Introduction to the ITA computer system

Size: px
Start display at page:

Download "Introduction to the ITA computer system"

Transcription

1 Introduction to the ITA computer system Tiago M. D. Pereira Slides: Institute of Theoretical Astrophysics

2 Today s lecture in a nutshell 1. Network and users, connecting 2. Compute resources 3. The module system 4. Parallel computing

3 1. Network and Users, Connecting Network accounts used for all users, central home directory Disk quota in MN home directories ($ quota): files, grace, etc. No disk quota for ITA home directories (but don t abuse it...) Access from outside UiO is blocked to all but a few computers: use login.astro.uio.no or login.uio.no to connect

4 Connecting via ssh ssh: secure shell, provides encrypted terminal connection ssh with many options possible Use scp for copying files: scp Password authentication is default. But much easier with keys!

5 ssh continued: keys Alice Bob's Public Key Combine keys 751A696C 24D97009 Alice's Private Key Bob Alice and Bob's shared secret Alice's Public Key Bob's Private Key Combine keys 751A696C 24D97009 Alice and Bob's shared secret

6 ssh continued: keys ssh-keygen In your computer: ~/.ssh/id_rsa.pub ~/.ssh/id_rsa At UiO computers: ~/.ssh/authorized_keys

7 ssh continued: keys In your Unix computer: $ ssh-keygen -t rsa -b 4096 [Choose passphrase, could be empty] Linux only: $ ssh-copy-id -i ~/.ssh/id_rsa.pub user@login.astro.uio.no MacOS or Linux: $ scp ~/.ssh/id_rsa.pub user@login.astro.uio.no:.ssh/mykey $ ssh user@login.astro.uio.no [user@tsih2 ~]$ cd.ssh [user@tsih2 ~]$ cat mykey >> authorized_keys

8 ssh continued: keys For Windows users, recommended approach is to use PuTTY Download: Set up keys:

9 ssh continued: keys So far we ve used a key in your computer to connect to ITA It is also to use keys in ITA s computers to connect to other ITA So you can ssh internally without having to enter your password! $ ssh user@login.astro.uio.no [user@tsih2 ~]$ ssh-keygen -t rsa -b 4096 (...) [user@tsih2 ~]$ ssh-copy-id -i ~/.ssh/id_rsa.pub tsih2

10 ssh continued: proxying Access via login.astro.uio.no, then ssh to your computer Possible to do this automatically via ~/.ssh/config Host beehive* owl* euclid* ForwardX11 yes ProxyCommand ssh -XY -W %h:%p ~]$ chmod 600 ~/.ssh/config In general, you can do several ssh proxies or hops (not needed at ITA)

11 ssh exercises Exercise: connect via ssh to login.astro.uio.no and find out the location of your home directory. Is it at ITA or at MN? Exercise: generate ssh keys in your computer and use them to connect to login.astro.uio.no without entering your password Exercise: set up ssh proxying so you can connect to beehive4.uio.no via login.astro.uio.no

12 ssh continued: X11 forwarding By default ssh is only text terminal. But possible to show graphical programs in your laptop/computer screen (X11 forwarding) $ ssh -XY user@tsih.uio.no [user@tsih ~]$ xeyes X11 forwarding is slow because bitstream sent uncompressed, not usually good enough for movies / dynamic GUIs vnc is a much better option if you want to have remote graphical control of a machine

13 ssh exercises (2) Exercise: connect to login.astro.uio.no and start up xeyes (a graphical programme). Make sure it opens up in your screen! Exercise: from login.astro.uio.no connect to your workstation and start another graphical programme (a browser?).

14 ssh continued: vnc vnc can be used to control the full desktop of a remote computer (can only use it for your own desktop) It is efficient because compression is used Different programmes in different operative systems MacOS: Finder > Go > Connect to server... vnc://hostname.uio.no In general, this will not work out of the box because direct traffic is blocked (see ssh): need ssh tunnel

15 ssh continued: tunnelling Ssh tunnelling is a way to connect to a port in a remote machine using ssh and remaping to a local port Can be used in many different ways and scenarios For vnc server running at hostname.uio.no: $ ssh -fn -L 5091:localhost:5900 hostname.uio.no No terminal Local port Remote port Ideally, with ssh proxy

16 ssh continued: tunnelling

17 ssh continued: tunnelling For jupyter notebook running at hostname.uio.no $ ssh user@hostname.uio.no [user@hostname] $ jupyter notebook --no-browser (...) In a different terminal set up ssh tunnel: $ ssh -fn -L 9999:localhost:8888 hostname.uio.no Finally, run jupyter from your browser: Recommended with %matplotlib inline backend

18 ssh exercises (3) Exercise: connect to beehive4 and start jupyter (may need to $ module load python first). Now set up an ssh tunnel so you can connect to jupyter via your own browser

19 Shell profile scripts When you open up a terminal (or ssh) into Unix machines, initialisation scripts load useful things into the environment Tcsh: /etc/csh.cshrc /etc/csh.login (login shells only) ~/.tcshrc ~/.cshrc (if.tcshrc is not found) ~/.history ~/.login (login shells only) ~/.cshdirs Bash login shell: /etc/profile ~/.bash_profile ~/.bash_login (if no.bash_profile) Bash non-login shell: /etc/bashrc ~/.bashrc

20 Login vs non-login shells Do you have a login or non-login shell: shopt (look for login_shell) Login shells are run when you first connect to a machine Non-login shells are run when you run a new shell from the shell or when you run a non-interactive ssh command (e.g scp, tunnelling) All shells in MacOS are login shells Different profiles can separate initialisation scripts for both scenarios All tcsh/csh scripts also run ~/.tshrc, use #!/bin/csh -f to avoid

21 Shell profile scripts, continued Modify your.tcsh /.bashrc to suit your needs, but don t screw up! Can use ifs inside to separate operative systems / computers unamestr=`uname` if [ "$unamestr" == 'Linux' ]; then echo "This is Linux!" elif [ "$unamestr" == 'Darwin' ]; then echo "This is a Mac!" if [ $HOSTNAME == beehive4.uio.no]; then echo "From beehive4!"

22 Shell profile scripts exercises Exercise: is your current shell login or non-login? Can you get a shell of a different kind? Exercise: modify the bash script below to tcsh to print something when connecting to beehive4 (login shell only): if [ $HOSTNAME == beehive4.uio.no]; then echo "From beehive4!"

23 2. Compute Resources Check out web page for most up-to-date information: Institute has workstations (Linux, Mac) or thin clients (Linux), but also compute nodes (powerful machines with no desktop) Machines for general use have names starting with beehive beehive.uio.no, beehive2.uio.no,..., beehive23.uio.no All beehive machines have 20 cores, 128 GB RAM, infiniband. Load more info:

24 Compute Resources, continued Machines are shared between all users at the Institute, be considerate and follow etiquette: Choose machine with low load at Do NOT use all cores in all machines at once Run top when connecting to a machine to double-check usage Avoid using more processes than cores If some user taking up a lot, notify her/him if you need to run stuff Check top to find out about your CPU and memory usage

25 Compute Resources, continued Additional clusters available for some groups: ask supervisor! Some beehive nodes are special, e.g. beehive32-gpu, beehive33-gpu: 2x NVIDIA K20 (2496 CUDA cores, 5 GB memory) Large memory (~768 GB) beehive nodes coming soon

26 Compute Resources, exercises Exercise: which beehive node is getting more used right now? Which user is running more things?

27 3. The Module System Most Linux machines at the Institute have the Unix module system module allows loading complex initialisation shell scripts for different software packages Typical commands are: $ module avail show available modules $ module load <name> load a module $ module list show loaded modules

28 The Module System, continue Each typically sets the $PATH, $LD_LIBRARY_PATH, or other important variables Used in most supercomputers, and also at ITA s clusters You can write and use your own module files: $ module load use.own, save modules in ~/privatemodules At ITA, use module for Intel compilers (Intel_parallel_studio) and python (python/3.6 or python/2.7)

29 The module system exercises Exercise: login to beehive4 and load module hdf5. What happens? What modules to you have loaded at the end? Exercise: login to beehive4 and start python. Check version number. Now load python 3.6 module, and recheck python version

30 4. Parallel computing The compute clusters at ITA are made for parallel computing Two major paradigms: OpenMP (shared memory) and MPI (message passing interface, combine different machines) For compiled languages and MPI, recommended to use the Intel compilers (Intel_parallel_studio module), mpiifort, mpiicc In Python, possible to use mpi4py from the system packages (python module)

31 Parallel computing, continued With OpenMP, you can only run on one beehive machine (maximum 20 cores) With MPI, you can run in several beehive machines at the same time (hundreds of cores)

32 Parallel computing, exercises Exercise: check the Institute s IT help web pages and find the page on Setting up MPI in compute clusters. Compile and run the Fortran example on a beehive machine (5 cores) Exercise: following the instructions in the same page, run a Python test script with mpi4py using beehive4 and beehive5 at the same time

33 Slides These slides online:

What is Secure. Authenticated I know who I am talking to. Our communication is Encrypted

What is Secure. Authenticated I know who I am talking to. Our communication is Encrypted Crypto App - SSH 1 What is Secure Authenticated I know who I am talking to Our communication is Encrypted Telnet clear text Servers Terminal clear text Routers SSH encrypted channel encrypted text Servers

More information

Cryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia

Cryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia Cryptography - SSH Network Security Workshop 29-31 May 2017 Phnom Penh, Cambodia What is Safely Authentication I know who I am talking with Our communication is Encrypted Telnet Servers Terminal Routers

More information

Cryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

Cryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea Cryptography - SSH Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 What is Secure Authentication I know who I am talking to Our communication is Encrypted Telnet Servers Terminal

More information

Cryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh

Cryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh Cryptography Application : SSH Cyber Security & Network Security 20-22 March, 2017 Dhaka, Bangladesh Issue Date: [31-12-2015] Revision: [v.1] What is Safely Authentication I am Assured of Which Host I

More information

SSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:

SSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: SSH 25-29 June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: Issue Date: Revision: 1 What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows

More information

PROJECT INFRASTRUCTURE AND BASH INTRODUCTION MARKUS PILMAN<

PROJECT INFRASTRUCTURE AND BASH INTRODUCTION MARKUS PILMAN< PROJECT INFRASTRUCTURE AND BASH INTRODUCTION MARKUS PILMAN< MPILMAN@INF.ETHZ.CH> ORGANIZATION Tutorials on Tuesdays - Sometimes, will be announced In General: no exercise sessions (unless you get an email

More information

CMTH/TYC Linux Cluster Overview. Éamonn Murray 1 September 2017

CMTH/TYC Linux Cluster Overview. Éamonn Murray 1 September 2017 CMTH/TYC Linux Cluster Overview Éamonn Murray 1 September 2017 Cluster Documentation Everything I ll talk about is covered in the cluster documentation Web: http://www.cmth.ph.ic.ac.uk/computing Local

More information

Cryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan

Cryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan Cryptography Application : SSH 7 Sept 2017, Taichung, Taiwan What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows Who I Am The Traffic is Encrypted

More information

Supercomputing environment TMA4280 Introduction to Supercomputing

Supercomputing environment TMA4280 Introduction to Supercomputing Supercomputing environment TMA4280 Introduction to Supercomputing NTNU, IMF February 21. 2018 1 Supercomputing environment Supercomputers use UNIX-type operating systems. Predominantly Linux. Using a shell

More information

Graham vs legacy systems

Graham vs legacy systems New User Seminar Graham vs legacy systems This webinar only covers topics pertaining to graham. For the introduction to our legacy systems (Orca etc.), please check the following recorded webinar: SHARCNet

More information

Tutorial: SSH. Secure SHell: Connect remotely anything, anywhere. UL High Performance Computing (HPC) Team Sebastien Varrette

Tutorial: SSH. Secure SHell: Connect remotely anything, anywhere. UL High Performance Computing (HPC) Team Sebastien Varrette Secure SHell: Connect remotely anything, anywhere UL High Performance Computing (HPC) Team Sebastien Varrette University of Luxembourg (UL), Luxembourg http://hpc.uni.lu 1 / 26 Summary 1 Introduction 2

More information

Workstations & Thin Clients

Workstations & Thin Clients 1 Workstations & Thin Clients Overview Why use a BioHPC computer? System Specs Network requirements OS Tour Running Code Locally Submitting Jobs to the Cluster Run Graphical Jobs on the Cluster Use Windows

More information

2-1-1 ssh Secure SHell

2-1-1 ssh Secure SHell 2-1-1 ssh Secure SHell Using Public Key Cryptography Keying, Key Exchange, and Session Setup Communicate Safely with Remote Systems What is Safely Authentication I am Assured of Which Host I am Talking

More information

UL HPC School 2017[bis] PS1: Getting Started on the UL HPC platform

UL HPC School 2017[bis] PS1: Getting Started on the UL HPC platform UL HPC School 2017[bis] PS1: Getting Started on the UL HPC platform UL High Performance Computing (HPC) Team C. Parisot University of Luxembourg (UL), Luxembourg http://hpc.uni.lu 1 / 34 Latest versions

More information

2-1-1 ssh Secure SHell

2-1-1 ssh Secure SHell 2-1-1 ssh Secure SHell Using Public Key Cryptography Keying, Key Exchange, and Session Setup 1 Communicate Safely with Remote Systems 2 What is Safely Authentication I am Assured of Which Host I am Talking

More information

MVAPICH MPI and Open MPI

MVAPICH MPI and Open MPI CHAPTER 6 The following sections appear in this chapter: Introduction, page 6-1 Initial Setup, page 6-2 Configure SSH, page 6-2 Edit Environment Variables, page 6-5 Perform MPI Bandwidth Test, page 6-8

More information

Introduction to Joker Cyber Infrastructure Architecture Team CIA.NMSU.EDU

Introduction to Joker Cyber Infrastructure Architecture Team CIA.NMSU.EDU Introduction to Joker Cyber Infrastructure Architecture Team CIA.NMSU.EDU What is Joker? NMSU s supercomputer. 238 core computer cluster. Intel E-5 Xeon CPUs and Nvidia K-40 GPUs. InfiniBand innerconnect.

More information

Unix. Examples: OS X and Ubuntu

Unix. Examples: OS X and Ubuntu The Command Line A terminal is at the end of an electric wire, a shell is the home of a turtle, tty is a strange abbreviation, and a console is a kind of cabinet. - Some person on SO Learning Resources

More information

A Prototype CPU-GPU Cluster for Research in High Performance Computing and Visualization of Large Scale Applications

A Prototype CPU-GPU Cluster for Research in High Performance Computing and Visualization of Large Scale Applications A Prototype CPU-GPU Cluster for Research in High Performance Computing and Visualization of Large Scale Applications Fritz McCall fmccall@umiacs.umd.edu Brad Erdman chef@umiacs.umd.edu Cluster Goals GPUs

More information

Introduction to Linux Workshop 2. The George Washington University SEAS Computing Facility

Introduction to Linux Workshop 2. The George Washington University SEAS Computing Facility Introduction to Linux Workshop 2 The George Washington University SEAS Computing Facility Course Goals SSH and communicating with other machines Public/Private key generation,.ssh directory, and the config

More information

FEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs

FEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs FEPS SSH Access with Two-Factor Authentication RSA Key-pairs access.eps.surrey.ac.uk Contents: Introduction - 3 RSA Key-pairs - 3 Where can I use my RSA Key-Pair? - 3 Step 1 Prepare to generate your RSA

