skip to main content
10.1145/2908446.2908497acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfosConference Proceedingsconference-collections
research-article

Dimensioning and Capacity Planning Framework for Large Scale M2M Complex Event Processing

Published:09 May 2016Publication History

ABSTRACT

Machine to Machine (M2M) is one of the evolving technologies that is employed in many business verticals such as banking, automotive, security, healthcare, and manufacturing. M2M devices communicates with the backend applications through the telecom network in order to exchange information. As a result of the wide deployment of M2M devices, the telecom network generates a large number of events that represents the traffic data (uplink and downlink volumes, session duration, charging related information, etc.). Those events have to be processed (collected, correlated, aggregated, formatted, encoded) and distributed to the destination Business Support Systems (BSS) for billing and reporting purposes. The Complex Event Processing (CEP) system making such processing is called Convergent Mediation. With the increase of M2M deployment and traffic, careful capacity planning and dimensioning is required to early prevent any capacity problem.

This work tackles this problem by proposing a framework for M2M capacity and dimensioning. It starts with the factors impacting the processing such as processing window then defines different processes and the resources required for those processes and how to make dimensioning for them.

References

  1. Elias, Y., Abdullah. K., Adnan. A, "An Energy-Efficient M2M Communication Method for Leakage Detection in Underground Water Pipes", "Q2SWinet '12 Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks", NY, USA, (Oct. 2012), 27--32, DOI: http://dx.doi.org/10.1145/2387218.2387224 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Vodafone M2M, 2016, {Online}, www.vodafone.com/business/m2m/world-leading-solutionsGoogle ScholarGoogle Scholar
  3. 3GPP TS 32.298, 3rd Generation Partnership Project, Charging Data Record Parameter CDR {Online}, ftp://www.3gpp.org/tsg_sa/WG5_TM/TSGS5_70/_specs_for_checking/32298-880.docGoogle ScholarGoogle Scholar
  4. Shafiq. M.Z, Lusheng Ji; Liu, A.X.; Pang, J.; Jia Wang 2013, "Large Scale Measurement and Characterization of Cellular machine-to machine Traffic", "IEEE/ACM Transaction on Networking (TON), NY, USA, (2013), Vol. 21, Issue 6, (Dec. 2013), 960--1973, DOI: http://dx.doi.org/10.1109/TNET.2013.2256431 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cisco, San Jose, CA, USA, "Cisco visual networking index: Global mobile data traffic forecast update," White Paper, 2012Google ScholarGoogle Scholar
  6. Bouillet, Y., Kothari, R., Kumanr, V., Mignet, L., Nathan, S., Ranganathan, A., Turaga, D., Udrea, O., Verscheure, O., "Processing 6 Billion CDRs/day: From research to production (experience report)","DEBS '12, Proceeding of the 6th ACM International Conference on Distributed Event-Based Systems", NY, USA, (2012), 246--267. DOI: http://dx.doi.org/10.1145/2335484.2335513 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kobayashi, Y., Isoyama, K., Koji, K., Tagato, H., "A Complex Event Processing for Large-Scale M2M Services and Its Performance Evaluation", "DEBS' 15: Proceeding of the 9th ACM International Conference on Distributed Event-Based Systems", NY, USA, (2015), 336--339, DOI: http://dx.doi.org/10.1145/2675743.2776771 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Stojanovic, N., Xu, Y., Nissatech, B., Stojanovic, L., "Mobile CEP architecture: from intelligence sensing to collaborative monitoring", "DEBS' 14: Proceeding of the 8th ACM International Conference on Distributed Event-Based Systems", NY, USA, (2014), 350--353, DOI: http://dx.doi.org/10.1145/2611286.2611322 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Turchin, Y., Gal, Y., Wasserkrug, S., "Tuning complex event processing rules using the prediction-correction paradigm", "DEBS '09 Proceedings of the Third ACM International Conference on Distributed Event-Based Systems", NY, USA, (2009), Article No. 10, DOI: http://dx.doi.org/10.1145/1619258.1619272 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Koldehofe, B., Mayer, R., Ramachandran, U., Rothermel, K., Volz, M., "Rollback-recovery without checkpoints in distributed event processing systems", "DEBS '13 Proceedings of the 7th ACM international conference on Distributed event-based systems", NY, USA, (2013), 27--38, DOI: http://dx.doi.org/10.1145/2488222.2488259 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Baumgartner, L., Strack, C., Hobbach, B., Seidemann, M., Seeger, B., Freisleben, B., "Complex event processing for reactive security monitoring in virtualized computer systems", "Complex event processing for reactive security monitoring in virtualized computer systems", (2015), 22--33, DOI: http://dx.doi.org/10.1145/2675743.2771829 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Understanding Disk I/O -- When Should Be Worried?, 2016, {Online}, http://blog.scoutapp.com/articles/2011/02/10/understanding-disk-i-o-when-should-you-be-worriedGoogle ScholarGoogle Scholar
  13. An Explanation of IOPS and Latency, 2016, {Online}, http://recoverymonkey.org/2012/07/26/an-explanation-of-iops-and-latency/Google ScholarGoogle Scholar
  14. Understanding I/O Request or Block Size, {Online}, http://www.dhillonblog.com/2014/07/understanding-io-request-block-size/Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    INFOS '16: Proceedings of the 10th International Conference on Informatics and Systems
    May 2016
    347 pages
    ISBN:9781450340625
    DOI:10.1145/2908446

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 9 May 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader