GIAN Course on Distributed Network Algorithms. Network Topologies and Interconnects

Size: px
Start display at page:

Download "GIAN Course on Distributed Network Algorithms. Network Topologies and Interconnects"

Transcription

1 GIAN Course on Distributed Network Algorithms Network Topologies and Interconnects Stefan T-Labs, 2011

2 The Many Faces and Flavors of Network Topologies Gnutella P2P. Social Networks. Internet. Smart grid. Wireless network before topology control Datacenter network Nervous system.

3 The Many Faces and Flavors of Network Topologies Also depends on the abstraction: router level topology vs Autonomous System topology? Gnutella P2P. Social Networks. Internet. Smart grid. Wireless network before topology control Datacenter network Nervous system.

4 The Many Faces and Flavors of Network Topologies given (social network) semi or unstructured (according to simple join protocol) subject to optimization (datacenter or structured p2p) Gnutella 2001 (unstructured p2p system) Chord DHT (structured p2p system)

5 The Many Faces and Flavors of Network Topologies given (social network) semi or unstructured (according to simple join protocol) subject to optimization (datacenter or structured p2p) Gnutella 2001 (unstructured p2p system) Chord DHT (structured p2p system) What makes a good network topology?

6 Properties of a good network topology? It depends! E.g., support simple and efficient routing! e.g., low diameter and short routes (wrt #hops, latency, energy,...?), no state needed at routers (destination address defines next hop), good expansion (fast information dissemination and gossip), etc. E.g., scalable! e.g., small number of neighbors to store (and maintain?), low degree, large bisection bandwidth / cutwidth, redundant paths / no bottleneck links,... E.g, robustness (random or worst-case failures?): e.g., symmetric structure, no single point of failure, redundant paths, good expansion, large mincut, k-connectivity,... Etc.! 6

7 Small diameter does not necessarily imply short routes! Especially in distributed setting. Need good algorithm! Remember the maze Properties of a good network topology? It depends! E.g., support simple and efficient routing! e.g., low diameter and short routes (wrt #hops, latency, energy,...?), no state needed at routers (destination address defines next hop), good expansion (fast information dissemination and gossip), etc. E.g., scalable! e.g., small number of neighbors to store (and maintain?), low degree, large bisection bandwidth / cutwidth, redundant paths / no bottleneck links,... E.g, robustness (random or worst-case failures?): e.g., symmetric structure, no single point of failure, redundant paths, good expansion, large mincut, k-connectivity,... Etc.! 7

8 Example: Is the Gnutella P2P network robust?

9 Example: Is the Gnutella P2P network robust? It depends

10 Example: Is the Gnutella P2P network robust? It depends all connections 30% random peers removed: still mostly connected ( giant component ), robust to random failures / leaves 4% highest degree peers removed: many disconnected components, not robust Measurement study 2001 with ~2000 peers: [Saroiu et al. 2002]

11 Network Topologies = Graphs Network topologies are often described as graphs! Graph G=(V,E): V = set of nodes/peers/..., E= set of edges/links/...? d(.,.): distance between two nodes = shortest path, e.g. d(a,d)=? D(G): diameter (D(G)=max u,v d(u,v)), e.g. D(G)=? (U): neighbor set of nodes U (not including nodes in U) (U) = (U) / U (size of neighbor set compared to size of U) (G) = min U, U <V/2 (U): expansion of G (meaning?)? Expansion captures bottlenecks! A C D B

12 Network Topologies = Graphs Network topologies are often described as graphs! Graph G=(V,E): V = set of nodes/peers/..., E= set of edges/links/... 3 d(.,.): distance between two nodes = shortest path, e.g. d(a,d)=? D(G): diameter (D(G)=max u,v d(u,v)), e.g. D(G)=? (U): neighbor set of nodes U (not including nodes in U) (U) = (U) / U (size of neighbor set compared to size of U) (G) = min U, U <V/2 (U): expansion of G (meaning?) 3 Expansion captures bottlenecks! A C D B

13 Example: Expansion (U), (U)? A U C D B 13

14 Example: Expansion (U), (U)? A U bottleneck! C D B (U) = {C} Therefore: (U)=1/3 14

15 Example: Expansion (U), (U)? A U bottleneck! C D B (U) = {C} Therefore: (U)=1/3 Worst possible: so also expansion of the whole graph! 15

16 The Clique Complete network: pro and cons? Pro: robust, simpleand fast routing, small diameter... Cons: does not scale! (degree?, number of edges?,...) 16

17 The Line Line network: pro and cons? Degree? Diameter? Expansion? Pro: simple and fast routing (tree = unique paths!), small degree (2)... Cons: does not scale! (diameter = n-1) Expansion?

18 The Line Line network: pro and cons? Degree? Diameter? Expansion? Pro: simple and fast routing (tree = unique paths!), small degree (2)... Cons: does not scale! (diameter = n-1, expansion = 2/n,...) Expansion? U (n/2 nodes) (U) (= 1 node)

19 The Line Line network: pro and cons? Degree? Diameter? Expansion? Pro: simple and fast routing (tree = unique paths!), small degree (2)... Cons: does not scale! (diameter = n-1, expansion = 2/n,...) Expansion? Can we reduce diameter without increasing degree by much? U (n/2 nodes) (U) (= 1 node)

20 Good Topologies? Binary tree network: pro and cons? Degree? Diameter? Expansion? 20

21 Good Topologies? Binary tree network: pro and cons? Degree? Diameter? Expansion? Pro: easy and fast routing (tree = unique paths!), small degree (3), log diameter... Cons: bad expansion? 21

22 Good Topologies? Binary tree network: pro and cons? Degree? Diameter? Expansion? Pro: easy and fast routing (tree = unique paths!), small degree (3), log diameter... Cons: bad expansion = 2/n,... G(U) (= 1 node) Expansion: U (~n/2 nodes) All communication from left to right tree goes through root! (no «bisection bandwidth») 22

23 Datacenter Interconnects For this reason, datacenter inter connects form fat-trees: more bandwidth at higher layers which interconnect more nodes. 23

24 Datacenter Interconnects For this reason, datacenter inter connects form fat-trees: more bandwidth at higher layers which interconnect more nodes. More bandwidth for constant bisection bandwidth! Note: more wires, not thicker wires! (Due to ECMP similar effect though?) The Clos topology: one of the most common datacenter interconnects today. 24

25 Datacenter Interconnects For this reason, datacenter inter connects form fat-trees: more bandwidth at higher layers which Servers organized into racks, racks organized into pods. The core routers usually connect to the Internet. interconnect more nodes. The Clos topology: one of the most common datacenter interconnects today. 25

26 Datacenter Interconnects For this reason, datacenter inter connects form fat-trees: more bandwidth at higher layers which Servers organized into racks, racks organized into pods. The core routers usually connect to the Internet. interconnect more nodes. The Clos topology: one of the most common datacenter interconnects today. 26

27 The Mesh 2d Mesh: pro and cons? Degree? Diameter? Expansion? Pro: easy and fast routing (coordinates!), small degree (4), <2 n diameter... Cons: diameter =?, expansion =?

28 The Mesh 2d Mesh: pro and cons? Degree? Diameter? Expansion? Pro: easy and fast routing (coordinates!), small degree (4), <2 n diameter... Cons: diameter = n, expansion = ~2/ n,... (U) = n nodes U ~ n/2 nodes

29 The Hypercube Use identifier manipulation to describe topology and do routing! Here: binary strings Connected iff Hamming distance = 1: flip exactly one bit. 29

30 The Hypercube Formally: d-dim Hypercube: Nodes V = {(b 1,...,b d ), b i binary} (nodes are bitstrings!) Edges E = for all i: (b 1,..., b i,..., b d ) connected to (b 1,..., 1-b i,..., b d )

31 The Hypercube d-dim Hypercube: Nodes V = {(b 1,...,b d ), b i binary} (nodes are bitstrings!) Edges E = for all i: (b 1,..., b i,..., b d ) connected to (b 1,..., 1-b i,..., b d ) Degree? Diameter? Expansion? How to get from (100101) to (011110)?

32 The Hypercube d-dim Hypercube: Nodes V = {(b 1,...,b d ), b i binary} (nodes are bitstrings!) Edges E = for all i: (b 1,..., b i,..., b d ) connected to (b 1,..., 1-b i,..., b d ) d = n nodes, hence d = log(n): degree Diameter: fix one bit after another, so log(n) as well 32

33 The Hypercube d-dim Hypercube: Nodes V = {(b 1,...,b d ), b i binary} (nodes are bitstrings!) Edges E = for all i: (b 1,..., b i,..., b d ) connected to (b 1,..., 1-b i,..., b d ) Simply the maximal Hamming distance! d = n nodes, hence d = log(n): degree Diameter: fix one bit after another, so log(n) as well 33

34 The Hypercube d-dim Hypercube: Nodes V = {(b 1,...,b d ), b i binary} (nodes are bitstrings!) Edges E = for all i: (b 1,..., b i,..., b d ) connected to (b 1,..., 1-b i,..., b d ) Simply the maximal Hamming distance! d = n nodes, hence d = log(n): degree 100 What about expansion? 000 Diameter: fix one bit after another, so log(n) as well

35 Expansion of Hypercube d-dim Hypercube: Nodes V = {(b d,...,b 1 ), b i binary} Edges E = for all i: (b d,..., b i,..., b 1 ) connected to (b d,..., 1-b i,..., b 1 )... Expansion? Find small neighborhood! all nodes with 0x`1 all nodes with 1x`1 all nodes with 2x`1 Idea: nodes with i x`1 are connected nodes with (i-1) x`1 and (i+1) x`1...: 35

36 Expansion of Hypercube Idea: How many nodes? U (~n/2 nodes) (U) = binomial(d,d/2+1)... all nodes with 0x`1 all nodes with 1x`1 all nodes with 2x`1 all nodes with d/2 x`1 all nodes with d/2+1 x`1 36

37 Expansion of Hypercube Idea: How many nodes? U (~n/2 nodes) Number of possibilities to place d/2+1 `1 s at d positions. (U) = binomial(d,d/2+1)... all nodes with 0x`1 all nodes with 1x`1 all nodes with 2x`1 all nodes with d/2 x`1 all nodes with d/2+1 x`1 37

38 Expansion of Hypercube Idea: How many nodes? U (~n/2 nodes) Number of possibilities to place d/2+1 `1 s at d positions. (U) = binomial(d,d/2+1)... all nodes with 0x`1 all nodes with 1x`1 all nodes with 2x`1 all nodes with d/2 x`1 all nodes with d/2+1 x`1 Expansion 1/ (log n) then follows from computing the ratio... 38

39 Expansion of Hypercube Idea: How many nodes? U (~n/2 nodes) Number of possibilities to place d/2+1 `1 s at d positions. (U) = binomial(d,d/2+1)... all nodes with 0x`1 all nodes with 1x`1 all nodes with 2x`1 all nodes with d/2 x`1 Can it even be lower? Also for ball? all nodes with d/2+1 x`1 Expansion 1/ (log n) then follows from computing the ratio... 39

40 Many networks are hypercubic! Many computer networks are variants or generalizations of hypercubes! E.g., peer-to-peer systems (Chord, Pastry, Kademlia,...) E.g., datacenter topologies (container-based datacenters, BCube, MDCCube,...) E.g., parallel architectures (butterfly variants, etc.) 40

41 Many networks are hypercubic! Many computer networks are variants or generalizations of hypercubes! E.g., peer-to-peer systems (Chord, Pastry, Kademlia,...) E.g., datacenter topologies (container-based datacenters, BCube, MDCCube,...) E.g., parallel architectures (butterfly variants, etc.) 41

42 Butterfly: A rolled-out hypercube Bitstrings like hypercube, connected if one bit difference, but not at every position d=1: k={0,1} k=0: k=1: d=2: d+1 (first index) 2 2 d (other indices) but rolled out: just at this position! 42

43 Butterfly: A rolled-out hypercube Bitstrings like hypercube, connected if one bit difference, but not at every position d=1: k={0,1} d=2: Differ in first bit on this level! k=0: Differ in second bit on this level! k=1: d+1 (first index) 2 2 d (other indices) but rolled out: just at this position! 43

44 Butterfly: A rolled-out hypercube Accordingly: 2-dimensional identifier: with the rollout dimension. Bitstrings like hypercube, connected if one bit difference, but not at every position d=1: k={0,1} k=0: k=1: d=2: d+1 (first index) 2 2 d (other indices) but rolled out: just at this position! 44

45 Butterfly: A rolled-out hypercube Formally Butterfly graph: (e.g., for parallel architectures) Nodes V = {(k, b 1...b d ), k ϵ {0,...,d}, b ϵ {0,1} d } (2-dim: number+bitstring ) Undirected edges E = for all i: (k-1, b 1...b k...b d ) connected to (k, b 1...b k...b d ) and (k, b b k...b d ) (i.e., to nodes on next level with same and opposite bit at only this position) Essentially a rolled-out hypercube! d=1: k={0,1} d=2: 0 1 k=0: 0 k=1: Roll-out hypercube into multiple levels: connect i-th bit on i-th level! d (other indices) d+1 (first index) 45

46 Butterfly: A rolled-out hypercube Butterfly graph: (e.g., for parallel architectures) Nodes V = {(k, b 1...b d ), k ϵ {0,...,d}, b ϵ {0,1} d } (2-dim: number+bitstring ) Undirected edges E = for all i: (k-1, b 1...b k...b d ) connected to (k, b 1...b k...b d ) and (k, b b k...b d ) (i.e., to nodes on next level with same and opposite bit at only this position) Essentially a rolled-out hypercube! d=1: k={0,1} k=0: 0 k=1: d=2: d+1 (first index) Diameter, Degree, Expansion? How many nodes in total? 2 2 d (other indices) 46

47 Butterfly: A rolled-out hypercube Butterfly graph: (e.g., for parallel architectures) Nodes V = {(k, b 1...b d ), k ϵ {0,...,d}, b ϵ {0,1} d } (2-dim: number+bitstring ) Undirected edges E = for all i: (k-1, b 1...b k...b d ) connected to (k, b 1...b k...b d ) and (k, b b k...b d ) (i.e., to nodes on next level with same and opposite bit at only this position) Essentially a rolled-out hypercube! d=1: k={0,1} 0 1 k=0: k=1: 0 1 d=2: Diameter, Degree, Expansion? How many nodes in total? d (other indices) d+1 (first index) Degree 4, Diameter 2d (e.g., go to corresponding bottom, then up) 47

48 Butterfly: A rolled-out hypercube Butterfly graph: Nodes V = {(k, b 1...b d ), k ϵ {0,...,d}, b ϵ {0,1} d } Edges E = for all i: (k-1, b 1...b k...b d ) connected to (k, b 1...b k...b d ) and (k, b b k...b d ) Expansion: Halfs only connected where k=d: differ in last bit. So n/d nodes 1 2 U has n/2 nodes. Expansion ~ 1/d. 48

49 CCC: Hypercube with cyclic corners 0,10 1,10 1,11 0,11 0,00 0,01 1,00 1,01 49

50 CCC: Hypercube with cyclic corners Hypercube with round corners : cycles. 0,10 1,10 1,11 0,11 0,00 0,01 1,00 1,01 50

51 CCC: Hypercube with cyclic corners Formally Cube-Connected Cycles: Hypercube with replaced corners (split into d nodes!) Nodes V = {(k, b 1...b d ) k ϵ {0,...,d-1}, b ϵ {0,1} d } Edges E = for all i: (k, b 1...b k...b d ) connected to (k-1, b 1...b k...b d ), (k+1, b 1...b k...b d ) and (k, b b k...b d ) (for each dimension one node!) Example: 1,10 1,11 0,10 0,11 0,00 0,01 1,00 1,01 51

52 De Bruijn Graph: Pull-in bits from the back! Like rolled out hypercube but now it is not bit difference at a certain position which matters, but how strings are shifted wrt to each other!

53 De Bruijn Graph: Pull-in bits from the back! Like rolled out hypercube but now it is not bit difference at a certain position which matters, but how strings are shifted wrt to each other! Shift in Shift in

54 De Bruijn Graph: Pull-in bits from the back! De Bruijn Graph: Nodes V = {(b 1...b d ) ϵ {0,1} d } (bitstrings...) (Undirected) edges E = for all i: (b 1...b k...b d ) Formally connected to (b 2...b d 0) and (b 2... b d 1) ( shift left and add 0 and 1 ) Example (undirected version):

55 De Bruijn Graph: Pull-in bits from the back! De Bruijn Graph: Nodes V = {(b 1...b d ) ϵ {0,1} d } (bitstrings...) (Undirected) edges E = for all i: (b 1...b k...b d ) connected to (b 2...b d 0) and (b 2... b d 1) ( shift left and add 0 and 1 ) Example (undirected version): How to do routing on this graph? 55

56 De Bruijn Graph: Pull-in bits from the back! De Bruijn Graph: Nodes V = {(b 1...b d ) ϵ {0,1} d } (bitstrings...) (Undirected) edges E = for all i: (b 1...b k...b d ) connected to (b 2...b d 0) and (b 2... b d 1) ( shift left and add 0 and 1 ) Example (undirected version): How to do routing on this graph? Fill in destination bits from the left! 56

57 We have seen graphs with diameter-degree pairs: log(n)-log(n) log(n)-o(1) Is there a graph with: O(1)-log(n) max(diameter,degree)< O(log n)?

58 What is the degree-diameter tradeoff? Idea? Proof? Theorem Each network with n nodes and max degree d>2 must have a diameter of at least log(n)/log(d-1)-1. Implications: Constant diameter networks need a linear degree! But also: log(n)-log(n) is not the best tradeoff for minimizing the maximum of degree and diameter!

59 What is the degree-diameter tradeoff? Idea? Proof? Theorem Each network with n nodes and max degree d>2 must have a diameter of at least log(n)/log(d-1)-1. How to prove this? Implications: Constant diameter networks need a linear degree! But also: log(n)-log(n) is not the best tradeoff for minimizing the maximum of degree and diameter!

60 What is the degree-diameter tradeoff? Idea? Proof? Theorem Each network with n nodes and max degree d>2 must have a diameter of at least log(n)/log(d-1) d d-1... Proof by simply counting how many nodes can be reached given a certain degree!

61 What is the degree-diameter tradeoff? Idea? Proof? Theorem Each network with n nodes and max degree d>2 must have a diameter of at least log(n)/log(d-1) In two steps, at most d (d-1) additional nodes can be reached! So in k steps at most: Formally: need to reach n nodes (if connected, i.e., finite diameter). 1 d d-1... Proof by simply counting how many nodes can be reached given a certain degree! To ensure it is connected this must be at least n, so: Reformulating this yields the claim... 61

62 EXERCISE 1: Understand the Pancake Graph O(log n / loglog n) diamter and degree! 62

63 Exercise 1: Pancake Graphs P n 63

64 Pancake Graphs Graph which minimizes max(degree, diameter)! Both in O( log n / log log n ) Nodes = permutations of {1,...,d} Edges = prefix reversals # nodes? degree? d! many nodes and degree (d-1). Routing? E.g., from (3412) to (1243)? Fix bits at the back, one after the other, in two steps, so diameter also log n / log log n. d! = n, so by Stirling formula: d = log(n)/loglog(n) (insert it to d d =n, resp. to d log(d) = log(n)...) 64

65 Solution 1a: Pancake Graphs 65

66 Solution 1b: Degree Pancake Graphs There are n-1 non-trivial prefix reversals for an n-dimensional Pancake with n digits 66

67 Solution 1c: Diameter of Pancake Graphs How to get from node v=v 1...v n to w=w 1...w n? Idea: fix one digit after the other at the back! Two steps: Prefix reversal such that digit is at the front, then full prefix reversal such that digit is at the back Length of routing path: at most 2*(n-1) Papadimitriou and Bill Gates have shown that this is asymptotically also optimal (i.e., close to diameter) 67

GIAN Course on Distributed Network Algorithms. Network Topologies and Local Routing

GIAN Course on Distributed Network Algorithms. Network Topologies and Local Routing GIAN Course on Distributed Network Algorithms Network Topologies and Local Routing Stefan Schmid @ T-Labs, 2011 GIAN Course on Distributed Network Algorithms Network Topologies and Local Routing If you

More information

From Shared Memory to Message Passing

From Shared Memory to Message Passing Message Passing From Shared Memory to Message Passing but pass messages along networks: classic social networks Stefan Schmid T-Labs & TU Berlin Some parts of the lecture (e.g., Skript and exercises) are

More information

Interconnection Networks. Issues for Networks

Interconnection Networks. Issues for Networks Interconnection Networks Communications Among Processors Chris Nevison, Colgate University Issues for Networks Total Bandwidth amount of data which can be moved from somewhere to somewhere per unit time

More information

CS575 Parallel Processing

CS575 Parallel Processing CS575 Parallel Processing Lecture three: Interconnection Networks Wim Bohm, CSU Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 license.

More information

Physical Organization of Parallel Platforms. Alexandre David

Physical Organization of Parallel Platforms. Alexandre David Physical Organization of Parallel Platforms Alexandre David 1.2.05 1 Static vs. Dynamic Networks 13-02-2008 Alexandre David, MVP'08 2 Interconnection networks built using links and switches. How to connect:

More information

Lecture 3: Topology - II

Lecture 3: Topology - II ECE 8823 A / CS 8803 - ICN Interconnection Networks Spring 2017 http://tusharkrishna.ece.gatech.edu/teaching/icn_s17/ Lecture 3: Topology - II Tushar Krishna Assistant Professor School of Electrical and

More information

Lectures 8/9. 1 Overview. 2 Prelude:Routing on the Grid. 3 A couple of networks.

Lectures 8/9. 1 Overview. 2 Prelude:Routing on the Grid. 3 A couple of networks. U.C. Berkeley CS273: Parallel and Distributed Theory Lectures 8/9 Professor Satish Rao September 23,2010 Lecturer: Satish Rao Last revised October 23, 2010 Lectures 8/9 1 Overview We will give a couple

More information

Lecture 2: Topology - I

Lecture 2: Topology - I ECE 8823 A / CS 8803 - ICN Interconnection Networks Spring 2017 http://tusharkrishna.ece.gatech.edu/teaching/icn_s17/ Lecture 2: Topology - I Tushar Krishna Assistant Professor School of Electrical and

More information

The Power of Locality

The Power of Locality GIAN Course on Distributed Network Algorithms The Power of Locality Case Study: Graph Coloring Stefan Schmid @ T-Labs, 2011 Case Study: Graph Coloring Case Study: Graph Coloring Assign colors to nodes.

More information

Small-World Datacenters

Small-World Datacenters 2 nd ACM Symposium on Cloud Computing Oct 27, 2011 Small-World Datacenters Ji-Yong Shin * Bernard Wong +, and Emin Gün Sirer * * Cornell University + University of Waterloo Motivation Conventional networks

More information

CS256 Applied Theory of Computation

CS256 Applied Theory of Computation CS256 Applied Theory of Computation Parallel Computation II John E Savage Overview Mesh-based architectures Hypercubes Embedding meshes in hypercubes Normal algorithms on hypercubes Summing and broadcasting

More information

Randomized Algorithms for Network Security and Peer-to-Peer Systems

Randomized Algorithms for Network Security and Peer-to-Peer Systems Randomized Algorithms for Network Security and Peer-to-Peer Systems Micah Adler University of Massachusetts, Amherst Talk Outline Probabilistic Packet Marking for IP Traceback Network Security Appeared

More information

Peer-to-Peer Computing

Peer-to-Peer Computing Chapter 10 Peer-to-Peer Computing Indeed, I believe that virtually every important aspect of programming arises somewhere in the context of [sorting and] searching! Donald E. Knuth, The Art of Computer

More information

Network Dilation: A Strategy for Building Families of Parallel Processing Architectures Behrooz Parhami

Network Dilation: A Strategy for Building Families of Parallel Processing Architectures Behrooz Parhami Network Dilation: A Strategy for Building Families of Parallel Processing Architectures Behrooz Parhami Dept. Electrical & Computer Eng. Univ. of California, Santa Barbara Parallel Computer Architecture

More information

Interconnection Networks: Topology. Prof. Natalie Enright Jerger

Interconnection Networks: Topology. Prof. Natalie Enright Jerger Interconnection Networks: Topology Prof. Natalie Enright Jerger Topology Overview Definition: determines arrangement of channels and nodes in network Analogous to road map Often first step in network design

More information

Lecture 26: Interconnects. James C. Hoe Department of ECE Carnegie Mellon University

Lecture 26: Interconnects. James C. Hoe Department of ECE Carnegie Mellon University 18 447 Lecture 26: Interconnects James C. Hoe Department of ECE Carnegie Mellon University 18 447 S18 L26 S1, James C. Hoe, CMU/ECE/CALCM, 2018 Housekeeping Your goal today get an overview of parallel

More information

Interconnection networks

Interconnection networks Interconnection networks When more than one processor needs to access a memory structure, interconnection networks are needed to route data from processors to memories (concurrent access to a shared memory

More information

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note 8

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note 8 CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note 8 An Introduction to Graphs Formulating a simple, precise specification of a computational problem is often a prerequisite

More information

Lecture 12: Interconnection Networks. Topics: communication latency, centralized and decentralized switches, routing, deadlocks (Appendix E)

Lecture 12: Interconnection Networks. Topics: communication latency, centralized and decentralized switches, routing, deadlocks (Appendix E) Lecture 12: Interconnection Networks Topics: communication latency, centralized and decentralized switches, routing, deadlocks (Appendix E) 1 Topologies Internet topologies are not very regular they grew

More information

CS 498 Hot Topics in High Performance Computing. Networks and Fault Tolerance. 9. Routing and Flow Control

CS 498 Hot Topics in High Performance Computing. Networks and Fault Tolerance. 9. Routing and Flow Control CS 498 Hot Topics in High Performance Computing Networks and Fault Tolerance 9. Routing and Flow Control Intro What did we learn in the last lecture Topology metrics Including minimum diameter of directed

More information

Recall: The Routing problem: Local decisions. Recall: Multidimensional Meshes and Tori. Properties of Routing Algorithms

Recall: The Routing problem: Local decisions. Recall: Multidimensional Meshes and Tori. Properties of Routing Algorithms CS252 Graduate Computer Architecture Lecture 16 Multiprocessor Networks (con t) March 14 th, 212 John Kubiatowicz Electrical Engineering and Computer Sciences University of California, Berkeley http://www.eecs.berkeley.edu/~kubitron/cs252

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

Peer-To-Peer Techniques

Peer-To-Peer Techniques PG DynaSearch Markus Benter 31th October, 2013 Introduction Centralized P2P-Networks Unstructured P2P-Networks Structured P2P-Networks Misc 1 What is a Peer-to-Peer System? Definition Peer-to-peer systems

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

INTERCONNECTION NETWORKS LECTURE 4

INTERCONNECTION NETWORKS LECTURE 4 INTERCONNECTION NETWORKS LECTURE 4 DR. SAMMAN H. AMEEN 1 Topology Specifies way switches are wired Affects routing, reliability, throughput, latency, building ease Routing How does a message get from source

More information

Adaptive Routing of QoS-Constrained Media Streams over Scalable Overlay Topologies

Adaptive Routing of QoS-Constrained Media Streams over Scalable Overlay Topologies Adaptive Routing of QoS-Constrained Media Streams over Scalable Overlay Topologies Gerald Fry and Richard West Boston University Boston, MA 02215 {gfry,richwest}@cs.bu.edu Introduction Internet growth

More information

SHARED MEMORY VS DISTRIBUTED MEMORY

SHARED MEMORY VS DISTRIBUTED MEMORY OVERVIEW Important Processor Organizations 3 SHARED MEMORY VS DISTRIBUTED MEMORY Classical parallel algorithms were discussed using the shared memory paradigm. In shared memory parallel platform processors

More information

The Spectral Relation between the Cube-Connected Cycles and the Shuffle-Exchange Network

The Spectral Relation between the Cube-Connected Cycles and the Shuffle-Exchange Network The Spectral Relation between the Cube-Connected Cycles and the Shuffle-Exchange Network Christian Riess 1 Rolf Wanka 2 Volker Strehl 3 February 29, 2012 1 Pattern Recognition Lab (CS 5) 2 Hardware-Software

More information

4. Networks. in parallel computers. Advances in Computer Architecture

4. Networks. in parallel computers. Advances in Computer Architecture 4. Networks in parallel computers Advances in Computer Architecture System architectures for parallel computers Control organization Single Instruction stream Multiple Data stream (SIMD) All processors

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 4

CPSC 536N: Randomized Algorithms Term 2. Lecture 4 CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 4 University of British Columbia In today s lecture we will see two applications of negative binomially distributed random variables.

More information

Exemples of LCP. (b,3) (c,3) (d,4) 38 d

Exemples of LCP. (b,3) (c,3) (d,4) 38 d This layout has been presented by G. Even and S. Even [ 00], and it is based on the notion of Layered Cross Product Def. A layered graph of l+1 layers G=(V 0, V 1,, V l, E) consists of l+1 layers of nodes;

More information

Hyper-Butterfly Network: A Scalable Optimally Fault Tolerant Architecture

Hyper-Butterfly Network: A Scalable Optimally Fault Tolerant Architecture Hyper-Butterfly Network: A Scalable Optimally Fault Tolerant Architecture Wei Shi and Pradip K Srimani Department of Computer Science Colorado State University Ft. Collins, CO 80523 Abstract Bounded degree

More information

Lecture: Interconnection Networks

Lecture: Interconnection Networks Lecture: Interconnection Networks Topics: Router microarchitecture, topologies Final exam next Tuesday: same rules as the first midterm 1 Packets/Flits A message is broken into multiple packets (each packet

More information

Throughout this course, we use the terms vertex and node interchangeably.

Throughout this course, we use the terms vertex and node interchangeably. Chapter Vertex Coloring. Introduction Vertex coloring is an infamous graph theory problem. It is also a useful toy example to see the style of this course already in the first lecture. Vertex coloring

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

Discrete Mathematics for CS Spring 2008 David Wagner Note 13. An Introduction to Graphs

Discrete Mathematics for CS Spring 2008 David Wagner Note 13. An Introduction to Graphs CS 70 Discrete Mathematics for CS Spring 2008 David Wagner Note 13 An Introduction to Graphs Formulating a simple, precise specification of a computational problem is often a prerequisite to writing a

More information

High Performance Computing Programming Paradigms and Scalability

High Performance Computing Programming Paradigms and Scalability High Performance Computing Programming Paradigms and Scalability PD Dr. rer. nat. habil. Ralf Peter Mundani Computation in Engineering / BGU Scientific Computing in Computer Science / INF Summer Term 208

More information

CS 258, Spring 99 David E. Culler Computer Science Division U.C. Berkeley Wide links, smaller routing delay Tremendous variation 3/19/99 CS258 S99 2

CS 258, Spring 99 David E. Culler Computer Science Division U.C. Berkeley Wide links, smaller routing delay Tremendous variation 3/19/99 CS258 S99 2 Real Machines Interconnection Network Topology Design Trade-offs CS 258, Spring 99 David E. Culler Computer Science Division U.C. Berkeley Wide links, smaller routing delay Tremendous variation 3/19/99

More information

GNUnet Distributed Data Storage

GNUnet Distributed Data Storage GNUnet Distributed Data Storage DHT and Distance Vector Transport Nathan S. Evans 1 1 Technische Universität München Department of Computer Science Network Architectures and Services July, 24 2010 Overview

More information

High Performance Computing Programming Paradigms and Scalability Part 2: High-Performance Networks

High Performance Computing Programming Paradigms and Scalability Part 2: High-Performance Networks High Performance Computing Programming Paradigms and Scalability Part 2: High-Performance Networks PD Dr. rer. nat. habil. Ralf-Peter Mundani Computation in Engineering (CiE) Scientific Computing (SCCS)

More information

Network-on-chip (NOC) Topologies

Network-on-chip (NOC) Topologies Network-on-chip (NOC) Topologies 1 Network Topology Static arrangement of channels and nodes in an interconnection network The roads over which packets travel Topology chosen based on cost and performance

More information

On Modularity Clustering. Group III (Ying Xuan, Swati Gambhir & Ravi Tiwari)

On Modularity Clustering. Group III (Ying Xuan, Swati Gambhir & Ravi Tiwari) On Modularity Clustering Presented by: Presented by: Group III (Ying Xuan, Swati Gambhir & Ravi Tiwari) Modularity A quality index for clustering a graph G=(V,E) G=(VE) q( C): EC ( ) EC ( ) + ECC (, ')

More information

Discrete Mathematics and Probability Theory Fall 2013 Vazirani Note 7

Discrete Mathematics and Probability Theory Fall 2013 Vazirani Note 7 CS 70 Discrete Mathematics and Probability Theory Fall 2013 Vazirani Note 7 An Introduction to Graphs A few centuries ago, residents of the city of Königsberg, Prussia were interested in a certain problem.

More information

Advanced Computer Networks Exercise Session 7. Qin Yin Spring Semester 2013

Advanced Computer Networks Exercise Session 7. Qin Yin Spring Semester 2013 Advanced Computer Networks 263-3501-00 Exercise Session 7 Qin Yin Spring Semester 2013 1 LAYER 7 SWITCHING 2 Challenge: accessing services Datacenters are designed to be scalable Datacenters are replicated

More information

Interconnection Network. Jinkyu Jeong Computer Systems Laboratory Sungkyunkwan University

Interconnection Network. Jinkyu Jeong Computer Systems Laboratory Sungkyunkwan University Interconnection Network Jinkyu Jeong (jinkyu@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Topics Taxonomy Metric Topologies Characteristics Cost Performance 2 Interconnection

More information

Today. Types of graphs. Complete Graphs. Trees. Hypercubes.

Today. Types of graphs. Complete Graphs. Trees. Hypercubes. Today. Types of graphs. Complete Graphs. Trees. Hypercubes. Complete Graph. K n complete graph on n vertices. All edges are present. Everyone is my neighbor. Each vertex is adjacent to every other vertex.

More information

Peer-to-Peer Computing

Peer-to-Peer Computing 122 CHAPTER 13. ALL-TO-ALL COMMUNICATION is the lightest edge that connects any two super-fragments, it must hold that e is exactly the blue edge of F. Thus, whenever an edge is added, it is an MST edge.

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

EE/CSCI 451: Parallel and Distributed Computation

EE/CSCI 451: Parallel and Distributed Computation EE/CSCI 451: Parallel and Distributed Computation Lecture #11 2/21/2017 Xuehai Qian Xuehai.qian@usc.edu http://alchem.usc.edu/portal/xuehaiq.html University of Southern California 1 Outline Midterm 1:

More information

Jellyfish: Networking Data Centers Randomly

Jellyfish: Networking Data Centers Randomly Jellyfish: Networking Data Centers Randomly Ankit Singla Chi-Yao Hong Lucian Popa Brighten Godfrey DIMACS Workshop on Systems and Networking Advances in Cloud Computing December 8 2011 The real stars...

More information

Interconnection Network

Interconnection Network Interconnection Network Recap: Generic Parallel Architecture A generic modern multiprocessor Network Mem Communication assist (CA) $ P Node: processor(s), memory system, plus communication assist Network

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

8 Supervised Overlay Networks

8 Supervised Overlay Networks 8 Supervised Overlay Networks Every application run on multiple machines needs a mechanism that allows the machines to exchange information. An easy way of solving this problem is that every machine knows

More information

P2P Network Structured Networks: Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili

P2P Network Structured Networks: Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili P2P Network Structured Networks: Distributed Hash Tables Pedro García López Universitat Rovira I Virgili Pedro.garcia@urv.net Index Introduction to DHT s Origins of structured overlays Case studies Chord

More information

Lecture 3: Sorting 1

Lecture 3: Sorting 1 Lecture 3: Sorting 1 Sorting Arranging an unordered collection of elements into monotonically increasing (or decreasing) order. S = a sequence of n elements in arbitrary order After sorting:

More information

Motivation. The Impact of DHT Routing Geometry on Resilience and Proximity. Different components of analysis. Approach:Component-based analysis

Motivation. The Impact of DHT Routing Geometry on Resilience and Proximity. Different components of analysis. Approach:Component-based analysis The Impact of DHT Routing Geometry on Resilience and Proximity Presented by Karthik Lakshminarayanan at P2P Systems class (Slides liberally borrowed from Krishna s SIGCOMM talk) Krishna Gummadi, Ramakrishna

More information

Interconnection Network

Interconnection Network Interconnection Network Jinkyu Jeong (jinkyu@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu SSE3054: Multicore Systems, Spring 2017, Jinkyu Jeong (jinkyu@skku.edu) Topics

More information

EN2910A: Advanced Computer Architecture Topic 06: Supercomputers & Data Centers Prof. Sherief Reda School of Engineering Brown University

EN2910A: Advanced Computer Architecture Topic 06: Supercomputers & Data Centers Prof. Sherief Reda School of Engineering Brown University EN2910A: Advanced Computer Architecture Topic 06: Supercomputers & Data Centers Prof. Sherief Reda School of Engineering Brown University Material from: The Datacenter as a Computer: An Introduction to

More information

The Impact of DHT Routing Geometry on Resilience and Proximity. Acknowledgement. Motivation

The Impact of DHT Routing Geometry on Resilience and Proximity. Acknowledgement. Motivation The Impact of DHT Routing Geometry on Resilience and Proximity Presented by Noorullah Moghul Krishna Gummadi, Ramakrishna Gummadi, Sylvia Ratnasamy, Steve Gribble, Scott Shenker, Ion Stoica Acknowledgement

More information

Parallel Computing Platforms

Parallel Computing Platforms Parallel Computing Platforms Network Topologies John Mellor-Crummey Department of Computer Science Rice University johnmc@rice.edu COMP 422/534 Lecture 14 28 February 2017 Topics for Today Taxonomy Metrics

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

From Routing to Traffic Engineering

From Routing to Traffic Engineering 1 From Routing to Traffic Engineering Robert Soulé Advanced Networking Fall 2016 2 In the beginning B Goal: pair-wise connectivity (get packets from A to B) Approach: configure static rules in routers

More information

Topology basics. Constraints and measures. Butterfly networks.

Topology basics. Constraints and measures. Butterfly networks. EE48: Advanced Computer Organization Lecture # Interconnection Networks Architecture and Design Stanford University Topology basics. Constraints and measures. Butterfly networks. Lecture #: Monday, 7 April

More information

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions GIAN Course on Distributed Network Algorithms Spanning Tree Constructions Stefan Schmid @ T-Labs, 2011 Spanning Trees Attactive infrastructure : sparse subgraph ( loop-free backbone ) connecting all nodes.

More information

Overlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma

Overlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma Overlay and P2P Networks Structured Networks and DHTs Prof. Sasu Tarkoma 6.2.2014 Contents Today Semantic free indexing Consistent Hashing Distributed Hash Tables (DHTs) Thursday (Dr. Samu Varjonen) DHTs

More information

Prefix Computation and Sorting in Dual-Cube

Prefix Computation and Sorting in Dual-Cube Prefix Computation and Sorting in Dual-Cube Yamin Li and Shietung Peng Department of Computer Science Hosei University Tokyo - Japan {yamin, speng}@k.hosei.ac.jp Wanming Chu Department of Computer Hardware

More information

Interconnection topologies (cont.) [ ] In meshes and hypercubes, the average distance increases with the dth root of N.

Interconnection topologies (cont.) [ ] In meshes and hypercubes, the average distance increases with the dth root of N. Interconnection topologies (cont.) [ 10.4.4] In meshes and hypercubes, the average distance increases with the dth root of N. In a tree, the average distance grows only logarithmically. A simple tree structure,

More information

Graph Algorithms. Many problems in networks can be modeled as graph problems.

Graph Algorithms. Many problems in networks can be modeled as graph problems. Graph Algorithms Graph Algorithms Many problems in networks can be modeled as graph problems. - The topology of a distributed system is a graph. - Routing table computation uses the shortest path algorithm

More information

CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University

CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University Course website: http://snap.stanford.edu/na09 Slides will be available online Reading material will be posted online:

More information

*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)

*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server Peer-to-Peer.

More information

Fast Topology Management in Large Overlay Networks

Fast Topology Management in Large Overlay Networks Topology as a key abstraction Fast Topology Management in Large Overlay Networks Ozalp Babaoglu Márk Jelasity Alberto Montresor Dipartimento di Scienze dell Informazione Università di Bologna! Topology

More information

LECT-05, S-1 FP2P, Javed I.

LECT-05, S-1 FP2P, Javed I. A Course on Foundations of Peer-to-Peer Systems & Applications LECT-, S- FPP, javed@kent.edu Javed I. Khan@8 CS /99 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer

More information

Graph Algorithms. Many problems in networks can be modeled as graph problems.

Graph Algorithms. Many problems in networks can be modeled as graph problems. Graph Algorithms Many problems in networks can be modeled as graph problems. - The topology of a distributed system is a graph. - Routing table computation uses the shortest path algorithm - Efficient

More information

Lecture 28: Networks & Interconnect Architectural Issues Professor Randy H. Katz Computer Science 252 Spring 1996

Lecture 28: Networks & Interconnect Architectural Issues Professor Randy H. Katz Computer Science 252 Spring 1996 Lecture 28: Networks & Interconnect Architectural Issues Professor Randy H. Katz Computer Science 252 Spring 1996 RHK.S96 1 Review: ABCs of Networks Starting Point: Send bits between 2 computers Queue

More information

Cycloid: A constant-degree and lookup-efficient P2P overlay network

Cycloid: A constant-degree and lookup-efficient P2P overlay network Performance Evaluation xxx (2005) xxx xxx Cycloid: A constant-degree and lookup-efficient P2P overlay network Haiying Shen a, Cheng-Zhong Xu a,, Guihai Chen b a Department of Electrical and Computer Engineering,

More information

08 Distributed Hash Tables

08 Distributed Hash Tables 08 Distributed Hash Tables 2/59 Chord Lookup Algorithm Properties Interface: lookup(key) IP address Efficient: O(log N) messages per lookup N is the total number of servers Scalable: O(log N) state per

More information

Parallel Pointers: Graphs

Parallel Pointers: Graphs Parallel Pointers: Graphs Breadth first Search (BFS) 101 Given a vertex S, what is the distance of all the other vertices from S? Why would this be useful? To find the fastest route through a network.

More information

Data Center Network Topologies II

Data Center Network Topologies II Data Center Network Topologies II Hakim Weatherspoon Associate Professor, Dept of Computer cience C 5413: High Performance ystems and Networking April 10, 2017 March 31, 2017 Agenda for semester Project

More information

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University CPSC / PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet

More information

Leveraging Heterogeneity to Reduce the Cost of Data Center Upgrades

Leveraging Heterogeneity to Reduce the Cost of Data Center Upgrades Leveraging Heterogeneity to Reduce the Cost of Data Center Upgrades Andy Curtis joint work with: S. Keshav Alejandro López-Ortiz Tommy Carpenter Mustafa Elsheikh University of Waterloo Motivation Data

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 11 Rou+ng: Deep Dive Spring 2018 Rachit Agarwal 2 Goals for Today s Lecture Learning about Routing Protocols Link State (Global view) Distance

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

EE/CSCI 451: Parallel and Distributed Computation

EE/CSCI 451: Parallel and Distributed Computation EE/CSCI 451: Parallel and Distributed Computation Lecture #5 1/29/2017 Xuehai Qian Xuehai.qian@usc.edu http://alchem.usc.edu/portal/xuehaiq.html University of Southern California 1 From last class Outline

More information

Exploiting Locality in Distributed SDN Control. Stefan Schmid (TU Berlin & T-Labs) Jukka Suomela (Uni Helsinki)

Exploiting Locality in Distributed SDN Control. Stefan Schmid (TU Berlin & T-Labs) Jukka Suomela (Uni Helsinki) Exploiting Locality in Distributed SDN Control Stefan Schmid (TU Berlin & T-Labs) Jukka Suomela (Uni Helsinki) 1 My view of SDN before I met Marco and Dan 2 Stefan Schmid (T-Labs) Logically Centralized,

More information

Topologies. Maurizio Palesi. Maurizio Palesi 1

Topologies. Maurizio Palesi. Maurizio Palesi 1 Topologies Maurizio Palesi Maurizio Palesi 1 Network Topology Static arrangement of channels and nodes in an interconnection network The roads over which packets travel Topology chosen based on cost and

More information

Lecture 9: Group Communication Operations. Shantanu Dutt ECE Dept. UIC

Lecture 9: Group Communication Operations. Shantanu Dutt ECE Dept. UIC Lecture 9: Group Communication Operations Shantanu Dutt ECE Dept. UIC Acknowledgement Adapted from Chapter 4 slides of the text, by A. Grama w/ a few changes, augmentations and corrections Topic Overview

More information

Slim Fly: A Cost Effective Low-Diameter Network Topology

Slim Fly: A Cost Effective Low-Diameter Network Topology TORSTEN HOEFLER, MACIEJ BESTA Slim Fly: A Cost Effective Low-Diameter Network Topology Images belong to their creator! NETWORKS, LIMITS, AND DESIGN SPACE Networks cost 25-30% of a large supercomputer Hard

More information

Outline. Distributed Shared Memory. Shared Memory. ECE574 Cluster Computing. Dichotomy of Parallel Computing Platforms (Continued)

Outline. Distributed Shared Memory. Shared Memory. ECE574 Cluster Computing. Dichotomy of Parallel Computing Platforms (Continued) Cluster Computing Dichotomy of Parallel Computing Platforms (Continued) Lecturer: Dr Yifeng Zhu Class Review Interconnections Crossbar» Example: myrinet Multistage» Example: Omega network Outline Flynn

More information

: Scalable Lookup

: Scalable Lookup 6.824 2006: Scalable Lookup Prior focus has been on traditional distributed systems e.g. NFS, DSM/Hypervisor, Harp Machine room: well maintained, centrally located. Relatively stable population: can be

More information

Non-Uniform Memory Access (NUMA) Architecture and Multicomputers

Non-Uniform Memory Access (NUMA) Architecture and Multicomputers Non-Uniform Memory Access (NUMA) Architecture and Multicomputers Parallel and Distributed Computing Department of Computer Science and Engineering (DEI) Instituto Superior Técnico February 29, 2016 CPD

More information

Lecture 24: Interconnection Networks. Topics: topologies, routing, deadlocks, flow control

Lecture 24: Interconnection Networks. Topics: topologies, routing, deadlocks, flow control Lecture 24: Interconnection Networks Topics: topologies, routing, deadlocks, flow control 1 Topology Examples Grid Torus Hypercube Criteria Bus Ring 2Dtorus 6-cube Fully connected Performance Bisection

More information

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University CPSC 4/5 PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet

More information

CSC630/CSC730: Parallel Computing

CSC630/CSC730: Parallel Computing CSC630/CSC730: Parallel Computing Parallel Computing Platforms Chapter 2 (2.4.1 2.4.4) Dr. Joe Zhang PDC-4: Topology 1 Content Parallel computing platforms Logical organization (a programmer s view) Control

More information

NP-Completeness. Algorithms

NP-Completeness. Algorithms NP-Completeness Algorithms The NP-Completeness Theory Objective: Identify a class of problems that are hard to solve. Exponential time is hard. Polynomial time is easy. Why: Do not try to find efficient

More information

Graph Algorithms. Andreas Klappenecker. [based on slides by Prof. Welch]

Graph Algorithms. Andreas Klappenecker. [based on slides by Prof. Welch] Graph Algorithms Andreas Klappenecker [based on slides by Prof. Welch] 1 Directed Graphs Let V be a finite set and E a binary relation on V, that is, E VxV. Then the pair G=(V,E) is called a directed graph.

More information

Wireless Internet Routing. Learning from Deployments Link Metrics

Wireless Internet Routing. Learning from Deployments Link Metrics Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data

More information

Sorting (Chapter 9) Alexandre David B2-206

Sorting (Chapter 9) Alexandre David B2-206 Sorting (Chapter 9) Alexandre David B2-206 1 Sorting Problem Arrange an unordered collection of elements into monotonically increasing (or decreasing) order. Let S = . Sort S into S =

More information

Non-Uniform Memory Access (NUMA) Architecture and Multicomputers

Non-Uniform Memory Access (NUMA) Architecture and Multicomputers Non-Uniform Memory Access (NUMA) Architecture and Multicomputers Parallel and Distributed Computing Department of Computer Science and Engineering (DEI) Instituto Superior Técnico September 26, 2011 CPD

More information

Recursive Dual-Net: A New Universal Network for Supercomputers of the Next Generation

Recursive Dual-Net: A New Universal Network for Supercomputers of the Next Generation Recursive Dual-Net: A New Universal Network for Supercomputers of the Next Generation Yamin Li 1, Shietung Peng 1, and Wanming Chu 2 1 Department of Computer Science Hosei University Tokyo 184-8584 Japan

More information

Overlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma

Overlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma Overlay and P2P Networks Structured Networks and DHTs Prof. Sasu Tarkoma 2.2.2015 Contents Today Geometries revisited Distributed Hash Tables (DHTs) Thursday Power-law networks Geometries revisited The

More information