Note section numbers such as 2.1syr refer to text in original document and are hyperlinked to it
2.2Syr) Meta-Challenges: We define a new class of applications called "Meta-Challenges". These are
loosely coupled sets of physically distributed instances of Grand or National
Challenges. A DoD example of a Meta-Challenge is Distributed Interactive
Simulation (DIS). DIS involves the modeling of forces (tanks, aircraft,
satellites), environments, rules of engagement and tactics, etc. Simulation
control and monitoring for red, blue, and white players are provided. A
simulation may need to grow with the addition of "green", "yellow", or neutral
forces, and have to scale form peace-time/peace-keeping through low-intensity-conflict
(LIC), to massive conflict. Requirements for considering chemical, biological,
or nuclear (CBN) environments are needed, for example, modeling operations
in a nuclear environment (OPINE).
2.3Syr) An Example Meta-Challenge: DIS: Java offers a means to enhance the existing DIS multi-user protocol. A
new DIS protocol, Advanced Distributed Simulation (ADS), is an attempt to
introduce scalability. ADS breaks apart the DIS into an active-reactive
part and an interactive-communicating part. Java is consistent with such
an evolutionary approach. Java applets could update models on-the-fly, as
with dynamic weather, battle damage, or threat-responsive counter-countermeasure
techniques. One of the greatest challenges to the DIS designer is finding
ways to interconnect independently built simulations having disparate modeling
granularity (i.e., the ALS protocol, Aggregate Level Simulation), and then
increase the number of models and improve fidelity, but with no-greater
demand on network bandwidth. Weapon system design has also been evolving
from integrating interoperable subsystems to influence management among
ubiquitous supersystems. (An example of the latter would be Information
Warfare (IW). Another is counter-OSINT --open source intelligence). BM/C3
is undergoing changes in definition: BM/C4 (computing), C3I with intelligence,
and IS&R for surveillance and reconnaissance. Also, a fifth-C, C5I is sometimes
added for emphasizing the collaboration among humans of any C3I system.
(The relationship between an Air Traffic Controller, the ATC surveillance,
tracking, processing and display system, and a pilot is another example).
From a user's (Commander's) perspective, Java is extremely attractive for
simulating (or even building) these systems since its roots are in the distributed,
interactive, object-oriented, collaborative user domain. It is rapidly becoming
the language of choice for programming the user-interface of on-line commercial
multimedia systems.
2.4Syr) Java for DIS: Java is intended to be machine independent and offers to challenge the need
for hegemony among systems. For example, the ideal computing architecture
for simulating military battle management including command and control
is multiple instances of "loosely coupled sets of tightly coupled processors."
Such always poses a severe configuration management problem: multiple hardware,
operating system, and programming languages. Interoperability among systems
of systems and the interfacing between "stovepipe" systems is related challenge.
Java could provide an approach for "wrapping" existing or planned systems
with a functionality layer for interoperability while ameliorating the bandwidth
problem by intelligently transmitting only those parts of a message (applet)
that are immediately needed by an application (user).
2.5umd) Remote sensing data fusion: There are many applications that are likely to require the generation of
data products derived from multiple sensor databases. Such databases could
include both static databases (such as databases that archive LANDSAT/AVHRR
images) and databases that are periodically updated (like weather map servers).
A client would direct (High Performance) Java programs to run on the database
servers. These HPJ programs would make use of the servers computational
and data resources to carry out partial processing of data products. Portions
of data processing that required the integration of data from several databases
would be carried out on the client or via a HPJ program running on another
computationally capable machine.
2.6umd) Interventional Epidemiology/ Medical crisis management: We are considering scenarios involving medical emergencies associated with
armed combat, terrorist actions, inadvertent releases of toxic chemicals,
or major industrial plant explosions. In such scenarios, the goal is to
rapidly acquire and analyze medical data as the crisis unfolds in order
to determine how best to allocate scarce medical resources. This scenario
involves the discovery and integration of multiple sources of data that
might be in different geographical locations. We would For instance, one
may need to determine the best diagnosis and treatment for patients exposed
to combinations of chemicals whose effects have not been well characterized.
This class of scenarios is motivated by the recent ARPA-sponsored National
Research Council workshop on crisis management.
This involves discovering and Exploiting Clinical Patterns in Patient Populations.
These scenarios involve study of health records to determine risk factors
associated with morbidity and mortality for specific subpopulations (e.g.
various substrata of armed forces personnel serving in a particular region).
In such scenarios, the goal is to provide high quality, lower cost care
by exploring diverse clinical data sources for patterns and correlations
and by ensuring that significant data for individual patients is not overlooked.
For instance, a system of this type could rapidly track the spread of serious
infectious diseases such as Hepatitis B or HIV. It could also be used to
identify specific soldiers whose demographic profile or past medical history
might place them at particularly high risk of contracting the disease.
The systems software required for these medical scenarios should be very similar to the requirements motivated by the sensor data fusion scenario.
With large volumes of routine data having been collected, many organizations are increasingly turning to the extraction of useful information from such databases. Such high-level inference processes may provide information on patterns from large databases of particular interest to defense analysis.
Data mining is an emerging research area, whose goal is to extract significant
patterns or interesting rules from such large databases. Data mining is
in fact a broad area which combines research in machine learning, statistics
and databases. It can be broadly classified into three main categories:
Classification -- finding rules that partition the database into disjoint
classes; Sequences -- extracting commonly occurring sequences in temporal
data; and Associations -- find the set of most commonly occurring groupings
of items.
At Rochester, we have worked on the problem of mining association rules
in parallel over basket data on both distributed shared-memory multiprocessors
and a network of machines. Basket data usually consists of a record per
customer with a transaction date, along with items bought by the customer.
Many real-world applications can be formulated in such a manner. Our preliminary
experimental results on a SGI Power Challenge shared-memory multiprocessor
machine and a DEC Memory Channel cluster are very encouraging.
The next step is to consider scenarios where the database server is accessible
via the Internet. The machine independent nature of Java makes it ideally
suited to writing both the server and client code. The server could be a
collection of machines, i.e., it could be a single tightly-coupled multi-processor
shared or distributed memory machine, it could be a network of workstations,
or any combination of these with heterogeneous processing elements, and
heterogeneous interconnection network. The client side could be a heterogeneous
collection of machines as well. We need compiler and run-time support to
manage both the client and the server. The compiler should be able to insert
code to exploit the local network configurations on both ends, while the
run-time system monitors dynamic behavior and executes different actions
according to the transient information. We have implemented a client-server
data mining algorithm in Java. The preliminary results will be discussed
in more detail in Section 8.5.
Data mining algorithms tend to have program behaviors quite different from traditional Grand Challenge problems in terms of both data access patterns and control flow. Unlike simple array structures used in scientific code, the data structures used in mining algorithms include hash trees, hash tables, and linked lists. Consider mining for associations: the first step consists of finding all the sets of items (called itemsets), that occur in the database with a certain user-specified frequency (called minimum support). Such itemsets are called large itemsets. An itemset of k items is called a k-itemset. The general structure of algorithms for mining associations are as follows. The initial pass over the database counts the support for all 1-itemsets. The large 1-itemsets are used to generate candidate 2-itemsets. The database is scanned again to obtain occurrence counts for the candidates, and the large 2-itemsets are selected for the next pass. This iterative process is repeated for k = 3,4, ... till there are no more large k-itemsets to be found. Effective parallelization and networked computing require new research in algorithms, compilers and runtime systems.
7.3.1)Limited Synchronization Capabilities of current Java: Following the exact semantics of Fortran-M channels might be a challenge in java because of the limited synchronization features of java.
The current Java compiler takes the hybrid approach of compilation and interpretation. At Rochester, we would like to exploit more options to generate efficient code for High Performance Java applications. We consider three scenarios:
At Rochester, we are implementing compiler infrastructure with multiple front- and back-ends which will uniformly treat all scenarios mentioned above (cf. Section 8.4). We expect to include traditional optimizations like cache optimizations, register allocations etc.
8.1.1syr) Introduction: We consider using Java to also provide low-level runtime support for the
Meta-Challenges and distributed Interactive Simulations (DIS) discussed
above as well as the traditional Grand and National Challenges: coding the
high-performance runtime system in Java (i.e., traditional PCRC-like, including
Parti/Chaos). There are two basic sets of issues that a runtime system designer
must consider for traditional HPC challenges:
8.1.2syr) Features for PCRC Runtime in Java: The Syracuse University Fortran 90D runtime consists of about 300 routines/functions.
We expect that number to reduce to less than 150 in the newer PCRC implementation
by for handling regular computations and communications. We add to this
the estimate about 60 functions from the Maryland CHAOS runtime for handling
the irregular case. At present our Fortran 90D runtime (including its use
of Parti/Chaos) requires only 23 different MPI functions. The same will
hold for the newer PCRC version. We claim the following:
8.1.3syr) Issues for PCRC Runtime in Java: As we re-implement the PCRC runtime system for regular and irregular distributed
arrays, we must address the following design issues:
Threads in Java are supported for concurrency. This is useful as perceived
by a user, when response time is important, e.g. the HotJava browser where
you can scroll a page while down-loading an image. It currently does not
support threads running on separate processors. Our main objective in this
section is to support parallel threads, at no expense to the Java programmer.
We would prefer not to change, modify or limit the language as perceived
by the user.
There seem to be two possible scenarios:
At Rochester, we are particularly interested in implementing a parallel thread package for Java with special compiler support on distributed shared-memory (DSM) machines. On scalable multiprocessors, communication is much more expensive than computation. Many different protocols have been proposed for behavior-driven locality management. None of them work best for all types of data sharing. Performance would be increased if the system could adapt to the program's memory access patterns. An example could be the use of multithreading to alleviate memory latency (especially on remote accesses) aggravated by delays introduced by the memory coherency protocol. We propose to analyze programs at compile time and annotate them with data access summary information. Exploiting this information will require the ability to switch among multiple data coherence protocols at run time.
7.4.1umd)Mobile Programs: The intent is to provide a single unified framework for remote access and
remote execution in the form of itinerant programs. Itinerant programs can
execute on and move between the user's machine, the servers providing the
datasets to be processed or third-party compute servers available on the
network. The motion is not just client-server; it can also be between servers.
Programs move either because the current platform does not have adequate
resources or because the cost of computation on the current platform or
at the current location in the network is too high. Various parts of a single
program can be executed at different locations, depending upon cost and
availability of resources as well as user direction. The architecture would
also provide support for plaza servers. Plaza servers provide facilities
for (1) execution of itinerant programs, (2) storage of intermediate data,
(3) monitoring cost, usage and availability of local and remote resources
on behalf of itinerant programs and alerting them if these quantities cross
user-specified bounds, (4) routing messages to and from itinerant programs,
and (5) value-added access to other servers available on the network. Examples
of value-added functionality include conversions to and from standard formats
and operations on data in its native format. In addition to allowing cost
and performance optimization, itinerant programs and plaza servers also
provide a flexible framework for extending the interface of servers, in
particular legacy servers with large volumes of data as well as servers
that are not under the control of the user.
7.4.2umd) Coupling sequential Java Programs: MPI should be bound to Java so that Java programs can communicate by message
passing. We believe that applications will require an ability to process
periodically generated data. Programming to carry this out could be written
in MPI, however, a higher level library might prove to be useful.
Consider long-running itinerant programs that process periodically generated data; each program processes sequences of data from multiple sources with possibly different periodicity. An itinerant program can either visit each of the data sources in order or it can install a surrogate at each data source, which is activated every time the dataset is updated. A surrogate acts as a filter for the sequence of data generated by the data source and communicates appropriate updates to the parent itinerant program (possibly after preliminary processing). For complex processing on a number of datasets, a hierarchy of surrogates and result combining programs can be created. The result of such itinerant programs can either be a single accumulated result or a sequence of results. What we have in mind is a scheme that is an extension of our existing scheme for mapping and synchronizing multiple update sequences, which has been used in our program coupling effort. This scheme has been used to dynamically link multiple physical simulations being performed concurrently.
7.4.3umd) Coupling HPJ programs with one another and with other data parallel
programs (e.g. MPI, HPF, HPC++): We consider the problem of efficiently coupling multiple data-parallel programs
at runtime. We propose an approach that establishes mappings between data
structures in different data-parallel programs and implements a user-specified
consistency model. Mappings are established at runtime and can be added
and deleted while the programs being coupled are in execution. Mappings,
or the identity of the processors involved, do not have to be known at compile-time
or even link-time. Programs can be made to interact with different granularities
of interaction without requiring any re-coding. A-priori knowledge of consistency
requirements allows buffering of data as well as concurrent execution of
the coupled applications. Efficient data movement is achieved by pre-computing
an optimized schedule. (This actually is already PCRC work and will appear
in a paper at the ICS conference in May).
7.4.4syr) WebWork: Integrated Programming Environment Tools for National and Grand Challenges is our joint work with Boston University and Cooperating systems with paper written before implications of Java as clear as they are now!
7.4.5syr) Computational Web Multiserver - a proposal for Web based HPCC
updates some of the ideas in WebWork
As part of our effort to better understand the compilation issues, at Rochester we are developing a Java compiler which could be used to optimize Java programs.
The compiler would use a common intermediate representation and a collection
of front- and back-ends to facilitate re-use of components and independence
of optimization passes.
There are two possible front-ends: one would read Java source, the other
one would read bytecode.
A set of back-ends would include Java source generation, bytecode generation, and "native" code generation (either in form of some target HLL like C, or actual native code for some architectures).
/=====> Java Java ----\ / ======> IR =====-------> bytecode bytecode ====/ \ \-----> C (or other "native")
Our current development concentrates on a bytecode front-end and Java back-end
(shown above with double lines). The choice was made, because using bytecode
as an input is more general (if we have access to source, we also have access
to its bytecode form -- the converse is not true). Using Java as output
has a big advantage in the development phase.
The implementation is not complete: only a subset of legal bytecode constructs
is implemented and the definition of our IR is not stable. However, preliminary
results are promising. We are able to identify implicit high level constructs
such as loops with good success. Also our high level IR makes implementation
of code transformation relatively simple.
Code instrumentation is our first application of the compiler framework. We are developing a pass which inserts instrumentation calls. Currently we are instrumenting loops, if-then-else statements, and methods. We are planning to look into the performance of a range of Java applications. The objective is to determine if there are any performance issues that are unique to Java the language (the fact that it is interpreted), and/or applications written in Java (it could be the case that only certain kinds of applications are worth writing in Java).
An Example.
We are given a bytecode representation of a method corresponding to the following disassembled code. Method void paintAll(java.awt.Graphics) 0 iconst_0 1 istore_2 2 goto 19 5 aload_0 6 aload_0 7 getfield #7 <Field PCRCexample.CellList [I> 10 iload_2 11 iaload 12 aload_1 13 invokevirtual #6 <Method PCRCexample.plotCell(ILjava/awt/Graphics;)V> 16 iinc 2 1 19 iload_2 20 aload_0 21 getfield #4 <Field PCRCexample.n I> 24 if_icmplt 5 27 aload_0 28 aload_1 29 invokevirtual #3 <Method PCRCexample.updateStatusLine(Ljava/awt/Graphics;)V > 32 return
We can parse the class file and recover a high-level intermediate representation which corresponds to the following source (this was generated automatically by our Java-source back-end).
public void paintAll ( java.awt.Graphics a1 ) { int v0; v0 = 0; while((v0 < this.n)) { this.plotCell(this.CellList[v0], a1); v0 = (v0 + 1); } //while this.updateStatusLine(a1); return; } // paintAll
Since our IR explicitly identifies high-level constructs (e.g.,loops), it is easy to instrument the code and/or perform optimizing transformations.
We have implemented a preliminary version of network-based data mining at
Rochester. Currently, the server is a passive entity in terms of the data
mining computation. It's only job is to accept client connections and ship
off requested data. The mining process is carried out at the client end.
Both the client and server are currently sequential.
We now present some timing results vis-a-vis a C++ implementation of the algorithm which doesn't transmit any data over the network. Below we show two synthetic databases from IBM we looked at:
Database Num_Trans Avg_Trans_Size Total_Size ----------------------------------------------------------- T5.I2.D100K 100,000 5 2.615 Mbytes T10.I4.D100K 100,000 10 4.31 Mbytes These database are accessible only to the server through a file-server. We now present the total execution time for the algorithm. The Java_Time includes the server disk-read time, transmission time and client computation time. C++_Time only gives the disk-read time and computation time. Database Total_Size Java_Time C++_Time -------------------------------------------------- T5.I2.D100K 2.615 Mbytes 367.7s 15.3s T10.I4.D100K 4.31 Mbytes 1847.2s 78.9s The break-up of the execution time is as follows: Database Total_Size Java:Reading Computation C++:Reading Computation ------------------------------------------------------------------------ T5.I2.D100K 2.615 Mbytes 292.6s 75.1s 8.8s 6.5s T10.I4.D100K 4.31 Mbytes 478.4s 1368.8s 13.8s 65.1s In Java the net disk-read time and shipping time for data is at the rate of 9Kb/sec vs. 0.31Mb/sec disc read time in C++.
From the experiments, we make two observations:
We will address these issues in our future research.