Are there advantages to high-dimension architectures?: Analysis of k-ary n-cubes for the class of parallel divide-and-conquer algorithms

Previous work analyzing k-my n-cubes with constant bisecrian-width und constant node-degree constraints have shown that generally lowerdtmenslon and middle-dimen.~ion cubes, respectively, have the best performance in terms of message [atencles under cantentimr, These analyses were done u.wummg a randam dtstrvbutian of ’me.wage traffic with same k)caliz,afion probabdiry, and da not necessarily capture the actual comrnunicatian patterns of many well-designed parallel application.v. In this work, we analyze.’ theoretically and empirically, the perjimmance of k -ary n-cubes ,for the class of diwde-and-conquer (D&C) parallel algorithms that are u.fedfor solvarg many numerical and non-numerical computations. We cla.wi~ D& C parallel algorithms accarding w their camrnunication patterns, and campare the perj%rrnance of three different classes qfthese alganthms on k-ary n-cubes In agreement with previous work, our results show that under the constant bmecrion-width constraint, the 2-D mesh perjarms best, the hypercube has the lowest perfarntance, and m general a lower dimension M better than a Iagher one, Howeve~ unhke prewarrs results ,for the more reahstm constant node-degree constraint (pin limitations on proce.worlrouter chips quickly become the overriding constraint as system size increases) that show that middle-dimenswna[ cubes have the lowest latencies, we show that the hypercube has the best perjorrnance, the 2-D mesh the warst, and generally that a }ugher dlmen. non IS better than a lower one,

[1]  J DallyWilliam,et al.  Performance Analysis of k-ary n-cube Interconnection Networks , 1990 .

[2]  GraefeGoetz Query evaluation techniques for large databases , 1993 .

[3]  Shantanu Dutt,et al.  Scalable Global and Local Hashing Strategies for Duplicate Pruning in Parallel A* Graph Search , 1997, IEEE Trans. Parallel Distributed Syst..

[4]  H. T. Kung,et al.  Communication complexity for parallel divide-and-conquer , 1991, [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.

[5]  E T. Leighton,et al.  Introduction to parallel algorithms and architectures , 1991 .

[6]  Goetz Graefe,et al.  Query evaluation techniques for large databases , 1993, CSUR.

[7]  James R. Goodman,et al.  The Impact of Pipelined Channels on k-ary n-Cube Networks , 1994, IEEE Trans. Parallel Distributed Syst..

[8]  Vipin Kumar,et al.  The Scalability of FFT on Parallel Computers , 1993, IEEE Trans. Parallel Distributed Syst..

[9]  Krishnan Padmanabhan,et al.  Performance of Multicomputer Networks under Pin-out Constraints , 1991, J. Parallel Distributed Comput..

[10]  William J. Dally,et al.  Performance Analysis of k-Ary n-Cube Interconnection Networks , 1987, IEEE Trans. Computers.

[11]  Leonard Kleinrock,et al.  Virtual Cut-Through: A New Computer Communication Switching Technique , 1979, Comput. Networks.

[12]  Joel H. Saltz,et al.  Communication Optimizations for Irregular Scientific Computations on Distributed Memory Architectures , 1994, J. Parallel Distributed Comput..

[13]  Anant Agarwal,et al.  Limits on Interconnection Network Performance , 1991, IEEE Trans. Parallel Distributed Syst..

[14]  F. Leighton,et al.  Introduction to Parallel Algorithms and Architectures: Arrays, Trees, Hypercubes , 1991 .

[15]  George Karypis,et al.  Introduction to Parallel Computing , 1994 .

[16]  Shantanu Dutt,et al.  Scalable Load Balancing Strategies for Parallel A* Algorithms , 1994, J. Parallel Distributed Comput..