Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543813
R. Pfitscher, E. Scheid, R. Santos, R. Obelheiro, M. A. Pillon, A. E. S. Filho, L. Granville
Network Functions Virtualization (NFV) is a key technology to reduce management costs as well as to improve scalability and elasticity of computer networks. Still, recent research efforts have been exposing additional management challenges. Concerning monitoring in particular, new types of entities and requirements are underexploited. To address these issues, we propose DReAM, a resource management architecture based on management by delegation and distributed monitoring, where each agent runs a diagnostic model to compute the network service state. In this paper, we describe DReAM's proposed architecture and its major components. We also discuss the feasibility of DReAM through experimental and analytical evaluations, where we observed application throughput, CPU utilization, communication overhead, scalability, and diagnosis complexity. We provide a trade-off analysis on the monitoring strategies in NFV scenarios. Our results indicate that a result-aware strategy is a better option when the monitored environment has more than 256 agents or when the diagnosis module induces at least 10% of CPU utilization.
{"title":"DReAM - a distributed result-aware monitor for Network Functions Virtualization","authors":"R. Pfitscher, E. Scheid, R. Santos, R. Obelheiro, M. A. Pillon, A. E. S. Filho, L. Granville","doi":"10.1109/ISCC.2016.7543813","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543813","url":null,"abstract":"Network Functions Virtualization (NFV) is a key technology to reduce management costs as well as to improve scalability and elasticity of computer networks. Still, recent research efforts have been exposing additional management challenges. Concerning monitoring in particular, new types of entities and requirements are underexploited. To address these issues, we propose DReAM, a resource management architecture based on management by delegation and distributed monitoring, where each agent runs a diagnostic model to compute the network service state. In this paper, we describe DReAM's proposed architecture and its major components. We also discuss the feasibility of DReAM through experimental and analytical evaluations, where we observed application throughput, CPU utilization, communication overhead, scalability, and diagnosis complexity. We provide a trade-off analysis on the monitoring strategies in NFV scenarios. Our results indicate that a result-aware strategy is a better option when the monitored environment has more than 256 agents or when the diagnosis module induces at least 10% of CPU utilization.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543825
Rifat Jafrin, Imran Khan, Jagruti Sahoo, R. Glitho
Virtualization in Wireless Sensor Networks (WSN) allows an efficient resource usage through the sharing of the same WSN physical infrastructure by multiple applications. Semantic applications are gaining more and more momentum. However, provisioning them in Virtualized WSNs (vWSNs) remains a big challenge; the data collected by the virtual sensors needs to be annotated in-network and for this annotation, an ontology needs to be provisioned, i.e. developed, deployed and managed. This paper proposes a framework for ontology provisioning in vWSNs. The framework comprises of an ontology provisioning center, an ontology enabled vWSN and an ontology provisioning protocol that enables the interactions between the provisioning center and the ontology enabled vWSN. To the best of our knowledge this is the first effort to provide such support in vWSNs. We have built a prototype to evaluate the performance of the framework and also present simulation results of the ontology provisioning protocol.
{"title":"A framework for ontology provisioning in Virtualized Wireless Sensor Networks","authors":"Rifat Jafrin, Imran Khan, Jagruti Sahoo, R. Glitho","doi":"10.1109/ISCC.2016.7543825","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543825","url":null,"abstract":"Virtualization in Wireless Sensor Networks (WSN) allows an efficient resource usage through the sharing of the same WSN physical infrastructure by multiple applications. Semantic applications are gaining more and more momentum. However, provisioning them in Virtualized WSNs (vWSNs) remains a big challenge; the data collected by the virtual sensors needs to be annotated in-network and for this annotation, an ontology needs to be provisioned, i.e. developed, deployed and managed. This paper proposes a framework for ontology provisioning in vWSNs. The framework comprises of an ontology provisioning center, an ontology enabled vWSN and an ontology provisioning protocol that enables the interactions between the provisioning center and the ontology enabled vWSN. To the best of our knowledge this is the first effort to provide such support in vWSNs. We have built a prototype to evaluate the performance of the framework and also present simulation results of the ontology provisioning protocol.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121041525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543749
G. Horn, F. Eliassen, Amirhosein Taherkordi, S. Venticinque, B. D. Martino, M. Büscher, L. Wood
The potential of patient-centred care and a connected eHealth ecosystem can be developed through socially responsible innovative architectures. The purpose of this paper is to define key innovation needs. This is achieved through conceptual development of an architecture for common information spaces with emergent end-user applications by supporting intelligent processing of measurements, data and services at the Internet of Things (IoT) integration level. The scope is conceptual definition, and results include descriptions of social, legal and ethical requirements, an architecture, services and connectivity infrastructures for consumer-oriented healthcare systems linking co-existing healthcare systems and consumer devices. We conclude with recommendations based on an analysis of research challenges related to how to process the data securely and anonymously and how to interconnect participants and services with different standards and interaction protocols, and devices with heterogeneous hardware and software configurations.
{"title":"An architecture for using commodity devices and smart phones in health systems","authors":"G. Horn, F. Eliassen, Amirhosein Taherkordi, S. Venticinque, B. D. Martino, M. Büscher, L. Wood","doi":"10.1109/ISCC.2016.7543749","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543749","url":null,"abstract":"The potential of patient-centred care and a connected eHealth ecosystem can be developed through socially responsible innovative architectures. The purpose of this paper is to define key innovation needs. This is achieved through conceptual development of an architecture for common information spaces with emergent end-user applications by supporting intelligent processing of measurements, data and services at the Internet of Things (IoT) integration level. The scope is conceptual definition, and results include descriptions of social, legal and ethical requirements, an architecture, services and connectivity infrastructures for consumer-oriented healthcare systems linking co-existing healthcare systems and consumer devices. We conclude with recommendations based on an analysis of research challenges related to how to process the data securely and anonymously and how to interconnect participants and services with different standards and interaction protocols, and devices with heterogeneous hardware and software configurations.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129315870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543844
Daniel Bezerra, Maria Silvia Ito, Wesley Melo, D. Sadok, J. Kelner
The popularity of Internet video streaming services has dramatically increased, leveraged by the emerging Dynamic Adaptive Streaming over HTTP (DASH) standard. DASH also favors the growth of video content access by mobile devices. However, due to fluctuating bandwidth and high latency, mobile networks, e.g. 3G, remain a challenging environment. The user's Quality of Experience (QoE) in this scenario constantly needs to improve. One way to achieve this is through the development of a better adaptation logic that reduces rebuffering events and delivers higher and more stable video qualities. In this paper, we present DBuffer, a control system developed for improving the QoE during a streaming session through mobile networks. DBuffer estimates the ideal video quality to request, during a 3G streaming session, through client-side buffer analysis. The main component of the control system is a buffer-based state machine, which manages the adaptation logic. Our experimental results show that DBuffer outperforms some of the existing advanced adaptation techniques.
{"title":"DBuffer: A state machine oriented control system for DASH","authors":"Daniel Bezerra, Maria Silvia Ito, Wesley Melo, D. Sadok, J. Kelner","doi":"10.1109/ISCC.2016.7543844","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543844","url":null,"abstract":"The popularity of Internet video streaming services has dramatically increased, leveraged by the emerging Dynamic Adaptive Streaming over HTTP (DASH) standard. DASH also favors the growth of video content access by mobile devices. However, due to fluctuating bandwidth and high latency, mobile networks, e.g. 3G, remain a challenging environment. The user's Quality of Experience (QoE) in this scenario constantly needs to improve. One way to achieve this is through the development of a better adaptation logic that reduces rebuffering events and delivers higher and more stable video qualities. In this paper, we present DBuffer, a control system developed for improving the QoE during a streaming session through mobile networks. DBuffer estimates the ideal video quality to request, during a 3G streaming session, through client-side buffer analysis. The main component of the control system is a buffer-based state machine, which manages the adaptation logic. Our experimental results show that DBuffer outperforms some of the existing advanced adaptation techniques.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115989039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543767
Soledad Escolar, D. Villa, F. Villanueva, Rubén Cantarero, J. C. López
The occurrence of emergency situations in high-rise buildings, daily hosting hundreds of people, may force the massive evacuation of their occupants with the ultimate goal of preventing the loss of lives. In this paper, we propose an adaptive algorithm for dynamically computing safe evacuation routes, while the load of people is balanced between the accesses of each floor of the building, thus avoiding the accumulation of people in hotspots. The combination of this algorithm with sensors to detect the events of interest and a navigation system to guide the evacuees turns this solution into a specially suited approach for evacuation in high-rise buildings. Simulation results demonstrate that the yield evacuation routes drive all people outdoor with a similar average path length for the different risk scenarios addressed.
{"title":"An adaptive emergency protocol for people evacuation in high-rise buildings","authors":"Soledad Escolar, D. Villa, F. Villanueva, Rubén Cantarero, J. C. López","doi":"10.1109/ISCC.2016.7543767","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543767","url":null,"abstract":"The occurrence of emergency situations in high-rise buildings, daily hosting hundreds of people, may force the massive evacuation of their occupants with the ultimate goal of preventing the loss of lives. In this paper, we propose an adaptive algorithm for dynamically computing safe evacuation routes, while the load of people is balanced between the accesses of each floor of the building, thus avoiding the accumulation of people in hotspots. The combination of this algorithm with sensors to detect the events of interest and a navigation system to guide the evacuees turns this solution into a specially suited approach for evacuation in high-rise buildings. Simulation results demonstrate that the yield evacuation routes drive all people outdoor with a similar average path length for the different risk scenarios addressed.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117298703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543814
Lucas Bondan, C. R. P. D. Santos, L. Granville
Network Functions Virtualization (NFV) is a paradigm designed to promote service agility and able to quickly generate revenue, thus encouraging competition among companies in the computer network industry. Besides the advocated benefits of NFV, management requirements should be properly taken into account. The choice of a particular NFV-based technology must consider its management requirements. However, there is still no evaluation of virtualization solutions providing an in-depth analysis from the management point-of-view. This paper presents a performance analysis of three prominent virtualization solutions: ClickOS, CoreOS, and OSv. Our results place ClickOS and CoreOS as the best solutions regarding boot time, response time, and memory consumption. Moreover, based on the results obtained for each performance metric, we provide a broad discussion about the effectiveness of each virtualization solution in fulfilling qualitative management requirements.
{"title":"Comparing virtualization solutions for NFV deployment: A network management perspective","authors":"Lucas Bondan, C. R. P. D. Santos, L. Granville","doi":"10.1109/ISCC.2016.7543814","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543814","url":null,"abstract":"Network Functions Virtualization (NFV) is a paradigm designed to promote service agility and able to quickly generate revenue, thus encouraging competition among companies in the computer network industry. Besides the advocated benefits of NFV, management requirements should be properly taken into account. The choice of a particular NFV-based technology must consider its management requirements. However, there is still no evaluation of virtualization solutions providing an in-depth analysis from the management point-of-view. This paper presents a performance analysis of three prominent virtualization solutions: ClickOS, CoreOS, and OSv. Our results place ClickOS and CoreOS as the best solutions regarding boot time, response time, and memory consumption. Moreover, based on the results obtained for each performance metric, we provide a broad discussion about the effectiveness of each virtualization solution in fulfilling qualitative management requirements.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117122184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543812
Masashi Hojo, Ryohei Banno, Kazuyuki Shudo
Structured overlays enable a number of nodes to construct a logical network autonomously and search each other. Skip Graph, one of the structured overlays, constructs an overlay network based on Skip List structure and supports range queries for keys. Skip Graph manages routing tables based on random digits; therefore, the deviation of them disturbs effective utilization of the routing table entries and increases path length than the ideal value. We therefore propose FRT-Skip Graph, a novel structured overlay that solves the issues of Skip Graph and provides desirable features not in Skip Graph. FRT-Skip Graph is designed based on Flexible Routing Tables and supports range queries similarly to Skip Graph. Furthermore, it provides features derived from FRT, namely, dynamic routing table size and high extensibility.
{"title":"FRT-Skip Graph: A Skip Graph-style structured overlay based on Flexible Routing Tables","authors":"Masashi Hojo, Ryohei Banno, Kazuyuki Shudo","doi":"10.1109/ISCC.2016.7543812","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543812","url":null,"abstract":"Structured overlays enable a number of nodes to construct a logical network autonomously and search each other. Skip Graph, one of the structured overlays, constructs an overlay network based on Skip List structure and supports range queries for keys. Skip Graph manages routing tables based on random digits; therefore, the deviation of them disturbs effective utilization of the routing table entries and increases path length than the ideal value. We therefore propose FRT-Skip Graph, a novel structured overlay that solves the issues of Skip Graph and provides desirable features not in Skip Graph. FRT-Skip Graph is designed based on Flexible Routing Tables and supports range queries similarly to Skip Graph. Furthermore, it provides features derived from FRT, namely, dynamic routing table size and high extensibility.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114203688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543800
Kai He, Chuanhe Huang, Jiaoli Shi, Jinhai Wang
To protect cloud data against corruption, enabling data integrity checking along with error recovery becomes quite critical. Recently, regenerating code has caught researchers' attention due to low repair traffic while preserving fault tolerance. Existing integrity checking schemes for regenerating code storage only support static data and have high auditing cost, which are not suitable for practical application. In this work, We propose a public auditing scheme for regenerating code based cloud storage supporting data dynamics. Our scheme allows the auditor to check the integrity of data stored across multiple servers and identify the location of corrupted data when data corruption is detected within one round. To support data dynamics, we design a novel update method based on matrix and index mechanism. The update method support multiple update requests performed in batch way without downloading and re-coding the data file and re-computing the data tags, such that the communication and computation cost can be greatly reduced. Theoretic analysis and experimental results show the security and efficiency of our proposed scheme.
{"title":"Public integrity auditing for dynamic regenerating code based cloud storage","authors":"Kai He, Chuanhe Huang, Jiaoli Shi, Jinhai Wang","doi":"10.1109/ISCC.2016.7543800","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543800","url":null,"abstract":"To protect cloud data against corruption, enabling data integrity checking along with error recovery becomes quite critical. Recently, regenerating code has caught researchers' attention due to low repair traffic while preserving fault tolerance. Existing integrity checking schemes for regenerating code storage only support static data and have high auditing cost, which are not suitable for practical application. In this work, We propose a public auditing scheme for regenerating code based cloud storage supporting data dynamics. Our scheme allows the auditor to check the integrity of data stored across multiple servers and identify the location of corrupted data when data corruption is detected within one round. To support data dynamics, we design a novel update method based on matrix and index mechanism. The update method support multiple update requests performed in batch way without downloading and re-coding the data file and re-computing the data tags, such that the communication and computation cost can be greatly reduced. Theoretic analysis and experimental results show the security and efficiency of our proposed scheme.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"2896 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127448967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543791
Ali Hussein, I. Elhajj, A. Chehab, A. Kayssi
Software Defined Networking (SDN) is the new promise towards an easily configured and centrally controlled network. Based on this centralized control, SDN technology has proved its positive impact in the world of network communications from different aspects. Consistency in SDN, as in any rule-based network, is an essential feature that every communication system should possess. In this paper, we propose an SDN verificationg layer based on formal techniques to establish flow consistency between SDN switches before the flow insertion process takes place. We show how such an approach can be used to prevent loopbacks, deadlocks, security domain breaches, and to verify the time delay for a controller to update a switch versus the switch to forward a packet. This last point ensures that the update process is synchronized and no packet would be checked against old rules during this update process. The solution lies in introducing a verification plane enabling our verification module to interact with a third party verification tool (UPPAAL) translating the controller's view of the network to a state machine and verifying each flow before being installed. The verification tool checks each flow against a predefined set of rules by applying the new flow to the scheme and testing if a packet can pass from point A to B without violating these rules. Our evaluation shows the capability of the proposed system to enforce different levels of consistency verification in case of flow update and topology change in a SDN network.
{"title":"SDN verification plane for consistency establishment","authors":"Ali Hussein, I. Elhajj, A. Chehab, A. Kayssi","doi":"10.1109/ISCC.2016.7543791","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543791","url":null,"abstract":"Software Defined Networking (SDN) is the new promise towards an easily configured and centrally controlled network. Based on this centralized control, SDN technology has proved its positive impact in the world of network communications from different aspects. Consistency in SDN, as in any rule-based network, is an essential feature that every communication system should possess. In this paper, we propose an SDN verificationg layer based on formal techniques to establish flow consistency between SDN switches before the flow insertion process takes place. We show how such an approach can be used to prevent loopbacks, deadlocks, security domain breaches, and to verify the time delay for a controller to update a switch versus the switch to forward a packet. This last point ensures that the update process is synchronized and no packet would be checked against old rules during this update process. The solution lies in introducing a verification plane enabling our verification module to interact with a third party verification tool (UPPAAL) translating the controller's view of the network to a state machine and verifying each flow before being installed. The verification tool checks each flow against a predefined set of rules by applying the new flow to the scheme and testing if a packet can pass from point A to B without violating these rules. Our evaluation shows the capability of the proposed system to enforce different levels of consistency verification in case of flow update and topology change in a SDN network.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126188853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-27DOI: 10.1109/ISCC.2016.7543769
S. Alam, K. Dewangan, A. Sinharay, Avik Ghose
Recently smartphones are used every area in day-to-day life. Smartphones comes with several built-in sensors like gyroscope, accelerometer etc., along with powerful processing units. There exist various frameworks which use mobile as sensing device and mobile sensors as data extractor and process extracted data to calculate various parameter. This processing unit can be resided either in mobile side or cloud side, which provides flexibility to the researcher/developer to reduce computation time by migrating processing unit and transferring data to the cloud side. This may create problem of packet dropping or network issue while transferring data to the cloud. To overcome network issue, we propose a common framework which maintains trade-off between network overhead and processing time. The key feature of proposed framework is dividing processing unit into mobile and cloud side, sends raw data to cloud after preprocessing at mobile side. This will take very low processing time and reduce raw data size, which reduces number of packets to send to the cloud. We investigate feasibility of our proposed framework by implementing and testing with several collaborative sensing applications and comparing with the existing framework. Our result shows promising result by trading off between on-board processing and network overhead across all the solutions we had tested.
{"title":"Mobile sensing framework for task partitioning between cloud and edge device for improved performance","authors":"S. Alam, K. Dewangan, A. Sinharay, Avik Ghose","doi":"10.1109/ISCC.2016.7543769","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543769","url":null,"abstract":"Recently smartphones are used every area in day-to-day life. Smartphones comes with several built-in sensors like gyroscope, accelerometer etc., along with powerful processing units. There exist various frameworks which use mobile as sensing device and mobile sensors as data extractor and process extracted data to calculate various parameter. This processing unit can be resided either in mobile side or cloud side, which provides flexibility to the researcher/developer to reduce computation time by migrating processing unit and transferring data to the cloud side. This may create problem of packet dropping or network issue while transferring data to the cloud. To overcome network issue, we propose a common framework which maintains trade-off between network overhead and processing time. The key feature of proposed framework is dividing processing unit into mobile and cloud side, sends raw data to cloud after preprocessing at mobile side. This will take very low processing time and reduce raw data size, which reduces number of packets to send to the cloud. We investigate feasibility of our proposed framework by implementing and testing with several collaborative sensing applications and comparing with the existing framework. Our result shows promising result by trading off between on-board processing and network overhead across all the solutions we had tested.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127716219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}