SlideShare a Scribd company logo
Sponsored by:
EETimes University Course:
Mastering IoT Design: Sense, Process, Connect
Day 2: Processing: Turning IoT Data into Intelligence
Presented by:
Deepak Shankar
Founder and Vice President, Technology
Mirabilis Design Inc.
1
Sponsored by:
Our Speaker:
2
Deepak Shankar
Founder and Vice President, Technology
Mirabilis Design Inc.
Sponsored by:
Agenda
Introduction to processing at
Edge Computing
Trends
Challenges
Case Study and Analysis
Conclusion
3
Sponsored by:
Enabling Data Center Connected Devices
• 50 billion IoT devices generate 79.4ZB requires
– Huge bandwidth
– Massive and expensive cloud processing
– 99.999% reliability
– Cybersecurity
– Variable response latency
• Solution: Edge Computing
– Process and analyze data locally
– Make instant decisions
• Applications that benefit from Edge Computing
– Safety, health care, security, autonomous vehicles,
smart cities
– Manufacturing, VR, AR, stream services, customer care
– Smart homes
4
Sponsored by:
Architecture of Edge Computing
• Edge computing is at the
outermost edge of network
• Sensor data is collected,
filtered, compressed, and
encrypted locally and a
small quantity is sent to the
cloud
• Network transfer can be
done in batch or offline
• Increases the number of
processing layers
• Server location is critical
• Tracking and diagnostic is
critical and adds layers
5
Sponsored by:
Trends
• Edge gateway separates the processing and end-point
– Increases the battery life of the connected devices
– Add more sensors and trackers at the device
• Example
– Smart electricity meters generate lots of measurements at short intervals
– Using data from temperature, light and other sensors, Edge Computing can respond to
environment changes quickly, reducing operational cost and increasing comfort
• Filtering edge data reduces cloud transfers, which increases battery life
• Example
– Mercedes AMG F1 team filters less valuable telemetry and transfers relevant data for offline
processing
6
Sponsored by:
Trends
• There is no “single” edge
– Depending on the application, the edge architecture will be different
– Manufacturing plant [Edge servers and gateways aggregate multiple
servers and devices in a distributed location]
– Telecommunications provider [architectures break down into a provider far
edge, a provider access edge, and a provider aggregation edge]
• Edge computing doesn’t need to be connected
– An edge device running autonomously in a hard-to-reach place like a rural
mining site can keep running when a connection drops
– When connection resumes, the system can sync and transfer data
7
Sponsored by:
Computing Trends
• Edge is getting “foggy”
– Fog computing adds a new filtering layer
– Example
• Temperature sensor generates data every one second
• With fog layer, data that meet the metrics are sent to cloud
• Advanced communication and AI technology enable mass
connection
– Wi-Fi 6 and 5G/6G covers most edge devices
– About 99.4% of the physical objects are still unconnected
8
Sponsored by:
Challenges
• Latency (Response times)
– Applications, like the health care, financial transactions, and automotive
cannot tolerate latency
– Stringent requirements need to be met and thus the components need to be
selected to meet such needs
• Bandwidth
– Applications, like Smart surveillance systems and traffic management,
require significant bandwidth
– Buffer overflow, retransmissions can severely affect application performance
9
Sponsored by:
Challenges
• Edge has same cyber risk as any other local network
server
– “AT&T Cybersecurity Insights report: Securing the Edge” found
that 74% of businesses have been compromised
– Sniffing attacks, DDoS, supply chain attacks, etc.
• Power
– Edge servers rely on battery as their primary power source
– IoT device batteries are not easily replaceable
• Fire alarm sensors, underwater sensors, wildlife tracking devices,
medical implants, space and satellite devices
10
Sponsored by:
Designing Edge Computing Requires Early Architecture
Planning
• Early system model can eliminate bottlenecks and measure
– Processing requirements
– Expected application latency
– Required bandwidth for seamless operation
– Power profile of the edge devices
– Behavior of the system under different failure conditions and threats
• To enable this, the system modeling solution requires IP libraries and
simulators for hardware, software, and network
– VisualSim Architect from Mirabilis Design ticks all the boxes
Sponsored by:
Why is System Performance Exploration Required?
Scheduling/Arbitration
proportional
share
WFQ
static
dynamic
fixed priority
EDF
TDMA
FCFS
Communication Templates
Architecture # 1 Architecture # 2
Computation Templates
DSP
AI
GPU
DRAM
CPU
FPGA
m
E
DSP
TDMA
Priority
EDF
WFQ
