The PI proposes an operating system and application architecture that removes the memory and CPU from the data path for applications that handle high-bandwidth data flows. The role of the operating system becomes that of data-flow management, while applications are concerned purely with signaling. This design parallels the evolution of modern network routers and has the potential to enable high-performance I/O for end systems, as well as fully exploit recent trends toward programmable peripheral (I/O) devices. An alternative view is that hardware devices are composed into virtual processing pipelines, completely removing the CPU and main memory from the data-intensive tasks for which they are increasingly unsuitable due to performance considerations.
The Pis hypothesis is that application-specific data-flow handling policies can be executed inside the operating system kernel, which composes and configures peripherals, manages flows, and handles exceptions. Such functionality can be retrofitted to existing operating systems and applications, instead of requiring a complete redesign. Several interesting research issues with respect to safety, flow scheduling, error handling, and resource management arise in the proposed architecture.
Intellectual Merit
The proposed architecture is a first step toward abandoning the concept of memorycentric computing, a paradigm ingrained in computer scientists for several decades. This shift in architectural thinking is both necessary for performance reasons and natural, given the increasing use of task-specific and programmable hardware. The proof-of-concept prototype indicates that the proposed system can at least double I/O throughput for large flows, and is orthogonal to other performance optimization approaches (e.g., faster interconnection buses). This research intends to bring together such diverse fields of Computer Science as networking, operating systems, embedded system design, programming languages, and security, and to change the way these are taught, from individual subjects to interdependent items that require (and promote) wide knowledge and creative thinking.
Broader Impact
-This architecture will enable high-performance applications and allow more efficient use of server resources -It will also allow experimentation and deployment of new types of system architectures, allowing use of novel hardware designs, device interconnection strategies, and load-balancing and scheduling algorithms. -This approach will also eliminate one commonly perceived problem with the wide-spread use of secure protocols and cryptography, that of performance. -The PI hopes to enable a new class of systems that are able to support highperformance applications across a wide range of areas of computer science -Finally, by fully taking advantage of computing systems capabilities, users can reap considerable savings in equipment spending. -The PI plans to involve creating cross-subject projects and an undergraduate laboratory class that exposes students to interesting projects and research at the intersection of systems, networks, and security. Many of these projects will allow students to cross the hardware/software boundary, which few current professionals can do despite increasing demand