Feeds

Boffins create bulk-process on-silicon optics

Managing the on-chip power budget

Business security measures using SSL

A group of researchers from MIT and the University of Boulder at Colorado say they've moved photonics a step closer to integration with both microprocessors and memory.

On-chip photonics offer a number of attractive prospects for chip-makers. Photonic communications generate less heat than electrons moving through copper, and photons following adjacent paths don't generate crosstalk.

Reducing the on-chip heat load is an important objective, because each transistor crammed onto a chip is a heat source. As transistors get smaller, the amount of heat generated in the tiny space of a microprocessor rises, and since you can't (yet) get rid of the transistors, shifting communications to the optical domain leaves a little more elbow room.

However, to make the whole thing affordable on a mass scale, the optics has to be created using the same manufacturing processes as are used to create the silicon components.

That's where the development from the CU / MIT team. Led by CU-Boulder researcher Milos Popovic, the group has created optical modulators that can be manufactured using familiar processes: the silicon-on-insulator CMOS techniques used in some microprocessor fabs, and the bulk CMOS processes used both in microprocessor and memory fabs.

“On top of the energy-efficiency and bandwidth-density advantages of silicon-photonics over electrical wires, photonics integrated into CMOS processes with no process changes provides enormous cost-benefits and advantage over traditional photonic systems,” explained Vladimir Stojanovic of MIT in a statement.

The SIO-CMOS process was able to deliver a modulator that could operate at 5 Gbps (abstract here), with energy consumption of 40 femto-Joules per bit, while the bulk-CMOS process, also running at 5 Gbps, has energy consumption of 160 femto-Joules per bit (abstract here).

The ultimate aim of the DARPA-funded project, also supported by Micron Technology, is to create a complete photonic processor and memory system. ®

New hybrid storage solutions

More from The Register

next story
4K-ing excellent TV is on its way ... in its own sweet time, natch
For decades Hollywood actually binned its 4K files. Doh!
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Apple's big bang: iPhone 6, ANOTHER iPhone 6 Plus and WATCH OUT
Let's >sigh< see what Cupertino has been up to for the past year
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Get your Indian Landfill Android One handsets - they're only SIXTY QUID
Cheap and deafening mobes for the subcontinental masses
Apple's SNEAKY plan: COPY ANDROID. Hello iPhone 6, Watch
Sizes, prices and all – but not for the wrist-o-puter
A SCORCHIO fatboy SSD: Samsung SSD850 PRO 3D V-NAND
4Gb/s speeds on a consumer drive, anyone?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.