• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Shuping, He Wangquan, Li Yi, Qi Fengbin. Multicast Routing Algorithm for Limited MFT Size in InfiniBand[J]. Journal of Computer Research and Development, 2022, 59(4): 864-881. DOI: 10.7544/issn1000-1239.20200767
Citation: Chen Shuping, He Wangquan, Li Yi, Qi Fengbin. Multicast Routing Algorithm for Limited MFT Size in InfiniBand[J]. Journal of Computer Research and Development, 2022, 59(4): 864-881. DOI: 10.7544/issn1000-1239.20200767

Multicast Routing Algorithm for Limited MFT Size in InfiniBand

Funds: This work was supported by the National Key Research and Development Program of China (2017YFB0202004).
More Information
  • Published Date: March 31, 2022
  • In high performance computing, multicast operations supported by hardware have important impact on the performance of collective communication. As the supercomputer becomes larger and larger, the number of MCGs (multicast groups) increases rapidly also, and may exceed the number of MFT (multicast forwarding table) entries supported by hardware. However, the existing multicast routing algorithms do not provide solutions to this problem. This paper proposes a multicast routing algorithm for limited MFT size in InfiniBand called MR4LMS (multicast routing for limited MFT size). The algorithm uses two different methods, called FBTC (first build then color) and FCTB (first color then build) respectively, to build the multicast tree, in order to reduce the number of MFT entries as more as possible. When the number of MFT entries is not enough, several similar MCGs can be merged together by a merge algorithm to further reduce the required MFT entries. MR4LMS is tested under various typical topologies and communication patterns. The results show that it only needs 256 MFT entries to support thousands or even tens of thousands of MCGs to meet the requirements of typical communication patterns. In addition, we test the maximum EFI (edge forwarding index) and the running time of MR4LMS and obtain the satisfying performance result, which show that the MR4LMS can be used in large-scale interconnect networks.
  • Related Articles

    [1]Bai Lifang, Zhu Yuefei, Li Yongjun, Wang Shuai, Yang Xiaoqi. Research Progress of Fully Homomorphic Encryption[J]. Journal of Computer Research and Development, 2024, 61(12): 3069-3087. DOI: 10.7544/issn1000-1239.202221052
    [2]Zhao Xiufeng, Fu Yu, Song Weitao. Circular Secure Homomorphic Encryption Scheme[J]. Journal of Computer Research and Development, 2020, 57(10): 2117-2124. DOI: 10.7544/issn1000-1239.2020.20200422
    [3]Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin. Security Issues and Privacy Preserving in Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085. DOI: 10.7544/issn1000-1239.2020.20200426
    [4]Yao Hailong, Wang Caifen, Xu Qinbai, Li Wenting. A Distributed Biometric Authentication Protocol Based on Homomorphic Encryption[J]. Journal of Computer Research and Development, 2019, 56(11): 2375-2383. DOI: 10.7544/issn1000-1239.2019.20190293
    [5]Song Lei, Ma Chunguang, Duan Guanghan, Yuan Qi. Privacy-Preserving Logistic Regression on Vertically Partitioned Data[J]. Journal of Computer Research and Development, 2019, 56(10): 2243-2249. DOI: 10.7544/issn1000-1239.2019.20190414
    [6]Xu Wenyu, Wu Lei, Yan Yunxue. Privacy-Preserving Scheme of Electronic Health Records Based on Blockchain and Homomorphic Encryption[J]. Journal of Computer Research and Development, 2018, 55(10): 2233-2243. DOI: 10.7544/issn1000-1239.2018.20180438
    [7]Yang Xiaoyuan, Zhou Tanping, Zhang Wei, Wu Liqiang. Application of a Circular Secure Variant of LWE in the Homomorphic Encryption[J]. Journal of Computer Research and Development, 2015, 52(6): 1389-1393. DOI: 10.7544/issn1000-1239.2015.20131952
    [8]Li Shundong, Dou Jiawei, Wang Daoshun. Survey on Homomorphic Encryption and Its Applications to Cloud Security[J]. Journal of Computer Research and Development, 2015, 52(6): 1378-1388. DOI: 10.7544/issn1000-1239.2015.20131494
    [9]Liu Mingjie, Wang An. Fully Homomorphic Encryption and Its Applications[J]. Journal of Computer Research and Development, 2014, 51(12): 2593-2603. DOI: 10.7544/issn1000-1239.2014.20131168
    [10]Qiang Weizhong, Zou Deqing, and Jin Hai. Research on Privacy Preservation Mechanism for Credentials and Policies in Grid Computing Environment[J]. Journal of Computer Research and Development, 2007, 44(1): 11-19.
  • Cited by

    Periodical cited type(3)

    1. 吴树芳,尹凯,吴汭漩,朱杰. 融入隐式情感和主题增强分布的网络敏感信息深度识别研究. 情报科学. 2024(05): 111-119 .
    2. 王梓宁,张国防. 考虑多交互关系与情感倾向的微博用户可信度评估算法. 计算机应用研究. 2024(10): 3000-3007 .
    3. 吕飞,王帅. 城市空间网红化现象测度及影响因素研究. 城市问题. 2023(12): 50-59 .

    Other cited types(5)

Catalog

    Article views (176) PDF downloads (74) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return