SlideShare a Scribd company logo
1 of 10
Download to read offline
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
An Easy Path to Exascale
Scott Pakin
Applied Computer Science Group
Los Alamos National Laboratory
25 April 2012
Slide 1
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
Disclaimer
 The opinions expressed herein definitely do not reflect the positions of
Los Alamos National Laboratory, the National Nuclear Security
Administration, or the United States Department of Energy
Slide 2
 Please don’t cut off my funding
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
Background
 Many of us have been to lots of
exascale meetings
 If these meetings forbade the
use of the words
• energy
• resilience
• programmability
• co-design
 the meetings would be a lot
shorter
Slide 3
 (but perhaps more fun)
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
Exascale Refrains
 We don’t know how to reduce
system power
 We don’t have a good way to
tolerate frequent faults
 As component heterogeneity
increases, programmability
decreases
Slide 4
Exascale is
hard!
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
Solution
 How can we deal with all of the
problems of exascale?
Slide 5
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
My Proposal
Slide 6
 What if instead of building an exascale system, we gave each of 1000
researchers his/her own, private, petascale system?
exascale
petascale
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
My Proposal
 Power problem solved
 Resiliency problem solved
 Programmability problem solved
 Increased productivity
 Lower cost
Slide 7
 What if instead of building an exascale system, we gave each of 1000
researchers his/her own, private, petascale system?
 Different locations → distribute
load across the power grid
 Fewer components → faults
occur less frequently
 Less complex hardware → can
stick with MPI+X (where X=∅)
 Dedicated systems → no long
queues waiting for job to start
 More aligned with vendor
roadmaps → no cajoling needed
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
What About Applications that Require Exascale?
 Approaching a singularity where we don’t have any applications
 (except perhaps LINPACK)
Slide 8
Numberofsuitableapps.
Sequential
Small
SMP
Large
NUMA
Distributed
memory
Heterogeneous
architecture
Exascale
(power, resiliency)
Zettascale
(quantum
decoherence?)
Yottascale
(inter-D-brane
interactions on
11-dimensional
M-theoretic
superstrings?)
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
We May be Facing a Petascale Performance Asymptote
 Parallelism
• By Amdahl’s Law, if your application is less than 99.9% parallelized, you’ll see at
best only petascale performance on an exascale system
 Resilience
• Performing the same work three times gives you 1/3 of the remaining performance
 Power
• To stay within the power budget, some components may have to be turned off or
downclocked, lowering performance even further
1E+0
1E+2
1E+4
1E+6
1E+8
1E+10
1E+12
1E+14
1E+16
1E+3 1E+6 1E+9 1E+12 1E+15 1E+18 1E+21 1E+24
Theoretical peak performance
Application
performance
Mega Giga Tera Peta Exa Zetta Yotta
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
Summary
 Exascale computing poses numerous challenges
• Energy, resilience, programmability
 Relatively few applications both require exascale and can be
programmed to exploit complex exascale hardware
 Many applications can take advantage of petascale
• Limited by access to machines
• (Long queue if you want the machine for yourself)
 Proposition: Buy 1000 research teams their own petascale computer
• Increases scientists’ productivity
• Why put ourselves through the pain of an exascale before its time?
• I’ll wait until I can borrow an exascale cell phone from my grandkids
 It’s not like there isn’t still exciting research to be done at petascale
Slide 10

More Related Content

Similar to An Easy Path to Exascale

fault tree analysis
fault tree analysisfault tree analysis
fault tree analysis
Siti Mastura
 
SS15_PresentationFinal
SS15_PresentationFinalSS15_PresentationFinal
SS15_PresentationFinal
John Determan
 
Protecting Software: Agencies Respond
Protecting Software: Agencies RespondProtecting Software: Agencies Respond
Protecting Software: Agencies Respond
asauers
 

Similar to An Easy Path to Exascale (18)

Cool Supercomputing: Keepin' it Real
Cool Supercomputing: Keepin' it RealCool Supercomputing: Keepin' it Real
Cool Supercomputing: Keepin' it Real
 
Is Exascale the End of the Line for Commodity Networks?
Is Exascale the End of the Line for Commodity Networks?Is Exascale the End of the Line for Commodity Networks?
Is Exascale the End of the Line for Commodity Networks?
 
LEAST-COST-&-RISK LIFECYCLE DELIVERED ENERGY SERVICES
LEAST-COST-&-RISK LIFECYCLE DELIVERED ENERGY SERVICESLEAST-COST-&-RISK LIFECYCLE DELIVERED ENERGY SERVICES
LEAST-COST-&-RISK LIFECYCLE DELIVERED ENERGY SERVICES
 
Comparing Individual Reliability to Population Reliability for Aging Systems
Comparing Individual Reliability to Population Reliability for Aging SystemsComparing Individual Reliability to Population Reliability for Aging Systems
Comparing Individual Reliability to Population Reliability for Aging Systems
 
fault tree analysis
fault tree analysisfault tree analysis
fault tree analysis
 
Intelgrids H4D Stanford 2018
Intelgrids H4D Stanford 2018Intelgrids H4D Stanford 2018
Intelgrids H4D Stanford 2018
 
The Incorporation of Machine Learning into Scientific Simulations at Lawrence...
The Incorporation of Machine Learning into Scientific Simulations at Lawrence...The Incorporation of Machine Learning into Scientific Simulations at Lawrence...
The Incorporation of Machine Learning into Scientific Simulations at Lawrence...
 
HCFP Customer reference
HCFP  Customer referenceHCFP  Customer reference
HCFP Customer reference
 
Scholarly Communications at a National Research Lab: Approaches to Research a...
Scholarly Communications at a National Research Lab: Approaches to Research a...Scholarly Communications at a National Research Lab: Approaches to Research a...
Scholarly Communications at a National Research Lab: Approaches to Research a...
 
21104091117.pdf
21104091117.pdf21104091117.pdf
21104091117.pdf
 
Allinea DDT Resolves an Unsolved Mystery at Argonne National Laboratory
Allinea DDT Resolves an Unsolved Mystery at Argonne National LaboratoryAllinea DDT Resolves an Unsolved Mystery at Argonne National Laboratory
Allinea DDT Resolves an Unsolved Mystery at Argonne National Laboratory
 
SS15_PresentationFinal
SS15_PresentationFinalSS15_PresentationFinal
SS15_PresentationFinal
 
Lightning talk: highly scalable databases and the PACELC theorem
Lightning talk: highly scalable databases and the PACELC theoremLightning talk: highly scalable databases and the PACELC theorem
Lightning talk: highly scalable databases and the PACELC theorem
 
Without Resilience, Nothing Else Matters
Without Resilience, Nothing Else MattersWithout Resilience, Nothing Else Matters
Without Resilience, Nothing Else Matters
 
Protecting Software: Agencies Respond
Protecting Software: Agencies RespondProtecting Software: Agencies Respond
Protecting Software: Agencies Respond
 
Enterprise 2.0 and the Context of Work | Carmen Medina, TUG 2009 Keynote
Enterprise 2.0 and the Context of Work | Carmen Medina, TUG 2009 KeynoteEnterprise 2.0 and the Context of Work | Carmen Medina, TUG 2009 Keynote
Enterprise 2.0 and the Context of Work | Carmen Medina, TUG 2009 Keynote
 
Hands-On Lab: Learn How to Harness CA Application Performance Management Di...
Hands-On Lab: Learn How to Harness CA Application Performance Management  Di...Hands-On Lab: Learn How to Harness CA Application Performance Management  Di...
Hands-On Lab: Learn How to Harness CA Application Performance Management Di...
 
digit_twin.pptx
digit_twin.pptxdigit_twin.pptx
digit_twin.pptx
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

An Easy Path to Exascale

  • 1. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D An Easy Path to Exascale Scott Pakin Applied Computer Science Group Los Alamos National Laboratory 25 April 2012 Slide 1
  • 2. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Disclaimer  The opinions expressed herein definitely do not reflect the positions of Los Alamos National Laboratory, the National Nuclear Security Administration, or the United States Department of Energy Slide 2  Please don’t cut off my funding
  • 3. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Background  Many of us have been to lots of exascale meetings  If these meetings forbade the use of the words • energy • resilience • programmability • co-design  the meetings would be a lot shorter Slide 3  (but perhaps more fun)
  • 4. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Exascale Refrains  We don’t know how to reduce system power  We don’t have a good way to tolerate frequent faults  As component heterogeneity increases, programmability decreases Slide 4 Exascale is hard!
  • 5. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Solution  How can we deal with all of the problems of exascale? Slide 5
  • 6. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D My Proposal Slide 6  What if instead of building an exascale system, we gave each of 1000 researchers his/her own, private, petascale system? exascale petascale
  • 7. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D My Proposal  Power problem solved  Resiliency problem solved  Programmability problem solved  Increased productivity  Lower cost Slide 7  What if instead of building an exascale system, we gave each of 1000 researchers his/her own, private, petascale system?  Different locations → distribute load across the power grid  Fewer components → faults occur less frequently  Less complex hardware → can stick with MPI+X (where X=∅)  Dedicated systems → no long queues waiting for job to start  More aligned with vendor roadmaps → no cajoling needed
  • 8. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D What About Applications that Require Exascale?  Approaching a singularity where we don’t have any applications  (except perhaps LINPACK) Slide 8 Numberofsuitableapps. Sequential Small SMP Large NUMA Distributed memory Heterogeneous architecture Exascale (power, resiliency) Zettascale (quantum decoherence?) Yottascale (inter-D-brane interactions on 11-dimensional M-theoretic superstrings?)
  • 9. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D We May be Facing a Petascale Performance Asymptote  Parallelism • By Amdahl’s Law, if your application is less than 99.9% parallelized, you’ll see at best only petascale performance on an exascale system  Resilience • Performing the same work three times gives you 1/3 of the remaining performance  Power • To stay within the power budget, some components may have to be turned off or downclocked, lowering performance even further 1E+0 1E+2 1E+4 1E+6 1E+8 1E+10 1E+12 1E+14 1E+16 1E+3 1E+6 1E+9 1E+12 1E+15 1E+18 1E+21 1E+24 Theoretical peak performance Application performance Mega Giga Tera Peta Exa Zetta Yotta
  • 10. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Summary  Exascale computing poses numerous challenges • Energy, resilience, programmability  Relatively few applications both require exascale and can be programmed to exploit complex exascale hardware  Many applications can take advantage of petascale • Limited by access to machines • (Long queue if you want the machine for yourself)  Proposition: Buy 1000 research teams their own petascale computer • Increases scientists’ productivity • Why put ourselves through the pain of an exascale before its time? • I’ll wait until I can borrow an exascale cell phone from my grandkids  It’s not like there isn’t still exciting research to be done at petascale Slide 10