Computer Science ›› 2019, Vol. 46 ›› Issue (1): 1-5.doi: 10.11896/j.issn.1002-137X.2019.01.001

• Surveys •     Next Articles

State-of-the-art Analysis and Perspectives of 2018 China HPC Development

ZHANG Yun-quan   

  1. (State Key Laboratory of Computer Architecture,Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100190,China)
  • Received:2018-12-25 Online:2019-01-15 Published:2019-02-25

Abstract: Based on the data of China’s high performance computer TOP100 rankings published in November 2018,this paper made an in-depth analysis of the current development status of high performance computers in China from the overall performance,manufacturer,industry and other aspects.The average Linpack performance of TOP100 in China continues to be higher than that of the international TOP500,and the threshold for entry performance of TOP100 still exceeds that of TOP500.China’s supercomputing system on TOP100 has almost all been a domestic supercomputer system,and the Shuguang and Lenovo have become the champion on the number of systems on Top100.The situation of the three strong hegemony of Shuguang,Lenovo and Inspur continues to be maintained and strengthened.On the basis of this,according to the performance data of the seventeenth ranking list,this paper analyzed and predicted the development trend of high-performance computers in mainland China in the future.According to the new data,we believe that machines with peak Exa ops will appear between 2018 and 2019;machines with peaks of 10 Exa ops will appear between 2022 and 2023;machines with peaks of 100 Exa ops will appear between 2024 and 2025.

Key words: High performance computer, TOP100, Ranking, Performance, Analysis

CLC Number: 

  • TP38
[1]MEUER H,SIMON H,STROHMAIER E,et al.TOP500 Supercomputer Sites[OL].http://www.top500.org.<br /> [2]张云泉,孙家昶,袁国兴,等.中国高性能计算机TOP100排行榜[OL].http://www.samss.org.cn.<br /> [3]DONGARRA J.An Overview of High Performance Computing and Challenges for the Future[OL].http://www.netlib.org/utk/people/JackDongarra/SLIDES/siam-0708.pdf.<br /> [4]PETITET A,WHALEY C,DONGARRA J,et al.HPL Benchmark 2.0[OL].http://netlib.org/benchmark/hpl.<br /> [5]ZHANG Y Q,SUN J C,YUAN G X,et al.A Brief Introduction to China HPC TOP100:from 2002 to 2006[C]//Asian Techno-logy Information Programs.ACM,2007:32-36.<br /> [6]ZHANG Y Q,SUN J C,YUAN G X,et al.Perspectives of China’s HPC system development:a view from the 2009 China HPC TOP100 list[J].Frontiers of Computer Science in China,2010,4(4):437-444.
[1] ZHANG Bin-bin, WANG Juan, YUE Kun, WU Hao, HAO Jia. Performance Prediction and Configuration Optimization of Virtual Machines Based on Random Forest [J]. Computer Science, 2019, 46(9): 85-92.
[2] GUO Qi, CUI Jing-song. Covert Communication Method Based on Closed Source Streaming Media [J]. Computer Science, 2019, 46(9): 150-155.
[3] YANG Li-peng, ZHANG Yang-sen, ZHANG Wen, WANG Jian, ZENG Jian-rong. Web Log Analysis Method Based on Storm Real-time Streaming Computing Framework [J]. Computer Science, 2019, 46(9): 176-183.
[4] SUN Zhong-feng, WANG Jing. RCNN-BGRU-HN Network Model for Aspect-based Sentiment Analysis [J]. Computer Science, 2019, 46(9): 223-228.
[5] LU Xian-guang, DU Xue-hui, WANG Wen-juan. Alert Correlation Algorithm Based on Improved FP Growth [J]. Computer Science, 2019, 46(8): 64-70.
[6] ZHANG Yan-hong, ZHANG Chun-guang, ZHOU Xiang-zhen, WANG Yi-ou. Diverse Video Recommender Algorithm Based on Multi-property Fuzzy Aggregate of Items [J]. Computer Science, 2019, 46(8): 78-83.
[7] YAN Hui, ZHU Bo-jing, WAN Wen, ZHONG Yin, David A YUNE. HPIC-LBM Method Based Simulation of Large Temporal-Spatial Scale 3D Turbulent Magnetic Reconnection on Supercomputer [J]. Computer Science, 2019, 46(8): 89-94.
[8] DU Zhen, MA Li-peng, SUN Guo-zi. Network Traffic Anomaly Detection Based on Wavelet Analysis [J]. Computer Science, 2019, 46(8): 178-182.
[9] WANG Yi. Integral Fault Analysis on LED Cryptosystem in Digital Data Forensic [J]. Computer Science, 2019, 46(8): 189-193.
[10] WANG Yi-chao, LIAO Qiu-cheng, ZUO Si-cheng, XIE Rui, LIN Xin-hua. Performance Evaluation of ARM-ISA SoC for High Performance Computing [J]. Computer Science, 2019, 46(8): 95-99.
[11] SUN Guo-dao, ZHOU Zhi-xiu, LI Si, LIU Yi-peng, LIANG Rong-hua. Spatio-Temporal Evolution of Geographical Topics [J]. Computer Science, 2019, 46(8): 42-49.
[12] ZHANG Hui-bing, ZHONG Hao, HU Xiao-li. User Reviews Clustering Method Based on Topic Analysis [J]. Computer Science, 2019, 46(8): 50-55.
[13] WU Gang,XU Li-min. Review of Shape Representation for Objects [J]. Computer Science, 2019, 46(7): 30-37.
[14] LIU Qiang,KUANG Xiao-hui,CHEN Hua,LI Xiang,LI Guang-ke. Vulnerability Discovery Approach Based on Similarity Matching of Program Slicing [J]. Computer Science, 2019, 46(7): 126-132.
[15] DONG Ming-gang,LIU Bao,JING Chao. Multi-objective Differential Evolution Algorithm with Fuzzy Adaptive Ranking-based Mutation [J]. Computer Science, 2019, 46(7): 224-232.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .