Coded QR Decomposition

Coded QR Decomposition

Coded QR Decomposition Quang Minh Nguyen1, Haewon Jeong2 and Pulkit Grover2 1 Department of Computer Science, National University of Singapore 2 Department of Electrical and Computer Engineering, Carnegie Mellon University Abstract—QR decomposition of a matrix is one of the essential • Previous works in ABFT for QR decomposition studied operations that is used for solving linear equations and finding applying coding on the Householder algorithm or the least-squares solutions. We propose a coded computing strategy Givens Rotation algorithm. Our work is the first to for parallel QR decomposition with applications to solving a full- rank square system of linear equations in a high-performance consider applying coding on the Gram-Schmidt algo- computing system. Our strategy is applied to the parallel Gram- rithm (and its variants). We show that using our strategy Schmidt algorithm, which is one of the three commonly used throughout the Gram-Schmidt algorithm1, vertical/hori- algorithms for QR decomposition. Conventional coding strategies zontal checksum structures are preserved (Section III). cannot preserve the orthogonality of Q. We prove a condition for • Simply applying linear coding cannot protect the Q-factor a checksum-generator matrix to restore the degraded orthogo- nality of the decoded Q through low-cost post-processing, and as the orthogonality is not preserved after linear trans- construct a checksum-generator matrix for single-node failures. forms. To circumvent this issue, we propose an innovative We obtain the minimal number of checksums required for single- post-processing technique to restore the orthogonality of node failures under the “in-node checksum storage setting”, where the Q-factor after coding. We show that if the checksum- checksums are stored in original nodes, and further adapt the generator matrix satisfies certain conditions, with low- coded QR decomposition to this setting. cost post-processing, we can perform QR factorization I. INTRODUCTION to solve a full-rank square system of linear equations. Motivated by the widespread use of large-scale machine We propose a construction of such checksum-generator learning computations, coded computing has been an active matrix for single node failures (Section IV). area of research [1]–[5], where the aim is to efficiently add • We consider practical data distribution. Throughout the redundancies to make computing more robust to uncertainties paper, we assume that the matrices are stored block- and accelerate computing. In this work, we consider protecting cyclically. In HPC applications, matrices are almost al- compute nodes from failures in high-performance computing ways distributed block-cyclically for load-balancing. Fur- (HPC) systems. Building a reliable supercomputer has been thermore, in Section VI, we consider in-node checksum a long-standing problem, but the emergence of exascale com- storage setting where we store the coded data (check- puting poses new challenges that require a new and innovative sums) in original processors instead of adding extra solution that goes beyond traditional reliability techniques. processors for fault tolerance. More than 20% of the computing capacity in today’s HPC This work focuses on the single-node failure case as it is systems is wasted due to failures and ensuing recovery [6], and the most common scenario in HPC. Generalizing our code this wastage is only expected to grow as the system size grows. construction to multiple-node failure scenarios and beyond To reduce the overhead of fault tolerance in upcoming HPC QR decomposition would be interesting to many intriguing systems, algorithm-based fault-tolerance (ABFT) for HPC has future work. Considering a realistic model of data distribution been suggested [7]–[17], the core idea of which is essentially and communication used in HPC, as is done here, not only the same as coded computing: adding encoded redundancy brings coded computing closer to practice, but also opens up tailored to a given numerical algorithm. intriguing theoretical questions. In this work, we study coded computing strategy for QR decomposition. QR decomposition factors a matrix into a II. BACKGROUND AND SYSTEM MODEL product of an orthogonal matrix (Q) and an upper triangular A. QR Decomposition matrix (R). It is an essential building block of linear algebraic QR decomposition decomposes a matrix A into a product computations as it provides a numerically stable method for A = QR of an orthogonal matrix Q (i.e. QT Q = I) solving linear equations, and is extensively used in the linear and an upper triangular matrix R. There are three classes least squares problem (e.g., linear regression). As it is an of commonly-used algorithms to compute QR factorization important computation primitive, ABFT for parallel QR de- in HPC: Gram-Schmidt (GS) and Modified Gram-Schmidt composition has been studied in the HPC literature [10], [12], (MGS) [18]–[20], Householder Transformation [21], [22] and [17]. In this paper, we not only introduce a new computation Givens Rotation [23]. In this work, we consider MGS [19], primitive that has not been considered in the coded computing which is an improved version of the GS algorithm. literature, but also incorporate practical system assumptions that are used in HPC algorithms. Our main contributions are 1Householder, Givens Rotation, Gram-Schmidt are the three most well- summarized below: known algorithms for QR decomposition A00 A01 A02 A03 A04 A05 A00 A01 A02 A03 A04 A05 triggering the recovery process. Computation continues once A10 A11 A12 A13 A14 A15 A10 A12 A13 A15 the system has recovered from its latest failure. Figure 1b A20 A21 A22 A23 A24 A25 A20 A21 A22 A23 A24 A25 illustrates an example of lost data-blocks. A A A A A A A A A A 30 31 32 33 34 35 30 32 33 35 D. Related Work C C C C C C C C C C C C 40 41 42 43 44 45 40 41 42 43 44 45 State-of-the-art ABFT techniques utilizing coded computation C C C C C C C C C C C C 50 51 52 53 54 55 50 51 52 53 54 55 have considered Householder [10], [12] and Givens Rotation (a) Failure-free state (b) Single-node failure [17], all of which only protect R via coding and rely on Figure 1: Out-of-node checksum storage for vertical checksums with replication for Q protection. While no work on coded MGS pr = 2; pc = 3. (a) Six systematic processors (green, purple, red, exists, its fault-tolerance via replication was proposed in [30]. blue, brown and white) own the original data blocks and three extra As MGS algorithms directly compute columns (or rows) of vertical checksum-processors (orange, light orange, light green) own the Q matrix subsequently used for R computation, coding the checksum-blocks Cij . (b) Lost data-blocks are grayed out for the case where the brown node fails. strategy which can protect Q is the main challenge and the pivotal building block in the design of coded MGS. Q- We specifically consider solving a system of linear equations factor protection is challenging: it was shown in [10] that Ax = b, where A is square and full-rank, as the end conventional coding approach, which linearly encodes A, is application of QR decomposition in this work. Solving square not possible for Q protection because the modified Q factor and non-singular system of linear equations is a fundamental retrieved from the coded computation is not orthogonal. building block for many applications in HPC [24]–[26], and uses QR decomposition in practice due to its guaranteed E. Problem Definition stability and computational efficiency [27]. We specifically consider MGS algorithm [19] for QR de- composition in our coding design, where A; Q and R are B. System Model distributed over processors using the 2D block-cyclic dis- We assume 2D block cyclic distribution of a matrix where a tribution and every node is vulnerable to fail-stop failures non-singular n × n matrix A is distributed block-cyclically (Section II-C). As encoding input matrix A naturally enforces on P = pr × pc processors with block size b, and each b × fault-tolerant computation, we attribute the main limitation to b block Aij is owned by processor Π(i; j) = (i mod pr) + the unsophisticated decoding of Q-factor. We thus allow post- n processing after the decoding phase to restore the degraded pr(j mod pc). N = b denote the number of data blocks of a block-column or a block-row. This is how matrix algorithms orthogonality of the decoded Q-factor. Post-processing can are implemented in practice for load balancing. transform A into an alternative form to be used in place of A in the end application- solving the square and non-singular Vertical checksums GvA (resp. horizontal checksums AGh) are checksum rows (resp. columns) which extend the input system of linear equations Ax = b. matrix A vertically (resp. horizontally) and are controlled Our goal is to design a novel coding strategy for MGS with full by the checksum-generator matrix Gv (resp. Gh). For fault protection, i.e., comprised of Q-factor and R-factor protection, tolerance, we encode the matrix A with both vertical and to tolerate any single-node failure during the the computation. A AGh As an extension, for the in-node checksum storage recently horizontal checksums as follows: Ae = . GvAGvAGh proposed by [10], we aim to address the optimality on the We consider the out-of-node checksum storage: (Figure 1a) number of checksums required for single-node failure, which The vertical (resp. horizontal) checksums are distributed over has remained an open question. the new set of pc vertical (resp. pr horizontal) checksum processors. Each checksum processor is protected and stores III. HORIZONTAL/VERTICAL CHECKSUMS FOR MGS the same amount of data as a systematic processor to ensure Checksum-preservation is the key idea of all the previous work load balancing and efficient parallelism.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    21 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us