calling the cloud enabling mobile phones as interfaces to
play

Calling the cloud: Enabling mobile phones as interfaces to cloud - PowerPoint PPT Presentation

Calling the cloud: Enabling mobile phones as interfaces to cloud applications r r r r st


  1. Calling the cloud: Enabling mobile phones as interfaces to cloud applications ■♦❛♥❛ ●✐✉r❣✐✉✱ ❖r✐❛♥❛ ❘✐✈❛✱ ❉❡❥❛♥ ❏✉r✐❝✱ ■✈❛♥ ❑r✐✈✉❧❡✈✱ ●✉st❛✈♦ ❆❧♦♥s♦ ❙②st❡♠s ●r♦✉♣✱ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ❉❡♣❛rt♠❡♥t✱ ❊❚❍ ❩✉r✐❝❤ � ❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ❝ ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾

  2. ■s t❤✐s ❛ ❣♦♦❞ ♠♦❞❡❧ ❢♦r ♣❤♦♥❡✲❝❧♦✉❞ ❛♣♣❧✐❝❛t✐♦♥s❄ Motivation ❱✐s✐♦♥ ◮ ▼♦❜✐❧❡ ♣❤♦♥❡s ❛r❡ s❡t t♦ ❜❡❝♦♠❡ t❤❡ ✉♥✐✈❡rs❛❧ ✐♥t❡r❢❛❝❡ t♦ ♦♥❧✐♥❡ s❡r✈✐❝❡s ❛♥❞ ❝❧♦✉❞ ❝♦♠♣✉t✐♥❣ ❛♣♣❧✐❝❛t✐♦♥s ❲❤❛t ✇❡ ❤❛✈❡ ♥♦✇ ◮ ❆♣♣❧✐❝❛t✐♦♥s r✉♥♥✐♥❣ ♦♥ ♠♦❜✐❧❡ ♣❤♦♥❡s ❛r❡ ❝✉rr❡♥t❧② ❧✐♠✐t❡❞ t♦ t✇♦ ❝♦♥✜❣✉r❛t✐♦♥s ◮ ❘✉♥ ❡♥t✐r❡❧② ♦♥ t❤❡ ♣❤♦♥❡ ◮ ❆❝❝❡ss ❛ ❝❡♥tr❛❧✐③❡❞ ♦♥❧✐♥❡ s❡r✈✐❝❡ ✭✇❡❜ ❜r♦✇s❡r✮ ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✷

  3. Motivation ❱✐s✐♦♥ ◮ ▼♦❜✐❧❡ ♣❤♦♥❡s ❛r❡ s❡t t♦ ❜❡❝♦♠❡ t❤❡ ✉♥✐✈❡rs❛❧ ✐♥t❡r❢❛❝❡ t♦ ♦♥❧✐♥❡ s❡r✈✐❝❡s ❛♥❞ ❝❧♦✉❞ ❝♦♠♣✉t✐♥❣ ❛♣♣❧✐❝❛t✐♦♥s ❲❤❛t ✇❡ ❤❛✈❡ ♥♦✇ ◮ ❆♣♣❧✐❝❛t✐♦♥s r✉♥♥✐♥❣ ♦♥ ♠♦❜✐❧❡ ♣❤♦♥❡s ❛r❡ ❝✉rr❡♥t❧② ❧✐♠✐t❡❞ t♦ t✇♦ ❝♦♥✜❣✉r❛t✐♦♥s ◮ ❘✉♥ ❡♥t✐r❡❧② ♦♥ t❤❡ ♣❤♦♥❡ ◮ ❆❝❝❡ss ❛ ❝❡♥tr❛❧✐③❡❞ ♦♥❧✐♥❡ s❡r✈✐❝❡ ✭✇❡❜ ❜r♦✇s❡r✮ ⇒ ■s t❤✐s ❛ ❣♦♦❞ ♠♦❞❡❧ ❢♦r ♣❤♦♥❡✲❝❧♦✉❞ ❛♣♣❧✐❝❛t✐♦♥s❄ = ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✷

  4. Phone - cloud applications ❉❡s✐r❡❞ ♣r♦♣❡rt✐❡s ◮ ❙✐♥❣❧❡ ✉s❛❣❡ ♠♦❞❡❧ ◮ ◆♦ ♣r❡✐♥st❛❧❧❛t✐♦♥ ◮ ❆❝q✉✐r❡ ♦♥✲t❤❡✲✢② ◮ ❉✐s❝❛r❞ ❛❢t❡r ✐♥t❡r❛❝t✐♦♥ ◮ P❤♦♥❡ ❝✉st♦♠✐③❛t✐♦♥ ◮ ▼❛t❝❤ ♣❤♦♥❡ ❝♦♥str❛✐♥ts ❛♥❞ ✉s❡r ♥❡❡❞s ◮ ❆♣♣❧✐❝❛t✐♦♥ ❞❡✈❡❧♦♣♠❡♥t ◮ ❲r✐t❡ ♦♥❝❡✱ r✉♥ ❡✈❡r②✇❤❡r❡ ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✸

  5. Scenario - Ticketing machine ◮ ❖♣♣♦rt✉♥✐t② : ❱✐rt✉❛❧✐③❡ ♣❤②s✐❝❛❧ s❡r✈✐❝❡s ◮ ●♦❛❧ ◮ ❚✉r♥ t❤❡ ♣❤♦♥❡ ✐♥t♦ ❛♥ ✐♥t❡r❢❛❝❡ ❢♦r t❤❡ t✐❝❦❡t ♠❛❝❤✐♥❡ ◮ ❆❞✈❛♥t❛❣❡s ◮ ▼♦r❡ ✐♥t❡r❛❝t✐♦♥ ♦♥ t❤❡ ♣❤♦♥❡ ◮ ▼♦r❡ ♣r✐✈❛❝② ◮ ❈♦♠❜✐♥❡❞ ❢✉♥❝t✐♦♥❛❧✐t✐❡s ◮ ❚✐❝❦❡t ❧♦❝❛❧❧② ♦♥ t❤❡ ♣❤♦♥❡ ◮ ❙❝❛❧❡s ✇✐t❤ ♠✉❧t✐♣❧❡ ❝❧✐❡♥ts ◮ ❈❤❛❧❧❡♥❣❡s ◮ ❍❛r❞✇❛r❡ ❞✐✈❡rs✐t② ❛♥❞ ❤❡t❡r♦❣❡♥❡♦✉s ✉s❡r ✐♥t❡r❢❛❝❡s ◮ ❙❤♦rt✲t❡r♠✱ s♣♦♥t❛♥❡♦✉s ✐♥t❡r❛❝t✐♦♥s ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✹

  6. More scenarios ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✺

  7. AlfredO [Middleware’08] ◮ ❙✉♣♣♦rts ♣❛rt✐t✐♦♥ ❛♥❞ ❞✐str✐❜✉t✐♦♥ ♦❢ ♠♦❞✉❧❛r✐③❡❞ ❛♣♣❧✐❝❛t✐♦♥s ✐♥ ❛ ❝❧✐❡♥t✲s❡r✈❡r s❡t✉♣ ◮ ❖❙●✐✲❜❛s❡❞ ◮ ❋♦❝✉s ♦♥ ♣r❡s❡♥t❛t✐♦♥ ❛♥❞ ❧♦❣✐❝ ♠♦❞✉❧❡s ◮ ❋❧❡①✐❜❧❡✿ ❛ ❝❧✐❡♥t ❝❛♥ ❞②♥❛♠✐❝❛❧❧② ❛❝q✉✐r❡ ❞✐✛❡r❡♥t ♣❛rts ♦❢ ❛♥ ❛♣♣❧✐❝❛t✐♦♥ ◮ ▲✐❣❤t✇❡✐❣❤t✿ ♠❡♠♦r② ❢♦♦t♣r✐♥t ♦❢ ❧❡ss t❤❛♥ ✸✵✵❦❇ ◮ ❙❝❛❧❡s ✇❡❧❧ ✇✐t❤ ♠✉❧t✐♣❧❡ ❝♦♥❝✉rr❡♥t ✐♥t❡r❛❝t✐♦♥s ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✻

  8. AlfredO ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✼

  9. AlfredO ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✼

  10. AlfredO ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✼

  11. AlfredO ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✼

  12. AlfredO ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✽

  13. Optimization problem ◮ Pr❡♠✐s❡✿ ▼♦❞✉❧❛r✐③❡❞ ❛♣♣❧✐❝❛t✐♦♥ ◮ ▼♦❞❡❧ ♦❢ r❡s♦✉r❝❡ ❝♦♥s✉♠♣t✐♦♥ ❛♥❞ ❞❡♣❡♥❞❡♥❝✐❡s ❛♠♦♥❣ ❛♣♣❧✐❝❛t✐♦♥ ♠♦❞✉❧❡s ●♦❛❧✿ P❛rt✐t✐♦♥ t❤❡ ❛♣♣❧✐❝❛t✐♦♥ ❜❡t✇❡❡♥ ♣❤♦♥❡ ❛♥❞ s❡r✈❡r ❜❛s❡❞ ♦♥ ❞✐✛❡r❡♥t ❝r✐t❡r✐❛ ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✾

  14. Application profiling ◮ ❆♣♣❧✐❝❛t✐♦♥ ✐s r❡♣r❡s❡♥t❡❞ ❛s ❝♦♥s✉♠♣t✐♦♥ ❣r❛♣❤ ◮ ▼♦❞❡❧ ❜❛♥❞✇✐❞t❤ ❛♥❞ ♠❡♠♦r② ❝♦sts ◮ ▲✐❣❤t✇❡✐❣❤t ♠♦❞✉❧❡s ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✶✵

  15. Application partitioning ◮ ❈♦♥str❛✐♥ts ◮ ▼❆❳✭♠❡♠♦r②✮ 24 42 ◮ ▼❆❳✭❝♦❞❡❴s✐③❡✮ 4 4 12 2 2 25 21 52 56 ◮ ❖❜❥❡❝t✐✈❡ 65 5 3 6 6 13 5 3 ◮ ▼✐♥✐♠✐③❡ ✐♥t❡r❛❝t✐♦♥ t✐♠❡ 5 5 1 1 31 i i 3 3 i i t < ❦ ✇ ❦ ✇ < s ( ✐♥ ✐❥ + ♦✉t ❥✐ ) ∗ ❢ ✐❥ ❝♦❞❡ ❴ s✐③❡ ✐ X X X X ♠✐♥ ❖ ❈ ❝ = ♠✐♥ ( + + ♣r♦①② ❴ ❝♦st ✐ ) α β ✐ = ✶ ❥ = ✶ ✐ = ✶ ✐ = ✶ ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✶✶

  16. ALL and K-STEP algorithms ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✶✷

  17. ALL and K-STEP algorithms ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✶✷

  18. ALL and K-STEP algorithms ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✶✷

  19. ALL and K-STEP algorithms ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✶✷

  20. ALL and K-STEP algorithms ✷♥❞ ❉❡❝❡♠❜❡r ✷✵✵✾❙②st❡♠s ●r♦✉♣ ⑤ ❉❡♣❛rt♠❡♥t ♦❢ ❈♦♠♣✉t❡r ❙❝✐❡♥❝❡ ⑤ ❊❚❍ ❩ür✐❝❤ ✶✷

Recommend


More recommend