SlideShare a Scribd company logo
1 of 25
Sponsored by:
EETimes University Course:
Mastering IoT Design: Sense, Process, Connect
Day 2: Processing: Turning IoT Data into Intelligence
Presented by:
Deepak Shankar
Founder and Vice President, Technology
Mirabilis Design Inc.
1
Sponsored by:
Our Speaker:
2
Deepak Shankar
Founder and Vice President, Technology
Mirabilis Design Inc.
Sponsored by:
Agenda
Introduction to processing at
Edge Computing
Trends
Challenges
Case Study and Analysis
Conclusion
3
Sponsored by:
Enabling Data Center Connected Devices
• 50 billion IoT devices generate 79.4ZB requires
– Huge bandwidth
– Massive and expensive cloud processing
– 99.999% reliability
– Cybersecurity
– Variable response latency
• Solution: Edge Computing
– Process and analyze data locally
– Make instant decisions
• Applications that benefit from Edge Computing
– Safety, health care, security, autonomous vehicles,
smart cities
– Manufacturing, VR, AR, stream services, customer care
– Smart homes
4
Sponsored by:
Architecture of Edge Computing
• Edge computing is at the
outermost edge of network
• Sensor data is collected,
filtered, compressed, and
encrypted locally and a
small quantity is sent to the
cloud
• Network transfer can be
done in batch or offline
• Increases the number of
processing layers
• Server location is critical
• Tracking and diagnostic is
critical and adds layers
5
Sponsored by:
Trends
• Edge gateway separates the processing and end-point
– Increases the battery life of the connected devices
– Add more sensors and trackers at the device
• Example
– Smart electricity meters generate lots of measurements at short intervals
– Using data from temperature, light and other sensors, Edge Computing can respond to
environment changes quickly, reducing operational cost and increasing comfort
• Filtering edge data reduces cloud transfers, which increases battery life
• Example
– Mercedes AMG F1 team filters less valuable telemetry and transfers relevant data for offline
processing
6
Sponsored by:
Trends
• There is no “single” edge
– Depending on the application, the edge architecture will be different
– Manufacturing plant [Edge servers and gateways aggregate multiple
servers and devices in a distributed location]
– Telecommunications provider [architectures break down into a provider far
edge, a provider access edge, and a provider aggregation edge]
• Edge computing doesn’t need to be connected
– An edge device running autonomously in a hard-to-reach place like a rural
mining site can keep running when a connection drops
– When connection resumes, the system can sync and transfer data
7
Sponsored by:
Computing Trends
• Edge is getting “foggy”
– Fog computing adds a new filtering layer
– Example
• Temperature sensor generates data every one second
• With fog layer, data that meet the metrics are sent to cloud
• Advanced communication and AI technology enable mass
connection
– Wi-Fi 6 and 5G/6G covers most edge devices
– About 99.4% of the physical objects are still unconnected
8
Sponsored by:
Challenges
• Latency (Response times)
– Applications, like the health care, financial transactions, and automotive
cannot tolerate latency
– Stringent requirements need to be met and thus the components need to be
selected to meet such needs
• Bandwidth
– Applications, like Smart surveillance systems and traffic management,
require significant bandwidth
– Buffer overflow, retransmissions can severely affect application performance
9
Sponsored by:
Challenges
• Edge has same cyber risk as any other local network
server
– “AT&T Cybersecurity Insights report: Securing the Edge” found
that 74% of businesses have been compromised
– Sniffing attacks, DDoS, supply chain attacks, etc.
• Power
– Edge servers rely on battery as their primary power source
– IoT device batteries are not easily replaceable
• Fire alarm sensors, underwater sensors, wildlife tracking devices,
medical implants, space and satellite devices
10
Sponsored by:
Designing Edge Computing Requires Early Architecture
Planning
• Early system model can eliminate bottlenecks and measure
– Processing requirements
– Expected application latency
– Required bandwidth for seamless operation
– Power profile of the edge devices
– Behavior of the system under different failure conditions and threats
• To enable this, the system modeling solution requires IP libraries and
simulators for hardware, software, and network
– VisualSim Architect from Mirabilis Design ticks all the boxes
Sponsored by:
Why is System Performance Exploration Required?
Scheduling/Arbitration
proportional
share
WFQ
static
dynamic
fixed priority
EDF
TDMA
FCFS
Communication Templates
Architecture # 1 Architecture # 2
Computation Templates
DSP
AI
GPU
DRAM
CPU
FPGA
m
E
DSP
TDMA
Priority
EDF
