The bus standards and the interfaces change frequently in the computer industry. Every 4-5 years a new bus emerges. Transitioning into a new computer architecture is both lengthy and tedious. Since 1945, the computer industry has consolidated the computer that we currently use today. However, with the advent of the Internet, the landscape has drastically changed due to new challenges related to the communication and the security. In this presentation, we will discuss a new computer architecture, history, philosophy, science fiction and the environment.
Double Revolving field theory-how the rotor develops torque
Presentation netmory
1. Consensus Consortium .
● Computer Architecture
● Science fiction
● Philosophy
● Environment
● History
For more about me and me and I and me goto :
● https://www.linkedin.com/in/getme/
Presentation NETMORY
2. Consensus Consortium .
Sent: Wednesday, July 23, 2014 12:59 PM
To: Mikhael Lerman (mlerman)
…/... and (you) should not share anything
regarding the invention with any
other company personnel …/...
4. Consensus Consortium .
The problem The solution
We periodically do file/save,
but why?
An new computer architecture where :
● The main memory is NV (Non Volatile)
● The main memory has no upper limit
We don't need to worry about loosing
data any more any time.
7. Consensus Consortium .
Disk-centric computer !
CPU
BOOT
ROM
Shadowed
In
Main
Memory
(BIOS)
DISK
(OS)
MBR Master Boot Record (Linux)
Boot sector (windows)
10sec
Memory
centric
Disk
centric
8. Consensus Consortium .
To : Network-centric computer
CPU
BOOT
ROM
Shadowed
In
Main
Memory
(BIOS)
DISK
(OS)
MBR Master Boot Record (Linux)
Boot sector (windows)
Network
centric
Disk
centric
10. Consensus Consortium .
What is his name?
He was born in 1903
Princeton University
Manhatan project
Genius mathematician
11. Consensus Consortium .
John von Neuman and the
Institute for Advanced Study
computer, a fully automatic,
digital, all-purpose
computing machine
constructed by him and his
team, 1945.
January 01, 1945
(Photo by PhotoQuest/Getty Images)
12. Consensus Consortium .
von Neuman = finite memory, infinite states
CPU MEM
IO
Finite size
infinite states
13. Consensus Consortium .
Turing machine = infinite memory, finite states
Ex : JTAG TAP controller is a Turing machine
infinite memory (the tape)
Finite states (16)
TDI
TMS
TCK
TDI
TMS
TCK
TDI
TMS
TCK
TDI
TMS
TCK
TDI
TMS
TCK
TDI
TMS
TCK
18. Consensus Consortium .
FIG. 5
Mem
Mem
Firmware CPU
BUS
Mem
Control
Storage
Control
Network
Control
NET
I/F
Core
I/F
504
509 501
505 506 507
508
503
510
502
21. Consensus Consortium .
Pointers referencing
remote memory locations
on the network.
● With Netmory, one computer can use the memory of another computer,
over the network.
● To achieve this, Netmory transfers memory resources over the network.
22. Consensus Consortium .
Local computer
A
time
Computer A requests a memory block of 1GB from computer B
1GB from B is granted to A with Block ID = B0
A request to write in block ID B0, data 12345678
A request to read from block ID B0
Reply with data = 12345678
The memory size of computer A
is increased by 1GB.
Protocol of communication for Netmory over the world network
The memory size of computer B
is decreased by 1GB. The block
is reserved for use of computer A.
Computer A uses the
memory of computer B
Computer B serves memory to
computer A.
Remote computer in the world
B
24. Consensus Consortium .
FIG. 5
Mem
Mem
Firmware CPU
BUS
Mem
Control
Storage
Control
Network
Control
NET
I/F
Core
I/F
504
509 501
505 506 507
508
503
510
502
25. Consensus Consortium .
Content location Access type Latency
Local immediat memory Byte address deterministic
Local storage Block device address Semi deterministic
Remote IP device address Non deterministic
26. Consensus Consortium .
Local from the storage areaLocal from the immediat memory Remote from the world
LSB MSB
Pointer or address
Extensible up to the physical
top of the immediat memory.
Ex 16GB.
Extensible up to the physical
size of the local storage.
Ex 4TB.
Extensible indefinitely.
27. Consensus Consortium .
What is network ?
There are 2 ways to look at the network
- The network is a connection (link)
- The network is a
media (memory)
I am going to tell you here a story of an idea.
I have worked many years in the computer industry (29) – mostly in the PC chipset = core logic.
I worked 12 y at AMD. 2000-2012
This idea stroke me when I left AMD after the sabatical.
I proposed this idea to multiple companies. Usually it didn't pass the committee. So I decided to draft myself the disclosure and file first a provisional application 2013, then one year later the final application 2014.
There is one large memory company for which for which I worked. I offered them to share the ownership. But I've got a strange response:
I should not talk to anybody in the company about this idea:
THE PEOPLE MUST NOT KNOW ABOUT THIS IDEA.
THE PEOPLE MUST NOT KNOW ABOUT THIS IDEA
Other strange things happened:
- they change sidewalk or they use another elevator.
- stuff like that
We start here with the environment.
Note about Consensus Consortium: Consensus Consortium is a Californian, nonprofit, Mutual Benefit, Corporation. The specific purpose of this corporation is to reduce global warming, due to computing and communication, with NETMORY, through standardization, research, education and regulation.
I think that this growing consumption is because the centralization.
A distributed solution can be neutral for the environement.
And this is tightly related to the computer architecture.
Transition: Next let's talk more about computer architecture
- Explain the picture of the girl
The top of memory
Why File/Save ? 2 reasons
- In the era of the artificial intelligence, why the computer cannot do this simple operation?
- We help the architecture
- ad vitam aeternam : because the main memory has no upper limit.
Next deep in computer architecture.
All the high speed busses (USB, PCIE, SATA, Ethernet) in the PC motherboard are now serial (LVDS = Low Voltage Differential Signals) except one = memory.
Simulate with the pen the traffic for
- download
- unzip
- install/configure
- Page swapping because of Virtual memory
- execute (micro architecture)
- Fetch/Decode/Execute/WriteBack
VIRTUAL MEMORY IS EVIL
- With Netmory : much less energy for the same result
- use current technonogy just arranged differently.
Next: let's go back to the history (MSDOS)
MS-DOS, do you remember.
Some of you were not even born !
What the D stands for in MS-DOS
The computer is NOT memory or CPU centric, it is Disk centric
This slide shows the boot flow in the modern computer.
After power on there is the reset.
We start executing code from the boot ROM shadow of the main memory. At this point it is memory centric
It is memory centric only 10 seconds after power on.
The BIOS gives control to the DISK.
The disk is the final destination of the content and programs.
The reason we jump quickly to the disk is because in the BIOS, the resources are limited: not enough memory and no storage and no network.
Next : But what if we have enough resources?
What if we do have enough resources in the BIOS.
Like If operating systems did not exist, developers around the world would compile their code against a standardized machine architecture directly.
Code will run as bare-metal.
Operating systems are intermediate, they slow down computer operations.
Next : bottleneck
- we have looked at the bottleneck
- This is the biggest problem in computing today
- This creates a wall for High Performance Computing. Discussed with Peter Ungaro CEO of Cray Inc.
Next : Quiz
Quiz: who knows who is that man?
He was born the same year my father was born
He can see a phone book page and remember all the numbers.
He was born in a Jewish family, in Budapest. His hebrew name is Jona.
He liked working in noisy environment, ex with marching band music.
His office was close to the office of Einstein at the Princeton University.
Next : the full picture
Today a computer does 3 things :
- It computes
- It remember (memorize)
- It communicate
But at that time in 1945 they didn't think that the computer are going to be in a network and talk to each other.
Today I am going to show you that not only computers can talk to each other, but also they can use the memory of each other.
Show with the smartphone in hand.
The fastest possible communication.
You can also communicated directly without passing through a data center.
The von Neuman machine was revolutionary because the CPU can be in a arbitrary number of states.
But the memory used to store the program is limited.
Still today we are in the same situation.
Next : another popular machine is the Turing machine.
It is a Turing machine.
The TAP controller : Test Access Port, is a patent from philips of year 2000. It is a very successful device.
It is in every device and PC.
This patent will expire likely next year in 2020 and will be in the public domain.
It is estimated that Alan Turing saved 14 millions of lives in the 2nd world war. Because of him the war ended 2 years earlier.
Through the tape, the Turing machine has an infinite memory.
Next : discussion about infinity with the US PTO, another phylosophical topic.
Netmory is the best of both worlds
- infinite states
- infinite memory
Next : I had this discussion about infinity with the Patent Office. I am going to share a little curiosity.
I want to share a curiosity during the patent examination.
Then later I argumented:
I didn't say the memory expands infinitely. I said indefinitely which means in an indefinite manner.
The USPTO didn't accept this argument.
Next : let's talk more about the interconnect
Let's have a closer look at the interconnect
A computer does 3 things :
- It computes
- It remember (memorize)
- It communicate
Those 3 functions of the computer are unified here in the interconnect.
The interconnect has 2 interfaces Network and Memory. That's why it is called NetMory.
Transition : This is the physical design of the interconnect.
The interconnect is a subsystem. It is like a computer itself.
Next is a logical function with a focus on the network client server.
On the core side the interconnect is server ONLY.
It serves requests from the core.
On the network side it is both client and server.
It is client so the request from the core can be served.
It is server so this machine can serve request for a remote core.
This way we can build a p2p network. (internet)
Note : the interconnect itself is local
Next : summarize of the physical and the logical view
science fiction
This piece of code is possible with this new architecture
It is like the whole world is ONE computer.
Netmory is a utility patent.
I showed you (with indefinitely) that The USPTO doesn't grant patent based on fiction. So what is shown here is possible in the future.
This shows an example of a protocol for transfering memory resource over a network.
We are not transfering just content but memory resource.
Those are commands like memory reads and memory writes.
For obvious reasons, the pointers in this architecture are different and more complex than what we are used to.
Transistion: Let's have a closer look at the pointers and the memory addressing in general.
To understand the addressing...
There are only 3 types of memory access, depending on where the content is located:
1. In the immediat memory. Like normal DRAM
2. Locally in the storage area of the interconnect
3. In the network
Transition : More about the 3 types and characteristics
You are used to 2 types of memory.
The byte addressable memory
- the unit of transfer is the machine word. 16-bit, 32, or 64-bit
The block devices
- The unit of transfer is a sector, ex 512 bytes.
We have here created a third type of memory, which coresponds to the IP memory.
This architecture is ad vitam aeternam
Currently we need to change the top of the memory for each generation of computer. The notable limits are
1M, 4Gig, 16G etc.
But this is not indefinite
For Netmory the address field is of a variable size to accommodate this feature.
For Netmory, the network is a media. It is a new type of memory that is not byte addressable and is not a block device.
Next : Synapse
I called one connection between 2 computer : Synapse.
In the brain there are over 100 trillion of synapses
In the nature there are situations where a phenomenon (an observable fact or event) occurs when a certain level of concentration occurs. Those are critical numbers, like Magic numbers.
- for example in nuclear science there is the critical mass, over which the chain reaction can occur.
- I believe that there is a critical number of connections in the brain over which the intelligence (reaction) occurs.
Maybe one day we will be able with every computer in the world reach this critical number of connections.
While Virtual Memory is evil, cache is good
Every memory is a cache for another memory.
When we have 2 memory with different access time, we have a method in hardware that is called caching.
The CPU run at the fastest possible speed
We give him fast SRAM L1 cache
L1 cache absorbes the latency of the L2 a slower SRAM
L2 cache absorbes the latency of the DRAM even slower
The DRAM absorbe the latency of the storage
The storage absorbes the latency of the network
There a cache coverage is overlapping between 2 communicating nodes.
Next : global view of the network
Dictionary, definition of “collective memory”
noun
the memory of a group of people, passed from one generation to the next.
For example the bible and the story of the creation of the world is part of the collective memory.
What is good and evil is also part of the collective memory.
Here it is a digital electronic collective memory. E-collective memory
I want to conclude this presentation with this sentence from the bible.
You interprete it the way you want.