SlideShare a Scribd company logo
Sponsored by:
EETimes University Course:
Mastering IoT Design: Sense, Process, Connect
Day 2: Processing: Turning IoT Data into Intelligence
Presented by:
Deepak Shankar
Founder and Vice President, Technology
Mirabilis Design Inc.
1
Sponsored by:
Our Speaker:
2
Deepak Shankar
Founder and Vice President, Technology
Mirabilis Design Inc.
Sponsored by:
Agenda
Introduction to processing at
Edge Computing
Trends
Challenges
Case Study and Analysis
Conclusion
3
Sponsored by:
Enabling Data Center Connected Devices
• 50 billion IoT devices generate 79.4ZB requires
– Huge bandwidth
– Massive and expensive cloud processing
– 99.999% reliability
– Cybersecurity
– Variable response latency
• Solution: Edge Computing
– Process and analyze data locally
– Make instant decisions
• Applications that benefit from Edge Computing
– Safety, health care, security, autonomous vehicles,
smart cities
– Manufacturing, VR, AR, stream services, customer care
– Smart homes
4
Sponsored by:
Architecture of Edge Computing
• Edge computing is at the
outermost edge of network
• Sensor data is collected,
filtered, compressed, and
encrypted locally and a
small quantity is sent to the
cloud
• Network transfer can be
done in batch or offline
• Increases the number of
processing layers
• Server location is critical
• Tracking and diagnostic is
critical and adds layers
5
Sponsored by:
Trends
• Edge gateway separates the processing and end-point
– Increases the battery life of the connected devices
– Add more sensors and trackers at the device
• Example
– Smart electricity meters generate lots of measurements at short intervals
– Using data from temperature, light and other sensors, Edge Computing can respond to
environment changes quickly, reducing operational cost and increasing comfort
• Filtering edge data reduces cloud transfers, which increases battery life
• Example
– Mercedes AMG F1 team filters less valuable telemetry and transfers relevant data for offline
processing
6
Sponsored by:
Trends
• There is no “single” edge
– Depending on the application, the edge architecture will be different
– Manufacturing plant [Edge servers and gateways aggregate multiple
servers and devices in a distributed location]
– Telecommunications provider [architectures break down into a provider far
edge, a provider access edge, and a provider aggregation edge]
• Edge computing doesn’t need to be connected
– An edge device running autonomously in a hard-to-reach place like a rural
mining site can keep running when a connection drops
– When connection resumes, the system can sync and transfer data
7
Sponsored by:
Computing Trends
• Edge is getting “foggy”
– Fog computing adds a new filtering layer
– Example
• Temperature sensor generates data every one second
• With fog layer, data that meet the metrics are sent to cloud
• Advanced communication and AI technology enable mass
connection
– Wi-Fi 6 and 5G/6G covers most edge devices
– About 99.4% of the physical objects are still unconnected
8
Sponsored by:
Challenges
• Latency (Response times)
– Applications, like the health care, financial transactions, and automotive
cannot tolerate latency
– Stringent requirements need to be met and thus the components need to be
selected to meet such needs
• Bandwidth
– Applications, like Smart surveillance systems and traffic management,
require significant bandwidth
– Buffer overflow, retransmissions can severely affect application performance
9
Sponsored by:
Challenges
• Edge has same cyber risk as any other local network
server
– “AT&T Cybersecurity Insights report: Securing the Edge” found
that 74% of businesses have been compromised
– Sniffing attacks, DDoS, supply chain attacks, etc.
• Power
– Edge servers rely on battery as their primary power source
– IoT device batteries are not easily replaceable
• Fire alarm sensors, underwater sensors, wildlife tracking devices,
medical implants, space and satellite devices
10
Sponsored by:
Designing Edge Computing Requires Early Architecture
Planning
• Early system model can eliminate bottlenecks and measure
– Processing requirements
– Expected application latency
– Required bandwidth for seamless operation
– Power profile of the edge devices
– Behavior of the system under different failure conditions and threats
• To enable this, the system modeling solution requires IP libraries and
simulators for hardware, software, and network
– VisualSim Architect from Mirabilis Design ticks all the boxes
Sponsored by:
Why is System Performance Exploration Required?
Scheduling/Arbitration
proportional
share
WFQ
static
dynamic
fixed priority
EDF
TDMA
FCFS
Communication Templates
Architecture # 1 Architecture # 2
Computation Templates
DSP
AI
GPU
DRAM
CPU
FPGA
m
E
DSP
TDMA
Priority
EDF
WFQ
RISC
DSP
LookUp
Cipher
AI DS
P
CPU
GP
U
mE DD
R
static
Which architecture is better suited
for our application?
12
Sponsored by:
Block Diagram of Data-Enabled Application
Device 1
AFE
ARM/
RISC-V
core
BLE/
Wifi/ 5G
Radio
Transceiv
er
Network
Hub
[Edge Gateways
+ Fog layers]
Data
Center
Sponsored by:
IoT to Data Center Model
• Power consumption of each
device
• Optimal HW and SW
configuration to meet the end-to-
end application timing deadline
• Performance with Big data and
fast data workloads
14
Sponsored by:
Architect Hardware-Software of Edge Device
DRAM
Display
IO
A
M
B
A
A
X
I
B
u
s
CPU
GPU
Display
Ctrl
P
C
I
e
Video Camera SRAM
Packet
• System Overview
– Camera: 30fps, VGA corresponds
– CPU: Multi-core ARM Cortex-A53 1.2GHz
– GPU: 64Cores(8Warps×8PEs), 32Threads,
1GHz
– DisplayCtrl: DisplayBuffer 293,888Byte
– SRAM: SDR, 64MB, 1.0GHz
– DRAM: DDR3, 64MB, 2.4GHz
Explore at the board- and semiconductor-level to size uP/GPU, memory bandwidth and bus/switch configuration
15
Sponsored by:
Conducting Architecture Trade-off
• By changing the amount of video input data (packet numbers), observe the SRAM -> DRAM
transfer performance and examine the upper limit performance of the video input that the
system can tolerate. 210 packets/s
12ms
21 packets/s
414us
300 packets/s
• 250 packets/s is the system limit
• With 300 packets/s, simulation cannot
be executed due to FIFO buffer
overflow.
16
Sponsored by:
Compare Edge Compute System using ARM vs RISC-V
Processors
Using ARM Cores Using RISC-V Cores
NOTE: Depending on the application profile run, the performance and power observed would
vary
• Compare application latency with and without custom instructions tailored for AI
and data filtering
• Average power consumption in different scenarios
17
Sponsored by:
Selecting Network Interface to Data Center
Using 1000 Mbps links 1000 Mbps link + Edge Processing (Single- and multi-core)
Sizing of network resources to Edge devices is important to get optimal performance
18
Sponsored by:
Bluetooth (BLE) Power State Transition (FSM)
• Depending on the
abstraction required,
the subsystems can
be built with great
details
• Here, Bluetooth
module has been
modeled with all the
state transition
details
19
Sponsored by:
Resource usage
extremely high due
to continued high
traffic levels
Security against DDoS Attack on Edge and Networks
A DDoS attack involves multiple
connected devices, collectively
known as a botnet, which are used to
overwhelm a target vehicle with
fake/malicious traffic.
• Virtually emulating the system behavior using DDoS attack technique
• Simulation methodology is designed to test automotive systems for cybersecurity
and safety that are under development
• Undertake Risk Assessment on network simulation to predict how the interaction of
restrictions and behavior may affect overall network hygiene
• Moreover, testing multiple potential settings can aid in finding a near-optimal
configuration for restrictions
• The above design analyzes the overall throughput and latency on the network under
attack.
High Delay in processing
request result in low
throughput
What is
DDoS?
DDoS Attack
Outcomes ?
Analyze the
System Design
and find best
optimal
configuration
High Resource Usage
due to Attacks on On-
Board Units. Unable to
discern between normal
and attack traffic
OB
U
Diagnostic
20
Sponsored by:
Failure and Cybersecurity Threat Analysis
Normal Operation Under Attack
Effective
throughput is
reduced and
significant bursts
in response times
are observed
21
Sponsored by:
Evaluate Bottlenecks and Security Threats
Stable
Response
Time
Malicious Devices are Blacklisted
Without
Firewall
With
Firewall
22
22
Sponsored by:
Edge Computing Architecture is Key for Data Intelligence
• System exploration must be performed during the planning stage
• Distribution of processing to IoT, edge, fog, and data center must
be based on the application requirements
• Edge, Network, and IoT System specification must be fully
validated for both power-performance and failure-security
• Data size, processing needs, and software tasks must be
determined in advance
• System must be scalable for future requirements
• Edge computing is the Future
Sponsored by:
About Mirabilis Design
Software Company based in Silicon Valley
Integrates Model-based Systems Engineering with the electronics
development flow
Development and Support Centers
USA, India, China, South Korea, Japan and Europe
VisualSim Architect - Modeling and Simulation Software
Graphical modeling, multi-domain simulator, system-level IP, analysis tools and
open API
Market Segments
Semiconductors, Automotive and, Aerospace and Defense
Design Enablement
Architecture trade-offs, system validation, early functional testing and
communication
Networking
24
Sponsored by:
Q&A
25

More Related Content

Similar to Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data into Intelligence (20)

PDF
Emerging Computing Architectures
Daniel Holmberg
 
PDF
5G Edge Computing Whitepaper, FCC Advisory Council
DESMOND YUEN
 
PPTX
Edge Computing & AI
Paul O'Hagan
 
PPTX
External SEDC cussadasdasdsadtomer brief.pptx
dusanheliant
 
PPTX
Edge Comp.pptx
MAHESHM920393
 
PDF
Edge Computing for the Industry
William Liang
 
PPTX
Edge Artificial Intelligence Seminar Presentation.pptx
UMASIKAMANI1
 
PPTX
A theory on basics of edge computing notes
RajeshYadav710264
 
PDF
Future of Edge Computing in Mobility Systems
Narayanan Subramaniam
 
PPTX
Building an Edge Computing Strategy - Distributed infrastructure.pptx
Mandakini Kumari
 
PPTX
What is Edge Computing and Why does it matter in IoT?
Sameer Ahmed
 
PPTX
Arpan pal icdcn
Arpan Pal
 
PPTX
Lecture_IIITD.pptx
achakracu
 
PPTX
Download Adobe XD Pro Crack Full Version 2025
beenachuhdri
 
PPTX
Microsoft Office 2021-2024 Professional Plus Crack Free
choudhryrobii
 
PPTX
Topaz Video Enhance AI + Crack Download (Latest)
robinaworknsolution
 
PPTX
Office 2013-2024 C2R Install v7.7.7.7 r25 + Lite Version
naveedbeena68
 
PPTX
Adobe Media Encoder 2025 v25.1.0 WIN Crack Pro Latest
robinaworknsolution
 
PPTX
Wondershare Filmora Crack 14.3.2.11147 Latest
choudhryrobii
 
PPTX
Topaz Video Enhance AI 4.0.7 + Crack Download [Latest]
alinaveedwns
 
Emerging Computing Architectures
Daniel Holmberg
 
5G Edge Computing Whitepaper, FCC Advisory Council
DESMOND YUEN
 
Edge Computing & AI
Paul O'Hagan
 
External SEDC cussadasdasdsadtomer brief.pptx
dusanheliant
 
Edge Comp.pptx
MAHESHM920393
 
Edge Computing for the Industry
William Liang
 
Edge Artificial Intelligence Seminar Presentation.pptx
UMASIKAMANI1
 
A theory on basics of edge computing notes
RajeshYadav710264
 
Future of Edge Computing in Mobility Systems
Narayanan Subramaniam
 
Building an Edge Computing Strategy - Distributed infrastructure.pptx
Mandakini Kumari
 