WFQ
RISC
DSP
LookUp
Cipher
AI DS
P
CPU
GP
U
mE DD
R
static
Which architecture is better suited
for our application?
12
Sponsored by:
Block Diagram of Data-Enabled Application
Device 1
AFE
ARM/
RISC-V
core
BLE/
Wifi/ 5G
Radio
Transceiv
er
Network
Hub
[Edge Gateways
+ Fog layers]
Data
Center
Sponsored by:
IoT to Data Center Model
• Power consumption of each
device
• Optimal HW and SW
configuration to meet the end-to-
end application timing deadline
• Performance with Big data and
fast data workloads
14
Sponsored by:
Architect Hardware-Software of Edge Device
DRAM
Display
IO
A
M
B
A
A
X
I
B
u
s
CPU
GPU
Display
Ctrl
P
C
I
e
Video Camera SRAM
Packet
• System Overview
– Camera: 30fps, VGA corresponds
– CPU: Multi-core ARM Cortex-A53 1.2GHz
– GPU: 64Cores(8Warps×8PEs), 32Threads,
1GHz
– DisplayCtrl: DisplayBuffer 293,888Byte
– SRAM: SDR, 64MB, 1.0GHz
– DRAM: DDR3, 64MB, 2.4GHz
Explore at the board- and semiconductor-level to size uP/GPU, memory bandwidth and bus/switch configuration
15
Sponsored by:
Conducting Architecture Trade-off
• By changing the amount of video input data (packet numbers), observe the SRAM -> DRAM
transfer performance and examine the upper limit performance of the video input that the
system can tolerate. 210 packets/s
12ms
21 packets/s
414us
300 packets/s
• 250 packets/s is the system limit
• With 300 packets/s, simulation cannot
be executed due to FIFO buffer
overflow.
16
Sponsored by:
Compare Edge Compute System using ARM vs RISC-V
Processors
Using ARM Cores Using RISC-V Cores
NOTE: Depending on the application profile run, the performance and power observed would
vary
• Compare application latency with and without custom instructions tailored for AI
and data filtering
• Average power consumption in different scenarios
17
Sponsored by:
Selecting Network Interface to Data Center
Using 1000 Mbps links 1000 Mbps link + Edge Processing (Single- and multi-core)
Sizing of network resources to Edge devices is important to get optimal performance
18
Sponsored by:
Bluetooth (BLE) Power State Transition (FSM)
• Depending on the
abstraction required,
the subsystems can
be built with great
details
• Here, Bluetooth
module has been
modeled with all the
state transition
details
19
Sponsored by:
Resource usage
extremely high due
to continued high
traffic levels
Security against DDoS Attack on Edge and Networks
A DDoS attack involves multiple
connected devices, collectively
known as a botnet, which are used to
overwhelm a target vehicle with
fake/malicious traffic.
• Virtually emulating the system behavior using DDoS attack technique
• Simulation methodology is designed to test automotive systems for cybersecurity
and safety that are under development
• Undertake Risk Assessment on network simulation to predict how the interaction of
restrictions and behavior may affect overall network hygiene
• Moreover, testing multiple potential settings can aid in finding a near-optimal
configuration for restrictions
• The above design analyzes the overall throughput and latency on the network under
attack.
High Delay in processing
request result in low
throughput
What is
DDoS?
DDoS Attack
Outcomes ?
Analyze the
System Design
and find best
optimal
configuration
High Resource Usage
due to Attacks on On-
Board Units. Unable to
discern between normal
and attack traffic
OB
U
Diagnostic
20
Sponsored by:
Failure and Cybersecurity Threat Analysis
Normal Operation Under Attack
Effective
throughput is
reduced and
significant bursts
in response times
are observed
21
Sponsored by:
Evaluate Bottlenecks and Security Threats
Stable
Response
Time
Malicious Devices are Blacklisted
Without
Firewall
With
Firewall
22
22
Sponsored by:
Edge Computing Architecture is Key for Data Intelligence
• System exploration must be performed during the planning stage
• Distribution of processing to IoT, edge, fog, and data center must
be based on the application requirements
• Edge, Network, and IoT System specification must be fully
validated for both power-performance and failure-security
• Data size, processing needs, and software tasks must be
determined in advance
• System must be scalable for future requirements
• Edge computing is the Future
Sponsored by:
About Mirabilis Design
Software Company based in Silicon Valley
Integrates Model-based Systems Engineering with the electronics
development flow
Development and Support Centers
USA, India, China, South Korea, Japan and Europe
VisualSim Architect - Modeling and Simulation Software
Graphical modeling, multi-domain simulator, system-level IP, analysis tools and
open API
Market Segments
Semiconductors, Automotive and, Aerospace and Defense
Design Enablement
Architecture trade-offs, system validation, early functional testing and
communication
Networking
24
Sponsored by:
Q&A
25

More Related Content

Similar to Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data into Intelligence

What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachSUSE
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2MEurotech
 
Edge Computing TS.pptx
Edge Computing TS.pptxEdge Computing TS.pptx
Edge Computing TS.pptxMilanap1
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Ultimate Guide to Edge Computing!!
Ultimate Guide to Edge Computing!!Ultimate Guide to Edge Computing!!
Ultimate Guide to Edge Computing!!DigitalThinkerHelp
 
PME 2021 Design & Quote.pptx
PME 2021 Design & Quote.pptxPME 2021 Design & Quote.pptx
PME 2021 Design & Quote.pptxNavedKhan659845
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp ciscoJheyson Ayala
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MECSabidur Rahman
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution Naved Ahmed
 
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...EuroCloud
 
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonIoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonEurotech
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesThe IOT Academy
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkDellNMS
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdffreddysarabia1
 

Similar to Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data into Intelligence (20)

What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
 
Design of network
Design of networkDesign of network
Design of network
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
 
edge computing.pptx
edge computing.pptxedge computing.pptx
edge computing.pptx
 
Edge Computing TS.pptx
Edge Computing TS.pptxEdge Computing TS.pptx
Edge Computing TS.pptx
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Ultimate Guide to Edge Computing!!
Ultimate Guide to Edge Computing!!Ultimate Guide to Edge Computing!!
Ultimate Guide to Edge Computing!!
 
PME 2021 Design & Quote.pptx
PME 2021 Design & Quote.pptxPME 2021 Design & Quote.pptx
PME 2021 Design & Quote.pptx
 
Data centers on the Edge
Data centers on the EdgeData centers on the Edge
Data centers on the Edge
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp cisco
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
 
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonIoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
 
Evolution of internet by Ali Kashif
Evolution of internet  by Ali KashifEvolution of internet  by Ali Kashif
Evolution of internet by Ali Kashif
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdf
 
Sgcp14phillips
Sgcp14phillipsSgcp14phillips
Sgcp14phillips
 

More from Deepak Shankar

How to achieve 95%+ Accurate power measurement during architecture exploration?
How to achieve 95%+ Accurate power measurement during architecture exploration? How to achieve 95%+ Accurate power measurement during architecture exploration?
How to achieve 95%+ Accurate power measurement during architecture exploration? Deepak Shankar
 
