1© 2011 M. SatyanarayananNSF PeCS Workshop January 27, 2011 Achieving Ubiquity through Hardware Virtualization Mahadev Satyanarayanan School of Computer.

Slides:



Advertisements
Similar presentations
1© M. SatyanarayananMicrosoft Networking Research Summit, Bellevue, WA, The Role of Cloudlets in Mobile Computing Mahadev Satyanarayanan.
Advertisements

Distributed Data Processing
The case for VM based Cloudlets in Mobile Computing
Source: IEEE Pervasive Computing, Vol. 8, Issue.4, Oct.2009, pp. 14 – 23 Author: Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N. Adviser: Chia-Nian.
Developing the Mobile Learning Business London, 24 September 2001 Mark Watkinson e-Learning Principal, IBM Region North (c) Copyright IBM Corp m-
Peter Kropf Ubiquitous Computing - Hiver 2006/20071 Peter Kropf Université de Neuchâtel Institut d’informatique
Towards a Virtual European Supercomputing Infrastructure Vision & issues Sanzio Bassini
Amazon. Cloud computing also known as on-demand computing or utility computing. Similar to other utility providers like electric, water, and natural gas,
©2014 Extreme Networks, Inc. All rights reserved. Extreme Networks Optimized Networks Kevin Kuenker, Solutions Architect – Central Region.
Tunis, Tunisia, 28 April 2014 Business Values of Virtualization Mounir Ferjani, Senior Product Manager, Huawei Technologies 2.
1/30/2015 Just-in-Time Virtual Machine Provisioning for Cloud Offload Kiryong Ha Carnegie Mellon University.
Ruhr University Bochum Cryptography in Heavily Constraint Environments Christof Paar EUROBITS Center for IT Security COmmunication SecuritY (COSY) Group.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
490dp Introduction Robert Grimm. The Computer for the 21 st Century “The most profound technologies are those that disappear. They weave themselves into.
1 NSF PeCS Twenty Years after Mark Weiser's Vision for Ubiquitous Computing - What Next? Plenary Discussion: 1/27: 5.15pm – 6.15pm Facilitators: Mahadev.
ISA5428: 普及計算 Pervasive Computing Course Outline 金仲達教授 清華大學資訊系統與應用研究所 九十三學年度第一學期 (Slides are taken from the presentations by Prof. Friedemann Mattern of.
Eyal de Lara Department of Computer Science University of Toronto.
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
D-1 Management Information Systems for the Information Age Second Canadian Edition Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Eyal de Lara Department of Computer Science University of Toronto.
Software Testing For Wireless Mobile Computing _________________________________________________________________________ By Michael Paltayan.
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Virtualization for Cloud Computing
Connect. Innovate. Transform. Powering Rwanda’s socio-economic transformation towards a knowledge economy. Vision.
Slide 1.1 Boddy et al., Managing Information Systems, 3 rd Edition, © Pearson Education Limited 2009 MIS – Boddy et al. Ch1. Information systems and organisations.
For more notes and topics visit:
1 GRUPPO TELECOM ITALIA Software Defined Networking (SDN) and Network Functions Virtualization (NFV) Research issues and trends Antonio Manzalini– Telecom.
Chapter 1 CSF 2009 Computer Abstractions and Technology.
MOBILE CLOUD COMPUTING
Operating Systems Who’s in charge in there?. Types of Software Application Software : Does things we want to do System Software : Does things we need.
Simulation of Cloud Environments
© 2008 Pittsburgh Supercomputing Center Tour Your Future The Girls, Math & Science Partnership Pittsburgh Supercomputing Center Computer Network Engineering.
Extended Learning Module D
203A Intro to Ubicomp Prof. Cristina Lopes
Improving Network I/O Virtualization for Cloud Computing.
Pervasive software interoperability for the Operating Room of the Future May 10, 2005.
Presentation on 5 pens technology - THE NEXT GEN INCREDIBLE COMPUTER.
MODULE 1 Computing Essentials © Paradigm Publishing, Inc.1.
Dynamic VM Synthesis for Cloudlet -ISTC Retreat Poster- Kiryong Ha, Padmanabhan S Pillai, Mahadev Satyanarayanan.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Server Virtualization
Chapter 1 — Computer Abstractions and Technology — 1 The Computer Revolution Progress in computer technology – Underpinned by Moore’s Law Makes novel applications.
Chapter 1 Computer Abstractions and Technology. Chapter 1 — Computer Abstractions and Technology — 2 The Computer Revolution Progress in computer technology.
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
Mobile Computing and Wireless Networking
MUC course – Final examination Stephane Dupin, February 2 nd 2010.
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
Capt Froberg. Outline What is a computer? What components does a computer need? Physical “Cloud” What is a virtual computer?
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Chapter 1 — Computer Abstractions and Technology — 1 Below Your Program Application software – Written in high-level language System software – Compiler:
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
Pervasive Computing Parts of the slides are extracted from those of Profs. Mark Weiser, Deborah Estrin, Akbar Sayeed, Jack Stankovic, Mani Srivastava,
CONTENT FOCUS FOCUS INTRODUCTION INTRODUCTION COMPONENTS COMPONENTS TYPES OF GESTURES TYPES OF GESTURES ADVANTAGES ADVANTAGES CHALLENGES CHALLENGES REFERENCE.
1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel:
Network Virtualization Overlays Use Cases draft-timy-nvo3-use-case-01 Lucy Yong Mehmet Toy Aldrin Isaac Vishwas Manral Linda Dunbar Vancouver July 31,
Cloud Computing – UNIT - II. VIRTUALIZATION Virtualization Hiding the reality The mantra of smart computing is to intelligently hide the reality Binary->
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
LECTURER: NGUY Ễ N ANH TU Ấ N (TUAN NGUYEN) TUTORS: TÔN TH Ị KIM LOAN TR Ầ N H Ồ NG NGHI {TUANNA, LOANTTK, Developing Applications.
Strawman LHCONE Point to Point Experiment Plan LHCONE meeting Paris, June 17-18, 2013.
A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link. Typically, connected.
Gaia Ubiquitous Computing Directions Roy Campbell University of Illinois at Urbana-Champaign.
Software Defined Datacenter – from Vision to Solution
Lecture 1: Network Operating Systems (NOS)
5G is coming Zoltán Turányi 5G Expert, Ericsson Research
Clouds , Grids and Clusters
Who’s in charge in there?
Morgan Kaufmann Publishers
Personal Wellbeing.
Smart Learning concepts to enhance SMART Universities in Africa
Presentation transcript:

1© 2011 M. SatyanarayananNSF PeCS Workshop January 27, 2011 Achieving Ubiquity through Hardware Virtualization Mahadev Satyanarayanan School of Computer Science Carnegie Mellon University

2© 2011 M. SatyanarayananNSF PeCS Workshop January 27, 2011 Essence of Weiser’s Vision Creation of computing environments that 1.“are saturated with computing and communication” 2.“yet gracefully integrated with human activities” We have done a great job on #1 We have hardly scratched the surface on #2 at best, we have created potentially useful components e.g., context awareness toolkits, smart space toolkits, sensing and activity inferencing toolkits, OS extensions for application- aware adaptation and transparency to disconnections and weak connectivity,  but “gracefully integrated”  ?

3© 2011 M. SatyanarayananNSF PeCS Workshop January 27, 2011 Moore’s Law Reigns Supreme Processors Internet Connectivity PC Disk Capacity (GB) (Figure credits: various Wikipedia sources)

4© 2011 M. SatyanarayananNSF PeCS Workshop January 27, 2011 Glaring Exception Adam & Eve2000 AD Human Attention “...in an information-rich world, the wealth of information means a dearth of something else: a scarcity of whatever it is that information consumes. What information consumes is rather obvious: it consumes the attention of its recipients. Hence a wealth of information creates a poverty of attention and a need to allocate that attention efficiently among the overabundance of information sources that might consume it” Simon, H., 1971 “Designing Organizations for an Information-Rich World” “The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.” Weiser, M., 1991 “The Computer for the 21 st Century”

5© 2011 M. SatyanarayananNSF PeCS Workshop January 27, 2011 Integration, Deployment & Scaling - I Wide interfaces  external complexity  brittle abstractions Hard to deploy, hard to sustain, hard to scale Cautionary lesson of process migration 1983 to 2011, PhD theses roughly every 5 years not supported by any production OS today (open or closed) great idea whose time has never come! Will our pervasive computing abstractions suffer the same fate?

6© 2011 M. SatyanarayananNSF PeCS Workshop January 27, 2011 Integration, Deployment & Scaling - II Contrast the wild real-world success of VM migration VMs are a key enabler of cloud computing widely used production-quality implementations Can we harness hardware virtualization in pervasive computing? VMs transform external complexity into internal complexity replace highly mutable interfaces with a very stable one software virtualization (e.g. JVM) just doesn’t cut it Two example use cases of VMs in mobile and pervasive computing use in cloudlets for cyber foraging use in transient PCs for legacy support

7© 2011 M. SatyanarayananNSF PeCS Workshop January 27, 2011 Cloudlet = Small Cloud Nearby Low-latency high-bandwidth 1-hop wireless network Olympus Mobile Eye Trek Wearable Computer Handtalk Wearable Glove Nokia N810 Tablet Android Phone Coffee shop Cloudlet WAN to distant cloud on Internet cloudlet = (compute cluster + wireless access point + wired Internet access + no battery limitations) “data center in a box”  “data center in a box” Fast on-demand VM-based customization of cloudlet infrastructure is possible

8© 2011 M. SatyanarayananNSF PeCS Workshop January 27, 2011 Transient PCs Our current PC world is a legacy for the new pervasive computing world Extended period of co-existence likely VM-based transient PCs are a key technology for this coexistence Transient PC #1 SuspendCloudCloud VM State Resume Transient PC #2 VM State wireless LAN 3G / WiFi wireless LAN