Challenges of Future High-End Computing
نویسنده
چکیده
רÖÖ BLOCKINØØ With the recent achievement of one teraflop/s (½¼ ½¾ flop/s) on the ASCI Red system at Sandia National Laboratory in the U.S., many have asked what lies ahead for high-end scientific computing. The next major milestone is one petaflop/s (½¼ ½½ flop/s). Systems capable of this level of performance may be available by 2010, assuming key technologies continue to advance at currently projected rates. This paper gives an overview of some of the challenges that need to be addressed to achieve this goal. One key issue is the question of whether or not the algorithms and applications anticipated for these systems possess the enormous levels of concurrency that will be required, and whether or not they possess the requisite data locality. In any event, new algorithms and implementation techniques may be required to effectively utilize these future systems. New approaches may also be required to program applications, analyze performance and manage systems of this scale. º½ ÁAEÌÊÇÇÍÍÌÁÇAE In December 1996, a sustained rate of one teraflop/s (also written as ½¼ ½¾ floating-point operations per second) was achieved on the Linpack benchmark, using the ASCI Red system at Sandia National Laboratory in New Mexico, U.S.A. While no one has yet demonstrated a sustained performance rate exceeding one teraflop/s on a real scientific or engineering application, it is expected that this also will be achieved soon. The next major milestone is a performance rate of one petaflop/s (also written as ½¼ ½½ floating-point operations per second). It should be emphasized that we could just as well use the term " peta-ops " , since it appears that large scientific systems will be required to perform intensive integer and logical computation in addition to floating-point operations, and completely non-floating-point applications are likely to be important as well. In addition to prodigiously high computational performance, ¾¿
منابع مشابه
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملSecurity Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...
متن کاملA Clustering Approach to Scientific Workflow Scheduling on the Cloud with Deadline and Cost Constraints
One of the main features of High Throughput Computing systems is the availability of high power processing resources. Cloud Computing systems can offer these features through concepts like Pay-Per-Use and Quality of Service (QoS) over the Internet. Many applications in Cloud computing are represented by workflows. Quality of Service is one of the most important challenges in the context of sche...
متن کاملIMPACTS AND CHALLENGES OF CLOUD COMPUTING FOR SMALL AND MEDIUM SCALE BUSINESSES IN NIGERIA
Cloud computing technology is providing businesses, be it micro, small, medium, and large scale enterprises with the same level playing grounds. Small and Medium enterprises (SMEs) that have adopted the cloud are taking their businesses to greater heights with the competitive edge that cloud computing offers. The limitations faced by (SMEs) in procuring and maintaining IT infrastructures has be...
متن کاملSoftware-Defined Networking: Challenges and research opportunities for Future Internet
Currently many aspects of the classical architecture of the Internet are etched in stone – a so called ossification of the Internet – which has led to major obstacles in IPv6 deployment and difficulty in using IP multicast services. Yet, there exist many reasons to extend the Internet, e.g., for improving intra-domain and inter-domain routing for high availability of the network, providing end-...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999