Reservoir: Named Data for Pervasive Computation Reuse at the Network Edge

In edge computing use cases (e.g., smart cities), where several users and devices may be in close proximity to each other, computational tasks with similar input data for the same services (e.g., image or video annotation) may be offloaded to the edge. The execution of such tasks often yields the same results (output) and thus duplicate (redundant) computation. Based on this observation, prior work has advocated for “computation reuse”, a paradigm where the results of previously executed tasks are stored at the edge and are reused to satisfy incoming tasks with similar input data, instead of executing these incoming tasks from scratch. However, realizing computation reuse in practical edge computing deployments, where services may be offered by multiple (distributed) edge nodes (servers) for scalability and fault tolerance, is still largely unexplored. To tackle this challenge, in this paper, we present Reservoir, a framework to enable pervasive computation reuse at the edge, while imposing marginal overheads on user devices and the operation of the edge network infrastructure. Reservoir takes advantage of Locality Sensitive Hashing (LSH) and runs on top of Named-Data Networking (NDN), extending the NDN architecture for the realization of the computation reuse semantics in the network. Our evaluation demonstrated that Reservoir can reuse computation with up to an almost perfect accuracy, achieving 4.25-21.34× lower task completion times compared to cases without computation reuse.

[1]  Yaser Sheikh,et al.  OpenPose: Realtime Multi-Person 2D Pose Estimation Using Part Affinity Fields , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[2]  Piotr Indyk,et al.  Approximate nearest neighbors: towards removing the curse of dimensionality , 1998, STOC '98.

[3]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[4]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[5]  Alexandr Andoni,et al.  Practical and Optimal LSH for Angular Distance , 2015, NIPS.

[6]  Piotr Indyk,et al.  Similarity Search in High Dimensions via Hashing , 1999, VLDB.

[7]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[8]  Nicole Immorlica,et al.  Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.

[9]  Satyajayant Misra,et al.  ICedge: When Edge Computing Meets Information-Centric Networking , 2020, IEEE Internet of Things Journal.

[10]  Katherine Guo,et al.  Cachier: Edge-Caching for Recognition Applications , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[11]  Yann LeCun,et al.  The mnist database of handwritten digits , 2005 .

[12]  Aric Hagberg,et al.  Exploring Network Structure, Dynamics, and Function using NetworkX , 2008, Proceedings of the Python in Science Conference.

[13]  Davide Pesavento,et al.  NFD Developer's Guide , 2014 .

[14]  Bernd Girod,et al.  Interframe Coding of Canonical patches for Low Bit-rate Mobile Augmented Reality , 2013, Int. J. Semantic Comput..

[15]  Karl Aberer,et al.  LSH At Large - Distributed KNN Search in High Dimensions , 2008, WebDB.

[16]  Peizhen Guo,et al.  Potluck: Cross-Application Approximate Deduplication for Computation-Intensive Mobile Applications , 2018, ASPLOS.

[17]  Thomas R. Henderson,et al.  Network Simulations with the ns-3 Simulator , 2008 .

[18]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[19]  Bo Hu,et al.  FoggyCache: Cross-Device Approximate Computation Reuse , 2018, MobiCom.

[20]  Ahmed Elmokashfi,et al.  On the Scalability of BGP: The Role of Topology Growth , 2010, IEEE Journal on Selected Areas in Communications.

[21]  Sibendu Paul,et al.  Coterie: Exploiting Frame Similarity to Enable High-Quality Multiplayer VR on Commodity Mobile Devices , 2020, ASPLOS.

[22]  Abderrahmen Mtibaa,et al.  A Case for Compute Reuse in Future Edge Systems: An Empirical Study , 2019, 2019 IEEE Globecom Workshops (GC Wkshps).

[23]  Zhe Wang,et al.  Multi-Probe LSH: Efficient Indexing for High-Dimensional Similarity Search , 2007, VLDB.