Quick viewing(Text Mode)

BCL: a Cross-Platform Distributed Data Structures Library

BCL: a Cross-Platform Distributed Data Structures Library

BCL: A Cross-Platform Distributed Data Structures

Benjamin Brock, Aydın Buluç, Katherine Yelick University of California, Berkeley Lawrence Berkeley National Laboratory {brock,abuluc,yelick}@cs.berkeley.edu

ABSTRACT a matching receive operation or outside of a global collective. How- One-sided communication is a useful paradigm for irregular paral- ever, PGAS languages lack the kind of high level libraries that exist lel applications, but most one-sided programming environments, in other popular programming environments. For example, high- including MPI’s one-sided interface and PGAS programming lan- performance scientific simulations written in MPI can leverage a guages, lack application-level libraries to support these applica- broad of numerical libraries for dense or sparse matrices, or tions. We present the Berkeley Container Library, a set of generic, for structured, unstructured, or adaptive meshes. PGAS languages cross-platform, high-performance data structures for irregular ap- can sometimes use those numerical libraries, but lack the kind of plications, including queues, hash tables, Bloom filters and more. data structures that are important in some of the most irregular BCL is written in ++ using an internal DSL called the BCL Core parallel programs. that provides one-sided communication primitives such as remote In this paper we describe a library, the Berkeley Container Li- get and remote put operations. The BCL Core has backends for brary (BCL) that is intended to support applications with irregular MPI, OpenSHMEM, GASNet-EX, and UPC++, allowing BCL data patterns of communication and computation and data structures structures to be used natively in programs written using any of with asynchronous access, for example hash tables and queues, that these programming environments. Along with our internal DSL, can be distributed across processes but manipulated independently we present the BCL ObjectContainer abstraction, which allows BCL by each . BCL is designed to provide a complementary set data structures to transparently serialize complex data types while of abstractions for data analytics problems, various types of search maintaining efficiency for primitive types. We also introduce the algorithms, and other applications that do not easily fit a bulk- set of BCL data structures and evaluate their performance across a synchronous model. BCL is written in C++ and its data structures number of high-performance computing systems, demonstrating are designed to be coordination free, using one-sided communica- that BCL programs are competitive with hand-optimized code, even tion primitives that can be executed using RDMA hardware with- while hiding many of the underlying details of message aggregation, out requiring coordination with remote CPUs. In this way, BCL is serialization, and synchronization. consistent with the spirit of PGAS languages, but provides higher level operations such as insert and find in a , rather than CCS CONCEPTS low-level remote read and write. As in PGAS languages, BCL data structures live in a global address space and can be accessed by • Computing methodologies → Parallel programming lan- every process in a parallel program. BCL data structures are also guages. partitioned to ensure good locality whenever possible and allow for scalable implementations across multiple nodes with physically KEYWORDS disjoint memory. Parallel Programming Libraries, RDMA, Distributed Data Structures BCL is cross-platform, and is designed to be agnostic about the ACM Reference Format: underlying communication layer as long as it provides one-sided Benjamin Brock, Aydın Buluç, Katherine Yelick. 2019. BCL: A Cross-Platform communication primitives. It runs on top of MPI’s one-sided com- Distributed Data Structures Library . In Proceedings of ACM Conference munication primitives, OpenSHMEM, and GASNet-EX, all of which (Conference’17). ACM, New York, NY, USA, 13 pages. https://doi.org/10. provide direct access to low-level remote read and write primitives 1145/nnnnnnn.nnnnnnn to buffers in memory [6, 9, 17]. BCL provides higher level abstrac- arXiv:1810.13029v2 [cs.DC] 23 Apr 2019 tions than these communication layers, hiding many of the details 1 INTRODUCTION of buffering, aggregation, and synchronization from users that are Writing parallel programs for is notoriously diffi- specific to a given . BCL also has an experimental cult, particularly when they have irregular control flow and complex UPC++ backend, allowing BCL data structures to be used inside an- data distribution; however, high-level languages and libraries can other high-level programming environment. BCL uses a high-level make this easier. A number of languages have been developed for data serialization abstraction called ObjectContainers to allow the high-performance computing, including several using the Parti- storage of arbitrarily complex datatypes inside BCL data structures. tioned Global Address Space (PGAS) model: Titanium, UPC, Coarray BCL ObjectContainers use C++ compile-time type introspection to Fortran, X10, and Chapel [8, 11, 12, 27, 31, 32]. These languages are avoid introducing any overhead in the common case that types are especially well-suited to problems that require asynchronous one- byte-copyable. sided communication, or communication that takes place without We present the design of BCL with an initial set of data struc- tures and operations. We then evaluate BCL’s performance on ISx, Conference’17, July 2017, Washington, DC, USA an integer sorting mini-application, Meraculous, a mini-application 2019. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM...$15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn taken from a large-scale genomics application, and a collection of Conference’17, July 2017, Washington, DC, USA Benjamin Brock, Aydın Buluç, Katherine Yelick

microbenchmarks examining the performance of individual data MPI structure operations. We explain how BCL’s data structures and OpenSHMEM design decisions make developing high-performance implementa- Internal DSL BCL Containers tions of these benchmarks more straightforward and demonstrate (BCL Core) that BCL is able to match or exceed the performance of both spe- GASNet-EX cialized, expert-tuned implementations as well as general libraries UPC++ across three different HPC systems.

Figure 1: Organizational diagram of BCL. 1.1 Contributions (1) A distributed data structures library that is designed for high inserts, and finds, are executed purely in RDMA without requiring performance and portability by using a small set of core primi- coordination with remote CPUs. tives that can be executed on four backends (2) The BCL ObjectContainer abstraction, which allows data struc- Portability. BCL is cross-platform and can be used natively in tures to transparently handle serialization of complex types programs written in MPI, OpenSHMEM, GASNet-EX, and UPC++. while maintaining high performance for simple types When programs only use BCL data structures, users can pick whichever (3) A distributed hash table implementation that supports fast in- backend’s implementation is most optimized for their system and sertion and lookup phases, dynamic message aggregation, and network hardware. individual insert and find operations Software Toolchain Complexity. BCL is a header-only library, so (4) A distributed queue abstraction for many-to-many data ex- users need only include the appropriate header files and compile changes performed without global synchronization with a C++-14 compliant to build a BCL program. BCL (5) A distributed Bloom filter which achieves fully atomic insertions data structures can be used in part of an application without having using only one-sided operations to re-write the whole application or include any new dependencies. (6) A collection of distributed data structures that offer variable levels of atomicity depending on the call context using an ab- 3 BCL CORE straction called concurrency promises (7) A fast and portable implementation of the Meraculous bench- The BCL Core is the cross-platform internal DSL we use to imple- mark built in BCL ment BCL data structures. It provides a high-level PGAS memory (8) An experimental analysis of irregular data structures across model based on global pointers, which are C++ objects that allow three different computing systems along with comparisons be- the manipulation of remote memory. During initialization, each tween BCL and other standard implementations. process creates a segment of a fixed size, and every process can read and write to any location within another node’s shared segment using global pointers. A global pointer is a C++ ob- 2 BACKGROUND AND HIGH-LEVEL DESIGN ject that contains (1) the rank of the process on which the memory Several approaches have been used to address programmability is located and (2) the particular offset within that process’ shared issues in high-performance computing, including parallel languages memory segment that is being referenced. Together, these two val- like Chapel, metaprogramming libraries like UPC++, and ues uniquely identify a global memory address. Global pointers are embedded DSLs like STAPL. These environments provide core regular data objects and can be passed around between BCL pro- language abstractions that can productivity, and some of them cesses using communication primitives or stored in global memory. have sophisticated support for multidimensional arrays. However, Global pointers support pointer arithmetic operations analogous none of these environments feature the kind of rich data structure to local pointer arithmetic. libraries that exist in sequential programming enviroments like Global pointers support remote get and remote put operations, C++ or . A particular need is for distributed memory data which can be performed using an explicit BCL::memcpy operation structures that allow for nontrivial forms of concurrent access or with that go beyond partitioned arrays in order to address the needs of irregular applications. These data structures tend to have more 3.1 Communication Primitives complicated concurrency control and locality optimizations that 3.1.1 Writing and Reading. The BCL Core’s primary memory op- go beyond tiling and ghost regions. erations involve writing and reading to global pointers. Remote get Our goal is to build robust, reusable, high-level components to operations read from a global pointer and copy the result into local support these irregular computational patterns while maintaining memory, and remote put operations write the contents of an object performance close to hardware limits. We aim to achieve this goal in local memory to a shared memory location referenced by a global using the following design principles. pointer. Remote completion of put operations is not guaranteed until after a memory fence such as a flush or barrier. Low Cost for Abstraction. While BCL offers data structures with high-level primitives like hash table and queue insertions, these 3.1.2 Collectives. BCL includes the broadcast and allreduce collec- commands will be compiled directly into a small number of one- tives. Depending on the backend, these may be implemented using sided remote memory operations. Where hardware support is avail- raw remote put and remote get operations, or, more likely, may able, all primary data structure operations, such as reads, writes, map directly to high-performance implementations offered by the BCL: A Cross-Platform Distributed Data Structures Library Conference’17, July 2017, Washington, DC, USA backend communication framework. In the work presented here, 4.2 Many-to-Many Data Redistribution collective performance is not critical, as they are mainly used for For the second pattern, we are interested in applications where each transporting pointers and control values. process wishes to push data to other processes in an asynchronous, arbitrary manner. MPI all-to-all provides a restricted implemen- 3.1.3 Atomics. BCL’s data structures avoid coordination between tation of this pattern, where each process gathers its data to be CPUs, instead relying on remote memory atomics to maintain consis- sent to each other process, then all processes take part in a bulk tency. BCL backends must implement at least the atomic compare- synchronous all-to-all operation. While there are asynchronous and-swap operation, since all other atomic memory operations versions of MPI all-to-all, it still restricts processes from generating (AMOs) can be implemented on top of compare-and-swap [20]. new data after the all-to-all operation has started, thus limiting However, backends will achieve much higher performance by di- the possibility for overlap between communication and computa- rectly including any atomic operations available in hardware. Other tion. Sometimes this pattern is explicitly present, such as in sorting atomic operations provided by current BCL backends and utilized by or histogramming, but sometimes it can be exposed by buffering BCL data structures include atomic fetch-and-add and atomic-fetch- and aggregating fine-grained operations. In this paper, we first and-or. We depend on backends to provide high quality interfaces build queue data structures (Section 5.2) that allow for arbitrary to atomic operations as implemented in hardware, but also to pro- data redistribution using asynchronous queue insertions. Then, vide atomic operation support through active messages or progress we design a “hash table buffer” data structure (Section 5.3) that threads when hardware atomics are not available. allows users to buffer and aggregate hash table insertions trans- parently, transforming fine-grained, latency-bound operations into 3.1.4 Barriers. BCL applications enforce synchronization using bulk, bandwidth-bound ones. BCL barriers, which are both barriers and memory fences, forcing ordering of remote memory operations. In order for a rank to enter a barrier, all of its memory operations must complete, both locally and at the remote target. In order for a rank to exit a barrier, all 5 BCL DATA STRUCTURES other threads must have entered the barrier. BCL data structures are split into two categories: distributed and hosted. Distributed data structures live in globally addressable mem- 4 PARALLEL PATTERNS IN BCL ory and are automatically distributed among all the ranks in a BCL When choosing data structures to implement in BCL, we wanted program. Hosted data structures, while resident in globally address- to focus on data structures that could exploit particular high-level able memory, are hosted only on a particular process. All other parallel patterns [23, 24]. While BCL also efficiently supports com- processes may read or write from the data structure lying on the monly known data structure patterns such as the Distributed Array host process. We have found hosted data structures to be an impor- Pattern [23], its novelty lies in its support for more challenging tant building block in creating distributed data structures. irregular data access patterns as first-class citizens. In particular, All BCL data structures are coordination free, by which we mean we chose to focus on exposing high-level data structures that ex- that primary data structure operations, such as insertions, deletions, ploit two parallel patterns: (1) fine-grained, low-latency reads and updates, reads, and writes, can be performed without coordinating writes, and (2) asynchronous many-to-many redistribution of data. with the CPUs of other nodes, but purely in RDMA where hard- These patterns occur in many applications that perform concurrent ware support is available. Other operations, such as resizing or reads and writes in an unpredictable manner, with prime examples migrating hosted data structures from one node to another, may coming from graph algorithms, computational chemistry, and bioin- require coordination. In particular, operations which modify the formatics. These patterns can also be used in loosely synchronous size and location of the data portions of BCL data structures must be applications [13] that require data redistribution due to changes in performed collectively, on both distributed and hosted data struc- the computational structure as the algorithms proceed [28]. tures. This is because coordination-free data structure methods, such as insertions, use global knowledge of the size and location of the data portion of the data structure. For example, one process 4.1 Fine-Grained RDMA Operations cannot change the size or location of a hash table without alerting For the first pattern, we wanted to provide high-level interfaces other processes, since they may try to insert into the old hash table for fine-grained operations that are potentially complex, such as memory locations. Tables 1 and 2 give an overview of the available hash table operations, but in many cases will be executed as a data structures and operations. Table 2 also gives the best-case cost single RDMA operation. For these low-latency operations, design- of each operation in terms of remote reads R, remote writes W , ing a low-cost, header-only library where user code is compiled atomic operations A, local operations ℓ, and global barriers B. As down to a small number of calls to a backend library is essential to demonstrated by the table, each high-level data structure operation achieve performance. Also essential to achieving performance for is compiled down to a small number of remote memory operations. low-latency operations across a variety of computing platforms is All BCL data structures are also generic, meaning they can be supporting multiple backends, since oftentimes the best communica- used to hold any type, including complex, user-defined types. Most tion backend varies across supercomputing platforms. Examples of common types will be handled automatically, without any interven- data structures we implemented which expose this pattern include tion by the user. See Section 6 for a detailed description of BCL’s hash tables and Bloom filters, discussed in Sections 5.1 and 5.4. lightweight serialization mechanism. Conference’17, July 2017, Washington, DC, USA Benjamin Brock, Aydın Buluç, Katherine Yelick

