George Michelogiannakis, Nan Jiang, Daniel Becker, William J. Dally This work was completed in Stanford University.

Slides:



Advertisements
Similar presentations
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Advertisements

Prof. Natalie Enright Jerger
Adaptive Backpressure: Efficient Buffer Management for On-Chip Networks Daniel U. Becker, Nan Jiang, George Michelogiannakis, William J. Dally Stanford.
B 黃冠智.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
Evaluating Bufferless Flow Control for On-Chip Networks George Michelogiannakis, Daniel Sanchez, William J. Dally, Christos Kozyrakis Stanford University.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 Message passing architectures and routing CEG 4131 Computer Architecture III Miodrag Bolic Material for these slides is taken from the book: W. Dally,
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Optical communications & networking - an Overview
What is Flow Control ? Flow Control determines how a network resources, such as channel bandwidth, buffer capacity and control state are allocated to packet.
High Performance Router Architectures for Network- based Computing By Dr. Timothy Mark Pinkston University of South California Computer Engineering Division.
1 Lecture 12: Interconnection Networks Topics: dimension/arity, routing, deadlock, flow control.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
1 Lecture 24: Interconnection Networks Topics: topologies, routing, deadlocks, flow control Final exam reminders:  Plan well – attempt every question.
1 Lecture 5: Directory Protocols Topics: directory-based cache coherence implementations.
1 Lecture 24: Interconnection Networks Topics: topologies, routing, deadlocks, flow control.
1 Lecture 26: Interconnection Networks Topics: flow control, router microarchitecture.
1 Indirect Adaptive Routing on Large Scale Interconnection Networks Nan Jiang, William J. Dally Computer System Laboratory Stanford University John Kim.
A Scalable, Commodity Data Center Network Architecture Mohammad Al-Fares, Alexander Loukissas, Amin Vahdat Presented by Gregory Peaker and Tyler Maclean.
Storage area network and System area network (SAN)
Dragonfly Topology and Routing
Performance and Power Efficient On-Chip Communication Using Adaptive Virtual Point-to-Point Connections M. Modarressi, H. Sarbazi-Azad, and A. Tavakkol.
Network Hardware for Expanding Network. Expanding Networks When do we need expansion:  Network cable is full of data movements  Printing tasks needs.
Switching, routing, and flow control in interconnection networks.
Switching Techniques Student: Blidaru Catalina Elena.
The Zone Routing Protocol (ZRP)
1 The Turn Model for Adaptive Routing. 2 Summary Introduction to Direct Networks. Deadlocks in Wormhole Routing. System Model. Partially Adaptive Routing.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
High-Performance Networks for Dataflow Architectures Pravin Bhat Andrew Putnam.
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the  Bus  Ring  Star.
Routing Protocol Evaluation David Holmer
1 Protection Mechanisms for Optical WDM Networks based on Wavelength Converter Multiplexing and Backup Path Relocation Techniques Sunil Gowda and Krishna.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
Improving QoS Support in Mobile Ad Hoc Networks Agenda Motivations Proposed Framework Packet-level FEC Multipath Routing Simulation Results Conclusions.
Communication Networks Fourth Meeting. Types of Networks  What is a circuit network?  Two people are connected and allocated them their own physical.
Author : Jing Lin, Xiaola Lin, Liang Tang Publish Journal of parallel and Distributed Computing MAKING-A-STOP: A NEW BUFFERLESS ROUTING ALGORITHM FOR ON-CHIP.
Circuit & Packet Switching. ► Two ways of achieving the same goal. ► The transfer of data across networks. ► Both methods have advantages and disadvantages.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
CS 8501 Networks-on-Chip (NoCs) Lukasz Szafaryn 15 FEB 10.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
1 Lecture 15: Interconnection Routing Topics: deadlock, flow control.
Interconnect simulation. Different levels for Evaluating an architecture Numerical models – Mathematic formulations to obtain performance characteristics.
Interconnect simulation. Different levels for Evaluating an architecture Numerical models – Mathematic formulations to obtain performance characteristics.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
1 Lecture 24: Interconnection Networks Topics: communication latency, centralized and decentralized switches, routing, deadlocks (Appendix F)
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
Chapter 10 Congestion Control in Data Networks and Internets 1 Chapter 10 Congestion Control in Data Networks and Internets.
1 Lecture 22: Interconnection Networks Topics: Routing, deadlock, flow control, virtual channels.
COMP8330/7330/7336 Advanced Parallel and Distributed Computing Communication Costs in Parallel Machines Dr. Xiao Qin Auburn University
Network Hardware for Expanding Network
How to Train your Dragonfly
Topics discussed in this section:
CT301 LECTURE 8.
A Bandwidth-Efficient and Low-Latency Packet Assembly Strategy for Optical Burst Switching in Metro Ring Prasanna Krishnamoorthy, Andrea Fumagalli Optical.
Datacenter Interconnection Network Design
CIS, University of Delaware
Fast Congestion Control in RDMA-Based Datacenter Networks
Figure Areas in an autonomous system
Lecture: Interconnection Networks
Optical communications & networking - an Overview
Dragonfly+: Low Cost Topology for scaling Datacenters
In-network computation
Presentation transcript:

George Michelogiannakis, Nan Jiang, Daniel Becker, William J. Dally This work was completed in Stanford University

 HPC and datacenter networks increasingly oversubscribed ◦ Exascale for HPC may need 1 billion-way parallelism ◦ Datacenter server count annual growth 7-17%  Levels of expensive bandwidth: ◦ Between servers (intra-rack) ◦ Between racks (intra-cluster) ◦ Between clusters (intra-datacenter) ◦ Between buildings (metro) ◦ Between regions (longhaul) Facebook’s datacenter network architecture. OSI 2013 Why optical data communications and why now? Applied Physics. 2009

 To make it worse, many traffic patterns create unbalanced load ◦ Unbalanced load creates long paths of blocked packets (known as tree saturation)  I’ll present a channel reservation protocol which prevents network and endpoint congestion  We focus on lossless flow control ◦ Tree saturation is a major drawback

 Motivation and related work  Channel reservation protocol  Evaluation

H Cluster 1 Cluster 2 Oversubscribed channels Oversubscribed Tree saturation root. Affects benign traffic This setting represents over-subscribed links between network clusters, or even between racks

 Adversarial pattern tops at 5% flit injection  Benign pattern slightly higher (6- 7%)  Ideal flow control would avoid any interference Benign traffic is negatively affected

Oversubscribed channels ECN detects congestion at the root of the congestion tree Signals to the sources to throttle down ECN: State of the art congestion handling scheme

 Motivation and related work  Channel reservation protocol  Evaluation

Potentially long packet sent speculativelyEncounters congestion. Converted to a single-flit reservation request Reply (ACK) creates reservations for the chosen time slot in all oversubscribed resources H Cluster 1 Cluster 2 Oversubscribed Resource available cycles 5 and 10 Destination available cycles 10 and 15. Result: cycle 10 Destination reserves cycle 10 Channel is reserved for cycle 10 Source is informed to transmit in cycle 10

Challenge: Participant’s availabilities are distributed across the network

 Reservation table is one line in the Doodle  Doodle asks for the length of time slots ◦ We call a time slot a cell ◦ Cells have C max cycles  We keep a counter per cell because packet sizes differ Cell labelsABCDE…V cells Cell values …50

 Request packets carry a vector to record what time slots are available in the resources traversed so far  This is used to build up to the final result of the Doodle Cell labelsABCDE…V cells Cell values TTFFT…F

 Request size: 80 cycles Cell labelsABCDE…V cells Cell values …50 Cell labelsABCDE…V cells Cell values TTTTT…T Cell labelsABCDE…V cells Cell values TTTFF…F

Cell labelsABCDE…V cells Cell values …90 Cell labelsABCDE…V cells Cell values TTTFF…F Cell labelsABCDE…V cells Cell values FTTFF…F

We have identified the common availability. Now we need to inform everybody

Cell labelsABCDE…V cells Cell values …90 Original destination table: Cell labelsABCDE…V cells Cell values …90 Resulting destination table: Subtracts reservation size (80 cycles) from the appropriate cells (time slots)

 Reserves 80 cycles starting from the granted timestamp cell (time slot) Cell labelsABCDE…V cells Cell values …50 Original reservation table: Cell labelsABCDE…V cells Cell values …50 Resulting reservation table:

 If participants cannot agree on a time, we wait and then try again  If time slot no longer available, ACK is converted to a retry  If network uncongested, speculative packets succeed and no overhead for reservation

 Motivation and related work  Channel reservation protocol  Evaluation

 Two clusters of 144-node fat trees ◦ 12x12 routers  Clusters connected with four channels ◦ All channels are 10Gb/s  Messages 2KB, divided into eight packets ◦ CRP applies to the message Oversubscribed H 4

By the time ECN reacts, the flow is done ECN does not share congestion state with other destinations in the same cluster Oversubscribed 4 A B S

ECN can be configured to prevent tree saturation in steady-state traffic

3.5% lower for CRP CRP has extra control overhead

300,000 cycles to stabilize for ECN ECN allows congestion occur and reacts to it. CRP prevents it entirely

300,000 cycles to stabilize for ECN ECN’s maximum latency: 37,000 cycles ECN allows congestion occur and reacts to it. CRP prevents it entirely

ECN configuration is sensitive to network topology, routing, and traffic pattern

ECN needs to be reconfigured

 CRP is a statistical scheme to avoid overwhelming channels and destinations  CRP effectively prevents congestion ◦ Avoids pitfalls of ECN and reactive techniques  CRP focuses on lossless flow control but similar benefits are possible in lossy flow control ◦ Congestion causes many packet drops