The field of invention pertains generally to the computing sciences, and, more specifically, to an edge component computing system having integrated FaaS call handling capability.
With the emergence of “cloud” computing in which client devices invoke application software or other services over a network, IS managers are increasingly looking for new ways to architect the cloud so that propagation delays associated with the invocation of services over a network is reduced.
A better understanding of the present invention can be obtained from the following detailed description in conjunction with the following drawings, in which:
The data center 104, in turn, relies upon a cloud service 106 for one or more IS services (e.g., cloud computing, cloud storage, etc.). Here, various client devices 108 (e.g., mobile devices (e.g., smartphones, laptop computers) and/or desktop computers, tower computers, etc.) access data that is stored by the cloud service 106 and/or access/invoke applications that the cloud service 106 is executing.
With respect to the clients' invocation of applications that the cloud service 106 is executing, according to a basic and traditional configuration, the application is continuously executing in the cloud 106 and the entity is bearing the cost of its continuous execution in large time increments (e.g., the entity pays by the hour or by the second for its usage of the application). This particular configuration can be particularly inefficient, e.g., in the case of a cloud application whose invocations or function calls can be fully processed (completed) in much smaller time increments and/or a cloud application that is sparsely used over time by the entity. In such circumstances the entity essentially pays for application resources that the entity does not actually use.
An emerging trend, referred to as “Function As A Service” (FaaS), granularizes payments so that they are based on much smaller time increments (e.g., tenths of seconds or less). With FaaS, the entity's payments correlate much closer to its actual usage, particularly for applications that complete their invocations in short time periods and/or applications that are sparsely used over time by the entity. Current examples of FaaS include AWS Lambda offered by Amazon's Cloud Computing Plartform (AWS), Google Cloud Functions offered by Google's (and/or its parent Alphabet's) cloud computing platform (Google Cloud), Microsoft Azure Functions offered by Microsoft's Azure Cloud Computing Platform (Azure), OpenWhisk offered by IBM and/or Apache, and Oracle Cloud Fn offered by Oracle.
Another emerging trend is edge computing. Referring again to
In order to reduce such delays, IS managers are seeking to push functionality out of the cloud 106 towards a processing resource that is much closer to an invoking client 108. As such, IS managers are seeking ways, for example, to push application functionality into any/all of the local central office switch 101, the base station 102 that a mobile client is communicating with, and/or the hardware resources of the client devices' local ISP 103.
Here, FaaS costs can be particularly sensitive to the time delays associated with large geographic distances and/or too many IS nodal hops between an invoking client 108 and an application that is executing in the cloud. For example, consider a client device 108 that, under a FaaS payment structure, calls an application in the cloud 106 to perform a search of the client's files (the clients files are also stored in the cloud 106). Here, the cloud application can determine the files to be searched (e.g., from the identity of the calling device, a memory range specified in the function call, etc.) and the FaaS function call is assumed to include some search criteria (e.g., a key-word, etc.).
If the return of the search (the items in the searched over files that meet the search criteria) includes a large amount of data (e.g., the content of a large number of files) and the function call is not deemed completed until the calling client device confirms to the application in the cloud 106 that it has successfully received the search results, the cost of the FaaS search function will largely be determined from the delay associated with the large amount of data being transported over the IS infrastructure 100 from the cloud 106 to the client device 108. The cost inefficiency is compounded if certain resources of the IS infrastructure (e.g., trunk lines 105 or 107) are swamped with additional traffic (e.g., the aggregate traffic between all the client devices and the cloud 106) thereby causing them to deliver the data only after a significant amount of time has elapsed (e.g., seconds).
As such, given that FaaS payment structure provides for significant cost reductions if function calls can be completed sooner, an incentive exists to move FaaS functions from the cloud 106 to the edge 101, 102, 103.
Recalling the FaaS search function example, if the calling client's files are also kept on the same edge component that handles the FaaS search function call, the latency between initial invocation of the function and final completion of the function should be miniscule. Not only are latencies associated with search processing to the edge component's internal latencies but also communication with the client is immediately direct.
The client device includes a NIC 319 that physically transmits the FaaS function call to the edge component 300. Here, in the case of an actual NIC “card”, the client device 308 may be a complex system such as a gateway router/switch, tower computer, server computer, etc. In other cases the networking interfacing function 319 may be integrated in some other fashion to the client device 308 (e.g., if the client device is a smartphone the networking interface function may be integrated into a system-on-chip semiconductor chip).
In the example of
In the example of
More generally, RDMA is a type of protocol that provides for a remote computer's sending of a request (or command) over a network to another (local) computer, where, the request/command asks for some function to be performed by and/or invokes some resource of the local computer (e.g., memory, memory controller, network interface, peripheral control hub, mass storage device, etc.) without invoking the local computer's central processing unit (e.g., its general purpose processing cores) to handle/service the request/command.
For the sake of example, the embodiment of
Here, in various embodiments, the memory range specified in the third field 323 corresponds to memory space that has been allocated to the end client. In further embodiments such memory space may include non volatile memory space such as persistent memory within the edge component computing system's main memory 313.
The computer industry is presently migrating toward a new system memory paradigm in which byte addressable system memory (also known as “main” memory) is being enhanced to include non volatile memory. Candidates for the non volatile system memory technology include flash as well as emerging non volatile memory technologies (e.g., phase change memory (PCM), dielectric random access memory, magnetic random access memory, spin transfer torque random access memory, ferroelectric random access memory among others). Many of the non volatile memory technologies are extremely high density because they are three dimensional (e.g., the storage cells are stacked above the semiconductor substrate amongst the interconnect wiring of the semiconductor substrate and are made accessible through a cross-point accessing architecture).
With non volatile system memory (or with traditional mass storage (e.g., solid state drive (SSD), hard disk drive) coupled, e.g., to the peripheral control hub 314), the edge component computing system 311 can readily mimic cloud storage for the client device. Here, particularly where the storage resources are physically implemented as non volatile memory within the edge component computing system 313, the “memory range” field 323 of the RDMA command can correspond, e.g., to the cloud storage capacity that has been allocated to the client that is making the function call and/or the application that is executing on the client device and is making the function call.
Upon receipt of the RDMA command 1 by the edge component computing system's NIC 315, the NIC's security logic 324 performs appropriate authentication services to ensure that the calling end client is truly the device/application it claims to be, and, performs authorization services to ensure that the calling end client has been given permission to access the storage space it has specified in the memory range field 323.
In various embodiments, the security logic 324 authenticates the calling end client with a public key and private key scheme. Here, each end client that is permitted to make FaaS function calls to the edge component is assigned a private key. In an embodiment, the client side NIC 319 locally stores in protected register and/or memory space of the NIC 319, the respective private key for each end client that it sends RDMA requests on behalf of and participates in an authentication scheme with the security logic 324 of the edge component NIC 315 as the security logic 324 authenticates the end caller that is calling a FaaS command through an RDMA request.
The edge component NIC 315 securely keeps (e.g., in protected register and/or memory space of the NIC 315) a corresponding public key for each end client private key maintained by the client side NIC 319. Upon receipt of an RDMA request with embedded FaaS function call, the security logic 324 sends the client side NIC 319 an encrypted message using its local public key for the end client that is invoking the FaaS call. The client side NIC 319 decrypts the message using the end client's corresponding private key and sends the decrypted message back to the edge component NIC 315. The security logic 324 examines the decrypted message and, if the decrypted message is correct, the edge component NIC 315 deems the calling end client to be legitimate/authentic.
Once the edge component NIC 315 has deemed the calling end client to be authentic, the NIC 315 proceeds to refer to additional register and/or memory space of the NIC 315 that lists what FaaS functions the authenticated end client is permitted to call and/or what memory address range(s) and/or mass storage space address range(s) the end client is permitted to access. In various embodiments the NIC 315 keeps such meta data for each end client that can invoke an FaaS call to the NIC 315.
With the end client having been properly authenticated and its request to access the specified memory range having been properly authorized, the RDMA command is passed 2 to the memory controller 312 which has special logic 317 to support RDMA commands with embedded FaaS calls. As observed in
Thus, in this case, the special logic 317 on the memory controller 312 is able to comprehend and parse the RDMA command with the embedded FaaS function call 2, and, direct a (e.g., reformatted) command 3 to the memory module(s) 320 whose memory space falls within the address range called out by the FaaS function call 2. The command sent by the memory controller 312 to the module(s) 320 identifies that a search is to performed, identifies the memory address range to be searched over and includes the search criteria.
In the simple case where the called out memory range is entirely on a single memory module 320_1, the memory module's special search logic 318_1 reads the data from its module's memory chips whose memory capacity includes the specified range, compares the read data to the search criteria and sends to the memory controller 312 those of the read data items having content that matches the search criteria 4.
Note that memory channel bandwidth is hardly impacted by performing the actual search on the memory module 320_1 with logic 318_1. That is, if the searching were performed by memory controller's special logic 317, the entirety of the content to be searched (e.g., all of a device's/user's files) would have to be read from the memory module 320_1 and sent to the memory controller 312 over the memory channel that couples the memory module 320_1 and the memory controller 312. If large amounts of data were to be searched (and therefore passed over the memory channel), overall memory performance could be impacted (other transactions would observe delays because the memory channel is overwhelmed sending data to be searched from the memory module 320_1 to the memory controller 312).
After the search results have been received, the memory controller's special logic 317 forms a response to the search request 2 sent by the NIC 315, and sends 5 the response to the NIC 315. The NIC 315 then sends 6 the response to the end client that invoked the search function call. Note that software executing on the processing cores 311 of the edge component computing system 310 can be left entirely out of the end-to-end FaaS call handling process (it is completely managed by the NIC 315, the memory controller 312 and the memory module 320_1).
With various search FaaS function calls, the content to be searched may be kept on the memory capacity of more than one memory module. In this case, the memory controller logic 317 sends a search command, search criteria and applicable memory range to each impacted memory module. Each memory module then performs its own local search and sends its respective search results (the content that matched the search criteria) to the memory controller 312. The memory controller's special logic 317 then combines the individual search results into a single response that is sent 5 to the NIC 315. The NIC 315 sends the response 6 to the client side NIC 319.
Regardless, special logic instances 317 and 318 can be viewed as smart end points because they specifically handle/process the precise request/function called out in the embedded FaaS call.
In an embodiment, the client side NIC 319 maintains a public key and the edge component NIC's security logic 324 maintains a private key so that the client side NIC 319 can confirm that the response is actually being sent from the edge component computer system 310. That is, for example, commensurate with the sending of the response 6 to the client side NIC 319, the client side NIC 319 sends an encrypted message to the edge component NIC 315.
The security logic 324 of the edge component NIC 315 decrypts the message with its private key and sends the decrypted message back to the client side NIC 319. With the correct decrypted message, the client side NIC 319 confirms the response is from the correct sender and forwards the response to the end client that called the FaaS search function. In a more granularized approach, there is a private key maintained by the NIC 315 for each FaaS function that the computing system 310 supports. Accordingly, the client side NIC 319 can confirm that the response is being sent by the specific function that was called.
Although the above example of
For example, if a simple FaaS read call was embedded in an RDMA command, special logic 330 on the edge component NIC 315 could intercept the RDMA command, parse and comprehend the embedded FaaS read call and then issue a standard RDMA “GET” command to the memory controller 312. In this case, from the memory controller's perspective, the GET command could appear indistinguishable from a nominal RDMA GET command (e.g., sent from a parallel computing system). As such, the memory controller 312 simply reads the requested data from memory 313 and sends it to the NIC 315 via a standard RDMA GET response (as per a normal/standard RDMA protocol).
The special logic 325 on the NIC 315 then sends the read response as per the applicable embedded FaaS protocol to the client side NIC 319. Thus, smart end point logic for handling embedded FaaS calls 317, 318, 330 may be disposed on any of a memory module 320 (and/or similarly, a traditional mass storage device), a memory controller 312 (and/or, interface/controller to a mass storage device such as a peripheral control hub), and/or NIC 315.
As alluded to above other FaaS function calls besides searching can be supported and executed by the edge component computing system 310. Examples include encryption, decryption, or a mathematical function. Essentially any “function” whose logic can be implemented in the edge computer 310 can be called upon by an FaaS call. Such functions may support or be a component of, e.g., any/all of a batch process, a stream process and an extract-transform-load process.
As discussed above, for those processes that do not require a read from the edge computing system memory or a write to the edge computing system memory, the actual logic that performs the FaaS function may be located somewhere other than a memory module or main memory controller (e.g., peripheral control hub 314, NIC 315, etc.). Generally, any/all functions could also be executed by the processing cores 311. However, executing at least simple functions with resources other than the processing cores and with dedicated logic elsewhere may minimize internal propagation latencies and therefore cost per FaaS function execute.
The FaaS logic 317, 318, 330 described above (e.g., embedded in memory controller 312, embedded in module 320, embedded in NIC 315, etc.) and/or NIC security logic 324 can be implemented with one or more forms of logic circuitry including dedicated hardwired logic circuitry (e.g., application specification integrated circuit (ASIC) logic circuitry (e.g., one or more state machine circuits and other hardwired logic circuits), programmable logic circuitry (e.g., field programmable gate array (FPGA) logic circuitry) and/or logic circuitry designed to execute some form of program code (e.g., an embedded controller, an embedded processor, etc.). The design of the logic may also be described in a hardware description language (HDL) (e.g., Verilog, VHDL, RTL, transistor netlist, etc.) and recorded on a machine readable medium.
The edge component computing system 300 can be implemented in various ways. For example, according to a first approach the edge component computing system is a complete, wholly integrated computer (e.g., a server computer where all of the main components 311 through 315 are integrated in a same hardware “box” or chassis). According to a second approach the edge component computing system is more distributed. Examples include a large scale “rack” in which one or more of the main components 311 through 315 are implemented on a card or blade and plugged into the rack's backplane, or, more generally, one or more of the main components 311 through 315 are essentially separate physical components that are interconnected to one another through one or more networks.
In any of these embodiments the computing system 300 can be a stand alone computing system, or, be integrated with a network routing or switching function apparatus of an edge component. For example, the computing system 300 can be the control platform, or general purpose computing platform, of a high performance router or switch networking system.
An applications processor or multi-core processor 550 may include one or more general purpose processing cores 515 within its CPU 501, one or more graphical processing units 516, a memory management function 517 (e.g., a memory controller) and an I/O control function 518. The general purpose processing cores 515 typically execute the operating system and application software of the computing system. The graphics processing unit 516 typically executes graphics intensive functions to, e.g., generate graphics information that is presented on the display 503. The memory control function 517 interfaces with the system memory 502 to write/read data to/from system memory 502. The power management control unit 512 generally controls the power consumption of the system 500.
Each of the touchscreen display 503, the communication interfaces 504-507, the GPS interface 508, the sensors 509, the camera(s) 510, and the speaker/microphone codec 513, 514 all can be viewed as various forms of I/O (input and/or output) relative to the overall computing system including, where appropriate, an integrated peripheral device as well (e.g., the one or more cameras 510). Depending on implementation, various ones of these I/O components may be integrated on the applications processor/multi-core processor 550 or may be located off the die or outside the package of the applications processor/multi-core processor 550. The computing system also includes non-volatile storage 520 which may be the mass storage component of the system.
Various components, e.g., other than the CPU 501, may be enhanced to include logic to handle FaaS calls (such as FaaS calls embedded in RDMA requests) as described at length above.
Embodiments of the invention may include various processes as set forth above. The processes may be embodied in machine-executable instructions. The instructions can be used to cause a general-purpose or special-purpose processor to perform certain processes. Alternatively, these processes may be performed by specific/custom hardware components that contain hardwired logic circuitry or programmable logic circuitry (e.g., FPGA, PLD) for performing the processes, or by any combination of programmed computer components and custom hardware components. For example an HDL, RTL or transistor level netlist description of the above described comparator and/or ADC may be used to perform a simulation of an electronic circuit in a computer environment.
Therefore elements of the present invention may also be provided as a machine-readable medium for storing the machine-executable instructions. The machine-readable medium may include, but is not limited to, floppy diskettes, optical disks, CD-ROMs, and magneto-optical disks, FLASH memory, ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, propagation media or other type of media/machine-readable medium suitable for storing electronic instructions and/or data. For example, the present invention may be downloaded as a computer program which may be transferred from a remote computer (e.g., a server) to a requesting computer (e.g., a client) by way of data signals embodied in a carrier wave or other propagation medium via a communication link (e.g., a modem or network connection).
In the foregoing specification, the invention has been described with reference to specific exemplary embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention as set forth in the appended claims. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
This application is a continuation of and claims the benefit of U.S. patent application Ser. No. 16/373,339, entitled, “EDGE COMPONENT COMPUTING SYSTEM HAVING INTEGRATED FAAS CALL HANDLING CAPABILITY”, filed Apr. 2, 2019, which is incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
6791988 | Hameleers | Sep 2004 | B1 |
8090832 | Semke | Jan 2012 | B1 |
8423529 | Bloomstein | Apr 2013 | B1 |
9229854 | Kuzmin | Jan 2016 | B1 |
9258412 | Trandal | Feb 2016 | B1 |
10148736 | Lee | Dec 2018 | B1 |
10360025 | Foskett et al. | Jul 2019 | B2 |
10402187 | Turovsky et al. | Sep 2019 | B2 |
10419550 | Nainar et al. | Sep 2019 | B2 |
10432537 | Zhang et al. | Oct 2019 | B2 |
10462112 | Makmel et al. | Oct 2019 | B1 |
10467045 | Braverman et al. | Nov 2019 | B1 |
10467149 | Kawahara | Nov 2019 | B2 |
10514958 | Kumar et al. | Dec 2019 | B2 |
10528367 | Liu et al. | Jan 2020 | B1 |
10541938 | Timmerman et al. | Jan 2020 | B1 |
10554689 | Reddy et al. | Feb 2020 | B2 |
10565034 | Zhang et al. | Feb 2020 | B2 |
10592280 | Ballantyne et al. | Mar 2020 | B2 |
10601672 | Jeuk et al. | Mar 2020 | B2 |
10606576 | Tung et al. | Mar 2020 | B1 |
10613901 | Mehr | Apr 2020 | B1 |
10621001 | Braverman et al. | Apr 2020 | B1 |
10621004 | Wood et al. | Apr 2020 | B2 |
10628299 | Schneider et al. | Apr 2020 | B1 |
10637724 | Johnson et al. | Apr 2020 | B2 |
10742750 | Johnson et al. | Aug 2020 | B2 |
10747580 | Vaikar | Aug 2020 | B2 |
10783015 | On et al. | Sep 2020 | B2 |
10796058 | Mezei et al. | Oct 2020 | B1 |
20060104221 | Norton | May 2006 | A1 |
20110158129 | Liu | Jun 2011 | A1 |
20120226742 | Momchilov | Sep 2012 | A1 |
20120233668 | Leafe | Sep 2012 | A1 |
20120250512 | Jagadeeswaran | Oct 2012 | A1 |
20140019609 | Williams | Jan 2014 | A1 |
20140280894 | Reynolds | Sep 2014 | A1 |
20160219024 | Verzun | Jul 2016 | A1 |
20170269947 | Johnson | Sep 2017 | A1 |
20170339247 | Tiwari | Nov 2017 | A1 |
20180225230 | Litichever | Aug 2018 | A1 |
20190132381 | Momchilov | May 2019 | A1 |
20190303018 | Huang et al. | Oct 2019 | A1 |
20190303211 | Dias et al. | Oct 2019 | A1 |
20190303212 | Bosch et al. | Oct 2019 | A1 |
20190312800 | Schibler et al. | Oct 2019 | A1 |
20190312899 | Shulman et al. | Oct 2019 | A1 |
20190317808 | Srinivasan et al. | Oct 2019 | A1 |
20190324813 | Bogineni et al. | Oct 2019 | A1 |
20190332781 | Natanzon | Oct 2019 | A1 |
20190347134 | Zhuo et al. | Nov 2019 | A1 |
20190349447 | Adams et al. | Nov 2019 | A1 |
20190377604 | Cybulski | Dec 2019 | A1 |
20190384655 | Singuru | Dec 2019 | A1 |
20200007388 | Johnston et al. | Jan 2020 | A1 |
20200012545 | Zhang et al. | Jan 2020 | A1 |
20200026444 | Dai et al. | Jan 2020 | A1 |
20200057618 | Alex et al. | Feb 2020 | A1 |
20200057676 | Vaikar | Feb 2020 | A1 |
20200057677 | Ritter et al. | Feb 2020 | A1 |
20200067789 | Khuti et al. | Feb 2020 | A1 |
20200081858 | Philmore et al. | Mar 2020 | A1 |
20200084202 | Smith et al. | Mar 2020 | A1 |
20200089547 | Rempel et al. | Mar 2020 | A1 |
20200097310 | Shukla et al. | Mar 2020 | A1 |
20200097323 | Nider et al. | Mar 2020 | A1 |
20200097393 | Moore et al. | Mar 2020 | A1 |
20200104309 | Borges et al. | Apr 2020 | A1 |
20200104378 | Wagner et al. | Apr 2020 | A1 |
20200117470 | Vaikar | Apr 2020 | A1 |
20200120120 | Cybulski | Apr 2020 | A1 |
20200220924 | Yang et al. | Jul 2020 | A1 |
20200225983 | Jung et al. | Jul 2020 | A1 |
20200285588 | Quinn et al. | Sep 2020 | A1 |
20200310828 | Turull et al. | Oct 2020 | A1 |
20200314168 | Nauerz et al. | Oct 2020 | A1 |
Entry |
---|
Extended European Search Report for Patent Application No. 20 164 626.2, dated Aug. 19, 2020, 9 pages. |
Avram, Abel. “Faas, PaaS, and the Benefits of the Serverless Architecture,” InfoQ, Jun. 25, 2016. (Year: 2016). |
Dragojevic, et al., “FaRM: Fast Remote Memory” USENIX Association, 11th USENIX Symposium on Networked Systems Design and Implementation, Apr. 2, 2014, pp. 401-414. |
Halpern, J and Pignataro, C. “Service Function Chaining (SFC) Architecture,” RFC 7665, Oct. 2015. (Year: 2015). |
JEDEC About Page. (Year: 2020). |
Lever, C. “Bidirectional Remote Procedure Call on RPC over ROMA Transports,” RFC 8167, Jun. 2017. (Year: 2017). |
Roberts, Mike. “Serverless Architectures,” Martin Fowler, May 22, 2018. (Year: 2018). |
Xu, et al., “BlueCache: A Scalable Distributed Flash-based Key-value Store”, Proceedings of the VLDB Endowment, Nov. 1, 2016, vol. 10, No. 4, pp. 301-312. |
Number | Date | Country | |
---|---|---|---|
20210326299 A1 | Oct 2021 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16373339 | Apr 2019 | US |
Child | 17363867 | US |