What is Edge Computing and Why does it matter in IoT?
Sameer Ahmed
 
Arpan pal icdcn
Arpan Pal
 
Lecture_IIITD.pptx
achakracu
 
Download Adobe XD Pro Crack Full Version 2025
beenachuhdri
 
Microsoft Office 2021-2024 Professional Plus Crack Free
choudhryrobii
 
Topaz Video Enhance AI + Crack Download (Latest)
robinaworknsolution
 
Office 2013-2024 C2R Install v7.7.7.7 r25 + Lite Version
naveedbeena68
 
Adobe Media Encoder 2025 v25.1.0 WIN Crack Pro Latest
robinaworknsolution
 
Wondershare Filmora Crack 14.3.2.11147 Latest
choudhryrobii
 
Topaz Video Enhance AI 4.0.7 + Crack Download [Latest]
alinaveedwns
 

More from Deepak Shankar (20)

PPTX
Simulating Auto Systems & E/E Architectures for Power and Performance using V...
Deepak Shankar
 
PPTX
Mirabilis Design- NoC Webinar- 15th-Oct 2024
Deepak Shankar
 
PPTX
Mirabilis_Presentation_SCC_July_2024.pptx
Deepak Shankar
 
PPTX
Mirabilis Design | Chiplet Summit | 2024
Deepak Shankar
 
PPTX
Mirabilis_Presentation_DAC_June_2024.pptx
Deepak Shankar
 
PPTX
How to achieve 95%+ Accurate power measurement during architecture exploration?
Deepak Shankar
 
PPTX
Mirabilis_Design AMD Versal System-Level IP Library
Deepak Shankar
 
PPTX
Modeling Abstraction
Deepak Shankar
 
PPTX
Accelerated development in Automotive E/E Systems using VisualSim Architect
Deepak Shankar
 
PPTX
Evaluating UCIe based multi-die SoC to meet timing and power
Deepak Shankar
 
PDF
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
Deepak Shankar
 
PPTX
Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021
Deepak Shankar
 
PPTX
Energy efficient AI workload partitioning on multi-core systems
Deepak Shankar
 
PPTX
Capacity Planning and Power Management of Data Centers.
Deepak Shankar
 
PPTX
Automotive network and gateway simulation
Deepak Shankar
 
PPTX
Introduction to architecture exploration
Deepak Shankar
 
PPTX
Using ai for optimal time sensitive networking in avionics
Deepak Shankar
 
PPTX
Designing memory controller for ddr5 and hbm2.0
Deepak Shankar
 
PPTX
Task allocation on many core-multi processor distributed system
Deepak Shankar
 
PPTX
Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...
Deepak Shankar
 
Simulating Auto Systems & E/E Architectures for Power and Performance using V...
Deepak Shankar
 
Mirabilis Design- NoC Webinar- 15th-Oct 2024
Deepak Shankar
 
Mirabilis_Presentation_SCC_July_2024.pptx
Deepak Shankar
 
Mirabilis Design | Chiplet Summit | 2024
Deepak Shankar
 
Mirabilis_Presentation_DAC_June_2024.pptx
Deepak Shankar
 
How to achieve 95%+ Accurate power measurement during architecture exploration?
Deepak Shankar
 
Mirabilis_Design AMD Versal System-Level IP Library
Deepak Shankar
 
Modeling Abstraction
Deepak Shankar
 
Accelerated development in Automotive E/E Systems using VisualSim Architect
Deepak Shankar
 
Evaluating UCIe based multi-die SoC to meet timing and power
Deepak Shankar
 
ROLE OF DIGITAL SIMULATION IN CONFIGURING NETWORK PARAMETERS
Deepak Shankar
 
Compare Performance-power of Arm Cortex vs RISC-V for AI applications_oct_2021
Deepak Shankar
 
Energy efficient AI workload partitioning on multi-core systems
Deepak Shankar
 
Capacity Planning and Power Management of Data Centers.
Deepak Shankar
 
Automotive network and gateway simulation
Deepak Shankar
 
Introduction to architecture exploration
Deepak Shankar
 
Using ai for optimal time sensitive networking in avionics
Deepak Shankar
 
Designing memory controller for ddr5 and hbm2.0
Deepak Shankar
 
Task allocation on many core-multi processor distributed system
Deepak Shankar
 
Introduction to Architecture Exploration of Semiconductor, Embedded Systems, ...
Deepak Shankar
 
Ad

Recently uploaded (20)

PPTX
OCS353 DATA SCIENCE FUNDAMENTALS- Unit 1 Introduction to Data Science
A R SIVANESH M.E., (Ph.D)
 
PPTX
Numerical-Solutions-of-Ordinary-Differential-Equations.pptx
SAMUKTHAARM
 
PPTX
Biosensors, BioDevices, Biomediccal.pptx
AsimovRiyaz
 
PPTX
MODULE 05 - CLOUD COMPUTING AND SECURITY.pptx
Alvas Institute of Engineering and technology, Moodabidri
 
PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PDF
mbse_An_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
PDF
3rd International Conference on Machine Learning and IoT (MLIoT 2025)
ClaraZara1
 
PDF
aAn_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
PPTX
澳洲电子毕业证澳大利亚圣母大学水印成绩单UNDA学生证网上可查学历
Taqyea
 
PPTX
Knowledge Representation : Semantic Networks
Amity University, Patna
 
PDF
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
PDF
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
PPTX
Water Resources Engineering (CVE 728)--Slide 4.pptx
mohammedado3
 
PDF
SERVERLESS PERSONAL TO-DO LIST APPLICATION
anushaashraf20
 
PPTX
Final Major project a b c d e f g h i j k l m
bharathpsnab
 
PPTX
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
PPTX
Water Resources Engineering (CVE 728)--Slide 3.pptx
mohammedado3
 
PPTX
MODULE 03 - CLOUD COMPUTING AND SECURITY.pptx
Alvas Institute of Engineering and technology, Moodabidri
 
PPTX
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
PPTX
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
OCS353 DATA SCIENCE FUNDAMENTALS- Unit 1 Introduction to Data Science
A R SIVANESH M.E., (Ph.D)
 
Numerical-Solutions-of-Ordinary-Differential-Equations.pptx
SAMUKTHAARM
 
Biosensors, BioDevices, Biomediccal.pptx
AsimovRiyaz
 
MODULE 05 - CLOUD COMPUTING AND SECURITY.pptx
Alvas Institute of Engineering and technology, Moodabidri
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
mbse_An_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
3rd International Conference on Machine Learning and IoT (MLIoT 2025)
ClaraZara1
 
aAn_Introduction_to_Arcadia_20150115.pdf
henriqueltorres1
 
澳洲电子毕业证澳大利亚圣母大学水印成绩单UNDA学生证网上可查学历
Taqyea
 
Knowledge Representation : Semantic Networks
Amity University, Patna
 
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
Water Resources Engineering (CVE 728)--Slide 4.pptx
mohammedado3
 
SERVERLESS PERSONAL TO-DO LIST APPLICATION
anushaashraf20
 
Final Major project a b c d e f g h i j k l m
bharathpsnab
 
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
Water Resources Engineering (CVE 728)--Slide 3.pptx
mohammedado3
 
MODULE 03 - CLOUD COMPUTING AND SECURITY.pptx
Alvas Institute of Engineering and technology, Moodabidri
 
