switching networks (CSs) have been used extensively in communication and computation systems. Recent advances in nanotechnology have enabled the construction of crossbar switching structures using nano-sized wires [], []. The small size and high density of these structures have motivated the study of their possible applications as high density interconnect, computation and information storage devices []-[8]. The storage capacity of crossbar switching networks, Figure, is derived in this paper. Both exact explicit expressions and simple Horizontal Wires Vertical Wires M Figure. M crossbar switching network Permission Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, reuires prior specific permission and/or a fee. GLSVLSI 0, April 8-9, 00, Washington, DC, USA. Copyright 00 ACM -58-677-/0/0004...$5.00. i Figure. Switches in series with (ideal) diodes. IFORMATIO STORAGE I CSS In order to proceed in estimating the information capacity of a general M CS like that of Figure, we make two assumptions that should be considered reasonable for every practically useful implementation. First, the M switches are assumed to have a high ratio of r off r on resistance and can be switched on and off independently of each other. Second, the ratio of r off over the total resistance of a wire (or nanotube) is assumed to be relatively high. In the analysis that follows these assumptions allow us to think of CSs as being composed out of ideal switches and ideal wires With a pair ( i, ) of wires we mean the pair of the i th horizontal and th vertical wire. The pair ( i, ) also corresponds to the position of the switch between those two wires. For pictorial simplification we put a black dot at the intersection of the pair ( i, ) to represent a closed switch. The convention is shown in Figure below. Figure. otational convention: closed switches are shown as dots 45

. Switches with and without diodes Suppose for the moment that all switches were in series with ideal diodes (the cathodes are connected to horizontal wires), exactly as in Figure. Moreover, suppose that the M switches have a given on-off configuration. In order to extract the particular configuration we can do a series of M experiments: For every pair ( i, ), i,,,,,,, M we measure the current I i,, see Figure 4. If I i, is non-negligible (recall the two assumptions we made) we conclude that the switch ( i, ) is closed. I i, i Figure 6. Two different configurations of a CS having the same conductivity proprties. ote that the configurations of Figure 6 cannot be distinguished based on the states of their switches (i.e. the left configuration has all switches closed while the right one has only three one them closed.) This is because the switches are not directly accessible to the outside of the CS, the switches are hidden inside the CS, Figure 7. In this sense, the two configurations above have to be considered as being identical. The above examples and discussion can be directly extended to the case of the general M CS. Therefore we are forced to think of its different configurations as ( + M) -terminal electrical devices because it is their (total) electrical behavior that differentiates them and not the setup of the switches. Vertical Wires M Figure 4. Extracting the configuration of a CS that has semi-conductive switches. The important point here is that the M connections are independent in the sense that the measured current, Figure 4, depends on the state of switch ( i, ) and it is independent of the state of any other switch. Whereas, in the case of the CS of Figure this is not true. For example, performing the same experiment for the pair (, ) in the two different configurations of Figure 5 we get the same result. Horizontal Wires Figure 7. The CS seen as an + M terminal device Figure 5. Two configurations of a CS. Therefore in the case of CSs without diodes, the results of the different experiments are neither independent nor they correspond to uniue states of the particular switches. ow, suppose that instead of examining individual pairs of wires we consider the set of all M experiments as a whole. By doing so we conclude that the pairs of connected wires in the left configuration of Figure 5 are: (, ) and (, ) while the pairs of connected wires in the right configuration are: (, ), (, ), (, ) and (, ). This allows us to distinguish the two configurations of Figure 5. The same is not true though for the two configurations in Figure 6. ote that in the case of the switching network of Figure there are exactly M possible electrical behaviors, or euivalently electrical devices, that can be realized by the different configurations of the switches. In this sense we can say that the information capacity of the network is M log M bits (throughout the paper log stands for the logarithm base ). Similarly, suppose that the network of Figure can realize D electrical devices by the different configurations of its switches. Then, its storage capacity is B logd. In order to proceed in the calculation of B it is important to give some more formal definitions, this is done in the following section. 46

. THE UMBER OF DEVICES Definition : A device D is a CS of Figure along with a configuration of its switches. To simplify our discussion we use the subscript h for the horizontal wires and the subscript v for the vertical wires of the CS. Then the set of all wires is: T { h, h,, h, v, v M v }. Following our discussion in Section, every device is uniuely characterized by the way its wires are connected to each other. In other words, the device is uniuely characterized by the partition of the set T into maximal subsets of wires that are electrically connected. Such a partition will be called the connectivity partition of the device. Example : The connectivity partitions of the devices in Figure 5 are, P D {{ h, h, v }, { v }} and P D {{ h, h, v, v }} respectively. The first one has two blocks (i.e. connected components) while the second has only one. Definition : Two devices D, D are identical if and only if they have the same connectivity partition. Example : In Figure 8 we see the sixteen configurations of the switches of a CS. There are only devices (i.e. electrical behaviors) that are realized. The last 5 configuration realize the same device since all wires are connected together. : A simple asymptotic lower bound of the number of bits B that can be stored in an CS is derived in the following lemma. Lemma : The information capacity, B, of an, CS is asymptotically eual to or greater than log bits as. Proof: There are! configurations of the switches such that every horizontal wire is connected to exactly one vertical wire. The situation is shown in Figure 9. 4 4 Figure 9. - connection of the wires For every there is some θ n, with θ n e, such that [0]:! π ( + ) + e ( + ) θ n log! Therefore we have as. log The following theorem provides an exact expression of the information capacity of an M CS. The expression involves the Stirling numbers of the second kind Snm (, ). By its definition Snm (, ) is the number of distinct ways that a set of n elements can be partitioned into m non-empty subsets [0]. A convenient expression of Snm (, ) is given by (), see for example [].. : : 4: 5: Snm (, ) m - ( ) m! m t m t n t t 0 () 6: 7: Theorem : The information capacity of an M CS is B logd where D is given by expression () and Snm (, ) is the Stirling number of the second kind. 8: 9: 0: : D + i 0 M 0 min{ i, M } M S ( i, )SM (, )! i () : Figure 8. The 6 configurations of a CS and the devices they realize. Instead of enumerating the devices using a brute force, which is not an easy task, we use the following standard trick of combinatorics to prove the theorem. We construct a biective map between the set of devices and another set whose elements we can enumerated easier. This is done in the following lemma. ote that the sets of the horizontal and the vertical wires of an M CS are denoted by H { h, h h } and V { v, v,, M v } respectively. Moreover for any two sets A, B, A B includes the case A B and A is the number of elements in the set A. 47

Lemma : The set of connectivity partitions of an M CS can be mapped biectively into the set of six-tuples ( HVPRf,,,,, ) that (are defined below and) have the following properties:. H H, it may be H.. V V, it may be V.. : nonnegative integer s.t. 0 min{ H, M V }. 4. If > 0, P is a partition of H H into non-empty subsets otherwise P. 5. If > 0, R is a partition of V V into non-empty subsets, otherwise R. 6. A biective map f from P to R. (if 0 then f is taken to be the dummy function f d :{ 0} { 0} Proof of lemma : Given a device D let P D { T, T T r } be its connectivity partition for some positive integer r. Also let H be the set of horizontal wires that are not connected to any vertical wire. Similarly, let V be the set of vertical wires that are not connected to any horizontal wire. We set, i H, V and r i. (It may be i 0 or 0 ). Proof of theorem : There is the trivial case H H and V V where no wire is connected to any other wire. (ote that if one of these eualities holds then the other one must hold as well because it is impossible to have all horizontal wires disconnected while some of the vertical ones are connected to each other and via versa.) We count for the above case and exclude it in the following analysis. Given some i 0,,, and 0,,, M we choose the sets of disconnected horizontal and vertical wires H H and V V such that H i and V. There are M ways to do so. For, i,,, min { H, M V } we choose partitions P and R of H H and V V respectively, each having exactly blocks. By the definition of the second Stirling numbers there are S ( i, )SM (, ) ways of doing so. Finally, for every partition pair ( PR, ) there are! distinct biective mappings from P to R. Summarizing the above we get expression (). Example : Figure 0 presents the graph of the capacity B of CSs with ranging from one to one hundred along with the two asymptotic bounds log and log of lemma and corollary (see next page) respectively. 400 00 Without loss of generality we can assume that all elements in H and V are contained in the last r i+ blocks of P D, i.e. H V T + T r. (ote that in this case T +,,..., are singletons.) Also note that each of the remaining T + T r subsets T, T,..., T must contain at least one horizontal and one vertical wire. For every k,,, we can decompose T k Bits 000 800 600 log B into T k H k V k where H k H and V k V. We define P, R to be the partitions P { H, H,, H }, 400 log R { V, V V } of the sets H H and V V respectively. ote that P and R are connectivity partitions. 00 Up to here we have shown that P D implies the five-tuple ( HVPR,,,, ). The six-tuple is completed by the mapping f from P to R such that f( H k ) V k for every k,,,, assuming that > 0. If 0 we set f to be the dummy function f d defined in property 6 of the lemma. To go from a six-tuple ( HVPRf,,,,, ) to a connectivity partition P D, and so to the corresponding device D, we switch-on all switches ( ab, ) such that a belongs to some S, S P and b belongs to f( S). We switch-off all the remaining switches. Finally, it is straight forward to verify that the mapping between connectivity partitions and the set of six-tuples is biective. 0 0 0 40 60 80 00 Figure 0: Information Capacity B of CSs with,,, 00. There are alternative expressions of the number of devices D. One of them is given in lemma and is used in the derivation of an asymptotic upper bound of B in corollary below. Using more involved mathematical analysis it is possible to get other more compact expressions of B. A few can be found in [9] along with a simple asymptotic expression. 48

Lemma : The number of devices D can be expressed as: D + min{, M} i 0 M 0 M S ( i, )SM (, )! () i Proof: The proof is similar to that of theorem. Here we count first with respect to the number of the blocks in the partitions of the sets of the connected wires. Then we count with respect to the number of disconnected horizontal and vertical wires. Corollary : The information capacity of an asymptotically less than log bits as. Proof: Starting from euation () we have: CS is Therefore we have logd log( + ) + 4log( e) and the proof of the lemma is complete. 4. COCLUSIOS The information storage capacity of crossbar switching networks, with regular contact switches, was derived explicitly. It was also shown that the capacity of an network is asymptotically between log and log. Comparing the result to the information capacity of crossbar switching networks with semi-conducting switches, which is, we conclude that the later ones, if available, are much more efficient as information storage devices. D + From () we have that: similarly we have: i 0 i 0 0 0 Replacing (5) and (6) into (4) we get: D S ( i, )S (, )! i S ( i, )S (, )! i S ( i, ) ( )! k k k i 0!! k 0 S (, )! 0 k 0 r 0 k 0 r 0 i! r 0 i r r k 0 r 0 i 0 0! k 0 k k i ( + k) ( + r) ( + )! k 0 r 0 ( + )! ( + ) 4! ( + ) e4 k k ir ir i (4) (5) (6) 5. REFERECES [] T. Rueckes, K. Kim, E. Jose-levich, G. Y. Tseng, C.L. Cheung, and C.M. Lieber, Carbon nanotube based non-volatile random access memory for molecular computing, Science, o. 89, pp. 94 97, 000. [] P.J. Kuekes, S. Williams and J.R. Heath, Molecular Wire Crossbar Memory, US Patent 6,8,4, Oct. 000. [] J.R. Heath, P.J. Kuekes, G.S. Snider, R.S. Williams, A Defect-Tolerant Computer Architecture: Opportunities for anotechnology, Science, Vol. 80, June 998. [4] S.C. Goldstein, M. Budiu, anofabrics: spatial computing using molecular electronics, Int. Symp. on Computer Architecture, pp. 78-89, 00. [5] P.J. Kuekes, R.S. Williams, Demultiplexer for a molecular wire crossbar network (MWC DEMUX), US Patent 6,56,767 B, July 00. [6] P.J. Kuekes, R.S. Williams, J.R. Heath, Molecular-Wire Crossbar Interconnect (MWCI) for Signal Routing and Communications, US Patent 6,4,09 B, ov. 00. [7] A. DeHon, Array-based architecture for molecular electronics, st. workshop on-silicon Comp. (SC-), 00. [8] M.M. Ziegler, M.R. Stan, Design and analysis of crossbar circuits for molecular nanoelectronics, IEEE Conf. on anotechnology, pp. -7, 00. [9] P. P. Sotiriadis, On the Information Storage Capacity of Crossbar Switching etworks, Electronics Letters (subm). [0] J.H. Van Lint and R.M. Wilson, A Course in Combinatorics, Cambridge University Press 999. [] M. Abramowitz and I.A. Stegun, Handbook of Mathematical Functions, ational Bureau of Standards, 6th edition, ov. 967 49