Best Practices HPC and Introduction to the New System FRAM

Total Page:16

File Type:pdf, Size:1020Kb

Best Practices HPC and Introduction to the New System FRAM Best Practices HPC and introduction to the new system FRAM Ole W. Saastad, Dr.Scient USIT / UAV / ITF / FI Sept 6th 2016 Sigma2 - HPC seminar Introduction • FRAM overview • Best practice for new system, requirement for application • Develop code for the new system – Vectorization Universitetets senter for informasjonsteknologi Strategy for FRAM and B1 • FRAM with Broadwell processors – Take over for Hexagon and Vilje – Run parallel workload in 18-24 mnts. – Switch role to take over for Abel & Stallo – Run throughput production when B1 comes on line Universitetets senter for informasjonsteknologi Strategy for FRAM and B1 • B1 massive parallel system – Processor undecided • AMD ZEN, OpenPOWER, ARM, KNL, Skylake • Strong focus on vectors for floating point • Performance is essential – Will run the few large core count codes • Typical job will used 10k+ cores • Interconnect InfiniBand or Omnipath Universitetets senter for informasjonsteknologi FRAM overall specs • Broadwell processors – AVX2 just like Haswell, including FMA • Island topology – 4 islands – approx 8k cores per island • Close to full bisection bandwidth within the island • Run up to 8k core jobs nicely • Struggle with jobs requiring > 8k cores Universitetets senter for informasjonsteknologi FRAM overall specs • 1000 compute nodes, 32000 cores • 8 large memory nodes, 256 cores • 2 very large memory nodes, 112 Cores • 8 accelerated nodes, 256 Cores + CUDA cores • A total of 32624 cores for computation ≈ 1 Pflops/s • 18 watercooled racks Universitetets senter for informasjonsteknologi FRAM overall specs • 2.4 PiB of local scratch storage, DDN EXAScaler • • LUSTRE file system /work (and local software) • /home and /project mounted from Norstore • Expected performance is ∼ 40 GiB/s read / write Universitetets senter for informasjonsteknologi Lenovo nx360m5 direct water cooled Universitetets senter for informasjonsteknologi Compute nodes – processor • Dual socket motherboard • Intel Broadwell E5-2683v4 processors • 2.1 GHz, 16 cores, 32 threads • Cache: L1 64kiB , L2 256 kiB , L3/last level 40 MiB • AVX2 (256 bits vectors), FMA3, RDSEED, ADX Universitetets senter for informasjonsteknologi Compute nodes - memory • Single memory controller per socket • 4 memory channels per socket • 8 x 8G dual ranked 2400 MHz DDR4 memory • Total of 64 GiB Cache coherent memory in 2 NUMA nodes • Approx 120 GiB/s bw (7.5 GiB/s per core) Universitetets senter for informasjonsteknologi Compute nodes - Interconnect • Mellanox Connect X-4 EDR (100 Gbits/s) InfiniBand • PCIe3 x 16 , 15.75 GiB/s per direction • Close to 10 GiB/s bw (0.625 GiB/s per core) • Island topology Universitetets senter for informasjonsteknologi Large memory nodes • Dual Intel E5-2683v4 processors • 8 x 32 G dual ranked 2400 MHz DDR4 memory • Total of 512 GiB cache coherent memory in 2 NUMA nodes • 1920 GiB Solid State Disk as local scratch storage Universitetets senter for informasjonsteknologi Very large memory nodes • Quad Intel E7-4850v3 processors, 14 cores, 2.2 GHz • 56 cores in total • 96 x 64 G LRDIMM Memory • Total of 6 TiB cache coherent memory in 4 NUMA nodes • 14 TiB Disk as local scratch storage Universitetets senter for informasjonsteknologi Accelerated nodes • Dual Intel E5-2683v4 processors • 8 x 16 G dual ranked 2400 MHz DDR4 memory • Total of 128 GiB Cache coherent memory in 2 NUMA nodes • 2 x NVIDIA K80 cards (Most probably PASCAL based cards will be installed, TBD), full CUDA support. Universitetets senter for informasjonsteknologi Local IO • 2 x DDN EXAScalers • LUSTRE file system with native InfiniBand support • InfiniBand RDMA • 2.45 PiB of storage • 49.9 GiB/s sequential write • 52.9 GiB/s sequential read • Provide /work and cluster wide software • NO backup Universitetets senter for informasjonsteknologi Remote IO • Provided by Norstore • Expected to be LUSTRE • Performance estimate is about 40 GiB/s read/write • Provide – /home – /projects • Full backup, snapshots, redundancy • A range of file access services – POSIX, object storage, etc Universitetets senter for informasjonsteknologi Software • Intel parallel studio – Compilers and libraries – Tuning and analysis tools – Intel MPI • GNU tools – Compilers, libraries and debuggers – Common GNU utilities Universitetets senter for informasjonsteknologi Software • Message Passing Interface, MPI – Intel – OpenMPI • Mellanox InfiniBand stack – Mellanox services for collectives – OpenMPI ok, intelMPI ?? Universitetets senter for informasjonsteknologi Software • SLURM queue system – Minor changes from today’s user experience • Modules – Expect changes, work in progress • User environment – Could be a mode for scientists and a mode for developers, undecided. Universitetets senter for informasjonsteknologi Support • RT tickets as before • Tickets handled by Sigma2 and metecenter members • Advanced user support as before • Training will be arranged by Sigma2 Universitetets senter for informasjonsteknologi Best Practice for HPC • How to utilize the system in a best possible way • How to schedule your job • How to allocate resources • How to do Input and Output • How to understand your application Universitetets senter for informasjonsteknologi Understand your application • The following is valid for any application • These tools can be used on any application • Optimal use of the system is important when resources are limited • Sigma2 might require performance review Universitetets senter for informasjonsteknologi Understand your application • Memory footprint • Memory access • Scaling – threads, shared memory • Scaling – MPI, interconnect, collectives • Vectorization • Usage of storage during run • Efficiency as a fraction of theoretical performance Universitetets senter for informasjonsteknologi Step by step application insight • Starting with simple tools – time – top – iostat – strace – MPI snapshop – Intel SDE • Progressing with tools like performance reports • Finishing with Intel vector advisor, amplifier and tracer Universitetets senter for informasjonsteknologi Time spent and memory • Timing is a key in performance tuning • /usr/bin/time • Man time • Very simple syntax : /usr/bin/time ./prog.x Universitetets senter for informasjonsteknologi Time spent and memory • Default format gives: %Uuser %Ssystem %Eelapsed %PCPU (%Xtext+%Ddata %Mmax)k %Iinputs+%Ooutputs (%Fmajor+%Rminor)pagefaults %Wswaps Universitetets senter for informasjonsteknologi Time spent and memory • %Uuser – Total number of CPU-seconds that the process spent in user mode. %Ssystem – Total number of CPU-seconds that the process spent in kernel mode. %Eelapsed – Elapsed real time (in [hours:]minutes:seconds). Universitetets senter for informasjonsteknologi Time spent and memory • %PCPU (%Xtext+%Ddata %Mmax)k – Percentage of the CPU that this job got, computed as (%U + %S) / %E. %Iinputs+%Ooutputs – Number of file system inputs by the process. (%Fmajor+%Rminor)pagefaults %Wswaps Universitetets senter for informasjonsteknologi Time spent and memory • %Fmajor pagefaults – Number of major page faults that occurred while the process was running. These are faults where the page has to be read in from disk. Universitetets senter for informasjonsteknologi Time spent and memory • %Rminor pagefaults – Number of minor, or recoverable, page faults. These are faults for pages that are not valid but which have not yet been claimed by other virtual pages. Thus the data in the page is still valid but the system tables must be updated. Universitetets– senter for informasjonsteknologi Time spent and memory • %Wswaps – Number of times the process was swapped out of main memory. Universitetets senter for informasjonsteknologi Time spent and memory • A Gaussian 09 job : 2597.79user 42.46system 44:06.57elapsed 99%CPU (0avgtext+0avgdata 0maxresident)k 0inputs+0outputs (0major+2957369minor)pagefaults 0swaps – 2598 s user time – 43 s system time – 2647 s wall clock time – 2957369 minor page faults – Bug in older kernels, 0 for memory Universitetets senter for informasjonsteknologi Time spent and memory • An evolution run : 13.89user 1.63system 1:27:26elapsed 0%CPU (0avgtext+0avgdata 220352maxresident)k 1768848inputs+17336outputs (462major+87335minor)pagefaults 0swaps – Maximum resident memory : 220 MB – Kernel : 3.10.0-327.28.3.el7.x86_64 Universitetets senter for informasjonsteknologi Memory, cache and data • While you can address and manipulate a single byte, • The smallest amount of data transferred is 32 or 64 bytes • Do not waste data in cachelines • Do all the work on data while they are in the cache • Running from memory is equal to a clock of 10 MHz Universitetets senter for informasjonsteknologi Memory and page faults • Major and minor page faults – Remember output from /usr/bin/time ? 2597.79user 42.46system 44:06.57elapsed 99%CPU (0avgtext+0avgdata 0maxresident)k 0inputs+0outputs (0major+2957369minor)pagefaults 0swaps Universitetets senter for informasjonsteknologi Minor page fault • Minor page faults are unavoidable • Page is in memory, just a memory admin by OS • Little cost • A huge number of these is often a sign of ineffective programming Universitetets senter for informasjonsteknologi Memory and page faults • Major page faults means to little memory for your working set! • Showstopper ! • Avoid at all cost, slows down your system to halt • Submit job on a node/system with more memory! Universitetets senter for informasjonsteknologi Memory footprint • “top” is your friend • Man top will give help • top is the mostly used tool for memory monitoring Universitetets senter for informasjonsteknologi
Recommended publications
  • A Fast, Verified, Cross-Platform Cryptographic Provider
    EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider Jonathan Protzenko∗, Bryan Parnoz, Aymeric Fromherzz, Chris Hawblitzel∗, Marina Polubelovay, Karthikeyan Bhargavany Benjamin Beurdouchey, Joonwon Choi∗x, Antoine Delignat-Lavaud∗,Cedric´ Fournet∗, Natalia Kulatovay, Tahina Ramananandro∗, Aseem Rastogi∗, Nikhil Swamy∗, Christoph M. Wintersteiger∗, Santiago Zanella-Beguelin∗ ∗Microsoft Research zCarnegie Mellon University yInria xMIT Abstract—We present EverCrypt: a comprehensive collection prone (due in part to Intel and AMD reporting CPU features of verified, high-performance cryptographic functionalities avail- inconsistently [78]), with various cryptographic providers able via a carefully designed API. The API provably supports invoking illegal instructions on specific platforms [74], leading agility (choosing between multiple algorithms for the same functionality) and multiplexing (choosing between multiple im- to killed processes and even crashing kernels. plementations of the same algorithm). Through abstraction and Since a cryptographic provider is the linchpin of most zero-cost generic programming, we show how agility can simplify security-sensitive applications, its correctness and security are verification without sacrificing performance, and we demonstrate crucial. However, for most applications (e.g., TLS, cryptocur- how C and assembly can be composed and verified against rencies, or disk encryption), the provider is also on the critical shared specifications. We substantiate the effectiveness of these techniques with
    [Show full text]
  • Extracting and Mapping Industry 4.0 Technologies Using Wikipedia
    Computers in Industry 100 (2018) 244–257 Contents lists available at ScienceDirect Computers in Industry journal homepage: www.elsevier.com/locate/compind Extracting and mapping industry 4.0 technologies using wikipedia T ⁎ Filippo Chiarelloa, , Leonello Trivellib, Andrea Bonaccorsia, Gualtiero Fantonic a Department of Energy, Systems, Territory and Construction Engineering, University of Pisa, Largo Lucio Lazzarino, 2, 56126 Pisa, Italy b Department of Economics and Management, University of Pisa, Via Cosimo Ridolfi, 10, 56124 Pisa, Italy c Department of Mechanical, Nuclear and Production Engineering, University of Pisa, Largo Lucio Lazzarino, 2, 56126 Pisa, Italy ARTICLE INFO ABSTRACT Keywords: The explosion of the interest in the industry 4.0 generated a hype on both academia and business: the former is Industry 4.0 attracted for the opportunities given by the emergence of such a new field, the latter is pulled by incentives and Digital industry national investment plans. The Industry 4.0 technological field is not new but it is highly heterogeneous (actually Industrial IoT it is the aggregation point of more than 30 different fields of the technology). For this reason, many stakeholders Big data feel uncomfortable since they do not master the whole set of technologies, they manifested a lack of knowledge Digital currency and problems of communication with other domains. Programming languages Computing Actually such problem is twofold, on one side a common vocabulary that helps domain experts to have a Embedded systems mutual understanding is missing Riel et al. [1], on the other side, an overall standardization effort would be IoT beneficial to integrate existing terminologies in a reference architecture for the Industry 4.0 paradigm Smit et al.
    [Show full text]
  • Intel Technology Platform for HPC Intel® Xeon® and Intel® Xeon Phi™ Processor Update
    Intel technology platform for HPC Intel® Xeon® and Intel® Xeon Phi™ processor update Manel Fernández Intel HPC Software Workshop Series 2016 HPC Code Modernization for Intel® Xeon and Xeon Phi™ February 17th 2016, Barcelona Today’s Intel solutions for HPC The multi- and many-core era Multi-core Many integrated core (MIC) C/C++/Fortran, OMP/MPI/Cilk+/TBB C/C++/Fortran, OMP/MPI/Cilk+/TBB Bootable, native execution model PCIe coprocessor, native and offload execution models Up to 18 cores, 3 GHz, 36 threads Up to 61 cores, 1.2 GHz, 244 threads Up to 768 GB, 68 GB/s, 432 GFLOP/s DP Up to 16 GB, 352 GB/s, 1.2 TFLOP/s DP 256-bit SIMD, FMA, gather (AVX2) 512-bit SIMD, FMA, gather/scatter, EMU (IMCI) Targeted at general purpose applications Targeted at highly parallel applications Single thread performance (ILP) High parallelism (DLP, TLP) Memory capacity High memory bandwidth 2 Processor Core 1 Core 2 Core n Core L3 Cache DDR3 Clock & MC QPI Graphics or Power DDR4 Intel® CoreTM architecture 3 Intel® CoreTM architecture roadmap The “Tick-Tock” roadmap model Intel® Core™ 2nd 3rd 4th 5th 6th “Nehalem” microarchitecture generation generation generation generation generation Sandy Ivy Nehalem Westmere Haswell Broadwell Skylake Bridge Bridge 45nm 32nm 22nm 14nm 2008 2009 2011 2012 2013 Sep 2014 2015 ADX and 3 other MPX, SGX SSE4.2 AES AVX RNRAND, etc. AVX2 new instructions AVX-512 (Xeon only) Tick (shrink, new process technology) Tock (innovate, new microarchitecture) 4 Haswell execution unit overview Unified Reservation Station Port 4 Port Port 2
    [Show full text]
  • Arhitectura Procesoarelor X86
    ARHITECTURA PROCESOARELOR X86. 2016 Setul de instrucţiuni generale UT Press Cluj-Napoca, 2016 ISBN 978-606-737-217-5 Recenzia materialului: Camelia Chira, Şef lucrări - UTCN Copyright © 2016 Editura U.T. PRESS Reproducerea integrală sau parţială a textului sau ilustraţiilor din această carte este posibilă numai cu acordul prealabil scris al editurii U.T.Press sau al autorului. ISBN 978-606-737-217-5 Prefaţă Această carte reprezintă un ghid ce se adresează în mod special studenților de la facultăţile de profil Informatică sau Tehnologia Informaţiilor, dar poate fi un instrument util și altor categorii de persoane; a fost conceput pentru cei care doresc să se acomodeze cu programarea în limbaj de asamblare şi deci cunoaşterea instrucţiunilor generale suportate de procesoare x86. Scopul principal al acestui material îl constituie susținerea procesului de învățare activă, prin studierea și apoi exersarea de exemple (rezolvarea individuală) de exerciţii sau probleme (cu instrucţiunile propuse aici). Materialul a fost structurat în 7 capitole, acoperind o varietate largă de exemple atât pentru procesoare de 16 biţi cât şi pentru procesoare pe 32 biţi. Acolo unde am considerat necesar, am prezentat şi exemple pentru procesoare pe 64 biţi. Execuţia programelor sau secvenţelor de instrucţiuni prezentate aici poate fi realizată în mai multe moduri: folosind un simulator de procesor (de exemplu EMU8086), folosind pachetul TASM sub DosBox sau un alt asamblor pe 32 sau chiar 64 biţi (MASM de exemplu), sau folosind Visual C şi asamblare inline. Cu toate eforturile pe care le-am depus în vederea organizării și prezentării materialului, cu siguranţă că sunt multe îmbunătăţiri care se pot propune; de aceea, aștept cu interes orice propunere, corectură sau pur și simplu comentariu în vederea îmbunătăţirii acestui material la adresa [email protected].
    [Show full text]
  • Computer-Aided Cryptography
    SoK: Computer-Aided Cryptography Manuel Barbosa∗, Gilles Bartheyz, Karthik Bhargavanx, Bruno Blanchetx, Cas Cremers{, Kevin Liaoyk, Bryan Parno∗∗ ∗University of Porto (FCUP) and INESC TEC, yMax Planck Institute for Security & Privacy, zIMDEA Software Institute, xINRIA Paris, {CISPA Helmholtz Center for Information Security, kMIT, ∗∗Carnegie Mellon University Abstract—Computer-aided cryptography is an active area of which are difficult to catch by code testing or auditing; ad- research that develops and applies formal, machine-checkable hoc constant-time coding recipes for mitigating side-channel approaches to the design, analysis, and implementation of attacks are tricky to implement, and yet may not cover the cryptography. We present a cross-cutting systematization of the computer-aided cryptography literature, focusing on three whole gamut of leakage channels exposed in deployment. main areas: (i) design-level security (both symbolic security and Unfortunately, the current modus operandi—relying on a select computational security), (ii) functional correctness and efficiency, few cryptography experts armed with rudimentary tooling to and (iii) implementation-level security (with a focus on digital vouch for security and correctness—simply cannot keep pace side-channel resistance). In each area, we first clarify the role with the rate of innovation and development in the field. of computer-aided cryptography—how it can help and what the caveats are—in addressing current challenges. We next present Computer-aided cryptography, or CAC for short, is an active a taxonomy of state-of-the-art tools, comparing their accuracy, area of research that aims to address these challenges. It en- scope, trustworthiness, and usability. Then, we highlight their compasses formal, machine-checkable approaches to design- main achievements, trade-offs, and research challenges.
    [Show full text]
  • Evaluation of Programming Models for Manycore And/Or Heterogeneous
    Evaluation of programming models for manycore and / or heterogeneous architectures for Monte Carlo neutron transport codes Tao Chang To cite this version: Tao Chang. Evaluation of programming models for manycore and / or heterogeneous architectures for Monte Carlo neutron transport codes. Computer science. Institut Polytechnique de Paris, 2020. English. NNT : 2020IPPAX099. tel-03086536 HAL Id: tel-03086536 https://tel.archives-ouvertes.fr/tel-03086536 Submitted on 22 Dec 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Evaluation of programming models for manycore and / or heterogeneous architectures for Monte Carlo neutron NNT : 2020IPPAX099 transport codes Thèse de doctorat de l’Institut Polytechnique de Paris préparée à l’École polytechnique École doctorale n◦626 École doctorale de l’Institut Polytechnique de Paris (ED IP Paris) Spécialité de doctorat: Informatique, Données et Intelligence Artificielle Thèse présentée et soutenue à Saclay, le 01/12/2020, par TAO CHANG Composition du Jury : Michael HEROUX Professeur, Sandia National Laboratories
    [Show full text]
  • Evaluation of Programming Models for Manycore and / Or Heterogeneous Architectures for Monte Carlo Neutron
    Evaluation of programming models for manycore and / or heterogeneous architectures for Monte Carlo neutron NNT : 2020IPPAX099 transport codes Thèse de doctorat de l’Institut Polytechnique de Paris préparée à l’École polytechnique École doctorale n◦626 École doctorale de l’Institut Polytechnique de Paris (ED IP Paris) Spécialité de doctorat: Informatique, Données et Intelligence Artificielle Thèse présentée et soutenue à Saclay, le 01/12/2020, par TAO CHANG Composition du Jury : Michael HEROUX Professeur, Sandia National Laboratories and St. John’s University Rapporteur Jean-François MEHAUT Professeur, Université Grenoble Alpes Rapporteur Raymond NAMYST Professeur, Université de Bordeaux Examinateur Marc VERDERI Directeur de recherche, Laboratoire Leprince Ringuet de l’IPP Président Emmanuelle SAILLARD Chargé de recherche, Le Centre de Recherche INRIA Bordeaux Examinateur Francieli ZANON BOITO Maitre de Conférences, Université de Bordeaux Examinateur 626 Christophe CALVIN Expert International, CEA Saclay Directeur de thèse Emeric BRUN Ingénieur de recherche, CEA Centre Marcoule Encadrant This thesis is dedicated to my family who have raised me to be the person I am today. I hope that this achievement makes you happy. Acknowledgements First and foremost, I would like to express my deep and sincere gratitude to my thesis supervisor, Christophe CALVIN, for the continuous support of my Ph.D study throughout the past three years, for his motivation, enthusiasm and vision which have deeply inspired me every time I got stuck on research. I am extremely grateful for having the opportunity to study and work under his guidance. I would like to thank my advisor, Emeric BRUN, for his patience, insightful comments and hardware support.
    [Show full text]
  • Sok: Computer-Aided Cryptography
    SoK: Computer-Aided Cryptography Manuel Barbosa∗, Gilles Bartheyz, Karthik Bhargavanx, Bruno Blanchetx, Cas Cremers{, Kevin Liaoyk, Bryan Parno∗∗ ∗University of Porto (FCUP) and INESC TEC, yMax Planck Institute for Security & Privacy, zIMDEA Software Institute, xINRIA Paris, {CISPA Helmholtz Center for Information Security, kMIT, ∗∗Carnegie Mellon University Abstract—Computer-aided cryptography is an active area of which are difficult to catch by code testing or auditing; ad- research that develops and applies formal, machine-checkable hoc constant-time coding recipes for mitigating side-channel approaches to the design, analysis, and implementation of attacks are tricky to implement, and yet may not cover the cryptography. We present a cross-cutting systematization of the computer-aided cryptography literature, focusing on three whole gamut of leakage channels exposed in deployment. main areas: (i) design-level security (both symbolic security and Unfortunately, the current modus operandi—relying on a select computational security), (ii) functional correctness and efficiency, few cryptography experts armed with rudimentary tooling to and (iii) implementation-level security (with a focus on digital vouch for security and correctness—simply cannot keep pace side-channel resistance). In each area, we first clarify the role with the rate of innovation and development in the field. of computer-aided cryptography—how it can help and what the caveats are—in addressing current challenges. We next present Computer-aided cryptography, or CAC for short, is an active a taxonomy of state-of-the-art tools, comparing their accuracy, area of research that aims to address these challenges. It en- scope, trustworthiness, and usability. Then, we highlight their compasses formal, machine-checkable approaches to design- main achievements, trade-offs, and research challenges.
    [Show full text]
  • Solving Pdes in Space-Time
    Solving PDEs in Space-Time: 4D Tree-Based Adaptivity, Mesh-Free and Matrix-Free Approaches Masado Ishii Milinda Fernando Kumar Saurabh University of Utah University of Utah Iowa State University Salt Lake City, Utah Salt Lake City, Utah Ames, Iowa Biswajit Khara Baskar Hari Sundar Iowa State University Ganapathysubramanian University of Utah Ames, Iowa Iowa State University Salt Lake City, Utah Ames, Iowa ABSTRACT KEYWORDS Numerically solving partial diferential equations (PDEs) remains a 4D, space-time adaptive, sedectree, mesh-free, matrix-free, fnite compelling application of supercomputing resources. The next gen- element method, distributed memory parallel eration of computing resources – exhibiting increased parallelism and deep memory hierarchies– provide an opportunity to rethink ACM Reference Format: Masado Ishii, Milinda Fernando, Kumar Saurabh, Biswajit Khara, Baskar how to solve PDEs, especially time dependent PDEs. Here, we con- Ganapathysubramanian, and Hari Sundar. 2019. Solving PDEs in Space- sider time as an additional dimension and simultaneously solve for Time: 4D Tree-Based Adaptivity, Mesh-Free and Matrix-Free Approaches. In the unknown in large blocks of time (i.e. in 4D space-time), instead The International Conference for High Performance Computing, Networking, of the standard approach of sequential time-stepping. We discretize Storage, and Analysis (SC ’19), November 17–22, 2019, Denver, CO, USA. ACM, the 4D space-time domain using a mesh-free kD tree construction New York, NY, USA, 15 pages. https://doi.org/10.1145/3295500.3356198 that enables good parallel performance as well as on-the-fy con- struction of adaptive 4D meshes. To best use the 4D space-time mesh adaptivity, we invoke concepts from PDE analysis to establish 1 INTRODUCTION rigorous a posteriori error estimates for a general class of PDEs.
    [Show full text]
  • Výpočetní Jednotky Procesorů Poslední Generace a Jejich Využití.: Bakalárska Práca
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Digital library of Brno University of Technology VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA ELEKTROTECHNIKY A KOMUNIKAČNÍCH TECHNOLOGIÍ ÚSTAV TELEKOMUNIKACÍ FACULTY OF ELECTRICAL ENGINEERING AND COMMUNICATION DEPARTMENT OF TELECOMMUNICATIONS VÝPOČETNÍ JEDNOTKY PROCESORŮ POSLEDNÍ GENERACE A JEJICH VYUŽITÍ PROCESSING UNITS OF LAST GENERATION PROCESSORS AND THEIR UTILIZATION BAKALÁŘSKÁ PRÁCE BACHELOR'S THESIS AUTOR PRÁCE SAMUEL ŠLENKER AUTHOR VEDOUCÍ PRÁCE Ing. MIROSLAV BALÍK, Ph.D. SUPERVISOR BRNO 2015 VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ Fakulta elektrotechniky a komunikačních technologií Ústav telekomunikací Bakalářská práce bakalářský studijní obor Teleinformatika Student: Samuel Šlenker ID: 154887 Ročník: 3 Akademický rok: 2014/2015 NÁZEV TÉMATU: Výpočetní jednotky procesorů poslední generace a jejich využití POKYNY PRO VYPRACOVÁNÍ: Proveďte podrobnou analýzu a následné porovnání starších a nových vektorových jednotek, které se používají v současných moderních procesorech. Soustřeďte se na porovnání možností vektorových jednotek SSE, AVX a FMA. Na konkrétních příkladech maticového a vektorového počtu uveďte přínosy AVX oproti SSE, dále přínosy tří- nebo čtyř-operandových operací podporovaných v rámci FMA. V úvahu vezměte také počty jader současných mikroprocesorů a počet současně pracujících vektorových jednotek na jádro. Výsledky zpracujte samostatně ve formě dvou teoretických úvodů k laboratorním úlohám. Připravte si vývojové prostředí pro vytváření dynamických knihoven s funkcemi, které budou tyto výpočetní jednotky využívat. DOPORUČENÁ LITERATURA: [1] Haswell New Instruction Descriptions [online], 2014. Dostupné z https://software.intel.com/en-us/blogs/2011/06/13/haswell-new-instruction-descriptions-now-available/ [2] Intel® Advanced Vector Extensions Programming Reference (319433-011) [online], 2014.
    [Show full text]
  • The Lesser Work Isbn 978-1-68474-073-4
    THE LESSER WORK ISBN 978-1-68474-073-4 No Copyright Published March 2021 THE LESSER WORK JLIAT WWW.JLIAT.COM Contents Part One. IF ITS NOT FREE ITS NOT ART 1 Part Two HIGH HOPES - War. 14 Part Three. FOLDING – making un-making. 39 Part Four. For the want of God. 53 Part Five. Signs. 67 Part Six. Trees. 75 Part Seven. 2020. 89 Appendix A. Hegel's Science of Logic. Appendix B. 8086 family Instruction Set. Appendix C. TO HAVE DONE WITH THE JUDGEMENT OF GOD by Antonin Artaud Part One. IF ITS NOT FREE ITS NOT ART - Capitalism, Marxism, Society and Freedom. “Beyond the rupture of the economic conditions of music, composition is revealed as the demand for a truly different system of organisation, a network within which a different kind of music and different social relations can arise. A music produced by each individual for himself, for pleasure outside of meaning, usage and exchange.” (Jacques Atali in “Noise The Political Economy of Music” p. 137.) The slogan “IF ITS NOT FREE ITS NOT ART” in the first case could be thought to be a critique of capitalism not only in music but in Art in general, and it is. The critique applies to the two 'Art Worlds', that of the 'Recording Stars', Bond Street galleries and auction houses where 'Art' as a commodity sells for millions, and makes contemporary artists millionaires whose 'factories' generate wealth and expensive trophies for the super rich, The 'Art Industry', where works are valued in monetary terms only1. And the alternative, 'radical' art collectives of critique of late capitalism2 and the promotion of political and social enfranchisement for all, and compensation for those identified as marginalised groups.
    [Show full text]
  • Optimization of Supersingular Isogeny Cryptography for Deeply Embedded Systems Jeffrey Denton Calhoun University of New Mexico - Main Campus
    University of New Mexico UNM Digital Repository Electrical and Computer Engineering ETDs Engineering ETDs Spring 5-11-2018 Optimization of Supersingular Isogeny Cryptography for Deeply Embedded Systems Jeffrey Denton Calhoun University of New Mexico - Main Campus Follow this and additional works at: https://digitalrepository.unm.edu/ece_etds Part of the Electrical and Computer Engineering Commons Recommended Citation Calhoun, Jeffrey Denton. "Optimization of Supersingular Isogeny Cryptography for Deeply Embedded Systems." (2018). https://digitalrepository.unm.edu/ece_etds/420 This Thesis is brought to you for free and open access by the Engineering ETDs at UNM Digital Repository. It has been accepted for inclusion in Electrical and Computer Engineering ETDs by an authorized administrator of UNM Digital Repository. For more information, please contact [email protected]. Jeffrey Denton Calhoun Candidate Electrical and Computer Engineering Department This thesis is approved, and it is acceptable in quality and form for publication: Approved by the Thesis Committee: James Plusquellic , Chairperson Marios Pattichis Manel Martinez-Ramon Optimization of Supersingular Isogeny Cryptography for Deeply Embedded Systems by Jeffrey D. Calhoun B.S., Computer Engineering, University of New Mexico, 2016 THESIS Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science Computer Engineering The University of New Mexico Albuquerque, New Mexico July, 2018 ii Dedication Dedicated to those I love and everyone else, even though it might not be appreciated. iii Acknowledgments I would like to thank my friends and colleagues, Donald Owen and Andrew Targhetta, for their mentorship and support in this research. I would also like to thank my adviser, Jim Plusquellic, for his helpful suggestions and timely feed- back.
    [Show full text]