US20210132994A1 - Predictive resource allocation for network growth in an edge computing network - Google Patents

Predictive resource allocation for network growth in an edge computing network Download PDF

Info

Publication number
US20210132994A1
US20210132994A1 US17/090,408 US202017090408A US2021132994A1 US 20210132994 A1 US20210132994 A1 US 20210132994A1 US 202017090408 A US202017090408 A US 202017090408A US 2021132994 A1 US2021132994 A1 US 2021132994A1
Authority
US
United States
Prior art keywords
requests
predicted
edge
edge nodes
edge node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US17/090,408
Inventor
Steven M. Casey
Felipe Castro
Stephen Opferman
Kevin M. McBride
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CenturyLink Intellectual Property LLC
Original Assignee
CenturyLink Intellectual Property LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CenturyLink Intellectual Property LLC filed Critical CenturyLink Intellectual Property LLC
Priority to US17/090,408 priority Critical patent/US20210132994A1/en
Publication of US20210132994A1 publication Critical patent/US20210132994A1/en
Assigned to CENTURYLINK INTELLECTUAL PROPERTY LLC reassignment CENTURYLINK INTELLECTUAL PROPERTY LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CASTRO, FELIPE, MCBRIDE, KEVIN M., OPFERMAN, STEPHEN, CASEY, STEVEN M.
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • G06F9/505Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering the load
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5077Logical partitioning of resources; Management or configuration of virtualized resources
    • G06K9/6256
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/04Inference or reasoning models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • H04L43/0882Utilisation of link capacity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/82Miscellaneous aspects
    • H04L47/823Prediction of resource usage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/83Admission control; Resource allocation based on usage prediction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1008Server selection for load balancing based on parameters of servers, e.g. available memory or workload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1021Server selection for load balancing based on client or server locations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/50Indexing scheme relating to G06F9/50
    • G06F2209/5019Workload prediction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses

Definitions

  • the remote resources are sometimes referred to as cloud-based resources.
  • video streaming services often rely on the delivery of video content to a user's computing device rather than having the video content stored locally on the user's computing device.
  • Other examples include storage of information or remote processing of information, such as for tasks that require more processing power than is readily available on a standard consumer computing device.
  • the remote resources that are accessed may be physically located in disparate locations. In some cases, the physical location of the remote resource is a significant distance from the consumer. Thus, due to the increased distance, latency for communications between the computing device and the remote resource increases.
  • the present technology relates to improving computing services in a distributed network of remote computing resources, such as edge nodes in an edge compute network.
  • the technology relates to a computer-implemented method for reducing latency in providing computing services.
  • the method includes receiving, from a mobile computing device, first location data for the mobile computing device at a first time; receiving, from the mobile computing device, second location data for the mobile computing device at a second time; and based on the first location data and the second location data, determining a direction vector for the mobile computing device.
  • the method also includes based on the direction vector: identifying an edge node from a plurality of edge nodes corresponding to a predicted location of the mobile computing device; and prior to the mobile computing device being in the predicted location, allocating computing resources for the computing service on the identified edge node.
  • the technology in another aspect, relates to a computer-implemented method for reducing latency in providing computing services.
  • the method includes receiving, from a mobile computing device, first location data for the mobile computing device at a first time; based on the first location data, identifying a first edge node from a plurality of edge nodes; receiving, from the mobile computing device, a request to perform a computing service; and performing, by the first edge node, at least a portion of the requested computing service.
  • the method further includes receiving, from the mobile computing device, second location data for the mobile computing device at a second time; and based on the first location data and the second location data, determining a direction vector for the mobile computing device.
  • the method also includes based on the direction vector: identifying a second edge node from a plurality of edge nodes corresponding to a predicted location of the mobile computing device; and allocating computing resources for the computing service on the second edge node so that the second edge node may continue performing the computing service.
  • the technology in another aspect, relates to a system for reducing latency in providing computing services.
  • the system includes at least one processor; and memory storing instructions that, when executed by the at least one processor, causes the system to perform a plurality of operations.
  • the operations include receiving, from a mobile computing device, first location data for the mobile computing device at a first time; based on the first location data, identifying a first edge node from a plurality of edge nodes; receiving, from the mobile computing device, a request to perform a computing service; performing, by the first edge node, at least a portion of the requested computing service; receiving, from the mobile computing device, second location data for the mobile computing device at a second time; and based on the first location data and the second location data, determining a direction vector for the mobile computing device.
  • the operations further include, based on the direction vector: identifying a second edge node from a plurality of edge nodes corresponding to a predicted location of the mobile computing device; and allocating computing resources for the computing service on the second edge node so that the second edge node may continue performing the computing service.
  • the technology in another aspect, relates to a computer-implemented method for reducing latency in providing computing services.
  • the method includes aggregating historical request data for a plurality of requests, wherein the aggregated historical request data includes at least the following data for a plurality of requests: a time of the request, a location of a device from which the request originated, and a type of service being requested; training a machine learning model based on the aggregated historical request data; and generating, from the trained machine learning model, a prediction for a type of service to be requested at a predicted time and a predicted location.
  • the method further includes, based on the generated predicted location, identifying an edge node, from a plurality of edge nodes, based on a physical location of the edge node; and based on the generated predicted type of service and the predicted time, allocating computing resources for the computing service on the identified edge node.
  • the technology in another aspect, relates to a system for reducing latency in providing computing services.
  • the system includes a plurality of edge nodes having different physical locations; a database storing historical request data for a plurality of requests; at least one processor; and memory, operatively connected to the at least one processor and storing instructions that, when executed by the at least one processor, cause the at least one processor to perform a set of operations.
  • the operation include training a machine learning model based on the historical request data; generating, from the trained machine learning model, a prediction for a type of service to be requested at a predicted time and a predicted location; based on the generated predicted location, identifying an edge node, from a plurality of edge nodes, based on a physical location of the edge node; and based on the generated predicted type of service and the predicted time, allocating computing resources for the computing service on the identified edge node prior to the predicted time.
  • the technology in another aspect, relates to a computer-implemented method for reducing latency in providing computing services.
  • the method include receiving, from a plurality of computing devices, a plurality of real-time requests for services to be performed by one or more edge nodes of a plurality of edge nodes; providing data representative of the plurality of real-time requests as an input into a trained machine learning model, wherein the trained machine learning model has been trained on historical request data; generating, based on an output of the trained machine learning model, a prediction for a type of service to be requested at a predicted time and a predicted location; based on the generated predicted location, identifying an edge node, from the plurality of edge nodes, based on a physical location of the identified edge node; and based on the generated predicted type of service and the predicted time, allocating computing resources for the computing service on the identified edge node prior to the predicted time.
  • the technology in another aspect, relates to a computer-implemented method for allocating hardware resources within a network.
  • the method includes aggregating historical request data for a plurality of requests for services to be performed by one or more edge nodes; training a machine learning model based on the aggregated historical request data; generating, from the trained machine learning model, a prediction for an amount of requests for services at the one or more edge nodes; generating a predicted capacity needed to perform the predicted amount of requests; comparing the predicted capacity to a current capacity for the one or mode edge nodes; and based on the comparison, generating a recommendation for an alteration of hardware resources at the one or more edge nodes.
  • the technology in another aspect, relates to a system for allocating hardware resources within a network.
  • the system includes a plurality of edge nodes having different physical locations; a database storing historical request data for a plurality of requests; at least one processor; and memory, operatively connected to the at least one processor and storing instructions that, when executed by the at least one processor, cause the at least one processor to perform a set of operations.
  • the set of operations include aggregating historical request data for a plurality of requests for services to be performed by one or more edge nodes in the plurality of edge nodes; training a machine learning model based on the aggregated historical request data; generating, from the trained machine learning model, a prediction for an amount of requests for services at the one or more edge nodes; generating a predicted capacity needed to perform the predicted amount of requests; comparing the predicted capacity to a current capacity for the one or mode edge nodes; and based on the comparison, generating a recommendation for an alteration of hardware resources at the one or more edge nodes.
  • the technology in another aspect, relates to a computer-implemented method for allocating hardware resources within a network.
  • the method includes aggregating historical request data for a plurality of requests for services to be performed by one or more edge nodes, wherein the aggregated historical request data includes performance data for the plurality of requests; training a machine learning model based on the aggregated historical request data; generating, by the machine learning model, a prediction for performance data for future requests; comparing the prediction for the performance data to a predetermined performance threshold; and based on the comparison, generating a recommendation for an alteration of hardware resources at the one or more edge nodes.
  • the technology in another aspect, relates to a system for allocating hardware resources in a network.
  • the system includes a plurality of edge nodes having different physical locations; a beacon having a different physical location than the plurality of edge nodes; at least one processor; and memory, operatively connected to the at least one processor and storing instructions that, when executed by the at least one processor, cause the at least one processor to perform a set of operations.
  • the operations include collecting traffic data from the beacon over a period of time, wherein the traffic data includes at least an amount of devices sending probe requests to the beacon; comparing the amount of devices to a predetermined threshold for traffic data; and based on the comparison of the amount of devices to the predetermined threshold for traffic data, generating a recommendation for installation of a new edge node in addition to the plurality of edge nodes.
  • the technology in another aspect, relates to a computer-implemented method for allocating hardware resources in a network.
  • the method includes collecting traffic data from a beacon over a period of time, wherein the traffic data includes at least an amount of devices sending probe requests to the beacon; comparing the amount of devices to a predetermined threshold for traffic data; and based on the comparison of the amount of devices to the predetermined threshold for traffic data, generating a recommendation for installation of a new edge node in addition to a plurality of existing edge nodes.
  • the technology in another aspect, relates to a computer-implemented method for allocating hardware resources in a network.
  • the method includes receiving, at a beacon at a first physical location, a plurality of requests for services to be performed by an edge node in an edge compute network; extracting a number of requests and a service types requested for the plurality of requests; forwarding the plurality of requests to the edge node for performance of the requested services; comparing the number of requests to a predetermined traffic threshold; based on the comparison of the number of requests to the predetermined traffic threshold, generating a recommendation for installation of a new edge node in addition to the existing edge node; and based on the extracted service types, generating a recommendation for a hardware allocation for the new edge node.
  • FIG. 1A depicts an example environment for which the present technology may be implemented.
  • FIG. 1B depicts an example of a predictive edge compute system.
  • FIG. 1C depicts an example of an edge node.
  • FIG. 1D depicts an example of a suitable operating environment.
  • FIG. 2 depicts an example system having a mobile computing device.
  • FIG. 3A depicts an example system having a plurality of beacons.
  • FIG. 3B depicts another example system having a plurality of beacons.
  • FIG. 4 depicts an example method for reducing latency in providing computing services.
  • FIG. 5 depicts another example method for reducing latency in providing computing services.
  • FIG. 6 depicts another example method for reducing latency in providing computing services.
  • FIG. 7 depicts another example method for reducing latency in providing computing services.
  • FIG. 8 depicts an example method for allocating hardware in a network.
  • FIG. 9 depicts another example method for allocating hardware in a network.
  • FIG. 10 depicts another example method for allocating hardware in a network.
  • FIG. 11 depicts another example method for allocating hardware in a network.
  • remote computing resources or computing services are often utilized to process data or accomplish tasks.
  • a local device such as a mobile device of a user
  • sends a request to a remote computing resource such as an edge node in an edge compute network
  • the request must first travel from the local device through the network to the edge node.
  • the edge node then processes the request by performing the requested service.
  • a response to the request based on the performed service is then sent from the edge node back to the local device.
  • Each of these operations takes time.
  • Increasing the distance between the local device and the remote resource increases the amount of time, or latency, between a request being sent and a response being received.
  • the remote resource is not properly prepared to handle the request, the amount of time taken to process the request also increases. In time-sensitive applications, these increased delays may cause significant difficulties or even render the application on the local device unusable.
  • the present technology reduces the latency between the local device and the edge nodes of an edge compute network by reducing the distance between the local device and the remote computing device as well as preparing the edge node for the request prior to receiving the request.
  • the local device may be a mobile computing device, such as a smart phone or laptop. The mobile device thus moves with its user. As the mobile computing device moves, future locations for the mobile device may be predicted, such as by determining a direction vector for the device based on the prior locations of the device. In an example, at a first location, the mobile device may be requesting a first edge node to perform a task and provide responses.
  • That first edge node may be the edge node that is physically closest to the first location, but the mobile computing device may be moving further away from that first edge node.
  • a second edge node may be closer to the mobile computing device at some time in the future.
  • computing resources may be allocated, such as initializing a service on the second edge node so that the second edge node can be prepared to continue to process requests from the mobile computing device even before the second edge node receives any requests from the mobile computing device.
  • the requests can be directed to the second edge node to maintain or reduce the roundtrip path distance for the requests and responses without incurring additional delays due to the second edge node having to prepare to process the requests. Accordingly, the processing capabilities of the edge nodes effectively follow the mobile computing device to maintain or reduce latency.
  • the present technology is able to predict the types of requests that will be received at different edge nodes located at different physical locations.
  • the predictions may provide for the types of requests that will be received at different times and different locations.
  • an edge node located in an urban environment may typically receive requests for performing business-related tasks during working hours but typically receive requests for streaming services during non-working hours.
  • Different computing resources are used to perform the varying types of tasks.
  • the proper computing resources may be allocated in the edge node(s) prior to the requests being received.
  • the predictions may be made through the use of machine learning and/or artificial intelligence. For example, historical request data may be aggregated for a plurality of requests.
  • That historical request data may include data such as a time of the request, a location of a device from which the request originated, a type of service being requested, and/or a user/device identifier (such as a media access control (MAC) address).
  • a machine learning model may then be trained from the aggregated historical request data. The trained machine learning model may then be used to make predictions for future requests and computing resources may be allocated to the edge nodes accordingly. Thus, the limited capacity of each node may be used more efficiently while also maintaining low latency for processing requests and providing computing services.
  • MAC media access control
  • the present technology is also able to predict edge compute network capacity and hardware requirements. For example, as discussed above, predictions may be made based on the historical request data as to what types of requests will be received in the future and where those requests will be received. The present technology is also able to predict the amount of requests as well as the effect those requests may have on the network. Such predictions may be used to help ensure that the particular edge node has capacity to perform the requested services in the future. For example, the predictions may be utilized to efficiently provision hardware resources at each edge node based on the types and amounts of computing services that are predicted to be requested at each of the edge nodes. Therefore, the network itself provides feedback about its hardware needs to continue operating at high-quality performance values, such as providing services at low latency levels.
  • the edge compute network may include a plurality of beacons that function to monitor traffic in a particular location.
  • the beacons may be low-cost implementations that may be installed at a variety of locations, including on outdoor structures such as lamp posts or buildings.
  • the beacons monitor traffic passing by the beacons by operating as a WiFi and/or Bluetooth beacon.
  • the beacons may also forward requests from authenticated users of the network to one or more of the edge nodes. By monitoring the traffic, a determination may be made as to whether an edge node should be installed at the location of the beacon.
  • the types of hardware that should be installed at the edge node may also be identified.
  • the use of beacons allows for the network itself to provide feedback that allows more efficient installation of the edge nodes and hardware within the edge nodes.
  • FIG. 1A depicts an example system 100 for which the present technology may be implemented.
  • the depicted system 100 includes plurality of edge nodes 106 located in different physical locations of a region 104 , such as a state or country.
  • the edge nodes 106 may be part of an edge compute network.
  • an edge compute network is a network that moves the processing of certain data to the edge nodes 106 rather than at a centralized computing resource. By moving the processing capabilities of the network closer to the edge, the processing capabilities can be moved closer to the devices actually requesting the processing capabilities.
  • An edge compute network is a content distribution network (CDN).
  • CDN content distribution network
  • the system 100 may include a plurality of mobile computing devices, such as smart phones 108 or tablets, mobile computers 110 such as laptops, and vehicles 112 . While not depicted in system 100 , other mobile computing devices such as drones, planes, trains, and similar computing devices that are intended to move may be present in the system 100 .
  • Stationary or fixed computing devices may also request the processing capabilities of the edge nodes 106 in the edge computing network. Such stationary computing devices may be housed or fixed within facilities such as businesses 114 or factories 116 . Other facilities may include farms, ranches, housing, or other facilities that have computing devices that utilize the processing capabilities of the edge nodes 106 .
  • Other computing devices may also include devices associated with the Internet of Things (IoT), such as cameras, home assistant devices, robots, televisions, and appliances, among other devices.
  • IoT Internet of Things
  • the mobile computing devices and/or stationary computing devices communicate requests for different types of data processing or computing services to one or more of the edge nodes 106 .
  • the edge node 106 that receives the request processes the request and provides a response back to the computing device that sent the request.
  • the particular edge node 106 for which the computing device may communicate may be based on the service boundaries 107 for the edge nodes 106 . For example, if a smart phone 108 is within a service boundary 107 of a particular edge node 106 , the smart phone 108 may send requests to that particular edge node 106 .
  • the request data that is received by the edge nodes 106 may also be communicated to a predictive edge compute system 102 .
  • the request data that is sent to the predictive edge compute system 102 may include different types data relating to how customers or users are utilizing the processing capabilities or computing services of the edge computing network.
  • the request data may include location information, time and date information, the customer requesting the service, the type of services requested, the bandwidth required to service the requests, and the duration for which the requests were received, among other data.
  • the request data may include different types of protocol data as well, including data relating to layers 3-7 of the Open Systems Interconnection (OSI) model.
  • OSI Open Systems Interconnection
  • application-level (layer 7) data may be useful in identifying request types and the types of computing services requested.
  • data relating to the application services may be used to identify the applications that are running and being requested on the local devices and edge nodes 106 .
  • the predictive edge compute system 102 utilizes that request data ultimately to orchestrate or allocate computing resources on the edge nodes 106 . Additional information regarding the predictive edge compute system 102 is provided below with reference to FIG. 1B .
  • FIG. 1B depicts an example of a predictive edge compute system 102 .
  • the predictive edge compute system 102 may include a data collection component 120 , a data storage component 122 , a machine learning (ML) and/or artificial intelligence (AI) component 124 , and an orchestration component 126 .
  • the components of the predictive edge compute system may operate together to perform one or more of the operations described herein.
  • the data collection component 120 collects the request and/or service data from the edge nodes 106 .
  • the data collection component may modify the request data to place the request data from the different edge nodes 106 in a uniform format.
  • the data collection component 120 may also further tag the request data with a particular data type.
  • the data collection component 120 may also facilitate the storage of the received request data in the data storage component 122 .
  • the data storage component 122 may include at least one database and/or data store for storing the request data collected by the data collection component 120 .
  • the data storage component 122 may also include physical hardware such as physical memory of the types discussed herein.
  • the request data may be stored in the data storage component 122 in any suitable manner that allows for retrieval and access of the request data by other components. For instance, the request data may be sorted or organized in the data storage component 122 in different manners, such as through the use of relational databases, object-oriented databases, graph databases, and/or a structured query language (SQL) database, among others.
  • SQL structured query language
  • the ML/AI component 124 accesses and utilizes the request data to predict orchestration or resource allocation needs for devices in the example system 100 .
  • the ML/AI component 124 may already include trained ML/AI models.
  • the ML/AI component 124 may train ML/AI models.
  • the ML/AI component 124 may also continue to train or update trained ML/AI models after the initial training of the ML/AI models.
  • the machine learning techniques that are implemented by the ML/AI component may include supervised or unsupervised machine learning techniques. For instance, supervised machine learning algorithms may be utilized based on the tagged or labeled request data.
  • the request data may include data including a request type, a request time, and a request location.
  • Supervised machine learning techniques may then be used to train an ML/AI model to predict future times, locations, and request types, among other data.
  • Regression-based and/or classification-based supervised learning algorithms or techniques may be implemented.
  • Some machine learning models that may be used include decision trees, a random forests, neural networks, deep learning models, continual learning models, Markov models, linear regression models, nearest neighbor models, Gaussian Na ⁇ ve Bayes models, support vector machine (SVM) models, among others.
  • Unsupervised machine learning techniques may also be implemented to identify additional correlations and insights that may have been previously unknown.
  • Clustering-based, association-based, and anomaly-based unsupervised learning algorithms may all be used for the request data.
  • Clustering algorithms are generally directed to problems where the goal is to discover inherent clusters or grouping of data
  • association algorithms are generally directed to problems where the goal is to discover rules that describe large portions of request data.
  • Anomaly detection algorithms generally are directed to discovering unusual or outlier metrics within the request data.
  • Semi-supervised machine learning techniques may also be utilized where a portion of the request data is tagged, but some request data is not properly tagged. Reinforcement machine learning techniques and algorithms may also be implemented. In reinforcement machine learning techniques, the ML/AI model continues to be trained on a feedback system of request data.
  • the ML/AI component 124 provides an output that is provided to an orchestration component 126 .
  • the output of the ML/AI component 124 may be indicative of request types that are to be seen in the future at a particular location, among other data or information discussed herein.
  • the output of the ML/AI component 124 may also be indicative of the types of the services that will be required in a particular location at a particular time.
  • the orchestration component 126 may then use that output from the ML/AI component 124 to orchestrate the edge nodes 106 .
  • Orchestrating the edge nodes 106 may include communicating instructions from the predictive edge compute system 102 to the edge nodes 106 .
  • the instructions may include resources that should be allocated at a particular edge node 106 at a particular time.
  • NFV Network Functions Virtualization
  • VNFs virtual network functions
  • NFV and VNFs may be used to implement resource allocation for orchestration utilized by the technology described herein.
  • Implementation of NFV and VNFs, in general, and as used in other network applications, is described in further detail in the U.S. patent application Ser. Nos. 14/730,695; 14/678,208; 14/678,280; and Ser. No. 14/678,309, which are also incorporated by reference in their entireties.
  • the orchestration operations are performed in the present technology to initialize or turn up services within a particular edge node 106 .
  • Allocating the computing resources of the edge nodes 106 may include operations such as deploying virtualized software, virtualized instances, virtualized machines, virtualized infrastructures, and/or virtualized containers. For example, if a particular computing service requires virtualized software or a virtualized machine, that virtualized software or machine may be deployed on an edge node 106 prior to receiving requests for that particular service. Accordingly, time is not wasted loading or initializing the software for a machine when the request is received, which may lead to significant increases in latency. Allocating the computing resources may also include loading a database into memory of one of the edge nodes 106 or caching content in one of the edge nodes for a particular computing service.
  • Allocating the computing resources of the edge node 106 may also include allocating storage resources in memory of the edge node 106 .
  • FIG. 1C depicts an example of an edge node 106 .
  • the edge node 106 includes hardware and software to process requests and perform services requested by the users of the local devices.
  • the edge node 106 include various components or features, such as a server 130 , a field-programmable gate array (FPGA) 132 , a central processing unit (CPU) 134 , a graphics processing unit (GPU) 136 , storage devices 138 , and network resources 140 , among other possible computing components or features.
  • the components of the edge node 106 are configured to provide services and compute data according requests of the local devices. Accordingly, the edge node 106 performs significantly more functions beyond those functions performed by simple routers or switches.
  • an edge node 106 may be an endpoint of an edge compute network and may be located at locations such as gateway locations, central offices, point-of-presence (POPs) locations.
  • POPs point-of-presence
  • FIG. 1D depicts an example of a suitable operating environment that may be implemented by an edge node 106 , the local devices communicating with the edge node 106 , and/or the predictive edge compute system 102 .
  • operating environment 150 typically includes at least one processing unit 152 and memory 154 .
  • the processing unit may be a processor, which is hardware.
  • memory 154 (storing, instructions to perform the motion detection techniques disclosed herein) may be volatile (such as RAM), non-volatile (such as ROM, flash memory, etc.), or some combination of the two.
  • This most basic configuration is illustrated in FIG. 5 by dashed line 156 .
  • the memory 154 stores instructions that, when executed by the processing unit(s) 152 , perform the processes and operations described herein, such as generating and interpreting data signals.
  • environment 150 may also include storage devices (removable 158 , and/or non-removable 160 ) including, but not limited to, solid-state, magnetic disks, optical disks, or tape.
  • environment 150 may also have input device(s) 164 such as keyboard, mouse, pen, voice input, etc. and/or output device(s) 166 such as a display, speakers, printer, etc.
  • Operating environment 150 may also include geolocation devices 170 , such as a global positioning system (GPS) device.
  • GPS global positioning system
  • Operating environment 150 typically includes at least some form of computer readable media.
  • Computer readable media can be any available media that can be accessed by processing unit 152 or other devices comprising the operating environment.
  • Computer readable media may comprise computer storage media and communication media.
  • Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
  • Computer storage media includes, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transitory medium which can be used to store the desired information.
  • Computer storage media is non-transitory and does not include communication media.
  • Communication media embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
  • modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
  • communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared, microwave, and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
  • FIG. 2 depicts an example system 200 having a mobile computing device 208 .
  • the example system may be similar to the example system 100 discussed above.
  • the system 200 includes a first edge node 206 A, a second edge node 206 B, and a third edge node 206 C.
  • Each of the edge nodes 206 may have a service boundary 207 .
  • the first edge node 206 A may have a first service boundary 207 A
  • the second edge node 206 B may have a second service boundary 207 B
  • the third edge node 206 C may have a third service boundary 207 C.
  • the service boundaries 207 may have different sizes or configurations relative to one another.
  • an edge node 206 located in a rural area may have a larger service boundary 207 than an edge node 206 located within an urban environment.
  • the service boundaries 207 may be statically configured to cover a specific area or the service boundaries 207 may be dynamic boundaries that change with demand and based on capacity of the corresponding edge node 206 . For example, if an edge node 206 is nearing maximum capacity for a particular type of service, the corresponding service boundary may reduce in size.
  • each edge node 206 may have multiple service boundaries 207 corresponding to different service types offered by the edge node 206 .
  • the second edge node 206 B may have a large service boundary 207 B for machine learning compute services.
  • the system 200 may also include a user boundary service 211 and an edge node boundary service 212 .
  • the user boundary service 211 may be housed or provided by a separate device such as depicted in system 200 . In other examples, the user boundary service 211 may be housed or provided by one of the edge nodes 206 .
  • edge node boundary service 212 may be housed or provided by a separate device such as depicted in system 200 . In other examples, the edge node boundary service may be housed or provided by one of the edge nodes 206 .
  • the user boundary service 211 tracks or stores the location of mobile and stationary computing devices, such as mobile computing device 208 .
  • the user boundary service 211 may track the location of the computing devices by receiving location data from the mobile computing device 208 that indicates the location of the mobile computing device 208 .
  • the location data may be generated from a geolocation device, such as a GPS device, located in the mobile computing device 208 .
  • the geolocation device may generate a location of the device and provide that location with a timestamp to the user boundary service 211 .
  • the location of the mobile computing device 208 may also be determined by the user boundary service 211 in different manners as well.
  • the location of the mobile computing device 208 may be determined based on the IP address of the mobile computing device 208 or a WiFi access point being used by the mobile computing device 208 .
  • a user of the mobile computing device 208 may also manually input the location of the mobile computing device.
  • the mobile computing device 208 may report its location to the user boundary service 211 at regular time intervals.
  • the edge node boundary service 212 tracks or stores the location of the edge nodes 206 .
  • the edge node boundary service 212 may track the location of the edge nodes 206 by receiving location data from the edge nodes 206 .
  • the location data may be generated from a geolocation device, such as a GPS device, located in the edge node 206 .
  • the geolocation device may generate a location of the device and provide that location with a timestamp to the edge node boundary service 212 .
  • the location of the edge node 206 may also be determined by the edge node boundary service 212 in different manners as well.
  • the location of the edge node 206 may be determined based on the IP address of the edge node 206 or a WiFi access point being used by the edge node 206 .
  • the location of the edge node 206 may also be input manually.
  • the location of each of the edge nodes 206 may also be stored in a table and updated when, or if, the edge nodes 206 move.
  • the edge nodes 206 may report their location to the edge node boundary service 212 at regular time intervals.
  • the mobile device may move throughout the region 204 .
  • the mobile device 208 may begin at a first location, such as the location of the mobile computing device 208 depicted in FIG. 2 .
  • the mobile computing device 208 may request a remote computing service to be performed.
  • the request may processed and the service performed by the first edge node 206 A because the first location of the mobile computing device 208 is within the first service boundary 207 A of the first edge node 206 A.
  • the mobile computing device 208 may request database processing or a live stream service.
  • the first edge node 206 A may begin performing those services and providing responses to the mobile computing device 208 .
  • the mobile computing device 208 would have been tied to the first edge node 206 A even when the mobile computing device 208 moved.
  • the service would continue to be provided by the first edge node 206 A even as the mobile computing device 208 traveled a significant distance away from the first edge node 206 A.
  • latency increased causing interruptions in the live stream and reducing the level or quality of service being provided.
  • the present technology improves that scenario by causing the service being performed to move with, or follow, the mobile computing device 208 .
  • a direction vector 209 for the mobile computing device is determined or generated.
  • the direction vector 209 may be determined by a predictive edge compute system.
  • the direction vector 209 may be determined based on a first location of the mobile computing device 208 at a first time and a second location of the mobile computing device 208 at a second time.
  • a different edge node 206 is identified based on a predicted future location of the mobile computing device 208 .
  • the mobile computing device 208 may be moving in a direction towards the second edge node 206 B.
  • computing resources may be allocated on the second edge node 206 B such that the second edge node 206 B can begin processing requests from the mobile computing device once it is within the second service boundary 207 B.
  • the resources allocated on the second edge node 206 B may be the same or similar to the resources of the first edge node 206 A being used to process the requests or perform the compute operations requested by mobile computing device when the mobile computing device 208 is in the first location.
  • the service can continue to be provided to the user without interruption and with a consistently low latency as the mobile computing device 208 moves around the region 204 .
  • a service is initialized or turned up at the first edge node 206 A
  • that same service may be initialized or turned up at the second edge node 206 B based on a prediction that the mobile computing device will be within the second service boundary 207 B due to the movement of the mobile computing device 208 .
  • the service can be stopped on the first edge node 206 A and the resources that were allocated to perform the service on the first edge node 206 A may then be used to perform other services for other users.
  • An aggregated or cluster-based direction vector may also be generated for a plurality of mobile computing devices moving throughout the region 204 .
  • the locations of multiple mobile computing device may be utilized to determine an aggregate direction vector. That aggregate direction vector may then be used to predict the future location of multiple computing devices.
  • Aggregate direction vectors may also be generated based on different types of services being requested by mobile computing devices. For example, a first aggregate direction vector may be generated for the mobile computing devices requesting a database processing service and a second aggregate direction vector may be generated for the mobile computing devices requesting a live streaming service.
  • the resources required to perform the database processing service may be different than the resources required to perform the live streaming service.
  • the database-based request may require the loading the database into memory of an edge node 206 . Accordingly, predicting the location where each those services will be requested allows for the appropriate resources to be allocated at the appropriate edge node 206 .
  • Initializing services or allocating resources at each of the edge nodes 206 based on such predictions allows for a more efficient use of the hardware resources that are available at each of the edge nodes 206 .
  • Each edge node 206 has a limited amount of capacity due to the hardware resources available at each edge node 206 . Accordingly, not every service that could be requested by a user may be initialized and operating at all times at all edge nodes 206 . Even if such a perpetual operation of all services at all locations was possible, such an implementation would likely be a significantly inefficient use of power and hardware resources.
  • the hardware resources of the edge nodes 206 are used more efficiently while also reducing the latency for communications within the edge compute network and users' computing devices for which the edge compute network is performing the services.
  • FIG. 3A depicts an example system 300 A having a plurality of beacons 310 .
  • the system 300 A is similar to system 100 and system 200 discussed above with the exception that system 300 A includes a plurality of beacons 310 .
  • the beacons 310 serve as network probes to predict and determine potential future growth of the edge compute network. For instance, the beacons 310 may monitor devices that pass by the beacons 310 . That information may then be used to predict the need for another edge node 206 at or near the location of one or more of the beacons 310 .
  • the beacons 310 may be located in positions that are not already well-covered by one or more edge nodes 206 .
  • the beacons may also be placed near areas of potential high traffic of computing devices, such as roadways, waterways, shipping lanes, flight paths, etc.
  • Each of the beacons 310 may include wireless connectivity and/or wired connectivity components, such as WiFi, Bluetooth, Ethernet, 100BaseT, and/or GigE connections.
  • the beacons 310 may include wireline or wired interfaces to allow for the wired connections, such as Ethernet-based connections.
  • the beacons 310 may also include cellular data interfaces to allow for cellular connections and cellular data services, such as 3G, 4G, and/or 5G cellular data services.
  • the beacons 310 may also include memory and storage devices along with some processing components, such as a processor.
  • the primary components of the device may be made from a miniature computer, such as a Raspberry Pi, Jetson Nano, or similar device.
  • Each of the beacons 310 may also be environmentally hardened to protect against weather and the elements.
  • the beacons 310 may be waterproof or water resistant, resistant to high or low temperatures, and/or shock resistant. By environmentally hardening the beacons 310 , the beacons 310 may be placed in outdoor environments, such as on light posts, buildings, towers, or any other outdoor structures.
  • the beacons 310 may also include alternative power sources to allow for remote usage.
  • the beacons may include batteries and solar cells to allow the batteries to recharge. Wind-based charging components, such as a small turbine, may also be included to recharge the batteries of the beacons 310 .
  • the beacons 310 may also have additional external physical connection features or adhesives to allow for connection to outdoor structures.
  • the beacons 310 may monitor traffic passing by the beacons 310 by monitoring requests for an access point or connection.
  • the beacons 310 may each operate as a WiFi beacon and/or a Bluetooth beacon by broadcasting the presence of the network, such as by broadcasting a service set identifier (SSID) or Bluetooth name.
  • Mobile computing devices 308 that utilize active scanning also announce their presence to the beacons 310 as they pass by the beacons 310 .
  • a WiFi or Bluetooth-enabled mobile computing device 308 may transmit a probe request to the beacons 310 .
  • the beacons 310 may transmit a probe response to the mobile computing device 308 .
  • the probe request sent by the mobile computing device 308 to the beacon may include identifying information about the mobile computing device 308 .
  • the identifying information may include a unique identifier for the device, such as a media access control (MAC) address, an Organizationally Unique Identifier (OUI), an Individual Address Block (IAB), Extended Unique Identifier (EUI), a cookie, or similar identifiers.
  • MAC media access control
  • UAI Organizationally Unique Identifier
  • IAB Individual Address Block
  • EUI Extended Unique Identifier
  • the manufacturer of the mobile computing device 308 that sent the probe request may be identified, and in some examples the type of mobile computing device 308 , including the model of the mobile computing device 308 , may be determined or identified.
  • the first three octets identify the manufacturer.
  • the first three octets of the MAC address may represent the OUI. Accordingly, each of the beacons 310 are able to identify the amount of devices and the types of devices that pass by each of the beacons 310 .
  • the data regarding the types of devices that pass by the beacons 310 further allows for a prediction of the hardware that should be installed in the new edge node.
  • the request data gathered by the predictive edge compute system may also include the types of devices that are sending the requests along with the types of requests that are being sent from those devices.
  • a determination may be made as to what types of devices most frequently request what types of computing services.
  • a prediction may be made as to the likely types of requests that would be generated by those devices.
  • the types of hardware required for newly installed edge nodes may be determined. Therefore, the edge compute network may be expanded in a more efficient manner based on predictions and data generated from the network itself.
  • the beacons 310 may also serve as access points to the Internet and/or the edge compute network.
  • users or mobile computing devices that are previously associated with the service provider operating the beacons 310 and/or the edge compute network may join the network of the beacons 310 either through WiFi, Bluetooth, or any other communication type supported by the beacons 310 .
  • the beacons 310 may also have wireline connections as well as cellular connections and data services, such as 3G, 4G, and/or 5G connectivity and data services.
  • customers of the edge compute network may be authenticated by the beacons 310 and allowed to join the WiFi or Bluetooth network of the beacons 310 .
  • the beacons 310 may act as a forwarding device that forwards requests from the mobile computing devices to one or more of the edge nodes 306 .
  • a mobile computing device 308 may join the network offered by the beacon 310 C.
  • the mobile computing device 308 may then send a request to the edge compute network to perform a computing service.
  • the beacon 310 C may forward that request on to an edge node 306 to process the request and/or perform the service, such as edge node 306 C.
  • the beacon 310 C differs from the edge nodes 306 in that the beacon 310 C does not process the requests or perform the requested services that are received, and the beacon 310 C may not have the capabilities to process the requests or perform the requested services.
  • the beacon 310 C When a beacon 310 C forwards the request to the edge node 306 , the beacon 310 C extracts data from the request, such as the time of the request, the location of the request, the type of service requested, a unique identifier for the mobile computing device 308 , the particular edge node 306 where the request was forwarded, and other types of request data discussed herein.
  • the beacon 310 C may also extract a user or device identifiers from the received requests. By extracting the user or device identifiers, the system is able to track which users or devices are requesting certain types of services and at what times those users are requesting those services.
  • the beacon 310 C may extract such data from each request received from each of the devices that have joined the network offered by the beacon 310 C. Thus, the beacon 310 C is able to keep a historic record of the usage and traffic that passes through the beacon 310 C.
  • the number of requests that are received near the beacon 310 C as well as the types of services that are requested may be determined. If the number of requests exceeds a predetermined traffic threshold, then a recommendation to install a new edge node 306 at the location of the beacon 310 C may be generated. A recommendation to install the new edge node 306 may also be based on a rate of change of the number of requests that are received near or at the beacon 310 . An ML/AI model may also be trained based on the extracted request data, and used to generate a predicted future number of requests. The rate of change of the number of requests and/or the predicted number of future requests may also be used in determining whether to generate a recommendation to install the new edge node 306 . For example, if the rate of change or the predicted number of future requests exceeds a predetermined threshold, then a recommendation to build the new edge node 306 at the location of the beacon 310 C may be generated.
  • the extracted types of service requested may also be used to generate a recommendation for a hardware allocation for the edge node.
  • the recommended hardware allocation may be for web servers.
  • the request types include streaming requests
  • the recommended hardware allocation may include streaming servers.
  • the request types include AI requests
  • the recommended hardware allocation may include specialized accelerators, such as GPU-based chips or cards, or similar devices suited for handling AI-related requests.
  • the beacons may communicate with the edge node boundary service 312 and provide the location of the beacons 310 to the edge node boundary service 312 .
  • the locations of the beacons 310 may be provided to the edge node boundary service 312 in the same or similar manner as the locations of the edge nodes 306 are provided to the edge node boundary service 312 , as discussed above.
  • the request data extracted from the beacon 310 may also include an identification of the particular edge node 306 to which the request was forwarded by the beacon 310 .
  • the distance between the beacon 310 and the particular edge node 306 may also be known or determined.
  • the distance may be a physical difference between the two locations or the physical distance the request must travel through the network.
  • Performance metrics such as latency, may also be tracked by the beacon 310 for the requests that are forwarded.
  • the latency data may also be indicative of distance.
  • the distance and/or performance metrics extracted by the beacon 310 may then be used in the determination as to whether a new edge node 306 should be installed at the location of a beacon 310 .
  • the beacon 310 C may receive a large number of probe requests from a plurality of devices and/or a large number of requests that are to be forwarded to an edge node 306 for processing. Due to the large number of requests, a recommendation may be generated to replace the beacon 310 with another edge node 306 .
  • FIG. 3B depicts an example system where a new edge node 306 D has been installed in place of the beacon 310 C. The new edge node 306 D has a corresponding service boundary 307 D. By installing the new edge node 306 D, computing devices, such as mobile computing device 308 , near the new edge node 306 D may experience reduced latencies for service requests from the edge compute network because the requests can be processed more closely to the computing devices.
  • FIG. 4 depicts an example method 400 for reducing latency in providing computing services.
  • the operations depicted in example method 400 may be performed by a predictive edge compute system, an edge node, a boundary service, another computing device communicatively connected to a mobile computing device, and/or a combination thereof.
  • first location data for a mobile computing device at a first time may be received from the mobile computing device.
  • second location data for a mobile computing device at a second time may be received from the mobile computing device.
  • the mobile computing device may be a smart phone, laptop, vehicle, drone, mobile computer, or a plane, among other types of mobile computing devices.
  • a direction vector for the mobile computing device may be determined or generated in operation 406 .
  • the direction vector may be indicative of a direction that the mobile computing device is travelling and a speed at which the mobile device is traveling. Thus, from the direction vector, a future location of the mobile computing device may be predicted.
  • the direction vector may also be based on other data in addition to the first location data and the second location data. For example, the direction vector may be based on additional location data for the mobile computing device.
  • the direction vector may also be based on mapping data that indicates the mobile computing device is travelling along a known roadway, waterway, railway, or similar constrained transportation feature. In such examples, the direction vector may be modified to match the shape or features of the transportation feature.
  • the direction vector may also be based on historical location data for the mobile device. For example, a mobile device may travel a predictable route at certain times of day that track habitual movements of the user, such as a work commute
  • the direction vector may be based on an aggregation or clustering of location data from a plurality of devices. For example, location data may be received from an additional mobile computing device for similar times as the first mobile computing device. The direction vector may then be based on the additional location data for the additional mobile computing devices.
  • location data is collected from multiple devices and/or users
  • a unique identifier may be assigned or correlated with each of the devices and/or users to allow for separation of the location data and to allow for tracking of individual users and/or individual devices.
  • the unique identifier may be any of the unique identifier discussed herein, included a MAC address and/or a cookie.
  • an edge node from a plurality of edge nodes in the edge compute network is identified that corresponds to a predicted location of the mobile computing device. Identifying the edge node in operation 410 may include accessing service boundaries for the plurality of edge nodes in the edge compute network. The direction vector and/or the predicted location of the mobile computing device may then be compared to the service boundaries for the plurality of edge nodes. Based on the comparison of the direction vector and/or the predicted location of the mobile computing device to the service boundaries, the edge node may be identified. For instance, the predicted location of the mobile computing device may lie within one of the service boundaries. The edge node for which the service boundary corresponds is then identified as the edge node.
  • computing resources for a particular computing service are allocated on the identified edge node.
  • the computing resources are allocated prior to the mobile device actually being in the predicted location.
  • the timing of the allocation of resources may also be based on the direction vector as the resources are to be allocated before the mobile computing device arrives in the predicted location. For example, the computing resources may be allocated prior to the mobile computing device entering the service boundary for the identified edge node.
  • Allocating resources on the identified edge node may include actions such as deploying a virtualized software, deploying a virtualized instance, deploying a virtualized machine, deploying virtualized infrastructure, deploying a virtualized container, loading a database into memory of the identified edge node, caching content for the computing service, and/or allocating storage resources in memory of the identified edge node, among other resource allocation actions discussed herein.
  • the computing service may be a database-based service and allocating the computing resources includes loading the corresponding database into memory of the identified edge node. Loading a database of considerable size may take a considerable amount of time. Thus, if the database was not loaded prior to receiving a request for the service, the latency for performing the requests would be considerably increased.
  • a request to perform the computing service is received from the mobile computing device.
  • the request may be received when the mobile computing device is in the predicted location and/or at a predicted time based on the direction vector.
  • the requested computing service is performed by the identified edge node using the resources that were allocated in operation 412 .
  • Log files for the requests that are received and the services that are performed may also be generated and stored during performance of method 400 .
  • the log files may include the types of request data discussed herein including data regarding the users making the requests, unique identifiers for the users and/or the mobile computing devices making the requests, the time the requests are being sent, the types of services being requested, and the location from which the requests are generated, and the location of the edge node performing the services, among other types of data. Those log files may then be provided as feedback into the predictive edge compute system to improve the system and further train the ML/AI models discussed herein. In some examples, if a request for a service corresponding to the allocated resources is not received within a predetermined time frame, the allocated resources may be reallocated for another service or deallocated to conserve resources.
  • FIG. 5 depicts another example method 500 for reducing latency in providing computing services.
  • the operations depicted in example method 500 may be performed by a predictive edge compute system, an edge node, a boundary service, another computing device communicatively connected to a mobile computing device, and/or a combination thereof.
  • first location data for a mobile computing device at a first time may be received from the mobile computing device.
  • the mobile computing device may be a smart phone, laptop, vehicle, drone, mobile computer, or a plane, among other types of mobile computing devices.
  • a first edge node from a plurality of edge nodes in an edge compute network is identified.
  • the first edge node may be identified by comparing the first location data to the service boundaries for the plurality of edge nodes. For example, the service boundaries for the plurality of edge nodes may be accessed, and the first location may be compared to the service boundaries. Based on the comparison of the first location to the service boundaries, the first edge node may be identified because the first location is within the service boundary of the first edge node.
  • a request is received, from the mobile computing device, to perform a computing service.
  • the computing service may be any of type of computing services discussed herein, among others that will be understood by those having skill in the art.
  • at least a portion of the requested computing service is performed by the first edge node.
  • the first edge node may begin a live-streaming service or begin processing AI requests.
  • second location data for the mobile computing device is received at a second time from the mobile computing device.
  • a direction vector is determined or generated based on the first location data and the second location data.
  • the direction vector may be generated or determined in the same or similar manner as discussed above.
  • a second edge node from the plurality of edge nodes may be identified that corresponds to a predicted future location of the mobile computing device.
  • the direction vector may be used to predict a location for the mobile computing device for a time in future, such as a third time. Identifying the second edge node in operation 514 may include accessing service boundaries for the plurality of edge nodes in the edge compute network.
  • the direction vector and/or the predicted location of the mobile computing device may then be compared to the service boundaries for the plurality of edge nodes. Based on the comparison of the direction vector and/or the predicted location of the mobile computing device to the service boundaries, the second edge node may be identified. For instance, the predicted location of the mobile computing device may lie within service boundary of the second edge node.
  • computing resources for the computing service are allocated on the second edge node so that the second edge node may continue performing the computing service when the mobile computing device nears the second edge node.
  • the computing resources may be allocated prior to the mobile computing device actually being in the predicted location or within the service boundary of the second edge node.
  • the timing of the allocation of resources may also be based on the direction vector and/or predicted location as the resources are to be allocated before the mobile computing device arrives in the predicted location and/or the service boundary for the second edge node.
  • Allocating the resources on the second edge node may include any of the allocation actions discussed herein.
  • the resources allocated may be based on the resources utilized by the first edge node.
  • allocating resources on the second edge node may include deploying the same particular virtual machine.
  • the computing resources required for the computing service can effectively follow the mobile computing device as the mobile computing device moves throughout a region.
  • the second edge node continues performing the computing services and providing responses to the mobile computing device once the mobile computing device is within the service boundary of the second edge node.
  • the computing resources of the first edge node may be stopped, deallocated, or reallocated as they may no longer be required because the mobile computing device is now sending requests to the second edge node. Accordingly, resources may be conserved on edge nodes when they are not needed.
  • Log files for the requests that are received and the services that are performed may also be generated and stored during performance of method 500 .
  • the log files may include the types of request data discussed herein including data regarding the users making the requests, unique identifiers for the users and/or the mobile computing devices making the requests, the time the requests are being sent, the types of services being requested, and the location from which the requests are generated, and the location of the edge node performing the services, among other types of data.
  • FIG. 6 depicts another example method 600 for reducing latency in providing computing services.
  • the operations depicted in example method 600 may be performed by a predictive edge compute system, an edge node, a boundary service, another computing device communicatively connected to a mobile computing device, and/or a combination thereof.
  • historical request data may be aggregated for a plurality of prior requests to perform computing services.
  • the aggregated historical request data may include a variety of types of request data discussed herein.
  • the aggregated historical request data may include, for a plurality of prior requests, a time of the request, a location of the device from which the request originated, and a type of service being requested, among other types of request data.
  • a machine learning model may be trained based on the aggregated historical request data.
  • the machine learning model may be any type of ML/AI model discussed herein.
  • the machine learning model may be at least one of a decision tree, a continual learning model, a random forest, a neural network, or a deep learning model. Training the machine learning model may be performed in a variety of different methods and may be altered based on the type of model being trained, as will be appreciated by those having skill in the art.
  • training machine learning model may include splitting the aggregated historical request data into a training data set and test data set. The training set is used to train or fit the machine learning model, and the test is used to evaluate to effectiveness or accuracy of the trained machine learning model.
  • Training the machine learning model results in different parameters within the machine learning model to be adjusted, such as regression coefficients, weights in a neural network, splitting points in a decision tree, among other parameters.
  • hyperparameters for the particular model may also be set or adjusted.
  • the number of decision trees to be used may be a hyperparameter that is set when the machine learning model is a random forest.
  • Other examples of hyperparameters include the number of hidden layers in a neural network and the strength of a penalty used in regression.
  • the machine learning models may also be tuned utilizing cross-validation techniques, and the model may be trained to reduce errors that may be evaluated using techniques such a mean squared error and/or area under the receiver operating characteristics.
  • a prediction for a type of service to be requested at a predicted time and a predicted location in the future is generated from machine learning model trained in operation 606 .
  • real-time data may be passed as an input into the trained machine learning model to receive the prediction as an output from the trained machine learning model.
  • the real-time (e.g., current) requests that are being received by the edge nodes in the edge compute network may be received by the predictive edge compute system and provided to trained machine learning model of the ML/AI component, which produces the prediction for the type of service to be requested at the predicted time and the predicted location.
  • a future location of a mobile device and a type of service to be requested by that mobile device may be generated based on historical usage data for the device of that mobile device. For example, a mobile device may travel a predictable route at certain times of day that track habitual movements of the user, such as a work commute.
  • the prediction may also be for multiple requests.
  • the prediction may include the predicted service type, the predicted location, and/or the predicted time for a plurality of requests to be received in the future.
  • orchestration or resource allocation decisions may be based on a prediction of an aggregate of predicted requests.
  • the prediction data generated at operation 608 may then be passed to an orchestration component of the predictive edge compute system which may orchestrate the allocation of resources at one or more of the edge nodes in operations 610 - 612 .
  • an edge node from a plurality of edge nodes in an edge compute network may be identified.
  • the identification of the edge node in operation 610 may be further based on the physical location of the edge node. For example, a comparison of the predicted location may be compared to the service boundaries of the plurality of edge nodes.
  • the edge node that is identified may be the edge node that has the service boundary that encompasses the predicted location.
  • computing resources may be allocated at the identified edge node based on the predicted service type and the predicted time generated in operation 606 .
  • Allocating the computing resources on the identified edge node may include any of the allocation actions discussed herein.
  • the allocation of the computing resources may be performed prior to the predicted time such that a service corresponding to the predicted service type may be initialized or turned up prior to a request for the service, or a bulk of requests for the service, being received at the identified edge node.
  • the machine learning models and systems are able to predict when, where, and how users will use the edge nodes in the edge compute networks hours or days in advance.
  • the present technology is capable of providing service before real-time requests are received—effectively providing real-time before real-time performance.
  • a request is received from a computing device to perform the predicted service type.
  • the request may be received after the allocation of resources in operation 612 .
  • the request may also be received at or substantially near the predicted time generated in operation 608 .
  • the computing device generating the request may be any of the computing devices discussed herein, including the computing devices discussed above with reference to FIG. 1A .
  • the computing device generating the request may be a mobile computing device, such as a smart phone, laptop, vehicle, drone, mobile computer, or a plane.
  • the computing device may also be a stationary computing device, such as a computing device at a home, business, factory, or farm.
  • the identified edge node performs the requested service with the allocated computing resources.
  • FIG. 7 depicts another example method 700 for reducing latency in providing computing services.
  • the operations depicted in example method 700 may be performed by a predictive edge compute system, an edge node, a boundary service, another computing device communicatively connected to a mobile computing device, and/or a combination thereof.
  • a plurality of real-time requests are received from a plurality of computing device.
  • the plurality of real-time requests may be for computing services to be performed by one or more edge nodes of a plurality of edge nodes in an edge compute network.
  • data representative of the plurality of real-time requests is provided as input to a trained machine learning model.
  • the trained machine learning model may be a machine learning model trained on aggregated historical request data, such as the trained machine learning models discussed herein and above with reference to method 600 depicted in FIG. 6 .
  • a prediction for a type of service a prediction for a type of service to be requested at a predicted time and a predicted location in the future is generated from the trained machine learning model.
  • the predictions may be for a plurality of requests from a plurality of devices.
  • an edge node from a plurality of edge nodes in an edge compute network may be identified.
  • the identification of the edge node in operation 708 may be further based on the physical location of the edge node.
  • computing resources may be allocated at the identified edge node based on the predicted service type and the predicted time generated in operation 706 . Allocating the computing resources on the identified edge node may include any of the allocation actions discussed herein. Operation 708 and 710 may be substantially similar to operations 610 and 612 of method 600 depicted in FIG. 6 .
  • FIG. 8 depicts an example method 800 for allocating hardware in a network.
  • the operations depicted in example method 800 may be performed by a predictive edge compute system, an edge node, a boundary service, another computing device communicatively connected to a mobile computing device, and/or a combination thereof.
  • historical request data for a plurality of requests is aggregated.
  • the plurality of requests may be prior requests for computing services to be performed by one or mode edge nodes within the edge computing network.
  • the aggregated historical request data may include a variety of types of request data discussed herein.
  • the aggregated historical request data may include, for a plurality of prior requests, a time of the request, a location of the device from which the request originated, and a type of service being requested, among other types of request data.
  • the aggregated request data may also include a user identifier, a device identifier, latency data, jitter data, and/or packet loss.
  • the aggregated request data may also include usage data such as CPU utilization, network interface utilization, requests per second, memory utilization, network alarms, component temperatures, and other similar usage data.
  • machine learning model is trained based on the aggregated historical request data.
  • the machine learning model may be any type of ML/AI model discussed herein, and training of the machine learning model maybe performed using any of the techniques discussed herein, including the techniques described above with reference to method 600 depicted FIG. 6 .
  • a prediction for an amount or number of requests for services to be performed at the edge nodes may be generated from the machine learning model trained in operation 804 .
  • the trained machine learning model may also generate a prediction of the types of service that will be requested.
  • the machine learning model is trained on usage data, such as CPU utilization, to produce as output predicted usage data.
  • a predicted capacity needed to perform the predicted amount of requests is generated.
  • the predicted capacity may be generated based on historical data regarding the amount of hardware resources that are required to perform the services requested. In some examples, predicting the capacity is also generated based on the predicted service types. For instance, based on historical performance data, a determination may be made as to how much storage, processing power, bandwidth, and other resources were required to perform different services (such as streaming services or AI processing) for a number of requests. That data may then be used to make a determination as to a predicted capacity for the predicted number of requests and the types of requests being made.
  • the output may be usage data which is also indicative of predicted capacity requirements and may be used to generate the predicted capacity requirements. For example, using CPU utilization as an example, the trained machine learning model may provide a predicted CPU utilization for a future time. Based on that predicted CPU utilization, a predicted capacity may be generated.
  • a comparison is made between the predicted capacity generated in operation 808 and a current capacity for one or more of the edge nodes. Based on the comparison, a recommendation for an alteration of hardware resources may be generated. For example, based on the comparison, a determination may be made that the predicted capacity exceeds the current capacity. When such a determination is made, method 800 flows to operation 812 where a recommendation to increase the hardware resources at one or more edge nodes is generated. The recommendation may be made to order additional hardware or transfer hardware from one edge node to another edge node. A hardware order to install the recommended hardware at the one or mode edge nodes may also be initiated or generated. In contrast, based on the comparison in operation 810 , a determination may be made that the predicted capacity is less than the current capacity.
  • method 800 flows to operation 814 , where a recommendation to decrease the hardware resources at one or more edge nodes is generated.
  • the recommendation may also be to transfer hardware resources from one edge node to another edge node.
  • the output of the machine learning model may inherently include a comparison to current capacity. For example, if the trained machine learning model generates an output predicting that CPU utilization will be greater than 100% at a time in the future, a recommendation to increase the hardware resources may be generated because the predicted capacity is greater than the current capacity.
  • the present technology enhances network expansions and contractions based on data generated from the network itself.
  • Planning for network expansions or contractions may be performed over different types of time series, including weeks, months, or years. Costs may also be calculated or otherwise determined. For example, cost per bit may be forecasted and inventory usage can be improved, monitored, and forecasted over time.
  • FIG. 9 depicts another example method 900 for allocating hardware in a network.
  • the operations depicted in example method 900 may be performed by a predictive edge compute system, an edge node, a boundary service, another computing device communicatively connected to a mobile computing device, and/or a combination thereof.
  • historical request data is aggregated for a plurality of prior requests for computing services to be performed by one or more edge nodes.
  • the historical request data may include performance or usage data for plurality of prior requests.
  • the historical request data may include data for jitter, latency, packet loss, CPU utilization, network interface utilization, requests per second, memory utilization, network alarms, component temperatures.
  • machine learning model is trained based on the aggregated historical request data.
  • the machine learning model may be any type of ML/AI model discussed herein, and training of the machine learning model maybe performed using any of the techniques discussed herein, including the techniques described above with reference to method 600 depicted FIG. 6 .
  • the machine learning model is trained to produce an output indicative of predicted performance or usage data in the future. For example, a linear regression model may be applied against the aggregated historical request data to provide a prediction of future performance or usage data having data types corresponding to those data types in the aggregated historical request.
  • a prediction for performance data for future requests is generated from the machine learning model.
  • the predicted performance data may be for predicted future latency values or predicted future CPU utilization.
  • the predicted performance data generated in operation 906 is compared to a predetermined performance threshold to determine whether the predicted performance data exceeds the predetermined performance threshold.
  • the predetermined performance threshold may be based on inherent features of the particular performance data being analyzed. For example, where the performance or usage data is CPU utilization or a similar value, the predetermined performance threshold may be 100%, which indicates that the one or more edge nodes will be at full capacity. In other examples, the predetermined threshold may otherwise be set, such as by a service level agreement. As an example, where the performance data is latency, a maximum latency value may be set in a service level agreement. That maximum latency value may be used as the predetermined performance threshold. Thus, in such an example, a determination is made in operation 908 as to whether the predicted latency value exceeds the maximum latency value being used as the predetermined performance threshold.
  • the method 900 flows to operation 910 where a recommendation to increase the hardware resources at one or more edge nodes is generated.
  • the recommendation may be made to order additional hardware or transfer hardware from one edge node to another edge node.
  • a hardware order to install the recommended hardware at the one or mode edge nodes may also be initiated or generated.
  • the method flows to operation 912 where a recommendation to decrease the hardware resources at one or more edge nodes is generated.
  • the recommendation may also be to transfer hardware resources from one edge node to another edge node.
  • FIG. 10 depicts another example method 1000 for allocating hardware in a network.
  • the operations depicted in example method 1000 may be performed by a predictive edge compute system, an edge node, a boundary service, a beacon, another computing device communicatively connected to a mobile computing device, and/or a combination thereof.
  • traffic data may be collected over a period of time from a beacon.
  • the beacon may any of the beacons discussed herein, such as one of the beacons 310 depicted in FIGS. 3A-3B .
  • the beacon may monitor traffic in the form of the number of devices in a variety of techniques, includes those discussed herein.
  • the devices may be tracked by the beacon based on probe requests sent to the beacon from the each of the devices.
  • the traffic data may include the amount or number of devices that sent probe requests to the beacon during the period of time.
  • a comparison is made between the traffic data collected at operation 1002 and a predetermined traffic threshold.
  • the predetermined traffic threshold may be set based on historical request data for other edge nodes. For example, the predetermined traffic threshold may be based on an average number of devices that other edge nodes receive requests from.
  • An ML/AI model such as a linear regression model, may also be trained based on the traffic data collected from the beacon. The trained machine learning model may then be used to predict an amount of traffic that will pass by the beacon in the future. That predicted traffic data may also or alternatively be compared to the predetermined traffic threshold in operation 1004 .
  • method 1000 flows back to operation 1002 where traffic data continues to be collected. If the traffic data collected from the beacon (or the predicted traffic data) is determined to exceed the predetermined traffic threshold in operation 1004 , method 1000 flows to operation 1006 where a recommendation for installation of a new edge node at the location of the beacon is generated. The recommendation for the new edge node is for a new edge node in addition to a plurality of edge nodes already in existence in the edge computing network.
  • Method 1000 may also provide recommendations for hardware allocations for the recommended new edge node.
  • unique identifiers are extracted for the devices identified in the traffic data.
  • the unique identifiers may be extracted from the probe requests received by the beacon from the devices.
  • the unique identifiers may be MAC addresses for the devices.
  • device types are generated based on the extracted unique identifiers. For example, a device type for each device that sent a probe request may be determined from the corresponding MAC address.
  • the likely types of service requests that would be received from the devices in the traffic data may be predicted based on the device types determined in operation 1010 .
  • the request data gathered by the predictive edge compute system may also include the types of devices that are sending the requests along with the types of requests that are being sent from those devices. Accordingly, a determination may be made as to what types of devices most frequently request what types of services. Thus, by having the types of devices that are passing by the beacons, a prediction may be made as to the likely types of requests that would be generated by those devices.
  • a recommended hardware allocation for the new edge node may be generated. For example, when the predicted computing services include web services, the recommended hardware allocation ma web servers. When the predicted computing services include streaming services, the recommended hardware allocation may include streaming servers. When the predicted computing services include AI services, the recommended hardware allocation may include specialized accelerators, such as GPU-based chips or cards, or similar devices suited for handling AI-related requests.
  • method 1000 may flow to operation 1016 where the recommended new edge node is installed with the recommended hardware allocation. Operation 1016 may also include processing requests from computing devices and performing services with the hardware allocation.
  • FIG. 11 depicts another example method 1100 for allocating hardware in a network.
  • the operations depicted in example method 1100 may be performed by a predictive edge compute system, an edge node, a boundary service, a beacon, another computing device communicatively connected to a mobile computing device, and/or a combination thereof.
  • a plurality of requests for computing services to be performed by an edge node in an edge compute network are received by a beacon.
  • the beacon may be located in a specific physical location in a region.
  • the beacon may any of the beacons discussed herein, such as one of the beacons 310 depicted in FIGS. 3A-3B .
  • a number or amount of requests is extracted from the received plurality of requests.
  • the type of services requested may also be extracted from the received plurality of requests in operation 1104 .
  • the requests are then forwarded to an edge node in the edge compute network for actual performance of the computing services in the request.
  • a comparison is made between the number of requests extracted at operation 1104 and a predetermined traffic threshold.
  • the predetermined traffic threshold may be set based on historical request data for other edge nodes. For example, the predetermined traffic threshold may be based on an average number of requests that other edge nodes receive.
  • An ML/AI model such as a linear regression model, may also be trained based on the extracted number of requests. The trained machine learning model may then be used to predict an amount of requests that will be received by the beacon in the future. That predicted number of requests may also or alternatively be compared to the predetermined traffic threshold in operation 1108 .
  • method 1100 flows back to operation 1102 where requests continue to be received. If the extracted number of requests (or the predicted number of requests) is determined to exceed the predetermined traffic threshold in operation 1108 , method 1100 flows to operation 1110 , where a recommendation for installation of a new edge node at the location of the beacon is generated. The recommendation for the new edge node is for a new edge node in addition to the plurality of edge nodes already in existence in the edge computing network.
  • a recommendation for a hardware allocation may be generated.
  • the recommended hardware allocation may include web servers.
  • the recommended hardware allocation may include streaming servers.
  • the recommended hardware allocation may include specialized accelerators, such as GPU-based chips or cards, or similar devices suited for handling AI-related requests.
  • method 1100 may flow to operation 1114 where the recommended new edge node is installed with the recommended hardware allocation. Operation 1114 may also include processing requests from computing devices and performing services with the hardware allocation.

Abstract

The present technology relates to improving computing services in a distributed network of remote computing resources, such as edge nodes in an edge compute network. In an aspect, the technology relates to a method that includes aggregating historical request data for a plurality of requests for services to be performed by one or more edge nodes; training a machine learning model based on the aggregated historical request data; generating, from the trained machine learning model, a prediction for an amount of requests for services at the one or more edge nodes; generating a predicted capacity needed to perform the predicted amount of requests; comparing the predicted capacity to a current capacity for the one or mode edge nodes; and based on the comparison, generating a recommendation for an alteration of hardware resources at the one or more edge nodes.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • This application claims the benefit of U.S. Provisional Application Ser. No. 62/931,538, filed on Nov. 6, 2019, and titled “PREDICTIVE RESOURCE ALLOCATION IN AN EDGE COMPUTING NETWORK,” the disclosure of which is incorporated herein by reference in its entirety.
  • BACKGROUND
  • Users of computing devices commonly rely on resources remote from the computing device itself to perform operations and tasks. The remote resources are sometimes referred to as cloud-based resources. For example, video streaming services often rely on the delivery of video content to a user's computing device rather than having the video content stored locally on the user's computing device. Other examples include storage of information or remote processing of information, such as for tasks that require more processing power than is readily available on a standard consumer computing device. The remote resources that are accessed, however, may be physically located in disparate locations. In some cases, the physical location of the remote resource is a significant distance from the consumer. Thus, due to the increased distance, latency for communications between the computing device and the remote resource increases.
  • It is with respect to these and other general considerations that the aspects disclosed herein have been made. Also, although relatively specific problems may be discussed, it should be understood that the examples should not be limited to solving the specific problems identified in the background or elsewhere in this disclosure.
  • SUMMARY
  • The present technology relates to improving computing services in a distributed network of remote computing resources, such as edge nodes in an edge compute network. In an aspect, the technology relates to a computer-implemented method for reducing latency in providing computing services. The method includes receiving, from a mobile computing device, first location data for the mobile computing device at a first time; receiving, from the mobile computing device, second location data for the mobile computing device at a second time; and based on the first location data and the second location data, determining a direction vector for the mobile computing device. The method also includes based on the direction vector: identifying an edge node from a plurality of edge nodes corresponding to a predicted location of the mobile computing device; and prior to the mobile computing device being in the predicted location, allocating computing resources for the computing service on the identified edge node.
  • In another aspect, the technology relates to a computer-implemented method for reducing latency in providing computing services. The method includes receiving, from a mobile computing device, first location data for the mobile computing device at a first time; based on the first location data, identifying a first edge node from a plurality of edge nodes; receiving, from the mobile computing device, a request to perform a computing service; and performing, by the first edge node, at least a portion of the requested computing service. The method further includes receiving, from the mobile computing device, second location data for the mobile computing device at a second time; and based on the first location data and the second location data, determining a direction vector for the mobile computing device. The method also includes based on the direction vector: identifying a second edge node from a plurality of edge nodes corresponding to a predicted location of the mobile computing device; and allocating computing resources for the computing service on the second edge node so that the second edge node may continue performing the computing service.
  • In another aspect, the technology relates to a system for reducing latency in providing computing services. The system includes at least one processor; and memory storing instructions that, when executed by the at least one processor, causes the system to perform a plurality of operations. The operations include receiving, from a mobile computing device, first location data for the mobile computing device at a first time; based on the first location data, identifying a first edge node from a plurality of edge nodes; receiving, from the mobile computing device, a request to perform a computing service; performing, by the first edge node, at least a portion of the requested computing service; receiving, from the mobile computing device, second location data for the mobile computing device at a second time; and based on the first location data and the second location data, determining a direction vector for the mobile computing device. The operations further include, based on the direction vector: identifying a second edge node from a plurality of edge nodes corresponding to a predicted location of the mobile computing device; and allocating computing resources for the computing service on the second edge node so that the second edge node may continue performing the computing service.
  • In another aspect, the technology relates to a computer-implemented method for reducing latency in providing computing services. The method includes aggregating historical request data for a plurality of requests, wherein the aggregated historical request data includes at least the following data for a plurality of requests: a time of the request, a location of a device from which the request originated, and a type of service being requested; training a machine learning model based on the aggregated historical request data; and generating, from the trained machine learning model, a prediction for a type of service to be requested at a predicted time and a predicted location. The method further includes, based on the generated predicted location, identifying an edge node, from a plurality of edge nodes, based on a physical location of the edge node; and based on the generated predicted type of service and the predicted time, allocating computing resources for the computing service on the identified edge node.
  • In another aspect, the technology relates to a system for reducing latency in providing computing services. The system includes a plurality of edge nodes having different physical locations; a database storing historical request data for a plurality of requests; at least one processor; and memory, operatively connected to the at least one processor and storing instructions that, when executed by the at least one processor, cause the at least one processor to perform a set of operations. The operation include training a machine learning model based on the historical request data; generating, from the trained machine learning model, a prediction for a type of service to be requested at a predicted time and a predicted location; based on the generated predicted location, identifying an edge node, from a plurality of edge nodes, based on a physical location of the edge node; and based on the generated predicted type of service and the predicted time, allocating computing resources for the computing service on the identified edge node prior to the predicted time.
  • In another aspect, the technology relates to a computer-implemented method for reducing latency in providing computing services. The method include receiving, from a plurality of computing devices, a plurality of real-time requests for services to be performed by one or more edge nodes of a plurality of edge nodes; providing data representative of the plurality of real-time requests as an input into a trained machine learning model, wherein the trained machine learning model has been trained on historical request data; generating, based on an output of the trained machine learning model, a prediction for a type of service to be requested at a predicted time and a predicted location; based on the generated predicted location, identifying an edge node, from the plurality of edge nodes, based on a physical location of the identified edge node; and based on the generated predicted type of service and the predicted time, allocating computing resources for the computing service on the identified edge node prior to the predicted time.
  • In another aspect, the technology relates to a computer-implemented method for allocating hardware resources within a network. The method includes aggregating historical request data for a plurality of requests for services to be performed by one or more edge nodes; training a machine learning model based on the aggregated historical request data; generating, from the trained machine learning model, a prediction for an amount of requests for services at the one or more edge nodes; generating a predicted capacity needed to perform the predicted amount of requests; comparing the predicted capacity to a current capacity for the one or mode edge nodes; and based on the comparison, generating a recommendation for an alteration of hardware resources at the one or more edge nodes.
  • In another aspect, the technology relates to a system for allocating hardware resources within a network. The system includes a plurality of edge nodes having different physical locations; a database storing historical request data for a plurality of requests; at least one processor; and memory, operatively connected to the at least one processor and storing instructions that, when executed by the at least one processor, cause the at least one processor to perform a set of operations. The set of operations include aggregating historical request data for a plurality of requests for services to be performed by one or more edge nodes in the plurality of edge nodes; training a machine learning model based on the aggregated historical request data; generating, from the trained machine learning model, a prediction for an amount of requests for services at the one or more edge nodes; generating a predicted capacity needed to perform the predicted amount of requests; comparing the predicted capacity to a current capacity for the one or mode edge nodes; and based on the comparison, generating a recommendation for an alteration of hardware resources at the one or more edge nodes.
  • In another aspect, the technology relates to a computer-implemented method for allocating hardware resources within a network. The method includes aggregating historical request data for a plurality of requests for services to be performed by one or more edge nodes, wherein the aggregated historical request data includes performance data for the plurality of requests; training a machine learning model based on the aggregated historical request data; generating, by the machine learning model, a prediction for performance data for future requests; comparing the prediction for the performance data to a predetermined performance threshold; and based on the comparison, generating a recommendation for an alteration of hardware resources at the one or more edge nodes.
  • In another aspect, the technology relates to a system for allocating hardware resources in a network. The system includes a plurality of edge nodes having different physical locations; a beacon having a different physical location than the plurality of edge nodes; at least one processor; and memory, operatively connected to the at least one processor and storing instructions that, when executed by the at least one processor, cause the at least one processor to perform a set of operations. The operations include collecting traffic data from the beacon over a period of time, wherein the traffic data includes at least an amount of devices sending probe requests to the beacon; comparing the amount of devices to a predetermined threshold for traffic data; and based on the comparison of the amount of devices to the predetermined threshold for traffic data, generating a recommendation for installation of a new edge node in addition to the plurality of edge nodes.
  • In another aspect, the technology relates to a computer-implemented method for allocating hardware resources in a network. The method includes collecting traffic data from a beacon over a period of time, wherein the traffic data includes at least an amount of devices sending probe requests to the beacon; comparing the amount of devices to a predetermined threshold for traffic data; and based on the comparison of the amount of devices to the predetermined threshold for traffic data, generating a recommendation for installation of a new edge node in addition to a plurality of existing edge nodes.
  • In another aspect, the technology relates to a computer-implemented method for allocating hardware resources in a network. The method includes receiving, at a beacon at a first physical location, a plurality of requests for services to be performed by an edge node in an edge compute network; extracting a number of requests and a service types requested for the plurality of requests; forwarding the plurality of requests to the edge node for performance of the requested services; comparing the number of requests to a predetermined traffic threshold; based on the comparison of the number of requests to the predetermined traffic threshold, generating a recommendation for installation of a new edge node in addition to the existing edge node; and based on the extracted service types, generating a recommendation for a hardware allocation for the new edge node.
  • This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. Additional aspects, features, and/or advantages of examples will be set forth in part in the description which follows and, in part, will be apparent from the description, or may be learned by practice of the disclosure.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Non-limiting and non-exhaustive examples are described with reference to the following figures.
  • FIG. 1A depicts an example environment for which the present technology may be implemented.
  • FIG. 1B depicts an example of a predictive edge compute system.
  • FIG. 1C depicts an example of an edge node.
  • FIG. 1D depicts an example of a suitable operating environment.
  • FIG. 2 depicts an example system having a mobile computing device.
  • FIG. 3A depicts an example system having a plurality of beacons.
  • FIG. 3B depicts another example system having a plurality of beacons.
  • FIG. 4 depicts an example method for reducing latency in providing computing services.
  • FIG. 5 depicts another example method for reducing latency in providing computing services.
  • FIG. 6 depicts another example method for reducing latency in providing computing services.
  • FIG. 7 depicts another example method for reducing latency in providing computing services.
  • FIG. 8 depicts an example method for allocating hardware in a network.
  • FIG. 9 depicts another example method for allocating hardware in a network.
  • FIG. 10 depicts another example method for allocating hardware in a network.
  • FIG. 11 depicts another example method for allocating hardware in a network.
  • DETAILED DESCRIPTION
  • As discussed above, remote computing resources or computing services are often utilized to process data or accomplish tasks. When a local device, such a mobile device of a user, sends a request to a remote computing resource, such as an edge node in an edge compute network, for a service to be performed or data to processed, the request must first travel from the local device through the network to the edge node. The edge node then processes the request by performing the requested service. A response to the request based on the performed service is then sent from the edge node back to the local device. Each of these operations takes time. Increasing the distance between the local device and the remote resource increases the amount of time, or latency, between a request being sent and a response being received. Further, if the remote resource is not properly prepared to handle the request, the amount of time taken to process the request also increases. In time-sensitive applications, these increased delays may cause significant difficulties or even render the application on the local device unusable.
  • Among other things, the present technology reduces the latency between the local device and the edge nodes of an edge compute network by reducing the distance between the local device and the remote computing device as well as preparing the edge node for the request prior to receiving the request. In some examples, the local device may be a mobile computing device, such as a smart phone or laptop. The mobile device thus moves with its user. As the mobile computing device moves, future locations for the mobile device may be predicted, such as by determining a direction vector for the device based on the prior locations of the device. In an example, at a first location, the mobile device may be requesting a first edge node to perform a task and provide responses. That first edge node may be the edge node that is physically closest to the first location, but the mobile computing device may be moving further away from that first edge node. Thus, a second edge node may be closer to the mobile computing device at some time in the future. By predicting the future location of the mobile computing device, computing resources may be allocated, such as initializing a service on the second edge node so that the second edge node can be prepared to continue to process requests from the mobile computing device even before the second edge node receives any requests from the mobile computing device. Thus, when the mobile computing device is closer to the second edge node, the requests can be directed to the second edge node to maintain or reduce the roundtrip path distance for the requests and responses without incurring additional delays due to the second edge node having to prepare to process the requests. Accordingly, the processing capabilities of the edge nodes effectively follow the mobile computing device to maintain or reduce latency.
  • In addition, the present technology is able to predict the types of requests that will be received at different edge nodes located at different physical locations. The predictions may provide for the types of requests that will be received at different times and different locations. For example, an edge node located in an urban environment may typically receive requests for performing business-related tasks during working hours but typically receive requests for streaming services during non-working hours. Different computing resources are used to perform the varying types of tasks. By predicting the request types and the times the requests will be received, the proper computing resources may be allocated in the edge node(s) prior to the requests being received. The predictions may be made through the use of machine learning and/or artificial intelligence. For example, historical request data may be aggregated for a plurality of requests. That historical request data may include data such as a time of the request, a location of a device from which the request originated, a type of service being requested, and/or a user/device identifier (such as a media access control (MAC) address). A machine learning model may then be trained from the aggregated historical request data. The trained machine learning model may then be used to make predictions for future requests and computing resources may be allocated to the edge nodes accordingly. Thus, the limited capacity of each node may be used more efficiently while also maintaining low latency for processing requests and providing computing services.
  • The present technology is also able to predict edge compute network capacity and hardware requirements. For example, as discussed above, predictions may be made based on the historical request data as to what types of requests will be received in the future and where those requests will be received. The present technology is also able to predict the amount of requests as well as the effect those requests may have on the network. Such predictions may be used to help ensure that the particular edge node has capacity to perform the requested services in the future. For example, the predictions may be utilized to efficiently provision hardware resources at each edge node based on the types and amounts of computing services that are predicted to be requested at each of the edge nodes. Therefore, the network itself provides feedback about its hardware needs to continue operating at high-quality performance values, such as providing services at low latency levels.
  • In addition to predicting the hardware resources that will be needed for the edge nodes already in place, the present technology may also be used to efficiently provision new edge nodes. The edge compute network may include a plurality of beacons that function to monitor traffic in a particular location. The beacons may be low-cost implementations that may be installed at a variety of locations, including on outdoor structures such as lamp posts or buildings. The beacons monitor traffic passing by the beacons by operating as a WiFi and/or Bluetooth beacon. In some examples, the beacons may also forward requests from authenticated users of the network to one or more of the edge nodes. By monitoring the traffic, a determination may be made as to whether an edge node should be installed at the location of the beacon. In addition, the types of hardware that should be installed at the edge node may also be identified. Thus, the use of beacons allows for the network itself to provide feedback that allows more efficient installation of the edge nodes and hardware within the edge nodes.
  • FIG. 1A depicts an example system 100 for which the present technology may be implemented. The depicted system 100 includes plurality of edge nodes 106 located in different physical locations of a region 104, such as a state or country. The edge nodes 106 may be part of an edge compute network. In general, an edge compute network is a network that moves the processing of certain data to the edge nodes 106 rather than at a centralized computing resource. By moving the processing capabilities of the network closer to the edge, the processing capabilities can be moved closer to the devices actually requesting the processing capabilities. One example of an edge compute network is a content distribution network (CDN).
  • Multiple devices or facilities may be requesting the processing capabilities of the edge computing network and the edge nodes 106 thereon. For example, the system 100 may include a plurality of mobile computing devices, such as smart phones 108 or tablets, mobile computers 110 such as laptops, and vehicles 112. While not depicted in system 100, other mobile computing devices such as drones, planes, trains, and similar computing devices that are intended to move may be present in the system 100. Stationary or fixed computing devices may also request the processing capabilities of the edge nodes 106 in the edge computing network. Such stationary computing devices may be housed or fixed within facilities such as businesses 114 or factories 116. Other facilities may include farms, ranches, housing, or other facilities that have computing devices that utilize the processing capabilities of the edge nodes 106. Other computing devices may also include devices associated with the Internet of Things (IoT), such as cameras, home assistant devices, robots, televisions, and appliances, among other devices.
  • The mobile computing devices and/or stationary computing devices communicate requests for different types of data processing or computing services to one or more of the edge nodes 106. The edge node 106 that receives the request processes the request and provides a response back to the computing device that sent the request. The particular edge node 106 for which the computing device may communicate may be based on the service boundaries 107 for the edge nodes 106. For example, if a smart phone 108 is within a service boundary 107 of a particular edge node 106, the smart phone 108 may send requests to that particular edge node 106.
  • The request data that is received by the edge nodes 106 may also be communicated to a predictive edge compute system 102. The request data that is sent to the predictive edge compute system 102 may include different types data relating to how customers or users are utilizing the processing capabilities or computing services of the edge computing network. For instance, the request data may include location information, time and date information, the customer requesting the service, the type of services requested, the bandwidth required to service the requests, and the duration for which the requests were received, among other data. The request data may include different types of protocol data as well, including data relating to layers 3-7 of the Open Systems Interconnection (OSI) model. In some examples, application-level (layer 7) data may be useful in identifying request types and the types of computing services requested. For instance, data relating to the application services may be used to identify the applications that are running and being requested on the local devices and edge nodes 106. The predictive edge compute system 102 utilizes that request data ultimately to orchestrate or allocate computing resources on the edge nodes 106. Additional information regarding the predictive edge compute system 102 is provided below with reference to FIG. 1B.
  • FIG. 1B depicts an example of a predictive edge compute system 102. The predictive edge compute system 102 may include a data collection component 120, a data storage component 122, a machine learning (ML) and/or artificial intelligence (AI) component 124, and an orchestration component 126. The components of the predictive edge compute system may operate together to perform one or more of the operations described herein. The data collection component 120 collects the request and/or service data from the edge nodes 106. The data collection component may modify the request data to place the request data from the different edge nodes 106 in a uniform format. The data collection component 120 may also further tag the request data with a particular data type. The data collection component 120 may also facilitate the storage of the received request data in the data storage component 122. The data storage component 122 may include at least one database and/or data store for storing the request data collected by the data collection component 120. The data storage component 122 may also include physical hardware such as physical memory of the types discussed herein. The request data may be stored in the data storage component 122 in any suitable manner that allows for retrieval and access of the request data by other components. For instance, the request data may be sorted or organized in the data storage component 122 in different manners, such as through the use of relational databases, object-oriented databases, graph databases, and/or a structured query language (SQL) database, among others.
  • The ML/AI component 124 accesses and utilizes the request data to predict orchestration or resource allocation needs for devices in the example system 100. In some examples, the ML/AI component 124 may already include trained ML/AI models. In other examples, the ML/AI component 124 may train ML/AI models. The ML/AI component 124 may also continue to train or update trained ML/AI models after the initial training of the ML/AI models. The machine learning techniques that are implemented by the ML/AI component may include supervised or unsupervised machine learning techniques. For instance, supervised machine learning algorithms may be utilized based on the tagged or labeled request data. The request data may include data including a request type, a request time, and a request location. Supervised machine learning techniques may then be used to train an ML/AI model to predict future times, locations, and request types, among other data. Regression-based and/or classification-based supervised learning algorithms or techniques may be implemented. Some machine learning models that may be used include decision trees, a random forests, neural networks, deep learning models, continual learning models, Markov models, linear regression models, nearest neighbor models, Gaussian Naïve Bayes models, support vector machine (SVM) models, among others.
  • Unsupervised machine learning techniques may also be implemented to identify additional correlations and insights that may have been previously unknown. Clustering-based, association-based, and anomaly-based unsupervised learning algorithms, among others, may all be used for the request data. Clustering algorithms are generally directed to problems where the goal is to discover inherent clusters or grouping of data, and association algorithms are generally directed to problems where the goal is to discover rules that describe large portions of request data. Anomaly detection algorithms generally are directed to discovering unusual or outlier metrics within the request data. Semi-supervised machine learning techniques may also be utilized where a portion of the request data is tagged, but some request data is not properly tagged. Reinforcement machine learning techniques and algorithms may also be implemented. In reinforcement machine learning techniques, the ML/AI model continues to be trained on a feedback system of request data.
  • The ML/AI component 124 provides an output that is provided to an orchestration component 126. The output of the ML/AI component 124 may be indicative of request types that are to be seen in the future at a particular location, among other data or information discussed herein. The output of the ML/AI component 124 may also be indicative of the types of the services that will be required in a particular location at a particular time. The orchestration component 126 may then use that output from the ML/AI component 124 to orchestrate the edge nodes 106. Orchestrating the edge nodes 106 may include communicating instructions from the predictive edge compute system 102 to the edge nodes 106. The instructions may include resources that should be allocated at a particular edge node 106 at a particular time. Additional details regarding network orchestration are provided in U.S. Pat. No. 9,882,833, titled “Intent-Based Services Orchestration,” which is incorporated by reference herein in its entirety. For example, Network Functions Virtualization (“NFV”) and virtual network functions (“VNFs”) may be used to implement resource allocation for orchestration utilized by the technology described herein. Implementation of NFV and VNFs, in general, and as used in other network applications, is described in further detail in the U.S. patent application Ser. Nos. 14/730,695; 14/678,208; 14/678,280; and Ser. No. 14/678,309, which are also incorporated by reference in their entireties. In part, the orchestration operations are performed in the present technology to initialize or turn up services within a particular edge node 106.
  • Allocating the computing resources of the edge nodes 106 may include operations such as deploying virtualized software, virtualized instances, virtualized machines, virtualized infrastructures, and/or virtualized containers. For example, if a particular computing service requires virtualized software or a virtualized machine, that virtualized software or machine may be deployed on an edge node 106 prior to receiving requests for that particular service. Accordingly, time is not wasted loading or initializing the software for a machine when the request is received, which may lead to significant increases in latency. Allocating the computing resources may also include loading a database into memory of one of the edge nodes 106 or caching content in one of the edge nodes for a particular computing service. For example, if a particular service requires specific content, such as a streaming service, that content may be loaded at a particular edge node 106 at a time prior to the content being requested. Accordingly, the content may already be cached at the edge node 106 prior to a request for the content being received by the edge node 106. Allocating the computing resources of the edge node 106 may also include allocating storage resources in memory of the edge node 106.
