CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? Karthik Kumar and Yung-Hsiang Lu, Purdue University IEEE Software, 2010.

Slides:



Advertisements
Similar presentations
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Advertisements

CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? Purdue University.
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
Chapter-7 Introduction to Cloud Computing Cloud Computing.
Open Cloud Sunil Kumar Balaganchi Thammaiah Internet and Web Systems 2, Spring 2012 Department of Computer Science University of Massachusetts Lowell.
Banking Clouds V International Youth Banking Forum.
INFO 355Week #61 Systems Analysis II Essentials of design INFO 355 Glenn Booker.
Cloud Computing. 2 A division of Konica Minolta Business Solutions USA Inc. What is Cloud Computing? A model for enabling convenient, on-demand network.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Osama Shahid ( ) Vishal ( ) BSCS-5B
Cloud Computing Brian Curran, Sabatino DeRico, Mike Delisa, Mudit Goel, Jon Guagenti, Jess Caso, Greg Flynn.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
MOBILE CLOUD COMPUTING
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Computing Hardware Starter.
By Chris Versaci CLOUD SECURITY. WHAT IS CLOUD COMPUTING? Cloud computing is a concept that involves a large number of computers connected through a real-time.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Computing on the Cloud Jason Detchevery March 4 th 2009.
Low-Power Wireless Sensor Networks
In the name of God :).
3G Single Core Modem A New Telecommunications Device Group 4: Warren Irwin, Austin Beam, Amanda Medlin, Rob Westerman, Brittany Deardian.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Component Technology. Challenges Facing the Software Industry Today’s applications are large & complex – time consuming to develop, difficult and costly.
Introduction The network is the computer By Waseem Anwar Chaudhri.
Server Virtualization
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Copyright © Curt Hill Error detection and correction Techniques to Increase the Reliability.
What is virtualization? virtualization is a broad term that refers to the abstraction of computer resources in order to work with the computer’s complexity.
© GCSE Computing Computing Hardware Starter. Creating a spreadsheet to demonstrate the size of memory. 1 byte = 1 character or about 1 pixel of information.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Mobile Application Testing Mobile Application Testing.
Axis AI Solves Challenges of Complex Data Extraction and Document Classification through Advanced Natural Language Processing and Machine Learning MICROSOFT.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
Cloud computing: IaaS. IaaS is the simplest cloud offerings. IaaS is the simplest cloud offerings. It is an evolution of virtual private server offerings.
Silberschatz and Galvin  Operating System Concepts Module 1: Introduction What is an operating system? Simple Batch Systems Multiprogramming.
Dr. Hussein Al-Bahadili Faculty of Information Technology Petra University Securing E-Transaction 1/24.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Cloud Computing ENG. YOUSSEF ABDELHAKIM. Agenda :  The definitions of Cloud Computing.  Examples of Cloud Computing.  Which companies are using Cloud.
BIG DATA. The information and the ability to store, analyze, and predict based on that information that is delivering a competitive advantage.
Page 1 Cloud Computing JYOTI GARG CSE 3 RD YEAR UIET KUK.
Vodafone Business Cloud
COMPUTER NETWORKS Quizzes 5% First practical exam 5% Final practical exam 10% LANGUAGE.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Unit 3 Virtualization.
Chapter 6: Securing the Cloud
Green cloud computing 2 Cs 595 Lecture 15.
Physical Architecture Layer Design
Chapter 21: Cloud Computing and Related Security Issues
Introduction to Cloud Computing
Chapter 22: Cloud Computing Technology and Security
CLOUD COMPUTING Presented By:- EduTechlearners
Cloud Testing Shilpi Chugh.
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Costs of Migration and Operation in the Cloud
Partition Starter Find out what disk partitioning is, state key features, find a diagram and give an example.
Emerging technologies-
2.C Memory GCSE Computing Langley Park School for Boys.
ONLINE SECURE DATA SERVICE
Cloud Computing.
Distributed Edge Computing
Algorithms for Selecting Mirror Sites for Parallel Download
Presentation transcript:

CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? Karthik Kumar and Yung-Hsiang Lu, Purdue University IEEE Software, 2010

Private (Internal) Cloud The cloud infrastructure is owned or leased by a single organization and is operated solely for that organization. Public (External) Cloud The cloud infrastructure is owned by an organization selling cloud services to the general public of to a large industry group. Hybrid Cloud The cloud infrastructure is a composition of both private and public clouds. Deployment Models

Cloud computing is a new paradigm in which computing resources such as processing, memory and storage are not physically present at the user’s location -> Instead, a service provider owns and manages these resources and users access them via the Internet. Advantages: Low initial capital investment Shorter start-up time for new services Lower maintenance and operations costs Higher utilization through virtualization Easier disaster recovery What about cloud computing for mobile users? Primary constraints: Limited energy and wireless bandwidth. Introduction

Various studies have identified longer battery lifetime as the most desired feature of mobile systems. Applications such as image retrieval, voice recognition, gaming and navigation run on a mobile system; however they consume significant amounts of energy. Research question: Can offloading these applications to the cloud save energy and extend battery lifetimes for mobile users? Saving Energy for Mobile Systems - 1

There are four basic approaches to saving energy and extending battery lifetime in mobile devices: -Adopt a new generation of semiconductor technology -Avoid wasting energy -Execute program slowly -Eliminate computation all together Saving Energy for Mobile Systems - 2

Instead of service providers managing programs running on servers, virtualization allows cloud vendors to run arbitrary applications from different customers on virtual machines. Cloud vendors thus provide computing cycles, and users can use these cycles to reduce the amounts of computation on mobile systems and save energy. Virtualization, a fundamental feature in cloud computing, lets applications from different customers run on different virtual machines, thereby providing seperation and protection. Offloading computation to save energy

Suppose the computation requires C instructions. S : The speeds (instructions per second) of the cloud server M : The speeds (instructions per second) of the mobile system -> The same task takes C/S seconds on the server and C/M seconds on the mobile system. If the server and mobile system exchange D bytes of data and B is the network bandwidth, it takes D/B seconds to transmit and receive data. P c : Mobile system consumes for computing, in Watts. P i : Mobile system consumes while being idle, in Watts. P tr : Mobile system consumes to transmit and receive, in Watts. - If the mobile system performs the computation, the energy consumption: P c * (C/M) - If the server performs the computation, the energy consumption: [P i * (C/S) ] + [P tr * (D/B)] Energy analysis for computation offloading - 1

The amount of energy saved is : Suppose the server is F times faster, S = F * M. We can rewrite the formula as: -> Energy is saved when this formula produces a positive number. -> The formula is positive if D/B is sufficiently small compared with C/M and F is sufficiently large. Energy analysis for computation offloading - 2

Energy analysis for computation offloading - 3

Two sample applications illuastrate the benefits of offloading: A chess game and image retrieval. Chess: A chessboard has 8 * 8 = 64 positions. Each player controls 16 pieces at the beginning of the game. Chess is Markovian, meaning that the game is fully expressed by the current state. Each piece may be in one of the 64 possible locations and needs 6 bits to represent the location. To represent a chess game’s current state, it is sufficient to state that 6 bits * 32 pieces = 192 bits = 24 bytes. -> This is smaller than the size of a typical wireless packet. The amount of computation for chess is very large. C. Shannon and V. Allis estimated that the complexity of chess to exceed the number of atoms in the universe. Chess can be parallelized, making the value of F very large. Since the amount of computation C is extremely large, and D is very small, chess provides and example where offloading is beneficial for most wireless networks. Sample applications benefiting from offloading - 1

Image retrieval: It retrieves images similar in content to a query from an image collection. The program accomplishes this by comparing numerical representations of the images, called features. The features for the image collection can be computed in advance; for a query, the program computes its features during retrieval and compares these with image collection. Since most of the cmputation is done in advance; less computation is performed online and the value of C is small. D is large since considerable data must be sent. -> Even if the value of F become ∞, D/B might still be too large when compared to C/M. Thus, offloading saves enery only if B is very large (at high bandwidths). Sample applications benefiting from offloading - 2

Analysis indicates that the energy saved by computation offloading depends on: -The wireless bandwidth B, -The amount of computation to be performed C, and -The amount of data to be transmitted D. Fundamental assumption with the client-server model: Because the server does not already contain the data, all the data must be sent to the service provider. However, cloud computing changes this assumption. Making computation offloading more attractive

Does this make cloud computing the “ultimate” solution to the energy problem for mobile devices? Not quite. Privacy and security: Because the data is stored and managed in the cloud, security and privacy settings depend on the IT management the cloud provides. ex: In March 2009, a bug in Google caused documents to be shared without the owners’ knowledge, while a July 2009 breach in Twitter allowed a hacker to obtain confidential documents. Another potential privacy violation is the “tracking” of individuals through location- based navigation data offloaded to the cloud. Futhermore, data stored at one location may not be secure at another due to different access rules. ex: The EU has stricter privacy protection than the US where laws such as Patriot Act give government agencies and other entities more power to access personal information. Challenges and possible solutions

One possible solution is to encrypt data before storage. Challenges and possible solutions - 2

Another possible privacy and security solution is to use a technique called steganography. This type of techniques can be used to transform the data so that operations can be performed without exposing them. -> Performing encryption or steganographic techniques before sending data to the cloud requires some additional processing C p on the mobile systeö and consumes additional energy: Challenges and possible solutions - 3 Additional energy required to protect privacy and security

Reliability: Dependence on the cloud for important computations could lead to problems during service outages. ex: In typical regions like national parks, a user may not be able to organize, retrieve or identify any images captured in the park.Mobile cloud computing is also difficult in locations such as the basement of a building, interior of a tunnel, or subway. -> The value of B (bandwidth) can become very small or even zero, cloud computing does not sace energy. One option in such scenarios involves an independent backup of data with an alternate service provider, which might increase the value of D. Challenges and possible solutions - 4

Real-time data: In real-time scenarios (i.e. Chess, mobile surveillance), D is no longer a pointer to the data, it refers to the actual data. ex: In chess, the value of D is small and hence offloading can still save energy. When D is large, offloading may not save energy. -> Performing the computation on the mobile system may be more energy efficient. A possible solution is partitioning computation between the mobile system and the cloud to reduce energy consumption. Challenges and possible solutions - 5

Cloud computing can potentially save energy for mobile users. However, not all applications are energy efficient when migrated to the cloud. Mobile cloud computing services would be significantly different from cloud services for desktops because they must offer energy savings. The services should consider the energy overhead for privacy, security, reliability and data communication before offloading. Conclusion