Introduction to the ITA computer system
|
|
- Geoffrey Wilkins
- 5 years ago
- Views:
Transcription
1 Introduction to the ITA computer system Tiago M. D. Pereira Slides: Institute of Theoretical Astrophysics
2 Today s lecture in a nutshell 1. Network and users, connecting 2. Compute resources 3. The module system 4. Parallel computing
3 1. Network and Users, Connecting Network accounts used for all users, central home directory Disk quota in MN home directories ($ quota): files, grace, etc. No disk quota for ITA home directories (but don t abuse it...) Access from outside UiO is blocked to all but a few computers: use login.astro.uio.no or login.uio.no to connect
4 Connecting via ssh ssh: secure shell, provides encrypted terminal connection ssh with many options possible Use scp for copying files: scp Password authentication is default. But much easier with keys!
5 ssh continued: keys Alice Bob's Public Key Combine keys 751A696C 24D97009 Alice's Private Key Bob Alice and Bob's shared secret Alice's Public Key Bob's Private Key Combine keys 751A696C 24D97009 Alice and Bob's shared secret
6 ssh continued: keys ssh-keygen In your computer: ~/.ssh/id_rsa.pub ~/.ssh/id_rsa At UiO computers: ~/.ssh/authorized_keys
7 ssh continued: keys In your Unix computer: $ ssh-keygen -t rsa -b 4096 [Choose passphrase, could be empty] Linux only: $ ssh-copy-id -i ~/.ssh/id_rsa.pub user@login.astro.uio.no MacOS or Linux: $ scp ~/.ssh/id_rsa.pub user@login.astro.uio.no:.ssh/mykey $ ssh user@login.astro.uio.no [user@tsih2 ~]$ cd.ssh [user@tsih2 ~]$ cat mykey >> authorized_keys
8 ssh continued: keys For Windows users, recommended approach is to use PuTTY Download: Set up keys:
9 ssh continued: keys So far we ve used a key in your computer to connect to ITA It is also to use keys in ITA s computers to connect to other ITA So you can ssh internally without having to enter your password! $ ssh user@login.astro.uio.no [user@tsih2 ~]$ ssh-keygen -t rsa -b 4096 (...) [user@tsih2 ~]$ ssh-copy-id -i ~/.ssh/id_rsa.pub tsih2
10 ssh continued: proxying Access via login.astro.uio.no, then ssh to your computer Possible to do this automatically via ~/.ssh/config Host beehive* owl* euclid* ForwardX11 yes ProxyCommand ssh -XY -W %h:%p ~]$ chmod 600 ~/.ssh/config In general, you can do several ssh proxies or hops (not needed at ITA)
11 ssh exercises Exercise: connect via ssh to login.astro.uio.no and find out the location of your home directory. Is it at ITA or at MN? Exercise: generate ssh keys in your computer and use them to connect to login.astro.uio.no without entering your password Exercise: set up ssh proxying so you can connect to beehive4.uio.no via login.astro.uio.no
12 ssh continued: X11 forwarding By default ssh is only text terminal. But possible to show graphical programs in your laptop/computer screen (X11 forwarding) $ ssh -XY user@tsih.uio.no [user@tsih ~]$ xeyes X11 forwarding is slow because bitstream sent uncompressed, not usually good enough for movies / dynamic GUIs vnc is a much better option if you want to have remote graphical control of a machine
13 ssh exercises (2) Exercise: connect to login.astro.uio.no and start up xeyes (a graphical programme). Make sure it opens up in your screen! Exercise: from login.astro.uio.no connect to your workstation and start another graphical programme (a browser?).
14 ssh continued: vnc vnc can be used to control the full desktop of a remote computer (can only use it for your own desktop) It is efficient because compression is used Different programmes in different operative systems MacOS: Finder > Go > Connect to server... vnc://hostname.uio.no In general, this will not work out of the box because direct traffic is blocked (see ssh): need ssh tunnel
15 ssh continued: tunnelling Ssh tunnelling is a way to connect to a port in a remote machine using ssh and remaping to a local port Can be used in many different ways and scenarios For vnc server running at hostname.uio.no: $ ssh -fn -L 5091:localhost:5900 hostname.uio.no No terminal Local port Remote port Ideally, with ssh proxy
16 ssh continued: tunnelling
17 ssh continued: tunnelling For jupyter notebook running at hostname.uio.no $ ssh user@hostname.uio.no [user@hostname] $ jupyter notebook --no-browser (...) In a different terminal set up ssh tunnel: $ ssh -fn -L 9999:localhost:8888 hostname.uio.no Finally, run jupyter from your browser: Recommended with %matplotlib inline backend
18 ssh exercises (3) Exercise: connect to beehive4 and start jupyter (may need to $ module load python first). Now set up an ssh tunnel so you can connect to jupyter via your own browser
19 Shell profile scripts When you open up a terminal (or ssh) into Unix machines, initialisation scripts load useful things into the environment Tcsh: /etc/csh.cshrc /etc/csh.login (login shells only) ~/.tcshrc ~/.cshrc (if.tcshrc is not found) ~/.history ~/.login (login shells only) ~/.cshdirs Bash login shell: /etc/profile ~/.bash_profile ~/.bash_login (if no.bash_profile) Bash non-login shell: /etc/bashrc ~/.bashrc
20 Login vs non-login shells Do you have a login or non-login shell: shopt (look for login_shell) Login shells are run when you first connect to a machine Non-login shells are run when you run a new shell from the shell or when you run a non-interactive ssh command (e.g scp, tunnelling) All shells in MacOS are login shells Different profiles can separate initialisation scripts for both scenarios All tcsh/csh scripts also run ~/.tshrc, use #!/bin/csh -f to avoid
21 Shell profile scripts, continued Modify your.tcsh /.bashrc to suit your needs, but don t screw up! Can use ifs inside to separate operative systems / computers unamestr=`uname` if [ "$unamestr" == 'Linux' ]; then echo "This is Linux!" elif [ "$unamestr" == 'Darwin' ]; then echo "This is a Mac!" if [ $HOSTNAME == beehive4.uio.no]; then echo "From beehive4!"
22 Shell profile scripts exercises Exercise: is your current shell login or non-login? Can you get a shell of a different kind? Exercise: modify the bash script below to tcsh to print something when connecting to beehive4 (login shell only): if [ $HOSTNAME == beehive4.uio.no]; then echo "From beehive4!"
23 2. Compute Resources Check out web page for most up-to-date information: Institute has workstations (Linux, Mac) or thin clients (Linux), but also compute nodes (powerful machines with no desktop) Machines for general use have names starting with beehive beehive.uio.no, beehive2.uio.no,..., beehive23.uio.no All beehive machines have 20 cores, 128 GB RAM, infiniband. Load more info:
24 Compute Resources, continued Machines are shared between all users at the Institute, be considerate and follow etiquette: Choose machine with low load at Do NOT use all cores in all machines at once Run top when connecting to a machine to double-check usage Avoid using more processes than cores If some user taking up a lot, notify her/him if you need to run stuff Check top to find out about your CPU and memory usage
25 Compute Resources, continued Additional clusters available for some groups: ask supervisor! Some beehive nodes are special, e.g. beehive32-gpu, beehive33-gpu: 2x NVIDIA K20 (2496 CUDA cores, 5 GB memory) Large memory (~768 GB) beehive nodes coming soon
26 Compute Resources, exercises Exercise: which beehive node is getting more used right now? Which user is running more things?
27 3. The Module System Most Linux machines at the Institute have the Unix module system module allows loading complex initialisation shell scripts for different software packages Typical commands are: $ module avail show available modules $ module load <name> load a module $ module list show loaded modules
28 The Module System, continue Each typically sets the $PATH, $LD_LIBRARY_PATH, or other important variables Used in most supercomputers, and also at ITA s clusters You can write and use your own module files: $ module load use.own, save modules in ~/privatemodules At ITA, use module for Intel compilers (Intel_parallel_studio) and python (python/3.6 or python/2.7)
29 The module system exercises Exercise: login to beehive4 and load module hdf5. What happens? What modules to you have loaded at the end? Exercise: login to beehive4 and start python. Check version number. Now load python 3.6 module, and recheck python version
30 4. Parallel computing The compute clusters at ITA are made for parallel computing Two major paradigms: OpenMP (shared memory) and MPI (message passing interface, combine different machines) For compiled languages and MPI, recommended to use the Intel compilers (Intel_parallel_studio module), mpiifort, mpiicc In Python, possible to use mpi4py from the system packages (python module)
31 Parallel computing, continued With OpenMP, you can only run on one beehive machine (maximum 20 cores) With MPI, you can run in several beehive machines at the same time (hundreds of cores)
32 Parallel computing, exercises Exercise: check the Institute s IT help web pages and find the page on Setting up MPI in compute clusters. Compile and run the Fortran example on a beehive machine (5 cores) Exercise: following the instructions in the same page, run a Python test script with mpi4py using beehive4 and beehive5 at the same time
33 Slides These slides online:
What is Secure. Authenticated I know who I am talking to. Our communication is Encrypted
Crypto App - SSH 1 What is Secure Authenticated I know who I am talking to Our communication is Encrypted Telnet clear text Servers Terminal clear text Routers SSH encrypted channel encrypted text Servers
More informationCryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia
Cryptography - SSH Network Security Workshop 29-31 May 2017 Phnom Penh, Cambodia What is Safely Authentication I know who I am talking with Our communication is Encrypted Telnet Servers Terminal Routers
More informationCryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea
Cryptography - SSH Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 What is Secure Authentication I know who I am talking to Our communication is Encrypted Telnet Servers Terminal
More informationCryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh
Cryptography Application : SSH Cyber Security & Network Security 20-22 March, 2017 Dhaka, Bangladesh Issue Date: [31-12-2015] Revision: [v.1] What is Safely Authentication I am Assured of Which Host I
More informationSSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:
SSH 25-29 June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: Issue Date: Revision: 1 What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows
More informationPROJECT INFRASTRUCTURE AND BASH INTRODUCTION MARKUS PILMAN<
PROJECT INFRASTRUCTURE AND BASH INTRODUCTION MARKUS PILMAN< MPILMAN@INF.ETHZ.CH> ORGANIZATION Tutorials on Tuesdays - Sometimes, will be announced In General: no exercise sessions (unless you get an email
More informationCMTH/TYC Linux Cluster Overview. Éamonn Murray 1 September 2017
CMTH/TYC Linux Cluster Overview Éamonn Murray 1 September 2017 Cluster Documentation Everything I ll talk about is covered in the cluster documentation Web: http://www.cmth.ph.ic.ac.uk/computing Local
More informationCryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan
Cryptography Application : SSH 7 Sept 2017, Taichung, Taiwan What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows Who I Am The Traffic is Encrypted
More informationSupercomputing environment TMA4280 Introduction to Supercomputing
Supercomputing environment TMA4280 Introduction to Supercomputing NTNU, IMF February 21. 2018 1 Supercomputing environment Supercomputers use UNIX-type operating systems. Predominantly Linux. Using a shell
More informationGraham vs legacy systems
New User Seminar Graham vs legacy systems This webinar only covers topics pertaining to graham. For the introduction to our legacy systems (Orca etc.), please check the following recorded webinar: SHARCNet
More informationTutorial: SSH. Secure SHell: Connect remotely anything, anywhere. UL High Performance Computing (HPC) Team Sebastien Varrette
Secure SHell: Connect remotely anything, anywhere UL High Performance Computing (HPC) Team Sebastien Varrette University of Luxembourg (UL), Luxembourg http://hpc.uni.lu 1 / 26 Summary 1 Introduction 2
More informationWorkstations & Thin Clients
1 Workstations & Thin Clients Overview Why use a BioHPC computer? System Specs Network requirements OS Tour Running Code Locally Submitting Jobs to the Cluster Run Graphical Jobs on the Cluster Use Windows
More information2-1-1 ssh Secure SHell
2-1-1 ssh Secure SHell Using Public Key Cryptography Keying, Key Exchange, and Session Setup Communicate Safely with Remote Systems What is Safely Authentication I am Assured of Which Host I am Talking
More informationUL HPC School 2017[bis] PS1: Getting Started on the UL HPC platform
UL HPC School 2017[bis] PS1: Getting Started on the UL HPC platform UL High Performance Computing (HPC) Team C. Parisot University of Luxembourg (UL), Luxembourg http://hpc.uni.lu 1 / 34 Latest versions
More information2-1-1 ssh Secure SHell
2-1-1 ssh Secure SHell Using Public Key Cryptography Keying, Key Exchange, and Session Setup 1 Communicate Safely with Remote Systems 2 What is Safely Authentication I am Assured of Which Host I am Talking
More informationMVAPICH MPI and Open MPI
CHAPTER 6 The following sections appear in this chapter: Introduction, page 6-1 Initial Setup, page 6-2 Configure SSH, page 6-2 Edit Environment Variables, page 6-5 Perform MPI Bandwidth Test, page 6-8
More informationIntroduction to Joker Cyber Infrastructure Architecture Team CIA.NMSU.EDU
Introduction to Joker Cyber Infrastructure Architecture Team CIA.NMSU.EDU What is Joker? NMSU s supercomputer. 238 core computer cluster. Intel E-5 Xeon CPUs and Nvidia K-40 GPUs. InfiniBand innerconnect.
More informationUnix. Examples: OS X and Ubuntu
The Command Line A terminal is at the end of an electric wire, a shell is the home of a turtle, tty is a strange abbreviation, and a console is a kind of cabinet. - Some person on SO Learning Resources
More informationA Prototype CPU-GPU Cluster for Research in High Performance Computing and Visualization of Large Scale Applications
A Prototype CPU-GPU Cluster for Research in High Performance Computing and Visualization of Large Scale Applications Fritz McCall fmccall@umiacs.umd.edu Brad Erdman chef@umiacs.umd.edu Cluster Goals GPUs
More informationIntroduction to Linux Workshop 2. The George Washington University SEAS Computing Facility
Introduction to Linux Workshop 2 The George Washington University SEAS Computing Facility Course Goals SSH and communicating with other machines Public/Private key generation,.ssh directory, and the config
More informationFEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs
FEPS SSH Access with Two-Factor Authentication RSA Key-pairs access.eps.surrey.ac.uk Contents: Introduction - 3 RSA Key-pairs - 3 Where can I use my RSA Key-Pair? - 3 Step 1 Prepare to generate your RSA
More informationTutorial on MPI: part I
Workshop on High Performance Computing (HPC08) School of Physics, IPM February 16-21, 2008 Tutorial on MPI: part I Stefano Cozzini CNR/INFM Democritos and SISSA/eLab Agenda first part WRAP UP of the yesterday's
More informationProject #6: Using ssh, scp and sftp with Key-Based Authentication
Project #6: Using ssh, scp and sftp with Key-Based Authentication ssh, scp and sftp Going beyond Password Protection Creating Keys Creating Keys with a Passphrase Using Key-Based Authentication in Our
More informationCS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 3: UNIX Operating System Organization Tian Guo CICS, Umass Amherst 1 Reminders Assignment 2 is due THURSDAY 09/24 at 3:45 pm Directions are on the website
More informationAn Overview of SSH. Presentation to Linux Users of Victoria. Melbourne, August 26, 2017
An Overview of SSH Presentation to Linux Users of Victoria Melbourne, August 26, 2017 http://levlafayette.com Utilisation and Rationale The most common use of SSH (secure shell) is remote login access
More informationAdobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud
Adobe Marketing Using FTP and sftp with the Adobe Marketing Contents Using FTP and sftp with the Adobe Marketing...3 Setting Up FTP Accounts Hosted by Adobe...3 Classifications...3 Data Sources...4 Data
More informationMost of the programming assignments in CS 2505 will require using the C language. We will use a (relatively) current version of the GCC C compiler.
Programming Tools 1 Most of the programming assignments in CS 2505 will require using the C language. We will use a (relatively) current version of the GCC C compiler. What s GCC? - the Gnu Compiler Collection
More informationHPC Account and Software Setup
HPC Account and Software Setup Ken-ichi Nomura MAGICS 2 nd Workshop at USC March 2, 2018 Wireless Network Configuration 1. USC Secure Wireless 2. eduroam 3. MAGICS@USC password: magics@usc 4. USC Guest
More informationComputing with the Moore Cluster
Computing with the Moore Cluster Edward Walter An overview of data management and job processing in the Moore compute cluster. Overview Getting access to the cluster Data management Submitting jobs (MPI
More informationBash Tutorial. ASL Fall 2017 Week 2
Bash Tutorial ASL Fall 2017 Week 2 Comments from previous years I had to stay up all night to run experiments! I cannot work on this from home.. It took me more than 40hrs./week to work on this. Solution
More informationProgramming Tools. Computer Organization Tools. Most of the programming assignments will require using the C language.
Programming Tools Tools 1 Most of the programming assignments will require using the C language. We will use a current version of the GCC C compiler. What s GCC? - the Gnu Compiler Collection (see gcc.gnu.org)
More informationIntroduction to Cuda Visualization. Graphical Application Tunnelling on Palmetto
Introduction to Cuda Visualization The CUDA programming paradigm is NVidia's development tool which is used to enable advanced computer processing on their GPGPU (General Purpose graphics Processing Units)
More informationOur Workshop Environment
Our Workshop Environment John Urbanic Parallel Computing Scientist Pittsburgh Supercomputing Center Copyright 2017 Our Environment This Week Your laptops or workstations: only used for portal access Bridges
More informationssh and handson Matsuzaki maz Yoshinobu 1
ssh and handson Matsuzaki maz Yoshinobu maz@iij.ad.jp 1 Secure Shell (ssh) Replacement for unsecure tools/protocols rsh and telnet Usually listen on tcp/22 Whole communication is encrypted
More informationIntroduction to the NCAR HPC Systems. 25 May 2018 Consulting Services Group Brian Vanderwende
Introduction to the NCAR HPC Systems 25 May 2018 Consulting Services Group Brian Vanderwende Topics to cover Overview of the NCAR cluster resources Basic tasks in the HPC environment Accessing pre-built
More informationUsing a Linux System 6
Canaan User Guide Connecting to the Cluster 1 SSH (Secure Shell) 1 Starting an ssh session from a Mac or Linux system 1 Starting an ssh session from a Windows PC 1 Once you're connected... 1 Ending an
More informationOur Workshop Environment
Our Workshop Environment John Urbanic Parallel Computing Scientist Pittsburgh Supercomputing Center Copyright 2017 Our Environment This Week Your laptops or workstations: only used for portal access Bridges
More informationSecure SHell Explained!
Open Gurus How To Secure SHell Explained! Here re some insights into SSH (Secure Shell), an essential tool for accessing remote machines. S SH is used to access or log in to a remote machine on the network,
More informationUsing Cartesius and Lisa. Zheng Meyer-Zhao - Consultant Clustercomputing
Zheng Meyer-Zhao - zheng.meyer-zhao@surfsara.nl Consultant Clustercomputing Outline SURFsara About us What we do Cartesius and Lisa Architectures and Specifications File systems Funding Hands-on Logging
More informationSetting up a Chaincoin Masternode
Setting up a Chaincoin Masternode Introduction So you want to set up your own Chaincoin Masternode? You ve come to the right place! These instructions are correct as of April, 2017, and relate to version
More informationIntroduction to High-Performance Computing (HPC)
Introduction to High-Performance Computing (HPC) Computer components CPU : Central Processing Unit cores : individual processing units within a CPU Storage : Disk drives HDD : Hard Disk Drive SSD : Solid
More informationOur Workshop Environment
Our Workshop Environment John Urbanic Parallel Computing Scientist Pittsburgh Supercomputing Center Copyright 2018 Our Environment Today Your laptops or workstations: only used for portal access Bridges
More informationSystems Programming/ C and UNIX
Systems Programming/ C and UNIX Alice E. Fischer Lecture 6: Processes October 9, 2017 Alice E. FischerLecture 6: Processes Lecture 5: Processes... 1/26 October 9, 2017 1 / 26 Outline 1 Processes 2 Process
More informationDogeCash Masternode Setup Guide Version 1.2 (Ubuntu 16.04)
DogeCash Masternode Setup Guide Version 1.2 (Ubuntu 16.04) This guide will assist you in setting up a DogeCash Masternode on a Linux Server running Ubuntu 16.04. (Use at your own risk) If you require further
More informationOur Workshop Environment
Our Workshop Environment John Urbanic Parallel Computing Scientist Pittsburgh Supercomputing Center Copyright 2016 Our Environment This Week Your laptops or workstations: only used for portal access Bridges
More informationNo More Passwords (with SSH)
No More Passwords (with SSH) Ted Dustman March 30, 2009 Contents 1 Introduction 1 1.1 Local or Remote?................................. 1 1.2 SSH Command Set................................ 1 2 Authentication
More informationHPC Introductory Course - Exercises
HPC Introductory Course - Exercises The exercises in the following sections will guide you understand and become more familiar with how to use the Balena HPC service. Lines which start with $ are commands
More informationIntroduction to BioHPC
Introduction to BioHPC New User Training [web] [email] portal.biohpc.swmed.edu biohpc-help@utsouthwestern.edu 1 Updated for 2015-06-03 Overview Today we re going to cover: What is BioHPC? How do I access
More informationIntroduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines
Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical
More informationSingularity: container formats
Singularity Easy to install and configure Easy to run/use: no daemons no root works with scheduling systems User outside container == user inside container Access to host resources Mount (parts of) filesystems
More informationBastion Hosts. Protected Access for Virtual Cloud Networks O R A C L E W H I T E P A P E R F E B R U A R Y
Bastion Hosts Protected Access for Virtual Cloud Networks O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 8 Disclaimer The following is intended to outline our general product direction. It is intended
More informationOur Workshop Environment
Our Workshop Environment John Urbanic Parallel Computing Scientist Pittsburgh Supercomputing Center Copyright 2018 Our Environment This Week Your laptops or workstations: only used for portal access Bridges
More informationUsing bash. Administrative Shell Scripting COMP2101 Fall 2017
Using bash Administrative Shell Scripting COMP2101 Fall 2017 Bash Background Bash was written to replace the Bourne shell The Bourne shell (sh) was not a good candidate for rewrite, so bash was a completely
More informationImage Sharpening. Practical Introduction to HPC Exercise. Instructions for Cirrus Tier-2 System
Image Sharpening Practical Introduction to HPC Exercise Instructions for Cirrus Tier-2 System 2 1. Aims The aim of this exercise is to get you used to logging into an HPC resource, using the command line
More informationOur Workshop Environment
Our Workshop Environment John Urbanic Parallel Computing Scientist Pittsburgh Supercomputing Center Copyright 2017 Our Environment This Week Your laptops or workstations: only used for portal access Bridges
More informationLAB #5 Intro to Linux and Python on ENGR
LAB #5 Intro to Linux and Python on ENGR 1. Pre-Lab: In this lab, we are going to download some useful tools needed throughout your CS career. First, you need to download a secure shell (ssh) client for
More informationPreparing Your Google Cloud VM for W4705
Preparing Your Google Cloud VM for W4705 August 27, 2017 1. Get a cloud.cs.columbia.edu account 1. Sign up for a cloud Columbia CS account using this link. Note that is is an entirely new account and is
More informationSUG Breakout Session: OSC OnDemand App Development
SUG Breakout Session: OSC OnDemand App Development Basil Mohamed Gohar Web and Interface Applications Manager Eric Franz Senior Engineer & Technical Lead This work is supported by the National Science
More informationIntroduction to the SHARCNET Environment May-25 Pre-(summer)school webinar Speaker: Alex Razoumov University of Ontario Institute of Technology
Introduction to the SHARCNET Environment 2010-May-25 Pre-(summer)school webinar Speaker: Alex Razoumov University of Ontario Institute of Technology available hardware and software resources our web portal
More informationQuick Start Guide for Intel FPGA Development Tools on the Microsoft* Azure* Platform
Quick Start Guide for Intel FPGA Development Tools on the Microsoft* Azure* Platform Updated for Intel Quartus Prime Design Suite: 17.1 Subscribe Send Feedback Latest document on the web: PDF HTML Contents
More informationSTARTING THE DDT DEBUGGER ON MIO, AUN, & MC2. (Mouse over to the left to see thumbnails of all of the slides)
STARTING THE DDT DEBUGGER ON MIO, AUN, & MC2 (Mouse over to the left to see thumbnails of all of the slides) ALLINEA DDT Allinea DDT is a powerful, easy-to-use graphical debugger capable of debugging a
More informationCluster Clonetroop: HowTo 2014
2014/02/25 16:53 1/13 Cluster Clonetroop: HowTo 2014 Cluster Clonetroop: HowTo 2014 This section contains information about how to access, compile and execute jobs on Clonetroop, Laboratori de Càlcul Numeric's
More informationCopyright 2013
This video will look at 9 of the biggest new features in Windows Server 2012. Understanding what is available will help decide if Windows Server 2012 is the right choice for you. New Features This video
More informationPractical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February
Practical Magic with SSH By David F. Skoll Roaring Penguin Software Inc. 1 February 2001 http://www.roaringpenguin.com dfs@roaringpenguin.com Overview of Presentation Why SSH? Problems with Telnet & Friends
More informationIntroduction to the Cluster
Follow us on Twitter for important news and updates: @ACCREVandy Introduction to the Cluster Advanced Computing Center for Research and Education http://www.accre.vanderbilt.edu The Cluster We will be
More informationEE516: Embedded Software Project 1. Setting Up Environment for Projects
EE516: Embedded Software Project 1. Setting Up Environment for Projects By Dong Jae Shin 2015. 09. 01. Contents Introduction to Projects of EE516 Tasks Setting Up Environment Virtual Machine Environment
More informationExercise 1: Connecting to BW using ssh: NOTE: $ = command starts here, =means one space between words/characters.
Exercise 1: Connecting to BW using ssh: NOTE: $ = command starts here, =means one space between words/characters. Before you login to the Blue Waters system, make sure you have the following information
More informationBasic UNIX commands. HORT Lab 2 Instructor: Kranthi Varala
Basic UNIX commands HORT 59000 Lab 2 Instructor: Kranthi Varala Client/Server architecture User1 User2 User3 Server (UNIX/ Web/ Database etc..) User4 High Performance Compute (HPC) cluster User1 Compute
More informationIntel Manycore Testing Lab (MTL) - Linux Getting Started Guide
Intel Manycore Testing Lab (MTL) - Linux Getting Started Guide Introduction What are the intended uses of the MTL? The MTL is prioritized for supporting the Intel Academic Community for the testing, validation
More informationMD Workflow Single System Tutorial (LINUX OPERATION GPU Cluster) Written by Pek Ieong
MD Workflow Single System Tutorial (LINUX OPERATION GPU Cluster) Written by Pek Ieong The purpose of this tutorial is to introduce the Amber GPU Molecular Dynamic (MD) Kepler workflow developed by NBCR
More informationCS451 - Assignment 8 Faster Naive Bayes? Say it ain t so...
CS451 - Assignment 8 Faster Naive Bayes? Say it ain t so... Part 1 due: Friday, Nov. 8 before class Part 2 due: Monday, Nov. 11 before class Part 3 due: Sunday, Nov. 17 by 11:50pm http://www.hadoopwizard.com/what-is-hadoop-a-light-hearted-view/
More informationCreate Test Environment
Create Test Environment Describes how to set up the Trafodion test environment used by developers and testers Prerequisites Python Passwordless ssh If you already have an existing set of ssh keys If you
More informationEnvironment, Scripts, ssh, and all that stuff
Environment, Scripts, ssh, and all that stuff GECO User Group Meeting April 16, 2009 Timothy H. Kaiser, Ph.D. http://geco.mines.edu/newsletters/ 1 Topics Introductions Free stuff Environment Scripting
More informationCS CS Tutorial 2 2 Winter 2018
CS CS 230 - Tutorial 2 2 Winter 2018 Sections 1. Unix Basics and connecting to CS environment 2. MIPS Introduction & CS230 Interface 3. Connecting Remotely If you haven t set up a CS environment password,
More informationUsing the computational resources at the GACRC
An introduction to zcluster Georgia Advanced Computing Resource Center (GACRC) University of Georgia Dr. Landau s PHYS4601/6601 course - Spring 2017 What is GACRC? Georgia Advanced Computing Resource Center
More informationIntroduc)on to Hyades
Introduc)on to Hyades Shawfeng Dong Department of Astronomy & Astrophysics, UCSSC Hyades 1 Hardware Architecture 2 Accessing Hyades 3 Compu)ng Environment 4 Compiling Codes 5 Running Jobs 6 Visualiza)on
More informationCSC- Bioweek 2018 Using cpouta for cloud computing Kimmo Mattila, Shubham Kapoor, Ari-Matti Saren (Jukka Nousiainen)
CSC- Bioweek 2018 Using cpouta for cloud computing 8.2.2018 Kimmo Mattila, Shubham Kapoor, Ari-Matti Saren (Jukka Nousiainen) CSC Finnish research, education and public administration ICT knowledge centre
More informationSecurity with SSH. Network Startup Resource Center
Security with SSH Network Startup Resource Center http://www.nsrc.org/ These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationIntroduction to the Cluster
Introduction to the Cluster Advanced Computing Center for Research and Education http://www.accre.vanderbilt.edu Follow us on Twitter for important news and updates: @ACCREVandy The Cluster We will be
More informationUser Guide Version 2.0
User Guide Version 2.0 Page 2 of 8 Summary Contents 1 INTRODUCTION... 3 2 SECURESHELL (SSH)... 4 2.1 ENABLING SSH... 4 2.2 DISABLING SSH... 4 2.2.1 Change Password... 4 2.2.2 Secure Shell Connection Information...
More informationA Brief Introduction to The Center for Advanced Computing
A Brief Introduction to The Center for Advanced Computing May 1, 2006 Hardware 324 Opteron nodes, over 700 cores 105 Athlon nodes, 210 cores 64 Apple nodes, 128 cores Gigabit networking, Myrinet networking,
More informationIntroduction to High Performance Computing at UEA. Chris Collins Head of Research and Specialist Computing ITCS
Introduction to High Performance Computing at UEA. Chris Collins Head of Research and Specialist Computing ITCS Introduction to High Performance Computing High Performance Computing at UEA http://rscs.uea.ac.uk/hpc/
More informationSystem Programming. Unix Shells
Content : Unix shells by Dr. A. Habed School of Computer Science University of Windsor adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction 2 Interactive and non-interactive
More informationIntroduction to Discovery.
Introduction to Discovery http://discovery.dartmouth.edu The Discovery Cluster 2 Agenda What is a cluster and why use it Overview of computer hardware in cluster Help Available to Discovery Users Logging
More informationLecture 4. Log into Linux Reminder: Homework 1 due today, 4:30pm Homework 2 out, due next Tuesday Project 1 out, due next Thursday Questions?
Lecture 4 Log into Linux Reminder: Homework 1 due today, 4:30pm Homework 2 out, due next Tuesday Project 1 out, due next Thursday Questions? Tuesday, September 7 CS 375 UNIX System Programming - Lecture
More informationEffective Use of CCV Resources
Effective Use of CCV Resources Mark Howison User Services & Support This talk... Assumes you have some familiarity with a Unix shell Provides examples and best practices for typical usage of CCV systems
More informationINTRODUCTION TO THE CLUSTER
INTRODUCTION TO THE CLUSTER WHAT IS A CLUSTER? A computer cluster consists of a group of interconnected servers (nodes) that work together to form a single logical system. COMPUTE NODES GATEWAYS SCHEDULER
More informationUoW HPC Quick Start. Information Technology Services University of Wollongong. ( Last updated on October 10, 2011)
UoW HPC Quick Start Information Technology Services University of Wollongong ( Last updated on October 10, 2011) 1 Contents 1 Logging into the HPC Cluster 3 1.1 From within the UoW campus.......................
More informationThe TinyHPC Cluster. Mukarram Ahmad. Abstract
The TinyHPC Cluster Mukarram Ahmad Abstract TinyHPC is a beowulf class high performance computing cluster with a minor physical footprint yet significant computational capacity. The system is of the shared
More informationA Hands-On Tutorial: RNA Sequencing Using High-Performance Computing
A Hands-On Tutorial: RNA Sequencing Using Computing February 11th and 12th, 2016 1st session (Thursday) Preliminaries: Linux, HPC, command line interface Using HPC: modules, queuing system Presented by:
More informationIntroduction to Linux Part 2b: basic scripting. Brett Milash and Wim Cardoen CHPC User Services 18 January, 2018
Introduction to Linux Part 2b: basic scripting Brett Milash and Wim Cardoen CHPC User Services 18 January, 2018 Overview Scripting in Linux What is a script? Why scripting? Scripting languages + syntax
More informationCSCI 350 Virtual Machine Setup Guide
CSCI 350 Virtual Machine Setup Guide This guide will take you through the steps needed to set up the virtual machine to do the PintOS project. Both Macintosh and Windows will run just fine. We have yet
More informationHigh Performance Computing (HPC) Using zcluster at GACRC
High Performance Computing (HPC) Using zcluster at GACRC On-class STAT8060 Georgia Advanced Computing Resource Center University of Georgia Zhuofei Hou, HPC Trainer zhuofei@uga.edu Outline What is GACRC?
More informationNew User Seminar: Part 2 (best practices)
New User Seminar: Part 2 (best practices) General Interest Seminar January 2015 Hugh Merz merz@sharcnet.ca Session Outline Submitting Jobs Minimizing queue waits Investigating jobs Checkpointing Efficiency
More informationA Brief Introduction to The Center for Advanced Computing
A Brief Introduction to The Center for Advanced Computing February 8, 2007 Hardware 376 Opteron nodes, over 890 cores Gigabit networking, Myrinet networking, Infiniband networking soon Hardware: nyx nyx
More informationLinux at the Command Line Don Johnson of BU IS&T
Linux at the Command Line Don Johnson of BU IS&T We ll start with a sign in sheet. We ll end with a class evaluation. We ll cover as much as we can in the time allowed; if we don t cover everything, you
More informationIntroduction to HPC Using zcluster at GACRC
Introduction to HPC Using zcluster at GACRC Georgia Advanced Computing Resource Center University of Georgia Zhuofei Hou, HPC Trainer zhuofei@uga.edu Outline What is GACRC? What is HPC Concept? What is
More informationIntroduction to HPC Using zcluster at GACRC
Introduction to HPC Using zcluster at GACRC On-class STAT8330 Georgia Advanced Computing Resource Center University of Georgia Suchitra Pakala pakala@uga.edu Slides courtesy: Zhoufei Hou 1 Outline What
More informationAllinea DDT Debugger. Dan Mazur, McGill HPC March 5,
Allinea DDT Debugger Dan Mazur, McGill HPC daniel.mazur@mcgill.ca guillimin@calculquebec.ca March 5, 2015 1 Outline Introduction and motivation Guillimin login and DDT configuration Compiling for a debugger
More informationBuilding MPI so we can run code on multiple nodes
1 of 8 22.02.2013 13:16 Return to h p://www.soton.ac.uk/~sjc/raspberrypi View video at: h p://www.youtube.com/watch?v=jq5nrhz9i94 Steps to make Raspberry Pi Supercomputer Prof Simon Cox Computa onal Engineering
More information