  • FIG. 1C depicts an example of an edge node 106. The edge node 106 includes hardware and software to process requests and perform services requested by the users of the local devices. The edge node 106 include various components or features, such as a server 130, a field-programmable gate array (FPGA) 132, a central processing unit (CPU) 134, a graphics processing unit (GPU) 136, storage devices 138, and network resources 140, among other possible computing components or features. The components of the edge node 106 are configured to provide services and compute data according requests of the local devices. Accordingly, the edge node 106 performs significantly more functions beyond those functions performed by simple routers or switches. In some examples, an edge node 106 may be an endpoint of an edge compute network and may be located at locations such as gateway locations, central offices, point-of-presence (POPs) locations. Thus, as workloads, resources, and/or services are transferred to different edge nodes 106 throughout an edge compute network, those workloads may be moving to different physical locations, which allows for different portions of the edge compute network to be utilized on demand in locations that are best suited for the users making the requests.
  • FIG. 1D depicts an example of a suitable operating environment that may be implemented by an edge node 106, the local devices communicating with the edge node 106, and/or the predictive edge compute system 102. In its most basic configuration, operating environment 150 typically includes at least one processing unit 152 and memory 154. The processing unit may be a processor, which is hardware. Depending on the exact configuration and type of computing device, memory 154 (storing, instructions to perform the motion detection techniques disclosed herein) may be volatile (such as RAM), non-volatile (such as ROM, flash memory, etc.), or some combination of the two. This most basic configuration is illustrated in FIG. 5 by dashed line 156. The memory 154 stores instructions that, when executed by the processing unit(s) 152, perform the processes and operations described herein, such as generating and interpreting data signals. Further, environment 150 may also include storage devices (removable 158, and/or non-removable 160) including, but not limited to, solid-state, magnetic disks, optical disks, or tape. Similarly, environment 150 may also have input device(s) 164 such as keyboard, mouse, pen, voice input, etc. and/or output device(s) 166 such as a display, speakers, printer, etc.
  • Additional communication connections 162 may also be included that allow for further communication with LAN, WAN, point-to-point, etc. Operating environment 150 may also include geolocation devices 170, such as a global positioning system (GPS) device.
  • Operating environment 150 typically includes at least some form of computer readable media. Computer readable media can be any available media that can be accessed by processing unit 152 or other devices comprising the operating environment. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transitory medium which can be used to store the desired information. Computer storage media is non-transitory and does not include communication media.
  • Communication media embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared, microwave, and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
  • FIG. 2 depicts an example system 200 having a mobile computing device 208. The example system may be similar to the example system 100 discussed above. For instance, the system 200 includes a first edge node 206A, a second edge node 206B, and a third edge node 206C. Each of the edge nodes 206 may have a service boundary 207. The first edge node 206A may have a first service boundary 207A, the second edge node 206B may have a second service boundary 207B, and the third edge node 206C may have a third service boundary 207C. The service boundaries 207 may have different sizes or configurations relative to one another. For example, an edge node 206 located in a rural area may have a larger service boundary 207 than an edge node 206 located within an urban environment. The service boundaries 207 may be statically configured to cover a specific area or the service boundaries 207 may be dynamic boundaries that change with demand and based on capacity of the corresponding edge node 206. For example, if an edge node 206 is nearing maximum capacity for a particular type of service, the corresponding service boundary may reduce in size. In addition, each edge node 206 may have multiple service boundaries 207 corresponding to different service types offered by the edge node 206. For example, if the second edge node 206B offers machine learning compute services, but the first edge node 206A and the third edge node 206C do not, the second edge node 206B may have a large service boundary 207B for machine learning compute services.
  • The system 200 may also include a user boundary service 211 and an edge node boundary service 212. The user boundary service 211 may be housed or provided by a separate device such as depicted in system 200. In other examples, the user boundary service 211 may be housed or provided by one of the edge nodes 206. Similarly, edge node boundary service 212 may be housed or provided by a separate device such as depicted in system 200. In other examples, the edge node boundary service may be housed or provided by one of the edge nodes 206.
  • The user boundary service 211 tracks or stores the location of mobile and stationary computing devices, such as mobile computing device 208. The user boundary service 211 may track the location of the computing devices by receiving location data from the mobile computing device 208 that indicates the location of the mobile computing device 208. The location data may be generated from a geolocation device, such as a GPS device, located in the mobile computing device 208. For instance, the geolocation device may generate a location of the device and provide that location with a timestamp to the user boundary service 211. The location of the mobile computing device 208 may also be determined by the user boundary service 211 in different manners as well. As some examples, the location of the mobile computing device 208 may be determined based on the IP address of the mobile computing device 208 or a WiFi access point being used by the mobile computing device 208. A user of the mobile computing device 208 may also manually input the location of the mobile computing device. The mobile computing device 208 may report its location to the user boundary service 211 at regular time intervals.
  • The edge node boundary service 212 tracks or stores the location of the edge nodes 206. The edge node boundary service 212 may track the location of the edge nodes 206 by receiving location data from the edge nodes 206. The location data may be generated from a geolocation device, such as a GPS device, located in the edge node 206. For instance, the geolocation device may generate a location of the device and provide that location with a timestamp to the edge node boundary service 212. The location of the edge node 206 may also be determined by the edge node boundary service 212 in different manners as well. As some examples, the location of the edge node 206 may be determined based on the IP address of the edge node 206 or a WiFi access point being used by the edge node 206. The location of the edge node 206 may also be input manually. The location of each of the edge nodes 206 may also be stored in a table and updated when, or if, the edge nodes 206 move. The edge nodes 206 may report their location to the edge node boundary service 212 at regular time intervals.
  • During normal usage of the mobile computing device 208, the mobile device may move throughout the region 204. The mobile device 208 may begin at a first location, such as the location of the mobile computing device 208 depicted in FIG. 2. At the first location, the mobile computing device 208 may request a remote computing service to be performed. Based on the first location of the mobile computing device 208, the request may processed and the service performed by the first edge node 206A because the first location of the mobile computing device 208 is within the first service boundary 207A of the first edge node 206A. As an example, the mobile computing device 208 may request database processing or a live stream service. The first edge node 206A may begin performing those services and providing responses to the mobile computing device 208. In traditional technology, the mobile computing device 208 would have been tied to the first edge node 206A even when the mobile computing device 208 moved. In the example of a live stream service, the service would continue to be provided by the first edge node 206A even as the mobile computing device 208 traveled a significant distance away from the first edge node 206A. In that scenario, as the mobile computing device 208 moved further away, latency increased causing interruptions in the live stream and reducing the level or quality of service being provided. The present technology improves that scenario by causing the service being performed to move with, or follow, the mobile computing device 208.
  • In the present technology, as the mobile computing device 208 moves, a direction vector 209 for the mobile computing device is determined or generated. The direction vector 209 may be determined by a predictive edge compute system. The direction vector 209 may be determined based on a first location of the mobile computing device 208 at a first time and a second location of the mobile computing device 208 at a second time. Based on the determined direction vector 209, a different edge node 206 is identified based on a predicted future location of the mobile computing device 208.
  • For example, the mobile computing device 208 may be moving in a direction towards the second edge node 206B. Prior to the mobile device 208 reaching a location within the second service boundary 207B for second edge node 206B, computing resources may be allocated on the second edge node 206B such that the second edge node 206B can begin processing requests from the mobile computing device once it is within the second service boundary 207B. The resources allocated on the second edge node 206B may be the same or similar to the resources of the first edge node 206A being used to process the requests or perform the compute operations requested by mobile computing device when the mobile computing device 208 is in the first location. Accordingly, the service can continue to be provided to the user without interruption and with a consistently low latency as the mobile computing device 208 moves around the region 204. For instance, if a service is initialized or turned up at the first edge node 206A, that same service may be initialized or turned up at the second edge node 206B based on a prediction that the mobile computing device will be within the second service boundary 207B due to the movement of the mobile computing device 208. Once the mobile computing device 208 has reached the second service boundary 207B and the requested service is being provided by the second edge node 206B, the service can be stopped on the first edge node 206A and the resources that were allocated to perform the service on the first edge node 206A may then be used to perform other services for other users.
  • An aggregated or cluster-based direction vector may also be generated for a plurality of mobile computing devices moving throughout the region 204. For instance, the locations of multiple mobile computing device may be utilized to determine an aggregate direction vector. That aggregate direction vector may then be used to predict the future location of multiple computing devices. Aggregate direction vectors may also be generated based on different types of services being requested by mobile computing devices. For example, a first aggregate direction vector may be generated for the mobile computing devices requesting a database processing service and a second aggregate direction vector may be generated for the mobile computing devices requesting a live streaming service. The resources required to perform the database processing service may be different than the resources required to perform the live streaming service. For instance, the database-based request may require the loading the database into memory of an edge node 206. Accordingly, predicting the location where each those services will be requested allows for the appropriate resources to be allocated at the appropriate edge node 206.
  • Initializing services or allocating resources at each of the edge nodes 206 based on such predictions allows for a more efficient use of the hardware resources that are available at each of the edge nodes 206. Each edge node 206 has a limited amount of capacity due to the hardware resources available at each edge node 206. Accordingly, not every service that could be requested by a user may be initialized and operating at all times at all edge nodes 206. Even if such a perpetual operation of all services at all locations was possible, such an implementation would likely be a significantly inefficient use of power and hardware resources. With the present technology, the hardware resources of the edge nodes 206 are used more efficiently while also reducing the latency for communications within the edge compute network and users' computing devices for which the edge compute network is performing the services.
  • FIG. 3A depicts an example system 300A having a plurality of beacons 310. The system 300A is similar to system 100 and system 200 discussed above with the exception that system 300A includes a plurality of beacons 310. The beacons 310 serve as network probes to predict and determine potential future growth of the edge compute network. For instance, the beacons 310 may monitor devices that pass by the beacons 310. That information may then be used to predict the need for another edge node 206 at or near the location of one or more of the beacons 310. The beacons 310 may be located in positions that are not already well-covered by one or more edge nodes 206. The beacons may also be placed near areas of potential high traffic of computing devices, such as roadways, waterways, shipping lanes, flight paths, etc.
  • Each of the beacons 310 may include wireless connectivity and/or wired connectivity components, such as WiFi, Bluetooth, Ethernet, 100BaseT, and/or GigE connections. The beacons 310 may include wireline or wired interfaces to allow for the wired connections, such as Ethernet-based connections. The beacons 310 may also include cellular data interfaces to allow for cellular connections and cellular data services, such as 3G, 4G, and/or 5G cellular data services. The beacons 310 may also include memory and storage devices along with some processing components, such as a processor. In some examples, the primary components of the device may be made from a miniature computer, such as a Raspberry Pi, Jetson Nano, or similar device. Each of the beacons 310 may also be environmentally hardened to protect against weather and the elements. For example, the beacons 310 may be waterproof or water resistant, resistant to high or low temperatures, and/or shock resistant. By environmentally hardening the beacons 310, the beacons 310 may be placed in outdoor environments, such as on light posts, buildings, towers, or any other outdoor structures. The beacons 310 may also include alternative power sources to allow for remote usage. For instance, the beacons may include batteries and solar cells to allow the batteries to recharge. Wind-based charging components, such as a small turbine, may also be included to recharge the batteries of the beacons 310. The beacons 310 may also have additional external physical connection features or adhesives to allow for connection to outdoor structures.
  • The beacons 310 may monitor traffic passing by the beacons 310 by monitoring requests for an access point or connection. For example, the beacons 310 may each operate as a WiFi beacon and/or a Bluetooth beacon by broadcasting the presence of the network, such as by broadcasting a service set identifier (SSID) or Bluetooth name. Mobile computing devices 308 that utilize active scanning also announce their presence to the beacons 310 as they pass by the beacons 310. For example, a WiFi or Bluetooth-enabled mobile computing device 308 may transmit a probe request to the beacons 310. In response, the beacons 310 may transmit a probe response to the mobile computing device 308. The probe request sent by the mobile computing device 308 to the beacon may include identifying information about the mobile computing device 308. The identifying information may include a unique identifier for the device, such as a media access control (MAC) address, an Organizationally Unique Identifier (OUI), an Individual Address Block (IAB), Extended Unique Identifier (EUI), a cookie, or similar identifiers. From the unique identifier, the manufacturer of the mobile computing device 308 that sent the probe request may be identified, and in some examples the type of mobile computing device 308, including the model of the mobile computing device 308, may be determined or identified. For instance, in a MAC address, the first three octets identify the manufacturer. The first three octets of the MAC address may represent the OUI. Accordingly, each of the beacons 310 are able to identify the amount of devices and the types of devices that pass by each of the beacons 310.
  • With the amount of devices and the types of the devices that pass by each of the beacons 310, a determination may be made as to whether a new edge node should be placed at or near the location of a particular beacon 310. For example, if a high number or an increasing number of devices are passing by a particular beacon, a new edge node may be needed at the location of the beacon 310. The data regarding the types of devices that pass by the beacons 310 further allows for a prediction of the hardware that should be installed in the new edge node. For example, the request data gathered by the predictive edge compute system may also include the types of devices that are sending the requests along with the types of requests that are being sent from those devices. Accordingly, a determination may be made as to what types of devices most frequently request what types of computing services. Thus, by having the types of devices that are passing by the beacons 310, a prediction may be made as to the likely types of requests that would be generated by those devices. Based on the likely types of services that are requested, the types of hardware required for newly installed edge nodes may be determined. Therefore, the edge compute network may be expanded in a more efficient manner based on predictions and data generated from the network itself.
  • In some examples, the beacons 310 may also serve as access points to the Internet and/or the edge compute network. In such examples, users or mobile computing devices that are previously associated with the service provider operating the beacons 310 and/or the edge compute network may join the network of the beacons 310 either through WiFi, Bluetooth, or any other communication type supported by the beacons 310. For instance, the beacons 310 may also have wireline connections as well as cellular connections and data services, such as 3G, 4G, and/or 5G connectivity and data services. For example, customers of the edge compute network may be authenticated by the beacons 310 and allowed to join the WiFi or Bluetooth network of the beacons 310. In such examples, the beacons 310 may act as a forwarding device that forwards requests from the mobile computing devices to one or more of the edge nodes 306. As an example, a mobile computing device 308 may join the network offered by the beacon 310C. The mobile computing device 308 may then send a request to the edge compute network to perform a computing service. The beacon 310C may forward that request on to an edge node 306 to process the request and/or perform the service, such as edge node 306C. The beacon 310C differs from the edge nodes 306 in that the beacon 310C does not process the requests or perform the requested services that are received, and the beacon 310C may not have the capabilities to process the requests or perform the requested services.
  • When a beacon 310C forwards the request to the edge node 306, the beacon 310C extracts data from the request, such as the time of the request, the location of the request, the type of service requested, a unique identifier for the mobile computing device 308, the particular edge node 306 where the request was forwarded, and other types of request data discussed herein. The beacon 310C may also extract a user or device identifiers from the received requests. By extracting the user or device identifiers, the system is able to track which users or devices are requesting certain types of services and at what times those users are requesting those services. The beacon 310C may extract such data from each request received from each of the devices that have joined the network offered by the beacon 310C. Thus, the beacon 310C is able to keep a historic record of the usage and traffic that passes through the beacon 310C.
  • Based on the extracted data, the number of requests that are received near the beacon 310C as well as the types of services that are requested may be determined. If the number of requests exceeds a predetermined traffic threshold, then a recommendation to install a new edge node 306 at the location of the beacon 310C may be generated. A recommendation to install the new edge node 306 may also be based on a rate of change of the number of requests that are received near or at the beacon 310. An ML/AI model may also be trained based on the extracted request data, and used to generate a predicted future number of requests. The rate of change of the number of requests and/or the predicted number of future requests may also be used in determining whether to generate a recommendation to install the new edge node 306. For example, if the rate of change or the predicted number of future requests exceeds a predetermined threshold, then a recommendation to build the new edge node 306 at the location of the beacon 310C may be generated.
  • The extracted types of service requested may also be used to generate a recommendation for a hardware allocation for the edge node. For example, when the request types include web requests, the recommended hardware allocation may be for web servers. When the request types include streaming requests, the recommended hardware allocation may include streaming servers. When the request types include AI requests, the recommended hardware allocation may include specialized accelerators, such as GPU-based chips or cards, or similar devices suited for handling AI-related requests. The foregoing request types and recommended hardware allocations are not meant as limiting, but rather are provided as examples.
  • Other performance related factors may also be determined, such as the total distance the forwarded requests have to travel to be processed by an existing edge node 306. For example, the beacons may communicate with the edge node boundary service 312 and provide the location of the beacons 310 to the edge node boundary service 312. The locations of the beacons 310 may be provided to the edge node boundary service 312 in the same or similar manner as the locations of the edge nodes 306 are provided to the edge node boundary service 312, as discussed above. The request data extracted from the beacon 310 may also include an identification of the particular edge node 306 to which the request was forwarded by the beacon 310. Because the location of the particular edge node 306 is known by the edge node boundary service 312 and the location of the beacon 310 forwarding the request is also known by the edge node boundary service 312, the distance between the beacon 310 and the particular edge node 306 may also be known or determined. The distance may be a physical difference between the two locations or the physical distance the request must travel through the network. Performance metrics, such as latency, may also be tracked by the beacon 310 for the requests that are forwarded. The latency data may also be indicative of distance. The distance and/or performance metrics extracted by the beacon 310 may then be used in the determination as to whether a new edge node 306 should be installed at the location of a beacon 310.
  • As a specific example, the beacon 310C may receive a large number of probe requests from a plurality of devices and/or a large number of requests that are to be forwarded to an edge node 306 for processing. Due to the large number of requests, a recommendation may be generated to replace the beacon 310 with another edge node 306. FIG. 3B depicts an example system where a new edge node 306D has been installed in place of the beacon 310C. The new edge node 306D has a corresponding service boundary 307D. By installing the new edge node 306D, computing devices, such as mobile computing device 308, near the new edge node 306D may experience reduced latencies for service requests from the edge compute network because the requests can be processed more closely to the computing devices. Accordingly, once the new edge node 306D is installed, requests can be processed by the edge compute network with lower latencies. In addition, the installation of the new edge node 306D was made due to proven need for the new edge node 306D that was generated by the components of the edge compute network itself. Thus, resources are not wasted in installing edge nodes 306 where there is no need for an edge node 306.
  • FIG. 4 depicts an example method 400 for reducing latency in providing computing services. The operations depicted in example method 400 may be performed by a predictive edge compute system, an edge node, a boundary service, another computing device communicatively connected to a mobile computing device, and/or a combination thereof. At operation 402, first location data for a mobile computing device at a first time may be received from the mobile computing device. At operation 404, second location data for a mobile computing device at a second time may be received from the mobile computing device. The mobile computing device may be a smart phone, laptop, vehicle, drone, mobile computer, or a plane, among other types of mobile computing devices.
  • Based on the first location data and the second location data, a direction vector for the mobile computing device may be determined or generated in operation 406. The direction vector may be indicative of a direction that the mobile computing device is travelling and a speed at which the mobile device is traveling. Thus, from the direction vector, a future location of the mobile computing device may be predicted. The direction vector may also be based on other data in addition to the first location data and the second location data. For example, the direction vector may be based on additional location data for the mobile computing device. The direction vector may also be based on mapping data that indicates the mobile computing device is travelling along a known roadway, waterway, railway, or similar constrained transportation feature. In such examples, the direction vector may be modified to match the shape or features of the transportation feature. The direction vector may also be based on historical location data for the mobile device. For example, a mobile device may travel a predictable route at certain times of day that track habitual movements of the user, such as a work commute
  • In addition, the direction vector may be based on an aggregation or clustering of location data from a plurality of devices. For example, location data may be received from an additional mobile computing device for similar times as the first mobile computing device. The direction vector may then be based on the additional location data for the additional mobile computing devices. In examples where location data is collected from multiple devices and/or users, a unique identifier may be assigned or correlated with each of the devices and/or users to allow for separation of the location data and to allow for tracking of individual users and/or individual devices. The unique identifier may be any of the unique identifier discussed herein, included a MAC address and/or a cookie.
  • At operation 410, based on the direction vector, an edge node from a plurality of edge nodes in the edge compute network is identified that corresponds to a predicted location of the mobile computing device. Identifying the edge node in operation 410 may include accessing service boundaries for the plurality of edge nodes in the edge compute network. The direction vector and/or the predicted location of the mobile computing device may then be compared to the service boundaries for the plurality of edge nodes. Based on the comparison of the direction vector and/or the predicted location of the mobile computing device to the service boundaries, the edge node may be identified. For instance, the predicted location of the mobile computing device may lie within one of the service boundaries. The edge node for which the service boundary corresponds is then identified as the edge node.
  • At operation 412, once the edge node is identified, computing resources for a particular computing service are allocated on the identified edge node. The computing resources are allocated prior to the mobile device actually being in the predicted location. The timing of the allocation of resources may also be based on the direction vector as the resources are to be allocated before the mobile computing device arrives in the predicted location. For example, the computing resources may be allocated prior to the mobile computing device entering the service boundary for the identified edge node. Allocating resources on the identified edge node may include actions such as deploying a virtualized software, deploying a virtualized instance, deploying a virtualized machine, deploying virtualized infrastructure, deploying a virtualized container, loading a database into memory of the identified edge node, caching content for the computing service, and/or allocating storage resources in memory of the identified edge node, among other resource allocation actions discussed herein. For example, the computing service may be a database-based service and allocating the computing resources includes loading the corresponding database into memory of the identified edge node. Loading a database of considerable size may take a considerable amount of time. Thus, if the database was not loaded prior to receiving a request for the service, the latency for performing the requests would be considerably increased.
  • At operation 414, subsequent to the allocation of the computing resources on the identified edge node, a request to perform the computing service is received from the mobile computing device. The request may be received when the mobile computing device is in the predicted location and/or at a predicted time based on the direction vector. At operation 416, the requested computing service is performed by the identified edge node using the resources that were allocated in operation 412. Log files for the requests that are received and the services that are performed may also be generated and stored during performance of method 400. The log files may include the types of request data discussed herein including data regarding the users making the requests, unique identifiers for the users and/or the mobile computing devices making the requests, the time the requests are being sent, the types of services being requested, and the location from which the requests are generated, and the location of the edge node performing the services, among other types of data. Those log files may then be provided as feedback into the predictive edge compute system to improve the system and further train the ML/AI models discussed herein. In some examples, if a request for a service corresponding to the allocated resources is not received within a predetermined time frame, the allocated resources may be reallocated for another service or deallocated to conserve resources.
  • FIG. 5 depicts another example method 500 for reducing latency in providing computing services. The operations depicted in example method 500 may be performed by a predictive edge compute system, an edge node, a boundary service, another computing device communicatively connected to a mobile computing device, and/or a combination thereof. At operation 502, first location data for a mobile computing device at a first time may be received from the mobile computing device. The mobile computing device may be a smart phone, laptop, vehicle, drone, mobile computer, or a plane, among other types of mobile computing devices.
