2019 31st International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD) 2019
DOI: 10.1109/sbac-pad.2019.00025
|View full text |Cite
|
Sign up to set email alerts
|

Detecting I/O Access Patterns of HPC Workloads at Runtime

Abstract: In this paper, we seek to guide optimization and tuning strategies by identifying the application's I/O access pattern. We evaluate three machine learning techniques to automatically detect the I/O access pattern of HPC applications at runtime: decision trees, random forests, and neural networks. We focus on the detection using metrics from file-level accesses as seen by the clients, I/O nodes, and parallel file system servers. We evaluated these detection strategies in a case study in which the accurate detec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 22 publications
0
4
0
1
Order By: Relevance
“…Specifically to our case study, we classified the access pattern regarding the operation (read or write), spatiality (contiguous or 1D-strided), number of accessed files, and request size aspects, since our extensive performance evaluation of TWINS showed these to uniquely identify the different behaviors. The classification of the spatiality uses a neural network described in our previous work [17].…”
Section: B Access Pattern Detectionmentioning
confidence: 99%
“…Specifically to our case study, we classified the access pattern regarding the operation (read or write), spatiality (contiguous or 1D-strided), number of accessed files, and request size aspects, since our extensive performance evaluation of TWINS showed these to uniquely identify the different behaviors. The classification of the spatiality uses a neural network described in our previous work [17].…”
Section: B Access Pattern Detectionmentioning
confidence: 99%
“…The main advantages of FTIO in this comparison basically stream from the unique properties of DFT. Compared to popular machine learning (ML) approaches from the time domain, like neuronal networks (NN) [43] and LSTMs [44], [45], decision trees and other supervised methods [46], or a combination of supervised and unsupervised techniques [20], FTIO, and in particular DFT, does not require a learning phase. Additionally, FTIO does not require past system logs, different from recent regressionbased approaches [47] and other strategies [20], [44]- [48], Moreover, compared to approaches that predict future I/O activity, such as ARIMA [41], DFT does not require defining several thresholds and parameter estimations.…”
Section: Related Workmentioning
confidence: 99%
“…More general characterization efforts usually focus on aspects such as spatiality and request size [49], [50], using information from MPI-IO [51]- [53], ML-based methods [43], etc. In contrast, FTIO focuses on the temporal behavior (specifically on the periodicity), and hence is also complementary to those.…”
Section: Related Workmentioning
confidence: 99%
“…Desta forma, evitamos sobrecarregar ainda mais o sistema, que já é muito concorrido pelas aplicac ¸ões que estão executando. Adaptamos o modelo de rede neural implementado por Bez et al [Bez et al 2019], a fim de possibilitar o treinamento em dispositivos Tensor Processing Unit (TPU) em Nuvem no Google Cloud Platform.…”
Section: Introduc ¸ãO E Motivac ¸ãOunclassified