More information

Tutorial on MPI: part I

Tutorial on MPI: part I Workshop on High Performance Computing (HPC08) School of Physics, IPM February 16-21, 2008 Tutorial on MPI: part I Stefano Cozzini CNR/INFM Democritos and SISSA/eLab Agenda first part WRAP UP of the yesterday's

More information

Project #6: Using ssh, scp and sftp with Key-Based Authentication

Project #6: Using ssh, scp and sftp with Key-Based Authentication Project #6: Using ssh, scp and sftp with Key-Based Authentication ssh, scp and sftp Going beyond Password Protection Creating Keys Creating Keys with a Passphrase Using Key-Based Authentication in Our

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 3: UNIX Operating System Organization Tian Guo CICS, Umass Amherst 1 Reminders Assignment 2 is due THURSDAY 09/24 at 3:45 pm Directions are on the website

More information

An Overview of SSH. Presentation to Linux Users of Victoria. Melbourne, August 26, 2017

An Overview of SSH. Presentation to Linux Users of Victoria. Melbourne, August 26, 2017 An Overview of SSH Presentation to Linux Users of Victoria Melbourne, August 26, 2017 http://levlafayette.com Utilisation and Rationale The most common use of SSH (secure shell) is remote login access

More information

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Adobe Marketing Using FTP and sftp with the Adobe Marketing Contents Using FTP and sftp with the Adobe Marketing...3 Setting Up FTP Accounts Hosted by Adobe...3 Classifications...3 Data Sources...4 Data

More information

Most of the programming assignments in CS 2505 will require using the C language. We will use a (relatively) current version of the GCC C compiler.

Most of the programming assignments in CS 2505 will require using the C language. We will use a (relatively) current version of the GCC C compiler. Programming Tools 1 Most of the programming assignments in CS 2505 will require using the C language. We will use a (relatively) current version of the GCC C compiler. What s GCC? - the Gnu Compiler Collection

More information

HPC Account and Software Setup

HPC Account and Software Setup HPC Account and Software Setup Ken-ichi Nomura MAGICS 2 nd Workshop at USC March 2, 2018 Wireless Network Configuration 1. USC Secure Wireless 2. eduroam 3. MAGICS@USC password: magics@usc 4. USC Guest

More information

Computing with the Moore Cluster

Computing with the Moore Cluster Computing with the Moore Cluster Edward Walter An overview of data management and job processing in the Moore compute cluster. Overview Getting access to the cluster Data management Submitting jobs (MPI

More information

Bash Tutorial. ASL Fall 2017 Week 2

Bash Tutorial. ASL Fall 2017 Week 2 Bash Tutorial ASL Fall 2017 Week 2 Comments from previous years I had to stay up all night to run experiments! I cannot work on this from home.. It took me more than 40hrs./week to work on this. Solution

More information

Programming Tools. Computer Organization Tools. Most of the programming assignments will require using the C language.

Programming Tools. Computer Organization Tools. Most of the programming assignments will require using the C language. Programming Tools Tools 1 Most of the programming assignments will require using the C language. We will use a current version of the GCC C compiler. What s GCC? - the Gnu Compiler Collection (see gcc.gnu.org)

More information

Introduction to Cuda Visualization. Graphical Application Tunnelling on Palmetto

Introduction to Cuda Visualization. Graphical Application Tunnelling on Palmetto Introduction to Cuda Visualization The CUDA programming paradigm is NVidia's development tool which is used to enable advanced computer processing on their GPGPU (General Purpose graphics Processing Units)

More information

Our Workshop Environment

Our Workshop Environment Our Workshop Environment John Urbanic Parallel Computing Scientist Pittsburgh Supercomputing Center Copyright 2017 Our Environment This Week Your laptops or workstations: only used for portal access Bridges

More information

ssh and handson Matsuzaki maz Yoshinobu 1

ssh and handson Matsuzaki maz Yoshinobu  1 ssh and handson Matsuzaki maz Yoshinobu maz@iij.ad.jp 1 Secure Shell (ssh) Replacement for unsecure tools/protocols rsh and telnet Usually listen on tcp/22 Whole communication is encrypted

More information

Introduction to the NCAR HPC Systems. 25 May 2018 Consulting Services Group Brian Vanderwende

Introduction to the NCAR HPC Systems. 25 May 2018 Consulting Services Group Brian Vanderwende Introduction to the NCAR HPC Systems 25 May 2018 Consulting Services Group Brian Vanderwende Topics to cover Overview of the NCAR cluster resources Basic tasks in the HPC environment Accessing pre-built

More information

Using a Linux System 6

Using a Linux System 6 Canaan User Guide Connecting to the Cluster 1 SSH (Secure Shell) 1 Starting an ssh session from a Mac or Linux system 1 Starting an ssh session from a Windows PC 1 Once you're connected... 1 Ending an

More information

Our Workshop Environment

Our Workshop Environment Our Workshop Environment John Urbanic Parallel Computing Scientist Pittsburgh Supercomputing Center Copyright 2017 Our Environment This Week Your laptops or workstations: only used for portal access Bridges

More information

Secure SHell Explained!

Secure SHell Explained! Open Gurus How To Secure SHell Explained! Here re some insights into SSH (Secure Shell), an essential tool for accessing remote machines. S SH is used to access or log in to a remote machine on the network,

More information

Using Cartesius and Lisa. Zheng Meyer-Zhao - Consultant Clustercomputing

Using Cartesius and Lisa. Zheng Meyer-Zhao - Consultant Clustercomputing Zheng Meyer-Zhao - zheng.meyer-zhao@surfsara.nl Consultant Clustercomputing Outline SURFsara About us What we do Cartesius and Lisa Architectures and Specifications File systems Funding Hands-on Logging

More information

Setting up a Chaincoin Masternode

Setting up a Chaincoin Masternode Setting up a Chaincoin Masternode Introduction So you want to set up your own Chaincoin Masternode? You ve come to the right place! These instructions are correct as of April, 2017, and relate to version

More information

Introduction to High-Performance Computing (HPC)

Introduction to High-Performance Computing (HPC) Introduction to High-Performance Computing (HPC) Computer components CPU : Central Processing Unit cores : individual processing units within a CPU Storage : Disk drives HDD : Hard Disk Drive SSD : Solid

More information

Our Workshop Environment

Our Workshop Environment Our Workshop Environment John Urbanic Parallel Computing Scientist Pittsburgh Supercomputing Center Copyright 2018 Our Environment Today Your laptops or workstations: only used for portal access Bridges

More information

Systems Programming/ C and UNIX

Systems Programming/ C and UNIX Systems Programming/ C and UNIX Alice E. Fischer Lecture 6: Processes October 9, 2017 Alice E. FischerLecture 6: Processes Lecture 5: Processes... 1/26 October 9, 2017 1 / 26 Outline 1 Processes 2 Process

More information

DogeCash Masternode Setup Guide Version 1.2 (Ubuntu 16.04)

DogeCash Masternode Setup Guide Version 1.2 (Ubuntu 16.04) DogeCash Masternode Setup Guide Version 1.2 (Ubuntu 16.04) This guide will assist you in setting up a DogeCash Masternode on a Linux Server running Ubuntu 16.04. (Use at your own risk) If you require further

More information

Our Workshop Environment

Our Workshop Environment Our Workshop Environment John Urbanic Parallel Computing Scientist Pittsburgh Supercomputing Center Copyright 2016 Our Environment This Week Your laptops or workstations: only used for portal access Bridges

More information

No More Passwords (with SSH)

No More Passwords (with SSH) No More Passwords (with SSH) Ted Dustman March 30, 2009 Contents 1 Introduction 1 1.1 Local or Remote?................................. 1 1.2 SSH Command Set................................ 1 2 Authentication

More information

HPC Introductory Course - Exercises

HPC Introductory Course - Exercises HPC Introductory Course - Exercises The exercises in the following sections will guide you understand and become more familiar with how to use the Balena HPC service. Lines which start with $ are commands

More information

Introduction to BioHPC

Introduction to BioHPC Introduction to BioHPC New User Training [web] [email] portal.biohpc.swmed.edu biohpc-help@utsouthwestern.edu 1 Updated for 2015-06-03 Overview Today we re going to cover: What is BioHPC? How do I access

More information

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical

More information

Singularity: container formats

Singularity: container formats Singularity Easy to install and configure Easy to run/use: no daemons no root works with scheduling systems User outside container == user inside container Access to host resources Mount (parts of) filesystems

More information

Bastion Hosts. Protected Access for Virtual Cloud Networks O R A C L E W H I T E P A P E R F E B R U A R Y

Bastion Hosts. Protected Access for Virtual Cloud Networks O R A C L E W H I T E P A P E R F E B R U A R Y Bastion Hosts Protected Access for Virtual Cloud Networks O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 8 Disclaimer The following is intended to outline our general product direction. It is intended

More information

Our Workshop Environment

Our Workshop Environment Our Workshop Environment John Urbanic Parallel Computing Scientist Pittsburgh Supercomputing Center Copyright 2018 Our Environment This Week Your laptops or workstations: only used for portal access Bridges

More information

Using bash. Administrative Shell Scripting COMP2101 Fall 2017

Using bash. Administrative Shell Scripting COMP2101 Fall 2017 Using bash Administrative Shell Scripting COMP2101 Fall 2017 Bash Background Bash was written to replace the Bourne shell The Bourne shell (sh) was not a good candidate for rewrite, so bash was a completely

More information

Image Sharpening. Practical Introduction to HPC Exercise. Instructions for Cirrus Tier-2 System

Image Sharpening. Practical Introduction to HPC Exercise. Instructions for Cirrus Tier-2 System Image Sharpening Practical Introduction to HPC Exercise Instructions for Cirrus Tier-2 System 2 1. Aims The aim of this exercise is to get you used to logging into an HPC resource, using the command line

More information

Our Workshop Environment

Our Workshop Environment Our Workshop Environment John Urbanic Parallel Computing Scientist Pittsburgh Supercomputing Center Copyright 2017 Our Environment This Week Your laptops or workstations: only used for portal access Bridges

