Skip to main navigation Skip to search Skip to main content

Fitted Fat-Tree for Localized Traffic in Data Center Networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In this paper, we propose a data center network architecture, named fitted fat-tree. Fitted fat- tree provisions unique flexibility in the sense that its topology and performance can be tailored with great freedom. This flexibility allows the architecture to closely follow the demands of the traffic. Given that traffic localization is ubiquitous in today's data centers, the fitted fat-tree can find its wide applications because it can be configured to adapt to the localized traffic load. We first propose a simple and efficient way to profile the localized traffic in the data centers, and then fit the architecture into the profile.We design the topology of the fitted fat-tree, propose its addressing and routing schemes, analyze its cost, and evaluate its performance. Because of its fitted nature, the architecture delivers the same performance as the original fat-tree, but incurs significantly reduced cost, because it uses the network resource much more efficiently.

Original languageEnglish
Title of host publication2018 IEEE International Conference on Communications, ICC 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781538631805
DOIs
StatePublished - Jul 27 2018
Event2018 IEEE International Conference on Communications, ICC 2018 - Kansas City, United States
Duration: May 20 2018May 24 2018

Publication series

NameIEEE International Conference on Communications
Volume2018-May

Conference

Conference2018 IEEE International Conference on Communications, ICC 2018
Country/TerritoryUnited States
CityKansas City
Period05/20/1805/24/18

Keywords

  • Data center networks
  • Fat-tree
  • Network architecture
  • Traffic locality

Fingerprint

Dive into the research topics of 'Fitted Fat-Tree for Localized Traffic in Data Center Networks'. Together they form a unique fingerprint.

Cite this