throbber

`

`I
`
`Sponsoring EdifQr Bruce M. Spatt
`Prot/uction Mallager Yallie Ovenon
`Production Editor
`Julie Pabst
`Text Design Gary Head, with second edition
`modifications by Ross Carron Design
`Cover An Direction David Lance Goines
`Cover Design Ross Carron Design
`
`lJJustrious, Inc.
`1IIustrolion
`CQpyeditors Ken DellaPenl8, Gary Morris,
`Sharilyn Hovind, Jessie Wood
`Proofreader
`Jeff Van Sucren
`Composition Nancy Logan
`Printer Courier Corporation
`
`Morgan Kaufmann Publishers, Inc.
`Editorial and Sales Office
`340 Pine Street. Sixth P100r
`San Francisco. CA 94104-3205 USA
`Telephone: 415/392-2665. Facsimile: 415 1982-2665, Intunet: mkp@mkp.com
`Order toJ! free: 800 1745*7323
`
`e 1990. 1996 by Morgan Kaufmann Publishers, Inc.
`All rights reserved
`
`Published 1990. Second Edition 1996
`Prinled in the United States of America
`030201
`10987
`
`No part of this publication may be reproduced, stored in a retrieval syStem. or transmiued in any form or by any
`means--electronic. mechanical, recording. or OIberwise-withoul the prior wriuen permission of the publisher.
`
`All instruction sets and orner design infommtion of the DLX computer syslem cOnlained herein is copyrighted by the
`publisher and may not be incorporated in other publications or distributed by media without formal acknowledgment
`and wrincn consenl from me publisher. Use of the DLX in Other publications for educational purposes is encouraged
`and application for permission is welcomed.
`
`ADVICE, PRAISE. & ERRORS: Any correspondence related to this publication or intended for the authors should
`be addressed to the Editorial and Sales Office of Morgan Kaufmann Publishers. Inc., DepL P&H APE. Infonnation
`regarding error sightings is encouraged. Any error sightings that are accepted for correction in subsequent printings
`will be rewarded by the authors with a payment of $1.00 (U.S.) per correction upon availability of the new priming.
`Electronic mail can be sent to arc2bugs@mkp.rom. (Please include your full name and permanent mailing address.)
`
`LNSTRUCTOR SUPPORT: For infonnation on classroom software and OIher instructor materials available to
`adopters. please contact the Editorial and Sales Office of Morgan Kaufmann Publishers. Inc. (415/392·2665) or
`visit our web sile at http://www.mkp.com.
`
`Library of Congress Cataloging-in"Publication Data
`Patterson, David A.
`Computer architecture: a quamitative approach 1 David A. Patterson. John L. Hennessy; with a contribution by
`David Goldberg.
`-2nde<!.
`p.cm.
`Includes bibliographical references and index..
`ISBN 1-55860-329-8 (cloth). ~ISBN 1-55860-372·7 (paper)
`I. Hennessy. John L.
`I. Computer architecture.
`II. Goldberg, David.
`QA76.9.A73P377
`1995
`004.2'2-<1c20
`
`ill. Title.
`
`95-37027
`erp
`
`Page 2
`
`

`

`7.5 Connecting More Than Two Computers
`
`585
`
`30
`
`0
`
`2
`
`10
`
`00
`
`0
`
`0
`
`10
`
`11
`
`01
`
`2
`
`1
`
`0
`
`2
`
`1
`
`3
`
`0
`
`3
`
`0
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`9
`
`10
`
`11
`
`12
`
`13
`
`14
`
`15
`
`FIGURE 7.14 A fat-tree topology for 16 nodes. The shaded circles are switches, and the squares at the bottom are pro-
`cessor-memory nodes. A simple 4-ary tree would only have the links at the front of the figure; that is, the tree with the root
`labeled 0,0. This three-dimensional view suggests the increase in bandwidth via extra links at each level over a simple tree,
`so bandwidth between each level of a fat tree is normally constant rather than being reduced by a factor of four as in a 4-
`ary tree. Multiple paths and random routing give it the ability to route common patterns well, which ensures no single pattern
`from a broad class of communication patterns will do badly. In the CM-5 fat-tree implementation, the switches have four
`downward connections and two or four upward connections; in this figure the switches have two upward connections.
`
`Given a distributed switch, the question is how to connect the switches together.
`Figure 7.15 shows that a low-cost alternative to full interconnection is a network
`that connects a sequence of nodes together. This topology is called a ring. Since
`some nodes are not directly connected, some messages will have to hop along
`intermediate nodes until they arrive at the final destination. Unlike shared lines, a
`ring is capable of many simultaneous transfers: the first node can send to the sec-
`ond at the same time as the third node can send to the fourth, for example. Rings
`are not quite as good as this sounds because the average message must travel
`through n/2 switches, where n is the number of nodes. To first order, a ring is like
`a pipelined bus: on the plus side are point-to-point links, and on the minus side
`are “bus repeater” delays.
`
`Page 3
`
`

`

`586
`
`Chapter 7 Interconnection Networks
`
`FIGURE 7.15 A ring network topology.
`
`One variation of rings used in local area networks is the token ring. To simplify
`arbitration, a single slot, or token, is passed around the ring to determine which
`node is allowed to send a message; a node can send only when it gets the token. (A
`token is simply a special bit pattern.) In this section we will evaluate the ring as a
`topology with more bandwidth rather than one that may be simpler to arbitrate
`than a long shared medium.
`A straightforward but expensive alternative to a ring is to have a dedicated
`communication link between every switch. The tremendous improvement in per-
`formance of fully connected switches is offset by the enormous increase in cost,
`typically going up with the square of the number of nodes. This cost inspires de-
`signers to invent new topologies that are between the cost of rings and the perfor-
`mance of fully connected networks. The evaluation of success depends in large
`part on the nature of the communication in the interconnection network. Real ma-
`chines frequently add extra links to these simple topologies to improve perfor-
`mance and reliability. Figure 7.16 illustrates three popular topologies for MPPs.
`One popular measure for MPP interconnections, in addition to the ones covered
`in section 7.2, is the bisection bandwidth. This measure is calculated by dividing
`the interconnect into two roughly equal parts, each with half the nodes. You then
`sum the bandwidth of the lines that cross that imaginary dividing line. For fully
`connected interconnections the bisection bandwidth is (n/2)2, where n is the num-
`ber of nodes.
`Since some interconnections are not symmetric, the question arises as to
`where to draw the imaginary line when bisecting the interconnect. Bisection
`bandwidth is a worst-case metric, so the answer is to choose the division that
`makes interconnection performance worst; stated alternatively, calculate all pos-
`sible bisection bandwidths and pick the smallest. Figure 7.17 summarizes these
`different topologies using bisection bandwidth and the number of links for 64
`nodes.
`
`Page 4
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket