SlideShare a Scribd company logo
Edge computing offloading:
status & perspectives


C. Cicconetti

Ubiquitous Internet research group

http://cnd.iit.cnr.it/
C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/
Multi-access edge computing
Three-tier model: cloud + edge + clients
A small taxonomy of
edge computing
applications
based on whether the data originates from (client vs. cloud)
and the final destination/consumer is the (client vs. cloud)
C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/
Applications
offloading = the application executes entirely on a VM/container in the edge

delegation = the application surrenders (some of its) computations to the edge
OUT: client OUT: cloud
IN: client Offloading / delegation Aggregation
IN: cloud Caching N/A
VM = virtual machine
C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/
Examples
• Offloading
• User with mobile phone camera takes a video. The latter usually must be
transcoded before upload to social media. The MNO offers a transcoding
service on the BS, which relieves the mobile phone from the burden of running
computational-intensive (= energy consuming) tasks

• Caching
• MNO hosts content distribution nodes (similar to CDN)

• Aggregation
• User continuously produces data (e.g. sensors running a telemetry
application). Not all data are really needed for historical reasons (e.g. a
humidity sensor producing the same value for hours). Aggregation happens in
the edge (e.g. only changes are sent to the cloud)
MNO = mobile network operator, BS = base station, CDN = content distribution network
C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/
Benefits
End user’s perspective
OUT: client OUT: cloud
IN: client
Less energy consumption 



(than doing computations
on device)
More privacy/control


(than using a public
cloud)
IN: cloud
Less latency



(than using a remote data
center)
N/A
C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/
Benefits
Operator’s perspective
OUT: client OUT: cloud
IN: client Better user analytics (?) Less outbound traffic
IN: cloud Less inbound traffic N/A
C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/
Analysis
A. Aggregation / caching

• Firm & significant benefits to the operator

• Less pronounced benefits to the user

B. Computation offloading / delegation

• Direct benefits to the operator are uncertain

• Benefits to the user may vanish in the future (next slide)
Quiz time: which

will be done first?
C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/
Extrapolation
• Computational power of servers has reached its peak long ago

• On the other hand, battery-power SoC devices (mobile phones and alike) are still
ramping up, esp. for specialised applications that can benefit from dedicated engines

• Eg. image processing on a server may be more (energy) efficient today, but what
about tomorrow?

• If this benefit disappears, what other reasons could we have to delegate
computations to the edge? Plenty of reasons not to:

• Communication overhead

• Transfer latency

• Risky process (many parties involved)

• Privacy issues
Is this the end of
computation offloading/
delegation*?
(spoiler: no)
(*) before it even started properly
C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/
Future applications!
• There are many devices for which outsourcing
computations is the only way to perform non-trivial
operations:

• Smart glasses/contact lenses

• Smart objects

• Smart watches

• <add your own>
Sources: Popular Science (contact lenses); Wikipedia (others)
C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/
TL;DR
• Computation offloading / delegation

• The right thing, for the wrong reasons (so far)

• In the future: may be the only option for many device
types / applications

• What should we do then?

• More research on simple plug&play mechanism to
support devices with no on-board computation at all
End of presentation

More Related Content

What's hot

Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
Deepak Upadhyay
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
Muhammad Zubair
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
Cloudflare
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
Aladdin Dandis
 
Fog computing
Fog computingFog computing
Fog computing
Ayush Chaurasia
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
Vikas Yadav
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
123seminarsonly
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
Thushara92
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
ChandanChandu928137
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
IOT Security
IOT SecurityIOT Security
IOT Security
Sylvain Martinez
 
Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
sreelesh balan
 
IoT Security
IoT SecurityIoT Security
IoT Security
Peter Waher
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
DrSamsonChepuri1
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
nadikari123
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security & Hygine
Cyber Security & HygineCyber Security & Hygine
Cyber Security & Hygine
Amit Arya
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
Security Bootcamp
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 

What's hot (20)

Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
Fog computing
Fog computingFog computing
Fog computing
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
Cyber Security & Hygine
Cyber Security & HygineCyber Security & Hygine
Cyber Security & Hygine
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 

Similar to Edge computing offloading: status & perspectives

IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
IRJET Journal
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
IRJET Journal
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
Rezgar Mohammad
 
Design and emulation tools for serverless edge computing
Design and emulation tools for serverless edge computingDesign and emulation tools for serverless edge computing
Design and emulation tools for serverless edge computing
IIT CNR
 
Edge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-timeEdge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-time
Shuquan Huang
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
Sabidur Rahman
 
Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energy
IEEEFINALYEARPROJECTS
 
Global C4IR-1 Masterclass Adryan - Zuehlke Engineering 2017
Global C4IR-1 Masterclass Adryan - Zuehlke Engineering 2017Global C4IR-1 Masterclass Adryan - Zuehlke Engineering 2017
Global C4IR-1 Masterclass Adryan - Zuehlke Engineering 2017
Justin Hayward
 
Edge Computing: Drivers and Trends
Edge Computing: Drivers and TrendsEdge Computing: Drivers and Trends
Edge Computing: Drivers and Trends
Nitin Kumar, CMAA, CMC, CITM, iCEO
 
Optimization of Fog computing for Industrial IoT applications
Optimization of Fog computing for Industrial IoT applicationsOptimization of Fog computing for Industrial IoT applications
Optimization of Fog computing for Industrial IoT applications
Sabelo Dlamini
 
An emulation framework for IoT, Fog, and Edge Applications
An emulation framework for IoT, Fog, and Edge ApplicationsAn emulation framework for IoT, Fog, and Edge Applications
An emulation framework for IoT, Fog, and Edge Applications
MoysisSymeonides
 
Best Practices to Secure Containerized Apps with Next-Gen WAF
Best Practices to Secure Containerized Apps with Next-Gen WAFBest Practices to Secure Containerized Apps with Next-Gen WAF
Best Practices to Secure Containerized Apps with Next-Gen WAF
DevOps.com
 
Digital Twins Case Study in CPG Industry
Digital Twins Case Study in CPG IndustryDigital Twins Case Study in CPG Industry
Digital Twins Case Study in CPG Industry
Shruti Chaurasia
 
POV - Digital Twins Technology in CPG Industry.pdf
POV - Digital Twins Technology in CPG Industry.pdfPOV - Digital Twins Technology in CPG Industry.pdf
POV - Digital Twins Technology in CPG Industry.pdf
Shruti Chaurasia
 
Edge computing
Edge computingEdge computing
Edge computing
pramiidhaaavula
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
FredReynolds2
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
FBK CREATE-NET
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
Upender Upr
 
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Boris Adryan
 
IRJET - An Overview of Edge Computing
IRJET - An Overview of Edge ComputingIRJET - An Overview of Edge Computing
IRJET - An Overview of Edge Computing
IRJET Journal
 

Similar to Edge computing offloading: status & perspectives (20)

IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
 
IRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational LeapIRJET- Edge Computing the Next Computational Leap
IRJET- Edge Computing the Next Computational Leap
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
 
Design and emulation tools for serverless edge computing
Design and emulation tools for serverless edge computingDesign and emulation tools for serverless edge computing
Design and emulation tools for serverless edge computing
 
Edge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-timeEdge optimized architecture for fabric defect detection in real-time
Edge optimized architecture for fabric defect detection in real-time
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
 
Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energy
 
Global C4IR-1 Masterclass Adryan - Zuehlke Engineering 2017
Global C4IR-1 Masterclass Adryan - Zuehlke Engineering 2017Global C4IR-1 Masterclass Adryan - Zuehlke Engineering 2017
Global C4IR-1 Masterclass Adryan - Zuehlke Engineering 2017
 
Edge Computing: Drivers and Trends
Edge Computing: Drivers and TrendsEdge Computing: Drivers and Trends
Edge Computing: Drivers and Trends
 
Optimization of Fog computing for Industrial IoT applications
Optimization of Fog computing for Industrial IoT applicationsOptimization of Fog computing for Industrial IoT applications
Optimization of Fog computing for Industrial IoT applications
 
An emulation framework for IoT, Fog, and Edge Applications
An emulation framework for IoT, Fog, and Edge ApplicationsAn emulation framework for IoT, Fog, and Edge Applications
An emulation framework for IoT, Fog, and Edge Applications
 
Best Practices to Secure Containerized Apps with Next-Gen WAF
Best Practices to Secure Containerized Apps with Next-Gen WAFBest Practices to Secure Containerized Apps with Next-Gen WAF
Best Practices to Secure Containerized Apps with Next-Gen WAF
 
Digital Twins Case Study in CPG Industry
Digital Twins Case Study in CPG IndustryDigital Twins Case Study in CPG Industry
Digital Twins Case Study in CPG Industry
 
POV - Digital Twins Technology in CPG Industry.pdf
POV - Digital Twins Technology in CPG Industry.pdfPOV - Digital Twins Technology in CPG Industry.pdf
POV - Digital Twins Technology in CPG Industry.pdf
 
Edge computing
Edge computingEdge computing
Edge computing
 
The Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingThe Future of Fog Computing and IoT: Revolutionizing Data Processing
The Future of Fog Computing and IoT: Revolutionizing Data Processing
 
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
Mehr und schneller ist nicht automatisch besser - data2day, 06.10.16
 
IRJET - An Overview of Edge Computing
IRJET - An Overview of Edge ComputingIRJET - An Overview of Edge Computing
IRJET - An Overview of Edge Computing
 

More from IIT CNR

Low-latency distributed computation offloading for pervasive environments
Low-latency distributed computation offloading for pervasive environmentsLow-latency distributed computation offloading for pervasive environments
Low-latency distributed computation offloading for pervasive environments
IIT CNR
 
5G Outlook on Challenges and Technologies for the Future Network Architectures
5G Outlook on Challenges and Technologies for the Future Network Architectures5G Outlook on Challenges and Technologies for the Future Network Architectures
5G Outlook on Challenges and Technologies for the Future Network Architectures
IIT CNR
 
How to tame densification of wireless networks with SDN/NFV
How to tame densification of wireless networks with SDN/NFVHow to tame densification of wireless networks with SDN/NFV
How to tame densification of wireless networks with SDN/NFV
IIT CNR
 
The Road towards Wireless Dense & Heterogeneous Networks: The CROWD Perspective
The Road towards Wireless Dense & Heterogeneous Networks: The CROWD PerspectiveThe Road towards Wireless Dense & Heterogeneous Networks: The CROWD Perspective
The Road towards Wireless Dense & Heterogeneous Networks: The CROWD Perspective
IIT CNR
 
Presentation short 2012
Presentation short 2012Presentation short 2012
Presentation short 2012
IIT CNR
 
Wowmom panel-claudio-2013
Wowmom panel-claudio-2013Wowmom panel-claudio-2013
Wowmom panel-claudio-2013
IIT CNR
 

More from IIT CNR (6)

Low-latency distributed computation offloading for pervasive environments
Low-latency distributed computation offloading for pervasive environmentsLow-latency distributed computation offloading for pervasive environments
Low-latency distributed computation offloading for pervasive environments
 
5G Outlook on Challenges and Technologies for the Future Network Architectures
5G Outlook on Challenges and Technologies for the Future Network Architectures5G Outlook on Challenges and Technologies for the Future Network Architectures
5G Outlook on Challenges and Technologies for the Future Network Architectures
 
How to tame densification of wireless networks with SDN/NFV
How to tame densification of wireless networks with SDN/NFVHow to tame densification of wireless networks with SDN/NFV
How to tame densification of wireless networks with SDN/NFV
 
The Road towards Wireless Dense & Heterogeneous Networks: The CROWD Perspective
The Road towards Wireless Dense & Heterogeneous Networks: The CROWD PerspectiveThe Road towards Wireless Dense & Heterogeneous Networks: The CROWD Perspective
The Road towards Wireless Dense & Heterogeneous Networks: The CROWD Perspective
 
Presentation short 2012
Presentation short 2012Presentation short 2012
Presentation short 2012
 
Wowmom panel-claudio-2013
Wowmom panel-claudio-2013Wowmom panel-claudio-2013
Wowmom panel-claudio-2013
 

Recently uploaded

BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
gaafergoudaay7aga
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
riddhimaagrawal986
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 

Recently uploaded (20)

BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 

Edge computing offloading: status & perspectives

  • 1. Edge computing offloading: status & perspectives 
 C. Cicconetti Ubiquitous Internet research group http://cnd.iit.cnr.it/
  • 2. C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/ Multi-access edge computing Three-tier model: cloud + edge + clients
  • 3. A small taxonomy of edge computing applications based on whether the data originates from (client vs. cloud) and the final destination/consumer is the (client vs. cloud)
  • 4. C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/ Applications offloading = the application executes entirely on a VM/container in the edge
 delegation = the application surrenders (some of its) computations to the edge OUT: client OUT: cloud IN: client Offloading / delegation Aggregation IN: cloud Caching N/A VM = virtual machine
  • 5. C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/ Examples • Offloading • User with mobile phone camera takes a video. The latter usually must be transcoded before upload to social media. The MNO offers a transcoding service on the BS, which relieves the mobile phone from the burden of running computational-intensive (= energy consuming) tasks • Caching • MNO hosts content distribution nodes (similar to CDN) • Aggregation • User continuously produces data (e.g. sensors running a telemetry application). Not all data are really needed for historical reasons (e.g. a humidity sensor producing the same value for hours). Aggregation happens in the edge (e.g. only changes are sent to the cloud) MNO = mobile network operator, BS = base station, CDN = content distribution network
  • 6. C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/ Benefits End user’s perspective OUT: client OUT: cloud IN: client Less energy consumption 
 
 (than doing computations on device) More privacy/control 
 (than using a public cloud) IN: cloud Less latency
 
 (than using a remote data center) N/A
  • 7. C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/ Benefits Operator’s perspective OUT: client OUT: cloud IN: client Better user analytics (?) Less outbound traffic IN: cloud Less inbound traffic N/A
  • 8. C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/ Analysis A. Aggregation / caching • Firm & significant benefits to the operator • Less pronounced benefits to the user B. Computation offloading / delegation • Direct benefits to the operator are uncertain • Benefits to the user may vanish in the future (next slide) Quiz time: which
 will be done first?
  • 9. C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/ Extrapolation • Computational power of servers has reached its peak long ago • On the other hand, battery-power SoC devices (mobile phones and alike) are still ramping up, esp. for specialised applications that can benefit from dedicated engines • Eg. image processing on a server may be more (energy) efficient today, but what about tomorrow? • If this benefit disappears, what other reasons could we have to delegate computations to the edge? Plenty of reasons not to: • Communication overhead • Transfer latency • Risky process (many parties involved) • Privacy issues
  • 10. Is this the end of computation offloading/ delegation*? (spoiler: no) (*) before it even started properly
  • 11. C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/ Future applications! • There are many devices for which outsourcing computations is the only way to perform non-trivial operations: • Smart glasses/contact lenses • Smart objects • Smart watches • <add your own> Sources: Popular Science (contact lenses); Wikipedia (others)
  • 12. C. Cicconetti, IIT-CNR, Ubiquitous Internet research group, http://cnd.iit.cnr.it/ TL;DR • Computation offloading / delegation • The right thing, for the wrong reasons (so far) • In the future: may be the only option for many device types / applications • What should we do then? • More research on simple plug&play mechanism to support devices with no on-board computation at all