John Kubiatowicz Electrical Engineering and Computer Sciences

Slides:



Advertisements
Similar presentations
CS252 Graduate Computer Architecture Lecture 16 Multiprocessor Networks (con’t) March 16 th, 2011 John Kubiatowicz Electrical Engineering and Computer.
Advertisements

COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Realizing Programming Models CS 258, Spring 99 David E. Culler Computer Science Division U.C. Berkeley.
1 Lecture 12: Interconnection Networks Topics: dimension/arity, routing, deadlock, flow control.
ECE669 L20: Evaluation and Message Passing April 13, 2004 ECE 669 Parallel Computer Architecture Lecture 20 Evaluation and Message Passing.
CS252 Graduate Computer Architecture Lecture 21 Multiprocessor Networks (con’t) John Kubiatowicz Electrical Engineering and Computer Sciences University.
CS 258 Parallel Computer Architecture Lecture 5 Routing February 6, 2008 Prof John D. Kubiatowicz
Active Messages: a Mechanism for Integrated Communication and Computation von Eicken et. al. Brian Kazian CS258 Spring 2008.
CS252 Graduate Computer Architecture Lecture 17 Multiprocessor Networks (con’t) March 31 th, 2010 John Kubiatowicz Electrical Engineering and Computer.
1 Lecture 24: Interconnection Networks Topics: topologies, routing, deadlocks, flow control Final exam reminders:  Plan well – attempt every question.
1 Lecture 24: Interconnection Networks Topics: topologies, routing, deadlocks, flow control.
7/2/2015 slide 1 PCOD: Scalable Parallelism (ICs) Per Stenström (c) 2008, Sally A. McKee (c) 2011 Scalable Multiprocessors What is a scalable design? (7.1)
Node-to-Network Interface in Scalable Multiprocessors CS 258, Spring 99 David E. Culler Computer Science Division U.C. Berkeley.
CS 258 Parallel Computer Architecture Lecture 8 Network Interface Design February 20, 2008 Prof John D. Kubiatowicz
John Kubiatowicz Electrical Engineering and Computer Sciences
Switching, routing, and flow control in interconnection networks.
CHAPTER 2: COMPUTER-SYSTEM STRUCTURES Computer system operation Computer system operation I/O structure I/O structure Storage structure Storage structure.
High-Level Interconnect Architectures for FPGAs An investigation into network-based interconnect systems for existing and future FPGA architectures Nick.
Multiprocessor Interconnection Networks Todd C. Mowry CS 740 November 3, 2000 Topics Network design issues Network Topology.
ECE669 L21: Routing April 15, 2004 ECE 669 Parallel Computer Architecture Lecture 21 Routing.
Delivery, Forwarding, and Routing of IP Packets
1 Lecture 15: Interconnection Routing Topics: deadlock, flow control.
Networks: Routing, Deadlock, Flow Control, Switch Design, Case Studies Alvin R. Lebeck CPS 220.
CS252 Graduate Computer Architecture Lecture 24 Network Interface Design Memory Consistency Models Prof John D. Kubiatowicz
1 Lecture 22: Interconnection Networks Topics: Routing, deadlock, flow control, virtual channels.
COMP8330/7330/7336 Advanced Parallel and Distributed Computing Communication Costs in Parallel Machines Dr. Xiao Qin Auburn University
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Muhammad Waseem Iqbal Lecture # 20 Data Communication.
Chapter 3 Part 3 Switching and Bridging
CS 704 Advanced Computer Architecture
Architectures of Digital Information Systems Part 1: Interrupts and DMA dr.ir. A.C. Verschueren Eindhoven University of Technology Section of Digital.
Module 12: I/O Systems I/O hardware Application I/O Interface
The network-on-chip protocol
THE OSI MODEL By: Omari Dasent.
Advanced Computer Networks
Lecture 23: Interconnection Networks
Physical constraints (1/2)
Chapter 3 Part 3 Switching and Bridging
18-WAN Technologies and Dynamic routing
Interconnection Network Routing, Topology Design Trade-offs
Interconnection Network Design Contd.
CMSC 611: Advanced Computer Architecture
Architecture of Parallel Computers CSC / ECE 506 Summer 2006 Scalable Programming Models Lecture 11 6/19/2006 Dr Steve Hunter.
Switching, routing, and flow control in interconnection networks
CS 258 Reading Assignment 4 Discussion Exploiting Two-Case Delivery for Fast Protected Messages Bill Kramer February 13, 2002 #
Lecture 14: Interconnection Networks
Module 2: Computer-System Structures
Introduction to Scalable Interconnection Networks
Operating System Concepts
Computer Science Division
The Network Layer Network Layer Design Issues:
On-time Network On-chip
PRESENTATION COMPUTER NETWORKS
Morgan Kaufmann Publishers Memory Hierarchy: Virtual Memory
Interconnection Networks Contd.
Lecture: Interconnection Networks
Chapter 3 Part 3 Switching and Bridging
Chapter 13: I/O Systems I/O Hardware Application I/O Interface
CS 6290 Many-core & Interconnect
Ch 17 - Binding Protocol Addresses
John Kubiatowicz Electrical Engineering and Computer Sciences
CS 258 Parallel Computer Architecture Lecture 5 Routing (Con’t)
Networks: Routing and Design
Lecture 25: Interconnection Networks
Switching, routing, and flow control in interconnection networks
Module 2: Computer-System Structures
Chapter 13: I/O Systems.
Module 12: I/O Systems I/O hardwared Application I/O Interface
Multiprocessors and Multi-computers
Chapter 13: I/O Systems “The two main jobs of a computer are I/O and [CPU] processing. In many cases, the main job is I/O, and the [CPU] processing is.
Presentation transcript:

CS252 Graduate Computer Architecture Lecture 16 Multiprocessor Networks (con’t) March 29th, 2010 John Kubiatowicz Electrical Engineering and Computer Sciences University of California, Berkeley http://www.eecs.berkeley.edu/~kubitron/cs252

Review: The Routing problem: Local decisions Routing at each hop: Pick next output port! 3/29/2010 cs252-S10, Lecture 16

Reducing routing delay: Express Cubes Problem: Low-dimensional networks have high k Consequence: may have to travel many hops in single dimension Routing latency can dominate long-distance traffic patterns Solution: Provide one or more “express” links Like express trains, express elevators, etc Delay linear with distance, lower constant Closer to “speed of light” in medium Lower power, since no router cost “Express Cubes: Improving performance of k-ary n-cube interconnection networks,” Bill Dally 1991 Another Idea: route with pass transistors through links 3/29/2010 cs252-S10, Lecture 16

Review: Virtual Channel Flow Control Basic Idea: Use of virtual channels to reduce contention Provided a model of k-ary, n-flies Also provided simulation Tradeoff: Better to split buffers into virtual channels Example (constant total storage for 2-ary 8-fly): 3/29/2010 cs252-S10, Lecture 16

When are virtual channels allocated? Hardware efficient design For crossbar Two separate processes: Virtual channel allocation Switch/connection allocation Virtual Channel Allocation Choose route and free output virtual channel Really means: Source of link tracks channels at destination Switch Allocation For incoming virtual channel, negotiate switch on outgoing pin 3/29/2010 cs252-S10, Lecture 16

Deadlock Freedom How can deadlock arise? How do you avoid it? necessary conditions: shared resource incrementally allocated non-preemptible channel is a shared resource that is acquired incrementally source buffer then dest. buffer channels along a route How do you avoid it? constrain how channel resources are allocated ex: dimension order Important assumption: Destination of messages must always remove messages How do you prove that a routing algorithm is deadlock free? Show that channel dependency graph has no cycles! 3/29/2010 cs252-S10, Lecture 16

Consider Trees Why is the obvious routing on X deadlock free? butterfly? tree? fat tree? Any assumptions about routing mechanism? amount of buffering? 3/29/2010 cs252-S10, Lecture 16

Up*-Down* routing for general topology Given any bidirectional network Construct a spanning tree Number of the nodes increasing from leaves to roots UP increase node numbers Any Source -> Dest by UP*-DOWN* route up edges, single turn, down edges Proof of deadlock freedom? Performance? Some numberings and routes much better than others interacts with topology in strange ways 3/29/2010 cs252-S10, Lecture 16

Turn Restrictions in X,Y XY routing forbids 4 of 8 turns and leaves no room for adaptive routing Can you allow more turns and still be deadlock free? 3/29/2010 cs252-S10, Lecture 16

Minimal turn restrictions in 2D +y +x -x north-last negative first -y 3/29/2010 cs252-S10, Lecture 16

Example legal west-first routes Can route around failures or congestion Can combine turn restrictions with virtual channels 3/29/2010 cs252-S10, Lecture 16

General Proof Technique resources are logically associated with channels messages introduce dependences between resources as they move forward need to articulate the possible dependences that can arise between channels show that there are no cycles in Channel Dependence Graph find a numbering of channel resources such that every legal route follows a monotonic sequence  no traffic pattern can lead to deadlock network need not be acyclic, just channel dependence graph 3/29/2010 cs252-S10, Lecture 16

Example: k-ary 2D array Thm: Dimension-ordered (x,y) routing is deadlock free Numbering +x channel (i,y) -> (i+1,y) gets i similarly for -x with 0 as most positive edge +y channel (x,j) -> (x,j+1) gets N+j similary for -y channels any routing sequence: x direction, turn, y direction is increasing Generalization: “e-cube routing” on 3-D: X then Y then Z 3/29/2010 cs252-S10, Lecture 16

Channel Dependence Graph 3/29/2010 cs252-S10, Lecture 16

More examples: What about wormhole routing on a ring? Or: Unidirectional Torus of higher dimension? 2 1 3 7 4 6 5 3/29/2010 cs252-S10, Lecture 16

Breaking deadlock with virtual channels Basic idea: Use virtual channels to break cycles Whenever wrap around, switch to different set of channels Can produce numbering that avoids deadlock 3/29/2010 cs252-S10, Lecture 16

General Adaptive Routing R: C x N x S -> C Essential for fault tolerance at least multipath Can improve utilization of the network Simple deterministic algorithms easily run into bad permutations fully/partially adaptive, minimal/non-minimal can introduce complexity or anomalies little adaptation goes a long way! 3/29/2010 cs252-S10, Lecture 16

Paper Discusion: Linder and Harden “An Adaptive and Fault Tolerant Wormhole” General virtual-channel scheme for k-ary n-cubes With wrap-around paths Properties of result for uni-directional k-ary n-cube: 1 virtual interconnection network n+1 levels Properties of result for bi-directional k-ary n-cube: 2n-1 virtual interconnection networks n+1 levels per network 3/29/2010 cs252-S10, Lecture 16

Example: Unidirectional 4-ary 2-cube Physical Network Wrap-around channels necessary but can cause deadlock Virtual Network Use VCs to avoid deadlock 1 level for each wrap-around 3/29/2010 cs252-S10, Lecture 16

Bi-directional 4-ary 2-cube: 2 virtual networks 3/29/2010 cs252-S10, Lecture 16

Use of virtual channels for adaptation Want to route around hotspots/faults while avoiding deadlock Linder and Harden, 1991 General technique for k-ary n-cubes Requires: 2n-1 virtual channels/lane!!! Alternative: Planar adaptive routing Chien and Kim, 1995 Divide dimensions into “planes”, i.e. in 3-cube, use X-Y and Y-Z Route planes adaptively in order: first X-Y, then Y-Z Never go back to plane once have left it Can’t leave plane until have routed lowest coordinate Use Linder-Harden technique for series of 2-dim planes Now, need only 3  number of planes virtual channels Alternative: two phase routing Provide set of virtual channels that can be used arbitrarily for routing When blocked, use unrelated virtual channels for dimension-order (deterministic) routing Never progress from deterministic routing back to adaptive routing 3/29/2010 cs252-S10, Lecture 16

Administrative Midterm I: Still grading I’ve posted solutions, so you can look at them I hope to have exams graded soon (by end of week at latest) Sorry about this – two proposals and a root-canal got in the way Should be working full blast on project by now! I’m going to want you to submit an update next week on Wednesday We will meet shortly after that 3/29/2010 cs252-S10, Lecture 16

Midterm Problem 2 solution: Bypassing … Register Lookup EX2 MEM1 EX3 MEM2 Reorder Buffer and Ready Instruction Selection Logic EX1 FP1 FP2 FP3 FP5 FP4 Addr Ready Instructions ROB D Register Writeback [I,L,G] [I] [A] [G,M] [D] [I,A] [I,A,G,M] [I,A,G,M,D] [L,G] All bypass results available for either pipeline. Also, results bypassed to end of register lookup stage. Bypass for Stores 3/29/2010 cs252-S10, Lecture 16

Paper Discussion: Tiled CMP On-Chip Networks James Balfour and William Dally: “Design Tradeoffs for Tiled CMP On-Chip Networks” Detailed model of 64-node network Wire model from “Future of Wires” paper Explicit layout on 6-metal technology Partitioned crossbar Worry about VIAs Input Buffer Partitioned Crossbar 3/29/2010 cs252-S10, Lecture 16

CMP Network paper (con’t) 5-different network topologies Results 3/29/2010 cs252-S10, Lecture 16

Message passing Sending of messages under control of programmer User-level/system level? Bulk transfers? How efficient is it to send and receive messages? Speed of memory bus? First-level cache? Communication Model: Synchronous Send completes after matching recv and source data sent Receive completes after data transfer complete from matching send Asynchronous Send completes after send buffer may be reused 3/29/2010 cs252-S10, Lecture 16

Synchronous Message Passing Processor Action? Constrained programming model. Deterministic! What happens when threads added? Destination contention very limited. User/System boundary? 3/29/2010 cs252-S10, Lecture 16

Asynch. Message Passing: Optimistic More powerful programming model Wildcard receive => non-deterministic Storage required within msg layer? 3/29/2010 cs252-S10, Lecture 16

Asynch. Msg Passing: Conservative Where is the buffering? Contention control? Receiver initiated protocol? Short message optimizations 3/29/2010 cs252-S10, Lecture 16

Features of Msg Passing Abstraction Source knows send data address, dest. knows receive data address after handshake they both know both Arbitrary storage “outside the local address spaces” may post many sends before any receives non-blocking asynchronous sends reduces the requirement to an arbitrary number of descriptors fine print says these are limited too Optimistically, can be 1-phase transaction Compare to 2-phase for shared address space Need some sort of flow control Credit scheme? More conservative: 3-phase transaction includes a request / response Essential point: combined synchronization and communication in a single package! 3/29/2010 cs252-S10, Lecture 16

Discussion of Active Messages paper Thorsten von Eicken, David E. Culler, Seth Copen Goldstein, Laus Erik Schauser: “Active messages: a mechanism for integrated communication and computation” Essential idea? Fast message primitive Handlers must be non-blocking! Head of message contains pointer to code to run on destination node Could be compiled from Split-C into TAM runtime Much better balance of network and computation on existing hardware! 3/29/2010 cs252-S10, Lecture 16

Active Messages User-level analog of network transaction Request/Reply handler Reply handler User-level analog of network transaction transfer data packet and invoke handler to extract it from the network and integrate with on-going computation Request/Reply Event notification: interrupts, polling, events? May also perform memory-to-memory transfer 3/29/2010 cs252-S10, Lecture 16

Common Challenges Input buffer overflow Options: N-1 queue over-commitment => must slow sources Options: reserve space per source (credit) when available for reuse? Ack or Higher level Refuse input when full backpressure in reliable network tree saturation deadlock free what happens to traffic not bound for congested dest? Reserve ack back channel drop packets Utilize higher-level semantics of programming model 3/29/2010 cs252-S10, Lecture 16

Spectrum of Designs None: Physical bit stream User/System blind, physical DMA nCUBE, iPSC, . . . User/System User-level port CM-5, *T, Alewife, RAW User-level handler J-Machine, Monsoon, . . . Remote virtual address Processing, translation Paragon, Meiko CS-2 Global physical address Proc + Memory controller RP3, BBN, T3D Cache-to-cache Cache controller Dash, Alewife, KSR, Flash Increasing HW Support, Specialization, Intrusiveness, Performance (???) 3/29/2010 cs252-S10, Lecture 16

Net Transactions: Physical DMA DMA controlled by regs, generates interrupts Physical => OS initiates transfers Send-side construct system “envelope” around user data in kernel area Receive receive into system buffer, since no interpretation in user space sender auth dest addr 3/29/2010 cs252-S10, Lecture 16

nCUBE Network Interface independent DMA channel per link direction leave input buffers always open segmented messages routing interprets envelope dimension-order routing on hypercube bit-serial with 36 bit cut-through Os 16 ins 260 cy 13 us Or 18 200 cy 15 us - includes interrupt 3/29/2010 cs252-S10, Lecture 16

Conventional LAN NI Costs: Marshalling, OS calls, interrupts Host Memory NIC trncv Data NIC Controller TX addr DMA RX len Addr Len Status Next Addr Len Status Next IO Bus mem bus Addr Len Status Next Addr Len Status Next Proc Addr Len Status Next Addr Len Status Next Costs: Marshalling, OS calls, interrupts 3/29/2010 cs252-S10, Lecture 16

User Level Ports initiate transaction at user level deliver to user without OS intervention network port in user space May use virtual memory to map physical I/O to user mode User/system flag in envelope protection check, translation, routing, media access in src CA user/sys check in dest CA, interrupt on system 3/29/2010 cs252-S10, Lecture 16

Example: CM-5 Input and output FIFO for each network 2 data networks tag per message index NI mapping table context switching? Alewife integrated NI on chip *T and iWARP also Os 50 cy 1.5 us Or 53 cy 1.6 us interrupt 10us 3/29/2010 cs252-S10, Lecture 16

RAW processor: Systolic Computation Very fast support for systolic processing Streaming from one processor to another Simple moves into network ports and out of network ports Static router programmed at same time as processors Also included dynamic network for unpredictable computations (and things like cache misses) 3/29/2010 cs252-S10, Lecture 16

User Level Handlers U s e r / y t m P M D a A d ° Hardware support to vector to address specified in message On arrival, hardware fetches handler address and starts execution Active Messages: two options Computation in background threads Handler never blocks: it integrates message into computation Computation in handlers (Message Driven Processing) Handler does work, may need to send messages or block 3/29/2010 cs252-S10, Lecture 16

J-Machine Each node a small mdg driven processor HW support to queue msgs and dispatch to msg handler task 3/29/2010 cs252-S10, Lecture 16

Alewife Messaging Send message Receive write words to special network interface registers Execute atomic launch instruction Receive Generate interrupt/launch user-level thread context Examine message by reading from special network interface registers Execute dispose message Exit atomic section 3/29/2010 cs252-S10, Lecture 16

Sharing of Network Interface What if user in middle of constructing message and must context switch??? Need Atomic Send operation! Message either completely in network or not at all Can save/restore user’s work if necessary (think about single set of network interface registers J-Machine mistake: after start sending message must let sender finish Flits start entering network with first SEND instruction Only a SENDE instruction constructs tail of message Receive Atomicity If want to allow user-level interrupts or polling, must give user control over network reception Closer user is to network, easier it is for him/her to screw it up: Refuse to empty network, etc However, must allow atomicity: way for good user to select when their message handlers get interrupted Polling: ultimate receive atomicity – never interrupted Fine as long as user keeps absorbing messages 3/29/2010 cs252-S10, Lecture 16

The Fetch Deadlock Problem Even if a node cannot issue a request, it must sink network transactions! Incoming transaction may be request  generate a response. Closed system (finite buffering) Deadlock occurs even if network deadlock free! NETWORK 3/29/2010 cs252-S10, Lecture 16

Solutions to Fetch Deadlock? logically independent request/reply networks physical networks virtual channels with separate input/output queues bound requests and reserve input buffer space K(P-1) requests + K responses per node service discipline to avoid fetch deadlock? NACK on input buffer full NACK delivery? Alewife Solution: Dynamically increase buffer space to memory when necessary Argument: this is an uncommon case, so use software to fix 3/29/2010 cs252-S10, Lecture 16

Example Queue Topology: Alewife Message-Passing and Shared-Memory both need messages Thus, can provide both! When deadlock detected, start storing messages to memory (out of hardware) Remove deadlock by increasing available queue space When network starts flowing again, relaunch queued messages They take loopback path to be handled by local hardware 3/29/2010 cs252-S10, Lecture 16

Summary #1 Routing Algorithms restrict the set of routes within the topology simple mechanism selects turn at each hop arithmetic, selection, lookup Virtual Channels Adds complexity to router Can be used for performance Can be used for deadlock avoidance Deadlock-free if channel dependence graph is acyclic limit turns to eliminate dependences add separate channel resources to break dependences combination of topology, algorithm, and switch design Deterministic vs adaptive routing 3/29/2010 cs252-S10, Lecture 16

Summary #2 Many different Message-Passing styles “Fetch Deadlock” Global Address space: 2-way Optimistic message passing: 1-way Conservative transfer: 3-way “Fetch Deadlock” RequestResponse introduces cycle through network Fix with: 2 networks dynamic increase in buffer space Network Interfaces User-level access DMA Atomicity 3/29/2010 cs252-S10, Lecture 16