AIMS 2017
Things in a Fog (TGIF): A Framework to Support Multi- domain Research in the Internet
- f Things
Dr Jim Martin School of Computing Clemson University
(jmarty@clemson.edu)
AIMS 2017 Things in a Fog (TGIF): A Framework to Support Multi- - - PowerPoint PPT Presentation
AIMS 2017 Things in a Fog (TGIF): A Framework to Support Multi- domain Research in the Internet of Things Dr Jim Martin School of Computing Clemson University (jmarty@clemson.edu) Talk Overview Setting the stage SC-CVT: South
Things in a Fog (TGIF): A Framework to Support Multi- domain Research in the Internet
Dr Jim Martin School of Computing Clemson University
(jmarty@clemson.edu)
2
3
protocols and applications in scenarios involving congested access links (cable, DSL).
DOJ/NIJ to explore usefulness of WiMAX for public safety (4.9 GHz or lower
funding from NSF.
controller
4
academic research ‘out in the wild’ - including network measurement ‘services’
middleware, co-locate a SciWiNet network control box at Sprint’s facility, programmable access to Sprint’s device and traffic management.
Internet
NIH Research DOE Research DOT/ITS Research Public Safety/ Homeland Security NSF Research networking, cybersecurity, Economic models, human behaviors
ARTERRA
Sprint’s 3G/4G T-Mobile SciWiNet is a Mobile Virtual Network Operator (MVNO)- our users are the academic community
Common themes
participate
makes use of contributed performance data
5
Recent USIgnite grant: “Enabling Connected Vehicle Applications through Advanced Network Technology”
transportation faculty and with South Carolina’s Department of Transportation.
systems required to support vehicular applications that communicate in a vehicle-to-vehicle or vehicle-to-infrastructure communications mode. This system is defined by a large set of standards collectively referred to as WAVE (Wireless Access in a Vehicular Environment)
applications that operate in a wireless network that extends the standard WAVE system with additional wireless networks (i.e., a wireless hetnet)
6
concepts in a manner that leverages advanced network infrastructure : Queue Warning and Traffic Incident Detection
analyze traffic flow data and attempts to predict the onset of congestion or to identify an incident.
accuracy of the data
Board Units (OBUs)
support CV application
7
to our system
vehicles provide the raw information
set is used by a Queue Warning detection algorithm based on Machine Learning.
node that handles training data updates.
8
We have faced the following challenges
campus.
distributed computing systems.
services to applications
with a handful of vehicular does not allow realistic studies.
there. We opted to broaden the scope to include edge computing in a shared infrastructure model with the goal of promoting the reusability (sharing) of data. Disclaimer : we are at the early stages of requirements/design/prototyping
Backbone Network
Cellular Network Fixed Edge Node Fixed Edge Node Mobile Edge Node Mobile Edge Node TGIF Gateway IoT Platforms Other Universities Mobile Edge Node Mobile Edge Node System Edge GENI Cloud
9
Physical Devices Lower Edge Services
Application Packet
Application Services
App1 Send Msg()
System Services
GEO Services Discovery Services MSG Services Package Message Publish to Broker Connectivity Services Get Signal Strength() Broker System Pub/Sub Broker Brokerless Logic for Selecting Route Broker to Broker Pub/Sub Pub/Sub WAVE Services Wave Service State() Send DSRC() WAVE Lower System Services DSRCSendTx() GetChannelInfo() SendBeacon() DSRCSendAck() Get Signal Info LTE Get Signal Info WiFi WAVE Lower Edge Services Get Signal Info Tx() Tx_Ack() LTE Dongle WiFi Dongle Rasp Pi Arada Radio DSRCTX() DSRCRX() GetSignalInfo() Cohda Radio DSRCTX() DSRCRX() GetSignalInfo() DSRCReceiveAck() Receive DSRC() Security Services Topic Mapping Topic Mapping PerfMon Services A1 A2 A3 A4 L Data Storage Application
Storage Services
Open Database System Database Database Server (Mongo DB) Topic Mapping Rx()
programming environment along with a system architecture
mobile edge, machines nodes that require GW services
applications access to services including :
bounded box, …
pub/sub.
in choosing the ‘best available network’
system
work on any device that can run Unix.
events
interest - e.g., analytics engines,
10
Quite a bit of academic activity in this area ….
the reuse of data
the data:
we have two rules at this point: open (anonymous available to all users), restricted (to users with a token)
trust model