SlideShare a Scribd company logo
1 of 10
Download to read offline
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
An Easy Path to Exascale
Scott Pakin
Applied Computer Science Group
Los Alamos National Laboratory
25 April 2012
Slide 1
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
Disclaimer
 The opinions expressed herein definitely do not reflect the positions of
Los Alamos National Laboratory, the National Nuclear Security
Administration, or the United States Department of Energy
Slide 2
 Please don’t cut off my funding
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
Background
 Many of us have been to lots of
exascale meetings
 If these meetings forbade the
use of the words
• energy
• resilience
• programmability
• co-design
 the meetings would be a lot
shorter
Slide 3
 (but perhaps more fun)
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
Exascale Refrains
 We don’t know how to reduce
system power
 We don’t have a good way to
tolerate frequent faults
 As component heterogeneity
increases, programmability
decreases
Slide 4
Exascale is
hard!
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
Solution
 How can we deal with all of the
problems of exascale?
Slide 5
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
My Proposal
Slide 6
 What if instead of building an exascale system, we gave each of 1000
researchers his/her own, private, petascale system?
exascale
petascale
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
My Proposal
 Power problem solved
 Resiliency problem solved
 Programmability problem solved
 Increased productivity
 Lower cost
Slide 7
 What if instead of building an exascale system, we gave each of 1000
researchers his/her own, private, petascale system?
 Different locations → distribute
load across the power grid
 Fewer components → faults
occur less frequently
 Less complex hardware → can
stick with MPI+X (where X=∅)
 Dedicated systems → no long
queues waiting for job to start
 More aligned with vendor
roadmaps → no cajoling needed
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
What About Applications that Require Exascale?
 Approaching a singularity where we don’t have any applications
 (except perhaps LINPACK)
Slide 8
Numberofsuitableapps.
Sequential
Small
SMP
Large
NUMA
Distributed
memory
Heterogeneous
architecture
Exascale
(power, resiliency)
Zettascale
(quantum
decoherence?)
Yottascale
(inter-D-brane
interactions on
11-dimensional
M-theoretic
superstrings?)
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
We May be Facing a Petascale Performance Asymptote
 Parallelism
• By Amdahl’s Law, if your application is less than 99.9% parallelized, you’ll see at
best only petascale performance on an exascale system
 Resilience
• Performing the same work three times gives you 1/3 of the remaining performance
 Power
• To stay within the power budget, some components may have to be turned off or
downclocked, lowering performance even further
1E+0
1E+2
1E+4
1E+6
1E+8
1E+10
1E+12
1E+14
1E+16
1E+3 1E+6 1E+9 1E+12 1E+15 1E+18 1E+21 1E+24
Theoretical peak performance
Application
performance
Mega Giga Tera Peta Exa Zetta Yotta
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA
U N C L A S S I F I E D
Summary
 Exascale computing poses numerous challenges
• Energy, resilience, programmability
 Relatively few applications both require exascale and can be
programmed to exploit complex exascale hardware
 Many applications can take advantage of petascale
• Limited by access to machines
• (Long queue if you want the machine for yourself)
 Proposition: Buy 1000 research teams their own petascale computer
• Increases scientists’ productivity
• Why put ourselves through the pain of an exascale before its time?
• I’ll wait until I can borrow an exascale cell phone from my grandkids
 It’s not like there isn’t still exciting research to be done at petascale
Slide 10

More Related Content

Similar to An Easy Path to Exascale

Cool Supercomputing: Keepin' it Real
Cool Supercomputing: Keepin' it RealCool Supercomputing: Keepin' it Real
Cool Supercomputing: Keepin' it RealScott Pakin
 
Is Exascale the End of the Line for Commodity Networks?
Is Exascale the End of the Line for Commodity Networks?Is Exascale the End of the Line for Commodity Networks?
Is Exascale the End of the Line for Commodity Networks?Scott Pakin
 
LEAST-COST-&-RISK LIFECYCLE DELIVERED ENERGY SERVICES
LEAST-COST-&-RISK LIFECYCLE DELIVERED ENERGY SERVICESLEAST-COST-&-RISK LIFECYCLE DELIVERED ENERGY SERVICES
LEAST-COST-&-RISK LIFECYCLE DELIVERED ENERGY SERVICESMichael P Totten
 
Comparing Individual Reliability to Population Reliability for Aging Systems
Comparing Individual Reliability to Population Reliability for Aging SystemsComparing Individual Reliability to Population Reliability for Aging Systems
Comparing Individual Reliability to Population Reliability for Aging SystemsASQ Reliability Division
 
fault tree analysis
fault tree analysisfault tree analysis
fault tree analysisSiti Mastura
 
The Incorporation of Machine Learning into Scientific Simulations at Lawrence...
The Incorporation of Machine Learning into Scientific Simulations at Lawrence...The Incorporation of Machine Learning into Scientific Simulations at Lawrence...
The Incorporation of Machine Learning into Scientific Simulations at Lawrence...inside-BigData.com
 
Scholarly Communications at a National Research Lab: Approaches to Research a...
Scholarly Communications at a National Research Lab: Approaches to Research a...Scholarly Communications at a National Research Lab: Approaches to Research a...
Scholarly Communications at a National Research Lab: Approaches to Research a...Dee Magnoni
 
Allinea DDT Resolves an Unsolved Mystery at Argonne National Laboratory
Allinea DDT Resolves an Unsolved Mystery at Argonne National LaboratoryAllinea DDT Resolves an Unsolved Mystery at Argonne National Laboratory
Allinea DDT Resolves an Unsolved Mystery at Argonne National LaboratoryAllineaSoftware
 
SS15_PresentationFinal
SS15_PresentationFinalSS15_PresentationFinal
SS15_PresentationFinalJohn Determan
 
Lightning talk: highly scalable databases and the PACELC theorem
Lightning talk: highly scalable databases and the PACELC theoremLightning talk: highly scalable databases and the PACELC theorem
Lightning talk: highly scalable databases and the PACELC theoremVishal Bardoloi
 
Without Resilience, Nothing Else Matters
Without Resilience, Nothing Else MattersWithout Resilience, Nothing Else Matters
Without Resilience, Nothing Else MattersJonas Bonér
 
Protecting Software: Agencies Respond
Protecting Software: Agencies RespondProtecting Software: Agencies Respond
Protecting Software: Agencies Respondasauers
 
Enterprise 2.0 and the Context of Work | Carmen Medina, TUG 2009 Keynote
Enterprise 2.0 and the Context of Work | Carmen Medina, TUG 2009 KeynoteEnterprise 2.0 and the Context of Work | Carmen Medina, TUG 2009 Keynote
Enterprise 2.0 and the Context of Work | Carmen Medina, TUG 2009 KeynoteTraction Software
 
Hands-On Lab: Learn How to Harness CA Application Performance Management Di...
Hands-On Lab: Learn How to Harness CA Application Performance Management  Di...Hands-On Lab: Learn How to Harness CA Application Performance Management  Di...
Hands-On Lab: Learn How to Harness CA Application Performance Management Di...CA Technologies
 
digit_twin.pptx
digit_twin.pptxdigit_twin.pptx
digit_twin.pptxajithakn1
 

Similar to An Easy Path to Exascale (19)

Cool Supercomputing: Keepin' it Real
Cool Supercomputing: Keepin' it RealCool Supercomputing: Keepin' it Real
Cool Supercomputing: Keepin' it Real
 
Is Exascale the End of the Line for Commodity Networks?
Is Exascale the End of the Line for Commodity Networks?Is Exascale the End of the Line for Commodity Networks?
Is Exascale the End of the Line for Commodity Networks?
 
LEAST-COST-&-RISK LIFECYCLE DELIVERED ENERGY SERVICES
LEAST-COST-&-RISK LIFECYCLE DELIVERED ENERGY SERVICESLEAST-COST-&-RISK LIFECYCLE DELIVERED ENERGY SERVICES
LEAST-COST-&-RISK LIFECYCLE DELIVERED ENERGY SERVICES
 
Comparing Individual Reliability to Population Reliability for Aging Systems
Comparing Individual Reliability to Population Reliability for Aging SystemsComparing Individual Reliability to Population Reliability for Aging Systems
Comparing Individual Reliability to Population Reliability for Aging Systems
 
fault tree analysis
fault tree analysisfault tree analysis
fault tree analysis
 
Intelgrids H4D Stanford 2018
Intelgrids H4D Stanford 2018Intelgrids H4D Stanford 2018
Intelgrids H4D Stanford 2018
 
The Incorporation of Machine Learning into Scientific Simulations at Lawrence...
The Incorporation of Machine Learning into Scientific Simulations at Lawrence...The Incorporation of Machine Learning into Scientific Simulations at Lawrence...
The Incorporation of Machine Learning into Scientific Simulations at Lawrence...
 
HCFP Customer reference
HCFP  Customer referenceHCFP  Customer reference
HCFP Customer reference
 
Scholarly Communications at a National Research Lab: Approaches to Research a...
Scholarly Communications at a National Research Lab: Approaches to Research a...Scholarly Communications at a National Research Lab: Approaches to Research a...
Scholarly Communications at a National Research Lab: Approaches to Research a...
 
21104091117.pdf
21104091117.pdf21104091117.pdf
21104091117.pdf
 
Allinea DDT Resolves an Unsolved Mystery at Argonne National Laboratory
Allinea DDT Resolves an Unsolved Mystery at Argonne National LaboratoryAllinea DDT Resolves an Unsolved Mystery at Argonne National Laboratory
Allinea DDT Resolves an Unsolved Mystery at Argonne National Laboratory
 
SS15_PresentationFinal
SS15_PresentationFinalSS15_PresentationFinal
SS15_PresentationFinal
 
Lightning talk: highly scalable databases and the PACELC theorem
Lightning talk: highly scalable databases and the PACELC theoremLightning talk: highly scalable databases and the PACELC theorem
Lightning talk: highly scalable databases and the PACELC theorem
 
Correale q4 2008_rtp
Correale q4 2008_rtpCorreale q4 2008_rtp
Correale q4 2008_rtp
 
Without Resilience, Nothing Else Matters
Without Resilience, Nothing Else MattersWithout Resilience, Nothing Else Matters
Without Resilience, Nothing Else Matters
 
Protecting Software: Agencies Respond
Protecting Software: Agencies RespondProtecting Software: Agencies Respond
Protecting Software: Agencies Respond
 
Enterprise 2.0 and the Context of Work | Carmen Medina, TUG 2009 Keynote
Enterprise 2.0 and the Context of Work | Carmen Medina, TUG 2009 KeynoteEnterprise 2.0 and the Context of Work | Carmen Medina, TUG 2009 Keynote
Enterprise 2.0 and the Context of Work | Carmen Medina, TUG 2009 Keynote
 
Hands-On Lab: Learn How to Harness CA Application Performance Management Di...
Hands-On Lab: Learn How to Harness CA Application Performance Management  Di...Hands-On Lab: Learn How to Harness CA Application Performance Management  Di...
Hands-On Lab: Learn How to Harness CA Application Performance Management Di...
 
digit_twin.pptx
digit_twin.pptxdigit_twin.pptx
digit_twin.pptx
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

An Easy Path to Exascale

  • 1. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D An Easy Path to Exascale Scott Pakin Applied Computer Science Group Los Alamos National Laboratory 25 April 2012 Slide 1
  • 2. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Disclaimer  The opinions expressed herein definitely do not reflect the positions of Los Alamos National Laboratory, the National Nuclear Security Administration, or the United States Department of Energy Slide 2  Please don’t cut off my funding
  • 3. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Background  Many of us have been to lots of exascale meetings  If these meetings forbade the use of the words • energy • resilience • programmability • co-design  the meetings would be a lot shorter Slide 3  (but perhaps more fun)
  • 4. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Exascale Refrains  We don’t know how to reduce system power  We don’t have a good way to tolerate frequent faults  As component heterogeneity increases, programmability decreases Slide 4 Exascale is hard!
  • 5. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Solution  How can we deal with all of the problems of exascale? Slide 5
  • 6. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D My Proposal Slide 6  What if instead of building an exascale system, we gave each of 1000 researchers his/her own, private, petascale system? exascale petascale
  • 7. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D My Proposal  Power problem solved  Resiliency problem solved  Programmability problem solved  Increased productivity  Lower cost Slide 7  What if instead of building an exascale system, we gave each of 1000 researchers his/her own, private, petascale system?  Different locations → distribute load across the power grid  Fewer components → faults occur less frequently  Less complex hardware → can stick with MPI+X (where X=∅)  Dedicated systems → no long queues waiting for job to start  More aligned with vendor roadmaps → no cajoling needed
  • 8. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D What About Applications that Require Exascale?  Approaching a singularity where we don’t have any applications  (except perhaps LINPACK) Slide 8 Numberofsuitableapps. Sequential Small SMP Large NUMA Distributed memory Heterogeneous architecture Exascale (power, resiliency) Zettascale (quantum decoherence?) Yottascale (inter-D-brane interactions on 11-dimensional M-theoretic superstrings?)
  • 9. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D We May be Facing a Petascale Performance Asymptote  Parallelism • By Amdahl’s Law, if your application is less than 99.9% parallelized, you’ll see at best only petascale performance on an exascale system  Resilience • Performing the same work three times gives you 1/3 of the remaining performance  Power • To stay within the power budget, some components may have to be turned off or downclocked, lowering performance even further 1E+0 1E+2 1E+4 1E+6 1E+8 1E+10 1E+12 1E+14 1E+16 1E+3 1E+6 1E+9 1E+12 1E+15 1E+18 1E+21 1E+24 Theoretical peak performance Application performance Mega Giga Tera Peta Exa Zetta Yotta
  • 10. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Summary  Exascale computing poses numerous challenges • Energy, resilience, programmability  Relatively few applications both require exascale and can be programmed to exploit complex exascale hardware  Many applications can take advantage of petascale • Limited by access to machines • (Long queue if you want the machine for yourself)  Proposition: Buy 1000 research teams their own petascale computer • Increases scientists’ productivity • Why put ourselves through the pain of an exascale before its time? • I’ll wait until I can borrow an exascale cell phone from my grandkids  It’s not like there isn’t still exciting research to be done at petascale Slide 10