Matches in Nanopublications for { ?s <http://schema.org/description> ?o ?g. }
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 3946 description "" assertion.
- 707 description "" assertion.
- 707 description "" assertion.
- 3382037 description "An approach to reproducibility problems related to porting software across machines and compilers." assertion.
- 3382037 description "An approach to reproducibility problems related to porting software across machines and compilers." assertion.
- 3491418.3530773 description "ABSTRACT The Slingshot interconnect designed by HPE/Cray is becoming more relevant in High-Performance Computing with its deployment on the upcoming exascale systems. In particular, it is the interconnect empowering the first exascale and highest-ranked supercomputer in the world, Frontier. It offers various features such as adaptive routing, congestion control, and isolated workloads. The deployment of newer interconnects raises questions about performance, scalability, and any potential bottlenecks as they are a critical element contributing to the scalability across nodes on these systems. In this paper, we will delve into the challenges the slingshot interconnect poses with current state-of-the-art MPI libraries. In particular, we look at the scalability performance when using slingshot across nodes. We present a comprehensive evaluation using various MPI and communication libraries including Cray MPICH, OpenMPI + UCX, RCCL, and MVAPICH2-GDR on GPUs on the Spock system, an early access cluster deployed with Slingshot and AMD MI100 GPUs, to emulate the Frontier system." assertion.
- 3491418.3530773 description "ABSTRACT The Slingshot interconnect designed by HPE/Cray is becoming more relevant in High-Performance Computing with its deployment on the upcoming exascale systems. In particular, it is the interconnect empowering the first exascale and highest-ranked supercomputer in the world, Frontier. It offers various features such as adaptive routing, congestion control, and isolated workloads. The deployment of newer interconnects raises questions about performance, scalability, and any potential bottlenecks as they are a critical element contributing to the scalability across nodes on these systems. In this paper, we will delve into the challenges the slingshot interconnect poses with current state-of-the-art MPI libraries. In particular, we look at the scalability performance when using slingshot across nodes. We present a comprehensive evaluation using various MPI and communication libraries including Cray MPICH, OpenMPI + UCX, RCCL, and MVAPICH2-GDR on GPUs on the Spock system, an early access cluster deployed with Slingshot and AMD MI100 GPUs, to emulate the Frontier system." assertion.
- 364-CHEP23_Paper_ApptainerWithoutSuid.pdf description "Abstract. Apptainer (formerly known as Singularity) since its beginning implemented many of its container features with the assistance of a setuid- root program. It still supports that mode, but as of version 1.1.0 it no longer uses setuid by default. This is feasible because it now can mount squashfs filesystems, ext3 filesystems, and overlay filesystems using unprivileged user namespaces and FUSE. It also now enables unprivileged users to build containers, even without requiring system administrators to configure /etc/subuid and /etc/subgid unlike other “rootless” container systems. As a result, all the unprivileged functions can be used nested inside of another container, even if the container runtime prevents any elevated privileges. As of version 1.2.0 Apptainer also supports completely unprivileged encryption of Singularity Image Format (SIF) container files. Performance with a particularly challenging HEP benchmark using the FUSE-based mounts both with and without encryption is essentially identical to the previous methods that required elevated privileges to use the Linux kernel-based counterparts." assertion.
- 364-CHEP23_Paper_ApptainerWithoutSuid.pdf description "Abstract. Apptainer (formerly known as Singularity) since its beginning implemented many of its container features with the assistance of a setuid- root program. It still supports that mode, but as of version 1.1.0 it no longer uses setuid by default. This is feasible because it now can mount squashfs filesystems, ext3 filesystems, and overlay filesystems using unprivileged user namespaces and FUSE. It also now enables unprivileged users to build containers, even without requiring system administrators to configure /etc/subuid and /etc/subgid unlike other “rootless” container systems. As a result, all the unprivileged functions can be used nested inside of another container, even if the container runtime prevents any elevated privileges. As of version 1.2.0 Apptainer also supports completely unprivileged encryption of Singularity Image Format (SIF) container files. Performance with a particularly challenging HEP benchmark using the FUSE-based mounts both with and without encryption is essentially identical to the previous methods that required elevated privileges to use the Linux kernel-based counterparts." assertion.
- 8950983 description "Abstract: Linux Containers with the build-once run-anywhere principle have gained huge attention in the research community where portability and reproducibility are key concerns. Unlike virtual machines (VMs), containers run the underlying host OS kernel. The container filesystem can include all necessary non-default prerequisites to run the container application at unaltered performance. For this reason, containers are popular in HPC for use with parallel/MPI applications. Some use cases include also abstraction layers, e.g. MPI applications require matching of MPI version between the host and the container, and/or GPU applications require the underlying GPU drivers to be installed within the container filesystem. In short, containers can only abstract what is above the OS kernel, not below. Consequently, portability is not completely granted. This paper presents the experience of PRACE (Partnership for Advanced Computer in Europe) in supporting Singularity containers on HPC clusters and provides notes about possible approaches for deploying MPI applications using different use cases. Performance comparison between bare metal and container executions are also provided, showing a negligible overhead in the container execution." assertion.
- 8950983 description "Abstract: Linux Containers with the build-once run-anywhere principle have gained huge attention in the research community where portability and reproducibility are key concerns. Unlike virtual machines (VMs), containers run the underlying host OS kernel. The container filesystem can include all necessary non-default prerequisites to run the container application at unaltered performance. For this reason, containers are popular in HPC for use with parallel/MPI applications. Some use cases include also abstraction layers, e.g. MPI applications require matching of MPI version between the host and the container, and/or GPU applications require the underlying GPU drivers to be installed within the container filesystem. In short, containers can only abstract what is above the OS kernel, not below. Consequently, portability is not completely granted. This paper presents the experience of PRACE (Partnership for Advanced Computer in Europe) in supporting Singularity containers on HPC clusters and provides notes about possible approaches for deploying MPI applications using different use cases. Performance comparison between bare metal and container executions are also provided, showing a negligible overhead in the container execution." assertion.
- 18d3e6d6-e559-4e43-b464-55275bd14708 description "The modern form of containers, as popularly known through platforms like Docker, Singularity (Apptainer), Podman or Charliecloud, to cite only a few, began to take shape over a decade ago. However, the fundamentals behind containerization and actual benefits of containers in scientific computing remain largely unclear to a vast majority of users. In fact, there is a significant gap between simplistic “Hello world” examples found online and real scientific applications. Rumors suggest that achieving satisfactory performance on supercomputers across multiple nodes is impossible. This paper describes how to leverage the full potential of high-speed networks for inter-node communications with UCX on Fram and Betzy (from the Norwegian national e-infrastructure). It is then explained how to achieve near-native performance on Lumi (EuroHPC's flagship) despite its OFI "Slingshot-11" interconnect and proprietary library. Results obtained in the standard OSU Micro-benchmarks tests for latency and bandwidth and with a fully-fledged climate model show that containerized applications work just as well as "bare-metal", are portable and provide bit-for-bit reproducibility on different platforms. Containers are therefore highly recommended to minimize deployment and porting issues \emph{i)} for AaaS (Applications as a Service) coming with all the necessary software environment (rather than source code only); and \emph{ii)} so that HPC users do not have to rely on anybody to install what they need and can be operational within minutes whilst still getting top performance." assertion.
- 18d3e6d6-e559-4e43-b464-55275bd14708 description "The modern form of containers, as popularly known through platforms like Docker, Singularity (Apptainer), Podman or Charliecloud, to cite only a few, began to take shape over a decade ago. However, the fundamentals behind containerization and actual benefits of containers in scientific computing remain largely unclear to a vast majority of users. In fact, there is a significant gap between simplistic “Hello world” examples found online and real scientific applications. Rumors suggest that achieving satisfactory performance on supercomputers across multiple nodes is impossible. This paper describes how to leverage the full potential of high-speed networks for inter-node communications with UCX on Fram and Betzy (from the Norwegian national e-infrastructure). It is then explained how to achieve near-native performance on Lumi (EuroHPC's flagship) despite its OFI "Slingshot-11" interconnect and proprietary library. Results obtained in the standard OSU Micro-benchmarks tests for latency and bandwidth and with a fully-fledged climate model show that containerized applications work just as well as "bare-metal", are portable and provide bit-for-bit reproducibility on different platforms. Containers are therefore highly recommended to minimize deployment and porting issues \emph{i)} for AaaS (Applications as a Service) coming with all the necessary software environment (rather than source code only); and \emph{ii)} so that HPC users do not have to rely on anybody to install what they need and can be operational within minutes whilst still getting top performance." assertion.
