SlideShare une entreprise Scribd logo
1  sur  26
Professor Uri Weiser
Technion
Haifa, Israel
Handling Memory Accesses in Big Data
Environment
Chipex 2016
1The talk covers research done by: T. Horowitz , Prof. A. Kolodny, T. Morad, , Prof. A. Mendelson, Daniel Raskin, Gil Shomron, Loren Jamal, Prof. U. Weiser
2
A New Architecture Avenues in
Big Data Environment
 The Era of Heterogeneous
 HW/SW fits application
 Dynamic tuning
 Accelerators
  performance, energy efficiency
 Big Data = big
 In general non repeated access to all the
“Big Data”
 What are the implications?
Heterogeneous computing :
Application Specific Accelerators
Performance/power
Apps range
Continue performance trend by tuned architecture to bypass current technological hurdles
Performance/power
Accelerators
3
Tuned architectures
Apps behavior
4
A New Architecture Avenues in
Big Data Environment
 Heterogeneous computing – ”tuning” HW to
respond to specific needs
 example: Big Data memory access pattern
 Potential savings
 Reduction of Data Movements and bypass
DRAM
 Bandwidth issue
 Potential solution
Input: Unstructured data
Big Data  usage of DATA
5
Read Once
Non-Temporal
Memory Access
Funnel
beta=
BWout
BWin
Structuring
Input: Unstructured data
Structured data (aggregation)
A
ML
Model creation
Data structuring = ETL
C
B
C Model usage @ client
6
Machine Learning
7
Does Big Data exhibit special
memory access pattern?
It probably should since
 Revisiting ALL Big Data items will cause huge/slow
data transfers from Data sources
 There are 2 access modes of memory operations:
 Temporal Memory Access
 Non-Temporal Memory access
 Many Big Data computations exhibit a Non-Temporal
Memory-Accesses and/or Funnel operation
Non-Temporal Memory access
Initial analysis: Hadoop-grep Single Memory Access Pattern
~50% of Hadoop-grep unique memory references are single access
8
Non-Temporal Memory Accesses
Preliminary Results
WordCount:
Access to Storage:
Non-temporal locality
Sort:
Access to Storage:
NO Non-temporal locality
0
10000
20000
30000
40000
50000
60000
70000
80000
0 10 20 30 40 50
Time [s]
WordCount I/O Utilization
0
20000
40000
60000
80000
100000
120000
0 200 400 600 800 1000 1200
Time [s]
SORT I/O
Access rate
[KB/s]
Time
Time
9
Access rate
[KB/s]
10
Where energy is wasted?
• DRAM
• Limited BW
From: Mark Horowitz, Stanford “Computing’s Energy Problems”
From: Bill Dally (nVidia and Stanford), Efficiency and Parallelism, the challenges of future computing
11
Energy:
DRAM
12
Memory Subsystem - copies
L1$
L2$
LL Cache
DRAM
NV Storage
RegistersKBs
10’s KBs
MBs
TBs
GBs
10’s MBs
3GB/sec
25GB/sec
500GB/sec
TB/sec
Size
Core
BW
- Source
Copy 1 (main memory)
Copy 2 (LL Cache)
Copy 3 (L2 Cache)
Copy 4 (L1 Cache)
Copy 5 (Registers) - Destination
13
Memory Subsystem – DRAM bypass == DDIO
L1$
L2$
LL Cache
DRAM
NV Storage
Registers
3-20GB/sec
25GB/sec
500GB/sec
TB/sec
Core
BW
- Source
Copy 1 (main memory)
Copy 2 (LL Cache)
Copy 3 (L2 Cache)
Copy 4 (L1 Cache)
Copy 5 (Registers) - Destination
Potential savings:
@ 0.5n J/B (DRAM)
10 – 20 GB/s NV BW
 5W – 10W
Reference: “Optimizing Read-Once Data Flow in Big-Data Applications”
Morad, Ghomron, Erez, Weiser, Kolodny, in Computer Architecture Letters Journal 2016 14
Bandwidth
When should we use Funnel at the Data source
15
Memory Hierarchy is Optimized for
A: Bandwidth issue  System are built for Temporal Locality
16
Highest Bandwidth
L1$
L2$
LLC Cache
DRAM
NV Storage
RegistersKBs
10’s KBs
MBs
TBs
GBs
10’s MBs
3-20GB/sec
25GB/sec
500GB/sec
TB/sec
Size
Core
BW Existing
BW
NTMA
Desired BW
# of cores
Bandwidth
[MB/s]
# of cores
CPU
utilization
[%]
Bandwidth
[MB/s]
Read Once – Non-Temporal Memory Accesses
# of cores
Bandwidth
[MB/s]
CPU
utilization
[%]
Temporal Memory Accesses
# of cores
Bandwidth
[MB/s]
Hint: Memory access per operation
B: Memory access per operation impact BW
CPU Utilizations
17
Solution:
Flow of “Non-Temporal Data Accesses”
Core
L1$
L2$
LLC Cache
DRAM
NV Storage
Registers
The Funnel
18
Use Funnel when Bandwidth bottleneck occurs
- “high” memory accesses per Instruction
- Limited BW
- Non temporal locality memory access
*private communication with: Moinuddin Qureshi
“Funnel”ing “Read-Once” data in storage
*Kang, Yangwook, Yang-suk Kee, Ethan L. Miller, and Chanik Park. "Enabling cost-effective data processing with smart ssd." In Mass Storage Systems
and Technologies (MSST), 2013 IEEE 29th Symposium on, pp. 1-12. IEEE, 2013.
**K. Eshghi and R. Micheloni. “SSD Architecture and PCI Express Interface”
Typical SDD architecture*
19
Analytical model of the Funnel
20
Post
process
Bandwidth (BW) IN
Bandwidth BW OUT
Funnel
B
B
= BWOUT/BWIN
20
Purposed Architecture
21
PCIe
TL
B
CPU performs NTMA and TMA work
SSD Storage
B
Funnel
B=Bandwidth
Baseline Configuration
PCIe
TL
B
2,LcE
CPU performs TMA workSSD performs NTMA work
B
Funnel
Funnel Configurations
B
B B
21
Funnel Performance22
Performanceimprovement
CPU becomes
bottleneck
CPU becomes
bottleneck
𝟏
𝐏𝐂𝐈𝐞 𝐁𝐖
𝟏
𝐒𝐒𝐃 𝐁𝐖
PCIe
TL
B
CPU performs NTMA
and TMA work
SSD Storage
B
Funnel
B=Bandwidth
PCIe
TL
B
2,LcE
CPU performs: TMA
work
SSD performs NTMA
work
B
Funnel
beta
Performance
22
Funnel energy
Funnel
improvement
CPU becomes the
bottleneck
Funnel processor
overhead
PCIe
TL
B
CPU performs NTMA
and TMA work
SSD Storage
B
Funnel
B=Bandwidth
PCIe
TL
B
2,LcE
CPU performs TMA
work
SSD performs NTMA
work
B
Funnel
beta
Energy
CPU becomes the
bottleneck
23
Solution: ?
Non-Temporal Memory Accesses should be
processed as close as possible to the data source
Data that exhibit Temporal Locality should use
current Memory Hierarchy
Use Machine Learning (context aware*) to distinguish
between the two phases
Open questions:
SW model
Shared Data
HW implementation
Computational requirement at the “Funnel”
*Reference: “Semantic locality and Context based prefetching” Peled, Mannor, Weiser, Etsion in ISCA 2015
24
Summary
Memory access is a critical path in computing
Funnel should be used for:
Resolve BW systems’ bottleneck for specific applications
Solve the System’s BW issues for “Read Once” cases
Reduction of Data movement
Free up system’s memory resources (re-Spark)
Simple-energy-efficient engines at the front end
Issues
…
25
26

Contenu connexe

En vedette

TCAMのしくみ
TCAMのしくみTCAMのしくみ
TCAMのしくみ
ogatay
 

En vedette (12)

The R Ecosystem
The R EcosystemThe R Ecosystem
The R Ecosystem
 
R at Microsoft
R at MicrosoftR at Microsoft
R at Microsoft
 
Beyond 100GE
Beyond 100GEBeyond 100GE
Beyond 100GE
 
Juniper Networks Router Architecture
Juniper Networks Router ArchitectureJuniper Networks Router Architecture
Juniper Networks Router Architecture
 
Building a scalable data science platform with R
Building a scalable data science platform with RBuilding a scalable data science platform with R
Building a scalable data science platform with R
 
A Strategic View of Enterprise Reporting and Analytics: The Data Funnel
A Strategic View of Enterprise Reporting and Analytics: The Data FunnelA Strategic View of Enterprise Reporting and Analytics: The Data Funnel
A Strategic View of Enterprise Reporting and Analytics: The Data Funnel
 
End User DNS Measurement at APNIC
End User DNS Measurement at APNICEnd User DNS Measurement at APNIC
End User DNS Measurement at APNIC
 
OIF 2015 FOE Architecture Presentation
OIF 2015 FOE Architecture PresentationOIF 2015 FOE Architecture Presentation
OIF 2015 FOE Architecture Presentation
 
ENRZ Advanced Modulation for Low Latency Applications
ENRZ Advanced Modulation for Low Latency ApplicationsENRZ Advanced Modulation for Low Latency Applications
ENRZ Advanced Modulation for Low Latency Applications
 
What's so special about the number 512?
What's so special about the number 512?What's so special about the number 512?
What's so special about the number 512?
 
Dr. John Bainbridge, Principal Application Architect, NetSpeed
 Dr. John Bainbridge, Principal Application Architect, NetSpeed  Dr. John Bainbridge, Principal Application Architect, NetSpeed
Dr. John Bainbridge, Principal Application Architect, NetSpeed
 
TCAMのしくみ
TCAMのしくみTCAMのしくみ
TCAMのしくみ
 

Similaire à Prof. Uri Weiser,Technion

onur-comparch-fall2018-lecture3a-whycomparch-afterlecture.pptx
onur-comparch-fall2018-lecture3a-whycomparch-afterlecture.pptxonur-comparch-fall2018-lecture3a-whycomparch-afterlecture.pptx
onur-comparch-fall2018-lecture3a-whycomparch-afterlecture.pptx
sivasubramanianManic2
 

Similaire à Prof. Uri Weiser,Technion (20)

Edge Chasing Delayed Consistency: Pushing the Limits of Weak Memory Models
Edge Chasing Delayed Consistency: Pushing the Limits of Weak Memory ModelsEdge Chasing Delayed Consistency: Pushing the Limits of Weak Memory Models
Edge Chasing Delayed Consistency: Pushing the Limits of Weak Memory Models
 
C-Store-s553-stonebraker.ppt
C-Store-s553-stonebraker.pptC-Store-s553-stonebraker.ppt
C-Store-s553-stonebraker.ppt
 
Chip Multiprocessing and the Cell Broadband Engine.pdf
Chip Multiprocessing and the Cell Broadband Engine.pdfChip Multiprocessing and the Cell Broadband Engine.pdf
Chip Multiprocessing and the Cell Broadband Engine.pdf
 
Michael Gschwind, Chip Multiprocessing and the Cell Broadband Engine
Michael Gschwind, Chip Multiprocessing and the Cell Broadband EngineMichael Gschwind, Chip Multiprocessing and the Cell Broadband Engine
Michael Gschwind, Chip Multiprocessing and the Cell Broadband Engine
 
onur-comparch-fall2018-lecture3b-memoryhierarchyandcaches-afterlecture.pptx
onur-comparch-fall2018-lecture3b-memoryhierarchyandcaches-afterlecture.pptxonur-comparch-fall2018-lecture3b-memoryhierarchyandcaches-afterlecture.pptx
onur-comparch-fall2018-lecture3b-memoryhierarchyandcaches-afterlecture.pptx
 
The von Neumann Memory Barrier and Computer Architectures for the 21st Century
The von Neumann Memory Barrier and Computer Architectures for the 21st CenturyThe von Neumann Memory Barrier and Computer Architectures for the 21st Century
The von Neumann Memory Barrier and Computer Architectures for the 21st Century
 
hpc2013_20131223
hpc2013_20131223hpc2013_20131223
hpc2013_20131223
 
Wolfgang Lehner Technische Universitat Dresden
Wolfgang Lehner Technische Universitat DresdenWolfgang Lehner Technische Universitat Dresden
Wolfgang Lehner Technische Universitat Dresden
 
PyData Paris 2015 - Closing keynote Francesc Alted
PyData Paris 2015 - Closing keynote Francesc AltedPyData Paris 2015 - Closing keynote Francesc Alted
PyData Paris 2015 - Closing keynote Francesc Alted
 
A High-Performance Campus-Scale Cyberinfrastructure: The Technical, Political...
A High-Performance Campus-Scale Cyberinfrastructure: The Technical, Political...A High-Performance Campus-Scale Cyberinfrastructure: The Technical, Political...
A High-Performance Campus-Scale Cyberinfrastructure: The Technical, Political...
 
NoSQL Slideshare Presentation
NoSQL Slideshare Presentation NoSQL Slideshare Presentation
NoSQL Slideshare Presentation
 
Nikravesh australia long_versionkeynote2012
Nikravesh australia long_versionkeynote2012Nikravesh australia long_versionkeynote2012
Nikravesh australia long_versionkeynote2012
 
Heterogeneous Computing : The Future of Systems
Heterogeneous Computing : The Future of SystemsHeterogeneous Computing : The Future of Systems
Heterogeneous Computing : The Future of Systems
 
Cluster based storage - Nasd and Google file system - advanced operating syst...
Cluster based storage - Nasd and Google file system - advanced operating syst...Cluster based storage - Nasd and Google file system - advanced operating syst...
Cluster based storage - Nasd and Google file system - advanced operating syst...
 
Introduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale ComputersIntroduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale Computers
 
onur-comparch-fall2018-lecture3a-whycomparch-afterlecture.pptx
onur-comparch-fall2018-lecture3a-whycomparch-afterlecture.pptxonur-comparch-fall2018-lecture3a-whycomparch-afterlecture.pptx
onur-comparch-fall2018-lecture3a-whycomparch-afterlecture.pptx
 
数据中心网络研究:机遇与挑战
数据中心网络研究:机遇与挑战数据中心网络研究:机遇与挑战
数据中心网络研究:机遇与挑战
 
CodeFutures - Scaling Your Database in the Cloud
CodeFutures - Scaling Your Database in the CloudCodeFutures - Scaling Your Database in the Cloud
CodeFutures - Scaling Your Database in the Cloud
 
Database revolution opening webcast 01 18-12
Database revolution opening webcast 01 18-12Database revolution opening webcast 01 18-12
Database revolution opening webcast 01 18-12
 
Database Revolution - Exploratory Webcast
Database Revolution - Exploratory WebcastDatabase Revolution - Exploratory Webcast
Database Revolution - Exploratory Webcast
 

Plus de chiportal

Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
chiportal
 

Plus de chiportal (20)

Prof. Zhihua Wang, Tsinghua University, Beijing, China
Prof. Zhihua Wang, Tsinghua University, Beijing, China Prof. Zhihua Wang, Tsinghua University, Beijing, China
Prof. Zhihua Wang, Tsinghua University, Beijing, China
 
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
 
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
 
Ken Liao, Senior Associate VP, Faraday
Ken Liao, Senior Associate VP, FaradayKen Liao, Senior Associate VP, Faraday
Ken Liao, Senior Associate VP, Faraday
 
Marco Casale-Rossi, Product Mktg. Manager, Synopsys
Marco Casale-Rossi, Product Mktg. Manager, SynopsysMarco Casale-Rossi, Product Mktg. Manager, Synopsys
Marco Casale-Rossi, Product Mktg. Manager, Synopsys
 
Dr.Efraim Aharoni, ESD Leader, TowerJazz
Dr.Efraim Aharoni, ESD Leader, TowerJazzDr.Efraim Aharoni, ESD Leader, TowerJazz
Dr.Efraim Aharoni, ESD Leader, TowerJazz
 
Eddy Kvetny, System Engineering Group Leader, Intel
Eddy Kvetny, System Engineering Group Leader, IntelEddy Kvetny, System Engineering Group Leader, Intel
Eddy Kvetny, System Engineering Group Leader, Intel
 
Xavier van Ruymbeke, App. Engineer, Arteris
Xavier van Ruymbeke, App. Engineer, ArterisXavier van Ruymbeke, App. Engineer, Arteris
Xavier van Ruymbeke, App. Engineer, Arteris
 
Asi Lifshitz, VP R&D, Vtool
Asi Lifshitz, VP R&D, VtoolAsi Lifshitz, VP R&D, Vtool
Asi Lifshitz, VP R&D, Vtool
 
Zvika Rozenshein,General Manager, EngineeringIQ
Zvika Rozenshein,General Manager, EngineeringIQZvika Rozenshein,General Manager, EngineeringIQ
Zvika Rozenshein,General Manager, EngineeringIQ
 
Lewis Chu,Marketing Director,GUC
Lewis Chu,Marketing Director,GUC Lewis Chu,Marketing Director,GUC
Lewis Chu,Marketing Director,GUC
 
Kunal Varshney, VLSI Engineer, Open-Silicon
Kunal Varshney, VLSI Engineer, Open-SiliconKunal Varshney, VLSI Engineer, Open-Silicon
Kunal Varshney, VLSI Engineer, Open-Silicon
 
Gert Goossens,Sen. Director, ASIP Tools, Synopsys
Gert Goossens,Sen. Director, ASIP Tools, SynopsysGert Goossens,Sen. Director, ASIP Tools, Synopsys
Gert Goossens,Sen. Director, ASIP Tools, Synopsys
 
Tuvia Liran, Director of VLSI, Nano Retina
Tuvia Liran, Director of VLSI, Nano RetinaTuvia Liran, Director of VLSI, Nano Retina
Tuvia Liran, Director of VLSI, Nano Retina
 
Sagar Kadam, Lead Software Engineer, Open-Silicon
Sagar Kadam, Lead Software Engineer, Open-SiliconSagar Kadam, Lead Software Engineer, Open-Silicon
Sagar Kadam, Lead Software Engineer, Open-Silicon
 
Ronen Shtayer,Director of ASG Operations & PMO, NXP Semiconductor
Ronen Shtayer,Director of ASG Operations & PMO, NXP SemiconductorRonen Shtayer,Director of ASG Operations & PMO, NXP Semiconductor
Ronen Shtayer,Director of ASG Operations & PMO, NXP Semiconductor
 
Prof. Emanuel Cohen, Technion
Prof. Emanuel Cohen, TechnionProf. Emanuel Cohen, Technion
Prof. Emanuel Cohen, Technion
 
Prof. Ramez Daniel, Technion
Prof. Ramez Daniel, TechnionProf. Ramez Daniel, Technion
Prof. Ramez Daniel, Technion
 
Rotem Ben-Hur,Graduate Student,Technio
Rotem Ben-Hur,Graduate Student,TechnioRotem Ben-Hur,Graduate Student,Technio
Rotem Ben-Hur,Graduate Student,Technio
 
Misbah Ramadan, Graduate Student,Technion
Misbah Ramadan, Graduate Student,TechnionMisbah Ramadan, Graduate Student,Technion
Misbah Ramadan, Graduate Student,Technion
 

Dernier

Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
vineshkumarsajnani12
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 

Dernier (20)

Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableCuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDINGPuri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
KALYANI 💋 Call Girl 9827461493 Call Girls in Escort service book now
KALYANI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKALYANI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KALYANI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 

Prof. Uri Weiser,Technion

  • 1. Professor Uri Weiser Technion Haifa, Israel Handling Memory Accesses in Big Data Environment Chipex 2016 1The talk covers research done by: T. Horowitz , Prof. A. Kolodny, T. Morad, , Prof. A. Mendelson, Daniel Raskin, Gil Shomron, Loren Jamal, Prof. U. Weiser
  • 2. 2 A New Architecture Avenues in Big Data Environment  The Era of Heterogeneous  HW/SW fits application  Dynamic tuning  Accelerators   performance, energy efficiency  Big Data = big  In general non repeated access to all the “Big Data”  What are the implications?
  • 3. Heterogeneous computing : Application Specific Accelerators Performance/power Apps range Continue performance trend by tuned architecture to bypass current technological hurdles Performance/power Accelerators 3 Tuned architectures Apps behavior
  • 4. 4 A New Architecture Avenues in Big Data Environment  Heterogeneous computing – ”tuning” HW to respond to specific needs  example: Big Data memory access pattern  Potential savings  Reduction of Data Movements and bypass DRAM  Bandwidth issue  Potential solution
  • 5. Input: Unstructured data Big Data  usage of DATA 5 Read Once Non-Temporal Memory Access Funnel beta= BWout BWin
  • 6. Structuring Input: Unstructured data Structured data (aggregation) A ML Model creation Data structuring = ETL C B C Model usage @ client 6 Machine Learning
  • 7. 7 Does Big Data exhibit special memory access pattern? It probably should since  Revisiting ALL Big Data items will cause huge/slow data transfers from Data sources  There are 2 access modes of memory operations:  Temporal Memory Access  Non-Temporal Memory access  Many Big Data computations exhibit a Non-Temporal Memory-Accesses and/or Funnel operation
  • 8. Non-Temporal Memory access Initial analysis: Hadoop-grep Single Memory Access Pattern ~50% of Hadoop-grep unique memory references are single access 8
  • 9. Non-Temporal Memory Accesses Preliminary Results WordCount: Access to Storage: Non-temporal locality Sort: Access to Storage: NO Non-temporal locality 0 10000 20000 30000 40000 50000 60000 70000 80000 0 10 20 30 40 50 Time [s] WordCount I/O Utilization 0 20000 40000 60000 80000 100000 120000 0 200 400 600 800 1000 1200 Time [s] SORT I/O Access rate [KB/s] Time Time 9 Access rate [KB/s]
  • 10. 10 Where energy is wasted? • DRAM • Limited BW
  • 11. From: Mark Horowitz, Stanford “Computing’s Energy Problems” From: Bill Dally (nVidia and Stanford), Efficiency and Parallelism, the challenges of future computing 11
  • 13. Memory Subsystem - copies L1$ L2$ LL Cache DRAM NV Storage RegistersKBs 10’s KBs MBs TBs GBs 10’s MBs 3GB/sec 25GB/sec 500GB/sec TB/sec Size Core BW - Source Copy 1 (main memory) Copy 2 (LL Cache) Copy 3 (L2 Cache) Copy 4 (L1 Cache) Copy 5 (Registers) - Destination 13
