-
Microlocation for Smart Buildings in the Era of the Internet of Things: A Survey of Technologies, Techniques, and Approaches
Authors:
Petros Spachos,
Ioannis Papapanagiotou,
Konstantinos Plataniotis
Abstract:
Microlocation plays a key role in the transformation of traditional buildings into smart infrastructure. Microlocation is the process of locating any entity with a very high accuracy, possibly in centimeters. Such technologies require high detection accuracy, energy efficiency, wide reception range, low cost, and availability. In this article, we provide insights into various microlocation-enablin…
▽ More
Microlocation plays a key role in the transformation of traditional buildings into smart infrastructure. Microlocation is the process of locating any entity with a very high accuracy, possibly in centimeters. Such technologies require high detection accuracy, energy efficiency, wide reception range, low cost, and availability. In this article, we provide insights into various microlocation-enabling technologies, techniques, and services and discuss how they can accelerate the incorporation of the Internet of Things (IoT) in smart buildings. We cover the challenges and examine some signal processing filtering techniques such that microlocation-enabling technologies and services can be thoroughly integrated with an IoT-equipped smart building. An experiment with Bluetooth Low-Energy (BLE) beacons used for microlocation is also presented.
△ Less
Submitted 17 February, 2021;
originally announced April 2021.
-
DBLog: A Watermark Based Change-Data-Capture Framework
Authors:
Andreas Andreakis,
Ioannis Papapanagiotou
Abstract:
It is a commonly observed pattern for applications to utilize multiple heterogeneous databases where each is used to serve a specific need such as storing the canonical form of data or providing advanced search capabilities. For applications it is hence desired to keep multiple databases in sync. We have observed a series of distinct patterns that have tried to solve this problem such as dual-writ…
▽ More
It is a commonly observed pattern for applications to utilize multiple heterogeneous databases where each is used to serve a specific need such as storing the canonical form of data or providing advanced search capabilities. For applications it is hence desired to keep multiple databases in sync. We have observed a series of distinct patterns that have tried to solve this problem such as dual-writes and distributed transactions. However, these approaches have limitations with regard to feasibility, robustness, and maintenance. An alternative approach that has recently emerged is to utilize Change-Data-Capture (CDC) in order to capture changed rows from a database's transaction log and eventually deliver them downstream with low latency. In order to solve the data synchronization problem one also needs to replicate the full state of a database and transaction logs typically do not contain the full history of changes. At the same time, there are use cases that require high availability of the transaction log events so that databases stay as closely in-sync as possible.
To address the above challenges, we developed a novel CDC framework for databases, namely DBLog. DBLog utilizes a watermark based approach that allows us to interleave transaction log events with rows that we directly select from tables to capture the full state. Our solution allows log events to continue progress without stalling while processing selects. Selects can be triggered at any time on all tables, a specific table, or for specific primary keys of a table. DBLog executes selects in chunks and tracks progress, allowing them to pause and resume. The watermark approach does not use locks and has minimum impact on the source. DBLog is currently used in production by tens of microservices at Netflix.
△ Less
Submitted 23 October, 2020;
originally announced October 2020.
-
NDBench: Benchmarking Microservices at Scale
Authors:
Ioannis Papapanagiotou,
Vinay Chella
Abstract:
Software vendors often report performance numbers for the sweet spot or running on specialized hardware with specific workload parameters and without realistic failures. Accurate benchmarks at the persistence layer are crucial, as failures may cause unrecoverable errors such as data loss, inconsistency or corruption. To accurately evaluate data stores and other microservices at Netflix, we develop…
▽ More
Software vendors often report performance numbers for the sweet spot or running on specialized hardware with specific workload parameters and without realistic failures. Accurate benchmarks at the persistence layer are crucial, as failures may cause unrecoverable errors such as data loss, inconsistency or corruption. To accurately evaluate data stores and other microservices at Netflix, we developed Netflix Data Benchmark (NDBench), a Cloud benchmark tool. It can be deployed in a loosely-coupled fashion with the ability to dynamically change the benchmark parameters at runtime so we can rapidly iterate on different tests and failure modes. NDBench offers pluggable patterns and loads, support for pluggable client APIs, and was designed to run continually. This design enabled us to test long-running maintenance jobs that may affect the performance, test numerous different systems under adverse conditions, and uncover long-term issues like memory leaks or heap pressure.
△ Less
Submitted 27 July, 2018;
originally announced July 2018.
-
BLEBeacon: A Real-Subject Trial Dataset from Mobile Bluetooth Low Energy Beacons
Authors:
Dimitrios Sikeridis,
Ioannis Papapanagiotou,
Michael Devetsikiotis
Abstract:
The BLEBeacon dataset is a collection of Bluetooth Low Energy (BLE) advertisement packets/traces generated from BLE beacons carried by people following their daily routine inside a university building. A network of Raspberry Pi 3 (RPi)-based edge devices were deployed inside a multi-floor facility continuously gathering BLE advertisement packets and storing them in a cloud-based environment. The d…
▽ More
The BLEBeacon dataset is a collection of Bluetooth Low Energy (BLE) advertisement packets/traces generated from BLE beacons carried by people following their daily routine inside a university building. A network of Raspberry Pi 3 (RPi)-based edge devices were deployed inside a multi-floor facility continuously gathering BLE advertisement packets and storing them in a cloud-based environment. The data were collected during an IRB (Institutional Review Board forhe Protection of Human Subjects in Research) approved one-month trial. Each facility occupant/participant was handed a BLE beacon to carry with him at all times. The focus is on presenting a real-life realization of a location-aware sensing infrastructure, that can provide insights for smart sensing platforms, crowd-based applications, building management, and user-localization frameworks. This work describes and documents the published BLEBeacon dataset.
△ Less
Submitted 9 May, 2019; v1 submitted 23 February, 2018;
originally announced February 2018.
-
A Comparative Taxonomy and Survey of Public Cloud Infrastructure Vendors
Authors:
Dimitrios Sikeridis,
Ioannis Papapanagiotou,
Bhaskar Prasad Rimal,
Michael Devetsikiotis
Abstract:
An increasing number of technology enterprises are adopting cloud-native architectures to offer their web-based products, by moving away from privately-owned data-centers and relying exclusively on cloud service providers. As a result, cloud vendors have lately increased, along with the estimated annual revenue they share. However, in the process of selecting a provider's cloud service over the co…
▽ More
An increasing number of technology enterprises are adopting cloud-native architectures to offer their web-based products, by moving away from privately-owned data-centers and relying exclusively on cloud service providers. As a result, cloud vendors have lately increased, along with the estimated annual revenue they share. However, in the process of selecting a provider's cloud service over the competition, we observe a lack of universal common ground in terms of terminology, functionality of services and billing models. This is an important gap especially under the new reality of the industry where each cloud provider has moved towards his own service taxonomy, while the number of specialized services has grown exponentially. This work discusses cloud services offered by four dominant, in terms of their current market share, cloud vendors. We provide a taxonomy of their services and sub-services that designates major service families namely computing, storage, databases, analytics, data pipelines, machine learning, and networking. The aim of such clustering is to indicate similarities, common design approaches and functional differences of the offered services. The outcomes are essential both for individual researchers, and bigger enterprises in their attempt to identify the set of cloud services that will utterly meet their needs without compromises. While we acknowledge the fact that this is a dynamic industry, where new services arise constantly, and old ones experience important updates, this study paints a solid image of the current offerings and gives prominence to the directions that cloud service providers are following.
△ Less
Submitted 28 January, 2018; v1 submitted 4 October, 2017;
originally announced October 2017.
-
Internet of Things: Survey on Security and Privacy
Authors:
Diego M. Mendez,
Ioannis Papapanagiotou,
Baijian Yang
Abstract:
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". While its purpose is to provide effective and efficient solutions, security of the devices and network is a challenging issue. The number of devices connected along with the ad-hoc nature of the system further exacerbates the situation. Therefore, security and privacy has emerged as a signifi…
▽ More
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". While its purpose is to provide effective and efficient solutions, security of the devices and network is a challenging issue. The number of devices connected along with the ad-hoc nature of the system further exacerbates the situation. Therefore, security and privacy has emerged as a significant challenge for the IoT. In this paper,we aim to provide a thorough survey related to the privacy and security challenges of the IoT. This document addresses these challenges from the perspective of technologies and architecture used. This work focuses also in IoT intrinsic vulnerabilities as well as the security challenges of various layers based on the security principles of data confidentiality, integrity and availability. This survey analyzes articles published for the IoT at the time and relates it to the security conjuncture of the field and its projection to the future.
△ Less
Submitted 10 July, 2017; v1 submitted 6 July, 2017;
originally announced July 2017.
-
An iBeacon based Proximity and Indoor Localization System
Authors:
Faheem Zafari,
Ioannis Papapanagiotou,
Michael Devetsikiotis,
Thomas Hacker
Abstract:
Indoor localization and Location Based Services (LBS) can greatly benefit from the widescale proliferation of communication devices. The basic requirements of a system that can provide the aforementioned services are energy efficiency, scalability, lower costs, wide reception range, high localization accuracy and availability. Different technologies such as WiFi, UWB, RFID have been leveraged to p…
▽ More
Indoor localization and Location Based Services (LBS) can greatly benefit from the widescale proliferation of communication devices. The basic requirements of a system that can provide the aforementioned services are energy efficiency, scalability, lower costs, wide reception range, high localization accuracy and availability. Different technologies such as WiFi, UWB, RFID have been leveraged to provide LBS and Proximity Based Services (PBS), however they do not meet the aforementioned requirements. Apple's Bluetooth Low Energy (BLE) based iBeacon solution primarily intends to provide Proximity Based Services (PBS). However, it suffers from poor proximity detection accuracy due to its reliance on Received Signal Strength Indicator (RSSI) that is prone to multipath fading and drastic fluctuations in the indoor environment. Therefore, in this paper, we present our iBeacon based accurate proximity and indoor localization system. Our two algorithms Server-Side Running Average (SRA) and Server-Side Kalman Filter (SKF) improve the proximity detection accuracy of iBeacons by 29% and 32% respectively, when compared with Apple's current moving average based approach. We also present our novel cascaded Kalman Filter-Particle Filter (KFPF) algorithm for indoor localization. Our cascaded filter approach uses a Kalman Filter (KF) to reduce the RSSI fluctuation and then inputs the filtered RSSI values into a Particle Filter (PF) to improve the accuracy of indoor localization. Our experimental results, obtained through experiments in a space replicating real-world scenario, show that our cascaded filter approach outperforms the use of only PF by 28.16% and 25.59% in 2-Dimensional (2D) and 3-Dimensional (3D) environments respectively, and achieves a localization error as low as 0.70 meters in 2D environment and 0.947 meters in 3D environment.
△ Less
Submitted 24 March, 2017; v1 submitted 22 March, 2017;
originally announced March 2017.
-
Serifos: Workload Consolidation and Load Balancing for SSD Based Cloud Storage Systems
Authors:
Zhihao Yao,
Ioannis Papapanagiotou,
Rean Griffith
Abstract:
Achieving high performance in virtualized data centers requires both deploying high throughput storage clusters, i.e. based on Solid State Disks (SSDs), as well as optimally consolidating the workloads across storage nodes. Nowadays, the only practical solution for cloud storage providers to offer guaranteed performance is to grossly over-provision the storage nodes. The current workload schedulin…
▽ More
Achieving high performance in virtualized data centers requires both deploying high throughput storage clusters, i.e. based on Solid State Disks (SSDs), as well as optimally consolidating the workloads across storage nodes. Nowadays, the only practical solution for cloud storage providers to offer guaranteed performance is to grossly over-provision the storage nodes. The current workload scheduling mechanisms used in production do not have the intelligence to optimally allocate block storage volumes based on the performance of SSDs. In this paper, we introduce Serifos, an autonomous performance modeling and load balancing system designed for SSD-based cloud storage. Serifos takes into account the characteristics of the SSD storage units and constructs hardware dependent workload consolidation models. Thus Serifos is able to predict the latency caused by workload interference and the average latency of concurrent workloads. Furthermore, Serifos leverages an I/O load balancing algorithm to dynamically balance the volumes across the cluster. Experimental results indicate that Serifos consolidation model is able to maintain the mean prediction error of around 10% for heterogeneous hardware. As a result of Serifos load balancing, we found that the variance and the maximum average latency are reduced by 82% and 52%, respectively. The supported Service Level Objectives (SLOs) on the testbed improve 43% on average latency, 32% on the maximum read and 63% on the maximum write latency.
△ Less
Submitted 25 December, 2015; v1 submitted 20 December, 2015;
originally announced December 2015.
-
Micro-location for Internet of Things equipped Smart Buildings
Authors:
Faheem Zafari,
Ioannis Papapanagiotou,
Konstantinos Christidis
Abstract:
Micro-location is the process of locating any entity with high accuracy (possibly in centimeters), while geofencing is the process of creating a virtual fence around a so-called Point of Interest (PoI). In this paper, we present an insight into various micro-location enabling technologies and services. We also discuss how these can accelerate the incorporation of Internet of Things (IoT) in smart…
▽ More
Micro-location is the process of locating any entity with high accuracy (possibly in centimeters), while geofencing is the process of creating a virtual fence around a so-called Point of Interest (PoI). In this paper, we present an insight into various micro-location enabling technologies and services. We also discuss how these can accelerate the incorporation of Internet of Things (IoT) in smart buildings. We argue that micro-location based location-aware solutions can play a significant role in facilitating the tenants of an IoT equipped smart building. Also, such advanced technologies will enable the smart building control system through minimal actions performed by the tenants. We also highlight the existing and envisioned services to be provided by using micro-location enabling technologies. We describe the challenges and propose some potential solutions such that micro-location enabling technologies and services are thoroughly integrated with IoT equipped smart building.
△ Less
Submitted 25 May, 2017; v1 submitted 7 January, 2015;
originally announced January 2015.