|
计算机科学技术学报 ›› 2023,Vol. 38 ›› Issue (1): 103-114.doi: 10.1007/s11390-022-2898-7
所属专题: 综述; Computer Architecture and Systems; Computer Networks and Distributed Computing
(徐志伟), Fellow, CCF, * (李振营), Student Member, CCF, (俞子舒), Student Member, CCF, and (李奉治), Student Member, CCF
约翰·麦卡锡在1961年庆祝麻省理工学院百年庆典的一次演讲中提出了效用计算的愿景,包括按需计费服务、大型计算机和私人计算机三个关键概念。60年后,尽管网格计算、服务计算和云计算均取得了进步,但麦卡锡的算力网愿景尚未完全实现。本文基于云计算领域最新进展,提出了一种称为“信息高铁”的算力网。本文认为一个全球算力网即将成为主流现实,并且其面临的技术挑战是可解决的。在有数十亿用户、数万亿设备和泽字节级数据的全球互联环境下,信息高铁视角尽可能保留了麦卡锡的愿景并使得现代的重要需求更加明确。算力网通过全球规模、低熵及高通量算力,提供按需计费的计算服务。本文阐述了算力网的三个显著特征,并提供了初步证据支撑这一观点。初步实验数据表明信息高铁可以同时提升通量和利用率。
<table class="reference-tab" style="background-color:#FFFFFF;width:914.104px;color:#333333;font-family:Calibri, Arial, 微软雅黑, "font-size:16px;"> <tbody> <tr class="document-box" id="b1"> <td valign="top" class="td1"> [1] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> McCarthy J. Time-sharing computer systems. In <i>Management and the Computer of the Future</i>, Greenberger M (ed.), New York: MIT Press, 1962, pp.220-248. </div> </td> </tr> <tr class="document-box" id="b2"> <td valign="top" class="td1"> [2] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Xu Z, Li G, Sun N. Information Superbahn: Towards new type of cyberinfrastructure. <i>Bulletin of Chinese Academy of Sciences</i>, 2022, 37(1): 46-52. (in Chinese) </div> </td> </tr> <tr class="document-box" id="b3"> <td valign="top" class="td1"> [3] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Mell P, Grance T. The NIST definition of cloud computing. Technical Report, NIST Special Publication, 2011. <a href="https://doi.org/10.6028/NIST.SP.800-145">https://doi.org/10.6028/NIST.SP.800-145</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b4"> <td valign="top" class="td1"> [4] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Hwang K. Cloud Computing for Machine Learning and Cognitive Applications. MIT Press, 2017. </div> </td> </tr> <tr class="document-box" id="b5"> <td valign="top" class="td1"> [5] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Jonas E, Schleier-Smith J, Sreekanti V et al. Cloud programming simplified: A Berkeley view on serverless computing. arXiv:1902.03383, 2019. <a href="https://arxiv.org/abs/1902.03383">https://arxiv.org/abs/1902.03383</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b6"> <td valign="top" class="td1"> [6] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Vahdat A. Networking challenges for the next decade. In <i>the</i> <i>Google Networking Research Summit Keynote Talks</i>, Apr. 2017. <a href="http://events17.linuxfoundation.org/sites/events/files/slides/ONS20Keynote20Vahdat202017.pdf">http://events17.linuxfoundation.org/sites/events/files/slides/ONS20Keynote20Vahdat202017.pdf</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b7"> <td valign="top" class="td1"> [7] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Guo J, Chang Z, Wang S, Ding H, Feng Y, Mao L, Bao Y. Who limits the resource efficiency of my datacenter: An analysis of Alibaba datacenter traces. In <i>Proc. the International Symposium on Quality of Service</i>, Jun. 2019. DOI: <a href="https://doi.org/10.1145/3326285.3329074">10.1145/3326285.3329074</a>. </div> </td> </tr> <tr class="document-box" id="b8"> <td valign="top" class="td1"> [8] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Xu Z, Li C. Low-entropy cloud computing systems. <i>Scientia Sinica Informationis</i>, 2017, 47(9): 1149-1163. DOI: <a href="https://doi.org/10.1360/N112017-00069">10.1360/N112017-00069</a>. (in Chinese) </div> </td> </tr> <tr class="document-box" id="b9"> <td valign="top" class="td1"> [9] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Perry T S. The trillion-device world. <i>IEEE Spectrum</i>, 2019, 56(1): 6. </div> </td> </tr> <tr class="document-box" id="b10"> <td valign="top" class="td1"> [10] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Ritter D. Cost-aware process modeling in multiclouds. <i>Information Systems</i>, 2022, 108: 101969. DOI: <a href="https://doi.org/10.1016/j.is.2021.101969">10.1016/j.is.2021.101969</a>. </div> </td> </tr> <tr class="document-box" id="b11"> <td valign="top" class="td1"> [11] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Lee C A, Bohn R B, Michel M. The NIST cloud federation reference architecture. Technical Report, NIST Special Publication, 2020. <a href="https://doi.org/10.6028/NIST.SP.500-332">https://doi.org/10.6028/NIST.SP.500-332</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b12"> <td valign="top" class="td1"> [12] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Chasins S, Cheung A, Crooks N et al. The sky above the clouds. arXiv preprint arXiv:2205.07147, 2022. <a href="https://arxiv.org/abs/2205.07147">https://arxiv.org/abs/2205.07147</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b13"> <td valign="top" class="td1"> [13] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Xu Z, Li G. Computing for the masses. <i>Communications of the ACM</i>, 2011, 54(10): 129-137. DOI: <a href="https://doi.org/10.1145/2001269.2001298">10.1145/2001269.2001298</a>. </div> </td> </tr> <tr class="document-box" id="b14"> <td valign="top" class="td1"> [14] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Reed D, Sporny M, Longley D et al. Decentralized identifiers (DIDs) v1.0: Core architecture, data model, and representations. Technical Report, W3C Working Draft, <a href="https://www.w3.org/TR/did-core/">https://www.w3.org/TR/did-core/</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b15"> <td valign="top" class="td1"> [15] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> IEA. Key world energy statistics 2021. Technical Report, IEA, 2021. <a href="https://www.iea.org/reports/key-world-energy-statistics-2021/final-consumption">https://www.iea.org/reports/key-world-energy-statistics-2021/final-consumption</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b16"> <td valign="top" class="td1"> [16] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Thollander P, Karlsson M, Rohdin P et al. Introduction to Industrial Energy Efficiency: Energy Auditing, Energy Management, and Policy Issues. Academic Press, 2020. </div> </td> </tr> <tr class="document-box" id="b17"> <td valign="top" class="td1"> [17] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Dean J, Barroso L A. The tail at scale. <i>Communications of the ACM</i>, 2013, 56(2): 74-80. DOI: <a href="https://doi.org/10.1145/2408776.2408794">10.1145/2408776.2408794</a>. </div> </td> </tr> <tr class="document-box" id="b18"> <td valign="top" class="td1"> [18] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Barroso L A, Hölzle U, Ranganathan P. The Datacenter as a Computer: Designing Warehouse-Scale Machines. Springer Cham, 2019. DOI: <a href="https://doi.org/10.2200/S00874ED3V01Y201809CAC046">10.2200/S00874ED3V01Y201809CAC046</a>. </div> </td> </tr> <tr class="document-box" id="b19"> <td valign="top" class="td1"> [19] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Kerner B S. Introduction to Modern Traffic Flow Theory and Control. Berlin: Springer, 2009. </div> </td> </tr> <tr class="document-box" id="b20"> <td valign="top" class="td1"> [20] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Crooks N, Pu Y, Alvisi L et al. Seeing is believing: A client-centric specification of database isolation. <i>In Proc. the ACM Symposium on Principles of Distributed Computing</i>, Jul. 2017, pp.73-82. DOI: <a href="https://doi.org/10.1145/3087801.3087802">10.1145/3087801.3087802</a>. </div> </td> </tr> <tr class="document-box" id="b21"> <td valign="top" class="td1"> [21] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Little J D C. Little’s Law as viewed on its 50th anniversary. <i>Operations Research</i>, 2011, 59(3): 536-549. DOI: <a href="https://doi.org/10.1287/opre.1110.0940">10.1287/opre.1110.0940</a>. </div> </td> </tr> <tr class="document-box" id="b22"> <td valign="top" class="td1"> [22] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Burns B, Grant B, Oppenheimer D et al. Borg, Omega, and Kubernetes: Lessons learned from three container-management systems over a decade. <i>ACM Queue</i>, 2016, 14(1): 70-93. DOI: <a href="https://doi.org/10.1145/2898442.2898444">10.1145/2898442.2898444</a>. </div> </td> </tr> <tr class="document-box" id="b23"> <td valign="top" class="td1"> [23] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Kuppe M A, Lamport L, Ricketts D. The TLA<span style="line-height:inherit;vertical-align:baseline;">+</span> toolbox. arXiv:1912.10633, 2019. <a href="https://arxiv.org/abs/1912.10633">https://arxiv.org/abs/1912.10633</a>, Oct. 2022. </div> </td> </tr> </tbody> </table> |
[1] | . 去中心化云性能评估的可靠性和激励性[J]. 计算机科学技术学报, 2022, 37(5): 1176-1199. |
[2] | Leo Mendiboure, Mohamed-Aymen Chalouf, Francine Krief. 车辆环境中边缘运算的应用:对比研究和主要问题[J]. 计算机科学技术学报, 2019, 34(4): 869-886. |
[3] | Jiang Rong, Tao Qin, Bo An. 基于长远利益和竞争优化的云计算定价[J]. 计算机科学技术学报, 2019, 34(3): 645-656. |
[4] | Fateh Boucenna, Omar Nouali, Samir Kechid, M. Tahar Kechadi. 用户访问权限管理加密云数据的安全反向索引搜索[J]. 计算机科学技术学报, 2019, 34(1): 133-154. |
[5] | Yang Li, Wen-Zhuo Song, Bo Yang. 一种针对大规模文本处理的基于随机变分推理的并行在线监督主题模型[J]. 计算机科学技术学报, 2018, 33(5): 1007-1022. |
[6] | Bao-Kun Zheng, Lie-Huang Zhu, Meng Shen, Feng Gao, Chuan Zhang, Yan-Dong Li, Jin. 基于区块链的可扩展和隐私保护的数据共享[J]. , 2018, 33(3): 557-567. |
[7] | An-Zhen Zhang, Jian-Zhong Li, Hong Gao, Yu-Biao Chen, Heng-Zhao Ma, Mohamed Jawa. CrowdOLA:重复数据上基于众包的在线聚集查询系统[J]. , 2018, 33(2): 366-379. |
[8] | Wei-Qing, Liu Jing Li. 面向仅有稀疏数据的移动云应用的一种自动化性能预测方法[J]. , 2017, 32(5): 936-956. |
[9] | Yuhun Jun, Jaemin Lee, Euiseong Seo. 一种基于分布式共享存储的计算迁移模式的远程I/O支持的评估方法[J]. , 2017, 32(5): 957-973. |
[10] | Dong-Gang Cao, Bo An, Pei-Chang Shi, Huai-Min Wang. 虚拟专用云:云际计算下的新型云服务[J]. , 2017, 32(2): 211-218. |
[11] | Yun-Gang Bao, Sa Wang. 面向软件定义云计算的标签化冯诺依曼体系结构[J]. , 2017, 32(2): 219-223. |
[12] | Zuo-Ning Chen, Kang Chen, Jin-Lei Jiang, Lu-Fei Zhang, Song Wu, Zheng-Wei Qi, Ch. 云操作系统演进:从技术到生态[J]. , 2017, 32(2): 224-241. |
[13] | Bin-Lei Cai, Rong-Qi Zhang, Xiao-Bo Zhou, Lai-Ping Zhao, Ke-Qiu Li. 体验可用性:面向尾延迟的软件定义的云计算的可用性[J]. , 2017, 32(2): 250-257. |
[14] | Mei Li, Hong-Jun Zhang, Yan-Jun Wu, Chen Zhao. 一种用于内存键值缓存系统的紧凑型抗扫描缓存替换框架[J]. , 2017, 32(1): 55-67. |
[15] | Xian-Mang He, Xiaoyang Sean Wang, Member, CCF, ACM, IEEE, Dong Li, Yan-Ni Hao. 半同构泛化:改进同构泛化在云计算中的隐私保护[J]. , 2016, 31(6): 1124-1135. |
|
版权所有 © 《计算机科学技术学报》编辑部 本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn 总访问量: |