Accessing Supercomputing Machines
Users should use a SSH client to log in to our machines. Unencrypted methods such as telnet, rlogin, and XDM are NOT allowed for accessing our machines. Any SSH client will typically require the user to supply the name or IP address of the machine to which access is sought, as well as a username and a password, before granting access. The interface may differ from platform to platform (PC based clients typically have GUIs while Unix based clients may not).
SSH (Secure SHell) clients provide essentially the same functionality as telnet clients but encrypt network traffic between the user's machine and the remote machine. SSH is therefore secure against snooping and is the recommended method of connecting to our machines. SSH clients may not be installed by default on all systems but many free implementations are available for download from the Internet.
You should also get into the habit of using secure copy (SCP -- a companion program often bundled with ssh) instead of the traditional ftp utility to transfer files. SCP is more flexible than ftp in that it allows you to transfer directories from one machine to another in addition to just files. There are SCP graphical user interfaces for Windows and for Macs.
If you wish to run programs with graphical interfaces on one of our machines and have it display on your workstation, you will need to have a X11 server or X11 server emulator running on your workstation.
Instructions for using SSH with our systems are listed below for each operating system:
1. Please install SSH client from ftp://ccftp.iitm.ac.in/ssh/SSHSecureShellClient-3.2.9.exe on
your local system.
2. Click on the SSH secure shell client icon.
3. Please click the Quick Connect Button.
4. Please enter the following details:
1. Open the Terminal, and type
· Intel C++ Compiler 10.1
· Intel Fortran Compiler 10.1
· OpenMPI 1.5.2
· Intel MPI Library 3.1
· Intel Math Kernel Library 10.0
· Intel MPI Benchmarks 3.1
· Intel Debugger 10.1
-- COMPUTE UNIFIED DEVICE ARCHITECTURE
-- Used to expose the computational horsepower of NVIDIA GPUs for GPU Computing
-- It is scalable across any number of threads
Based on industry-standard C
Small set of extensions to C language
Low learning curve
Straightforward APIs to manage devices, memory, etc.
You (probably) need experience with C or C++
You do not need any GPU experience
You do not need any graphics experience
You do not need any parallel programming experience
Ø Data Parallesim - Program property where arithmetic operations are simultaneously performed on data structures.
Ø Thread Creation : CUDA threads light weight than CPU threads.
All the incoming mails to the institute will pass through SonicWall Email Security system.
Web interface to SonicWall (needs to go through proxy): http://mailx2.iitm.ac.in/
ADS users and OpenLDAP users can login to the site and administer the settings for their respective emails. Following are few features that users can explore using the web interface to this filter:
All the incoming/outgoing mails to the institute will pass through SonicWall Email Security system.
Policy: If the user sends 200 mails per hour the user will be blocked as a flood sender and a mail will be send to the user before getting blocked.
If the mails are genuine(such mails triggered for MS/PHD admission, conference exclusion will be given for period of time)
For getting exclusion mail to be send to firstname.lastname@example.org
Computer center provides space to host websites as well as virtual hosts to serve as websites for the Institute. Each virtual host can be made visible using its own hostname in the Intranet and/or Internet using appropriate DNS entries. The servers are LAMP based. There are two web servers currently in operation:
Click on the links above to see further information on what websites are hosted on those servers.
Users who have their account on ADS are eligible to have their inboxes on MS Exchange server with email.iitm.ac.in as the front end. Here are the different ways one can send and receive mails.
Account and Password Procedures
How to Get an account in hpce
In order to use HPCE resources you must have an account on each cluster or resource you are planning to work on.
A valid LDAP/ADS emailid is required in order to login to CC web site for creating a request for new/renewal of account.
To request access to HPC clusters, please login to the www.cc.iitm.ac.in site.
After login, click the link located at button “ Hpce-Create My Hpce account” fill in all required information including your faculty email id. An email will be sent to your faculty seeking his/her approval for creating the requested account.
Please keep our institute email address of yours valid at all times as all notifications and important communications from HPCE will be sent to it.
After activating your accounts, consult our guide for accessing our resources. If you are new to working in a Unix or Linux environment, consult our introduction to UNIX and our guide to basic Unix commands.
How to Renew an Account
All User accounts are created for a period of 1 year duration and after this the user accounts have to be renewed. Account expiration notification emails will be sent 30 days prior to expiration and reminders will also be sent in the last week of the validity period. You can use www.cc.iitm.ac.in site to renew your account or download the RenewalForm fill it and submit it to HPCE Team.
Please note that in the event of account expires, all files associated with the account on home directory and related files will be deleted after a period of 3 months from the validity period.
Account information - user credentials
You will receive account information by email. When you have received your password, you must immediately change it. See below on how to change your password below.
Password and account protection
A user is given a username (also known as a login name) and associated password that permits her/him to access HPCE resources. This username/password pair may be used by a single individual only: passwords must not be shared with any other person.
Passwords must be changed as soon as possible after exposure or suspected compromise. Exposure of passwords and suspected compromises must immediately be reported:
NOTE: Each user is responsible for all activities originating from any of his or her username(s).
A username/password pair must NOT be shared under any circumstances. Users who share their passwords will have their access to HPCE systems disabled. Users should not leave clear-text passwords in a location accessible to others or secured in a location for which protection is less than that required for protecting the information that can be accessed using the password.
Changing a password
To change your password, Once you are logged in to the cluster, type the command
and respond to the prompts by entering your old password and your new password. Please remember that this will change your password.
Obtaining a new password
If you have forgotten your password send an email to email@example.com with your account details from your smail ID.
Closing of user accounts
User accounts on HPCE are automatically removed when they expire in the user database.
Storage Allocations and Policies
Each individual user is assigned a standard storage allocation or quota on home directory. The jobs of those who use more than their allocated space will be blocked from submitting until they stick on the allocated space on the file systems. The below detail shows the storage allocations for individual accounts.
*Note: Capacity of the /home file system varies from cluster to cluster. Each cluster has its own /home.
When an account reaches 100% of its allocation, job shows DISK QUOTA error.
Automatic File Deletion Policy