1997
DOI: 10.1002/(sici)1096-9128(199710)9:10<915::aid-cpe277>3.3.co;2-3
|View full text |Cite
|
Sign up to set email alerts
|

Message‐passing performance of various computers

Abstract: i This report has been reproduced directly from the best available copy. Available to DOE and DOE contractors from the Office of Scientific and TednI cal Information. P.O. Box 62, Oak Ridge. TN 37831; prices availab from (615) 576-8401, FTS 626-8401. Available to the public from the National Technical Information Service, U.S. Department of Commerce. 5265 Port Royal Rd., Springfield. VA 22161.This report was prepared as an account of work sponsored by M aof the United States Government. Neither the United Stat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2000
2000
2009
2009

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 3 publications
(3 reference statements)
0
12
0
Order By: Relevance
“…For the SGI Power Challenge, t el = 10 s and bNBW = 64M B = s 19]. This is, strictly speaking, the value for uNBW but since communications take place via shared memory, the value of bNBW 66M B = s (dcopy() -which we calculated directly) suggesting that uNBW = bNBW for this architecture.…”
Section: Complete Exchangementioning
confidence: 79%
“…For the SGI Power Challenge, t el = 10 s and bNBW = 64M B = s 19]. This is, strictly speaking, the value for uNBW but since communications take place via shared memory, the value of bNBW 66M B = s (dcopy() -which we calculated directly) suggesting that uNBW = bNBW for this architecture.…”
Section: Complete Exchangementioning
confidence: 79%
“…We did not focus on this problem here and thereby, in this paper we used a simple linear model which was used in [48] to analyze the performance of different collective operation algorithms, f p2p (m) = α + mβ, where α are startup code (or latency), independent of message size, β is the transfer time per byte and m is message size. The common technique to measure the parameters α and β is to use a ping-pong micro benchmark as the one given in [49].…”
Section: B Performance Prediction and Experimental Resultsmentioning
confidence: 99%
“…If we compare with the performance numbers presented in Table 1, our performance measurements are a little under half the best FDDI performance, as measured in [6]. It represents the best performance we could achieve on the FDDI network through the PVM communication library.…”
Section: Experimental Fddi Throughput With Pvm Protocolsmentioning
confidence: 96%
“…the number of bytes which could be transmitted during latency time on various parallel architectures and network protocols ( Table 1). The numbers in the first two columns of Table 2 are all derived from Dongarra [6]. The third column is a measure of the network quality (throughput divided by latency).…”
Section: Theoretical Cap Token Overheadmentioning
confidence: 99%