SlideShare a Scribd company logo
Portable Energy-Aware Cluster-Based
Edge Computers
Thomas Rausch, Cosmin Avasalcai, Schahram Dustdar
TU Wien, Vienna Austria
Distributed Systems Group
http://dsg.tuwien.ac.at
ACM/IEEE Symposium on Edge Computing
2018, Bellevue, WA
2
Edge Computers
Cloudlet
Cloud
Server Computer
Edge Computer
Extension to the Edge
3
Cloudlets for Fieldwork Scenarios
Edge CloudIoT
Lewis et al., 2014. “Tactical cloudlets: Moving cloud computing to the edge”
Edge Computer Requirements
● Performance
● Portable
● Energy-Efficient
● Reliable
Edge Computer Requirements
● Performance
● Portable
● Energy-Efficient
● Reliable
4
Cluster-Based Edge Resources?
Sun Modular Datacenter Ubuntu Orange Box
(Intel NUC cluster)
1
Elkhatib et al., 2017, “On Using Micro-Clouds to Deliver the Fog”
“Micro Clouds” 1
Server Computers SOC & Single Board Computers
5
Cluster-Based Edge Computer Prototype
Motherboard ASUS P10S-I Mini-ITX
CPU Intel Xeon E3-1230 (4 cores + HT)
RAM 2x16GB Kingston HyperX Fury
SSD Intel SSD 600p 128 GB M.2.
PSU picoPSU-90 12V
6
Energy-Aware Clustered Edge Computers
1
13
3
2
2
4
4
7
Examine Cluster Configurations
● Resource Utilization?
● Energy Consumption?
● System Responsiveness?
SqueezeNet
MXNet Model Server
8
Energy Signatures of Node Operations
Offline: 2 W
Shutdown: 4-6 s
~620 J
Boot (WoL)
Docker container
with MXNet starts
Average Idle: 9 W
Boot: 45-48 s
~39 J
E(idle(t )) = E(boot) + E(shutdown)
t = ~110 s
Boot Cycle
9
∑(E(ni)) 17.0 Wh 19.4 Wh 19.1 Wh 19.3 Wh
n1
n2
RTT
.99
.95
μ
CPU
n1
: 100%
n2
: off
n3
: off
n4
: off
n1
: 90%
n2
: 10%
n3
: off
n4
: off
n1
: 80%
n2
: 20%
n3
: off
n4
: off
n1
: 70%
n2
: 30%
n3
: off
n4
: off
300r/s
10
∑(E(ni)) 19.4 Wh 19.4 Wh 19.4 Wh 21.5 Wh
n1
: 60%
n2
: 40%
n3
: off
n4
: off
n1
: 50%
n2
: 50%
n3
: off
n4
: off
n1
: 33%
n2
: 33%
n3
: 33%
n4
: off
n1
: 25%
n2
: 25%
n3
: 25%
n4
: 25%
11
Conventional Wisdom
[R]ecent studies show the CPU
utilization has a linear relationship on
power consumption, when dynamic
voltage and frequency scaling is
applied.
[R]ecent studies show the CPU
utilization has a linear relationship on
power consumption, when dynamic
voltage and frequency scaling is
applied.
Farahnakian et al., 2014. Energy-Efficient Virtual Machines
Consolidation in Cloud Data Centers Using Reinforcement
Learning
Kusic et al., 2009. Power and performance management of
virtualized computing environments via lookahead control
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
0
20
40
60
80
100
120
140
160
HP ProLiant G5 HP ProLiant G4
CPU (%)
W
12
Intricacies of Power Management
CPU %
Freq (MHz)
Power (W)
RTT
Segmented relation
13
Workload Centric View
Questions that arise
● How to cooperate with hardware?
● Pareto optimality energy vs. responsiveness?
● How to measure for multi-tenancy?
Frequency
1.0
3.3.5
GHz
14
Dipl.-Ing. (MSc), BSc
Thomas Rausch
Research Assistant
TU Wien
Information Systems Engineering
Argentinierstrasse 8-194-02, Vienna, Austria
T: +43 1 58801-184838
E: trausch@dsg.tuwien.ac.at
http://dsg.tuwien.ac.at/staff/trausch

