Source: IEEE Pervasive Computing, Vol. 8, Issue.4, Oct.2009, pp. 14 – 23 Author: Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N. Adviser: Chia-Nian.

Slides:



Advertisements
Similar presentations
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
Advertisements

Computer Networks TCP/IP Protocol Suite.
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Distributed Systems Architectures
1© M. SatyanarayananMicrosoft Networking Research Summit, Bellevue, WA, The Role of Cloudlets in Mobile Computing Mahadev Satyanarayanan.
Context-awareness, cloudlets and the case for AP-embedded, anonymous computing Anthony LaMarca Associate Director Intel Labs Seattle.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
Integrating 3D Geodata in Service-Based Visualization Systems Jan Klimke, Dieter Hildebrandt, Benjamin Hagedorn, and Jürgen Döllner Computer Graphics Systems.
11 Application of CSF4 in Avian Flu Grid: Meta-scheduler CSF4. Lab of Grid Computing and Network Security Jilin University, Changchun, China Hongliang.
Network Resource Broker for IPTV in Cloud Computing Lei Liang, Dan He University of Surrey, UK OGF 27, G2C Workshop 15 Oct 2009 Banff,
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
1 Copyright © 2005, Oracle. All rights reserved. Introducing the Java and Oracle Platforms.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
So far Binary numbers Logic gates Digital circuits process data using gates – Half and full adder Data storage – Electronic memory – Magnetic memory –
Universitá degli Studi di LAquila Mälardalens Högskola, Västerås 10th September 2009 Integrating Wireless Systems into Process Industry and Business Management.
Chapter 1 Introduction Copyright © Operating Systems, by Dhananjay Dhamdhere Copyright © Introduction Abstract Views of an Operating System.
Secure Virtual Machine Execution Under an Untrusted Management OS Chunxiao Li Anand Raghunathan Niraj K. Jha.
All rights reserved © 2005, Alcatel Grid services over IP Multimedia Subsystem  Antoine Pichot, Olivier Audouin, Alcatel  GridNets ’06.
Communicating over the Network
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
All Rights Reserved © Alcatel-Lucent 2009 Enhancing Dynamic Cloud-based Services using Network Virtualization F. Hao, T.V. Lakshman, Sarit Mukherjee, H.
1 Quality of Service Issues Network design and security Lecture 12.
Duagi Bulent UNIVERSITY POLITEHNICA of BUCHAREST DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY POLITEHNICA of BUCHAREST DEPARTMENT OF COMPUTER SCIENCE.
Mobile Computing
The case for VM based Cloudlets in Mobile Computing
AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds 作者:Xiaofei Wang, MinChen, Ted Taekyoung Kwon,
Mostafa Ammar, School of Computer Science Georgia Institute of Technology Atlanta, GA Mobile Computing in Cirrus Clouds: Mobile Computing in Cirrus Clouds:
Asaf Cidon. , Tomer M. London
Windows® Deployment Services
© S Haughton more than 3?
Virtual Switching Without a Hypervisor for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton)
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
KAIST Computer Architecture Lab. The Effect of Multi-core on HPC Applications in Virtualized Systems Jaeung Han¹, Jeongseob Ahn¹, Changdae Kim¹, Youngjin.
1 First EMRAS II Technical Meeting IAEA Headquarters, Vienna, 19–23 January 2009.
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
Addition 1’s to 20.
25 seconds left…...
Test B, 100 Subtraction Facts
Week 1.
We will resume in: 25 Minutes.
1 Copyright © 2012 Juniper Networks, Inc. Executive Intro Slide Turn Trends into Opportunities Vertical Wide Michael Tjon-En-Fa Industry,
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
1/30/2015 Just-in-Time Virtual Machine Provisioning for Cloud Offload Kiryong Ha Carnegie Mellon University.
Towards Virtual Networks for Virtual Machine Grid Computing Ananth I. Sundararaj Peter A. Dinda Prescience Lab Department of Computer Science Northwestern.
Eyal de Lara Department of Computer Science University of Toronto.
ThinkAir: Dynamic Resource Allocation and Parallel Execution in Cloud for Mobile Code Offloading Sokol Kosta, Pan Hui Deutsche Telekom Labs, Berlin, Germany.
Slingshot: Deploying Stateful Services in Wireless Hotspots Ya-Yunn Su Jason Flinn University of Michigan.
 Energy Results: Memory Assistant Arcade Game  Performance Results:  Response Time ▪ Memory assistant: 17.3 sec -> 1.5 sec ▪ Arcade game: 6 FPS -> 13.
Ch 1. Mobile Adaptive Computing Myungchul Kim
MOBILE CLOUD COMPUTING
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 1: Introduction What is an Operating System? Mainframe Systems Desktop Systems.
Improving Network I/O Virtualization for Cloud Computing.
Challenges towards Elastic Power Management in Internet Data Center.
Dynamic VM Synthesis for Cloudlet -ISTC Retreat Poster- Kiryong Ha, Padmanabhan S Pillai, Mahadev Satyanarayanan.
ANDROID AS A SERVER PLATFORM ON CLOUD COMPUTING SONA COLLEGE OF TECHNOLOGY SUBMITTED BY: NAGADEVI PRIYA.G DIVYA PURNIMA.S.S
Md Baitul Al Sadi, Isaac J. Cushman, Lei Chen, Rami J. Haddad
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Chapter 1: Introduction
Slingshot: Deploying Stateful Services in Wireless Hotspots
Chapter 1: Introduction
Introduction to Edge Computing
Project topic: Adaptive cloud based services for mobile users Paper to present: Competitive Analysis for Service Migration in VNets Zahra Abbasi.
Principles/Paradigms Of Pervasive Computing
Presentation transcript:

Source: IEEE Pervasive Computing, Vol. 8, Issue.4, Oct.2009, pp. 14 – 23 Author: Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N. Adviser: Chia-Nian Shyi Speaker: Date: 2010/11/2 1

Introduction We have developed the core concepts, techniques and mechanisms for mobile computing. Mobile computing seamlessly augments the cognitive abilities of users. Speech recognition Natural language processing Computer vision and graphics Machine learning Augmented reality Planning and decision-making 2

Introduction Exploit virtual Machine (VM) technology to rapidly instantiate customized service software on a nearby cloudlet, then uses that service over a wireless LAN. Cloudlet also simplifies the challenge of meeting bandwidth demand of multiple users, such as HD video and high- resolution images. 3

Resource-Poor Mobile Hardware Mobile hardware is necessarily resource-poor relative to static client and server hardware. Improving size, weight and battery life are higher priorities than enhancing compute power. Resource poverty is a major obstacle for many applications with the potential to seamlessly augment human cognition. 4

The Limits of Cloud Computing Cloud computing - solution to the resource poverty of mobile devices. Long WAN latencies are a fundamental obstacle. WAN delays in the critical path of user interaction can hurt usability. 5

The Limits of Cloud Computing Lagar-Cavilla et al shows latency can negatively impact interactive response in spite of adequate bandwidth. 6

How Cloudlets Can Help Resource poverty of a mobile device can be addressed by using a nearby resource-rich cloudlet. The end-to-end response time of applications executing in the cloudlet needs to be fast (few milliseconds) and predictable. 7

How Cloudlets Can Help Cloudlets are decentralized and widely- dispersed Internet infrastructure. 8

How Cloudlets Can Help A cloudlet only contains soft state such as cache copies of data or code that is available elsewhere. 9

Transient Cloudlet Customization A key challenge is to simplify cloudlet management. Solution is transient customization of cloudlet infrastructure using hardware virtual machine (VM) technology. Pre-use customization and Post-use cleanup. 10

Transient Cloudlet Customization Two different approaches to delivering VM state to infrastructure. VM migration approach Already-executing VM is first suspended, processor, disk and memory state are then transferred, VM execution is resumed at the destination. 11

Transient Cloudlet Customization The other approach is called dynamic VM synthesis. 12

Transient Cloudlet Customization Dynamic VM synthesis differs cloud in two key ways. First its performance is determined solely by local resources: Bandwidth to cloudlet Compute power of the cloudlet Second, WAN failures do not affect synthesis. 13

Dynamic VM Synthesis A proof-of-concept prototype called Kimberley. The controller of the transient binding between mobile device and cloudlet called Kimberley Control Manager (KCM). 14

Dynamic VM Synthesis The first step in the binding sequence is the establishment of a secure TCP tunnel using SSL between KCM on a device and a cloudlet. After successful authentication, the cloudlet KCM executes a command that fetches the VM overlay from the mobile device. 15

Dynamic VM Synthesis Decrypts and decompresses it, and applies the overlay to the base VM. The VM is then launched, and is ready to provide services to the mobile device. 16

Dynamic VM Synthesis For use in cloudlets, rapid VM synthesis is important. Cloudlet handoffs should be as rapid, invisible and seamless. 17

Dynamic VM Synthesis Significant improvement is needed for real-world deployment. The major contributors to VM synthesis time are (a) overlay transmission and (b) decompressing and applying the overlay on the cloudlet. 18

Dynamic VM Synthesis To reduce decompression and overlay application times, can exploit parallelism. Partitioning the VM image into four parts will allow a four-core cloudlet to synthesize the parts. 19

Conclusion Resource poverty is a fundamental constraint. A vision of mobile computing that breaks free of this fundamental constraint. Mobile users seamlessly utilize nearby computers to obtain the resource benefits of cloud computing without incurring WAN delays and jitter. 20