Unformatted text preview:

Advanced Computer Architecture CSE 8383ContentsNetworks ComputingOther Network technologiesSlide 5Client/Server SystemsSocketsA Client Server Framework for Parallel ApplicationsSlide 9Cluster ArchitectureGridsInterconnection NetworksSlide 13Slide 14Slide 15Slide 16Slide 17Slide 18Slide 19Slide 20Slide 21Computer Science and EngineeringCopyright by Hesham El-RewiniAdvanced Computer Advanced Computer ArchitectureArchitectureCSE 8383CSE 8383April 11, 2006April 11, 2006Session 23Session 23Computer Science and EngineeringCopyright by Hesham El-RewiniContentsNetwork ComputingClient/Server SystemClustersGridInterconnection NetworksComputer Science and EngineeringCopyright by Hesham El-RewiniNetworks ComputingFour categoriesWANMANLANSANInternetTCP/IPComputer Science and EngineeringCopyright by Hesham El-RewiniOther Network technologiesFast Ethernet and Gigabit EthernetThe Fiber Distributed Data Interface (FDDI)High-Performance Parallel Interface (HIPPI)Asynchronous Transfer Mode (ATM)Scalable Coherent Interface (SCI)Computer Science and EngineeringCopyright by Hesham El-RewiniHiPPIATM10 Base T100 Base TSCISAN LAN MANWAN10Mbps100Mbps1000Mbps10Gbps1000 Base TFDDIA representation of network technologiesComputer Science and EngineeringCopyright by Hesham El-RewiniClient/Server SystemsInterconnectionNetworkInterconnectionNetworkServer ThreadsClientServer ClientComputer Science and EngineeringCopyright by Hesham El-RewiniSocketsSockets are used to provide the capability of making connections from one application running on one machine to another running on a different machine.Once a socket is created, it can be used to wait for an incoming connection (passive socket) or can be used to initiate connection (active socket). ClientServerA Socket ConnectionComputer Science and EngineeringCopyright by Hesham El-RewiniA Client Server Framework for Parallel Applications InterconnectionNetworkInterconnectionNetworkMaster (Supervisor)Server 1Server 2Server 3 Server nClientSlaves (Workers)Computer Science and EngineeringCopyright by Hesham El-RewiniComputer ClustersAdvances in commodity processors and network technologyNetwork of PCs and workstations connected via LAN or WAN forms a Parallel SystemCompete favorably (cost/performance)Computer Science and EngineeringCopyright by Hesham El-RewiniCluster ArchitectureMCPI/OOSMCPI/OOSMCPI/OOSMiddlewareProgramming EnvironmentInterconnection NetworkHome clusterComputer Science and EngineeringCopyright by Hesham El-RewiniInternetInternetGridsDependable, consistent, pervasive, and inexpensive access to high end computing.Geographically distributed platforms.Computer Science and EngineeringCopyright by Hesham El-RewiniInterconnection NetworksEthernetA packet-switched LAN technology.All hosts connected to an Ethernet receive every transmission, making it possible to broadcast a packet to all hosts at the same time.Ethernet uses a distributed access control scheme called Carrier Sense Multiple Access with Collision Detect (CSMA/CD).Each computer connected to an Ethernet network is assigned a unique 48-bit address known as its Ethernet address, also called the media access control address, (MAC).Computer Science and EngineeringCopyright by Hesham El-RewiniSwitchesA n1 x n2 switch consists of:n1 input portsn2 output portsLinks connecting each input to every outputControl logic to select a specific connection Internal buffersThe connections between input ports and output ports may be:One-to-one (point-to-point)One-to-many (multicast or broadcast)Many-to-one: may cause conflicts at the output ports and needs arbitration.Computer Science and EngineeringCopyright by Hesham El-RewiniWhen only one-to-one connections are allowed, the switch is called crossbar.An n x n crossbar switch can establish n! connections.If we allow both one-to-one as well as one-to-many in an n x n switch, the number of connections that can be established is nn. (We discussed this before, remember?)Computer Science and EngineeringCopyright by Hesham El-RewiniRouting can be achieved using 2 mechanisms:Source-path: the entire path to the destination is stored in the packet header at the source location.Table-based: the switch must have a complete routing table that determines the corresponding port for each destination.Port 0Port 1Port 2Port 3Port 4Port 5Port 6Port 7605Port 0Port 1Port 2Port 3Port 4Port 5Port 6Port 7Dest-id6idRouting tableSource-path Routing versus Table-based RoutingComputer Science and EngineeringCopyright by Hesham El-RewiniMyrinet Clos networkMyrinet is a high-performance, packet communication and switching technology.Myrinet switches are multiple-port components that route a packet entering on an input channel of a port to the output channel of the port selected by the packet.Computer Science and EngineeringCopyright by Hesham El-RewiniMyrinet Clos network128 HostsNetwork SpineClos “Spreader” NetworkConnects Spine (upper 8 switches) to Leaves (16 lower switches)128-host Clos Network using 16-port Myrinet SwitchComputer Science and EngineeringCopyright by Hesham El-RewiniMyrinet Clos network2 links eachNetwork Spine64 Hosts64-host Clos Network using 16-port Myrinet Switch (Each line represents 2 links)Computer Science and EngineeringCopyright by Hesham El-RewiniMyrinet Clos network4 links each32 hostsNetwork Spine32-host Clos Network using 16-port Myrinet Switch (Each line represents 4 links)Computer Science and EngineeringCopyright by Hesham El-RewiniThe Quadrics network (QsNet)Consists of 2 hardware building blocks A programmable network interface called Elan: connects the Quadrics network to a processing node containing one or more CPUsElan provides substantial local processing power to implement high-level message passing protocols (ex: MPI).High-bandwidth, low-latency communication switch called Elite:QsNet connects Elite switches in a quaternary fat-tree topology.Computer Science and EngineeringCopyright by Hesham El-RewiniThe Quadrics network (QsNet)Processing


View Full Document

SMU CSE 8383 - Network Computing

Download Network Computing
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Network Computing and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Network Computing 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?