More Related Content

What's hot

Eeuc111
Eeuc111Eeuc111
Cycle Computing Record-breaking Petascale HPC Run
Cycle Computing Record-breaking Petascale HPC RunCycle Computing Record-breaking Petascale HPC Run
Cycle Computing Record-breaking Petascale HPC Run
inside-BigData.com
 
Comparison of Photovoltaic Array Maximum Power Point Tracking Techniques
Comparison of Photovoltaic Array Maximum Power Point Tracking TechniquesComparison of Photovoltaic Array Maximum Power Point Tracking Techniques
Comparison of Photovoltaic Array Maximum Power Point Tracking Techniques
Asoka Technologies
 
UberCloud Webinar Abaqus and cloud computing
UberCloud Webinar Abaqus and cloud computingUberCloud Webinar Abaqus and cloud computing
UberCloud Webinar Abaqus and cloud computing
Thomas Francis
 
2020 ml swarm ascend presentation
2020 ml swarm ascend presentation2020 ml swarm ascend presentation
2020 ml swarm ascend presentation
Kyongsik Yun
 
Gravitational Billion Body Project
Gravitational Billion Body ProjectGravitational Billion Body Project
Gravitational Billion Body Project
Derek Groen
 
Quantum Computing in Cloud
Quantum Computing in CloudQuantum Computing in Cloud
Quantum Computing in Cloud
Anil Loutombam
 
Modeling PV Module Power Degradation to Evaluate Performance Warranty Risks
Modeling PV Module Power Degradation to Evaluate Performance Warranty RisksModeling PV Module Power Degradation to Evaluate Performance Warranty Risks
Modeling PV Module Power Degradation to Evaluate Performance Warranty Risks
Kenneth J. Sauer
 
09 mikoski pv-mismatch_pvpmc-8_20170509_r5
09 mikoski pv-mismatch_pvpmc-8_20170509_r509 mikoski pv-mismatch_pvpmc-8_20170509_r5
09 mikoski pv-mismatch_pvpmc-8_20170509_r5
Sandia National Laboratories: Energy & Climate: Renewables
 
26 pvpmc presentation_mac_alpine_final
26 pvpmc presentation_mac_alpine_final26 pvpmc presentation_mac_alpine_final
26 pvpmc presentation_mac_alpine_final
Sandia National Laboratories: Energy & Climate: Renewables
 
Presentation
PresentationPresentation
Presentation
Anmitas1
 
Intro to quantum computing by QCI
Intro to quantum computing by QCIIntro to quantum computing by QCI
Intro to quantum computing by QCI
QuantumComputingIndi
 
Plasma Power Generation
Plasma Power Generation Plasma Power Generation
Plasma Power Generation
HariDuggireddy1
 
1 4 epri sandia cuiffi 050916 43
1 4 epri sandia cuiffi 050916 431 4 epri sandia cuiffi 050916 43
Graduation project folded
Graduation project foldedGraduation project folded
Graduation project folded
AbdullahAzizi8
 
Photovoltaic Project Analysis Using RETScreen software
Photovoltaic Project Analysis Using RETScreen softwarePhotovoltaic Project Analysis Using RETScreen software
Photovoltaic Project Analysis Using RETScreen softwareLeonardo ENERGY
 

What's hot (20)

Eeuc111
Eeuc111Eeuc111
Eeuc111
 
Cycle Computing Record-breaking Petascale HPC Run
Cycle Computing Record-breaking Petascale HPC RunCycle Computing Record-breaking Petascale HPC Run
Cycle Computing Record-breaking Petascale HPC Run
 
Comparison of Photovoltaic Array Maximum Power Point Tracking Techniques
Comparison of Photovoltaic Array Maximum Power Point Tracking TechniquesComparison of Photovoltaic Array Maximum Power Point Tracking Techniques
Comparison of Photovoltaic Array Maximum Power Point Tracking Techniques
 
UberCloud Webinar Abaqus and cloud computing
UberCloud Webinar Abaqus and cloud computingUberCloud Webinar Abaqus and cloud computing
UberCloud Webinar Abaqus and cloud computing
 
2020 ml swarm ascend presentation
2020 ml swarm ascend presentation2020 ml swarm ascend presentation
2020 ml swarm ascend presentation
 
Gravitational Billion Body Project
Gravitational Billion Body ProjectGravitational Billion Body Project
Gravitational Billion Body Project
 
Dronautique Space Pen
Dronautique Space PenDronautique Space Pen
Dronautique Space Pen
 
Quantum Computing in Cloud
Quantum Computing in CloudQuantum Computing in Cloud
Quantum Computing in Cloud
 
Modeling PV Module Power Degradation to Evaluate Performance Warranty Risks
Modeling PV Module Power Degradation to Evaluate Performance Warranty RisksModeling PV Module Power Degradation to Evaluate Performance Warranty Risks
Modeling PV Module Power Degradation to Evaluate Performance Warranty Risks
 
12 pvpmc
12 pvpmc12 pvpmc
12 pvpmc
 
09 mikoski pv-mismatch_pvpmc-8_20170509_r5
09 mikoski pv-mismatch_pvpmc-8_20170509_r509 mikoski pv-mismatch_pvpmc-8_20170509_r5
09 mikoski pv-mismatch_pvpmc-8_20170509_r5
 
26 pvpmc presentation_mac_alpine_final
26 pvpmc presentation_mac_alpine_final26 pvpmc presentation_mac_alpine_final
26 pvpmc presentation_mac_alpine_final
 
Presentation
PresentationPresentation
Presentation
 
Intro to quantum computing by QCI
Intro to quantum computing by QCIIntro to quantum computing by QCI
Intro to quantum computing by QCI
 
Plasma Power Generation
Plasma Power Generation Plasma Power Generation
Plasma Power Generation
 
solar air heater Using ANN
solar air heater Using ANNsolar air heater Using ANN
solar air heater Using ANN
 
1 4 epri sandia cuiffi 050916 43
1 4 epri sandia cuiffi 050916 431 4 epri sandia cuiffi 050916 43
1 4 epri sandia cuiffi 050916 43
 
Graduation project folded
Graduation project foldedGraduation project folded
Graduation project folded
 
CURB Poster
CURB PosterCURB Poster
CURB Poster
 
Photovoltaic Project Analysis Using RETScreen software
Photovoltaic Project Analysis Using RETScreen softwarePhotovoltaic Project Analysis Using RETScreen software
Photovoltaic Project Analysis Using RETScreen software
 

Similar to Portable Energy-Aware Cluster-Based Edge Computers

JAVA 2013 IEEE NETWORKING PROJECT Harvesting aware energy management for time...
JAVA 2013 IEEE NETWORKING PROJECT Harvesting aware energy management for time...JAVA 2013 IEEE NETWORKING PROJECT Harvesting aware energy management for time...
JAVA 2013 IEEE NETWORKING PROJECT Harvesting aware energy management for time...
IEEEGLOBALSOFTTECHNOLOGIES
 
Harvesting aware energy management for time-critical wireless sensor networks
Harvesting aware energy management for time-critical wireless sensor networksHarvesting aware energy management for time-critical wireless sensor networks
Harvesting aware energy management for time-critical wireless sensor networks
IEEEFINALYEARPROJECTS
 
Santhosh hj shivaprakash
Santhosh hj shivaprakashSanthosh hj shivaprakash
Santhosh hj shivaprakash
Prof.Dr.Hanumanthappa J
 
Energy Efficient Wireless Internet Access
Energy Efficient Wireless Internet AccessEnergy Efficient Wireless Internet Access
Energy Efficient Wireless Internet Access
Scienzainrete
 
Step by step process of uploading presentation videos
Step by step process of uploading presentation videos Step by step process of uploading presentation videos
Step by step process of uploading presentation videos
Hoopeer Hoopeer
 
NOC POWER MANAGEMENT CONTROLLER DESIGN
NOC POWER MANAGEMENT CONTROLLER DESIGN  NOC POWER MANAGEMENT CONTROLLER DESIGN
NOC POWER MANAGEMENT CONTROLLER DESIGN
Engr. Muhammad Shan Saleem
 
FCCM2020: High-Throughput Convolutional Neural Network on an FPGA by Customiz...
FCCM2020: High-Throughput Convolutional Neural Network on an FPGA by Customiz...FCCM2020: High-Throughput Convolutional Neural Network on an FPGA by Customiz...
FCCM2020: High-Throughput Convolutional Neural Network on an FPGA by Customiz...
Hiroki Nakahara
 
Precision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsnPrecision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsn
Gaurang Rathod
 
CoolDC'16: Seeing into a Public Cloud: Monitoring the Massachusetts Open Cloud
CoolDC'16: Seeing into a Public Cloud: Monitoring the Massachusetts Open CloudCoolDC'16: Seeing into a Public Cloud: Monitoring the Massachusetts Open Cloud
CoolDC'16: Seeing into a Public Cloud: Monitoring the Massachusetts Open Cloud
Ata Turk
 
Science and Cyberinfrastructure in the Data-Dominated Era
Science and Cyberinfrastructure in the Data-Dominated EraScience and Cyberinfrastructure in the Data-Dominated Era
Science and Cyberinfrastructure in the Data-Dominated Era
Larry Smarr
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
IRJET Journal
 
Hairong Qi V Swaminathan
Hairong Qi V SwaminathanHairong Qi V Swaminathan
Hairong Qi V Swaminathan
FNian
 
Thesis proposal2
Thesis proposal2Thesis proposal2
Thesis proposal2
Emmanuel Ekeh
 
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless NetworksEnhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
IJRES Journal
 
Experimental Testing of a Real-Time Implementation of a PMU-Based Wide-Area D...
Experimental Testing of a Real-Time Implementation of a PMU-Based Wide-Area D...Experimental Testing of a Real-Time Implementation of a PMU-Based Wide-Area D...
Experimental Testing of a Real-Time Implementation of a PMU-Based Wide-Area D...
Power System Operation
 
SINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSN
SINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSNSINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSN
SINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSN
Editor IJMTER
 
A Comparative Study Of Low Power Consumption Techniques In A VLSI Circuit
A Comparative Study Of Low Power Consumption Techniques In A VLSI CircuitA Comparative Study Of Low Power Consumption Techniques In A VLSI Circuit
A Comparative Study Of Low Power Consumption Techniques In A VLSI Circuit
IJERA Editor
 

Similar to Portable Energy-Aware Cluster-Based Edge Computers (20)

JAVA 2013 IEEE NETWORKING PROJECT Harvesting aware energy management for time...
JAVA 2013 IEEE NETWORKING PROJECT Harvesting aware energy management for time...JAVA 2013 IEEE NETWORKING PROJECT Harvesting aware energy management for time...
JAVA 2013 IEEE NETWORKING PROJECT Harvesting aware energy management for time...
 
Harvesting aware energy management for time-critical wireless sensor networks
Harvesting aware energy management for time-critical wireless sensor networksHarvesting aware energy management for time-critical wireless sensor networks
Harvesting aware energy management for time-critical wireless sensor networks
 
Santhosh hj shivaprakash
Santhosh hj shivaprakashSanthosh hj shivaprakash
Santhosh hj shivaprakash
 
Energy Efficient Wireless Internet Access
Energy Efficient Wireless Internet AccessEnergy Efficient Wireless Internet Access
Energy Efficient Wireless Internet Access
 
Step by step process of uploading presentation videos
Step by step process of uploading presentation videos Step by step process of uploading presentation videos
Step by step process of uploading presentation videos
 
NOC POWER MANAGEMENT CONTROLLER DESIGN
NOC POWER MANAGEMENT CONTROLLER DESIGN  NOC POWER MANAGEMENT CONTROLLER DESIGN
NOC POWER MANAGEMENT CONTROLLER DESIGN
 
FCCM2020: High-Throughput Convolutional Neural Network on an FPGA by Customiz...
FCCM2020: High-Throughput Convolutional Neural Network on an FPGA by Customiz...FCCM2020: High-Throughput Convolutional Neural Network on an FPGA by Customiz...
FCCM2020: High-Throughput Convolutional Neural Network on an FPGA by Customiz...
 
Precision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsnPrecision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsn
 
CoolDC'16: Seeing into a Public Cloud: Monitoring the Massachusetts Open Cloud
CoolDC'16: Seeing into a Public Cloud: Monitoring the Massachusetts Open CloudCoolDC'16: Seeing into a Public Cloud: Monitoring the Massachusetts Open Cloud
CoolDC'16: Seeing into a Public Cloud: Monitoring the Massachusetts Open Cloud
 
20320130406029
2032013040602920320130406029
20320130406029
 
Science and Cyberinfrastructure in the Data-Dominated Era
Science and Cyberinfrastructure in the Data-Dominated EraScience and Cyberinfrastructure in the Data-Dominated Era
Science and Cyberinfrastructure in the Data-Dominated Era
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
 
WCNC
WCNCWCNC
WCNC
 
Hairong Qi V Swaminathan
Hairong Qi V SwaminathanHairong Qi V Swaminathan
Hairong Qi V Swaminathan
 
International Journal of Engineering Inventions (IJEI),
International Journal of Engineering Inventions (IJEI),International Journal of Engineering Inventions (IJEI),
International Journal of Engineering Inventions (IJEI),
 
Thesis proposal2
Thesis proposal2Thesis proposal2
Thesis proposal2
 
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless NetworksEnhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
 
Experimental Testing of a Real-Time Implementation of a PMU-Based Wide-Area D...
Experimental Testing of a Real-Time Implementation of a PMU-Based Wide-Area D...Experimental Testing of a Real-Time Implementation of a PMU-Based Wide-Area D...
Experimental Testing of a Real-Time Implementation of a PMU-Based Wide-Area D...
 
SINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSN
SINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSNSINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSN
SINK RELOCATION FOR NETWORK LIFETIME ENHANCEMENT METHOD IN WSN
 
A Comparative Study Of Low Power Consumption Techniques In A VLSI Circuit
A Comparative Study Of Low Power Consumption Techniques In A VLSI CircuitA Comparative Study Of Low Power Consumption Techniques In A VLSI Circuit
A Comparative Study Of Low Power Consumption Techniques In A VLSI Circuit
 

More from Thomas Rausch

Test cloud application deployments locally and in CI without staging environm...
Test cloud application deployments locally and in CI without staging environm...Test cloud application deployments locally and in CI without staging environm...
Test cloud application deployments locally and in CI without staging environm...
Thomas Rausch
 
Synthesizing Plausible Infrastructure Configurations for Evaluating Edge Comp...
Synthesizing Plausible Infrastructure Configurations for Evaluating Edge Comp...Synthesizing Plausible Infrastructure Configurations for Evaluating Edge Comp...
Synthesizing Plausible Infrastructure Configurations for Evaluating Edge Comp...
Thomas Rausch
 
Towards a Serverless Platform for Edge AI
Towards a Serverless Platform for Edge AITowards a Serverless Platform for Edge AI
Towards a Serverless Platform for Edge AI
Thomas Rausch
 