RISC
DSP
LookUp
Cipher
AI DS
P
CPU
GP
U
mE DD
R
static
Which architecture is better suited
for our application?
12
Sponsored by:
Block Diagram of Data-Enabled Application
Device 1
AFE
ARM/
RISC-V
core
BLE/
Wifi/ 5G
Radio
Transceiv
er
Network
Hub
[Edge Gateways
+ Fog layers]
Data
Center
Sponsored by:
IoT to Data Center Model
• Power consumption of each
device
• Optimal HW and SW
configuration to meet the end-to-
end application timing deadline
• Performance with Big data and
fast data workloads
14
Sponsored by:
Architect Hardware-Software of Edge Device
DRAM
Display
IO
A
M
B
A
A
X
I
B
u
s
CPU
GPU
Display
Ctrl
P
C
I
e
Video Camera SRAM
Packet
• System Overview
– Camera: 30fps, VGA corresponds
– CPU: Multi-core ARM Cortex-A53 1.2GHz
– GPU: 64Cores(8Warps×8PEs), 32Threads,
1GHz
– DisplayCtrl: DisplayBuffer 293,888Byte
– SRAM: SDR, 64MB, 1.0GHz
– DRAM: DDR3, 64MB, 2.4GHz
Explore at the board- and semiconductor-level to size uP/GPU, memory bandwidth and bus/switch configuration
15
Sponsored by:
Conducting Architecture Trade-off
• By changing the amount of video input data (packet numbers), observe the SRAM -> DRAM
transfer performance and examine the upper limit performance of the video input that the
system can tolerate. 210 packets/s
12ms
21 packets/s
414us
300 packets/s
• 250 packets/s is the system limit
• With 300 packets/s, simulation cannot
be executed due to FIFO buffer
overflow.
16
Sponsored by:
Compare Edge Compute System using ARM vs RISC-V
Processors
Using ARM Cores Using RISC-V Cores
NOTE: Depending on the application profile run, the performance and power observed would
vary
• Compare application latency with and without custom instructions tailored for AI
and data filtering
• Average power consumption in different scenarios
17
Sponsored by:
Selecting Network Interface to Data Center
Using 1000 Mbps links 1000 Mbps link + Edge Processing (Single- and multi-core)
Sizing of network resources to Edge devices is important to get optimal performance
18
Sponsored by:
Bluetooth (BLE) Power State Transition (FSM)
• Depending on the
abstraction required,
the subsystems can
be built with great
details
• Here, Bluetooth
module has been
modeled with all the
state transition
details
19
Sponsored by:
Resource usage
extremely high due
to continued high
traffic levels
Security against DDoS Attack on Edge and Networks
A DDoS attack involves multiple
connected devices, collectively
known as a botnet, which are used to
overwhelm a target vehicle with
fake/malicious traffic.
• Virtually emulating the system behavior using DDoS attack technique
• Simulation methodology is designed to test automotive systems for cybersecurity
and safety that are under development
• Undertake Risk Assessment on network simulation to predict how the interaction of
restrictions and behavior may affect overall network hygiene
• Moreover, testing multiple potential settings can aid in finding a near-optimal
configuration for restrictions
• The above design analyzes the overall throughput and latency on the network under
attack.
High Delay in processing
request result in low
throughput
What is
DDoS?
DDoS Attack
Outcomes ?
Analyze the
System Design
and find best
optimal
configuration
High Resource Usage
due to Attacks on On-
Board Units. Unable to
discern between normal
and attack traffic
OB
U
Diagnostic
20
Sponsored by:
Failure and Cybersecurity Threat Analysis
Normal Operation Under Attack
Effective
throughput is
reduced and
significant bursts
in response times
are observed
21
Sponsored by:
Evaluate Bottlenecks and Security Threats
Stable
Response
Time
Malicious Devices are Blacklisted
Without
Firewall
With
Firewall
22
22
Sponsored by:
Edge Computing Architecture is Key for Data Intelligence
• System exploration must be performed during the planning stage
• Distribution of processing to IoT, edge, fog, and data center must
be based on the application requirements
• Edge, Network, and IoT System specification must be fully
validated for both power-performance and failure-security
• Data size, processing needs, and software tasks must be
determined in advance
• System must be scalable for future requirements
• Edge computing is the Future
Sponsored by:
About Mirabilis Design
Software Company based in Silicon Valley
Integrates Model-based Systems Engineering with the electronics
development flow
Development and Support Centers
USA, India, China, South Korea, Japan and Europe
VisualSim Architect - Modeling and Simulation Software
Graphical modeling, multi-domain simulator, system-level IP, analysis tools and
open API
Market Segments
Semiconductors, Automotive and, Aerospace and Defense
Design Enablement
Architecture trade-offs, system validation, early functional testing and
communication
Networking
24
Sponsored by:
Q&A
25

More Related Content

Similar to Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data into Intelligence

EDGE devices_ ERTOS_ IOT_ presentation_P.pptx
EDGE devices_ ERTOS_ IOT_ presentation_P.pptxEDGE devices_ ERTOS_ IOT_ presentation_P.pptx
EDGE devices_ ERTOS_ IOT_ presentation_P.pptx
National Institute of Technolgy(REC) warangal
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
SUSE
 
Design of network
Design of networkDesign of network
Design of network
Aniruddh Brahmbhatt
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
Eurotech
 
edge computing.pptx
edge computing.pptxedge computing.pptx
edge computing.pptx
ANANDHUPILLAI1
 
Edge Computing TS.pptx
Edge Computing TS.pptxEdge Computing TS.pptx
Edge Computing TS.pptx
Milanap1
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Ultimate Guide to Edge Computing!!
Ultimate Guide to Edge Computing!!Ultimate Guide to Edge Computing!!
Ultimate Guide to Edge Computing!!
DigitalThinkerHelp
 
PME 2021 Design & Quote.pptx
PME 2021 Design & Quote.pptxPME 2021 Design & Quote.pptx
PME 2021 Design & Quote.pptx
NavedKhan659845
 
Data centers on the Edge
Data centers on the EdgeData centers on the Edge
Data centers on the Edge
Schneider Electric
 
DiseĂąo de red isp cisco
DiseĂąo de red isp ciscoDiseĂąo de red isp cisco
DiseĂąo de red isp cisco
Jheyson Ayala
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
Sabidur Rahman
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
Naved Ahmed
 
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...EuroCloud
 
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonIoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
Eurotech
 
Evolution of internet by Ali Kashif
Evolution of internet  by Ali KashifEvolution of internet  by Ali Kashif
Evolution of internet by Ali Kashif
Ali Kashif Bashir. Ph.D, MIEEE
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
The IOT Academy
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
DellNMS
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
NguyenLong773850
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdf
freddysarabia1
 

Similar to Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data into Intelligence (20)

EDGE devices_ ERTOS_ IOT_ presentation_P.pptx
EDGE devices_ ERTOS_ IOT_ presentation_P.pptxEDGE devices_ ERTOS_ IOT_ presentation_P.pptx
EDGE devices_ ERTOS_ IOT_ presentation_P.pptx
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
 
Design of network
Design of networkDesign of network
Design of network
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
 
edge computing.pptx
edge computing.pptxedge computing.pptx
edge computing.pptx
 
Edge Computing TS.pptx
Edge Computing TS.pptxEdge Computing TS.pptx
Edge Computing TS.pptx
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Ultimate Guide to Edge Computing!!
Ultimate Guide to Edge Computing!!Ultimate Guide to Edge Computing!!
Ultimate Guide to Edge Computing!!
 
PME 2021 Design & Quote.pptx
PME 2021 Design & Quote.pptxPME 2021 Design & Quote.pptx
PME 2021 Design & Quote.pptx
 
Data centers on the Edge
Data centers on the EdgeData centers on the Edge
Data centers on the Edge
 
DiseĂąo de red isp cisco
DiseĂąo de red isp ciscoDiseĂąo de red isp cisco
DiseĂąo de red isp cisco
 
Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
Fernando Loureiro Presentation / CloudViews.Org - Cloud Computing Conference ...
 
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonIoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
 
Evolution of internet by Ali Kashif
Evolution of internet  by Ali KashifEvolution of internet  by Ali Kashif
Evolution of internet by Ali Kashif
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdf
 

More from Deepak Shankar

How to achieve 95%+ Accurate power measurement during architecture exploration?
How to achieve 95%+ Accurate power measurement during architecture exploration? How to achieve 95%+ Accurate power measurement during architecture exploration?
How to achieve 95%+ Accurate power measurement during architecture exploration?
Deepak Shankar
 
Mirabilis_Design AMD Versal System-Level IP Library
Mirabilis_Design AMD Versal System-Level IP LibraryMirabilis_Design AMD Versal System-Level IP Library
Mirabilis_Design AMD Versal System-Level IP Library
Deepak Shankar
 
Modeling Abstraction
Modeling AbstractionModeling Abstraction
Modeling Abstraction
Deepak Shankar
 
Accelerated development in Automotive E/E Systems using VisualSim Architect
Accelerated development in Automotive E/E Systems using VisualSim ArchitectAccelerated development in Automotive E/E Systems using VisualSim Architect
Accelerated development in Automotive E/E Systems using VisualSim Architect
Deepak Shankar
 
Evaluating UCIe based multi-die SoC to meet timing and power
Evaluating UCIe based multi-die SoC to meet timing and power Evaluating UCIe based multi-die SoC to meet timing and power
Evaluating UCIe based multi-die SoC to meet timing and power
Deepak Shankar
 
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERSROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
Deepak Shankar
 
Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021
Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021
Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021
Deepak Shankar
 
Energy efficient AI workload partitioning on multi-core systems
Energy efficient AI workload partitioning on multi-core systemsEnergy efficient AI workload partitioning on multi-core systems
Energy efficient AI workload partitioning on multi-core systems
Deepak Shankar
 
Capacity Planning and Power Management of Data Centers.
Capacity Planning and Power Management of Data Centers. Capacity Planning and Power Management of Data Centers.
Capacity Planning and Power Management of Data Centers.
Deepak Shankar
 
Automotive network and gateway simulation
Automotive network and gateway simulationAutomotive network and gateway simulation
Automotive network and gateway simulation
Deepak Shankar
 
Introduction to architecture exploration
Introduction to architecture explorationIntroduction to architecture exploration
Introduction to architecture exploration
Deepak Shankar
 
Using ai for optimal time sensitive networking in avionics
Using ai for optimal time sensitive networking in avionicsUsing ai for optimal time sensitive networking in avionics
Using ai for optimal time sensitive networking in avionics
Deepak Shankar
 
Designing memory controller for ddr5 and hbm2.0
Designing memory controller for ddr5 and hbm2.0Designing memory controller for ddr5 and hbm2.0
Designing memory controller for ddr5 and hbm2.0
Deepak Shankar
 
Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...
Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...
Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...
Deepak Shankar
 
Develop High-bandwidth/low latency electronic systems for AI/ML application
Develop High-bandwidth/low latency electronic systems for AI/ML applicationDevelop High-bandwidth/low latency electronic systems for AI/ML application
Develop High-bandwidth/low latency electronic systems for AI/ML application
Deepak Shankar
 
Webinar on Latency and throughput computation of automotive EE network
Webinar on Latency and throughput computation of automotive EE networkWebinar on Latency and throughput computation of automotive EE network
Webinar on Latency and throughput computation of automotive EE network
Deepak Shankar
 
Webinar on radar
Webinar on radarWebinar on radar
Webinar on radar
Deepak Shankar
 
Webinar on RISC-V
Webinar on RISC-VWebinar on RISC-V
Webinar on RISC-V
Deepak Shankar
 
System Architecture Exploration Training Class
System Architecture Exploration Training ClassSystem Architecture Exploration Training Class
System Architecture Exploration Training Class
Deepak Shankar
 
Exploration of Radars and Software Defined Radios using VisualSim
Exploration of  Radars and Software Defined Radios using VisualSimExploration of  Radars and Software Defined Radios using VisualSim
Exploration of Radars and Software Defined Radios using VisualSim
Deepak Shankar
 

More from Deepak Shankar (20)

How to achieve 95%+ Accurate power measurement during architecture exploration?
How to achieve 95%+ Accurate power measurement during architecture exploration? How to achieve 95%+ Accurate power measurement during architecture exploration?
How to achieve 95%+ Accurate power measurement during architecture exploration?
 
Mirabilis_Design AMD Versal System-Level IP Library
Mirabilis_Design AMD Versal System-Level IP LibraryMirabilis_Design AMD Versal System-Level IP Library
Mirabilis_Design AMD Versal System-Level IP Library
 
Modeling Abstraction
Modeling AbstractionModeling Abstraction
Modeling Abstraction
 
Accelerated development in Automotive E/E Systems using VisualSim Architect
Accelerated development in Automotive E/E Systems using VisualSim ArchitectAccelerated development in Automotive E/E Systems using VisualSim Architect
Accelerated development in Automotive E/E Systems using VisualSim Architect
 
Evaluating UCIe based multi-die SoC to meet timing and power
Evaluating UCIe based multi-die SoC to meet timing and power Evaluating UCIe based multi-die SoC to meet timing and power
Evaluating UCIe based multi-die SoC to meet timing and power
 
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERSROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
 
Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021
Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021
Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021
 
Energy efficient AI workload partitioning on multi-core systems
Energy efficient AI workload partitioning on multi-core systemsEnergy efficient AI workload partitioning on multi-core systems
Energy efficient AI workload partitioning on multi-core systems
 
Capacity Planning and Power Management of Data Centers.
Capacity Planning and Power Management of Data Centers. Capacity Planning and Power Management of Data Centers.
Capacity Planning and Power Management of Data Centers.
 
Automotive network and gateway simulation
Automotive network and gateway simulationAutomotive network and gateway simulation
Automotive network and gateway simulation
 
Introduction to architecture exploration
Introduction to architecture explorationIntroduction to architecture exploration
Introduction to architecture exploration
 
Using ai for optimal time sensitive networking in avionics
Using ai for optimal time sensitive networking in avionicsUsing ai for optimal time sensitive networking in avionics
Using ai for optimal time sensitive networking in avionics
 
Designing memory controller for ddr5 and hbm2.0
Designing memory controller for ddr5 and hbm2.0Designing memory controller for ddr5 and hbm2.0
Designing memory controller for ddr5 and hbm2.0
 
Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...
Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...
Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...
 
Develop High-bandwidth/low latency electronic systems for AI/ML application
Develop High-bandwidth/low latency electronic systems for AI/ML applicationDevelop High-bandwidth/low latency electronic systems for AI/ML application
Develop High-bandwidth/low latency electronic systems for AI/ML application
 
Webinar on Latency and throughput computation of automotive EE network
Webinar on Latency and throughput computation of automotive EE networkWebinar on Latency and throughput computation of automotive EE network
Webinar on Latency and throughput computation of automotive EE network
 
Webinar on radar
Webinar on radarWebinar on radar
Webinar on radar
 
Webinar on RISC-V
Webinar on RISC-VWebinar on RISC-V
Webinar on RISC-V
 
System Architecture Exploration Training Class
System Architecture Exploration Training ClassSystem Architecture Exploration Training Class
System Architecture Exploration Training Class
 
Exploration of Radars and Software Defined Radios using VisualSim
Exploration of  Radars and Software Defined Radios using VisualSimExploration of  Radars and Software Defined Radios using VisualSim
Exploration of Radars and Software Defined Radios using VisualSim
 

Recently uploaded

Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 

Recently uploaded (20)

Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 

Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data into Intelligence

  • 1. Sponsored by: EETimes University Course: Mastering IoT Design: Sense, Process, Connect Day 2: Processing: Turning IoT Data into Intelligence Presented by: Deepak Shankar Founder and Vice President, Technology Mirabilis Design Inc. 1
  • 2. Sponsored by: Our Speaker: 2 Deepak Shankar Founder and Vice President, Technology Mirabilis Design Inc.
  • 3. Sponsored by: Agenda Introduction to processing at Edge Computing Trends Challenges Case Study and Analysis Conclusion 3
  • 4. Sponsored by: Enabling Data Center Connected Devices • 50 billion IoT devices generate 79.4ZB requires – Huge bandwidth – Massive and expensive cloud processing – 99.999% reliability – Cybersecurity – Variable response latency • Solution: Edge Computing – Process and analyze data locally – Make instant decisions • Applications that benefit from Edge Computing – Safety, health care, security, autonomous vehicles, smart cities – Manufacturing, VR, AR, stream services, customer care – Smart homes 4
  • 5. Sponsored by: Architecture of Edge Computing • Edge computing is at the outermost edge of network • Sensor data is collected, filtered, compressed, and encrypted locally and a small quantity is sent to the cloud • Network transfer can be done in batch or offline • Increases the number of processing layers • Server location is critical • Tracking and diagnostic is critical and adds layers 5
  • 6. Sponsored by: Trends • Edge gateway separates the processing and end-point – Increases the battery life of the connected devices – Add more sensors and trackers at the device • Example – Smart electricity meters generate lots of measurements at short intervals – Using data from temperature, light and other sensors, Edge Computing can respond to environment changes quickly, reducing operational cost and increasing comfort • Filtering edge data reduces cloud transfers, which increases battery life • Example – Mercedes AMG F1 team filters less valuable telemetry and transfers relevant data for offline processing 6
  • 7. Sponsored by: Trends • There is no “single” edge – Depending on the application, the edge architecture will be different – Manufacturing plant [Edge servers and gateways aggregate multiple servers and devices in a distributed location] – Telecommunications provider [architectures break down into a provider far edge, a provider access edge, and a provider aggregation edge] • Edge computing doesn’t need to be connected – An edge device running autonomously in a hard-to-reach place like a rural mining site can keep running when a connection drops – When connection resumes, the system can sync and transfer data 7
  • 8. Sponsored by: Computing Trends • Edge is getting “foggy” – Fog computing adds a new filtering layer – Example • Temperature sensor generates data every one second • With fog layer, data that meet the metrics are sent to cloud • Advanced communication and AI technology enable mass connection – Wi-Fi 6 and 5G/6G covers most edge devices – About 99.4% of the physical objects are still unconnected 8
  • 9. Sponsored by: Challenges • Latency (Response times) – Applications, like the health care, financial transactions, and automotive cannot tolerate latency – Stringent requirements need to be met and thus the components need to be selected to meet such needs • Bandwidth – Applications, like Smart surveillance systems and traffic management, require significant bandwidth – Buffer overflow, retransmissions can severely affect application performance 9
  • 10. Sponsored by: Challenges • Edge has same cyber risk as any other local network server – “AT&T Cybersecurity Insights report: Securing the Edge” found that 74% of businesses have been compromised – Sniffing attacks, DDoS, supply chain attacks, etc. • Power – Edge servers rely on battery as their primary power source – IoT device batteries are not easily replaceable • Fire alarm sensors, underwater sensors, wildlife tracking devices, medical implants, space and satellite devices 10
  • 11. Sponsored by: Designing Edge Computing Requires Early Architecture Planning • Early system model can eliminate bottlenecks and measure – Processing requirements – Expected application latency – Required bandwidth for seamless operation – Power profile of the edge devices – Behavior of the system under different failure conditions and threats • To enable this, the system modeling solution requires IP libraries and simulators for hardware, software, and network – VisualSim Architect from Mirabilis Design ticks all the boxes
  • 12. Sponsored by: Why is System Performance Exploration Required? Scheduling/Arbitration proportional share WFQ static dynamic fixed priority EDF TDMA FCFS Communication Templates Architecture # 1 Architecture # 2 Computation Templates DSP AI GPU DRAM CPU FPGA m E DSP TDMA Priority EDF WFQ RISC DSP LookUp Cipher AI DS P CPU GP U mE DD R static Which architecture is better suited for our application? 12
  • 13. Sponsored by: Block Diagram of Data-Enabled Application Device 1 AFE ARM/ RISC-V core BLE/ Wifi/ 5G Radio Transceiv er Network Hub [Edge Gateways + Fog layers] Data Center
  • 14. Sponsored by: IoT to Data Center Model • Power consumption of each device • Optimal HW and SW configuration to meet the end-to- end application timing deadline • Performance with Big data and fast data workloads 14
  • 15. Sponsored by: Architect Hardware-Software of Edge Device DRAM Display IO A M B A A X I B u s CPU GPU Display Ctrl P C I e Video Camera SRAM Packet • System Overview – Camera: 30fps, VGA corresponds – CPU: Multi-core ARM Cortex-A53 1.2GHz – GPU: 64Cores(8Warps×8PEs), 32Threads, 1GHz – DisplayCtrl: DisplayBuffer 293,888Byte – SRAM: SDR, 64MB, 1.0GHz – DRAM: DDR3, 64MB, 2.4GHz Explore at the board- and semiconductor-level to size uP/GPU, memory bandwidth and bus/switch configuration 15
  • 16. Sponsored by: Conducting Architecture Trade-off • By changing the amount of video input data (packet numbers), observe the SRAM -> DRAM transfer performance and examine the upper limit performance of the video input that the system can tolerate. 210 packets/s 12ms 21 packets/s 414us 300 packets/s • 250 packets/s is the system limit • With 300 packets/s, simulation cannot be executed due to FIFO buffer overflow. 16
  • 17. Sponsored by: Compare Edge Compute System using ARM vs RISC-V Processors Using ARM Cores Using RISC-V Cores NOTE: Depending on the application profile run, the performance and power observed would vary • Compare application latency with and without custom instructions tailored for AI and data filtering • Average power consumption in different scenarios 17
  • 18. Sponsored by: Selecting Network Interface to Data Center Using 1000 Mbps links 1000 Mbps link + Edge Processing (Single- and multi-core) Sizing of network resources to Edge devices is important to get optimal performance 18
  • 19. Sponsored by: Bluetooth (BLE) Power State Transition (FSM) • Depending on the abstraction required, the subsystems can be built with great details • Here, Bluetooth module has been modeled with all the state transition details 19
  • 20. Sponsored by: Resource usage extremely high due to continued high traffic levels Security against DDoS Attack on Edge and Networks A DDoS attack involves multiple connected devices, collectively known as a botnet, which are used to overwhelm a target vehicle with fake/malicious traffic. • Virtually emulating the system behavior using DDoS attack technique • Simulation methodology is designed to test automotive systems for cybersecurity and safety that are under development • Undertake Risk Assessment on network simulation to predict how the interaction of restrictions and behavior may affect overall network hygiene • Moreover, testing multiple potential settings can aid in finding a near-optimal configuration for restrictions • The above design analyzes the overall throughput and latency on the network under attack. High Delay in processing request result in low throughput What is DDoS? DDoS Attack Outcomes ? Analyze the System Design and find best optimal configuration High Resource Usage due to Attacks on On- Board Units. Unable to discern between normal and attack traffic OB U Diagnostic 20
  • 21. Sponsored by: Failure and Cybersecurity Threat Analysis Normal Operation Under Attack Effective throughput is reduced and significant bursts in response times are observed 21
  • 22. Sponsored by: Evaluate Bottlenecks and Security Threats Stable Response Time Malicious Devices are Blacklisted Without Firewall With Firewall 22 22
  • 23. Sponsored by: Edge Computing Architecture is Key for Data Intelligence • System exploration must be performed during the planning stage • Distribution of processing to IoT, edge, fog, and data center must be based on the application requirements • Edge, Network, and IoT System specification must be fully validated for both power-performance and failure-security • Data size, processing needs, and software tasks must be determined in advance • System must be scalable for future requirements • Edge computing is the Future
  • 24. Sponsored by: About Mirabilis Design Software Company based in Silicon Valley Integrates Model-based Systems Engineering with the electronics development flow Development and Support Centers USA, India, China, South Korea, Japan and Europe VisualSim Architect - Modeling and Simulation Software Graphical modeling, multi-domain simulator, system-level IP, analysis tools and open API Market Segments Semiconductors, Automotive and, Aerospace and Defense Design Enablement Architecture trade-offs, system validation, early functional testing and communication Networking 24