skip to main content
article
Free Access

Work-preserving emulations of fixed-connection networks

Published:15 January 1997Publication History
First page image

References

  1. ATALLAH, M. J. 1988. On multidimensional arrays of processors. IEEE Trans. Comput. 37, 10 (Oct.), 1306-1309. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. BENEg, V.E. 1965. Mathematical Theory of Connecting Networks and Telephone Traffic. Academic Press, Orlando, Fla.Google ScholarGoogle Scholar
  3. BHATT, S. N., CHUNG, F. R. K., HONG, J.-W., LEIGHTON, F. T., AND ROSENBERG, A. L. 1996. Optimal simulations by butterfly-like networks. J. ACM 43, 2 (Mar.), 293-330. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. BHATT, S. N., CHUNG, F. R. K., LEIGHTON, F. T., AND ROSENBERG, A. L. 1986. Optimal simulations of tree machines. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science (Oct.). IEEE, New York.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. BHATT, S. N., AND IPSEN, I. 1988. Embedding trees in the hypercube. Tech. Rep. RR-443. Yale Univ. New Haven, Conn. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. COLE, R. J., MAGGS, B. M., AND SITARAMAN, R. K. 1996. On the benefit of supporting virtual channels in wormhole routers. In Proceedings of the 8th Annual ACM Symposium on Parallel Algorithms and Architectures (Padua, Italy, June 24-26). ACM, New York, pp. 131-141. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. FELLOWS, M.R. 1985. Encoding graphs in graphs. Ph.D. dissertation, Department of Computer Science. Univ. California, San Diego, San Diego, Calif.Google ScholarGoogle Scholar
  8. FISHBURN, J. P., AND FINKEL, R.A. 1982. Quotient networks. IEEE Trans. Comput. C-31, 4 (Apr.). 288 -295.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. GREENBERG, D. S., HEATH, L. S., AND ROSENBERG, A.L. 1990. Optimal embeddings of butterflylike graphs in the hypercube. Math. Syst. Theory 23, 61-77.Google ScholarGoogle ScholarCross RefCross Ref
  10. HOLY, D., AND LEISERSON, C.E. 1980. A layout for the shuffle-exchange network. In Proceedings ~of the 1980 International Conference on Parallel Processing (Aug.). IEEE, New York, pp. 329-336.Google ScholarGoogle Scholar
  11. KLEITMAN, D. J., LEIGHTON, F. T., LEPLEY, M., AND MILLER, G. L. 1981. New layouts for the shuffle-exchange graph. In Proceedings of the 13th Annual ACM Symposium on Theory of Computing (Milwaukee, Wisc., May 11-13). ACM, New York, pp. 278-292. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. KRUSKAL, C. P., RUDOLPH, L., AND SNIR, M. 1988. A complexity theory of efficient parallel algorithms. In Proceedings of the 15th International Colloquium on Automata, Languages and Programming. Lecture Notes in Computer Science, vol. 317. Springer-Verlag, New York, pp. 333-346. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. LEIGHTON, F. T., LEPLEY, M., AND MILLER, G.L. 1984. Layouts for the shuffle-exchange graph based on the complex plane diagram. SIAM J. Algebraic Disc. Meth. 5, 2 (June). 202-215. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. LEIGHTON, F. T., MAGGS, B. M., RANADE, A. G., AND RAO, S.B. 1994. Randomized routing and sorting on fixed-connection networks. J. Algorithms 17, 1 (July). 157-205. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. LEIGHTON, F. T., AND MILLER, G.L. 1981. Optimal layouts for small shuffle-exchange graphs. In VLSI 81-Very Large Scale Integration, J. Gray, ed. Academic Press, New York, NY.Google ScholarGoogle Scholar
  16. LEIGHTON, T., MAGGS, B., AND RAO, S. 1988. Universal packet routing algorithms. In Proceedings of the 29th Annual Symposium on Foundations of Computer Science (Oct.). IEEE, New York, pp. 256-271.Google ScholarGoogle ScholarCross RefCross Ref
  17. MEYER AUF DER HEIDE, F. 1983. Efficiency of universal parallel computers. Acta Inf. 19, 269-296.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. MEYER AUF DER HEIDE, F. 1986. Efficient simulations among several models of parallel computers. SIAM J. Comput. 15, 1 (Feb.), 106-119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. MEYER AUF DER HEIDE, F., AND WANKA, R. 1989. Time-optimal simulations of networks by universal parallel computers. In Proceedings of the 6th Symposium on Theoretical Aspects of Computer Science. pp. 120-131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. LEWIS II, P. M., STEARNS, R. E., AND HARTMANIS, J. 1965. Memory bounds for recognition of context-free and context-sensitive languages. In Proceedings of the IEEE Symposium on Circuit Theory and Logical Design. IEEE, New York, pp. 191-202.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. PAPADIMITRIOU, C. H., AND YANNAKAKIS, M. 1988. Towards an architecture-independent analysis of parallel algorithms. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing (Chicago, Ill., May 2-4). ACM, New York, pp. 510-513. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. PATERSON, M. S., RUZZO, W. L., AND SNYDER, L. 1981. Bound on minimax edge length for complete binary trees. In Proceedings of the 13th Annual ACM Symposium on Theory of Computing (Milwaukee, Wisc., May 11-13). ACM, New York, pp. 293-299. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. PIPPENGER, N. 1982. Telephone switching networks. In Proceedings of Symposia in Applied Mathematics, vol. 26. American Mathematical Society, Providence, R.I., pp. 101-133.Google ScholarGoogle Scholar
  24. PIPPENGER, N. 1984. Parallel communication with limited buffers. In Proceedings of the 25th ~Annual Symposium on Foundations of Computer Science (Oct.). IEEE, New York, pp. 127-136.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. RAGHUNATHAN, A., AND SARAN, n. 1988. Is the shuffle-exchange better than the butterfly? Unpublished manuscript.Google ScholarGoogle Scholar
  26. REIF, J. n., AND VALIANT, L.G. 1987. A logarithmic time sort for linear size networks. J. ACM 34, 1 (Jan.). 60-76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. SEKANINA, M. 1960. On an ordering of the set of vertices of a connected graph. Publications of the Faculty of Science, University of Brno 412, 137-142.Google ScholarGoogle Scholar
  28. STEINBERG, D., AND RODEH, M. 1981. A layout for the shuffle-exchange network with ~(N2/log3/2 N) area. IEEE Trans. Comput. C-30, 12 (Dec.). 977-982.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. WAKSMAN, A. 1968. A permutation network. J. ACM 15, 1 (Jan.). 159-163. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. WISE, D.S. 1981. Compact layouts of Banyan/FFT networks. In CMU Conference on VLSI Systems and Computations, H. T. Kung, B. Sproull, and G. Steele, eds. Computer Science Press, Rockville, Md., pp. 186-195.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Work-preserving emulations of fixed-connection networks

