Latency-aware Placement of Stream Processing Operators

Raphael Ecker, Vasileios Karagiannis, Michael Sober (Speaker), Elmira Ebrahimi, Stefan Schulte

Research output: Chapter in Book or Conference ProceedingsConference Proceedings with Oral Presentationpeer-review

53 Downloads (Pure)

Abstract

The rise of the Internet of Things and Fog computing has increased substantially the number of interconnected devices at the edge of the network. As a result, a large amount of computations is now performed in the fog generating vast amounts of data. To process this data in near real time, stream processing is typically employed due to its efficiency in handling continuous streams of information in a scalable manner. However, most stream processing approaches do not consider the underlying network devices as candidate resources for processing data. Moreover, many existing works do not take into account the incurred network latency of performing computations on multiple devices in a distributed way. Consequently, the fog computing resources may not be fully exploited by existing stream processing approaches. To avoid this, we formulate an optimization problem for utilizing the existing fog resources, and we design heuristics for solving this problem efficiently. Furthermore, we integrate our heuristics into Apache Storm, and we perform experiments that show latency-related benefits compared to alternatives.
Original languageEnglish
Title of host publicationInternational Workshop on Scalable Compute Continuum (WSCC 2023)
PublisherSpringer
Pages1-12
Number of pages12
Publication statusAccepted/In press - 2023
EventInternational Workshop on Scalable Compute Continuum (WSCC 2023) - Limassol, Cyprus, Cyprus, Greece
Duration: 29 Aug 202329 Aug 2023

Workshop

WorkshopInternational Workshop on Scalable Compute Continuum (WSCC 2023)
Country/TerritoryGreece
CityCyprus
Period29/08/2329/08/23

Research Field

  • Enabling Digital Technologies

Fingerprint

Dive into the research topics of 'Latency-aware Placement of Stream Processing Operators'. Together they form a unique fingerprint.

Cite this