  • 14. Memory Subsystem – DRAM bypass == DDIO L1$ L2$ LL Cache DRAM NV Storage Registers 3-20GB/sec 25GB/sec 500GB/sec TB/sec Core BW - Source Copy 1 (main memory) Copy 2 (LL Cache) Copy 3 (L2 Cache) Copy 4 (L1 Cache) Copy 5 (Registers) - Destination Potential savings: @ 0.5n J/B (DRAM) 10 – 20 GB/s NV BW  5W – 10W Reference: “Optimizing Read-Once Data Flow in Big-Data Applications” Morad, Ghomron, Erez, Weiser, Kolodny, in Computer Architecture Letters Journal 2016 14
  • 15. Bandwidth When should we use Funnel at the Data source 15
  • 16. Memory Hierarchy is Optimized for A: Bandwidth issue  System are built for Temporal Locality 16 Highest Bandwidth L1$ L2$ LLC Cache DRAM NV Storage RegistersKBs 10’s KBs MBs TBs GBs 10’s MBs 3-20GB/sec 25GB/sec 500GB/sec TB/sec Size Core BW Existing BW NTMA Desired BW
  • 17. # of cores Bandwidth [MB/s] # of cores CPU utilization [%] Bandwidth [MB/s] Read Once – Non-Temporal Memory Accesses # of cores Bandwidth [MB/s] CPU utilization [%] Temporal Memory Accesses # of cores Bandwidth [MB/s] Hint: Memory access per operation B: Memory access per operation impact BW CPU Utilizations 17
  • 18. Solution: Flow of “Non-Temporal Data Accesses” Core L1$ L2$ LLC Cache DRAM NV Storage Registers The Funnel 18 Use Funnel when Bandwidth bottleneck occurs - “high” memory accesses per Instruction - Limited BW - Non temporal locality memory access *private communication with: Moinuddin Qureshi
  • 19. “Funnel”ing “Read-Once” data in storage *Kang, Yangwook, Yang-suk Kee, Ethan L. Miller, and Chanik Park. "Enabling cost-effective data processing with smart ssd." In Mass Storage Systems and Technologies (MSST), 2013 IEEE 29th Symposium on, pp. 1-12. IEEE, 2013. **K. Eshghi and R. Micheloni. “SSD Architecture and PCI Express Interface” Typical SDD architecture* 19
  • 20. Analytical model of the Funnel 20 Post process Bandwidth (BW) IN Bandwidth BW OUT Funnel B B = BWOUT/BWIN 20
  • 21. Purposed Architecture 21 PCIe TL B CPU performs NTMA and TMA work SSD Storage B Funnel B=Bandwidth Baseline Configuration PCIe TL B 2,LcE CPU performs TMA workSSD performs NTMA work B Funnel Funnel Configurations B B B 21
  • 22. Funnel Performance22 Performanceimprovement CPU becomes bottleneck CPU becomes bottleneck 𝟏 𝐏𝐂𝐈𝐞 𝐁𝐖 𝟏 𝐒𝐒𝐃 𝐁𝐖 PCIe TL B CPU performs NTMA and TMA work SSD Storage B Funnel B=Bandwidth PCIe TL B 2,LcE CPU performs: TMA work SSD performs NTMA work B Funnel beta Performance 22
  • 23. Funnel energy Funnel improvement CPU becomes the bottleneck Funnel processor overhead PCIe TL B CPU performs NTMA and TMA work SSD Storage B Funnel B=Bandwidth PCIe TL B 2,LcE CPU performs TMA work SSD performs NTMA work B Funnel beta Energy CPU becomes the bottleneck 23
  • 24. Solution: ? Non-Temporal Memory Accesses should be processed as close as possible to the data source Data that exhibit Temporal Locality should use current Memory Hierarchy Use Machine Learning (context aware*) to distinguish between the two phases Open questions: SW model Shared Data HW implementation Computational requirement at the “Funnel” *Reference: “Semantic locality and Context based prefetching” Peled, Mannor, Weiser, Etsion in ISCA 2015 24
  • 25. Summary Memory access is a critical path in computing Funnel should be used for: Resolve BW systems’ bottleneck for specific applications Solve the System’s BW issues for “Read Once” cases Reduction of Data movement Free up system’s memory resources (re-Spark) Simple-energy-efficient engines at the front end Issues … 25
  • 26. 26