
Edge Computing Acceleration
Beschreibung
Alles über E-Books | Antworten auf Fragen rund um E-Books, Kopierschutz und Dateiformate finden Sie in unserem Info- & Hilfebereich.
Discover the latest advances in computer architecture and software at the dawn of the 5G/6G era
In Edge Computing Acceleration: From 5G to 6G and Beyond, distinguished researchers Dr. Patrick Hung, Hongwei Kan, and Greg Knopf deliver a comprehensive overview of personal computer architecture and software design usage in the upcoming 5G decade. The authors begin by introducing key components and exploring different hardware acceleration architectures. They move on to discuss 5G data security and data integrity and offer a survey of network virtualization technologies, including accelerated virtualization technologies.
The book analyzes 5G/6G system performance, investigating key design considerations and trade-offs and introducing high-level synthesis flow. It concludes with chapters exploring design verification and validation flow, illustrations of 5G applications based on artificial intelligence and other emerging technologies and offering highlights of emerging 6G research and roadmaps.
Readers will enjoy the combination of accessible descriptions of new technologies presented side-by-side as a step-by-step guide to designing effective 5G systems. The book also includes:
- A thorough introduction to key 5G/6G components, including new wireless communication protocols, edge and fog computing, acceleration technologies, IoE architectures, software-designed networks, network function virtualization, and data security
- Explorations of various hardware acceleration architectures, like FPGA and GPU acceleration architectures
- Practical discussions of 5G/6G data security, data integrity, and a survey of network virtualization technologies
- In-depth treatments of 5G/6G system performance, key design considerations, high-level synthesis flow, design verification, and validation flow
Perfect for undergraduate and graduate students in programs related to communications technology, engineering, and computer science, Edge Computing Acceleration: From 5G to 6G and Beyond is a must-have resource for engineers, programmers, system architects, technical managers, communications business executives, telco operators, and government regulators who regularly interact with cutting-edge communications equipment.
Weitere Details
Weitere Ausgaben
Andere Ausgaben

Personen
Patrick Hung, PhD, is a co-founder of Alta Sicuro Technology, and was Consulting Assistant Professor at Stanford University. He is currently Vice-Chairman of IEEE Hong Kong Section Computer Society Chapter and IEEE ESOC Technical Committee member. Dr. Hung was Taishan Scholar in China and CBI Overseas Scholar in UK.
Hongwei Kan is Chief Expert & General Manager at the Institute of Pioneering Technologies (IPT) at Tsinghua Unigroup, responsible for designing and development its next-generation computer architecture. Mr. Kan is a Visiting Professor at Beijing University of Posts and Telecommunications and the China University of Mining and Technology.
Greg Knopf is Senior Director of Server Customer Engineering at Advanced Micro Devices (AMD). Through his engineering leadership roles at AMD and Intel, Mr. Knopf contributed to the development of more than ten generations of flagship server CPUs.
Inhalt
About the Authors xi
Foreword (professor Ray Cheung) xiii
Foreword (Raghu Nambiar) xv
Preface xvii
Acknowledgment (Patrick Hung) xix
Acknowledgment (Greg Knopf) xxi
Part I Introduction 1
1 Introduction 3
1.1 Introducing 5G and Internet of Everything 4
1.2 Edge Computing Architecture 8
1.2.1 Edge Versus Cloud Computing 10
1.2.2 Edge Design Options 11
1.2.3 Key Benefits of Edge Computing 12
1.3 Custom Computing 14
1.3.1 Introduction to Custom Computing 14
1.3.2 5G/6G Security Concerns 15
1.3.3 Custom Edge Computing Cards 17
1.4 Deployment Considerations 18
1.4.1 5G/6G Cell Architecture 19
1.4.2 5G/6G Private Network 21
1.4.3 Infrastructure Sharing 23
References 26
2 Overview of 5G and 6G 31
2.1 5G Timeline 31
2.2 5G Spectrum 32
2.3 Characteristics of 5G 34
2.4 5G New Radio 34
2.4.1 Orthogonal Frequency-Division Multiplexing 34
2.4.2 Massive MIMO 36
2.4.3 Beamforming 37
2.4.4 Multiuser MIMO 38
2.5 Data Plane and Control Plane Separation 38
2.6 5G Applications 40
2.7 Smooth Transition to 6G 42
2.8 6G Expected Timeline, Spectrum, and Characteristics 46
2.9 6G Potential Applications 48
2.10 Edge, Fog, and Cloud Computing in Relation to 5G and 6G 50
2.10.1 Edge Computing in Relation to 5G and 6G 51
2.10.2 Fog Computing in Relation to 5G and 6G 53
2.10.3 Cloud Computing in Relation to 5G and 6G 55
References 57
Part II Theory 63
3 High-Level Synthesis (HLS) 65
3.1 Why Use High-Level Synthesis? 67
3.1.1 Hardware Acceleration with High-Level Synthesis 68
3.2 Common HLS Languages and Platforms 69
3.2.1 Compute Unified Device Architecture (CUDA) 70
3.2.1.1 CUDA and HLS for Hardware Acceleration 70
3.2.1.2 Advantage of Using CUDA and HLS for Hardware Acceleration 71
3.2.2 OpenCL 72
3.2.2.1 OpenCL and HLS for Hardware Acceleration 73
3.2.2.2 Advantages of Using OpenCL with HLS Tools for Hardware Acceleration 74
3.2.3 Maxeler MaxJ 75
3.2.3.1 Using Maxeler MaxJ with HLS for Hardware Acceleration 76
3.2.3.2 Advantages of Using Maxeler MaxJ with HLS for Hardware Acceleration 77
3.3 Limitations and Challenges of HLS 79
3.4 Using HLS in 5G Edge Computing 80
3.4.1 User (Data) Plane Acceleration 81
3.4.2 Control Plane Acceleration 82
3.4.3 Advantages of Using HLS for User Plane and Control Plane Acceleration 83
References 85
4 Coding Design 89
4.1 Overview 89
4.2 Error Correction Codes (ECCs) 90
4.2.1 Turbo, Low-Density Parity-Check, and Polar Codes 92
4.2.1.1 Turbo Codes 93
4.2.1.2 LDPC Codes 94
4.2.1.3 Polar Codes 97
4.3 Security Codes 98
4.3.1 Public Key Infrastructure 99
4.3.2 Symmetric and Asymmetric Cryptography Concepts 100
4.3.2.1 Symmetric Key Cryptography 100
4.3.2.2 Asymmetric Key Cryptography 101
4.3.3 Existing Algorithms and Standards 103
4.3.3.1 Advanced Encryption Standard 103
4.3.3.2 RSA Algorithm 103
4.3.3.3 Elliptic Curve Cryptography 104
4.4 Emerging 5G Security Design Acceleration 105
4.4.1 Blockchain 105
4.4.2 Lightweight Encryption Algorithms 108
4.4.2.1 SIMON and SPECK Algorithms 108
4.4.2.2 PRESENT Algorithm 110
4.4.2.3 GIFT Algorithm 112
4.4.3 Network Codes 113
4.4.4 Post-Quantum Cryptography 115
4.4.5 Homomorphic Encryption 116
4.4.6 Zero-Knowledge Proof 118
References 120
Part III Architecture 125
5 Hardware Architecture 127
5.1 Development Timeline 127
5.2 Operating Spectrum 128
5.3 Core Requirements 133
5.4 New Radio Access Technology 135
5.4.1 Orthogonal Frequency-Division Multiplexing 135
5.4.2 Massive MIMO (Multiple-Input Multiple-Output) 137
5.4.3 Beamforming 137
5.4.4 Multiuser MIMO 138
5.5 Network Architecture 138
5.5.1 Next Generation Radio Access Network 139
5.5.2 5G Core 140
5.5.2.1 Control and User Plane Separation (CUPS) 140
5.5.2.2 Service-Based Architecture (SBA) 140
5.6 Performance Improvement 142
5.6.1 Computing and Network Convergence 142
5.6.2 Related Works 144
5.6.3 Smart_xPU Design Methodology 148
5.6.3.1 Data Flow Optimization 148
5.6.3.2 Distributed System Optimization 151
5.6.3.3 Core Microarchitecture Optimization 154
5.6.3.4 Software/Hardware Interface Optimization 156
5.6.3.5 Analyzing the Smart_xPU Architecture 159
5.6.4 Summary of the Smart_xPU Architecture 160
References 162
6 Software Architecture 167
6.1 End-to-End Example of 5G System 167
6.1.1 High-Level Description 167
6.1.1.1 5G Radio Access Network 168
6.1.1.2 Edge 169
6.1.1.3 5G Core 169
6.1.1.4 Application and Services 171
6.1.2 Interfaces 171
6.1.2.1 N1: Between 5G Core and User Equipment 171
6.1.2.2 N2: Between 5G Core and Base Station 171
6.1.2.3 N3: Between RAN and User Plane Function 172
6.1.2.4 Other Interfaces Include the Following 172
6.2 Network Slicing Architecture, Software-Defined Network, and Network Function Virtualization 173
6.2.1 Network Slicing Architecture 173
6.2.1.1 Software-Defined Network (SDN) 174
6.2.1.2 Network Function Virtualization (NFV) 176
6.3 Software Acceleration 178
6.3.1 User Space Approach 178
6.3.1.1 Data Plane Development Kit (DPDK) 178
6.3.2 Other Approaches 183
6.3.2.1 Remote Direct Memory Access (RDMA) 183
6.3.2.2 Compute Express Link (CXL) 186
6.3.2.3 Data Processing Unit (DPU) 188
References 190
Part IV Applications 193
7 Killer Applications 195
7.1 Metaverse and Its Trends 195
7.2 Technologies Behind Metaverse 197
7.2.1 Artificial Intelligence 197
7.2.1.1 AI-Based Non-player Character 199
7.2.1.2 Sensory Capabilities with AI 199
7.2.2 Blockchain 200
7.2.2.1 Power Consumption 201
7.2.3 AR and VR 202
7.2.4 Internet of Things 203
7.3 Applications of Metaverse 204
7.3.1 Gaming 204
7.3.2 Education 205
7.3.3 Commerce 206
7.3.4 Social Networking 207
7.3.5 Healthcare 208
7.3.6 Industrial Use 210
7.3.7 Entertainment 211
7.4 Accelerating Killer Apps 213
7.4.1 Edge Computing 214
7.4.2 Acceleration by Specialized Hardware 215
References 216
8 From Concept to Production 225
8.1 System Design Process 225
8.2 Some Examples 230
8.3 Standards Compliance 233
8.4 Other Design Metrics 234
8.5 Summary 237
References 237
Part V Future Roadmap 241
9 The Road Ahead 243
9.1 Spatial Computing and Networking 245
9.2 Supporting 5G/6G Spatial Computing and Networking 246
9.3 Migrating to 6G 248
9.3.1 Cutting Edge 6G Research 249
9.4 Enabling Technologies for 5G and Beyond 251
9.4.1 Processing-in-Memory Architecture 251
9.4.2 New Packaging Architecture 253
9.4.3 New Memory Architecture 255
9.4.4 Artificial Intelligence-Driven Architectures 257
9.5 Some Final Thoughts 259
References 259
Index 263
1
Introduction
The fifth-generation (5G) and the upcoming sixth-generation (6G) wireless networks are poised to be the most significant and transformative technology in the coming decade, disrupting numerous industries ranging from energy, agriculture, manufacturing to transportation, retail, healthcare, entertainment, and financial services. Surprisingly and unbeknownst to most outsiders, one of the key technology enablers is the new computer architecture and software design model, in addition to the wireless communications technology [1, 2].
The main objective of this book is to help university students and professional engineers understand the 5G/6G edge computing architecture and to describe step by step how to unleash the full 5G/6G potential using custom edge computing technologies.
This book is divided into five parts:
- Part 1 (Introduction):
- - Chapters 1 and 2 introduce the concept of edge and custom computing and provide an overview of 5G/6G technologies.
- Part 2 (Theory):
- - Chapters 3 and 4 discuss how to use high-level synthesis (HLS) and coding theory to realize secure edge acceleration with high performance.
- Part 3 (Architecture):
- - Chapters 5 and 6 elaborate the 5G/6G hardware and software acceleration architecture.
- Part 4 (Applications):
- - Chapters 7 and 8 describe a few 5G/6G killer applications with acceleration technology including some practical development strategies.
- Part 5 (Future Roadmap):
- - Chapter 9 discusses the road ahead in the coming decade.
1.1 Introducing 5G and Internet of Everything
With 20 times higher bandwidth and 10 times reduction in network latency, fifth-generation (5G) technologies enable many new applications, such as remote surgery and autonomous driving. These incredible applications require both high bandwidth and extremely low latency. To realize these useful applications, we need high-performance communication and computing platforms demanding different kinds of acceleration technologies, known as heterogeneous acceleration architecture (Figure 1.1).
Although the fundamental wireless technology - wireless spectral efficiency - has only increased three times from 4G/LTE to 5G, the area traffic capacity is 100 times larger. This is made possible mainly by building many more 5G cell towers, each covering a smaller area and supporting a wider spectrum. A typical 4G/LTE cell tower may have a range of 10 km, but a typical 5G tower may have a range of 500 m or less.
Figure 1.1 Comparison between 4G and 5G features and performance metrics.
The 3rd-Generation Partnership Project (3GPP) is responsible for driving the 5G telecommunications standards, which are detailed in the 3GPP Specifications Release 15 (NR Phase 1) and Release 16 (NR Phase 2) documents. The 3GPP 5G network architecture defines the network entities based on their functions and nature (control and data planes) [3-6].
There are three technical specification groups (TSGs) within the 3GPP:
- TSG SA (services and systems aspects) focuses on the overall architectures and services.
- TSG CT (core network and terminals) focuses on the core network (CN) architecture and terminal interfaces.
- TSG RAN (radio access networks) focuses on the radio transmission and its technical requirements.
The TSG SA defines three different sets of requirements for new 5G usages:
- Enhanced Mobile Broadband (eMBB): a new requirement that defines higher data rates, traffic and connection densities, and user mobility.
- Massive Machine-Type Communications (mMTC): a new requirement that supports very high traffic densities of devices.
- Ultra-Reliable Low Latency Communications (URLLC): a new requirement that provides very low latency and very high communications service availability (Figure 1.2).
Figure 1.2 compares the bandwidth and latency requirements of some 4G and 5G applications. The typical 4G network latency is 10-20 ms, while the minimum 5G network latency can go as low as 1 ms. The maximum 4G network bandwidth is around 100 Mbps, but the 5G network bandwidth can go up to 1 Gbps. Some new mobile applications, such as mobile telepresence, may only require higher network bandwidth. On the other hand, most disruptive applications, such as autonomous driving and smart energy grid, may demand very short network latencies.
Although human beings may not perceive any difference between 5 and 50 ms, this difference is so important in many industrial robotic systems. Indeed, an interconnection of machine systems - called the Internet of Everything (IoE) - can take full advantage of the three new 5G features (eMBB, mMTC, and URLLC) [7, 8] (Figure 1.3).
In 2012, Cisco Systems extended the concept of the Internet of Things (IoT) and coined the term "the Internet of Everything (IoE)," representing a networked connection of people, processes, data, and things. It goes beyond simple machine-to-machine (M2M) communications, forming a network of networks connecting all data, technologies, processes, and people [9-12].
Figure 1.2 Latency and bandwidth requirements of some typical 4G and 5G applications.
Figure 1.3 3GPP 5G network architecture.
Figure 1.4 Ubiquitous Internet of Everything (IoE) devices.
Today many IoE devices are adopting a tethered communication scheme - using Wi-Fi or Bluetooth to first connect to a smartphone or an access point - to communicate with other IoE devices. Unfortunately, tethered communication is slow, unreliable, and insecure, limiting the performance of these applications [13, 14].
The 5G/6G wireless network enables IoE devices to adopt an untethered communication scheme, thus allowing each device to have a secure channel connecting to a radio access network (RAN) with guaranteed network latency, bandwidth, and security (Figure 1.4).
According to Juniper Research, IoE devices reached 46 billion units by 2021. Figure 1.4 depicts a framework of different connected devices and things. The top IoE applications include smart factories, smart buildings, smart grids, connected gaming and entertainment, smart vehicles, remote healthcare, remote education, and connected marketing and advertisement.
These ubiquitous IoE devices have some essential characteristics:
- Resource Limitations: Many IoE devices are limited by size, weight, and power (SWaP) and do not have sufficient resources to process or store information locally. Accordingly, the information is offloaded to a remote server for storage and processing.
- Network Latency: Extremely low network latency is needed for time-critical applications. Industrial control systems can only tolerate delays of the order of milliseconds. Autonomous vehicles and virtual reality applications also have similar latency requirements. The network latency can be excessive if the servers are in a remote cloud.
- Network Bandwidth: A large IoE network can generate a huge amount of real-time data. For example, 120,000 CCTV devices transmitting 1080p video to a remote cloud may generate 1 Tbps traffic. If the servers are in a remote cloud, the 1 Tbps network data can cause serious traffic congestion in the Internet backbone.
- Security and Reliability: Many critical applications, such as energy grids and smart factories, must be ultra-secure and reliable. Due to the multi-hop nature of the Internet backbone, it is probably impossible to guarantee ultra-security and reliability with a remote cloud server.
- Reconfigurability: After deployment, an IoE system oftentimes requires future security patches and performance updates. While it is easier to update a generic software architecture, it is difficult to update a high-performance hardware architecture. This is an important reason why custom computing is desirable for 5G computing architecture.
1.2 Edge Computing Architecture
Although 5G can provide large bandwidths and low latencies, if the other end of the communication is far away, these parameters cannot be guaranteed. In particular, the communication latency is limited by the speed of light. For example, a distance of 4000 km - between Los Angeles and New York - has at least 20 ms delay on fiber optics [15-17].
In reality, the actual latencies, including all electronic and electro-optic delays, are much longer. Table 1.1 shows the typical round-trip latencies from Tokyo to some target cities.
Table 1.1 Round-trip time (RTT) from Tokyo to overseas cities.
Source: Adapted from http://Wondernetwork.com.
Target city Round-trip time from Tokyo (ms) Cape Town 360 New York 176 London 218 ... Los Angeles 128Systemvoraussetzungen
Dateiformat: ePUB
Kopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an.
Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.
Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.