Theory vs. Practice in Modeling Edge Storage Systems

08/23/2023
by   Oleg Kolosov, et al.
0

Edge systems promise to bring data and computing closer to the users of time-critical applications. Specifically, edge storage systems are emerging as a new system paradigm, where users can retrieve data from small-scale servers inter-operating at the network's edge. The analysis, design, and optimization of such systems require a tractable model that will reflect their costs and bottlenecks. Alas, most existing mathematical models for edge systems focus on stateless tasks, network performance, or isolated nodes and are inapplicable for evaluating edge-based storage performance. We analyze the capacity-region model - the most promising model proposed so far for edge storage systems. The model addresses the system's ability to serve a set of user demands. Our analysis reveals five inherent gaps between this model and reality, demonstrating the significant remaining challenges in modeling storage service at the edge.

READ FULL TEXT

page 2

page 7

page 8

page 9

research
02/25/2019

Edge Federation: Towards an Integrated Service Provisioning Model

Edge computing is a promising computing paradigm for pushing the cloud s...
research
11/29/2021

A Case for a Programmable Edge Storage Middleware

Edge computing is a fast-growing computing paradigm where data is proces...
research
09/09/2009

Remembrance: The Unbearable Sentience of Being Digital

We introduce a world vision in which data is endowed with memory. In thi...
research
04/18/2022

Actions at the Edge: Jointly Optimizing the Resources in Multi-access Edge Computing

Multi-access edge computing (MEC) is an emerging paradigm that pushes re...
research
08/09/2023

Federated Online/Offline Remote Data Inspection for Distributed Edge Computing

In edge computing environments, app vendors can cache their data to be s...
research
12/05/2022

Evaluation of Locality, Latency and Geospace Aware Data Placement Strategies at the Edge

With the rise in the adaptation of edge computing frameworks for applica...
research
06/12/2022

RSSD: Defend against Ransomware with Hardware-Isolated Network-Storage Codesign and Post-Attack Analysis

Encryption ransomware has become a notorious malware. It encrypts user d...

Please sign up or login with your details

Forgot password? Click here to reset