SlideShare a Scribd company logo
Dynamic Module
Deployment in a Fog
Computing Platform
Hua-Jun Hong, Pei-Hsuan Tsai, and Cheng-Hsin Hsu
Department of Computer Science, National Tsing Hua
University, Taiwan
Motivation
▸Internet of Things (IoT) grows rapidly
▸Produce incredible amount of data
• Overload the data centers and congest the networks seriously
2
Limitations of Current Solution
3
Analyze and Compute
Data
in Data center
Huge Amount of
Overload Networks
and Data Center
Better (Our) Solution
▸Pre-processing the data before transmitting them over the
Internet
• Reduce the network traffic
• Reduce the load of data centers
4REPORT
▸Fog computing leverages devices in data centers, edge
networks, and end devices simultaneously
▸Centralized controller  Master
End devices, edge networks, data centers  Minions
Fog Computing Overview
5
Data Centers
Edge Networks
End Devices
▸Many kinds of resources
• Computations, communications, storage, and sensors
▸Utilize wasted resources
▸Reduce network traffic
▸Short response time
▸Low cost
▸Low carbon foot print
▸…
Advantages: Fog >> Cloud
6
Challenges
▸Different requests need different modules
• Need dynamic deployment mechanism
▸Limited resources of the minions
• Split applications into smaller modules for requests
• Collaborate and connect the minions to finish a request
▸Huge amount of requests
• An optimal algorithm to serve more requests
7
▸Real-time plate recognition
▸Path estimation
• Turn right!
▸Dynamically deploy the
car tracking modules!
Car Tracking Usage Scenario
8
Images
Real-time
Computation!
Dynamic
Deployment!
Split the complex application
into smaller modules!
Path
Estimation!
▸Virtualized modules are easier to be
• Dynamically placed on the minions
• Migrated among the minions
▸Traditional virtual machine v.s. container
• Xen, KVM
• LXC, Docker
Dynamic Deployment Mechanism
9
▸Traditional Virtual Machine
• Need large storage space and more computing power
▸Container: light-weight VM
• Need less storage space and less computing power
Traditional VM v.s Container
10
Virtual
Machine
Container
Size GB MB
Startup Minute Second
▸OpenStack
• Used to manage virtual machines in data centers
▸SaltStack
• Remote execution tool and configuration
management system
▸Kubernetes
• Automating deployment, scaling, and management of
containerized applications
Open-source Platforms
11
▸Each minion hosts several containers, can be assembled into pod
▸A service is a group of pods that are running on the cluster
Kubernetes Architecture
12
Minion 1 Minion 2
▸Push virtualized modules to minions quickly
▸Replace modules directly when algorithm is updated
Kubernetes-based Fog Computing
Platform
13
Module Deployment Problem Formulation
14
Decision variable:
whether module m is deployed on minion d
module m is only deployed on a minion
resource constraints
determines if a module has been deployed
Objective function:
maximizes the number of satisfied requests
O ( + + )|R|( )
Module Deployment Algorithm
15(|R|log(|R| ) |D|log(|D|) |D||M|
= max {O (|R| log(|R| )),O (|R| |D| (log(|D| )+|M| ))}
▸Implement three modules
• Image collector
• Face detector
• Crowdedness monitor
Module Implementation
16
Master
Minions
▸Master: i5 CPU PC installed with Kubernetes
▸Minions: Raspberry Pis
▸Network Emulator: Wonder Shaper[1]
• WiFi (300 Mbps): stream data among the minions
• 4G (150 Mbps): pushing container images to the minions
▸Master executes the module deployment algorithm
• MDA algorithm
• Optimal algorithm (OPT) using CPLEX[2] for comparisons
Experiment Setup
17[1] http://lartc.org/wondershaper/
[2] http://www-03.ibm.com/software/products/en/ibmilogcpleoptistud/
▸Running face detection
with/without container
• Virtually zero overhead
Container Overhead
18
▸Serve 20 requests only
needs 9 seconds
Fast Deployment Time of the
Implemented Testbed
19
▸Largest gap of satisfied
requests between the MDA
and OPT algorithm is only
2%
Near-Optimality of the MDA
Algorithm
20
2%
▸20 Requests and 5 Minions
• OPT: 80 seconds
• MDA < 1 second
▸We conduct another
experiment
• MDA algorithm computes
1000 requests with 500
minions < 2 seconds
The MDA Algorithm Computes in
Real Time
21
▸Using ifconfig to measure the network traffics
Amount of Network Traffics
22
Image collector
Face detector
Crowdedness monitor
49.04Mpbs 2.67Mpbs
0.5Mpbs
REPORT
49.04Mpbs
▸We implemented a fog computing platform for
dynamically deploying modules on fog minions
• Formulate the problem and propose an efficient Module
Deployment Algorithm (MDA)
• Build a real testbed to evaluate our algorithms and the
dynamics of the fog computing platform
Conclusion
23
Q&A

More Related Content

What's hot

Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
Mahantesh Hiremath
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Manoj Mandava
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Pachipulusu Giridhar
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
S.Mostafa Sayyedi
 
Fog computing
Fog computingFog computing
Fog computing
karunsajeev
 
Fog computing. Igor Tsybin
Fog computing. Igor TsybinFog computing. Igor Tsybin
Fog computing. Igor Tsybin
Igor Tsybin
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Mohit Jaju
 
Edge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edgeEdge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edge
Nitinder Mohan
 
Fog Computing - DEV.BG 2018
Fog Computing - DEV.BG 2018Fog Computing - DEV.BG 2018
Fog Computing - DEV.BG 2018
Trayan Iliev
 
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Jiang Zhu
 
Attack graph generation for micro services architecture
Attack graph generation for micro services architectureAttack graph generation for micro services architecture
Attack graph generation for micro services architecture
Abdul Qadir
 
PhD Projects in Fog Computing Research Ideas
PhD Projects in Fog Computing Research IdeasPhD Projects in Fog Computing Research Ideas
PhD Projects in Fog Computing Research Ideas
PhD Services
 
Edge-Fog Cloud
Edge-Fog CloudEdge-Fog Cloud
Edge-Fog Cloud
Nitinder Mohan
 
Fog computing
Fog computingFog computing
Fog computing
Hari Priyanka
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
FBK CREATE-NET
 
Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
sreelesh balan
 
Grid computing
Grid computingGrid computing
Grid computing
Wipro
 
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Jiang Zhu
 
Developing io t applications in the fog a distributed dataflow approach
Developing io t applications in the fog  a distributed dataflow approachDeveloping io t applications in the fog  a distributed dataflow approach
Developing io t applications in the fog a distributed dataflow approach
Nam Giang
 
Fog Computing Defined
Fog Computing DefinedFog Computing Defined
Fog Computing Defined
Angelo Corsaro
 

What's hot (20)

Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing. Igor Tsybin
Fog computing. Igor TsybinFog computing. Igor Tsybin
Fog computing. Igor Tsybin
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Edge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edgeEdge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edge
 
Fog Computing - DEV.BG 2018
Fog Computing - DEV.BG 2018Fog Computing - DEV.BG 2018
Fog Computing - DEV.BG 2018
 
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
Improving Web Siste Performance Using Edge Services in Fog Computing Architec...
 
Attack graph generation for micro services architecture
Attack graph generation for micro services architectureAttack graph generation for micro services architecture
Attack graph generation for micro services architecture
 
PhD Projects in Fog Computing Research Ideas
PhD Projects in Fog Computing Research IdeasPhD Projects in Fog Computing Research Ideas
PhD Projects in Fog Computing Research Ideas
 
Edge-Fog Cloud
Edge-Fog CloudEdge-Fog Cloud
Edge-Fog Cloud
 
Fog computing
Fog computingFog computing
Fog computing
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
 
Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
 
Grid computing
Grid computingGrid computing
Grid computing
 
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
 
Developing io t applications in the fog a distributed dataflow approach
Developing io t applications in the fog  a distributed dataflow approachDeveloping io t applications in the fog  a distributed dataflow approach
Developing io t applications in the fog a distributed dataflow approach
 
Fog Computing Defined
Fog Computing DefinedFog Computing Defined
Fog Computing Defined
 

Similar to Dynamic module deployment in a fog computing platform

Cloud Roundtable at Microsoft Switzerland
Cloud Roundtable at Microsoft Switzerland Cloud Roundtable at Microsoft Switzerland
Cloud Roundtable at Microsoft Switzerland
mictc
 
An Introduction to Cloud Computing by Robert Grossman 08-06-09 (v19)
An Introduction to Cloud Computing by Robert Grossman 08-06-09 (v19)An Introduction to Cloud Computing by Robert Grossman 08-06-09 (v19)
An Introduction to Cloud Computing by Robert Grossman 08-06-09 (v19)
Robert Grossman
 
Edge computing system for large scale distributed sensing systems
Edge computing system for large scale distributed sensing systemsEdge computing system for large scale distributed sensing systems
Edge computing system for large scale distributed sensing systems
Faculty of Technical Sciences, University of Novi Sad
 
Raspberry pi x kubernetes x tensorflow
Raspberry pi x kubernetes x tensorflowRaspberry pi x kubernetes x tensorflow
Raspberry pi x kubernetes x tensorflow
霈萱 蔡
 
Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival
Digital Health Enterprise Zone
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ripal Ranpara
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
Upender Upr
 
Lab 9 - Ethical and Legal.pdf sault college
Lab 9 - Ethical and Legal.pdf sault collegeLab 9 - Ethical and Legal.pdf sault college
Lab 9 - Ethical and Legal.pdf sault college
ashokharshadev
 
_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf
TyStrk
 
Week 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdfWeek 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdf
John422973
 
Gridcomputingppt
GridcomputingpptGridcomputingppt
Gridcomputingppt
navjasser
 
PIMRC-2012, Sydney, Australia, 28 July, 2012
PIMRC-2012, Sydney, Australia, 28 July, 2012PIMRC-2012, Sydney, Australia, 28 July, 2012
PIMRC-2012, Sydney, Australia, 28 July, 2012
Charith Perera
 
Week 1 lecture material cc
Week 1 lecture material ccWeek 1 lecture material cc
Week 1 lecture material cc
Ankit Gupta
 
Grid computing
Grid computingGrid computing
vssutcloud computing.pptx
vssutcloud computing.pptxvssutcloud computing.pptx
vssutcloud computing.pptx
MunmunSaha7
 
42 grid computing
42 grid computing42 grid computing
42 grid computing
SALMAN SHAIKH
 
42 grid computing
42 grid computing42 grid computing
42 grid computing
SALMAN SHAIKH
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
sharmili priyadarsini
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Zeeshan Bilal
 
Cloud computing basic introduction and notes for exam
Cloud computing basic introduction and notes for examCloud computing basic introduction and notes for exam
Cloud computing basic introduction and notes for exam
UtkarshAnand512529
 

Similar to Dynamic module deployment in a fog computing platform (20)

Cloud Roundtable at Microsoft Switzerland
Cloud Roundtable at Microsoft Switzerland Cloud Roundtable at Microsoft Switzerland
Cloud Roundtable at Microsoft Switzerland
 
An Introduction to Cloud Computing by Robert Grossman 08-06-09 (v19)
An Introduction to Cloud Computing by Robert Grossman 08-06-09 (v19)An Introduction to Cloud Computing by Robert Grossman 08-06-09 (v19)
An Introduction to Cloud Computing by Robert Grossman 08-06-09 (v19)
 
Edge computing system for large scale distributed sensing systems
Edge computing system for large scale distributed sensing systemsEdge computing system for large scale distributed sensing systems
Edge computing system for large scale distributed sensing systems
 
Raspberry pi x kubernetes x tensorflow
Raspberry pi x kubernetes x tensorflowRaspberry pi x kubernetes x tensorflow
Raspberry pi x kubernetes x tensorflow
 
Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
Lab 9 - Ethical and Legal.pdf sault college
Lab 9 - Ethical and Legal.pdf sault collegeLab 9 - Ethical and Legal.pdf sault college
Lab 9 - Ethical and Legal.pdf sault college
 
_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf_Cloud_Computing_Overview.pdf
_Cloud_Computing_Overview.pdf
 
Week 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdfWeek 1 Lecture_1-5 CC_watermark.pdf
Week 1 Lecture_1-5 CC_watermark.pdf
 
Gridcomputingppt
GridcomputingpptGridcomputingppt
Gridcomputingppt
 
PIMRC-2012, Sydney, Australia, 28 July, 2012
PIMRC-2012, Sydney, Australia, 28 July, 2012PIMRC-2012, Sydney, Australia, 28 July, 2012
PIMRC-2012, Sydney, Australia, 28 July, 2012
 
Week 1 lecture material cc
Week 1 lecture material ccWeek 1 lecture material cc
Week 1 lecture material cc
 