Data Structure Locality Description indicates that a bucket is ready to be read. The remaining 30 bits are BCL::HashMap Distributed Hash Table read flag bits, and they indicate, if flipped, that a process is currently BCL::CircularQueue Hosted Multiple Reader/Writer Queue BCL::FastQueue Hosted Multi-Reader or Multi-Writer Queue reading the hash table entry, and prevent another process from BCL::HashMapBuffer Distributed Aggregate hash table insertions writing to the entry before the other process has finished reading. BCL::BloomFilter Distributed Distributed Bloom filter BCL::DArray Distributed 1- Array 5.1.3 Insert Operations. The default, fully atomic process for in- BCL::Array Hosted 1-D Array on one process serting (Table 3a) requires two atomic memory operations (AMOs) and a remote put with a flush. First, the inserting process computes Table 1: A summary of BCL data structures. the appropriate bucket. Then it uses a compare-and-swap (CAS) operation to set the bucket’s status to reserved, a remote put to write the correct key and value to the reserved bucket, followed Many distributed data structure operations have multiple pos- by a flush to ensure completion of the put, then finally anatomic sible implementations that offer varying levels of atomicity. De- XOR to set the status of the bucket to ready. Pseudocode for this pending on the context of a particular callsite, only some of these implementation follows. implementations may be valid. We formalize a mechanism, called (1) CAS bucket state from free → reserved. If state is discovered concurrency promises, that allows users to optionally assert invari- to be reserved/ready, instead CAS ready → reserved. ants about a callsite context. This allows BCL data structures to use (2) Once successful, if the previous state was free, write the optimized implementations that offer fewer atomicity guarantees key and value to the bucket. If the previous state was ready, when a user guarantees that this is possible. This mechanism is check the key. If key is incorrect, reset status, move to the discussed in Section 7. next bucket, and begin at (1). (3) Set status bits to ready using an atomic XOR. (Flipped read 5.1 Hash Table bits from attempted reads could interfere with a CAS, which BCL’s hash table is implemented as a single logically contiguous is unnecessary.) array of hash table buckets distributed block-wise among all pro- cesses. Each bucket is a struct including a key, value, and status In some special cases, we may wish to have processes perform flag. Our hash table uses open addressing with quadratic probing local insertions into their own portions of the hash table. This may to resolve hash collisions. As a result, neither insert nor find op- be done with only local CPU instructions, not involving the NIC. erations to our hash table require any coordination with remote Crucially, this cannot be done when other operations, such as gen- ranks. Where hardware support is available, hash table operations eral find or insert operations, might be executed, since CPU atomics will take place purely with RDMA operations. are not atomic with respect to NIC atomics. This implementation requires the concurrency promise local (Table 3b). 5.1.1 Interface. BCL’s BCL::HashMap is a distributed data struc- ture. Users can create a BCL::HashMap by calling the constructor as 5.1.4 Find Operations. The default, fully atomic implementation a collective operation among all ranks. BCL hash tables are created of the find operation (Table 3c) again involves two AMOs anda with a fixed key and value type as well as a fixed size. BCLhash remote read. First, the process uses a fetch-and-or to set a ran- tables use ObjectContainers, discussed in Section 6, to store keys dom read bit. This keeps other processes from writing to the hash and values of any type. BCL hash tables also use the standard C++ bucket before the process has finished reading it. Then, it reads the STL method for handling hash functions, which is to look for a value, and, after reading, unsets the read bit. Pseudocode for this std::hash template struct in the standard namespace that implementation follows. provides a mechanism for hashing key objects. (1) Atomic fetch-and-or to set a random read bit. If bit was The hash table supports two primary methods, insert and find. previously set, start again at (1). If bit was unset and status Section 9 gives a performance analysis of our hash table. was reserved, atomically fetch until status is ready. 5.1.2 Atomicity. By default, hash table insert and find operations (2) Once read bit is set and status is ready, read the key and are atomic with respect to one another, including simultaneous value. insert operations and find operations using the same key. In addition (3) Unset read bit using atomic fetch-and-and. If key was incor- to this default level of atomicity, users can pass a concurrency rect, move on to next bucket. promise as an optional argument at each callsite that can allow the In the common case of a traversal phase of an application, where data structure to select a more optimized implementation with less no insert operations may occur concurrent with find operations, strict atomicity guarantees. All the available implementations for we may use an alternate implementation that requires no atomic insert and find operations are shown in Table 3. operations (Table 3d), but just a single read operation to read the Our hash table uses a lightweight, per-bucket locking scheme. whole bucket including the reserved flag, key, and value. Each hash table bucket has a 32-bit used flag that ensures atomicity of operations. The lowest 2 bits of this flag indicate the reservation 5.1.5 Hash Table Size. A current limitation of BCL is that, since status of the bucket. There are three possible states: (1) free, (2) hash tables are initialized to a fixed size and do not dynamically reserved, and (3) ready. The free state represents an unused bucket, resize, an insertion may fail. In the future, we plan to support a the reserved state represents a bucket that has been reserved and dynamically resizing hash table. Currently, the user must call the will immediately be written to by a process, and the ready state collective resize method herself when the hash table becomes full. BCL: A Cross-Platform Distributed Data Structures Library Conference’17, July 2017, Washington, DC, USA

Data Structure Method Collective Description Cost BCL::HashMap bool insert(const K &key, const V &val) N Insert item into hash table. 2A + W bool find(const K &key, V &val) N Find item in table, return val. 2A + R BCL::BloomFilter bool insert(const T &val) N Insert item into Bloom filter, return true if already present. A bool find(const T &val) N Find item in table, return whether present. R BCL::CircularQueue bool push(const T &val) N Insert item into queue. 2A + W bool pop(T &val) N Pop item into queue. 2A + R bool push(const std::vector &vals) N Insert items into queue. 2A + nW bool pop(std::vector &vals, size_t n) N Pop items from queue. 2A + nR bool local_nonatomic_pop(T &val) N Nonatomically pop item from a local queue. ℓ void resize(size_t n) Y Resize queue. B + ℓ void migrate(size_t n) Y Migrate queue to new host. B + nW BCL::FastQueue bool push(const T &val) N Insert item into queue. A + W bool pop(T &val) N Pop item into queue. A + R bool push(const std::vector &vals) N Insert items into queue. A + nW bool pop(std::vector &vals, size_t n) N Pop items from queue. A + nR bool local_nonatomic_pop(T &val) N Nonatomically pop item from a local queue. ℓ void resize(size_t n) Y Resize queue. B + ℓ void migrate(size_t n) Y Migrate queue to new host. B + nW

Table 2: A selection of methods from BCL data structures. Costs are best case, using implementation chosen with no concur- rency promises. R is the cost of a remote read, W the cost of a remote write, A the cost of a remote atomic memory operation, B the cost of a barrier, ℓ the cost of a local memory operation, and n the number of elements involved.

Method Concurrency Promise Description Cost and are initialized with a fixed size as a hosted data structure, so insert while a queue is globally visible, it is resident on only one process (a) find | insert Fully Atomic 2A + W at a time. (b) local Local Insert ℓ find 5.2.1 FastQueue. FastQueue uses three shared objects: a data seg- ment, where queue elements are stored; a shared integer that stores (c) find | insert Fully Atomic 2A + R the head of the queue; and a shared integer that stores the tail of the (d) find Only Finds R queue. To insert, a process first increments the tail using an atomic fetch-and-add operation, checks that this does not surpass the head Table 3: Implementations of data structure operations for pointer, and then inserts its value or values into the data segment of BCL’s hash table data structure. the queue. An illustration of a push operation is shown in Figure 2. Method Concurrency Promise Description Cost In general, the head overrun check is performed without a remote push memory operation by caching the position of the head pointer, so an insertion requires only two remote memory operations. We (a) push | pop Fully Atomic 2A + W similarly cache the location of the tail pointer, so pops to the queue (b) push Only Pushes 2A + W usually require only one atomic memory operation to increment (c) local Local Push ℓ pop the head pointer and one remote memory operation to read the popped values. (d) push | pop Fully Atomic 2A + R (e) pop Only Pops 2A + R 5.2.2 CircularQueue. To support concurrent reads and writes, (f) local Local Pop ℓ CircularQueue has an additional set of head and tail pointers which indicate which portions of data in the queue are ready to Table 4: Implementations of data structure operations for be read. There are multiple implementations of push and pop for a BCL’s circular queue data structure. CircularQueue data structure, as listed in Table 4. 5.2.3 Push and Pop Operations. The default fully atomic imple- 5.2 Queues mentation used for insertion (Table 4a) into a CircularQueue data BCL includes two types of queues: one, CircularQueue, is a general structure involves 2 atomic operations and a remote put operation multi-reader, multi-writer queue which supports variable levels with a flush. First, we issue a fetch-and-add operation to increment of atomicity. The second, FastQueue, supports multiple readers the tail pointer, then write the data to the queue and flush it. Finally, or multiple writers, but requires that read and write phases be we must perform a compare-and-swap operation to increment the separated by a barrier. Both queues are implemented as ring buffers “tail ready” pointer, indicating that the pushed data is ready to be Conference’17, July 2017, Washington, DC, USA Benjamin Brock, Aydın Buluç, Katherine Yelick

Filled 5.4 Bloom Filters

Reserved A Bloom filter is a space-efficient, probabilistic data structure that Head answers queries about set membership [5]. Bloom filters can be used to improve the efficiency of hash tables, sets, and other key-based data structures. Bloom filters support two operations, insert and 1 2 Tail find. To insert a value into the Bloom filter, we use k hash functions fetch_and_add rput to hash the value to be inserted k times, resulting in k locations in New Tail a bit array that will all be set to one. To check if a value is present in a Bloom filter, the value is hashed k times, and if each of the Figure 2: Process for pushing values to a BCL FastQueue. corresponding bits is set, the value is said to be present. Because of First (1) a fetch_and_add operation is performed, which re- hash collisions, a Bloom filter may return false positives, although turns a reserved location where values can be inserted. Then it will never return false negatives. (2) the values to be inserted are copied to the queue. 5.4.1 Distributed Bloom Filter. A simple Bloom filter can be imple- read. A CAS is necessary for the final step because a fetch-and- mented in distributed memory as an array of integers distributed add could increment the ready pointer to mistakenly mark other block-wise across all processes. To insert a value into this Bloom processes’ writes as ready to be read. In the case where no pop oper- filter, the value to be inserted is hashed k times to determine which ations will be performed before a barrier, we may perform the final bits in the distributed Bloom filter must be set. Then, the appropriate atomic increment using a fetch-and-add (Table 4b). An analogous bits are set using atomic fetch-and-or operations to the correspond- implementation is used for pop operations (Table 4d and 4e). ing integers. To check whether a value is in the Bloom filter, the Both queues support resizing as well as migrating to another host value can be hashed k times and the corresponding locations in the process, both as collective operations. We evaluate the performance array checked. of our circular queue data structures in Section 9.1. There is, however, a fundamental limitation in implementing a distributed Bloom filter this way, as it results in a loss of atomicity 5.2.4 Advantage of FastQueue. FastQueue has the advantage of re- for insert operations. For many applications, it may be useful to quiring one fewer AMO per push or pop. While the CircularQueue have an atomic insertion operation that inserts a value into a Bloom does support variable levels of atomicity, allowing the final pop to filter and atomically returns a boolean value indicating whether be a single non-blocking fetch-and-add operation, we felt that this the value was already present in the Bloom filter. In a regular serial was an important enough overhead to warrant a separate version Bloom filter, we define a value as already present ifall k bits for of the data structure, since queues that support only multi-reader our value were already set in the filter, and not already present if and multi-writer phases are crucial to several of the algorithms that we were required to flip any bits in the filter. Since our insertion we explored. operation consists of multiple AMOs which cannot be guaranteed to be executed together atomically, we cannot guarantee that two 5.3 Buffering Hash Table Insertions processes which attempt to insert the same value simultaneously Many applications, such as the Meraculous benchmark, exhibit into the Bloom filter will not both believe that they were thefirst phasal behavior, where there is an insert phase, followed by a bar- process to insert that value into the Bloom filter. This violates the rier, followed by a read phase. We anticipate that this is likely to invariant that a Bloom filter will return no false negatives, sothe be a common case, and so have created a hash table buffer data Bloom filter described above cannot provide this information. structure that accelerates hash table insertion phases. An applica- There is also a disadvantage in terms of communication cost for tion can create a new BCL::HashMapBuffer on top of this implementation, since performing an insert requires flipping k an existing hash table. The user then inserts directly into the hash bits, generally resulting in k independent atomic operations. map buffer object using the same methods provided by thehash table. This simple code transformation is demonstrated in Figure 5.4.2 Blocked Bloom Filter. Instead of being comprised of a single 4. While the hash table interface ensures ordering of hash table bit array, blocked Bloom filters are composed of many smaller Bloom insertions, insertions into the hash table buffer are non-blocking, filters29 [ ]. To insert a value into a blocked Bloom filter, the value and ordering is no longer guaranteed until after an explicit flush op- is first hashed to determine which Bloom filter the value should eration. The hash table buffer implementation creates a FastQueue be stored in. The item will then be hashed k times to determine on each node as well as local buffers for each other node. When a which bits in the smaller Bloom filter need to be set. In shared user inserts into the hash table buffer, the insert will be stored in memory systems, blocked Bloom filters are used to improve the a buffer until the buffer reaches its maximum size, when itwillbe cache performance of large Bloom filters with a block size that isa pushed to the queue lying on the appropriate node to be staged for multiple of the cache line size. insertion. At the end of an insert phase, the user calls the flush() In BCL, we implement a distributed blocked Bloom filter as method to force all buffered insertions to complete. Insertions into BCL::BloomFilter to solve both of the issues with distributed the actual table will be completed using a local, fast hash table Bloom filters raised above. Our distributed blocked Bloom filter insertion (Table 3b). The hash map buffer results in a significant consists of a number of 64-bit Bloom filters. Inserting an item into performance boost for phasal applications, as discussed in Section our blocked Bloom filter now requires, in all cases, a single atomic 9.2.1. memory operation, and the operation is fully atomic. Checking if BCL: A Cross-Platform Distributed Data Structures Library Conference’17, July 2017, Washington, DC, USA

1 auto sort(const std::vector& data) { and deserialize our object in a way that is meaningful to remote 2 std::vector> buffers(BCL::nprocs()); processes. At the same time, we would like to optimize for the 3 common case where objects can be byte copied and avoid making 4 std::vector> queues; unnecessary copies. 5 for (size_t rank=0; rank< BCL::nprocs(); rank++){ 6 queues.push_back(BCL::FastQueue(rank, queue_size)); 6.0.1 Implementation. BCL ObjectContainers are implemented us- 7 } ing the C++ type system. A BCL ObjectContainer is a C++ struct 8 that takes template parameters T, a type of object that the Object- 9 for (auto& val : data) { Container will hold, and TSerialize, a C++ struct with methods 10 size_t rank= map_to_rank(val); to serialize objects of type T and deserialize stored objects back to 11 buffers[rank].push_back(val); T 12 if (buffers[rank].size()>= message_size) { type . BCL ObjectContainers themselves are of a fixed size and 13 queues[rank].push(buffers[rank]); can be byte copied to and from shared memory. An ObjectCon- 14 buffers[rank].clear(); tainer has a set method, which allows the user to store an object in 15 } the ObjectContainer, and a get method, which allows the user to 16 } retrieve the object from the container. 17 BCL includes a number of TSerialize structs for common C++ 18 for (size_t i=0; i< buffers.size(); i++){ types, and these will be automatically detected and utilized by 19 queues[i].push(buffers[i]); the BCL data structures at runtime. Users will usually not have to 20 } write their own serialization and deserialization methods unless 21 they wish to use custom types which use heap memory or other 22 BCL::barrier(); 23 local resources. 24 std::sort(queues[BCL::rank()].begin().local(), A finer point of BCL serialization structs is that they may serialize 25 queues[BCL::rank()].end().local()); objects to either fixed length or variable length types. This is handled 26 return queues[BCL::rank()].as_vector(); automatically at compile time by looking at the return type of the 27 } serialization struct: if the serialization struct returns an object of any normal type, then the serialized object is taken to be fixed size Figure 3: Our bucket sort implementation in BCL for the ISx and is stored directly as a member variable of the serialization struct. benchmark. If, however, the serialization struct returns an object of the special type BCL::serial_ptr, this signifies that the object is variable