  • At operation 504, a first edge node from a plurality of edge nodes in an edge compute network is identified. The first edge node may be identified by comparing the first location data to the service boundaries for the plurality of edge nodes. For example, the service boundaries for the plurality of edge nodes may be accessed, and the first location may be compared to the service boundaries. Based on the comparison of the first location to the service boundaries, the first edge node may be identified because the first location is within the service boundary of the first edge node.
  • At operation 506, a request is received, from the mobile computing device, to perform a computing service. The computing service may be any of type of computing services discussed herein, among others that will be understood by those having skill in the art. At operation 508, at least a portion of the requested computing service is performed by the first edge node. For example, the first edge node may begin a live-streaming service or begin processing AI requests.
  • At operation 510, second location data for the mobile computing device is received at a second time from the mobile computing device. At operation 512, a direction vector is determined or generated based on the first location data and the second location data. The direction vector may be generated or determined in the same or similar manner as discussed above. At operation 514, based on the determined or generated direction vector, a second edge node from the plurality of edge nodes may be identified that corresponds to a predicted future location of the mobile computing device. For example, the direction vector may be used to predict a location for the mobile computing device for a time in future, such as a third time. Identifying the second edge node in operation 514 may include accessing service boundaries for the plurality of edge nodes in the edge compute network. The direction vector and/or the predicted location of the mobile computing device may then be compared to the service boundaries for the plurality of edge nodes. Based on the comparison of the direction vector and/or the predicted location of the mobile computing device to the service boundaries, the second edge node may be identified. For instance, the predicted location of the mobile computing device may lie within service boundary of the second edge node.
  • At operation 516, computing resources for the computing service are allocated on the second edge node so that the second edge node may continue performing the computing service when the mobile computing device nears the second edge node. The computing resources may be allocated prior to the mobile computing device actually being in the predicted location or within the service boundary of the second edge node. The timing of the allocation of resources may also be based on the direction vector and/or predicted location as the resources are to be allocated before the mobile computing device arrives in the predicted location and/or the service boundary for the second edge node. Allocating the resources on the second edge node may include any of the allocation actions discussed herein. The resources allocated, however, may be based on the resources utilized by the first edge node. For example, if the first edge node required a particular virtual machine to be deployed in order to perform the requested computing service, allocating resources on the second edge node may include deploying the same particular virtual machine. Thus, the computing resources required for the computing service can effectively follow the mobile computing device as the mobile computing device moves throughout a region.
  • At operation 518, the second edge node continues performing the computing services and providing responses to the mobile computing device once the mobile computing device is within the service boundary of the second edge node. In some examples, the computing resources of the first edge node may be stopped, deallocated, or reallocated as they may no longer be required because the mobile computing device is now sending requests to the second edge node. Accordingly, resources may be conserved on edge nodes when they are not needed.
  • Log files for the requests that are received and the services that are performed may also be generated and stored during performance of method 500. The log files may include the types of request data discussed herein including data regarding the users making the requests, unique identifiers for the users and/or the mobile computing devices making the requests, the time the requests are being sent, the types of services being requested, and the location from which the requests are generated, and the location of the edge node performing the services, among other types of data.
  • FIG. 6 depicts another example method 600 for reducing latency in providing computing services. The operations depicted in example method 600 may be performed by a predictive edge compute system, an edge node, a boundary service, another computing device communicatively connected to a mobile computing device, and/or a combination thereof. At operation 602, historical request data may be aggregated for a plurality of prior requests to perform computing services. The aggregated historical request data may include a variety of types of request data discussed herein. For example, the aggregated historical request data may include, for a plurality of prior requests, a time of the request, a location of the device from which the request originated, and a type of service being requested, among other types of request data.
  • At operation 604, a machine learning model may be trained based on the aggregated historical request data. The machine learning model may be any type of ML/AI model discussed herein. For example, the machine learning model may be at least one of a decision tree, a continual learning model, a random forest, a neural network, or a deep learning model. Training the machine learning model may be performed in a variety of different methods and may be altered based on the type of model being trained, as will be appreciated by those having skill in the art. For example, training machine learning model may include splitting the aggregated historical request data into a training data set and test data set. The training set is used to train or fit the machine learning model, and the test is used to evaluate to effectiveness or accuracy of the trained machine learning model. Training the machine learning model results in different parameters within the machine learning model to be adjusted, such as regression coefficients, weights in a neural network, splitting points in a decision tree, among other parameters. During the training process, hyperparameters for the particular model may also be set or adjusted. For example, the number of decision trees to be used may be a hyperparameter that is set when the machine learning model is a random forest. Other examples of hyperparameters include the number of hidden layers in a neural network and the strength of a penalty used in regression. The machine learning models may also be tuned utilizing cross-validation techniques, and the model may be trained to reduce errors that may be evaluated using techniques such a mean squared error and/or area under the receiver operating characteristics. Those having skill in the art will appreciate and understand additional or different aspects involved in training machine learning models based on a set of data.
  • At operation 608, a prediction for a type of service to be requested at a predicted time and a predicted location in the future is generated from machine learning model trained in operation 606. For instance, real-time data may be passed as an input into the trained machine learning model to receive the prediction as an output from the trained machine learning model. As an example, the real-time (e.g., current) requests that are being received by the edge nodes in the edge compute network may be received by the predictive edge compute system and provided to trained machine learning model of the ML/AI component, which produces the prediction for the type of service to be requested at the predicted time and the predicted location. For example, a future location of a mobile device and a type of service to be requested by that mobile device may be generated based on historical usage data for the device of that mobile device. For example, a mobile device may travel a predictable route at certain times of day that track habitual movements of the user, such as a work commute. The prediction may also be for multiple requests. For example, the prediction may include the predicted service type, the predicted location, and/or the predicted time for a plurality of requests to be received in the future. Thus, orchestration or resource allocation decisions may be based on a prediction of an aggregate of predicted requests. The prediction data generated at operation 608 may then be passed to an orchestration component of the predictive edge compute system which may orchestrate the allocation of resources at one or more of the edge nodes in operations 610-612.
  • At operation 610, based on the predicted location generated in operation 608, an edge node from a plurality of edge nodes in an edge compute network may be identified. The identification of the edge node in operation 610 may be further based on the physical location of the edge node. For example, a comparison of the predicted location may be compared to the service boundaries of the plurality of edge nodes. The edge node that is identified may be the edge node that has the service boundary that encompasses the predicted location.
  • At operation 612, computing resources may be allocated at the identified edge node based on the predicted service type and the predicted time generated in operation 606. Allocating the computing resources on the identified edge node may include any of the allocation actions discussed herein. The allocation of the computing resources may be performed prior to the predicted time such that a service corresponding to the predicted service type may be initialized or turned up prior to a request for the service, or a bulk of requests for the service, being received at the identified edge node. Thus, the machine learning models and systems are able to predict when, where, and how users will use the edge nodes in the edge compute networks hours or days in advance. By initializing the services prior to the services being requested, the present technology is capable of providing service before real-time requests are received—effectively providing real-time before real-time performance.
  • At operation 614, a request is received from a computing device to perform the predicted service type. The request may be received after the allocation of resources in operation 612. The request may also be received at or substantially near the predicted time generated in operation 608. The computing device generating the request may be any of the computing devices discussed herein, including the computing devices discussed above with reference to FIG. 1A. For example, the computing device generating the request may be a mobile computing device, such as a smart phone, laptop, vehicle, drone, mobile computer, or a plane. The computing device may also be a stationary computing device, such as a computing device at a home, business, factory, or farm. At operation 616, the identified edge node performs the requested service with the allocated computing resources.
  • FIG. 7 depicts another example method 700 for reducing latency in providing computing services. The operations depicted in example method 700 may be performed by a predictive edge compute system, an edge node, a boundary service, another computing device communicatively connected to a mobile computing device, and/or a combination thereof. At operation 702, a plurality of real-time requests are received from a plurality of computing device. The plurality of real-time requests may be for computing services to be performed by one or more edge nodes of a plurality of edge nodes in an edge compute network. At operation 704, data representative of the plurality of real-time requests is provided as input to a trained machine learning model. The trained machine learning model may be a machine learning model trained on aggregated historical request data, such as the trained machine learning models discussed herein and above with reference to method 600 depicted in FIG. 6.
  • At operation 706, a prediction for a type of service a prediction for a type of service to be requested at a predicted time and a predicted location in the future is generated from the trained machine learning model. The predictions may be for a plurality of requests from a plurality of devices. At operation 708, based on the predicted location generated in operation 706, an edge node from a plurality of edge nodes in an edge compute network may be identified. The identification of the edge node in operation 708 may be further based on the physical location of the edge node. At operation 710, computing resources may be allocated at the identified edge node based on the predicted service type and the predicted time generated in operation 706. Allocating the computing resources on the identified edge node may include any of the allocation actions discussed herein. Operation 708 and 710 may be substantially similar to operations 610 and 612 of method 600 depicted in FIG. 6.
  • FIG. 8 depicts an example method 800 for allocating hardware in a network. The operations depicted in example method 800 may be performed by a predictive edge compute system, an edge node, a boundary service, another computing device communicatively connected to a mobile computing device, and/or a combination thereof. At operation 802, historical request data for a plurality of requests is aggregated. The plurality of requests may be prior requests for computing services to be performed by one or mode edge nodes within the edge computing network. The aggregated historical request data may include a variety of types of request data discussed herein. For example, the aggregated historical request data may include, for a plurality of prior requests, a time of the request, a location of the device from which the request originated, and a type of service being requested, among other types of request data. The aggregated request data may also include a user identifier, a device identifier, latency data, jitter data, and/or packet loss. The aggregated request data may also include usage data such as CPU utilization, network interface utilization, requests per second, memory utilization, network alarms, component temperatures, and other similar usage data.
  • At operation 804, machine learning model is trained based on the aggregated historical request data. The machine learning model may be any type of ML/AI model discussed herein, and training of the machine learning model maybe performed using any of the techniques discussed herein, including the techniques described above with reference to method 600 depicted FIG. 6. At operation 806, a prediction for an amount or number of requests for services to be performed at the edge nodes may be generated from the machine learning model trained in operation 804. In addition to a prediction of the number or amount of requests, the trained machine learning model may also generate a prediction of the types of service that will be requested. Further, the machine learning model is trained on usage data, such as CPU utilization, to produce as output predicted usage data.
  • At operation 808, a predicted capacity needed to perform the predicted amount of requests is generated. The predicted capacity may be generated based on historical data regarding the amount of hardware resources that are required to perform the services requested. In some examples, predicting the capacity is also generated based on the predicted service types. For instance, based on historical performance data, a determination may be made as to how much storage, processing power, bandwidth, and other resources were required to perform different services (such as streaming services or AI processing) for a number of requests. That data may then be used to make a determination as to a predicted capacity for the predicted number of requests and the types of requests being made. In addition, where the trained machine learning model is trained on usage data, the output may be usage data which is also indicative of predicted capacity requirements and may be used to generate the predicted capacity requirements. For example, using CPU utilization as an example, the trained machine learning model may provide a predicted CPU utilization for a future time. Based on that predicted CPU utilization, a predicted capacity may be generated.
  • At operation 810, a comparison is made between the predicted capacity generated in operation 808 and a current capacity for one or more of the edge nodes. Based on the comparison, a recommendation for an alteration of hardware resources may be generated. For example, based on the comparison, a determination may be made that the predicted capacity exceeds the current capacity. When such a determination is made, method 800 flows to operation 812 where a recommendation to increase the hardware resources at one or more edge nodes is generated. The recommendation may be made to order additional hardware or transfer hardware from one edge node to another edge node. A hardware order to install the recommended hardware at the one or mode edge nodes may also be initiated or generated. In contrast, based on the comparison in operation 810, a determination may be made that the predicted capacity is less than the current capacity. When such a determination is made, method 800 flows to operation 814, where a recommendation to decrease the hardware resources at one or more edge nodes is generated. The recommendation may also be to transfer hardware resources from one edge node to another edge node. In examples where the machine learning model is trained on the usage data, such as CPU utilization, the output of the machine learning model may inherently include a comparison to current capacity. For example, if the trained machine learning model generates an output predicting that CPU utilization will be greater than 100% at a time in the future, a recommendation to increase the hardware resources may be generated because the predicted capacity is greater than the current capacity.
  • Accordingly, the present technology enhances network expansions and contractions based on data generated from the network itself. Planning for network expansions or contractions may be performed over different types of time series, including weeks, months, or years. Costs may also be calculated or otherwise determined. For example, cost per bit may be forecasted and inventory usage can be improved, monitored, and forecasted over time.
  • FIG. 9 depicts another example method 900 for allocating hardware in a network. The operations depicted in example method 900 may be performed by a predictive edge compute system, an edge node, a boundary service, another computing device communicatively connected to a mobile computing device, and/or a combination thereof. At operation 902, historical request data is aggregated for a plurality of prior requests for computing services to be performed by one or more edge nodes. The historical request data may include performance or usage data for plurality of prior requests. For example, the historical request data may include data for jitter, latency, packet loss, CPU utilization, network interface utilization, requests per second, memory utilization, network alarms, component temperatures.
  • At operation 904, machine learning model is trained based on the aggregated historical request data. The machine learning model may be any type of ML/AI model discussed herein, and training of the machine learning model maybe performed using any of the techniques discussed herein, including the techniques described above with reference to method 600 depicted FIG. 6. The machine learning model is trained to produce an output indicative of predicted performance or usage data in the future. For example, a linear regression model may be applied against the aggregated historical request data to provide a prediction of future performance or usage data having data types corresponding to those data types in the aggregated historical request. At operation 906, a prediction for performance data for future requests is generated from the machine learning model. As examples, the predicted performance data may be for predicted future latency values or predicted future CPU utilization.
  • At operation 908, the predicted performance data generated in operation 906 is compared to a predetermined performance threshold to determine whether the predicted performance data exceeds the predetermined performance threshold. The predetermined performance threshold may be based on inherent features of the particular performance data being analyzed. For example, where the performance or usage data is CPU utilization or a similar value, the predetermined performance threshold may be 100%, which indicates that the one or more edge nodes will be at full capacity. In other examples, the predetermined threshold may otherwise be set, such as by a service level agreement. As an example, where the performance data is latency, a maximum latency value may be set in a service level agreement. That maximum latency value may be used as the predetermined performance threshold. Thus, in such an example, a determination is made in operation 908 as to whether the predicted latency value exceeds the maximum latency value being used as the predetermined performance threshold.
  • If the predicted performance data exceeds the predetermined performance threshold, the method 900 flows to operation 910 where a recommendation to increase the hardware resources at one or more edge nodes is generated. The recommendation may be made to order additional hardware or transfer hardware from one edge node to another edge node. A hardware order to install the recommended hardware at the one or mode edge nodes may also be initiated or generated. In contrast, if a determination may be made in operation 908 that the predicted performance data does not exceed the predetermined performance threshold, the method flows to operation 912 where a recommendation to decrease the hardware resources at one or more edge nodes is generated. The recommendation may also be to transfer hardware resources from one edge node to another edge node.
  • FIG. 10 depicts another example method 1000 for allocating hardware in a network. The operations depicted in example method 1000 may be performed by a predictive edge compute system, an edge node, a boundary service, a beacon, another computing device communicatively connected to a mobile computing device, and/or a combination thereof. At operation 1002, traffic data may be collected over a period of time from a beacon. The beacon may any of the beacons discussed herein, such as one of the beacons 310 depicted in FIGS. 3A-3B. The beacon may monitor traffic in the form of the number of devices in a variety of techniques, includes those discussed herein. For example, the devices may be tracked by the beacon based on probe requests sent to the beacon from the each of the devices. Accordingly, the traffic data may include the amount or number of devices that sent probe requests to the beacon during the period of time.
  • At operation 1004 a comparison is made between the traffic data collected at operation 1002 and a predetermined traffic threshold. The predetermined traffic threshold may be set based on historical request data for other edge nodes. For example, the predetermined traffic threshold may be based on an average number of devices that other edge nodes receive requests from. An ML/AI model, such as a linear regression model, may also be trained based on the traffic data collected from the beacon. The trained machine learning model may then be used to predict an amount of traffic that will pass by the beacon in the future. That predicted traffic data may also or alternatively be compared to the predetermined traffic threshold in operation 1004.
  • If the traffic data collected from the beacon (or the predicted traffic data) is determined not to exceed the predetermined traffic threshold in operation 1004, method 1000 flows back to operation 1002 where traffic data continues to be collected. If the traffic data collected from the beacon (or the predicted traffic data) is determined to exceed the predetermined traffic threshold in operation 1004, method 1000 flows to operation 1006 where a recommendation for installation of a new edge node at the location of the beacon is generated. The recommendation for the new edge node is for a new edge node in addition to a plurality of edge nodes already in existence in the edge computing network.
  • Method 1000 may also provide recommendations for hardware allocations for the recommended new edge node. At operation 1008, unique identifiers are extracted for the devices identified in the traffic data. The unique identifiers may be extracted from the probe requests received by the beacon from the devices. For example, the unique identifiers may be MAC addresses for the devices. At operation 1010, device types are generated based on the extracted unique identifiers. For example, a device type for each device that sent a probe request may be determined from the corresponding MAC address.
  • At operation 1012, the likely types of service requests that would be received from the devices in the traffic data may be predicted based on the device types determined in operation 1010. For example, the request data gathered by the predictive edge compute system may also include the types of devices that are sending the requests along with the types of requests that are being sent from those devices. Accordingly, a determination may be made as to what types of devices most frequently request what types of services. Thus, by having the types of devices that are passing by the beacons, a prediction may be made as to the likely types of requests that would be generated by those devices.
  • At operation 1014, based on the predicted types of computing services determined in operation 1012, a recommended hardware allocation for the new edge node may be generated. For example, when the predicted computing services include web services, the recommended hardware allocation ma web servers. When the predicted computing services include streaming services, the recommended hardware allocation may include streaming servers. When the predicted computing services include AI services, the recommended hardware allocation may include specialized accelerators, such as GPU-based chips or cards, or similar devices suited for handling AI-related requests. Following operation 1014, method 1000 may flow to operation 1016 where the recommended new edge node is installed with the recommended hardware allocation. Operation 1016 may also include processing requests from computing devices and performing services with the hardware allocation.
  • FIG. 11 depicts another example method 1100 for allocating hardware in a network. The operations depicted in example method 1100 may be performed by a predictive edge compute system, an edge node, a boundary service, a beacon, another computing device communicatively connected to a mobile computing device, and/or a combination thereof. At operation 1102, a plurality of requests for computing services to be performed by an edge node in an edge compute network are received by a beacon. The beacon may be located in a specific physical location in a region. The beacon may any of the beacons discussed herein, such as one of the beacons 310 depicted in FIGS. 3A-3B.
  • At operation 1104, a number or amount of requests is extracted from the received plurality of requests. The type of services requested may also be extracted from the received plurality of requests in operation 1104. The requests are then forwarded to an edge node in the edge compute network for actual performance of the computing services in the request.
  • At operation 1108, a comparison is made between the number of requests extracted at operation 1104 and a predetermined traffic threshold. The predetermined traffic threshold may be set based on historical request data for other edge nodes. For example, the predetermined traffic threshold may be based on an average number of requests that other edge nodes receive. An ML/AI model, such as a linear regression model, may also be trained based on the extracted number of requests. The trained machine learning model may then be used to predict an amount of requests that will be received by the beacon in the future. That predicted number of requests may also or alternatively be compared to the predetermined traffic threshold in operation 1108.
  • If the extracted number of requests (or the predicted number of requests) is determined not to exceed the predetermined traffic threshold in operation 1108, method 1100 flows back to operation 1102 where requests continue to be received. If the extracted number of requests (or the predicted number of requests) is determined to exceed the predetermined traffic threshold in operation 1108, method 1100 flows to operation 1110, where a recommendation for installation of a new edge node at the location of the beacon is generated. The recommendation for the new edge node is for a new edge node in addition to the plurality of edge nodes already in existence in the edge computing network.
  • At operation 1112, based on service types extracted in operation 1104, a recommendation for a hardware allocation may be generated. For example, when the predicted computing services include web services, the recommended hardware allocation may include web servers. When the predicted computing services include streaming services, the recommended hardware allocation may include streaming servers. When the predicted computing services include AI services, the recommended hardware allocation may include specialized accelerators, such as GPU-based chips or cards, or similar devices suited for handling AI-related requests. Following operation 1112, method 1100 may flow to operation 1114 where the recommended new edge node is installed with the recommended hardware allocation. Operation 1114 may also include processing requests from computing devices and performing services with the hardware allocation.
  • The embodiments described herein may be employed using software, hardware, or a combination of software and hardware to implement and perform the systems and methods disclosed herein. Although specific devices have been recited throughout the disclosure as performing specific functions, one of skill in the art will appreciate that these devices are provided for illustrative purposes, and other devices may be employed to perform the functionality disclosed herein without departing from the scope of the disclosure. In addition, some aspects of the present disclosure are described above with reference to block diagrams and/or operational illustrations of systems and methods according to aspects of this disclosure. The functions, operations, and/or acts noted in the blocks may occur out of the order that is shown in any respective flowchart. For example, two blocks shown in succession may in fact be executed or performed substantially concurrently or in reverse order, depending on the functionality and implementation involved.
  • This disclosure describes some embodiments of the present technology with reference to the accompanying drawings, in which only some of the possible embodiments were shown. Other aspects may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments were provided so that this disclosure was thorough and complete and fully conveyed the scope of the possible embodiments to those skilled in the art. Further, as used herein and in the claims, the phrase “at least one of element A, element B, or element C” is intended to convey any of: element A, element B, element C, elements A and B, elements A and C, elements B and C, and elements A, B, and C. Further, one having skill in the art will understand the degree to which terms such as “about” or “substantially” convey in light of the measurements techniques utilized herein. To the extent such terms may not be clearly defined or understood by one having skill in the art, the term “about” shall mean plus or minus ten percent.
  • Although specific embodiments are described herein, the scope of the technology is not limited to those specific embodiments. One skilled in the art will recognize other embodiments or improvements that are within the scope and spirit of the present technology. In addition, one having skill in the art will recognize that the various examples and embodiments described herein may be combined with one another. Therefore, the specific structure, acts, or media are disclosed only as illustrative embodiments. The scope of the technology is defined by the following claims and any equivalents therein.