Edge Intelligence: The Convergence of Humans, Things and AI
Edge Intelligence: The Convergence of Humans, Things and AIEdge Intelligence: The Convergence of Humans, Things and AI
Edge Intelligence: The Convergence of Humans, Things and AI
Thomas Rausch
 
EMMA: Distributed QoS-Aware MQTT Middleware for Edge Computing Applications
EMMA: Distributed QoS-Aware MQTT Middleware for Edge Computing ApplicationsEMMA: Distributed QoS-Aware MQTT Middleware for Edge Computing Applications
EMMA: Distributed QoS-Aware MQTT Middleware for Edge Computing Applications
Thomas Rausch
 
Message-Oriented Middleware for Edge Computing Applications
Message-Oriented Middleware for Edge Computing ApplicationsMessage-Oriented Middleware for Edge Computing Applications
Message-Oriented Middleware for Edge Computing Applications
Thomas Rausch
 
An Empirical Analysis of Build Failures in the Continuous Integration Workflo...
An Empirical Analysis of Build Failures in the Continuous Integration Workflo...An Empirical Analysis of Build Failures in the Continuous Integration Workflo...
An Empirical Analysis of Build Failures in the Continuous Integration Workflo...
Thomas Rausch
 
Build Failure Prediction in Continuous Integration Workflows
Build Failure Prediction in Continuous Integration WorkflowsBuild Failure Prediction in Continuous Integration Workflows
Build Failure Prediction in Continuous Integration Workflows
Thomas Rausch
 
Git Introduction Tutorial
Git Introduction TutorialGit Introduction Tutorial
Git Introduction Tutorial
Thomas Rausch
 

More from Thomas Rausch (9)

Test cloud application deployments locally and in CI without staging environm...
Test cloud application deployments locally and in CI without staging environm...Test cloud application deployments locally and in CI without staging environm...
Test cloud application deployments locally and in CI without staging environm...
 
Synthesizing Plausible Infrastructure Configurations for Evaluating Edge Comp...
Synthesizing Plausible Infrastructure Configurations for Evaluating Edge Comp...Synthesizing Plausible Infrastructure Configurations for Evaluating Edge Comp...
Synthesizing Plausible Infrastructure Configurations for Evaluating Edge Comp...
 
Towards a Serverless Platform for Edge AI
Towards a Serverless Platform for Edge AITowards a Serverless Platform for Edge AI
Towards a Serverless Platform for Edge AI
 
Edge Intelligence: The Convergence of Humans, Things and AI
Edge Intelligence: The Convergence of Humans, Things and AIEdge Intelligence: The Convergence of Humans, Things and AI
Edge Intelligence: The Convergence of Humans, Things and AI
 
EMMA: Distributed QoS-Aware MQTT Middleware for Edge Computing Applications
EMMA: Distributed QoS-Aware MQTT Middleware for Edge Computing ApplicationsEMMA: Distributed QoS-Aware MQTT Middleware for Edge Computing Applications
EMMA: Distributed QoS-Aware MQTT Middleware for Edge Computing Applications
 
Message-Oriented Middleware for Edge Computing Applications
Message-Oriented Middleware for Edge Computing ApplicationsMessage-Oriented Middleware for Edge Computing Applications
Message-Oriented Middleware for Edge Computing Applications
 
An Empirical Analysis of Build Failures in the Continuous Integration Workflo...
An Empirical Analysis of Build Failures in the Continuous Integration Workflo...An Empirical Analysis of Build Failures in the Continuous Integration Workflo...
An Empirical Analysis of Build Failures in the Continuous Integration Workflo...
 
Build Failure Prediction in Continuous Integration Workflows
Build Failure Prediction in Continuous Integration WorkflowsBuild Failure Prediction in Continuous Integration Workflows
Build Failure Prediction in Continuous Integration Workflows
 
Git Introduction Tutorial
Git Introduction TutorialGit Introduction Tutorial
Git Introduction Tutorial
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Portable Energy-Aware Cluster-Based Edge Computers

  • 1. Portable Energy-Aware Cluster-Based Edge Computers Thomas Rausch, Cosmin Avasalcai, Schahram Dustdar TU Wien, Vienna Austria Distributed Systems Group http://dsg.tuwien.ac.at ACM/IEEE Symposium on Edge Computing 2018, Bellevue, WA
  • 3. 3 Cloudlets for Fieldwork Scenarios Edge CloudIoT Lewis et al., 2014. “Tactical cloudlets: Moving cloud computing to the edge” Edge Computer Requirements ● Performance ● Portable ● Energy-Efficient ● Reliable Edge Computer Requirements ● Performance ● Portable ● Energy-Efficient ● Reliable
  • 4. 4 Cluster-Based Edge Resources? Sun Modular Datacenter Ubuntu Orange Box (Intel NUC cluster) 1 Elkhatib et al., 2017, “On Using Micro-Clouds to Deliver the Fog” “Micro Clouds” 1 Server Computers SOC & Single Board Computers
  • 5. 5 Cluster-Based Edge Computer Prototype Motherboard ASUS P10S-I Mini-ITX CPU Intel Xeon E3-1230 (4 cores + HT) RAM 2x16GB Kingston HyperX Fury SSD Intel SSD 600p 128 GB M.2. PSU picoPSU-90 12V
  • 6. 6 Energy-Aware Clustered Edge Computers 1 13 3 2 2 4 4
  • 7. 7 Examine Cluster Configurations ● Resource Utilization? ● Energy Consumption? ● System Responsiveness? SqueezeNet MXNet Model Server
  • 8. 8 Energy Signatures of Node Operations Offline: 2 W Shutdown: 4-6 s ~620 J Boot (WoL) Docker container with MXNet starts Average Idle: 9 W Boot: 45-48 s ~39 J E(idle(t )) = E(boot) + E(shutdown) t = ~110 s Boot Cycle
  • 9. 9 ∑(E(ni)) 17.0 Wh 19.4 Wh 19.1 Wh 19.3 Wh n1 n2 RTT .99 .95 μ CPU n1 : 100% n2 : off n3 : off n4 : off n1 : 90% n2 : 10% n3 : off n4 : off n1 : 80% n2 : 20% n3 : off n4 : off n1 : 70% n2 : 30% n3 : off n4 : off 300r/s
  • 10. 10 ∑(E(ni)) 19.4 Wh 19.4 Wh 19.4 Wh 21.5 Wh n1 : 60% n2 : 40% n3 : off n4 : off n1 : 50% n2 : 50% n3 : off n4 : off n1 : 33% n2 : 33% n3 : 33% n4 : off n1 : 25% n2 : 25% n3 : 25% n4 : 25%
  • 11. 11 Conventional Wisdom [R]ecent studies show the CPU utilization has a linear relationship on power consumption, when dynamic voltage and frequency scaling is applied. [R]ecent studies show the CPU utilization has a linear relationship on power consumption, when dynamic voltage and frequency scaling is applied. Farahnakian et al., 2014. Energy-Efficient Virtual Machines Consolidation in Cloud Data Centers Using Reinforcement Learning Kusic et al., 2009. Power and performance management of virtualized computing environments via lookahead control 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 0 20 40 60 80 100 120 140 160 HP ProLiant G5 HP ProLiant G4 CPU (%) W
  • 12. 12 Intricacies of Power Management CPU % Freq (MHz) Power (W) RTT Segmented relation
  • 13. 13 Workload Centric View Questions that arise ● How to cooperate with hardware? ● Pareto optimality energy vs. responsiveness? ● How to measure for multi-tenancy? Frequency 1.0 3.3.5 GHz
  • 14. 14 Dipl.-Ing. (MSc), BSc Thomas Rausch Research Assistant TU Wien Information Systems Engineering Argentinierstrasse 8-194-02, Vienna, Austria T: +43 1 58801-184838 E: trausch@dsg.tuwien.ac.at http://dsg.tuwien.ac.at/staff/trausch