You are on page 1of 59

Edge Computing

Digital Health
Smart
Manufacturing
Careers

JUNE 2023www.computer.org
IEEE COMPUTER SOCIETY CAREER CENTER

Evolving Career
Opportunities
Explore new options—upload your resume today

Changes in the marketplace shift demands for vital skills


careers.computer.org and talent. The IEEE Computer Society Career Center is a
valuable resource tool to keep job seekers up to date on
the dynamic career opportunities offered by employers.
Take advantage of these special resources for job seekers:

JOB ALERTS TEMPLATES WEBINARS

CAREER RESUMES VIEWED


ADVICE BY TOP EMPLOYERS

No matter what your career level, the IEEE Computer


Society Career Center keeps you connected to
workplace trends and exciting career prospects.
IEEE COMPUTER SOCIETY computer.org

STAFF
Editor Periodicals Portfolio Senior Managers Director, Periodicals and Special Projects
Cathy Martin Carrie Clark and Kimberly Sperka Robin Baldwin

Production & Design Artist Periodicals Operations Project Specialist Senior Advertising Coordinator
Carmen Flores-Garvey Christine Shaughnessy Debbie Sims

Circulation: ComputingEdge (ISSN 2469-7087) is published monthly by the IEEE Computer Society. IEEE Headquarters, Three Park Avenue, 17th
Floor, New York, NY 10016-5997; IEEE Computer Society Publications Office, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720; voice +1 714 821 8380;
fax +1 714 821 4010; IEEE Computer Society Headquarters, 2001 L Street NW, Suite 700, Washington, DC 20036.
Postmaster: Send address changes to ComputingEdge-IEEE Membership Processing Dept., 445 Hoes Lane, Piscataway, NJ 08855. Periodicals Postage
Paid at New York, New York, and at additional mailing offices. Printed in USA.
Editorial: Unless otherwise stated, bylined articles, as well as product and service descriptions, reflect the author’s or firm’s opinion. Inclusion in
ComputingEdge does not necessarily constitute endorsement by the IEEE or the Computer Society. All submissions are subject to editing for style,
clarity, and space.
Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use: 1) is not made for
profit; 2) includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any third-
party products or services. Authors and their companies are permitted to post the accepted version of IEEE-copyrighted material on their own Web
servers without permission, provided that the IEEE copyright notice and a full citation to the original work appear on the first screen of the posted copy.
An accepted manuscript is a version which has been revised by the author to incorporate review suggestions, but not the published version with copy-
editing, proofreading, and formatting added by IEEE. For more information, please go to: http://www.ieee.org/publications_standards/publications
/rights/paperversionpolicy.html. Permission to reprint/republish this material for commercial, advertising, or promotional purposes or for creating new
collective works for resale or redistribution must be obtained from IEEE by writing to the IEEE Intellectual Property Rights Office, 445 Hoes Lane,
Piscataway, NJ 08854-4141 or pubs-permissions@ieee.org. Copyright © 2023 IEEE. All rights reserved.
Abstracting and Library Use: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy for private use of patrons,
provided the per-copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive,
Danvers, MA 01923.
Unsubscribe: If you no longer wish to receive this ComputingEdge mailing, please email IEEE Computer Society Customer Service at help@
computer.org and type “unsubscribe ComputingEdge” in your subject line.
IEEE prohibits discrimination, harassment, and bullying. For more information, visit www.ieee.org/web/aboutus/whatis/policies/p9-26.html.

IEEE Computer Society Magazine Editors in Chief

Computer IEEE Intelligent Systems IEEE Pervasive Computing


Jeff Voas, NIST San Murugesan, Western Fahim Kawsar, Nokia Bell Labs
Sydney University (Interim EIC) and University of Glasgow
Computing in Science
& Engineering IEEE Internet Computing IEEE Security & Privacy
Lorena A. Barba, George George Pallis, University Sean Peisert, Lawrence
Washington University of Cyprus Berkeley National
Laboratory and University of
IEEE Annals of the History IEEE Micro California, Davis
of Computing Lizy Kurian John, University
Ramesh Subramanian, of Texas at Austin IEEE Software
Quinnipiac University and Ipek Ozkaya, Software
Yale Law School IEEE MultiMedia Engineering Institute
Balakrishnan Prabhakaran,
IEEE Computer Graphics University of Texas at Dallas IT Professional
and Applications Charalampos Z.
André Stork, Fraunhofer IGD Patrikakis, University of
and TU Darmstadt West Attica

2469-7087/23 © 2023 IEEE Published by the IEEE Computer Society June 2023 1
JUNE 2023 • VOLUME 9 • NUMBER 6

8
Utilizing AI
16
DROO: Integrated
26
Medical Device
Planning on Learning and Forensics
the Edge Optimization for
Edge Computing
Offloading
Edge Computing
8 Utilizing AI Planning on the Edge
ILIR MURTURI, ADAM EGYED, AND SCHAHRAM DUSTDAR

16 DROO: Integrated Learning and Optimization for Edge


Computing Offloading
QIAN ZHANG

Digital Health
20 TELECOVID: Remote Vital Signs Monitoring of
COVID-19 Risk Patients in Home Isolation With an
In-Ear Wearable
MELANIE BALDINGER, AXEL HEINRICH, TIM ADAMS, EIMO MARTENS,
MICHAEL DOMMASCH, ALEXANDER MÜLLER, ADONIA SIEGMANN, AND
GEORG SCHMIDT

26 Medical Device Forensics


VERONICA SCHMITT

Smart Manufacturing
32 Trusting Digital Twins
PHIL LAPLANTE

38 Architectural Concerns of Digital Twins


IPEK OZKAYA

Careers
42 “Well Paid for a Woman”: Gloria Hardman’s 50-Year
Career in Computing
PHILIP NEL

50 Masterminds of the NSFnet: Jennings, Wolff, and


Van Houweling
GEORGE STRAWN

Departments
4 Magazine Roundup
7 Editor’s Note: Optimizing Edge Computing
55 Conference Calendar

Subscribe to ComputingEdge for free at


www.computer.org/computingedge.
Magazine Roundup

T he IEEE Computer Society’s lineup of 12 peer-reviewed technical magazines covers cutting-edge topics rang-
ing from software design and computer graphics to Internet computing and security, from scientific appli-
cations and machine intelligence to visualization and microchip design. Here are highlights from recent issues.

the authors of this article from the system called PRIZM. It produced
July/August 2022 issue of Comput- new categories of populations
Revisiting the Spaceborne ing in Science & Engineering high- known as clusters. These clusters
Illuminators of Opportunity light the implications of mixed-pre- provided a novel and legible form
for Airborne Object Tracking cision (MP) computations for HPC of computer demographics for
applications. Introduced 75 years marketers reliant on direct mail.
This article from the January ago, long before the advent of HPC Drawing on interviews and histor-
2023 issue of Computer reviews architectures, MP numerical meth- ical research, this article from the
existing research for coopera- ods turn out to be paramount for October–December 2022 issue
tive passive coherent location increasing the throughput of tra- of IEEE Annals of the History of
and tracking employing space- ditional and artificial intelligence Computing chronicles the under-
borne opportunistic illuminators. workloads beyond riding the wave studied history of the Claritas
The article highlights the need of the hardware alone. Corporation.
for novel, cooperative, real-time
object detection and tracking
approaches. It also discusses the
lack of multi-static experimental When the New Magic Finding Their Data Voice:
data for future research. was New: The Claritas Practices and Challenges of
Corporation and the Dashboard Users
Clustering of America
Dashboards are the ubiquitous
Responsibly Reckless In 1982, geodemographics was means of data communication
Matrix Algorithms for HPC “the new magic.” The system within organizations. Yet, we
Scientific Applications promised to pinpoint voters. One have limited understanding of
of its key developers, Jonathan how they factor into data prac-
High-performance computing (HPC) Robbin, boasted, “Tell me some- tices in the workplace, particu-
simulations on massively parallel one’s ZIP code, and I can predict larly for data workers who do not
systems are often driven by matrix what they eat, drink, drive—even self-identify as professional ana-
computations, whose rate of exe- think.” What was the secret? Rob- lysts. The authors of this article
cution depends on their floating- bin and his company, the Clari- from the January/February 2023
point precision. Referred to by Jack tas Corporation, were among the issue of IEEE Computer Graphics
Dongarra—the 2021 ACM A.M. Tur- first to merge newly digitized cen- and Applications focus on data
ing Award Laureate—as “respon- sus data and computational social workers who use dashboards
sibly reckless” matrix algorithms, science into a geodemographic as a primary interface to data,

4 June 2023 Published by the IEEE Computer Society  2469-7087/23 © 2023 IEEE
reporting on an interview study this January/February 2023 IEEE
that characterizes their data prac- Micro article, the authors intro-
tices and the accompanying barri- The Future of HPC in duce a framework to probabilis-
ers to seamless data interaction. Nuclear Security tically model the emissions from
While dashboards are typically computing on board a global fleet
designed for data consumption, Experience spanning almost 80 of AVs and show that the emis-
the authors’ findings show that years shows that qualitative leaps sions have the potential to make
dashboard users have far more in simulation capabilities have a nonnegligible impact on global
diverse needs. allowed new contributions to emissions, comparable to that of
national security. Through detailed all datacenters today. Anticipating
quantitative analysis of represen- a future scenario with high adop-
tative simulations, the authors of tion of AVs, business-as-usual
A Framework for this article from IEEE Internet Com- decarbonization, and workloads
Reasoning About Uncertainty puting’s January/February 2023 doubling every three years, hard-
in Ontologies issue show that reliance on tech- ware efficiency must double every
nologies developed for popular 1.1 years for emissions in 2050 to
This IEEE Intelligent Systems market applications will likely stall equal 2018 datacenter emissions.
November/December 2022 arti- progress. They argue that if the The rate of increase in hardware
cle introduces a logic-based argu- United States is to continue bene- efficiency needed in many scenar-
mentation framework for rea- fiting from advances in computing, ios to contain emissions is faster
soning under uncertainty of investments in deeper co-design than the current rate.
description logic-based ontolo- of hardware and software—
gies. The authors found the frame- addressing levels of branching
work on four new argumentation- and sparsity not found in machine
based semantics: the classical learning or most other major mar- Enhanced Local and
semantics, the IAR semantics fam- ket applications—will be needed. Global Learning for
ily, the cardinality-based family, Rotation-Invariant Point
and the agent preference-based Cloud Representation
semantics. Within this frame-
work, multiple new inference rela- Data Centers on Wheels: Various studies have been under-
tions can be distinguished to Emissions From taken to learn point cloud repre-
draw meaningful answers to que- Computing Onboard sentations that are both discrimi-
ries even from imperfect ontolo- Autonomous Vehicles native and robust. However, most
gies. The authors investigate logi- of them suffer from rotation dis-
cal properties and the productivity While much attention has been turbance and insufficient labeled
of these new entailment mecha- paid to datacenters’ greenhouse data. To solve the problem of rota-
nisms and their relationships with gas emissions, less attention has tion disturbance, the authors of
other well-known existing logical been paid to autonomous vehi- this article from IEEE MultiMedia’s
entailments. cles’ (AVs’) potential emissions. In October–December 2022 issue

www.computer.org/computingedge 5
MAGAZINE ROUNDUP

propose a novel rotation-invariant not require retraining of recogni- combines multiple virtual spaces.
network that is equipped with the tion algorithms, making the obfus- A novel technology like meta-
following core modules: enhanced cated data compatible with exist- verse gives rise to various chal-
local representation learning mod- ing methods. lenges such as the standing of
ule and global alignment module. virtual avatars in legal systems in
The enhanced local representa- case of injury or harm, demand for
tion learning module captures the expensive resources in its upscal-
geometric relationship among the Eight Lightweight ing, privacy of user data, and
neighbors defined in both 3D Car- Usable Security Principles increased risk of cybercrimes.
tesian space and a latent space to for Developers This November/December 2022
exploit the local context and long- IT Professional article presents
distance context. The global align- The authors of this IEEE Security a brief overview of technologies
ment module is devised to address & Privacy article from the Janu- used in the development of meta-
the lack of global information and ary/February 2023 issue propose verse, the challenges, and the
supplement the absolute locations eight usable security principles potential aspects of the virtual
of points by adaptively generating that provide software developers world.
the rotation-invariant coordinates. with a lightweight framework to
help them integrate security in a
user-friendly way. These principles
should help developers who must
weigh usability and security trad-
An Opt-in Framework for eoffs to facilitate adoption.
Privacy Protection in Audio-
Based Applications

Installing audio-based applica- Unscheduled Meetings in


tions exposes users to the risk Hybrid Work
of the data processor extract-
ing additional information beyond By studying four development
the task the user permitted. To teams in the Norwegian compa- Join the IEEE
solve these privacy concerns, the nies NAV and Entur, the authors of
Computer
authors of this article from IEEE this article from the March/April
Pervasive Computing’s October– 2023 issue of IEEE Software found
Society
December 2022 issue propose to that unscheduled meetings are computer.org/join
integrate an on-edge data obfus- maintained by using tools like Dis-
cation between the audio sen- cord and Zoom to create virtual
sor and the recognition algorithm. rooms. The authors provide three
They introduce a novel privacy loss recommendations for hybrid work.
metric and use adversarial learning
to train an obfuscator. Contrary to
existing work, this technique does
not require users to specify which Virtual Dimension—
sensitive attributes they want to A Primer to Metaverse
protect (opt-out), but instead only
provide permission for specific The metaverse is a concept of a
tasks (opt-in). Moreover, it does persistent, online, 3D world that

6 ComputingEdge June 2023


Editor’s Note

Optimizing Edge Computing

E dge computing is a promising


technology that can enable
smart cities and Internet of Things
for Edge Computing Offloading”
discusses an approach for achiev-
ing optimal online provisioning of
“Trusting Digital Twins” consid-
ers whether emerging digital
twin technology will provide the
(IoT) applications to achieve edge services in a large IoT net- desired operational functionality
energy-efficient, low-latency, and work under fast-varying wireless along with an acceptable level of
high-performance computing. channel conditions. quality. The authors of IEEE Soft-
New research suggests that we In the healthcare field, medi- ware’s “Architectural Concerns
can extract the maximum bene- cal devices can often help improve of Digital Twins” encourage orga-
fits of edge computing by apply- patient outcomes. “TELECOVID: nizations beyond those in manu-
ing artificial intelligence. This Remote Vital Signs Monitoring of facturing to adopt digital twins to
ComputingEdge issue considers COVID-19 Risk Patients in Home assist with operations and main-
ways to optimize edge comput- Isolation With an In-Ear Wearable,” tenance in cyberphysical systems.
ing through state-of-the-art tech- from IEEE Pervasive Computing, This ComputingEdge issue
niques such as deep reinforce- shows how wearables played an concludes with two articles that
ment learning. important role in disease detec- detail the careers of computing
“Utilizing AI Planning on the tion and monitoring during the pioneers. “’Well Paid for a Woman’:
Edge,” from IEEE Internet Comput- pandemic. The authors of IEEE Gloria Hardman’s 50-Year Career
ing, proposes a conceptual frame- Security & Privacy’s “Medical in Computing,” from IEEE Annals
work for executing AI planners Device Forensics” argue that—in of the History of Computing, pro-
on distributed devices in edge light of increased hacking—med- vides a biography of an influential
networks. As a case study, the ical devices should be manufac- programmer and computer edu-
authors simulate a waste manage- tured with security and incident cator. IT Professional’s “Master-
ment problem and find the optimal response in mind. minds of the NSFnet: Jennings,
route for disposing of waste bins In smart manufacturing, dig- Wolff, and Van Houweling” high-
in a city. Computer’s “DROO: Inte- ital twins are used to optimize lights the team that created a pre-
grated Learning and Optimization production systems. Computer’s cursor to the Internet.

2469-7087/23 © 2023 IEEE Published by the IEEE Computer Society June 2023 7
EDITOR:Schahram
EDITOR: SchahramDustdar,
Dustdar,dustdar@dsg.tuwien.ac.at
dustdar@dsg.tuwien.ac.at
This article originally
appeared in
DEPARTMENT:
DEPARTMENT:INTERNET
INTERNET OF
OF THINGS, PEOPLE, AND PROCESSES
PEOPLE, AND PROCESSES vol. 26, no. 2, 2022

Utilizing AI
Utilizing AI Planning
Planning on
on the
the Edge
Edge
Ilir Murturi , Adam Egyed, and Schahram Dustdar , TU Wien Vienna, Vienna 1040, Austria
Ilir Murturi , Adam Egyed, and Schahram Dustdar , TU Wien Vienna, Vienna 1040, Austria

The convergence between AI planning techniques and the Internet of Things (IoT) can
solve
The various operational
convergence betweenand business techniques
AI planning challenges. However, IoT systems’
and the Internet stringent
of Things (IoT) can
requirements
solve such as latency
various operational andand scalability
business have introduced
challenges. However,several challenges
IoT systems’ to
stringent
execute and scale
requirements suchplanners
as latencyin cloud environments.
and scalability haveEdge computers
introduced placed
several close to the
challenges to execute
and
IoT scale
domainplanners in cloud
(e.g., sensors) can environments. Edge
be leveraged for computersplanners
implementing placed close to the IoT domain
and overcoming
(e.g., sensors)
scalability can We
issues. be leveraged for implementing
propose a conceptual frameworkplanners and overcoming
highlighting executing scalability
issues. We propose
Expressive NumericaHeuristic
conceptual framework
Search Planner onhighlighting
distributedexecuting
devices in Expressive Numeric
edge networks.
Heuristic Search Planner on distributed devices in edge networks. As a proof
As a proof of concept, we develop a simulator to show the applicability and feasibility of concept,
of
we develop a simulator to show the applicability and feasibility of
running planners on the edge. As a case study, we simulate a waste management running planners on
the edge. As a case study, we simulate awaste management problem and find the optimal
problem and find the optimal route for disposing of? waste bins in a city. Throughout
route for disposing of? waste bins in a city. Throughout the experiments, the user can
the experiments, the user can discover insightful information regarding the planner’s
discover insightful information regarding the planner’s applicability on the edge.
applicability on the edge.

T
he Internet of Things (IoT) has widely dissemi- can act as an intermediary computation device to pro-
nated into society, and many services in various cess and store the incoming data. Besides that, an
industries are built on top of IoT technologies. edge device may decide whether the pumped IoT data
Managing and controlling a high number of heteroge- must be processed at the edge network or forwarded
neous devices (i.e., mobile devices, sensors, etc.) is to a cloud infrastructure.
becoming increasingly complex. On the other hand, In recent years, urban growth became an endemic
the evergrowing number of devices challenges the problem for large cities in the world. In cities with rapid
cloud-centric environments to process incoming sen- population growth and with high number of visitors, daily
sory data streams within the critical time-frame.1,2 In public services or public safety services should operate
this context, processing IoT data streams over distrib- efficiently. In this sense, IoT resources (i.e., sensors,
uted computation entities and gaining authority over actuators, etc.) distributed over the city have been seen
a smaller segment of the large network is critical to as critical to improve the quality of life. For example,
achieving various system goals. These distributed within a city district, several smart devices provide real-
computation entities are usually referred to as edge time information about the environment to the closest
devices. Essentially, edge devices allow for prepro- edge device benefiting from high connectivity to it and
cessing incoming sensory data streams as well as pro- its awareness of other resources in its surroundings. An
vides a seamless opportunity to deploy multiple edge edge device may act as an authority to coordinate avail-
applications (i.e., IoT applications) aiming at providing able resources in its district and becomes responsible
low-latency services for end-users. For instance, a for processing data generated by the smart devices in
neighborhood may be composed of hundreds of net- the field. At the same time, various edge applications
worked devices providing various sensory information (e.g., waste management service) can be deployed on
about the environment. An edge device in proximity edge, process sensory data, and provide useful informa-
tion to the end-users. However, not all services can be
trivially obtained from IoT resources—for instance, opti-
mizing the energy efficiency of street lighting systems in
a neighborhood when no citizen is walking. In that case,
This work is licensed under a Creative Commons Attribution several combinations of other IoT devices’ resources
4.0 License. For more information, see https://creativecom-
must be considered to achieve the desired goal.3 Such a
mons.org/licenses/by/4.0/
Digital Object Identifier 10.1109/MIC.2021.3073434 goal can be achieved through utilizing AI planning tech-
Date of current version 16 May 2022. niques, which are well-known approaches developed to

8 28 June 2023
IEEE Internet Computing Published by the IEEE
Published Computer
by the SocietySociety
IEEE Computer  2469-7087/23 © 2023
March/April 2022IEEE
INTERNET OFOF
INTERNET THINGS, PEOPLE,
THINGS, AND
PEOPLE, ANDPROCESSES
PROCESSES

LISTING 1. Domain-Predicates. LISTING 3. Problem skeleton.


1 (:predicates
2 (truck ?t - vehicle) 1 (define (problem smart-waste)
3 (bin ?b - wastebin) 2 (:domain smart-waste)
4 (node ?n - location) 3 (:objects %1$)
5 (street ?s - street) 4 (:init %2$)
6 (plant ?p - facility) 5 (:goal %3$)
7 (is-at ?p ?n - location) 6 (:metric minimize (total-cost))
8 (connected ?s - street ?n - location)
9 (truck-at ?t - vehicle ?n - location) Search Planner (ENHSP)a on distributed edge devices
10 (plant-at ?p - facility ?n- location)
in edge networks. As a proof of concept, we develop a
11 (emptied ?b - wastebin)
12 (empty ?t - vehicle)) simulator to simulate the waste management problem
to find the optimal route for the disposal of waste bins
solve planning autonomously and without human inter- in a city. Subsequently, we discuss the motivation and
vention. Essentially, the planning is defined as the task of reasons for choosing to model the waste management
coming up with a sequence of actions that will achieve a problem as well as explain the syntax required to model
user goal. both the domain and the actual problem for the ENHSP
AI planning techniques aim to address NP-hard planner. Furthermore, the simulator is configurable and
problems. The bigger the problem instance is, the more provides functionalities that enable the user to interact
time and resources are required to find an optimal at runtime. Throughout the experiments, the user can
solution. In this sense, utilizing the planners in the con- discover insightful information regarding the planner’s
text of IoT and smart cities becomes an increasingly applicability on the edge, such as performance req-
complex as well as resource-intensive process.4 Exe- uirements when executing the planner in different city
cuting AI planning techniques on the cloud is naturally areas with different parameter settings, and also opti-
possible. However, in the context of IoT such techni- mizing the overall waste disposal process.
ques do not scale very well. In addition, the bandwidth
of the networks that carry IoT sensory data streams to
and from the cloud has not increased appreciably.
BACKGROUND AND RELATED
Essentially, the network bottleneck causes higher
WORK
latencies than expected response time for IoT systems. In the past few years, researchers from academia and
Considering the above-mentioned challenges, we argue industry have been focused on utilizing the power of
that Edge Computing can help to tackle the scalability AI planning techniques in different contexts in edge-
problem by splitting the problem, and also overcome based systems (i.e., IoT systems). Several approaches
networks bottleneck by processing sensory data on discussed in the literature are based on AI plan-
the edge. Therefore, this calls for novel resource man- ning techniques such as enabling engineering
agement approaches, resource coordination, and the resource coordination at runtime,3 energy-efficient
need to investigate the feasibility and the applicability task offloading,5 deploying self-adaptive IoT systems,6
of AI planning techniques executed in a distributed and adaptation of goal-driven IoT systems.7 AI-Plan-
manner on the edge. We refer to the applicability ning consists of several developed techniques to solve
aspect by considering real-life scenarios and their con- planning and scheduling problems autonomously and
crete requirements to achieve user goals. On the other without human intervention. Essentially the planning
hand, we refer to the feasibility aspect to show the per- is defined as the task of coming up with a sequence of
formance requirements to execute AI planning models actions that will lead from an initial state to a specified
on edge infrastructure. goal state. A goal can be represented as a single goal
In this article, we propose a conceptual framework state (i.e., predicate) or a complex goals states (i.e.,
that highlights executing Expressive Numeric Heuristic multiple goal states) that can either be true or false.
To reach a goal state, the planner is provided with
LISTING 2. Domain-Functions. actions that can alter these states. These actions may
1 (:functions define preconditions that need to be met to change
2 (total-cost) the states of the problem according to the action’s
3 (distance ?s - street) effect. For each task, the planner requires the domain
4 (capacity ?t - vehicle)
5 (wastebin-status ?b - wastebin)
6 (wastebin-capacity) a
The ENHSP Planning System, https://sites.google.com/view/
7 (max-capacity ?t - vehicle)) enhsp/

www.computer.org/computingedge
March/April 2022 IEEE Internet Computing 29 9
INTERNETOF
INTERNET OFTHINGS,
THINGS, PEOPLE,
PEOPLE, AND
AND PROCESSES
PROCESSES

the fixed schedules become ineffective while driving


to an almost empty garbage can cause wasting of
resources and money.
To provide real-time scheduling, we assume that
several smart vehicles (i.e., smart trucks) may operate
continuously around the city areas. Through the inte-
grated IoT sensors, each waste bin provides sensory
information to the closest edge device responsible for
FIGURE 1. An overview of the conceptual framework.
a particular area in the city (i.e., neighborhood, square,
park, or district). On the other side, edge devices are
preconfigured regarding the maximum waste level
and problem models as inputs (discussed in the sec- allowed in bins as well as the truck capacity. For
tion “Scalability and Performance”). instance, when the waste level in bins is above the pre-
Engineering edge-based systems is challenging, defined threshold, a responsible edge device places a
partly due to the heterogeneity, dynamicity, and uncer- lease on the closest available truck to empty all bins in
tainty of the devices. Tsigkanos et al.3 proposed a goal- the responsible authority radius. However, we will face
driven approach for engineering resource coordination an NP-hard problem when considering several factors
at runtime. The approach adopts goal modeling to cap- (i.e., streets, bins, trucks, etc.) to provide most optimal
ture objectives opportunistically at runtime and with- routes for the trucks operating in the city. Therefore,
out any operational status knowledge. Bounded model when utilizing AI planning techniques and processing
checking is used as the foundational technique to com- sensory data on the edge, a crucial aspect is to mea-
pute coordination plans that satisfy device goals. sure performance issues in different scenarios.
Essentially, it considers dependencies among IoT
things to achieve a particular goal. Alkhabbas et al.7
proposed an approach for enabling the automated for- UTILIZING AI PLANNING ON THE
mation and adaptation of goal-driven IoT systems by EDGE
exploiting context-awareness and AI-planning techni- Conceptual Framework
ques. On the contrary to the mentioned works, while In the Smart City context, we may have multiple com-
focusing primarily on AI planning techniques, we delve plex problems, which can be solved by using planners.
more into showing the feasibility and emphasize the More precisely, this means that for each task, we have
applicability of AI planning techniques executed in a different planning domains and planning require-
distributed manner on the edge. As the case study, we ments. Thus, this calls for a new framework that allows
consider an age-old matter and well-known waste developers or system administrators to deploy models
management problem. We developed a configurable on available devices at the edge. To overcome the
simulator, which is interactable at runtime. The simula- mentioned challenges, we introduce a conceptual
tor provides functionalities to the user to create framework that enables easy deployment and opera-
diverse use-cases for the ENHSP planner to solve. tion of planners on the edge infrastructure. The con-
ceptual framework is presented in Figure 1.
The proposed framework comprises two main
MOTIVATION parts: a cloud-based IoT platform and edge device core
Providing an efficient waste disposal service in functions. The platform consists of three main modules
crowded and highly frequented areas (i.e., squares, i) Runtime Orchestration, ii) Smart City Layouts, and
parks, etc.) by visitors remains a prime concern for iii) AI Planning Models. The runtime orchestration is
metropolitan cities. This is because the cleaner cities responsible for providing an environment, where it
are, the more tourists they attract. Parks for instance allows planners’ execution in heterogeneous environ-
may become visitor spots because of their cleanliness, ments. The platform can interact with the edge system
view, and fresh air. On the other side, waste disposal components (i.e., resource manager) to access, govern,
operators traditionally collect waste from bins on a and orchestrate planners at the edge. For instance,
fixed schedule (e.g., hourly or daily). However, the Dockerb containers are a way to wrap up a planner into
number of visitors and citizens roaming in the various its own isolated package. Additionally, the runtime
city areas changes frequently. Such public spaces can
get crowded very fast, meaning that the waste bin fill-
ing rate may increase drastically. In such situations, b
Docker, https://docker.com

1030
ComputingEdge
IEEE Internet Computing June
March/April 20222023
INTERNET OFOF
INTERNET THINGS, PEOPLE,
THINGS, AND
PEOPLE, ANDPROCESSES
PROCESSES

orchestration manages edge devices, automates con- Thus, the simulator requires the geospatial informa-
tainer provisioning, networking, load-balancing, secu- tion in a format called shapefile.
rity, and scaling across the distributed edge devices.
The cloud layer assumes to contain various plan-
Use Case: Waste Management Domain
ning models that a system administrator can upload on
Modeling
distributed edge devices. An edge device may run mul-
As outlined in section , PDDL is comprised of planning
tiple planners (i.e., ENHSP instances) depending on the
domain model and problem description files. The
device resources. Furthermore, models are written
domain describes the planning world in a general
using the Planning Domain Definition Language
sense, which contains the actions and predicates.
(PDDL), which is comprised of planning domain model
Essentially, it defines which objects are existent, the
and problem description. Planning domain model and
actions that can alter these objects’ state, including
problem description are essential files required to
the preconditions that need to be fulfilled, and the
instantiate a planner (see section “Technology and
effects of these actions on the objects. The domain
Social Constraints”). In addition to the models, the
file does not define the set amount of objects (i.e.,
cloud platform may contain simple city layouts (i.e.,
bins or trucks), neither does it define the planning
maps) or accurate digital architectural models.8
problem’s goal.
The second part of the framework represents edge
In Listing 1, we show the exact syntax for defining
device core functionalities. The Resource Manager is
the domain problem. Most of the predicates are self-
responsible for monitoring the infrastructure-specific
explanatory, such that objects are vehicles, bins,
metrics such as edge devices’ resource capabilities
streets, etc. In order to derive the city structure from
(i.e., hardware). In addition, the module implements an
the shapefile retrieved from the OpenGov data, we
IoT resource discovery mechanism9 and various com-
introduce the notion of whether a node is connected
munication protocols (i.e., Bluetooth, ZigBee, LoRa,
to a street or not. The rest of the predicates express
WiFi, etc.) to connect with various surrounding IoT
positioning on the map alongside the ones telling the
devices. On the other hand, the AI Planning module
planner whether a waste bin has been emptied or a
executes ENHSP instances. The module listens contin-
vehicle is empty after visiting a waste disposal facility
uously for new requests from the system administrator
and regaining full capacity.
to start new solver instances. Essentially, after the
With the :fluents requirement, we are able to create
required files (i.e., domain and problem model) are
numeric predicates to keep track of the capacity of the
uploaded, a new container-based service is started at
vehicle or the current status of the waste bins or assign
the edge device.
a numeric cost called distance for travelling along a
street (see Listing 2). The most important function is
Smart City Layout the (total-cost) one that is getting modified after every
As outlined in the motivation section, we consider the movement of the truck and essentially keeps track of
waste management problem by deploying multiple the plan’s current cost. This is the metric that will ulti-
edge devices and coordinating available resources mately need to be optimized by the planner. Further-
(i.e., trucks) in the entire city. Before starting with the more, vehicle move actions and preconditions
problem modeling in PDDL, first it is required to relay considered in the problem are rather straightforward
and document the process of finding the right underly- (i.e., pick up bin, move truck, etc.). Further modeling
ing data-structure for the city itself. Generally speak- details can be found.10
ing, the waste management problem is consolidated
to Nodes (waste bins), Streets connecting them with a
Problem Skeleton
given distance (representing the cost of the route), and
The problem description file defines the initial and the
one or multiple trucks. However, to visualize the pro-
goal states. Thus, once the format of the domain is
cess and enable user interaction with the simulator,
set, the problem file is initialized with the actual part
we require a static city representation with wide-
of the city that needs to be planned including nodes,
spread usage implementation. To overcome such a
streets, facilities, waste bins, and the trucks. To initiate
challenge, we utilize an open-source java library called
the planner, we require the planning domain and prob-
GeoToolsc to read, parse, and display the datasets.
lem as two static files. However, edge devices receive
real-time status values from smart devices, and these
c
GeoTools The Open Source Java GIS Toolkit, https:// data need to be translated and inputted into the plan-
geotools.org/ ner continuously. Thus, to build our simulator and

www.computer.org/computingedge
March/April 2022 IEEE Internet Computing 31 11
INTERNETOF
INTERNET OFTHINGS,
THINGS, PEOPLE,
PEOPLE, AND
AND PROCESSES
PROCESSES

Smart City Layouts


We first choose a city that provides data that can be
used in conjunction with the ENHSP planner. For
instance, the City of Vienna, which is part of the Coop-
eration Open Government Data Austriad provides a
vast amount of static and real-time data spanning
FIGURE 2. Overview of the three-step configuration process. from general street structure to real-time construction
works. The above-mentioned site provides an API for
developers to use such data free of charge for their
enable the user to interact with it, we generate the purposes. Nevertheless, since the aim is to develop a
static file on the fly. This calls for creating a skeleton standalone version of our prototype, downloading the
of the actual problem file, populated by real-time val- geospatial information in a format called shapefile ful-
ues and edge configuration parameters (see Listing 3). filled the need for offline usage.
As can be noted in Listing 3, the %1$ part is where
the actual initialization occurs. Essentially, it gets built
as a string in the application itself and uses string Configure Edge Device
replacement to populate the placeholders. Ultimately The end-user can place edge devices anywhere on the
this file gets written to the file system and the planner. map. Prior to its placing on the map, an edge device is
Afterward, the planner receives its input for the prob- essentially configured with the parameters such as
lem definition. Furthermore, to cut down generation authority radius, number of bins, bin capacity, etc. The
times, the static part of the problem is generated as waste bins are distributed randomly inside the edge
soon as an edge device is placed on the map. Given devices authority zone. For each edge device placed on
the edge device’s authority radius, it is possible to pre- the map, a new server instance is started on a specific
generate the city structure that needs to be planned port to generate sensory data for the simulator (i.e.,
to speed up the generation process. This means that explained in the following section). The waste bins posi-
only the values that are changing over time (i.e., the tion on the map are generated randomly. Moreover,
bin status and the truck’s position) need to be proc- trucks operate in one of two possible modes: i) available
essed before the planning can start. and ii) not-available. The available mode represents the
Another issue that may arise is when the smart state when edge devices can place a lease on the truck.
truck is out of the edge device’s authority radius. An The not-available mode represents the state when
edge device can call the closest available smart truck the truck is leased by another edge device. Besides that,
in the city. Solving such a challenge within the problem the end-user configures trucks with the following
skeleton becomes unfeasible in performance terms parameters such as truck capacity, speed, etc. Each
when the truck is too far away (i.e., the entire city needs edge device can query at anytime the state of trucks
to be considered). To overcome such a challenge, we placed on the map.
create another problem skeleton intending to move
the smart truck within the caller radius (i.e., edge Simulate
radius) in the most optimal way possible. The end-user can place trucks at any given place on the
map. After the main components are set, the user can
either set a fixed interval for plan generation or do it on
SIMULATOR IMPLEMENTATION demand. The plan generation occurs in two steps. First,
the edge device places a lease on the truck, and it cal-
Workflow
culates the fastest route to the closest point in its
To show the applicability and feasibility of executing
authority radius. The truck then moves there, and in
planners on edge networks, we develop a simulator to
the second step, the planner generates the most opti-
simulate the waste management problem.10 The cur-
mal route to empty all the bins in the edge device’s
rent version of the prototype is written in Java and
authority. Once these bins are emptied, the truck is
provides basic functionalities to enable resource coor-
released, and other edge devices can apply for a lease
dination (i.e., between edge devices and trucks) and
on the said vehicle. The entire process (i.e., planning
executing multiple planners on the simulated edge
and executing the plans) can thus be automated and
devices. The end-user can interact with the simulator
at runtime, configure it, and simulate various scenar-
ios. An overview of the three-step configuration pro- d
Cooperation Open Government Data Austria, https://www.
cess of the simulator is presented in Figure 2. data.gv.at/

1232
ComputingEdge
IEEE Internet Computing June
March/April 20222023
INTERNET OFOF
INTERNET THINGS, PEOPLE,
THINGS, AND
PEOPLE, ANDPROCESSES
PROCESSES

FIGURE 3. An overview of the simulator.

evaluated over a longer period of time. An overview of ii) optimizing the waste disposal process. First, we
the simulator is presented in Figure 3. show the planner performance aspects when scaling
by the number of trucks considered to generate a sin-
Simulating Sensory Data gle plan. The planner will thus try to find the optimal
The time until a waste bin is full usually varies depend- emptying plan by using one or multiple trucks avail-
ing on population density and some other variables. able. Besides that, we compare the performance scal-
For instance, according to the City of Vienna,e the bins ing by the number of bins considered for generating a
are emptied from once a day to six times a week. To single plan. Second, we explain other experiments
generate waste bins sensory data, we developed a that the user can realize within the current simulator
Python-based web server that allows the planner to version.
query actual sensor status and create new instances To monitor resource utilization during the runtime
when the user adds new edge devices on the map. process, we use a tool called VisualVM,f which displays
With generating pseudorandom numbers between the performance statistics of a specific Java Virtual
0 and 1 for each bin, we get the fill rate function Machine instance in real time. Figure 5 presents the
fðxÞ ¼ 0:6 þ x3 � ð4:167 � 0:6Þ. Every random number planner performance when scaling with increasing the
generated gives us an average of fð0:5Þ � 1:045% per number of trucks assigned to a single edge device. We
day. Moreover, waste bins are full until an average of consider a city area that consists of 129 streets, 8 bins
3.98 days and make it somewhat closer to the situa- placed within the 71 nodes on the map. As can be
tion we encounter in real life (see Figure 4). noted, with increasing the number of trucks, the aver-
age planning time increases as well. The average plan-
EXPERIMENTS ning time and memory consumption remain in the
Throughout the experiments, the user can discover acceptable range with three trucks; however, the plan-
insightful information regarding the planner’s app- ner will not scale well when the number of trucks
licability on the edge, such as i) performance req- increases. Nevertheless, edge devices are considered
uirements when executing the planner in different resource-constrained devices, and creating multiple
city areas with different parameter settings and edge devices with a single truck responsible for

e f
Vienna Waste Disposal Frequency, https://bit.ly/39qpEIN VisualVM, https://visualvm.github.io/

www.computer.org/computingedge
March/April 2022 IEEE Internet Computing 3313
INTERNETOF
INTERNET OFTHINGS,
THINGS, PEOPLE,
PEOPLE, AND
AND PROCESSES
PROCESSES

instance, regularly operating multiple smaller capacity


trucks with lower operating costs can be more cost-
efficient than having fewer high-capacity trucks cover-
ing a larger area. With the parameters revolving around
the truck count, we can immediately notice the drop in
bins emptied per km driven. Therefore, we can empiri-
cally put the cost of dispatching a garbage truck in
shorter intervals versus the cost of doing longer routes
but emptying more waste bins along the way.

FIGURE 4. Fill-rate graph of waste bins. CONCLUSION


The developed simulator is the initial attempt at
designing a system for executing AI planning tech-
niques in a distributed manner on the edge. The
current version is in the early stage of development
and provides essential functionalities to simulate
the waste management problem. Besides that,
edge devices are simulated, and the planner instan-
ces for each edge device placed on the map are
executed on the same machine. However, when
placing multiple edge devices on the map, the sim-
FIGURE 5. Scaling by vehicle count. ulator may face performance issues. In our future
work, we plan to extend the prototype with a mod-
ule through which developers and users can easily
configure edge devices and connect them to their
physical entities.
entities.Furthermore,
Furthermore,we weplan to extend
plan the
to extend
the simulator with other AI models supporting
simulator with other AI models supporting various vari-
ous Smart
Smart City City problems.
problems. Finally,
Finally, we to
we plan plan to per-a
perform
form a more extensive evaluation of
more extensive evaluation of the approach. the approach.

ACKNOWLEDGMENTS
FIGURE 6. Scaling by number of bins.
This work was supported in part by the “Smart Commu-
nities and Technologies (Smart CT)” and it has received
emptying bins at a time overcomes the scalability funding from the EU’s Horizon 2020 Research and Inno-
challenges introduced by the planner. vation Programme under grant agreement No. 871525.
Figure 6 presents the planner performance when EU web site for Fog Protect: https://fogprotect.eu.
scaling with increasing the number of bins assigned to
a single edge device. We consider a similar city area as
in the previous experiment. On the contrary to the first REFERENCES
experiment, we consider a single truck and the various 1. W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge
number of bins. As can be noted, increasing the num- computing: Vision and challenges,” IEEE Internet Things
ber of bins in the problem instance results in an aver- J., vol. 3, no. 5, pp. 637–646, Oct. 2016.
age planning time increase. Similarly, as in the first 2. S. Dustdar and I. Murturi, “Towards distributed edge-
experiment, the planner will not scale well when the based systems,” in Proc. IEEE 2nd Int. Conf. Cogn.
number of bins considered in the problem instance is Mach. Intell., 2020, pp. 1–9.
high. Therefore, the user may concretely discover the 3. C. Tsigkanos, I. Murturi, and S. Dustdar, “Dependable
planner’s resource requirements to run it in a particular resource coordination on the edge at runtime,” Proc.
region of a city. IRE, vol. 107, no. 8, pp. 1520–1536, Aug. 2019.
Since we are subdividing the city into small self- 4. M. Ghallab, D. Nau, and P. Traverso, Automated
governing areas, determining optimal truck count and Planning: Theory and Practice. Amsterdam, The
capacity may determine the overall operating cost. For Netherlands: Elsevier, 2004.

1434
ComputingEdge
IEEE Internet Computing June
March/April 20222023
INTERNET OFOF
INTERNET THINGS, PEOPLE,
THINGS, AND
PEOPLE, ANDPROCESSES
PROCESSES

5. J. Zilic, A. Aral, and I. Brandic, “EFPO: Energy efficient and 10. U. A. P.On the Edge (The Waste Management Problem,
failure predictive edge offloading,” in Proc. 12th IEEE/ACM 2021. [Online]. Available: https://hyde.infosys.tuwien.ac.
Int. Conf. Utility Cloud Comput., 2019, pp. 165–175. at/utilizing-ai-planning-on-the-edge.
6. F. Alkhabbas, I. Murturi, R. Spalazzese, P. Davidsson,
and S. Dustdar, “A goal-driven approach for deploying
self-adaptive IoT systems,” in Proc. IEEE Int. Conf. ILIR MURTURI is currently working toward the Ph.D. degree
Softw. Archit., 2020, pp. 146–156. in edge computing under the supervision of Prof. S. Dustdar
7. F. Alkhabbas, R. Spalazzese, and P. Davidsson, “Eco-IoT:
with the Distributed Systems Group, TU Wien, 1040, Vienna,
An architectural approach for realizing emergent
Austria. Contact him at imurturi@dsg.tuwien.ac.at.
configurations in the Internet of Things,” in Proc. Eur.
Conf. Softw. Archit., 2018, pp. 86–102.
8. P. M. Lerones, J. L. Ferna  M. Gil, J. Go
ndez, A.  mez- ADAM EGYED received the B.Sc. degree in software and infor-
García-Bermejo, and E. Z. Casanova, “A practical mation engineering from the TU Wien, Vienna, Austria, in 2020.
approach to making accurate 3D layouts of interesting Contact him at adam.egyed@protonmail.com.
cultural heritage sites through digital models,” J.
Cultural Heritage, vol. 11, no. 1, pp. 1–9, 2010.
9. I. Murturi, C. Avasalcai, C. Tsigkanos, and S. Dustdar, “Edge- SCHAHRAM DUSTDAR is a professor of Computer Science
to-edge resource discovery using metadata replication,” in with the Distributed Systems Group, TU Wien, 1040, Vienna,
Proc. IEEE 3rd Int. Conf. Fog Edge Comput., 2019, pp. 1–6. Austria. Contact him at dustdar@dsg.tuwien.ac.at.

ADVERTISER INFORMATION

Advertising Coordinator Central US, Northwest US, Southeast US, Asia/Pacific:


Eric Kincaid
Debbie Sims Email: e.kincaid@computer.org
Email: dsims@computer.org Phone: +1 214-553-8513 | Fax: +1 888-886-8599
Phone: +1 714-816-2138 | Fax: +1 714-821-4010 Cell: +1 214-673-3742

Midwest US:
Advertising Sales Contacts Dave Jones
Email: djones@computer.org
Mid-Atlantic US: Phone: +1 708-442-5633 Fax: +1 888-886-8599
Dawn Scoda Cell: +1 708-624-9901
Email: dscoda@computer.org
Phone: +1 732-772-0160
Cell: +1 732-685-6068 | Fax: +1 732-772-0164 Jobs Board (West Coast and Asia), Classified Line Ads

Southwest US, California: Heather Bounadies


Mike Hughes Email: hbuonadies@computer.org
Email: mikehughes@computer.org Phone: +1 623-233-6575
Cell: +1 805-208-5882

Northeast, Europe, the Middle East and Africa: Jobs Board (East Coast and Europe), SE Radio Podcast
David Schissler
Email: d.schissler@computer.org Marie Thompson
Phone: +1 508-394-4026 Email: marie.thompson@computer.org
Phone: +1 714-813-5094

www.computer.org/computingedge
March/April 2022 IEEE Internet Computing 3515
EDITOR: Ron Vetter, University of North Carolina Wilmington, vetterr@uncw.edu

This article originally


appeared in
DEPARTMENT: SPOTLIGHT ON TRANSACTIONS
vol. 54, no. 12, 2021

DROO: Integrated Learning


and Optimization for Edge
Computing Offloading
Qian Zhang, Hong Kong University of Science and Technology

This installment of Computer’s series highlighting the work published in IEEE


Computer Society journals comes from IEEE Transactions on Mobile Computing.

E
dge computing is recognized as a key Computing Networks,” Huang et al.1 propose a novel
enabling technology for Internet of Things integrated optimization and learning approach, deep
(IoT) applications to achieve energy-efficient, reinforcement learning-based online offloading
ultralow-latency, and high-performance computing (DROO). That can provision close-to-optimal comput-
service beyond 5G/6G. IoT devices of limited comput- ing services that are adaptive to fast-varying wireless
ing power and onboard battery life can significantly channels. As shown in Figure 1, instead of solving for
improve their data processing capability by offloading the hybrid integer-continuous solution altogether,
intensive computation tasks to a nearby edge server DROO decomposes the original optimization problem
for remote execution. Constrained by the available into a zeroone binary offloading decision subproblem
computation and communication resources in an
edge access network, efficient provisioning of edge
computing services requires judiciously deciding the TO BETTER APPROXIMATE THE
set of IoT devices allowed to offload as well as the SUBMANIFOLD, THEIR METHOD
assets allocated to them based on real-time edge CONSIDERS ONLY A FEW BASIS
parameters. Achieving optimal online provisioning MODES IN THE VICINITY OF THE
of edge services is challenging in a large IoT network DESIRED DEFORMATION.
under fast-varying wireless channel conditions. In
particular, it requires repeatedly solving mixed-integer
nonlinear programming (MINLP) problems, each to be and a continuous resource allocation subproblem and
finished within a channel coherence time of at most then tackles them separately through a model-free
several seconds. Conventional model-based integer learning module and a model-based optimization mod-
optimization methods are too slow in their numerical ule, respectively. In each time slot, the actor module
iterations to search large solution vector spaces, while uses a fully connected deep neural network (DNN)
model-free learning-based methods suffer from slow to map the input instant system parameters to mul-
learning convergence or even divergence in finding an tiple binary offloading action vectors, and the critic
optimal hybrid integer-continuous online policy. module optimizes the resource allocation for each
In “Deep Reinforcement Learning for Online Com- action vector and selects the best one. DROO uses the
putation Offloading in Wireless Powered MobileEdge selected binary offloading action and the correspond-
ing resource allocation as the control decision in the
current time slot and then stores the selected binary
Digital Object Identifier 10.1109/MC.2021.3055923 action in a replay buffer for updating the policy of the
Date of current version: 17 November 2021 DNN in the future. With a new input channel condition

16 June 2023 Published by the IEEE Computer Society  2469-7087/23 © 2023 IEEE
Model-Free Model-Based
Actor Module Critic Module

Relaxed Selected
Action Resource
Action
Instant System Allocation Real-Time
Parameters and Decision
Argmax

Quantized
Deep Neural Network Actions

Train Neural Networks

FIGURE 1. A schematic of DROO.1

in the next time slot, the update of the DNN model provisioned computing service achieves 99.9 of the
parameters repeats until converging to the optimal optimum in less than 0.1 s after convergence.
online policy.
Compared with model-based optimization, DROO
takes negligible computation time, as it can directly
map any new channel input to the optimal output
B esides edge service provisioning, DROO has
important applications in a wide range of areas,
such as wireless communications and industrial con-
control action without the need for numerical opti- trol, where MINLP instances need to be frequently
mization. On the other hand, compared with conven-
tional deep reinforcement learning (DRL) methods
that treat both the integer offloading and continuous MODEL-FREE LEARNING-BASED
resource allocation decisions as the action, DROO METHODS SUFFER FROM SLOW
significantly reduces the action space of the DNN, LEARNING CONVERGENCE OR EVEN
which greatly simplifies the learning task to a classi- DIVERGENCE IN FINDING AN OPTIMAL
cal classification problem. Perhaps more importantly, HYBRID INTEGER-CONTINUOUS
the optimization-based critic module provides precise ONLINE POLICY.
evaluation of the integer offloading decisions gener-
ated by the actor module. This greatly improves the
convergence of the training process as compared with resolved. In addition, its decoupled structure facili-
conventional DRL, whose convergence is often jeop- tates simple modifications to handle more compli-
ardized by the inaccurate evaluation of actions before cated use cases. For instance, by slightly modifying the
the critic network is sufficiently trained. Simulation critic module with a Lyapunov optimization technique,
results show that DROO quickly converges in fewer DROO can effectively tackle stochastic MINLP with
than 3,000 iterations in a 30-user network, and the long-term performance constraints2; by replacing the

www.computer.org/computingedge 17
SPOTLIGHT ON TRANSACTIONS

DNN in the actor module with a convolutional neural QIAN ZHANG is the Tencent Professor of Engineering and
network, recursive neural network, or state-of-the-art chair professor in the Department of Computer Science and
transformer, DROO can improve its convergence Engineering, Hong Kong University of Science and Technol-
performance and handle more sophisticated learn- ogy, Hong Kong, China. Contact him at qianzh@cse.ust.hk.
ing tasks. In this sense, DROO makes it truly viable to
obtain real-time and optimal solutions to a variety of
hard MINLP problems in fast-varying environments.

REFERENCES
1. L. Huang, S. Bi, and Y. J. Zhang, “Deep reinforcement
learning for online computation offloading in wireless
powered mobile-edge computing networks,” IEEE
Trans. Mobile Comput., vol. 19, no. 11, pp. 25812593, Nov.
2020. doi: 10.1109/TMC.2019.2928811
2. S. Bi, L. Huang, H. Wang, and Y. J. Zhang,
“Lyapunov-guided deep reinforcement learning for
stable online computation offloading in mobile-edge
computing networks,” IEEE Trans. Wireless Commun., WWW.COMPUTER.ORG/COMPUTINGEDGE
2021, arXiv:2010.01370.

CG& A IEEE Computer Graphics and Applications bridges the theory


and practice of computer graphics. Subscribe to CG&A and
www.computer.org/cga

• stay current on the latest tools and applications and gain


invaluable practical and research knowledge,
• discover cutting-edge applications and learn more about
the latest techniques, and
• benefit from CG&A’s active and connected editorial board.

18 ComputingEdge June 2023


EXECUTIVE COMMITTEE
President: Nita Patel
President-Elect: Jyotika Athavale
Past President: William D. Gropp
www.computer.org First VP: Hironori Washizaki
Second VP: Grace A. Lewis
Secretary: Carolyn McGregor
PURPOSE: Engaging professionals from all areas of
Treasurer: Michela Taufer
computing, the IEEE Computer Society sets the standard for
VP, Membership & Geographic Activities: Fernando Bouche
education and engagement that fuels global technological
VP, Professional & Educational Activities: Deborah Silver
advancement. Through conferences, publications, and
programs, IEEE CS empowers, guides, and shapes the future Interim VP, Publications: Greg Byrd
of its members, and the greater industry, enabling new VP, Standards Activities: Annette Reilly
opportunities to better serve our world. VP, Technical & Conference Activities: Grace A. Lewis
OMBUDSMAN: Direct unresolved complaints to 2023–2024 IEEE Division VIII Director: Leila De Floriani
ombudsman@computer.org. 2022–2023 IEEE Division V Director: Cecilia Metra

CHAPTERS: Regular and student chapters worldwide provide 2023 IEEE Division V Director-Elect: Christina M. Schober
the opportunity to interact with colleagues, hear technical
experts, and serve the local professional community. BOARD OF GOVERNORS
Term Expiring 2023:
AVAILABLE INFORMATION: To check membership status,
report an address change, or obtain more information on any Jyotika Athavale, Terry Benzel, Takako Hashimoto, Irene Pazos
of the following, email Customer Service at help@computer. Viana, Annette Reilly, Deborah Silver
org or call +1 714 821 8380 (international) or our toll-free Term Expiring 2024:
number, +1 800 272 6657 (US): Saurabh Bagchi, Charles (Chuck) Hansen, Carlos E. Jimenez-
• Membership applications Gomez, Daniel S. Katz, Shixia Liu, Cyril Onwubiko
• Publications catalog
Term Expiring 2025:
• Draft standards and order forms
İlkay Altintaş, Nils Aschenbruck, Mike Hinchey, Joaquim Jorge,
• Technical committee list
Rick Kazman, Carolyn McGregor
• Technical committee application
• Chapter start-up procedures
• Student scholarship information EXECUTIVE STAFF
• Volunteer leaders/staff directory
Executive Director: Melissa Russell
• IEEE senior member grade application (requires 10 years
practice and significant performance in five of those 10) Director, Governance & Associate Anne Marie Kelly
Executive Director:
Director, Conference Operations: Silvia Ceballos
PUBLICATIONS AND ACTIVITIES Director, Information Technology & Sumit Kacker
Computer: The flagship publication of the IEEE Computer Services:
Society, Computer, publishes peer-reviewed technical Director, Marketing & Sales: Michelle Tubb
content that covers all aspects of computer science, Director, Membership Development: Eric Berkowitz
computer engineering, technology, and applications. Director, Periodicals & Special Projects: Robin Baldwin
Periodicals: The Society publishes 12 magazines, 19 journals.
Conference Proceedings & Books: Conference Publishing IEEE BOARD OF DIRECTORS
Services publishes more than 275 titles every year.
President & CEO: Saifur Rahman
Standards Working Groups: More than 150 groups produce
President-Elect: Thomas M. Coughlin
IEEE standards used throughout the world.
Director & Secretary: Forrest (Don) Wright
Technical Communities: TCs provide professional interaction
Director & Treasurer: Mary Ellen Randall
in more than 30 technical areas and directly influence
Past President: K. J. Ray Liu
computer engineering conferences and publications.
Director & VP, Educational Activities: Rabab Ward
Conferences/Education: The society holds more than 215
Director & VP, Publication Services & Sergio Benedetto
conferences each year and sponsors many educational
Products:
activities, including computing science accreditation.
Director & VP, Member & Geographic Jill Gostin
Certifications: The society offers three software Activities:
developer credentials.
Director & President, Standards Yu Yuan
Association:
COMPUTER SOCIETY OFFICES Director & VP, Technical Activities: John Verboncoeur
Director & President, IEEE-USA: Eduardo Palacio
Washington, D.C.: Los Alamitos:
2001 L St., Ste. 700, 10662 Los Vaqueros Cir.,
Washington, D.C. 20036-4928; Los Alamitos, CA 90720;
Phone: +1 202 371 0101; Phone: +1 714 821 8380;
Fax: +1 202 728 9614; Email: help@computer.org
Email: help@computer.org

MEMBERSHIP & PUBLICATION ORDERS


Phone: +1 800 272 6657; Fax: +1 714 821 4641;
Email: help@computer.org revised 6 February 2023
EDITORS:Oliver
EDITORS: OliverAmft,
Amft, oliver.amft@fau.de
oliver.amft@fau.de
Kristof Van Kristof Van Laerhoven,
Laerhoven, kvl@eti.uni-siegen.de
kvl@eti.uni-siegen.de This article originally
appeared in

DEPARTMENT:
DEPARTMENT:WEARABLE
WEARABLE COMPUTING
vol. 20, no. 2, 2021

TELECOVID: Remote Vital Signs


TELECOVID: Remote Vital Signs Monitoring
Monitoring
of COVID-19of COVID-19
Risk Risk
Patients Patients
in Home in
Isolation
Home Isolation
With an With an In-Ear Wearable
In-Ear Wearable
Melanie Baldinger , Axel Heinrich, and Tim Adams, Cosinuss GmbH , Munich, 81379 , Germany
Melanie Baldinger , Axel Heinrich, and Tim Adams, Cosinuss GmbH , Munich, 81379 , Germany
Eimo Martens , Michael Dommasch, Alexander Müller , Adonia Siegmann , and Georg Schmidt,
Eimo Martens
Technische , Michael
Universität Dommasch,
Munich, Alexander
Munich, Mu€ ller , Adonia Siegmann , and Georg Schmidt, Technische
80333, Germany
Universitat Munich, Munich, 80333, Germany

The TELECOVID study (https://www.telecovid.de) is designed to remotely monitor


The TELECOVID study (https://www.telecovid.de) is designed to remotely monitor the
the physiological health status of COVID-19 positive-risk patients in home isolation.
physiological health status of COVID-19 positive-risk patients in home isolation. Key vital
Key vital parameters are measured day and night using an in-ear biosensor technol-
parameters are measured
ogy. These data day and
are streamed night
to the using
clinic an time
in real in-ear
tobiosensor technology.
enable timely These
interaction in data
are streamed to the clinic
case of deterioration. in real time to enable timely interaction in case of deterioration.

T
he main goal of the study at the Klinikum rechts In total, 95 patients (n = 95) participated in the
der Isar (MRI) of the Technical University of study so far. We instructed participants to use the
Munich (TUM) is to detect the transition into wearable as much as possible during day and night for
the potentially life-threatening course of the disease the time of their home isolation. Inclusion criteria are
at an early stage and, thereby, improve the survival as follows.
chances of the patients. To this end, we continuously
record relevant vital parameters, such as blood oxy- › COVID-19 patients over 60 years of age with con-
gen saturation, core body temperature, respiration firmed diagnosis, which do not require intensive
rate, and heart rate, using the cosinuss remote vital care or mechanical ventilation at the time of
signs monitoring system and the in-ear wearable inclusion.
cosinuss Two. Recent research has shown that wear- › Immunosuppressed COVID-19 patients of all
ables can play an important role in disease detection1 ages.
and monitoring2 during the COVID-19 pandemic. Espe-
cially digital health platforms for remote patient moni- All participants signed a declaration of consent
toring and managing this pandemic are needed.3 The provided by the MRI, TUM. This article was approved
aim of this article is to make the pandemic outbreak by the local medical ethics committee (Ethikkommis-
more manageable and to keep up a functioning sion der Technischen Universita
€t Munich).
healthcare system.

REMOTE VITAL SIGNS


MONITORING SYSTEM
ABOUT THIS ARTICLE
The cosinuss remote vital signs monitoring system
Health professionals monitor the patients during
(https://www.cosinuss.com/en/portfolio-items/study-
home isolation day and night and, in the event of criti-
on-remote-patient-monitoring-for-covid-19) is used for
cal deterioration, patients are immediately admitted
data collection and remote monitoring of COVID-19
to the clinic.
patients in home isolation. It consists of a wearable in-
ear device for monitoring vital signs (cosinuss Two) a
data gateway (cosinuss LabGateway) and a cloud
1536-1268  2021 IEEE server database (cosinuss LabServer). The components
Digital Object Identifier 10.1109/MPRV.2021.3066825 are shown in Figure 1. The cosinuss Two is an in-ear
Date of current version 25 May 2021. wearable incorporating a photoplethysmographic (PPG)

2058
June 2023
IEEE Pervasive Computing PublishedPublished
by the IEEE
byComputer Society  Society
the IEEE Computer 2469-7087/23 © 2023
April-June 2021IEEE
WEARABLE
WEARABLECOMPUTING
COMPUTING

FIGURE 1. Components of the remote vital signs monitoring system. (a) Wearable in-ear device for monitoring vital signs
remotely: cosinuss Two. (b) Data gateway, cosinuss LabGateway, receives the data from the in-ear wearable and transmits it
to the cloud server, cosinuss LabServer. (c) Example dashboard of the LabServer showing pseudonymized patients with
example vital signs data and deviation scores.

sensor with red and infrared LEDs, a contact tempera- then transmitted via Wi-Fi or the mobile network to
ture sensor, and a 3D accelerometer. the cloud server, where a group of students that is
The in-ear wearable device collects physiological supervised by physicians have access to all monitored
parameters from the patient and sends it to the LabGa- vital data and further information, e.g., the measure-
teway. The PPG and other vital signs data are transmit- ments and trends over the last days. This information
ted with a proprietary protocol including lossless data supports the study team in determining the urgency
compression using Bluetooth Low Energy. The LabGa- of the respective health situation and the necessity of
teway, which runs a Python application on a Debian- hospital admission. The health professionals at the
based Linux OS, stores the data—also offline—and MRI call the patients at home at least once a day as
transmits it to the cosinuss LabServer via REST proto- well as in critical situations to inquire about the gen-
col. For optimal performance and scalability, MongoDB eral condition and the well-being of the patient.
is used as a backend cloud database in combination Additionally to the real-time data display, all data
with Redis, an in-memory data storage application, and can be downloaded for further analysis using the
the web framework Flask. Data management is based cosinuss REST API. The data flow is shown in Figure 2.
on proprietary logic to efficiently store, transmit, and All health data on the cloud server are pseudony-
process the vast amounts of raw data accumulating mized. Only authorized personnel have access to the
during a patients monitoring period. data. The data transfer is encrypted.
The web interface of the LabServer provides a
comprehensive dashboard of all monitored patients.
Latest vital parameters can be tracked and data visu- DATA COLLECTION AND
alization with meaningful plots supports healthcare PROCESSING
professionals with identifying critical patients. The cosinuss Two in-ear wearable collects the follow-
ing data: Optical pulse wave (PPG signal) with a sam-
pling rate of 200 Hz, core body temperature with a
MEASURING AT PATIENTS’ HOMES sampling rate of 1 Hz and 3D acceleration of the head
Patients that gave their written consent to participate with a sampling rate of 100 Hz. Based on these raw
in the study, receive the in-ear wearable, cosinuss data, the following four vital signs are calculated: core
Two, and a LabGateway from a courier that is part of body temperature, heart rate, blood oxygen saturation
the study team at MRI. (SpO2 ), and respiration rate.
The cosinuss remote vital signs monitoring sys- We designed and provide an indicator for the PPG
tem is then set up as convenient and easy-to-use as signal’s quality additionally to the vital data, indicating
possible: The cosinuss Two is placed inside the outer the reliability of the calculated heart rate of the current
ear canal. The LabGateway is plugged into a socket. It measurement. If the signal quality indicator (Q) drops
is a plug-and-play device, requiring minimum user below a set threshold, the calculated values should be
interaction. The wearable device automatically starts scrutinized by the health professionals. This quality indi-
measuring PPG data and vital signs and sends the col- cator enables them to determine whether the wearable
lected data to the LabGateway. The collected data are is correctly adjusted in the ear canal and whether it is

www.computer.org/computingedge
April-June 2021 IEEE Pervasive Computing 5921
WEARABLECOMPUTING
WEARABLE COMPUTING

FIGURE 2. Data flow from the wearable device through the data gateway to the cloud server, where data can be displayed at
hospitals or health authorities and data are provided through the API for downloading or integrating the data in already existing
data infrastructures.

able to determine reliable measurements. Additionally, decision makers in case of deterioration.6 This is in line
the perfusion index (PI) is an indicator for the quality of with the recommendations of Liao et al.7
the measurement of SpO2 . PI is the ratio of pulsatile
blood flow to nonpulsatile blood flow measured using INTERMEDIATE RESULTS
pulse oximetry.4 The quality indicator as well as the PI
From the total of 95 patients, 7 dropped out of the
are particularly important for the health professionals
study early due to various reasons ranging from pain
monitoring the patients. The in-ear wearable device
in the ear due to long wearing times of the sensor in
measures the vital signs every 15 min for a period of 3
three cases, daily phone calls from the clinical person-
min. After the 3-min measurement period, all data are
nel being too stressful in two cases and no specified
sent to the cloud server and displayed on the dashboard
reasons in two cases.
in the web interface. For SpO2 , the maximum value over
Patients were monitored between 1 and 21 days,
the 3-min measurement is displayed; for the respiration
with an average duration of 8.2 days (median = 8).
rate, heart rate, core body temperature, and the quality
Patients recorded their vital data using the cosinuss
indicator, the median value over the last 3 min is shown;
Two in-ear wearable on average 12.9 h per 24 h
and for the PI, the minimum value is shown. These
(median = 13.3), recording time ranging between 1.3
measurement cycles can be configured individually. For
and 21.1 h (assuming that 3-min data acquisition corre-
this article, we optimized the measurement intervals for
sponds to 15-min usage time). The actual wearing time
a 24-h runtime from one battery charge; thus, the
of the device might potentially be longer since we did
cosinuss Two wearable only needs to be charged 1 h per
not include the time when patients were outside of
24-h monitoring. Furthermore, the battery status and the
the Bluetooth range of the gateway, which means no
time that has passed since the last measurement are dis-
data can be recorded and transmitted. Therefore, the
played on the dashboard for each patient. Additionally to
time when the patient is outside of Bluetooth range
the periodic recordings, a vital parameter measurement
corresponds to “not wearing the device.” At peak
can be triggered on demand through the web interface.
times, 17 patients were monitored in parallel.
A physiological deviation score based on the four
Based on the continuous monitoring, 9 patients
vital parameters (heart rate, SpO2 , respiration rate, and
have been hospitalized so far. Of these, one had to be
core body temperature) is calculated for each measure-
ventilated (noninvasively) and one put into an artificial
ment. This score indicates an overall deviation from the
coma after hospital admission.
normal physiological health state of a person. The cal-
culation is similar to the National Early Warning Score
(NEWS) system5: A deviation is given to each parameter LESSONS FROM THE FIELD STUDY
as they are measured, with the magnitude reflecting the High data quality especially during the night and a low
deviation from the norm. The deviation of each of the dropout rate of 7.7% strongly indicate the feasibility
four vital parameters is added up to calculate the over- and usability of the solution to use in remote patient
all deviation score, which is indicated on the dashboard monitoring applications.
(low, intermediate, and high deviation). The Royal Col- Talking and chewing affects the measurements.
lege of Physicians suggest using the National Early The setting in this article is different from a station-
Warning Score system when managing patients with ary hospital setup. Patients at home are moving
COVID-19 to ensure timely assessment by clinical around within their flat or house and engage in

22
60
ComputingEdge
IEEE Pervasive Computing June
April-June 20212023
WEARABLE
WEARABLECOMPUTING
COMPUTING

parameters, the PPG raw data (see Figure 3) helps


them to better understand if the signal is disturbed
or can be relied on when interpreting the vital
parameters. In addition to motion artifacts, PI, and,
therefore, the quality of the SpO2 measurement is
furthermore influenced by various factors including
blood circulation, ambient temperature, body posi-
tion (sitting, standing, or lying), or skin color.
In-ear fit is important. Another important factor
is the size of the wearable itself. A good and tight
fit of the in-ear wearable device inside the outer
ear canal is essential to get high-quality data. Par-
ticipants decide which size (S, M, L) fits using a
specifically designed measuring tool without previ-
ous experience and only little guidance on how to
apply it. An ill-fitting device can considerably impair
the measurement quality, which is reflected in low
quality values.
These promising results suggest the cosinuss
remote vital signs monitoring system to be a reason-
able solution to tackle COVID-19 crisis by keeping
patients safely monitored at home.

ACKNOWLEDGMENTS
We would like to acknowledge and express thanks to
the whole TELECOVID study team.
FIGURE 3. Varying quality of PPG raw data signals derived
from the cosinuss Two depending on the patients’ activity
level. (a) Undisturbed PPG. (b) Mildly disturbed PPG. (c) REFERENCES
Severely disturbed PPG. 1. O. Amft, L. Lopera, P. Lukowicz, S. Bian, and P. Burggraf,
“Wearables to fight COVID-19: From symptom tracking
to contact tracing,” IEEE Ann. Hist. Comput., vol. 19,
activities of daily living. Patients’ activities at home no. 4, pp. 53–60, Oct.–Dec. 2020, doi: 10.1109/
can affect the measurement quality (see Figure 3). MPRV.2020.3021321.
First research has already been done in the area of 2. A. Natarajan, H.-W. Su, and C. Heneghan, “Assessment of
gait and movement classification using the in-ear physiological signs associated with COVID-19 measured
wearable and has shown promising results.8 Further using wearable devices,” NPJ Digit. Med., vol. 3, no. 1,
research in the area of movement detection would pp. 1–8, 2020, doi: 10.1038/s41746-020-00363-7.
be an additional benefit for remote monitoring of 3. D. R. Seshadri et al., “Wearable sensors for COVID-19: A
patients. However, measurements of heart rate and call to action to harness our digital infrastructure for
blood oxygen saturation using the in-ear wearable remote patient monitoring and virtual assessments,”
are strongly influenced by talking or chewing due Front. Digit. Health, vol. 2, pp. 1–11, 2020, doi: 10.3389/
to the movement in the jaw. Highest accuracy and fdgth.2020.00008.
reliability of the measurements were observed 4. A. Lima and J. Bakker, “Noninvasive monitoring of
when the patient was in a resting position without peripheral perfusion,” in Appl. Physiology Intensive Care
talking or eating. Medicine, Springer, Berlin, Heidelberg. 2006, doi: 10.1007/
PI and Q help to determine if data are reliable. 3-540-37363-2_26.
The health professionals at the clinic use the PI 5. Royal College of Physicians, “National early warning
and Q parameters to determine if the recorded score (NEWS) 2,” 2017. Accessed: Feb. 1, 2021. [Online].
data point is reliable or if the measurement is Available: https://www.rcplondon.ac.uk/projects/
affected by motion artifacts. Additionally to these outputs/national-early-warning-score-news-2

www.computer.org/computingedge
April-June 2021 IEEE Pervasive Computing 6123
WEARABLECOMPUTING
WEARABLE COMPUTING

6. Royal College of Physicians, “NEWS2 and deterioration EIMO MARTENS is currently a Senior Physician of the TELE-
in COVID-19,” 2020. Accessed: Feb. 1, 2021. [Online]. COVID study with the Department of Internal Medicine I, Kli-
Available: https://www.rcplondon.ac.uk/news/news2-
nikum rechts der Isar, Munich, Germany. Contact him at
and-deterioration-covid-19
eimo.martens@mri.tum.de.
7. X. Liao, B. Wang, and Y. Kang, “Novel coronavirus
infection during the 2019-2020 epidemic: Preparing
MICHAEL DOMMASCH is currently a Senior Physician of the
intensive care units—The experience in Sichuan
Province, China,” Intensive Care Med., vol. 46, no. 2, TELECOVID study with the Department of Internal Medicine
pp. 357–360, 2020, doi: 10.1007/s00134-020-05954-2. I, Klinikum rechts der Isar, Munich, Germany. Contact him at
8. C. P. Burgos et al., “In-ear accelerometer-based michael.dommasch@mri.tum.de.
sensor for gait classification,” IEEE Sensors J., vol. 20,
no. 21, pp. 12895–12902, Nov. 2020, doi: 10.1109/JSEN. €
ALEXANDER MULLER is currently a Software Engineer with
2020.3002589. the Biosignal Analysis Working Group, Klinikum rechts der
Isar, Munich, Germany. Contact him at alexander.mueller@-
MELANIE BALDINGER is currently a Project Manager for
tum.de.
research projects at cosinuss (Cosinuss GmbH), Munich,
Germany. Contact her at melanie.baldinger@cosinuss.com. ADONIA SIEGMANN is currently the Project Manager of the
TELECOVID study with the Department of Internal
AXEL HEINRICH is currently a Data Engineer with cosinuss
Medicine I, Klinikum rechts der Isar, Munich, Germany. Con-
(Cosinuss GmbH), Munich, Germany. Contact him at axel.
tact her at adonia.siegmann@tum.de.
heinrich@cosinuss.com.

GEORG SCHMIDT is currently the Clinical Director of the


TIM ADAMS is currently the Head of Software Development TELECOVID study with the Department of Internal Medicine
with cosinuss (Cosinuss GmbH), Munich, Germany. Contact I, Klinikum rechts der Isar, Munich, Germany. Contact him at
him at tim.adams@cosinuss.com. gschmidt@tum.de.

IEEE COMPUTER SOCIETY


Call for Papers
Write for the IEEE Computer
Society’s authoritative
computing publications
and conferences.

GET PUBLISHED
www.computer.org/cfp

2462
ComputingEdge
IEEE Pervasive Computing June
April-June 20212023
IEEE
Computer
Society Has
You Covered!
WORLD-CLASS CONFERENCES — Stay
ahead of the curve by attending one of our
189+ globally recognized conferences.

DIGITAL LIBRARY — Easily access over


893k articles covering world-class peer-
reviewed content in the IEEE Computer
Society Digital Library.

CALLS FOR PAPERS — Discover


opportunities to write and present your
ground-breaking accomplishments.

EDUCATION — Strengthen your resume


with the IEEE Computer Society Course
Catalog and its range of offerings.

ADVANCE YOUR CAREER — Search the


new positions posted in the IEEE Computer
Society Career Center.

NETWORK — Make connections that count


by participating in local Region, Section,
and Chapter activities.

Explore all of the member benefits


at www.computer.org today!
EDITORS: Pavel Gladyshev, pavel.gladyshev@ucd.ie,
Joshua James, joshua.i.james@pm.me
This article originally
appeared in

CYBERCRIME AND FORENSICS


vol. 20, no. 1, 2022

Medical Device Forensics


Veronica Schmitt, Noroff University

Traditionally, medical devices were built with a focus on clinical care, not security. As
health care moves to Industry 4.0, practitioners need to evolve and determine what
digital forensics and incident response entail when dealing with medical devices.

I
n 2020, the world was turned on its head. With the examines the threat landscape around health care,
pandemic not showing any signs of regressing, the probability starts looking much greater. In 2020,
the medical industry has had to adapt quickly there were an alarming number of incidents in which
to ensure that patients receive the necessary care. health-care information was exposed, with 24.1 mil-
More than ever before, physicians needed to be able lion records being disclosed in one occurence.4 These
to monitor their patients while at home. This brought events represent an alarming 91.2 of all breached
about what is referred to as “Health Care 4.0,”1 derived records for that year.
from “Industry 4.0.” Health-care data are a significant source of con-
This article details how health care has moved to cern. Generally, within health care, it takes anywhere
form part of the digital frontier. This change meant between 96 and 236 days to detect and recover from
that the push for interconnected medical devices was an IT breach.9 Overall, health care has seen an increase
no longer a pipe dream but had to be made a reality of 25 in the frequency of breaches in the sector.5
much faster. It became a necessity for a physician to Hacking and IT incidents accounted for about 67 of all
have real-time access to patients’ data. data breaches and 92 of all data breaches for 2020.4
Generally, the medical industry has not had the These numbers indicate that health care, as a whole,
best track record when it comes to incorporating is under attack. When dealing with interconnected
fast-paced changes. As we introduce these instru- instruments, medical devices could potentially be a
ments into our hospital infrastructure and patients’ stepping-stone toward obtaining access to a hospital
homes, the age-old question is asked: “Can these network or electronic health-care records.
devices be hacked?” Although this is a valid concern, There have been numerous hcal devices. It should
it would be far better to determine the likelihood that be no surprise that these devices, like any other sys-
a medical device will be hacked. The easy answer to tem, have flaws that could lead to a more significant
this is probably one that every digital forensics prac- compromise. According to the Center for Devices
titioner is familiar with: “It depends.” Many factors are and Radiological Health,2 security researchers
involved—for example, how the device is connected, identified 12 vulnerabilities, which they named
how the network is segmented, and the manufactur- SweynTooth. These particular vulnerabilities were
ing specifications of the device. associated with the wireless communication tech-
It is often proposed that the likelihood of a medi- nology Bluetooth Low Energy. This communication
cal device being hacked is not very high.9 When one technology allows two devices to effectively pair and
perform their intended function without excessively
impacting battery life. The potential attacks that
Digital Object Identifier 10.1109/MSEC.2021.3127490 could stem from this vulnerability would crash the
Date of current version: 25 January 2022 device, stopping the communication from working

26 June 2023 Published by the IEEE Computer Society  2469-7087/23 © 2023 IEEE
©SHUTTERSTOCK.COM/VEKTORJUNKIE

and causing the device to freeze, much like a denial and outputs. Medical devices are manufactured to
of service. This would leave the device unable to last for an extended period and apply treatment to
respond and allow researchers to bypass security patients. On a functional level, they were not built
to access functions on the device that otherwise with security in mind.
would not be available. There are many manufactur- As a result, some devices were the most advanced
ers affected by this vulnerability. 2 at one point. However, as time has moved on, they
The question is whether these devices have log- have become vulnerable due to the progression of
ging capabilities to offer early detection or even technology. Many of the more traditional medical
allow postmortem investigations to occur. From the devices cannot dynamically evolve in the way that
research and examinations I have done, this would software might. The medical device software is
seem not to be the case. The focus should be on early built on hardware that might be embedded within a
detection and mitigation for vulnerabilities like this. patients’ body and so cannot be updated. As soft-
There have been other suggestions made in the indus- ware and firmware grow over time and become more
try relating to managing the manufacturing material sophisticated, they surpass the capabilities of the
and code libraries used in terms of introducing the physical hardware. In 10 years, we will still be deal-
software bill of materials, which certainly helps ing with legacy devices, which are the biggest pitfall
manufacturers be in a position to identify whether when it comes to traditional incident response and
a vulnerability impacts their devices. However, this digital forensics.
does not solve the problem of determining whether a Forensic readiness is a term that has many defini-
device has been compromised by a vulnerability and tions, partially because it is relatively new. Unclear
exploited.3 definitions lead to confusion when discussing how
When I have these conversations with patients and forensic readiness can be achieved in medical devices.
medical personnel, I am often asked whether the risk There is a balance to forensic readiness, specifically,
outweighs the benefit of these devices. There is no the ability to collect credible digital evidence while
satisfactory answer here, except it depends on many reducing the costs to perform digital forensics on
variables. One cannot argue that medical devices a medical device. 8 To determine whether a medical
stand between life and death for patients. I have had device has forensic readiness maturity means that
an implantable device that ensures that my heart the digital forensics practitioner or manufacturer
functions as it should and does not stop. This device has to determine what information is stored on the
has added many years to my life expectancy. file system.
The concern when dealing with medical devices The first step is to understand what hardware
has always been one of legacy. When a device is architecture is used on a particular device. Hardware
manufactured, it goes through many checks and tests is very diverse across a manufacturer. The functional-
to ensure that it is safe and built appropriately. It is ity and firmware support determine its selection. Next,
essential to understand that security is not a func- we should consider the file system, which is the link
tional requirement of a medical device. Functional between the hardware and software components. It is
requirements are defined as necessary functions of the guiding principle for storing the data and recording
the system or its components. These are described the file creation, deletions, and modification. These
as a specification of the behavior between the inputs could even apply to devices that do not have a file

www.computer.org/computingedge 27
CYBERCRIME AND FORENSICS

Evidence
Locations settings or calibration of the device, patient data, and
Cloud clinical information. The data from these devices in
Application terms of clinical and health data are often integrated
Operating System with different cloud solutions at the health-care facil-
File System ity and connected with the electronic health-care sys-
Physical tems.4 The question is whether there are logs that can
Hardware
be ingested from medical devices into cloud solutions
for log aggregation (Figure 1).
When a medical device is compromised, several
FIGURE 1. The medical device locations of the investigation. things are needed to respond to and remediate the
incident. The first is whether the medical device
manufacturer, hospital, or patient is in a position to
system but function as “bare-metal devices” These detect the breach. Since 2015, reports indicate that
can be likened to memory-based devices, which pose early detection in all industries has been challeng-
many challenges to digital forensics. ing. 2 Medical devices are not manufactured with
Other file systems in medical devices are ones that breach detection in mind. Presently, however, the
most digital forensics practitioners are already famil- landscape is changing, with medical manufacturers
iar with. The file system I have encountered the most exploring security by design and including this as part
is the File Allocation Table (FAT), which has unique of their operating models.
features that allow easier data recovery. The Exten- When we talk about medical device forensics,
sible FAT (exFAT) is the next most common, a UNIX file there is no clear definition in the literature. The field is
system with its own rules that govern data storage. made up of three main disciplines, called the triangle
The next area of understanding in the layers of approach, as seen in Figure 2.13 There is also a wide
medical devices is the operating systems; these vary variety of medical devices. We explore some in more
across devices, manufacturers, and many other fac- detail, as this is important to understand the problem
tors. One you can expect to encounter is VxWorks statement. Infusion pumps make up more than half of
(https://www.windriver.com/products/vxworks), an all of the medical Internet of Things devices deployed
embedded real-time operating system. You might within hospitals. They play a critical role in patient
even encounter embedded Microsoft Windows or care and ensuring that the hospital controls the infu-
Windows CE, which has since been deprecated. How- sion of medicine. These pumps have given medical
ever, as previously discussed, medical devices last for professionals the ability to care for patients remotely
many years. An investigator might encounter medical and automate some health-care delivery. This type
device forensics that includes the Android and iOS of technology invites malicious threat actors inter-
operating systems. These, again, have forensic arti- ested in disrupting these life-sustaining advances in
facts a digital forensics practitioner is accustomed medicine. 5
to. We could also encounter some operating systems In January 2020, a security vulnerability was pub-
that are custom versions of Linux or BusyBox (https: lished involving certain GE Healthcare clinical infor-
//busybox.net/). mation central stations and telemetry servers.4 These
We then proceed to the application layer, which devices are specifically used in health-care facilities
contains the information generated by the application to display information about patients, including phys-
itself. This area is unique to each application regard- iological parameters, such as temperature, heart-
ing what is created in terms of artifacts. However, how beat, blood pressure, for monitoring. A statement
data are stored is governed by the operating and file made by the U.S. Food and Drug Administration says
systems. Knowing the forensics rules surrounding that, to date, there have been no reports of incidents
these components enables the digital forensics prac- related to these vulnerabilities.4 The question that
titioner to digest the application level’s information. It should be raised here, the same as before, is whether
is critical to record the application functionality, the these devices can retain information forensically,

28 ComputingEdge June 2023


CYBERCRIME AND FORENSICS

allowing possible malicious access


Medical Device Engineering
through this vulnerability. When To Debug
explored, concerns around logging Digital Forensics
and forensic data indicate that To Preser ve, Examine, and Analyze
the maturity of forensic readiness Medical Forensics
To Determine Clinical Information
within medical devices is very low.

MEDICAL
DEVICE FORENSICS
Medical device forensics is made FIGURE 2.The medical device forensics triangle.
up of three distinct processes:

› medical device engineering Once the sequence of events has been estab-
› digital forensics lished, one more aspect needs to be looked at: the
› medical forensics. actual recorded medical data. Recorded medical
data should be examined to reconstruct events and
These three disciplines cover the skill sets needed determine the overall medical sequence of them. This
when looking at medical devices, which are often analysis requires knowledge of the medical nature of
are composed of complex hardware, software, and the device and patient. It is essential to understand
data structures. Medical device engineering is the that these devices vary in how data can be acquired,
process of designing, manufacturing, and maintain- the data they store, and the medical information they
ing a medical device. An understanding of the hard- record. Some devices run on bare-metal systems and
ware and operating system is needed. This process is are primarily memory based. The analysis of these
also used extensively to examine whether a medical can be time-consuming and cumbersome. They are
device functions as it should and does fault finding. also often implanted within a patient, making the
It is useful when considering the process of acquiring data more complicated to acquire. With implanted
a forensic image from a medical device, as this often devices, one cannot simply plug something in to make
requires an understanding of the hardware and con- a forensic acquisition, as there is a person attached
straints you might face dealing with these devices.7 to the device.
Knowledge of device functionality can aid the Informal medical device forensics is not a new dis-
digital forensics investigation by determining what cipline; it has been done by manufacturers for years
condition the medical device was in during acquisi- when receiving back faulty devices. They have been
tion. The second part of what needs to be understood fault finding and determining why a device failed as
is the sequence of events on the device and whether part of the medical engineering portion. It is possible
there are any data that need to be recovered. to analyze a medical device to provide an overall pic-
The discipline of digital forensics involves recon- ture of its functionality, the sequence of events, and
structing events on a digital device and recovering the recorded medical information.
data that may have been lost. Data recovery is the Important to note is that most medical devices
second portion of examining the forensic image do not contain robust logging capabilities designed
that you have acquired. Recovery and reconstruc- for incident response. I have a saying: ”When noth-
tion require a low-level understanding of the disk ing goes right, just go left;“ this way, you build what
structures and file systems used to store the data you do not have. The landscape should change from
on a medical device. It is important to note that a file simply hoping that medical devices will not be com-
system should not be confused with an operating promised. Instead, manufacturers must build in the
system. Some medical devices, from a digital foren- detection and forensic evidence needed to prove
sics point of view, look more like what we know in that is the case or adequately deal with an incident.
traditional memory forensics. It is probably not when but whether you would even

www.computer.org/computingedge 29
CYBERCRIME AND FORENSICS

know about such an incident. That being said, medi- balance needs to have multiple stakeholders look at
cal devices save lives and extend the life expectancy the same logs and understand if the provided data
of patients. It is time we focus on building forensics suits their needs.
for future breaches. A developer looks at logs to determine whether
something within the workflow is working as it
LOGGING AND MONITORING ON should. A digital forensics practitioner looks at logs to
MEDICAL DEVICES rebuild events that took place across a given period.
Logging and monitoring are critical steps in the early Upcoming work must ensure that legacy devices can
detection of IT incidents. Log monitoring speeds up be monitored and forensic readiness applied in some
the identification of specific exceptions; for example, form, and medical devices should be built with future
when a device is not behaving expectantly, the logs breaches in mind.
can alert people to that fact. Additionally, log moni-
toring provides developers and support personnel
with observability and visibility of the behavior of their
applications. Cauchi et al.11 state that their research
T he biggest constraint in dealing with medical
devices includes legacy systems, which have
been an ever-growing problem in the medical device
examined the logs from Braun Infusomat Space world. This means that a digital forensics practitio-
pumps and found that they are split between two files. ner investigating medical devices should be versed
The first that they encountered was the device log, in older systems. These devices are not forensically
which contains comprehensive device event informa- ready; they do not have the hardware build, sufficient
tion. The second is the keystroke log, which records logging, or necessary artifacts to conduct incident
inputs. These logs are deficient in many ways. response or perform digital forensics adequately.
For example, logs are often incomplete and contain We have the opportunity to influence how com-
anomalies.12 Ingest logs in real time via cloud-based panies build future devices by building forensic readi-
solutions can help detect and clean these anomalies. ness within the manufacturing phase. However, it also
The key to having these logs ingested is that the logs means that there are potentially legacy devices that
remain time synchronized and tamper evident. This cannot support a costly upgrade to make significant
would allow for the real-time monitoring of the con- changes in terms of forensic readiness. There needs to
dition of patients and their medical devices. Nguyen be a layered approach to device usage within a hospital
et al.12 recommend using Software Guard Extension network and its protection. The future of more secure
(SGX) and the Trusted Platform Module (TPM). They and better forensics-ready medical devices rests
propose that the logger relies on SGX, TPM, and stan- in the hands of those building them. More research
dard encryption to facilitate secure communication. is needed in unpacking the forensic needs to better
This process is used assuming that the communica- reconstruct information on a medical device.
tion channel is in a hostile environment and operat-
ing system. The article identifies options that have ACKNOWLEDGMENTS
promise. However, the concern is how older systems I would like to thank Prof. Barry Irwin from Noroff Uni-
can be refactored to use a cloud solution for real-time versity, who has been instrumental in supporting my
logging, given that the hardware potentially does not writing and research; Emlyn Butterfield from Noroff
support this. University for the support and editing that have gone
Building a secure cloud logger is something that into the article and being a sounding board for the dig-
should be considered for future medical device manu- ital forensics component; and the Biohack Village at
facturing. Medical devices generally have logs that DEF CON, especially Janine Medina, for the late-night
developers design to do fault and error finding and conversation about how we can get better manu-
pull statistics to understand the device’s functional- factured medical devices. Then, there are othersyou
ity. Instead, devices should contain logs with an equal know who you arewho have given me the support to
balance among the system, performance, and debug- explore my ideas. Last but not least, I would like to
ging, and security logging should be considered. The thank William Hagestad for his continuous support

30 ComputingEdge June 2023


CYBERCRIME AND FORENSICS

and many interesting conversations as well as Kyle Rochefortia Sw. (Ehretiaceae, Boraginales),” Biodiver-
Erickson for his support and knowledge. sity Data J., vol. 4, p. e7720, Jun. 2016, doi: 10.3897/BDJ
.4.e7720.
REFERENCES 11. A. Cauchi, H. Thimbleby, P. Oladimeji, and M. Harrison,
1. P. P. Jayaraman, A. R. M. Forkan, A. Morshed, P. D. “Using medical device logs for improving medical
Haghighi, and Y.-B. Kang, “Healthcare 4.0: A review of device design,” in Proc. 2013 IEEE Int. Conf. Healthcare
frontiers in digital health,” Wiley Interdisciplinary Rev., Inform., pp. 5665, doi: 10.1109/ICHI.2013.14.
Data Mining Knowl. Discovery, vol. 10, no. 2, p. e1350, 12. H. Nguyen et al., “Cloud-based secure logger for medi-
2019, doi: 10.1002/widm.1350. cal devices,” in Proc. 2016 IEEE 1st Int. Conf. Connected
2. “SweynTooth cybersecurity vulnerabilities may affect Health, Appl., Syst. Eng. Technol. (CHASE), pp. 8994, doi:
certain medical devices: FDA safety communication,” 10.1109/CHASE.2016.48.
U.S. Food and Drug Administration. https://www.fda 13. N. Ellouze, S. Rekhis, N. Boudriga, and M. Allouche,
.gov/medical-devices/safety-communications/ “Cardiac implantable medical devices forensics:
sweyntooth-cybersecurity-vulnerabilities-may-affect Postmortem analysis of lethal attacks scenarios,”
-certain-medical-devices-fda-safety-communication Digit. Investigation, vol. 21, pp. 1130, Jun. 2017, doi:
(accessed Jun. 24, 2021). 10.1016/j.diin.2016.12.001.
3. S. Carmody et al., ”Building resilient medical technol-
ogy supply chains with a software bill of materials,” npj
Digit. Med., vol. 4, p. 34, Feb. 23, 2021, doi: 10.1038 VERONICA SCHMITT is an assistant professor at Noroff Uni-
/s41746-021-00403-w. versity, Oslo, 4645, Norway. Her research interests include
4. J. Johnson, “Percentage of U.S. healthcare data security vulnerabilities in medical devices forming part of
breaches caused by hacking from 2014 to 2020,” the Internet of Things and how these could be exploited by
Statista, Feb. 12, 2021. [Online]. Available: https://www malicious attackers as well as what types of forensic arti-
.statista.com/statistics/972228/health-data-breaches facts could be identified from any attacks. Schmitt received
-caused-by-hacking-us/ (accessed Jun. 24, 2021). an M.S. degree in information security with a specialization
5. F. Langston, “Top 6 hackable medical IoT devices,” Criti- in the forensic analysis of malware from Rhodes University.
cal Insight. https://www.criticalinsight.com/resources She is involved in DEF CON and various conferences and has
/news/article/top-6-hackable-medical-iot-devices spoken on this topic.
(accessed Jun. 24, 2021).
6. “Cybersecurity vulnerabilities in certain GE healthcare
clinical information central stations and telemetry
servers: Safety communication,” U.S. Food and Drug
Administration. https://www.fda.gov/medical-devices
/safety-communications/cybersecurity-vulnerabilities
-certain-ge-healthcare-clinical-information-central
-stations-and (accessed Jun. 24, 2021).
7. F. E. Block, “The role of forensic engineering investiga-
tions in medical device reports,” J. Clin. Eng., vol. 42, no.
2, pp. 8588, doi: 10.1097/JCE.0000000000000208.
8. A. Kyaw, B. Cusack, and R. Lutui, “Digital forensic
readiness in wireless medical systems,” in Proc. 2019
29th Int. Telecommun. Netw. Appl. Conf. (ITNAC), pp. 16,
F O LLOW US
doi: 10.1109/ITNAC46935.2019.9078005.
9. “Resources for retail delivery leaders,” Convey. https: @s e curit y p riva c y
//www.getconvey.com/resource/medical-devicex
-statistics/ (accessed Jun. 24, 2021).
10. R. Irimia and M. Gottschling, “Taxonomic revision of

www.computer.org/computingedge 31
EDITOR: Phil Laplante, The Pennsylvania State University, plaplante@psu.edu

This article originally


appeared in
DEPARTMENT: SOFTWARE ENGINEERING
vol. 55, no. 7, 2022

Trusting Digital Twins


Phil Laplante, The Pennsylvania State University

A digital twin is a virtual representation of real-world entities and processes


synchronized at a specified frequency and fidelity. This new technology has the
same trust concerns as do other systems, and we explore them here.

O
ur current virtual world seems little different considerations that were proposed in Voas et al. 2021.2
than it was in past decades when we talked These 14 should be considered by any proposed defini-
about specifications and software, both of tion for digital twin.
which are virtual. Specifications and software were These proposed trust concerns are not directly
key software engineering topics back then and still are focused on risk assessment and mitigation, but rather
today. Here, I explore a new technology termed digital on trust. That is, will digital twin technology provide
twins, and ask, “What has really changed?” The trust the desired operational functionality with an accept-
concerns are essentially the same, so let’s revisit them. able level of quality? Answering this question begins
For those of you who are unfamiliar with “digital with an understanding of trust. Here, trust is the
twins,” the Digital Twin Consortium, which is currently probability that the intended behavior and the actual
developing a digital twin standard, has offered the fol- behavior are equivalent given a fixed context, fixed
lowing description for digital twins: environment, and fixed point in time. Trust is viewed as
a level of confidence.
“A digital twin is a virtual representation of Trust should be considered at several levels. 1) Is
real-world entities and processes synchro- the digital twin functionally equivalent to the physical
nized at a specified frequency and fidelity. object? 2) Can a specific digital twin be composed with
another digital twin? 3) Is enough information available
› Digital twin systems transform business by about the environment and context of the physical
accelerating holistic understanding, optimal object? 4) Can digital twin technology be standardized
decision-making, and effective action. to the point where certification of a digital twin is pos-
› Digital twins use real-time and historical data sible? Now, let’s explore the 14 trust issues.
to represent the past and present and simulate
predicted futures. DIGITAL TWIN
› Digital twins are motivated by outcomes, CREATION ORDERING
tailored to use cases, powered by integration, The point in time at which a digital twin is created will
built on data, guided by domain knowledge, and have an impact on the correctness of the digital twin.
implemented in IT/OT systems.1” For example, is it created before the physical object is
created, or is it reverse-engineered from the physical
We won’t focus on that definition here because entity (that it is intended to mirror)? Both approaches
there are others. Instead, we will focus on the 14 trust are valid. However, the fidelity of the digital twin may
be reduced if it is created after the physical entity
exists because there may be internal unknowns about
Digital Object Identifier 10.1109/MC.2022.3149448 the existing physical entity that cannot be discov-
Date of current version: 4 July 2022 ered. A good analogy here is commercial off-the-shelf

32 June 2023 Published by the IEEE Computer Society  2469-7087/23 © 2023 IEEE
software. Such products are black boxesthe source tolerances or expected usage profiles is needed for
code is usually unavailable to the customer or integra- many of the “ilities,”3 particularly interoperability. For
tor and, thus, hides internal syntax. For digital twins, example, bricks used to construct buildings are made
this is a trust consideration. from a variety of materials; some bricks will break more
easily under stress than others, and some bricks are
TEMPORAL better suited to certain temperatures and climates.4
Digital twin technology has an implied temporal com- This additional expected operational usage infor-
ponent to it, particularly since it deals with physical mation should be reflected in the digital twin. With-
objects, and physical objects are bound by time. Hard- out this information, it will be difficult to determine if
ware reliability theory dictates that physical objects the physical object is ”fit for purpose” since purpose
will degrade and fatigue over time after periods of implies environment and context. Unknown environ-
usage. Even when idle, physical systems suffer from mental influences have plagued safety-critical sys-
levels of decay over time. For example, if a car has not tems and software.
been turned on for years, it is likely that the battery will Consider PowerPoint running during a presenta-
be dead, rust and oxidation has occurred, and perhaps tion. Usually, the presenter does little more than touch
insect or rodent pests have damaged the vehicle. (A the Page Up or Page Down keys. One could argue
friend had his car “totaled” by the insurance company that the operational profile for executing PowerPoint
because after years of it lying idle in his barn, he dis- during a presentation is twofold: 1) the loaded presen-
covered that mice had made nests, clogging compo- tation and 2) the button inputs from the presenter.
nents and chewing through all of the wiring.) Whether the presentation goes smoothly (reliably
A digital twin will not degrade or fatigue over time. and in a timely manner) is also a function of all of the
Therefore, at some point the real-world entity and inputs that PowerPoint is receiving from the disk,
digital twin will be in conflict on some level, and syn- memory, and the operating system in real time. If, for
chronization of the two should occur. For example, a example, the presentation gets stuck going from slide
metal part could develop hairline fractures after usage x to slide x + 1, then something related to “unknown”
that are not represented in the digital twin. This situ- (phantom-like) environmental influences is probably
ation might suggest that the digital twin needs to be involved (for example, another process running on the
reworked or maintained to account for this. For exam- machine at the same time and stealing resources and
ple, a physical object at time t + 1 will likely be different computing cycles). Accurately defining as many envi-
than at time t. However, the digital twin should be the ronmental factors as possible is a trust consideration.
same at times t and t + 1 unless it updates dynamically
with feeds from the physical object. Having access to MANUFACTURING DEFECTS
an accurate time stamp for the physical object and Digital twin technology has an interesting relation-
digital twin is a trust consideration. ship to mass production. A digital twin may be used to
guide a manufacturing process. For example, a factory
ENVIRONMENT that produces light bulbs will have a certain defect
Digital twin technology has an implied or explicit envi- rate per thousand bulbs. Not all bulbs produced will
ronmental component that cannot be overlooked. For be usable, and for those that are usable, there will still
physical objects, a description of the environmental be small (possibly microscopic) distinctions between

www.computer.org/computingedge 33
SOFTWARE ENGINEERING

individual bulbs. These small distinctions may impact components (real-world entities), and each compo-
the lifetime of a specific bulb. The packaging on a nent has a corresponding digital twin definition. Physi-
set of light bulbs will offer an approximation for how cally connecting the five components may be straight-
long a bulb will operate before burnout. This facet forward, but composing the five digital twins may not
highlights the idea that a digital twin could not only be, particularly if the digital twins contain information
describe the underlying components of an average such as tolerances and expected operational usages.
bulb but also suggest how it should be manufactured Standards should be useful to prune extraneous infor-
if the representation also details a metric, such as mation contained in a digital twin since standards can
time to burnout. Ensuring that a manufacturing pro- define required interconnects between components
cess produces a product with the correct life expec- of a domain, enabling the composition to be modeled
tancy based on the information in a digital twin is a and tested. One approach might be separating classes
trust consideration. of information into categories, such as “essential,”
“need to know,” or “extraneous.”
FUNCTIONAL EQUIVALENCE
Digital twin technology requires a means to determine INSTRUMENTATION
functional equivalence between the digital twin and AND MONITORING
the physical object. Without this function, trust is sus- Instrumentation of a digital twin (the ability to provide
pect. If the digital twin is an executable specification, dashboard information during operations) is a bene-
ficial and unique advantage that digital twin technol-
ogy offers. While one might not be able to instrument
DOES THE INSERTION OF VIRTUAL the physical object, one may be able to instrument the
PROBES IN THE DIGITAL TWIN MIMIC digital twin. However, it is not as simple to correctly
THE BEHAVIOR OF THE PROBES IN inject instrumentation and probes into a digital twin
THE REAL SYSTEM? as might be expected; much can be learned here from
the safety-critical software community. First, a deter-
mination of where to inject the probes is necessary.5
then for the inputs that are presented, it should pro- This is not often easy, and it can be more art than sci-
duce the same outputs that the physical object pro- ence. Second, how many probes to inject is also a con-
duces for the same input data. If this does not occur, sideration. As shown in real-time systems, probes can
then functional equivalence has not been achieved. slow down performance and timing. This may cause
This situation could occur for many reasons, such as a problem for synchronization between the digital
decay and fatigue, manufacturing variances, or other twin and physical object. That said, there are ways to
environmental influences that the physical object reduce this impact by having the probes only collect
experiences during operation but the digital twin does raw data and not compute internal test results, such
not. Without some assessment of the level of func- as built-in self-tests. Collecting the “right” information
tional equivalence, it is difficult to assert trustworthi- from the internal state of an executing digital twin is
ness. (Verification and validation can be used to pro- an expensive and error-prone effort. Finally, the inser-
vide evidence of functional equivalence.) tion of probes in real systems can sometimes alter the
system performance in subtle ways that might not be
COMPOSABILITY reflected in the twin.6 But does the insertion of virtual
AND COMPLEXITY probes in the digital twin mimic the behavior of the
There is a trust consideration regarding the size and probes in the real system? I don’t think so.
complexity of the digital twin for its physical object.
A digital twin that is too complicated can introduce a HETEROGENEITY OF STANDARDS
composability problem in terms of predicting the trust- The heterogeneity of different formats for digital
worthiness of a final composed system from more than twins may cause composability problems.7 If ven-
one digital twin. Assume that a system has five physical dors misuse standardized formats for the digital twin

34 ComputingEdge June 2023


SOFTWARE ENGINEERING

definitions of their components, composing digital independent implementation is run in parallel, and the
twin definitions from different component vendors outputs from each implementation are sent to a voter,
may not be achievable.8 This is a consideration for which then decides on the final output that the sys-
trusting composed digital twins. tem receives.

NONFUNCTIONAL REQUIREMENTS TESTING


A trust consideration for systems composed of many The testability of a digital twin refers to measuring how
components deals with quality attributes often likely an error or defect will be detected during test-
referred to as “ilities.” This also applies to digital twin ing. Systems that are less likely to reveal the presence
technology. Functional requirements state what a of defects are deemed less testable. Physical objects
system shall do, negative requirements state what a are testable to different degrees using this definition,
system shall not do, and nonfunctional requirements though the methods for testing digital twins that are
(the “ilities”) typically state what level of quality the most likely to demonstrate that the digital representa-
system shall exhibit for both the functional and nega- tion is correct are unclear. One option is to ignore this
tive requirements. “ilities” apply to both “things” and trust consideration and decide that a digital twin is
the systems they are built into. It is unclear how many untestable and, therefore, stands alone as the “oracle”
“ilities” there are, though examples include availabil- or “gold standard.” Moreover, although testing usually
ity, composability, compatibility, dependability, dis- involves expected use cases, consideration should
coverability, durability, fault tolerance, flexibility, also be given for cases of misuse.
interoperability, insurability, liability, maintainability,
observability, privacy, performance, portability, pre- CERTIFICATION
dictability, probability of failure, readability, reliabil- Certification usually occurs in two different ways.10
ity, resilience, reachability, safety, scalability, cyberse- One type certifies the process used to develop, while
curity, sustainability, testability, traceability, usability, the other certifies the final artifact that comes from
visibility, and vulnerability.3 The issue for digital twin that process. These two types of certification are dis-
technology concerns how many of the nonfunctional tinct.1114 For digital twin technology, this means that
requirements can be written for the functional and one could attempt to certify how the digital twin was
negative requirements (thus defining the level of created or certify the accuracy of the digital twin itself.
quality for what the system should and should not Certification of a twin will be complicated. For exam-
do). The ability to write these nonfunctional require- ple, the pharmaceutical industry has illuminated the
ments will affect the ability to claim the trustworthi- problem of information overload. Most prescription
ness of a composite object. drugs come with warnings concerning who can take
them based on gender, age, underlying conditions,
DIGITAL TWIN ACCURACY negative drug interactions, and other factors. Most
If the accuracy of a digital twin is questionable, or drugs also come with disclaimers about negative side
even found to be faulty, then trust is an issue. For soft- effects and when to discontinue use. This information
ware, faulty specifications lead to faulty designs that is made available to patients, doctors, pharmacists,
lead to faulty implementations. In digital twin tech- and other medical providers.
nology, the degree to which the digital twin is cor- The problem stems from the vast amount of infor-
rect is a trust consideration. It begs the question as mation known about a drug and the vaster amount of
to whether it might be prudent to have more than one unknown information about a drug at time t that will
independently created digital twin for a specific phys- not be known until time t + 1. Further, much of the
ical object. In N-version programming,9 more than information is only understandable by medical experts
one independent software implementation is created but is vital to determine a drug’s fitness for purpose.
for highly critical systems that the software impacts The trust consideration here for digital twin technol-
because no single implementation can be assumed ogy is how much of this information can be provided in
to be adequately trustworthy. To address this, each a specific digital twin without overloading a user with

www.computer.org/computingedge 35
SOFTWARE ENGINEERING

extraneous information that leads to confusion about 3. J. Voas, “Software’s secret sauce: The ‘–ilities’
how to use the twin or what the twin even represents. [Software Quality],” IEEE Softw., vol. 21, no. 6, pp. 23,
2004, doi: 10.
PROPAGATION 1109/MS.2004.54.
One of the greatest trust concerns with any system 4. Standard Specification for Building Brick, ASTM C62
of systems is how errors and corrupt data propagate 17, 2017. [Online]. Available: https://www.astm.org
(cascade) during execution.15 Digital twin technol- /Standards/C62.htm
ogy experiences this trust consideration, particularly 5. J. M. Voas and K. W. Miller, “Putting assertions in
when different twins representing different physical their place,” in Proc. Int. Symp. Softw. Reliability Eng.,
objects are composed. This may, perhaps, suggest Monterey, CA, USA, 1994, pp 152157. doi: 10.1109/ISSRE
that a digital twin should be packaged with precon- .1994.341367.
ditions and postconditions to determine if the out- 6. P. Laplante, “Heisenberg uncertainty,” ACM SIGSOFT
put from one digital twin will be acceptable as input to Softw. Eng. Notes, vol. 15, no. 5, pp. 122, 1990, doi: 10
another digital twin. .1145/101328.101333.
7. J. M. Voas, “Networks of Things’,” Nat. Inst. Standards
COUNTERFEITING Technol., Gaithersburg, MD, USA, NIST Special Publica-
It is possible that a digital twin could be tampered tion (SP) 800-183, 2016.
with or counterfeited. There are schemes that could 8. J. M. Voas and P. Laplante, “Standards confusion and
be used to protect against this. Digital twin defini- harmonization,” Computer, vol. 40, no. 7, pp. 9496, 2007,
tions could be hashed and the hash posted to a pub- doi: 10.1109/MC.2007.252.
lic webpage; users of a digital twin definition could 9. L. Chen and A. Avizienis, “N-version programming:
hash their copy and compare it against the hash on the A fault-tolerance approach to reliability of software
public webpage. That said, webpages and other simi- operation,” in Proc. 8th Int. Symp. Fault-Tolerant
lar publicly accessible repositories can be hacked. To Comput., 1978, pp. 39.
enhance trust, one could use a blockchain and post a 10. J. Voas, “The software quality certification triangle,”
digital twin definition hash publicly in an immutable Crosstalk, vol. 11, no. 11, pp. 1214, 1998.
data structure (it could never be changed even by mali- 11. J. M. Voas and G. Hurlburt, “Third party software’s trust
cious attackers). In these ways modifications to digital quagmire,” Computer, vol. 48, no. 12, pp. 8087, 2015, doi:
twin definition files could be discovered. Alternatively, 10.1109/MC.2015.372.
identical copies of a digital twin definition (and related 12. J. Voas, “Toward a usage-based software certification
instances) could be stored in separate locations (for process,” Computer, vol. 33, no. 8, pp. 3237, 2000, doi:
example, in offline backups). 10.1109/2.863965.
13. J. Voas and P. Laplante, “The IoT blame game,”

I n summary, these 14 trust concerns apply to digital


twins, but really, to anything virtual. I recommend
you think about them in your domain and environment,
Computer, vol. 50, no. 6, pp. 6973, 2017, doi: 10.1109/
MC.2017.169.
14. J. Voas and P. Laplante, “IoT’s certification quagmire,”
especially as we enter the metaverse. Computer, vol. 51, no. 4, pp. 8689, 2018, doi: 10.1109/MC
.2018.2141036.
REFERENCES 15. J. Voas, “Error propagation analysis for COTS systems,”
1. “The definition of a digital twin,” Digital Twin Consor- IEEE Comput. Control Eng. J., vol. 8, no. 6, pp. 269227,
tium, 2020. https://www.digitaltwinconsortium.org 1997, doi: 10.1049/cce:19970607.
/hot-topics/the-definition-of-a-digital-twin.htm
2. J. Voas, P. Mell, and V. Piroumian, “Considerations
for digital twin technology and emerging standards,” PHIL LAPLANTE is a professor of software and systems engi-
Nat. Inst. Standards Technol., Gaithersburg, MD, USA, neering at The Pennsylvania State University, Malvern, Penn-
NISTIR 8356, 2021. [Online]. Available: https://csrc.nist sylvania, 19355, USA, a Fellow of IEEE, and an associate editor
.gov/publications/detail/nistir/8356/draft in chief of Computer. Contact him at plaplante@psu.edu.

36 ComputingEdge June 2023


IEEE Security & Privacy is a bimonthly magazine
communicating advances in security, privacy,
and dependability in a way that is useful to a
broad section of the professional community.

The magazine provides articles with both a


practical and research bent by the top thinkers in
the field of security and privacy, along with case
studies, surveys, tutorials, columns, and in-depth
interviews. Topics include:
• Internet, software, hardware, and systems security
• Legal and ethical issues and privacy concerns
• Privacy-enhancing technologies
• Data analytics for security and privacy
• Usable security
• Integrated security design methods
• Security of critical infrastructures
• Pedagogical and curricular issues in security education
• Security issues in wireless and mobile networks
• Real-world cryptography
• Emerging technologies, operational resilience,
and edge computing
• Cybercrime and forensics, and much more

www.computer.org/security

E-Currency and Fairness ■ Ransomware Defense ■ A National Cybersecurity Policy


IEEE SECURITY & PRIVACY

Software and Cybersecurity ■ Big Data: Privacy Versus Accessibility ■ Resiliency in Cloud Computing
AI ETHICS

Blockchain Technologies ■ The Fuzzing Revival ■ Cybersecurity for the Public Interest
IEEE SECURITY & PRIVACY

IEEE SECURITY & PRIVACY


DIGITAL FORENSICS, PART 2

PRIVACY AND AUTOMATED AIRPORT SCREENING


VOLUME 17

VOLUME 16
NUMBER 1
JANUARY/FEBRUARY 2019

NUMBER 3

January/February 2019 CYBERSECURITY AND


PRIVACY ISSUES IN BRAZIL
Vol. 17, No. 1
WWW.COMPUTER.ORG/SECURITY

VOLUME 17

November/December 2018
Vol. 16, No. 6
NUMBER 2
MAY/JUNE 2018

MARCH/APRIL 2019

Join the IEEE Computer Society May/June 2018


WWW.COMPUTER.ORG/SECURITY

Vol. 16, No. 3 March/April 2019


Vol. 17, No. 2
WWW.COMPUTER.ORG/SECURITY

for subscription discounts today!
www.computer.org/product/magazines/security-and-privacy
EDITOR IN CHIEF: Ipek Ozkaya, Carnegie Mellon Software Engineering Institute,
ipek.ozkaya@computer.org This article originally
appeared in

DEPARTMENT: FROM THE EDITOR


vol. 39, no. 2, 2022

Architectural Concerns of
Digital Twins
Ipek Ozkaya

S
ystems where software and hardware ele- needs that a digital twin enables.1 The concept of digi-
ments need to be designed, deployed, and sus- tal twins is more than an effective data collection and
tained in orchestration are no longer limited to analysis idea for manufacturing maintenance. Digital
manufacturing systems such as smart grids, autono- twins’ fundamental objective is to disrupt the cost of
mous vehicles, medical monitoring, industrial control, operations and maintenance. However, they also have
robotics, or avionics. In these systems, the boundar- the potential to influence cost-effective software
ies of software, hardware, and data become hard to development and maintenance strategies as well as
isolate and control. Digital twins provide a solution different software-based business models.
to managing smart manufacturing lifecycles in such Organizations that embrace digital twin-based
systems as well as their operation and maintenance. approaches often aim to enable both reactive and
While manufacturing systems pose key software proactive data collection strategies. Digital twins not
maintenance and evolution challenges due to their only assist with operations and maintenance but also
scale, complexity, and safety criticality, embedded give organizations an opportunity to monetize their
and cyberphysical systems increasingly dominate and their partners’ data as well as services developed
the technologies we use on a daily basis, ranging to monitor different system components. Taking
from home appliances to personal health and enter- advantage of the new data and service economy
tainment. Digital twins can assist managing and expands the scope of digital twins from improving the
monitoring maintenance and evolution lifecycles maintenance and operation of a single cyberphysical
with a data-driven approach in these systems as well. component, e.g., an aircraft engine, to a broader focus,
Developing digital twins lies at the intersection of e.g., an entire plane and the operation optimization
model-driven software engineering, data manage- of fleets. With such an expanded scope, the need to
ment, and the ability to scale analysis, including using develop twins of twins is not uncommon. All these
artificial intelligence-based techniques. This article scenarios are driven by the goal of collecting as much
summarizes architectural concerns to consider when relevant data as possible to drive timely decision
developing digital twin-enabled systems. making. The ability to take advantage of digital twins
A digital twin is a virtual representation that serves requires designing them with these several scoping
as the real-time counterpart of a physical object, pro- goals in mind. The data architecture, the design of the
cess, or component. The concept originates from work data collecting and servicing infrastructure, and the
in product lifecycle management in the early 2000s digital model of the asset are all part of the scope.
but found increasing implementations as businesses
recognized the cost savings and timely response to ARCHITECTURALLY SIGNIFICANT
REQUIREMENTS FOR
DIGITAL TWINS
Digital Object Identifier 10.1109/MS.2021.3130872 Designing systems that meet quality, business, and
Date of current version: 14 February 2022 long-term sustainability goals is a stakeholder-focused

38 June 2023 Published by the IEEE Computer Society  2469-7087/23 © 2023 IEEE
FROM THE EDITOR

activity. Architecturally significant requirements are to information-related services and operational con-
elicited in light of stakeholder and business goals. In cerns. In particular, architectural decisions related to
addition to typical stakeholders, such as users, main- latency, shared resources, storage, versioning, and
tainers, development teams, and customers, digital logging will significantly impact data consistency.
twin systems’ stakeholders include data scientists Evolution- and maintenance-related quality relies
and business domain analysts. In addition, twin build- on accounting for the evolution of the asset that
ers or twin implementers may need to be considered the digital twin represents as well as the evolution
as stakeholders. Data scientists and business ana- of the technologies that the digital twin architec-
lysts create their own analysis steps by using digital ture relies on. Legacy integrability and reusability,
twin platforms and application programming inter- configurability, and platform alignment- and digital
faces, accessing data and other analytics capabilities. twin evolution-related considerations drive differ-
Some may also take on the special role of twin builder, ent classes of architectural decisions. In particular,
those who create digital twins from existing digital evolvability is often a higher-priority quality concern in
models and analytics. digital twin-enabled systems due to the rapid pace of
Architecturally significant concerns can be change in underlying technologies as well as data.
grouped into three areas: data, operation, and evolu-
tion and maintenance. These apply whether the digital QUESTIONS TO DRIVE DIGITAL
twin is for a physical element, software component, TWIN DESIGN DECISIONS
business process, or service. Eliciting and expressing Software design decisions for digital twins operate at
these concerns as quality attribute scenarios2 will two related but distinct levels. The first is the architec-
assist software engineering teams to assess tech- ture of the digital twin, in essence, the choices that are
nologies they need to take into account and their risks involved in deciding how to model the asset. The sec-
when designing systems that incorporate digital twins. ond level concerns decisions related to incorporating
Data-driven quality concerns for digital twins the digital twin into the system, particularly as it oper-
include scalability, consistency across an asset or ates and as maintenance and evolution choices are
process lifecycle, accessibility, the usability of analyt- made based on collected data.
ics, and security and privacy. There are other critical Model-based engineering techniques drive digital
attributes related to data, including quality, ownership twin design, whether the twin represents a physical,
and intellectual property, versioning, and lifecycles digital, or process asset. Domain expertise is essential
(such as how long to keep information). Not all these to making dependency and modeling decisions related
characteristics can be controlled with architectural to different asset elements. Established architectural
strategies. However, being aware of these properties tactics, such as localizing change, support ease of
and concerns informs architects about other potential evolution of the asset model. A number of generaliz-
constraints to consider when selecting technologies able design concerns can assist architects with mak-
and design approaches. ing correct technical as well as design element deci-
Operational quality is related to how the digital sions. Regardless of the domain and context of the
twin functions as well as when and how data analysis digital twin, addressing what concrete architecture
is conducted. Performance, availability, security, and choices are made to answer key design questions can
scalability concerns apply, especially as operational help teams get on the same page quickly. Examples of
data are collected and while the system operates. Dif- these questions include the following:
ferent quality response measures may apply to the twin
versus the asset in operation. Real-time data collec- › How does the digital twin ensure the availability
tion and servicing, which may be used to orchestrate of all the moving parts at run time as well as the
scenarios such as real-time repair and availability, call data when needed?
for stringent design strategies, as opposed to systems › How does the digital twin deal with versioning,
where the same data are used for business analytics including the versioning of data?
after the fact. Data consistency is critical and applies › How is provenance of collected data handled?

www.computer.org/computingedge 39
FROM THE EDITOR

› What are the atomic units where likely rely on digital twins to optimize quality, opera-
architecture-level scalability applies: to a single tional effectiveness, and cost of system evolution. Vir-
digital twin and its operations, many digital tualization enabled by digital twins empowers orga-
twins of the same kind and their operations, and nizations to ask about the cost of maintenance and
digital twins of twins and their operation? operations and change questions in a timelier man-
› How are communications between the digital ner. Such analytics also inform improved design deci-
twin model, asset, and business analytics sions. Architectural concerns span multiple levels,
handled? How are concerns, such as message including the creation of digital twins, understanding
caching, network routing, parallel operations, how twins of twins need to be designed and behave,
and the decoupling of runtime services, platforms that host data collected from operations,
designed to keep the digital twin in service? and systems that incorporate digital twins. Address-
› How will the correctness and consistency of ing architectural concerns at these multiple levels will
the digital twin models and collected data be both improve the likely success of digital-twin enabled
ensured? What architecture strategies are used systems and also accelerate their successful applica-
to guarantee reliability and assure that the tion to different business areas.
analysis results depend on the intended data?
› How are key security and privacy attributes REFERENCES
assured? Are these attributes assumed to be 1. M. Grieves, Product Lifecycle Management: Driving
provided by the cloud platforms and data analyt- the Next Generation of Lean Thinking. New York,
ics software frameworks that digital twins often McGraw-Hill, 2006.
rely on? What assumptions are made? What 2. L. Bass, P. Clements, and R. Kazman, Software
additional architectural strategies are needed to Architecture in Practice, 4th ed. Reading, MA, USA:
enforce security and privacy? Addison-Wesley, 2021.

Capabilities enabled by more and timely data also


imply amultiple-ownership context. Different entities
and software platforms may be responsible for data,

Cutting Edge
models that contribute to the digital twin architec-
ture, digital twin development, system development,
stay
and maintenance and operations. An underestimated
but critical cross-cutting architectural concern then
on the

of Artificial Intelligence
arises around ownership: the party responsible for
end-to-end quality needs to be clearly defined for
the successful development and operations of digital
twin-enabled systems. J a n ua ry/ f E b r ua ry 2 016

IEEE Intelligent Systems provides peer-


IEEE

Also in this issue:


aI’s 10 to Watch 56
real-Time Taxi Dispatching 68
IEEE
January/FEBruary 2016

from flu Trends to Cybersecurity 84

SOFTWARE ENABLES
P U T T I N G A I I N T O P R A C T I C E

reviewed, cutting-edge articles on the


DIGITAL TWINS theory and applications of systems
Online BehAviOrAl AnAlysis

A number of model-based engineering software sys- that perceive, reason, learn, and
tems, such as Ansys and Microstation, include digi-
act intelligently.
VOLuME 31

tal twin builder functions as well as underlying physi-


nuMBEr 1

www.computer.org/intelligent

IS-31-01-C1 Cover-1 January 11, 2016 6:06 PM

cal models for common asset types, such as circuits,


sensors, and engines, and the ability to develop cus-
tomized analytics on top of them. Such systems ease
the initial entry for conceptualizing digital twins. As
The #1 AI Magazine
www.computer.org/intelligent
IEEE

the boundaries between system software, hardware,


and data elements get fuzzier, more organizations will

40 ComputingEdge June 2023


Get Published in the New IEEE Open
Journal of the Computer Society

Submit a paper to the new


IEEE Open Journal of the
Computer Society covering
computing and informational
technology.

Your research will benefit from


the IEEE marketing launch and 5
million unique monthly users of
the IEEE Xplore® Digital Library.
Plus, this journal is fully open
and compliant with funder
mandates, including Plan S.

Submit your paper today!


Visit www.computer.org/oj to learn more.
DEPARTMENT
EDITOR: EDITOR:
Alexander Alexander
Magoun, Magoun, a.b.magoun@ieee.org
a.b.magoun@ieee.org
This article originally
appeared in
DEPARTMENT:
ANECDOTE ANECDOTE
vol. 44, no. 3, 2022

“Well Paid for a Woman”:


“Well Paid for a Woman”: Gloria Hardman’s
Gloria Hardman’s 50-Year Career
50-Year Career in Computing
in Computing
Philip Nel , Kansas State University, Manhattan, KS, 66506, USA
Philip Nel , Kansas State University, Manhattan, KS, 66506, USA

In 1964, Gloria Nel (ne


e Webb) arrived in England and began her 50-year career in
computing at IBM in London (1964-1966). She continued as a programmer at the
InLondon
1964, Gloria
Press Nel (née Webb)
Exchange arrived and
(1966–1968), in England
then inand began
the U.S. at her
MIT50-year career in computing
(1968–1969),
at IBM in London (1964-1966). She continued as a programmer at the London Press Exchange
followed by time as a self-employed educator (1979–1982), at Shore Country Day
(1966–1968), and then in the U.S. at MIT (1968–1969), followed by time as a self-employed
School (1982–1984), Choate Rosemary Hall (1984–1989), IBM in Milford Connecticut
educator (1979–1982), at Shore Country Day School (1982–1984), Choate Rosemary Hall
(1989–1993), and Yale University (1994–2014). Her life in computing started in the era
(1984–1989), IBM in Milford Connecticut (1989–1993), and Yale University (1994–2014). Her
of punch cards and ended in the era of smart phones.
life in computing started in the era of punch cards and ended in the era of smart phones.

“W
ho would want to read this?” When did), they persuaded her mother to enroll her in Peter
encouraged to write her memoirs, Glo- Pan, a tiny private school in the Durban neighborhood
ria Hardman often asked that ques- where they lived. She was so adept that, after a little
tion. I told her that lots of people would: she was a over two years of school, Gloria was already two
pioneer in the fields of computing and computing edu- grades ahead of her age [1], [3].
cation. When she brushed off that reason, I said that When her arithmetic teacher taught “rules for dis-
her two children—I and my sister Linda—would. So covering which numbers were divisible by, for exam-
would her granddaughter Emily. In the 2000s and the ple, 2, 3, 4, 5,” Gloria spent her walk home from school
early 2010s, Gloria wrote about her life. This account looking at license plate numbers and working out
derives from those memoirs, and is augmented by her what they were divisible by. “I doubt that any of the
letters and emails, interviews with and emails from other girls in the class found this fascinating. It seems
people who knew her, other items in our family’s that an interest in numbers may be genetic and I was
archive, and my own memories. just lucky that numbers appealed to me” [3].
Gloria’s career in computing began with an inter- Though South African society did not value girls’
view at IBM’s London office in September of 1964. education as highly as boys’, her brother Terry noticed
Newly arrived to the country and to the field of com- that his sister was bright and inquisitive. Her parents
puters, she was unsure what to expect. A 22-year-old would have been happy for Gloria to take “domestic
graduate of Natal University in Durban, the former science,” but Terry insisted that she enroll in serious
Gloria Webb had taught high school math for two academic courses, including Latin and math.
years in South Africa. Graduating at the top of her class, Gloria was Dux
Born in Pretoria in 1941, Gloria’s attraction to num- (the equivalent of valedictorian in the U.S.) of Durban
bers began in childhood. “When I was a small child I Girls High School. As a student, she so loved mathe-
remember my brothers and my father teaching me matics that she tutored classmates. “I loved to explain
card games—solitaire, simplified Bridge (auction), and it to others and would spend time tutoring my friends
rummy. The cards and their symbols attracted me.” and others in the class. Teaching was such fun and I
When her cousins observed that four-year-old Gloria knew I wanted to be a math teacher.” Gloria “was sure
wanted to attend school (as her two older brothers that if I taught math properly every girl in my class
would find it interesting and be successful” [3].
At the age of 16, Gloria enrolled in the University of
Natal at Durban, pursuing degrees in math and
English. For the first time, she was not in a girls-only
1058-6180  2022 IEEE
Digital Object Identifier 10.1109/MAHC.2022.3193854 school. “The ratio of girls to boys at was about 1 to 5
Date of current version 27 August 2022. which was quite a culture shock to someone who had

4280
June 2023
IEEE Published by Published
Annals of the History of Computing the IEEE Computer Society
by the IEEE 
Computer Society 2469-7087/23 © 2023
July-September 2022IEEE
ANECDOTE
ANECDOTE

FIGURE 1. Gloria Nel in the spring of 1966 poses in London at what was probably the completion of an IBM PL1 class with her stu-
dents from local IBM offices and IBM's clients. Left to right: Frank Johnston (from one of Great Britain’s largest privately owned
firms), Graham Manson (later finance director for IBM Norway), Nicholas Blacklock (IBM's Computer Services Centre in London),
Mike Allen (Information Services, Beecham Pharmaceuticals), Nick Bark (back; ITT Data Services, whose Data Centre opened in
London that September), Gloria Nel (front), Roger Prosser, Bill Clark (data systems at Clark Johnston Whitehead Ltd.), Guy
Parker (later managing director, Bellard Investments), George Sutton, George Smith. Courtesy of the author.

attended girls-only schools.” Her first-year math class 19-year-old Gloria became the sole female student
had about a hundred students, but only “perhaps 5 remaining. The work was getting harder, and more
girls in total and the others arrived early and sat philosophical, “like proving there were more irrational
together in the front row. I was coming from my than rational numbers.” Gloria worried that she would
English class some distance away and would arrive be the next to fail [3].
just minutes before the class began.” Each day as she Her professor was not much help. His style of
stepped into the large, tiered lecture hall, the boys teaching was to write on the board at high speed, say
greeted Gloria with “some foot stomping, whistles and “it is intuitively obvious that. . .” and then write the next
calls to ‘sit here – there’s room for you.’” The experi- line of a proof without further explanation. On the rec-
ence was “more than a little intimidating and today it ommendation of a classmate, Gloria went to tutorials
would be classified as harassment but back then run by a younger professor, Siegfried Gra €sser [3].
(1957) that was just the way it was” [3]. Prof. Gra€sser taught Gloria how to study. He told her
She persisted. By the final year of her degree, the she should “get a large pad of scratch paper and prac-
increasing challenge shrunk the math class to 12, tice writing all the proofs until they were embedded in
with just two girls. When the other girl failed an exam, my brain.” She must spend six hours a day studying

www.computer.org/computingedge
July-September 2022 IEEE Annals of the History of Computing 8143
ANECDOTE
ANECDOTE

math, he said. She followed his advice. Each day for a To prepare her to teach the corporation’s salesmen
month, Gloria rose at 5 a.m., worked on math for two and customers, IBM enrolled Gloria in a six-month training
hours, took a break by reading English, and then program. She was the youngest person and sole woman
returned to math. At the end of the term, Gloria aced in a class of 24, and one of only two students learning to
the exam, receiving the highest mark in the class [3]. be instructors. The others would become systems engi-
For the next two years, Gloria taught math—one neers and salesmen. It was a “trial by fire.” They began by
year at Pietermaritzburg Girls High School, and the next learning about machines that used punch cards: key-
back at Durban Girls High. Gloria at first “enjoyed the punch machines, verifiers, sorters, and calculators. That
challenge of trying to get the nonmath girls at least to was but a warmup to the very latest in tabulation technol-
feel that they could do it.” However, she soon concluded ogy: the 421 accounting machine, a calculator larger than
“that the damage had been done in elementary school a contemporary washer-dryer. For each new task, one had
and that it is really hard to turn around the perception to rewire its control panel. The 421 would then read
that ‘I’ll never get it.’” She also missed the coeducational instructions from a stack of 80-column punch cards [4].
environment and social life of her university days [3]. After two months of course work, IBM sent Gloria
In September 1963, Gloria needed a date to the Dur- out into the field with an experienced salesman.
ban Girls High dance—which included some younger Together, they “had to figure out how to sell these
teachers. A friend set her up with Pierre Nel. After that behemoths and would have to create sales plans to
night, they began dating. A few months later, when Pierre solve the accounting or inventory control problems in
shared his ambition of going to England for his Ph.D. in a factory or business.” She felt “horribly out of my
chemistry, Gloria said that was fine, but she would not depth—I had no business experience and did not
continue dating him exclusively while awaiting his return. know an invoice from a hole in the wall” [4].
In response to Gloria’s nonexclusive clause, Pierre pro- Gloria persevered, learned, and then returned to
posed in December—just three months after they had IBM’s classrooms for two more months, where she began
met. They married in July 1964 [4]. learning programming languages: Assembler, Fortran,
In August, she and Pierre arrived in the U.K. so that Cobol, and RPG. She learned to write code for the punch
he could pursue his Ph.D. at Imperial College London. cards. This meant that, first, she wrote all the code on
They found a small basement flat with a rent of £8 per paper. Next, she keypunched the code into the card.
week. At 56 Penywern Road, they had a bedroom, Then, she gave the cards to the operator, who loaded
small dining room, tiny kitchen, and a bathroom. But them, ran the program, and gave her a printout with all
no hot water, nor any heat. To get those, they put the error messages. Gloria then corrected her code, and
money into a meter that “swallowed it faster than you repeated the entire process until the program performed
can imagine.” As Gloria recalled, “Landlords in London as intended [4].
made extra money that way—they paid the electric After Gloria completed the six-month training pro-
bill and had the key to your meter so they could set gram, IBM sent her into its classrooms, teaching cus-
the rates somewhat higher than they paid” [4]. tomers who had come down to London for one or two
Pierre had a British Council Scholarship, but Gloria weeks of training—the cost of which was underwritten
would need to be the primary breadwinner. Thinking by IBM. “Fortunately my ‘students’ were all very polite,
that computing might pay better than teaching, she kind Brits who did not shoot holes in my teaching or ask
scheduled an interview at IBM at 101 Wigmore Street really embarrassing questions that I could not answer.”
in Marylebone [4]. When asked a difficult question, Gloria used her tea
When she arrived, “they put me in a little office break to find the answer. She would dash to the instruc-
with their aptitude test . . .. It was great fun—just up tors’ lounge and find a knowledgeable man who would
my street.” They graded the test—which had arith- tell her what she needed to know. “It was a steep learn-
metic, logic, and algebra sections—while she waited. ing curve, but I was young, I needed the job and I sur-
Gloria aced it. They interviewed her, and set up vived by studying at night for the next day’s class” [4].
another interview at their Education Department on She also began putting what she had learned into
Lodge Road. There, “they asked whether I was plan- practice. As Gloria watched Pierre process complex cal-
ning to have a baby and then quit. I managed to culations for his own research, she realized “we could
convince them that was not part of the game plan.” write a program to automate this.” Assisted by her IBM
Her starting salary was £1000 per year—far “better colleagues, she wrote a program that Pierre then put on
than I would have got as a teacher. And as a punch cards and ran on the Imperial College computer.
teacher in a tough East End school I would probably It worked! for Gloria, programming was no longer a theo-
not have survived!” [4]. retical endeavor. She could actually do it [4].

4482
ComputingEdge
IEEE Annals of the History of Computing June
July-September 2023
2022
ANECDOTE
ANECDOTE

Soon Gloria was teaching customers how to use computers, and education were never far away. We
the brand-new IBM System/360 computers, which the were the only family in our neighborhood that used com-
corporation began shipping to customers in the spring puter punch cards as scrap paper. When she learned
of 1965. With a faster programming language, PL1, that about Cuisenaire Rods (colored blocks designed to
ran on earlier machines and peripherals compatible teach mathematical ideas), she bought a set and used
with third-party manufacturers, the 360 series domi- them with her children. These blocks are the reason I
nated the market by the late 1960s. But in 1965, they still think of numbers spatially.
were so new that salespeople had not yet had the Exercise led her back to the classroom. In 1974,
chance to test them. Gloria found herself telling a class Gloria read Mildred Cooper’s Aerobics for Women,
what the 360 would do, only to be interrupted by one which advocated regular exercise that raises the heart
student whose company had already installed one: rate to 130. A year later, with both children in school,
“Well, it didn’t work like that on the one we have!” [4]. she started taking and then teaching Jacki Sorenson’s
In May 1966, after about 20 months with IBM, Glo- Aerobic Dancing. In 1978, Gloria began working with
ria learned from conversations in the staff room that Math Learning Inc., and developed and taught courses
her male colleagues were being paid a lot more—even to help people of all ages overcome math anxiety [7].
men who started when she did and were doing exactly In 1979, the family acquired a Radio Shack TRS-80
the same job. She thought that “since I am the primary computer. Gloria began giving workshops at home on
breadwinner in our little family I should be paid at the how to use personal computers. Within a year, she was
same rate as the male breadwinners.” So, she plucked teaching Lynnfield Massachusetts school teachers
up her courage, and went to the office of her manager, and courses on programming in BASIC (Beginners’ All-
Mr. Cooper. She explained the situation, and asked purpose Symbolic Instruction Code) in the town’s adult
politely for a raise. Cooper responded, “You’re being education program. In 1982, Pierre took early retire-
well paid for a woman” [4]. ment from Polaroid and set himself up as a computer
As Gloria left his office, she thought to herself: with my salesman and consultant. Since that was not particu-
IBM training, I could get a raise by getting a better job. larly lucrative, the family needed a new breadwinner.
Looking through the newspaper ads, she saw a better-pay-
ing job programming in assembler language on IBM’s Sys-
tem/360 for the London Press Exchange, a market-
THOUGH SHE NEVER FORGOT THE
research firm. The company hired her, and she quit IBM [5].
DISCRIMINATION SHE FACED THERE,
Though she never forgot the discrimination she
faced there, the years at IBM also launched her career
THE YEARS AT IBM ALSO LAUNCHED
as a computer educator. But it would take a decade for HER CAREER AS A COMPUTER
her to return to teaching people how to use computers. EDUCATOR.
Pierre defended his Ph.D. in August of 1967. He got a
job at Carter’s Ink in the United States. While waiting for
their U.S. visas, Pierre and Gloria returned to South Africa. In meeting this necessity, Gloria transformed her
In the spring of 1968, they flew to Boston, Massachusetts. life and the family’s. For the next 32 years, Gloria
Gloria got a programming job at MIT’s Office of Insti- devoted her professional life to teaching people how to
tutional Studies. In December 1968, when she was use computers. In 1982, she designed the classroom,
nearly six months pregnant, Carter’s Ink fired Pierre. He selected the equipment and planned the computer
thought the company insufficiently innovative, and curriculum at Shore Country Day School in Beverly
voiced frustration that his research project was taking Massachusetts, where she would teach for two years.
so long to be approved. Though his tendency for blunt Under her direction, the school installed about 15 Apple
criticism likely cost him his job, by early 1969, Pierre had computers—likely the Apple II Plus—in a classroom on
a new job in the research division of Polaroid, and joined the second floor of the main upper-school building. In
the team that designed the battery for Polaroid’s SX- 1983, those were joined by some Franklin Ace 1200
70—the iconic camera that instantly ejected pictures computers—the lower-priced, short-lived clone of the
which developed as you watched. Meanwhile, Gloria Apple II. She taught the students BASIC, including the
went from a full-time MIT employee to working part- “IF. . . THEN. . .” routine, simple graphics and animation,
time from home. At the end of March she had her first the random number generator, and how to debug one’s
child—me. Two years later, she had her second—Linda. program via TRON (Trace On).
Though she was primarily a stay-at-home mom from Gloria described the experience as “tremendously
mid-1969 until 1976, Gloria’s interests in mathematics, challenging and enjoyable.” It was “a teacher’s

www.computer.org/computingedge
July-September 2022 IEEE Annals of the History of Computing 8345
ANECDOTE
ANECDOTE

dream—the students are lined up outside the com-


puter room in the morning, eager to get in, and they
are working productively on programming in BASIC. It
is easily the most popular course in the school and I
have ideal conditions, with one student to a computer
in most of my classes.”1
In addition to Gloria’s expertise, her students
remember her patience, her supportiveness, and her
gently irreverent sense of humor. Steve Sloan (Shore
’84) recalled, “because we all started with different levels
of exposure to computers,” Gloria “supported us 1:1 from
wherever we were starting.”2 Alex Rigopulos (also Shore
’84) became a successful game designer, co-founding
Harmonix Music Systems, the company that developed
both the Guitar Hero and Rock Band series of video
games. He calls Gloria’s classes “the most energizing
and inspirational classes in my 3 years at Shore,” credit-
ing them with “changing the trajectory of my life,” and
adding “that there’s pretty much a direct line from [her]
classes to my career making music games.”3
Though a private school paid a lower salary than a
public school, Gloria was in one respect now well paid
and not just for a woman. Since faculty children could
attend Shore tuition-free, her work gave my sister and
me access to a first-rate education.
When I was to graduate from ninth grade, Gloria
found a new job that would allow both of us to continue FIGURE 2. Gloria helping a student in Choate Rosemary
our private secondary education. For five years (1984- Hall's Academic Computer Center, 1987. Photo from
1989), she directed Computer Education at Choate Course Catalog: Choate Rosemary Hall 1987-1989. Photo-
Rosemary Hall in Wallingford, Connecticut. Rare among graph courtesy of the Choate Rosemary Hall School
private schools at the time, Choate in 1984 had a super-
Archives, Wallingford, CT.
minicomputer—a DEC VAX 11/750, running Unix.
Roughly the size of a refrigerator, it sat behind a glass
window, in a climate-controlled room, and was con- field of computing.” His computer science instructors
nected to a series of terminals in a larger classroom. at his high and middle schools had “all been men.”5
Though few used it, every Choate student had an In taking over computer education at Choate,
account, via which they could send email—via Yale— Gloria inherited an unusual managerial structure:
anywhere in the world, if they specified exactly how they members of the almost entirely male Choate Com-
wanted it routed. As Jan Miksovsky (Choate ’86) recalls, puter Club were the system administrators. On the
to send a message to somebody at Stanford, he would one hand, as Jan observed, “it’s not a universal good”
“send it to Yale, and then to this other hub and then to to put teenage boys “in charge of anything.”6 Gloria
Stanford, and then to their final email address.”4 maintained order by reminding them of their responsi-
Jan is one of Gloria’s students who realized in ret- bility and intervening as needed. On the other hand,
rospect how unusual it was to have a woman teaching as Gloria said at the time, managing a computer
computer science. As he recalled, “she was the first system “provides an opportunity for students to be
woman that I knew who was sort of a leader in the unrestricted without a bureaucratic system hanging
above them. They have independence” [6].
When they devised independent projects, Gloria
1
G. Nel and P. Nel, letter to Phil Penney, 29 December 1982.
supervised and evaluated their work. In one of them,
2
S. Sloan, “Re: Research question about Gloria Nel at Shore,”
email to author, 12 June 2022.
3
A. Rigopulos, “Re: Research question about Gloria Nel at
5
Shore,” email to author, 11 June 2022. Miksovsky, Zoom interview.
4 6
J. Miksovsky, Zoom interview with author, 13 June 2022. Miksovsky, Zoom interview.

4684
ComputingEdge
IEEE Annals of the History of Computing June
July-September 2023
2022
ANECDOTE
ANECDOTE

FIGURE 3. Gloria Hardman, “Hello, World!” Editor's Comments, inaugural issue of IBM's AIXpert, Winter 1991. Reprint Courtesy of
IBM Corporation © 1991.

www.computer.org/computingedge
July-September 2022 IEEE Annals of the History of Computing 8547
ANECDOTE
ANECDOTE

Jan wrote an interpreter for the programming lan- Assistant Dean Risa Sodi recalled that “It was a com-
guage Karel, allowing it to run on Unix. He shared it on fort” to know that Gloria “was the real, live person
Usenet and, soon, Jan’s compiler was being used by behind the Classesv2 help button.” Gloria wrote
people at AT&T, Digital Equipment Corporation, and in much of the documentation and balanced the inter-
courses at Stanford University. The education at and ests of IT management and the faculty. On the one
internships attained via Choate served as “an impor- hand, she supported Sakai and the people using it. On
tant foundation for [his] career.” Jan spent 15 years at the other, to improve the system, she brought their cri-
Microsoft before leaving to co-found two compa- tiques back to management, and helped people use v2
nies—Cozi and Component Kitchen.7 in ways not anticipated by its designers [8].
In July of 1989, Gloria—now Gloria Hardman— The onset of posterior cortical atrophy, a variant of
returned to IBM, but this time at the company’s offices Alzheimer’s, began impeding Gloria’s ability to read
in Milford, Connecticut. She became a project admin- certain typefaces. She devised workarounds, such as
istrator in the AIX Programs Department. In the winter changing or enlarging the font. But PCA erodes the
of 1991, she launched and edited the company’s AIX- brain’s capacity to interpret what the eyes see, and
pert Journal. As she wrote in its inaugural issue, the Gloria soon realized she would need to retire. As she
publication’s goal was to provide software developers said then, “I don’t want to stay on past my sell-by
and others “with timely, relevant information that will date.” In the fall of 2014, she moved to The Commons
optimize your AIX development work.” [2] in Lincoln, Massachusetts.
In 1993, when IBM wanted her to relocate to Texas, Though Alzheimer’s has mostly silenced Gloria,
Gloria left the company. The next year, Phil Long hired when I told her that I was writing about her role in the
her to work in Yale University’s Instructional Technol- history of computing, she opened her eyes and man-
ogy Department, where she remained until she retired aged to utter a single legible word: “Good.”
in 2014.
For her first decade at Yale, Gloria supported
ACKNOWLEDGMENTS
Classesv1, helping faculty and graduate students with
For answering my queries, sincere thanks to Jenn
their technological needs, including (in the mid-1990s)
Borggaard, Ann Cahill, Brian Donlon, David Hirsch, Trip
introducing many of them to email. She not only
Kirkpatrick, Jan Miksovsky, Linda Nel, Alina Nevins,
answered emails and phone calls, but went to their offi-
Paul Parry, Ba Penney, Chris Penney, Jeff Pettiross,
ces and classrooms. When conservative icon William F.
Matt Plum, Matt Regan, Josh Rose, Stephen Sloan,
Buckley returned to Yale to teach writing in the late
Peter Snow, Risa Sodi, Jill Speed, and Terry Wong. For
1990s, he insisted on using WordStar—a mid-1980s
additional guidance, thanks to Annals editors Alexan-
word processing program that had to be adapted to
der Magoun and David Hemmendinger.
current computing systems. Gloria ensured that he
could use WordStar, and he “was extremely consider-
ate and courteous to his ‘computer geek assistant’ and BIBLIOGRAPHY
sent me autographed copies of his books for several [1] G. Hardman, “Gloria’s memories,” unpublished
years after he taught at Yale.”8 manuscript, 2003 and 2013.
In March 2005, Yale’s Academic Technology Direc- [2] G. Hardman, “Hello, world!,” AIXpert, Winter 1991, p. 3.
tor Chuck Powell decided to bring Sakai to Yale’s [3] G. Hardman, “Memoirs — How mathematics gave me
course management system. Gloria became part of opportunities,” unpublished manuscript, c. 2010.
the main team implementing Sakai on Classesv2, led [4] G. Hardman, “Pierre,” unpublished manuscript, 2004 and
by project manager David Hirsch and programming 2013.
team manager Andy Newman, with technical manager [5] G. Hardman, Re
sume , c. 1990.
Michael Appleby, and programmers Jen Bourey and [6] K. Kassover, “A decade of computers at CRH,” Choate
Drew Mazurek. From then until her retirement, Gloria News, vol. 76, no. 10, p. 1, Feb. 1986.
was its sole full-time support person and “the face of [7] “New faculty,” unspecified Shore Country Day School
Classesv2,” as her colleague Matt Regan said.9 publication, p. 2, Fall 1982.
[8] “Wonder woman,” Booklet of reminiscences given to
Gloria Hardman upon her retirement from Yale, 2014.
7
Miksovsky, Zoom interview.
8
G. Hardman, “Re: Shiny & Busy & Bow-tie’d,” email to author, PHILIP NEL is University Distinguished Professor of English at
3 March 2008. Kansas State University, Manhattan, KS, 66506, USA. Find him
9
M. Regan, “Re: Query for IEEE article about Gloria Hardman,”
email to author, 12 July 2022. online at philnel.com. Contact him at philnel@ksu.edu.

4886
ComputingEdge
IEEE Annals of the History of Computing June
July-September 2023
2022
IEEE COMPUTER SOCIETY D&I FUND

Drive Diversity
& Inclusion in
Computing

Supporting projects
and programs that
positively impact
diversity, equity, and
inclusion throughout
the computing DONATE TODAY!
community.
EDITOR: George Strawn,
EDITOR: Strawn, gostrawn@gmail.com
gostrawn@gmail.com
This article originally
appeared in
DEPARTMENT:
DEPARTMENT: MASTERMIND
vol. 23, no. 6, 2021
Masterminds of the NSFnet:
Masterminds of the NSFnet: Jennings, Wolff,
Jennings, Wolff, and
and Van Houweling
Van Houweling
George Strawn , National Academy of Sciences, Engineering, and Medicine, Washington, DC, 20418, USA
George Strawn , National Academy of Sciences, Engineering, and Medicine, Washington, DC, 20418, USA

T
he Arpanet origins of the Internet are well referred to a previous action of an NSF Program Advi-
known. For example, see “Masterminds of the sory Committee, which had recommended that “the
Arpanet.”1 Not as well known is the NSFnet, standard DoD TCP and IP protocols be designated as
which was the essential step between the Arpanet the initial national network transport and internet
and the Internet. This article will highlight the unlikely protocols, respectively.”
origin of the NSFnet, its development over ten years Dennis Jennings arrived at the NSF from Ireland in
(1985–1995), and its transition to the Internet of today. 1985 and was appointed as a Network Program Officer
I should note that I was a part of the NSFnet project in the Division for Supercomputing. In concert with this
team, so this article is part history, part reminiscence. recommendation, he selected TCP/IP for the incipient
NSFnet. After making the decision for TCP/IP, Jennings
architected a three-layer network: national backbone,
LAX AND SCIENCENET REPORTS regional nets, and campus nets. Then, he made an
In the early 1980s, both Europe and Japan were provid- interim backbone network award to interconnect the
ing their researchers with more access to supercom- six supercomputing centers with a 56 Kb/s network
puters than the United States. A committee of (which was the same bandwidth as the Arpanet). The
distinguished computational scientists, chartered by developing regional networks began connecting to this
the National Science Foundation (NSF) and chaired by interim backbone. The three-layer decision was also for-
Peter Lax of NYU, recommended in December 1982 that tuitous, as will be seen below. Then, Jennings returned
the U.S. government address this problem.2 In 1984, an to his regular job in Ireland in the summer of 1986.
IBM Vice President, Eric Bloch,3 became the Director of Stephan Wolff, a Network Specialist from the U.S.
NSF and accepted the challenge (along with some new Army Ballistics Research Laboratory (home of the
money) to create supercomputing centers for general ENIAC), was selected by NSF to replace Jennings.
use by scientists at 100 U.S. research universities. Shortly, a question arose as to how funds would be
The Lax Report also recommended that a com- divided between supercomputers and the NSFnet. In
puter network be constructed to interconnect the order to forestall intradivision disputes, a new NSF
research universities with the new supercomputer division was created for the network, and Steve Wolff
centers. As a fortuitous coincidence, in January 1983, became its director. He proceeded to staff the new
TCP/IP replaced NCP on the Arpanet. Significantly, division and to prepare a solicitation for the new
the Arpanet was the only network at that time NSFnet backbone.
that was “vendor neutral.” The Sciencenet Report
appeared in December 1984, exactly two years after NSFNET
the Lax Report.4 Its subtitle was “A report on the evo-
The three-layer network was developed and deployed
lution of a supercomputer access network.” An inter-
as follows. A national backbone network competition
national participant in the Sciencenet deliberations
was won by a partnership led by the State of Michigan
was Dennis Jennings, the director of Computing Serv-
and its higher education network, MERIT, and included
ices at the University College Dublin. This report
the private sector companies, MCI and IBM. The
leader of the partnership was Douglas Van Houweling,
CIO of the University of Michigan. The regional net-
1520-9202  2021 IEEE works formed in different geographical areas of the
Digital Object Identifier 10.1109/MITP.2021.3123419 country and interconnected the research universities
Date of current version 17 December 2021. in their areas with the backbone network. The campus

50 June 2023 2021


November/December Published
Published by theby theComputer
IEEE IEEE Computer
SocietySociety  67
2469-7087/23 © 2023 IEEE
IT Professional
MASTERMIND MASTERMIND

networks were the responsibility of the universities, that helped fund connecting to the local regional. At
who had to assure that TCP/IP traffic could be the time, there were about 4000 colleges and universi-
accepted and transmitted by campus computers. The ties in the United States, and by 1995, half of them
56 Kb/s backbone had become very congested, and were on the NSFnet. And, via an international connec-
the installation in 1988 of the 1.5 Mb/s backbone was tion program, European and Asian research networks
much appreciated by users. began connecting. But the Internet was not yet public.
MCI was relatively a new company that provided
long-distance phone service, after having broken the
AT&T long-distance monopoly. (MCI’s original name PRIVATIZATION AND
was Microwave Communications Inc. They argued in COMMERCIALIZATION
court that AT&T’s natural long-distance monopoly In 1992, interested entrepreneurs called for and
was moot in the presence of microwave communica- obtained a congressional hearing aimed at “getting
tions. The court agreed. MCI was acquired by World- the government out of the way so that they could
com in 1998 and then by Verizon in 2006.) IBM was the take over the Internet.” After the hearing, it was clear
computer colossus of that time, a provider of hard- to NSF that congress wanted this to happen, so Wolff
ware and software (like Intel and Microsoft combined). began thinking about how to retire the NSFnet in a
Significantly, it was the IBM research division that was helpful way. This turned out to be a complicated task
the NSFnet partner. IBM’s task was to develop Inter- that took three years to accomplish.
net routers, and MCI’s task was to provide the fiber When the NSFnet began operating, DARPA was
optic communications lines. There were many out- still supporting Internet number and domain name
standing contributors in the NSFnet partnership, but transactions. As the NSFnet grew, it was appropriate
as stated previously, the most important contributors that NSF assume those responsibilities. Consequently,
were Jennings, Wolff, and Van Houweling. It should be a solicitation was issued that called for a new man-
noted that, in addition to contributing excellent ager for these services. It also called for a user serv-
human resources, MCI, led by Dick Liebheber, and ices organization to help new academic network
IBM, led by Al Weis, contributed more than $150 mil- users. Finally, it also called for Internet “white and yel-
lion in like-kind effort to the project, making the low page services.” Very soon the World Wide Web
NSFnet a truly public–private partnership. made its dramatic appearance on the network, and
On the one hand, both the backbone network and Google (in 1998) and other search engines filled this
the regional networks were funded by NSF as support role in a revolutionary manner.
awards to the academic community, as opposed to Another challenge that had to be met before retir-
the government procuring services for itself. This ing the NSFnet was related to its increasing popularity.
meant that the awards were outside of the jurisdiction That is, the 1.5 Mb/s network was becoming con-
of the Federal Acquisition Regulations, which can be a gested. The partnership came to NSF with a proposal
nemesis for agencies (disputed awards, etc.). The to replace the 1.5 Mb/s backbone with a 45 Mb/s net-
backbone was awarded as a cooperative agreement, work. This was approved by NSF, and (none too soon)
which meant that decisions would be made jointly by the new network went into parallel operation with the
NSF and the partnership. On the other hand, the old one. It was the first network to operate at such a
regionals were awarded as standard grants, which high bandwidth, and a number of “interesting” prob-
meant that they were at an arm’s length from govern- lems were discovered and solved. The fast network
ment requirements. This turned out to be crucial came into full service just at the time when the slow
because it enabled the regionals to seek additional network would have collapsed from congestion, as
members beyond the research universities, as long as had its 56 Kb/s predecessor in 1987.
the network traffic was restricted to open research. With the network stabilized, attention turned to
Midway through NSFnet’s life (in 1991), half of the creating a solicitation for a new, post-NSFnet Internet.
members of the regionals were private companies, The initial discussion regarding NSF’s future was
who wanted to “keep an eye” on this novel network. In whether it should have one new backbone or two (for
my opinion, it was this early interest by the private private sector development purposes). But the private
sector that convinced entrepreneurs that there was sector signaled that it was wary of using a Federally
“money to be made” in the Internet. At the same time supported network for business purposes, and in the
that the private sector was quietly joining the network, end, the solicitation called for no NSF backbone. It did,
colleges and universities beyond the first 100 were of course, call for the creation of network access
offered the opportunity to join by means of NSF grants points where the new commercial Internet providers

68
www.computer.org/computingedge
IT Professional November/December 2021 51
MASTERMIND MASTERMIND

could interconnect their services (those commercial By the late 1970s, the idea of a vendor-neutral com-
services would be where the higher ed community puter network had come to be seen as important. Sev-
could get service to replace the soon-to-be-retired eral international standards bodies created the Open
backbone). The solicitation was first released as a Systems Interconnect (OSI) model with the anticipa-
public draft, and many comments and suggestions tion that OSI networks would be the future. But his-
were received, some of which were incorporated in tory provided an Internet future instead. As the
the final solicitation. In due course, all the required Wikipedia article on OSI says.
awards were made, and in the spring of 1995, the “OSI was an industry effort, attempting to get
NSFnet was retired and the commercial Internet was industry participants to agree on common network
born. For much more detail on the NSFnet, see its standards to provide multivendor interoperability. It
Wikipedia article5 and the Computer History Museum was common for large networks to support multiple
history of the Internet.6 network protocol suites, with many devices unable to
interoperate with other devices because of a lack of
common protocols. For a period in the late 1980s and
AFTERMATH early 1990s, engineers, organizations and nations
As it happened, the handoff to the private sector became polarized over the issue of which standard,
occurred just in time. In that summer, Internet usage the OSI model or the Internet protocol suite, would
exploded and the new Internet providers struggled to result in the best and most robust computer networks.
keep up with demand. They invested tremendous However, while OSI developed its networking stand-
resources to do so, and if NSF had still been in charge, it ards in the late 1980s, TCP/IP came into widespread
would have either been bankrupted or else the Internet use on multivendor networks for internetworking.’’7
would have failed. As it was, NSF did not get the Internet In other words, the de jure OSI development
number and domain services privatized in time and became bogged down in politics, and the de facto
spent the next several years struggling to do so. TCP/IP took its place in history. Politics had played
IBM had developed the first high-speed Internet almost no role in the development of TCP/IP and its
routers for the NSFnet and might have become the method of “rough consensus and running code,”
leader of the router business. But their research divi- proved to be a better development strategy than cor-
sion could not convince the business division to com- porate politics.
mercialize routers, so Cisco (and then others) stepped
in. His job well done, Steve Wolff left NSF at this time
and joined Cisco. REFERENCES
One other part of the new Internet should be men- 1. G. Strawn, “Masterminds of the Arpanet,” IT
tioned. The supercomputing centers were intercon- Professional, vol. 16, no. 3, pp. 66–68, May/Jun. 2014.
nected with an ultrahigh-bandwidth network (cryptically 2. Lax Report, 1982. [Online]. Available: https://www.pnnl.
named the vBNS) to support research in distributed gov/scales/docs/lax_report1982.pdf
high-performance computing. And when an NSF review 3. G. Strawn and C. Strawn, “Erich Bloch: Mastermind of
of the new network architecture (chaired by Doug Van computer technology and science administration,” IT
Houweling) highlighted the grave concern that profes- Professional, vol. 19, no. 2, pp. 70–72, Mar./Apr. 2017.
sors could not get their new Internet-related work done 4. “The Sciencenet report: A report on the evolution of a
on the newly privatized but highly congested networks, supercomputer access network,” 1984, unpublished.
NSF responded by providing support for the 100 (then 5. Accessed: Mar. 2021. [Online]. Available: https://en.
200) research universities to connect to the vBNS, and wikipedia.org/wiki/National_Science_Foundation_
this provided the spark for the creation of the university Network
consortium named Internet2, which Van Houweling ably 6. Accessed: 2021. [Online]. Available: https://www.
led for the next ten years. About the time when Van computerhistory.org/internethistory/1980s/
Houweling stepped down from his Internet2 responsibil- 7. Accessed: 2021. [Online]. Available: https://en.wikipedia.
ities, Wolff joined it as Interim VP and CTO. org/wiki/OSI_model

52 ComputingEdge
November/December 2021 IT Professional 69
June 2023
IEEE Computer Architecture Letters is a forum for fast
publication of new, high-quality ideas in the form of
short, critically refereed technical papers. Submissions
are accepted on a continuing basis and letters will be
published shortly after acceptance in IEEE Xplore and in
the Computer Society Digital Library.

Submissions are welcomed on any topic in computer


architecture, especially:
• Microprocessor and multiprocessor systems
• Microarchitecture and ILP processors
• Workload characterization
• Performance evaluation and simulation techniques
• Interactions with compilers and operating systems
• Interconnection network architectures
• Memory and cache systems
• Power and thermal issues at the architectural level
• I/O architectures and techniques
• Independent validation of previously published results
• Analysis of unsuccessful techniques
• Domain-specific processor architecture
(embedded, graphics, network)
• High-availability architectures
• Reconfigurable computer architectures

www.computer.org/cal

Join the IEEE Computer Society


for subscription discounts today!
www.computer.org/product/journals/cal
SA
,U
Register Today!
A
W
E,
U
V
LE

IEEE
EL
B

QUANTUM
WEEK

23
20
PT
SE
2
–2
17

qce.quantum.ieee.org
Don’t miss IEEE Quantum Week 2023—the IEEE International
Conference on Quantum Computing and Engineering (QCE)
bridging the gap between the science of quantum computing
and the development of the industry surrounding it. In-person
registration space is limited. Register today!

Council on Superconductivity

®
Conference Calendar

I EEE Computer Society conferences are valuable forums for learning on broad and dynamically shifting top-
ics from within the computing profession. With over 200 conferences featuring leading experts and thought
leaders, we have an event that is right for you. Questions? Contact conferences@computer.org.

JULY 18 July 23 August


2 July • ICDCS (IEEE Int’l Conf. on Dis- • HotI (IEEE Hot Interconnects
• CLOUD (IEEE Int’l Conf. on tributed Computing Systems) Symposium), virtual
Cloud Computing), Chicago, Hong Kong 25 August
USA • SCC (IEEE Space Computing • SmartIoT (IEEE Int’l Conf. on
• EDGE (IEEE Int’l Conf. on Edge Conf.) Pasadena, USA Smart Internet of Things), Xin-
Computing & Communica- • SMC-IT (IEEE Int’l Conf. on ing, China
tions), Chicago, USA Space Mission Challenges for 27 August
• ICDH (IEEE Int’l Conf. on Digi- Information Technology) Pasa- • HCS (IEEE Hot Chips Sympo-
tal Health), Chicago, USA dena, USA sium), Palo Alto, California, USA
• ICWS (IEEE Int’l Conf. on Web 19 July 30 August
Services), Chicago, USA • ASAP (IEEE Int’l Conf. on Appli- • MIPR (IEEE Int’l Conf.on Multi-
• QSW (IEEE Int’l Conf. on Quan- cation-specific Systems, media Information Processing
tum Soft ware), Chicago, USA Architectures and Processors) and Retrieval), Singapore
• SERVICES (IEEE World Con- Porto, Portugal
gress on Services), Chicago, 28 July SEPTEMBER
USA • ICCP (IEEE Int’l Conf. on Com- 4 September
• SSE (IEEE Int’l Conf. on Soft- putational Photography), Mad- • ARITH (IEEE Int’l Symposium
ware Services Eng.), Chicago, ison, Wisconsin, USA on Computer Arithmetic),
USA Portland, Oregon, USA
3 July AUGUST • RE (IEEE Int’ l Require -
• EuroS&P (IEEE European Sym- 1 August ments Eng. Conf.), Hannover,
posium on Security and Pri- • IRI (IEEE Int’l Conf. on Informa- Germany
vacy) Delft , Netherlands tion Reuse and Integration for 16 September
10 July Data Science), Bellevue, WA, • SmartCloud (IEEE Int’l Conf. on
• CSF (IEEE Computer Secu- USA Smart Cloud), Tokyo, Japan
rity Foundations Symposium) 14 August 25 September
Dubrovnik, Croatia • FiCloud (Int’l Conf. on Future • ACSOS (IEEE Int’l Conf. on
• ICALT (IEEE Int’ l Conf. on Internet of Things and Cloud), Autonomic Computing and
Advanced Learning Technolo- Marrakesh, Morocco Self- Or ganizing S ys tems),
gies) Orem, USA 21 August Toronto, Canada
• ICME (IEEE Int’l Conf. on Mul- • PST (Int’l Conf. on Privacy, • IC2E (IEEE Int’l Conf. on Cloud
timedia and Expo) Brisbane, Security & Trust), Copenhagen, Eng.), Boston, USA
Australia Denmark • MASS (IEEE Int’ l Conf. on

55 June 2023 Published by the IEEE Computer Society 2469-7087/23 © 2023 IEEE
Mobile Ad-Hoc and Smart Sys- 2 November Multimedia), Laguna Hills, USA
tems), Toronto, Canada • CyberC (Int’l Conf. on Cyber- 14 December
• STC (IEEE Software Technol- Enabled Distributed Comput- • BCD (IEEE/ACIS Int’l Conf. on
ogy Conf.), virtual ing and Knowledge Discovery), Big Data, Cloud Computing,
Suzhou, China and Data Science Eng.), Ho Chi
OCTOBER 4 November Minh City, Vietnam
2 October • ICEBE (IEEE Int’l Conf. on 15 December
• ICCV (IEEE/CVF Int’l Conf. on E- Business Eng.), S ydney, • BigData (IEEE Int’l Conf. on Big
Computer Vision), Paris, France Australia Data), Sorrento, Italy
• LCN (IEEE Conf. on Local Com- 12 November 18 December
puter Net works), Day tona • SC (Int’l Conf. for High-Perfor- • HiPC (IEEE Int’l Conf. on High-
Beach, USA mance Computing, Network- Performance Computing, Data,
9 October ing, Storage, and Analysis), and Analytics), Goa, India
• e-Science (IEEE Int’l Conf. on Denver, USA • iSES (IEEE Int’l Symposium on
e-Science), Limassol, Cyprus Smart Electronic Systems),
18 October DECEMBER Ahmedabad, India
• SecDev (IEEE Secure Develop- 1 December
ment Conf.), Atlanta, USA • ICDM (IEEE Int’l Conf. on Data
22 October Mining), Shanghai, China
• VIS (IEEE Visualization and 4 December
Visual Analytics), Melbourne, • CloudCom (IEEE Int’l Conf. on
Australia Cloud Computing Technol-
31 October ogy and Science), Napoli, Italy
• CLUSTER (IEEE Int’l Conf. on CloudCom (IEEE Int’l Conf. on
Cluster Computing), Santa Fe, Cloud Computing Technology
USA and Science), Napoli, Italy
• CSDE (IEEE Asia-Pacific Conf.
NOVEMBER on Computer Science and
1 November Data Eng.), Nadi, Fiji
• CIC (IEEE Int’l Conf. on Collab- • ICA (IEEE Int’l Conf. on Agents), Learn more
oration and Internet Comput- Kyoto, Japan
about IEEE
ing), Atlanta, USA 5 December
• CogMI (IEEE Int’l Conf. on Cog- • BIBM (IEEE Int’l Conf. on Bio- Computer
nitive Machine Intelligence), informatics and Biomedicine), Society
Atlanta, USA
• TPS (IEEE Int’l Conf. on Trust,
Istanbul, Turkey
• RTSS (IEEE Real-Time Systems
conferences
Privacy and Security in Intel- Symposium), Taipei, Taiwan computer.org/conferences
ligent Systems and Applica- 11 December
tions), Atlanta, USA • ISM (IEEE Int’l Symposium on
Science Led.
Enterprise Driven.

Through the pioneering work of


its scientific and engineering
teams around the world,
Quantinuum has become a global
leader for quantum computing
hardware, software, and the open
source tools used by quantum
developers and engineers.

Today, Quantinuum is
accelerating the adoption of
applications in cybersecurity,
chemistry, optimization, and
true artificial intelligence.

Join us as we accelerate
quantum computing.

Scan the QR code


or visit us online at
quantinuum.com
to learn more . . . . . . . . . . . . .

You might also like