Abstract

We present a new environment for computations in particle physics phenomenology employing recent developments in cloud computing. On this environment users can create and manage “virtual” machines on which the phenomenology codes/tools can be deployed easily in an automated way. We analyze the performance of this environment based on “virtual” machines versus the utilization of physical hardware. In this way we provide a qualitative result for the influence of the host operating system on the performance of a representative set of applications for phenomenology calculations.

Highlights

  • Particle physics is one of the main driving forces in the development of computing and data distribution tools for advanced users

  • The use of an open-source software allows us to adapt the services to better suit the needs of a scientific computing environment: we have expanded the authentication of Keystone to support Virtual Organization Management System (VOMS) and LDAP-based identities as shown in Appendix A and we have developed an image contextualization service with a web interface built on top of Horizon

  • We have described a new computing environment for particle physics phenomenology that can be translated to other branches of science

Read more

Summary

Introduction

Particle physics is one of the main driving forces in the development of computing and data distribution tools for advanced users. The inclusion of new modules to the software package needs to be done in such a way that these legacy parts remain untouched as much as possible, because its modification would affect all modules already present in ways sometimes very difficult to disentangle, or to predict All this reflects in difficulties when it comes to compile those codes together with more modern ones. This reflects situations of competitiveness between groups, and the fact that the knowledge of the group often resides in the developed code, and needs to be protected due to Intellectual Property Rights (IPR) In such situations only the executable binaries are made externally available by the collaboration, which poses limitations on the architecture and operating systems, library versions, etc. The very technical details about authentication and user authorization as well as detailed numbers about our comparisons can be found in Appendices A and B

OpenStack deployment
Image contextualization
The physics problem
The computer codes and program flow
Performance analysis
Single process on multicore virtual machines
Multiple simultaneous processes on multicore virtual machines
Use case
MPI parallelization
Conclusions
Authentication
VOMS authentication
Findings
LDAP authentication
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call