Grid computing
Grid computingGrid computing
Grid computing
 
vssutcloud computing.pptx
vssutcloud computing.pptxvssutcloud computing.pptx
vssutcloud computing.pptx
 
42 grid computing
42 grid computing42 grid computing
42 grid computing
 
42 grid computing
42 grid computing42 grid computing
42 grid computing
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing basic introduction and notes for exam
Cloud computing basic introduction and notes for examCloud computing basic introduction and notes for exam
Cloud computing basic introduction and notes for exam
 

Recently uploaded

molar-distalization in orthodontics-seminar.pptx
molar-distalization in orthodontics-seminar.pptxmolar-distalization in orthodontics-seminar.pptx
molar-distalization in orthodontics-seminar.pptx
Anagha Prasad
 
The debris of the ‘last major merger’ is dynamically young
The debris of the ‘last major merger’ is dynamically youngThe debris of the ‘last major merger’ is dynamically young
The debris of the ‘last major merger’ is dynamically young
Sérgio Sacani
 
ESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptxESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptx
PRIYANKA PATEL
 
waterlessdyeingtechnolgyusing carbon dioxide chemicalspdf
waterlessdyeingtechnolgyusing carbon dioxide chemicalspdfwaterlessdyeingtechnolgyusing carbon dioxide chemicalspdf
waterlessdyeingtechnolgyusing carbon dioxide chemicalspdf
LengamoLAppostilic
 
Basics of crystallography, crystal systems, classes and different forms
Basics of crystallography, crystal systems, classes and different formsBasics of crystallography, crystal systems, classes and different forms
Basics of crystallography, crystal systems, classes and different forms
MaheshaNanjegowda
 
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
Scintica Instrumentation
 
Compexometric titration/Chelatorphy titration/chelating titration
Compexometric titration/Chelatorphy titration/chelating titrationCompexometric titration/Chelatorphy titration/chelating titration
Compexometric titration/Chelatorphy titration/chelating titration
Vandana Devesh Sharma
 
Applied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdfApplied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdf
University of Hertfordshire
 
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
vluwdy49
 
Gadgets for management of stored product pests_Dr.UPR.pdf
Gadgets for management of stored product pests_Dr.UPR.pdfGadgets for management of stored product pests_Dr.UPR.pdf
Gadgets for management of stored product pests_Dr.UPR.pdf
PirithiRaju
 
aziz sancar nobel prize winner: from mardin to nobel
aziz sancar nobel prize winner: from mardin to nobelaziz sancar nobel prize winner: from mardin to nobel
aziz sancar nobel prize winner: from mardin to nobel
İsa Badur
 
Modelo de slide quimica para powerpoint
Modelo  de slide quimica para powerpointModelo  de slide quimica para powerpoint
Modelo de slide quimica para powerpoint
Karen593256
 
8.Isolation of pure cultures and preservation of cultures.pdf
8.Isolation of pure cultures and preservation of cultures.pdf8.Isolation of pure cultures and preservation of cultures.pdf
8.Isolation of pure cultures and preservation of cultures.pdf
by6843629
 
Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)
Sciences of Europe
 
Randomised Optimisation Algorithms in DAPHNE
Randomised Optimisation Algorithms in DAPHNERandomised Optimisation Algorithms in DAPHNE
Randomised Optimisation Algorithms in DAPHNE
University of Maribor
 
AJAY KUMAR NIET GreNo Guava Project File.pdf
AJAY KUMAR NIET GreNo Guava Project File.pdfAJAY KUMAR NIET GreNo Guava Project File.pdf
AJAY KUMAR NIET GreNo Guava Project File.pdf
AJAY KUMAR
 
23PH301 - Optics - Optical Lenses.pptx
23PH301 - Optics  -  Optical Lenses.pptx23PH301 - Optics  -  Optical Lenses.pptx
23PH301 - Optics - Optical Lenses.pptx
RDhivya6
 
Immersive Learning That Works: Research Grounding and Paths Forward
Immersive Learning That Works: Research Grounding and Paths ForwardImmersive Learning That Works: Research Grounding and Paths Forward
Immersive Learning That Works: Research Grounding and Paths Forward
Leonel Morgado
 
