skip to main content
10.1145/2908446.2908497acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfosConference Proceedingsconference-collections
research-article

Dimensioning and Capacity Planning Framework for Large Scale M2M Complex Event Processing

Published: 09 May 2016 Publication History

Abstract

Machine to Machine (M2M) is one of the evolving technologies that is employed in many business verticals such as banking, automotive, security, healthcare, and manufacturing. M2M devices communicates with the backend applications through the telecom network in order to exchange information. As a result of the wide deployment of M2M devices, the telecom network generates a large number of events that represents the traffic data (uplink and downlink volumes, session duration, charging related information, etc.). Those events have to be processed (collected, correlated, aggregated, formatted, encoded) and distributed to the destination Business Support Systems (BSS) for billing and reporting purposes. The Complex Event Processing (CEP) system making such processing is called Convergent Mediation. With the increase of M2M deployment and traffic, careful capacity planning and dimensioning is required to early prevent any capacity problem.
This work tackles this problem by proposing a framework for M2M capacity and dimensioning. It starts with the factors impacting the processing such as processing window then defines different processes and the resources required for those processes and how to make dimensioning for them.

References

[1]
Elias, Y., Abdullah. K., Adnan. A, "An Energy-Efficient M2M Communication Method for Leakage Detection in Underground Water Pipes", "Q2SWinet '12 Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks", NY, USA, (Oct. 2012), 27--32.
[2]
Vodafone M2M, 2016, {Online}, www.vodafone.com/business/m2m/world-leading-solutions
[3]
3GPP TS 32.298, 3rd Generation Partnership Project, Charging Data Record Parameter CDR {Online}, ftp://www.3gpp.org/tsg_sa/WG5_TM/TSGS5_70/_specs_for_checking/32298-880.doc
[4]
Shafiq. M.Z, Lusheng Ji; Liu, A.X.; Pang, J.; Jia Wang 2013, "Large Scale Measurement and Characterization of Cellular machine-to machine Traffic", "IEEE/ACM Transaction on Networking (TON), NY, USA, (2013), Vol. 21, Issue 6, (Dec. 2013), 960--1973.
[5]
Cisco, San Jose, CA, USA, "Cisco visual networking index: Global mobile data traffic forecast update," White Paper, 2012
[6]
Bouillet, Y., Kothari, R., Kumanr, V., Mignet, L., Nathan, S., Ranganathan, A., Turaga, D., Udrea, O., Verscheure, O., "Processing 6 Billion CDRs/day: From research to production (experience report)","DEBS '12, Proceeding of the 6th ACM International Conference on Distributed Event-Based Systems", NY, USA, (2012), 246--267.
[7]
Kobayashi, Y., Isoyama, K., Koji, K., Tagato, H., "A Complex Event Processing for Large-Scale M2M Services and Its Performance Evaluation", "DEBS' 15: Proceeding of the 9th ACM International Conference on Distributed Event-Based Systems", NY, USA, (2015), 336--339.
[8]
Stojanovic, N., Xu, Y., Nissatech, B., Stojanovic, L., "Mobile CEP architecture: from intelligence sensing to collaborative monitoring", "DEBS' 14: Proceeding of the 8th ACM International Conference on Distributed Event-Based Systems", NY, USA, (2014), 350--353.
[9]
Turchin, Y., Gal, Y., Wasserkrug, S., "Tuning complex event processing rules using the prediction-correction paradigm", "DEBS '09 Proceedings of the Third ACM International Conference on Distributed Event-Based Systems", NY, USA, (2009), Article No. 10.
[10]
Koldehofe, B., Mayer, R., Ramachandran, U., Rothermel, K., Volz, M., "Rollback-recovery without checkpoints in distributed event processing systems", "DEBS '13 Proceedings of the 7th ACM international conference on Distributed event-based systems", NY, USA, (2013), 27--38.
[11]
Baumgartner, L., Strack, C., Hobbach, B., Seidemann, M., Seeger, B., Freisleben, B., "Complex event processing for reactive security monitoring in virtualized computer systems", "Complex event processing for reactive security monitoring in virtualized computer systems", (2015), 22--33.
[12]
Understanding Disk I/O -- When Should Be Worried?, 2016, {Online}, http://blog.scoutapp.com/articles/2011/02/10/understanding-disk-i-o-when-should-you-be-worried
[13]
An Explanation of IOPS and Latency, 2016, {Online}, http://recoverymonkey.org/2012/07/26/an-explanation-of-iops-and-latency/
[14]
Understanding I/O Request or Block Size, {Online}, http://www.dhillonblog.com/2014/07/understanding-io-request-block-size/

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
INFOS '16: Proceedings of the 10th International Conference on Informatics and Systems
May 2016
347 pages
ISBN:9781450340625
DOI:10.1145/2908446
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 May 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CEP
  2. Capacity
  3. Complex Event Processing
  4. Dimensioning
  5. M2M
  6. Machine to machine

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

INFOS '16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 41
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media