List of Figures
Loading the transatlantic cable into the ‘Great Eastern’ in 1865 |
........... 1 |
|
Diagrams from the 51-page report of Paul Baran to the U.S. Air Force, 1964 |
........... 2 |
|
Kidney blood filtering in the human organism |
........... 3 |
|
Pulmonary circuit of the human organism |
........... 4 |
|
One of the first Interface Message Processor (IMP) of ARPANET connecting UCLA with SRI in August 1969 |
........... 5 |
|
Packet switching network: packets are entirely stored at each intermediate switch and only then forwarded to the next switch |
........... 5 |
|
Wormhole or cut-through routing network: a packet is “copied” through the communication path from the source directly to the destination without being stored in any intermediate switch |
........... 6 |
|
Swiss-Tx supercomputer in June 2001 |
......... 13 |
|
File Striping |
......... 14 |
|
SFIO integration into MPI-I/O |
......... 16 |
|
Distribution of a striped file across subfiles |
......... 18 |
|
Disk access optimization |
......... 19 |
|
Comparison of the optimized write access with a non-optimized write access as a function of the file striping granularity (3 I/O nodes, 1 compute node, global file size is 660 Mbytes) |
......... 20 |
|
Comparison of the optimized multi-block write access with corresponding separate non-optimized single block accesses (Fast Ethernet, stripe unit size is 1005 bytes, 7 I/O nodes) |
......... 20 |
|
SFIO functional architecture |
......... 21 |
|
Aggregate throughput of Fast Ethernet as a function of the number of contributing nodes |
......... 24 |
|
SFIO architecture on Swiss-T1 |
......... 24 |
|
SFIO/MPICH all-to-all I/O performance for a 200 byte stripe size |
......... 25 |
|
Aggregate throughput of TNET as a function of the number of the contributing nodes |
......... 25 |
|
The Swiss-T1 network interconnection topology |
......... 26 |
|
SFIO all-to-all I/O performance on TNET |
......... 27 |
|
The use of derived datatypes in MPI-I/O interface |
......... 29 |
|
The recursive construction of derived datatypes in MPI (“Contiguous” is a derived datatype obtained by repeatedly joining another datatype which in turn can be fragmented) |
......... 29 |
|
The MPI-I/O implementation requires a method for retrieving the fragmentation patterns of opaque MPI derived datatypes |
......... 30 |
|
A reverse engineering method for discovery the fragmentation pattern of an opaque datatype built by the user |
......... 31 |
|
Isolated implementation of a portable MPI-I/O interface functional on any MPI-1 implementation |
......... 32 |
|
Wavelength routing in optical layer |
......... 40 |
|
A simple network sample (pictograms) |
......... 42 |
|
The pictograms representing the 25 transfers from all sending nodes to all receiving nodes of the network of Figure 28 |
......... 43 |
|
Example of a traffic comprising 25 transfers carried out over the network shown in Figure 28 |
......... 45 |
|
An initial
category before fission, where symbol |
......... 48 |
|
Fission of the category of Figure 31 into its positive and negative sub categories. |
......... 48 |
|
Proportion of the number of transfers within a skeleton, compared with the number of transfers of the corresponding traffic |
......... 50 |
|
Search space reduction obtained by idle+skeleton+blank optimization steps |
......... 52 |
|
Time frames of a liquid schedule of the collective traffic shown in Figure 30 |
......... 53 |
|
There exists a traffic of three transmissions across this network that has no team and therefore no liquid schedule |
......... 54 |
|
A traffic consisting of thee transmissions to be carried across the network shown in Figure 36 |
......... 54 |
|
Liquid schedule
construction tree: |
......... 55 |
|
Architecture of the Swiss-T1 cluster supercomputer interconnected by a high performance wormhole switch fabric |
......... 58 |
|
For a given number of contributing nodes all possible allocation of nodes yielding different liquid throughputs |
......... 59 |
|
The 362 topologies of Figure 40 yielding different liquid throughput values placed along one axis, sorted first by the number of contributing nodes and then by their liquid throughputs |
......... 60 |
|
Theoretical liquid throughput and measured round-robin schedule throughput for 362 network sub topologies. |
......... 61 |
|
Predicted liquid throughput and measured throughput according to the computed liquid schedule |
......... 61 |
|
Figure 44. |
In the first layer the flow is equally split across two paths. Two of their links, marked by thick dashes, are the bottlenecks. |
......... 66 |
Figure 45. |
The second layer minimizes to 1/3 the maximal load of the remaining seven links and identifies three bottlenecks. |
......... 66 |
Figure 46. |
The third layer minimizes to 1/4 the maximal load of the remaining four links and identifies two bottlenecks. |
......... 66 |
Routing pattern of layer 10 built by the capillary routing algorithm on a network sample with 180 nodes [zip] |
......... 66 |
|
Figure 48. |
Initial problem with one source and one sink node |
......... 67 |
Figure 49. |
Maximize the
flow, fix the new flow-out coefficients at the nodes and find the bottleneck
links (layer 1, |
......... 67 |
Figure 50. |
Remove the bottleneck links from the network and adjust the flow-out coefficients at the adjacent nodes |
......... 67 |
Figure 51. |
Maximize the
flow in the new sub-problem, fix the new flow-out coefficients at the nodes
and find the new bottlenecks (layer 2, |
......... 68 |
Figure 52. |
Again remove the bottleneck links from the network and adjust correspondingly the flow-out coefficients at the adjacent nodes |
......... 68 |
Figure 53. |
Maximize the
flow in the obtained new problem, fixing the new resulting flow-out
coefficients at the nodes and find the new bottlenecks (layer 3, |
......... 68 |
Figure 54. |
An example of a bounded multi-source/multi-sink problem (obtained during construction of the capillary routing from a network with one source and one destination node) |
......... 69 |
Figure 55. |
A max-flow solution with the flow increase factor of 4/3, containing four maximally loaded candidate links {a, b, d, e} |
......... 69 |
Figure 56. |
The cost reduction applied to the four fully loaded links of Figure 55 reduces the load of suspected link d, and the bottleneck candidate list is now {a, b, e}. |
......... 70 |
Figure 57. |
The cost reduction applied to the three fully loaded links of Figure 56 reduces the load of another suspected link a. The true bottleneck links are {b, e}. |
......... 70 |
Decrease of the number of suspected links during the bottleneck hunting loop at each of the 10 capillary routing layers |
......... 70 |
|
Transmission
rate increase factor as a function of the packet loss rate ( |
......... 74 |
|
Average ROR metric as a function of the capillary routing layer |
......... 76 |
|
Average ROR metric computed assuming real-time streaming (the group of curves above) and off-line streaming (the group below) |
......... 76 |
|
Congestion graph corresponding to the traffic pattern of Figure 29 across the network of Figure 28: the vertices of the graph represent the 25 transfers, the edges represent congestions between the transfers |
......... 85 |
|
Number of edges in the 362 congestion graphs corresponding to the traffic patterns of Figure 40 and Figure 41 |
......... 86 |
|
Loss in throughput induced by schedules computed with the DSatur heuristic algorithm |
......... 87 |
|
Running times for computing liquid schedules with the MILP Cplex method and with the liquid schedule construction algorithm |
......... 90 |
|
The overall measured throughputs of hundreds of different traffic patterns carried out according to a liquid schedule and according to a topology unaware schedule |
......... 98 |
|
The
probability that the interarrival time between two consecutive failures in a
Poisson process is less than a given time, |
....... 100 |
* * *