Abstract
Introduced as an extension of the Cloud at the network edge for computing and storage purposes, the Fog is increasingly considered a key enabler for Internet-of-Things applications whose latency requirements are not compatible with a Cloud-only approach. Unlike Cloud platforms, which can elastically accommodate large numbers of requests, Fog deployments are usually dimensioned for an average traffic load and, thus, unable to handle sudden bursts of requests without violating latency guarantees. In this article, we address the problem of efficiently controlling Fog admission to guarantee application response time. We propose request-aware admission control (AC) strategies maximizing the number of Fog-handled requests by means of dynamic popularity estimation. In particular, the LRU-AC, an AC strategy based on online learning of the request popularity distribution via a Least Recently Used (LRU) filter, is introduced. We contribute an analytical model for assessing LRU-AC performance and quantifying the incurred reduction of Cloud offload cost, w.r.t. both an ideal oracle-based and a request-oblivious AC strategy. Further, we propose a feasible implementation design of LRU-AC on FPGA hardware using Aging Bloom Filters (ABF) to mimic the function of the LRU-AC, while providing a compact memory representation. The use of ABFs for LRU-AC is theoretically validated and verified through simulation. The current implementation shows a throughput of 16.7 Mpps and a processing latency of less than 3μ s while multiplying the Fog acceptance-rate by 10 in the evaluated scenario.
- Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. 2012. Fog computing and its role in the Internet of Things. In Proc. 1st Edition Workshop Mobile Cloud Computing. ACM.Google Scholar
Digital Library
- Kirak Hong, David Lillethun, Umakishore Ramachandran, Beate Ottenwälder, and Boris Koldehofe. 2013. Mobile fog: A programming model for large-scale applications on the Internet of Things. In Proc. 2nd SIGCOMM Workshop Mobile Cloud Computing. ACM.Google Scholar
Digital Library
- Mohit Taneja and Alan Davy. 2017. Resource aware placement of IoT application modules in fog-cloud computing paradigm. In 2017 IFIP/IEEE Symp. Integrated Network and Service Manage. (IM). 1222--1228. DOI:http://dx.doi.org/10.23919/INM.2017.7987464Google Scholar
Cross Ref
- Redowan Mahmud, Kotagiri Ramamohanarao, and Rajkumar Buyya. 2018. Latency-aware application module management for fog computing environments. ACM Trans. Internet Technol. 19, 1 (Nov. 2018). DOI:http://dx.doi.org/10.1145/3186592Google Scholar
Digital Library
- Junaid Khan, Cedric Westphal, and Yacine Ghamri-Doudane. 2017. A content-based centrality metric for collaborative caching in information-centric fogs. In IFIP-Networking - ICFC.Google Scholar
- M. Wang, J. Wu, G. Li, J. Li, and Q. Li. 2017. Fog computing based content-aware taxonomy for caching optimization in information-centric networks. In IEEE Conf. Comput. Commun. Workshops.Google Scholar
- Zhuo Chen, Wenlu Hu, Junjue Wang, Siyan Zhao, Brandon Amos, Guanhang Wu, Kiryong Ha, Khalid Elgazzar, Padmanabhan Pillai, Roberta Klatzky, Daniel Siewiorek, and Mahadev Satyanarayanan. 2017. An empirical study of latency in an emerging class of edge computing applications for wearable cognitive assistance. In Proc. 2nd ACM/IEEE Symp. Edge Computing. ACM.Google Scholar
Digital Library
- Mung Chiang, Bharath Balasubramanian, and Flavio Bonomi. 2017. Fog for 5G and IoT. John Wiley 8 Sons.Google Scholar
- AWS Greengrass. Retrieved from https://aws.amazon.com/greengrass.Google Scholar
- Ashish Rauniyar, Paal Engelstad, Boning Feng, et al. 2016. Crowdsourcing-based disaster management using fog computing in internet of things paradigm. In 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC). IEEE, 490--494.Google Scholar
Cross Ref
- Zhou Su, Qichao Xu, Jun Luo, Huayan Pu, Yan Peng, and Rongxing Lu. 2018. A secure content caching scheme for disaster backup in fog computing enabled mobile social networks. IEEE Trans. Ind. Inf. 14, 10 (2018), 4579--4589.Google Scholar
Cross Ref
- Yipei Niu, Fangming Liu, Xincai Fei, and Bo Li. 2017. Handling flash deals with soft guarantee in hybrid cloud. In Proc. INFOCOM. IEEE.Google Scholar
Cross Ref
- Jianbo Du, Liqiang Zhao, Jie Feng, and Xiaoli Chu. 2018. Computation offloading and resource allocation in mixed fog/cloud computing systems with min-max fairness guarantee. IEEE Trans. Commun. 66, 4 (2018), 1594--1608.Google Scholar
- Robert B. Miller. 1968. Response time in man-computer conversational transactions. In Proc. AFIPS Fall Joint Comput. Conf.Google Scholar
Digital Library
- Marcel Enguehard, Giovanna Carofiglio, and Dario Rossi. 2018. A popularity-based approach for effective Cloud offload in Fog deployments. In Proc. 2018 30th Int. Teletraffic Congr. (ITC 30), Vol. 1. IEEE, 55--63.Google Scholar
Cross Ref
- Michaela Blott, Kimon Karras, Ling Liu, Kees A. Vissers, Jeremia Bär, and Zsolt István. 2013. Achieving 10Gbps line-rate key-value stores with FPGAs. In HotCloud.Google Scholar
- MyungKeun Yoon. 2010. Aging bloom filter with two active buffers for dynamic sets. IEEE Trans. Knowl. Data Eng. 22, 1 (2010), 134--138.Google Scholar
Digital Library
- Noa Zilberman, Yury Audzevich, G. Adam Covington, and Andrew W. Moore. 2014. NetFPGA SUME: Toward 100 Gbps as research commodity. IEEE Micro 34, 5 (2014), 32--41.Google Scholar
Cross Ref
- Luca Muscariello, Giovanna Carofiglio, Jordan Auge, and Michele Papalini. 2018. Hybrid Information-Centric Networking. Internet-Draft draft-muscariello-intarea-hicn-00. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-muscariello-intarea-hicn-00 Work in Progress.Google Scholar
- Pat Bosshart, George Varghese, David Walker, Dan Daly, Glen Gibb, Martin Izzard, Nick McKeown, Jennifer Rexford, Cole Schlesinger, Dan Talayco, and Amin Vahdat. 2014. P4: Programming protocol-independent packet processors. ACM SIGCOMM Comput. Communication Review 44, 3 (July 2014), 87--95. DOI:http://dx.doi.org/10.1145/2656877.2656890Google Scholar
Digital Library
- Ming Mao and Marty Humphrey. 2011. Auto-scaling to minimize cost and meet application deadlines in cloud workflows. In Proc. of 2011 Int. Conf. for High Performance Computing, Networking, Storage and Anal. ACM. DOI:http://dx.doi.org/10.1145/2063384.2063449Google Scholar
Digital Library
- Tomasz Janaszka, Dariusz Bursztynowski, and Mateusz Dzida. 2012. On popularity-based load balancing in content networks. In Proc. 24th Int. Teletraffic Congr. 12.Google Scholar
Digital Library
- Giovanna Carofiglio, Leonce Mekinda, and Luca Muscariello. 2015. FOCAL: Forwarding and caching with latency awareness in information-centric networking. In Globecom Workshops. IEEE, 1--7.Google Scholar
Cross Ref
- Christine Fricker, Philippe Robert, and James Roberts. 2012. A versatile and accurate approximation for LRU cache performance. In Proc. 24th Int. Teletraffic Congr.Google Scholar
Digital Library
- Giuseppe Rossini and Dario Rossi. 2013. Evaluating CCN multi-path interest forwarding strategies. Comput. Commun. 36, 7 (2013), 771--778.Google Scholar
Digital Library
- Lee Breslau, Pei Cao, Li Fan, Graham Phillips, and Scott Shenker. 1999. Web caching and Zipf-like distributions: Evidence and implications. In Proc. INFOCOM, Vol. 1. IEEE.Google Scholar
Cross Ref
- Claudio Imbrenda, Luca Muscariello, and Dario Rossi. 2014. Analyzing cacheable traffic in ISP access networks for micro CDN applications via content-centric networking. In Proc. 1st ACM SIGCOMM Conf. Inform.-Centric Networking.Google Scholar
Digital Library
- Stefano Traverso, Mohamed Ahmed, Michele Garetto, Paolo Giaccone, Emilio Leonardi, and Saverio Niccolini. 2013. Temporal locality in today’s content caching: Why it matters and how to model it. ACM SIGCOMM Comput. Commun. Rev. 43, 5 (2013).Google Scholar
Digital Library
- Bhuvan Urgaonkar, Giovanni Pacifici, Prashant Shenoy, Mike Spreitzer, and Asser Tantawi. 2005. An analytical model for multi-tier internet services and its applications. ACM SIGMETRICS Perform. Eval. Rev. 33, 1 (2005), 291--302.Google Scholar
Digital Library
- Masahiko Nabe, Masayuki Murata, and Hideo Miyahara. 1998. Analysis and modeling of world wide web traffic for capacity dimensioning of Internet access lines. Perform. Eval. 34, 4 (1998).Google Scholar
- Jacqueline Boyer, Fabrice Guillemin, Philippe Robert, and Bert Zwart. 2003. Heavy tailed M/G/1-PS queues with impatience and admission control in packet networks. In Proc. INFOCOM, Vol. 1. IEEE.Google Scholar
Cross Ref
- Hao Che, Ye Tung, and Zhijun Wang. 2002. Hierarchical web caching systems: Modeling, design and experimental results. J. Sel. Areas Commun. 20, 7 (2002).Google Scholar
- Frank P. Kelly. 2011. Reversibility and Stochastic Networks. Cambridge University Press.Google Scholar
Digital Library
- G. F. Newell. 1966. The M/G/∞ queue. J. Appl. Math. 14, 1 (1966).Google Scholar
- Yoann Desmouceaux, Marcel Enguehard, Victor Nguyen, Pierre Pfister, Wenqin Shao, and Éric Vyncke. 2019. A content-aware data-plane for efficient and scalable video delivery. In Proc. 16th IFIP/IEEE Int. Symp. Integrated Network Manage. To appear.Google Scholar
- D. Shasha and T. Johnson. 1994. 2Q: A low overhead high performance buffer management replacement algoritm. In Proc. 20th Int. Conf. Very Large Databases.Google Scholar
- Michele Garetto, Emilio Leonardi, and Valentina Martina. 2016. A unified approach to the performance analysis of caching systems. ACM Trans. Model. Perform. Eval. Comput. Syst. 1, 3 (2016), 12.Google Scholar
Digital Library
- Marcel Enguehard, Yoann Desmouceaux, and Giovanna Carofiglio. 2019. Efficient latency control in Fog deployments via hardware-accelerated popularity estimation (Technical Report). Retrieved from https://enguehard.org/papers/lru-ac-techrep2019.pdf.Google Scholar
- Krister Svanberg. 1987. The method of moving asymptotes—A new method for structural optimization. Int. J. Numer. Methods Eng. 24, 2 (1987).Google Scholar
Cross Ref
- Steven G. Johnson. The NLopt nonlinear-optimization package. Retrieved from http://ab-initio.mit.edu/nlopt.Google Scholar
- Marcel Enguehard and Yoann Desmouceaux. 2019. Marceleng/queueing-network-simulator: A simulator for queueing networks. https://github.com/marceleng/queueing-network-simulator. (Jan. 2019). DOI:http://dx.doi.org/10.5281/zenodo.2551195Google Scholar
- Jean-Louis Brelet. 2000. Using block RAM for high performance read/write CAMs. Xilinx Inc., Application Notes 204 (2000).Google Scholar
- Sarang Dharmapurikar, Praveen Krishnamurthy, Todd Sproull, and John Lockwood. 2004. Deep packet inspection using parallel bloom filters. IEEE Micro 24, 1 (Jan. 2004), 52--61. DOI:http://dx.doi.org/10.1109/mm.2004.1268997Google Scholar
Digital Library
- Haoyu Song, Sarang Dharmapurikar, Jonathan Turner, and John Lockwood. 2005. Fast hash table lookup using extended bloom filter: An aid to network processing. ACM SIGCOMM Comput. Communication Review 35, 4 (2005), 181--192. DOI:http://dx.doi.org/10.1145/1080091.1080114Google Scholar
Digital Library
- Haoyu Song, Fang Hao, Murali Kodialam, and TV Lakshman. 2009. IPv6 lookups using distributed and load balanced Bloom filters for 100Gbps core router line cards. In Proc. 28th IEEE Conf. Comput. Commun. (INFOCOM). IEEE, 2518--2526. DOI:http://dx.doi.org/10.1109/infcom.2009.5062180Google Scholar
Cross Ref
- Minlan Yu, Alex Fabrikant, and Jennifer Rexford. 2009. BUFFALO: Bloom filter forwarding architecture for large organizations. In Proc. 5th Int. Conf. Emerging Networking Experiments and Technologies - CoNEXT’09. ACM, 313--324. DOI:http://dx.doi.org/10.1145/1658939.1658975Google Scholar
Digital Library
- G. Xylomenos et al. 2014. A survey of information-centric networking research. IEEE Commun. Surveys and Tutorials, 16, 2 (Jul. 2014), 1024--1049.Google Scholar
Cross Ref
- Stephen Ibanez, Gordon Brebner, Nick McKeown, and Noa Zilberman. 2019. The P4 → NetFPGA workflow for line-rate packet processing. In Proceedings of the 2019 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays. ACM, 1--9.Google Scholar
Digital Library
- Anirudh Sivaraman, Alvin Cheung, Mihai Budiu, Changhoon Kim, Mohammad Alizadeh, Hari Balakrishnan, George Varghese, Nick McKeown, and Steve Licking. 2016. Packet transactions: High-level programming for line-rate switches. In Proc. 2016 ACM SIGCOMM Conf. ACM, 15--28.Google Scholar
Digital Library
- Martin Dietzfelbinger, Torben Hagerup, Jyrki Katajainen, and Martti Penttonen. 1997. A reliable randomized algorithm for the closest-pair problem. J. Algorithms 25, 1 (1997), 19--51.Google Scholar
Digital Library
- Yun Chao Hu, Milan Patel, Dario Sabella, Nurit Sprecher, and Valerie Young. 2015. Mobile edge computing—A key technology towards 5G. ETSI White Paper 11, 11 (2015).Google Scholar
- Maciej Malawski, Kamil Figiela, and Jarek Nabrzyski. 2013. Cost minimization for computational applications on hybrid cloud infrastructures. Future Gener. Comput. Syst. 29, 7 (2013).Google Scholar
Index Terms
Efficient Latency Control in Fog Deployments via Hardware-Accelerated Popularity Estimation
Recommendations
Cloud, Fog, or Mist in IoT? That Is the Question
Special Issue on Fog, Edge, and Cloud IntegrationInternet of Things (IoT) has been commercially explored as Platforms as a Services (PaaS). The standard solution for this kind of service is to combine the Cloud computing infrastructure with IoT software, services, and protocols also known as CoT (...
A Pattern for Fog Computing
VikingPLoP '16: Proceedings of the 10th Travelling Conference on Pattern Languages of ProgramsFog Computing is a new variety of the cloud computing paradigm that brings virtualized cloud services to the edge of the network to control the devices in the IoT. We present a pattern for fog computing which describes its architecture, including its ...
A Survey of Fog Computing: Concepts, Applications and Issues
Mobidata '15: Proceedings of the 2015 Workshop on Mobile Big DataDespite the increasing usage of cloud computing, there are still issues unsolved due to inherent problems of cloud computing such as unreliable latency, lack of mobility support and location-awareness. Fog computing can address those problems by ...






Comments