Mirabilis_Design AMD Versal System-Level IP Library
Mirabilis_Design AMD Versal System-Level IP LibraryMirabilis_Design AMD Versal System-Level IP Library
Mirabilis_Design AMD Versal System-Level IP LibraryDeepak Shankar
 
Accelerated development in Automotive E/E Systems using VisualSim Architect
Accelerated development in Automotive E/E Systems using VisualSim ArchitectAccelerated development in Automotive E/E Systems using VisualSim Architect
Accelerated development in Automotive E/E Systems using VisualSim ArchitectDeepak Shankar
 
Evaluating UCIe based multi-die SoC to meet timing and power
Evaluating UCIe based multi-die SoC to meet timing and power Evaluating UCIe based multi-die SoC to meet timing and power
Evaluating UCIe based multi-die SoC to meet timing and power Deepak Shankar
 
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERSROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERSDeepak Shankar
 
Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021
Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021
Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021Deepak Shankar
 
Energy efficient AI workload partitioning on multi-core systems
Energy efficient AI workload partitioning on multi-core systemsEnergy efficient AI workload partitioning on multi-core systems
Energy efficient AI workload partitioning on multi-core systemsDeepak Shankar
 
Capacity Planning and Power Management of Data Centers.
Capacity Planning and Power Management of Data Centers. Capacity Planning and Power Management of Data Centers.
Capacity Planning and Power Management of Data Centers. Deepak Shankar
 
Automotive network and gateway simulation
Automotive network and gateway simulationAutomotive network and gateway simulation
Automotive network and gateway simulationDeepak Shankar
 
Introduction to architecture exploration
Introduction to architecture explorationIntroduction to architecture exploration
Introduction to architecture explorationDeepak Shankar
 
Using ai for optimal time sensitive networking in avionics
Using ai for optimal time sensitive networking in avionicsUsing ai for optimal time sensitive networking in avionics
Using ai for optimal time sensitive networking in avionicsDeepak Shankar
 
Designing memory controller for ddr5 and hbm2.0
Designing memory controller for ddr5 and hbm2.0Designing memory controller for ddr5 and hbm2.0
Designing memory controller for ddr5 and hbm2.0Deepak Shankar
 
Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...
Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...
Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...Deepak Shankar
 
Develop High-bandwidth/low latency electronic systems for AI/ML application
Develop High-bandwidth/low latency electronic systems for AI/ML applicationDevelop High-bandwidth/low latency electronic systems for AI/ML application
Develop High-bandwidth/low latency electronic systems for AI/ML applicationDeepak Shankar
 
Webinar on Latency and throughput computation of automotive EE network
Webinar on Latency and throughput computation of automotive EE networkWebinar on Latency and throughput computation of automotive EE network
Webinar on Latency and throughput computation of automotive EE networkDeepak Shankar
 
System Architecture Exploration Training Class
System Architecture Exploration Training ClassSystem Architecture Exploration Training Class
System Architecture Exploration Training ClassDeepak Shankar
 
Exploration of Radars and Software Defined Radios using VisualSim
Exploration of  Radars and Software Defined Radios using VisualSimExploration of  Radars and Software Defined Radios using VisualSim
Exploration of Radars and Software Defined Radios using VisualSimDeepak Shankar
 

More from Deepak Shankar (20)

How to achieve 95%+ Accurate power measurement during architecture exploration?
How to achieve 95%+ Accurate power measurement during architecture exploration? How to achieve 95%+ Accurate power measurement during architecture exploration?
How to achieve 95%+ Accurate power measurement during architecture exploration?
 
Mirabilis_Design AMD Versal System-Level IP Library
Mirabilis_Design AMD Versal System-Level IP LibraryMirabilis_Design AMD Versal System-Level IP Library
Mirabilis_Design AMD Versal System-Level IP Library
 
Modeling Abstraction
Modeling AbstractionModeling Abstraction
Modeling Abstraction
 
Accelerated development in Automotive E/E Systems using VisualSim Architect
Accelerated development in Automotive E/E Systems using VisualSim ArchitectAccelerated development in Automotive E/E Systems using VisualSim Architect
Accelerated development in Automotive E/E Systems using VisualSim Architect
 
Evaluating UCIe based multi-die SoC to meet timing and power
Evaluating UCIe based multi-die SoC to meet timing and power Evaluating UCIe based multi-die SoC to meet timing and power
Evaluating UCIe based multi-die SoC to meet timing and power
 
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERSROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
 
Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021
Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021
Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021
 
Energy efficient AI workload partitioning on multi-core systems
Energy efficient AI workload partitioning on multi-core systemsEnergy efficient AI workload partitioning on multi-core systems
Energy efficient AI workload partitioning on multi-core systems
 
Capacity Planning and Power Management of Data Centers.
Capacity Planning and Power Management of Data Centers. Capacity Planning and Power Management of Data Centers.
Capacity Planning and Power Management of Data Centers.
 
Automotive network and gateway simulation
Automotive network and gateway simulationAutomotive network and gateway simulation
Automotive network and gateway simulation
 
Introduction to architecture exploration
Introduction to architecture explorationIntroduction to architecture exploration
Introduction to architecture exploration
 
Using ai for optimal time sensitive networking in avionics
Using ai for optimal time sensitive networking in avionicsUsing ai for optimal time sensitive networking in avionics
Using ai for optimal time sensitive networking in avionics
 
Designing memory controller for ddr5 and hbm2.0
Designing memory controller for ddr5 and hbm2.0Designing memory controller for ddr5 and hbm2.0
Designing memory controller for ddr5 and hbm2.0
 
Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...
Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...
Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...
 
Develop High-bandwidth/low latency electronic systems for AI/ML application
Develop High-bandwidth/low latency electronic systems for AI/ML applicationDevelop High-bandwidth/low latency electronic systems for AI/ML application
Develop High-bandwidth/low latency electronic systems for AI/ML application
 
Webinar on Latency and throughput computation of automotive EE network
Webinar on Latency and throughput computation of automotive EE networkWebinar on Latency and throughput computation of automotive EE network
Webinar on Latency and throughput computation of automotive EE network
 
Webinar on radar
Webinar on radarWebinar on radar
Webinar on radar
 
Webinar on RISC-V
Webinar on RISC-VWebinar on RISC-V
Webinar on RISC-V
 
System Architecture Exploration Training Class
System Architecture Exploration Training ClassSystem Architecture Exploration Training Class
System Architecture Exploration Training Class
 
Exploration of Radars and Software Defined Radios using VisualSim
Exploration of  Radars and Software Defined Radios using VisualSimExploration of  Radars and Software Defined Radios using VisualSim
Exploration of Radars and Software Defined Radios using VisualSim
 

Recently uploaded

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 

Recently uploaded (20)

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 

Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data into Intelligence

  • 1. Sponsored by: EETimes University Course: Mastering IoT Design: Sense, Process, Connect Day 2: Processing: Turning IoT Data into Intelligence Presented by: Deepak Shankar Founder and Vice President, Technology Mirabilis Design Inc. 1
  • 2. Sponsored by: Our Speaker: 2 Deepak Shankar Founder and Vice President, Technology Mirabilis Design Inc.
  • 3. Sponsored by: Agenda Introduction to processing at Edge Computing Trends Challenges Case Study and Analysis Conclusion 3
  • 4. Sponsored by: Enabling Data Center Connected Devices • 50 billion IoT devices generate 79.4ZB requires – Huge bandwidth – Massive and expensive cloud processing – 99.999% reliability – Cybersecurity – Variable response latency • Solution: Edge Computing – Process and analyze data locally – Make instant decisions • Applications that benefit from Edge Computing – Safety, health care, security, autonomous vehicles, smart cities – Manufacturing, VR, AR, stream services, customer care – Smart homes 4
  • 5. Sponsored by: Architecture of Edge Computing • Edge computing is at the outermost edge of network • Sensor data is collected, filtered, compressed, and encrypted locally and a small quantity is sent to the cloud • Network transfer can be done in batch or offline • Increases the number of processing layers • Server location is critical • Tracking and diagnostic is critical and adds layers 5
  • 6. Sponsored by: Trends • Edge gateway separates the processing and end-point – Increases the battery life of the connected devices – Add more sensors and trackers at the device • Example – Smart electricity meters generate lots of measurements at short intervals – Using data from temperature, light and other sensors, Edge Computing can respond to environment changes quickly, reducing operational cost and increasing comfort • Filtering edge data reduces cloud transfers, which increases battery life • Example – Mercedes AMG F1 team filters less valuable telemetry and transfers relevant data for offline processing 6
  • 7. Sponsored by: Trends • There is no “single” edge – Depending on the application, the edge architecture will be different – Manufacturing plant [Edge servers and gateways aggregate multiple servers and devices in a distributed location] – Telecommunications provider [architectures break down into a provider far edge, a provider access edge, and a provider aggregation edge] • Edge computing doesn’t need to be connected – An edge device running autonomously in a hard-to-reach place like a rural mining site can keep running when a connection drops – When connection resumes, the system can sync and transfer data 7
  • 8. Sponsored by: Computing Trends • Edge is getting “foggy” – Fog computing adds a new filtering layer – Example • Temperature sensor generates data every one second • With fog layer, data that meet the metrics are sent to cloud • Advanced communication and AI technology enable mass connection – Wi-Fi 6 and 5G/6G covers most edge devices – About 99.4% of the physical objects are still unconnected 8
  • 9. Sponsored by: Challenges • Latency (Response times) – Applications, like the health care, financial transactions, and automotive cannot tolerate latency – Stringent requirements need to be met and thus the components need to be selected to meet such needs • Bandwidth – Applications, like Smart surveillance systems and traffic management, require significant bandwidth – Buffer overflow, retransmissions can severely affect application performance 9
  • 10. Sponsored by: Challenges • Edge has same cyber risk as any other local network server – “AT&T Cybersecurity Insights report: Securing the Edge” found that 74% of businesses have been compromised – Sniffing attacks, DDoS, supply chain attacks, etc. • Power – Edge servers rely on battery as their primary power source – IoT device batteries are not easily replaceable • Fire alarm sensors, underwater sensors, wildlife tracking devices, medical implants, space and satellite devices 10
  • 11. Sponsored by: Designing Edge Computing Requires Early Architecture Planning • Early system model can eliminate bottlenecks and measure – Processing requirements – Expected application latency – Required bandwidth for seamless operation – Power profile of the edge devices – Behavior of the system under different failure conditions and threats • To enable this, the system modeling solution requires IP libraries and simulators for hardware, software, and network – VisualSim Architect from Mirabilis Design ticks all the boxes
  • 12. Sponsored by: Why is System Performance Exploration Required? Scheduling/Arbitration proportional share WFQ static dynamic fixed priority EDF TDMA FCFS Communication Templates Architecture # 1 Architecture # 2 Computation Templates DSP AI GPU DRAM CPU FPGA m E DSP TDMA Priority EDF WFQ RISC DSP LookUp Cipher AI DS P CPU GP U mE DD R static Which architecture is better suited for our application? 12
  • 13. Sponsored by: Block Diagram of Data-Enabled Application Device 1 AFE ARM/ RISC-V core BLE/ Wifi/ 5G Radio Transceiv er Network Hub [Edge Gateways + Fog layers] Data Center
  • 14. Sponsored by: IoT to Data Center Model • Power consumption of each device • Optimal HW and SW configuration to meet the end-to- end application timing deadline • Performance with Big data and fast data workloads 14
  • 15. Sponsored by: Architect Hardware-Software of Edge Device DRAM Display IO A M B A A X I B u s CPU GPU Display Ctrl P C I e Video Camera SRAM Packet • System Overview – Camera: 30fps, VGA corresponds – CPU: Multi-core ARM Cortex-A53 1.2GHz – GPU: 64Cores(8Warps×8PEs), 32Threads, 1GHz – DisplayCtrl: DisplayBuffer 293,888Byte – SRAM: SDR, 64MB, 1.0GHz – DRAM: DDR3, 64MB, 2.4GHz Explore at the board- and semiconductor-level to size uP/GPU, memory bandwidth and bus/switch configuration 15
  • 16. Sponsored by: Conducting Architecture Trade-off • By changing the amount of video input data (packet numbers), observe the SRAM -> DRAM transfer performance and examine the upper limit performance of the video input that the system can tolerate. 210 packets/s 12ms 21 packets/s 414us 300 packets/s • 250 packets/s is the system limit • With 300 packets/s, simulation cannot be executed due to FIFO buffer overflow. 16
  • 17. Sponsored by: Compare Edge Compute System using ARM vs RISC-V Processors Using ARM Cores Using RISC-V Cores NOTE: Depending on the application profile run, the performance and power observed would vary • Compare application latency with and without custom instructions tailored for AI and data filtering • Average power consumption in different scenarios 17
  • 18. Sponsored by: Selecting Network Interface to Data Center Using 1000 Mbps links 1000 Mbps link + Edge Processing (Single- and multi-core) Sizing of network resources to Edge devices is important to get optimal performance 18
  • 19. Sponsored by: Bluetooth (BLE) Power State Transition (FSM) • Depending on the abstraction required, the subsystems can be built with great details • Here, Bluetooth module has been modeled with all the state transition details 19
  • 20. Sponsored by: Resource usage extremely high due to continued high traffic levels Security against DDoS Attack on Edge and Networks A DDoS attack involves multiple connected devices, collectively known as a botnet, which are used to overwhelm a target vehicle with fake/malicious traffic. • Virtually emulating the system behavior using DDoS attack technique • Simulation methodology is designed to test automotive systems for cybersecurity and safety that are under development • Undertake Risk Assessment on network simulation to predict how the interaction of restrictions and behavior may affect overall network hygiene • Moreover, testing multiple potential settings can aid in finding a near-optimal configuration for restrictions • The above design analyzes the overall throughput and latency on the network under attack. High Delay in processing request result in low throughput What is DDoS? DDoS Attack Outcomes ? Analyze the System Design and find best optimal configuration High Resource Usage due to Attacks on On- Board Units. Unable to discern between normal and attack traffic OB U Diagnostic 20
  • 21. Sponsored by: Failure and Cybersecurity Threat Analysis Normal Operation Under Attack Effective throughput is reduced and significant bursts in response times are observed 21
  • 22. Sponsored by: Evaluate Bottlenecks and Security Threats Stable Response Time Malicious Devices are Blacklisted Without Firewall With Firewall 22 22
  • 23. Sponsored by: Edge Computing Architecture is Key for Data Intelligence • System exploration must be performed during the planning stage • Distribution of processing to IoT, edge, fog, and data center must be based on the application requirements • Edge, Network, and IoT System specification must be fully validated for both power-performance and failure-security • Data size, processing needs, and software tasks must be determined in advance • System must be scalable for future requirements • Edge computing is the Future
  • 24. Sponsored by: About Mirabilis Design Software Company based in Silicon Valley Integrates Model-based Systems Engineering with the electronics development flow Development and Support Centers USA, India, China, South Korea, Japan and Europe VisualSim Architect - Modeling and Simulation Software Graphical modeling, multi-domain simulator, system-level IP, analysis tools and open API Market Segments Semiconductors, Automotive and, Aerospace and Defense Design Enablement Architecture trade-offs, system validation, early functional testing and communication Networking 24