In this talk, we presented an emulation framework that eases the modeling, deployment, and large-scale experimentation of fog and 5G testbeds. The framework provides a toolset to (i) model complex fog topologies comprised of heterogeneous resources, network capabilities, and QoS criteria; (ii) abstractions for physical 5G infrastructure concepts such as radio units, edge servers, mobile nodes, user equipment, and node trajectories; (iii) deploy the modeled configuration and services using popular containerised descriptions to a cloud or
local environment; (iv) experiment, measure and evaluate the deployment by injecting faults, adapting the configuration at runtime, real-time updates of the radio network (i.e., signal strength) and respective network QoS to test different “what-if” scenarios that reveal the limitations of service before introduced to the public. The framework has been used for studying the performance of Intelligent transportation services, Industrial IoT micro-service applications, geo-distributed deployments of big data engines, and many more.
The presentation took place at Athens Demokritos Research Center organised by SKEL | The AI Lab
video: https://www.youtube.com/watch?v=z37I1QVFabg
Report
Share
Report
Share
1 of 88
Download to read offline
More Related Content
Similar to An emulation framework for IoT, Fog, and Edge Applications
This document discusses applications of metaheuristics and swarm intelligence in Internet of Things processes. It begins by defining metaheuristics and swarm intelligence. It then discusses how the large amount of data generated by IoTs needs optimization techniques like swarm intelligence. It provides examples of using ant colony optimization for vehicle routing of connected cars, data routing from sensor networks, and data optimization in cloud computing. The document concludes by advocating for using swarm intelligence algorithms to optimize data-intensive IoT processes.
Making Actionable Decisions at the Network's EdgeCognizant
With the vast analytical power unleashed by the Internet of Things (IoT) ecosystem, IT organizations must be able to apply both cloud analytics and edge analytics - cloud for strategic decision-making and edge for more instantaneous response based on local sensors and other technology.
Edge optimized architecture for fabric defect detection in real-timeShuquan Huang
In textile industry, fabric defect relies on human inspection traditionally, which is inaccurate, inconsistent, inefficient and expensive. There were automatic systems developed on the defect detection by identifying the faults in fabric surface using the image and video processing techniques. However, the existing solution has insufficiencies in defect data sharing, backhaul interconnect, maintenance and etc. By evolving to an edge-optimized architecture, we can help textile industry improve fabric quality, reduce operation cost and increase production efficiency. In this session, I’ll share:
What’s edge computing and why it’s important to intelligence manufacturing
What’s the characteristics, strengths and weaknesses of traditional fabric defect detection method
Why textile industry can benefit from edge computing infrastructure
How to design and implement an edge-enabled application for fabric defect detection in real-time
Insights, synergy and future research directions
Edge computing is redefining the cloud computing space. The growing de-emphasis on the cloud’s role in connected environments is expected to lead to smarter and faster autonomous solutions that have the potential to reshape the IoT landscape. Edge computing will transform the IoT landscape into a hyperconnected environment where the restrictions related to latency and computation capacity will be eliminated. Many companies are transforming their business models to attain edge computing capabilities necessary for offering end to end services.
The recent years have witnessed a number of mergers and acquisitions in the edge computing space for IoT services, with the increase in M&A activities representing the industry’s conundrum of cloud, edge, and hybrid architectures, and the race to achieve a considerable market share.
This report includes an analysis of approximately 60 deals, along with a detailed technology overview and the purpose of the acquisitions. The M&A analysis section offers a comprehensive view of the transactions around edge computing, covering different technology aspects including data center, AI, security, software-defined WAN (SD-WAN), analytics, interoperability, multi-access edge computing (MEC), and others.
To purchase the full report, write to us at info@netscribes.com
Overcoming the AIoT Obstacles through Smart Component IntegrationInnodisk Corporation
Enterprises in every industry are gearing up for AI’s integration with IoT at the edge. Analytics and cloud-based applications are crucial foundations for the AIoT infrastructure. But even more importantly, AIoT requires complete, real-time access to the data in fulfill the needs of highly responsive edge computing applications.
In our experience, many customers are facing the same difficulties with regards to cyber level and physical level device integration in the new AI era. As the world's leading industrial storage and memory provider, Innodisk has a solid track record with more than 2000 customers, and expertise built on more than a decade of integration of hardware, firmware and software solutions.
Attend this webinar to learn about:
- Preparing your business for the new Internet of Things (IoT) an AI era
- How do we Overcome the Current Architectural Issues?
- Increasing process efficiency and delivering a better customer experience
- Facilitating new platforms that enable rapid development of next generation intelligent IoT systems
- Trends and technology in AIoT intelligent storage/ data optimization
Operational systems manage our finances, shopping, devices and much more. Adding real-time analytics to these systems enables them to instantly respond to changing conditions and provide immediate, targeted feedback. This use of analytics is called "operational intelligence," and the need for it is widespread.
This talk will explain how in-memory computing techniques can be used to implement operational intelligence. It will show how an in-memory data grid integrated with a data-parallel compute engine can track events generated by a live system, analyze them in real time, and create alerts that help steer the system’s behavior. Code samples will demonstrate how an in-memory data grid employs object-oriented techniques to simplify the correlation and analysis of incoming events by maintaining an in-memory model of a live system.
The talk also will examine simplifications offered by this approach over directly analyzing incoming event streams from a live system using complex event processing or Storm. Lastly, it will explain key requirements of the in-memory computing platform for operational intelligence, in particular real-time updating of individual objects and high availability using data replication, and contrast these requirements to the design goals for stream processing in Spark.
Network Automation in Support of Cyber DefenseKen Flott
Cyber Defense Challenges
-Real-time network visibility
-Limited network automation
-Making sense of the data
Adaptive Network Automation Applied to Cyber Defense
-Visualize
-Automate
-Integrate
The Internet of Things
Definition1
The Internet of Things refers to the use of sensors,
actuators, and data communications technology
built into physical objects - from roadways to
pacemakers - that enable those objects to be
tracked, coordinated, or controlled across a data
network or the Internet
There are three steps in Internet of Things
applications:
Capturing data from the object (for example,
simple location data or more complex
information),
Aggregating that information across a data
network, and
Acting on that information - taking immediate
action or collecting data over time to design
process improvements.
Rohit Vijay Bapat's resume summarizes his education and professional experience in software development. He has a MS in Mechanical Engineering from Missouri University of Science and Technology and a BE in Mechanical Engineering from University of Pune. His experience includes roles at Tata Consultancy Services, Mindware Engineering, SigmaTEK Systems, and Vaal Triangle developing CAD/CAM and shopfloor software. He has strong skills in C++, C#, Delphi, and CAD tools like AutoCAD, ProE, and NX.
Building a reliable and scalable IoT platform with MongoDB and HiveMQDominik Obermaier
Today’s Internet of Things (IoT) is enabling companies to blend together the physical and digital worlds, creating new business models and generating insights that increase productivity at once unimaginable levels. However, managing the ever growing volume of heterogeneous IoT data from disparate devices, systems and applications both on premise and in the cloud can be a challenging endeavour without a scalable and reliable IoT platform.
In this webinar, we will explore why and how companies are leveraging HiveMQ and MongoDB to build exactly that: a scalable and reliable IoT platform. Based upon a sample fleet management scenario, we will explain how telematics data can be routed via MQTT and efficiently stored to provide analytics and insights into the data.
Key Learnings
- Common challenges and pitfalls of IoT projects
- Required components for effectively handling data with an IoT platform
- HiveMQ for MQTT to enable bi-directional device communication over unstable networks
- MongoDB as the flexible and scalable modern data platform combining data from different sources and powering your applications
- Why MongoDB and HiveMQ is such a great combination
What Is Edge Computing? Everything You Need to KnowDigital Carbon
Edge computing is transforming the way we process and utilize data in the era of 5G. This groundbreaking technology is redefining the rules for businesses by bringing computing resources closer to the data source, reducing latency, and enabling real-time decision-making.
- The document discusses IBM Z and the digital enterprise, focusing on how mainframes can support digital transformation.
- It outlines how in-place modernization of mainframe assets makes sense for enterprises, and how mainframes can support business transformation, application modernization and optimization, agility, and cloud services.
- The agenda covers topics like the role of mainframes in digital transformation, application modernization techniques, infrastructure services like IBM Cloud Private, and mainframe modernization examples from IBM clients.
Iot 1906 - approaches for building applications with the IBM IoT cloudPeterNiblett
The IBM Internet of Things cloud allows customers to quickly register, connect, and send data from devices. This sensor data is collected and stored in a data historian and also made available as a real-time event stream. This session discusses how to build applications that consume and exploit this data to show business insight and value. This session covers how to access and use the streaming application programming interfaces to build new applications and/or connect to existing systems and applications. It includes integration with IBM BlueMix and NodeRed.
Are you ready to be edgy? Bringing applications to the edge of the networkMegan O'Keefe
This document discusses edge computing and provides an overview of key concepts:
1. Edge computing extends cloud computing to the edge of networks to address bandwidth and latency issues and enable real-time applications like VR/AR, machine learning, and IoT.
2. Edge computing deployments are shaped differently than cloud but still leverage containers and orchestration tools like Kubernetes.
3. The document demonstrates an edge application management platform called Optikon that uses Kubernetes to deploy and manage applications across edge clusters.
Oracle Open World 2018 - Cloud Lift Accelerator SuiteIke Aniagoh
Organizations are increasingly leveraging infrastructure as a service (IaaS) and platform as a service (PaaS) as part of their cloud journey. To help accelerate the cloud migration, Cognizant created a Cloud Lift Accelerator Suite comprised of CloudFit assessment, OneClickInfra, OneClickSOA, OneClickDB, and CloudLift ACE tools. The Cloud Lift Accelerator Suite is a Perl, Linux shell scripts, and Python–based toolset powered with Terraform and Oracle migration utilities. The toolset is configured to transform an output of CloudFit Assessment into Terraform and CLI programs and builds the code foundation to manage infrastructure as code. This session provides an overview of Cloud Lift Accelerator Suite, its benefits, and a demo of how the toolsets work and help accelerate cloud migration.
The document discusses IoT, edge computing, and machine learning. It provides an overview of edge computing and how it differs from cloud computing by processing data near its source to improve response times. It also discusses edge intelligence, which combines AI and edge computing by enabling machine learning algorithms to run on edge devices. The document outlines some challenges in edge computing like real-time scheduling on reconfigurable platforms. It summarizes some of the speaker's research on techniques like voltage scaling partitions to enable low-power edge inference on FPGAs.
Similar to An emulation framework for IoT, Fog, and Edge Applications (20)
Towards Wearable Continuous Point-of-Care Monitoring for Deep Vein Thrombosis...ThrombUS+ Project
Kaldoudi E, Marozas M, Jurkonis R, Pousset N, Legros M, Kircher M, Novikov D, Sakalauskas A, Moustakidis P, Ayinde B, Moltani LA, Balling S, Vehkaoja A, Oksala N, Macas A, Balciuniene N, Bigaki M, Potoupnis M, Papadopoulou S-L, Grandone E, Gautier M, Bouda S, Schloetelburg C, Prinz T, Dionisio P, Anagnostopoulos S, Drougka I, Folkvord F, Drosatos G, Didaskalou S and the ThrombUS+ Consortium, Towards Wearable Continuous Point-of-Care Monitoring for Deep Vein Thrombosis of the Lower Limb. In: Jarm, T., Šmerc, R., Mahnič-Kalamiza, S. (eds) 9th European Medical and Biological Engineering Conference. EMBEC 2024. IFMBE Proceedings, vol 113. Springer, Cham. https://doi.org/10.1007/978-3-031-61628-0_36
Presented by Dr. Stelios Didaskalou, ThrombUS+ Project Manager
Cause and solution of Water hyacinth (Terror of Bengal)saloniswain225
Water hyacinth is a buoyant plant that has a clump of leaves with squishy stalks arising from the lower feathery roots and it is an invasive species came from South America
Detecting and translating language ambiguity with multilingual LLMsBehrang Mehrparvar
Language is one of the most important landmarks in humans in history. However, most languages could be ambiguous, which means the same conveyed text or speech, results in different actions by different readers or listeners. In this project we propose a method to detect the ambiguity of a sentence using translation by multilingual LLMs. In this context, we hypothesize that a good machine translator should preserve the ambiguity of sentences in all target languages. Therefore, we investigate whether ambiguity is encoded in the hidden representation of a translation model or, instead, if only a single meaning is encoded. The potential applications of the proposed approach span i) detecting ambiguous sentences, ii) fine-tuning existing multilingual LLMs to preserve ambiguous information, and iii) developing AI systems that can generate ambiguity-free languages when needed.
Prototype Implementation of Non-Volatile Memory Support for RISC-V Keystone E...LenaYu2
Handling confidential information has become an increasingly important concern among many areas of society. However, current computing environments have been still vulnerable to various threats, and we should think they are untrusted.
Trusted Execution Environments (TEEs) have attracted attention because they can execute a program in a trusted environment constructed on an untrusted platform.
Particularly, the RISC-V Keystone is one of the interesting TEEs since it is a flexibly customizable and fully open-source platform. On the other hand, as same as other TEEs, it must also delegate I/O processing, such as file accesses, to a host OS, resulting in the expensive overhead. For this problem, we thought utilizing byte-addressable non-volatile memory (NVM) modules is a useful solution to handle persistent data objects for TEEs.
In this paper, we introduce a prototype implementation of NVM support for the Keystone. Additionally, we evaluate it on the Freedom U500 built on a VC707 FPGA dev kit.
https://ken.ieice.org/ken/paper/20210720TC4K/
PART 1 The New Natural Principles of Electromagnetism and Electromagnetic Fie...Thane Heins
Document Summary and the History of Perpetual Motion
Every single Faraday Generator coil since 1834 has been and is currently performing Negative Work at infinite efficiency with created Electromagnetic Field Energy during electricity generation and its physical Kinetic Energy reduction or Electromagnetic Resistance of the changing magnetic field which is initially inducing Electric Current in the generator coil according to Faraday's Law of Induction.
The Work-Energy Principle confirms mathematically that the magnitude of the changing magnetic field's Kinetic Energy reduction is equal to the magnitude of Negative Work performed at infinite efficiency, which is equal to the magnitude of Energy (Electromagnetic Field Energy which is created according to Oersted's Law of Creation of Energy of 1820). Created Electromagnetic Field Energy is required in order to perform the Negative Work – because Work cannot be performed in the absence of Energy.
In 2007 Thane Heins of Almonte Ontario, Canada discovered that unlimited amounts of Positive Electromechanical Work could be performed at infinite efficiency with created and TIME DELAYED Electromagnetic Field Energy.
Every single ReGenX Generator coil since 2007 has been and is currently performing Positive Work at infinite efficiency with created Electromagnetic Field Energy during electricity generation and during its physical Kinetic Energy increase or Electromagnetic Assistance of the changing magnetic field which is initially inducing Electric Current in the generator coil according to Heins' Law of Induction.
Faraday Electric Generators all harness internally Created Electromagnetic Field Energy in order to perform Negative Work (system Kinetic Energy reduction) at infinite efficiency and ReGenX Electric Generators harness internally created and Time Delayed Electromagnetic Field Energy in order to perform Positive Work (system Kinetic Energy increase) at infinite efficiency.
Both Faraday Generators and ReGenX Generators operate as Perpetual Motion Machines of the First Kind because they both have the ability to perform both Negative or Positive Work indefinitely and at infinite efficiency without requiring any External Energy input. The unlimited Energy required to perform either the Negative or Positive Work is created at the Sub-Atomic Quantum Electron level inside the generators' Current Bearing Wires according to the Law of Creation of Energy.
Hans Christian Oersted discovered the Law of Creation of Energy in 1820 when he demonstrated the world's first Perpetual Motion Machine of the First Kind at the University of Copenhagen when he also simultaneously violated Newton's 1st, 2nd and 3rd Laws of Motion.
Michael Faraday built and demonstrated the world's second Perpetual Motion Machine of the First Kind in 1822 when he demonstrated his Electric Motor invention which harnessed created Electromagnetic Field Energy in order to perform Positive Electromechanical Work at infinite efficienc
Keys of Identification for Indian Wood: A Seminar ReportGurjant Singh
Identifying Indian wood involves recognizing key characteristics such as grain patterns, color, texture, hardness, and specific anatomical features. These identification keys include observing the wood's pores, growth rings, and resin canals, as well as its scent and weight. Understanding these features is essential for accurate wood identification, which is crucial for various applications in carpentry, furniture making, and conservation.
Additionally, the application of Convolutional Neural Networks (CNN) in wood identification has revolutionized this field. CNNs can analyze images of wood samples to identify species with high accuracy by learning and recognizing intricate patterns and features. This technological advancement not only enhances the precision of wood identification but also accelerates the process, making it more efficient for industry professionals and researchers alike.
Dalghren, Thorne and Stebbins System of Classification of AngiospermsGurjant Singh
The Dahlgren, Thorne, and Stebbins system of classification is a modern method for categorizing angiosperms (flowering plants) based on phylogenetic relationships. Developed by botanists Rolf Dahlgren, Robert Thorne, and G. Ledyard Stebbins, this system emphasizes evolutionary relationships and incorporates extensive morphological and molecular data. It aims to provide a more accurate reflection of the genetic and evolutionary connections among angiosperm families and orders, facilitating a better understanding of plant diversity and evolution. This classification system is a valuable tool for botanists, researchers, and horticulturists in studying and organizing the vast diversity of flowering plants.
This an presentation about electrostatic force. This topic is from class 8 Force and Pressure lesson from ncert . I think this might be helpful for you. In this presentation there are 4 content they are Introduction, types, examples and demonstration. The demonstration should be done by yourself
2. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
The Internet of Things
2
● Transforming the physical world into an information system.
● IDC predicts that by 2025 there will be 41.8B connected IoT
devices and data generated from them to be 73.1 ZB by 2025.
Analytic Insights
Computing
Platform
● It only seems “natural” that IoT services offload analytic jobs to the compute resources for
processing. https://www.idc.com/getdoc.jsp?containerId=prAP46737220, 2020
3. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
The Internet of Things
3
● Transforming the physical world into an information system.
● IDC predicts that by 2025 there will be 41.8B connected IoT
devices and data generated from them to be 73.1 ZB by 2025.
Analytic Insights
Computing
Platform
● It only seems “natural” that IoT services offload analytic jobs to the compute resources for
processing. https://www.idc.com/getdoc.jsp?containerId=prAP46737220, 2020
4. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Application Use-case
4
A microservice-based application is created, which computes
statistics from user (e.g., the average vehicle delay per city segment)
Use-case: A taxi company wants to analyse region-based data from its fleet.
5. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Partial
Aggregator
Application Use-case
5
A microservice-based application is created, which computes
statistics from user (e.g., the average vehicle delay per city segment)
Application Services:
● Partial Aggregator exposes an API on which the IoT devices
send their data, performs region-based aggregations, and
stores the results in an in-memory buffer
Partial
Aggregator
Partial
Aggregator
Use-case: A taxi company wants to analyse region-based data from its fleet.
6. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Partial
Aggregator
Application Use-case
6
A microservice-based application is created, which computes
statistics from user (e.g., the average vehicle delay per city segment)
Application Services:
● Partial Aggregator exposes an API on which the IoT devices
send their data, performs region-based aggregations, and
stores the results in an in-memory buffer
● Back-end Server requests periodically the data from the partial
aggregators, performs the final processing and stores the final
results in a Database
Back-end
Server Overall
Aggregations
Partial
Aggregator
Partial
Aggregator
Use-case: A taxi company wants to analyse region-based data from its fleet.
7. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Partial
Aggregator
Application Use-case
7
A microservice-based application is created, which computes
statistics from user (e.g., the average vehicle delay per city segment)
Application Services:
● Partial Aggregator exposes an API on which the IoT devices
send their data, performs region-based aggregations, and
stores the results in an in-memory buffer
● Back-end Server requests periodically the data from the partial
aggregators, performs the final processing and stores the final
results in a Database
Back-end
Server Overall
Aggregations
Partial
Aggregator
Partial
Aggregator
Use-case: A taxi company wants to analyse region-based data from its fleet.
Users can evaluate the data via a Dashboard and they can submit different queries.
9. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Deployment
9
The company will purchase MECs and will place them in different regions inside a city.
Application Deployment:
Partial Aggregator Services
are deployed on MECs and
the Back-end server on cloud.
Back-end
Server
Partial Aggr
Partial Aggr
Partial Aggr
10. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Deployment
10
The company will purchase MECs and will place them in different regions inside a city.
Application Deployment:
Partial Aggregator Services
are deployed on MECs and
the Back-end server on cloud.
Back-end
Server
Partial Aggr
Partial Aggr
Partial Aggr
Taxis send their data to nearby MEC (aka Partial Aggregator Service) and If there is no
reachable MEC (suburbs), the data are forwarded to Cloud via mobile internet.
11. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Deployment
11
The company will purchase MECs and will place them in different regions inside a city.
Application Deployment:
Partial Aggregator Services
are deployed on MECs and
the final Back-end server on
cloud.
Back-end
Server
Partial Aggr
Partial Aggr
Partial Aggr
Taxis send their data to nearby MEC (aka Partial Aggregator Service) and If there is no
reachable MEC (suburbs), the data are forwarded to Cloud via mobile internet.
The involving actors in this scenario like Operators, IoT Developers, Performance
Evaluators, face numerous challenges in deployment realization…
12. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Plethora of Devices
12
Wide range of devices comes in different shapes,
capabilities, sizes and prices. But, not all meet the desired
QoS…
And if we are wrong… we need more time, resources,
money, etc…
Raspberry Pi 4 Nvidia Jetson Nano Nvidia AGX Xavier
ARM 4 cores @1.5GHz
4GB RAM
$54
ARM 4 cores @1.4GHz
4GB RAM + GPU No wifi
$69
HiKey 970
ARM 8 cores @2.3GHz
6GB RAM Mali-G72 GPU
$299
ARM 8 cores @2.2GHz
32GB RAM 512-core GPU
$695
Back-end
Server
Partial Aggr
Partial Aggr
Partial Aggr
13. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Scalable Geo-Distributed Deployments
13
Even if the proper devices are selected… We need
to install them in their physical locations…
Back-end
Server
Partial Aggr
Partial Aggr
Partial Aggr
90ms
10-18ms
2ms
● Installation Efforts
● Manual Configurations
● Time-consuming Deployment
● Network Connectivity evaluation…
14. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Scalable Geo-Distributed Deployments
14
90ms
10-18ms
2ms
Partial Aggr
Partial Aggr
Partial Aggr
Back-end
Server
Even if the proper devices are selected… We need
to install them in their physical locations…
In a Geo-distributed environment, scalability
increases exponentially the difficulties…
● Installation Efforts
● Manual Configurations
● Time-consuming Deployment
● Network Connectivity evaluation…
15. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Positioning and Mobility
15
Different distances and Antenna configurations offer different network QoS.
To reproduce similar situations, developers should perform in-place experiments with physical
devices which is extremely time-consuming during the development period.
Partial Aggr
Partial Aggr
Partial Aggr
Back-end
Server
16. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Random Generated Reliability Problems
16
The ad-hoc changes on Edge environments and
wireless networks are common, so developers need
to investigate errors regarding:
● Node disconnections
● Failstops
● Link drops
● Network QoS fluctuations
● Packet drops
● Load fluctuations
● …
How do these errors affect the quality of service, running cost, decision-making,
overall reliability, etc., of their applications?
Partial Aggr
Partial Aggr
Partial Aggr
Back-end
Server
17. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Monitoring
17
Actors need to generate useful metrics and insights about their deployments in order to
make the right decisions maximizing the performance and minimizing the running cost.
● Device & System (e.g., cpu, memory, disk
i/o, network i/o, energy consumption, etc.)
● OS & Virtualization Stack (per service)
● Application Metrics
● Network-wise statistics
● …
Partial Aggr
Partial Aggr
Partial Aggr
Back-end
Server
18. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
To this end, the users seek solutions to model and analyze the
behavior of Infrastructure and IoT services…
Fog Design and Deployment Challenges
18
● Plethora of Devices
● Scalable Geo-Distributed Deployments
● Positioning and Mobility
● Random Generated Reliability Problems
● Monitoring
19. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Simulators & Emulators
19
● Simulators must have models for every piece of infrastructure, application
behavior and their interactions… application does not actually run…
● Emulators mimic production-end environment and application is
executed in real-time with relatively low cost.
● Fog Emulators provide resource and network heterogeneity but… what
about ad-hoc topology alterations, mobility, 5G concepts, scalability,
etc…
20. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Fog Emulators
20
Resource
Heterogeneity
Network
Heterogeneity
Ad-hoc
Changes Mobility 5G-concepts
Multi-host
scalability
MeDICINE
MockFog
Marvis
FogBed
Fogify
MeDICINE: Rapid prototyping of production-ready network services in multi-PoP environments, M. Peuster et al., IEEE NFV-SDN, 2016
MockFog 2.0: Automated Execution of Fog Application Experiments in the Cloud, J. Hasenburg et al., IEEE Transactions on Cloud Computing, 2021
Towards a Staging Environment for the Internet of Things, J. Beilharz, ΙΕΕΕ PerCom Workshops, 2021
Scalable Fogbed for Fog Computing Emulation, A. Coutinho et al., IEEE Symposium on Computers and Communications (ISCC) 2018
22. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
22
Outline
● Features
● Key Design Points
● System Overview
● Modeling Abstractions
○ Fog Modeling Abstractions
○ Runtime Evaluation Model
● Implementation Details
● Evaluation
○ Accuracy Evaluation
○ Usability Evaluation
● Conclusion
23. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Fogify Emulation Framework
23
● Fog & 5G Modeling Abstractions
● Resource & Network Link
Heterogeneity
● Controllable Faults & Alterations
● Geo-positioning and Mobility
● Any-scale Experimentation
● Monitoring Capabilities
Fogify: A Fog Computing Emulation Framework, M. Symeonides et al, ACM/IEEE Symposium on Edge Computing (SEC), 2020
24. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Key Design Points
24
● Applications adopt multi-service design (microservices, big-data engines, etc.)
● Application services are containerized adopting Docker containers
● IoT data generators are also virtualized and containerized processes that only
generate and transmit simple data points to other services
● The application runs in real-time through the emulation Environment, and
● The emulator takes care of shaping the static and dynamic performance traits of:
○ Compute Resources (physical or virtual) like CPU, RAM, disk, etc.
○ Networks and their Quality of Service like network latency, data rate, error rate, etc.
35. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Fog Templates
35
The initial Fog Templates of Emulator consist of:
● a set of Services,
● a set of Nodes,
● a set of Networks
Partial Aggr
Partial Aggr
Partial Aggr
Back-end
Server
36. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Fog Templates
36
Partial Aggr
Partial Aggr
Partial Aggr
The initial Fog Templates of Emulator consist of:
● a set of Services,
● a set of Nodes,
● a set of Networks
Services are containerized
micro-programs and are
inherited from specification
of docker-compose file.
Back-end
Server
37. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Fog Templates
37
The initial Fog Templates of Emulator consist of:
● a set of Services,
● a set of Nodes,
● a set of Networks
Partial Aggr
Partial Aggr
Partial Aggr
Nodes describe the compute
resources of the infrastructure
and include parameters such as
CPU, Memory, and Disk
Back-end
Server
38. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Fog Templates
38
The initial Fog Templates of Emulator consist of:
● a set of Services,
● a set of Nodes,
● a set of Networks
Partial Aggr
Partial Aggr
Partial Aggr
Networks are interconnected
mesh networks that will connect
the emulated nodes.
Each network includes a set of
QoS, like network latency, data
rate, etc., along with VNFs.
Back-end
Server
39. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Fog Templates
39
The initial Fog Templates of Emulator consist of:
● a set of Services,
● a set of Nodes,
● a set of Networks
Partial Aggr
Partial Aggr
Partial Aggr
But networks may have
more complex structure and
QoS like 5G-Networks…
Back-end
Server
44. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
44
A 5G Network includes:
● Midhaul Connectivity Characteristics
● Backhaul Connectivity Characteristics
● Wireless Connections
● Virtual Network Functions
● Radio Units (Basestations) locations
5G Networks Template
45. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Fog Topology
45
Partial Aggr
Partial Aggr
Partial Aggr
A Fog Topology consists of Blueprints.
● A Blueprint is a combination of a Node,
Service, a set of Networks, a location, a
replication factor, and a label
Back-end
Server
46. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Fog Topology
46
Partial Aggr
Partial Aggr
Partial Aggr
A Fog Topology consists of Blueprints.
● A Blueprint is a combination of a Node,
Service, a set of Networks, a location, a
replication factor, and a label
Back-end
Server
10 blueprints exist
in this topology
47. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Fog Topology
47
Partial Aggr
Partial Aggr
Partial Aggr
A Fog Topology consists of Blueprints.
● A Blueprint is a combination of a Node,
Service, a set of Networks, a location, a
replication factor, and a label
Back-end
Server
51. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
51
Actions change properties of a running
Fog Topology.
Actions can be:
○ Failure Actions
○ Scaling Actions (horizontal or vertical)
Runtime Evaluation Model
52. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
52
Actions change properties of a running
Fog Topology.
Actions can be:
○ Failure Actions
○ Scaling Actions (horizontal or vertical)
○ Network Actions
Runtime Evaluation Model
53. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
53
Actions change properties of a running
Fog Topology.
Actions can be:
○ Failure Actions
○ Scaling Actions (horizontal or vertical)
○ Network Actions
○ Stress Actions
Runtime Evaluation Model
54. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
54
Actions change properties of a running
Fog Topology.
Actions can be:
○ Failure Actions
○ Scaling Actions (horizontal or vertical)
○ Network Actions
○ Stress Actions
○ Positioning Updates
Runtime Evaluation Model
55. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
55
A Scenario or Trajectory is a sequence of time
scheduled actions that are used to emulate
more complex user-driven experiments (e.g.,
multiple errors or moving actions).
Runtime Evaluation Model
56. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
56
A Scenario or Trajectory is a sequence of time
scheduled actions that are used to emulate
more complex user-driven experiments (e.g.,
multiple errors or moving actions).
Runtime Evaluation Model
57. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
57
A Scenario or Trajectory is a sequence of time
scheduled actions that are used to emulate
more complex user-driven experiments (e.g.,
multiple errors or moving actions).
Runtime Evaluation Model
59. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
FogifySDK
59
Fogify SDK realized as python library and provides:
● Deployment of Topologies, Actions & Scenarios
● Retrieval of the Monitoring data
● Out-of-the-box exploratory analysis
● Functions for building programmably the Fogify’s model
Jupyter Integration
A Monitoring Agent retrieves:
● Basic Metrics (CPU, RAM, network, disk)
● Application's metrics
Monitoring System
Monitoring System
60. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Computational Resources Translation
60
Fogify utilizes the containers as execution platform while they achieve isolation, through
linux namespaces, and resource constraining by using Linux Control Groups (cgroups). Fogify
maps the high-level device’s template to the host’s capabilities.
For some resources, like memory, the mapping is straightforward but… for CPU,
cgroups give us only the ability to set a portion of host CPU. For that:
● Fogify computes the cumulative clock rate (CCR) for both host and model as:
● Then, it specifies the rate of the processing power that the emulated device will occupy from host:
61. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Enforcement of the Network QoS & VNFs
61
● The system realizes a virtual overlay mesh network (Virtual Extensible Lan (VXLAN))
per network description
● Then, emulation agents apply the network functions, so for each emulated Node:
○ Apply firewall rules via iptables tool
○ Inspect the packets and exports statistics
○ Build a tree-base structure by utilizing Classful
Queuing Disciplines (qdisc) and apply QoS Rules
by utilizing the linux tc-tool
62. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
5G Network Plug-in
62
5G-Slicer: An emulator for mobile IoT applications deployed over 5G network slices, M. Symeonides et al, ACM/IEEE IoTDI 2022
5G-Slice Model
FogifySDK
Network
Conceptual
Graph
● Creates the Network Conceptual Graph that is an in-memory structure
● 5G-Slicer takes as input 5G-slice models and creates an
emulated execution environment via Fogify
● Transforms the RU-to-UE distance to respective QoS
● Translates Network Conceptual Graph to Emulated Execution
Environment via FogifySDK.
63. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
5G Network Plug-in
63
5G-Slicer: An emulator for mobile IoT applications deployed over 5G network slices, M. Symeonides et al, ACM/IEEE IoTDI 2022
5G-Slice Model
FogifySDK
Network
Conceptual
Graph
● Creates the Network Conceptual Graph that is an in-memory structure
● Transforms the RU-to-UE distance to respective QoS
● Translates Network Conceptual Graph to Emulated Execution
Environment via FogifySDK.
● 5G-Slicer takes as input 5G-slice models and creates an
emulated execution environment via Fogify
64. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
5G Network Plug-in
64
5G-Slicer: An emulator for mobile IoT applications deployed over 5G network slices, M. Symeonides et al, ACM/IEEE IoTDI 2022
5G-Slice Model
FogifySDK
Network
Conceptual
Graph
● Creates the Network Conceptual Graph that is an in-memory structure
● Transforms the RU-to-UE distance to respective QoS
● Translates Network Conceptual Graph to Emulated Execution
Environment via FogifySDK.
● 5G-Slicer takes as input 5G-slice models and creates an
emulated execution environment via Fogify
65. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
5G Network Plug-in
65
5G-Slicer: An emulator for mobile IoT applications deployed over 5G network slices, M. Symeonides et al, ACM/IEEE IoTDI 2022
5G-Slice Model
FogifySDK
Network
Conceptual
Graph
● Creates the Network Conceptual Graph that is an in-memory structure
● Nodes are RUs, UEs, Fog devices, and
● Transforms the RU-to-UE distance to respective QoS
● Translates Network Conceptual Graph to Emulated Execution
Environment via FogifySDK.
● 5G-Slicer takes as input 5G-slice models and creates an
emulated execution environment via Fogify
66. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
5G Network Plug-in
66
5G-Slicer: An emulator for mobile IoT applications deployed over 5G network slices, M. Symeonides et al, ACM/IEEE IoTDI 2022
5G-Slice Model
FogifySDK
Network
Conceptual
Graph
● Creates the Network Conceptual Graph that is an in-memory structure
● Nodes are RUs, UEs, Fog devices, and
● Links denote their connectivity with network QoS
● Transforms the RU-to-UE distance to respective QoS
● Translates Network Conceptual Graph to Emulated Execution
Environment via FogifySDK.
● 5G-Slicer takes as input 5G-slice models and creates an
emulated execution environment via Fogify
67. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
5G Network Plug-in
67
5G-Slicer: An emulator for mobile IoT applications deployed over 5G network slices, M. Symeonides et al, ACM/IEEE IoTDI 2022
5G-Slice Model
FogifySDK
Network
Conceptual
Graph
● Creates the Network Conceptual Graph that is an in-memory structure
● Nodes are RUs, UEs, Fog devices, and
● Links denote their connectivity with network QoS
● Transforms the RU-to-UE distance to respective QoS
● Translates Network Conceptual Graph to Emulated Execution
Environment via FogifySDK.
, where
Shannon’s Formula for wireless MIMO channels
Signal-to-noise ratio computation
● 5G-Slicer takes as input 5G-slice models and creates an
emulated execution environment via Fogify
68. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
5G Network Plug-in
68
5G-Slicer: An emulator for mobile IoT applications deployed over 5G network slices, M. Symeonides et al, ACM/IEEE IoTDI 2022
5G-Slice Model
FogifySDK
Network
Conceptual
Graph
● Creates the Network Conceptual Graph that is an in-memory structure
● Nodes are RUs, UEs, Fog devices, and
● Links denote their connectivity with network QoS
● Transforms the RU-to-UE distance to respective QoS
● Translates Network Conceptual Graph to Emulated Execution
Environment via FogifySDK.
, where
Shannon’s Formula for wireless MIMO channels
Signal-to-noise ratio computation
● 5G-Slicer takes as input 5G-slice models and creates an
emulated execution environment via Fogify
70. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
70
Network Accuracy
70
VM
Paris
VM
London
wifi
i
n
t
e
r
n
e
t
internet
Ethernet
We measured the latency and data rate among the devices with
ping tool and perf, respectively.
Then, we emulated the same infrastructure and captured the
same measurements.
Emulator achieves near to real-world network link capabilities,
only with outliers that are not captured and a slight overhead in
low-latency connections
71. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
71
Application Accuracy
71
wifi
internet
Ethernet
On the same infrastructure, we deployed a small microservice ML inference application
● Image inference on Paris VM
● Preprocessing service on Edge Server (reduces the image size)
● Laptop (workload generator) sends an image either to Cloud or to Edge preprocessor
Preprocessing
Workload Gen
The emulation results closely follow the real measurements
with a 5%-8% deviation of the overall experiment time.
VM
Paris
Cloud Server
72. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
72
Emulation Scalability & 5G Accuracy
Emulation Scalability: Emulator is only bounded by the
underlying resources. When the resource pool expands, the
emulation capabilities proportionally increase with a
comparable raising of the bootstrapping time.
Real vs Emulated MIMO connectivity: The emulation results
follow the distribution of the real testbed with the mean
absolute percentage error being 11.7% for 23dBm and 5.3%
for the 33dBm configuration.
“Patras 5g: An open source based end-to-end facility for 5g trials” C. Tranoris and S. G. Denazis, ERCIM News, 2019
“A holistic approach for 5g network slice monitoring” D. Giannopoulos, P. Papaioannou, L. Ntzogani, C. Tranoris, and S. Denazis, MeditCom2021
75. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Scenario - Network Uncertainties
We can observe the minimum execution
utilization of all services and Fog nodes.
Common execution of
the infrastructure.
75
76. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Scenario - Network Uncertainties
2s network delay at MEC
region-1 for 3 minutes
76
We identify a throughput degradation
Network traffic increases to the previous
level, since the latency does not exceed
the pre-defined 10s disconnect limit
77. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Scenario - Network Uncertainties
A data transfer spike is appeared for the MEC and
Car nodes due to queued requests.
Common execution for 3
minutes
77
78. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Scenario - Network Uncertainties
20s network delay at MEC
region-1 for 3 minutes
78
When the network latency is
boosted to 20s, every Car node
request to the MEC fails
The CPU and network effects of directly receiving
requests from the taxis operating in region-1
80. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Scenario - Network Uncertainties
Disconnection of the MEC in region-1
80
We observe a similar increase in the cloud
CPU load and network traffic as in the
previous period (75-110th interval)
81. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Scenario - Network Uncertainties
In conclusion, with network alterations and fault injections, users:
● evaluate the execution of their services under extreme conditions
● identify unpredictable outcomes of imposed uncertainties to the
service behavior
81
82. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Other Insights
82
Node profiling: insights are highly beneficial to
engineers for capacity planning, optimizing service
and resource placement.
Mobility Patterns, Scaling Actions &
Workload Changes: released insights about
service performance and resources utilization.
Application-level metrics: Operators can employ
Fogify to produce and evaluate analytic insights,
implementing adequate app-level metrics.
83. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Other Applications
83
Applications
A Novel Middleware for Efficiently Implementing Complex Cloud-Native SLOs, T. Pusztai et al., CLOUD2021
EQUALITY: Quality-aware intensive analytics on the edge, A. Michailidou et al., Information Systems 2021
A study on speculative task scheduling for apache spark in fog computing realms, M. Symeonides et al., PCI2019
RAINBOW Project H2020 - A Fog Computing Platform (https://rainbow-h2020.eu/)
Human-Robot Collaboration in Industrial Ecosystems (https://rainbow-h2020.eu/use-case-1/) by BIBA GmbH (http://www.biba.uni-bremen.de/)
Kind: a tool for running local Kubernetes clusters using Docker container “nodes” (https://kind.sigs.k8s.io/)
84. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Conclusion
● We introduced an open-source Emulation suite for IoT, Edge and Fog applications.
○ features a powerful model specification for Fog and 5G Deployments,
○ allows the controllable Faults, Mobility patterns, and Alterations,
○ implements realistically 5G concepts like Slicing, MIMO, Beamforming, VNF, network monitoring, etc.
○ offers enablers for Any-scale Experimentation, and
○ provides Monitoring Capabilities
● We provided a detailed description of the implementation aspects, such as modeling,
resource management and network shaping.
● Our future work includes:
○ Emulation of CPU architecture, GPUs, and low-level circuits
○ Emulation of embedded sensors as data generators
84
85. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Thank you!!!!
85
Fogify Github: https://github.com/UCY-LINC-LAB/fogify
Fogify Documentation: https://ucy-linc-lab.github.io/fogify/
5G-Slicer Github: https://github.com/UCY-LINC-LAB/5G-Slicer
Fogify and 5G-Slicer are
an open source projects.
Fogify Demo: https://github.com/UCY-LINC-LAB/fogify-demo
5G-Slicer Demo: https://github.com/UCY-LINC-LAB/5G-Slicer-demo
Video: https://www.youtube.com/watch?v=PthMM6rC89o
87. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
87
Use-cases
Single Trace Evaluation
In this experiment, we show that the density of the RUs should be at least 100 in the selected
bounding box to have fresh and in-time results
Experiment Setup:
● Single randomly-selected bus trace (id=1230)
● Different number of RUs (25, 50, 75, 100, 125) in the bus
operational area
● Monitor the IoT buffer size and count of timeouts.
Network Traffic and IoT density
The placement of the Edge service should be in line with the IoT devices density in order to have
balanced workload computations
Experiment Setup:
● Six MEC servers (Node 0-5) deployed on randomly selected RUs
● 20 IoT devices (buses) operated in the same city area
However, during the execution, we realized that nodes 0, 1, and 4 did not receive
any traffic so…
88. Moysis Symeonides
msymeo03@cs.ucy.ac.cy
Laboratory for Internet
Computing
Emulating 5G-Ready Mobile IoT Services
88
Use-cases
Dublin’s bus traces sample, https://data.smartdublin.ie/dataset/dublin_bus_sample
Dublin’s bus stops, https://data.gov.ie/dataset/bus-stops-served-by-dublin-bus
M. Symeonides, Z. Georgiou, D. Trihinas, G. Pallis and M. D. Dikaiakos, "Demo: Emulating 5G-Ready Mobile IoT Services", IoTDI2022
We use the real-world open-access dataset from Dublin's bus traces[9],
and bus stops[10] as IoT device traces, and locations for 5G URs,
respectively.
The datasets include:
● over 950 bus traces
● each bus periodically generates 16 metrics, including bus id,
location coordinates, operating city region, etc
● over 4000 bus stops
SlicerSDK and Bus Operator Use Case Template
Application pipeline:
● When the bus (IoT device) is connected to an RU, it t transmits its data to the nearest MEC. MEC
periodically computes region-based analytics and sends them to a Cloud server. If the bus is not connected
to an RU, it uses a temporal buffer to store its data.