More information

LAB #5 Intro to Linux and Python on ENGR

LAB #5 Intro to Linux and Python on ENGR LAB #5 Intro to Linux and Python on ENGR 1. Pre-Lab: In this lab, we are going to download some useful tools needed throughout your CS career. First, you need to download a secure shell (ssh) client for

More information

Preparing Your Google Cloud VM for W4705

Preparing Your Google Cloud VM for W4705 Preparing Your Google Cloud VM for W4705 August 27, 2017 1. Get a cloud.cs.columbia.edu account 1. Sign up for a cloud Columbia CS account using this link. Note that is is an entirely new account and is

More information

SUG Breakout Session: OSC OnDemand App Development

SUG Breakout Session: OSC OnDemand App Development SUG Breakout Session: OSC OnDemand App Development Basil Mohamed Gohar Web and Interface Applications Manager Eric Franz Senior Engineer & Technical Lead This work is supported by the National Science

More information

Introduction to the SHARCNET Environment May-25 Pre-(summer)school webinar Speaker: Alex Razoumov University of Ontario Institute of Technology

Introduction to the SHARCNET Environment May-25 Pre-(summer)school webinar Speaker: Alex Razoumov University of Ontario Institute of Technology Introduction to the SHARCNET Environment 2010-May-25 Pre-(summer)school webinar Speaker: Alex Razoumov University of Ontario Institute of Technology available hardware and software resources our web portal

More information

Quick Start Guide for Intel FPGA Development Tools on the Microsoft* Azure* Platform

Quick Start Guide for Intel FPGA Development Tools on the Microsoft* Azure* Platform Quick Start Guide for Intel FPGA Development Tools on the Microsoft* Azure* Platform Updated for Intel Quartus Prime Design Suite: 17.1 Subscribe Send Feedback Latest document on the web: PDF HTML Contents

More information

STARTING THE DDT DEBUGGER ON MIO, AUN, & MC2. (Mouse over to the left to see thumbnails of all of the slides)

STARTING THE DDT DEBUGGER ON MIO, AUN, & MC2. (Mouse over to the left to see thumbnails of all of the slides) STARTING THE DDT DEBUGGER ON MIO, AUN, & MC2 (Mouse over to the left to see thumbnails of all of the slides) ALLINEA DDT Allinea DDT is a powerful, easy-to-use graphical debugger capable of debugging a

More information

Cluster Clonetroop: HowTo 2014

Cluster Clonetroop: HowTo 2014 2014/02/25 16:53 1/13 Cluster Clonetroop: HowTo 2014 Cluster Clonetroop: HowTo 2014 This section contains information about how to access, compile and execute jobs on Clonetroop, Laboratori de Càlcul Numeric's

More information

Copyright 2013

Copyright 2013 This video will look at 9 of the biggest new features in Windows Server 2012. Understanding what is available will help decide if Windows Server 2012 is the right choice for you. New Features This video

More information

Practical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February

Practical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February Practical Magic with SSH By David F. Skoll Roaring Penguin Software Inc. 1 February 2001 http://www.roaringpenguin.com dfs@roaringpenguin.com Overview of Presentation Why SSH? Problems with Telnet & Friends

More information

Introduction to the Cluster

Introduction to the Cluster Follow us on Twitter for important news and updates: @ACCREVandy Introduction to the Cluster Advanced Computing Center for Research and Education http://www.accre.vanderbilt.edu The Cluster We will be

More information

EE516: Embedded Software Project 1. Setting Up Environment for Projects

EE516: Embedded Software Project 1. Setting Up Environment for Projects EE516: Embedded Software Project 1. Setting Up Environment for Projects By Dong Jae Shin 2015. 09. 01. Contents Introduction to Projects of EE516 Tasks Setting Up Environment Virtual Machine Environment

More information

Exercise 1: Connecting to BW using ssh: NOTE: $ = command starts here, =means one space between words/characters.

Exercise 1: Connecting to BW using ssh: NOTE: $ = command starts here, =means one space between words/characters. Exercise 1: Connecting to BW using ssh: NOTE: $ = command starts here, =means one space between words/characters. Before you login to the Blue Waters system, make sure you have the following information

More information

Basic UNIX commands. HORT Lab 2 Instructor: Kranthi Varala

Basic UNIX commands. HORT Lab 2 Instructor: Kranthi Varala Basic UNIX commands HORT 59000 Lab 2 Instructor: Kranthi Varala Client/Server architecture User1 User2 User3 Server (UNIX/ Web/ Database etc..) User4 High Performance Compute (HPC) cluster User1 Compute

More information

Intel Manycore Testing Lab (MTL) - Linux Getting Started Guide

Intel Manycore Testing Lab (MTL) - Linux Getting Started Guide Intel Manycore Testing Lab (MTL) - Linux Getting Started Guide Introduction What are the intended uses of the MTL? The MTL is prioritized for supporting the Intel Academic Community for the testing, validation

More information

MD Workflow Single System Tutorial (LINUX OPERATION GPU Cluster) Written by Pek Ieong

MD Workflow Single System Tutorial (LINUX OPERATION GPU Cluster) Written by Pek Ieong MD Workflow Single System Tutorial (LINUX OPERATION GPU Cluster) Written by Pek Ieong The purpose of this tutorial is to introduce the Amber GPU Molecular Dynamic (MD) Kepler workflow developed by NBCR

More information

CS451 - Assignment 8 Faster Naive Bayes? Say it ain t so...

