SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Scalable networked systems:
analysis and optimization
Gopika Premsankar
Doctoral candidate
Department of Computer Science
February 28, 2020
Future networked systems
Image source: Solvieg Been/Shutterstock
Different connectivity requirements
11111111111111111
22222222222222222
33333333333333333
Image source: Solvieg Been/Shutterstock
Different connectivity requirements
Battery-powered
Small infrequent
data (bytes)
Delay in hours
11111111111111111
Image source: Solvieg Been, Jarp2/Shutterstock
Different connectivity requirements
Battery-powered
Small infrequent
data (bytes)
Delay in hours
Mains-powered
Large video data
(MBs)
Delay in seconds
to minutes
22222222222222222
Image source: Solvieg Been, Jarp2, NinaM/Shutterstock
Different connectivity requirements
Battery-powered
Small infrequent
data (bytes)
Delay in hours
Mains-powered
Large video data
(MBs)
Delay in seconds
to minutes
Battery-powered
Large sensor-rich
data (MBs)
Delay in
milliseconds
33333333333333333
Image source: Solvieg Been, Jarp2, NinaM, Herr Loeffer/Shutterstock
A single network cannot
satisfy all requirements
Challenges in current networks
Image source: Solvieg Been/Shutterstock
Increasing interference with
high density of devices
A single network cannot
satisfy all requirements
Challenges in current networks
Image source: Solvieg Been/Shutterstock
Increasing interference with
high density of devices
A single network cannot
satisfy all requirements
Large latency of communication
to distant cloud data centers
Challenges in current networks
Image source: Solvieg Been/Shutterstock
Research goal
How to enable scalable and reliable communications
for large number of heterogeneous devices
through algorithmic approaches?
Research question 1
What is the role of secondary access networks
in enabling scalable communications?
Image source: Solvieg Been/Shutterstock
Secondary access networks
Utilize free spectrum in TV white space and Industrial, Scientific
and Medical (ISM) bands through opportunistic contacts between
mobile users
Distributor selection algorithm
Select distributors to maximize offloaded traffic
WS offloading enables 47% more capacity even with inaccurate
WSDB information
Publication I. Suzan Bayhan, Gopika Premsankar, Mario Di Francesco, Jussi Kan-
gasharju, “Mobile Content Offloading in Database-Assisted White Space Net-
works”, CROWNCOM ‘16, May 2016
Research question 2
How to achieve scalable and reliable communications
in dense urban deployments of LoRa networks?
Image source: Solvieg Been/Shutterstock
Adaptive configuration of LoRa parameters
REV
1.2
201
1-08
-08
__
__
REV
1.2
201
1-08
-08
__
__
SF 7
SF 8
SF 9
SF 10
SF 11
SF 12
Lower SF: higher data rate, less energy
Higher SF: lower data rate, more energy
Control parameters: spreading factor (SF), transmission power
to increase scalablity
Issues identified with Adaptive Data Rate (ADR) algorithm to
control parameters
Publication II. Mariusz Slabicki, Gopika Premsankar, Mario Di Francesco, “Adaptive
Configuration of LoRa Networks for Dense IoT Deployments”, IEEE/IFIP NOMS ‘18,
Apr 2018
Optimal assignment of LoRa parameters
REV
1.2
2011
-08-0
8
___
_
REV
1.2
2011
-08-0
8
___
_
REV
1.2
2011
-08-0
8
___
_
REV
1.2
2011
-08-0
8
___
_
REV
1.2
2011
-08-0
8
___
_
REV
1.2
2011
-08-0
8
___
_
REV
1.2
2011
-08-0
8
___
_
REV
1.2
2011
-08-0
8
___
_
High transmission power Low transmission power
SF 7
SF 9
SF 10
SF 8
SF 7
SF 9
SF 10
SF 8
A A
B B
C C
D D
Integer Linear Programming model to assign parameters
to nodes in dense networks with multiple gateways
Improved reliability with up to 8% increase in successful delivery
of messages
Publication III. Gopika Premsankar, Bissan Ghaddar, Mariusz Slabicki, Mario Di
Francesco, “Optimal configuration of LoRa networks in smart cities”, IEEE Trans-
actions on Industrial Informatics, to appear
FLoRa
Open source framework for LoRa simulations (FLoRa)
https://flora.aalto.fi https://github.com/mariuszslabicki/flora
Research question 3
How can edge computing
provide scalable processing
for data-intensive applications?
Image source: Solvieg Been/Shutterstock
Properties of edge computing
Mobile
network
edge
CSC cloud
Kajaani
Finland
EC2
Frankfurt
datacenter
EC2
Ireland
datacenter
0
20
40
60
80
100
Networkdelay(ms)
WiFi
LTE
800 x 600 1280 x 720 1920 x 10800
10
20
30
40
50
60
Processingdelay(ms)
g2.2xlarge
g2.8xlarge
More processing power in the cloud does not compensate for the
network delay to reach distant data centers
Publication IV. Gopika Premsankar, Mario Di Francesco, Tarik Taleb, “Edge Com-
puting for the Internet of Things: A Case Study”, IEEE Internet of Things Journal
5(2):1275–1284, Feb 2018
Optimal placement of edge devices
Candidate edge device location
Mixed Integer Linear Programming model to optimally place
edge devices in a city
Improved delivery of messages and reduced overload
at edge servers when traffic volume is high
Publication V. Gopika Premsankar, Bissan Ghaddar, Mario Di Francesco, Rudi Ver-
ago, “Efficient Placement of Edge Computing Devices for Vehicular Applications
in Smart Cities”, IEEE/IFIP NOMS ‘18, Apr 2018. Best student paper award
Summary and future work
Proposed solutions that can solve large network instances
within a short time
Improved reliability of networks even in dense networks
Data-centric approach to optimizing the network

Weitere ähnliche Inhalte

Was ist angesagt?

Artificial neural network for misuse detection
Artificial neural network for misuse detectionArtificial neural network for misuse detection
Artificial neural network for misuse detectionSajan Sahu
 
Detection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks inDetection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks inFinalyear Projects
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...IEEEFINALYEARPROJECTS
 
Privacy and integrity-preserving range queries
Privacy and integrity-preserving range queriesPrivacy and integrity-preserving range queries
Privacy and integrity-preserving range queriesKeerthi Reddy Yeruva
 
Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Raja Shekhar
 
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET Journal
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networkseSAT Publishing House
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)Sakhee Khan
 
Icacci presentation-cnn intrusion
Icacci presentation-cnn intrusionIcacci presentation-cnn intrusion
Icacci presentation-cnn intrusionvinaykumar R
 
Energetic key for protected communication in wireless sensor network
Energetic key for protected communication in wireless sensor networkEnergetic key for protected communication in wireless sensor network
Energetic key for protected communication in wireless sensor networkeSAT Journals
 
Energetic key for protected communication in wireless
Energetic key for protected communication in wirelessEnergetic key for protected communication in wireless
Energetic key for protected communication in wirelesseSAT Publishing House
 

Was ist angesagt? (19)

Artificial neural network for misuse detection
Artificial neural network for misuse detectionArtificial neural network for misuse detection
Artificial neural network for misuse detection
 
Artificial neural networks
Artificial neural networks Artificial neural networks
Artificial neural networks
 
Detection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks inDetection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks in
 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
 
Wsn1 ppt
Wsn1 pptWsn1 ppt
Wsn1 ppt
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...
 
Privacy and integrity-preserving range queries
Privacy and integrity-preserving range queriesPrivacy and integrity-preserving range queries
Privacy and integrity-preserving range queries
 
Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)
 
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
 
A0320105
A0320105A0320105
A0320105
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networks
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
Icacci presentation-cnn intrusion
Icacci presentation-cnn intrusionIcacci presentation-cnn intrusion
Icacci presentation-cnn intrusion
 
Energetic key for protected communication in wireless sensor network
Energetic key for protected communication in wireless sensor networkEnergetic key for protected communication in wireless sensor network
Energetic key for protected communication in wireless sensor network
 
Energetic key for protected communication in wireless
Energetic key for protected communication in wirelessEnergetic key for protected communication in wireless
Energetic key for protected communication in wireless
 

Ähnlich wie Scalable communication networks - dissertation slides

Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationSecure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationeSAT Journals
 
Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationSecure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationeSAT Publishing House
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...IJAEMSJORNAL
 
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...prj_publication
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganographyAlexander Decker
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganographyAlexander Decker
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
 
IRJET - Hand Gesture Recognition and Voice Conversion System using IoT
IRJET -  	  Hand Gesture Recognition and Voice Conversion System using IoTIRJET -  	  Hand Gesture Recognition and Voice Conversion System using IoT
IRJET - Hand Gesture Recognition and Voice Conversion System using IoTIRJET Journal
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues andijfcstjournal
 
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering ijistjournal
 
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
Strategic Prefetching of VoD Programs Based on ART2 driven Request ClusteringStrategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clusteringijistjournal
 
Fpga implementation of wireless data logger system
Fpga implementation of wireless data logger systemFpga implementation of wireless data logger system
Fpga implementation of wireless data logger systemeSAT Journals
 
The pattern and realization of zigbee wi-fi
The pattern and realization of zigbee  wi-fiThe pattern and realization of zigbee  wi-fi
The pattern and realization of zigbee wi-fieSAT Publishing House
 
The pattern and realization of zigbee wi-fi wireless pathway
The pattern and realization of zigbee  wi-fi wireless pathwayThe pattern and realization of zigbee  wi-fi wireless pathway
The pattern and realization of zigbee wi-fi wireless pathwayeSAT Journals
 

Ähnlich wie Scalable communication networks - dissertation slides (20)

Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationSecure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfiguration
 
Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationSecure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfiguration
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...
 
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
 
2013 2014 ieee dotnet project titles
2013 2014 ieee dotnet project titles2013 2014 ieee dotnet project titles
2013 2014 ieee dotnet project titles
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
IRJET - Hand Gesture Recognition and Voice Conversion System using IoT
IRJET -  	  Hand Gesture Recognition and Voice Conversion System using IoTIRJET -  	  Hand Gesture Recognition and Voice Conversion System using IoT
IRJET - Hand Gesture Recognition and Voice Conversion System using IoT
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
 
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
 
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
Strategic Prefetching of VoD Programs Based on ART2 driven Request ClusteringStrategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
Strategic Prefetching of VoD Programs Based on ART2 driven Request Clustering
 
Fpga implementation of wireless data logger system
Fpga implementation of wireless data logger systemFpga implementation of wireless data logger system
Fpga implementation of wireless data logger system
 
Lecture 2_IoT.pptx
Lecture 2_IoT.pptxLecture 2_IoT.pptx
Lecture 2_IoT.pptx
 
The pattern and realization of zigbee wi-fi
The pattern and realization of zigbee  wi-fiThe pattern and realization of zigbee  wi-fi
The pattern and realization of zigbee wi-fi
 
The pattern and realization of zigbee wi-fi wireless pathway
The pattern and realization of zigbee  wi-fi wireless pathwayThe pattern and realization of zigbee  wi-fi wireless pathway
The pattern and realization of zigbee wi-fi wireless pathway
 

Kürzlich hochgeladen

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Kürzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Scalable communication networks - dissertation slides

  • 1. Scalable networked systems: analysis and optimization Gopika Premsankar Doctoral candidate Department of Computer Science February 28, 2020
  • 2. Future networked systems Image source: Solvieg Been/Shutterstock
  • 4. Different connectivity requirements Battery-powered Small infrequent data (bytes) Delay in hours 11111111111111111 Image source: Solvieg Been, Jarp2/Shutterstock
  • 5. Different connectivity requirements Battery-powered Small infrequent data (bytes) Delay in hours Mains-powered Large video data (MBs) Delay in seconds to minutes 22222222222222222 Image source: Solvieg Been, Jarp2, NinaM/Shutterstock
  • 6. Different connectivity requirements Battery-powered Small infrequent data (bytes) Delay in hours Mains-powered Large video data (MBs) Delay in seconds to minutes Battery-powered Large sensor-rich data (MBs) Delay in milliseconds 33333333333333333 Image source: Solvieg Been, Jarp2, NinaM, Herr Loeffer/Shutterstock
  • 7. A single network cannot satisfy all requirements Challenges in current networks Image source: Solvieg Been/Shutterstock
  • 8. Increasing interference with high density of devices A single network cannot satisfy all requirements Challenges in current networks Image source: Solvieg Been/Shutterstock
  • 9. Increasing interference with high density of devices A single network cannot satisfy all requirements Large latency of communication to distant cloud data centers Challenges in current networks Image source: Solvieg Been/Shutterstock
  • 10. Research goal How to enable scalable and reliable communications for large number of heterogeneous devices through algorithmic approaches?
  • 11. Research question 1 What is the role of secondary access networks in enabling scalable communications? Image source: Solvieg Been/Shutterstock
  • 12. Secondary access networks Utilize free spectrum in TV white space and Industrial, Scientific and Medical (ISM) bands through opportunistic contacts between mobile users
  • 13. Distributor selection algorithm Select distributors to maximize offloaded traffic WS offloading enables 47% more capacity even with inaccurate WSDB information Publication I. Suzan Bayhan, Gopika Premsankar, Mario Di Francesco, Jussi Kan- gasharju, “Mobile Content Offloading in Database-Assisted White Space Net- works”, CROWNCOM ‘16, May 2016
  • 14. Research question 2 How to achieve scalable and reliable communications in dense urban deployments of LoRa networks? Image source: Solvieg Been/Shutterstock
  • 15. Adaptive configuration of LoRa parameters REV 1.2 201 1-08 -08 __ __ REV 1.2 201 1-08 -08 __ __ SF 7 SF 8 SF 9 SF 10 SF 11 SF 12 Lower SF: higher data rate, less energy Higher SF: lower data rate, more energy Control parameters: spreading factor (SF), transmission power to increase scalablity Issues identified with Adaptive Data Rate (ADR) algorithm to control parameters Publication II. Mariusz Slabicki, Gopika Premsankar, Mario Di Francesco, “Adaptive Configuration of LoRa Networks for Dense IoT Deployments”, IEEE/IFIP NOMS ‘18, Apr 2018
  • 16. Optimal assignment of LoRa parameters REV 1.2 2011 -08-0 8 ___ _ REV 1.2 2011 -08-0 8 ___ _ REV 1.2 2011 -08-0 8 ___ _ REV 1.2 2011 -08-0 8 ___ _ REV 1.2 2011 -08-0 8 ___ _ REV 1.2 2011 -08-0 8 ___ _ REV 1.2 2011 -08-0 8 ___ _ REV 1.2 2011 -08-0 8 ___ _ High transmission power Low transmission power SF 7 SF 9 SF 10 SF 8 SF 7 SF 9 SF 10 SF 8 A A B B C C D D Integer Linear Programming model to assign parameters to nodes in dense networks with multiple gateways Improved reliability with up to 8% increase in successful delivery of messages Publication III. Gopika Premsankar, Bissan Ghaddar, Mariusz Slabicki, Mario Di Francesco, “Optimal configuration of LoRa networks in smart cities”, IEEE Trans- actions on Industrial Informatics, to appear
  • 17. FLoRa Open source framework for LoRa simulations (FLoRa) https://flora.aalto.fi https://github.com/mariuszslabicki/flora
  • 18. Research question 3 How can edge computing provide scalable processing for data-intensive applications? Image source: Solvieg Been/Shutterstock
  • 19. Properties of edge computing Mobile network edge CSC cloud Kajaani Finland EC2 Frankfurt datacenter EC2 Ireland datacenter 0 20 40 60 80 100 Networkdelay(ms) WiFi LTE 800 x 600 1280 x 720 1920 x 10800 10 20 30 40 50 60 Processingdelay(ms) g2.2xlarge g2.8xlarge More processing power in the cloud does not compensate for the network delay to reach distant data centers Publication IV. Gopika Premsankar, Mario Di Francesco, Tarik Taleb, “Edge Com- puting for the Internet of Things: A Case Study”, IEEE Internet of Things Journal 5(2):1275–1284, Feb 2018
  • 20. Optimal placement of edge devices Candidate edge device location Mixed Integer Linear Programming model to optimally place edge devices in a city Improved delivery of messages and reduced overload at edge servers when traffic volume is high Publication V. Gopika Premsankar, Bissan Ghaddar, Mario Di Francesco, Rudi Ver- ago, “Efficient Placement of Edge Computing Devices for Vehicular Applications in Smart Cities”, IEEE/IFIP NOMS ‘18, Apr 2018. Best student paper award
  • 21. Summary and future work Proposed solutions that can solve large network instances within a short time Improved reliability of networks even in dense networks Data-centric approach to optimizing the network