Not applicable
Computer systems and related technology affect many aspects of society. Indeed, the computer system's ability to process information has transformed the way we live and work. Computer systems now commonly perform a host of tasks (e.g., word processing, scheduling, accounting, etc.) that prior to the advent of the computer system were performed manually. More recently, computer systems have been coupled to one another and to other electronic devices to form both wired and wireless computer networks over which the computer systems and other electronic devices can transfer electronic data. Accordingly, the performance of many computing tasks is distributed across a number of different computer systems and/or a number of different computing environments. For example, distributed applications can have components at a number of different computer systems.
Examples extend to methods, systems, and computer program products for partially reconfiguring acceleration components. A reason for changing the provided functionality of an acceleration component is detected (e.g., an error at the acceleration component or an available update to the provided functionality). The provided functionality at the acceleration component is halted. The acceleration component is partially reconfigured by writing an image for the provided functionality to the acceleration component (e.g., to address an error or update the provided functionality). Other functionality at the acceleration component is maintained as operational during partially reconfiguring the acceleration component. The provided functionality is activated at the acceleration component after partially reconfiguring the acceleration component is complete.
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
Additional features and advantages will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice. The features and advantages may be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. These and other features and advantages will become more fully apparent from the following description and appended claims, or may be learned by practice as set forth hereinafter.
In order to describe the manner in which the above-recited and other advantages and features can be obtained, a more particular description will be rendered by reference to specific implementations thereof which are illustrated in the appended drawings. Understanding that these drawings depict only some implementations and are not therefore to be considered to be limiting of its scope, implementations will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:
Examples extend to methods, systems, and computer program products for partially reconfiguring acceleration components. A reason for changing the provided functionality of an acceleration component is detected (e.g., an error at the acceleration component or an available update to the provided functionality). The provided functionality at the acceleration component is halted. The acceleration component is partially reconfigured by writing an image for the provided functionality to the acceleration component (e.g., to address an error or update the provided functionality). Other functionality at the acceleration component is maintained as operational during partially reconfiguring the acceleration component. The provided functionality is activated at the acceleration component after partially reconfiguring the acceleration component is complete.
In one aspect, an acceleration component (e.g., a hardware accelerator, such as, a Field Programmable Gate Array (FPGA)) provides functionality to a group of interoperating acceleration components that provide acceleration for a service. Functionality at each acceleration component in the group of interoperating acceleration components is composed together in a graph to provide the service acceleration. The acceleration component has other functionality in addition to the provided functionality. The group of interoperating acceleration components and one or more other acceleration components are part of a hardware acceleration plane that includes a larger plurality of acceleration components providing a configurable fabric of acceleration components for accelerating services.
Implementations may comprise or utilize a special purpose or general-purpose computer including computer hardware, such as, for example, one or more processors and system memory, as discussed in greater detail below. Implementations also include physical and other computer-readable media for carrying or storing computer-executable instructions and/or data structures. Such computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer system. Computer-readable media that store computer-executable instructions are computer storage media (devices). Computer-readable media that carry computer-executable instructions are transmission media. Thus, by way of example, and not limitation, implementations can comprise at least two distinctly different kinds of computer-readable media: computer storage media (devices) and transmission media.
Computer storage media (devices) includes RAM, ROM, EEPROM, CD-ROM, solid state drives (“SSDs”) (e.g., based on RAM), Flash memory, phase-change memory (“PCM”), other types of memory, other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer.
A “network” is defined as one or more data links that enable the transport of electronic data between computer systems and/or modules and/or other electronic devices. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless) to a computer, the computer properly views the connection as a transmission medium. Transmissions media can include a network and/or data links which can be used to carry desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer. Combinations of the above should also be included within the scope of computer-readable media.
Further, upon reaching various computer system components, program code means in the form of computer-executable instructions or data structures can be transferred automatically from transmission media to computer storage media (devices) (or vice versa). For example, computer-executable instructions or data structures received over a network or data link can be buffered in RAM within a network interface module (e.g., a “NIC”), and then eventually transferred to computer system RAM and/or to less volatile computer storage media (devices) at a computer system. Thus, it should be understood that computer storage media (devices) can be included in computer system components that also (or even primarily) utilize transmission media.
Computer-executable instructions comprise, for example, instructions and data which, in response to execution at a processor, cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. The computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, or even source code. Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the described features or acts described above. Rather, the described features and acts are disclosed as example forms of implementing the claims.
Those skilled in the art will appreciate that the described aspects may be practiced in network computing environments with many types of computer system configurations, including, personal computers, desktop computers, laptop computers, message processors, hand-held devices, wearable devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, mobile telephones, PDAs, tablets, pagers, watches, routers, switches, and the like. The described aspects may also be practiced in distributed system environments where local and remote computer systems, which are linked (either by hardwired data links, wireless data links, or by a combination of hardwired and wireless data links) through a network, both perform tasks. In a distributed system environment, program modules may be located in both local and remote memory storage devices.
The described aspects can also be implemented in cloud computing environments. In this description and the following claims, “cloud computing” is defined as a model for enabling on-demand network access to a shared pool of configurable computing resources. For example, cloud computing can be employed in the marketplace to offer ubiquitous and convenient on-demand access to the shared pool of configurable computing resources. The shared pool of configurable computing resources can be rapidly provisioned via virtualization and released with low management effort or service provider interaction, and then scaled accordingly.
A cloud computing model can be composed of various characteristics such as, for example, on-demand self-service, broad network access, resource pooling, rapid elasticity, measured service, and so forth. A cloud computing model can also expose various service models, such as, for example, Software as a Service (“SaaS”), Platform as a Service (“PaaS”), and Infrastructure as a Service (“IaaS”). A cloud computing model can also be deployed using different deployment models such as private cloud, community cloud, public cloud, hybrid cloud, and so forth. In this description and in the claims, a “cloud computing environment” is an environment in which cloud computing is employed.
In this description and the following claims, an “acceleration component” is defined as a hardware component specialized (e.g., configured, possibly through programming) to perform a computing function more efficiently than software running on general-purpose central processing unit (CPU) could perform the computing function. Acceleration components include Field Programmable Gate Arrays (FPGAs), Graphics Processing Units (GPUs), Application Specific Integrated Circuits (ASICs), Erasable and/or Complex programmable logic devices (PLDs), Programmable Array Logic (PAL) devices, Generic Array Logic (GAL) devices, and massively parallel processor array (MPPA) devices.
In this description and in the following claims, a “role” is defined as functionality provided by an acceleration component to a group of interoperating acceleration components used to accelerate a service. Roles at each acceleration component in a group of interoperating acceleration components can be linked together to compose a graph that provides the service acceleration.
In this description and in the following claims, a “graph” is defined as a group of interconnected (e.g., network connected) acceleration components providing acceleration for a service wherein each acceleration component in the group provides a portion of the acceleration functionality.
In this description an in the following claims, an “image” is defined as a file including information that can be used in configuration of an acceleration component, such as, for example, an FPGA. Information included in an image file can be used to program hardware components of an acceleration component (e.g., logic blocks and reconfigurable interconnects of an FPGA) to implement desired functionality. Desired functionality can be implemented to solve virtually any problem which is computable.
In this description and in the following claims, a “neighbor acceleration component” is defined as an acceleration component configured to exchange input and/or output with another acceleration component when interconnected to the other acceleration component within a graph. Neighbor is viewed logically from the perspective of the graph. The physical proximity of an acceleration component relative to another acceleration component is not a determining factor in identifying neighbor acceleration components. That is, acceleration components that are not physically adjacent to one another (or even near to one another on a network or within a datacenter) can be configured to exchange data with one another when interconnected within a graph. Acceleration components interconnected within a graph can be viewed as neighbor acceleration components even if data exchanged between the acceleration components physically passes through other acceleration components outside of the graph or through host components in transit between the acceleration components. However, acceleration components that are physically adjacent or near to one another on a network or in a datacenter and are interconnected within a graph can also be viewed as neighbor acceleration components with respect to one another.
In general, an acceleration component can include an array of programmable logic blocks and hierarchy of reconfigurable interconnects that allow logic blocks to be connected together in different configurations to provide different functionality (i.e., different roles). Image files can be received and loaded at an acceleration component to configure programmable logic blocks and configure interconnects to provide desired functionality (i.e., roles).
In some environments, applications (services) are provided to a client from a data center. A data center includes multiple (and potentially a very large number of) software-driven general purpose computing devices. Each general purpose computing device can include one or more central processing units (CPUs) that process machine-readable instructions to perform specified computing activities. The multiple general purpose computing devices are networked to one another such that the combined power of the multiple general purpose computer systems (or subsets thereof) can be used to perform more complex computing activities.
Data center providers face continuing challenges to increase processing capabilities and efficiency within and provided by data centers. Continuing to add more and more general purpose computing devices is not feasible due at least in part to power limitations. Computing device specialization is one option. For example, computing devices can be specialized for specific scale workloads to provide some efficiency gains. However, computing device specialization is problematic for at least two reasons. First, lack of homogeneity in a data center increases management issues and provides inconsistent platforms for applications to rely on. Further, data center services evolve rapidly, making non-programmable hardware features impractical. Thus, data center providers need continued improvements in performance and efficiency but cannot obtain those improvements from general purpose computing devices.
Aspects facilitate partially reconfiguring an acceleration component. Partial reconfiguration can be implemented for any of a variety of reasons, including to address an error in functionality at the acceleration component or to update functionality at the acceleration component. During partial reconfiguration, connectivity can be maintained for any other functionality at the acceleration component untouched by the partial reconfiguration. Partial reconfiguration is more efficient to deploy than full reconfiguration of an acceleration component.
In some aspects, an acceleration component provides a role to a group of interoperating acceleration components that provide acceleration of a service. Roles at each acceleration component in the group of interoperating acceleration components are composed together into a graph that provides the service acceleration. The acceleration component can also have other functionality in addition to the role.
For example, in one aspect, an acceleration component provides roles to a plurality of groups of interoperating acceleration components composed together into graphs to provide acceleration for a plurality of corresponding services. During reconfiguration of a role for one group of interoperating acceleration components, roles for any other groups of interoperating acceleration components can be maintained. Various groups of interoperating acceleration components can be part of a hardware acceleration plane that includes a larger plurality of acceleration components. The hardware acceleration plane provides a configurable fabric of acceleration components for accelerating services.
An acceleration component can be programmed to include a network interface. The network interface permits the acceleration component to exchange network traffic with other components, such as, for example, other acceleration components or host components. As such, when one role at an acceleration component is being reconfigured, any other roles at the acceleration component can be maintained as stable and operational. Further, when a role at an acceleration component is being reconfigured, the network interface can be maintained as stable and operational. Thus, during reconfiguration of one role at acceleration component, any of the other roles at the acceleration component can continue to use the network interface to route network traffic between the acceleration component and other components.
Any number of different components might detect a reason for changing the provided functionality at an acceleration component. In one aspect, a higher level service monitors a hardware acceleration plane for roles exhibiting incorrect behavior or roles for which an update is available. When an incorrect behavior is detected or an update is available, the higher level service can initiate reconfiguration of a role at an acceleration component to address the error or update the role. In another aspect, a local monitor at an acceleration component monitors the acceleration component for roles exhibiting incorrect behavior or roles for which an update is available. When an incorrect behavior is detected or an update is available, the local monitor can initiate reconfiguration of a role at the acceleration component to address the error or update the role.
In a further aspect, acceleration components are locally linked to host components (e.g., CPUs). In these further aspects, a locally linked host component monitors an acceleration component for roles exhibiting incorrect behavior or roles for which an update is available. When an incorrect behavior is detected or an update is available, the host component can initiate reconfiguration of a role at the acceleration component to address the error or update the role.
In general, a data center deployment includes a hardware acceleration plane and a software plane. The hardware acceleration plane can include a plurality of networked acceleration components (e.g., FPGAs). The software plane can include a plurality of networked software-implemented host components (e.g., central processing units (CPUs)). A network infrastructure can be shared between the hardware acceleration plane and the software plane. In some environments, software-implemented host components are locally linked to corresponding acceleration components.
Hardware acceleration plane 106 can be constructed using a heterogeneous collection of acceleration components, including different types of acceleration components and/or the same type of acceleration components with different capabilities. For example, hardware acceleration plane 106 can include FPGA devices having different respective processing capabilities and architectures, a mixture of FPGA devices and other devices, and so on. Hardware acceleration plane 106 provides a reconfigurable fabric of acceleration components.
A host component generally performs operations using a temporal execution paradigm (i.e., sequentially) by using each of its CPU hardware threads to execute machine-readable instructions, one after the after. In contrast, an acceleration component may perform operations using a spatial paradigm (i.e., concurrently) by using a large number of parallel logic elements to perform computational tasks. Thus, an acceleration component can perform some operations in less time compared to a software-driven host component. In the context of the architecture 102, the “acceleration” qualifier associated with the term “acceleration component” reflects its potential for accelerating the functions that are performed by the host components.
In one example, architecture 102 corresponds to a data center environment that includes a plurality of computer servers. The computer servers correspond to the host components in the software plane 104. In another example, architecture 102 corresponds to an enterprise system. In a further example, the architecture 102 corresponds to a user device or appliance which uses at least one host component that has access to two or more acceleration components, etc. Other implementations for architecture 102 are also possible.
Common network infrastructure 120 couples host components in the software plane 104 to other host components and couples acceleration components in the hardware acceleration plane 106 to other acceleration components. That is, host components can use common network infrastructure 120 to interact with one another and acceleration components can use common network infrastructure 120 to interact with one another. Interaction among host components in the software plane 104 is independent of the interaction among acceleration components in the hardware acceleration plane 106. As such, two or more acceleration components may communicate in a transparent manner relative to host components in the software plane 104, outside the direction of the host components, and without the host components being “aware” of particular interaction is even taking place in the hardware acceleration plane 106.
Architecture 102 can use any of a variety of different protocols to facilitate communication between acceleration components over network infrastructure 120 and can use any of a variety of different protocols to facilitate communication between host components over network infrastructure 120. For example, architecture 102 can uses Ethernet protocol to transmit Internet Protocol (IP) packets over network infrastructure 120. In one implementation, each local host component in a server is given a single physical IP address. The local acceleration component in the same server may adopt the same IP address. The server can determine whether an incoming packet is destined for the local host component or destined for the local acceleration component in different ways. For example, packets that are destined for the local acceleration component can be formulated as UDP packets having a specific port; host-defined packets, on the other hand, may not be formulated in this way. In another example, packets belonging to the acceleration plane 106 can be distinguished from packets belonging to the software plane 104 based on the value of a status flag in each of the packets.
As such, architecture 102 can be viewed as two logical networks (software plane 104 and hardware acceleration plane 106) that share the same physical network communication links. Packets associated with the two logical networks may be distinguished from each other by their respective traffic classes.
In another aspect, each host component in the architecture 102 is coupled to at least one acceleration component in hardware acceleration plane 104 through a local link. For example, a host component and acceleration component can be arranged together and maintained as single serviceable unit (e.g., a server) within architecture 102. In this arrangement, the server can be referred to as the “local” host component to distinguish it from other host components that are associated with other servers. Similarly, acceleration component(s) of a server can be referred to as the “local” acceleration component(s) to distinguish them from other acceleration components that are associated with other servers.
As depicted in architecture 102, host component 108 is coupled to acceleration component 110 through a local link 112 (e.g., a Peripheral Component Interconnect Express (PCIe) link). Thus, host component 108 is a local host component form the perspective of acceleration component 110 and acceleration component 110 is a local acceleration component from the perspective of host component 108. The local linking of host component 108 and acceleration component 110 can form part of a server. More generally, host components in software plane 104 can be locally coupled to acceleration components in hardware acceleration plane 106 through many individual links collectively represented as a localH-to-localS coupling 114.
Thus, a host component can interact directly with any locally linked acceleration components. As such, a host component can initiate communication to a locally linked acceleration component to cause further communication among multiple acceleration components. For example, a host component can issue a request for a service (or portion thereof) where functionality for the service (or portion thereof) is composed across a group of one or more acceleration components in hardware acceleration plane 106.
Thus, a host component can also interact indirectly with other acceleration components in hardware acceleration plane 106 to which the host component is not locally linked. For example, host component 108 can indirectly communicate with acceleration component 116 via acceleration component 110. More specifically, acceleration component 110 communicates with acceleration component 116 via a link 118 (e.g., network infrastructure 120).
Acceleration components in hardware acceleration plane 106 can be used to accelerate larger-scale services robustly in a data center. Substantial portions of complex datacenter services can be mapped to acceleration components (e.g., FPGAs) by using low latency interconnects for computations spanning multiple acceleration components. Acceleration components can also be reconfigured as appropriate to provide different service functionality at different times.
Acceleration component 218 is directly coupled to host component 212 via local link 220 (e.g., a PCIe link). Thus, host component 212 can view acceleration component 218 as a local acceleration component and acceleration component 218 can view host component 212 as a local host component. Acceleration component 218 and host component 212 are also indirectly coupled by way of network interface controller 222 (e.g., used to communicate across network infrastructure 120). Server 204 can load images representing service functionality onto acceleration component 218.
Acceleration component 218 is also coupled to TOR switch 210. Hence, in architecture 202, acceleration component 218 represents the path through which host component 212 interacts with other components in the data center (including other host components and other acceleration components). Architecture 202 allows acceleration component 218 to perform processing on packets that are received from (and/or sent to) TOR switch 210 (e.g., by performing encryption, compression, etc.), without burdening the CPU-based operations performed by host component 212.
Management functionality 232 serves to manage the operations of architecture 202. Management functionality 232 can be physically implemented using different control architectures. For example, in one control architecture, the management functionality 232 may include plural local management components that are coupled to one or more global management components.
Server 402 can include a single host component locally linked to two acceleration components. The two acceleration components can perform different respective tasks. For example, one acceleration component can be used to process outgoing traffic to its local TOR switch, while the other acceleration component can be used to process incoming traffic from the TOR switch. In addition, server 402 can load images representing service functionality onto any of the acceleration components 408 through 410.
In general, a service (e.g., document ranking, encryption, compression, computer vision, speech translation, machine learning, etc.) can be implemented at one or more host components, at one or more acceleration components, or a combination of one or more host components and one or more acceleration components depending on what components are better suited to provide different portions of the service.
The requested service 512 is a composed service spread out over a plurality of acceleration components, each of which performs a specified portion of the service. Although acceleration component 506 was contacted to request use of the service 512, acceleration component 506 may not be the head of the composed service (or even be part of the multi-component service). Instead, acceleration component 508 may be the head component for the composed service.
As such, in operation (3), host component 504 indirectly communicates with acceleration component 508 via acceleration component 506. Acceleration component 508 then performs its portion of the composed service to generate an intermediate output result. In operation (4), acceleration component 508 then invokes acceleration component 510, which performs another respective portion of the composed service, to generate a final result. In operations (5), (6), and (7), the hardware acceleration plane 106 successively forwards the final result back to the requesting host component 504, through the same chain of components set forth above but in the opposite direction.
Operations in hardware acceleration plane 106 are performed in an independent manner of operations performed in the software plane 104. In other words, the host components in the software plane 104 do not manage the operations in the hardware acceleration plane 106. However, the host components may invoke the operations in the hardware acceleration plane 106 by issuing requests for services that are hosted by the hardware acceleration plane 106.
The hardware acceleration plane 106 operates in a manner that is transparent to a requesting host component. For example, host component 504 may be “unaware” of how its request is being processed in hardware acceleration plane 106, including the fact that the service corresponds to a composed service.
Communication in software plane 104 (e.g., corresponding to operation (1)) can take place using the same common network infrastructure 120 as communication in the hardware acceleration plane 106 (e.g., correspond to operations (3)-(6)). Operations (2) and (7) may take place over a local link, corresponding to the localH-to-localS coupling 114 shown in
In general, an acceleration component can include any of variety of components some of which can be more or less common across different application images. Some components, such as, for example, a role, are distinct between application images. Other components, such as, for example, routers, transport components, switches, diagnostic recorders, etc., can be relatively common between some number of application images. These other relatively common components can be viewed as being included in an intermediate layer of abstraction or “soft shell”. Further components, such as, for example, bridges, bypass controls, Network Interface Cards, Top of Rack Interfaces, buffers, memory controllers, PCIe controllers, Inter-FPGA network controllers, configuration memories and interfaces, host interfaces, debugging and back-channel interfaces (e.g., Joint Test Action Group (JTAG) interfaces, Inter-Integrated Circuit (I2C) interfaces, etc.), sensors, etc. can be very common between a higher number of (and essentially all) application images. These further very common components can be viewed as included in a greater layer of abstraction (e.g., than the other relatively common components) or “shell”.
When an acceleration component (e.g., an FPGA) is reconfigured with new functionality, it is likely (although not guaranteed) that a role (i.e., the application-specific logic) at the acceleration component is changed. However, it is unlikely that existing functionality in the soft shell is changed and it is extremely unlikely that existing functionality in the shell is changed. Thus, components in the soft shell and to greater extent components in the shell provide a common interface for a role. As such, the shell allows code for a role to be ported relatively easy across different acceleration components.
Turning to
Acceleration component 702 includes application logic 706, soft shell 704 associated with a first set of resources and shell 711 associated with a second set of resources. The resources associated with shell 711 correspond to lower-level interface-related components that generally remain the same across many different application scenarios. The resources associated with soft shell 704 can remain the same across at least some different application scenarios. The application logic 706 may be further conceptualized as including an application domain (e.g., a “role”). The application domain or role can represent a portion of functionality included in a composed service spread out over a plurality of acceleration components.
The application domain hosts application logic 706 that performs service specific tasks (such as a portion of functionality for ranking documents, encrypting data, compressing data, facilitating computer vision, facilitating speech translation, etc.). Resources associated with soft shell 704 are generally less subject to change compared to the application resources, and the resources associated with shell 711 are less subject to change compared to the resources associated with soft shell 704 (although it is possible to change (reconfigure) any component of acceleration component 702).
In operation, application logic 706 interacts with the shell resources and soft shell resources in a manner analogous to the way a software-implemented application interacts with its underlying operating system resources. From an application development standpoint, the use of common shell resources and soft shell resources frees a developer from having to recreate these common components for each service.
Referring first to the shell 711, shell resources include bridge 708 for coupling acceleration component 702 to the network interface controller (via a NIC interface 710) and a local top-of-rack switch (via a TOR interface 712). Bridge 708 also includes a data path that allows traffic from the NIC or TOR to flow into acceleration component 702, and traffic from the acceleration component 702 to flow out to the NIC or TOR. Internally, bridge 708 may be composed of various FIFOs (714, 716) which buffer received packets, and various selectors and arbitration logic which route packets to their desired destinations. A bypass control component 718, when activated, can control bridge 708 so that packets are transmitted between the NIC and TOR without further processing by the acceleration component 702.
Memory controller 720 governs interaction between the acceleration component 702 and local memory 722 (such as DRAM memory). The memory controller 720 may perform error correction as part of its services.
Host interface 724 provides functionality that enables acceleration component 702 to interact with a local host component (not shown). In one implementation, the host interface 724 may use Peripheral Component Interconnect Express (PCIe), in conjunction with direct memory access (DMA), to exchange information with the local host component. The outer shell may also include various other features 726, such as clock signal generators, status LEDs, error correction functionality, and so on.
Turning to soft shell 704, router 728 is for routing messages between various internal components of the acceleration component 702, and between acceleration component 702 and external entities (e.g., via a transport component 730). Each such endpoint is associated with a respective port. For example, router 728 is coupled to memory controller 720, host interface 724, application logic 706, and transport component 730.
Transport component 730 formulates packets for transmission to remote entities (such as other acceleration components), and receives packets from the remote entities (such as other acceleration components). A 3-port switch 732, when activated, takes over the function of the bridge 708 by routing packets between the NIC and TOR, and between the NIC or TOR and a local port associated with the acceleration component 702.
Diagnostic recorder 734 can store information regarding operations performed by the router 728, transport component 730, and 3-port switch 732 in a circular buffer. For example, the information may include data about a packet's origin and destination IP addresses, host-specific data, timestamps, etc. A technician may study a log of the information in an attempt to diagnose causes of failure or sub-optimal performance in the acceleration component 702.
A plurality of acceleration components similar to acceleration component 702 can be included in hardware acceleration plane 106.
Acceleration components can use different network topologies (instead of using common network infrastructure 120 for communication) to communicate with one another. In one aspect, acceleration components are connected directly to one another, such as, for example, in a two dimensional torus.
In operations (4) and (5), the application logic 912 retrieves the data from the input buffer 910, processes it to generate an output result, and places the output result in an output buffer 914. In operation (6), the acceleration component 904 copies the contents of the output buffer 914 into output buffer 916 (in the host logic's memory). In operation (7), acceleration component 904 notifies the host logic 906 that the data is ready for it to retrieve. In operation (8), the host logic thread wakes up and consumes the data in the output buffer 916. Host logic 906 may then discard the contents of the output buffer 916, which allows the acceleration component 904 to reuse it in the next loading operation.
Host component 1002 also includes an input/output module 1010 for receiving various inputs (via input devices 1012), and for providing various outputs (via output devices 1014). One particular output mechanism may include a presentation device 1016 and an associated graphical user interface (GUI) 1018. Host component 1002 can also include one or more network interfaces 1020 for exchanging data with other devices via one or more communication conduits 1022. One or more communication buses 1024 communicatively couple the above-described components together.
Communication conduit(s) 1022 can be implemented in any manner, e.g., by a local area network, a wide area network (e.g., the Internet), point-to-point connections, etc., or any combination thereof. Communication conduit(s) 1022 can include any combination of hardwired links, wireless links, routers, gateway functionality, name servers, etc., governed by any protocol or combination of protocols.
A plurality of host components similar to host component 1002 can be included in software plane 104.
A local determination component 1124, for example, can identify the current locations of services within architecture 102, based on information stored in a data store 1126. In operation, location determination component 1124 may receive a request for a service. In response, location determination component 1124 returns an address associated with the service, if that address is present in data store 1126. The address may identify a particular acceleration component in hardware acceleration plane 106 that hosts (or is the head of) the requested service.
Request handling component (RHC) 1128 processes requests for services made by instances of tenant functionality. For example, an instance of tenant functionality may correspond to a software program running on a particular local host component. That software program may request a service in the course of its execution. The RHC 1128 handles the request by determining an appropriate component in architecture 102 to provide the service. Possible components for consideration include: a local acceleration component (associated with the local host component from which the request originated); a remote acceleration component; and/or the local host component itself (whereupon the local host component implements the service in software). RHC 1128 makes its determinations based on one or more request handling considerations, such as whether the requested service pertains to a line-rate service. Further, the RHC 1128 may interact with the location determination component 1124 in performing its functions.
A global service allocation component (GSAC) 1130 can operate in a background and global mode, allocating services to acceleration components based on global conditions in architecture 102 (rather than handling individual requests from instances of tenant functionality, as does RHC 1128). For example, GSAC 1130 may invoke its allocation function in response to a change in demand that affects one or more services. GSAC 1130 makes its determinations based on one or more allocation considerations, such as the historical demand associated with the services, etc. Further, the GSAC 1130 may interact with the location determination component 1124 in performing its functions. A sub-component of GSAC 1130 can also manage multi-component and/or composed services. A multi-component service is a service that is composed of plural parts. Plural respective acceleration components perform the respective parts.
Request handling component (RHC) 1128 handles requests for services by tenant functionality that resides on the host components. In response to each request by a local host component, RHC 1128 determines an appropriate component to implement the service. For example, RHC 1128 may choose from among: a local acceleration component (associated with the local host component that made the request), a remote acceleration component, or the local host component itself (whereupon the local host component will implement the service in software), or some combination thereof. RHC 1128 performs its determinations based on one or more request handling considerations.
General allocation component (GSAC) 1130, on the other hand, operates by globally allocating services to acceleration components within architecture 102 to meet overall anticipated demand in the data processing system and/or to satisfy other objectives (rather than individual requests by host components). In performing its functions, the GSAC component 1130 may draw on a data store 1202 that provides free pool information. The free pool information identifies acceleration components that have free capacity to implement one or more services. The GSAC 1130 can also receive input information that has a bearing on its allocation decisions. One such piece of input information pertains to historical demand information associated with a service, e.g., as maintained in a data store 1204.
GSAC 1130 and RHC 1128 may use, in part, common logic in reaching their allocation decisions, and that common logic may, in part, taken into account similar allocation considerations. Further, both RHC 1128 and GSAC 1130 interact with the location determination component 124 in the course of performing their respective operations. Otherwise, as described, the GSAC 1130 frames its decisions in a global context, whereas the RHC 1128 is an on-demand component that is primarily focused on satisfying specific requests.
Configuration component 1206 configures acceleration components, e.g., by sending a configuration steam to the acceleration components. A configuration stream specifies the logic (e.g., an image) to be “programmed” into a recipient acceleration component. The configuration component 1206 may use different strategies to configure an acceleration component.
The failure monitoring component 1208 determines whether a previously configured acceleration component has failed. Various components of the management functionality 1122 may respond to failure notification by substituting a spare acceleration component for a failed acceleration component, reconfiguring an acceleration component, partial reconfiguring acceleration component, reloading data in an acceleration component, etc.
As described, functionality for a service or portion thereof can be provided by linking roles from a group of interoperating acceleration components. The linked roles can be composed in a directed graph in any variety of different ways, including a directed acyclic graph, a directed cyclic graph, etc., to provide service functionality and/or acceleration. For example, in some aspects, linked roles are composed in a pipeline or ring.
Acceleration component 1301 can include an array of programmable logic blocks and a hierarchy of reconfigurable interconnects that allow logic blocks to be connected together in different configurations (to provide different functionality (i.e., different roles)). Image files can be loaded at acceleration component 1301 to configure programmable logic blocks and configure interconnects to provide desired functionality. Images 1307 include one or more images including images 1311, 1312, etc. Images 1307 can be at a network location and/or local to acceleration component 1031. As such, one or more image files from images 1307 can be loaded at acceleration component 1301 to configure acceleration component 1301 to provide role 1303, role 1304, and network interface 1306.
Acceleration component 1301 can be included in one or more groups of interoperating acceleration components. Within each group of interoperating components, acceleration component 1301 can provide a role. The role can be linked together with roles at other acceleration components in the group of interoperating components to compose a graph providing hardware acceleration for a service. For example, acceleration component 1301 can provide role 1303 to one graph and can provide role 1304 to another different graph.
Other components 1308 can include other acceleration components (e.g., in hardware acceleration plane 106) and host components (e.g., in software plane 104). Network interface 1306 facilitates network communication between role 1303 and other components 1308 and between role 1304 and other components 1308.
For example, role 1303 can exchange network traffic 1313 with other components 1308. Network traffic 1313 can include network traffic originating at role 1303 or network traffic being routed from one component in other components 1308 to another component in other components 1308 (e.g., between components in a graph). Similarly, role 1304 can exchange network traffic 1314 with other components 1308. Network traffic 1314 can include network traffic originating at role 1304 or network traffic being routed from one component in other components 1308 to another component in other components 1308 (e.g., between components in a graph).
Configuration service 1302 can monitor the operation of acceleration component 1301. Configuration service 1302 can be a higher level monitoring service (e.g., on network infrastructure 120), located at a locally linked host component, or even internal to acceleration component 1301. Configuration service 1302 can monitor acceleration component 1301 for incorrect behaviors and/or for functionality that is to be updated. When configuration service 1302 detects incorrect behavior or that an update is appropriate, configuration service 1302 can initiate a partial reconfiguration of acceleration component 1301. Thus, when configuration service 1302 is internal to acceleration component 1301, acceleration component 1301 can self-initiate a partial reconfiguration.
Turning to
Method 1400 includes detecting a reason for changing functionality provided at an acceleration component (1401). For example, configuration service 1302 can detect error 1321 in the operation of role 1303. Alternately, configuration service 1303 can detect that there is an update available for role 1303.
Method 1400 includes halting the provided functionality at the acceleration component (1402). Turning to
Method 1400 includes partially reconfiguring the acceleration component by writing an image for the provided functionality to the acceleration component (1403). For example, configuration service 1302 can send write image command 1323 to images 1307. Write image command 1323 causes image 1312 to be written from images 1307 to acceleration component 1301. Writing image 1312 to acceleration component 1301 reprograms programmable logic blocks and reconfigurable interconnects to provide role 1303. Reprogramming can address error 1321. Alternately, reprogramming can be used to update role 1303.
Method 1400 includes maintaining other functionality as operational during partially reconfiguring the acceleration component (1404). For example, role 1304 as well as functionality in a shell or soft shell can be maintained as operational during reconfiguration of role 1303. For example, network interface 1306 can be maintained as operational during reconfiguration of role 1303. As such, role 1304 can continue to route network traffic 1314 between acceleration component 1301 and other components 1308 through network interface 1306 during reconfiguration of role 1303.
Method 1400 includes activating the provided functionality at the acceleration component after partially reconfiguring the acceleration component is complete (1405). For example, turning to
Turning to
Acceleration component 1501 is programmed with roles 1512 and 1517.
Each of acceleration components 1502, 1503, 1504, and 1506 are programmed with a specified role 1511, 1513, 1514, and 1516 respectively. Roles 1511, 1512, and 1513 are linked together to compose graph 1521. Graph 1521 can provide hardware acceleration for a service. Roles 1514, 1517, and 1516 are linked together to compos graph 1522. Graph 1522 can provide hardware acceleration for another different service.
Input and output from roles at (logically) neighboring acceleration components may depend on one another or input and output from other components (e.g., host components or functionality composed from a different group of interoperating acceleration components). For example, input to role 1512 can depend on output from role 1511. Similarly, input to role 1513 can depend on output from role 1512.
Some or all of acceleration components 1501, 1502, 1503, 1504, and 1506 can participate in one-way or two-way communication with (logically) neighboring acceleration components and other components (e.g., host components). Thus, input and output from one acceleration component can depend on input and output from another acceleration component and vice versa. For example, input to role 1511 can depend on output from role 1512 and input to role 1512 can depend on output from role 1513.
A graph can represent a composed grouping of linked roles providing acceleration functionality or a portion thereon. For example, graph 1521 can provide acceleration for part of a document ranking service used to provide search engine results. Graph 1521 can interoperate with other portions of service functionality composed from other groups of interoperating acceleration components and/or provided by one or more host components. For example, for a document ranking service, document feature extraction can be composed from one group of interoperating acceleration components, free form expression calculations can be composed from another group of interoperating acceleration components, and scoring calculations can be composed from a further group of interoperating acceleration components.
Graph 1522 can provide acceleration for another part of the document ranking service or can provide acceleration for some other service (e.g., encryption, compression, computer vision, speech translation, machine learning, etc.).
Configuration service 1531 can monitor the other components depicted in architecture 1500. During monitoring, configuration service 1531 can detect error 1532 in role 1512. Alternately, configuration service 1531 can detect update available message 1537 indicating that there is an update available for role 1512. In response, configuration service 1531 can send halt command 1533 to graph 1521. Halt command 1533 halts operation of role 1512 as well as quiescing graph 1521. Quiescing graph 1521 stops all network traffic flowing into and out of graph 1521. Halt command 1533 also instructs roles 1511 and 1513 to ignore any data coming out of role 1512.
Turning to
During reconfiguration of role 1512 (e.g., during processing of an image file), other roles at acceleration component 1501 can continue to operate as intended while role 1512 is reconfigured. For example, role 1517 can continue to interoperate and exchange network traffic with other roles in graph 1522 during reconfiguration of role 1512. Thus, an image for one role can be loaded onto acceleration component 1501 without overwriting images for other roles or overwriting a network interface.
When reconfiguration of role 1512 is complete, role 1512 can send configuration complete message 1536 to configuration service 1531. Turning to
Turning to
In general, the described aspects are advantageous for reconfiguring part of an acceleration component without impacting other parts of the acceleration component. Partial reconfiguration of an acceleration component can also be performed more quickly than full reconfiguration of an acceleration component.
In some aspects, a system includes a hardware acceleration plane, a software plane, and a network infrastructure. The hardware acceleration plane includes a configurable fabric of a plurality of acceleration components (e.g., hardware accelerators, such as, FPGAs). The software plane includes a plurality of host components (e.g., CPUs) running software. The network infrastructure is shared by acceleration components in the hardware acceleration plane and host components in the software plane. The network infrastructure is used by acceleration components to communicate directly with one another. Local links connect acceleration components and host components (e.g., in the same server).
The system also includes one or more computer storage devices having stored thereon computer-executable instructions representing a configuration service, the configuration service is configured to reconfigure acceleration components. Reconfiguring acceleration components includes detecting a reason for reconfiguring an acceleration component (e.g., detecting an error or detecting an available update). The acceleration component is included in and providing functionality to a group of interoperating acceleration components (included in the hardware acceleration plane) that provide acceleration of a service. Functionality at each acceleration component in the group of interoperating acceleration components is composed together in a graph to provide the service acceleration. The acceleration component has other functionality in addition to the provided functionality.
Reconfiguring acceleration components includes halting the provided functionality at the acceleration component. Reconfiguring acceleration components includes partially reconfiguring the acceleration component by writing an image for the provided functionality to the acceleration component (e.g., to address an error or install an update).
Reconfiguring acceleration components includes maintaining other functionality as operational during partially reconfiguring the acceleration component. Maintaining other functionality as operational can include maintaining other roles, maintaining functionality in a soft shell, or maintaining functionality in a shell. Maintained functionality can include functionality that is provided to one or more other groups of acceleration components composed together in graphs to accelerate other services. For example, maintaining functionality can include routing network traffic between the acceleration component and at least one other component during partially reconfiguring the acceleration component. Reconfiguring acceleration components includes activating the provided functionality at the acceleration component after partially reconfiguring the acceleration component is complete.
In another aspect, a method for partially reconfiguring an acceleration component is performed. A reason for changing functionality provided by an acceleration component is detected (e.g., detecting an error or detecting an available update). The provided functionality at the acceleration component is halted. The acceleration component is partially reconfigured by writing an image for the provided functionality to the acceleration component (e.g., to address an error or install an update).
Other functionality is maintained as operational during partially reconfiguring the acceleration component. Maintaining other functionality can include maintaining other roles, maintaining functionality in a soft shell, or maintaining functionality in a shell. Maintained functionality can include functionality that is provided to one or more other groups of acceleration components composed together in graphs to accelerate other services As such, maintaining functionality can include routing network traffic between the acceleration component and at least one other hardware component during partially reconfiguring the acceleration component. The provided functionality is activated at the acceleration component after partially reconfiguring the acceleration component is complete.
In another aspect, a computer program product for use at a computer system includes one or more computer storage devices having stored thereon computer-executable instructions that, in response to execution at a processor, cause the computer system to implement a method for partially reconfiguring an acceleration component (e.g., a hardware accelerator, such as, an FPGA).
The computer program product includes computer-executable instructions that, in response to execution at a processor, cause the computer system to detect a reason for changing the provided functionality (e.g., detecting an error or detecting an available update). The computer program product includes computer-executable instructions that, in response to execution at a processor, cause the computer system to halt the provided functionality at the acceleration component. The computer program product includes computer-executable instructions that, in response to execution at a processor, cause the computer system to partially reconfigure the acceleration component by writing an image for the provided functionality to the acceleration component (e.g., to address an error or install an update).
The computer program product includes computer-executable instructions that, in response to execution at a processor, cause the computer system to maintain other functionality as operational during partially reconfiguring the acceleration component. Maintaining other functionality can include maintaining other roles, maintaining functionality in a soft shell, or maintaining functionality in a shell. Maintained functionality can include functionality that is provided to one or more other groups of acceleration components composed together in graphs to accelerate other services As such, maintaining functionality can include including routing network traffic between the acceleration component and at least one other component during partially reconfiguring the acceleration component. The computer program product includes computer-executable instructions that, in response to execution at a processor, cause the computer system to activate the provided functionality at the acceleration component after partially reconfiguring the acceleration component is complete.
The described aspects may be implemented in other specific forms without departing from its spirit or essential characteristics. The described aspects are to be considered in all respects only as illustrative and not restrictive. The scope is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Number | Name | Date | Kind |
---|---|---|---|
5600845 | Gilson | Feb 1997 | A |
5684980 | Casselman | Nov 1997 | A |
5748979 | Trimberger | May 1998 | A |
5774668 | Choquier et al. | Jun 1998 | A |
5828858 | Athanas et al. | Oct 1998 | A |
6096091 | Hartmann | Aug 2000 | A |
6104211 | Alfke | Aug 2000 | A |
6256758 | Abramovici | Jul 2001 | B1 |
6326806 | Fallside et al. | Dec 2001 | B1 |
6462579 | Camilleri et al. | Oct 2002 | B1 |
6496971 | Lesea et al. | Dec 2002 | B1 |
6526557 | Young et al. | Feb 2003 | B1 |
6530049 | Abramovici et al. | Mar 2003 | B1 |
6573748 | Trimberger | Jun 2003 | B1 |
6874108 | Abramovici | Mar 2005 | B1 |
6915338 | Hunt et al. | Jul 2005 | B1 |
6973608 | Abramovici | Dec 2005 | B1 |
6996443 | Marshall et al. | Feb 2006 | B2 |
7020860 | Zhao et al. | Mar 2006 | B1 |
7036059 | Carmichael et al. | Apr 2006 | B1 |
7111224 | Trimberger | Sep 2006 | B1 |
7146598 | Horanzy | Dec 2006 | B2 |
7224184 | Levi et al. | May 2007 | B1 |
7240127 | Dubreuil | Jul 2007 | B2 |
7263631 | VanBuren | Aug 2007 | B2 |
7286020 | O et al. | Oct 2007 | B1 |
7340596 | Crosland et al. | Mar 2008 | B1 |
7382154 | Ramos et al. | Jun 2008 | B2 |
7389460 | Demara | Jun 2008 | B1 |
7444551 | Johnson et al. | Oct 2008 | B1 |
7482836 | Levi | Jan 2009 | B2 |
7500083 | Trivedi et al. | Mar 2009 | B2 |
7546572 | Ballagh et al. | Jun 2009 | B1 |
7620883 | Carmichael et al. | Nov 2009 | B1 |
7685254 | Pandya | Mar 2010 | B2 |
7734895 | Agarwal | Jun 2010 | B1 |
7822958 | Allen et al. | Oct 2010 | B1 |
7899864 | Margulis | Mar 2011 | B2 |
7906984 | Montminy et al. | Mar 2011 | B1 |
7925863 | Hundley | Apr 2011 | B2 |
7953014 | Toda et al. | May 2011 | B2 |
8018249 | Koch et al. | Sep 2011 | B2 |
8018866 | Kasturi et al. | Sep 2011 | B1 |
8046727 | Solomon | Oct 2011 | B2 |
8054172 | Jung | Nov 2011 | B2 |
8117497 | Lesea | Feb 2012 | B1 |
8117512 | Sorensen et al. | Feb 2012 | B2 |
8127113 | Sinha et al. | Feb 2012 | B1 |
8145894 | Casselman | Mar 2012 | B1 |
8159259 | Lewis et al. | Apr 2012 | B1 |
8166289 | Owens et al. | Apr 2012 | B2 |
8171099 | Malmskog et al. | May 2012 | B1 |
8250578 | Krishnamurthy et al. | Aug 2012 | B2 |
8368423 | Yancey et al. | Feb 2013 | B2 |
8434087 | Degenaro et al. | Apr 2013 | B2 |
8453013 | Chen | May 2013 | B1 |
8516268 | Woodall | Aug 2013 | B2 |
8554953 | Sorensen et al. | Oct 2013 | B1 |
8635571 | Goldman | Jan 2014 | B1 |
8635675 | Kruglick | Jan 2014 | B2 |
8803876 | Bohan et al. | Aug 2014 | B2 |
8803892 | Urbach | Aug 2014 | B2 |
8863072 | Jahnke | Oct 2014 | B1 |
8867545 | Viens et al. | Oct 2014 | B2 |
8901960 | Takano et al. | Dec 2014 | B2 |
8910109 | Orthner | Dec 2014 | B1 |
8924907 | Jahnke et al. | Dec 2014 | B1 |
8997033 | Hew | Mar 2015 | B1 |
9032343 | Goldman | May 2015 | B1 |
9313364 | Tanaka | Apr 2016 | B2 |
9361416 | Fine | Jun 2016 | B2 |
9483291 | Chen et al. | Nov 2016 | B1 |
9576332 | Streete et al. | Feb 2017 | B1 |
9647731 | Ardalan | May 2017 | B2 |
9652327 | Heil et al. | May 2017 | B2 |
9774520 | Kasturi et al. | Sep 2017 | B1 |
9792154 | Burger et al. | Oct 2017 | B2 |
9819542 | Burger | Nov 2017 | B2 |
9912517 | Ramalingam et al. | Mar 2018 | B1 |
9983938 | Heil et al. | May 2018 | B2 |
10027543 | Lanka et al. | Jul 2018 | B2 |
20020161902 | Mcmahan et al. | Oct 2002 | A1 |
20020188832 | Mirsky et al. | Dec 2002 | A1 |
20030033450 | Appleby-alis | Feb 2003 | A1 |
20040081104 | Pan et al. | Apr 2004 | A1 |
20040141386 | Karlsson | Jul 2004 | A1 |
20050097305 | Doering et al. | May 2005 | A1 |
20050120110 | Curran-Gray | Jun 2005 | A1 |
20060015866 | Ang et al. | Jan 2006 | A1 |
20060143350 | Miloushev et al. | Jun 2006 | A1 |
20070200594 | Levi | Aug 2007 | A1 |
20070210487 | Schroder | Sep 2007 | A1 |
20070283311 | Karoubalis | Dec 2007 | A1 |
20080028187 | Casselman et al. | Jan 2008 | A1 |
20080120500 | Kimmery et al. | May 2008 | A1 |
20080164907 | Mercaldi-kim et al. | Jul 2008 | A1 |
20080184042 | Parks et al. | Jul 2008 | A1 |
20080270411 | Sedukhin et al. | Oct 2008 | A1 |
20080276262 | Munshi et al. | Nov 2008 | A1 |
20080279167 | Cardei et al. | Nov 2008 | A1 |
20080285581 | Maiorana et al. | Nov 2008 | A1 |
20080307259 | Vasudevan et al. | Dec 2008 | A1 |
20090063665 | Bagepalli et al. | Mar 2009 | A1 |
20090085603 | Paul | Apr 2009 | A1 |
20090147945 | Doi et al. | Jun 2009 | A1 |
20090153320 | Jung | Jun 2009 | A1 |
20090182814 | Tapolcai et al. | Jul 2009 | A1 |
20090187733 | El-ghazawi | Jul 2009 | A1 |
20090189890 | Corbett et al. | Jul 2009 | A1 |
20090210487 | Westerhoff et al. | Aug 2009 | A1 |
20090254505 | Davis et al. | Oct 2009 | A1 |
20090278564 | Dehon et al. | Nov 2009 | A1 |
20100011116 | Thornton et al. | Jan 2010 | A1 |
20100046546 | Ram et al. | Feb 2010 | A1 |
20100057647 | Davis et al. | Mar 2010 | A1 |
20100058036 | Degenaro et al. | Mar 2010 | A1 |
20100076915 | Xu et al. | Mar 2010 | A1 |
20100083010 | Kern et al. | Apr 2010 | A1 |
20100106813 | Voutilainen et al. | Apr 2010 | A1 |
20100121748 | Handelman et al. | May 2010 | A1 |
20100174770 | Pandya | Jul 2010 | A1 |
20100251265 | Hodson et al. | Sep 2010 | A1 |
20110068921 | Shafer | Mar 2011 | A1 |
20110078284 | Bomel et al. | Mar 2011 | A1 |
20110080264 | Clare et al. | Apr 2011 | A1 |
20110088038 | Kruglick | Apr 2011 | A1 |
20110153824 | Chikando et al. | Jun 2011 | A1 |
20110161495 | Ratering et al. | Jun 2011 | A1 |
20110178911 | Parsons et al. | Jul 2011 | A1 |
20110218987 | Branscome et al. | Sep 2011 | A1 |
20110238792 | Phillips et al. | Sep 2011 | A1 |
20120047239 | Donahue et al. | Feb 2012 | A1 |
20120092040 | Xu et al. | Apr 2012 | A1 |
20120110192 | Lu et al. | May 2012 | A1 |
20120110274 | Rosales et al. | May 2012 | A1 |
20120150952 | Beverly | Jun 2012 | A1 |
20120260078 | Varnum et al. | Oct 2012 | A1 |
20120324068 | Jayamohan et al. | Dec 2012 | A1 |
20130055240 | Gondi | Feb 2013 | A1 |
20130151458 | Indeck et al. | Jun 2013 | A1 |
20130152099 | Bass et al. | Jun 2013 | A1 |
20130159452 | de fuentes et al. | Jun 2013 | A1 |
20130177293 | Mate et al. | Jul 2013 | A1 |
20130182555 | Raaf et al. | Jul 2013 | A1 |
20130205295 | Ebcioglu et al. | Aug 2013 | A1 |
20130226764 | Battyani | Aug 2013 | A1 |
20130227335 | Dake et al. | Aug 2013 | A1 |
20130285739 | Blaquiere et al. | Oct 2013 | A1 |
20130297043 | Choi | Nov 2013 | A1 |
20130305199 | He et al. | Nov 2013 | A1 |
20130314559 | Kim | Nov 2013 | A1 |
20130318277 | Dalal et al. | Nov 2013 | A1 |
20140007113 | Collin et al. | Jan 2014 | A1 |
20140055467 | Bittner et al. | Feb 2014 | A1 |
20140067851 | Asaad et al. | Mar 2014 | A1 |
20140092728 | Rivera et al. | Apr 2014 | A1 |
20140095928 | Ogasawara et al. | Apr 2014 | A1 |
20140115151 | Kruglick | Apr 2014 | A1 |
20140118026 | Aldragen | May 2014 | A1 |
20140208322 | Sasaki et al. | Jul 2014 | A1 |
20140215424 | Fine | Jul 2014 | A1 |
20140245061 | Kobayashi | Aug 2014 | A1 |
20140258360 | Hebert et al. | Sep 2014 | A1 |
20140267328 | Banack et al. | Sep 2014 | A1 |
20140280499 | Basavaiah et al. | Sep 2014 | A1 |
20140282506 | Cadigan, Jr. et al. | Sep 2014 | A1 |
20140282586 | Shear et al. | Sep 2014 | A1 |
20140310555 | Schulz et al. | Oct 2014 | A1 |
20140351811 | Kruglick | Nov 2014 | A1 |
20140380025 | Kruglick | Dec 2014 | A1 |
20150026450 | Adiki | Jan 2015 | A1 |
20150058614 | Degenaro et al. | Feb 2015 | A1 |
20150089204 | Henry | Mar 2015 | A1 |
20150100655 | Pouzin et al. | Apr 2015 | A1 |
20150103837 | Dutta | Apr 2015 | A1 |
20150169376 | Chang et al. | Jun 2015 | A1 |
20150186158 | Yalamanchili et al. | Jul 2015 | A1 |
20150199214 | Lee et al. | Jul 2015 | A1 |
20150261478 | Obayashi | Sep 2015 | A1 |
20150271342 | Gupta et al. | Sep 2015 | A1 |
20150339130 | Kruglick | Nov 2015 | A1 |
20150371355 | Chen | Dec 2015 | A1 |
20150373225 | Tanaka | Dec 2015 | A1 |
20150379100 | Vermeulen | Dec 2015 | A1 |
20160087849 | Balasubramanian et al. | Mar 2016 | A1 |
20160147709 | Franke et al. | May 2016 | A1 |
20160154694 | Anderson et al. | Jun 2016 | A1 |
20160202999 | Van Den Heuvel | Jul 2016 | A1 |
20160210167 | Bolic et al. | Jul 2016 | A1 |
20160306667 | Burger et al. | Oct 2016 | A1 |
20160306668 | Heil et al. | Oct 2016 | A1 |
20160306674 | Chiou et al. | Oct 2016 | A1 |
20160306700 | Heil et al. | Oct 2016 | A1 |
20160306701 | Heil et al. | Oct 2016 | A1 |
20160308649 | Burger et al. | Oct 2016 | A1 |
20160308718 | Lanka et al. | Oct 2016 | A1 |
20160308719 | Putnam et al. | Oct 2016 | A1 |
20160328222 | Arumugam et al. | Nov 2016 | A1 |
20160378460 | Chiou et al. | Dec 2016 | A1 |
20160380819 | Burger | Dec 2016 | A1 |
20160380912 | Burger et al. | Dec 2016 | A1 |
20170039089 | Xia et al. | Feb 2017 | A1 |
20170126487 | Xie et al. | May 2017 | A1 |
20170351547 | Burger et al. | Dec 2017 | A1 |
Number | Date | Country |
---|---|---|
101276298 | Oct 2008 | CN |
101545933 | Sep 2009 | CN |
101783812 | Jul 2010 | CN |
102377778 | Jul 2010 | CN |
102724478 | Mar 2012 | CN |
103246582 | Aug 2013 | CN |
103677916 | Mar 2014 | CN |
2199910 | Jun 2010 | EP |
2650786 | Oct 2013 | EP |
2005235074 | Sep 2005 | JP |
2013062566 | Apr 2013 | JP |
2013049079 | Apr 2013 | WO |
2013158707 | Oct 2013 | WO |
2013167326 | Nov 2013 | WO |
2013177316 | Nov 2013 | WO |
2014019428 | Feb 2014 | WO |
2015026373 | Feb 2015 | WO |
2015042684 | Apr 2015 | WO |
Entry |
---|
Emmert, John et al., “Dynamic Fault Tolerance in FPGAs via Partial Reconfiguration,” pp. 165-174. (Year: 2000). |
Li, Zhiyuan et al., “Configuration Prefetching Techniques for Partial Reconfigurable Coprocessor,” pp. 187-195. (Year: 2002). |
Lie, Wang et al., “Dynamic partial reconfiguration in FPGAs,” pp. 445-448. (Year: 2009). |
Steiger, Christoph et al., “Operating Systems for Reconfigurable Embedded Platforms,” pp. 1393-1407. (Year: 2004). |
Yin, Dong et al., “Customizing Virtual Networks with Partial FPGA Reconfiguration,” pp. 57-64. (Year: 2010). |
Danek, Martin et al., “Increasing the Level of Abstraction in FPGA-Based Designs,” pp. 5-10. (Year: 2008). |
Horta, Edson L. et al., “Dynamic Hardware Plugins in an FPGA with Partial Run-time Reconfiguration,” Retrieved from “https://ieeexplore.ieee.org/document/1012647” pp. 343-348, [retrieved on Oct. 11, 2018]. (Year: 2002). |
Lysaght, Patrick et al., “Invited Paper: Enhanced Architectures, Design Methodologies and CAD Tools for Dynamic Reconfiguration of XILINX FPGAS,” Retrieved from “https://ieeexplore.ieee.org/document/4100950” pp. 1-6, [retrieved on Oct. 11, 2018]. (Year: 2006). |
Bolchini, Cristiana et al., “TMR and Partial Dynamic Reconfiguration to mitigate SEU faults in FPGAs,” Retrieved from “https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4358376” pp. 87-95, [retrieved on Oct. 11, 2018]. (Year: 2007). |
Heiner, Jonathan et al., “FPGA Partial Reconfiguration Via Configuration Scrubbing,” Retrieved from “https://ieeexplore.ieee.org/document/5272543” pp. 99-104, [retrieved on Oct. 11, 2018]. (Year: 2009). |
Papadimitriou, Kyprianos et al., “Performance of Partial Reconfiguration in FPGA Systems:A Survey and a Cost Model,” Retrieved from “https://dl.acm.org/citation.cfm?id=2068722” pp. 36:1-36:24, [retrieved on Oct. 11, 2018]. (Year: 2011). |
Rani, J. Sheeba et al., “FPGA Based Partial Reconfigurable Fir Filter Design,” Retrieved from “https://ieeexplore.ieee.org/document/6779423” pp. 789-792, [retrieved on Oct. 11, 2018]. (Year: 2014). |
Harikrishna, et al., “A Novel Online Fault Reconfiguration of FPGA”, In Proceedings of Indian Journal of Applied Research, vol. 3, Issue 8, Aug. 2013, pp. 195-198. |
Kearney, et al., “Using Simulated Partial Dynamic Run-Time Reconfiguration to Share Embedded FPGA Compute and Power Resources across a Swarm of Unpiloted Airborne Vehicles”, In Proceedings of EURASIP Journal of Embedded Systems, vol. 2007, Feb. 21, 2007, 12 pages. |
Abel, et al., “Increasing Design Changeability using Dynamical Partial Reconfiguration”, In Proceedings of 16th IEEE NPSS Real Time Conference, May 10, 2009, 7 pages. |
Emmert, et al., “Online Fault Tolerance for FPGA Logic Blocks”, In IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 15, Issue 2, Feb. 2007, pp. 216-226. |
Paulsson, et al., “Exploitation of Run-Time Partial Reconfiguration for Dynamic Power Management in Xilinx Spartan III-based Systems”, In Proceedings of the 3rd International Workshop on Reconfigurable Communication-centric Systems-on-Chip, Jun. 2007, 6 pages. |
“Secure Computing Architecture”, Retrieved on: Feb. 23, 2015 Available at: http://www.syprisresearch.com/home/secure-computing-architecture. |
Straka, et al., “Modern Fault Tolerant Architectures Based on Partial Dynamic Reconfiguration in FPGAs”, In IEEE 13th International Symposium on Design and Diagnostics of Electronic Circuits and Systems, Apr. 16, 2010, pp. 173-176. |
Conger, et al., “FPGA Design Framework for Dynamic Partial Reconfiguration”, In Proceedings of the 15th Reconfigurable Architecture Workshop, Apr. 14, 2008, 8 pages. |
Corbetta, et al., “Two Novel Approaches to Online Partial Bitstream Relocation in a Dynamically Reconfigurable System”, In Proceedings of IEEE Computer Society Annual Symposium on VLSI, Mar. 9, 2007, 2 pages. |
Putnam, et al., “A Reconfigurable Fabric for Accelerating Large-Scale Datacenter Services”, In Proceedings of ACM/IEEE 41st International Symposium on Computer Architecture, Jun. 14, 2014, 12 pages. |
Raaijmagers, et al., “Run-Time Partial Reconfiguration for Removal, Placement and Routing on the Virtex-II Pro”, In Proceedings of International Conference on Field Programmable Logic and Applications, Aug. 27, 2007, 5 pages. |
Kohn, Christian., “Partial Reconfiguration of a Hardware Accelerator on Zynq-7000 All Programmable SoC Devices”, In Proceedings of Application Note: Zynq-7000 All Programmable SoC, vol. XAPP1159, No. UG1159, Jan. 21, 2013, 19 pages. |
Rana, et al., “Partial Dynamic Reconfiguration in a Multi-FPGA Clustered Architecture Based on Linux”, In Proceedings of IEEE International Parallel and Distributed Processing Symposium, Mar. 26, 2007, 8 pages. |
Rehman, et al., “Test and Diagnosis of FPGA Cluster Using Partial Reconfiguration”, In Proceedings of 10th Conference on Ph.D. Research in Microelectronics and Electronics, Jun. 30, 2014, 4 pages. |
Gazzano, et al., “Integrating Reconfigurable Hardware-Based Grid for High Performance Computing”, in the Scientific World Journal vol. 2015, Apr. 16, 2015, 14 pages. |
“International Search Report and Written Opinion Issued in PCT Application No. PCT/US2016/038837”, dated Sep. 16, 2016, 18 Pages. |
Pereira, et al., “Characterization of FPGA-based High Performance Computers”, Retrieved From:https://vtechworks.lib.vt.edu/bitstream/handle/10919/34483/PimentaPereira_KS_T_2011.pdf?sequence=1, Aug. 9, 2011, 134 Pages. |
Rath, John, “Microsoft Working on Re-configurable Processors to Accelerate Bing Search”, Retrieved From: http://www.datacenterknowledge.com/archives/2014/06/27/programmable-fpga-chips-coming-to-microsoft-data-centers/, Jun. 27, 2014, 3 Pages. |
Saldana, et al., “TMD-MPI: An MPI Implementation for Multiple Processors Across Multiple FPGAs”, In International Conference on Field Programmable Logic and Applications, Aug. 28, 2006, 6 Pages. |
Schadt, et al., “Computational Solutions to Large-Scale Data Management and Analysis”, In Journal of Nature Reviews Genetics, vol. 11, Sep. 2010, 11 Pages. |
Slogsnat, et al., “An Open-Source Hyper Transport Core”, in Journal of ACM Transactions on Reconfigurable Technology and Systems, vol. 1, Issue 3, Sep. 2008, 21 Pages. |
So, et al., “A Unified Hardware/Software Runtime Environment for FPGA-Based Reconfigurable Computers using BORPH”, In Journal of ACM Transactions on Embedded Computing Systems, vol. 7, Issue 2, Feb. 2008, 28 Pages. |
Southard, Dale, “Best Practices for Deploying and Managing GPU Cluster”, Retrieved from http://on-demand.gputechconf.com/gtc-express/2012/presentations/deploying-managing-gpu-clusters.pdf, Dec. 18, 2008, 17 Pages. |
Stott, et al., “Degradation in FPGAs: Measurement and Modelling”, In Proceedings of the 18th Annual ACM/SIGDA International Symposium on Field Programmable Gate Array, Feb. 21, 2010, Feb. 21, 2010, 10 Pages. |
Stuecheli, Jeff, “Next Generation Power Microprocessor”, In proceedings of Hot Chips: A Symposium on High Performance Chips, Aug. 2013, 20 Pages. |
Sverdlik, Yevgeniy,, “Intel to Offer Hyper-Scale Operators Ability to Reconfigure CPUs on a Dime”, Retrieved From: https://www.datacenterknowledge.com/archives/2014/06/19/intel-offer-hyper-scale-operators-ability-reconfigure-cpus-dime, Jun. 19, 2014, 3 Pages. |
Tan, et al., “A Case for Fame: FPGA Architecture Model Execution”, In ACM SIGARCH, Computer Architecture News, vol. 38, No. 3, Jun. 19, 2010, pp. 290-301. |
Tan,, et al., “Datacenter-Scale Network Research on FPGAs”, In Proceedings of the Exascale Evaluation and Research Techniques Workshop, 2011, 6 Pages. |
Unnikrishnan,, et al., “Reconfigurable Data Planes for Scalable Network Virtualization”, in IEEE Transactions on Computers, vol. 62, No. 1, Jan. 2013, 14 Pages. |
Vanderbauwhede,, et al., “FPGA-accelerated Information Retrieval: High-Efficiency Document Filtering”, In Proceedings of the International Conference on Field Programmable Logic and Applications, Aug. 2009, 6 Pages. |
Vaz,, et al., “Deferring Accelerator Offloading Decisions to Application Runtime”, in Proceedings of the International Conference on ReConFigurable Computing and FPGAs, Apr. 24, 1994, 8 Pages. |
Wilson,, Richard,, “Big FPGA design moves to the cloud”, Retrieved From: https://www.electronicsweekly.com/news/products/fpga-news/big-fpga-design-moves-to-the-cloud-2013-06/, Jun. 11, 2013. |
Wilson,, Ron,, “Heterogeneous Computing Meets the Data Center”, Retrieved From: https://systemdesign.intel.com/heterogeneous-computing-meets-the-data-center/, Aug. 4, 2014, 3 Pages. |
Wittig, et al., “OneChip: An FPGA Processor With Reconfigurable Logic”, In Department of Computer and Electrical Engineering,University of Toronto, Apr. 17, 1996, 10 Pages. |
Yan, et al., “Efficient Query Processing for Web Search Engine with FPGAs”, In Proceedings of the IEEE 20th International Symposium on Field-Programmable Custom Computing Machines, Jun. 14, 2014, 4 Pages. |
Yin,, “Customizing Virtual Networks with Partial FPGA Reconfiguration”, In Proceedings of the Second ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures, Sep. 2010, 8 Pages. |
“Accelium 3700 Coprocessor”, Retrieved From http://drccomputer.com/downloads/DRC%20Accelium%203700%20Datasheet%20-%200ct%202013.pdf, Mar. 4, 2015, 1 Page. |
“Altera and IBM Unveil FPGA-Accelerated Power Systems”, Retrieved From: http://www.hpcwire.com/off-the-wire/altera-ibm-unveil-fpga-accelerated-power-systems/, Nov. 17, 2014, 5 Pages. |
“Altera Programmable Logic is Critical DNA in Software Defined Data Centers”, Retrieved From: http://newsroom.altera.com/press-releases/altera-microsoft-datacenter.html, Jun. 16, 2014, 2 Pages. |
“An Introduction to the Intel Quickpath Interconnect”, Retrieved From: http://www.inlel.in/content/dam/doc/white-paper/quick-path-interconnect-introduction-paper.pdf, Jan. 2009, 22 Pages. |
“An Introduction to the Nl Lab View Rio Architecture”, Retrieved From: http://www.ni.com/white-paper/10894/en, Jan. 28, 2015, 4 Pages. |
“BEE4 Hardware Platform”, Retrieved From: http://beecube.com/downloads/BEE42pages.pdf, Feb. 26, 2015, 2 Pages. |
“Cisco UCS C240-M3 Rack Server with NVIDIA GRID GPU cards on Citrix XenServer 6.2 and XenDesktop 7.5”, Retrieved From: http://www.cisco.com/c/en/us/products/collateral/servers-unified-computing/ucs-c-series-rack-servers/Whitepaper_C11-732283.pdf, Jul. 2014, 38 Pages. |
“Cray XD1 Datasheet”, Retrieved From http://www.carc.unm.edu/-tlthomas/buildoui/Cray_XD1_Datasheel.pdf, Mar. 4, 2015, 6 Pages. |
“Final Office Action Issued in U.S. Appl. No. 14/717,788”, dated May 2, 2017, 18 Pages. |
“Final Office Action Issued in U.S. Appl. No. 14/717,788”, dated Nov. 6, 2017, 18 Pages. |
“Final Office Action Issued in U.S. Appl. No. 14/752,800”, dated Nov. 8, 2017, 14 Pages. |
“How Microsoft Designs its Cloud-Scale Servers”, Retrieved From: http://download.microsoft.com/download/5/7/6/576F498A-2031-4F35-A 156-BF8DB 1 ED3452/How_MS_designs_its_cloud_scale_servers_strategy_paper.pdf, Feb. 26, 2015,, 6 Pages. |
“IBM PureData System for Analytics N2001”, Retrieved From: http://public.dhe.ibm.com/common/ssi/ecm/wa/en/wad12353usen/WAD12353USEN.PDF, Feb. 26, 2015, 8 pages. |
“International Preliminary Report on Patentability Issued in PCT Patent Application No. PCT/ US2016/026285”, Oct. 26, 2017, 12 Pages. |
“MicroBlaze Processor Reference Guide, Embedded Development Kit”, Retrieved From: http://www.xilinx.com/support/documentation/sw_manuals/xilinx14_2/mb_ref_guide.pdf, 2012, 256 Pages. |
“QP: A Heterogeneous Multi-Accelerator Cluster”, In Proceedings of the 10th LCI International Conference on High-Performance Clustered Computing, Mar. 2009, 8 pages. |
NIU, et al., “Reconfiguring Distributed Applications in FPGA Accelerated Cluster with Wireless Networking”, IEEE 21st International Conference on Field Programmable Logic and Applications, 2011, 2011, 6 Pages. |
“SRC MAPstation Systems”, Retrieved From: http://www.srccomp.com/sites/default/files/pdf/SRC7_MAPstation_70000-AG.pdf, Feb. 26, 2015, 2 Pages. |
“Stratix V Device Handbook”, available at «http://www.altera.com/literature/hb/stratix-v/stx5_core.pdf and http://www.16 altera.com/literature/hb/stratix-v/stx5_xcvr.pdf», vols. 1 and 2, Altera Corporation, San Jose, CA, Sep. 30, 2014, 563 Pages. |
“The Convey HC-2 Computer: Architectural Overview”, Retrieved From: http://www.conveycomputer.com/index.php/download_file/view/143/142/, 2012, 10 pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 14/717,680”, dated Jan. 11, 2017, 11 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 14/717,752”, dated Nov. 7, 2016, 16 Pages. |
“Final Office Action Issued in U.S. Appl. No. 14/717,752”, dated Feb. 9, 2017, 14 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 14/717,788”, dated Jan. 31, 2018, 18 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 14/717,788”, dated Jan. 25, 2017, 20 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 14/717,788”, dated Aug. 22, 2017, 17 Pages. |
“Final Office Action Issued in U.S. Appl. No. 14/717,721”, dated Jun. 29, 2018, 51 Pages. |
“Final Office Action Issued in U.S. Appl. No. 14/717,721”, dated Apr. 5, 2017, 27 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 14/717,721”, dated Jan. 27, 2017, 25 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 14/717,721”, dated Jan. 24, 2018, 40 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 14/752,778”, dated Feb. 2, 2017, 23 Pages. |
Caulfield, “A Cloud-Scale Acceleration Architecture”, In 49th Annual IEEE/ACM International Symposium on Microarchitecture, Oct. 15, 2015, 13 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 14/752,800”, dated May 3, 2018, 13 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 14/752,800”, dated May 9, 2017, 12 Pages. |
“Final Office Action Issued in U.S. Appl. No. 14/752,802”, dated Jul. 7, 2017, 18 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 14/752,802”, dated Feb. 10, 2017, 28 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 14/752,807”, dated Jun. 21, 2018, 13 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 14/752,807”, dated Sep. 22, 2017, 15 Pages. |
“Office Action Issued in European Application No. 16719599.9”, dated Aug. 9, 2018, 5 Pages. |
“Office Action Issued in European Patent Application No. 16719604.7”, dated Aug. 9, 2018, 7 Pages. |
“Office Action Issued in European Patent Application No. 16719605.4”, dated Aug. 9, 2018, 5 Pages. |
Alachiotis,, et al., “Efficient PC-FPGA Communication Over Gigabit Ethernet”, in Proceedings of the 10th IEEE International Conference on Computer and Information Technology, Jun. 2010, 8 Pages. |
Alder et al., “Leap Scratchpads: Automatic Memory and Cache Management for Reconfigurable Logic”, In Proceedings of the 19th ACM/SIGDA International Symposium on Field Programmable Gate Arrays, Feb. 2011, 4 Pages. |
Baxter,, et al., “Maxwell—a 64 FPGA Supercomputer”, In Proceedings of the Second NASA!ESA Conference on Adaptive Hardware and Systems, 8 Pages. |
Bharthi, et al., “A Reconfigurable Framework for Cloud Computing Architecture”, Journal of Artificial Intelligence, vol. 6, Issue 1, Jan. 14, 2013, 4 Pages. |
Blott,, “Dataflow Architectures for 10Gbps Line-Rate Key-Value Stores”, In Proceedings of the Symposium on High Performance Chips, Aug. 25, 2013, 25 Pages. |
Bolchini, et al., “A Reliable Reconfiguration Controller for Fault-Tolerant Embedded Systems on Multi-FPGA 29 Platforms”, In Proceedings of the IEEE 25th International Symposium on Defect and Fault Tolerance in VLSI Systems, D Oct. 6, 2010, Oct. 6, 2010, 9 Pages. |
Burger, et al., “Providing Services in a System having a Hardware Acceleration Plane and a Software Plane”, , 118 Pages. |
Burger,, et al., “Data Processing System having a Hardware Acceleration Plane and a Software Plane”, filed Apr. 17, 2015, 156 Pages. |
Cervero, et al., “A resource manager for dynamically reconfigurable FPGA-based embedded systems”, In Proceedings of the Euromicro Conference on Digital System Design, Sep. 2013, 8 Pages. |
Chalamalasetti, et al., “Evaluating FPGA-Acceleration for Real-time Unstructured Search”, In Proceedings of the IEEE International Symposium on Performance Analysis of Systems & Software, Apr. 2012, 10 Pages. |
Chen, et al., “Enabling FPGAs in the Cloud”, In Proceedings of the 11th ACM Conference on Computing Frontiers, Published on: May 20, 2014, 10 pages. |
Chiou, et al., “Handling Tenant Requests in a System that Uses Acceleration Components”, U.S. Appl. No. 14/717,752, filed May 20, 2015, 120 Pages. |
Chung, et al., “CoRAM: An In-Fabric Memory Architecture for FPGA-based Computing”, In Proceedings of the 19th ACM/SIGDA International Symposium on Field Programmable Gate Arrays, Feb. 2011, 10 pages. |
Eguro, et al., “FPGAS for Trusted Cloud Computing”, In Proceedings of the International Conference on Field-Programmable Logic and Applications, Aug. 2012, 8 Pages. |
Eshelman,, DJ,, “Think You Don't Need GPUs in the Datacenter? Think Again”, Retrieved From: http://www.gtri.com/think-you-dont-need-gpus-in-the-datacenter-think-again/, Jul. 23, 2014, 9 Pages. |
Estlick., et al., “Algorithmic Transformations in the Implementation of K-Means Clustering on Reconfigurable Hardware”, In Proceedings of the ACM/SIGDA Ninth International Symposium on Field Programmable Gate Arrays, February 2001,, 8 Pages. |
Fahmy,, “A Case for FPGA Accelerators in the Cloud”, Poster in of ACM Symposium on Cloud Computing, Nov. 2014, 1 Pages. |
George,, et al., “Novo-G: AI the Forefront of Scalable Reconfigurable Supercomputing”, in Journal of Computing in Science & Engineering, vol. 13, Issue 1,, Jan. 2011,, 5 Pages. |
Hammad, et al., “Highly Expandable Reconfigurable Platform using Multi-FPGA based Boards”, In International Journal of Computer Applications, vol. 51 No. 12, Aug. 2012, 6 Pages. |
Hussain,, et al., “Highly Parameterized K-means Clustering on FPGAs: Comparative Results with GPPs and GPUs”, In Proceedings of the International Conference on Reconfigurable Computing and FPGAs, Nov. 2011, 6 Pages. |
Inoue,, et al., “20Gbps C-Based Complex Event Processing”, In Proceedings of the 2011 21st International Conference on Field Programmable Logic and Applications, 2011, 6 Pages. |
Inta, et al., “The ‘Chimera’: An Off-The-Shelf CPU/GPGPU/FPGA Hybrid Computing Platform”, In International Journal of Reconfigurable Computing, vol. 2012, Article ID 241439, Jan. 2012, 10 Pages. |
Jamuna, et al., “Fault Tolerant Tecniques for Reconfigurable Devices: a brief Survey”, In International Journal Application or Innovation in Engineering & Management, vol. 2, Issue 1,, Jan. 2013, 6 Pages. |
Jun,, et al., “Scalable Multi-Access Flash Store for Big Data Analytics”, in Proceedings of 22nd ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, Feb. 26, 2014, 10 Pages. |
Kachris, et al., “A Configurable MapReduce Accelerator for Multi-core FPGAs”, In Proceedings of the 2014 ACM/SIGDA international symposium on Field-programmable gate arrays, Feb. 26-28, 2014, 1 Page. |
Kachris,, et al., “A Reconfigurable MapReduce Accelerator for Multi-Core All-Programmable SoCs”, in Proceedings of the International Symposium on System-on-Chip, Oct. 28, 2014, 6 Pages. |
Khalilzad,, et al., et al., “FPGA implementation of Real-time Ethernet communication using RMII Interface”, In Proceedings of the IEEE 3rd International Conference on Communication Software and Networks, May 2011, 7 Pages. |
Kim, “Polymorphic On-Chip Networks”, In 35th International Symposium on Computer Architecture, Jun. 21, 2008, pp. 101-112. |
Kirchgessner,, et al., “VirtuaiRC: A Virtual FPGA Platform for Applications and Tools Portability”, In Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, Feb. 2012,, 4 Pages. |
Krieg, et al., “Run-Time FPGA Health Monitoring using Power Emulation Techniques”, In Proceedings of the IEEE 54th International Midwest Symposium on Circuits and Systems, Aug. 7, 2011, 4 Pages. |
Lavasani,, et al., “An FPGA-based In-line Accelerator for Memcached”, in IEEE Computer Architecture Letters, vol. 13, No. 2, Jul. 15, 2013, 4 Pages. |
Machidon, et al., “Cloud Perspective on Reconfigurable Hardware”, In Review of the Air Force Academy, 6 Pages. |
Macvitiie,, et al., “Hardware Acceleration Critical Component for Cost-Conscious Data Centers”, Retrieved From: https://devcentral.f5.com/articles/hardware-acceleration-critical-component-for-cost-conscious-data-centers, Mar. 24, 2009, 10 Pages. |
Madhavapeddy, et al., “Reconfigurable Data Processing for Clouds”, In Proceedings IEEE International Symposium on Field-Programmable Custom Computing Machines, May 1, 2011, 5 Pages. |
Mamiit,, Aaron,, “Intel develops hybrid Xeon-FPGA chip for cloud services”, Retrieved From:https://www.techtimes.com/articles/8794/20140620/intel-develops-hybrid-xeon-fpga-chip-for-cloud-services.htm, Jun. 20, 2014, 4 Pages. |
Markettos,, et al., “Interconnect for commodity FPGA clusters: standardized or customized?”, In Proceedings of the 24th International Conference on Field Programmable Logic and Applications, Sep. 2, 2014, 8 Pages. |
Martin,, et al., “FPGA-Based Application Acceleration: Case Study with GZIP Compression/Decompression Streaming Engine”, In ICCAD Special Session 7C, Nov. 2013, 1 Page. |
McLoughlin, et al., “Achieving Low-cost High-reliability Computation Through Redundant Parallel Processing”, In Proceedings of International Conference on Computing & Informatics, Jun. 6, 2006, 6 Pages. |
Mershad, et al., “A Framework for Multi-cloud Cooperation with Hardware Reconfiguration Support”, In the Proceedings of IEEE Ninth World Congress on Services, Jun. 28, 2013, pp. 52-59. |
Mesquita, et al., “Remote and Partial Reconfiguration of FPGAs: tools and trends”, In Proceedings of the International Parallel and Distributed Processing Symposium, Apr. 22, 2003, 8 Pages. |
Moorhead,, Patrick,, “Moving Beyond CPUs in the Cloud: Will FPGAs Sink or Swim?”, Retrieved From: http://www.moorinsightsstrategy.com/wp-content/uploads/2014/12/Moving-Beyond-CPUs-in-the-Cloud-Will-FPGAs-Sink-or-Swim-by-Moor-Insights-and-Strategy.pdf Dec. 2, 2014, 5 Pages. |
Morris,, Kevin,, “FPGAs Cool Off the Datacenter”, Retrieved From https://www.eejournal.com/article/20141118-datacenter/, Nov. 18, 2014, 5 Pages. |
Mysore, et al., “Portland: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric”, In ACM SIGCOMM Computer Communication Review, vol. 39, No. 4,, Aug. 16, 2009, 12 Pages. |
Oden, et al., “GGAS: Global GPU Address Spaces for Efficient Communication in Heterogeneous Clusters”, In Proceedings of the IEEE International Conference on Cluster Computing, Sep. 23, 2013, 8 Pages. |
Papadimitriou, et al., “Performance of Partial Reconfiguration in FPGA Systems; A Survey and a Cost Model”, In ACM Transactions on Reconfigurable Technology and Systems, vol. 4, No. 4, Dec. 1, 2011, 24 Pages. |
PCT/ US2016/038841, “International Search Report and Written Opinion in PCT Application No. PCT/US2016/038841”, dated Sep. 28, 2016, 18 Pages. |
“International Search Report & Written Opinion Issued in PCT Application No. PCT/US2016/026284”, dated Jun. 20, 2016, 13 Pages. |
“International Search Report & Written Opinion Issued in PCT Application No. PCT/US2016/026285”, dated Jun. 23, 2016, 16 Pages. |
“International Preliminary Report on Patentability Issued in PCT Application No. PCT/US2016/026286”, dated May 24, 2017, 11 Pages. |
“International Search Report and Written Opinion Issued in PCT Application No. PCT/US2016/026286”, dated Jul. 4, 2016,, 15 Pages. |
“Second Written Opinion Issued in PCT Application No. PCT/US2016/026286”, dated Oct. 14, 2016, 9 Pages. |
“International Search Report and Written Opinion Issued in PCT Application No. PCT/US2016/026287”, dated Jul. 4, 2016, 16 Pages. |
“International Preliminary Report on Patentability Issued in PCT Application No. PCT/US2016/026290”, dated Mar. 13, 2017, 8 Pages. |
“International Search Report & Written Opinion Received for PCT Application No. PCT/US2016/026291”, dated Jun. 20, 2016, 11 Pages. |
“International Preliminary Report on Patentability Issued in PCT Application No. PCT/US2016/026293”, dated Mar. 13, 2017, 8 Pages. |
“International Search Report & Written Opinion Received for PCT Application No. PCT/US2016/026293”, dated Jun. 20, 2016, 10 Pages. |
“International Search Report and Written Opinion Issued in PCT Application No. PCT/US2016/038838”, dated Sep. 5, 2016, 12 Pages. |
Pell, et al., “Surviving the end of frequency scaling with reconfigurable dalaftow computing”, In ACM SIGARCH Computer Architecture News, vol. 39, Issue 4, Sep. 2011, 6 Pages. |
“Final Office Action Issued in U.S. Appl. No. 14/752,807”, dated Oct. 18, 2018, 7 Pages. |
Number | Date | Country | |
---|---|---|---|
20160378460 A1 | Dec 2016 | US |