Leveraging Smart Phones to Reduce Mobility Footprints Stephen Smaldone †, Benjamin Gilbert ‡, Nilton Bila *, Liviu Iftode †, Eyal de Lara *, and Mahadev.

Slides:



Advertisements
Similar presentations
Cool-Tether: Energy Efficient On-the-fly WiFi Hot-spots using Mobile Smartphones 1 Vishnu Navda (MSR India) Ashish Sharma (MSR India Intern/UCSB) Ram Ramjee.
Advertisements

Virtual Disk based Centralized Management for Enterprise Networks
Live migration of Virtual Machines Nour Stefan, SCPD.
Buffers & Spoolers J L Martin Think about it… All I/O is relatively slow. For most of us, input by typing is painfully slow. From the CPUs point.
The case for VM based Cloudlets in Mobile Computing
Source: IEEE Pervasive Computing, Vol. 8, Issue.4, Oct.2009, pp. 14 – 23 Author: Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N. Adviser: Chia-Nian.
MicroCast: Cooperative Video Streaming on Smartphones Lorenzo Keller, Anh Le, Blerim Cic, Hulya Seferoglu LIDS, Christina Fragouli, Athina Markopoulou.
Energy Efficiency through Burstiness Athanasios E. Papathanasiou and Michael L. Scott University of Rochester, Computer Science Department Rochester, NY.
Live Migration of Virtual Machines Christopher Clark, Keir Fraser, Steven Hand, Jacob Gorm Hansen, Eric Jul, Christian Limpach, Ian Pratt, Andrew Warfield.
Rootkits on Smart Phones: Attacks, Implications and Opportunities Jeffrey Bickford, Ryan O’Hare, Arati Baliga, Vinod Ganapathy, and Liviu Iftode Department.
Exploiting Data Deduplication to Accelerate Live Virtual Machine Migration Xiang Zhang 1,2, Zhigang Huo 1, Jie Ma 1, Dan Meng 1 1. National Research Center.
Mary Sakaluk Iggy Filice Hamilton Public Library.
1 Cheriton School of Computer Science 2 Department of Computer Science RemusDB: Transparent High Availability for Database Systems Umar Farooq Minhas 1,
Institute of Networking and Multimedia, National Taiwan University, Jun-14, 2014.
Tracking & Login Data persistence User tracking.
Nilton Bila, Eyal de Lara University of Toronto Matti Hiltunen, Kaustubh Joshi, H. Andres Lagar-Cavilla AT&T Labs Research Mohadev Satyanarayanan Cargie-Mellon.
Towards High-Availability for IP Telephony using Virtual Machines Devdutt Patnaik, Ashish Bijlani and Vishal K Singh.
Secure Off Site Backup at CERN Katrine Aam Svendsen.
© 2009 Research In Motion Limited Methods of application development for mobile devices.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
Reducing the Energy Usage of Office Applications Jason Flinn M. Satyanarayanan Carnegie Mellon University Eyal de Lara Dan S. Wallach Willy Zwaenepoel.
HiberSnail Portable home directory with environment retrieval.
Eyal de Lara Department of Computer Science University of Toronto.
DAKNET Presented By: rreema.
Introduction to Computers Essential Understanding of Computers and Computer Operations.
ThinkAir: Dynamic Resource Allocation and Parallel Execution in Cloud for Mobile Code Offloading Sokol Kosta, Pan Hui Deutsche Telekom Labs, Berlin, Germany.
Slingshot: Deploying Stateful Services in Wireless Hotspots Ya-Yunn Su Jason Flinn University of Michigan.
1. Outline Introduction Virtualization Platform - Hypervisor High-level NAS Functions Applications Supported NAS models 2.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Configuration of Linux Terminal Server Group: LNS10A6 Thebe Laxmi, Sharma Prabhakar, Patrick Appiah.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
1 Configurable Security for Scavenged Storage Systems NetSysLab The University of British Columbia Abdullah Gharaibeh with: Samer Al-Kiswany, Matei Ripeanu.
School of EECS, Peking University Microsoft Research Asia UStore: A Low Cost Cold and Archival Data Storage System for Data Centers Quanlu Zhang †, Yafei.
Protecting Data on Smartphones and Tablets from Memory Attacks
Turducken: Hierarchical Power Management for Mobile Devices Jacob Sorber, Nilanjan Banerjee, Mark Corner, Sami Rollins University of Massachusetts, Amherst.
Module 1: Installing and Configuring Servers. Module Overview Installing Windows Server 2008 Managing Server Roles and Features Overview of the Server.
Data Staging on Untrusted Surrogates Jason Flinn Shafeeq Sinnamohideen Niraj Tolia Mahadev Satyanarayanan Intel Research Pittsburgh, University of Michigan,
Slingshot: Deploying Stateful Services in Wireless Hotspots Ya-Yunn Su Jason Flinn University of Michigan Presenter: Youngki, Lee.
Context-Aware Interactive Content Adaptation Iqbal Mohomed, Jim Cai, Sina Chavoshi, Eyal de Lara Department of Computer Science University of Toronto MobiSys2006.
Network Computing Laboratory Integrating Portable and Distributed Storage Niraj Tolia, Jan Harkes, Michael Kozuch, and M. Satyanarayanan CMU and Intel.
Dynamic VM Synthesis for Cloudlet -ISTC Retreat Poster- Kiryong Ha, Padmanabhan S Pillai, Mahadev Satyanarayanan.
A Study of Wireless Virtual Network Computing Kiran Erra.
Introduction to DFS. Distributed File Systems A file system whose clients, servers and storage devices are dispersed among the machines of a distributed.
Agenda Introduction. Design. Trust and Threat Model. Key-Encrypting Keys. Token Vulnerabilities. Token-Laptop Interaction. Assigning File keys & Handling.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Data Replication and Power Consumption in Data Grids Susan V. Vrbsky, Ming Lei, Karl Smith and Jeff Byrd Department of Computer Science The University.
Towards Dynamic Green-Sizing for Database Servers Mustafa Korkmaz, Alexey Karyakin, Martin Karsten, Kenneth Salem University of Waterloo.
Terminal Servers in Schools A second life for your older computers.
FRAC: Implementing Role-Based Access Control for Network File Systems Aniruddha Bohra, Stephen Smaldone, and Liviu Iftode Department of Computer Science.
EnsemBlue: Integrating Distributed Storage and Consumer Electronics Daniel Peek and Jason Flinn University of Michigan.
Computer Hardware. What is Hardware? Hardware is any part of a computer you can touch There are 2 categories: Inside the computer Peripherals connected.
Efficient Live Checkpointing Mechanisms for computation and memory-intensive VMs in a data center Kasidit Chanchio Vasabilab Dept of Computer Science,
© GCSE Computing Computing Hardware Starter. Creating a spreadsheet to demonstrate the size of memory. 1 byte = 1 character or about 1 pixel of information.
1.00 Computer Basics 1.01 Classify computer component. 1 Primary sources of information and images: GCFLearnFree.org, Microsoft Digital Learning E-Learning.
© Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted Module 7.
CLOUD BASED STORAGE Amy. Cloud Based Storage Cloud based storage is “the storage of data online in the cloud”
Streaming Big Data with Self-Adjusting Computation Umut A. Acar, Yan Chen DDFP January 2014 SNU IDB Lab. Namyoon Kim.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
CIT 140: Introduction to ITSlide #1 CSC 140: Introduction to IT Operating Systems.
Using Virtualization in the Classroom
Virtualization OVERVIEW
Optimizing the Migration of Virtual Computers
A Study of Wireless Virtual Network Computing
Slingshot: Deploying Stateful Services in Wireless Hotspots
Lifecycle Suppose we have two processes that require the CPU. The first one had the CPU and you would like to let the second process run, ie context switch.
Efficient and Transparent Dynamic Content Updates for Mobile Clients
Declarative Transfer Learning from Deep CNNs at Scale
A workload-aware energy model for VM migration
Presentation transcript:

Leveraging Smart Phones to Reduce Mobility Footprints Stephen Smaldone †, Benjamin Gilbert ‡, Nilton Bila *, Liviu Iftode †, Eyal de Lara *, and Mahadev Satyanarayanan ‡ † Rutgers University, ‡ Carnegie Mellon University, * University of Toronto

June 23, 2009MobiSys Traditional Mobile Computing Carry-Everything (on your laptop) Primary advantage – Have all personal data, files, applications, preferences, etc., instantaneously/immediately available Primary disadvantage – Too “heavy”

June 23, 2009MobiSys Carry-Nothing: Internet Suspend/Resume ® (ISR) Use stateless VM-enabled client stations and suspend/resume state from a server over the Internet ISR Parcel = VM State (memory image, disk, etc.) Primary advantage – Carry nothing Primary disadvantage – Depends on connectivity ISR Client Station #1ISR Client Station #2 Suspend Resume ISR Parcel ISR Server

June 23, 2009MobiSys Existing ISR Optimizations On-demand disk fetching Look-aside caching / Content-addressable storage Certain problems still persist –Does not work in the absence of Internet connectivity –Suspend and Resume latencies can be intolerable to users

June 23, 2009MobiSys The Opportunity: Smartphone Device that people already carry Provides ample storage Provides multiple modes of connectivity Light-weight (very small mobility footprint)

June 23, 2009MobiSys Horatio: Mobile Self-Cleaning Cache Fast SuspendLazy Self-CleaningMultiple Resume Options 3G / WiFi Time ISR Client Station #1 ISR Client Station #2 ISR Server

June 23, 2009MobiSys Our Contributions 1.Mobile self-cleaning cache (Horatio) 2.Design and prototype implementation on smartphones 3.Evaluation that demonstrates usability benefits 4.Suggestions to improve current smartphones for better mobile self-cleaning cache performance

June 23, 2009MobiSys 20098Outline Introduction Horatio Design and Implementation Evaluation and Results Related Work Conclusions and Future Work

June 23, 2009MobiSys Horatio Design Goals 1.Reduce Latency –Fast suspends and resumes 2.Preserve ISR Reliability –Clean state as soon as possible 3.Conserve Battery and Storage –Store and transfer as little as possible Key Design Principle: Separation of Control and Data

June 23, 2009MobiSys Control/Data Separation Ownership Nonce – 10 bytes Keyring – 5.5 MB Configuration File – 500 bytes Ownership Nonce – 10 bytes Keyring – 5.5 MB Configuration File – 500 bytes ISR Parcel Disk Image – 4 GB Memory Image – 200 MB Disk Image – 4 GB Memory Image – 200 MB Parcel ControlParcel Data Small Defines parcel ownership Trusted (used to validate data) As large as necessary Can be (partially) replicated Encrypted Possibly untrusted

June 23, 2009MobiSys Control/Data Separation: How it Works Fast+Lazy SuspendsEfficient Self-CleaningEfficient Resume Parcel Data Parcel Control Time ISR Server

June 23, 2009MobiSys Control/Data Separation: Benefits Saves Horatio’s battery –At suspend: state transferred to Horatio (acts as receiver) –During self-cleaning: control state transferred from Horatio (acts as transmitter) –At resume: data state can be transferred from server Client can transfer state to server without impacting suspend time –Client station can transfer data state to server after user leaves (lazy suspend) –Trust is not an issue, Horatio will validate later (using control state)

June 23, 2009MobiSys Additional Horatio Optimizations Memory image differencing –Transfer only dirty memory state as diffs during suspends and resumes –Require basis memory image to be cached at resume site Eager state transfer during client session –Transfer dirty state in the background –May result in transferring more data than necessary due to overwrites

June 23, 2009MobiSys Outline Introduction Horatio Design and Implementation Evaluation and Results Related Work Conclusions and Future Work

June 23, 2009MobiSys Evaluation Goals 1.How much does Horatio improve user experience? 2.How effective is self-cleaning in reducing the vulnerability of a Horatio device? 3.What is the impact of Horatio on a user’s smartphone battery? 4.How effective is eager state transfer in reducing suspend latency?

June 23, 2009MobiSys Evaluation Setup ISR Parcel –512 MB Memory Image and 4 GB Disk Image ISR Client –2.33 GHz Core 2 Duo CPU, 3 GB RAM, 250 GB SATA Disk, USB 2.0, Linux 2.6 ISR Server –Dual 2.8 GHz Xeon CPUs, 1 GB RAM, 32 GB SCSI Disk, Linux 2.6 Horatio Devices –Nokia N95, Openmoko Freerunner, and USB MicroSD Card

June 23, 2009MobiSys Improvement in User Experience Dirty State Size (MB) Horatio Device ISR-1 (No Horatio) N95-WiFi OM-WiFi N95-USB SD-USB Microbenchmark Suspend Results * Values are time measured in minutes

June 23, 2009MobiSys Improvement in User Experience Dirty State Size (MB) Horatio Device ISR-1 (No Horatio)5---- N95-WiFi OM-WiFi N95-USB-4459 SD-USB Microbenchmark Resume Results * Values are time measured in minutes

June 23, 2009MobiSys Realistic Workloads (Macrobenchmarks) Workload NameExecution Time (min) Dirty State (MB) MemoryDisk Word10413 Photo13254 Shop Podcast Video

June 23, 2009MobiSys Improvement in User Experience Macrobenchmark Results

June 23, 2009MobiSys Self-Cleaning Time Dirty State Size (MB) Horatio Device N95-WiFi0.6 minutes2 minutes15 minutes OM-WiFi0.2 minutes1 minute13 minutes N95-3G3 minutes8 minutes1 hour Workload (Dirty State Size) N95-WiFiN95-3G (20 MB) 4 minutes12 minutes Word (44 MB) 16 minutes1 hour Photo (29 MB) 14 minutes1 hour Shop (44 MB) 18 minutes1 hour Podcast (230 MB) 37 minutes2 hours Video (632 MB) 2 hours7 hours

June 23, 2009MobiSys Horatio Battery Consumption Dirty State Size (MB) OperationHoratio Device SuspendN95-WiFi0.2%0.4%3%11% SuspendN95-USB0.1%0.2%0.9%4% ResumeN95-WiFi3%4%5%9% ResumeN95-USB0.6% 0.7%1% Self-CleanN95-WiFi0.2%0.6%6%- Self-CleanN95-3G1%4%28%- * Values are percentage of battery depleted

June 23, 2009MobiSys Eager State Propagation WorkloadLazy State (MB) Suspend State (MB) Eager State (MB) Word Photo Shop

June 23, 2009MobiSys Related Work Remote ( low physical vulnerability) Storage Site Local (h igh network resilience) Local (crisp interaction) Remote (high compute power) Execution Site Classic PC model Laptops SoulPad, MojoPac Remote Execution Cyber Foraging ISR model Thin client model Snowbird Transient Thin Client Horatio

June 23, 2009MobiSys Conclusions and Future Work Reliable and Efficient Carry-Nothing Mobile Computing –Use the smartphone as a self-cleaning mobile cache to improve ISR Experimental Results Demonstrate: –Suspend and resume latencies reduced up to 98% Future Work –Prediction of resume location for state prefetching –Horatio user interface –Deployment

Thank You!

June 23, 2009MobiSys Impact on Mobility Footprint Dirty State Size (MB) OperationHoratio Device SuspendN95-WiFi SuspendN95-USB ResumeN95-WiFi ResumeN95-USB Self-CleanN95-WiFi Self-CleanN95-3G * Values are energy measured in Joules

June 23, 2009MobiSys Workload State Generation

June 23, 2009MobiSys Update Locality