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
Ad

Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data into Intelligence

  • 1. Sponsored by: EETimes University Course: Mastering IoT Design: Sense, Process, Connect Day 2: Processing: Turning IoT Data into Intelligence Presented by: Deepak Shankar Founder and Vice President, Technology Mirabilis Design Inc. 1
  • 2. Sponsored by: Our Speaker: 2 Deepak Shankar Founder and Vice President, Technology Mirabilis Design Inc.
  • 3. Sponsored by: Agenda Introduction to processing at Edge Computing Trends Challenges Case Study and Analysis Conclusion 3
  • 4. Sponsored by: Enabling Data Center Connected Devices • 50 billion IoT devices generate 79.4ZB requires – Huge bandwidth – Massive and expensive cloud processing – 99.999% reliability – Cybersecurity – Variable response latency • Solution: Edge Computing – Process and analyze data locally – Make instant decisions • Applications that benefit from Edge Computing – Safety, health care, security, autonomous vehicles, smart cities – Manufacturing, VR, AR, stream services, customer care – Smart homes 4
  • 5. Sponsored by: Architecture of Edge Computing • Edge computing is at the outermost edge of network • Sensor data is collected, filtered, compressed, and encrypted locally and a small quantity is sent to the cloud • Network transfer can be done in batch or offline • Increases the number of processing layers • Server location is critical • Tracking and diagnostic is critical and adds layers 5
  • 6. Sponsored by: Trends • Edge gateway separates the processing and end-point – Increases the battery life of the connected devices – Add more sensors and trackers at the device • Example – Smart electricity meters generate lots of measurements at short intervals – Using data from temperature, light and other sensors, Edge Computing can respond to environment changes quickly, reducing operational cost and increasing comfort • Filtering edge data reduces cloud transfers, which increases battery life • Example – Mercedes AMG F1 team filters less valuable telemetry and transfers relevant data for offline processing 6
  • 7. Sponsored by: Trends • There is no “single” edge – Depending on the application, the edge architecture will be different – Manufacturing plant [Edge servers and gateways aggregate multiple servers and devices in a distributed location] – Telecommunications provider [architectures break down into a provider far edge, a provider access edge, and a provider aggregation edge] • Edge computing doesn’t need to be connected – An edge device running autonomously in a hard-to-reach place like a rural mining site can keep running when a connection drops – When connection resumes, the system can sync and transfer data 7
  • 8. Sponsored by: Computing Trends • Edge is getting “foggy” – Fog computing adds a new filtering layer – Example • Temperature sensor generates data every one second • With fog layer, data that meet the metrics are sent to cloud • Advanced communication and AI technology enable mass connection – Wi-Fi 6 and 5G/6G covers most edge devices – About 99.4% of the physical objects are still unconnected 8
  • 9. Sponsored by: Challenges • Latency (Response times) – Applications, like the health care, financial transactions, and automotive cannot tolerate latency – Stringent requirements need to be met and thus the components need to be selected to meet such needs • Bandwidth – Applications, like Smart surveillance systems and traffic management, require significant bandwidth – Buffer overflow, retransmissions can severely affect application performance 9
  • 10. Sponsored by: Challenges • Edge has same cyber risk as any other local network server – “AT&T Cybersecurity Insights report: Securing the Edge” found that 74% of businesses have been compromised – Sniffing attacks, DDoS, supply chain attacks, etc. • Power – Edge servers rely on battery as their primary power source – IoT device batteries are not easily replaceable • Fire alarm sensors, underwater sensors, wildlife tracking devices, medical implants, space and satellite devices 10
  • 11. Sponsored by: Designing Edge Computing Requires Early Architecture Planning • Early system model can eliminate bottlenecks and measure – Processing requirements – Expected application latency – Required bandwidth for seamless operation – Power profile of the edge devices – Behavior of the system under different failure conditions and threats • To enable this, the system modeling solution requires IP libraries and simulators for hardware, software, and network – VisualSim Architect from Mirabilis Design ticks all the boxes
  • 12. Sponsored by: Why is System Performance Exploration Required? Scheduling/Arbitration proportional share WFQ static dynamic fixed priority EDF TDMA FCFS Communication Templates Architecture # 1 Architecture # 2 Computation Templates DSP AI GPU DRAM CPU FPGA m E DSP TDMA Priority EDF WFQ RISC DSP LookUp Cipher AI DS P CPU GP U mE DD R static Which architecture is better suited for our application? 12
  • 13. Sponsored by: Block Diagram of Data-Enabled Application Device 1 AFE ARM/ RISC-V core BLE/ Wifi/ 5G Radio Transceiv er Network Hub [Edge Gateways + Fog layers] Data Center
  • 14. Sponsored by: IoT to Data Center Model • Power consumption of each device • Optimal HW and SW configuration to meet the end-to- end application timing deadline • Performance with Big data and fast data workloads 14
  • 15. Sponsored by: Architect Hardware-Software of Edge Device DRAM Display IO A M B A A X I B u s CPU GPU Display Ctrl P C I e Video Camera SRAM Packet • System Overview – Camera: 30fps, VGA corresponds – CPU: Multi-core ARM Cortex-A53 1.2GHz – GPU: 64Cores(8Warps×8PEs), 32Threads, 1GHz – DisplayCtrl: DisplayBuffer 293,888Byte – SRAM: SDR, 64MB, 1.0GHz – DRAM: DDR3, 64MB, 2.4GHz Explore at the board- and semiconductor-level to size uP/GPU, memory bandwidth and bus/switch configuration 15
  • 16. Sponsored by: Conducting Architecture Trade-off • By changing the amount of video input data (packet numbers), observe the SRAM -> DRAM transfer performance and examine the upper limit performance of the video input that the system can tolerate. 210 packets/s 12ms 21 packets/s 414us 300 packets/s • 250 packets/s is the system limit • With 300 packets/s, simulation cannot be executed due to FIFO buffer overflow. 16
  • 17. Sponsored by: Compare Edge Compute System using ARM vs RISC-V Processors Using ARM Cores Using RISC-V Cores NOTE: Depending on the application profile run, the performance and power observed would vary • Compare application latency with and without custom instructions tailored for AI and data filtering • Average power consumption in different scenarios 17
  • 18. Sponsored by: Selecting Network Interface to Data Center Using 1000 Mbps links 1000 Mbps link + Edge Processing (Single- and multi-core) Sizing of network resources to Edge devices is important to get optimal performance 18
  • 19. Sponsored by: Bluetooth (BLE) Power State Transition (FSM) • Depending on the abstraction required, the subsystems can be built with great details • Here, Bluetooth module has been modeled with all the state transition details 19
  • 20. Sponsored by: Resource usage extremely high due to continued high traffic levels Security against DDoS Attack on Edge and Networks A DDoS attack involves multiple connected devices, collectively known as a botnet, which are used to overwhelm a target vehicle with fake/malicious traffic. • Virtually emulating the system behavior using DDoS attack technique • Simulation methodology is designed to test automotive systems for cybersecurity and safety that are under development • Undertake Risk Assessment on network simulation to predict how the interaction of restrictions and behavior may affect overall network hygiene • Moreover, testing multiple potential settings can aid in finding a near-optimal configuration for restrictions • The above design analyzes the overall throughput and latency on the network under attack. High Delay in processing request result in low throughput What is DDoS? DDoS Attack Outcomes ? Analyze the System Design and find best optimal configuration High Resource Usage due to Attacks on On- Board Units. Unable to discern between normal and attack traffic OB U Diagnostic 20
  • 21. Sponsored by: Failure and Cybersecurity Threat Analysis Normal Operation Under Attack Effective throughput is reduced and significant bursts in response times are observed 21
  • 22. Sponsored by: Evaluate Bottlenecks and Security Threats Stable Response Time Malicious Devices are Blacklisted Without Firewall With Firewall 22 22
  • 23. Sponsored by: Edge Computing Architecture is Key for Data Intelligence • System exploration must be performed during the planning stage • Distribution of processing to IoT, edge, fog, and data center must be based on the application requirements • Edge, Network, and IoT System specification must be fully validated for both power-performance and failure-security • Data size, processing needs, and software tasks must be determined in advance • System must be scalable for future requirements • Edge computing is the Future
  • 24. Sponsored by: About Mirabilis Design Software Company based in Silicon Valley Integrates Model-based Systems Engineering with the electronics development flow Development and Support Centers USA, India, China, South Korea, Japan and Europe VisualSim Architect - Modeling and Simulation Software Graphical modeling, multi-domain simulator, system-level IP, analysis tools and open API Market Segments Semiconductors, Automotive and, Aerospace and Defense Design Enablement Architecture trade-offs, system validation, early functional testing and communication Networking 24