Importance of Runtime Considerations in Performance Engineering of Large-Scale Distributed Graph Algorithms
Due to the ever increasing complexity of the modern supercomputers, performance analysis of irregular applications became an experimental endeavor. We show that runtime considerations are inseparable from algorithmic concerns in performance engineering of large-scale distributed graph algorithms, and we argue that the whole system stack, starting with the algorithm at the top down to low-level communication libraries must be considered.
KeywordsRuntime System Message Type Distribute Control Active Message Breadth First Search
This research used Big Red2 (Funded by Lilly Endowment, Inc. and Indiana METACyt Initiative). Support by NSF grant 1111888 gratefully acknowledged.
- 1.http://hpx.crest.iu.edu/. Accessed 25 May 2015
- 2.Big Red II at Indiana University. http://rt.uits.iu.edu/ci/systems/BRII.php#info. Accessed 17 Apr 2015
- 3.Kissel, E., Swany, M.: Session layer burst switching for high performance data movement. In: Proceedings of the 8th International Workshop on Protocols for Future, Large-Scale & Diverse Network Transports (2010)Google Scholar
- 5.Murphy, R.C., Wheeler, K.B., Barrett, B.W., Ang, J.A.: Introducing the graph 500 benchmark. Cray User’s Group (CUG) (2010)Google Scholar
- 7.Willcock, J.J., Hoefler, T., Edmonds, N.G., Lumsdaine, A.: AM++: a generalized active message framework. In: Proceedings of the 19th International Conference on Parallel Architectures and Compilation Techniques, pp. 401–410. ACM (2010)Google Scholar
- 8.Willcock, J.J., Hoefler, T., Edmonds, N.G., Lumsdaine, A.: Active pebbles: a programming model for highly parallel fine-grained data-driven computations. In: Proceedings of the 16th ACM Symposium on Principles and Practice of Parallel Programming, pp. 305–306. ACM (2011)Google Scholar
- 9.Zalewski, M., Kanewala, T.A., Firoz, J.S., Lumsdaine, A.: Distributed control: priority scheduling for single source shortest paths without synchronization. In: Proceedings of the Fourth Workshop on Irregular Applications: Architectures and Algorithms, pp. 17–24. IEEE (2014)Google Scholar