          Recommendations

          Reviews

          Festus Gail Gray

          Mapping a collection of processes linked by precedence and communications constraints onto the processors and routing network of a parallel machine, to take maximum advantage of the available hardware in order to minimize the completion time of the job, is one of the central problems in parallel computing. This paper addresses the problem by studying work-preserving emulations of one network type on another. An emulation is work-preserving if the slowdown is a constant factor of the ratio of the numbers of processors in the two architectures. For example, the authors show that a linear array can emulate a butterfly network in a work-preserving manner. Presumably, any algorithm that has an efficient implementation on a butterfly network can then be efficiently emulated by a linear array. This paper should interest anyone interested in efficient implementation of parallel algorithms. Full understanding requires considerable mathematical sophistication, but the general principles can be understood by anyone with a general science background. This is not the whole story, however. In the case of the linear array, the emulation of the butterfly network experienced a slowdown on the order of 2 N . The ratio of the number of processors in the butterfly to the number of processors in the linear array was exactly 2 N . From a practical viewpoint, is this an acceptable tradeoff This paper provides many theoretical results concerning the relative computational power of different types of networks of computers. If work-preserving emulations are proven not to exist, it is not possible to efficiently emulate one network by another. If work-preserving emulations do exist, it is possible to emulate one type of network on the other, but the slowdown may be unacceptable. Read the paper for details.

          Access critical reviews of Computing literature here

          Become a reviewer for Computing Reviews.

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Journal of the ACM
            Journal of the ACM  Volume 44, Issue 1
            Jan. 1997
            199 pages
            ISSN:0004-5411
            EISSN:1557-735X
            DOI:10.1145/256292
            Issue’s Table of Contents

            Copyright © 1997 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 15 January 1997
            Published in jacm Volume 44, Issue 1

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader