• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Guo Deke, Luo Lailong, Li Yan, Hu Zhiyao, Ren Bangbang. Aggregating Incast Transfers in Data Centers[J]. Journal of Computer Research and Development, 2016, 53(1): 53-67. DOI: 10.7544/issn1000-1239.2016.20150656
Citation: Guo Deke, Luo Lailong, Li Yan, Hu Zhiyao, Ren Bangbang. Aggregating Incast Transfers in Data Centers[J]. Journal of Computer Research and Development, 2016, 53(1): 53-67. DOI: 10.7544/issn1000-1239.2016.20150656

Aggregating Incast Transfers in Data Centers

More Information
  • Published Date: December 31, 2015
  • Data transfers, such as the common shuffle and incast communication patterns, contribute most of the network traffic in MapReduce like working paradigms and thus have severe impacts on application performance in modern data centers. This motivates us to bring opportunities for performing the inter-flow data aggregation during the transmission phase as early as possible rather than just at the receiver side. In this paper, we first examine the gain and feasibility of the inter-flow data aggregation with novel data center network structures. To achieve such a gain, we model the incast minimal tree problem. We propose two approximate incast tree construction methods, RS-based and ARS-based incast trees. We are thus able to generate an efficient incast tree solely based on the labels of incast members and the data center topology. We further present incremental methods to tackle the dynamic and fault-tolerant issues of the incast tree. Based on a prototype implementation and large-scale simulations, we demonstrate that our approach can significantly decrease the amount of network traffic, save the data center resources, and reduce the delay of job processing. Our approach for BCube and FBFLY can be adapted to other data centers structures with minimal modifications.
  • Related Articles

    [1]Zhang Yiran, Wang Shangguang, Ren Fengyuan. Survey on Traffic Management in Lossless Networks[J]. Journal of Computer Research and Development, 2025, 62(5): 1290-1306. DOI: 10.7544/issn1000-1239.202440096
    [2]Wen Yimin, Yuan Zhe, Yu Hang. A New Semi-Supervised Inductive Transfer Learning Framework: Co-Transfer[J]. Journal of Computer Research and Development, 2023, 60(7): 1603-1614. DOI: 10.7544/issn1000-1239.202220232
    [3]Li Junchen, Cheng Guang, Yang Gangqin. Private Protocol Reverse Engineering Based on Network Traffic: A Survey[J]. Journal of Computer Research and Development, 2023, 60(1): 167-190. DOI: 10.7544/issn1000-1239.202110722
    [4]Zhang Tong, Feng Jiaqi, Ma Yanying, Qu Siyuan, Ren Fengyuan. Survey on Traffic Scheduling in Time-Sensitive Networking[J]. Journal of Computer Research and Development, 2022, 59(4): 747-764. DOI: 10.7544/issn1000-1239.20210203
    [5]Shi Yang, Wen Mei, Fei Jiawei, Zhang Chunyuan. A DAG-Based Network Traffic Scheduler[J]. Journal of Computer Research and Development, 2021, 58(12): 2798-2810. DOI: 10.7544/issn1000-1239.2021.20200568
    [6]Wei Songjie, Wu Chao, Luo Na, Zhang Gongxuan. Traffic Latency Characterization and Fingerprinting in Mobile Cellular Networks[J]. Journal of Computer Research and Development, 2019, 56(2): 363-374. DOI: 10.7544/issn1000-1239.2019.20170501
    [7]Qiang Siwei, Chen Xiaming, Jiang Kaida, Jin Yaohui. Urban Spatio-Temporal Behavior Analysis Based on Mobile Network Traffic Logs[J]. Journal of Computer Research and Development, 2016, 53(4): 932-940. DOI: 10.7544/issn1000-1239.2016.20148278
    [8]Tian Zhongda, Gao Xianwen, Li Shujiang, Wang Yanhong. Prediction Method for Network Traffic Based on Genetic Algorithm Optimized Echo State Network[J]. Journal of Computer Research and Development, 2015, 52(5): 1137-1145. DOI: 10.7544/issn1000-1239.2015.20131757
    [9]Li Zhiyuan, Wang Ruchuan. A P2P Network Traffic Identification Approach Based on Machine Learning[J]. Journal of Computer Research and Development, 2011, 48(12): 2253-2260.
    [10]Zheng Liming, Zou Peng, Jia Yan. Anomaly Detection Using Multi-Level and Multi-Dimensional Analyzing of Network Traffic[J]. Journal of Computer Research and Development, 2011, 48(8): 1506-1516.

Catalog

    Article views (1704) PDF downloads (771) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return