Claims (20)

What is claimed is:
1. A computer-implemented method for allocating hardware resources within a network, the method comprising:
aggregating historical request data for a plurality of requests for services to be performed by one or more edge nodes;
training a machine learning model based on the aggregated historical request data;
generating, from the trained machine learning model, a prediction for an amount of requests for services at the one or more edge nodes;
generating a predicted capacity needed to perform the predicted amount of requests;
comparing the predicted capacity to a current capacity for the one or mode edge nodes; and
based on the comparison, generating a recommendation for an alteration of hardware resources at the one or more edge nodes.
2. The computer-implemented method of claim 1, wherein the machine learning model is at least one of a regression model, a decision tree, a random forest, a neural network, a continual learning model, or a deep learning model.
3. The computer-implemented method of claim 1, wherein the aggregated historical request data includes at least one or more of the following data for a plurality of requests: a time of the request, a location of a device from which the request originated, a type of service being requested, a user identifier, a device identifier, latency data, jitter data, or packet loss.
4. The computer-implemented method of claim 1, further comprising, based on the generating of the recommendation for the alteration of hardware, initiating a hardware order to be installed at the one or more edge nodes.
5. The computer-implemented method of claim 1, further comprising:
based on the comparison, determining that the predicted capacity exceeds the current capacity for the one or more edge nodes; and
wherein the recommendation is to increase the hardware resources at the one or more edge nodes.
6. The computer-implemented method of claim 1, further comprising:
based on the comparison, determining that the predicted capacity is less than the current capacity for the one or more edge nodes; and
wherein the recommendation is to decrease the hardware resources at the one or more edge nodes.
7. The computer-implemented method of claim 1, wherein the recommendation is to transfer hardware resources from one edge node to another edge node.
8. The computer-implemented method of claim 1, further comprising:
generating, for the predicted amount of requests, a prediction of types of services to be requested by the predicted amount of requests; and
wherein generating the predicted capacity is further based on the predication of the types of services to be requested.
9. A system for allocating hardware resources within a network, the system comprising:
a plurality of edge nodes having different physical locations;
a database storing historical request data for a plurality of requests;
at least one processor; and
memory, operatively connected to the at least one processor and storing instructions that, when executed by the at least one processor, cause the at least one processor to perform a set of operations comprising:
aggregating historical request data for a plurality of requests for services to be performed by one or more edge nodes in the plurality of edge nodes;
training a machine learning model based on the aggregated historical request data;
generating, from the trained machine learning model, a prediction for an amount of requests for services at the one or more edge nodes;
generating a predicted capacity needed to perform the predicted amount of requests;
comparing the predicted capacity to a current capacity for the one or mode edge nodes; and
based on the comparison, generating a recommendation for an alteration of hardware resources at the one or more edge nodes.
10. The system of claim 9, wherein the operations further comprise:
generating, for the predicted amount of requests, a prediction of types of services to be requested by the predicted amount of requests; and
wherein generating the predicted capacity is further based on the predication of the types of services to be requested.
11. The system of claim 9, wherein the operations further comprise:
based on the comparison, determining that the predicted capacity is less than the current capacity for the one or more edge nodes; and
wherein the recommendation is to decrease the hardware resources at the one or more edge nodes.
12. The system of claim 9, wherein the operations further comprise:
based on the comparison, determining that the predicted capacity exceeds the current capacity for the one or more edge nodes; and
wherein the recommendation is to increase the hardware resources at the one or more edge nodes.
13. The system of claim 9, wherein the recommendation is to transfer hardware resources from one edge node to another edge node.
14. The system of claim 9, wherein the machine learning model is at least one of a regression model, a decision tree, a random forest, a neural network, a continual learning model, or a deep learning model.
15. A computer-implemented method for allocating hardware resources within a network, the method comprising:
aggregating historical request data for a plurality of requests for services to be performed by one or more edge nodes, wherein the aggregated historical request data includes performance data for the plurality of requests;
training a machine learning model based on the aggregated historical request data;
generating, by the machine learning model, a prediction for performance data for future requests;
comparing the prediction for the performance data to a predetermined performance threshold; and
based on the comparison, generating a recommendation for an alteration of hardware resources at the one or more edge nodes.
16. The computer-implemented method of claim 15, wherein performance data includes at least one of jitter, latency, packet loss, CPU utilization, network interface utilization, requests per second, memory utilization, network alarms, or component temperatures data for the plurality of requests.
17. The computer-implemented method of claim 15, wherein the machine learning model is at least one of a regression model, a decision tree, a random forest, a neural network, a continual learning model, or a deep learning model.
18. The computer-implemented method of claim 15, wherein:
the performance data is latency;
the predicted performance data is an average latency value for predicted requests; and
the predetermined performance threshold is a maximum latency value.
19. The computer-implemented method of claim 18, further comprising:
based on the comparison, determining that the predicted average latency value for the predicted requests is greater than the maximum latency value; and
wherein the recommendation is to increase the hardware resources at the one or more edge nodes.
20. The computer-implemented method of claim 18, further comprising:
based on the comparison, determining that the predicted average latency value for the predicted requests is less than the maximum latency value; and
wherein the recommendation is to transfer one or more hardware resources from one edge node to another edge node.
US17/090,408 2019-11-06 2020-11-05 Predictive resource allocation for network growth in an edge computing network Pending US20210132994A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/090,408 US20210132994A1 (en) 2019-11-06 2020-11-05 Predictive resource allocation for network growth in an edge computing network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201962931538P 2019-11-06 2019-11-06
US17/090,408 US20210132994A1 (en) 2019-11-06 2020-11-05 Predictive resource allocation for network growth in an edge computing network

Publications (1)

Publication Number Publication Date
US20210132994A1 true US20210132994A1 (en) 2021-05-06

Family

ID=73654893

Family Applications (5)

Application Number Title Priority Date Filing Date
US17/090,421 Pending US20210135969A1 (en) 2019-11-06 2020-11-05 Predictive resource allocation in an edge computing network utilizing beacons
US17/090,369 Abandoned US20210136178A1 (en) 2019-11-06 2020-11-05 Predictive resource allocation in an edge computing network utilizing geolocation for orchestration
US17/090,408 Pending US20210132994A1 (en) 2019-11-06 2020-11-05 Predictive resource allocation for network growth in an edge computing network
US17/090,387 Active 2041-09-01 US11829800B2 (en) 2019-11-06 2020-11-05 Predictive resource allocation in an edge computing network utilizing machine learning
US18/518,701 Pending US20240086252A1 (en) 2019-11-06 2023-11-24 Predictive resource allocation in an edge computing network utilizing machine learning

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US17/090,421 Pending US20210135969A1 (en) 2019-11-06 2020-11-05 Predictive resource allocation in an edge computing network utilizing beacons
US17/090,369 Abandoned US20210136178A1 (en) 2019-11-06 2020-11-05 Predictive resource allocation in an edge computing network utilizing geolocation for orchestration

Family Applications After (2)

Application Number Title Priority Date Filing Date
US17/090,387 Active 2041-09-01 US11829800B2 (en) 2019-11-06 2020-11-05 Predictive resource allocation in an edge computing network utilizing machine learning
US18/518,701 Pending US20240086252A1 (en) 2019-11-06 2023-11-24 Predictive resource allocation in an edge computing network utilizing machine learning

Country Status (4)

Country Link
US (5) US20210135969A1 (en)
EP (1) EP4055801A1 (en)
CA (3) CA3222306A1 (en)
WO (1) WO2021092212A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113900731A (en) * 2021-09-30 2022-01-07 百度在线网络技术(北京)有限公司 Request processing method, device, equipment and storage medium
US11252036B1 (en) 2021-06-10 2022-02-15 Bank Of America Corporation System for evaluating and tuning resources for anticipated demands
CN114745314A (en) * 2022-03-21 2022-07-12 南京邮电大学 Vehicle-mounted delay tolerant network data message forwarding method based on optimized random forest
CN114780225A (en) * 2022-06-14 2022-07-22 支付宝(杭州)信息技术有限公司 Distributed model training system, method and device
US11704609B2 (en) 2021-06-10 2023-07-18 Bank Of America Corporation System for automatically balancing anticipated infrastructure demands
US11909618B2 (en) 2022-04-06 2024-02-20 Cisco Technology, Inc. Actively learning PoPs to probe and probing frequency to maximize application experience predictions

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9069725B2 (en) 2011-08-19 2015-06-30 Hartford Steam Boiler Inspection & Insurance Company Dynamic outlier bias reduction system and method
CN106471475B (en) 2014-04-11 2022-07-19 哈佛蒸汽锅炉检验和保险公司 Improving future reliability predictions based on system operation and performance data modeling
US11636292B2 (en) 2018-09-28 2023-04-25 Hartford Steam Boiler Inspection And Insurance Company Dynamic outlier bias reduction system and method
GB2603358B (en) 2019-09-18 2023-08-30 Hartford Steam Boiler Inspection And Insurance Company Computer-based systems, computing components and computing objects configured to implement dynamic outlier bias reduction in machine learning models
US11615348B2 (en) 2019-09-18 2023-03-28 Hartford Steam Boiler Inspection And Insurance Company Computer-based systems, computing components and computing objects configured to implement dynamic outlier bias reduction in machine learning models
US11328177B2 (en) * 2019-09-18 2022-05-10 Hartford Steam Boiler Inspection And Insurance Company Computer-based systems, computing components and computing objects configured to implement dynamic outlier bias reduction in machine learning models
US11902337B2 (en) * 2020-05-07 2024-02-13 Tencent America LLC Methods for discovery of media capabilities of 5G edge
US11589243B2 (en) * 2020-05-12 2023-02-21 Harmonic, Inc. Dynamic adjustment of deployment location of software within a network
US20220083876A1 (en) * 2020-09-17 2022-03-17 International Business Machines Corporation Shiftleft topology construction and information augmentation using machine learning
US20210014133A1 (en) * 2020-09-25 2021-01-14 Intel Corporation Methods and apparatus to coordinate edge platforms
US11509715B2 (en) * 2020-10-08 2022-11-22 Dell Products L.P. Proactive replication of software containers using geographic location affinity to predicted clusters in a distributed computing environment
US11606674B2 (en) * 2020-12-29 2023-03-14 T-Mobile Usa, Inc. Network based containerized computing
US11218561B1 (en) * 2021-03-09 2022-01-04 Wipro Limited Method and system for managing cache data in a network through edge nodes
CN113191455A (en) * 2021-05-26 2021-07-30 平安国际智慧城市科技股份有限公司 Edge computing box election method and device, electronic equipment and medium
CN113254213B (en) * 2021-06-08 2021-10-15 苏州浪潮智能科技有限公司 Service computing resource allocation method, system and device
US11366699B1 (en) * 2021-07-19 2022-06-21 Sas Institute Inc. Handling bulk requests for resources
CN113301169B (en) * 2021-07-23 2021-10-01 杭州雅观科技有限公司 Edge network switching method based on dynamic mobile device behavior prediction
US20230131611A1 (en) * 2021-10-21 2023-04-27 Dell Products L.P. Generating temporal predictions for provisioning cloud resources using trained machine learning techniques
US20230216760A1 (en) * 2021-12-31 2023-07-06 Samsung Electronics Co., Ltd. System and method for detecting network services based on network traffic using machine learning
US11765100B1 (en) * 2022-04-19 2023-09-19 Bank Of America Corporation System for intelligent capacity planning for resources with high load variance
US11915059B2 (en) * 2022-07-27 2024-02-27 Oracle International Corporation Virtual edge devices
CN117235559B (en) * 2023-11-14 2024-02-06 四川万物纵横科技股份有限公司 Internet of things data acquisition method and system based on edge calculation
CN117713382A (en) * 2024-02-04 2024-03-15 北京中电飞华通信有限公司 Distributed power service providing method and distributed power service system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130019243A1 (en) * 2006-04-17 2013-01-17 Vmware, Inc. Executing a multicomponent software application on a virtualized computer platform
US20190149399A1 (en) * 2017-11-14 2019-05-16 TidalScale, Inc. Dynamic reconfiguration of resilient logical modules in a software defined server
US10452441B1 (en) * 2018-10-15 2019-10-22 Accenture Global Solutions Limited Determining an allocation of computing resources for a job

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9832606B1 (en) * 2014-12-16 2017-11-28 Amazon Technologies, Inc. Modifying user service environments
US10225365B1 (en) * 2014-12-19 2019-03-05 Amazon Technologies, Inc. Machine learning based content delivery
US9882833B2 (en) 2015-09-28 2018-01-30 Centurylink Intellectual Property Llc Intent-based services orchestration
EP3457664B1 (en) * 2017-09-14 2019-11-06 Deutsche Telekom AG Method and system for finding a next edge cloud for a mobile user
US11412052B2 (en) * 2018-12-28 2022-08-09 Intel Corporation Quality of service (QoS) management in edge computing environments
US11099921B2 (en) * 2019-07-09 2021-08-24 Microsoft Technology Licensing, Llc Predictive system resource allocation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130019243A1 (en) * 2006-04-17 2013-01-17 Vmware, Inc. Executing a multicomponent software application on a virtualized computer platform
US20190149399A1 (en) * 2017-11-14 2019-05-16 TidalScale, Inc. Dynamic reconfiguration of resilient logical modules in a software defined server
US10452441B1 (en) * 2018-10-15 2019-10-22 Accenture Global Solutions Limited Determining an allocation of computing resources for a job

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11252036B1 (en) 2021-06-10 2022-02-15 Bank Of America Corporation System for evaluating and tuning resources for anticipated demands
US11616695B2 (en) 2021-06-10 2023-03-28 Bank Of America Corporation System for evaluating and tuning resources for anticipated demands
US11704609B2 (en) 2021-06-10 2023-07-18 Bank Of America Corporation System for automatically balancing anticipated infrastructure demands
CN113900731A (en) * 2021-09-30 2022-01-07 百度在线网络技术(北京)有限公司 Request processing method, device, equipment and storage medium
CN114745314A (en) * 2022-03-21 2022-07-12 南京邮电大学 Vehicle-mounted delay tolerant network data message forwarding method based on optimized random forest
US11909618B2 (en) 2022-04-06 2024-02-20 Cisco Technology, Inc. Actively learning PoPs to probe and probing frequency to maximize application experience predictions
CN114780225A (en) * 2022-06-14 2022-07-22 支付宝(杭州)信息技术有限公司 Distributed model training system, method and device

Also Published As

Publication number Publication date
US11829800B2 (en) 2023-11-28
US20210136178A1 (en) 2021-05-06
CA3157413A1 (en) 2021-05-14
US20210135969A1 (en) 2021-05-06
CA3222363A1 (en) 2021-05-14
EP4055801A1 (en) 2022-09-14
US20210136006A1 (en) 2021-05-06
US20240086252A1 (en) 2024-03-14
CA3222306A1 (en) 2021-05-14
WO2021092212A1 (en) 2021-05-14

Similar Documents

Publication Publication Date Title
US11829800B2 (en) Predictive resource allocation in an edge computing network utilizing machine learning
US11902092B2 (en) Systems and methods for latency-aware edge computing
US20210185676A1 (en) Dynamic carrier management and network slicing for internet of things (iot)
Wu et al. ADDSEN: Adaptive data processing and dissemination for drone swarms in urban sensing
KR101943530B1 (en) Systems and methods for placing virtual serving gateways for mobility management
Cao et al. Developing an edge computing platform for real-time descriptive analytics
Jan et al. An energy-efficient and congestion control data-driven approach for cluster-based sensor network
WO2022001941A1 (en) Network element management method, network management system, independent computing node, computer device, and storage medium
Sathiamoorthy et al. Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK MANETs
Shuja et al. Applying machine learning techniques for caching in edge networks: A comprehensive survey
Maiti et al. Efficient data collection for IoT services in edge computing environment
Starks et al. Mobile distributed complex event processing—Ubi Sumus? Quo vadimus?
US20230169356A1 (en) Communications System, First Node, Second Node, Third Node and Methods Performed Thereby for Handling a Prediction of an Event
Kulkarni et al. Q-MOHRA: QoS assured multi-objective hybrid routing algorithm for heterogeneous WSN
Yang et al. A multi-vessels cooperation scheduling for networked maritime fog-ran architecture leveraging SDN
Pushpalatha et al. A prolonged network life time and reliable data transmission aware optimal sink relocation mechanism
Khodaparas et al. A multi criteria cooperative caching scheme for internet of things
Radenkovic et al. Cognitive caching at the edges for mobile social community networks: A multi-agent deep reinforcement learning approach
Lyu et al. Demystifying traffic statistics for edge cache deployment in large-scale WiFi system
Chaari et al. Dynamic computation offloading for ground and flying robots: Taxonomy, state of art, and future directions
US20230318932A1 (en) Methods and apparatus to direct transmission of data between network-connected devices
Bahrami et al. Edge server placement problem in multi-access edge computing environment: models, techniques, and applications
Chandirika et al. Performance Analysis of Clustering-Based Routing Protocols for Wireless Sensor Networks
Pasha Opportunistic task offloading in vehicular networks
Sultana An experimental survey of fog computing and iot: Escalate the cloud to where the things are

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: CENTURYLINK INTELLECTUAL PROPERTY LLC, COLORADO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CASEY, STEVEN M.;CASTRO, FELIPE;OPFERMAN, STEPHEN;AND OTHERS;SIGNING DATES FROM 20201111 TO 20211108;REEL/FRAME:058075/0868

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED