Feeds

The stage is set: Prepare for Hamburg cluster carnage

Sprints, mystery apps and less amps in student contest

Internet Security Threat Report 2014

ISC 2012 Now that China has settled on its two entrants to the ISC’12 Student Cluster Challenge (I’m dubbing it iSCC for short), it’s time to get a feel for the number-cruncher design competition and what the entrants will face.

Airbus is the big-name sponsor of the iSCC this year and has played a vital role in getting this fledgling competition off the ground – so to speak. (As a gesture of gratitude, I’ll be flying in an Airbus-manufactured plane to Hamburg this year. I really hope the back-of-the-seat power works – it’s a damned long flight.)

We now have two large HPC organisations - the SC and the aforementioned ISC - running separate competitions in which university teams build and benchmark clusters of their own design against their peers' computers. The two contests are similar in that the teams get their hardware from vendor sponsors, they all have to run HPL and submit a LINPACK score on the first day, and they receive awards for both the highest LINPACK and the highest overall performance on the assorted benchmarks.

Teams can’t go nuts and add hardware willy-nilly: there are hard caps on power consumption. The SC competition (or SCC) has a ceiling of 26 amps, but the iSSC allows only half as much – 13 amps. Energy-efficient designs are key in both competitions, but students participating in the iSSC will have much less room in which to wriggle when it comes to power. Plus you have to run what you’ve got; you can’t swap out hardware mid-stream.

Both competitions ask students to run the HPC Challenge benchmark on the first day, and both give an award for the highest LINPACK score. At SC10 in New Orleans, three teams broke through the teraflop barrier. The bout in Seattle a year later saw six of the eight teams beat the 1.0 teraflop mark; Team Russia topped all competitors with their 1.926 teraflop score. It’ll be interesting to see what the iSCC teams can do in June. They’ll probably have better hardware, but only half the power budget to work with.

Sprint versus marathon

One of the biggest differences between the SCC and iSCC is the timeframe in which hopefuls compete. The SCC is a 46-hour non-stop marathon that begins when the students get their data sets on Monday evening and ends when they turn in their final results on Wednesday afternoon.

In the iSCC, students will have a limited amount of time to complete their runs and submit their results. On Monday, they have from 3pm to 8.30pm to run HPCC and a separate LINPACK, submitting their scores at the end of the evening. The winner of the highest LINPACK award will be announced that evening.

Tuesday and Wednesday are devoted to application runs. They’re required to run six applications including:

  • OpenFOAM – computational fluid dynamics
  • CP2K – atomistic and molecular simulation
  • CPMD – molecular dynamics
  • NEMO – oceanographic research modeling

Sharp-eyed readers may notice that there are only four apps on the above list. That’s because each day the students are going to be confronted with a "surprise application" that they’ll have to complete along with the other applications.

In the real world, we don’t know exactly what we’ll be doing from day to day, so why should the iSCC be any different? This will add a bit more pressure on the teams as they struggle to fit the mystery app into their already busy system schedule.

At the end of the competition, team scores for LINPACK, application runs, and an interview with iSCC officials will be compiled and an overall winning team announced. There is also a "fan favourite" award for the team that captures the hearts of ISC attendees during the event.

We’ll preview the teams in upcoming articles so that you armchair cluster types can get a feel for the field and start to fill in your office betting pool brackets. ®

Internet Security Threat Report 2014

More from The Register

next story
Docker's app containers are coming to Windows Server, says Microsoft
MS chases app deployment speeds already enjoyed by Linux devs
IBM storage revenues sink: 'We are disappointed,' says CEO
Time to put the storage biz up for sale?
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
SDI wars: WTF is software defined infrastructure?
This time we play for ALL the marbles
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
Oracle hires former SAP exec for cloudy push
'We know Larry said cloud was gibberish, and insane, and idiotic, but...'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.