2017 IEEE International Conference on Cluster Computing (CLUSTER) 2017
DOI: 10.1109/cluster.2017.25
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying I/O and Communication Traffic Interference on Dragonfly Networks Equipped with Burst Buffers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 26 publications
0
12
0
Order By: Relevance
“…A typical architecture consists in locating the Burst-Buffers between the compute nodes and the Parallel File System (PFS). This is the case of DDN IME [8], [14] and Cray DataWarp [9], [15], [16]. In this pseudo-centralized architecture, the Burst-Buffers are often colocated with the I/O nodes.…”
Section: A Burst-buffers Architectures and Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…A typical architecture consists in locating the Burst-Buffers between the compute nodes and the Parallel File System (PFS). This is the case of DDN IME [8], [14] and Cray DataWarp [9], [15], [16]. In this pseudo-centralized architecture, the Burst-Buffers are often colocated with the I/O nodes.…”
Section: A Burst-buffers Architectures and Modelsmentioning
confidence: 99%
“…Several management strategies have been proposed. Mubarak et al [15] study the case where the buffers are shared between the different applications running onto the platform and used both to accelerate transfers and to prevent I/O congestion. On the contrary, in Schenck et al [14] and Daley et al [16], applications decide the size of the buffer that should be dedicated to them.…”
Section: A Burst-buffers Architectures and Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Typically, Burst-Buffers can be located between the compute nodes and the Parallel File System (PFS). This is the case of DDN IME [7], [10] and Cray DataWarp [8], [11], [9]. In this pseudo-centralized architecture, the Burst-Buffers are often colocated with the I/O nodes.…”
Section: Related Work a Burst-buffer Architectures And Modelsmentioning
confidence: 99%
“…Despite years of innovation in network routing, congestion avoidance, and mitigation algorithms across generation highperformance interconnects, extreme-scale applications running on high-performance computing systems continue to suffer from performance variation and scaling challenges [1]- [3] due to (i) frequent exposure to congestion; and (ii) the inability to automatically optimize resource parameters (such as placement, rank mapping, and application scheduling) to improve network utilization. The current interconnects suffer from congestion that can occur because of (i) bad application placement (e.g., tightly packed ranks versus ranks spread across the network) [4], [5] and presence of bully applications [6]; (ii) the presence of large numbers of failed links [7] and new link failures, which force adversarial traffic shaping/flow on the network; and (iii) inherent congestion susceptibility due to network design choices (e.g., directional order routing in torus networks) or design bugs/gaps (e.g., incorrect/bad dynamic routing policy).…”
Section: Introductionmentioning
confidence: 99%