Working Set: Model and Characterization

Slides:



Advertisements
Similar presentations
Chapter 3 Process Description and Control
Advertisements

D. Tam, R. Azimi, L. Soares, M. Stumm, University of Toronto Appeared in ASPLOS XIV (2009) Reading Group by Theo 1.
TAILS: COBWEB 1 [1] Online Digital Learning Environment for Conceptual Clustering This material is based upon work supported by the National Science Foundation.
Project Overview Goal: Instrumentation and Measurement capabilities for GENI experimenters and operations Outcomes: Software to perform centralized and.
1 PATH: Page Access Tracking Hardware to Improve Memory Management Reza Azimi, Livio Soares, Michael Stumm, Tom Walsh, and Angela Demke Brown University.
Advanced OS Chapter 3p2 Sections 3.4 / 3.5. Interrupts These enable software to respond to signals from hardware. The set of instructions to be executed.
ABACUS: A Hardware-Based Software Profiler for Modern Processors Eric Matthews Lesley Shannon School of Engineering Science Sergey Blagodurov Sergey Zhuravlev.
DNA NANOTECHNOLOGY. Outline DNA in nature DNA and nanotechnology Extract real DNA.
Authors: Tong Li, Dan Baumberger, David A. Koufaty, and Scott Hahn [Systems Technology Lab, Intel Corporation] Source: 2007 ACM/IEEE conference on Supercomputing.
DUE Router and Switch Configuration Software Installation Module 2.
Model Driven Development reduces the problem-implementation gap by redefining the role of models and using platforms for translating and realizing the.
A Fast On-Chip Profiler Memory Roman Lysecky, Susan Cotterell, Frank Vahid* Department of Computer Science and Engineering University of California, Riverside.
Design Tradeoffs For Software-Managed TLBs Authers; Nagle, Uhlig, Stanly Sechrest, Mudge & Brown.
Virtualization for Adaptability Project Presentation CS848 Fall 2006 Umar Farooq Minhas 29 Nov 2006 David R. Cheriton School of Computer Science University.
Team-Based Inquiry ASTC Preconference Workshop, October 18
Architectural Characterization of an IBM RS6000 S80 Server Running TPC-W Workloads Lei Yang & Shiliang Hu Computer Sciences Department, University of.
Black Box Software Testing Copyright © 2003 Cem Kaner & James Bach 1 Black Box Software Testing Spring 2005 PART 7 -- FUNCTION TESTING by Cem Kaner, J.D.,
Partnership for International Research and Education A Global Living Laboratory for Cyberinfrastructure Application Enablement A Competitive Analysis of.
CO2 and Temperature Investigation Does global climate data show evidence of a relationship between the carbon dioxide (CO2) in the atmosphere and average.
Numerical Methods Multi Dimensional Direct Search Methods - Theory
Computer Aided Design By Brian Nettleton This material is based upon work supported by the National Science Foundation under Grant No Any opinions,
Partnership for International Research and Education A Global Living Laboratory for Cyberinfrastructure Application Enablement Enhanced Grid Enabled Weather.
Partnership for International Research and Education A Global Living Laboratory for Cyberinfrastructure Application Enablement II. International Experience.
Troubleshooting SQL Server Performance: Tips &Tools Amit Khandelwal.
Parallel Algorithm for Multiple Genome Alignment Using Multiple Clusters Nova Ahmed, Yi Pan, Art Vandenberg Georgia State University SURA Cyberinfrastructure.
Embedded System Lab. 오명훈 Addressing Shared Resource Contention in Multicore Processors via Scheduling.
Monitors Chapter Seven Dr. Gheith Abandah1. Outline Monitors Software monitors Hardware monitors Dr. Gheith Abandah2.
WildFire: A Scalable Path for SMPs Erick Hagersten and Michael Koster Sun Microsystems Inc. Presented by Terry Arnold II.
Leader Interviews Name, PhD Title, Organization University This project is funded by the National Science Foundation (NSF) under award numbers ANT
 Wind Power TEAK – Traveling Engineering Activity Kits Partial support for the TEAK Project was provided by the National Science Foundation's Course,
Application of Stereo Vision in Tracking *This research is supported by NSF Grant No. CNS Opinions, findings, conclusions, or recommendations.
Thinking in Parallel - Introduction New Mexico Supercomputing Challenge in partnership with Intel Corp. and NM EPSCoR.
Numerical Methods Multidimensional Gradient Methods in Optimization- Example
Funded by a grant from the National Science Foundation. Any opinions, findings, conclusions or recommendations expressed are those of the authors and do.
Engineering programs must demonstrate that their graduates have the following: Accreditation Board for Engineering and Technology (ABET) ETP 2005.
1 University of Maryland Using Information About Cache Evictions to Measure the Interactions of Application Data Structures Bryan R. Buck Jeffrey K. Hollingsworth.
CS161 – Design and Architecture of Computer
Virtual Machine Monitors
Computer Sciences Department University of Wisconsin-Madison
J. Randy McGinnis, University of Maryland, College Park
Operating Systems CMPSC 473
Partnership for International Research and Education
Ph.D. in Computer Science
Session 3 Memory Management
18742 Parallel Computer Architecture Caching in Multi-core Systems
Green Software Engineering Prof
Discussion and Conclusion
Parallelized Analysis Using Subdural Interictal EEG
“ ” A case study to support testing of dynamic SPL
What we need to be able to count to tune programs
I.III Implementation I. Introduction III. Layers I.II Approach
KINAMIN Plugin - Kaseya IN A MINute
Local to Global Perspectives on Sea Level Rise
Critical - thinking Assessment Test (CAT)
Elliptic Partial Differential Equations – Direct Method
I. Research Overview and Outcome
Title of Poster Site Visit 2017 Introduction Results
People Who Did the Study Universities they are affiliated with
Title of session For Event Plus Presenters 12/5/2018.
Tapestry: Reducing Interference on Manycore Processors for IaaS Clouds
Black Box Software Testing Fall 2005 Overview – Part 1 of 3
Black Box Software Testing 2004 Academic Edition
Lecture 14: Large Cache Design II
Supporting Material for the Biodiversity Teaching Experiment
Presented by David Wolinsky
Numerical Methods Newton’s Method for One -Dimensional Optimization - Example
Title of Poster Site Visit 2018 Introduction Results
Virtual Memory: Policies (Part II)
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Project Title: I. Research Overview and Outcome
Presentation transcript:

Working Set: Model and Characterization Partnership for International Research and Education A Global Living Laboratory for Cyberinfrastructure Application Enablement Working Set: Model and Characterization Student: Ricardo Koller, PhD student, FIU FIU Advisor: Raju Rangaswami, FIU PIRE International Partner Advisor: Akshat Verma, IBM National Science Foundation I. Research Overview and Outcome Model Characterization (tools implemented)‏ Inuse Set (IS): An inuse set for a phase of duration θi is the subset of all distinct memory lines that are accessed in one phase. Reuse Set (RS): The Reuse Set for a time window T is the subset of Inuse Set that is accessed more than once in the phase. Effective Reuse Set Size (ERSS): The Effective Reuse Set Size is the minimum size of memory resources that need to be assigned to the program in that phase for it to not exhibit thrashing behavior. 1 Probe based cache partitioning Memory tracing on POWER6 Linux kernel patch that instruments the Performance Monitoring (PM) counter overflow interruptions and dumps the address of the load/store instructions from the SDAR. The PM is configured by the perf program. perf Kernel Overflow handler Counter overflow at 1 Partitioning using a probe program that consumes a specific amount of cache. The only requirement for this probe is that it needs to access L2 lines faster than any other program. This can be achieved by using touch lines prefetching (TCB instruction on POWER6.)‏ SDAR L2 cache associativity based partitioning The index portion of the address selects the set The cache can be partitioned for an application if all the pages allocated to it are only touching some specific sets (for cache associativity). Comparison of all methods ERSS Tree Each node represents a phase. The parent-child relationship means that a phase includes a smaller phase. Isolation References Peter J. Denning. Working sets past and present. In IEEE Tran. on Software Engineerng, 1980. David K. Tam, Reza Azimi, Livio B. Soares, and Michael Stumm. Rapidmrc: Approximating l2 miss rate curves on commodity systems for online optimizations. In ASPLOS, 2009 Ashutosh S. Dhodapkar and James E. Smith. Managing multi-configuration hardware via dynamic working set analysis. In Proc. ISCA, 2002 II. International Experience This was definitely a great trip. From one side, I had the pleasure to work with the same team and mentor, Akshat V., at IRL. And from the other side, I was able to visit one of the most interesting countries in the world for the second time. You can't get bored in India, and there is no way one can really get to know India in a couple of months. III. Acknowledgement The material presented in this poster is based upon the work supported by the National Science Foundation under Grant No. OISE-0730065. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.