CS252 Graduate Computer Architecture Lecture 17 Multiprocessor Networks (con’t) March 31 th, 2010 John Kubiatowicz Electrical Engineering and Computer.

Slides:



Advertisements
Similar presentations
Computer Architecture
Advertisements

CS252 Graduate Computer Architecture Lecture 16 Multiprocessor Networks (con’t) March 16 th, 2011 John Kubiatowicz Electrical Engineering and Computer.
SE-292 High Performance Computing
1/1/ / faculty of Electrical Engineering eindhoven university of technology Architectures of Digital Information Systems Part 1: Interrupts and DMA dr.ir.
1/1/ / faculty of Electrical Engineering eindhoven university of technology Processor support devices Part 1:Interrupts and shared memory dr.ir. A.C. Verschueren.
Chapter 12 CPU Structure and Function. CPU Sequence Fetch instructions Interpret instructions Fetch data Process data Write data.
Graduate Computer Architecture, Fall 2005 Lecture 10 Distributed Memory Multiprocessors Shih-Hao Hung Computer Science & Information Engineering National.
AMLAPI: Active Messages over Low-level Application Programming Interface Simon Yau, Tyson Condie,
Multiple Processor Systems
CSCI 8150 Advanced Computer Architecture Hwang, Chapter 1 Parallel Computer Models 1.2 Multiprocessors and Multicomputers.
Computer Systems/Operating Systems - Class 8
Realizing Programming Models CS 258, Spring 99 David E. Culler Computer Science Division U.C. Berkeley.
1 Lecture 12: Interconnection Networks Topics: dimension/arity, routing, deadlock, flow control.
ECE669 L20: Evaluation and Message Passing April 13, 2004 ECE 669 Parallel Computer Architecture Lecture 20 Evaluation and Message Passing.
OS2-1 Chapter 2 Computer System Structures. OS2-2 Outlines Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection.
Scalable Distributed Memory Multiprocessors Todd C. Mowry CS 495 October 24 & 29, 2002.
Architectural Support for Operating Systems. Announcements Most office hours are finalized Assignments up every Wednesday, due next week CS 415 section.
CS 258 Parallel Computer Architecture Lecture 5 Routing February 6, 2008 Prof John D. Kubiatowicz
Inter Process Communication:  It is an essential aspect of process management. By allowing processes to communicate with each other: 1.We can synchronize.
Haoyuan Li CS 6410 Fall /15/2009.  U-Net: A User-Level Network Interface for Parallel and Distributed Computing ◦ Thorsten von Eicken, Anindya.
Active Messages: a Mechanism for Integrated Communication and Computation von Eicken et. al. Brian Kazian CS258 Spring 2008.
3.5 Interprocess Communication
1 Lecture 24: Interconnection Networks Topics: topologies, routing, deadlocks, flow control Final exam reminders:  Plan well – attempt every question.
CS533 - Concepts of Operating Systems
12/13/99 Page 1 IRAM Network Interface Ioannis Mavroidis IRAM retreat January 12-14, 2000.
Computer System Overview Chapter 1. Basic computer structure CPU Memory memory bus I/O bus diskNet interface.
General Purpose Node-to-Network Interface in Scalable Multiprocessors CS 258, Spring 99 David E. Culler Computer Science Division U.C. Berkeley.
1 Lecture 24: Interconnection Networks Topics: topologies, routing, deadlocks, flow control.
7/2/2015 slide 1 PCOD: Scalable Parallelism (ICs) Per Stenström (c) 2008, Sally A. McKee (c) 2011 Scalable Multiprocessors What is a scalable design? (7.1)
Node-to-Network Interface in Scalable Multiprocessors CS 258, Spring 99 David E. Culler Computer Science Division U.C. Berkeley.
PRASHANTHI NARAYAN NETTEM.
CS 258 Parallel Computer Architecture Lecture 8 Network Interface Design February 20, 2008 Prof John D. Kubiatowicz
Ethan Kao CS 6410 Oct. 18 th  Active Messages: A Mechanism for Integrated Communication and Control, Thorsten von Eicken, David E. Culler, Seth.
Gursharan Singh Tatla Transport Layer 16-May
Switching, routing, and flow control in interconnection networks.
Synchronization and Communication in the T3E Multiprocessor.
Multiple Processor Systems. Multiprocessor Systems Continuous need for faster and powerful computers –shared memory model ( access nsec) –message passing.
Hardware Definitions –Port: Point of connection –Bus: Interface Daisy Chain (A=>B=>…=>X) Shared Direct Device Access –Controller: Device Electronics –Registers:
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
CHAPTER 2: COMPUTER-SYSTEM STRUCTURES Computer system operation Computer system operation I/O structure I/O structure Storage structure Storage structure.
© Janice Regan, CMPT 300, May CMPT 300 Introduction to Operating Systems Principles of I/0 hardware.
Operating Systems Lecture 2 Processes and Threads Adapted from Operating Systems Lecture Notes, Copyright 1997 Martin C. Rinard. Zhiqing Liu School of.
ECE669 L21: Routing April 15, 2004 ECE 669 Parallel Computer Architecture Lecture 21 Routing.
CS252 Graduate Computer Architecture Lecture 17 Multiprocessor Networks (con’t) March 18 th, 2012 John Kubiatowicz Electrical Engineering and Computer.
By Teacher Asma Aleisa Year 1433 H.   Goals of memory management  To provide a convenient abstraction for programming.  To allocate scarce memory.
CS533 - Concepts of Operating Systems 1 The Mach System Presented by Catherine Vilhauer.
Graduate Computer Architecture I Lecture 11: Distribute Memory Multiprocessors.
Computer Network Lab. Korea University Computer Networks Labs Se-Hee Whang.
Chapter 13 – I/O Systems (Pgs ). Devices  Two conflicting properties A. Growing uniformity in interfaces (both h/w and s/w): e.g., USB, TWAIN.
Caltech CS184 Spring DeHon 1 CS184b: Computer Architecture (Abstractions and Optimizations) Day 14: May 7, 2003 Fast Messaging.
Networks: Routing, Deadlock, Flow Control, Switch Design, Case Studies Alvin R. Lebeck CPS 220.
CS252 Graduate Computer Architecture Lecture 24 Network Interface Design Memory Consistency Models Prof John D. Kubiatowicz
1 Device Controller I/O units typically consist of A mechanical component: the device itself An electronic component: the device controller or adapter.
Interrupts and Exception Handling. Execution We are quite aware of the Fetch, Execute process of the control unit of the CPU –Fetch and instruction as.
1 Lecture 22: Interconnection Networks Topics: Routing, deadlock, flow control, virtual channels.
COMP8330/7330/7336 Advanced Parallel and Distributed Computing Communication Costs in Parallel Machines Dr. Xiao Qin Auburn University
Lecture 20: Consistency Models, TM
Architectures of Digital Information Systems Part 1: Interrupts and DMA dr.ir. A.C. Verschueren Eindhoven University of Technology Section of Digital.
John Kubiatowicz Electrical Engineering and Computer Sciences
CMSC 611: Advanced Computer Architecture
Architecture of Parallel Computers CSC / ECE 506 Summer 2006 Scalable Programming Models Lecture 11 6/19/2006 Dr Steve Hunter.
Switching, routing, and flow control in interconnection networks
CS 258 Reading Assignment 4 Discussion Exploiting Two-Case Delivery for Fast Protected Messages Bill Kramer February 13, 2002 #
Computer Science Division
Threads Chapter 4.
Lecture: Interconnection Networks
Chapter 13: I/O Systems I/O Hardware Application I/O Interface
Ch 17 - Binding Protocol Addresses
Lecture 24: Multiprocessors
John Kubiatowicz Electrical Engineering and Computer Sciences
Presentation transcript:

CS252 Graduate Computer Architecture Lecture 17 Multiprocessor Networks (con’t) March 31 th, 2010 John Kubiatowicz Electrical Engineering and Computer Sciences University of California, Berkeley

3/31/2010cs252-S10, Lecture 17 2 Recall: Deadlock Freedom How can deadlock arise? –necessary conditions: »shared resource »incrementally allocated »non-preemptible –channel is a shared resource that is acquired incrementally »source buffer then dest. buffer »channels along a route How do you avoid it? –constrain how channel resources are allocated –ex: dimension order Important assumption: –Destination of messages must always remove messages How do you prove that a routing algorithm is deadlock free? –Show that channel dependency graph has no cycles!

3/31/2010cs252-S10, Lecture 17 3 Recall: Use of virtual channels for adaptation Want to route around hotspots/faults while avoiding deadlock Linder and Harden, 1991 –General technique for k-ary n-cubes »Requires: 2 n-1 virtual channels/lane!!! Alternative: Planar adaptive routing –Chien and Kim, 1995 –Divide dimensions into “planes”, »i.e. in 3-cube, use X-Y and Y-Z –Route planes adaptively in order: first X-Y, then Y-Z »Never go back to plane once have left it »Can’t leave plane until have routed lowest coordinate –Use Linder-Harden technique for series of 2-dim planes »Now, need only 3  number of planes virtual channels Alternative: two phase routing –Provide set of virtual channels that can be used arbitrarily for routing –When blocked, use unrelated virtual channels for dimension-order (deterministic) routing –Never progress from deterministic routing back to adaptive routing

3/31/2010cs252-S10, Lecture 17 4 Network Transaction Primitive one-way transfer of information from a source output buffer to a dest. input buffer –causes some action at the destination –occurrence is not directly visible at source deposit data, state change, reply

3/31/2010cs252-S10, Lecture 17 5 Shared Address Space Abstraction Fundamentally a two-way request/response protocol –writes have an acknowledgement Issues –fixed or variable length (bulk) transfers –remote virtual or physical address, where is action performed? –deadlock avoidance and input buffer full coherent? consistent?

3/31/2010cs252-S10, Lecture 17 6 Consistency write-atomicity violated without caching –No way to enforce serialization Solution? Acknowledge write of A before writing Flag… P3P3 P2P2 P1P1

3/31/2010cs252-S10, Lecture 17 7 Properties of Shared Address Abstraction Source and destination data addresses are specified by the source of the request –a degree of logical coupling and trust no storage logically “outside the address space” –may employ temporary buffers for transport Operations are fundamentally request response Remote operation can be performed on remote memory –logically does not require intervention of the remote processor

3/31/2010cs252-S10, Lecture 17 8 Message passing Sending of messages under control of programmer –User-level/system level? –Bulk transfers? How efficient is it to send and receive messages? –Speed of memory bus? First-level cache? Communication Model: –Synchronous »Send completes after matching recv and source data sent »Receive completes after data transfer complete from matching send –Asynchronous »Send completes after send buffer may be reused

3/31/2010cs252-S10, Lecture 17 9 Synchronous Message Passing Constrained programming model. Deterministic! What happens when threads added? Destination contention very limited. User/System boundary? Processor Action?

3/31/2010cs252-S10, Lecture Asynch. Message Passing: Optimistic More powerful programming model Wildcard receive => non-deterministic Storage required within msg layer?

3/31/2010cs252-S10, Lecture Asynch. Msg Passing: Conservative Where is the buffering? Contention control? Receiver initiated protocol? Short message optimizations

3/31/2010cs252-S10, Lecture Features of Msg Passing Abstraction Source knows send data address, dest. knows receive data address –after handshake they both know both Arbitrary storage “outside the local address spaces” –may post many sends before any receives –non-blocking asynchronous sends reduces the requirement to an arbitrary number of descriptors »fine print says these are limited too Optimistically, can be 1-phase transaction –Compare to 2-phase for shared address space –Need some sort of flow control »Credit scheme? More conservative: 3-phase transaction –includes a request / response Essential point: combined synchronization and communication in a single package!

3/31/2010cs252-S10, Lecture Common Challenges Input buffer overflow –N-1 queue over-commitment => must slow sources Options: –reserve space per source(credit) »when available for reuse? Ack or Higher level –Refuse input when full »backpressure in reliable network »tree saturation »deadlock free »what happens to traffic not bound for congested dest? –Reserve ack back channel –drop packets –Utilize higher-level semantics of programming model

3/31/2010cs252-S10, Lecture Active Message Protocol Thorsten von Eicken, David E. Culler, Seth Copen Goldstein, Laus Erik Schauser: –“Active messages: a mechanism for integrated communication and computation” Protocol –Sender sends a message to a receiver »Asynchronous send while still computing –Receiver pulls message, integrates into computation through handler »Handler executes without blocking »Handler provides data to ongoing computation Does not perform any computation itself »Handler can only reply to sender, if necessary Request handler Reply

3/31/2010cs252-S10, Lecture Why Active Messages Asynchronous communication –Non-blocking send/receive for overlap No buffering –Only buffering needed within network is needed »Software handles other necessary buffers Improved Performance –Close association with network protocol Handlers are kept simple –Serve as an interface between network and computation Concern becomes overhead, not latency

3/31/2010cs252-S10, Lecture Split-C Extension of C for SPMD Programs –Global address space is partitioned into local and remote –Maps shared memory benefits to distributed memory »Dereference of remote pointers »Keep events associated with message passing models –Split-phase access »Enables dereferencing without interruption of processor Active Messages serve as interface for Split-C –PUT/GET instructions utilized by compiler through prefetching

3/31/2010cs252-S10, Lecture Titanium Implementation Similar to Split-C, Java-based –Utilizes GASNet for network communication »GASNet higher level abstraction of core API with AM –Global address space allows for portability –Skips JVM by compiling translating to C Image from

3/31/2010cs252-S10, Lecture Message Driven Machines Computation is within message handlers Network is integrated into the processor Developed for fine-grain parallelism –Utilizes small messages with low overhead May buffer messages upon receipt –Buffers can grow to any size depending on amount of excess parallelism State of computation is very temporal –Small amount of registers, little locality

3/31/2010cs252-S10, Lecture Administrative Midterm I: Still grading –I’ve posted solutions, so you can look at them –I hope to have exams graded soon (by end of week at latest) »Sorry about this – two proposals and a root-canal got in the way Should be working full blast on project by now! –I’m going to want you to submit an update next week on Wednesday –We will meet shortly after that

3/31/2010cs252-S10, Lecture Spectrum of Designs None: Physical bit stream –blind, physical DMAnCUBE, iPSC,... User/System –User-level portCM-5, *T, Alewife, RAW –User-level handlerJ-Machine, Monsoon,... Remote virtual address –Processing, translationParagon, Meiko CS-2 Global physical address –Proc + Memory controllerRP3, BBN, T3D Cache-to-cache –Cache controllerDash, Alewife, KSR, Flash Increasing HW Support, Specialization, Intrusiveness, Performance (???)

3/31/2010cs252-S10, Lecture Net Transactions: Physical DMA DMA controlled by regs, generates interrupts Physical => OS initiates transfers Send-side –construct system “envelope” around user data in kernel area Receive –receive into system buffer, since no interpretation in user space senderauth dest addr

3/31/2010cs252-S10, Lecture nCUBE Network Interface independent DMA channel per link direction –leave input buffers always open –segmented messages routing interprets envelope –dimension-order routing on hypercube –bit-serial with 36 bit cut-through Os16 ins 260 cy13 us Or18200 cy15 us - includes interrupt

3/31/2010cs252-S10, Lecture Conventional LAN NI NIC Controller DMA addr len trncv TX RX Addr Len Status Next Addr Len Status Next Addr Len Status Next Addr Len Status Next Addr Len Status Next Addr Len Status Next Data Host Memory NIC IO Bus mem bus Proc Costs: Marshalling, OS calls, interrupts

3/31/2010cs252-S10, Lecture User Level Ports initiate transaction at user level deliver to user without OS intervention network port in user space –May use virtual memory to map physical I/O to user mode User/system flag in envelope –protection check, translation, routing, media access in src CA –user/sys check in dest CA, interrupt on system

3/31/2010cs252-S10, Lecture Example: CM-5 Input and output FIFO for each network 2 data networks tag per message –index NI mapping table context switching? Alewife integrated NI on chip *T and iWARP also Os50 cy1.5 us Or53 cy1.6 us interrupt10us

3/31/2010cs252-S10, Lecture RAW processor: Systolic Computation Very fast support for systolic processing –Streaming from one processor to another »Simple moves into network ports and out of network ports –Static router programmed at same time as processors Also included dynamic network for unpredictable computations (and things like cache misses)

3/31/2010cs252-S10, Lecture User Level Handlers Hardware support to vector to address specified in message –On arrival, hardware fetches handler address and starts execution Active Messages: two options –Computation in background threads »Handler never blocks: it integrates message into computation –Computation in handlers (Message Driven Processing) »Handler does work, may need to send messages or block User/system P Mem DestDataAddress P Mem 

3/31/2010cs252-S10, Lecture J-Machine William Dally, J.A. Stuart Fiske, John Keen, Richard Lethin, Michael Noakes, Peter Nuth, Roy Davison, and Gregory Fyler –“The Message-Driven Processor: A Multicomputer Processing Node with Efficient Mechanisms” Each node a small MDP (message driven processor) –HW support to queue msgs and dispatch to msg handler task –Assumption that every message generates a small amount of computation »i.e. a method call –Thus, messages are small and represent a small amount of work

3/31/2010cs252-S10, Lecture Alewife Messaging Send message –write words to special network interface registers –Execute atomic launch instruction Receive –Generate interrupt/launch user-level thread context –Examine message by reading from special network interface registers –Execute dispose message –Exit atomic section

3/31/2010cs252-S10, Lecture Sharing of Network Interface What if user in middle of constructing message and must context switch??? –Need Atomic Send operation! »Message either completely in network or not at all »Can save/restore user’s work if necessary (think about single set of network interface registers –J-Machine mistake: after start sending message must let sender finish »Flits start entering network with first SEND instruction »Only a SENDE instruction constructs tail of message Receive Atomicity –If want to allow user-level interrupts or polling, must give user control over network reception »Closer user is to network, easier it is for him/her to screw it up: Refuse to empty network, etc »However, must allow atomicity: way for good user to select when their message handlers get interrupted –Polling: ultimate receive atomicity – never interrupted »Fine as long as user keeps absorbing messages

3/31/2010cs252-S10, Lecture Alewife User-level event mechanism Disable during polling: –Allowed as long as user code properly removing messages Disable as atomicity for user-level interrupt –Allowed as long as user removes message quickly Emulation of hardware delivery in software:

3/31/2010cs252-S10, Lecture The Fetch Deadlock Problem Even if a node cannot issue a request, it must sink network transactions! –Incoming transaction may be request  generate a response. –Closed system (finite buffering) Deadlock occurs even if network deadlock free! NETWORK

3/31/2010cs252-S10, Lecture Solutions to Fetch Deadlock? logically independent request/reply networks –physical networks –virtual channels with separate input/output queues bound requests and reserve input buffer space –K(P-1) requests + K responses per node –service discipline to avoid fetch deadlock? NACK on input buffer full –NACK delivery? Alewife Solution: –Dynamically increase buffer space to memory when necessary –Argument: this is an uncommon case, so use software to fix

3/31/2010cs252-S10, Lecture Example Queue Topology: Alewife Message-Passing and Shared-Memory both need messages –Thus, can provide both! When deadlock detected, start storing messages to memory (out of hardware) –Remove deadlock by increasing available queue space When network starts flowing again, relaunch queued messages –They take loopback path to be handled by local hardware

3/31/2010cs252-S10, Lecture Natural Extensions of Memory System P 1 Switch Main memory P n (Interleaved) First-level $ P 1 $ Interconnection network $ P n Mem P 1 $ Interconnection network $ P n Mem Shared Cache Centralized Memory Dance Hall, UMA Distributed Memory (NUMA) Scale

3/31/2010cs252-S10, Lecture Sequential Consistency Memory operations from a proc become visible (to itself and others) in program order There exists a total order, consistent with this partial order - i.e., an interleaving –the position at which a write occurs in the hypothetical total order should be the same with respect to all processors Said another way: –For any possible individual run of a program on multiple processors –Should be able to come up with a serial interleaving of all operations that respects »Program Order »Read-after-write orderings (locally and through network) »Also Write-after-read, write-after-write

3/31/2010cs252-S10, Lecture Sequential Consistency Total order achieved by interleaving accesses from different processes –Maintains program order, and memory operations, from all processes, appear to [issue, execute, complete] atomically w.r.t. others –as if there were no caches, and a single memory “A multiprocessor is sequentially consistent if the result of any execution is the same as if the operations of all the processors were executed in some sequential order, and the operations of each individual processor appear in this sequence in the order specified by its program.” [Lamport, 1979]

3/31/2010cs252-S10, Lecture LD 1 A  5 LD 2 B  7 LD 5 B  2 ST 1 A,6 LD 6 A  6 ST 4 B,21 LD 3 A  6 LD 4 B  21 LD 7 A  6 ST 2 B,13 ST 3 B,4 LD 8 B  4 Sequential Consistency Example LD 1 A  5 LD 2 B  7 ST 1 A,6 … LD 3 A  6 LD 4 B  21 ST 2 B,13 ST 3 B,4 LD 5 B  2 … LD 6 A  6 ST 4 B,21 … LD 7 A  6 … LD 8 B  4 Processor 1Processor 2One Consistent Serial Order

3/31/2010cs252-S10, Lecture Summary #1 Routing Algorithms restrict the set of routes within the topology –simple mechanism selects turn at each hop –arithmetic, selection, lookup Virtual Channels –Adds complexity to router –Can be used for performance –Can be used for deadlock avoidance Deadlock-free if channel dependence graph is acyclic –limit turns to eliminate dependences –add separate channel resources to break dependences –combination of topology, algorithm, and switch design Deterministic vs adaptive routing

3/31/2010cs252-S10, Lecture Summary #2 Many different Message-Passing styles –Global Address space: 2-way –Optimistic message passing: 1-way –Conservative transfer: 3-way “Fetch Deadlock” –Request  Response introduces cycle through network –Fix with: »2 networks »dynamic increase in buffer space Network Interfaces –User-level access –DMA –Atomicity