CS451 - Assignment 8 Faster Naive Bayes? Say it ain t so... CS451 - Assignment 8 Faster Naive Bayes? Say it ain t so... Part 1 due: Friday, Nov. 8 before class Part 2 due: Monday, Nov. 11 before class Part 3 due: Sunday, Nov. 17 by 11:50pm http://www.hadoopwizard.com/what-is-hadoop-a-light-hearted-view/

More information

Create Test Environment

Create Test Environment Create Test Environment Describes how to set up the Trafodion test environment used by developers and testers Prerequisites Python Passwordless ssh If you already have an existing set of ssh keys If you

More information

Environment, Scripts, ssh, and all that stuff

Environment, Scripts, ssh, and all that stuff Environment, Scripts, ssh, and all that stuff GECO User Group Meeting April 16, 2009 Timothy H. Kaiser, Ph.D. http://geco.mines.edu/newsletters/ 1 Topics Introductions Free stuff Environment Scripting

More information

CS CS Tutorial 2 2 Winter 2018

CS CS Tutorial 2 2 Winter 2018 CS CS 230 - Tutorial 2 2 Winter 2018 Sections 1. Unix Basics and connecting to CS environment 2. MIPS Introduction & CS230 Interface 3. Connecting Remotely If you haven t set up a CS environment password,

More information

Using the computational resources at the GACRC

Using the computational resources at the GACRC An introduction to zcluster Georgia Advanced Computing Resource Center (GACRC) University of Georgia Dr. Landau s PHYS4601/6601 course - Spring 2017 What is GACRC? Georgia Advanced Computing Resource Center

More information

Introduc)on to Hyades

Introduc)on to Hyades Introduc)on to Hyades Shawfeng Dong Department of Astronomy & Astrophysics, UCSSC Hyades 1 Hardware Architecture 2 Accessing Hyades 3 Compu)ng Environment 4 Compiling Codes 5 Running Jobs 6 Visualiza)on

More information

CSC- Bioweek 2018 Using cpouta for cloud computing Kimmo Mattila, Shubham Kapoor, Ari-Matti Saren (Jukka Nousiainen)

CSC- Bioweek 2018 Using cpouta for cloud computing Kimmo Mattila, Shubham Kapoor, Ari-Matti Saren (Jukka Nousiainen) CSC- Bioweek 2018 Using cpouta for cloud computing 8.2.2018 Kimmo Mattila, Shubham Kapoor, Ari-Matti Saren (Jukka Nousiainen) CSC Finnish research, education and public administration ICT knowledge centre

More information

Security with SSH. Network Startup Resource Center

Security with SSH. Network Startup Resource Center Security with SSH Network Startup Resource Center http://www.nsrc.org/ These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Introduction to the Cluster

Introduction to the Cluster Introduction to the Cluster Advanced Computing Center for Research and Education http://www.accre.vanderbilt.edu Follow us on Twitter for important news and updates: @ACCREVandy The Cluster We will be

More information

User Guide Version 2.0

User Guide Version 2.0 User Guide Version 2.0 Page 2 of 8 Summary Contents 1 INTRODUCTION... 3 2 SECURESHELL (SSH)... 4 2.1 ENABLING SSH... 4 2.2 DISABLING SSH... 4 2.2.1 Change Password... 4 2.2.2 Secure Shell Connection Information...

More information

A Brief Introduction to The Center for Advanced Computing

A Brief Introduction to The Center for Advanced Computing A Brief Introduction to The Center for Advanced Computing May 1, 2006 Hardware 324 Opteron nodes, over 700 cores 105 Athlon nodes, 210 cores 64 Apple nodes, 128 cores Gigabit networking, Myrinet networking,

More information

Introduction to High Performance Computing at UEA. Chris Collins Head of Research and Specialist Computing ITCS

Introduction to High Performance Computing at UEA. Chris Collins Head of Research and Specialist Computing ITCS Introduction to High Performance Computing at UEA. Chris Collins Head of Research and Specialist Computing ITCS Introduction to High Performance Computing High Performance Computing at UEA http://rscs.uea.ac.uk/hpc/

More information

System Programming. Unix Shells

System Programming. Unix Shells Content : Unix shells by Dr. A. Habed School of Computer Science University of Windsor adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction 2 Interactive and non-interactive

More information

Introduction to Discovery.

Introduction to Discovery. Introduction to Discovery http://discovery.dartmouth.edu The Discovery Cluster 2 Agenda What is a cluster and why use it Overview of computer hardware in cluster Help Available to Discovery Users Logging

More information

Lecture 4. Log into Linux Reminder: Homework 1 due today, 4:30pm Homework 2 out, due next Tuesday Project 1 out, due next Thursday Questions?

