Orchestrating a Resource-aware Edge PDF Download

Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download Orchestrating a Resource-aware Edge PDF full book. Access full book title Orchestrating a Resource-aware Edge by Klervie Toczé. Download full books in PDF and EPUB format.

Orchestrating a Resource-aware Edge

Orchestrating a Resource-aware Edge PDF Author: Klervie Toczé
Publisher: Linköping University Electronic Press
ISBN: 9180757480
Category :
Languages : en
Pages : 122

Book Description
More and more services are moving to the cloud, attracted by the promise of unlimited resources that are accessible anytime, and are managed by someone else. However, hosting every type of service in large cloud datacenters is not possible or suitable, as some emerging applications have stringent latency or privacy requirements, while also handling huge amounts of data. Therefore, in recent years, a new paradigm has been proposed to address the needs of these applications: the edge computing paradigm. Resources provided at the edge (e.g., for computation and communication) are constrained, hence resource management is of crucial importance. The incoming load to the edge infrastructure varies both in time and space. Managing the edge infrastructure so that the appropriate resources are available at the required time and location is called orchestrating. This is especially challenging in case of sudden load spikes and when the orchestration impact itself has to be limited. This thesis enables edge computing orchestration with increased resource-awareness by contributing with methods, techniques, and concepts for edge resource management. First, it proposes methods to better understand the edge resource demand. Second, it provides solutions on the supply side for orchestrating edge resources with different characteristics in order to serve edge applications with satisfactory quality of service. Finally, the thesis includes a critical perspective on the paradigm, by considering sustainability challenges. To understand the demand patterns, the thesis presents a methodology for categorizing the large variety of use cases that are proposed in the literature as potential applications for edge computing. The thesis also proposes methods for characterizing and modeling applications, as well as for gathering traces from real applications and analyzing them. These different approaches are applied to a prototype from a typical edge application domain: Mixed Reality. The important insight here is that application descriptions or models that are not based on a real application may not be giving an accurate picture of the load. This can drive incorrect decisions about what should be done on the supply side and thus waste resources. Regarding resource supply, the thesis proposes two orchestration frameworks for managing edge resources and successfully dealing with load spikes while avoiding over-provisioning. The first one utilizes mobile edge devices while the second leverages the concept of spare devices. Then, focusing on the request placement part of orchestration, the thesis formalizes it in the case of applications structured as chains of functions (so-called microservices) as an instance of the Traveling Purchaser Problem and solves it using Integer Linear Programming. Two different energy metrics influencing request placement decisions are proposed and evaluated. Finally, the thesis explores further resource awareness. Sustainability challenges that should be highlighted more within edge computing are collected. Among those related to resource use, the strategy of sufficiency is promoted as a way forward. It involves aiming at only using the needed resources (no more, no less) with a goal of reducing resource usage. Different tools to adopt it are proposed and their use demonstrated through a case study.

Orchestrating a Resource-aware Edge

Orchestrating a Resource-aware Edge PDF Author: Klervie Toczé
Publisher: Linköping University Electronic Press
ISBN: 9180757480
Category :
Languages : en
Pages : 122

Book Description
More and more services are moving to the cloud, attracted by the promise of unlimited resources that are accessible anytime, and are managed by someone else. However, hosting every type of service in large cloud datacenters is not possible or suitable, as some emerging applications have stringent latency or privacy requirements, while also handling huge amounts of data. Therefore, in recent years, a new paradigm has been proposed to address the needs of these applications: the edge computing paradigm. Resources provided at the edge (e.g., for computation and communication) are constrained, hence resource management is of crucial importance. The incoming load to the edge infrastructure varies both in time and space. Managing the edge infrastructure so that the appropriate resources are available at the required time and location is called orchestrating. This is especially challenging in case of sudden load spikes and when the orchestration impact itself has to be limited. This thesis enables edge computing orchestration with increased resource-awareness by contributing with methods, techniques, and concepts for edge resource management. First, it proposes methods to better understand the edge resource demand. Second, it provides solutions on the supply side for orchestrating edge resources with different characteristics in order to serve edge applications with satisfactory quality of service. Finally, the thesis includes a critical perspective on the paradigm, by considering sustainability challenges. To understand the demand patterns, the thesis presents a methodology for categorizing the large variety of use cases that are proposed in the literature as potential applications for edge computing. The thesis also proposes methods for characterizing and modeling applications, as well as for gathering traces from real applications and analyzing them. These different approaches are applied to a prototype from a typical edge application domain: Mixed Reality. The important insight here is that application descriptions or models that are not based on a real application may not be giving an accurate picture of the load. This can drive incorrect decisions about what should be done on the supply side and thus waste resources. Regarding resource supply, the thesis proposes two orchestration frameworks for managing edge resources and successfully dealing with load spikes while avoiding over-provisioning. The first one utilizes mobile edge devices while the second leverages the concept of spare devices. Then, focusing on the request placement part of orchestration, the thesis formalizes it in the case of applications structured as chains of functions (so-called microservices) as an instance of the Traveling Purchaser Problem and solves it using Integer Linear Programming. Two different energy metrics influencing request placement decisions are proposed and evaluated. Finally, the thesis explores further resource awareness. Sustainability challenges that should be highlighted more within edge computing are collected. Among those related to resource use, the strategy of sufficiency is promoted as a way forward. It involves aiming at only using the needed resources (no more, no less) with a goal of reducing resource usage. Different tools to adopt it are proposed and their use demonstrated through a case study.

The Cloud-to-Thing Continuum

The Cloud-to-Thing Continuum PDF Author: Theo Lynn
Publisher: Springer Nature
ISBN: 3030411109
Category : Business & Economics
Languages : en
Pages : 183

Book Description
The Internet of Things offers massive societal and economic opportunities while at the same time significant challenges, not least the delivery and management of the technical infrastructure underpinning it, the deluge of data generated from it, ensuring privacy and security, and capturing value from it. This Open Access Pivot explores these challenges, presenting the state of the art and future directions for research but also frameworks for making sense of this complex area. This book provides a variety of perspectives on how technology innovations such as fog, edge and dew computing, 5G networks, and distributed intelligence are making us rethink conventional cloud computing to support the Internet of Things. Much of this book focuses on technical aspects of the Internet of Things, however, clear methodologies for mapping the business value of the Internet of Things are still missing. We provide a value mapping framework for the Internet of Things to address this gap. While there is much hype about theInternet of Things, we have yet to reach the tipping point. As such, this book provides a timely entrée for higher education educators, researchers and students, industry and policy makers on the technologies that promise to reshape how society interacts and operates.

Cloud Computing and Services Science

Cloud Computing and Services Science PDF Author: Maarten van Steen
Publisher: Springer Nature
ISBN: 3031681657
Category :
Languages : en
Pages : 226

Book Description


Science and Technologies for Smart Cities

Science and Technologies for Smart Cities PDF Author: Sara Paiva
Publisher: Springer Nature
ISBN: 3031063716
Category : Computers
Languages : en
Pages : 733

Book Description
This book constitutes the refereed proceedings of the 7th Annual SmartCity360° Summit which was organized in November 2021 in Porto, Portugal. Due to COVID-19 pandemic the conference was held virtually. The volume combines selected papers of 6 conferences, namely EdgeIoT 2021 - International Conference on Intelligent Edge Processing in the IoT Era; IC4S 2021 - International Conference on Cognitive Computing and Cyber Physical Systems; SmartGov 2021 - International Conference on Smart Governance for Sustainable Smart Cities; SmartGift 2021 - International Conference on Smart Grid and Innovative Frontiers in Telecommunications; e PFSM 2021 - International Conference on Privacy and Forensics in Smart Mobility. The 45 full papers were carefully selected from 109 submissions. The papers are organized in four thematic sections on Smart Grid and Innovative Frontiers in Telecommunications; Smart Governance for Sustainable Smart Cities; Privacy and Forensics in Smart Mobility; and Sensor Systems and Software.

Leveraging Applications of Formal Methods, Verification and Validation. Practice

Leveraging Applications of Formal Methods, Verification and Validation. Practice PDF Author: Tiziana Margaria
Publisher: Springer Nature
ISBN: 3031197623
Category : Computers
Languages : en
Pages : 431

Book Description
This four-volume set LNCS 13701-13704 constitutes contributions of the associated events held at the 11th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2022, which took place in Rhodes, Greece, in October/November 2022. The contributions in the four-volume set are organized according to the following topical sections: specify this - bridging gaps between program specification paradigms; x-by-construction meets runtime verification; verification and validation of concurrent and distributed heterogeneous systems; programming - what is next: the role of documentation; automated software re-engineering; DIME day; rigorous engineering of collective adaptive systems; formal methods meet machine learning; digital twin engineering; digital thread in smart manufacturing; formal methods for distributed computing in future railway systems; industrial day.

Advanced Information Networking and Applications

Advanced Information Networking and Applications PDF Author: Leonard Barolli
Publisher: Springer Nature
ISBN: 3030750787
Category : Computers
Languages : en
Pages : 753

Book Description
This book covers the theory, design and applications of computer networks, distributed computing and information systems. Networks of today are going through a rapid evolution, and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low-power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations is emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several of such applications have been difficult to realize because of many interconnections problems. To fulfill their large range of applications, different kinds of networks need to collaborate, and wired and next-generation wireless systems should be integrated in order to develop high-performance computing solutions to problems arising from the complexities of these networks. The aim of the book “Advanced Information Networking and Applications” is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.

Fog/Edge Computing For Security, Privacy, and Applications

Fog/Edge Computing For Security, Privacy, and Applications PDF Author: Wei Chang
Publisher: Springer Nature
ISBN: 3030573281
Category : Computers
Languages : en
Pages : 417

Book Description
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

Fog and Edge Computing

Fog and Edge Computing PDF Author: Rajkumar Buyya
Publisher: John Wiley & Sons
ISBN: 1119524989
Category : Technology & Engineering
Languages : en
Pages : 512

Book Description
A comprehensive guide to Fog and Edge applications, architectures, and technologies Recent years have seen the explosive growth of the Internet of Things (IoT): the internet-connected network of devices that includes everything from personal electronics and home appliances to automobiles and industrial machinery. Responding to the ever-increasing bandwidth demands of the IoT, Fog and Edge computing concepts have developed to collect, analyze, and process data more efficiently than traditional cloud architecture. Fog and Edge Computing: Principles and Paradigms provides a comprehensive overview of the state-of-the-art applications and architectures driving this dynamic field of computing while highlighting potential research directions and emerging technologies. Exploring topics such as developing scalable architectures, moving from closed systems to open systems, and ethical issues rising from data sensing, this timely book addresses both the challenges and opportunities that Fog and Edge computing presents. Contributions from leading IoT experts discuss federating Edge resources, middleware design issues, data management and predictive analysis, smart transportation and surveillance applications, and more. A coordinated and integrated presentation of topics helps readers gain thorough knowledge of the foundations, applications, and issues that are central to Fog and Edge computing. This valuable resource: Provides insights on transitioning from current Cloud-centric and 4G/5G wireless environments to Fog Computing Examines methods to optimize virtualized, pooled, and shared resources Identifies potential technical challenges and offers suggestions for possible solutions Discusses major components of Fog and Edge computing architectures such as middleware, interaction protocols, and autonomic management Includes access to a website portal for advanced online resources Fog and Edge Computing: Principles and Paradigms is an essential source of up-to-date information for systems architects, developers, researchers, and advanced undergraduate and graduate students in fields of computer science and engineering.

Empirical Studies in Machine Psychology

Empirical Studies in Machine Psychology PDF Author: Robert Johansson
Publisher: Linköping University Electronic Press
ISBN: 9179295061
Category :
Languages : en
Pages : 201

Book Description
This thesis presents Machine Psychology as an interdisciplinary paradigm that integrates learning psychology principles with an adaptive computer system for the development of Artificial General Intelligence (AGI). By synthesizing behavioral psychology with a formal intelligence model, the Non-Axiomatic Reasoning System (NARS), this work explores the potential of operant conditioning paradigms to advance AGI research. The thesis begins by introducing the conceptual foundations of Machine Psychology, detailing its alignment with the theoretical constructs of learning psychology and the formalism of NARS. It then progresses through a series of empirical studies designed to systematically investigate the emergence of increasingly complex cognitive behaviors as NARS interacts with its environment. Initially, operant conditioning is established as a foundational principle for developing adaptive behavior with NARS. Subsequent chapters explore increasingly sophisticated cognitive capabilities, all studied with NARS using experimental paradigms from operant learning psychology: Generalized identity matching, Functional equivalence, and Arbitrarily Applicable Relational Responding. Throughout this research, Machine Psychology is demonstrated to be a promising framework for guiding AGI research, allowing both the manipulation of environmental contingencies and the system’s intrinsic logical processes. The thesis contributes to AGI research by showing how using operant psychological paradigms with NARS can enable cognitive abilities similar to human cognition. These findings set the stage for AGI systems that learn and adapt more like humans, potentially advancing the creation of more general and flexible AI. Denna avhandling introducerar Maskinpsykologi som ett tvärvetenskapligt område där principer från inlärningspsykologi integreras med ett adaptivt datorsystem. Genom att kombinera forskning från beteendepsykologi med en formell modell för intelligens (Non-Axiomatic Reasoning System; NARS), undersöker avhandlingen hur operant betingning kan användas för att driva utvecklingen av Artificiell General Intelligens (AGI) framåt. Avhandlingen börjar med att förklara grunderna i Maskinpsykologi och hur dessa relaterar till både inlärningspsykologi och NARS. Därefter presenteras en serie experiment som systematiskt undersöker hur allt mer komplexa kognitiva beteenden kan uppstå när NARS interagerar med sin omgivning. Till att börja med etableras operant betingning som en central metod för att utveckla adaptiva beteenden med NARS. I de följande kapitlen utforskas hur NARS, genom experiment inspirerade av operant inlärningspsykologi, kan utveckla mer avancerade kognitiva förmågor som till exempel generaliserad identitetsmatchning, funktionell ekvivalens och så kallade arbiträrt applicerbara relationsresponser. Denna forskning visar att Maskinpsykologi är ett lovande verktyg för att vägleda AGI-forskning, eftersom det möjliggör att både påverka omgivningsfaktorer och styra systemets interna logiska processer. Avhandlingen bidrar till AGI-forskning genom att visa hur operanta psykologiska metoder, tillämpade på NARS, kan möjliggöra kognitiva förmågor som liknar mänskligt tänkande. Dessa insikter öppnar nya möjligheter för att utveckla AI-system som kan lära sig och anpassa sig på ett mer mänskligt sätt, vilket kan leda till skapandet av mer generell och flexibel AI.

Emergency Vehicle Approaching

Emergency Vehicle Approaching PDF Author: Kajsa Weibull
Publisher: Linköping University Electronic Press
ISBN: 9180758053
Category :
Languages : en
Pages : 115

Book Description
Driving an emergency vehicle can be difficult. The driver of the emergency vehicle must navigate, communicate with emergency services, often drive at high speeds, and take surrounding traffic into account. Civilian drivers are required by law to give way to emergency vehicles with lights and sirens activated. Despite this, they sometimes fail to move over. One reason is not noticing the emergency vehicle in time. This dissertation aims to understand how technology can support civilian drivers in their interactions with emergency vehicles. One form of technology used to make drivers move over is emergency vehicle lighting. The results of this dissertation show that alternative designs of emergency vehicle lighting can affect driver behavior and that the current designs are not always suited to promote the most desirable driver behavior. Another technological approach to supporting drivers in their interactions with emergency vehicles is the use of Cooperative Intelligent Transport Systems (C-ITS). One C-ITS service is the Emergency Vehicle Approaching (EVA) warning. An EVA warning is an early in-car warning sent out to the driver before being overtaken by an emergency vehicle, providing more time to move over. Three driving simulator studies with EVA warnings were conducted in this dissertation. The results indicate that EVA warnings make drivers move over more quickly and thereby decrease delay time for emergency vehicles. Furthermore, there is a learning effect when receiving multiple EVA warnings, implying that drivers move over more quickly once they are familiar with the system. One of the simulator studies used eye tracking and showed that EVA warnings make drivers scan mirrors earlier, compared to when not receiving an EVA warning. An EVA warning is distributed based on the most probable path of the emergency vehicle. If the driver of the emergency vehicle decides on another route, there is a risk of false EVA warnings. Therefore, this dissertation explored how false alarms, and false expectations of EVA warnings, affect drivers. Receiving false alarms makes drivers move over more slowly in future interactions and negatively affects attitudes toward the EVA system. Furthermore, wrongly expecting an EVA warning makes drivers less attentive to the road ahead. In conclusion, both emergency vehicle lighting and EVA warnings can support civilian drivers in their interactions with emergency vehicles. It can decrease the risks of both collisions and delays. However, to implement a large-scale deployment of C-ITS, Sweden needs digital infrastructure to support secure data exchange Att framföra ett utryckningsfordon är utmanande. Utryckningsföraren förväntas navigera, kommunicera med larmcentralen, framföra utryckningsfordonet i inte sällan höga hastigheter och samtidigt ta hänsyn till omgivande trafik. Bilister är enligt lag tvungna att lämna fri väg för utryckningsfordon med blåljus och sirener. Trots det misslyckas ibland förare med att lämna fri väg. En anledning är att de inte hinner uppfatta utryckningsfordonet i tid. Syftet med denna avhandling är att förstå hur teknik kan stödja förare vid interaktioner med utryckningsfordon. En form av teknik som används för att få förare att lämna fri väg är blåljus. Resultaten av denna avhandling visar att alternativa designlösningar för blåljus kan påverka förarnas beteende och att de nu-varande utformningarna inte alltid är optimala för att främja det mest önskvärda förarbeteendet. En annan metod för att stötta förare i deras interaktion med utryckningsfordon är uppkopplad fordonsteknik, så kallat Cooperative Intelligent Transport Systems (C-ITS). En typ av C-ITS-tjänst är Emergency Vehicle Approaching (EVA)-varningar. En EVA-varning är en tidig varning som skickas ut till bilisten innan utryckningsfordonet kör ikapp, vilket ger föraren mer tid att lämna fri väg. Tre förarsimulatorstudier med EVA-varningar genomfördes inom ramen för avhandlingen. Resultaten visar på att EVA-varningar kan få förare att lämna fri väg snabbare och därmed minska förseningar för utryckningsfordon. Dessutom finns det en inlärningseffekt med EVA varningar som innebär att förare lämnar fri väg snabbare när de är bekanta med EVA systemet. I en av simulatorstudierna användes ögonrörelsemätning som visade att EVA-varningar får förare att skanna av speglarna i bilen tidigare, jämfört med när de inte får någon EVA-varning. En EVA-varning distribueras baserat på den mest sannolika vägen för utryckningsfordonet. Om föraren av utryckningsfordonet väljer en annan väg finns det risk för falska EVA-varningar. I den här avhandlingen undersöktes därför hur falska larm och en falsk förväntan om EVA-varningar påverkar förare. Att ta emot falska larm påverkade förarnas framtida interaktioner och inställning till EVA-systemet. Dessutom gjorde en felaktig förväntan på en EVA-varning till att förarna var mindre uppmärksamma på vägen framför dem. Sammanfattningsvis kan både blåljus och EVA-varningar stödja civila förare i interaktionen med utryckningsfordon. Varningssystemen kan minska riskerna för både kollisioner och förseningar. För att genomföra en storskalig utbyggnad av C-ITS behöver Sverige dock en digital infrastruktur för att stödja säkert datautbyte.