• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Hu Kai, Wang Zhe, Jiang Shu, and Yin Baolin. A Performance Model of k-Ary n-Cube Under Communication Locality[J]. Journal of Computer Research and Development, 2011, 48(11): 2083-2093.
Citation: Hu Kai, Wang Zhe, Jiang Shu, and Yin Baolin. A Performance Model of k-Ary n-Cube Under Communication Locality[J]. Journal of Computer Research and Development, 2011, 48(11): 2083-2093.

A Performance Model of k-Ary n-Cube Under Communication Locality

More Information
  • Published Date: November 14, 2011
  • Interconnection network is a key component of parallel computer which influences the parallel application’s efficiency significantly. k-ary n-cube network topology is widely adopted in many current large scale parallel computers such as Blue Gene/L and Cray XT4. The method of spatial communication locality is implied in many real parallel programs, but as we know the exiting analytical models just gave some rough and fragmented results on network performance under communication locality. The binary parameters, local message fraction and local domain’s radius, are proposed to measure parallel application’s spatial communication locality. Then based on queueing theory, an analytical model of the k-ary n-cube is established to evaluate communication locality’s impact on message latency and network throughput. The situation that the message’ length is shorter than the network radius is discussed, which has not been considered in the existing analytical models. The impacts of different parameters on network performance are compared carefully. At last, an improved network simulator is used to validate the analytical model, and it is demonstrated that the analytical results close to the simulation experiments well. The proposed model gives an efficient method to predict message latency and network throughput of large scale parallel applications whose communication patterns have local character.
  • Related Articles

    [1]Fang Dongliang, Liu Puzhuo, Qin Chuan, Song Zhanwei, Sun Yuyan, Shi Zhiqiang, Sun Limin. Survey of Protocol Security of Industrial Control System[J]. Journal of Computer Research and Development, 2022, 59(5): 978-993. DOI: 10.7544/issn1000-1239.20211132
    [2]He Kewen, Zhang Jiachen, Liu Xiaoguang, Wang Gang. Fingerprint Search Optimization for Deduplication on Emerging Storage Devices[J]. Journal of Computer Research and Development, 2020, 57(2): 269-280. DOI: 10.7544/issn1000-1239.2020.20190543
    [3]Zeng Gaoxiong, Hu Shuihai, Zhang Junxue, Chen Kai. Transport Protocols for Data Center Networks: A Survey[J]. Journal of Computer Research and Development, 2020, 57(1): 74-84. DOI: 10.7544/issn1000-1239.2020.20190519
    [4]Yan Fang, Li Yuanzhang, Zhang Quanxin, Tan Yu’an. Object-Based Data De-Duplication Method for OpenXML Compound Files[J]. Journal of Computer Research and Development, 2015, 52(7): 1546-1557. DOI: 10.7544/issn1000-1239.2015.20140093
    [5]Cao Jian, Wang Xingwei, Zhang Jinhong, Huang Min. A Data Driven Cognitive Routing Protocol for Information-Centric Networking[J]. Journal of Computer Research and Development, 2015, 52(4): 798-805. DOI: 10.7544/issn1000-1239.2015.20148404
    [6]Li Chao, Wang Shupeng, Yun Xiaochun, Zhou Xiaoyang, Chen Ming. A Reading Performance Improvement Method in Deduplication Based on Pipeline[J]. Journal of Computer Research and Development, 2013, 50(1): 90-100.
    [7]Zong Ming, Wang Xiaodong, and Zhou Xingming. Cost-Optimizing Adaptive Location Service Protocol in MANET[J]. Journal of Computer Research and Development, 2012, 49(12): 2515-2528.
    [8]Fu Yinjin, Xiao Nong, and Liu Fang. Research and Development on Key Techniques of Data Deduplication[J]. Journal of Computer Research and Development, 2012, 49(1): 12-20.
    [9]Jin Hai, Luo Fei, Zhang Qin, and Zhang Hao. An Efficient Data Transfer Protocol for P2P-Based High Performance Computing[J]. Journal of Computer Research and Development, 2006, 43(9): 1543-1549.
    [10]Liu Yi, Pang Liaojun, and Wang Yumin. An Optimistic Payment Protocol Based on Mobile Agents[J]. Journal of Computer Research and Development, 2005, 42(10): 1686-1691.

Catalog

    Article views (806) PDF downloads (565) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return