- 2a331f93-aaee-4f14-9bf3-c948f17984cc description "SLURM job scripts to submit jobs on HPCs." assertion.
- 2a331f93-aaee-4f14-9bf3-c948f17984cc description "SLURM job scripts to submit jobs on HPCs." assertion.
- 4c848863-603c-4770-b1bf-6e114989e353 description "Container definition files for singularity/Apptainer." assertion.
- 4c848863-603c-4770-b1bf-6e114989e353 description "Container definition files for singularity/Apptainer." assertion.
- 729a11e7-acf6-4077-a795-5e0aeddb0cc3 description "Folder containing links to scientific papers and other articles used in the study." assertion.
- 729a11e7-acf6-4077-a795-5e0aeddb0cc3 description "Folder containing links to scientific papers and other articles used in the study." assertion.
- 7af73f42-db2d-4e99-aa71-724a6a24571e description "Source code for various tools used in this work" assertion.
- 7af73f42-db2d-4e99-aa71-724a6a24571e description "Source code for various tools used in this work" assertion.
- 99a2489a-1e9b-4dd3-b5d4-9c980646e3ff description "This folder contains output results." assertion.
- 99a2489a-1e9b-4dd3-b5d4-9c980646e3ff description "This folder contains output results." assertion.
- b23734da-8819-4c44-acf3-4fbb1fdfd153 description "Singularity image files to ensure reproducibility." assertion.
- b23734da-8819-4c44-acf3-4fbb1fdfd153 description "Singularity image files to ensure reproducibility." assertion.
- 19c117d8-f89a-45f1-b806-1fff50ecb341 description "Slurm script to submit the OSU latency and get bandwidth tests with 2 CPUs on different nodes on Lumi using an OpenSUSE/Leap:15.3 container with MPIch4.1.2 and the OFI libraries from the host" assertion.
- 19c117d8-f89a-45f1-b806-1fff50ecb341 description "Slurm script to submit the OSU latency and get bandwidth tests with 2 CPUs on different nodes on Lumi using an OpenSUSE/Leap:15.3 container with MPIch4.1.2 and the OFI libraries from the host" assertion.
- 1eb356c5-3da5-4cdf-9741-fba770dcfcb8 description "This is a definition file to illustrate the use of an OpenSUSE/Leap:15.3 container with MPIch4.1.2 and support for UCX1.15.0 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- 1eb356c5-3da5-4cdf-9741-fba770dcfcb8 description "This is a definition file to illustrate the use of an OpenSUSE/Leap:15.3 container with MPIch4.1.2 and support for UCX1.15.0 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- 2e6ebb01-29ee-4f4f-a04e-56f83a599457 description "OSU Micro-Benchmarks 7.3 (10/30/23)" assertion.
- 2e6ebb01-29ee-4f4f-a04e-56f83a599457 description "OSU Micro-Benchmarks 7.3 (10/30/23)" assertion.
- 3bdd74d8-8a9e-4e98-ba93-4706c0043767 description "OpenSUSE/Leap:15.3 container with MPIch4.1.2 and support for UCX1.15.0 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- 3bdd74d8-8a9e-4e98-ba93-4706c0043767 description "OpenSUSE/Leap:15.3 container with MPIch4.1.2 and support for UCX1.15.0 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- 6065fe78-4974-49bb-a6a2-4794b0298591 description "Slurm script to submit the OSU latency and get bandwidth tests with 2 CPUs on one node on Fram with the simple container" assertion.
- 6065fe78-4974-49bb-a6a2-4794b0298591 description "Slurm script to submit the OSU latency and get bandwidth tests with 2 CPUs on one node on Fram with the simple container" assertion.
- 657d591a-4b33-4376-aec9-b77704073916 description "Container with all the necessary packages to run CESM2.3 with the OFI-swap method" assertion.
- 657d591a-4b33-4376-aec9-b77704073916 description "Container with all the necessary packages to run CESM2.3 with the OFI-swap method" assertion.
- 75d28143-2135-440a-a508-c69f12d95a30 description "Slurm script to submit the OSU latency and get bandwidth tests with 2 CPUs on different nodes on Lumi using an OpenSUSE/Leap:15.3 container with MPIch4.1.2 and the OFI libraries from the host" assertion.
- 75d28143-2135-440a-a508-c69f12d95a30 description "Slurm script to submit the OSU latency and get bandwidth tests with 2 CPUs on different nodes on Lumi using an OpenSUSE/Leap:15.3 container with MPIch4.1.2 and the OFI libraries from the host" assertion.
- 90b63535-65b3-4995-853a-ab66503a35ae description "OpenSUSE/Leap:15.3 container with MPIch4.1.2 and a "dummy" LibFabric1.14.0 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- 90b63535-65b3-4995-853a-ab66503a35ae description "OpenSUSE/Leap:15.3 container with MPIch4.1.2 and a "dummy" LibFabric1.14.0 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- 9bab6133-709a-49e5-b65e-7139f18b83c1 description "Singularity Image file for a simple Ubuntu:22.04 container with MPIch4.1.2 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- 9bab6133-709a-49e5-b65e-7139f18b83c1 description "Singularity Image file for a simple Ubuntu:22.04 container with MPIch4.1.2 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- a1a3a1f8-9aa6-448e-8850-0319a40714a9 description "Slurm script to submit the a job on Lumi using the OpenSUSE/Leap:15.3 container with MPIch4.1.2 (like to prepare or run an ESM) and swapping the OFI for that on the host at runtime" assertion.
- a1a3a1f8-9aa6-448e-8850-0319a40714a9 description "Slurm script to submit the a job on Lumi using the OpenSUSE/Leap:15.3 container with MPIch4.1.2 (like to prepare or run an ESM) and swapping the OFI for that on the host at runtime" assertion.
- b017e3bf-41c0-475e-b7cb-36a46365c3f0 description "This is a definition file to illustrate the use of an OpenSUSE/Leap:15.3 container with MPIch4.1.2 and support for UCX1.15.0 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- b017e3bf-41c0-475e-b7cb-36a46365c3f0 description "This is a definition file to illustrate the use of an OpenSUSE/Leap:15.3 container with MPIch4.1.2 and support for UCX1.15.0 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- b7d5827c-4355-4238-ad95-e290abaaeedc description "This is a definition file to illustrate the use of an OpenSUSE/Leap:15.3 container with MPIch4.1.2 and a "dummy" LibFabric1.14.0 to run CESM2.3 version alpha 17" assertion.
- b7d5827c-4355-4238-ad95-e290abaaeedc description "This is a definition file to illustrate the use of an OpenSUSE/Leap:15.3 container with MPIch4.1.2 and a "dummy" LibFabric1.14.0 to run CESM2.3 version alpha 17" assertion.
- b936509e-4dbc-47c1-bd80-079472aa4f70 description "This is a definition file to illustrate the use of a simple Ubuntu:22.04 container with MPIch4.1.2 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- b936509e-4dbc-47c1-bd80-079472aa4f70 description "This is a definition file to illustrate the use of a simple Ubuntu:22.04 container with MPIch4.1.2 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- d54fca0c-130d-4615-8369-e8fe25c72bad description "This is a definition file to illustrate the use of an OpenSUSE/Leap:15.3 container with MPIch4.1.2 and a "dummy" LibFabric1.14.0 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- d54fca0c-130d-4615-8369-e8fe25c72bad description "This is a definition file to illustrate the use of an OpenSUSE/Leap:15.3 container with MPIch4.1.2 and a "dummy" LibFabric1.14.0 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- f3125bda-90a3-47e9-98c1-c6a8169d71a6 description "Community Earth System Model version 2.3 Alpha 17" assertion.
- f3125bda-90a3-47e9-98c1-c6a8169d71a6 description "Community Earth System Model version 2.3 Alpha 17" assertion.
- f5381fbc-627d-4ce3-8aaa-ff727850ec93 description "OpenSUSE/Leap:15.3 container with MPIch4.1.2 and a "dummy" LibFabric1.14.0 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- f5381fbc-627d-4ce3-8aaa-ff727850ec93 description "OpenSUSE/Leap:15.3 container with MPIch4.1.2 and a "dummy" LibFabric1.14.0 to run the OSU Micro-benchmarks tests version 7.3" assertion.
- fe49c3cd-6077-4f11-be47-7b0b946c0069 description "Slurm script to submit the OSU latency and get bandwidth tests with 2 CPUs on different nodes on Fram with the simple container" assertion.