计算机科学技术学报 ›› 2023,Vol. 38 ›› Issue (1): 103-114.doi: 10.1007/s11390-022-2898-7

所属专题: 综述 Computer Architecture and Systems Computer Networks and Distributed Computing

• • 上一篇    下一篇

信息高铁:一种全球低熵高通量算力网

  

  • 收稿日期:2022-10-10 修回日期:2022-11-07 接受日期:2022-12-02 出版日期:2023-02-28 发布日期:2023-02-28

Information Superbahn: Towards a Planet-Scale, Low-Entropy and High-Goodput Computing Utility

Zhi-Wei Xu (徐志伟), Fellow, CCFZhen-Ying Li* (李振营), Student Member, CCFZi-Shu Yu (俞子舒), Student Member, CCF, and Feng-Zhi Li (李奉治), Student Member, CCF        

  1. Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
    University of Chinese Academy of Sciences, Beijing 100149, China
  • Received:2022-10-10 Revised:2022-11-07 Accepted:2022-12-02 Online:2023-02-28 Published:2023-02-28
  • Contact: Zhen-Ying Li E-mail:lizhenying20b@ict.ac.cn
  • About author:Zhen-Ying Li is a Ph.D. candidate of Institute of Computing Technology, Chinese Academy of Sciences, Beijing. He received his B.E. degree in computer science and technology from University of Chinese Academy of Sciences, Beijing, in 2018. His current research interests include distributed systems and programming language.
  • Supported by:
    This work was supported in part by the State Key Laboratory of Computer Architecture of China under Grant No. CARCH 5206 and the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No. XDB44030000.

约翰·麦卡锡在1961年庆祝麻省理工学院百年庆典的一次演讲中提出了效用计算的愿景,包括按需计费服务、大型计算机和私人计算机三个关键概念。60年后,尽管网格计算、服务计算和云计算均取得了进步,但麦卡锡的算力网愿景尚未完全实现。本文基于云计算领域最新进展,提出了一种称为“信息高铁”的算力网。本文认为一个全球算力网即将成为主流现实,并且其面临的技术挑战是可解决的。在有数十亿用户、数万亿设备和泽字节级数据的全球互联环境下,信息高铁视角尽可能保留了麦卡锡的愿景并使得现代的重要需求更加明确。算力网通过全球规模、低熵及高通量算力,提供按需计费的计算服务。本文阐述了算力网的三个显著特征,并提供了初步证据支撑这一观点。初步实验数据表明信息高铁可以同时提升通量和利用率。

关键词: 云计算, 算力网, 利用率, 低熵系统, 高通量计算

Abstract:

In a 1961 lecture to celebrate MIT’s centennial, John McCarthy proposed the vision of utility computing, including three key concepts of pay-per-use service, large computer and private computer. Six decades have passed, but McCarthy’s computing utility vision has not yet been fully realized, despite advances in grid computing, services computing and cloud computing. This paper presents a perspective of computing utility called Information Superbahn, building on recent advances in cloud computing. This Information Superbahn perspective retains McCarthy’s vision as much as possible, while making essential modern requirements more explicit, in the new context of a networked world of billions of users, trillions of devices, and zettabytes of data. Computing utility offers pay-per-use computing services through a 1) planet-scale, 2) low-entropy and 3) high-goodput utility. The three salient characteristics of computing utility are elaborated. Initial evidence is provided to support this viewpoint.

Key words: cloud computing, computing utility, utilization, low-entropy system, high-goodput computing

<table class="reference-tab" style="background-color:#FFFFFF;width:914.104px;color:#333333;font-family:Calibri, Arial, 微软雅黑, "font-size:16px;"> <tbody> <tr class="document-box" id="b1"> <td valign="top" class="td1"> [1] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> McCarthy J. Time-sharing computer systems. In <i>Management and the Computer of the Future</i>, Greenberger M (ed.), New York: MIT Press, 1962, pp.220-248. </div> </td> </tr> <tr class="document-box" id="b2"> <td valign="top" class="td1"> [2] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Xu Z, Li G, Sun N. Information Superbahn: Towards new type of cyberinfrastructure. <i>Bulletin of Chinese Academy of Sciences</i>, 2022, 37(1): 46-52. (in Chinese) </div> </td> </tr> <tr class="document-box" id="b3"> <td valign="top" class="td1"> [3] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Mell P, Grance T. The NIST definition of cloud computing. Technical Report, NIST Special Publication, 2011. <a href="https://doi.org/10.6028/NIST.SP.800-145">https://doi.org/10.6028/NIST.SP.800-145</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b4"> <td valign="top" class="td1"> [4] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Hwang K. Cloud Computing for Machine Learning and Cognitive Applications. MIT Press, 2017. </div> </td> </tr> <tr class="document-box" id="b5"> <td valign="top" class="td1"> [5] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Jonas E, Schleier-Smith J, Sreekanti V et al. Cloud programming simplified: A Berkeley view on serverless computing. arXiv:1902.03383, 2019. <a href="https://arxiv.org/abs/1902.03383">https://arxiv.org/abs/1902.03383</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b6"> <td valign="top" class="td1"> [6] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Vahdat A. Networking challenges for the next decade. In <i>the</i> <i>Google Networking Research Summit Keynote Talks</i>, Apr. 2017. <a href="http://events17.linuxfoundation.org/sites/events/files/slides/ONS20Keynote20Vahdat202017.pdf">http://events17.linuxfoundation.org/sites/events/files/slides/ONS20Keynote20Vahdat202017.pdf</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b7"> <td valign="top" class="td1"> [7] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Guo J, Chang Z, Wang S, Ding H, Feng Y, Mao L, Bao Y. Who limits the resource efficiency of my datacenter: An analysis of Alibaba datacenter traces. In <i>Proc. the International Symposium on Quality of Service</i>, Jun. 2019. DOI: <a href="https://doi.org/10.1145/3326285.3329074">10.1145/3326285.3329074</a>. </div> </td> </tr> <tr class="document-box" id="b8"> <td valign="top" class="td1"> [8] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Xu Z, Li C. Low-entropy cloud computing systems. <i>Scientia Sinica Informationis</i>, 2017, 47(9): 1149-1163. DOI: <a href="https://doi.org/10.1360/N112017-00069">10.1360/N112017-00069</a>. (in Chinese) </div> </td> </tr> <tr class="document-box" id="b9"> <td valign="top" class="td1"> [9] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Perry T S. The trillion-device world. <i>IEEE Spectrum</i>, 2019, 56(1): 6. </div> </td> </tr> <tr class="document-box" id="b10"> <td valign="top" class="td1"> [10] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Ritter D. Cost-aware process modeling in multiclouds. <i>Information Systems</i>, 2022, 108: 101969. DOI: <a href="https://doi.org/10.1016/j.is.2021.101969">10.1016/j.is.2021.101969</a>. </div> </td> </tr> <tr class="document-box" id="b11"> <td valign="top" class="td1"> [11] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Lee C A, Bohn R B, Michel M. The NIST cloud federation reference architecture. Technical Report, NIST Special Publication, 2020. <a href="https://doi.org/10.6028/NIST.SP.500-332">https://doi.org/10.6028/NIST.SP.500-332</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b12"> <td valign="top" class="td1"> [12] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Chasins S, Cheung A, Crooks N et al. The sky above the clouds. arXiv preprint arXiv:2205.07147, 2022. <a href="https://arxiv.org/abs/2205.07147">https://arxiv.org/abs/2205.07147</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b13"> <td valign="top" class="td1"> [13] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Xu Z, Li G. Computing for the masses. <i>Communications of the ACM</i>, 2011, 54(10): 129-137. DOI: <a href="https://doi.org/10.1145/2001269.2001298">10.1145/2001269.2001298</a>. </div> </td> </tr> <tr class="document-box" id="b14"> <td valign="top" class="td1"> [14] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Reed D, Sporny M, Longley D et al. Decentralized identifiers (DIDs) v1.0: Core architecture, data model, and representations. Technical Report, W3C Working Draft, <a href="https://www.w3.org/TR/did-core/">https://www.w3.org/TR/did-core/</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b15"> <td valign="top" class="td1"> [15] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> IEA. Key world energy statistics 2021. Technical Report, IEA, 2021. <a href="https://www.iea.org/reports/key-world-energy-statistics-2021/final-consumption">https://www.iea.org/reports/key-world-energy-statistics-2021/final-consumption</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b16"> <td valign="top" class="td1"> [16] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Thollander P, Karlsson M, Rohdin P et al. Introduction to Industrial Energy Efficiency: Energy Auditing, Energy Management, and Policy Issues. Academic Press, 2020. </div> </td> </tr> <tr class="document-box" id="b17"> <td valign="top" class="td1"> [17] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Dean J, Barroso L A. The tail at scale. <i>Communications of the ACM</i>, 2013, 56(2): 74-80. DOI: <a href="https://doi.org/10.1145/2408776.2408794">10.1145/2408776.2408794</a>. </div> </td> </tr> <tr class="document-box" id="b18"> <td valign="top" class="td1"> [18] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Barroso L A, Hölzle U, Ranganathan P. The Datacenter as a Computer: Designing Warehouse-Scale Machines. Springer Cham, 2019. DOI: <a href="https://doi.org/10.2200/S00874ED3V01Y201809CAC046">10.2200/S00874ED3V01Y201809CAC046</a>. </div> </td> </tr> <tr class="document-box" id="b19"> <td valign="top" class="td1"> [19] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Kerner B S. Introduction to Modern Traffic Flow Theory and Control. Berlin: Springer, 2009. </div> </td> </tr> <tr class="document-box" id="b20"> <td valign="top" class="td1"> [20] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Crooks N, Pu Y, Alvisi L et al. Seeing is believing: A client-centric specification of database isolation. <i>In Proc. the ACM Symposium on Principles of Distributed Computing</i>, Jul. 2017, pp.73-82. DOI: <a href="https://doi.org/10.1145/3087801.3087802">10.1145/3087801.3087802</a>. </div> </td> </tr> <tr class="document-box" id="b21"> <td valign="top" class="td1"> [21] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Little J D C. Little’s Law as viewed on its 50th anniversary. <i>Operations Research</i>, 2011, 59(3): 536-549. DOI: <a href="https://doi.org/10.1287/opre.1110.0940">10.1287/opre.1110.0940</a>. </div> </td> </tr> <tr class="document-box" id="b22"> <td valign="top" class="td1"> [22] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Burns B, Grant B, Oppenheimer D et al. Borg, Omega, and Kubernetes: Lessons learned from three container-management systems over a decade. <i>ACM Queue</i>, 2016, 14(1): 70-93. DOI: <a href="https://doi.org/10.1145/2898442.2898444">10.1145/2898442.2898444</a>. </div> </td> </tr> <tr class="document-box" id="b23"> <td valign="top" class="td1"> [23] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Kuppe M A, Lamport L, Ricketts D. The TLA<span style="line-height:inherit;vertical-align:baseline;">+</span> toolbox. arXiv:1912.10633, 2019. <a href="https://arxiv.org/abs/1912.10633">https://arxiv.org/abs/1912.10633</a>, Oct. 2022. </div> </td> </tr> </tbody> </table>
[1] . 去中心化云性能评估的可靠性和激励性[J]. 计算机科学技术学报, 2022, 37(5): 1176-1199.
[2] Leo Mendiboure, Mohamed-Aymen Chalouf, Francine Krief. 车辆环境中边缘运算的应用:对比研究和主要问题[J]. 计算机科学技术学报, 2019, 34(4): 869-886.
[3] Jiang Rong, Tao Qin, Bo An. 基于长远利益和竞争优化的云计算定价[J]. 计算机科学技术学报, 2019, 34(3): 645-656.
[4] Fateh Boucenna, Omar Nouali, Samir Kechid, M. Tahar Kechadi. 用户访问权限管理加密云数据的安全反向索引搜索[J]. 计算机科学技术学报, 2019, 34(1): 133-154.
[5] Yang Li, Wen-Zhuo Song, Bo Yang. 一种针对大规模文本处理的基于随机变分推理的并行在线监督主题模型[J]. 计算机科学技术学报, 2018, 33(5): 1007-1022.
[6] Bao-Kun Zheng, Lie-Huang Zhu, Meng Shen, Feng Gao, Chuan Zhang, Yan-Dong Li, Jin. 基于区块链的可扩展和隐私保护的数据共享[J]. , 2018, 33(3): 557-567.
[7] An-Zhen Zhang, Jian-Zhong Li, Hong Gao, Yu-Biao Chen, Heng-Zhao Ma, Mohamed Jawa. CrowdOLA:重复数据上基于众包的在线聚集查询系统[J]. , 2018, 33(2): 366-379.
[8] Wei-Qing, Liu Jing Li. 面向仅有稀疏数据的移动云应用的一种自动化性能预测方法[J]. , 2017, 32(5): 936-956.
[9] Yuhun Jun, Jaemin Lee, Euiseong Seo. 一种基于分布式共享存储的计算迁移模式的远程I/O支持的评估方法[J]. , 2017, 32(5): 957-973.
[10] Dong-Gang Cao, Bo An, Pei-Chang Shi, Huai-Min Wang. 虚拟专用云:云际计算下的新型云服务[J]. , 2017, 32(2): 211-218.
[11] Yun-Gang Bao, Sa Wang. 面向软件定义云计算的标签化冯诺依曼体系结构[J]. , 2017, 32(2): 219-223.
[12] Zuo-Ning Chen, Kang Chen, Jin-Lei Jiang, Lu-Fei Zhang, Song Wu, Zheng-Wei Qi, Ch. 云操作系统演进:从技术到生态[J]. , 2017, 32(2): 224-241.
[13] Bin-Lei Cai, Rong-Qi Zhang, Xiao-Bo Zhou, Lai-Ping Zhao, Ke-Qiu Li. 体验可用性:面向尾延迟的软件定义的云计算的可用性[J]. , 2017, 32(2): 250-257.
[14] Mei Li, Hong-Jun Zhang, Yan-Jun Wu, Chen Zhao. 一种用于内存键值缓存系统的紧凑型抗扫描缓存替换框架[J]. , 2017, 32(1): 55-67.
[15] Xian-Mang He, Xiaoyang Sean Wang, Member, CCF, ACM, IEEE, Dong Li, Yan-Ni Hao. 半同构泛化:改进同构泛化在云计算中的隐私保护[J]. , 2016, 31(6): 1124-1135.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 周笛;. A Recovery Technique for Distributed Communicating Process Systems[J]. , 1986, 1(2): 34 -43 .
[2] 李未;. A Structural Operational Semantics for an Edison Like Language(2)[J]. , 1986, 1(2): 42 -53 .
[3] 陈世华;. On the Structure of Finite Automata of Which M Is an(Weak)Inverse with Delay τ[J]. , 1986, 1(2): 54 -59 .
[4] 李万学;. Almost Optimal Dynamic 2-3 Trees[J]. , 1986, 1(2): 60 -71 .
[5] 冯玉琳;. Recursive Implementation of VLSI Circuits[J]. , 1986, 1(2): 72 -82 .
[6] 刘明业; 洪恩宇;. Some Covering Problems and Their Solutions in Automatic Logic Synthesis Systems[J]. , 1986, 1(2): 83 -92 .
[7] 王选; 吕之敏; 汤玉海; 向阳;. A High Resolution Chinese Character Generator[J]. , 1986, 1(2): 1 -14 .
[8] C.Y.Chung; 华宣仁;. A Chinese Information Processing System[J]. , 1986, 1(2): 15 -24 .
[9] 孙钟秀; 商陆军;. DMODULA:A Distributed Programming Language[J]. , 1986, 1(2): 25 -31 .
[10] 陈世华;. On the Structure of (Weak) Inverses of an (Weakly) Invertible Finite Automaton[J]. , 1986, 1(3): 92 -100 .
版权所有 © 《计算机科学技术学报》编辑部
本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn
总访问量: