Vous êtes sur la page 1sur 4

A Survey On Emerging Technologies: IoT,Data

Analytics, Capacity Planning, Cloud Computing


Jayraj Dave
Institute Of Engineering & Technology, Ahmedabad University
Ahmedabad, India
Email: jayrajdave3110@gmail.com

AbstractOver the past few years, the world is being introduced to the fascinating emerging technologies such as IoT (And
Security), Cloud Computing, Data Analytics. Internet of Things is
the network of embedded devices (sensors,actuators,etc.) with the
objective of collecting and exchanging data anytime, anywhere,
always. So many connected devices produces large chunks of
data and interaction of data which demands and seeks solution
to cloud technology (Solution to processing large amount of data
with the help of virtual server). Moreover, with the increasing
penetration of Internet in human life, we are producing zetta
bytes of data carrying meaningful insights. Data analytics allows
us to process this raw data, analyze it and come to meaningful
conclusion with opportunities. Providers of all these services (and
others as well) deal with discrepancy of demand and capacity.
Thus, the capacity management is required with the help of
performance modeling.This survey paper covers wide view of all
these emerging technologies and the challenges associated with it.
It is very important to consider the challenges and cost of those
challenges in these emerging technologies, because we are going
to emerge along with these technologies. This paper contains
enlightening view of challenges from which one can have more
insights to the solution to it and to the technology itself.

I. I NTRODUCTION
IoT: It is the network of physical objects embedded with
electronics, actuators, softwares, sensors etc. The objective is
to enable this network of objects to collect and exchange data
with 3As (Always, Anywhere, Anytime) of IoT. The devices
are called thing with environment of Devices, Network
and Application (DNA of Internet). It gives opportunity to
integrate physical world into computer based systems. In
environment, communication systems are embedded with
RFID, WSN, Bluetooth, Wi-Fi and Cloud Technology.
Data Analytics: Data analytics is about processing
raw data, modeling and reaching to meaningful and useful
conclusion that could help in Decision making and strategy
formation. Too many devices connected to network produces
very large chunks of data with hidden perception which
makes it important to process that BIG DATA to get the
insights of a system and to explore new possibilities with the
derived conclusions.

Capacity Planning and Performance modeling:


It
is a process of determining the capacity to deal with
changing demands of products or service level requirements.
Capacity management is widely used term in information

technology and computing business in the context of storage,


infrastructure resources, hardware, software and so on. It
becomes imperative for any organization to determine its own
capability with the changing scenarios in present as well as
for the future. Because Discrepancy between demands and
capacity cause either underutilized resources or unfulfilled
customers.
Types of Capacity planning: 1. Capacity benchmarking, 2.
Capacity trending, 3. Capacity modeling
Advantages of Capacity Planning: Time saving, competitive
edge, risk avoidance, avoiding waste from over-provisioning,
bottlenecks prevention, increasing business productivity
Objectives of capacity planning in IT industry:
1. Finding and re-purposing underutilized infrastructure,
2. Preparing for future (unexpected or forecasted) workloads,
3. Migrating workloads to new IT infrastructure,
4. Ensuring successful server consolidation,
5. Predicting when infrastructure will no longer be able to
service requirements,
6. Determining which workloads can efficiently live together
on the same hardware,
7. Predicting the most cost-effective production configuration
before rolling out a new application,
8. Determining optimum virtual and physical machine
configurations

Cloud Computing: Cloud computing is the solution to


overcome the problem of processing large amounts of data.
It enables ubiquitous, on demand access to shared computing
resources.
Cloud computing models:
1. IaaS (Infrastructure as a service): IaaS providers offer
physical machines on which customer can implement software
solutions. It also provides load balancers, firewalls, software
solutions, etc. Client has to pay for only resources allocated
to them without worrying about hardware maintenance.
2. Paas (Platform as a service): Paas is the most widely used
cloud service as it facilitates the implementation and testing
of software solutions. The resources required by application
gets automatically allocated.
3. Saas (Software as a service): This is the fully configured

solution in terms of hardware and software. Its pay-per-use


in which client has to pay subscription fee.

II. S URVEYED T ECHNOLOGIES


IoT: As per Atzori et al. IoT can be realized in three
paradigms-1. Internet-oriented (middleware), 2. Things
oriented (sensors), 3. Semantic-oriented (Knowledge) .While
using widened horizon of RFID, Pervasive computing, Cyber
physical systems, Li-Fi and Cloud Computing, IoT can
make large impact in key areas such as Home automation,
smart city, Healthcare, security, energy harvesting, Intelligent
logistics, Smart Utilities, etc.
RFID: There are unique tags associated with objects that
uses radiofrequency electromagnetic fields to transfer data
attached to an object. Three configurations of RFID tags: [1]
PRAT (Passive Reader Active Tag) Passive reader receives
signals from battery operated active tags. [2] ARPT [Active
Reader Passive Tag] This widely used type has not onboard
power supply (energy harvesting) [3] ARAT [Active Reader
Active Tag] Tag and reader are active.
NFC: It is nothing but an integration of RFID in mobile
devices with limited range ( 20cm) dependent on antenna
size.
M2M: Heterogeneous access, Sensing, information
processing, application and service are the most advantageous
characteristics of M2M communication which can surely play
major role in development of IoT.
Central Hubs: Due to deploying constraint (in size)
of actuators and sensors, it is difficult to enrich their power
and computational capacity. Moreover, as these individual
devices have limited knowledge about their given context,
it is hard to analyze from such a constrained data. Here,
Central hubs are used having ability of dealing with various
protocols, higher power and computational capacity, storage
and performing data processing and reasoning tasks (e.g.
triggering IF-THEN conditions)
CC3200[1] by Texas Instrumentation is the most popular
IoT gateway in form of single chip MCU for IoT applications
such as Home Automation, access control, internet gateway,
etc.
Fitbit[2] (Wearable device to measure physical activities),
Ivee[3] (Voice assistant for interoperability over other IoT
devices) , nod[4] (gesture control ring to engage with objects
as per user movements), are some of the applications of IoT
in real life.

Data Analytics: 5 Vs for characterization of big data:


Volume, Velocity, Variety, Veracity, Value Data mining is
one of the tools for data analysis used by Facebook, Google,

e-commerce for suggestions and advertisement purposes.


Parameters to determine efficiency of any platform
for data analytics:
1. Scalability
2. Data I/O performance
3. Real time processing
4. Fault tolerance
5. Data size supported
6. Speed or throughput optimization
Capacity Planning and Performance modeling: Recent
EMA survey says, Reclaiming and/or re-purposing hardware
and software that is underutilized was cited as a top priority
by 57 percent of IT executives responding. Performance
modeling is one way to do capacity management
Three steps for Capacity Planning: [1] Determine Service
Level Requirements, [2] Analyze Current Capacity, [3]
Planning for the Future
Key Capacity Planning Value Points: [1] Identify and
repurpose underutilized servers, [2] Reduce server downtime,
[3] Improve IT budget accuracy [4] Reduce IT operational
expenditures
Models and Techniques for Capacity Planning: 1. Present
value analysis: It is used to evaluate time of fund flows
and capital investment. 2. Aggregate planning models: It is
useful to analyze the way of using existing capacity for short
terms 3. Linear programming: it is useful to determine the
optimum 4. TeamQuest (Software) model is widely used for
IT infrastructure capacity planning and to get optimization
insights
Cloud Computing : It provides high scalability, agility,
high availability, reliability and multi sharing.
Three types of cloud deployment
1. Private cloud: High security
2. Public cloud: Open for public
3. Hybrid cloud: Allows to specify the private or public
deployment for data
III. I SSUES & C HALLENGES I N T ECHNOLOGIES
A. Internet Of Things
Vulnerability of Network (Security and Privacy):
Every connected end devices to the network becomes more
vulnerable to unauthentic penetration and exploitation of
network (Especially when it is Internet centric or cloud
centric). The more larger the network is the more vulnerable
it becomes as there can be more probability of having
loopholes in the network
Communication Protocols: IoT talks about very high
number of devices with significantly different domains and
mobility of devices raises issues with standardization of
communication protocols. On other side, application specific
protocols may cause compatibility issues. As mobile devices

are essential part of IoT, need of universal protocols increases.


But application specific protocols gives more flexibility. This
tradeoff is one of the biggest obstacles for IoT when it comes
to heterogeneity and network adaptability of small devices.
Incorporating human behavior into methodology for
feedback control. Outside the loop, inside the controller or
system model are the areas where human model can be
placed along with various levels in hierarchical controls.
Incorporating human model in the system is very crucial
when it comes to healthcare, energy management, automobile,
security and so on.
Firmware updation and compliance with the changes
in the environment or with the constraints are the challenges
which makes IoT too reliable.
Comprehensive Complete understanding of human in
loop controls. Humans in loop applications can be classified
in many categories:
1. Application in which human directly controls the
system,
2. Applications where system monitors humans and takes
proper actions
3. Applications where physiological parameters of humans
are modeled.
Traffic classification and New QoS parameters: The
data traffic generated in IoT will be different from the current
internet traffic and it would be different from each other as
well. So it will be needed to define new QoS parameters for
IoT and categorize that traffic for analyzing to get meaningful
insights along with security.
Synchronization: Large chain of devices in network
requires real time synchronization among them. Power
failure, network traffic, hardware buffer can cause issues with
control and processing of devices leading to avalanche of
failures in terms of data authenticity, time, cost, etc.

B. Data Analytics
Cognitive biased data may lead to unreliable conclusions.
BIG Data comprises of huge chunks of information with lot
of variety. Every bit of information may not be neutral.
Computational capacity and storage: Big Data demands
huge processing power and storage for incoming data as well
as resultant data. Moreover, the response time should be high
(Many organization asks for conclusions within few days of
giving data to data analysts). This real time demand in both
ways is very crucial.
Processing Speed: Requirement of real time data
visualization demands fast processing of huge chunk of
data. Processing speed will be compromised with increasing
rate of big data.
Heterogeneity of data makes it more complex to clean
(preprocessing), processing, modeling and visualization.
In general, the quality of dataset is inversely proportional to
its size. Big data might not always carry meaningful insights.
Huge data volume, huge variety and high velocity of data are
major issues with Big data
No guarantee of 100 percent accurate conclusions (Or
predication). Because of stochastic nature of real world,
conclusions might not be absolutely reliable (e.g. Weather
forecasting, election results based on social media activities
of voters)

? Cost of Challanges:
Inaccurate conclusion through DA may do large impact on
its applications. Reliability could be at stake when the data
is untrustworthy or because of the faulty processing of BIG
DATA.
Huge data sets makes every relationship significant which
could affect the probability of hypothesis testing.One of the
Vs in BIG DATA is variety. The more variables are there
in the data makes it very difficult to model and come to a
concrete conclusion.

C. Capacity Planning/ Performance Modelling

? Cost of Challanges:
Vulnerability of network and synchronization issues largely
impacts on security and reliability of IoT.
Issues with communication protocols raises questions on universal acceptance of IoT because of the residing compatibility
issues
Human-in-loop incorporation could be very crucial when
it comes to health care,pervasive surgery, automobile. Dependency is at stake as the system is not programmed to deal with
change or learn effectively covering all the permutation and
combination.

Accurate statistical modeling of service level requirements


is difficult to determine. (Especially for large organization the
traffic is very stochastic in nature. e.g. Flipkarts fiasco on Big
billion day (Diwali) in India. Amazon being very experienced
competitor in the race replicated the same mistake in India
more or less).
Forecasting accurate future resource utilization is difficult
because of random and inconsistent change in demand. The
demand depends on too many uncontrollable factors which
makes it very difficult to have deterministic and reliable
model for future service level requirements
Inconsistent resource utilization will always be major issue
for capacity management. Even if performance modeling is
done successfully, there will always be randomness in the
utilization. This becomes truer for large

? Cost of Challanges:
Unreliable future forecasting of demand or service
level requirements may lead to unnecessary and huge
investments, causing compromised spending in other
necessary development. 90 percent of real time traffic is
Markovian distributed which could lead to nondeterministic
performance modeling. There will always be trade-off
between the different solution approach between technology
view and business view. These two different approaches could
create compromised system level investments.

D. Cloud Computing
Security and privacy of data is major concern on two
levels. On user side as well as on the service provider
(Storage side). Both ends are vulnerable to the security threat.
(e.g. leaked celebrity images from Apple iCloud on 31ts
August, 2014)
Performance and bandwidth cost: Cloud computing demands
very high bandwidth becuase of the virtual server are involved
as far as storage is concerned. Moreover, in Public cloud
too many users accessing simultaneously requires very high
bandwidth.
Software licensing. Companies have to allow their customers
to use the software in cloud environment. Companies can
either sale their product in environment which is dependent
on the number of machines or can use Cloud licensing asking
for verification by vendors.
Government regulations (Migration of BI solutions of
companies to a cloud infrastructure outside the border)

? Cost of Challanges:
Money can be saved on business maintenance but for
data-intensive applications money needed for bandwidth is
high. Applications which collects or exchange huge data
requires high bandwidth for less response time and Qos.
In order to make cloud more secured (Which is required)
the access time decreases. As cloud is huge network,
the layered security approach could be one option.Thus,
query goes through different security requirements (firewall,
encryption,decryption, 2-3 step verification processes). These
security requirements decreases the access time of the service.

R EFERENCES
[1] Perera, Charith, et al. A survey on internet of things from industrial
market perspective. Access, IEEE 2 (2014): 1660-1679.
[2] John A. Stankovic Research Directions for the Internet of Things.
IEEE

[3] Gubbi, Jayavardhana, et al. Internet of Things (IoT): A vision,


architectural elements, and future directions. Future Generation
Computer Systems 29.7 (2013): 1645-1660.
[4] Tole, Alexandru Adrian. Cloud Computing and Business Intelligence.
Database Systems Journal 5.4 (2015): 49-58.
[5] Zanella, Andrea, et al. Internet of things for smart cities. Internet of
Things Journal, IEEE 1.1 (2014): 22-32.
[6] Atzori, Luigi, Antonio Iera, and Giacomo Morabito. The internet of
things: A survey. Computer networks 54.15 (2010): 2787-2805.
[7] Rich, J., and J. Hill. How to Do Capacity Planning. (2013).
[8] Predictor, Performance. TeamQuest. (2014).

Vous aimerez peut-être aussi