Data center using a memory pool between selected memory resources

ABSTRACT

Apparatuses, systems, and methods related to a data center using a memory pool between selected memory resources are described. A data center using a memory pool between selected memory resources may enable performance of functions, including automated functions critical for prevention of damage to product, personal safety, and/or reliable operation, based on increased access to data that may improve performance of a mission profile. For instance, a method described herein includes transmitting, from a processor at a first vehicle that comprises the processor and memory, a request to access a pool of memory resources configured from a plurality of vehicles each having a local processor and memory, receiving, from a second vehicle of the plurality of vehicles, an indication to access the pool of memory resources, and reading data from or writing data to the memory at the second vehicle using the processor at the first vehicle based at least in part on receiving the indication to access the pool of memory resources.

PRIORITY INFORMATION

This application is a Continuation of U.S. application Ser. No. 16/142,590, filed on Sep. 26, 2018, the contents of which are incorporated herein by reference.

TECHNICAL FIELD

The present disclosure relates generally to semiconductor memory and methods, and more particularly, to apparatuses and methods related to a data center using a memory pool between selected memory resources.

BACKGROUND

In conventional motor vehicles (e.g., automobiles, cars, trucks, buses, etc.), the driver is critical to operating the vehicle's control system. For example, the driver of a conventional motor vehicle makes decisions regarding the safe operation of the vehicle. Such decisions may include decisions related to the speed of the vehicle, steering of the vehicle, obstacle and/or hazard recognition, and obstacle and/or hazard avoidance. However, a driver's ability to make these decisions and operate the vehicle's control system may be limited in some situations. For example, driver impairment, fatigue, attentiveness, and/or other factors such as visibility (e.g., due to weather or changes in terrain) may limit a driver's ability to safely operate a conventional motor vehicle and/or its control system.

In order to alleviate the deficiencies resulting from driver operation of a conventional motor vehicle, various manufacturers have experimented with autonomous vehicles. While autonomous vehicles may allow for a reduction in issues that may arise as a result of the driver's ability to operate the conventional motor vehicle becoming lessened, autonomous vehicles have their own shortcomings.

For example, autonomous vehicles may rely on artificial intelligence and/or machine learning. Artificial intelligence and machine learning require large amounts of memory bandwidth, which can be difficult to achieve given the constraints of I/O technology, power, and packaging. For example, concerning power, thermal management and battery life must be considered. With regards to safety, system components in autonomous vehicles need to be reliable because failure of one or more system components could result in injury or death to passengers in the autonomous vehicle. To decrease the chance of system failure, system components can be reduced, however a lower component count is generally in conflict with meeting performance requirements of a system.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an apparatus in the form of a memory resource and processing resource in accordance with a number of embodiments of the present disclosure.

FIG. 2 is a block diagram of examples of a system including an apparatus in accordance with a number of embodiments of the present disclosure.

FIG. 3 is a diagram of an apparatus in accordance with a number of embodiments of the present disclosure.

FIG. 4 is a block diagram illustrating an example of environments that correspond to a range of densities of resources couplable for formation of a memory pool in accordance with a number of embodiments of the present disclosure.

FIG. 5 is a block diagram of examples of a network for wirelessly coupling selected resources to form a memory pool in accordance with a number of embodiments of the present disclosure.

FIG. 6 is a flow chart illustrating an example of a method for wirelessly utilizing resources in accordance with a number of embodiments of the present disclosure.

DETAILED DESCRIPTION

The present disclosure includes apparatuses and methods related to forming a data center using a memory pool between selected memory resources. An example apparatus comprises a first vehicle configured to transmit, from a processor, a request to access a pool of memory resources configured from a plurality of vehicles each having a local processor and memory, receive, from a second vehicle of the plurality of vehicles, an indication to access the pool of memory resources, and read data from or write data to the memory at the second vehicle using the processor based at least in part on receiving the indication to access the pool of memory resources.

The memory pool (e.g., the pool of memory resources) can include a third vehicle of the plurality of vehicles. The processor can also read data from or write data to the memory at the third vehicle. In some examples, data can be read or written to the memory at the third vehicle based at least in part on receiving the indication to access the pool of memory resources. The pool of memory resources can include base stations and vehicles including unitary vehicles and transport vehicles. In some examples, a memory resource and a processing resource can be coupled to a base station or a vehicle. The first vehicle and/or the plurality of vehicles can be, but are not limited to, autonomous vehicles.

The processing resource can request access to the pool of memory resources in response to needing memory to perform operations on data. In some examples, the processing resource can query the memory pool requesting a particular amount of memory. The processing resource can receive access to the memory pool in response to the memory pool having the particular amount of memory available. The request to access the memory pool can include an address of the first vehicle.

The pool of memory resources can be accessed by the first vehicle wirelessly via a transceiver. The request to access the pool of memory resources can be transmitted using the transceiver and the indication to access the pool of memory resources can be received by the transceiver.

In some examples, the second vehicle can include a transceiver. The transceiver of the second vehicle can receive the request from the first vehicle to access the pool of memory resources and can transmit the indication to access the pool of memory resources to the first vehicle.

A memory pool can be chosen by a processing resource based on proximity to the processing resource. For example, a first processing resource can request access to a first memory pool in response to the first memory pool being in closer proximity to the first processing resource than a second memory pool. In some examples, the first processing resource requests access to the first memory pool in response to the first memory pool having more available memory than the second memory pool. The first processing resource can receive access to the second memory pool in response to the first memory pool revoking access.

In some embodiments, none of the memory pools have enough memory for the processing resource to perform an operation on data. The processing resource in this example, can receive access to the number of memory pools.

The memory pools can be used by a number of active vehicles. The memory pools can include memory resources from a number of idle vehicles (e.g., turned off and/or parked). In some examples, the memory pools include memory from a number of base stations. The memory pool can be used to perform data center operations.

In some embodiments, a processing resource can relinquish access to a pool of memory resources. The processing resource can relinquish access to the memory in response to completing an operation in data and/or accessing another pool of memory resources. For example, the processer can relinquish access to the pool of memory resources after reading data from or writing data to the memory at the second vehicle.

In some embodiments, a processing resource can receive access requests from a memory pool and can allow the memory pool access to a memory resource coupled to the processing resource. The processing resource can allow the memory pool access in response to the memory pool being trusted. The processing resource can verify the memory pool is a trusted pool of memory resources by checking whether the pool of memory resources is secure and free of malware. The processing resource can allow the memory pool access in response to the vehicle coupled to the processing resource being idle. In some examples, the first processing resource can revoke access to the memory pool.

The figures herein follow a numbering convention in which the first digit or digits correspond to the drawing figure number and the remaining digits identify an element or component in the drawing. Similar elements or components between different figures may be identified by the use of similar digits. For example, 108 may reference element “8” in FIG. 1, and a similar element may be referenced as 208 in FIG. 2. As will be appreciated, elements shown in the various embodiments herein can be added, exchanged, and/or eliminated so as to provide a number of additional embodiments of the present disclosure. In addition, as will be appreciated, the proportion and the relative scale of the elements provided in the figures are intended to illustrate certain embodiments of the present invention and should not be taken in a limiting sense.

FIG. 1 is a block diagram of an apparatus 100 in the form of a memory resource 101 and a processing resource 108 in accordance with a number of embodiments of the present disclosure. The apparatus 100 can include a wirelessly utilizable resource.

As shown in FIG. 1, apparatus 100 includes a memory resource 101 coupled to a processing resource 108, a transceiver 120, and a cloud 122. The memory resource 101 can include a number of memory devices 103-1, 103-2, . . . , 103-N coupled to control circuitry 107 via a number of channels 105-1, 105-2, . . . , 105-N. The processing resource 108 can include a controller 110 and a mission profile 117. The controller 110 can include a combination 112, an arbiter 114, and an operating mode 116.

The memory resource 101 may include memory (e.g., memory cells) arranged, for example, in a number of bank groups, banks, bank sections, subarrays, and/or rows of a number of memory devices 103-1, 103-2, . . . , 103-N.

The memory resource 101 may include volatile and/or non-volatile memory configured to store instructions executable by the processing resource 108 coupled to the memory resource 101 via bus 118. For example, the number of memory devices 103-1, 103-2, . . . , 103-N may include flash memory, for example NOR, read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), dynamic random-access memory (DRAM), static random-access memory (SRAM), and/or other suitable storage media.

In some embodiments, the memory resource 101 may include a number of non-volatile memory devices formed and/or operable as PCRAM, RRAM, FeRAM, MRAM, and/or STT RAM, phase change memory, 3D XPoint, and/or Flash memory devices, among other types of non-volatile memory devices. In some embodiments, the memory resource 101 of FIG. 1 may include a combination of a number of volatile memory devices and a number of non-volatile memory devices, as described herein.

Each of the number of memory devices 103-1, 103-2, . . . , 103-N can be coupled to a corresponding number of channels 105-1, 105-2, . . . , 105-N. The number of channels 105-1, 105-2, . . . , 105-N are described further in connection with FIG. 2. The number of channels 105-1, 105-2, . . . , 105-N can be selectably coupled to control circuitry 107 of the memory resource 101. The control circuitry 107 can be configured to enable data values for and/or instructions (e.g., commands) related to an operation to be directed to an appropriate one or more of the number of memory devices 103-1, 103-2, . . . , 103-N.

The apparatus 100 may be used in driving applications, including, but not limited to, autonomous driving applications. For example, the memory resource 101, processing resource 108, and/or the transceiver 120 can be located on a vehicle and/or a base station. The number of memory devices 103-1, 103-2, . . . , 103-N of the memory resource 101 may store vehicle data. For example, critical code (e.g., firmware, specific parameters, and data) for an autonomous driving application. The data can include data collected from vehicle sensors, photographic data collected from vehicle cameras, traffic cameras, and/or a combination thereof. In some embodiments the memory resource 101 can store data and transmit data. The data can be transmitted to the processing resource 108 including the controller 110.

The processing resource 108 can receive data and/or instructions from the memory resource 101 via a bus 118. The bus 118 can include a number of I/O lines selectably coupled to the channels 105-1, 105-2, . . . , 105-N via switches (e.g., switches 226-1, . . . , 226-N in FIG. 2). The received data can be used by the controller 110 to generate commands. For example, the data can include information regarding the amount of memory needed to perform an operation. The controller 110 can generate a command to request access to a memory pool, for example. The processing resource 108 can then transmit the request to a transceiver 120 via channel 119 to send the request to one more memory pools. In some embodiments, the transceiver 120 can send the request to the cloud 122 to query one or more memory pools.

In some embodiments, the controller 110 can include a number of components configured to contribute to operations controlled by the controller 110. Such components may include a combination component 112, an arbiter component 114, and an operating mode component 116. The combination component 112 can be configured to assess resource availability in a plurality of separate memory devices 101. The arbiter component 114 can be configured to selectably determine whether a first processing resource is authorized to access a memory pool. The operating mode component 116 can be configured to determine memory pools to be used by a first processing resource.

The processing resource 108 can include a mission profile 117. The mission profile 117 can be selectably coupled to the controller 110 and or the combination component 112, the arbiter component 114, and the operating mode component 116 associated with the controller 110. The mission profile 117 can be stored and/or accessible in SRAM of the processing resource 108, for example. The mission profile 117 can alternatively or in addition be stored by the memory resource 101 by one or more of the number of memory devices 103-1, 103-2, . . . , 103-N and can be accessible via bus 118, control circuitry 107, and/or channels 105-1, 105-2, . . . , 105-N by the controller 110 for read and/or write operations.

As shown in FIG. 1, the processing resource 108 includes a plurality of sets of logic units 111-1, . . . , 111-N (collectively referred to as logic units 111). In a number of embodiments, the processing resource 108 may be configured to execute a plurality of sets of instructions using the plurality of sets of logic units 111-1, . . . , 111-N and transmit outputs obtained as a result of the execution via a device-to-device communication technology that is operable in a number of frequency bands including the EHF band. The outputs transmitted may be communicated with other devices such as wirelessly utilizable resources (e.g., wirelessly utilizable resources 200-1, . . . , 200-4.

Although embodiments are not so limited, at least one of the logic units 111 can be an arithmetic logic unit (ALU), which is a circuit that can perform arithmetic and bitwise logic operations on integer binary numbers and/or floating point numbers. As an example, the ALU can be utilized to execute instructions by performing logical operations such as AND, OR, NOT, NAND, NOR, and XOR, and invert (e.g., inversion) logical operations on data (e.g., one or more operands). The processing resource 108 may also include other components that may be utilized for controlling logic units 111. For example, the processing resource 108 may also include a control logic (e.g., configured to control a data flow coming into and out of the logic units 111) and/or a cache coupled to each of the plurality of set of logic units 111-1, . . . , 111-N.

A number of ALUs can be used to function as a floating point unit (FPU) and/or a graphics processing unit (GPU). Stated differently, at least one of the plurality of sets of logic units 111-1, . . . , 111-N may be FPU and/or GPU. As an example, the set of logic units 111-1 may be the FPU while the set of logic units 111-N may be the GPU.

As used herein, “FPU” refers to a specialized electronic circuit that operates on floating point numbers. In a number of embodiments, FPU can perform various operations such as addition, subtraction, multiplication, division, square root, and/or bit-shifting, although embodiments are not so limited. As used herein, “GPU” refers to a specialized electronic circuit that rapidly manipulate and alter memory (e.g., memory resource 101) to accelerate the creation of image in a frame buffer intended for output to a display. In a number of embodiments, GPU can include a number of logical operations on floating point numbers such that the GPU can perform, for example, a number of floating point operations in parallel.

In some embodiments, GPU can provide non-graphical operation. As an example, GPU can also be used to support shading, which is associated with manipulating vertices and textures with man of the same operations supported by CPUs, oversampling and interpolation techniques to reduce aliasing, and/or high-precision color spaces. These example operations that can be provided by the GPU are also associated with matrix and vector computations, which can be provided by GPU as non-graphical operations. As an example, GPU can also be used for computations associated with performing machine-learning algorithms and is capable of providing faster performance than what CPU is capable of providing. For example, in training a deep learning neural networks, GPUs can be 250 times faster than CPUs. As used herein, “machine-learning algorithms” refers to algorithms that uses statistical techniques to provide computing systems an ability to learn (e.g., progressively improve performance on a specific function) with data, without being explicitly programmed.

GPU can be present on various locations. For example, the GPU can be internal to (e.g., within) the CPU (e.g., of the network device 102). For example, the GPU can be on a same board (e.g., on-board unit) with the CPU without necessarily being internal to the GPU. For example, the GPU can be on a video card that is external to a wirelessly utilizable resource (e.g., wirelessly utilizable resource 200-1, . . . , 200-4 as described in connection with FIG. 2). Accordingly, the apparatus 100 may be an additional video card that can be external to and wirelessly coupled to a network device such as the wirelessly utilizable resource for graphical and/or non-graphical operations.

A number of GPUs of the processing resource 108 may accelerate a video decoding process. As an example, the video decoding process that can be accelerated by the processing resource 108 may include a motion compensation (mocomp), an inverse discrete cosine transform (iCDT), an inverse modified discrete cosine transform (iMDCT), an in-loop deblocking filter, an intra-frame prediction, an inverse quantization (IQ), a variable-length decoding (VLD), which is also referred to as a slice-level acceleration, a spatial-temporal deinterlacing, an automatic interlace/progressive source detection, a bitstream processing (e.g., context-adaptive variable-length coding and/or context-adaptive binary arithmetic coding), and/or a perfect pixel positioning. As used herein, “a video decoding” refers to a process of converting base-band and/or analog video signals to digital components video (e.g., raw digital video signal).

In some embodiments, the processing resource 108 may be further configured to perform a video encoding process, which converts digital video signals to analog video signals. For example, if the network device (including a display) requests the apparatus 100 to return a specific form of signals such as the analog video signals, the apparatus 100 may be configured to convert, via the processing resource 108, digital video signals to analog video signals prior to transmitting those wirelessly to the network device.

The apparatus 100 includes the transceiver 120. As used herein, a “transceiver” may be referred to as a device including both a transmitter and a receiver. In a number of embodiments, the transceiver 120 may be and/or include a number of radio frequency (RF) transceivers. The transmitter and receiver may, in a number of embodiments, be combined and/or share common circuitry. In a number of embodiments, no circuitry may be common between the transmit and receive functions and the device may be termed a transmitter-receiver. Other devices consistent with the present disclosure may include transponders, transverters, and/or repeaters, among similar devices.

In a number of embodiments, a communication technology that the processing resource 108 can utilize may be a device-to-device communication technology as well as a cellular telecommunication technology, and the processing resource 108 may be configured to utilize the same transceiver 120 for both technologies, which may provide various benefits such as reducing a design complexity of the apparatus 100. As an example, consider devices (e.g., wirelessly utilizable resources 200-1, . . . , 200-4 and/or any other devices that may be analogous to the apparatus 100) in previous approaches, in which the device utilizes a device-to-device communication technology as well as a cellular telecommunication technology in communicating with other devices. The device in those previous approaches may include at least two different transceivers (e.g., each for the device-to-device communication technology and the cellular telecommunication technology, respectively) because each type of communication technology may utilize different network protocols that would further necessarily utilize unique transceivers. As such, the device implemented with different transceivers would increase a design (e.g., structural) complexity that may increase costs associated with the device. On the other hand, in a number of embodiments, the processing resource 108 is configured to utilize the same network protocol for both technologies (e.g., device-to-device communication and cellular telecommunication technologies), which eliminates a need of having different transceivers for different types of wireless communication technologies. Accordingly, a number of the present disclosure may reduce a design complexity of the apparatus 100.

In a number of embodiments, since resources of the apparatus 100 can be wirelessly utilizable, the apparatus 100 may be free of those physical interfaces that would have been included, to physically connect to a motherboard of a network device and/or a display, in expansion cards of previous approaches. For example, the apparatus 100 as an expansion card may not include a physical interface, which would have been utilized to connect to the mother board, such as a physical bus (e.g., S-100 bus, industry standard architecture (ISA) bus, NuBus bus, Micro Channel bus (or Micro Channel Architecture (MCA), extended industry standard architecture (EISA) bus, VESA local bus (VLB), peripheral component interconnect (PCI) bus, ultra port architecture (UPA), universal serial bus (USB), peripheral component interconnect extended (PCI-X), peripheral component interconnect express (PCIe)) or other physical channels such as accelerated graphics port (AGP) that would have been utilized to connect to the motherboard. For example, the apparatus 100 as an expansion card may not include a physical interface, which would have been utilized to connect to the display, such as a video graphics array (VGA), digital video interface (DVI), high-definition multimedia interface (HDMI), and/or display port. Accordingly, the apparatus 100 may be configured to transmit, via the transceiver 120, those signals, which would have been transmitted by those physical interfaces listed above, wirelessly to the network device and/or display. For example, the signals that can be wirelessly transmitted via the transceiver 120 may include compressed and/or uncompressed digital video signals (that would have been transmitted by HDMI and/or VGA), compressed and/or uncompressed audio signals (that would have been transmitted by HDMI), and/or analog video signals (that would have been transmitted by VGA).

Further, the apparatus 100 may be utilized by wirelessly utilizable resource (e.g., wirelessly utilizable resource 200-1, . . . , 200-4 in FIG. 2) via a device-to-device communication technology that is operable in an EHF band. The communication technology operable in the EHF band can include a fifth generation (5G) technology or later technology. 5G technology may be designed to utilize a higher frequency portion of the wireless spectrum, including an EHF band (e.g., ranging from 30 to 300 GHz as designated by the ITU).

As used herein, the device-to-device communication technology refers to a wireless communication performed directly between a transmitting device and a receiving device, as compared to a wireless communication technology such as the cellular telecommunication technology and/or those communication technologies based on an infrastructure mode, by which network devices communicate with each other by firstly going through an intermediate network device (e.g., base station and/or Access Point (AP)). As such, via the device-to-device communication technology, data to be transmitted by the transmitting device may be directly transmitted to the receiving device without routing through the intermediate network device (e.g., base station 225), as described in connection with FIG. 2). In some embodiments. the device-to-device communication may rely on existing infrastructures (e.g., network entity such as a base station); therefore, can be an infrastructure mode. For example, as described herein, the device-to-device communication whose transmission timing is scheduled by a base station can be an infrastructure mode. In some embodiments, the receiving and transmitting devices may communicate in the absent of the existing infrastructures; therefore, can be an ad-hoc mode. As used herein, “an infrastructure mode” refers to an 802.11 networking framework in which devices communicate with each other by first going through an intermediary device such as an AP. As used herein, “ad-hoc mode” refers to an 802-11 networking framework in which devices communicate with each other without the use of intermediary devices such as an AP. The term “ad-hoc mode” can also be referred to as “peer-to-peer mode” or “independent Basic Service Set (IBSS).”

As used herein, the cellular telecommunication technology refers to a technology for wireless communication performed indirectly between a transmitting device and a receiving device via a base station, as compared to those types of wireless communication technologies including a device-to-device communication technology. Cellular telecommunications may be those that use resources of a frequency spectrum restricted or regulated by a governmental entity. License frequency spectrum resources may be scheduled for use or access by certain devices and may be inaccessible to other devices. By contrast, resources of shared or unlicensed frequency spectrum may be open and available for use by many devices without the necessity of a governmental license. Allocating licensed and shared or unlicensed frequency resources may present different technical challenges. In the case of licensed frequency spectrum, resources may be controlled by a central entity, such as a base station or entity within a core network. While devices using resources of shared or unlicensed frequency spectrum may contend for access—e.g., one device may wait until a communication channel is clear or unused before transmitting on that channel. Sharing resources may allow for broader utilization at the expense of guaranteed access.

Techniques described herein may account for, or may use, both licensed and unlicensed frequency spectrum. In some communication schemes, device-to-device communication may occur on resources of a licensed frequency spectrum, and such communications may be scheduled by a network entity (e.g., a base station). Such schemes may include certain 3GPP-developed protocols, like Long-Term Evolution (LTE) or New Radio (NR). A communication link between devices (e.g. user equipments (UEs)) in such schemes may be referred to as sidelink, while a communication link from a base station to a device may be referred to as a downlink and a communication from a device to a base station may be referred to as an uplink.

In other schemes, device-to-device communication may occur on resources of unlicensed frequency spectrum, and devices may contend for access the communication channel or medium. Such schemes may include WiFi or MulteFire. Hybrid schemes, including licensed-assisted access (LAA) may also be employed.

As used herein, an EHF band refers to a band of radio frequencies in an electromagnetic spectrum ranging from 30 to 300 gigahertz (GHz) as designated by the International Telecommunication Union (ITU), and as described further herein. Ranges of radio frequencies as designated by the ITU can include extremely low frequency (ELF) band ranging from 3 to 30 Hz, super low frequency (SLF) band ranging from 30 Hz to 300 Hz, ultra low frequency (ULF) band ranging from 300 Hz to 3 kilohertz (kHz), very low frequency (VLF) band ranging from 3 to 30 kHz, low frequency (LF) band ranging from 30 kHz to 300 kHz, medium frequency (MF) band ranging from 300 kHz to 3 megahertz (MHz), high frequency (HF) band ranging from 3 MHz to 30 MHz, very high frequency (VHF) band ranging from 30 MHz to 300 MHz, ultra high frequency (UHF) band ranging from 300 MHz to 3 GHz, super high frequency (SHF) band ranging from 3 GHz to 30 GHz, extremely high frequency (EHF) band ranging from 30 GHz to 300 GHz, and tremendously high frequency (THF) band ranging from 0.3 to 3 terahertz (THz).

A number of embodiments of the present disclosure can provide various benefits by utilizing a network communication that is operable in a number of frequency bands including a higher frequency portion (e.g., EHF) of the wireless spectrum, as compared to those network communication technologies that utilizes a lower frequency portion of the wireless spectrum only. As an example, the EHF bands of 5G technology may enable data to be transferred more rapidly than technologies (e.g., including technologies of previous generations) using lower frequency bands only. For example, a 5G network is estimated to have transfer speeds up to hundreds of times faster than a 4G network, which may enable data transfer rates in a range of tens of megabits per second (MB/s) to tens of GB/s for tens of thousands of users at a time (e.g., in a memory pool, as described herein) by providing a high bandwidth. For example, a 5G network provides faster transfer rates than the 802.11-based network such as WiFi that operate on unlicensed 2.4 GHz radio frequency band (e.g., Ultra High Frequency (UHF) band). Accordingly, a number of embodiments can enable the apparatus 100 to be used at a high transfer speed as if the apparatus 100 were wired to the wirelessly utilizable resource (e.g., wirelessly utilizable resource 200-1, . . . , 200-4).

In addition to the EHF band, the communication technology of the communication can also be operable in other frequency bands such as the UHF band and the SHF band. As an example, the communication technology can operate in a frequency band below 2 GHz (e.g., low 5G frequencies) and/or in a frequency band between 2 GHz and 6 GHz (e.g., medium 5G frequencies) in addition to a frequency band above 6 GHz (e.g., high 5G frequencies). Further details of a number of frequency bands (e.g., below 6 GHz) in which the 5G technology can operate are defined in Release 15 of the Third Generation Partnership Project (3GPP) as New Radio (NR) Frequency Range 1 (FR1), as shown in Table 1.

TABLE 1 5G operating bands for FR1 NR Operating Frequency Band Duplex Band (MHz) Mode n1 1920-1980; 2110-2170 FDD n2 1850-1910; 1930-1990 FDD n3 1710-1785; 1805-1880 FDD n5 824-849; 869-894 FDD n7 2500-2570; 2620-2690 FDD n8 880-915; 925-960 FDD n20 791-821; 832-862 FDD n28 703-748; 758-803 FDD n38 2570-2620 TDD n41 2496-2690 TDD n50 1432-1517 TDD n51 1427-1432 TDD n66 1710-1780; 2110-2200 FDD n70 1695-1710; 1995-2020 FDD n71 617-652; 663-698 FDD n74 1427-1470; 1475-1518 FDD n75 1432-1517 SDL n76 1427-1432 SDL n78 3300-3800 TDD n77 3300-4200 TDD n79 4400-5000 TDD n80 1710-1785 SUL n81 880-915 SUL n82 832-862 SUL n83 703-748 SUL n84 1920-1980 SUL

Further, details of a number of frequency bands (e.g., above 6 GHz) in which the 5G technology can operate are defined in Release 15 of the 3GPP as NR Frequency Range 2 (FR2), as shown in Table 2.

TABLE 2 5G operating bands for FR2 NR Operating FREQUENCY BAND Duplex Band (MHz) Mode n257 26500-29500 TDD n258 24250-27500 TDD n260 37000-40000 TDD

In some embodiments, a number of frequency bands in which a communication technology (e.g., device-to-device communication technology and/or cellular telecommunication technology using 5G technology) utilized for the communication 106 may be operable can further include the THF band in addition to those frequency bands such as the SHF, UHF, and EHF bands. The memory, transceiver, and/or the processor described herein may be a resource that can be wirelessly utilizable via respective communication technologies such as 5G technology.

As used herein, FDD stands for frequency division duplex, TDD stands for time division duplex, SUL stands for supplementary uplink, and SDL stands for supplementary downlink. FDD and TDD are each a particular type of a duplex communication system. As used herein, a duplex communication system refers to a point-to point system having two connected parties and/or devices that can communicate with one another in both directions. TDD refers to duplex communication links where uplink is separated from downlink by the allocation of different time slots in the same frequency band. FDD refers to a duplex communication system, in which a transmitter and receiver operate at different frequency bands. SUL/SDL refer to a point-to-point communication system having two connected parties and/or devices that can communicate with one another in a unilateral direction (e.g., either via an uplink or a downlink, but not both).

The 5G technology may be selectively operable in one or more of low, medium, and/or high 5G frequency bands based on characteristics of, for example, the communication. As an example, the low 5G frequency may be utilized in some use cases (e.g., enhanced mobile broadband (eMBB), ultra-reliable and low-latency communications (URLLC), massive machine-type communications (mMTC)), in which extremely wide area needs to be covered by the 5G technology. As an example, the medium 5G frequency may be utilized in some use cases (e.g., eMBB, URLLC, mMTC), in which higher data rate than that of the low 5G frequencies is desired for the communication technology. As an example, the high 5G frequency may be utilized in some use cases (e.g., eMBB), in which extremely high data rate is desired for the 5G technology.

As used herein, eMBB, URLLC, mMTC each refers to one of three categories of which the ITU has defined as services that the 5G technology can provide. As defined by the ITU, eMBB aims to meet the people's demand for an increasingly digital lifestyle and focuses on services that have high requirements for bandwidth, such as high definition (HD) videos, virtual reality (VR), and augmented reality (AR). As defined by the ITU, URLLC aims to meet expectations for the demanding digital industry and focuses on latency-sensitive services, such as assisted and automated driving, and remote management. As defined by the ITU, mMTC aims to meet demands for a further developed digital society and focuses on services that include high requirements for connection density, such as smart city and smart agriculture.

As used herein, a channel bandwidth refers to a frequency range occupied by data and/or instructions when being transmitted (e.g., by an individual carrier) over a particular frequency band. As an example, a channel bandwidth of 100 MHz may indicate a frequency range from 3700 MHZ to 3800 MHZ, which can be occupied by data and/or instructions when being transmitted over n77 frequency band, as shown in Table 1. As indicated in Release 15 of the 3GPP, a number of different channel bandwidth such as a channel bandwidth equal to or greater than 50 MHz (e.g., 50 MHz, 100 MHz, 200 MHz, and/or 400 Mhz) may be utilized for the 5G technology.

Embodiments are not limited to a particular communication technology; however, various types of communication technologies may be employed for the communication. The various types of communication technologies the apparatus 100 and/or the wirelessly utilizable resource (e.g., wirelessly utilizable resource 200-1, . . . , 200-4 in FIG. 2) can utilize may include, for example, cellular telecommunication technology including 0-5 generations broadband cellular network technologies, device-to-device to communication including Bluetooth, Zigbee, and/or 5G, and/or other wireless communication utilizing an intermediary device (e.g., WiFi utilizing an AP), although embodiments are not so limited.

FIG. 2 is a block diagram of examples of a system including a number of wirelessly utilizable resources in accordance with a number of embodiments of the present disclosure. As illustrated in FIG. 2, the system 223 may, in a number of embodiments, include a plurality of elements. For example, the plurality of elements of the system 223 may be a number of wirelessly utilizable resources 200-1, . . . , 200-5 (collectively referred to as wirelessly utilizable resources 200), an apparatus 200-1, and/or a base station 225. At least a portion of the wirelessly utilizable resources 200 may include a local commodity DRAM and may utilize the resources of the apparatus 200-1 as supplemental resources. The apparatus 200-1 includes resources (e.g., a memory resource, a transceiver, and/or a processor) at least of which can be wirelessly utilizable (e.g., shared) by the wirelessly utilizable resources 200.

The wirelessly utilizable resources 200 can be various user devices. As an example, the wirelessly utilizable resources 200 can be computing devices such as laptops, phones, tablets, desktops, wearable smart devices, etc. In some embodiments, the user devices may be mobile as well. As used herein, a “mobile user device” may be a device that is portable and utilizes a portable power supply. In a number of embodiments, the wirelessly utilizable resources 200 can include a local DRAM and a memory resource that can be included in the apparatus 200-1 and utilizable by the wirelessly utilizable resources 200 and may be supplemental to the wirelessly utilizable resources 200.

The apparatus 200-1 including a wirelessly utilizable resource can be a wireless electronic component of at least one of the wirelessly utilizable resources 200. As used herein, “an electronic component” refers to an electronic component that can provide additional functions to a network device and/or assist the network device in furthering a particular function. For example, an electronic component may include various types of components (e.g., expansion card) such as a video card, sound card, primary storage devices (e.g., main memory), and/or secondary (auxiliary) storage devices (e.g., flash memory, optical discs, magnetic disk, and/or magnetic tapes), although embodiments are not so limited. As used herein, “a wireless electronic component” refers to an electronic component that is wirelessly coupled to a network device.

Accordingly, as an example, the apparatus 200-1 may be wirelessly utilized by the wirelessly utilizable resources 200 for various functions. As an example, the apparatus 200-1 may be utilized for graphical operations that would require high-performance processing and/or memory resources such as memory intensive games and/or high quality video associated with a high degree of resolutions and/or frame rates. Further, as an example, the apparatus 200-1 may be utilized for non-graphical operations such as a number of operations of applications associated with machine-learning algorithms that would require high-performance processing and/or memory resources.

In some embodiments, at least a portion of the wirelessly utilizable resources 200 may be a small form factor (SFF) device such as a handheld computing device (e.g., personal computer (PC)). A degree of performance that can be often provided by the SSF device can be relatively low due to its limited size and volume. Further, the SSF device may lack a number of channels by which expansion cards such as a high-performance video card can be added. Accordingly, providing a mechanism to wirelessly add a high-performance video card such as the apparatus 200-1 to the SSF device can provide benefits such as performing, at the SSF device, memory-intensive operations (e.g., memory intensive games and/or high quality video associated with a high degree of resolutions and/or frame rates), which would have not been properly performed at the SSF device absent the wirelessly utilizable resources.

In a number of embodiments, the apparatus 200-1 may be wirelessly utilized via a device-to-device communication technology, for example, by the wirelessly utilizable resources 200 as shown in FIG. 2. For example, as illustrated in connection with FIG. 1, the device-to-device communication technology can operate in higher frequency portion of the wireless spectrum, including an UHF, SHF, EHF and/or THF band, as defined according to the ITU. However, embodiments are not so limited. For example, other network communication technologies of a device-to-device communication technology may be employed within the system 223. As an example, the apparatus 200-1 may communicate with at least one of the wirelessly utilizable resources 200 via a different type of device-to-device communication technology such as a Bluetooth, Zigbee, and/or other types of device-to-device communication technologies.

As shown in FIG. 2, the apparatus 200-1 may be wirelessly utilized by the wirelessly utilizable resource 200-4 via the base station 225. As an example, a communication technology that can be utilized between the wirelessly utilizable resource 200-4 and the apparatus 200-1 may be a cellular telecommunication technology. In a number of embodiments, the cellular telecommunication technology that can be utilized for communicating between the wirelessly utilizable resource 200-4 and the apparatus 200-1 can include a 5G cellular telecommunication technology that operates in at least one of a number of frequency bands including the UHF, SHF, EHF, and/or THF.

The term “base station” may be used in the context of mobile telephony, wireless computer networking and/or other wireless communications. As an example, a base station 225 may include a GPS receiver at a known position, while in wireless communications it may include a transceiver connecting a number of other devices to one another and/or to a wider area. As an example, in mobile telephony, a base station 225 may provide a connection between mobile phones and the wider telephone network. As an example, in a computing network, a base station 322 may include a transceiver acting as a router for electrical components (e.g., memory resource 101 and processing resource 108 in FIG. 1) in a network, possibly connecting them to a WAN, WLAN, the Internet, and/or the cloud. For wireless networking, a base station 225 may include a radio transceiver that may serve as a hub of a local wireless network. As an example, a base station 225 also may be a gateway between a wired network and the wireless network. As an example, a base station 225 may be a wireless communications station installed at a fixed location.

In a number of embodiments, the apparatus 200-1 may utilize the same network protocol and same transceiver (e.g., RF transceiver) for a device-to-device communication technology (e.g., 5G device-to-device communication technology) as well as a cellular telecommunication technology (e.g., 5G cellular telecommunication technology), as described in connection with FIG. 1. As an example, the apparatus 200-1 may utilize the same network protocol in communicating with the wirelessly utilizable resource 200-4 (e.g., via a cellular telecommunication technology through the base station 225) as well as with the wirelessly utilizable resources 200 (e.g., via a device-to-device communication technology).

In a number of embodiments, various types of network protocols may be utilized for communicating data within the system 223 (e.g., among the wirelessly utilizable resources 200, between the wirelessly utilizable resources 200, between the wirelessly utilizable resources 200 and the base station 225, etc.). The various types of network protocols may include the time-division multiple access (TDMA), code-division multiple access (CDMA), space-division multiple access (SDMA), frequency division multiple access (FDMA), orthogonal FDMA (OFDMA), single-carrier (SC)-FDMA, and/or non-orthogonal multiple access (NOMA), although embodiments are not so limited.

In some embodiments, cellular telecommunication technologies (e.g., between the apparatus 200-1 and the wirelessly utilizable resource 200-4) may be performed via (e.g., include) a NOMA. As used herein, the NOMA refers to a network protocol that separates signals according to a power domain. For example, signals may be received (e.g., from the user) in an intentionally-introduced mutual interference and can be separated from each other according to differences on their power levels. As such, the signals received and to be processed pursuant to the NOMA may be non-orthogonal in time, frequency, and/or code, as compared to those orthogonal multiple-access (OMA) schemes, in which different users are allocated according to orthogonal resources, either in time, frequency, and/or code domain. Accordingly, utilizing a non-orthogonal network protocols such as the NOMA may provide benefits such as reduced latencies associated with separating users based on factors other than power domain, which may enable massive Multiple Input Multiple Output (MIMO).

In a number of embodiments, the apparatus 200-1 may be utilized by the wirelessly utilizable resources 200 at a discrete time. For example, the apparatus 200-1 may be utilized by the wirelessly utilizable resource 200-3 during a subsequent period of a particular period during which the apparatus 200-1 was, for example, utilized by the wirelessly utilizable resource 200-2. As such, the apparatus 200-1 may be utilized by each of the wirelessly utilizable resources 200 at different times (e.g., non-overlapping time periods). However, embodiments are not so limited. For example, the apparatus 200-1 may be simultaneously utilized by the wirelessly utilizable resources 200. As an example, the apparatus 200-1 may be physically and/or logically partitioned such that the partitioned portions may be simultaneously utilized by the wirelessly utilizable resources 200.

FIG. 3 is a diagram of an apparatus 324 in accordance with a number of embodiments of the present disclosure.

As shown in FIG. 3, apparatus 324 includes a memory resource 301, a processing resource 308 and a number of channels 305-1, 305-2 . . . , 305-N coupled to memory devices (e.g., memory devices 103-1, 103-2 . . . , 103-N in FIG. 1). The processing resource 308 can include a controller 310. The controller 310 is illustrated as being formed from a plurality of sections 310-1, 310-2, . . . , 310-N, although the controller 310 can be formed as a single component, as shown in FIG. 1. As described further herein, circuitry 318, a number of switches 326-1, 326-2 . . . , 326-N, and/or the controller 310 can be coupled to a number of resource transceivers 328-1, 328-2, . . . , 328-N-1 of the transceiver (e.g., transceiver 120 in FIG. 1) to transmit access requests, receive access to one or more wireless memory pools, receive access requests and/or enable access to the memory resource.

Controller section 310-1 can be selectably coupled via I/O line 318-1 of the bus (e.g., bus 118 in FIG. 1) to the channel 305-1. A command can be issued from the processing resource 308 related to an operation to be directed to a memory resource (e.g., memory resource 101 in FIG. 1) coupled to the channel 305-1 and selectably coupled to the I/O line 318-1. The command can enable access of the memory resource by the processing resource 308. Alternatively or in addition, I/O line 318-1 can enable a wireless memory pool access to the memory resource in response to a request by the wireless memory pool. The wireless memory pool can use the memory resource to improve performance of other processing resources, for example.

The processing resource 308 via controller section 310-1 can selectably determine whether I/O line 318-1 is configured to enable the processing resource 308 access to the memory resource (e.g., memory resource 101 in FIG. 1) or enable the wireless memory pool access to the memory resource by controlling switch 326-1. The controller section 310-1 can direct switch 326-1 to open to disconnect channel 305-1 from controller section 310-1 while connecting a portion of the I/O line 318-1 to resource transceiver 328-1 to enable the wireless memory pool to access the memory resource via I/O line 318-1 and channel 305-1. The controller section 310-1 can also direct switch 326-1 to close to disconnect resource transceiver 328-1 from channel 305-1 while connecting a portion of the I/O line 318-1 to the processing resource 308 to enable the processing resource 308 to access the memory resource via I/O line 318-1 and channel 305-1.

The processing resource 308 can request and receive access to a wireless memory pool via the transceiver 310. For example, the controller section 310-2 can request access and receive access to a wireless memory pool via resource transceiver 328-2.

FIG. 4 is a block diagram illustrating an example of environments that correspond to a range of densities of resources couplable for formation of a memory pool in accordance with a number of embodiments of the present disclosure. The range of densities 440 of resources may, in a number of embodiments, correspond to a “low” density of such resources, as shown at or near the left side of FIG. 4, through a “high” density of such resources, as shown at or near the right side.

A density range 440 of such resources may correspond to a number of resources 441 located (e.g., fixedly and/or movably at a particular point in time and/or in a particular time period) within a particular area (e.g., geographically defined and/or defined by base station, cell tower, cloud coverage, among other possibilities for defining the area). The density of resources 440 and/or the number of resources 441 in a particular area may, in a number of embodiments, contribute to determination of a size of a memory pool between a plurality of such resources that are coupled to wirelessly share data. For example, a low density of such resources may enable formation of a memory pool that includes fewer such resources than may be included in a memory pool formed where there is a high density of such resources, with the memory pool potentially including an intermediate number of such resources where the density 440 is between low and high.

The number of resources 441 in a particular area may correspond to a number of memory resources (e.g., memory resource 101 in FIG. 1), processing resources (e.g., processing resource 108 in FIG. 1), transceiver resources (e.g., transceiver resource 120 in FIG. 1), and/or base stations 435 within the particular area. The number of resources 441 may be formed and/or positioned on, in a number of embodiments, a corresponding number of vehicles including unitary vehicles 431 and transport vehicles 433, base stations 435, and/or infrastructure (e.g., houses 434, police/fire/news stations, and/or businesses 445, factories and/or corporate offices, etc., 446) located within the area and/or within a proximity of an intended route or potential alternative routes to be transited by the unitary vehicles 431 and/or transport vehicles 433. An increasing density 440, an increasing number of such resources 441, and/or an increasing number of different types of such resources (e.g., a mixture of unitary vehicles 431, transport vehicles 433, number of base stations 435, infrastructure 444, 445, 446), within an area may correspond to an increasing complexity 442 of such resources in the area.

An area having a low density number 441 and/or complexity 442 of resources may, for example, be a rural area, as shown at or near the left side of FIG. 4. Such a rural area may include a number of routes of transit 443 (e.g., widely separated interstate freeways, state and/or county highways, etc.) that may correspond to potential intended routes of transit for unitary vehicles 431 and/or transport vehicles 433. Such a rural area may, at a particular time point and/or in a particular time period, have as few as two unitary vehicles 431-1 or as few as two transport vehicles 433 and/or as few as one unitary vehicle 431-1 and one transport vehicle 433 to form a memory pool. In some situations, such a rural area and/or a portion of the routes of transit 443 may or may not include a base station and/or infrastructure to contribute to formation of the memory pool. Accordingly, the memory pool may be formed via direct wireless coupling between processing resources of the unitary vehicles 431 and/or transport vehicles 433.

An area having an intermediate density number 441 and/or complexity 442 of resources may, for example, be a suburban area, as shown at or near the middle of FIG. 4. Such a suburban area may potentially include the routes of transit 443 for unitary vehicles 431 and/or transport vehicles 433 present in the rural areas. Such a suburban area, at a particular time point and/or in a particular time period, may be more likely to have at least two unitary vehicles 431-2 to form a memory pool. The suburban area may or may not include any transport vehicles 433 at a particular time point and/or in a particular time period. Such a suburban area may be more likely to include at least one base station 435-1 and/or infrastructure 444, 445 to contribute to formation of the memory pool. Accordingly, the memory pool may be formed via direct or indirect wireless coupling between processing resources of the unitary vehicles 431-2 and/or transport vehicles 433. In a number of embodiments, the memory pool may be formed between the processing resources of the unitary vehicles 431 and/or transport vehicles 433 by indirect wireless coupling via the base station 435-1 and/or the infrastructure 444, 445.

An area having a high density number 441 and/or complexity 442 of resources may, for example, be an urban area, as shown at or near the right side of FIG. 4. Such an urban area may potentially include the routes of transit 443 for unitary vehicles 431 and/or transport vehicles 433 present in the rural and/or suburban areas. Such an urban area, at a particular time point and/or in a particular time period, may be more likely to have more than two unitary vehicles 431-3 to form a memory pool. The urban area may or may not include any transport vehicles 433 at a particular time point and/or in a particular time period. Such an urban area may be more likely to include more than one base station 435-2 and/or infrastructure 446 (e.g., in addition to infrastructure 444, 445) to contribute to formation of the memory pool. Accordingly, the memory pool may be formed via direct wireless coupling between processing resources of the unitary vehicles 431-3 and/or transport vehicles 433. In a number of embodiments, the memory pool may be formed between the processing resources of the unitary vehicles 431 and/or transport vehicles 433 by indirect wireless coupling via the base stations 435-2 and/or the infrastructure 444, 445, 446.

FIG. 5 is a block diagram of examples of a network for wirelessly coupling selected resources to form a memory pool in accordance with a number of embodiments of the present disclosure.

As shown in FIG. 5, network 546 includes a number of base stations 535-1, 535-2, . . . , 535-L and a number of vehicles including a number of unitary vehicles 531-1, 531-2, . . . , 531-M and a number of transport vehicles 533-1, . . . , 533-K.

In some embodiments, a first vehicle can be configured to transmit, from a processor (e.g., processing resource 108 in FIG. 1), a request to access a pool of memory resources configured from a plurality of vehicles each having a local processor and memory. The first vehicle can further be configured to receive, from a second vehicle of the plurality of vehicles, an indication to access the pool of memory resources, and read data from or write data to the memory at the second vehicle using the processor based at least in part on receiving the indication to access the pool of memory resources.

The memory pool can include a third vehicle of the plurality of vehicles. The processor (e.g., processing resource 108 in FIG. 1) can also read data from or write data to the memory at the third vehicle. In some examples, data can be read or written to the memory at the third vehicle based at least in part on receiving the indication to access the pool of memory resources.

The memory pool can include a number of memory resources and processing resources. The memory resources and processing resources can include base stations 535-1, 535-2, . . . , 535-L and vehicles including a number of unitary vehicles 531-1, 531-2, . . . , 531-M and a number of transport vehicles 533-1, . . . , 533-K. In some examples, the first memory resource and the first processing resource can be coupled to a first vehicle, for example first unitary vehicle 531-1. In a number of embodiments, the number of unitary vehicles 531-1, 531-2, . . . , 531-M, and the number of transport vehicles 533-1, . . . , 533-K can be autonomous vehicles.

The first processing resource (e.g., processing resource 108 in FIG. 1) of the first unitary vehicle 531-1 can request access to a memory pool in response to needing memory to perform operations on data. For example, the first processing resource may need access to a memory pool to create a route for the first unitary vehicle 531-1 to take. In some examples, the first processing resource can query a memory pool, requesting a particular amount of memory. The first processing resource can receive access to a memory pool in response to the memory pool having the particular amount of memory available. The request to access the memory pool can include an address of the first unitary vehicle 531-1. The address can be used to verify whether the first unitary vehicle 531-1 is trusted by the memory pool. The memory pool can be used to perform data center operations for the first unitary vehicle 531-1 that are using the memory and/or processing resources of the memory pool.

The memory pool can be accessed wirelessly via a transceiver (e.g., transceiver 120 in FIG. 1) by the first unitary vehicle 531-1. The request to access the memory pool can be sent using the transceiver and the access to the memory pool can be received by the transceiver.

In some examples, the second vehicle, for example, second unitary vehicle 531-2 can include a transceiver. The transceiver of the second unitary vehicle 531-2 can receive the request from the first unitary vehicle 531-1 to access the pool of memory resources and can transmit the indication to access the pool of memory resources to the first unitary vehicle 531-1.

A memory pool can be chosen by a processing resource (e.g., processing resource 108 in FIG. 1) based on proximity to the processing resource. For example, a first processing resource on a first unitary vehicle 531-1 can request access to a first memory pool. This first memory pool can include a first base station 535-1, a first transport vehicle 533-1, and a second unitary vehicle 531-2, for example. The first processing resource can request access to the first memory pool (e.g., first base station 535-1, first transport vehicle 533-1, second unitary vehicle 531-2) in response to the first memory pool (e.g., first base station 535-1, first transport vehicle 533-1, second unitary vehicle 531-2) being in closer proximity to the processing resource than a second memory pool. The second memory pool can include a second base station 535-2 and a third unitary vehicle 533-3, for example.

In some embodiments, the first processing resource requests access to the first memory pool (e.g., first base station 535-1, first transport vehicle 533-1, second unitary vehicle 531-2) in response to the first memory pool (e.g., first base station 535-1, first transport vehicle 533-1, second unitary vehicle 531-2) having more available memory than the second memory pool (e.g., second base station 535-2 third unitary vehicle 533-3). In some examples, the first processing resource can receive access to the second memory pool (e.g., second base station 535-2, third unitary vehicle 533-3) in response to the first memory pool (e.g., first base station 535-1, first transport vehicle 533-1, second unitary vehicle 531-2) revoking access.

In some embodiments, none of the memory pools have enough memory for the processing resource to perform an operation on data. The processing resource in this example, can receive access to the number of memory pools. For example, the first processing resource of the first unitary vehicle 531-1 can receive access to the first memory pool (e.g., first base station 535-1, first transport vehicle 533-1, second unitary vehicle 531-2) and the second memory pool (e.g., second base station 535-2, third unitary vehicle 533-3).

Memory pools can be used by a number of active vehicles. The memory pools can include memory resources from a number of idle vehicles (e.g., turned off and/or parked). In some examples, the memory pools can include memory resources from a number of base stations 535-1, 535-2, . . . , 535-L.

In some embodiments, a processing resource can relinquish access to a memory pool. The processing resource can relinquish access to the memory in response to completing an operation in data and/or accessing another memory pool. For example, the first processing resource of the first unitary vehicle 531-1 can relinquish access to the first memory pool (e.g., first base station 535-1, first transport vehicle 533-1, second unitary vehicle 531-2) once the first unitary vehicle 531-1 has completed the operation. This operation could be the first unitary vehicle 531-1 reading data from or writing data to the memory at the second vehicle 531-2, for example. In some examples, the first processing resource of the first unitary vehicle 531-1 can relinquish access to the first memory pool (e.g., first base station 535-1, first transport vehicle 533-1, second unitary vehicle 531-2) once the first processing resource accessed the second memory pool (e.g., second base station 535-2, third unitary vehicle 533-3) because the first unitary vehicle 531-1 after driving can be closer to the second memory pool (e.g., second base station 535-2, third unitary vehicle 533-3). For example, the first processing resource can relinquish access to the first memory pool (e.g., first base station 535-1, first transport vehicle 533-1, second unitary vehicle 531-2) in response to receiving an indication to access another memory pool with a different plurality of vehicles and/or base stations.

In some embodiments, a processing resource (e.g. processing resource 108 in FIG. 1) can receive access requests from a memory pool and can allow the memory pool access to the memory resource coupled to the processing resource. The processing resource can allow the memory pool access in response to the memory pool being trusted (e.g., secure, free of malware, etc.). The processing resource can allow the memory pool access in response to the vehicle coupled to the processing resource being idle (e.g., turned off and/or parked). In some examples, the first processing resource can revoke access to the memory resource.

FIG. 6 is a flow chart illustrating an example of a method for wirelessly utilizing resources in accordance with a number of embodiments of the present disclosure.

At block 642, the method 640 may include transmitting, from a processor at a first vehicle that comprises the processor and memory, a request to access a pool of memory resources configured from a plurality of vehicles each having a local processor and memory.

At block 644, the method 640 may further include receiving, from a second vehicle of the plurality of vehicles, an indication to access the pool of memory resources.

The method 640 at block 646 may further include reading data from or writing data to the memory at the second vehicle using the processor at the first vehicle based at least in part on receiving the indication to access the pool of memory resources.

Although specific embodiments have been illustrated and described herein, those of ordinary skill in the art will appreciate that an arrangement calculated to achieve the same results can be substituted for the specific embodiments shown. This disclosure is intended to cover adaptations or variations of one or more embodiments of the present disclosure. It is to be understood that the above description has been made in an illustrative fashion, and not a restrictive one. Combination of the above embodiments, and other embodiments not specifically described herein will be apparent to those of skill in the art upon reviewing the above description. The scope of the one or more embodiments of the present disclosure includes other applications in which the above structures and methods are used. Therefore, the scope of one or more embodiments of the present disclosure should be determined with reference to the appended claims, along with the full range of equivalents to which such claims are entitled.

In the foregoing Detailed Description, some features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the disclosed embodiments of the present disclosure have to use more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separate embodiment. 

What is claimed is:
 1. A method, comprising: requesting, from a first device that comprises a processor and memory, access to a pool of memory resources, wherein the pool of memory resources are located on a plurality of devices each having a local processor and memory; and accessing the memory at the second device using the processor at the first device based at least in part on receiving an indication from a second device to access the pool of memory resources, wherein: the first device is directly coupled to the second device when the pool of memory resources includes less than a threshold number of memory resources; and the first device is coupled to the second device via a base station when the pool of memory resources includes at least the threshold number of memory resources.
 2. The method of claim 1, further comprising: accessing the memory at a third device of the plurality of devices based at least in part on receiving the indication to access the pool of memory resources.
 3. The method of claim 1, further comprising relinquishing access to the pool of memory resources after reading data from or writing data to the memory at the second device.
 4. The method of claim 1, further includes relinquishing access to the pool of memory resources in response to receiving an indication to access another pool of memory resources with a different plurality of resources.
 5. The method of claim 1, further includes verifying the pool of memory resources is a trusted pool of memory resources, wherein trusted includes being secure and free of malware.
 6. An apparatus, comprising: a first device, including a processor and memory resource, configured to: transmit a request to access a pool of memory resources configured from a plurality of devices each having a local processor and memory; receive, from a second device of the plurality of devices, an indication to access the pool of memory resources; and access the memory at the second device based at least in part on receiving the indication to access the pool of memory resources; and wherein: the first device is directly coupled to the second device when the pool of memory includes less than a threshold number of memory resources; and the first device is coupled to the second device via a base station when the pool of memory includes at least the threshold number of memory resources.
 7. The apparatus of claim 6, wherein the first device is located on an autonomous vehicle.
 8. The apparatus of claim 6, wherein the pool of memory resources is accessed wirelessly by the first device.
 9. The apparatus of claim 6, wherein the first device includes a transceiver to transmit and receive.
 10. The apparatus of claim 6, wherein the second device includes a transceiver to transmit the indication to access the pool of memory resources to the first device.
 11. The apparatus of claim 6, wherein the request to access the pool of memory resources is received by a transceiver of the second device.
 12. The apparatus of claim 6, wherein the request includes an address of the first device.
 13. The apparatus of claim 6, wherein the first device transmits a request to access the pool of memory resources in response to needing additional memory to perform an operation.
 14. The apparatus of claim 6, wherein the first device is further configured to read data from or write data to the memory at a third device.
 15. The apparatus of claim 6, wherein the pool of memory resources is further configured from a plurality of base stations each having a local processor and memory.
 16. A system, comprising: a first pool of memory resources, wherein the first pool of memory resources are configured from a plurality of devices each having a local processor and memory; and a first device, comprising: a first processor configured to: request access to a particular amount of memory from the first pool of memory resources; and access the memory at a second device based at least in part on receiving an indication to access the first pool of memory resources in response to the first pool of memory resources having the particular amount of memory available; and wherein: the first device is directly coupled to the second device when the first pool of memory resources includes less than a threshold number of resources; and the first device is coupled to the second device via a base station when the first pool of memory resources includes at least the threshold number of resources.
 17. The system of claim 16, further comprising a second pool of memory resources.
 18. The system of claim 17, wherein the first processor requests access to the first pool of memory resources in response to the first pool of memory resources being in closer proximity to the first device than the second pool of memory resources.
 19. The system of claim 17, wherein the first processor requests access to the first pool of memory resources in response to the first pool of memory resources having more available memory than the second pool of memory resources.
 20. The system of claim 17, wherein the first processor is further configured to receive access to the second pool of memory resources in response to the first pool of memory resources revoking access. 