HOW DO ORGANISMS REPRODUCE?reproduction part 1
HOW DO ORGANISMS REPRODUCE?reproduction part 1HOW DO ORGANISMS REPRODUCE?reproduction part 1
HOW DO ORGANISMS REPRODUCE?reproduction part 1
Shashank Shekhar Pandey
 
Direct Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart AgricultureDirect Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart Agriculture
International Food Policy Research Institute- South Asia Office
 

Recently uploaded (20)

molar-distalization in orthodontics-seminar.pptx
molar-distalization in orthodontics-seminar.pptxmolar-distalization in orthodontics-seminar.pptx
molar-distalization in orthodontics-seminar.pptx
 
The debris of the ‘last major merger’ is dynamically young
The debris of the ‘last major merger’ is dynamically youngThe debris of the ‘last major merger’ is dynamically young
The debris of the ‘last major merger’ is dynamically young
 
ESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptxESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptx
 
waterlessdyeingtechnolgyusing carbon dioxide chemicalspdf
waterlessdyeingtechnolgyusing carbon dioxide chemicalspdfwaterlessdyeingtechnolgyusing carbon dioxide chemicalspdf
waterlessdyeingtechnolgyusing carbon dioxide chemicalspdf
 
Basics of crystallography, crystal systems, classes and different forms
Basics of crystallography, crystal systems, classes and different formsBasics of crystallography, crystal systems, classes and different forms
Basics of crystallography, crystal systems, classes and different forms
 
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
 
Compexometric titration/Chelatorphy titration/chelating titration
Compexometric titration/Chelatorphy titration/chelating titrationCompexometric titration/Chelatorphy titration/chelating titration
Compexometric titration/Chelatorphy titration/chelating titration
 
Applied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdfApplied Science: Thermodynamics, Laws & Methodology.pdf
Applied Science: Thermodynamics, Laws & Methodology.pdf
 
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
在线办理(salfor毕业证书)索尔福德大学毕业证毕业完成信一模一样
 
Gadgets for management of stored product pests_Dr.UPR.pdf
Gadgets for management of stored product pests_Dr.UPR.pdfGadgets for management of stored product pests_Dr.UPR.pdf
Gadgets for management of stored product pests_Dr.UPR.pdf
 
aziz sancar nobel prize winner: from mardin to nobel
aziz sancar nobel prize winner: from mardin to nobelaziz sancar nobel prize winner: from mardin to nobel
aziz sancar nobel prize winner: from mardin to nobel
 
Modelo de slide quimica para powerpoint
Modelo  de slide quimica para powerpointModelo  de slide quimica para powerpoint
Modelo de slide quimica para powerpoint
 
8.Isolation of pure cultures and preservation of cultures.pdf
8.Isolation of pure cultures and preservation of cultures.pdf8.Isolation of pure cultures and preservation of cultures.pdf
8.Isolation of pure cultures and preservation of cultures.pdf
 
Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)Sciences of Europe journal No 142 (2024)
Sciences of Europe journal No 142 (2024)
 
Randomised Optimisation Algorithms in DAPHNE
Randomised Optimisation Algorithms in DAPHNERandomised Optimisation Algorithms in DAPHNE
Randomised Optimisation Algorithms in DAPHNE
 
AJAY KUMAR NIET GreNo Guava Project File.pdf
AJAY KUMAR NIET GreNo Guava Project File.pdfAJAY KUMAR NIET GreNo Guava Project File.pdf
AJAY KUMAR NIET GreNo Guava Project File.pdf
 
23PH301 - Optics - Optical Lenses.pptx
23PH301 - Optics  -  Optical Lenses.pptx23PH301 - Optics  -  Optical Lenses.pptx
23PH301 - Optics - Optical Lenses.pptx
 
Immersive Learning That Works: Research Grounding and Paths Forward
Immersive Learning That Works: Research Grounding and Paths ForwardImmersive Learning That Works: Research Grounding and Paths Forward
Immersive Learning That Works: Research Grounding and Paths Forward
 
HOW DO ORGANISMS REPRODUCE?reproduction part 1
HOW DO ORGANISMS REPRODUCE?reproduction part 1HOW DO ORGANISMS REPRODUCE?reproduction part 1
HOW DO ORGANISMS REPRODUCE?reproduction part 1
 
Direct Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart AgricultureDirect Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart Agriculture
 

Dynamic module deployment in a fog computing platform

  • 1. Dynamic Module Deployment in a Fog Computing Platform Hua-Jun Hong, Pei-Hsuan Tsai, and Cheng-Hsin Hsu Department of Computer Science, National Tsing Hua University, Taiwan
  • 2. Motivation ▸Internet of Things (IoT) grows rapidly ▸Produce incredible amount of data • Overload the data centers and congest the networks seriously 2
  • 3. Limitations of Current Solution 3 Analyze and Compute Data in Data center Huge Amount of Overload Networks and Data Center
  • 4. Better (Our) Solution ▸Pre-processing the data before transmitting them over the Internet • Reduce the network traffic • Reduce the load of data centers 4REPORT
  • 5. ▸Fog computing leverages devices in data centers, edge networks, and end devices simultaneously ▸Centralized controller  Master End devices, edge networks, data centers  Minions Fog Computing Overview 5 Data Centers Edge Networks End Devices
  • 6. ▸Many kinds of resources • Computations, communications, storage, and sensors ▸Utilize wasted resources ▸Reduce network traffic ▸Short response time ▸Low cost ▸Low carbon foot print ▸… Advantages: Fog >> Cloud 6
  • 7. Challenges ▸Different requests need different modules • Need dynamic deployment mechanism ▸Limited resources of the minions • Split applications into smaller modules for requests • Collaborate and connect the minions to finish a request ▸Huge amount of requests • An optimal algorithm to serve more requests 7
  • 8. ▸Real-time plate recognition ▸Path estimation • Turn right! ▸Dynamically deploy the car tracking modules! Car Tracking Usage Scenario 8 Images Real-time Computation! Dynamic Deployment! Split the complex application into smaller modules! Path Estimation!
  • 9. ▸Virtualized modules are easier to be • Dynamically placed on the minions • Migrated among the minions ▸Traditional virtual machine v.s. container • Xen, KVM • LXC, Docker Dynamic Deployment Mechanism 9
  • 10. ▸Traditional Virtual Machine • Need large storage space and more computing power ▸Container: light-weight VM • Need less storage space and less computing power Traditional VM v.s Container 10 Virtual Machine Container Size GB MB Startup Minute Second
  • 11. ▸OpenStack • Used to manage virtual machines in data centers ▸SaltStack • Remote execution tool and configuration management system ▸Kubernetes • Automating deployment, scaling, and management of containerized applications Open-source Platforms 11
  • 12. ▸Each minion hosts several containers, can be assembled into pod ▸A service is a group of pods that are running on the cluster Kubernetes Architecture 12 Minion 1 Minion 2
  • 13. ▸Push virtualized modules to minions quickly ▸Replace modules directly when algorithm is updated Kubernetes-based Fog Computing Platform 13
  • 14. Module Deployment Problem Formulation 14 Decision variable: whether module m is deployed on minion d module m is only deployed on a minion resource constraints determines if a module has been deployed Objective function: maximizes the number of satisfied requests
  • 15. O ( + + )|R|( ) Module Deployment Algorithm 15(|R|log(|R| ) |D|log(|D|) |D||M| = max {O (|R| log(|R| )),O (|R| |D| (log(|D| )+|M| ))}
  • 16. ▸Implement three modules • Image collector • Face detector • Crowdedness monitor Module Implementation 16 Master Minions
  • 17. ▸Master: i5 CPU PC installed with Kubernetes ▸Minions: Raspberry Pis ▸Network Emulator: Wonder Shaper[1] • WiFi (300 Mbps): stream data among the minions • 4G (150 Mbps): pushing container images to the minions ▸Master executes the module deployment algorithm • MDA algorithm • Optimal algorithm (OPT) using CPLEX[2] for comparisons Experiment Setup 17[1] http://lartc.org/wondershaper/ [2] http://www-03.ibm.com/software/products/en/ibmilogcpleoptistud/
  • 18. ▸Running face detection with/without container • Virtually zero overhead Container Overhead 18
  • 19. ▸Serve 20 requests only needs 9 seconds Fast Deployment Time of the Implemented Testbed 19
  • 20. ▸Largest gap of satisfied requests between the MDA and OPT algorithm is only 2% Near-Optimality of the MDA Algorithm 20 2%
  • 21. ▸20 Requests and 5 Minions • OPT: 80 seconds • MDA < 1 second ▸We conduct another experiment • MDA algorithm computes 1000 requests with 500 minions < 2 seconds The MDA Algorithm Computes in Real Time 21
  • 22. ▸Using ifconfig to measure the network traffics Amount of Network Traffics 22 Image collector Face detector Crowdedness monitor 49.04Mpbs 2.67Mpbs 0.5Mpbs REPORT 49.04Mpbs
  • 23. ▸We implemented a fog computing platform for dynamically deploying modules on fog minions • Formulate the problem and propose an efficient Module Deployment Algorithm (MDA) • Build a real testbed to evaluate our algorithms and the dynamics of the fog computing platform Conclusion 23
  • 24. Q&A

Editor's Notes

  1. Hello everyone , I am Pei Hsuan Tsai from National Thing Hua university, the topic I am going to present is about fog computing
  2. The motivation of this paper is because the internet of things grows rapidly in recent years, you can see IOT every where such like smart home, smart factory or smart city Here is a research result from Gartner, the line chart is below, it says that the number of IOT devices will increase to 20 billions in 2020 So, We can imagine that the incredible amount of data which produced by IOT devices will Overload the data centers and congest the networks really seriously
  3. Just like this, we have IOT devices everywhere now, So the data center has to analyze and compute huge amount of data, since IOT devices send all the data here, Hence, the networks and the data center will be overloaded
  4. To solve this problem, we have a solution We propose an better approach, which pre-process the data produced by IOT devices before transmitting them over the Internet For example, assume we have several raspberry pis as IOT devices, and one of them captures an image, if we send this image directly to the data center, then the size of data will be around 5MG, but if we pre-processing the image in local to get the result first, such like the number of people or the plate of car in this picture, then the size of data will reduce to around 10 Byte According that, we can see the pre-processing idea will reduce the network traffic and the load of data centers significantly
  5. And to achieve the concept of pre-process, we implement the Fog computing platform (記得按動畫) The fog computing extend the devices from colud to the end devices, it leverages devices in data centers , edge networks, such as router, WiFi AP, and end devices, such as laptop and desktop. In this paper, we call the devices as minions and the minions are managed by a centralized controller called master. 你會拉回去 然後說 the minions could be in datacenter, edge networkd, and end devices, such as laptop and desktop… 然後再講 we use raspberry pi to implement the testbed, is because pis is easier to attach the sensors, and the resource of pi is less, more like the normal iot devices
  6. Compare to the cloud, fog computing has several advantages. In the fog, we have many kinds of resources. We can utilize the wasted resources for lower cost. For example, when you are listening my presentation, the resource of your laptop is idling, and we can use those resources to do somthing meaningful in the fog computing Fog computing also has many andvantages like Reduce network traffic, Short response time, Low cost, Low carbon foot print And so on
  7. Fog computing is very powerful and has many advantages To implement the fog computing platform effificiently, we have to solve many challenges, and we pick three import one here first is Different requests need different modules, and we Cannot stick a module on one minion forever so we need a dynamic deployment mechanism second one is the resources of the minionsnare Limited, we should Split requests into smaller modules then Collaborate the minions among one another to finish a request and the last challenge is that amount of requests is Huge, thus, an optimal algorithm to server more requests is required
  8. Let me use an car tracking usage scenario to explain those Challenges today we would like to track a thies car. This is a complex application and cannot be achieved using a single minion in real-time. Hence, we split the application into multiple smaller modules and collaborate among multiple minions to achieve it in almost real-time. ’’’’’’’’’’’ First, left minion captures the images, and because this minions doesn’t have enough resource to recognize the plate so Collaborate with others to finish the job And it also can estimatie the path of thiefs car,After the thief turns right. Left minion may not see the car anymore, so master need to dynamically deploy the image collector module to the bottom minion to continue the tracking ‘’’’’’’’’’’’ This example tells us that dynamic deployment, spliting applications, and module deployment decesions are important in our fog computing platform.
  9. For the first challenge We need a Dynamic Deployment Mechanism to dynamically deploy our module on minions So we use the Virtualized modules because it will be easier to Dynamically placed them and migrates them among the minions Just like we can easily start a virtual machine and move or delete it whenever we want and there are two different types of Virtualized technology: Traditional virtual machine and container I am going to introduce them and compare the pros and cons
  10. the Traditional Virtual Machine, they all Need entire guest operating systems, necessary binaries, and libraries so it consume large storage space and computing power unlike that, container is sort of a Light-Weight VM, it Only requires mandatory services they need and share the same kernel with host, thus it consume less storage space and computing power, it also have the advantage that it can be set-up in a really short time Here is a table compare the size and the startup between Traditional virtual machine and container , you can see the container can start in real time, and only cost a few capacity, so it more suitable for our platform
  11. To manage the containers efficiently, we leverage the existing open-source platforms. Here, we survey three of them. In this paper, we choose the state-of-art paltform -- kubernetes as our based platform.
  12. Let me introduce the Architecture of Kubernetes briefly In kubernetes, the minions are connected to the master and controlled by it Each minion can host several containers, and the containers will be assembled into pod Then , the service is a group of pods that are running on the cluster In other word, we can manage many containers on many minions to server our requests by kubernetes
  13. so, how can we use this Kubernetes-based Fog Computing Platform to server the users requests? This figure shows our data flow in this figure user can send some requests through the UI and our module deployment algorithm calculates the best deployment way then tell the kubernetes to deploy those modules to minions as you can see, some times module will Collaborate and connect with each other to finish a request therefore, we will get the result And what is the module deployment algorithm?
  14. So far, we have a platform to manage the minions, and then we have to make decisions on deploying the modules. Here, we carefully formulate the module deployment problem. The Objective function of this formulation is to maximizes the number of satisfied requests And the Decision variable, if xdm equal one then it means module m is deployed on minion d The yrm is the intermediate variable in Objective function is to determines if module m for requesr r has been deployed This equation means minion should have enough resource to put the module And the last equation means module m will only be deployed on a device
  15. and there is the sudocode which achieves the problem formulation I just mentioned First. We decides the order of requests. Let the request which has less modules to be deployed first. time complexity is r log r Then The for-loop iterates through all sorted requests which cost r time complexity In this loop we decides the order and choosing the feasible devices to equally deploy the modules, which cost d log d complexity. After that we checks the violation of the resource constraint in every minions of every modules and it cost DM time complexity So the final time complexity is like this, is polynomial time!
  16. After I explain all the challenges we have and how we conquer them, Let us see the real work of platform, this is an Implementation We split an Crowdedness application into three modules: Image collector,Face detector,Crowdedness monitor Image collector module will capture the image and send it to Face detector module to detect how may head in the picture, then Face detector module will send the number to Crowdedness monitor module, which is a web site for monitor the history record of the people number in the room
  17. And the following is the experiment setup we use i5 CPU PC which installed with Kubernetes as the master Serveral Raspberry Pis as Minions for the Network Emulator we use Wonder Shaper to constrain the bandwidth and use the Optimal algorithm to compare with our MDA algorithm
  18. Ok, here comes the result, this is the analyze to compare the efficiency between bare machines and containers we Running face detection module with or without container to measuring the Container Overhead, and found Almost zero overhead: resource usage and processing time are almost the same
  19. Because of the serveral advantages of containers we can set up the modules in real time, it only needs 9 seconds to Serve 20 requests
  20. and here shows the optimality of our MDA it shows the largest gap of satisfied requests between the our MDA and OPT algorithm is only 2%. ???????????????
  21. But OPT algorithm takes 80 seconds to solve 20 requests, while the MDA algorithm computes it in real time (< 1 second). Which means our Algorithm can cost less time and resources but finsh the job as good as OPT algorithm We also conduct another experiment Which reveal that MDA algorithm can compute 1000 requests with 500 devices in 2 seconds
  22. Let me use this experiment result to summarize my presentation. So, we have three modules and our MDA algorithm will decide how to depoly them on minions. If we use traditional way, we send the whole image to the datacenter, which consume large amount of network traffics. If we use our fog computing approach, we pre-process the image among the minions and finally send the small report to the datacenter, which reduce large amount of network traffics.
  23. so there is the conclusion of our paper We implemented a fog computing platform for dynamically deploying modules on fog minions we Formulate the problem and propose an efficient Module Deployment Algorithm (MDA) we also Build a real testbed to evaluate our algorithms and the dynamics of the fog computing platform
  24. 你會拉回去 然後說 the minions could be in datacenter, edge networkd, and end devices, such as laptop and desktop… 然後再講 we use raspberry pi to implement the testbed, is because pis is easier to attach the sensors, and the resource of pi is less, more like the normal iot devices