Journal of Computer Science and Technology ›› 2023, Vol. 38 ›› Issue (1): 103-114.doi: 10.1007/s11390-022-2898-7

Special Issue: Surveys; Computer Architecture and Systems; Computer Networks and Distributed Computing

• Special Issue in Honor of Professor Kai Hwang’s 80th Birthday • Previous Articles     Next Articles

Information Superbahn: Towards a Planet-Scale, Low-Entropy and High-Goodput Computing Utility

Zhi-Wei Xu (徐志伟), Fellow, CCFZhen-Ying Li* (李振营), Student Member, CCFZi-Shu Yu (俞子舒), Student Member, CCF, and Feng-Zhi Li (李奉治), Student Member, CCF        

  1. Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
    University of Chinese Academy of Sciences, Beijing 100149, China
  • Received:2022-10-10 Revised:2022-11-07 Accepted:2022-12-02 Online:2023-02-28 Published:2023-02-28
  • Contact: Zhen-Ying Li E-mail:lizhenying20b@ict.ac.cn
  • About author:Zhen-Ying Li is a Ph.D. candidate of Institute of Computing Technology, Chinese Academy of Sciences, Beijing. He received his B.E. degree in computer science and technology from University of Chinese Academy of Sciences, Beijing, in 2018. His current research interests include distributed systems and programming language.
  • Supported by:
    This work was supported in part by the State Key Laboratory of Computer Architecture of China under Grant No. CARCH 5206 and the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No. XDB44030000.

In a 1961 lecture to celebrate MIT’s centennial, John McCarthy proposed the vision of utility computing, including three key concepts of pay-per-use service, large computer and private computer. Six decades have passed, but McCarthy’s computing utility vision has not yet been fully realized, despite advances in grid computing, services computing and cloud computing. This paper presents a perspective of computing utility called Information Superbahn, building on recent advances in cloud computing. This Information Superbahn perspective retains McCarthy’s vision as much as possible, while making essential modern requirements more explicit, in the new context of a networked world of billions of users, trillions of devices, and zettabytes of data. Computing utility offers pay-per-use computing services through a 1) planet-scale, 2) low-entropy and 3) high-goodput utility. The three salient characteristics of computing utility are elaborated. Initial evidence is provided to support this viewpoint.

Key words: cloud computing; computing utility; utilization; low-entropy system; high-goodput computing ;

<table class="reference-tab" style="background-color:#FFFFFF;width:914.104px;color:#333333;font-family:Calibri, Arial, 微软雅黑, "font-size:16px;"> <tbody> <tr class="document-box" id="b1"> <td valign="top" class="td1"> [1] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> McCarthy J. Time-sharing computer systems. In <i>Management and the Computer of the Future</i>, Greenberger M (ed.), New York: MIT Press, 1962, pp.220-248. </div> </td> </tr> <tr class="document-box" id="b2"> <td valign="top" class="td1"> [2] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Xu Z, Li G, Sun N. Information Superbahn: Towards new type of cyberinfrastructure. <i>Bulletin of Chinese Academy of Sciences</i>, 2022, 37(1): 46-52. (in Chinese) </div> </td> </tr> <tr class="document-box" id="b3"> <td valign="top" class="td1"> [3] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Mell P, Grance T. The NIST definition of cloud computing. Technical Report, NIST Special Publication, 2011. <a href="https://doi.org/10.6028/NIST.SP.800-145">https://doi.org/10.6028/NIST.SP.800-145</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b4"> <td valign="top" class="td1"> [4] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Hwang K. Cloud Computing for Machine Learning and Cognitive Applications. MIT Press, 2017. </div> </td> </tr> <tr class="document-box" id="b5"> <td valign="top" class="td1"> [5] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Jonas E, Schleier-Smith J, Sreekanti V et al. Cloud programming simplified: A Berkeley view on serverless computing. arXiv:1902.03383, 2019. <a href="https://arxiv.org/abs/1902.03383">https://arxiv.org/abs/1902.03383</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b6"> <td valign="top" class="td1"> [6] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Vahdat A. Networking challenges for the next decade. In <i>the</i> <i>Google Networking Research Summit Keynote Talks</i>, Apr. 2017. <a href="http://events17.linuxfoundation.org/sites/events/files/slides/ONS20Keynote20Vahdat202017.pdf">http://events17.linuxfoundation.org/sites/events/files/slides/ONS20Keynote20Vahdat202017.pdf</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b7"> <td valign="top" class="td1"> [7] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Guo J, Chang Z, Wang S, Ding H, Feng Y, Mao L, Bao Y. Who limits the resource efficiency of my datacenter: An analysis of Alibaba datacenter traces. In <i>Proc. the International Symposium on Quality of Service</i>, Jun. 2019. DOI: <a href="https://doi.org/10.1145/3326285.3329074">10.1145/3326285.3329074</a>. </div> </td> </tr> <tr class="document-box" id="b8"> <td valign="top" class="td1"> [8] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Xu Z, Li C. Low-entropy cloud computing systems. <i>Scientia Sinica Informationis</i>, 2017, 47(9): 1149-1163. DOI: <a href="https://doi.org/10.1360/N112017-00069">10.1360/N112017-00069</a>. (in Chinese) </div> </td> </tr> <tr class="document-box" id="b9"> <td valign="top" class="td1"> [9] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Perry T S. The trillion-device world. <i>IEEE Spectrum</i>, 2019, 56(1): 6. </div> </td> </tr> <tr class="document-box" id="b10"> <td valign="top" class="td1"> [10] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Ritter D. Cost-aware process modeling in multiclouds. <i>Information Systems</i>, 2022, 108: 101969. DOI: <a href="https://doi.org/10.1016/j.is.2021.101969">10.1016/j.is.2021.101969</a>. </div> </td> </tr> <tr class="document-box" id="b11"> <td valign="top" class="td1"> [11] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Lee C A, Bohn R B, Michel M. The NIST cloud federation reference architecture. Technical Report, NIST Special Publication, 2020. <a href="https://doi.org/10.6028/NIST.SP.500-332">https://doi.org/10.6028/NIST.SP.500-332</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b12"> <td valign="top" class="td1"> [12] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Chasins S, Cheung A, Crooks N et al. The sky above the clouds. arXiv preprint arXiv:2205.07147, 2022. <a href="https://arxiv.org/abs/2205.07147">https://arxiv.org/abs/2205.07147</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b13"> <td valign="top" class="td1"> [13] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Xu Z, Li G. Computing for the masses. <i>Communications of the ACM</i>, 2011, 54(10): 129-137. DOI: <a href="https://doi.org/10.1145/2001269.2001298">10.1145/2001269.2001298</a>. </div> </td> </tr> <tr class="document-box" id="b14"> <td valign="top" class="td1"> [14] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Reed D, Sporny M, Longley D et al. Decentralized identifiers (DIDs) v1.0: Core architecture, data model, and representations. Technical Report, W3C Working Draft, <a href="https://www.w3.org/TR/did-core/">https://www.w3.org/TR/did-core/</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b15"> <td valign="top" class="td1"> [15] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> IEA. Key world energy statistics 2021. Technical Report, IEA, 2021. <a href="https://www.iea.org/reports/key-world-energy-statistics-2021/final-consumption">https://www.iea.org/reports/key-world-energy-statistics-2021/final-consumption</a>, Oct. 2022. </div> </td> </tr> <tr class="document-box" id="b16"> <td valign="top" class="td1"> [16] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Thollander P, Karlsson M, Rohdin P et al. Introduction to Industrial Energy Efficiency: Energy Auditing, Energy Management, and Policy Issues. Academic Press, 2020. </div> </td> </tr> <tr class="document-box" id="b17"> <td valign="top" class="td1"> [17] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Dean J, Barroso L A. The tail at scale. <i>Communications of the ACM</i>, 2013, 56(2): 74-80. DOI: <a href="https://doi.org/10.1145/2408776.2408794">10.1145/2408776.2408794</a>. </div> </td> </tr> <tr class="document-box" id="b18"> <td valign="top" class="td1"> [18] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Barroso L A, Hölzle U, Ranganathan P. The Datacenter as a Computer: Designing Warehouse-Scale Machines. Springer Cham, 2019. DOI: <a href="https://doi.org/10.2200/S00874ED3V01Y201809CAC046">10.2200/S00874ED3V01Y201809CAC046</a>. </div> </td> </tr> <tr class="document-box" id="b19"> <td valign="top" class="td1"> [19] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Kerner B S. Introduction to Modern Traffic Flow Theory and Control. Berlin: Springer, 2009. </div> </td> </tr> <tr class="document-box" id="b20"> <td valign="top" class="td1"> [20] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Crooks N, Pu Y, Alvisi L et al. Seeing is believing: A client-centric specification of database isolation. <i>In Proc. the ACM Symposium on Principles of Distributed Computing</i>, Jul. 2017, pp.73-82. DOI: <a href="https://doi.org/10.1145/3087801.3087802">10.1145/3087801.3087802</a>. </div> </td> </tr> <tr class="document-box" id="b21"> <td valign="top" class="td1"> [21] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Little J D C. Little’s Law as viewed on its 50th anniversary. <i>Operations Research</i>, 2011, 59(3): 536-549. DOI: <a href="https://doi.org/10.1287/opre.1110.0940">10.1287/opre.1110.0940</a>. </div> </td> </tr> <tr class="document-box" id="b22"> <td valign="top" class="td1"> [22] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Burns B, Grant B, Oppenheimer D et al. Borg, Omega, and Kubernetes: Lessons learned from three container-management systems over a decade. <i>ACM Queue</i>, 2016, 14(1): 70-93. DOI: <a href="https://doi.org/10.1145/2898442.2898444">10.1145/2898442.2898444</a>. </div> </td> </tr> <tr class="document-box" id="b23"> <td valign="top" class="td1"> [23] </td> <td class="td2"> <div class="reference-en" style="margin:0px;padding:0px;"> Kuppe M A, Lamport L, Ricketts D. The TLA<span style="line-height:inherit;vertical-align:baseline;">+</span> toolbox. arXiv:1912.10633, 2019. <a href="https://arxiv.org/abs/1912.10633">https://arxiv.org/abs/1912.10633</a>, Oct. 2022. </div> </td> </tr> </tbody> </table>
[1] Jiu-Chen Shi, Xiao-Qing Cai, Wen-Li Zheng, Quan Chen, De-Ze Zeng, Tatsuhiro Tsuchiya, and Min-Yi Guo. Reliability and Incentive of Performance Assessment for Decentralized Clouds [J]. Journal of Computer Science and Technology, 2022, 37(5): 1176-1199.
[2] Leo Mendiboure, Mohamed-Aymen Chalouf, Francine Krief. Edge Computing Based Applications in Vehicular Environments: Comparative Study and Main Issues [J]. Journal of Computer Science and Technology, 2019, 34(4): 869-886.
[3] Jiang Rong, Tao Qin, Bo An. Competitive Cloud Pricing for Long-Term Revenue Maximization [J]. Journal of Computer Science and Technology, 2019, 34(3): 645-656.
[4] Fateh Boucenna, Omar Nouali, Samir Kechid, M. Tahar Kechadi. Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management [J]. Journal of Computer Science and Technology, 2019, 34(1): 133-154.
[5] Yang Li, Wen-Zhuo Song, Bo Yang. Stochastic Variational Inference-Based Parallel and Online Supervised Topic Model for Large-Scale Text Processing [J]. Journal of Computer Science and Technology, 2018, 33(5): 1007-1022.
[6] Bao-Kun Zheng, Lie-Huang Zhu, Meng Shen, Feng Gao, Chuan Zhang, Yan-Dong Li, Jing Yang. Scalable and Privacy-Preserving Data Sharing Based on Blockchain [J]. , 2018, 33(3): 557-567.
[7] An-Zhen Zhang, Jian-Zhong Li, Hong Gao, Yu-Biao Chen, Heng-Zhao Ma, Mohamed Jaward Bah. CrowdOLA: Online Aggregation on Duplicate Data Powered by Crowdsourcing [J]. , 2018, 33(2): 366-379.
[8] Qin Liu, Yuhong Guo, Jie Wu, Guojun Wang. Effective Query Grouping Strategy in Clouds [J]. Journal of Computer Science and Technology, 2017, 32(6): 1231-1249.
[9] Wei-Qing, Liu Jing Li. An Approach to Automatic Performance Prediction for Cloud-enhanced Mobile Applications with Sparse Data [J]. , 2017, 32(5): 936-956.
[10] Yuhun Jun, Jaemin Lee, Euiseong Seo. Evaluation of Remote-I/O Support for a DSM-Based Computation Offloading Scheme [J]. , 2017, 32(5): 957-973.
[11] Dong-Gang Cao, Bo An, Pei-Chang Shi, Huai-Min Wang. Providing Virtual Cloud for Special Purposes on Demand in JointCloud Computing Environment [J]. , 2017, 32(2): 211-218.
[12] Zuo-Ning Chen, Kang Chen, Jin-Lei Jiang, Lu-Fei Zhang, Song Wu, Zheng-Wei Qi, Chun-Ming Hu, Yong-Wei Wu, Yu-Zhong Sun, Hong Tang, Ao-Bing Sun, Zi-Lu Kang. Evolution of Cloud Operating System: From Technology to Ecosystem [J]. , 2017, 32(2): 224-241.
[13] Bin-Lei Cai, Rong-Qi Zhang, Xiao-Bo Zhou, Lai-Ping Zhao, Ke-Qiu Li. Experience Availability: Tail-Latency Oriented Availability in Software-Defined Cloud Computing [J]. , 2017, 32(2): 250-257.
[14] Xian-Mang He, Xiaoyang Sean Wang, Member, CCF, ACM, IEEE, Dong Li, Yan-Ni Hao. Semi-Homogenous Generalization:Improving Homogenous Generalization for Privacy Preservation in Cloud Computing [J]. , 2016, 31(6): 1124-1135.
[15] Bing Zhou, Jiang-Tao Wen. Improving Metadata Caching Efficiency for Data Deduplication via In-RAM Metadata Utilization [J]. , 2016, 31(4): 805-819.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Zhou Di;. A Recovery Technique for Distributed Communicating Process Systems[J]. , 1986, 1(2): 34 -43 .
[2] Li Wei;. A Structural Operational Semantics for an Edison Like Language(2)[J]. , 1986, 1(2): 42 -53 .
[3] Chen Shihua;. On the Structure of Finite Automata of Which M Is an(Weak)Inverse with Delay τ[J]. , 1986, 1(2): 54 -59 .
[4] Li Wanxue;. Almost Optimal Dynamic 2-3 Trees[J]. , 1986, 1(2): 60 -71 .
[5] Feng Yulin;. Recursive Implementation of VLSI Circuits[J]. , 1986, 1(2): 72 -82 .
[6] Liu Mingye; Hong Enyu;. Some Covering Problems and Their Solutions in Automatic Logic Synthesis Systems[J]. , 1986, 1(2): 83 -92 .
[7] Wang Xuan; Lü Zhimin; Tang Yuhai; Xiang Yang;. A High Resolution Chinese Character Generator[J]. , 1986, 1(2): 1 -14 .
[8] C.Y.Chung; H.R.Hwa;. A Chinese Information Processing System[J]. , 1986, 1(2): 15 -24 .
[9] Sun Zhongxiu; Shang Lujun;. DMODULA:A Distributed Programming Language[J]. , 1986, 1(2): 25 -31 .
[10] Chen Shihua;. On the Structure of (Weak) Inverses of an (Weakly) Invertible Finite Automaton[J]. , 1986, 1(3): 92 -100 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved