Professional Documents
Culture Documents
Digital Object Identifier: Boubakr Nour (corresponding author) is with the Beijing Institute of Technology; Spyridon Mastorakis is with the University of Nebraska–Omaha;
10.1109/MNET.011.2000180 Abderrahmen Mtibaa is with the University of Missouri-St. Louis.
Review of State-of-the-Art The compute-less paradigm aims to utilize in-network computing for “simple” functions that will reduce
Remote Computing Paradigms the utilization of network and computing resources, while offering overhead assessment mechanisms
In this section, we provide a brief review of exist-
ing remote computing paradigms. to ensure that the complexity introduced is justified by the resulting amount of resources that the
network and servers will save.
Cloud and Edge Computing
Cloud computing gained traction in mid-2000
offering on-demand computing resources to consideration and further research to understand
end-users through a “pay-as-you-go” model with- where the fine line between a network element
out requiring the active management of these and a middlebox is (if there is one). About the
resources by end-users. However, as increasing- latter case, additional computing resources may
ly delay-sensitive applications emerged, the net- be attached to network elements (e.g., one hop
work latency to remote clouds was prohibitive for away from them). These resources may be able to
these applications. Edge computing was later pro- offer pre-defined services (e.g., image annotation,
posed to migrate services and code to computing matrix multiplication, real-time navigation) or exe-
resources located at the edge of the network as cute code offloaded to them by end-users.
a means to reduce execution times, load balance How Can Compute-Less Help? In-network
traffic, and minimize energy consumption. computing has been criticized for its limited scope
How Can Compute-less Help? Edge com- and the limited set of applications that can benefit
puting stakeholders today operate in a semi-cen- from it. Pushing computation to the network may
tralized fashion, where task execution decisions introduce complexity for network elements, which
are made independently from the network load. would otherwise have to only forward network
Edge computing also inherits the cloud computing traffic. The compute-less paradigm aims to utilize
operational practices. To this end, collaboration in-network computing for “simple” functions that
and sharing of computing resources, data, and will reduce the utilization of network and com-
execution results among stakeholders (e.g., service puting resources, while offering overhead assess-
providers) is not typically allowed. This may not be ment mechanisms to ensure that the complexity
a noteworthy issue in the context of cloud com- introduced is justified by the resulting amount of
puting given the abundance of resources. How- resources that the network and servers will save.
ever, at the edge, where computing resources are
limited, collaborative approaches can increase the Computation Reuse
overall computing capacity. The compute-less par- Computation reuse is a paradigm transparent
adigm aims to address such issues. to end-users requiring the availability of stor-
age resources (to store previous computations)
In-Network Computing and efficient indexing and lookup mechanisms.
In-network computing has been, to some extent, Tasks can be divided into a set of subtasks form-
a controversial research direction. Traditionally, ing an execution dependency graph. This graph
computing capabilities have been offered by the represents a flow of which subtasks need to be
communication endpoints (typically servers, but executed first and pass their results as input to
also clients to a certain extent). Recently, the remaining subtasks. It also offers a fine granular-
community started paying considerable attention ity in terms of which subtasks of a task can be
to the direction of in-network computing, which reused during the execution of another task (e.g.,
proposes the placement of computing capa- the subtask of multiplying parts of two matrices in
bilities in the network instead of the endpoints the case of a graphics application). This approach
of communication. However, this direction has may be suitable for applications that require the
raised concerns within the community, since the reuse of identical tasks/subtasks, where reusing
primary job of network elements (e.g., network “similar” but not identical tasks/subtasks may
routers) is to forward traffic at line rates, therefore have considerable impact on the application per-
their resources should be fully dedicated to this formance (e.g., the results of the multiplication
purpose. With the emergence of recent trends of slightly different matrices may be significantly
in networking (e.g., edge computing, Informa- different).
tion-Centric Networking, Software-Defined Net- Computation reuse can also be based on the
working), the community was provided with the “similarity” between previously executed tasks/
proper mechanisms and appealing use-cases to subtasks and tasks/subtasks to be executed [7, 8].
make in-network computing a reality. This approach may be suitable for applications,
In-network computing resources may consist where reusing the results among tasks/subtasks
of either parts of the computing resources of net- that are different up to a certain degree may not
work elements themselves or computing resourc- severely impact the user Quality of Experience
es directly attached to network elements. About (QoE). For example, two images that are similar
the former case, we acknowledge that the prima- in the sense that they have slightly different back-
ry responsibility of network elements is traffic for- grounds, but the same foreground, may yield the
warding. However, when elements have available same results during object detection.
resources, they can perform “simple” functions How Can Compute-Less Help? The benefits of
based on incoming traffic (e.g., aggregate various computation reuse are limited by how efficiently
measurements from IoT sensors in a building and we can perform task profiling, creation of execu-
return the average of these measurements to the tion dependency graphs, estimation of the simi-
requester). The critical question in this case would larity between tasks, and lookups and storage of
be “are we transforming network elements to mid- existing tasks/results. The compute-less paradigm
dleboxes?” [7]. This is an aspect that needs careful employs both compute-aware and network-aware
FIGURE 2. The spectrum of different computing paradigms. Trade-offs exist between task completion times
(i.e., communication and computation delays) and resource utilization.
and Its Associated Overhead: Each of these the capacity of available resources, while reduc-
directions requires additional processing, storage, ing the total execution time.
and communication among different stakeholders.
Often this overhead can exceed the benefits of use-cAses And ApplIcAtIons
the paradigm; therefore, an assessment and esti- The compute-less paradigm opens new perspec-
mation of the trade-off between overhead and tives and opportunities for applications and ser-
potential gain is needed. vices that generate large amounts of data and/
Seamless Collaboration Among Stakehold- or result in large delays and overhead if designed
ers, Given the Limited Amount of Computing without the compute-less paradigm directives.
Resources at the Network Edge: Different stake- Examples of such applications may include real-
holders, such as end-users, ISPs, and service pro- time computer vision, robotics, safety-critical sys-
viders, need to agree on protocols and incentive tems, control systems, autonomous vehicles, and
mechanisms (e.g., monetary, tit-for-tat) to enable industrial machinery.
seamless sharing of data and computation.
Security as a Built-In Design Component: commAnd And control ApplIcAtIons
Security is a vital component of the compute-less Command and control is used in multiple appli-
paradigm given the collaboration among different cations that require sensing, monitoring, actua-
stakeholders and the sharing of data and compu- tion, and fast and reliable control over a given
tation. mission or a set of actions. These systems consist
of multiple actors/devices (including users, sen-
where does compute -less resIde In the sors, and robots among others) and may require
s pectrum of computIng pArAdIgms? the exchanges of several messages under strict
Figure 2 compares the communication and com- latency and jitter requirements.
putation delays of different computing paradigms. Application examples include military intelli-
The spectrum of computing paradigms ranges gence (e.g., surveillance, reconnaissance, electron-
from remote processing on a distant cloud (i.e., ic warfare), exploratory missions (e.g., find water
high communication and low task execution in Mars), remote medicine (e.g., tele-surgeries),
delays, resulting in task completion times of sever- and services based on Unmanned Aerial Vehicles
al hundred milliseconds [10]) to edge computing (UAVs) and autonomous vehicles. These applica-
(i.e., relatively low communication and moderate tions (and more) have strict network requirements
task execution delays, resulting in task completion and require fast data analytics and reactive actions.
times of tens to a few hundred milliseconds [10]) While some of these applications utilize edge
and running tasks locally at the end-user devices, computing, the massive amount of data and com-
which often exceeds the computing capabilities putation required, especially in cases of crowded
of the devices themselves. The compute-less para- events such as concerts or the Super Bowl, make
digm achieves moderate to low utilization of net- compute-less a great candidate for the realization
work and computing resources and, in general, of such applications. In the context of these appli-
low task completion times. It utilizes edge servers cations, compute-less can reduce the load at the
that can be located at one-hop distances, but also edge, enable fast processing, and reduce latency
a few hops away from users. In the former case, and jitter. For instance, the video streams of cam-
the servers can be accessed through direct links eras broadcasting the Super Bowl can be aggre-
(e.g., LTE/5G, WiFi), while in the latter case, the gated and processed as a cluster of similar tasks
servers may be interconnected through network (e.g., cameras sharing a common field-of-view or
elements (e.g., network routers). In addition to focusing on a single player).
leveraging edge computing servers and in-net-
work computing resources in a collaborative man- prIvAcy-preservIng servIces
ner, compute-less features the reuse of previously Users, companies, and applications rely heavily
executed computations, which can further reduce on cloud vendors to secure their critical online
the computation burden at the edge and increase data. This phenomenon has been motivated by