1 BCL::HashMap map(size); length, even when serialized, so we must instead store a global 2 pointer to the serialized object inside the ObjectContainer. 3 BCL::HashMapBuffer buffer(map, queue_size, 4 message_size); 6.0.2 User-Defined Types. To store user-defined types in BCL data 5 structures, users can simply define serialization structs for their type 6 for (...) { and inject the struct into the BCL namespace. For byte-copyable 7 buffer.insert(key, value); types, this struct can be an empty struct that inherits from the 8 } BCL::identity_serialize template struct. 9 10 buffer.flush(); 6.0.3 Copy Elision Optimization. An important consideration when using serialization is overhead in the common case, when no seri- Figure 4: A small change to user code—inserting into the alization is actually required. In the common byte-copyable case, HashMapBuffer instead of the HashMap—causes inserts to be where the serialization struct simply returns a reference to the batched together. original object, intelligent are able to offer some implicit copy elision automatically. We have observed, by examining the an operation is present in the blocked Bloom filter requires one assembly produced, that the GNU and Clang compilers are able remote read memory operation. to optimize away the unnecessary copy when a ObjectContainer object is retrieved from distributed memory, get() is called to re- 6 BCL OBJECTCONTAINERS trieve the item lying inside. However, when an array of items is All BCL data structures use BCL ObjectContainers, which provide a pulled together from distributed memory and unpacked, the nec- transparent abstraction for storing complex data types in distributed essary loop complicates analysis and prevents the compiler from memory with low overhead. BCL ObjectContainers are necessary performing this copy elision. because not all data types can be stored in distributed memory by For this reason, BCL data structures perform explicit copy elision byte copying. The common case for this is a struct or class, such as when reading or writing from an array of ObjectContainers stored the C++ standard library’s std::string, which contains a pointer. in distributed memory when the ObjectContainer inherits from the The pointer contained inside the class is no longer meaningful once BCL::identity_serialize struct, which signifies that it is transferred to another node, since it refers to local memory that is byte copyable. This is a compile-time check, so there is no runtime now inaccessible, so we must use some other method to serialize cost for this optimization. Conference’17, July 2017, Washington, DC, USA Benjamin Brock, Aydın Buluç, Katherine Yelick

Name Processors Interconnect taken from large-scale genome assembly, and a collection of mi- Cori Phase I Intel Xeon Haswell Cray Aries crobenchmarks. In order to evaluate the performance portability Summitdev IBM POWER8 Mellanox EDR Infiniband of BCL programs, we tested the first two benchmarks across three AWS c3.4xlarge Intel Xeon 10Gb/s Ethernet different computer systems, as outlined in Table 5. On Cori, experi- ments are performed up to 512 nodes. On Summitdev, experiments Table 5: Summary of systems used in evaluation. are performed up to 54 nodes, which is the size of the whole cluster. On AWS, we provisioned a 64 node cluster and performed scaling 7 CONCURRENCY PROMISES experiments up to its full size. For reasons of space, the microbench- marks are presented only on Cori up to 64 nodes. As we have shown for various BCL data structures, distributed data structure operations often have multiple alternate implementations, only some of which will be correct in the context in which an 9.1 ISx Benchmark operation is issued. A common example of this is phasal operations, To test out our queue’s performance, we implemented a bucket sort where data structures are manipulated in separate phases, each of algorithm to execute the ISx benchmark [18]. The ISx benchmark which is separated by a barrier. Figures 3 and 4 both demonstrate is a simple bucket sort benchmark performed on uniformly dis- phasal operations. Crucially, the barriers associated with phasal tributed data. It consists of two stages, a distribution stage and a operations provide atomicity between different types of operations local sort stage. In the distribution stage, processes use pre-existing that often allows the use of implementations with fewer atomicity knowledge about the distribution of the randomly generated data guarantees. For example, a find operation in a hash table canbe to assign each key to be sorted to a bucket, where there is by de- executed with a more optimized implementation—a single remote fault one bucket on each node. After this stage, each process simply get operation, rather than 2 AMOs and a remote get—when we are performs a local sort on its received data. The original ISx bench- guaranteed that only find operations will be executed in the same mark comes with an MPI implementation, which uses an all-to-all barrier region. collective for the distribution stage and an OpenSHMEM imple- To allow users to take advantage of these optimized implemen- mentation, which sends data asynchronously. An implementation tations in a straightforward manner, we allow users to optionally in Chapel, a high-level parallel , has also provide concurrency promises, which are lists of data structure op- been published [1, 19]. erations that could take place concurrently with the operation be- ing issued. To use an optimized version of hash table find, we 9.1.1 BCL Implementation. We implemented our bucket sort in can pass as an extra argument to the find function the value BCL using the circular queue data structure. First, during initial- ConProm::HashMap::find. This indicates that only find opera- ization, we place one circular queue on each process. During the tions may occur simultaneously with this invocation. Similarly, if in distribution phase, each process pushes its keys into the appropri- a particular context a find operation might also occur concurrently ate remote queues. After a global barrier, each node performs a with a insert operation, we can pass the concurrency promise local sort on the items in its queue. During the distribution phase, ConProm::HashMap::find | ConProm::HashMap::insert. we perform aggregation of inserts to amortize the latency costs It’s important to note that, since C++ template metaprogram- of individual inserts. Instead of directly pushing individual items ming does not have full-program knowledge (unless the whole to the remote queues, we first place items in local buffers corre- program is expressed as a single expression), it is not possible to sponding to the appropriate remote queue. Once a bucket reaches automatically identify these optimization opportunities and pick a set message size, we push the whole bucket of items at once and correct implementations with a library. Instead, it would require clear the local bucket. It’s important to note that this push is asyn- static analysis using either a preprocessing tool or a separate paral- chronous, meaning that the communication involved with pushing lel programming language with an intermediate representation that items to the queue can be overlapped with computation involved preserves semantic knowledge of data structure operations. Our with sorting the items. The fact that BCL circular queue’s push approach here is to provide a facility for the user to easily specify method accepts a vector of items to insert simultaneously makes invariants, rather than to identify them automatically. adding aggregation very straightforward. Even with this optimiza- tion, our full BCL sorting benchmark code, including initialization 8 BACKENDS and timing, is only 72 lines long, compared to the original MPI and SHMEM reference implementations at 838 and 899 lines, and the BCL backends implement a limited number of communication prim- Chapel implementation at 244 lines. A slightly abbreviated version itives to provide full support for the BCL Core. These include an of our implementation is listed in Figure 3. init() function which allocates symmetric shared memory seg- ments of a requested size, the barrier(), read() and write() 9.1.2 Analysis. As shown in Figure 5, our BCL implementation of operations that perform variable-sized reads and writes to global ISx performs competitively with the reference and Chapel imple- memory, at least an atomic compare-and-swap, and broadcast and mentations. reduce operations. On the Cray Aries systems, BCL outperforms the other imple- mentations. This is because BCL is able to overlap communication 9 EXPERIMENTAL EVALUATION with computation: the asynchronous queue insertions overlap with We evaluated the performance of BCL’s data structures using ISx, sorting the values into buckets. This is an optimization that would an integer sorting mini-application, Meraculous, a mini-application be much more complicated to apply in a low-level MPI or SHMEM BCL: A Cross-Platform Distributed Data Structures Library Conference’17, July 2017, Washington, DC, USA

ISx Weak Scaling, Cori Phase I ISx Weak Scaling, Summitdev ISx Weak Scaling, AWS c3.4xlarge Cluster 16.0 4.0 16.0 BCL (MPI Backend) BCL (MPI Backend) BCL (SHMEM Backend) BCL (SHMEM Backend) BCL (GASNet-EX Backend) BCL (GASNet-EX Backend) 8.0 8.0 Chapel Chapel SHMEM SHMEM MPI MPI

4.0 4.0 2.0 Runtime (s) Runtime (s) Runtime (s)

2.0 2.0 BCL (MPI Backend) BCL (GASNet-EX Backend) Chapel MPI 1.0 1 2 4 8 16 32 64 128 256 512 1 2 4 8 16 32 54 1 2 4 8 16 32 64 Number of Nodes Number of Nodes Number of Nodes

Figure 5: Performance comparison on the ISx benchmark on three different computing systems. All runs measure weak scaling with 224 items per process. implementation (the reference implementation uses all-to-all pat- k-mers, which are short error-free strands of DNA guaranteed to terns), but is straightforward using BCL’s high-level interface. overlap each other by exactly k bases. The goal of contig generation There is an upward trend in the BCL scaling curves toward the is to process these k-mers to produce contigs, which are long strands high extreme of the graph on Cori. This is because as the number of contiguous DNA [10]. of processes increases, the number of values sent to each process Assembling these k-mers into longer strands of DNA involves decreases. At 512 nodes with 32 processes per node, each process using a hash table to traverse the de Bruijn graph of overlapping will send, on average, 1024 values to each other process. With our k-mers. This is performed by taking a k-mer, computing the next message size of 1024, on average only one push is sent to each overlapping k-mer in the sequence, and then looking it up in the other process, and the potential for communication and computa- hash table. This process is repeated recursively until a k-mer is tion overlap is much smaller, thus our solution degenerates to the found which does not match the preceding k-mer or a k-mer with synchronous all-to-all solution, and our performance matches the an invalid base is discovered. reference SHMEM implementation. Note that performance with A fast implementation for contig generation is relatively simple the MPI backend is poor on Cori; we believe this is because the MPI in a serial program, since using any of a large number of generic implementation is failing to use hardware atomics. hash table libraries will high performance. However, things The performance on Summitdev is similar, except that there is are not so simple in distributed memory. The reference solution for a slight downward trend in all the scaling lines because of cache Meraculous, written in UPC, is nearly 4,000 lines long and includes effects. As the number of processes increases, the keyspace oneach a large amount of boilerplate C code for operations like reading node decreases, and the local sort becomes more cache efficient. and writing to memory buffers [2]. Historically, PGAS programs have not faired well on Ethernet The implementation of the contig generation phase of a genome clusters, since PGAS programs often rely on fast hardware RDMA assembly pipeline is greatly simplified by the availability ofa support. With our BCL implementation, we are able to increase the generic distributed hash table in BCL. As described above, the message size to amortize the cost of slow atomic operations. While contig generation benchmark is really a simple application split our performance on AWS does not scale as well as the reference into two phases, an insert phase, which builds the hash table, and a MPI implementation, we consider the performance acceptable given traversal phase, which uses the hash table to traverse the de Bruijn that it is a high-level implementation running in an environment graph of overlapping symbols. Because of this phasal behavior, we traditionally deemed the exclusive domain of message-passing. On are able to optimize the performance of the hash table using BCL’s the Ethernet network, the GASNet-EX backend, which is using the hash map buffer, which groups together inserts by inserting them UDP conduit, performs better than the MPI backend, which is using all at once into a local queue on the node where they will likely Open MPI. be placed, then inserting them all using a fast local insert when a flush operation is called on the hash map buffer. Our implementa- 9.2 Genome Assembly tion of the Meraculous benchmark is only 600 lines long, 400 of which consist of code for reading, parsing, and manipulating k-mer We evaluated BCL’s generic hash table using two benchmarks taken objects. from a large-scale scientific application, a de novo genome assembly We implemented the contig generation phase of a genome as- pipeline: contig generation and k-mer counting. Both use a hash sembly pipeline using the Meraculous algorithm [10, 15, 16]. Our table, contig generation to traverse a de Bruijn graph of overlapping implementation is similar to the high-performance UPC implemen- symbols, and k-mer counting to compute a histogram describing tation [16], but (1) uses our generic hash table, instead of a highly the number of occurrences of each k-mer across reads of a DNA specialized hash table, and (2) uses a less sophisticated locking sequence. scheme, so sometimes processes may redundantly perform extra 9.2.1 Contig Generation in De Novo Genome Assembly. During the work by reconstructing an already constructed contig. We should contig generation stage of de novo genome assembly, the many error- note that the Meraculous UPC benchmark is based on the HipMer prone reads recorded by a DNA sequencer have been condensed into application, which may have higher performance [15]. Conference’17, July 2017, Washington, DC, USA Benjamin Brock, Aydın Buluç, Katherine Yelick

chr14, Cori Phase I chr14, Summitdev chr14, c3.4xlarge Cluster

64 PapyrusKV BCL with Buffer, GASNet-EX 512 BCL without Buffer, GASNet-EX 128 Meraculous 32 BCL with Buffer, GASNet-EX perfect scaling Meraculous 64 16 perfect scaling 256 32

8 16 128 8 Runtime (s) Runtime (s)

Runtime (s) 4 BCL without Buffer, SHMEM 4 BCL with Buffer, SHMEM 2 64 BCL without Buffer, GASNet-EX BCL with Buffer, GASNet-EX 1 perfect scaling 32

1 2 4 8 16 32 64 1 2 4 8 16 32 54 4 8 16 32 64 Number of Nodes Number of Nodes Number of Nodes

Figure 6: Performance comparison on the Meraculous benchmark on the chr14 dataset.

human, Cori Phase I k-mer Counting, chr14 512 384 BCL without Bloom Filter 256 256 BCL with Bloom Filter Perfect Scaling 128 128

64

64 32 Runtime (s) Runtime (s)

16.0 PapyrusKV 32 BCL without Buffer, GASNet-EX BCL with Buffer, GASNet-EX Meraculous 16 perfect scaling

8 16 32 64 128 256 512 4 8 16 32 64 Number of Nodes Number of Nodes

Figure 7: Performance on the Meraculous benchmark Figure 8: Strong scaling for our k-mer counting benchmark using dataset chr14. We benchmarked our hash table across the same three HPC systems described in Table 5 using the chr14 dataset, which is from sequencing data of human chromosome 14. We compared our of each individual k-mer, to try to eliminate errors. A large number implementation to the high-performance UPC reference Meracu- of k-mers will be erroneous, and, as a result, will appear only once lous benchmark implementation provided on the NERSC website, in the counting. which we compiled with Berkeley UPC with hardware atomics To speed up this histogram calculation, we can avoid unnecessary enabled [2, 16]. We also compared our hash table to PapyrusKV, a hash table lookups for items which appear only once in the hash high-performance general-purpose hash table implemented in MPI table by using our distributed blocked Bloom filter as discussed in which has a Meraculous benchmark implementation available [22]. Section 5.4.2. With this optimization, we first atomically insert a All performance results were obtained by running one process per k-mer into the Bloom filter, then only update its histogram value if core. Benchmarks for the UPC implementation are not available on the k-mer was already present in the Bloom filter. This optimization Summitdev because the code fails on POWER processors due to an also significantly reduces the overall memory consumption ofk- endianness issue. We also used the Meraculous benchmark prepared mer counting because a high portion of the unique k-mers occur by the developers of PapyrusKV [22]. As shown in Figure 6, our only once due to sequencing errors. Consequently, Bloom filters BCL implementation of the contig generation benchmark matches are now common in single node k-mer counters [25]. However, it is or exceeds the performance of both the reference high-performance harder to efficiently take advantage of Bloom filters in distributed implementation of Meraculous and the general PapyrusKV hash k-mer counting. In the absence of an efficient distributed Bloom table. In Figure 7, we also show a larger scaling experiment using filter that keeps global information about the k-mers processed the human genome as a dataset on Cori. Our BCL implementation so far, all the occurrences of a k-mer had to be localized in and appears to be both scalable to high numbers of nodes and portable counted by the same process for local Bloom filters to produce across different architectures and interconnects. accurate counts [16]. BCL’s distributed Bloom filter avoids this localization and the expensive all-to-all exchange of all k-mers 9.2.2 k-mer Counting. k-mer counting is another benchmark from associated with it. de novo genome assembly. In k-mer counting, we examine a large As shown in Figure 8, our k-mer counting benchmark shows number of lossy reads of DNA sequences and split these reads up excellent strong scaling, along with a slight performance boost into small, overlapping chunks of length k. We then use a hash table when using our distributed blocked Bloom filter. Aside from this to calculate a histogram, accumulating the number of occurrences performance boost, lower memory footprint is another benefit of BCL: A Cross-Platform Distributed Data Structures Library Conference’17, July 2017, Washington, DC, USA

Hash Table 'find_atomic' Hash Table 'find' FastQueue 'pop' FastQueue 'push' 149.7 546.8 84.0 154.1 GASNet-EX MPI SHMEM 48.2 226.2 18.8 19.9

15.5 93.6 4.2 2.6

38.7 0.9 0.3 5.0 GASNet-EX GASNet-EX Throughput (MOps/s) Throughput (MOps/s) Throughput (MOps/s)

Throughput (MOps/s) GASNet-EX MPI MPI MPI SHMEM SHMEM SHMEM 1.6 16.0 0.2 0.0 1 2 4 8 16 32 64 1 2 4 8 16 32 64 1 2 4 8 16 32 64 1 2 4 8 16 32 64 Number of Nodes Number of Nodes Number of Nodes Number of Nodes

Hash Table 'insert' Hash Table 'insert_buffer' FastQueue 'pop_many' FastQueue 'push_many' 60.9 2133.5 359.8 432.2 GASNet-EX GASNet-EX GASNet-EX MPI MPI MPI SHMEM SHMEM SHMEM 23.1 737.8 97.4 127.5

GASNet-EX 8.7 MPI 255.2 26.4 37.6 SHMEM

3.3 88.2 7.1 11.1 Throughput (MOps/s) Throughput (MOps/s) Throughput (MOps/s) Throughput (MOps/s)

1.3 30.5 1.9 3.3 1 2 4 8 16 32 64 1 2 4 8 16 32 64 1 2 4 8 16 32 64 1 2 4 8 16 32 64 Number of Nodes Number of Nodes Number of Nodes Number of Nodes

Figure 9: Microbenchmarks for the hash table. Figure 11: Microbenchmarks for FastQueue.

CircularQueue 'pop_pushpop' CircularQueue 'push_pushpop' 1.0 1.0 GASNet-EX GASNet-EX find_atomic insert MPI MPI operations ( and ) and versions offering fewer SHMEM SHMEM 0.3 0.3 atomicity guarantees or buffering (find and insert_buffer). We see that buffering offers an order of magnitude increase in perfor- 0.1 0.1 mance, which we would expect from transforming a latency-bound

0.0 0.0

Throughput (MOps/s) Throughput (MOps/s) operation into a bandwidth-bound operation, while the optimized find operation offers a factor of 2-3x improved performance, aswe 0.0 0.0 1 2 4 8 16 32 64 1 2 4 8 16 32 64 Number of Nodes Number of Nodes would expect from the relative best-case costs (2A + R and R). The queue performance features two kinds of benchmarks: bench- CircularQueue 'pop_pop' CircularQueue 'push_push' 67.6 117.0 GASNet-EX GASNet-EX marks looking at operations by all processes on a single queue, MPI MPI SHMEM SHMEM 14.7 18.0 and benchmarks looking at operations by all processes on a col- lection of queues, one on each processor (the latter benchmarks 3.2 2.8 are labeled “many”). In the CircularQueue benchmarks, we see

0.7 0.4 that fully atomic operations (pop_pushpop and push_pushpop) are Throughput (MOps/s) Throughput (MOps/s) quite expensive when all processes are inserting into a single queue, 0.2 0.1 1 2 4 8 16 32 64 1 2 4 8 16 32 64 Number of Nodes Number of Nodes compared to the less-atomic pop_pop and push_push. This is unsur- prising, since the final compare-and-swap operation in an atomic CircularQueue 'push_many_pushpop' CircularQueue 'push_many_push' 255.3 273.6 GASNet-EX CircularQueue push or pop essentially serializes the completion MPI SHMEM of operations. When pushing to multiple queues, using the less- 40.2 73.6 atomic operation gives a factor of two performance improvement 6.3 19.8 (push_many_pushpop vs. push_many_push). Looking at the FastQueue benchmarks, we see that this data 1.0 5.3 Throughput (MOps/s)

Throughput (MOps/s) GASNet-EX MPI structure does achieve a significant performance improvement even SHMEM 0.2 1.4 1 2 4 8 16 32 64 1 2 4 8 16 32 64 over the less-atomic implementations of data structure operations Number of Nodes Number of Nodes in CircularQueue. Figure 10: Microbenchmarks for CircularQueue. Across all benchmarks, it appears that GASNet-EX is most effec- tive at automatically utilizing local atomics when only running on one node, while MPI lags behind on most benchmarks, particularly BCL’s distributed Bloom filter, since k-mers which appear only those which make heavy use of atomic operations. once need not be inserted into the hash table. 10 RELATED WORK 9.3 Microbenchmarks UPC, Titanium, X10, and Chapel are parallel programming lan- We prepared a collection of microbenchmarks to compare (1) differ- guages which offer a PGAS distributed memory abstraction8 [ , 11, ent backends’ performance across data structure operations and (2) 12, 31, 32]. the relative performance of different implementations of data struc- UPC++ is a C++ library which offers a PGAS distributed memory ture operations. Each benchmark tests a single data structure opera- programming model [4, 33]. UPC++ has a heavy focus on asyn- tion. Turning first to the HashMap microbenchmarks in Figure 9: we chronous programming that is absent from BCL, including futures, see clear differences between fully atomic versions of data structure promises, and callbacks. UPC++’s remote procedure calls can be Conference’17, July 2017, Washington, DC, USA Benjamin Brock, Aydın Buluç, Katherine Yelick used to create more expressive atomic operations, since all RPCs are [2] NERSC Meraculous benchmark. http://www.nersc.gov/ executed atomically in UPC++. However, these operations require research-and-development/apex/apex-benchmarks/meraculous/. Accessed March 2, 2018. interrupting the remote CPU, and thus have slower throughput [3] STAPL beta release tutorial guide. 2017. than true RDMA atomic memory operations. The current version of [4] John Bachan, Dan Bonachea, Paul H Hargrove, Steve Hofmeyr, Mathias Jacquelin, UPC++ also lacks a library of data structures, and UPC++ is closely Amir Kamil, Brian van Straalen, and Scott B Baden. The UPC++ PGAS library for exascale computing. In Proceedings of the Second Annual PGAS Applications tied to the GASNet communication library, instead of supporting Workshop, page 7. ACM, 2017. multiple backends. [5] Burton H Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422–426, 1970. DASH is another C++ library that offers a PGAS distributed mem- [6] Dan Bonachea and P Hargrove. Gasnet specification, v1. 8.1. 2017. ory programming model [14]. DASH has a large focus on structured [7] Soumen Chakrabarti, Etienne Deprit, Eun-Jin Im, Jeff Jones, Arvind Krishna- grid computation, with excellent support for distributed arrays and murthy, Chih-Po Wen, and Katherine Yelick. Multipol: A distributed data struc- ture library. In PPoPP, 1995. matrices and an emphasis on providing each process with fast ac- [8] Bradford L Chamberlain, David Callahan, and Hans P Zima. Parallel programma- cess to its local portion of the distributed array. While DASH’s data bility and the chapel language. The International Journal of High Performance structures are generic, they do not support storing objects with com- Computing Applications, 21(3):291–312, 2007. [9] Barbara Chapman, Tony Curtis, Swaroop Pophale, Stephen Poole, Jeff Kuehn, plex types. DASH is tied to the DART communication library, which Chuck Koelbel, and Lauren Smith. Introducing OpenSHMEM: SHMEM for the could potentially offer performance portability through multiple PGAS community. In Proceedings of the Fourth Conference on Partitioned Global Address Space Programming Model, page 2. ACM, 2010. backends, but is currently limited to MPI for distributed memory [10] Jarrod A Chapman, Isaac Ho, Sirisha Sunkara, Shujun Luo, Gary P Schroth, and communication. Daniel S Rokhsar. Meraculous: de novo genome assembly with short paired-end HPX is a task-based runtime system for parallel C++ programs [21]. reads. PloS one, 6(8):e23501, 2011. [11] Philippe Charles, Christian Grothoff, Vijay Saraswat, Christopher Donawa, Allan It aims to offer a runtime system for executing standard C++ algo- Kielstra, Kemal Ebcioglu, Christoph Von Praun, and Vivek Sarkar. X10: an object- rithms efficiently on parallel systems, including clusters ofcom- oriented approach to non-uniform cluster computing. In Acm Sigplan Notices, puters. Unlike BCL, which is designed to use coordination-free volume 40, pages 519–538. ACM, 2005. [12] UPC Consortium et al. UPC language specifications v1. 2. Lawrence Berkeley RDMA communication, HPX’s fundamental primitives are remote National Laboratory, 2005. procedure calls used to distribute tasks. [13] Geoffrey C Fox, Roy D Williams, and Guiseppe C Messina. works! Elsevier, 2014. STAPL, or the standard adaptive template library, is an STL- [14] Karl Fürlinger, Tobias Fuchs, and Roger Kowalewski. DASH: A C++ PGAS like library of parallel algorithms and data structures for C++ [30]. library for distributed data structures and parallel algorithms. In Proceedings STAPL programs are written at a much higher level of abstraction of the 18th IEEE International Conference on High Performance Computing and Communications (HPCC 2016), pages 983–990, Sydney, Australia, December 2016. than BCL, in a functional style using special higher-order functions [15] Evangelos Georganas, Aydın Buluç, Jarrod Chapman, Steven Hofmeyr, Chaitanya such as map, reduce, and for-each which take lambda functions Aluru, Rob Egan, Leonid Oliker, Daniel Rokhsar, and Katherine Yelick. HipMer: as arguments. From this program description, STAPL generates a an extreme-scale de novo genome assembler. In Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, hybrid OpenMP and MPI program at compile time. Some versions page 14. ACM, 2015. of STAPL also include a runtime which provides load balancing. [16] Evangelos Georganas, Aydin Buluç, Jarrod Chapman, Leonid Oliker, Daniel Rokhsar, and Katherine Yelick. Parallel de bruijn graph construction and traversal The current version of STAPL is only available in a closed beta and for de novo genome assembly. In Proceedings of the International Conference for only includes array and vector data structures [3]. High Performance Computing, Networking, Storage and Analysis, pages 437–448. The Multipol library provided a set of concurrent data structures IEEE Press, 2014. [17] Robert Gerstenberger, Maciej Besta, and Torsten Hoefler. Enabling highly-scalable on top of active messages, including dynamic load balancing and remote memory access programming with MPI-3 one sided. Scientific Program- optimistic task schedulers [7]. However, it was non-portable and ming, 22(2):75–91, 2014. did not have the rich set of hash table data structures discussed [18] Ulf Hanebutte and Jacob Hemstad. ISx: A scalable integer sort for co-design in the exascale era. In Partitioned Global Address Space Programming Models (PGAS), here nor the notion of concurrency promises. 2015 9th International Conference on, pages 102–104. IEEE, 2015. Global Arrays provides a portal shared memory interface, ex- [19] Jacob Hemstad, Ulf R Hanebutte, Ben Harshbarger, and Bradford L Chamberlain. A study of the bucket-exchange pattern in the PGAS model using the ISx integer posing globally visible array objects that can be read from and sort mini-application. In PGAS Applications Workshop (PAW) at SC16, 2016. written to by each process [26]. While many application-specific [20] Maurice Herlihy. Wait-free synchronization. ACM Transactions on Programming libraries have been built on top of Global Arrays, it lacks the kind of Languages and Systems (TOPLAS), 13(1):124–149, 1991. [21] Hartmut Kaiser, Thomas Heller, Bryce Adelstein-Lelbach, Adrian Serio, and high-level generic data structures that are the focus of this work. Dietmar Fey. HPX: A task based programming model in a global address space. In Proceedings of the 8th International Conference on Partitioned Global Address Space Programming Models, page 6. ACM, 2014. 11 CONCLUSION [22] Jungwon Kim, Seyong Lee, and Jeffrey S Vetter. PapyrusKV: a high-performance BCL is a distributed data structures library that offers productivity parallel key-value store for distributed NVM architectures. In Proceedings of the International Conference for High Performance Computing, Networking, Storage through high-level, flexible interfaces but maintains high perfor- and Analysis, page 57. ACM, 2017. mance by introducing minimal overhead, offering high-level ab- [23] Timothy G Mattson, Beverly Sanders, and Berna Massingill. Patterns for parallel stractions that can be directly compiled down to a small number of programming. Pearson Education, 2004. [24] Michael McCool, James Reinders, and Arch Robison. Structured parallel program- one-sided remote memory operations. We have demonstrated that ming: patterns for efficient computation. Elsevier, 2012. BCL matches or exceeds the performance of both hand-optimized [25] Pall Melsted and Jonathan K Pritchard. Efficient counting of k-mers inDNA domain-specific implementations and general libraries on arange sequences using a Bloom filter. BMC bioinformatics, 12(1):333, 2011. [26] Jaroslaw Nieplocha, Robert J Harrison, and Richard J Littlefield. Global arrays: A of benchmarks and is portable to multiple HPC systems. nonuniform memory access programming model for high-performance comput- ers. The Journal of Supercomputing, 10(2):169–189, 1996. [27] Robert W Numrich and John Reid. Co-array fortran for parallel programming. REFERENCES In ACM Sigplan Fortran Forum, volume 17, pages 1–31. ACM, 1998. [1] Chapel implementation of ISx. https://github.com/chapel-lang/chapel/tree/ [28] Chao-Wei Ou, Sanjay Ranka, and Geoffrey Fox. Fast and parallel mapping master/test/release/examples/benchmarks/isx. Accessed March 10, 2018. algorithms for irregular problems. The Journal of Supercomputing, 10(2):119–140, BCL: A Cross-Platform Distributed Data Structures Library Conference’17, July 2017, Washington, DC, USA

1996. [29] Felix Putze, Peter Sanders, and Johannes Singler. Cache-, hash-, and space- efficient Bloom filters. Journal of Experimental Algorithmics (JEA), 14:4, 2009. [30] Gabriel Tanase, Antal Buss, Adam Fidel, Harshvardhan, Ioannis Papadopoulos, Olga Pearce, Timmie Smith, Nathan Thomas, Xiabing Xu, Nedal Mourad, Jeremy Vu, Mauro Bianco, Nancy M. Amato, and Lawrence Rauchwerger. The STAPL Parallel Container Framework. In Proceedings of the 16th ACM Symposium on Principles and Practice of Parallel Programming, PPoPP ’11, pages 235–246, New York, NY, USA, 2011. ACM. [31] Michele Weiland. Chapel, Fortress and X10: novel languages for HPC. EPCC, The University of Edinburgh, Tech. Rep. HPCxTR0706, 2007. [32] Kathy Yelick, Luigi Semenzato, Geoff Pike, Carleton Miyamoto, Ben Liblit, Arvind Krishnamurthy, Paul Hilfinger, Susan Graham, David Gay, Phillip Colella, etal. Titanium: A high-performance Java dialect. Concurrency Practice and Experience, 10(11-13):825–836, 1998. [33] Yili Zheng, Amir Kamil, Michael B Driscoll, Hongzhang Shan, and Katherine Yelick. UPC++: a PGAS extension for C++. In 28th IEEE International Parlalel and Distributed Processing Symposium, pages 1105–1114. IEEE, 2014.