Feeds

SCC Final: Taiwan crowned champs

Ultra-close results, rise of GPUs

  • alert
  • submit to reddit

High performance access to file storage

SC11 The final results of the 2011 Student Cluster Competition (SCC11) in Seattle are in the books and can be revealed. Well, they should have been revealed last night, but a series of meetings, bad hotel Wi-Fi, and perhaps alcohol played a role in the delay. In upcoming articles, you’ll see more videos and analysis of the results, but for now, let me sketch out the big picture.

In the closest finish, Team Taiwan from National Tsing Hua University took the overall student clustering crown for the second year in a row. They did it on a hybrid Acer system consisting of 72 Xeon CPU nodes and six NVIDIA Tesla C2070 GPU accelerators. On the memory side they had 48 GB/node, a bit low compared with other teams.

Barely behind Team Taiwan was NUDT’s Team China. The SC committee hasn’t (ever) released actual figures, but I was skulking around while they were being compiled and can say that the Taiwan-China scores were so close that hours of checking, re-checking, and then checking once again were required to make sure the results were correct.

Team China also rana hybrid CPU-GPU system. But the Chinese system, while sporting the same six NVIDIA C2070 Tesla accelerators as Team Taiwan, had only 24 Xeon cores. China had more memory per node at 96 GB each, but less overall memory at 192 GB total vs. 288 for Taiwan.

What’s obvious is that both of these teams did a great job of adapting the scientific workloads for use with GPUs. Some of the apps, like PFA, were already GPU compliant, but POP and some of the others were much less so and required some work to make them run efficiently. Both teams also did a great job of sandbagging me – always saying that they weren’t sure if their apps would take advantage of the GPUs, and that they weren’t expecting much.

Team Texas was a close third and had the highest score of any non-GPU competitor. Their mineral oil gambit seems to have paid off, giving them enough computing power (11 nodes, 132 Xeon cores and 48 GB per node) to both fit within the 26 amp limit and put up a good fight with the winners.

Team Boston, a new competitor, took fourth place with a massive hybrid AMD (336 cores)-NVIDIA (4xTesla M2090) system. This is a very good finish for a new team and also the highest placement of an AMD Interlagos-based box in the competition.

Just barely behind Boston was Team Russia with yet another hybrid system. Team Russia was sporting 84 Xeon cores and a whopping twelve NVIDIA M2070 cards while running a Microsoft operating system. While they didn’t take the overall crown, Team Russia nailed a win on LINPACK with their 1.9 TFlops result.

Close behind was Team Colorado, running a traditional CPU-based system with 256 Xeon cores and more memory (128GB per node) than any other team. Purdue’s gambit of sandbagging the Monday HPCC/LINPACK portion of the competition to apply maximum hardware to the scientific applications didn’t pay off as hoped. We have a video posted that discusses the what’s and why’s behind Purdue’s strategy.

Rounding out the competition was Team Costa Rica, who completed every challenge but didn’t excel in enough of them to put them above the leaders. They were thrown a last-minute curve ball when they had to change hardware vendors on setup day. The HPC Advisory Council – in the person of Gilad Shainer – stepped in to make sure that Costa Rica had everything they needed to compete. And compete they did, making a great impression on judges and spectators alike with their attitude, technical prowess, and desire to excel.

I’ll write a bit more analysis of the competition and what we’ve learned from it when I get back home – or maybe after the aspirin kicks in. But briefly, the huge impact of GPUs can’t be denied. Hybrids took the top two spots and four out of the top five places. The student teams were able to either find GPU-enabled codes for the scientific workloads or convert existing code to take advantage of them. That’s what made the difference this year. More later… meds now. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.