ABSTRACT
Machine to Machine (M2M) is one of the evolving technologies that is employed in many business verticals such as banking, automotive, security, healthcare, and manufacturing. M2M devices communicates with the backend applications through the telecom network in order to exchange information. As a result of the wide deployment of M2M devices, the telecom network generates a large number of events that represents the traffic data (uplink and downlink volumes, session duration, charging related information, etc.). Those events have to be processed (collected, correlated, aggregated, formatted, encoded) and distributed to the destination Business Support Systems (BSS) for billing and reporting purposes. The Complex Event Processing (CEP) system making such processing is called Convergent Mediation. With the increase of M2M deployment and traffic, careful capacity planning and dimensioning is required to early prevent any capacity problem.
This work tackles this problem by proposing a framework for M2M capacity and dimensioning. It starts with the factors impacting the processing such as processing window then defines different processes and the resources required for those processes and how to make dimensioning for them.
- Elias, Y., Abdullah. K., Adnan. A, "An Energy-Efficient M2M Communication Method for Leakage Detection in Underground Water Pipes", "Q2SWinet '12 Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks", NY, USA, (Oct. 2012), 27--32, DOI: http://dx.doi.org/10.1145/2387218.2387224 Google ScholarDigital Library
- Vodafone M2M, 2016, {Online}, www.vodafone.com/business/m2m/world-leading-solutionsGoogle Scholar
- 3GPP TS 32.298, 3rd Generation Partnership Project, Charging Data Record Parameter CDR {Online}, ftp://www.3gpp.org/tsg_sa/WG5_TM/TSGS5_70/_specs_for_checking/32298-880.docGoogle Scholar
- Shafiq. M.Z, Lusheng Ji; Liu, A.X.; Pang, J.; Jia Wang 2013, "Large Scale Measurement and Characterization of Cellular machine-to machine Traffic", "IEEE/ACM Transaction on Networking (TON), NY, USA, (2013), Vol. 21, Issue 6, (Dec. 2013), 960--1973, DOI: http://dx.doi.org/10.1109/TNET.2013.2256431 Google ScholarDigital Library
- Cisco, San Jose, CA, USA, "Cisco visual networking index: Global mobile data traffic forecast update," White Paper, 2012Google Scholar
- Bouillet, Y., Kothari, R., Kumanr, V., Mignet, L., Nathan, S., Ranganathan, A., Turaga, D., Udrea, O., Verscheure, O., "Processing 6 Billion CDRs/day: From research to production (experience report)","DEBS '12, Proceeding of the 6th ACM International Conference on Distributed Event-Based Systems", NY, USA, (2012), 246--267. DOI: http://dx.doi.org/10.1145/2335484.2335513 Google ScholarDigital Library
- Kobayashi, Y., Isoyama, K., Koji, K., Tagato, H., "A Complex Event Processing for Large-Scale M2M Services and Its Performance Evaluation", "DEBS' 15: Proceeding of the 9th ACM International Conference on Distributed Event-Based Systems", NY, USA, (2015), 336--339, DOI: http://dx.doi.org/10.1145/2675743.2776771 Google ScholarDigital Library
- Stojanovic, N., Xu, Y., Nissatech, B., Stojanovic, L., "Mobile CEP architecture: from intelligence sensing to collaborative monitoring", "DEBS' 14: Proceeding of the 8th ACM International Conference on Distributed Event-Based Systems", NY, USA, (2014), 350--353, DOI: http://dx.doi.org/10.1145/2611286.2611322 Google ScholarDigital Library
- Turchin, Y., Gal, Y., Wasserkrug, S., "Tuning complex event processing rules using the prediction-correction paradigm", "DEBS '09 Proceedings of the Third ACM International Conference on Distributed Event-Based Systems", NY, USA, (2009), Article No. 10, DOI: http://dx.doi.org/10.1145/1619258.1619272 Google ScholarDigital Library
- Koldehofe, B., Mayer, R., Ramachandran, U., Rothermel, K., Volz, M., "Rollback-recovery without checkpoints in distributed event processing systems", "DEBS '13 Proceedings of the 7th ACM international conference on Distributed event-based systems", NY, USA, (2013), 27--38, DOI: http://dx.doi.org/10.1145/2488222.2488259 Google ScholarDigital Library
- Baumgartner, L., Strack, C., Hobbach, B., Seidemann, M., Seeger, B., Freisleben, B., "Complex event processing for reactive security monitoring in virtualized computer systems", "Complex event processing for reactive security monitoring in virtualized computer systems", (2015), 22--33, DOI: http://dx.doi.org/10.1145/2675743.2771829 Google ScholarDigital Library
- Understanding Disk I/O -- When Should Be Worried?, 2016, {Online}, http://blog.scoutapp.com/articles/2011/02/10/understanding-disk-i-o-when-should-you-be-worriedGoogle Scholar
- An Explanation of IOPS and Latency, 2016, {Online}, http://recoverymonkey.org/2012/07/26/an-explanation-of-iops-and-latency/Google Scholar
- Understanding I/O Request or Block Size, {Online}, http://www.dhillonblog.com/2014/07/understanding-io-request-block-size/Google Scholar
Recommendations
A complex event processing for large-scale M2M services and its performance evaluations
DEBS '15: Proceedings of the 9th ACM International Conference on Distributed Event-Based SystemsThis paper describes a scalable complex event processing (CEP) system and rule allocation algorithm for large-scale M2M services and presents the results of its performance evaluations. Platforms providing M2M services deal with various data from ...
Predictive complex event processing: a conceptual framework for combining complex event processing and predictive analytics
BCI '12: Proceedings of the Fifth Balkan Conference in InformaticsComplex Event Processing deals with the detection of complex events based on rules and patterns defined by domain experts. Many complex events require real-time detection in order to have enough time for appropriate reactions. However, there are several ...
Intelligent M2M
Event-driven software architecture of decision support systems for M2M is proposed.Complex event processing serves as key technology for intelligent M2M systems.General architecture defines M2M-specific domain, event and state models.Machine data is ...
Comments