SlideShare a Scribd company logo
1 of 1
The aim of this project is the virtualization of “things” to add
cloud based functionalities to a constrained IoT device. Building
smarter devices using an assembly of the existing ones is
achieved by message exchanges in a micro-cloud. A device
virtualization is featured by its input and output interfaces. The
proposed assembly strategy relies on putting interfaces together
and the definition of a richer component.
This effort focuses on three main topics:
• Makes connected objects highly available.
• Manage spatial distribution of composed connected objects.
• Handle and manage transactions on a collection of connected
objects.
ABSTRACT
LIMITATIONS & PROBLEMS
CONTACTS
Mehdi Tazi mtazi@octo.com
Charif Mahmoudi charif.mahmoudi@lacl.fr
Fabrice Mourlin fabrice.mourlin@u-pec.fr
Contact:
Fabrice MOURLIN - 00 33 6 15 05 15 51
Université Paris-Est Créteil Val de Marne,
61 avenue du Général de Gaulle 94010 Créteil Cedex
The connected “things” needs to deliver high availability and
accessibility on top of a drastic resource limitations. Three main
limitations face the IoT systems:
• The battery autonomy: nowadays, the batteries autonomy
limits the active duration of the connected devices before any
human intervention. Their mobility is also affected as they
need to be connected to a charging sector or an electrical
outlet.
• The processing power: the cost is the main driver of CPU
architecture embedded in the IoT devices. As they are usually
limited in processing power, many CPU-hungry functionalities
cannot be deployed on those devices.
• The storage capacity: IoT devices are not designed to store
data, their main propose is to collect data and send it on the
network. That prevents the possibility to deploy complex
filters on data that needs significant data caches.
• The network security: Usually poor in term of resources, the
IoT devices cannot host advanced security strategy. Their
exposition to the network makes this lake of security a real
threat.
• The data privacy: As the devices management can be limited
to device discovery, all the data are collected and stored in a
remote platform before the processing. Meanwhile, the privacy
of the data is not ensured especially on shared platforms.
Mehdi TAZI†‡ , Charif MAHMOUDI† , Fabrice MOURLIN†
IoT Virtualization in Micro-Clouds
OBJECTIVES
The first goal focuses on by-passing the IoT mobile devices
hardware limitations by :
• Enhancing the connected objects lifetime : Inspired from the
mobile cloud computing (MCC) offloading techniques, the
batteries autonomy of the connected devices can lasts longer.
• Empowering the processing : Delegate and distribute the
processing from the IoT devices to micro-cloud nodes to
virtually add CPUs to the Devices.
• Increasing the storage capacity : by-pass the devices storage
limitations by offloading the data on distributed files systems.
• Identify a cloud stack offering the needed features
• Compute, storage and networking nodes
• Lightweight and reliable messaging system
• Multi-tenants and high available infrastructure
• Build and integrate Things Virtual Machine (TVM) in the stack
• Hypervisor for isolated VCT
• Design an IoT communication and composition protocol
• Composition protocol for building CVCT
• Communication protocol between CT, VCT and CVCT
• Benchmarking to validate the critical properties
• High availability, fault tolerance, resiliency, …
METHOD
Paris-Est Créteil Val-de-Marne University, LACL Laboratory, France
‡ OCTO Technology
IoT Platform
IoT Device
Battery
CPU
Memory
Virtual Device
Battery
CPU
Memory
IoT Platform
CT 1
VCT 1
CT 2
CT 3
CVCT
User 1
User 2
CT : Connected Thing
VCT : Virtual Connected Thing
CVCT : Composed Virtual Connected Thing
The second goal focuses on the delivery of the services provided
by the “things”. Still the integration within an IoT system is based
on ad-hoc components. The delivery of well structured IoT
services as a service offers a new paradigm for building IoT
systems. After the successful impact of this approach on regular
software, enabling “thing” as a service extends the Application
Capacity Type (ACT) of the cloud to the IoT world.
POSSIBLE OUTCOMES
Extending the ACT to the IoT world brings many benefits :
• Capacity Improvement : using the micro-cloud scalability, the
“things” resolves complicated problems in short time for which
it wasn’t dedicated for at first such as image or voice
reorganization and databases management.
• Ease of maintenance, upgrade and portability : because of
the “VCT” nature, the “things” runs within isolated
environments, which permits having multiple versions of it and
running it on different OS and location without any service
interruption. It actually treat heterogeneous environments as
homogeneous ones.
• Better mobility : auto-switching to the closest available micro-
cloud increases the “things” mobility.
• Lower costs : since the “VCT” resides on multi-tenants
environments, the whole material change is not more required,
which makes the “things” costs less.
• Integration : since the “VCT” is cloud based, it can easily be
integrated with other VCTs or with other ACT offerings.
IoT Platform
CT 1
User 1
VCT 1 VCT 1 VCT 1
Synchronization
User 2
Collaboration
Cloud is considered by IoT systems as a partner that provide
storage and workflow management. The objective of the proposed
approach is to extend the cloud services layer for a better
coverage of IoT devices and services.
Note: The proposed approach is not a fogging architecture that
aims to push the computing to the edge. Contrariwise, it aims to
pull the computation from the physical devices to the cloud.
SaaS / ACT
Hardware, Networks
Virtualization,
OS, Softwares,
Middlewares
Data, Application Code
OaaS / OCT
Hardware, Networks
Virtualization,
OS, Softwares,
Middlewares
Emulation
Data, Application Code
Extends
Management and orchestration of
nodes, cluster Highly availablily,
resilience and fault-tolerence.
Node Manager
Node
Compute, storage and networking
nodes
Communication and composition Protocol using VCT and CVCT descriptions
OS
TVM
VCT VCT
Messaging system
Node
OS
TVM
VCT CVCT
Node
OS
TVM
CVCT CVCT

More Related Content

What's hot

Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)Iffat Anjum
 
Sustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challengesSustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challengesAbdulMajidFarooqi
 
Fog computing. Igor Tsybin
Fog computing. Igor TsybinFog computing. Igor Tsybin
Fog computing. Igor TsybinIgor Tsybin
 
Dynamic module deployment in a fog computing platform
Dynamic module deployment in a fog computing platformDynamic module deployment in a fog computing platform
Dynamic module deployment in a fog computing platform霈萱 蔡
 
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iotMichael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iotMichael Enescu
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Edge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edgeEdge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edgeNitinder Mohan
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of ThingsS.Mostafa Sayyedi
 

What's hot (20)

Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Sustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challengesSustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challenges
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
Fog computing. Igor Tsybin
Fog computing. Igor TsybinFog computing. Igor Tsybin
Fog computing. Igor Tsybin
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Dynamic module deployment in a fog computing platform
Dynamic module deployment in a fog computing platformDynamic module deployment in a fog computing platform
Dynamic module deployment in a fog computing platform
 
FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog ppt
Fog pptFog ppt
Fog ppt
 
Fog Computing Defined
Fog Computing DefinedFog Computing Defined
Fog Computing Defined
 
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iotMichael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Edge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edgeEdge-Fog Cloud: Scaling IoT computations on the edge
Edge-Fog Cloud: Scaling IoT computations on the edge
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 

Similar to IoT Virtualization Poster

IRJET - Cloud Computing and IoT Convergence
IRJET -  	  Cloud Computing and IoT ConvergenceIRJET -  	  Cloud Computing and IoT Convergence
IRJET - Cloud Computing and IoT ConvergenceIRJET Journal
 
Unit i cloud computing
Unit i  cloud computingUnit i  cloud computing
Unit i cloud computingMGkaran
 
Design of an Autonomous Management and Orchestration for Fog Computing
Design of an Autonomous Management and Orchestration for Fog ComputingDesign of an Autonomous Management and Orchestration for Fog Computing
Design of an Autonomous Management and Orchestration for Fog ComputingSabelo Dlamini
 
UNIT I -Cloud Computing (1).pdf
UNIT I -Cloud Computing (1).pdfUNIT I -Cloud Computing (1).pdf
UNIT I -Cloud Computing (1).pdflauroeuginbritto
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
internet architecture.pdf
internet architecture.pdfinternet architecture.pdf
internet architecture.pdfqhawengcongo
 
Webofthing_WOT_vs_IOT.pptx
Webofthing_WOT_vs_IOT.pptxWebofthing_WOT_vs_IOT.pptx
Webofthing_WOT_vs_IOT.pptxjainam bhavsar
 
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Codit
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainAltoros
 
Vicinity glo tsummit yajuan guan
Vicinity glo tsummit yajuan guanVicinity glo tsummit yajuan guan
Vicinity glo tsummit yajuan guanJuan C. Vasquez
 
Interoute VDC: Education from the cloud
Interoute VDC: Education from the cloudInteroute VDC: Education from the cloud
Interoute VDC: Education from the cloudjon_graham1977
 

Similar to IoT Virtualization Poster (20)

IRJET - Cloud Computing and IoT Convergence
IRJET -  	  Cloud Computing and IoT ConvergenceIRJET -  	  Cloud Computing and IoT Convergence
IRJET - Cloud Computing and IoT Convergence
 
Unit i cloud computing
Unit i  cloud computingUnit i  cloud computing
Unit i cloud computing
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
Design of an Autonomous Management and Orchestration for Fog Computing
Design of an Autonomous Management and Orchestration for Fog ComputingDesign of an Autonomous Management and Orchestration for Fog Computing
Design of an Autonomous Management and Orchestration for Fog Computing
 
UNIT I -Cloud Computing (1).pdf
UNIT I -Cloud Computing (1).pdfUNIT I -Cloud Computing (1).pdf
UNIT I -Cloud Computing (1).pdf
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
2.pdf
2.pdf2.pdf
2.pdf
 
IoT.pdf
IoT.pdfIoT.pdf
IoT.pdf
 
internet architecture.pdf
internet architecture.pdfinternet architecture.pdf
internet architecture.pdf
 
Webofthing_WOT_vs_IOT.pptx
Webofthing_WOT_vs_IOT.pptxWebofthing_WOT_vs_IOT.pptx
Webofthing_WOT_vs_IOT.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Groupchain
GroupchainGroupchain
Groupchain
 
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
 
IoT Summit yajuan guan
IoT Summit yajuan guanIoT Summit yajuan guan
IoT Summit yajuan guan
 
Vicinity glo tsummit yajuan guan
Vicinity glo tsummit yajuan guanVicinity glo tsummit yajuan guan
Vicinity glo tsummit yajuan guan
 
Interoute VDC: Education from the cloud
Interoute VDC: Education from the cloudInteroute VDC: Education from the cloud
Interoute VDC: Education from the cloud
 

Recently uploaded

Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...shreenathji26
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunicationnovrain7111
 
Overview of IS 16700:2023 (by priyansh verma)
Overview of IS 16700:2023 (by priyansh verma)Overview of IS 16700:2023 (by priyansh verma)
Overview of IS 16700:2023 (by priyansh verma)Priyansh
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...Amil baba
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfalokitpathak01
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Ergodomus - LOD 400 Production Drawings Exampes - Copy.pdf
Ergodomus - LOD 400 Production Drawings Exampes - Copy.pdfErgodomus - LOD 400 Production Drawings Exampes - Copy.pdf
Ergodomus - LOD 400 Production Drawings Exampes - Copy.pdfgestioneergodomus
 
Introduction to Machine Learning Part1.pptx
Introduction to Machine Learning Part1.pptxIntroduction to Machine Learning Part1.pptx
Introduction to Machine Learning Part1.pptxPavan Mohan Neelamraju
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfadeyimikaipaye
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptx10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptxAdityaGoogle
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
Road Development plans of India-Transportation Engineering
Road Development plans of India-Transportation EngineeringRoad Development plans of India-Transportation Engineering
Road Development plans of India-Transportation EngineeringSayli Madhale
 
input buffering in lexical analysis in CD
input buffering in lexical analysis in CDinput buffering in lexical analysis in CD
input buffering in lexical analysis in CDHeadOfDepartmentComp1
 

Recently uploaded (20)

Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
ASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductosASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductos
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunication
 
Overview of IS 16700:2023 (by priyansh verma)
Overview of IS 16700:2023 (by priyansh verma)Overview of IS 16700:2023 (by priyansh verma)
Overview of IS 16700:2023 (by priyansh verma)
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdf
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
Ergodomus - LOD 400 Production Drawings Exampes - Copy.pdf
Ergodomus - LOD 400 Production Drawings Exampes - Copy.pdfErgodomus - LOD 400 Production Drawings Exampes - Copy.pdf
Ergodomus - LOD 400 Production Drawings Exampes - Copy.pdf
 
Introduction to Machine Learning Part1.pptx
Introduction to Machine Learning Part1.pptxIntroduction to Machine Learning Part1.pptx
Introduction to Machine Learning Part1.pptx
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptx10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptx
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
Road Development plans of India-Transportation Engineering
Road Development plans of India-Transportation EngineeringRoad Development plans of India-Transportation Engineering
Road Development plans of India-Transportation Engineering
 
input buffering in lexical analysis in CD
input buffering in lexical analysis in CDinput buffering in lexical analysis in CD
input buffering in lexical analysis in CD
 

IoT Virtualization Poster

  • 1. The aim of this project is the virtualization of “things” to add cloud based functionalities to a constrained IoT device. Building smarter devices using an assembly of the existing ones is achieved by message exchanges in a micro-cloud. A device virtualization is featured by its input and output interfaces. The proposed assembly strategy relies on putting interfaces together and the definition of a richer component. This effort focuses on three main topics: • Makes connected objects highly available. • Manage spatial distribution of composed connected objects. • Handle and manage transactions on a collection of connected objects. ABSTRACT LIMITATIONS & PROBLEMS CONTACTS Mehdi Tazi mtazi@octo.com Charif Mahmoudi charif.mahmoudi@lacl.fr Fabrice Mourlin fabrice.mourlin@u-pec.fr Contact: Fabrice MOURLIN - 00 33 6 15 05 15 51 Université Paris-Est Créteil Val de Marne, 61 avenue du Général de Gaulle 94010 Créteil Cedex The connected “things” needs to deliver high availability and accessibility on top of a drastic resource limitations. Three main limitations face the IoT systems: • The battery autonomy: nowadays, the batteries autonomy limits the active duration of the connected devices before any human intervention. Their mobility is also affected as they need to be connected to a charging sector or an electrical outlet. • The processing power: the cost is the main driver of CPU architecture embedded in the IoT devices. As they are usually limited in processing power, many CPU-hungry functionalities cannot be deployed on those devices. • The storage capacity: IoT devices are not designed to store data, their main propose is to collect data and send it on the network. That prevents the possibility to deploy complex filters on data that needs significant data caches. • The network security: Usually poor in term of resources, the IoT devices cannot host advanced security strategy. Their exposition to the network makes this lake of security a real threat. • The data privacy: As the devices management can be limited to device discovery, all the data are collected and stored in a remote platform before the processing. Meanwhile, the privacy of the data is not ensured especially on shared platforms. Mehdi TAZI†‡ , Charif MAHMOUDI† , Fabrice MOURLIN† IoT Virtualization in Micro-Clouds OBJECTIVES The first goal focuses on by-passing the IoT mobile devices hardware limitations by : • Enhancing the connected objects lifetime : Inspired from the mobile cloud computing (MCC) offloading techniques, the batteries autonomy of the connected devices can lasts longer. • Empowering the processing : Delegate and distribute the processing from the IoT devices to micro-cloud nodes to virtually add CPUs to the Devices. • Increasing the storage capacity : by-pass the devices storage limitations by offloading the data on distributed files systems. • Identify a cloud stack offering the needed features • Compute, storage and networking nodes • Lightweight and reliable messaging system • Multi-tenants and high available infrastructure • Build and integrate Things Virtual Machine (TVM) in the stack • Hypervisor for isolated VCT • Design an IoT communication and composition protocol • Composition protocol for building CVCT • Communication protocol between CT, VCT and CVCT • Benchmarking to validate the critical properties • High availability, fault tolerance, resiliency, … METHOD Paris-Est Créteil Val-de-Marne University, LACL Laboratory, France ‡ OCTO Technology IoT Platform IoT Device Battery CPU Memory Virtual Device Battery CPU Memory IoT Platform CT 1 VCT 1 CT 2 CT 3 CVCT User 1 User 2 CT : Connected Thing VCT : Virtual Connected Thing CVCT : Composed Virtual Connected Thing The second goal focuses on the delivery of the services provided by the “things”. Still the integration within an IoT system is based on ad-hoc components. The delivery of well structured IoT services as a service offers a new paradigm for building IoT systems. After the successful impact of this approach on regular software, enabling “thing” as a service extends the Application Capacity Type (ACT) of the cloud to the IoT world. POSSIBLE OUTCOMES Extending the ACT to the IoT world brings many benefits : • Capacity Improvement : using the micro-cloud scalability, the “things” resolves complicated problems in short time for which it wasn’t dedicated for at first such as image or voice reorganization and databases management. • Ease of maintenance, upgrade and portability : because of the “VCT” nature, the “things” runs within isolated environments, which permits having multiple versions of it and running it on different OS and location without any service interruption. It actually treat heterogeneous environments as homogeneous ones. • Better mobility : auto-switching to the closest available micro- cloud increases the “things” mobility. • Lower costs : since the “VCT” resides on multi-tenants environments, the whole material change is not more required, which makes the “things” costs less. • Integration : since the “VCT” is cloud based, it can easily be integrated with other VCTs or with other ACT offerings. IoT Platform CT 1 User 1 VCT 1 VCT 1 VCT 1 Synchronization User 2 Collaboration Cloud is considered by IoT systems as a partner that provide storage and workflow management. The objective of the proposed approach is to extend the cloud services layer for a better coverage of IoT devices and services. Note: The proposed approach is not a fogging architecture that aims to push the computing to the edge. Contrariwise, it aims to pull the computation from the physical devices to the cloud. SaaS / ACT Hardware, Networks Virtualization, OS, Softwares, Middlewares Data, Application Code OaaS / OCT Hardware, Networks Virtualization, OS, Softwares, Middlewares Emulation Data, Application Code Extends Management and orchestration of nodes, cluster Highly availablily, resilience and fault-tolerence. Node Manager Node Compute, storage and networking nodes Communication and composition Protocol using VCT and CVCT descriptions OS TVM VCT VCT Messaging system Node OS TVM VCT CVCT Node OS TVM CVCT CVCT