Visual analysis of I/O system behavior for high-end computing

Christopher Muelder, Carmen Sigovan, Kwan-Liu Ma, Jason Cope, Sam Lang, Kamil Iskra, Pete Beckman, Robert Ross

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Abstract

As supercomputers grow ever larger, so too do application run times and data requirements. The operational patterns of modern parallel I/O systems are far too complex to allow for a direct analysis of their trace logs. Several visualization methods have therefore been developed to address this issue. Traditional, direct visualizations of parallel systems, such as Gantt charts, can be applied to parallel file systems, but do they not capture domain specific properties nor scale up to modern systems. We propose a portable I/O tracing system and visualization methods to analyze the traces we have obtained. We demonstrate the effectiveness of this system on existing parallel storage systems.

Original languageEnglish (US)
Title of host publicationLSAP'11 - Proceedings of the 3rd International Workshop on Large-Scale System and Application Performance
Pages19-26
Number of pages8
DOIs
StatePublished - Aug 8 2011
Event3rd International Workshop on Large-Scale System and Application Performance, LSAP'11, Co-located with 20th International ACM Symposium on High-Performance Parallel and Distributed Computing, HPDC 2011 - San Jose, CA, United States
Duration: Jun 8 2011Jun 8 2011

Other

Other3rd International Workshop on Large-Scale System and Application Performance, LSAP'11, Co-located with 20th International ACM Symposium on High-Performance Parallel and Distributed Computing, HPDC 2011
CountryUnited States
CitySan Jose, CA
Period6/8/116/8/11

Keywords

  • information visualization
  • parallel I/O
  • performance analysis tools

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture

Fingerprint Dive into the research topics of 'Visual analysis of I/O system behavior for high-end computing'. Together they form a unique fingerprint.

Cite this