Mostrar el registro sencillo

dc.contributor.authorCamarero Coterillo, Cristobal 
dc.contributor.authorVallejo Gutiérrez, Enrique 
dc.contributor.authorBeivide Palacio, Ramón 
dc.contributor.otherUniversidad de Cantabriaes_ES
dc.date.accessioned2015-01-08T13:06:59Z
dc.date.available2015-01-08T13:06:59Z
dc.date.issued2014-12
dc.identifier.issn1544-3566
dc.identifier.urihttp://hdl.handle.net/10902/5906
dc.description.abstractCurrent HPC and datacenter networks rely on large-radix routers. Hamming graphs (Cartesian products of complete graphs) and dragonflies (two-level direct networks with nodes organized in groups) are some direct topologies proposed for such networks. The original definition of the dragonfly topology is very loose, with several degrees of freedom such as the inter- and intra-group topology, the specific global connectivity and the number of parallel links between groups (or trunking level). This work provides a comprehensive analysis of the topological properties of the dragonfly network, providing balancing conditions for network dimensioning, as well as introducing and classifying several alternatives for the global connectivity and trunking level. From a topological study of the network, it is noted that a Hamming graph can be seen as a canonical dragonfly topology with a large level of trunking. Based on this observation and by carefully selecting the global connectivity, the Dimension Order Routing (DOR) mechanism safely used in Hamming graphs is adapted to dragonfly networks with trunking. The resulting routing algorithms approximate the performance of minimal, non-minimal and adaptive routings typically used in dragonflies, but without requiring virtual channels to avoid packet deadlock, thus allowing for lower-cost router implementations. This is obtained by selecting properly the link to route between groups, based on a graph coloring of the network routers. Evaluations show that the proposed mechanisms are competitive to traditional solutions when using the same number of virtual channels, and enable for simpler implementations with lower cost. Finally, multilevel dragonflies are discussed, considering how the proposed mechanisms could be adapted to them.es_ES
dc.format.extent25 p.es_ES
dc.language.isoenges_ES
dc.publisherACMes_ES
dc.rights© ACM, 2014. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ACM Transactions on Architecture and Code Optimization, VOL 11, Issue 4, (December 2014) http://dl.acm.org/citation.cfm?doid=2695583.2677038es_ES
dc.sourceACM Transactions on Architecture and Code Optimization, Vol. 11 Issue 4, December 2014es_ES
dc.subject.otherHamming graphes_ES
dc.subject.otherDragonfly networkes_ES
dc.subject.otherTopologyes_ES
dc.subject.otherDeadlock-freedomes_ES
dc.subject.otherRoutinges_ES
dc.titleTopological Characterization of Hamming and Dragonfly Networks and its Implications on Routinges_ES
dc.typeinfo:eu-repo/semantics/articlees_ES
dc.relation.publisherVersionhttp://dl.acm.org/citation.cfm?doid=2695583.2677038es_ES
dc.rights.accessRightsopenAccesses_ES
dc.identifier.DOI10.1145/2677038
dc.type.versionacceptedVersiones_ES


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo