Sharing a memory resource among physically remote entities

ABSTRACT

Apparatuses, systems, and methods related to sharing a memory resource among physically remote entities are described. A system sharing a memory resource among physically remote entities may enable performance of functions, including automated functions critical for prevention of damage to a product, personnel safety, and/or reliable operation, based on increased access to data that may improve performance of a mission profile. For instance, one apparatus described herein includes a first vehicle configured to determine an availability of processing resources or memory capacity, or both, at the first vehicle based at least in part on a current operating mode of the first vehicle, receive a request from a second vehicle to use at least a portion of the processing resources or the memory capacity, or both, to perform a processing operation at a second vehicle, wherein the request from the second vehicle is associated with insufficient processing capability or memory capacity, or both, at the second vehicle, and perform at least a portion of the processing operation or allow access to the available memory capacity, or both, at the first vehicle in response to the request and based at least in part on determining the availability of the processing resources or the memory capacity, or both.

TECHNICAL FIELD

The present disclosure relates generally to semiconductor memory and methods, and more particularly, to apparatuses and methods related to sharing a memory resource among physically remote entities.

BACKGROUND

In conventional motor vehicles (e.g., automobiles, cars, trucks, buses, etc.), the driver is critical to operating the vehicle's control system. For example, the driver of a conventional motor vehicle makes decisions regarding the safe operation of the vehicle. Such decisions may include decisions related to the speed of the vehicle, steering of the vehicle, obstacle and/or hazard recognition, and obstacle and/or hazard avoidance. However, a driver's ability to make these decisions and operate the vehicle's control system may be limited in some situations. For example, driver impairment, fatigue, attentiveness, and/or other factors such as visibility (e.g., due to weather or changes in terrain) may limit a driver's ability to safely operate a conventional motor vehicle and/or its control system.

In order to alleviate the deficiencies resulting from driver operation of a conventional motor vehicle, various manufacturers have experimented with autonomous vehicles. While autonomous vehicles may allow for a reduction in issues that may arise as a result of the driver's ability to operate the conventional motor vehicle becoming lessened, autonomous vehicles have their own shortcomings.

For example, autonomous vehicles may rely on artificial intelligence and/or machine learning. Artificial intelligence and machine learning require large amounts of memory bandwidth, which can be difficult to achieve given the constraints of I/O technology, power, and packaging. For example, concerning power, thermal management and battery life must be considered. With regards to safety, system components in autonomous vehicles need to be reliable because failure of one or more system components could result in injury or death to passengers in the autonomous vehicle. To decrease the chance of system failure, system components can be reduced, however a lower component count is generally in conflict with meeting performance requirements of a system.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an apparatus in the form of a memory resource and processing resource in accordance with a number of embodiments of the present disclosure.

FIG. 2 is a block diagram of examples of a system including an apparatus in accordance with a number of embodiments of the present disclosure.

FIG. 3 is a diagram of an apparatus in accordance with a number of embodiments of the present disclosure.

FIG. 4 is a diagram of a number of vehicles in accordance with a number of embodiments of the present disclosure.

FIG. 5 is a flow chart illustrating an example of a method for wirelessly utilizing resources in accordance with a number of embodiments of the present disclosure.

DETAILED DESCRIPTION

The present disclosure includes apparatuses and methods related to sharing a memory resource among physically remote entities. An example apparatus comprises a first vehicle configured to determine an availability of processing resources or memory capacity, or both, at the first vehicle based at least in part on a current operating mode of the first vehicle, receive a request from a second vehicle to use at least a portion of the processing resources or the memory capacity, or both, to perform a processing operation at a second vehicle, wherein the request from the second vehicle is associated with insufficient processing capability or memory capacity, or both, at the second vehicle, and perform at least a portion of the processing operation or allow access to the available memory capacity, or both, at the first vehicle in response to the request and based at least in part on determining the availability of the processing resources or the memory capacity, or both. The first vehicle can be an automobile, an unmanned aerial vehicle, an aircraft, a train, or a watercraft, for example. The second vehicle can also be an automobile, an unmanned aerial vehicle, an aircraft, a train, or a watercraft.

The first vehicle can allow the second vehicle to perform at least the portion of the processing operation or allow access to the available memory capacity, or both, in response to the second vehicle being a trusted vehicle. The first vehicle can verify the second vehicle is a trusted vehicle by checking the second vehicle's credentials and/or address.

In some examples, the first vehicle can allow the second vehicle to perform at least the portion of the processing operation or allow access to the available memory capacity, or both, at the first vehicle in response to the first vehicle being idle and/or in response to the first vehicle determining the availability of the processing resources or the memory capacity, or both, at the first vehicle exceeds a minimum threshold.

In some embodiments, the first vehicle can include a first transceiver and the second vehicle can include a second transceiver. The first vehicle can receive via the first transceiver the request sent from the second transceiver of the second vehicle.

The first vehicle can revoke access to perform at least the portion of the processing operation or access to the available memory capacity, or both. The first vehicle can revoke access to perform at least the portion of the processing operation or access to the available memory capacity, or both, in response to the second vehicle completing the processing operation. In some examples, the first vehicle can revoke access in response to the first vehicle having to perform a processing operation.

The first vehicle can request access to a third vehicle. In some examples, the first vehicle can request from the third vehicle to use at least a portion of the processing resources or the memory capacity, or both, of the third vehicle. The portion of the processing resources or the memory capacity of the third vehicle can be used to perform the processing operation at the second vehicle. The first vehicle can allow the second vehicle to use at least the portion of the processing resources or the memory capacity of the third vehicle to perform the processing operation at the second vehicle.

For example, the first vehicle can be in wireless communication with the third vehicle when the second vehicle is not. The first vehicle can be in wireless communication because the third vehicle is within a particular range of the first vehicle, while the second vehicle is not in wireless communication because the third vehicle is not within the particular range of the second vehicle. In some examples, the first vehicle can request to use the processing resources and/or the memory capacity of the third vehicle on behalf of the second vehicle. Also, in some examples, the first vehicle can be trusted by the third vehicle and the second vehicle is not trusted by the third vehicle. The second vehicle can access the processing resources or the memory capacity of the third vehicle even though the second vehicle is not trusted using the first vehicle.

The first vehicle can transmit a signal that indicates the availability of processing resources or memory capacity, or both. The signal can be broadcasted to one or more base stations and/or one or more vehicles including the second vehicle. The request from the second vehicle can be received by the first vehicle in response to the signal or the signal can be broadcasted to the second vehicle in response to the first vehicle receiving the request from the second vehicle.

The figures herein follow a numbering convention in which the first digit or digits correspond to the drawing figure number and the remaining digits identify an element or component in the drawing. Similar elements or components between different figures may be identified by the use of similar digits. For example, 108 may reference element “8” in FIG. 1, and a similar element may be referenced as 208 in FIG. 2. As will be appreciated, elements shown in the various embodiments herein can be added, exchanged, and/or eliminated so as to provide a number of additional embodiments of the present disclosure. In addition, as will be appreciated, the proportion and the relative scale of the elements provided in the figures are intended to illustrate certain embodiments of the present invention and should not be taken in a limiting sense.

FIG. 1 is a block diagram of an apparatus 100 in the form of a memory resource 101 and a processing resource 108 in accordance with a number of embodiments of the present disclosure. The apparatus 100 can include a wirelessly utilizable resource.

As shown in FIG. 1, apparatus 100 includes a memory resource 101 coupled to a processing resource 108, a transceiver 120, and a cloud 122. The memory resource 101 can include a number of memory devices 103-1, 103-2, . . . , 103-N coupled to control circuitry 107 via a number of channels 105-1, 105-2, . . . , 105-N. The processing resource 108 can include a controller 110 and a mission profile 117. The controller 110 can include a combination 112, an arbiter 114, and an operating mode 116.

The memory resource 101 may include memory (e.g., memory cells) arranged, for example, in a number of bank groups, banks, bank sections, subarrays, and/or rows of a number of memory devices 103-1, 103-2, . . . , 103-N.

The memory resource 101 may include volatile and/or non-volatile memory configured to store instructions executable by the processing resource 108 coupled to the memory resource 101 via bus 118. For example, the number of memory devices 103-1, 103-2, . . . , 103-N may include flash memory, for example NOR, read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), dynamic random-access memory (DRAM), static random-access memory (SRAM), and/or other suitable storage media.

In some embodiments, the memory resource 101 may include a number of non-volatile memory devices formed and/or operable as PCRAM, RRAM, FeRAM, MRAM, and/or STT RAM, phase change memory, 3D XPoint, and/or Flash memory devices, among other types of non-volatile memory devices. In some embodiments, the memory resource 101 of FIG. 1 may include a combination of a number of volatile memory devices and a number of non-volatile memory devices, as described herein.

Each of the number of memory devices 103-1, 103-2, . . . , 103-N can be coupled to a corresponding number of channels 105-1, 105-2, . . . , 105-N. The number of channels 105-1, 105-2, . . . , 105-N are described further in connection with FIG. 2. The number of channels 105-1, 105-2, . . . , 105-N can be selectably coupled to control circuitry 107 of the memory resource 101. The control circuitry 107 can be configured to enable data values for and/or instructions (e.g., commands) related to an operation to be directed to an appropriate one or more of the number of memory devices 103-1, 103-2, . . . , 103-N.

The apparatus 100 may be used in autonomous driving applications. For example, the memory resource 101, processing resource 108, and/or the transceiver 120 can be, but is not limited to being, located on an autonomous vehicle. The number of memory devices 103-1, 103-2, . . . , 103-N of the memory resource 101 may store vehicle data. For example, critical code (e.g., firmware, specific parameters, and data) for an autonomous driving application. The data can include data collected from vehicle sensors, photographic data collected from vehicle cameras, and/or a combination thereof. In some embodiments the memory resource 101 can store data and transmit data. The data can be transmitted to the processing resource 108 including the controller 110.

The processing resource 108 can receive data and/or instructions from the memory resource 101 via a bus 118. The bus 118 can include a number of I/O lines selectably coupled to the channels 105-1, 105-2, . . . , 105-N via switches (e.g., switches 226-1, . . . , 226-N in FIG. 2). The received data can be used by the controller 110 to generate commands. For example, the data can include information regarding the amount of memory needed to perform an operation. The controller 110 can generate a command to allow access to the memory resource 101, for example. The processing resource 108 can then transmit the access to a transceiver 120 via channel 119 to send the access to one more processing resources. In some embodiments, the transceiver 120 can send the access to the cloud 122 to allow the one or more processing resources to access the memory resource 101 via the cloud 122.

In some embodiments, the controller 110 can include a number of components configured to contribute to operations controlled by the controller 110. Such components may include a combination component 112, an arbiter component 114, and an operating mode component 116. The combination component 112 can be configured to assess resource availability in a plurality of separate memory devices 101. The arbiter component 114 can be configured to selectably determine whether a second processing resource is authorized to access a first memory resource. The operating mode component 116 can be configured to determine a particular number of second processing resources to use a first memory resource.

The processing resource 108 can include a mission profile 117. The mission profile 117 can be selectably coupled to the controller 110 and or the combination component 112, the arbiter component 114, and the operating mode component 116 associated with the controller 110. The mission profile 117 can be stored and/or accessible in SRAM of the processing resource 108, for example. The mission profile 117 can alternatively or in addition be stored by the memory resource 101 by one or more of the number of memory devices 103-1, 103-2, . . . , 103-N and can be accessible via bus 118, control circuitry 107, and/or channels 105-1, 105-2, . . . , 105-N by the controller 110 for read and/or write operations.

As shown in FIG. 1, the processing resource 108 includes a plurality of sets of logic units 111-1, . . 111-N (collectively referred to as logic units 111). In a number of embodiments, the processing resource 108 may be configured to execute a plurality of sets of instructions using the plurality of sets of logic units 111-1, . . . , 111-N and transmit outputs obtained as a result of the execution via a device-to-device communication technology that is operable in a number of frequency bands including the EHF band. The outputs transmitted may be communicated with other devices such as wirelessly utilizable resources (e.g., wirelessly utilizable resources 200-1, . . . , 200-4.

Although embodiments are not so limited, at least one of the logic units 111 can be an arithmetic logic unit (ALU), which is a circuit that can perform arithmetic and bitwise logic operations on integer binary numbers and/or floating point numbers. As an example, the ALU can be utilized to execute instructions by performing logical operations such as AND, OR, NOT, NAND, NOR, and XOR, and invert (e.g., inversion) logical operations on data (e.g., one or more operands). The processing resource 108 may also include other components that may be utilized for controlling logic units 111. For example, the processing resource 108 may also include a control logic (e.g., configured to control a data flow coming into and out of the logic units 111) and/or a cache coupled to each of the plurality of set of logic units 111-1, . . . , 111-N.

A number of ALUs can be used to function as a floating point unit (FPU) and/or a graphics processing unit (GPU). Stated differently, at least one of the plurality of sets of logic units 111-1, . . . , 111-N may be FPU and/or GPU. As an example, the set of logic units 111-1 may be the FPU while the set of logic units 111-N may be the GPU.

As used herein, “FPU” refers to a specialized electronic circuit that operates on floating point numbers. In a number of embodiments, FPU can perform various operations such as addition, subtraction, multiplication, division, square root, and/or bit-shifting, although embodiments are not so limited. As used herein, “GPU” refers to a specialized electronic circuit that rapidly manipulate and alter memory (e.g., memory resource 101) to accelerate the creation of image in a frame buffer intended for output to a display. In a number of embodiments, GPU can include a number of logical operations on floating point numbers such that the GPU can perform, for example, a number of floating point operations in parallel.

In some embodiments, GPU can provide non-graphical operation. As an example, GPU can also be used to support shading, which is associated with manipulating vertices and textures with man of the same operations supported by CPUs, oversampling and interpolation techniques to reduce aliasing, and/or high-precision color spaces. These example operations that can be provided by the GPU are also associated with matrix and vector computations, which can be provided by GPU as non-graphical operations. As an example, GPU can also be used for computations associated with performing machine-learning algorithms and is capable of providing faster performance than what CPU is capable of providing. For example, in training a deep learning neural networks, GPUs can be 250 times faster than CPUs. As used herein, “machine-learning algorithms” refers to algorithms that uses statistical techniques to provide computing systems an ability to learn (e.g., progressively improve performance on a specific function) with data, without being explicitly programmed.

GPU can be present on various locations. For example, the GPU can be internal to (e.g., within) the CPU (e.g., of the network device 102). For example, the GPU can be on a same board (e.g., on-board unit) with the CPU without necessarily being internal to the GPU. For example, the GPU can be on a video card that is external to a wirelessly utilizable resource (e.g., wirelessly utilizable resource 200-1, . . . , 200-4 as described in connection with FIG. 2). Accordingly, the apparatus 100 may be an additional video card that can be external to and wirelessly coupled to a network device such as the wirelessly utilizable resource for graphical and/or non-graphical operations.

A number of GPUs of the processing resource 108 may accelerate a video decoding process. As an example, the video decoding process that can be accelerated by the processing resource 108 may include a motion compensation (mocomp), an inverse discrete cosine transform (iCDT), an inverse modified discrete cosine transform (iMDCT), an in-loop deblocking filter, an intra-frame prediction, an inverse quantization (IQ), a variable-length decoding (VLD), which is also referred to as a slice-level acceleration, a spatial-temporal deinterlacing, an automatic interlace/progressive source detection, a bitstream processing (e.g., context-adaptive variable-length coding and/or context-adaptive binary arithmetic coding), and/or a perfect pixel positioning. As used herein, “a video decoding” refers to a process of converting base-band and/or analog video signals to digital components video (e.g., raw digital video signal).

In some embodiments, the processing resource 108 may be further configured to perform a video encoding process, which converts digital video signals to analog video signals. For example, if the network device (including a display) requests the apparatus 100 to return a specific form of signals such as the analog video signals, the apparatus 100 may be configured to convert, via the processing resource 108, digital video signals to analog video signals prior to transmitting those wirelessly to the network device.

The apparatus 100 includes the transceiver 120. As used herein, a “transceiver” may be referred to as a device including both a transmitter and a receiver. In a number of embodiments, the transceiver 120 may be and/or include a number of radio frequency (RF) transceivers. The transmitter and receiver may, in a number of embodiments, be combined and/or share common circuitry. In a number of embodiments, no circuitry may be common between the transmit and receive functions and the device may be termed a transmitter-receiver. Other devices consistent with the present disclosure may include transponders, transverters, and/or repeaters, among similar devices.

In a number of embodiments, a communication technology that the processing resource 108 can utilize may be a device-to-device communication technology as well as a cellular telecommunication technology, and the processing resource 108 may be configured to utilize the same transceiver 120 for both technologies, which may provide various benefits such as reducing a design complexity of the apparatus 100. As an example, consider devices (e.g., wirelessly utilizable resources 200-1, . . . , 200-4 and/or any other devices that may be analogous to the apparatus 100) in previous approaches, in which the device utilizes a device-to-device communication technology as well as a cellular telecommunication technology in communicating with other devices. The device in those previous approaches may include at least two different transceivers (e.g., each for the device-to-device communication technology and the cellular telecommunication technology, respectively) because each type of communication technology may utilize different network protocols that would further necessarily utilize unique transceivers. As such, the device implemented with different transceivers would increase a design (e.g., structural) complexity that may increase costs associated with the device. On the other hand, in a number of embodiments, the processing resource 108 is configured to utilize the same network protocol for both technologies (e.g., device-to-device communication and cellular telecommunication technologies), which eliminates a need of having different transceivers for different types of wireless communication technologies. Accordingly, a number of the present disclosure may reduce a design complexity of the apparatus 100.

In a number of embodiments, since resources of the apparatus 100 can be wirelessly utilizable, the apparatus 100 may be free of those physical interfaces that would have been included, to physically connect to a motherboard of a network device and/or a display, in expansion cards of previous approaches. For example, the apparatus 100 as an expansion card may not include a physical interface, which would have been utilized to connect to the mother board, such as a physical bus (e.g., S-100 bus, industry standard architecture (ISA) bus, NuBus bus, Micro Channel bus (or Micro Channel Architecture (MCA), extended industry standard architecture (EISA) bus, VESA local bus (VLB), peripheral component interconnect (PCI) bus, ultra port architecture (UPA), universal serial bus (USB), peripheral component interconnect extended (PCI-X), peripheral component interconnect express (PCIe)) or other physical channels such as accelerated graphics port (AGP) that would have been utilized to connect to the motherboard. For example, the apparatus 100 as an expansion card may not include a physical interface, which would have been utilized to connect to the display, such as a video graphics array (VGA), digital video interface (DVI), high-definition multimedia interface (HDMI), and/or display port. Accordingly, the apparatus 100 may be configured to transmit, via the transceiver 120, those signals, which would have been transmitted by those physical interfaces listed above, wirelessly to the network device and/or display. For example, the signals that can be wirelessly transmitted via the transceiver 120 may include compressed and/or uncompressed digital video signals (that would have been transmitted by HDMI and/or VGA), compressed and/or uncompressed audio signals (that would have been transmitted by HDMI), and/or analog video signals (that would have been transmitted by VGA).

Further, the apparatus 100 may be utilized by wirelessly utilizable resource (e.g., wirelessly utilizable resource 200-1, . . . , 200-4 in FIG. 2) via a device-to-device communication technology that is operable in an EHF band. The communication technology operable in the EHF band can include a fifth generation (5G) technology or later technology. 5G technology may be designed to utilize a higher frequency portion of the wireless spectrum, including an EHF band (e.g., ranging from 30 to 300 GHz as designated by the ITU).

As used herein, the device-to-device communication technology refers to a wireless communication performed directly between a transmitting device and a receiving device, as compared to a wireless communication technology such as the cellular telecommunication technology and/or those communication technologies based on an infrastructure mode, by which network devices communicate with each other by firstly going through an intermediate network device (e.g., base station and/or Access Point (AP)). As such, via the device-to-device communication technology, data to be transmitted by the transmitting device may be directly transmitted to the receiving device without routing through the intermediate network device (e.g., base station 225), as described in connection with FIG. 2). In some embodiments. the device-to-device communication may rely on existing infrastructures (e.g., network entity such as a base station); therefore, can be an infrastructure mode. For example, as described herein, the device-to-device communication whose transmission timing is scheduled by a base station can be an infrastructure mode. In some embodiments, the receiving and transmitting devices may communicate in the absent of the existing infrastructures; therefore, can be an ad-hoc mode. As used herein, “an infrastructure mode” refers to an 802.11 networking framework in which devices communicate with each other by first going through an intermediary device such as an AP. As used herein, “ad-hoc mode” refers to an 802-11 networking framework in which devices communicate with each other without the use of intermediary devices such as an AP. The term “ad-hoc mode” can also be referred to as “peer-to-peer mode” or “independent Basic Service Set (IBSS).”

As used herein, the cellular telecommunication technology refers to a technology for wireless communication performed indirectly between a transmitting device and a receiving device via a base station, as compared to those types of wireless communication technologies including a device-to-device communication technology. Cellular telecommunications may be those that use resources of a frequency spectrum restricted or regulated by a governmental entity. License frequency spectrum resources may be scheduled for use or access by certain devices and may be inaccessible to other devices. By contrast, resources of shared or unlicensed frequency spectrum may be open and available for use by many devices without the necessity of a governmental license. Allocating licensed and shared or unlicensed frequency resources may present different technical challenges. In the case of licensed frequency spectrum, resources may be controlled by a central entity, such as a base station or entity within a core network. While devices using resources of shared or unlicensed frequency spectrum may contend for access—e.g., one device may wait until a communication channel is clear or unused before transmitting on that channel. Sharing resources may allow for broader utilization at the expense of guaranteed access.

Techniques described herein may account for, or may use, both licensed and unlicensed frequency spectrum. In some communication schemes, device-to-device communication may occur on resources of a licensed frequency spectrum, and such communications may be scheduled by a network entity (e.g., a base station). Such schemes may include certain 3GPP-developed protocols, like Long-Term Evolution (LTE) or New Radio (NR). A communication link between devices (e.g. user equipments (UEs)) in such schemes may be referred to as sidelink, while a communication link from a base station to a device may be referred to as a downlink and a communication from a device to a base station may be referred to as an uplink.

In other schemes, device-to-device communication may occur on resources of unlicensed frequency spectrum, and devices may contend for access the communication channel or medium. Such schemes may include WiFi or MulteFire. Hybrid schemes, including licensed-assisted access (LAA) may also be employed.

As used herein, an EHF band refers to a band of radio frequencies in an electromagnetic spectrum ranging from 30 to 300 gigahertz (GHz) as designated by the International Telecommunication Union (ITU), and as described further herein. Ranges of radio frequencies as designated by the ITU can include extremely low frequency (ELF) band ranging from 3 to 30 Hz, super low frequency (SLF) band ranging from 30 Hz to 300 Hz, ultra low frequency (ULF) band ranging from 300 Hz to 3 kilohertz (kHz), very low frequency (VLF) band ranging from 3 to 30 kHz, low frequency (LF) band ranging from 30 kHz to 300 kHz, medium frequency (MF) band ranging from 300 kHz to 3 megahertz (MHz), high frequency (HF) band ranging from 3 MHz to 30 MHz, very high frequency (VHF) band ranging from 30 MHz to 300 MHz, ultra high frequency (UHF) band ranging from 300 MHz to 3 GHz, super high frequency (SHF) band ranging from 3 GHz to 30 GHz, extremely high frequency (EHF) band ranging from 30 GHz to 300 GHz, and tremendously high frequency (THF) band ranging from 0.3 to 3 terahertz (THz).

A number of embodiments of the present disclosure can provide various benefits by utilizing a network communication that is operable in a number of frequency bands including a higher frequency portion (e.g., EHF) of the wireless spectrum, as compared to those network communication technologies that utilizes a lower frequency portion of the wireless spectrum only. As an example, the EHF bands of 5G technology may enable data to be transferred more rapidly than technologies (e.g., including technologies of previous generations) using lower frequency bands only. For example, a 5G network is estimated to have transfer speeds up to hundreds of times faster than a 4G network, which may enable data transfer rates in a range of tens of megabits per second (MB/s) to tens of GB/s for tens of thousands of users at a time (e.g., in a memory pool, as described herein) by providing a high bandwidth. For example, a 5G network provides faster transfer rates than the 802.11-based network such as WiFi that operate on unlicensed 2.4 GHz radio frequency band (e.g., Ultra High Frequency (UHF) band). Accordingly, a number of embodiments can enable the apparatus 100 to be used at a high transfer speed as if the apparatus 100 were wired to the wirelessly utilizable resource (e.g., wirelessly utilizable resource 200-1, . . . , 200-4).

In addition to the EHF band, the communication technology of the communication can also be operable in other frequency bands such as the UHF band and the SHF band. As an example, the communication technology can operate in a frequency band below 2 GHz (e.g., low 5G frequencies) and/or in a frequency band between 2 GHz and 6 GHz (e.g., medium 5 G frequencies) in addition to a frequency band above 6 GHz (e.g., high 5 G frequencies). Further details of a number of frequency bands (e.g., below 6 GHz) in which the 5G technology can operate are defined in Release 15 of the Third Generation Partnership Project (3GPP) as New Radio (NR) Frequency Range 1 (FR1), as shown in Table 1.

TABLE 1 5G operating bands for FR1 NR Operating Duplex Band Frequency Band (MHz) Mode n1 1920-1980; 2110-2170 FDD n2 1850-1910; 1930-1990 FDD n3 1710-1785; 1805-1880 FDD n5 824-849; 869-894 FDD n7 2500-2570; 2620-2690 FDD n8 880-915; 925-960 FDD n20 791-821; 832-862 FDD n28 703-748; 758-803 FDD n38 2570-2620 TDD n41 2496-2690 TDD n50 1432-1517 TDD n51 1427-1432 TDD n66 1710-1780; 2110-2200 FDD n70 1695-1710; 1995-2020 FDD n71 617-652; 663-698 FDD n74 1427-1470; 1475-1518 FDD n75 1432-1517 SDL n76 1427-1432 SDL n78 3300-3800 TDD n77 3300-4200 TDD n79 4400-5000 TDD n80 1710-1785 SUL n81 880-915 SUL n82 832-862 SUL n83 703-748 SUL n84 1920-1980 SUL

Further, details of a number of frequency bands (e.g., above 6 GHz) in which the 5G technology can operate are defined in Release 15 of the 3GPP as NR Frequency Range 2 (FR2), as shown in Table 2.

TABLE 2 5G operating bands for FR2 NR Operating Duplex Band FREQUENCY BAND (MHz) Mode n257 26500-29500 TDD n258 24250-27500 TDD n260 37000-40000 TDD

In some embodiments, a number of frequency bands in which a communication technology (e.g., device-to-device communication technology and/or cellular telecommunication technology using 5G technology) utilized for the communication 106 may be operable can further include the THF band in addition to those frequency bands such as the SHF, UHF, and EHF bands. The memory, transceiver, and/or the processor described herein may be a resource that can be wirelessly utilizable via respective communication technologies such as 5G technology.

As used herein, FDD stands for frequency division duplex, TDD stands for time division duplex, SUL stands for supplementary uplink, and SDL stands for supplementary downlink. FDD and TDD are each a particular type of a duplex communication system. As used herein, a duplex communication system refers to a point-to point system having two connected parties and/or devices that can communicate with one another in both directions. TDD refers to duplex communication links where uplink is separated from downlink by the allocation of different time slots in the same frequency band. FDD refers to a duplex communication system, in which a transmitter and receiver operate at different frequency bands. SUL/SDL refer to a point-to-point communication system having two connected parties and/or devices that can communicate with one another in a unilateral direction (e.g., either via an uplink or a downlink, but not both).

The 5G technology may be selectively operable in one or more of low, medium, and/or high 5G frequency bands based on characteristics of, for example, the communication. As an example, the low 5G frequency may be utilized in some use cases (e.g., enhanced mobile broadband (eMBB), ultra-reliable and low-latency communications (URLLC), massive machine-type communications (mMTC)), in which extremely wide area needs to be covered by the 5G technology. As an example, the medium 5G frequency may be utilized in some use cases (e.g., eMBB, URLLC, mMTC), in which higher data rate than that of the low 5G frequencies is desired for the communication technology. As an example, the high 5G frequency may be utilized in some use cases (e.g., eMBB), in which extremely high data rate is desired for the 5G technology.

As used herein, eMBB, URLLC, mMTC each refers to one of three categories of which the ITU has defined as services that the 5G technology can provide. As defined by the ITU, eMBB aims to meet the people's demand for an increasingly digital lifestyle and focuses on services that have high requirements for bandwidth, such as high definition (HD) videos, virtual reality (VR), and augmented reality (AR). As defined by the ITU, URLLC aims to meet expectations for the demanding digital industry and focuses on latency-sensitive services, such as assisted and automated driving, and remote management. As defined by the ITU, mMTC aims to meet demands for a further developed digital society and focuses on services that include high requirements for connection density, such as smart city and smart agriculture.

As used herein, a channel bandwidth refers to a frequency range occupied by data and/or instructions when being transmitted (e.g., by an individual carrier) over a particular frequency band. As an example, a channel bandwidth of 100 MHz may indicate a frequency range from 3700 MHZ to 3800 MHZ, which can be occupied by data and/or instructions when being transmitted over n77 frequency band, as shown in Table 1. As indicated in Release 15 of the 3GPP, a number of different channel bandwidth such as a channel bandwidth equal to or greater than 50 MHz (e.g., 50 MHz, 100 MHz, 200 MHz, and/or 400 Mhz) may be utilized for the 5G technology.

Embodiments are not limited to a particular communication technology; however, various types of communication technologies may be employed for the communication. The various types of communication technologies the apparatus 100 and/or the wirelessly utilizable resource (e.g., wirelessly utilizable resource 200-1, . . . , 200-4 in FIG. 2) can utilize may include, for example, cellular telecommunication technology including 0-5 generations broadband cellular network technologies, device-to-device to communication including Bluetooth, Zigbee, and/or 5G, and/or other wireless communication utilizing an intermediary device (e.g., WiFi utilizing an AP), although embodiments are not so limited.

FIG. 2 is a block diagram of examples of a system including a number of wirelessly utilizable resources in accordance with a number of embodiments of the present disclosure. As illustrated in FIG. 2, the system 223 may, in a number of embodiments, include a plurality of elements. For example, the plurality of elements of the system 223 may be a number of wirelessly utilizable resources 200-1, . . . , 200-5 (collectively referred to as wirelessly utilizable resources 200), an apparatus 200-1, and/or a base station 225. At least a portion of the wirelessly utilizable resources 200 may include a local commodity DRAM and may utilize the resources of the apparatus 200-1 as supplemental resources. The apparatus 200-1 includes resources (e.g., a memory resource, a transceiver, and/or a processor) at least of which can be wirelessly utilizable (e.g., shared) by the wirelessly utilizable resources 200.

The wirelessly utilizable resources 200 can be various user devices. As an example, the wirelessly utilizable resources 200 can be computing devices such as laptops, phones, tablets, desktops, wearable smart devices, etc. In some embodiments, the user devices may be mobile as well. As used herein, a “mobile user device” may be a device that is portable and utilizes a portable power supply. In a number of embodiments, the wirelessly utilizable resources 200 can include a local DRAM and a memory resource that can be included in the apparatus 200-1 and utilizable by the wirelessly utilizable resources 200 and may be supplemental to the wirelessly utilizable resources 200.

The apparatus 200-1 including a wirelessly utilizable resource can be a wireless electronic component of at least one of the wirelessly utilizable resources 200. As used herein, “an electronic component” refers to an electronic component that can provide additional functions to a network device and/or assist the network device in furthering a particular function. For example, an electronic component may include various types of components (e.g., expansion card) such as a video card, sound card, primary storage devices (e.g., main memory), and/or secondary (auxiliary) storage devices (e.g., flash memory, optical discs, magnetic disk, and/or magnetic tapes), although embodiments are not so limited. As used herein, “a wireless electronic component” refers to an electronic component that is wirelessly coupled to a network device.

Accordingly, as an example, the apparatus 200-1 may be wirelessly utilized by the wirelessly utilizable resources 200 for various functions. As an example, the apparatus 200-1 may be utilized for graphical operations that would require high-performance processing and/or memory resources such as memory intensive games and/or high quality video associated with a high degree of resolutions and/or frame rates. Further, as an example, the apparatus 200-1 may be utilized for non-graphical operations such as a number of operations of applications associated with machine-learning algorithms that would require high-performance processing and/or memory resources.

In some embodiments, at least a portion of the wirelessly utilizable resources 200 may be a small form factor (SFF) device such as a handheld computing device (e.g., personal computer (PC)). A degree of performance that can be often provided by the SSF device can be relatively low due to its limited size and volume. Further, the SSF device may lack a number of channels by which expansion cards such as a high-performance video card can be added. Accordingly, providing a mechanism to wirelessly add a high-performance video card such as the apparatus 200-1 to the SSF device can provide benefits such as performing, at the SSF device, memory-intensive operations (e.g., memory intensive games and/or high quality video associated with a high degree of resolutions and/or frame rates), which would have not been properly performed at the SSF device absent the wirelessly utilizable resources.

In a number of embodiments, the apparatus 200-1 may be wirelessly utilized via a device-to-device communication technology, for example, by the wirelessly utilizable resources 200 as shown in FIG. 2. For example, as illustrated in connection with FIG. 1, the device-to-device communication technology can operate in higher frequency portion of the wireless spectrum, including an UHF, SHF, EHF and/or THF band, as defined according to the ITU. However, embodiments are not so limited. For example, other network communication technologies of a device-to-device communication technology may be employed within the system 223. As an example, the apparatus 200-1 may communicate with at least one of the wirelessly utilizable resources 200 via a different type of device-to-device communication technology such as a Bluetooth, Zigbee, and/or other types of device-to-device communication technologies.

As shown in FIG. 2, the apparatus 200-1 may be wirelessly utilized by the wirelessly utilizable resource 200-4 via the base station 225. As an example, a communication technology that can be utilized between the wirelessly utilizable resource 200-4 and the apparatus 200-1 may be a cellular telecommunication technology. In a number of embodiments, the cellular telecommunication technology that can be utilized for communicating between the wirelessly utilizable resource 200-4 and the apparatus 200-1 can include a 5G cellular telecommunication technology that operates in at least one of a number of frequency bands including the UHF, SHF, EHF, and/or THF.

The term “base station” may be used in the context of mobile telephony, wireless computer networking and/or other wireless communications. As an example, a base station 225 may include a GPS receiver at a known position, while in wireless communications it may include a transceiver connecting a number of other devices to one another and/or to a wider area. As an example, in mobile telephony, a base station 225 may provide a connection between mobile phones and the wider telephone network. As an example, in a computing network, a base station 322 may include a transceiver acting as a router for electrical components (e.g., memory resource 101 and processing resource 108 in FIG. 1) in a network, possibly connecting them to a WAN, WLAN, the Internet, and/or the cloud. For wireless networking, a base station 225 may include a radio transceiver that may serve as a hub of a local wireless network. As an example, a base station 225 also may be a gateway between a wired network and the wireless network. As an example, a base station 225 may be a wireless communications station installed at a fixed location.

In a number of embodiments, the apparatus 200-1 may utilize the same network protocol and same transceiver (e.g., RF transceiver) for a device-to-device communication technology (e.g., 5G device-to-device communication technology) as well as a cellular telecommunication technology (e.g., 5G cellular telecommunication technology), as described in connection with FIG. 1. As an example, the apparatus 200-1 may utilize the same network protocol in communicating with the wirelessly utilizable resource 200-4 (e.g., via a cellular telecommunication technology through the base station 225) as well as with the wirelessly utilizable resources 200 (e.g., via a device-to-device communication technology).

In a number of embodiments, various types of network protocols may be utilized for communicating data within the system 223 (e.g., among the wirelessly utilizable resources 200, between the wirelessly utilizable resources 200, between the wirelessly utilizable resources 200 and the base station 225, etc.). The various types of network protocols may include the time-division multiple access (TDMA), code-division multiple access (CDMA), space-division multiple access (SDMA), frequency division multiple access (FDMA), orthogonal FDMA (OFDMA), single-carrier (SC)-FDMA, and/or non-orthogonal multiple access (NOMA), although embodiments are not so limited.

In some embodiments, cellular telecommunication technologies (e.g., between the apparatus 200-1 and the wirelessly utilizable resource 200-4) may be performed via (e.g., include) a NOMA. As used herein, the NOMA refers to a network protocol that separates signals according to a power domain. For example, signals may be received (e.g., from the user) in an intentionally-introduced mutual interference and can be separated from each other according to differences on their power levels. As such, the signals received and to be processed pursuant to the NOMA may be non-orthogonal in time, frequency, and/or code, as compared to those orthogonal multiple-access (OMA) schemes, in which different users are allocated according to orthogonal resources, either in time, frequency, and/or code domain. Accordingly, utilizing a non-orthogonal network protocols such as the NOMA may provide benefits such as reduced latencies associated with separating users based on factors other than power domain, which may enable massive Multiple Input Multiple Output (MIMO).

In a number of embodiments, the apparatus 200-1 may be utilized by the wirelessly utilizable resources 200 at a discrete time. For example, the apparatus 200-1 may be utilized by the wirelessly utilizable resource 200-3 during a subsequent period of a particular period during which the apparatus 200-1 was, for example, utilized by the wirelessly utilizable resource 200-2. As such, the apparatus 200-1 may be utilized by each of the wirelessly utilizable resources 200 at different times (e.g., non-overlapping time periods). However, embodiments are not so limited. For example, the apparatus 200-1 may be simultaneously utilized by the wirelessly utilizable resources 200. As an example, the apparatus 200-1 may be physically and/or logically partitioned such that the partitioned portions may be simultaneously utilized by the wirelessly utilizable resources 200.

FIG. 3 is a diagram of an apparatus 324 in accordance with a number of embodiments of the present disclosure.

As shown in FIG. 3, apparatus 324 includes a memory resource 301, a processing resource 308 and a number of channels 305-1, 305-2 . . . , 305-N coupled to memory devices (e.g., memory devices 103-1, 103-2 . . . , 103-N in FIG. 1). The processing resource 308 can include a controller 310. The controller 310 is illustrated as being formed from a plurality of sections 310-1, 310-2, . . . , 310-N, although the controller 310 can be formed as a single component, as shown in FIG. 1. As described further herein, circuitry 318, a number of switches 326-1, 326-2 . . . , 326-N, and/or the controller 310 can be coupled to a number of resource transceivers 328-1, 328-2, . . . , 328-N-1 of the transceiver (e.g., transceiver 120 in FIG. 1) to transmit access requests, receive access to one or more wireless memory resources, receive access requests and/or enable access to the one or more memory resources.

Controller section 310-1 can be selectably coupled via I/O line 318-1 of the bus (e.g., bus 118 in FIG. 1) to the channel 305-1. A command can be issued from the processing resource 308 related to an operation to be directed to a memory resource (e.g., memory resource 101 in FIG. 1) coupled to the channel 305-1 and selectably coupled to the I/O line 318-1. The command can enable access of the memory resource by the processing resource 308. Alternatively or in addition, I/O line 318-1 can enable the wireless processing resource access to the memory resource in response to a request by the wireless processing resource. The wireless processing resource can use the memory resource to improve performance of the wireless processing resource, for example.

The processing resource 308 via controller section 310-1 can selectably determine whether I/O line 318-1 is configured to enable the processing resource 308 access to the memory resource (e.g., memory resource 101 in FIG. 1) or enable the wireless processing resource access to the memory resource by controlling switch 326-1. The controller section 310-1 can direct switch 326-1 to open to disconnect channel 305-1 from controller section 310-1 while connecting a portion of the I/O line 318-1 to resource transceiver 328-1 to enable the wireless processing resource to access the memory resource via I/O line 318-1 and channel 305-1. The controller section 310-1 can also direct switch 326-1 to close to disconnect resource transceiver 328-1 from channel 305-1 while connecting a portion of the I/O line 318-1 to the processing resource 308 to enable the processing resource 308 to access the memory resource via I/O line 318-1 and channel 305-1.

The processing resource 308 can request and receive access to a wireless memory resource via the transceiver 310. For example, the controller section 310-2 can request access and receive access to a wireless memory resource via resource transceiver 328-2.

FIG. 4 is a diagram 430 of a number of vehicles 431-1, 431-2, . . . , 431-X in accordance with a number of embodiments of the present disclosure.

As shown in FIG. 4, diagram 430 includes a number of vehicles 431-1, 431-2, . . . , 431-X including memory resources 401-1, 401-2, . . . , 401-Y and processing resources 408-1, 408-2, . . . , 408-Z.

In a number of embodiments, a first vehicle 431-1 can be configured to determine an availability of processing resources or memory capacity, or both, at the first vehicle 431-1 based at least in part on a current operating mode of the first vehicle 431-1. The current operating mode can be idle or active, for example.

A second vehicle 431-2 can determine that a processing capability or a memory capacity, or both at the second vehicle 431-2 is insufficient to perform a processing operation at the second vehicle 431-2. In some examples, the second vehicle 431-2 can identify additional processing resources or additional memory capacity, or both, at the first vehicle 431-1. The first vehicle 431-1 and the second vehicle 431-2 can be in wireless communication.

The second vehicle 431-2 can identify the additional processing resources or the additional memory capacity, or both, at the first vehicle 431-1 based at least in part on determining that the processing capability or the memory capacity, or both, at the second vehicle 431-2 is insufficient. The second vehicle 431-2 can send a request to the first vehicle 431-1 to use at least a portion of the processing resources or the memory capacity, or both, to perform a processing operation at the second vehicle 431-2. In some examples, the request can be from a base station on behalf of the second vehicle 431-2.

The first vehicle 431-1 can further be configured to receive the request from the second vehicle 431-2 to use at least the portion of the processing resources and/or the memory capacity to perform a processing operation at the second vehicle 431-2. In some examples, the request from the second vehicle 431-2 can be associated with the second vehicle 431-2 having insufficient processing capability or memory capacity, or both.

In a number of embodiments, the first vehicle 431-1 can also be configured to perform at least a portion of the processing operation or allow access to the available memory capacity, or both, at the first vehicle 431-1 in response to the request. In some examples, the first vehicle 431-1 can be configured to perform at least the portion of the processing operation and/or allow access to the available memory capacity based at least in part on determining the availability of the processing resources or the memory capacity.

The first vehicle 431-1 can be an automobile, an unmanned aerial vehicle, an aircraft, a train, or a watercraft. In some examples, the second vehicle 431-2 can also be an automobile, an unmanned aerial vehicle, an aircraft, a train, or a watercraft.

In some embodiments, the first vehicle 431-1 can include a first memory resource 401-1 coupled to a first processing resource 408-1. The first processing resource 408-1 can be configured to receive access requests from a second processing resource 408-2. In some examples, the first processing resource 408-1 can allow the second processing resource 408-2 access to the first memory resource 401-1.

The second processing resource 408-2 can be coupled to the second vehicle 431-2. The second processing resource 408-2 can also be coupled to a second memory resource 401-2. Since the first memory resource 401-1 is on a first vehicle 431-1 and the second processing resource 408-2 is on a second vehicle 431-2, the second processing resource 408-2 can wirelessly access the first memory resource 401-1.

In some embodiments, the first vehicle 431-1 can be a master and the second vehicle 431-2 can be a slave. The first vehicle 431-1 can be a master and the second vehicle 431-2 can be a slave because the first vehicle 431-1 can grant the second vehicle 431-2 access to the first memory resource 401-1.

The first vehicle 431-1 can allow the second vehicle 431-2 to perform at least the portion of the processing operation or allow access to the available memory capacity, or both, at the first vehicle 431-1 in response to the second vehicle 431-2 being a trusted vehicle. For example, the first processing resource 408-1 can allow the second processing resource 408-2 access to the first memory resource 401-1 in response to the second processing resource 408-2 being a trusted processing resource. The first processing resource 408-1 of the first vehicle 431-1 can verify the second processing resource 408-2 of the second vehicle 431-2 is a trusted processing resource and/or a trusted vehicle by checking the second processing resource's credentials and/or the second vehicle's 431-2 credentials. The first processing resource 408-1 and/or the first vehicle 431-1 can also verify the second processing resource 408-2 and/or the second vehicle 431-2 is a trusted processing resource and/or a trusted vehicle by checking the address of the second processing resource 408-2 and/or the second vehicle 431-2.

In some examples, the first vehicle 431-1 can allow the second vehicle 431-2 to perform at least the portion of the processing operation or allow access to the available memory capacity, or both at the first vehicle 431-1 in response to the first vehicle 431-1 being idle. For example, the first processing resource 408-1 can allow the second processing resource 408-2 access to the first memory resource 401-1 in response to the first vehicle 431-1 being idle. The first vehicle 431-1 can be idle when the first vehicle 431-1 is turned off and/or in park, for example.

The first vehicle 431-1 can allow the second vehicle 431-2 access to use at least the portion of the processing resources or the memory capacity of the first vehicle 431-1 to perform the processing operation at the second vehicle 431-2 in response to the first vehicle 431-1 determining the availability of the processing resources or the memory capacity, or both, at the first vehicle exceeds a minimum threshold. For example, the first processing resource 408-1 can allow the second processing resource 408-2 access to the first memory resource 401-1 in response to the first memory resource 401-1 having a threshold amount of memory. In some examples, the first processing resource 408-1 can allow access to the second processing resource 408-2 if the first memory resource 401-1 has the amount of memory the second processing resource 408-2 needs. The amount of memory needed by the processing resource 408-2 can be dictated by one or more operations the processing resource 408-2 wants to perform.

The first processing resource 408-1 can allow the second processing resource 408-2 access to the first memory resource 401-1 to perform an operation on data. For example, the first processing resource 408-1 can allow the second processing resource 408-2 access to the first memory resource 401-1 in response to the operation being of a particular importance and/or beneficial to the first vehicle 431-1. For example, the second vehicle 431-2 can be an emergency vehicle (e.g., ambulance, fire truck, and/or police car) making the one or more operations of the second vehicle of higher importance than the first vehicle 431-1. In some examples, the second processing resource 408-1 can access the first memory resource 401-1 in response to the second vehicle 431-2 leading a convoy of vehicles including the first vehicle 431-1. In this example, it is beneficial to the first vehicle 431-1 to share the first memory resource 401-1 with the second vehicle 431-2.

In some embodiments, the first vehicle 431-1 can include a transceiver (e.g., transceiver 120 in FIG. 1). For example, the first processing resource 408-1 can be coupled to the transceiver. The access request can be sent by the second vehicle 431-2 and can be received by the first processing resource 408-1 and/or the first vehicle 431-1 via the transceiver. In some examples, the message allowing the second processing resource 408-2 of the second vehicle 431-2 access to the first memory resource 401-1 can be sent via the transceiver.

The first processing resource 408-1 can determine an amount of memory available on the first memory resource 401-1 in response to receiving an access request from the second processing resource 408-2. The access request can include a threshold amount of memory needed by the second processing resource 408-2. The first processing resource 408-1 can allow the second processing resource 408-2 access in response to the amount of memory available being the threshold amount. In some examples, the threshold amount can be determined by the second processing resource 408-2.

The first vehicle 431-1 can revoke access to perform at least the portion of the processing operation or the memory capacity, or both. For example, the first processing resource 408-1 can revoke access to the first memory resource 401-1. The first processing resource 408-1 and/or the first vehicle 431-1 can revoke access in response to a processing operation being completed by the second processing resource 408-2 and/or the second vehicle 431-2. For example, if the second processing resource 408-2 received access to the first memory resource 401-1 to perform a particular operation, the first processing resource 408-1 can revoke access to the second processing resource 408-2 when the operation is completed.

In some examples, the first processing resource 408-1 can revoke access to the first memory resource 401-1 in response to receiving an access request from a different processing resource and/or a different vehicle. For example, the first processing resource 408-1 and/or the first vehicle 431-1 can revoke access from the second processing resource and/or the second vehicle 431-2 in response to the first vehicle 431-1 needing to perform a processing operation and/or requesting access to its own memory resource (e.g., first memory resource 401-1). The first vehicle 431-1 can request access to the first memory resource 401-1 in response to the first vehicle 431-1 going from “on” to “off”, for example.

The first vehicle 431-1 can request from a third vehicle 431-3 to use at least a portion of the processing resources or the memory capacity of the third vehicle 431-3 to perform a processing operation at the first vehicle 431-1 and/or the second vehicle 431-2. For example, the first processing resource 408-1 can request access to a third memory resource 401-3. In some examples, the first vehicle 431-1 can allow the second vehicle 431-2 to use at least the portion of the processing resources or the memory capacity of the third vehicle 431-3 to perform the processing operation at the second vehicle 431-2. For example, the first processing resource 408-1 can allow the second processing resource 408-2 access to the third memory resource 401-3.

In a number of embodiments, the first processing resource 408-1 of the first vehicle 431-1 can be within a particular distance of the second processing resource 408-2 of the second vehicle 431-2 and the third memory resource 401-3 of the third vehicle 431-3 can be further than the particular distance from the second processing resource 408-2 of the second vehicle 431-2. Even though the third memory resource 401-3 of the third vehicle 431-3 is further than the particular distance, the second processing resource 408-2 of the second vehicle 431-2 can access the third memory resource 401-3 of the third vehicle 431-3 using the first processing resource 408-1 of the first vehicle 431-1.

In some embodiments, the first vehicle 431-1 can allow the second vehicle 431-2 access to the third vehicle 431-3 even though the third vehicle 431-3 declines the second vehicle 431-2 access. For example, the first vehicle 431-1 can be trusted by the third vehicle 431-3 while the second vehicle 431-2 is not. In some examples, the second processing resource 408-2 can access the third memory resource 401-3 via the first processing resource 408-1. The first processing resource 408-1 can request access to the third memory resource 401-3 on behalf of the second processing resource 408-2 and/or the second processing resource 408-2 can borrow and use the credentials of the first processing resource 408-1 to request access to the third memory resource 401-3.

The first vehicle 431-1 can transmit a signal that indicates the availability of processing resources or memory capacity, or both. Transmitting the signal can include broadcasting the signal that indicates the availability to a plurality of vehicles 431-2, . . . , 431-X that includes the second vehicle 431-2. The signal can be transmitted to the second vehicle 431-2 in response to the first vehicle 431-1 receiving the request from the second vehicle 431-2. In some examples, the signal can be transmitted to a base station to forward the signal on to the plurality of vehicles 431-2, . . . , 431-X.

For example, the first processing resource 408-1 can query a number of processing resources 408-2, 408-3, . . . , 408-Z. The first processing resource 408-1 can query the number of processing resources 408-2, 408-3, . . . , 408-Z in response to a portion of memory of the first memory resource 401-1 being available. In some examples, the first processing resource 408-1 can query the number of processing resources 408-2, 408-3, . . . , 408-Z in response to the processing resource 408-2, 408-3, . . . , 408-Z being within a particular proximity to the first memory resource 401-1. The first processing resource 408-1 can offer the number of processing resources 408-2, 408-3, . . . , 408-Z access to the first memory resource 401-1. In some examples, the first processing resource 408-1 can receive a response from one of the number of processing resources 408-2, 408-3, . . . , 408-Z accepting access to the first memory resource.

In some embodiments, the request from the second vehicle 431-2 can be received in response to the broadcast signal. The first processing resource 408-1 can receive a number of responses from a number of the processing resources 408-2, 408-3, . . . , 408-Z accepting access to the first memory resource 401-1. For example, the first processing resource 408-1 can receive a response from a second processing resource 408-2 and a third processing resource 408-3. The first processing resource 408-1 can grant access of the first memory resource 401-1 to the second processing resource 408-2 over the third processing resource 408-3 in response to receiving the response from the second processing resource 408-2 before receiving the response from the third processing resource 408-3.

In some examples, the first processing resource 408-1 can grant access to the first memory resource 401-1 to the second processing resource 408-2 over the third processing resource 408-3 in response to the second processing resource 408-2 needing access to the first memory resource 401-1 for a particular operation. For example, the second processing resource 408-2 receives access to the first memory resource 401-1 in response to an emergency operation. The operation can be getting the second vehicle 431-2 to a hospital, for example.

The first processing resource 408-1 can also grant access of the first memory resource 401-1 to a number of the processing resources 408-2, 408-3, . . . , 408-Z. For example, the first processing resource 408-1 can grant access to the second processing resource 408-2 and the third processing resource 408-3. The first processing resource 408-1 can grant access to the second processing resource 408-2 and the third processing resource 408-3 in response to the first memory resource 401-1 having enough memory available for both the second processing resource 408-2 and the third processing resource 408-3, for example.

The first memory resource 401-1 and the first processing resource 308-1 can be in a first vehicle 431-1 and a number of processing resources 408-2, 408-3 . . . , 408-Z can be in a number of vehicles 431-2, 431-3, . . . , 431-X. For example, a first memory resource 401-1 can be in a first vehicle 431-1 making the first memory resource 401-1 a wireless memory when accessed by the second processing resource 408-2 in a second vehicle 431-2.

The first memory resource 401-1 can be used by an active vehicle. For example, active vehicles can be a number of vehicles 431-2, 431-3, . . . , 431-X that are in use, driving, and/or turned on. The memory resource 401-1 can be from an idle vehicle. For example, the idle vehicle can be a vehicle that is not in use, parked, and/or turned off. The number of active vehicles 431-2, 431-3, . . . , 431-X can use the first memory resource 401-1 of the first vehicle 431-1 that is not in use, for example.

In some embodiments, the number of processing resources 408-2, 408-3, . . . , 408-Z can be within a particular proximity to the idle vehicle 431-1. In some examples, the number of processing resources 408-2, 408-3, . . . , 408-Z can each receive access to the first memory resource 401-1 of the idle vehicle 431-1 in response to the first memory resource 401-1 having enough memory available for the number of processing resources 408-2, 408-3, . . . , 408-Z.

FIG. 5 is a flow chart illustrating an example of a method for wirelessly utilizing resources in accordance with a number of embodiments of the present disclosure.

At block 532, the method 530 may include determining an availability of processing resources or memory capacity, or both, at a first vehicle (e.g., first vehicle 431-1 in FIG. 4) based at least in part on a current operating mode of the first vehicle.

At block 534, the method 530 may further include receiving a request from a second vehicle (e.g., second vehicle 431-2 in FIG. 2) to use at least a portion of the processing resources or the memory capacity to perform a processing operation at the second vehicle, wherein the request from the second vehicle is associated with insufficient processing capability or memory capacity, or both, at the second vehicle. At block 536, the method 530 can further include performing at least a portion of the processing operation or allowing access to the available memory capacity, or both, at the first vehicle (e.g., first vehicle 431-1 in FIG. 4) in response to the request and based at least in part on determining the availability of the processing resources or the memory capacity.

Although specific embodiments have been illustrated and described herein, those of ordinary skill in the art will appreciate that an arrangement calculated to achieve the same results can be substituted for the specific embodiments shown. This disclosure is intended to cover adaptations or variations of one or more embodiments of the present disclosure. It is to be understood that the above description has been made in an illustrative fashion, and not a restrictive one. Combination of the above embodiments, and other embodiments not specifically described herein will be apparent to those of skill in the art upon reviewing the above description. The scope of the one or more embodiments of the present disclosure includes other applications in which the above structures and methods are used. Therefore, the scope of one or more embodiments of the present disclosure should be determined with reference to the appended claims, along with the full range of equivalents to which such claims are entitled.

In the foregoing Detailed Description, some features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the disclosed embodiments of the present disclosure have to use more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separate embodiment. 

What is claimed is:
 1. An apparatus, comprising: a first vehicle configured to: determine an availability of processing resources or memory capacity, or both, at the first vehicle based at least in part on a current operating mode of the first vehicle; receive a request from a second vehicle to use at least a portion of the processing resources or the memory capacity, or both, to perform a processing operation at the second vehicle, wherein the request from the second vehicle is associated with insufficient processing capability or memory capacity, or both, at the second vehicle; and perform at least a portion of the processing operation or allow access to the available memory capacity, or both, at the first vehicle in response to the request and based at least in part on determining the availability of the processing resources or the memory capacity, or both.
 2. The apparatus of claim 1, wherein the first vehicle allows the second vehicle to perform at least the portion of the processing operation or allow access to the available memory capacity, or both, at the first vehicle in response to the second vehicle being a trusted vehicle.
 3. The apparatus of claim 1, wherein the first vehicle is further configured to revoke access to perform at least the portion of the processing operation or access to the available memory capacity, or both.
 4. The apparatus of claim 1, wherein the first vehicle is configured to allow the second vehicle to perform at least the portion of the processing operation or allow access to the available memory capacity, or both, at the first vehicle in response to the first vehicle being idle.
 5. The apparatus of claim 1, wherein the first vehicle is further configured to request from a third vehicle to use at least a portion of the processing resources or the memory capacity of the third vehicle to perform the processing operation at the second vehicle.
 6. The apparatus of claim 5, wherein the first vehicle is further configured to allow the second vehicle to use at least the portion of the processing resources or the memory capacity of the third vehicle to perform the processing operation at the second vehicle.
 7. The apparatus of claim 1, wherein the first vehicle is configured to allow the second vehicle to use at least the portion of the processing resources or the memory capacity of the first vehicle to perform the processing operation at the second vehicle in response to the first vehicle determining the availability of the processing resources or the memory capacity, or both, at the first vehicle exceeds a minimum threshold.
 8. An apparatus, comprising: a first vehicle configured to: determine that a processing capability or a memory capacity, or both, at the first vehicle is insufficient to perform a processing operation at the first vehicle; identify additional processing resources or additional memory capacity, or both, at a second vehicle that is in wireless communication with the first vehicle based at least in part on determining that the processing capability or the memory capacity, or both, at the first vehicle is insufficient; and send a request to the second vehicle to use at least a portion of the processing resources or the memory capacity to perform a processing operation at the first vehicle; and the second vehicle configured to: determine an availability of processing resources or memory capacity, or both, at the second vehicle based at least in part on a current operating mode of the second vehicle; receive the request from the first vehicle; and perform at least a portion of the processing operation or allow access to the available memory capacity, or both, at the first vehicle in response to the request and based at least in part on determining the availability of the processing resources or the memory capacity.
 9. The apparatus of claim 8, wherein the first vehicle includes a first transceiver and the second vehicle includes a second transceiver.
 10. The apparatus of claim 9, wherein the request is sent from the first vehicle via the first transceiver and the request is received by the second vehicle via the second transceiver.
 11. A method, comprising: determining an availability of processing resources or memory capacity, or both, at a first vehicle based at least in part on a current operating mode of the first vehicle; receiving a request from a second vehicle to use at least a portion of the processing resources or the memory capacity to perform a processing operation at a second vehicle, wherein the request from the second vehicle is associated with insufficient processing capability or memory capacity, or both, at the second vehicle; and performing at least a portion of the processing operation or allowing access to the available memory capacity, or both, at the first vehicle in response to the request and based at least in part on determining the availability of the processing resources or the memory capacity.
 12. The method of claim 11, further comprising: receiving the request from a base station.
 13. The method of claim 11, further comprising: transmitting signaling that indicates the availability of processing resources or memory capacity, or both.
 14. The method of claim 13, wherein transmitting the signaling comprises: broadcasting the signaling that indicates the availability to a plurality of vehicles that includes the second vehicle, and wherein the request from the second vehicle is received in response to the broadcast signal.
 15. The method of claim 13, wherein the signaling is transmitted to the second vehicle in response to the request.
 16. The method of claim 13, wherein the signaling is transmitted to a base station.
 17. The method of claim 11, further includes revoking access to use at least the portion of the processing resources or the memory capacity in response to the second vehicle completing the processing operation.
 18. The method of claim 11, further includes revoking access to use at least the portion of the processing resources or the memory capacity in response to the first vehicle having to perform a processing operation.
 19. The method of claim 11, further includes verifying the second vehicle is a trusted vehicle.
 20. The method of claim 11, wherein the first vehicle is an automobile, an unmanned aerial vehicle, an aircraft, a train, or a watercraft and the second vehicle is an unmanned aerial vehicle, an aircraft, a train, or a watercraft. 