Professional Documents
Culture Documents
Optimizations For Rfid-Based Iot Applications On The Cloud
Optimizations For Rfid-Based Iot Applications On The Cloud
Hoang Minh Nguyen, Seong Hoon Kim, Dinh Tuan Le, Sehyeon Heo, Janggwan Im, Daeyoung Kim
Department of Computer Science
Korea Advanced Institute of Science and Technology
Daejeon 305-701, South Korea
Emails: {minhhoang,shkim08,ldtuan,crux042,limg00n,kimd}@kaist.ac.kr
Abstract—Internet of Things (IoT) has received a lot of a suitable approach for read-world deployments. This includes
attentions recently as a network of virtual representations of combination of Cloud Computing, REST and Mashups in [3],
physical objects using technologies like radio-frequency identi- an RFID Ecosystem deployed within a building [4], a building-
fication (RFID) to identify and tracking objects’ tags. While wide EPC Gen 2 UHF RFID deployment in [5]. However,
some research work has attempted to deliver IoT applications scalability of such approaches still remain an issue, as the
into the real-world, a scalable deployment has not yet been seen.
Therefore, by utilizing Cloud technology as a well-proven way
number of RFID readers is increasing rapidly in the IoT
of real-world deployment for thousands of vendors, we propose field. Thus, in this paper, we provide optimizations for RFID
our Cloud solution with optimizations for scalable RFID-based applications deployments, especially back-end deployment and
IoT applications deployment. In this paper, we first outline maintenance, using Cloud computing.
the challenges of deployment of RFID-based IoT applications,
then our Cloud solution with load prediction and migration For any RFID applications deployments on the Cloud,
management optimizations is proposed. For our experiments, an important component would be the ’flows’ of RFID tags
various results including prediction accuracy, migration delay between RFID readers and their applications. To optimize
and load balancing performance are presented. the performance of such application deployments, these flows
Keywords—IoT, RFID, Cloud optimizations, load balancing
present several challenges, in particular:
Various research works have deployed building-scale RFID To prove the feasibility of our approach, we have built
applications, at the same time proving Cloud platforms to be a system consisted of components taken from EPC Network
Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on March 19,2021 at 04:43:26 UTC from IEEE Xplore. Restrictions apply.
2015 5th International Conference on the Internet of Things (IoT)
software stack, including RFID readers implemented in em- and Fast Fourier Transform (FFT) to select the ’pattern’
ulators and LLRP interface. The system utilizes CloudStack from the workload historical data. For applications without
management software as it is one of the most matured open- repeating patterns, they employ a discrete-time Markov chain
source Cloud solution with flexible environment for our setup. to predict short-term future values. Dinda et al. [13] perform a
The CloudStack VMs are used to run ALE, which function comprehensive set of experiments to compare between various
as RFID readers’ clients to generate required flows for our linear models and point out the performance advantage of Auto
experiments. Our evaluation is performed for three key as- Regression model at order 16 (AR(16)). In [14] and [15], load
pects, including load prediction accuracy, migration delay, and prediction is achieved through a two-step strategy consisting
overall load balancing performance. of load tracker, which ’smooths out’ the work-load historical
data to avoid noises and show the workload’s actual trend,
The remainder of the paper is organized as follows. Section and load prediction, which predicts future values based on the
II outlines the related works to this paper. Section III provides load tracker values. The strategy is shown to work well in real
the necessary background information for understanding of the time, as simple linear models can be used for both load tracker
paper. Then the challenges of RFID application deployments and prediction. Although the above researches have significant
on Cloud and our proposed solution are explained in Section contributions in improving the accuracy in predicting load
IV. Our load and migration delay effect prediction approach is prediction values, they have a big limitation of requiring
explained in Section V, and our migration strategy is shown in sufficient past load values data (i.e. a training phase). Since our
Section VI. Experimental results and discussion are provided approach of flow-based migration scheme consists of gradually
in Section VII. Finally, concluding remarks are presented in migrating flows out of VMs in consecutive short intervals
Section VIII which emphasizes the scientific contributions of which provides limited amount of data between intervals, the
this research. above approaches are thus not suitable for our system.
Cloud computing researches have also seen a lot of works
II. R ELATED W ORKS
about migration algorithms and techniques. This ranges from
In [7], Rimal et al. provides a taxonomy and survey of evaluation of live VM migration effect on application per-
Cloud Computing systems based on the concept of massive formance [16], survey of many Cloud Computing state-of-
data processing distributed systems. They focus on comparing the-art technologies and challenges including VM migration
different world-wide Cloud Computing services’ features and [17] to different techniques of VM migrations including VM
identifying their key research challenges. Limitations of Cloud cloning [18], black-box and gray-box strategies [19], and
Computing are further elaborated by Hofman et al.[8]. They dynamic resource scaling [20]. These researches have largely
point out the tradeoffs enterprises need to make in order to concentrated on live VM migrations between hosts in order to
adopt the utility computing provided by the Cloud, which solve overloading situations in physical machines; however,
emerge or are magnified in Cloud due to the infrastructure con- load balancing within VMs have not yet been considered.
trol change from enterprises to service providers. Furthermore, While live VM migration can be effectively utilized to reduce
moving into the Cloud can bring about serious challenges such the load inside a host; this technique cannot be used to
as integration cost and performance issue for applications not reduce the load inside a VM. Furthermore, in our work, we
originally designed for Cloud adoption [9]. aim to provide a migration strategy that also considers RFID
applications’ properties, in order to perform load balancing for
There have been researches in RFID applications deploy- ALE VMs.
ments on the Cloud [3], [10], [11]. Guinard et al. [3] discusses
how Cloud Computing, RESTful interfaces, Real-time Web Analyzing the contemplated related works, we intend to
and Web 2.0 Mashups can simplify application development, bridge the gap presented in previous works: developing an
deployments and maintenance in a common RFID application. optimized strategy to bring RFID applications, in this case
Although this research works with RFID/EPC Network and EPC Network, into the Cloud. In this regard, we present
contributes to reductions in complexity and costs of deploy- a comprehensive solution to a set of challenges presented
ments, they focus mainly on Cloud functionalities without in RFID applications and demonstrate its effectiveness in a
considerations on improving the functionality between RFID Cloud-based system dealing with RFID readers and LLRP
readers and their clients. In [10], a cube model for data interface, two major components directly involved with the
processing is presented to remove data redundancies and data stated challenges.
noises; wherein Cloud computing is employed for necessary
computing power. In [11], a hybrid building fire evacuation III. BACKGROUND
system (HBFES) is designed on a mobile phone using RFID
techniques and Cloud Computing. While these two researches This section provides the background information on EPC
contribute to deployment of RFID applications on the Cloud, Network and CloudStack architectures, which are necessary in
they only utilize Cloud systems without trying to improve the understanding our architecture design and experiments.
performance of such applications.
A. EPC Network
A lot of researches have worked on load prediction in
computing systems, more recently Cloud computing systems Electronic Product Code (EPC) Network architecture’s
[12], [13], [14], [15]. Gong et al. [12] presents a scheme which components are included in Figure 1, which consists of
consists of signature-driven and state-driven resource demand Reader Device, Filtering and Collection, EPCIS, and ONS.
prediction to deal with application resources scaling conflicts. Enterprise applications communicate with EPC Network’s
Their solution, PRESS, first uses signal processing techniques components through proper interface (ONS, Query, Capture,
81
Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on March 19,2021 at 04:43:26 UTC from IEEE Xplore. Restrictions apply.
2015 5th International Conference on the Internet of Things (IoT)
Capture Interface
EPCIS
Capturing Fig. 2. Overview of CloudStack Architecture
Application
Filtering and Collection Logical Reader ALE
82
Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on March 19,2021 at 04:43:26 UTC from IEEE Xplore. Restrictions apply.
2015 5th International Conference on the Internet of Things (IoT)
100
Controller Prediction Migration
90
Results Decision
80 Load Migration
70 Migration List
Predictor Manager
CPU load value
60
50 Load Migration
40 Statistics Information
30
CloudStack Management Software
20
10 Control
0
CloudStack Hosts
1
8
15
22
29
36
43
50
57
64
71
78
85
92
99
106
113
120
127
134
141
148
155
162
169
176
183
190
197
Number of intervals Host 1 Host 2 Host n
ALE VM
ALE VM
ALE VM
ALE VM
ALE VM
ALE VM
TCP state machines. When the number of flows needed to
be migrated gets larger, ranging from hundreds to thousands
of flows, the overhead will become undesirable. Secondly, an XenServer XenServer XenServer
efficient strategy is needed for effective migration performance Hypervisor Hypervisor Hypervisor
inside the Cloud systems, including when, where, and what to
migrate.
Flow
83
Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on March 19,2021 at 04:43:26 UTC from IEEE Xplore. Restrictions apply.
2015 5th International Conference on the Internet of Things (IoT)
where: (Fig. 6). Each flow’s event cycle is tracked in order to predict
this delay inside each VM.
EM A(t) : the exponential moving average value at time t
O(t) : the observed load value at time t
Migration Effect
α : the smoothing factor
100 Migration Point
90
EMA is chosen for its ability to smooth the load; however, 80
70
With the above reasoning, together with careful considera- Event Cycle Event Cycle
tions of a previous research work [23] that allows for negative
Tags Tags Tags
value of α, we come up with a modified smoothing value,
namely ”adaptive Exponential Moving Average”. This is de- Migration Point
signed to be able to ”adapt” to different cases of increasing and Tags Reported Tags Reported Tags Reported
decreasing load values. In other words, the smoothing factors
”accelerates” for increasing load values, and ”decelerates” for Fig. 6. Delay Effect after Migration
decreasing load values, thus the name of ”adaptive EMA”.
α = ( O(t)−E(t−1)
100 − 1) ∗ i for increasing load values VI. M IGRATION M ANAGER
A. Migration Technique
and
In our system, to reduce load level when necessary, flows
E(t−1)−O(t) should be migrated from one VM to another; this procedure
α = (1 − 100 ) ∗ d for decreasing load values
is different from live VM migration. Also, migrating flows is
where: not straightforward, as connections from RFID readers to their
clients are TCP-based; direct migrations would, as a result,
i : increasing smoothing factor cause high overhead as well as TCP state machines changes
d : decreasing smoothing factor [24]. So, instead of direct migrations, we apply a redirection-
based migration technique to migrate connection out of a VM
B. Prediction of Delays after Migrations whenever necessary (Fig. 7).The connection between a RFID
reader and an ALE VM can be redirected using iptables chain
In our flow-based system, whenever a migration is per- manipulation of sockets (each consisting of an IP address and
formed, an amount of time is needed for the VM’s load to a port number). Although this approach introduces delay for
stabilize; an example of this behavior is shown in Fig. 5. As migrated flows establishment; the delay is shown to be small
can be seen from the figure, load remains at high level even in our experimental evaluation.
after a migration has already been finished; only until after
some time that the load finally settles down and exhibit its In our system, we take advantage of CloudStack Virtual
normal behavior. Router to perform our redirection-based flow migration ap-
proach. Rules in iptables-like chains inside the Virtual Router
The reason for this delay effect can be explained in are sequentially traversed to process and send the packets to
Fig. 6. Tags are continuously read into RFID readers from the correct destination VM. A flow of tags is considered to be
outside world objects. However, these tags are not immediately the smallest migration unit in our system.
reported from RFID readers to their clients (ALE VM) once
they are read. Instead, tags are reported after regular time line B. Migration Decision
configuration called ”event cycle” inside RFID readers. This,
in turn, causes the load inside the VM to remain at high level To properly perform flow migrations for VMs, our system
for a longer amount of time even after migration has been needs to be able to solve three essential issues, including which
performed (in other words, a ”delay” is experienced). flows to migrate, when to migrate, and where to migrate them.
Thus, in our system, the delay time is calculate to be from • Flows to migrate: it is necessary to calculate the
the moment a migration happens until the next event cycle amount of CPU the migrated flows would take inside
84
Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on March 19,2021 at 04:43:26 UTC from IEEE Xplore. Restrictions apply.
2015 5th International Conference on the Internet of Things (IoT)
CPU Type Intel Core i5-3330 AMD Opteron 6172 AMD Opteron
Flow Number of 4 48 1
CloudStack Virtual Router CPU cores
Total Memory 8GB 200GB 1GB
Redirection
ALE VM
ALE VM
ALE VM
ALE VM
ALE VM
ALE VM
ALE VM
ALE VM
85
Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on March 19,2021 at 04:43:26 UTC from IEEE Xplore. Restrictions apply.
2015 5th International Conference on the Internet of Things (IoT)
80 80 80
40 40 40
20 20 20
0 0 0
0 100 200 300 400 500 0 100 200 300 400 500 0 100 200 300 400 500
Time (seconds) Time (seconds) Time (seconds)
80 80 80
CPU Usage (%)
40 40 40
20 20 20
0 0 0
0 100 200 300 400 500 0 100 200 300 400 500 0 100 200 300 400 500
Time (seconds) Time (seconds) Time (seconds)
7000
Load Balancing Performance Comparison
6000 180 161.2903
Establishment time (ms)
160
5000
140
119.0476
4000 120
100
3000 80
60 42
2000
40 31
1000 20
0
0 Number of utilized VMs Average number of flows/VM
10 20 30 40 50 60 70 80 90 100
Standard Approach Our Approach
Number of readers
86
Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on March 19,2021 at 04:43:26 UTC from IEEE Xplore. Restrictions apply.
2015 5th International Conference on the Internet of Things (IoT)
We reach the conclusion that gradual flow-based migration [15] M. Andreolini and S. Casolari, “Load prediction models in web-
based on aEMA load prediction scheme provides significant based systems,” in Proceedings of the 1st international conference on
contributions for hot spots detection and load balancing in Performance evaluation methodolgies and tools. ACM, 2006, p. 27.
Cloud-based RFID application deployment. As only linear [16] W. Voorsluys, J. Broberg, S. Venugopal, and R. Buyya, “Cost of virtual
machine live migration in clouds: A performance evaluation,” in Cloud
models are used, this scheme is also very inexpensive to Computing. Springer, 2009, pp. 254–265.
implement and use in real time. We expect our design to [17] Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: state-of-the-art
contribute to the realization of IoT applications deployments. and research challenges,” Journal of internet services and applications,
vol. 1, no. 1, pp. 7–18, 2010.
ACKNOWLEDGMENT [18] H. A. Lagar-Cavilla, J. A. Whitney, A. M. Scannell, P. Patchin, S. M.
Rumble, E. De Lara, M. Brudno, and M. Satyanarayanan, “Snowflock:
This research was supported by the MSIP(Ministry of rapid virtual machine cloning for cloud computing,” in Proceedings of
Science, ICT and Future Planning), Korea, under the C- the 4th ACM European conference on Computer systems. ACM, 2009,
ITRC(Convergence Information Technology Research Center) pp. 1–12.
(IITP-2015-H8601-15-1007) supervised by the IITP(Institute [19] T. Wood, P. J. Shenoy, A. Venkataramani, and M. S. Yousif, “Black-box
for Information & communications Technology Promotion), and gray-box strategies for virtual machine migration.” in NSDI, vol. 7,
2007, pp. 17–17.
Institute for Information & communications Technology Pro-
[20] Z. Shen, S. Subbiah, X. Gu, and J. Wilkes, “Cloudscale: elastic resource
motion(IITP) grant funded by the Korea government(MSIP) scaling for multi-tenant cloud systems,” in Proceedings of the 2nd ACM
(No. R0126-15-1002, Development of agro-livestock cloud Symposium on Cloud Computing. ACM, 2011, p. 5.
and application service for balanced production, transparent [21] M. Kang and D.-H. Kim, “A real-time distributed architecture for rfid
distribution and safe consumption based on GS1), and the push service in large-scale epcglobal networks,” in Grid and Distributed
KUSTAR-KAIST Institute, Korea, under the R&D program Computing, ser. Communications in Computer and Information Science,
supervised by the KAIST. 2011, vol. 261, pp. 489–495.
[22] (2014) Apache cloudstack. [Online]. Available: http://cloudstack.
R EFERENCES apache.org/
[23] Z. Xiao, W. Song, and Q. Chen, “Dynamic resource allocation using
[1] K. Ashton, “That internet of things thing,” RFiD Journal, vol. 22, pp. virtual machines for cloud computing environment,” Parallel and Dis-
97–114, 2009. tributed Systems, IEEE Transactions on, vol. 24, no. 6, pp. 1107–1117,
[2] (2015) Gs1, the global language of business. [Online]. Available: 2013.
http://www.gs1.org/epcglobal [24] F. Sultan, K. Srinivasan, D. Iyer, and L. Iftode, “Migratory tcp: Highly
[3] D. Guinard, C. Floerkemeier, and S. Sarma, “Cloud computing, rest and available internet services using connection migration,” in Proceedings
mashups to simplify rfid application development and deployment,” in of ICDCS, 2002, pp. 17–26.
Proceedings of the Second International Workshop on Web of Things.
ACM, 2011, p. 9.
[4] E. Welbourne, L. Battle, G. Cole, K. Gould, K. Rector, S. Raymer,
M. Balazinska, and G. Borriello, “Building the internet of things using
rfid: the rfid ecosystem experience,” Internet Computing, IEEE, vol. 13,
no. 3, pp. 48–55, 2009.
[5] E. Welbourne, K. Koscher, E. Soroush, M. Balazinska, and G. Borriello,
“Longitudinal study of a building-scale rfid ecosystem,” in Proceedings
of the 7th international conference on Mobile systems, applications, and
services. ACM, 2009, pp. 69–82.
[6] (2015) Oliot, open language for internet of things. [Online]. Available:
http://gs1oliot.github.io/oliot/
[7] B. P. Rimal, E. Choi, and I. Lumb, “A taxonomy and survey of cloud
computing systems,” in INC, IMS and IDC, 2009. NCM’09. Fifth
International Joint Conference on. Ieee, 2009, pp. 44–51.
[8] P. Hofmann and D. Woods, “Cloud computing: the limits of public
clouds for business applications,” Internet Computing, IEEE, vol. 14,
no. 6, pp. 90–93, 2010.
[9] T. Dillon, C. Wu, and E. Chang, “Cloud computing: issues and chal-
lenges,” in Advanced Information Networking and Applications (AINA),
2010 24th IEEE International Conference on. Ieee, 2010, pp. 27–33.
[10] Z.-W. Yuan and Q. Li, “Research on data processing of rfid middleware
based on cloud computing,” in Rough Set and Knowledge Technology.
Springer, 2010, pp. 663–671.
[11] L. Chu and S.-J. Wu, “An integrated building fire evacuation system
with rfid and cloud computing,” in Intelligent Information Hiding and
Multimedia Signal Processing (IIH-MSP), 2011 Seventh International
Conference on. IEEE, 2011, pp. 17–20.
[12] Z. Gong, X. Gu, and J. Wilkes, “Press: Predictive elastic resource scal-
ing for cloud systems,” in Network and Service Management (CNSM),
2010 International Conference on. IEEE, 2010, pp. 9–16.
[13] P. A. Dinda and D. R. O’Hallaron, “Host load prediction using linear
models,” Cluster Computing, vol. 3, no. 4, pp. 265–280, 2000.
[14] P. Saripalli, G. Kiran, R. R. Shankar, H. Narware, and N. Bindal,
“Load prediction and hot spot detection models for autonomic cloud
computing,” in Utility and Cloud Computing (UCC), 2011 Fourth IEEE
International Conference on. IEEE, 2011, pp. 397–402.
87
Authorized licensed use limited to: Corporacion Universitaria de la Costa. Downloaded on March 19,2021 at 04:43:26 UTC from IEEE Xplore. Restrictions apply.