The Unheralded Power of Cloudlet Computing in the Vicinity of Mobile Devices
|
|
|
- Charlene Greer
- 10 years ago
- Views:
Transcription
1 The Unheralded Power of Cloudlet Computing in the Vicinity of Mobile Devices Yujin Li and Wenye Wang Department of Electrical and Computer Engineering North Carolina State University, Raleigh, NC, USA {yli27, Abstract With the popularity of smartphones and explosion of mobile applications, mobile devices are becoming the prevalent computing platform for convenient communication and rich entertainment. Because mobile devices still have limited processor power, computing-intensive applications need to be offloaded to either remote clouds or nearby cloudlets for processing. But, remote cloud computing is hindered by the long latency and expensive roaming charges of cellular radio access. Therefore, cloudlet computing becomes appealing to provide instant and lowcost service through resource-rich devices(e.g., desktops) in the vicinity of mobile devices. It is evident that cloudlet computing is challenged by the intermittent connection between cloudlets andmobiledevicesduetousermobility.thequestionishowto evaluate the impact of user mobility on cloudlet computing performance. In this paper, we examine the cloudlet access probability, task success rate, and task execution speed to measure the impact of mobility. We discover that the cloudlet access probability is µ TC /(µ TI +µ TC )determinedbymeanconnectiontime µ TC and meaninter-connectiontime µ TI betweenthemobiledeviceand the cloudlet. Furthermore, we find that the task success rate and execution speed depend on not only task computation demand and cloudlet computing speed but also cloudlet access probability. Ourfindingsrevealthattheratio µ TC /(µ TI + µ TC )quantifies the impact of node mobility on both cloudlet access probability and cloudlet computing performance. I. INTRODUCTION Mobile devices (such as smartphones and tablets) are becoming an inseparable part of our lives for convenient communication and entertainment. The number of smartphones in use worldwide reached 1.38 billion units during the third quarter of 212, and smartphone users are expected to be over 2 billion by 215 [1]. With the popularity of mobile devices, there is also an explosion of mobile applications, such as terrestrial navigation, and web browsing, and mobile games, indicating that mobile devices are quickly becoming the dominant computing platform. Although mobile devices are rapidly gaining more computing power and memory resources (up to 64 GB flash memory on smartphones currently) [2], they are still limited by their available processor power, memory size and battery life [3]. There is still a large gap in computing speed between mobile devices and desktops. Thus, computing-intensive mobile applications, such as video decoding, speech recognition, and augmented reality, need to be offloaded to the cloud for processing, namely mobile cloud computing. This work is supported by the NSF Career Award CNS and NSF Award CNS In mobile cloud computing, the cloud is formed by data centers and servers, which are distributed in different geographic locations. Mobile devices can offload their computingintensive applications to the cloud in order to save energy and improve application performance. The mobile devices access the cloud service through wireless networks (mainly cellular and WLAN networks). But, remote cloud access through wireless communication could be unavailable or costly [2, 4]. Specifically, cellular connection is known to suffer from very long latency, which may make mobile application offloading expensive. For instance, a search query on a highend smartphone with a 3G connection can take 3 to 1 seconds depending on location, device and operator used. When 3G radio is not connected or only EDGE connectivity is available, this delay can be doubled or even tripled. Although the throughput of radio links on mobile devices and channel bandwidth will continue to increase over time, the long latency of remote cloud access through cellular radio is unlikely to improve dramatically, because the radio link needs 1.5 to 2 seconds to wake up from standby mode. Moreover, using 3G/4G connection can quickly drain battery, which is the bottleneck of mobile device development. In addition, network provider s (e.g., AT&T and Verizon) service is very expensive. As an example, AT&T charges a mobile user $2 for 3MB data plan (or $3 for 3GB data plan) per month and $2 per 3MB (or $1 per 1GB) overage fee [5]. In order to overcome the limitations of accessing remote clouds through cellular radio, paper [4] proposes to use cloudlet, which offloads mobile applications to resource-rich devices in the vicinity of mobile devices. Mobile applications can be seamlessly off-loaded from mobile devices onto nearby cloudlets using virtual machine technology [6]. Fig. 1 illustrates an example of using cloudlets. Suppose mobile user Bob needs to do mobile commerce (e.g., mobile transactions and payments, mobile ticketing) using his smartphone. In order to avoid data overage charge and preserve battery on his phone, Bob offloads the task to a nearby cloudlet that includes resource-rich devices, such as desktops, laptops, even tablets and high-end smartphones. As Bob moves around, he exploits different cloudlets during different periods of time. The benefits of utilizing cloudlet are the speed of service accessibility, the support of mobility, the enhanced application performance, the elongated battery life, and the reduced roaming data cost [7]. First, as computations and information reside /13/$ IEEE 4959
2 2 Fig. 1. Mobile cloud computing through cloudlets in the vicinity of a mobile device: Bob uses cloudlet 1 during [t 1, t 2 ], cloudlet 2 during [t 3, t 4 ], and cloudlet 3 during [t 5, t 6 ] to execute mobile applications on his phone. on nearby devices, users can get direct access instantly through interactions with cloudlets, eliminating the communication latency introduced by the cellular network. Second, cloudlet still preserves the conventional offloading benefit as that in cloud computing, which allows applications that can not be processed on a single mobile device to be executed in the cloudlet. Application performance can be improved if the execution sequence of an application can be reordered to increase the level of parallel processing, thus the mobile user s experience can be significantly enhanced. Third, compared with a complete local execution, offloading the task (e.g. construct augmented reality tourist guide) to a group of nearby devices saves mobile device s energy. Finally, offloading to nearby devices saves money, because expensive data charging in roaming situation is avoided. The main challenge of utilizing cloudlet resides in the intermittent connectivity between mobile devices and cloudlets due to the mobility of mobile devices and even devices in cloudlets. Mobile devices are held by human that move to different locations for different social activities. Sometimes, a mobile user may move to an area that has no cloudlet in the transmission range of his/her mobile device, while at other times, a mobile user may be at a place with cloudlets in vicinity and can connect to the cloudlets for mobile application computing. For example, in Fig. 1, Bob can t connect to any cloudlet when he is moving from the location of Cloudlet 1 to the location of Cloudlet 2. Only when Bob s smartphone is within the transmission range of Cloudlet 1 during [t 1,t 2 ] or that of Cloudlet 2 during [t 3,t 4 ], Bob can access the computing resources on devices in Cloudlets 1 or 2, respectively. Such intermittent connection to cloudlet greatly affects the performance of cloudlet computing for mobile applications [8]. Therefore, a fundamental question for cloudlet computing is: what is the impact of node mobility on cloudlet computing? In this paper, we investigate the basic scenario where a mobile device needs to offload computational tasks to cloudlets. Because the mobile device has its intrinsic mobility pattern, the connection to cloudlets is intermittent and limited in duration. We examine the cloudlet access probability that a mobile device can connect to at least one cloudlet, the probability of a successful task execution, the number of executed tasks and the average task execution speed over time t. Studying them will not only reveal the power of cloudlet computing but also identify how mobility affects cloudlet computing s performance. As the intermittent cloudlet connectivity is due to node mobility, we model the connection and inter-connection between a mobile device and a cloudlet as an alternating renewal process. Based on renewal theory, we find that a cloudlet s access probability equals to µ TC /(µ TC + µ TI ), where µ TC is the expectation of connection time T C and µ TI is the expectation of inter-connection time between the mobile device and the cloudlet. Furthermore, we show that the probability of successfully executing a task by a cloudlet is determined by cloudlet access probability, probability distribution of connection time, task computation demand, cloudlet computing speed, and channel bandwidth. Finally, we prove that the number of executed tasks over time t and the average task execution speed are both determined by cloudlet access probability and task completion time (i.e., the sum of task transmission and computing time). In summary, node mobility affects not only cloudlet access probability but also cloudlet computing performance and its impact can be represented by µ TC /(µ TC + µ TI ). The remainder of this paper is organized as follows: we define the network and cloudlet connection models in Section II; using renewal theory, we derive cloudlet access probability and computing performance in Section III; we conclude this paper with insights from our analysis as well as future work in Section IV. II. MODELS AND DEFINITIONS In reality, mobile users visit many community locations to perform social activities, such as working in office, shopping in mall, and staying at home. At these community sites, likely there are resource-rich devices, such as desktops and laptops, that can provide cloudlet computing for a mobile device. Therefore, we focus on a heterogeneous network environment that is composed of a set of cloudlets with different computing capabilities at different locations. Network Model: Assume that a mobile device is moving in a network Ω m with m cloudlets. The locations of cloudlets can be community locations extracted from real map or points generated according to a random process. The network is partitioned into a Voronoi diagram with m Voronoi cells, and there is one cloudlet in each region. Fig., 2 shows 19 cloudlets in the network and the mobile device is connected to cloudlet C 7 for mobile application computing. Suppose the computational task on the mobile device requires C instructions. Let S i be the computing speed, in instructions per time slot (e.g., second), of the cloudlet C i, i = 1,2,...,m. This task thus takes C/S i time slots to 496
3 3 and suppose that they have finite expectations and µ i and their density functions f i T C and f i exist and are continuous on (, ), respectively. In reality, distributions of T i C and T i I can be estimated based on movement history of mobile users as human tend to repeat their everyday schedules [9]. In this paper, we study the performance of using cloudlet for mobile applications. Due to node mobility, cloudlet connection is intermittent, which poses challenges for utilizing cloudlet computing. In order to identify power and node mobility of cloudlet computing, we examine the probability that a mobile device can connect to at least one cloudlet, which is called cloudlet access probability, the success rate of task execution, the total number of tasks executed by cloudlets and average task execution speed over time t. Fig. 2. Cloudlet network model compute on cloudlet C i, i = 1,2,...,m. Denote B as the network bandwidth. If the mobile device needs to send D out bytes of task data to the cloudlet while the cloudlet needs to send back D in bytes of executed task data to the mobile device, it takes D out /B and D in /B time slots to transmit and receive data, respectively. Define δ i = C/S i +(D in +D out )/B as thetaskcompletiontime, which is the sum of task transmission time and task computing time at cloudlet C i. Cloudlet Connection Model: When cloudlet C i (1 i m) is within the mobile device s transmission range, the mobile device can access the computing resources in C i ; otherwise, the mobile device is disconnected from C i. In Fig. 2, connection to C 7 is available to the mobile device. Formally, suppose mobile device is moving in the network according to a mobility process M. Denote by X(t) and X Ci (t) the locations of the mobile device and cloudlet C i, respectively. Let the transmission range of the mobile device be r. Connection to C i is available at time t if and only if X(t) X Ci (t) r, where is the Euclidean norm in 2-Dimension. Further, the connection and inter-connection time between a mobile device and a cloudlet are defined as follows. Definition1. The connection time T C of the mobile device and cloudlet C i ( i = 1,2,...,m) is defined as T i C inf t> {t : X(t) X i(t) > r}, (1) given that X() X i () > r and X( + ) X i ( + ) r. The inter-connection time (i.e., time between two consecutive connections) of the mobile device and cloudlet C i is defined as TI i inf {t : X(t) X i(t) r}, (2) t> given that X() X i () r and X( + ) X i ( + ) > r. Let F i T C and F i denote the distribution functions of the connection time T i C and inter-connection time T i I, respectively, III. CLOUDLET COMPUTING PERFORMANCE Because of node mobility, the connection between a mobile device and a cloudlet can be intermittent. In order to study cloudlet computing performance, we start with modeling the connection and inter-connection process between a mobile device and a cloudlet. Definition2. Let {η(t), t < } be a stochastic process with state space {,1}. If a mobile device can connect to a cloudlet at time t, η(t) = 1; otherwise, η(t) =. Denote by α 1,β 1,α 2,β 2,... the lengths of successive intervals spent in states and 1, respectively, in time (, ), where α 1,α 2,... are i.i.d. and β 1,β 2,... are i.i.d.. The process {η(t)} assumes the states and 1 alternately, as shown in Fig. 3. The process {η(t)} is called alternating renewal process. Fig. 3. The connection and inter-connection process of a mobile device and a cloudlet is an alternating renewal process. With only a slight loss of generality, we assume that the time origin of the process {η(t)} is an arbitrary connection or inter-connection. When η() =, the mobile device is initially disconnected from the cloudlet; when η() = 1, the mobile device is initially connected with the cloudlet. If η() =, α i = TI i and β i = TC i, i.e., ith inter-connection and connection time, respectively; if η() = 1, α i = TC i and β i = TI i, i.e., ith connection and inter-connection time, respectively. The former case is shown in Fig. 3. Based on the alternating renewal process of the connection between a mobile device and a cloudlet, we study the cloudlet access probability, task success rate and execution speed. A. Cloudlet access probability A mobile device s connection to cloudlets is intermittent due to node mobility. If there is no cloudlet in the vicinity of 4961
4 4 mobile device, cloudlet computing is unavailable. Hence, it is important to find out the cloudlet access probability, which is defined as the probability that a mobile device can connect to at least one cloudlet in the network. Note that if the mobile device can connect to multiple resource-rich devices at the same time, these devices can be seen as belonging to one cloudlet. In other words, a mobile device can connect to at most one cloudlet at any time t, and a mobile device s connections with different cloudlets are exclusive. This assumption is reasonable because different cloudlets probably locate at different community sites. Based on this assumption and the connection and inter-connection process of a mobile device and a cloudlet, we have the following theorem for the cloudlet access probability. Theorem 1. The limiting cloudlet access probability is m µ i T CA = C + µ i. (3) where and µ i are expectations of connection time T i C andinter-connection T i I betweenthemobiledeviceand cloudlet C i (i = 1,2,...,m),respectively. Proof: The movements of mobile device result in alternating connection and inter-connection with a cloudlet C i,1 i m, which is modeled in Definition 2. The probability that the connection between the mobile device and cloudlet C i is available at time t, conditional on the initial state, is given by Cox in Renewal Theory (1962, p.83) [1]. When the mobile device is initially connected to cloudlet C i, CA i 1(t) = 1 F i T C (t) + h i 1(u)[1 F i T C (t u)]du, where h 1 (u) is the inverse Laplace transform of H i 1(s) = f i T C (s)f i (s) s(1 f i T C (s)f i (s)) ; when the mobile device is disconnected from cloudlet C i at t =, CA i (t) = F i (t) + h i 1(u)[1 F i (t u)]du. It is reasonable to assume that the process of connection and inter-connection between nodes has been running for a long time before it is first observed. The limiting connection probability of cloudlet C i is CA i = lim CA i 1(t) = lim CA i µ i T (t) = C + µ i. (4) As the mobile device s connections to different cloudlets are exclusive, the cloudlet access probability is CA = m CAi. Thus, we finish our proof. Remark 1. Connection probability CA i of a cloudlet C i is determined by the average connection and inter-connection time, i.e., mobility pattern of a mobile user. The more frequent visit and the longer sojourn time at the location of a cloudlet, the more likely a mobile user can connect to this cloudlet. The mobile device s isolation probability is 1 CA, which is determined by the percentage of time that the mobile user is at locations without any cloudlet (i.e., user mobility pattern). B. Task Success Rate Cloudlets available at a point in time can not guarantee a successful task execution. In order to successfully compute a task, a cloudlet has to maintain a connection with the mobile device during the task transmissions and computation. In other words, cloudlet C i can successfully execute a task for a mobile device if a connection is available between them for at least δ i period of time, where δ i = C/S i + (D in + D out )/B. We derive the task success rate by applying results on interval availability of an alternating renewal process [11]. Theorem2.Thetasksuccessrateis m ) δi SR = CA (1 i [1 FT i C (x)]/ dx, (5) wherecloudlet C i saccessprobability CA i = µi T C +µ i. Proof: Define SR i (t,δ i ) as the probability that a connection between the mobile device and cloudlet C i is available at least δ i period of time starting at t. Based on the interval availability of an alternating renewal process derived by Barlow and Hunter (1961) [11], we have that conditioning on initial state η() = 1, SR i 1(t,δ i ) = 1 F i T C (t+δ i )+ while conditioning on initial state η() =, SR i (t,δ i ) = h i 1(u)[1 F i T C (t+δ i u)]du; h i 2(u)[1 F i T C (t + δ i u)]du, where h i 2(u) is the inverse Laplace transform of It is readily seen H i 2(s) = f i (s)f i (s) s(1 f i T C (s)f i (s)). SR i = lim SR i 1(t,δ i ) = lim SR i (t,δ i ) (6) δ = i (1 FT i C (u))du δi + µ i = µi T C (1 [1 F T i C (u)]/ du) + µ i. Note that SR i is the product of the limiting cloudlet access probability CA i and the limiting probability that it survives an interval of duration δ i. As the limiting success rate is SR = m SRi, we complete our proof. The connection time between a mobile device and a cloudlet is also called contact time or link lifetime, which has been formally described to be exponential random variable under various mobility models [12, 13]. When TC i (i = 1,2,...,m) follows exponential distribution with parameter 1/, we have the following corollary. 4962
5 5 Corollary 1. When {TC i,i = 1,2,...,m},areexponential randomvariableswithrates {1/,i = 1,2,...,m},the limiting task success rate is m SR = CA i e δi. (7) Remark 2. The probability that a task can be executed successfully by cloudlet C i not only depends on thecloudletaccess probability CA i andthe probability distribution of connection time T i C butalsodependsonthe task completion time δ i, which is determined by computation demand C, sizes of task data D in and D out,cloudletcomputingspeed S i,andchannel bandwidth B. C. Task Execution Speed In mobile cloud computing, mobile applications, such as mobile learning, health monitoring, and map navigation, require recurrent services. For example, in mobile gaming, mobile users offload game engine (e.g., graphic rendering) to the servers in the cloudlet and users need to access the cloudlet repeatedly as the game refreshes during the game playing time. In general, a mobile device has a large amount of tasks to compute, and each task is sent to a cloudlet for computing after the previous task is finished. It is important to find out how many tasks can be executed successfully over time t and what is the average task execution speed. Because of node mobility, the connection between a mobile device and a cloudlet is unstable. In order to maintain high cloudlet computing reliability, it is reasonable to assume that for recurrent task computing, a mobile device only utilizes a cloudlet when they are connected. Accordingly, the average number of executed tasks over a fixed time t depends on the total connection time between a mobile device and its encountered cloudlets as well as task completion time. We derive the following theorem using renewal theory. Theorem 3. The average number of executed tasks over time t,denotedas N(t),satisfies m E(N i E(N(t)) = C (t)), (8) where isthefloorfunction,and E(N i C (t))isthenumber ofconnectionsbetweenamobileuserandcloudlet C i within time t.formally, E(N i C (t))istheinverselaplacetransformof F i T C+ (s)/[s(1 F i T C+ (s))]and F i T C+ (s)isthelaplace transformofrandomvariable T i I + T i C. Proof: In the connection and inter-connection process of a mobile device and cloudlet C i, define S i = and S i n = α i1 +β i1 +α i2 +β i2 + +α in +β in for n 1. The process N i C (t) = max n {n S i n t} is the number of renewals over time t. The total connection time between a mobile device and cloudlet C i over time t is approximately CT i (t) N i C (t) k=1 δ i T ik C, (9) where TC ik is the kth connection time between a mobile device and cloudlet C i. As {TC ik,k = 1,2,...} are i.i.d. and have the same distribution as TC i, E(CT i (t)) = E(N i C(t))E(T i C) = E(N i C(t)), (1) where E(NC i (t)), by renewal theory, is the inverse Laplace transform of FT i C+ (s)/[s(1 FT i C+ (s))] and FT i C+ (s) is the Laplace transform of random variable TI i + T C i. The number of tasks executed by cloudlet C i is E(CT i (t))/δ i. Accordingly, the total number of executed tasks over time t is sum of E(CT i (t))/δ i over all cloudlets C i, i = 1,2,...,m. Similar to connection time T C, inter-connection time, also called inter-contact time, has been shown to exhibit exponential tail decay under many mobility models [14]. Under the special case when TC i and i (i = 1,2,...,m) are exponential random variables, we can derive the closed form for the average number of renewals E(NC i (t)) over time t, thus E(N(t)) in the following corollary. Corollary2. If TC i and i (1 i m)areexponential randomvariableswithrates 1/, 1/µ i,respectively, ( m CA i t + CA i (1 CA i ) 1 e t ) CA i µ i E(N(t)) =, where CA i = /( + µ i ). δ i (11) Proof: When TC i and i are exponentially distributed with rates 1/ and 1/µ i, respectively, TI i + T C i has density function (e t/µi µ i T µ i e t/µi T C ), which gives the 1 I T C 1 Laplace transform L TI+T C (s) = µ i T µ i C T (s+1/µ i I T )(s+1/µ i C T ). I Then, L(E(N i c(t)),s) = 1 µ i s 2 (s µ i ). Performing inverse Laplace transform, we have E(N i c(t)) = t + µ i +CA i (1 CA i )(1 e ( 1 µ i + 1 µ T i )t C ). Substituting this equation into Eq. (8), we finish the proof. To understand how the number of tasks executed by cloudlets increases over time t, we give some numerical results in Fig. 4. We set the scenario that a mobile user mainly stays at work place and home. Let there be two cloudlets in the network (i.e., m = 2). Cloudlet C 1 locates at the mobile user s home, and Cloudlet C 2 locates at the mobile user s office. The mean connection and inter-connection time between the mobile user with these two cloudlets are µ 1 T C = 12 hours and µ 1 = 12 hours, µ 2 T C = 8 hours and µ 2 = 16 hours, respectively. Let the task completion time δ 1 = δ 2 = 1 minute. Fig. 4 shows that number of tasks executed by cloudlet C 1 (or C 2 ) increases linearly with rate approximately equal to cloudlet C 1 s (or C 2 s) access probability CA 1 = 1 2 (or CA 2 = 1 3 ). The total number of executed tasks by cloudlets 4963
6 6 Number of computed tasks Cloudlets 1&2 Cloudlet 1 Cloudlet t (minute) Fig. 4. Number of tasks computed by cloudlet 1, cloudlet 2, and both cloudlets over time t. in the network increases linearly with rate approximately equal to cloudlet access probability CA = CA 1 + CA 2 = 5 6. Remark 3. Average number of executed tasks over time t grows linearly with rate approximately equal m CAi /δ i. In other words, number of executed tasks is mainly determined by cloudlet access probability and task completion time. Theorem 4. The limiting average speed of task execution satisfies E(N(t)) m CA i CS = lim =. (12) t δ i Proof: The average speed of task execution is CS(t) = E(N(t))/t. Based on Theorem 3, we have limiting task execution speed when t, m E(N(t)) CS = lim = t lim According to the elementary renewal theorem, E(N i c(t)) t E(N lim c(t)) i 1 = t ( + µ i ). Hence, we complete our proof. Remark 4. The higher the cloudlet access probability CA i (1 i m) and the shorter the task completion time δ i (1 i m) are, the faster the task execution speed CS is. Findings in this paper reveal that mobility pattern of a mobile user determines its connection and inter-connection time to cloudlets, which in turn affect not only the cloudlet access probability, but also success rate and speed of task execution. IV. CONCLUSION In this paper, we study the cloudlet computing for mobile applications, in which mobile users offload tasks to nearby resource-rich devices for instant service access and saving on roaming charges. As a cloudlet locates at a community site that a mobile user visits, its access probability for this mobile user is µ TC /(µ TI + µ TC ) determined by the mobile user s mean. connection time and inter-connection time with the cloudlet. Moreover, cloudlet access probability affects the cloudlet computing performance, such as probability of successful task execution, average number of tasks executed over time t, and the limiting task execution speed. In summary, a mobile user s mobility pattern has significant impact on its cloudlet access probability and cloudlet computing performance, which can be measured by µ TC /(µ TI + µ TC ). In the future work, we will integrate real mobility traces and mobile applications to evaluate the cloudlet computing performance, such as task completion time or execution speed, and energy consumption on local mobile devices. By comparing computing performance using cloudlets with using remote clouds, we could glean insights on the advantages and disadvantages of cloudlet and remote cloud, respectively, thus provide guidelines on whether or when cloudlets or remote clouds is suitable for mobile application computing. REFERENCES [1] S. Bicheno, Global smartphone installed base forecast by operating system for 88 countries: 27 to 217, tech. rep., Strategy Analytics, Oct [2] E. Koukoumidis, D. Lymberopoulos, K. Strauss, J. Liu, and D. Burger, Pocket cloudlets, in The Sixteenth International Conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS), Mar [3] H. T. Dinh, C. Lee, D. Niyato, and P. Wang, A survey of mobile cloud computing: architecture, applications, and approaches, Wireless Communications and Mobile Computing, 211. [4] M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, The case for vm-based cloudlets in mobile computing, IEEE Pervasive Computing, vol. 8, pp , Oct.-Dec. 29. [5] A. Inc., At&t individual & mobile share data plans [6] B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, Clonecloud: elastic execution between mobile device and cloud, in Proceedings of the sixth conference on Computer systems, EuroSys 11, pp , 211. [7] G. Huerta-Canepa and D. Lee, A virtual cloud computing provider for mobile devices, in ACM Workshop on Mobile Cloud Computing& Services: Social Networks and Beyond. MCS 1, Jun. 21. [8] C. Shi, V. Lakafosis, M. H. Ammar, and E. W. Zegura, Serendipity: enabling remote computing among intermittently connected mobile devices, in Proc. of the ACM MobiHoc, 212. [9] C. Song, N. B. Z. Qu, and A.-L. Barabási, Limits of predictability in human mobility, Science magazine, 21. [1] D. Cox, Renewal Theory. Methuen & Co, [11] R. E. Barlow and L. C. Hunter, Reliability of analysis of a one-unit system, Operations Research, vol. 9, [12] I. Gruber and H. Li, Link expiration times in mobile ad hoc networks, in Proceedings of 27th Annual IEEE Conference on Local Computer Networks(LCN), pp , Nov. 22. [13] W. Wang and M. Zhao, Joint effects of radio channels and node mobility on link dynamics in wireless networks, inproceedings of The 27th IEEE Conference on Computer Communications (INFOCOM), pp , Apr. 28. [14] H. Cai and D. Y. Eun, Toward stochastic anatomy of intermeeting time distribution under general mobility models, in Proc. of the ACM MobiHoc,
Mobile Hybrid Cloud Computing Issues and Solutions
, pp.341-345 http://dx.doi.org/10.14257/astl.2013.29.72 Mobile Hybrid Cloud Computing Issues and Solutions Yvette E. Gelogo *1 and Haeng-Kon Kim 1 1 School of Information Technology, Catholic University
Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战
Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: [email protected]
Mobile Cloud Computing: Critical Analysis of Application Deployment in Virtual Machines
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Mobile Cloud Computing: Critical Analysis of Application Deployment
Task Allocation for Mobile Cloud Computing in Heterogeneous Wireless Networks
Task Allocation for Mobile Cloud Computing in Heterogeneous Wireless Networks Zongqing Lu, Jing Zhao, Yibo Wu and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University
Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover
1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate
Opportunism and Symbiosis in Mobile Cloud Computing: The Promise and the Challenges
Opportunism and Symbiosis in Mobile Cloud Computing: The Promise and the Challenges Mostafa Ammar School of Computer Science Georgia Institute of Technology Atlanta, GA In Collaboration with: Ellen Zegura,
Cooperative Caching Framework for Mobile Cloud Computing
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 8 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Mobile Cloud Computing: A Comparison of Application Models
Volume 1, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Mobile Cloud Computing: A Comparison of Application Models Nidhi
A Comparative Study of cloud and mcloud Computing
A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. [email protected]
Efficient Energy Reduction and Enhancing Security Privacy in Mobile Cloud Computing
Efficient Energy Reduction and Enhancing Security Privacy in Mobile Cloud Computing B.Sudhanantham 1, M.Shankar 2 PG Scholar, Dept. of CSE, Angel College of Engineering and Technology, Tirupur, India 1
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with Computation Offload
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 01-06 Cloud Computing for hand-held Devices:Enhancing Smart phones viability
A Novel Semi-Markov Smooth Mobility Model for Mobile Ad Hoc Networks.
A Novel Semi-Markov Smooth Mobility Model for Mobile Ad Hoc Networks. Ming Zhao Wenye Wang Department of Electrical and Computer Engineering North Carolina State University Raleigh, North Carolina 7695
Overview of Offloading in Smart Mobile Devices for Mobile Cloud Computing
Overview of Offloading in Smart Mobile Devices for Mobile Cloud Computing Roopali, Rajkumari Dep t of IT, UIET, PU Chandigarh, India Abstract- The recent advancement in cloud computing is leading to an
ALOHA Performs Delay-Optimum Power Control
ALOHA Performs Delay-Optimum Power Control Xinchen Zhang and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {xzhang7,mhaenggi}@nd.edu Abstract As
Help Your Mobile Applications with Fog Computing
Help Your Mobile Applications with Fog Computing Mohammed A. Hassan, Mengbai Xiao, Qi Wei and Songqing Chen [email protected], NetApp Inc. {mxiao3,qwei2,sqchen}@gmu.edu, Department of Computer Science,
Saving Mobile Battery Over Cloud Using Image Processing
Saving Mobile Battery Over Cloud Using Image Processing Khandekar Dipendra J. Student PDEA S College of Engineering,Manjari (BK) Pune Maharasthra Phadatare Dnyanesh J. Student PDEA S College of Engineering,Manjari
Offloading file search operation for performance improvement of smart phones
Offloading file search operation for performance improvement of smart phones Ashutosh Jain [email protected] Vigya Sharma [email protected] Shehbaz Jaffer [email protected] Kolin Paul
Mobile Cloud Computing: Survey & Discussion. Jianting Yue Sep 27, 2013
Mobile Cloud Computing: Survey & Discussion Jianting Yue Sep 27, 2013 1 Outline Lead-in Definition Main Functions Architecture Computation Offloading: an example Challenges Potential Ideas Summary 2 3
Mobile Image Offloading Using Cloud Computing
Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of
Performance of Host Identity Protocol on Nokia Internet Tablet
Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
ISSN:2320-0790. Keywords : Mobile Cloud Computing, Cloud Computing, Mobile services, Computation offloading.
ISSN:2320-0790 Mobile Cloud Computing Concepts, Architecture and Challenges V. Sathiyavathi #1, Dr. C. Jayakumar *2 #1 Assistant Professor, Dept.of.Computer Applications, Easwari Engineering College *3
Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks
ENSC 427: Communication Network Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks Simon Fraser University - Spring 2012 Claire Liu Alan Fang Linda Zhao Team 3 csl12 at sfu.ca
A Virtual Machine Placement Algorithm in Mobile Cloud Computing Environment by Considering Network Features
A Virtual Machine Placement Algorithm in Mobile Cloud Computing Environment by Considering Network Features Chaitra Sathyampet M.E. Scholar Department of Computer Science & Engineering APPA Institute Of
The TrimTrac Locator: A New Standard in Practical and Affordable Asset Tracking
The TrimTrac Locator: A New Standard in Practical and Affordable Asset Tracking By Bill Dussell Director, Integrated Products Trimble Navigation 15-December-2003 1997 2003, Trimble Navigation Limited.
3G smartphones. ericsson White paper Uen 284 23-3250 February 2015
ericsson White paper Uen 284 23-3250 February 2015 3G smartphones optimizing user experience and network efficiency Rapid global smartphone uptake is creating new mobile data traffic patterns. There is
A Hybrid Load Balancing Policy underlying Cloud Computing Environment
A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349
Computation off loading to Cloud let and Cloud in Mobile Cloud Computing
Computation off loading to Cloud let and Cloud in Mobile Cloud Computing Rushi Phutane Department of Information Technology, PICT, Pune 411043, Maharshtra,India, [email protected] Prof. Tushar
Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung
Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: [email protected] # K.Meena 2, Assistant Professor
Next Generation Mobile Cloud Gaming
Next Generation Mobile Cloud Gaming Wei Cai, Victor C.M. Leung Department of Electrical and Computer Engineering The University of British Columbia Min Chen School of Computer Science and Technology Huazhong
LTE Test: EE 4G Network Performance
LTE Test: EE 4G Network Performance An Analysis of Coverage, Speed, Latency and related key performance indicators, from October 31 st to December 20 th, 2012. Disclaimer Epitiro has used its best endeavours
The Cloud Personal Assistant for Providing Services to Mobile Clients
2013 IEEE Seventh International Symposium on Service-Oriented System Engineering The Cloud Personal Assistant for Providing Services to Mobile Clients Michael J. O Sullivan, Dan Grigoras Department of
THE ROLE OF CLOUD COMPUTING IN MOBILE
THE ROLE OF CLOUD COMPUTING IN MOBILE Rajesh A. Dhote Smt. R. S. arts, commerce and sciences college Anjangaon Surji [email protected] ABSTRACT: The mobile cloud computing approach has emerged
N. J. Pramod Dhinakar 1, G. Kishore Kumar 2, M. Raghavendra 3
A Review on Mobile Cloud Computing N. J. Pramod Dhinakar 1, G. Kishore Kumar 2, M. Raghavendra 3 1 Asst. Professor, Dept. of Information Technology, RGM College of Engg. & Tech., Nandyal, Kurnool Dt. 2
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
Adaptive Workload Offloading For Efficient Mobile Cloud Computing Jayashree Lakade Venus Sarode
Summer 13 Adaptive Workload Offloading For Efficient Mobile Cloud Computing Jayashree Lakade Venus Sarode COEN283 Table of Contents 1 Introduction... 3 1.1 Objective... 3 1.2 Problem Description... 3 1.3
Studies on Market and Technologies for IMT in the Next Decade CJK-IMT Working Group
Studies on Market and Technologies for IMT in the Next Decade CJK-IMT Working Group Dr. LEE, HyeonWoo ([email protected]) ITU-R Working Party 5D Workshop IMT for the Next Decade March 21 st 2011, Bangkok
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
perform computations on stored data (Elastic Compute Cloud (EC2). )
Karthik Kumar and Yung-Hsiang Lu, Purdue University Presenter Yifei Sun Take Amazon cloud for example. store personal data (Simple Storage Service (S3) ) perform computations on stored data (Elastic Compute
Energy Consumption in Android Phones when using Wireless Communication Technologies
Energy Consumption in Android Phones when using Wireless Communication Technologies Goran Kalic, Iva Bojic and Mario Kusek University of Zagreb Faculty of Electrical Engineering and Computing Unska 3,
Advanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 [email protected] Mohamed E. Fayad Computer Engineering
DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security
ICT Development Trends (2014): Embracing the Era of Mobile-ICT
ICT Development Trends (2014): Embracing the Era of Mobile-ICT ZTE COPORATION In our fast-growing global information society, technology has had a profound effect on every aspect of society and each individual's
NORTH AMERICA ERICSSON MOBILITY REPORT APPENDIX JUNE
NORTH AMERICA ERICSSON MOBILITY REPORT APPENDIX JUNE 215 MARKET OVERVIEW Key figures: North America 214 22 CAGR 214 22 Mobile subscriptions (million) 38 48 4% Smartphone subscriptions (million) 25 37 5%
DYNAMIC LOAD BALANCING IN CLOUD AD-HOC NETWORK
DYNAMIC LOAD BALANCING IN CLOUD AD-HOC NETWORK Anuja Dhotre 1, Sonal Dudhane 2, Pranita Kedari 3, Utkarsha Dalve 4 1,2,3,4 Computer Engineering, MMCOE, SPPU, (India) ABSTRACT Cloud computing is a latest
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 1, Volume 2 (January 2015)
Survey on Massive Multimedia Content Delivery in Push- Based Wireless Converged Network Saranya B, II M.E. Department of Computer Science and Engineering, Balasubramaniam C, Asst.Professor(Sr.G), Department
Mobile Cloud Computing: Approaches and Issues
Mobile Cloud Computing: Approaches and Issues Ms. Snehal P.Warhekar 1, Prof. V.T.Gaikwad 2 1,2 Sipna COET, Amravati, MS, India Abstract: During the last few years, there is a revolutionary development
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
OPTIMIZED CONSUMPTION AND ACCESS OF REMOTE DISPLAY ON MOBILE DEVICE ENVIRONMENT
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 2, Feb 2014, 167-174 Impact Journals OPTIMIZED CONSUMPTION AND
IN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
Mobile video streaming and sharing in social network using cloud by the utilization of wireless link capacity
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 7 July, 2014 Page No. 7247-7252 Mobile video streaming and sharing in social network using cloud by
A Survey on Mobile Cloud Computing
A Survey on Mobile Cloud Computing Preeti Garg M.Tech Scholar, Dept of CSE, KIET Vineet Sharma, PhD. Professor, Dept of CSE, KIET ABSTRACT Today, during global economic downturn, exponential growth of
A Study of Application Recovery in Mobile Environment Using Log Management Scheme
A Study of Application Recovery in Mobile Environment Using Log Management Scheme A.Ashok, Harikrishnan.N, Thangavelu.V, [email protected], [email protected],[email protected], Bit Campus,
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
Mobile Virtual Network Computing System
Mobile Virtual Network Computing System Vidhi S. Patel, Darshi R. Somaiya Student, Dept. of I.T., K.J. Somaiya College of Engineering and Information Technology, Mumbai, India ABSTRACT: we are planning
A Novel Routing and Data Transmission Method for Stub Network of Internet of Things based on Percolation
IEEE INFOCO 2011 Workshop on 2CN-2011 A Novel Routing and Data Transmission ethod for Stub Network of Internet of Things based on Percolation Xiangming Li, Jihua Lu, Jie Yang, and Jianping An School of
A Proposed Service Broker Strategy in CloudAnalyst for Cost-Effective Data Center Selection
A Proposed Service Broker Strategy in CloudAnalyst for Cost-Effective Selection Dhaval Limbani*, Bhavesh Oza** *(Department of Information Technology, S. S. Engineering College, Bhavnagar) ** (Department
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Modeling and Performance Evaluation of Computer Systems Security Operation 1
Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system
Introduction to time series analysis
Introduction to time series analysis Margherita Gerolimetto November 3, 2010 1 What is a time series? A time series is a collection of observations ordered following a parameter that for us is time. Examples
Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis
Basic Multiplexing models? Supermarket?? Computer Networks - Vassilis Tsaoussidis Schedule Where does statistical multiplexing differ from TDM and FDM Why are buffers necessary - what is their tradeoff,
Parametric Analysis of Mobile Cloud Computing using Simulation Modeling
Parametric Analysis of Mobile Cloud Computing using Simulation Modeling Arani Bhattacharya Pradipta De Mobile System and Solutions Lab (MoSyS) The State University of New York, Korea (SUNY Korea) StonyBrook
Mobility Management in Mobile Cloud Computing
Mobility Management in Mobile Cloud Computing Karan Mitra Luleå University of Technology Skellefteå, Sweden [email protected] https://karanmitra.me 19/06/2015, Nancy, France Agenda Introduction M2C2:
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5
Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Study
MAUI: Dynamically Splitting Apps Between the Smartphone and Cloud
MAUI: Dynamically Splitting Apps Between the Smartphone and Cloud Brad Karp UCL Computer Science CS M038 / GZ06 28 th February 2012 Limited Smartphone Battery Capacity iphone 4 battery: 1420 mah (@ 3.7
Topology-Transparent Distributed Multicast and Broadcast Scheduling in Mobile Ad Hoc Networks
Topology-Transparent Distributed Multicast and Broadcast Scheduling in Mobile d Hoc Networks Yiming Liu, Victor O. K. Li, Ka-Cheong Leung, and Lin Zhang, Department of Electronic Engineering Tsinghua University,
CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING
Journal homepage: http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING R.Kohila
LCMON Network Traffic Analysis
LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia [email protected] Abstract The Swinburne
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
