An Example Use Case Scenario

Slides:



Advertisements
Similar presentations
Performance Testing - Kanwalpreet Singh.
Advertisements

Big Data Open Source Software and Projects ABDS in Summary XIV: Level 14B I590 Data Science Curriculum August Geoffrey Fox
MapReduce Online Created by: Rajesh Gadipuuri Modified by: Ying Lu.
Fast Algorithms For Hierarchical Range Histogram Constructions
Master/Slave Architecture Pattern Source: Pattern-Oriented Software Architecture, Vol. 1, Buschmann, et al.
Programming Types of Testing.
June 22-23, 2005 Technology Infusion Team Committee1 High Performance Parallel Lucene search (for an OAI federation) K. Maly, and M. Zubair Department.
Visual Solution to High Performance Computing Computer and Automation Research Institute Laboratory of Parallel and Distributed Systems
LHC Beam Operation CommitteeJune, 14 th UFOs in the LHC Tobias Baer LBOC June, 14 th 2011 Acknowledgements: N. Garrel, B. Goddard, E.B. Holzer, S.
Lecturer: Sebastian Coope Ashton Building, Room G.18 COMP 201 web-page: Lecture.
Introduction to Analysis of Algorithms
1 CS 177 Week 12 Recitation Slides Running Time and Performance.
1 Lecture 6 Performance Measurement and Improvement.
Scripting Languages For Virtual Worlds. Outline Necessary Features Classes, Prototypes, and Mixins Static vs. Dynamic Typing Concurrency Versioning Distribution.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
SIMULATING ERRORS IN WEB SERVICES International Journal of Simulation: Systems, Sciences and Technology 2004 Nik Looker, Malcolm Munro and Jie Xu.
Tyson Condie.
Chapter 1 Algorithm Analysis
CS 420 Design of Algorithms Analytical Models of Parallel Algorithms.
Interpreting the data: Parallel analysis with Sawzall LIN Wenbin 25 Mar 2014.
Distributed Control of FACTS Devices Using a Transportation Model Bruce McMillin Computer Science Mariesa Crow Electrical and Computer Engineering University.
Designing and Evaluating Parallel Programs Anda Iamnitchi Federated Distributed Systems Fall 2006 Textbook (on line): Designing and Building Parallel Programs.
The Pipeline Processing Framework LSST Applications Meeting IPAC Feb. 19, 2008 Raymond Plante National Center for Supercomputing Applications.
Parallelization: Area Under a Curve. AUC: An important task in science Neuroscience – Endocrine levels in the body over time Economics – Discounting:
CERN IT Department CH-1211 Genève 23 Switzerland t Internet Services Job Monitoring for the LHC experiments Irina Sidorova (CERN, JINR) on.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 3: Operating-System Structures System Components Operating System Services.
Object-Oriented Program Development Using Java: A Class-Centered Approach, Enhanced Edition.
Analysis of algorithms Analysis of algorithms is the branch of computer science that studies the performance of algorithms, especially their run time.
An Object-Oriented Approach to Programming Logic and Design Fourth Edition Chapter 5 Arrays.
U.S. Department of the Interior U.S. Geological Survey Dealing with Streaming Data CDI Connected Devices Working Group Jeff Allen and Dell Long USGS Fort.
LHC BLM Software revue June BLM Software components Handled by BI Software section –Expert GUIs  Not discussed today –Real-Time software  Topic.
Simulation of the interaction of macro- particles with the LHC proton beam Zhao Yang, EPFL
David Adams ATLAS DIAL: Distributed Interactive Analysis of Large datasets David Adams BNL August 5, 2002 BNL OMEGA talk.
1 CC & MP - CC10 - CERN Crab LHC J. Wenninger CERN Beams Department for the LHC Machine Protection Panel.
European Organization For Nuclear Research Future Database Requirements in the Accelerator Sector Ronny Billen Database Futures Workshop – 6-7 June 2011.
LogTree: A Framework for Generating System Events from Raw Textual Logs Liang Tang and Tao Li School of Computing and Information Sciences Florida International.
A Runtime Verification Based Trace-Oriented Monitoring Framework for Cloud Systems Jingwen Zhou 1, Zhenbang Chen 1, Ji Wang 1, Zibin Zheng 2, and Wei Dong.
Big traffic data processing framework for intelligent monitoring and recording systems 學生 : 賴弘偉 教授 : 許毅然 作者 : Yingjie Xia a, JinlongChen a,b,n, XindaiLu.
‘Review’ of the machine protection system in the SPS 1 J. Wenninger BE-OP SPS MPS - ATOP 09.
Liang, Introduction to Java Programming, Sixth Edition, (c) 2007 Pearson Education, Inc. All rights reserved Chapter 23 Algorithm Efficiency.
Eva Barbara Holzer July 16, LHC MPP Eva Barbara Holzer for the BLM team LHC MPP CERN, July 17, 2010 Proposal on Threshold Corrections for RC Filters.
UCI Large-Scale Collection of Application Usage Data to Inform Software Development David M. Hilbert David F. Redmiles Information and Computer Science.
Interfacing the FMCM for additional protection in the LHC and the SPS- LHC/CNGS Transfer Lines to the CERN controls system Cristina Gabriel Casado, Interlock.
The Google File System Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung Presenter: Chao-Han Tsai (Some slides adapted from the Google’s series lectures)
European Organization For Nuclear Research CERN Accelerator Logging Service Overview Focus on Data Extraction for Offline Analysis Ronny Billen & Chris.
 TE-MPE-PE Clean code workshop – R.Heil, M.Koza, K.Krol Introduction to the MPE software process Raphaela Heil TE-MPE-PE Clean code workshop - 9 th July.
2 nd BLMTWG meeting, B. Auchmann, O. Picha, with A. Lechner.
Team LYF: Applying Python to Waveform Matching Detection Xin Liu (USC), Dongdong Yao(GT), Lili Feng(CU-Boulder)
Development of concurrent and distributed programs with the Actor model and Akka César Aguilera Padilla Thematic CERN School of Computing Split, 27th of.
Sung-Dong Kim, Dept. of Computer Engineering, Hansung University Java - Introduction.
Experience Report: System Log Analysis for Anomaly Detection
QUANTUM COMPUTING: Quantum computing is an attempt to unite Quantum mechanics and information science together to achieve next generation computation.
Computer Organization
2007 IEEE Nuclear Science Symposium (NSS)
BEAM LOSS MONITORING SYSTEM
UFO Buster analysis tool A brief introduction / Software layout
Web: Parallel Computing Rabie A. Ramadan , PhD Web:
Walter Binder Giovanna Di Marzo Serugendo Jarle Hulaas
Peer-to-peer networking
LHC BLM system: system overview
Chapter 16: Distributed System Structures
BEAM LOSS MONITORING SYSTEM
StreamInsight in SQL Server 2012
Fault Injection: A Method for Validating Fault-tolerant System
Azure's Performance, Scalability, SQL Servers Automate Real Time Data Transfer at Low Cost MINI-CASE STUDY “Azure offers high performance, scalable, and.
Soft Error Detection for Iterative Applications Using Offline Training
Measure Reliability of Automation – using Machine learning
Performance And Scalability In Oracle9i And SQL Server 2000
Copyright © JanBask Training. All rights reserved Get Started with Hadoop Hive HiveQL Languages.
Presentation transcript:

An Example Use Case Scenario Using Akka Platform in Unidentified Falling Object Detection on the LHC An Example Use Case Scenario Evangelos Motesnitsalis Magnet Powering Interlocks & Software Machine Protection and Electrical Integrity Group Technology Department European Organization for Nuclear Research (CERN) August 2013

Contents Section I: Theoretical Aspects Section II: Use Case Scenario UFOs The LHC Logging Database Beam Loss Monitors Akka and Actors Section II: Use Case Scenario Motivation Finding UFOs with Akka

Section I: Theoretical Aspects

Unidentified Falling Objects UFOs are micrometer sized macroparticles which interact with the proton beam multiple times per event. Their creation mechanism is still uncertain. UFOs were first observed in July 2010. They have caused numerous protection beam dumps and they are one of the major known limitations of LHC operation. UFO events at high energies are much more dangerous than those of the lower energies.

UFO-caused Beam Loss Plot 1: Temporal loss profile of a fast beam loss event on 23.08.2010. The beam loss in running sum exceeded the corresponding threshold and caused the beam dump. The loss occurred on beam 2 in the arc of sector 34. The temporal width of the Gaussian fit is 335 μs (=approximately 3.8 turns). More than 10.000 UFO events were recorded between April and August 2011.

The LHC Logging Database Oracle is the standard Relational Database Management System at CERN. The database stores almost 5 TB of operational (and not physics) data per year and deals with more than 40 million queries per day. A Java API is used to extract data from the database. The Logging Database contains relatively slow time series data that are stored online for at least the lifetime of the LHC. Data are considered useful for long term use and are often filtered with respect to the raw measured data.

Beam Loss Monitors Beam Loss Monitors (BLMs) are systems that can measure beam losses in the LHC Ring. Their data are constantly stored in the LHC Logging Database. There are more than 4000 BLMs in the LHC Ring. An ionization chamber, a specific type of Beam Loss Monitor in the LHC Ring.

Akka and Actors Akka is a toolkit and runtime for building distributed, concurrent, scalable and fault tolerant applications on the Java Virtual Machine. Actors are very lightweight concurrent object-oriented entities which process messages asynchronously using an event-driven receive loop. Actors are constrained only by memory of which they consume a few hundred bytes each. Therefore, any application can easily create millions of Actors which form a hierarchical tree. Messages can be of arbitrary type such as String, Integer, Boolean, arrays, collection etc.

Contents Section I: Theoretical Aspects Section II: Use Case Scenario UFOs The LHC Logging Database Beam Loss Monitors Akka and Actors Section II: Use Case Scenario Motivation Finding UFOs with Akka

Section II: Use Case Scenario

Motivation Why are we interested in new technologies for the analysis of LHC operational data? Answer: Efficiency A distributed solution may offer: Increased scalability Increased reliability Increased fault-tolerance Increased decentralization Reduced execution time Therefore, if the Akka approach offers any of these, there are some good reasons to use it!

Finding UFOs – Simple Solution UFOSearch 1. Fetch Data from the Logging Database; 2. Import the positions of the BLMs; 3. Import the needed Running Sums and their Thresholds; 4. Define the Time Range for the Search; 5. Search for UFOS: For every second 5.1. Fetch the data for this second; 5.2. If all the Thresholds in the Running Sums are reached; 5.3. Add the UFO to a List; 6. Print the List to the Logging Output; ! But where is the point where we can inject parallelization? !

Finding UFOs with Akka UFOSearch 1. Fetch Data from the Logging Database; 2. Import the positions of the BLMs; 3. Import the needed Running Sums and their Thresholds; 4. Define the Time Range for the Search; 5. Search for UFOS: For every second create an actor who will: Actor. 5.1. Fetch the data for its second; Actor. 5.2. If all the Thresholds in the Running Sums are passed; Actor. 5.3. Add the UFO to a List; 6. Print the List to the Logging Service; ! We create as many actors as the seconds that are contained in our time range but this does not affect us as an actor needs only around 300 bytes of memory to be saved !

Summary To sum up… We continuously try to improve the frameworks and software running on (and for) the LHC. A good approach is parallelization –which is a big trend in Computer Science in any case. The UFO Detection Algorithm is only a try of the Akka Toolkit which will enable us to decide whether or not we will make an extensive use of it to parallelize even more parts of the LHC Operational Data Analysis in order to increase scalability and reduce execution time.

Thank you! e-mail: evangelos.motesnitsalis@cern.ch mevangem@csd.auth.gr