Lecture 4. Log into Linux Reminder: Homework 1 due today, 4:30pm Homework 2 out, due next Tuesday Project 1 out, due next Thursday Questions? Lecture 4 Log into Linux Reminder: Homework 1 due today, 4:30pm Homework 2 out, due next Tuesday Project 1 out, due next Thursday Questions? Tuesday, September 7 CS 375 UNIX System Programming - Lecture

More information

Effective Use of CCV Resources

Effective Use of CCV Resources Effective Use of CCV Resources Mark Howison User Services & Support This talk... Assumes you have some familiarity with a Unix shell Provides examples and best practices for typical usage of CCV systems

More information

INTRODUCTION TO THE CLUSTER

INTRODUCTION TO THE CLUSTER INTRODUCTION TO THE CLUSTER WHAT IS A CLUSTER? A computer cluster consists of a group of interconnected servers (nodes) that work together to form a single logical system. COMPUTE NODES GATEWAYS SCHEDULER

More information

UoW HPC Quick Start. Information Technology Services University of Wollongong. ( Last updated on October 10, 2011)

UoW HPC Quick Start. Information Technology Services University of Wollongong. ( Last updated on October 10, 2011) UoW HPC Quick Start Information Technology Services University of Wollongong ( Last updated on October 10, 2011) 1 Contents 1 Logging into the HPC Cluster 3 1.1 From within the UoW campus.......................

More information

The TinyHPC Cluster. Mukarram Ahmad. Abstract

The TinyHPC Cluster. Mukarram Ahmad. Abstract The TinyHPC Cluster Mukarram Ahmad Abstract TinyHPC is a beowulf class high performance computing cluster with a minor physical footprint yet significant computational capacity. The system is of the shared

More information

A Hands-On Tutorial: RNA Sequencing Using High-Performance Computing

A Hands-On Tutorial: RNA Sequencing Using High-Performance Computing A Hands-On Tutorial: RNA Sequencing Using Computing February 11th and 12th, 2016 1st session (Thursday) Preliminaries: Linux, HPC, command line interface Using HPC: modules, queuing system Presented by:

More information

Introduction to Linux Part 2b: basic scripting. Brett Milash and Wim Cardoen CHPC User Services 18 January, 2018

Introduction to Linux Part 2b: basic scripting. Brett Milash and Wim Cardoen CHPC User Services 18 January, 2018 Introduction to Linux Part 2b: basic scripting Brett Milash and Wim Cardoen CHPC User Services 18 January, 2018 Overview Scripting in Linux What is a script? Why scripting? Scripting languages + syntax

More information

CSCI 350 Virtual Machine Setup Guide

CSCI 350 Virtual Machine Setup Guide CSCI 350 Virtual Machine Setup Guide This guide will take you through the steps needed to set up the virtual machine to do the PintOS project. Both Macintosh and Windows will run just fine. We have yet

More information

High Performance Computing (HPC) Using zcluster at GACRC

High Performance Computing (HPC) Using zcluster at GACRC High Performance Computing (HPC) Using zcluster at GACRC On-class STAT8060 Georgia Advanced Computing Resource Center University of Georgia Zhuofei Hou, HPC Trainer zhuofei@uga.edu Outline What is GACRC?

More information

New User Seminar: Part 2 (best practices)

New User Seminar: Part 2 (best practices) New User Seminar: Part 2 (best practices) General Interest Seminar January 2015 Hugh Merz merz@sharcnet.ca Session Outline Submitting Jobs Minimizing queue waits Investigating jobs Checkpointing Efficiency

More information

A Brief Introduction to The Center for Advanced Computing

A Brief Introduction to The Center for Advanced Computing A Brief Introduction to The Center for Advanced Computing February 8, 2007 Hardware 376 Opteron nodes, over 890 cores Gigabit networking, Myrinet networking, Infiniband networking soon Hardware: nyx nyx

More information

Linux at the Command Line Don Johnson of BU IS&T

Linux at the Command Line Don Johnson of BU IS&T Linux at the Command Line Don Johnson of BU IS&T We ll start with a sign in sheet. We ll end with a class evaluation. We ll cover as much as we can in the time allowed; if we don t cover everything, you

More information

Introduction to HPC Using zcluster at GACRC

Introduction to HPC Using zcluster at GACRC Introduction to HPC Using zcluster at GACRC Georgia Advanced Computing Resource Center University of Georgia Zhuofei Hou, HPC Trainer zhuofei@uga.edu Outline What is GACRC? What is HPC Concept? What is

More information

Introduction to HPC Using zcluster at GACRC

Introduction to HPC Using zcluster at GACRC Introduction to HPC Using zcluster at GACRC On-class STAT8330 Georgia Advanced Computing Resource Center University of Georgia Suchitra Pakala pakala@uga.edu Slides courtesy: Zhoufei Hou 1 Outline What

More information

Allinea DDT Debugger. Dan Mazur, McGill HPC March 5,

Allinea DDT Debugger. Dan Mazur, McGill HPC  March 5, Allinea DDT Debugger Dan Mazur, McGill HPC daniel.mazur@mcgill.ca guillimin@calculquebec.ca March 5, 2015 1 Outline Introduction and motivation Guillimin login and DDT configuration Compiling for a debugger

More information

Building MPI so we can run code on multiple nodes

Building MPI so we can run code on multiple nodes 1 of 8 22.02.2013 13:16 Return to h p://www.soton.ac.uk/~sjc/raspberrypi View video at: h p://www.youtube.com/watch?v=jq5nrhz9i94 Steps to make Raspberry Pi Supercomputer Prof Simon Cox Computa onal Engineering

More information