This document discusses mobile cloud computing and data center network architectures. It begins with an introduction to mobile cloud computing, including definitions and key elements. It describes how mobile devices can offload computation and data to augment their capabilities. It then covers mobile networks and technologies for cloud access. The document outlines approaches to distributed application processing and partitioning. Finally, it defines data center network architectures and classification schemes before analyzing examples like Fat-Tree, BCube and DCell. Evaluation criteria for energy consumption and communication latency in data centers are also presented.
Middleware technologies like RPC, RMI, CORBA, and web services define standards for distributed computing by allowing programs and objects located on different machines to communicate. They provide location transparency so clients can access remote objects as if they were local. Middleware sits above basic communication mechanisms and hides differences in operating systems, networks, and programming languages.
The document discusses middleware technologies, providing an overview of middleware categories and services. It describes middleware as software that connects diverse computer systems and formats. The main categories of middleware services discussed are data management, communication, distribution, object management, application cooperation, presentation, and system management services. Examples of specific middleware technologies like CORBA, COM/DCOM, and TAPI are also summarized. The document outlines some advantages of middleware like enabling real-time access and streamlining processes, as well as disadvantages such as high costs and immature products.
The document discusses the evolution towards pervasive computing through three stages: 1) multi-channel delivery with many devices for each context, 2) cross-channel delivery with many devices accessible across contexts, and 3) impromptu networking where devices aggregate services in a context. It also describes how networks, devices, applications and user experiences are converging to create an "abstract reality" of actors, contexts and channels.
The document discusses the emerging trend of connecting devices to the internet, noting that by 2009 there will be over 14 billion internet-connected devices, far surpassing the number of computers. It introduces Embrace's Device Brokerage Platform, which acts as a software layer that dynamically brokers interactions between applications and internet devices. This decouples devices from applications and addresses issues like remote management and integration that are difficult with traditional approaches. Customers are seeing a 10:1 reduction in management costs when using the platform.
The document discusses APIs for digital services and the ecosystem. The most requested APIs by startups are listed as provisioning, identity, charging, user validation, and single sign-on. A chart shows the level of integration for backend services, ranging from no integration to deep integration. The pillars for a proper internet service platform are discussed, including infrastructure abstraction, identity management, profile management, transaction management, analytics, and exposing services through APIs.
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Vivek Garhewal
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming and applying it to perform for the same using RPC, RMI and various Mobile Agents and hence comparing different Mobile Agent systems
Service Oriented Software Engineering: Services as reusable components, Service Engineering, Software Development with Services. Service-oriented architectures, RESTful services
This document discusses topics related to client-server computing including connectivity, communication interfaces, interprocess communication technologies, wide area network technologies, network topologies, and client-server system hardware. It focuses on the layered architecture of client-server applications and describes the interface between layers. It also explains concepts like synchronous and asynchronous communication, buffering, reliable and ordered transmission, and different interprocess communication methods. Finally, it discusses wide area network components like switches, access servers, modems, and terminal adapters as well as network technologies like Token Ring.
Middleware technologies like RPC, RMI, CORBA, and web services define standards for distributed computing by allowing programs and objects located on different machines to communicate. They provide location transparency so clients can access remote objects as if they were local. Middleware sits above basic communication mechanisms and hides differences in operating systems, networks, and programming languages.
The document discusses middleware technologies, providing an overview of middleware categories and services. It describes middleware as software that connects diverse computer systems and formats. The main categories of middleware services discussed are data management, communication, distribution, object management, application cooperation, presentation, and system management services. Examples of specific middleware technologies like CORBA, COM/DCOM, and TAPI are also summarized. The document outlines some advantages of middleware like enabling real-time access and streamlining processes, as well as disadvantages such as high costs and immature products.
The document discusses the evolution towards pervasive computing through three stages: 1) multi-channel delivery with many devices for each context, 2) cross-channel delivery with many devices accessible across contexts, and 3) impromptu networking where devices aggregate services in a context. It also describes how networks, devices, applications and user experiences are converging to create an "abstract reality" of actors, contexts and channels.
The document discusses the emerging trend of connecting devices to the internet, noting that by 2009 there will be over 14 billion internet-connected devices, far surpassing the number of computers. It introduces Embrace's Device Brokerage Platform, which acts as a software layer that dynamically brokers interactions between applications and internet devices. This decouples devices from applications and addresses issues like remote management and integration that are difficult with traditional approaches. Customers are seeing a 10:1 reduction in management costs when using the platform.
The document discusses APIs for digital services and the ecosystem. The most requested APIs by startups are listed as provisioning, identity, charging, user validation, and single sign-on. A chart shows the level of integration for backend services, ranging from no integration to deep integration. The pillars for a proper internet service platform are discussed, including infrastructure abstraction, identity management, profile management, transaction management, analytics, and exposing services through APIs.
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Vivek Garhewal
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming and applying it to perform for the same using RPC, RMI and various Mobile Agents and hence comparing different Mobile Agent systems
Service Oriented Software Engineering: Services as reusable components, Service Engineering, Software Development with Services. Service-oriented architectures, RESTful services
This document discusses topics related to client-server computing including connectivity, communication interfaces, interprocess communication technologies, wide area network technologies, network topologies, and client-server system hardware. It focuses on the layered architecture of client-server applications and describes the interface between layers. It also explains concepts like synchronous and asynchronous communication, buffering, reliable and ordered transmission, and different interprocess communication methods. Finally, it discusses wide area network components like switches, access servers, modems, and terminal adapters as well as network technologies like Token Ring.
This document provides an overview of Service Oriented Architecture (SOA) and its enabling technologies. It discusses key SOA principles like loose coupling, standardized service contracts, and service reusability. The document also covers major SOA objectives, benefits, architecture layers, and the differences between SOA and web services. Web services are described as a standardized way for applications to communicate over the web using XML, SOAP, WSDL and other standards. The document contrasts SOA with public-subscribe and pull-based vs push-based messaging architectures.
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTIJNSA Journal
This document proposes a security framework for developing SOA (Service Oriented Architecture) applications on mobile devices. The framework aims to provide tools to securely develop and provide services in the mobile environment. It includes components for service description, communication interfaces, security features like cryptography and digital signatures. The framework also defines layers for networking, event handling, service provision, storage, security and management. It allows developers to easily create and securely provide services from mobile devices.
This document discusses a proposed middleware solution for providing location-based video on demand (VoD) services to heterogeneous portable devices. The solution involves developing a mobile agent system that uses proxies and quality adapters to dynamically deploy and transcode multimedia content based on a device's capabilities and location. It describes implementing a prototype movie information application using this middleware to allow portable devices to access location-dependent services like movie trailers. Key components of the middleware include shadow proxies that migrate with user profiles, a profile manager service, and a quality adapter that performs transcoding using Java Media Framework to fit the multimedia presentation to each device.
Cloud computing and Software defined networkingsaigandham1
This is my Graduate defense presentation. I have interest in various topics like cloud computing and software defined networking. This slides includes the research of various researchers on cloud computing and SDN, presented their work as my comprehensive exam.
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...edirin aphunu
Wireless communication cost reduction software provides a simple but sophisticated means of communications between individuals in an organization. Here we focus on both sides of the clients-server relationship using Java Programming Language. The client requests that some action be performed, and the server performs the action and responds to the clients. The clients will also be able to establish connection between themselves through the server itself. Java’s fundamental networking capabilities are declared by classes and interfaces of package java.net, through which Java offers stream-based communication that enable applications to view networking as streams of data.
The document provides information on client-server technology and architecture. It discusses:
1) Client-server computing partitions tasks between service providers (servers) and service requesters (clients), with clients initiating communication sessions with servers.
2) Common examples of client-server models include web browsing, email, and database access.
3) The OSI 7-layer model is described, with an overview of the functions of each layer from the physical layer to the session layer.
Project report on mesh hybrid topology network visionJignesh Ameta
This document provides a summary of mesh/hybrid network topologies. It discusses the key characteristics of mesh topologies, including that nodes are connected to multiple other nodes on the network. This creates redundant pathways between nodes and allows the network to dynamically route around failures. The document also notes that hybrid topologies combine elements of mesh and other topologies like bus or star, providing some of the redundancy of mesh with lower infrastructure costs. In summary, the document outlines mesh and hybrid network topologies and their advantages in providing multiple connections and redundancy between nodes.
Presentation from IBM InterConnect 2015:
Mobile devices are increasingly ubiquitous and are the preferred, or in some cases the only, way we wish to interact as a consumer or employee. We now live in a world where we are often connected to the Internet in an "always-on" culture where receiving information or events is both valuable and acceptable. IBM MessageSight helps connect mobile platforms and devices to existing systems of record to enhance the way we involve our customers for improved experience and hence better outcomes. In this session, we explore how to use MessageSight to integrate with systems of record exposed using both IBM Integration Bus and WebSphere Application Server to allow bi-directional, event-driven communication to the mobile application.
Narrative of digital signature technology and moving forwardConference Papers
1) The document discusses the development of a digital signature solution for web browsers over time, addressing changing technologies and standards.
2) Three key technology curves impacted the solution's design: the evolution of web extensions, compatibility across browsers, and digital certificate issuance standards.
3) The final solution released uses a client-server architecture with a web script to simplify digital signatures as a service, addressing challenges around cross-browser compatibility and changing extension technologies in browsers like Internet Explorer, Firefox and Chrome over the past 20 years.
The document provides an overview of cloud architecture, services, and storage. It defines cloud architecture as the components and relationships between databases, software, applications, and other resources leveraged to solve business problems. The main components are on-premise resources, cloud resources, software/services, and middleware. Three common cloud service models are also defined - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Amazon Simple Storage Service (S3) is discussed as a cloud storage service that stores unlimited data in buckets with fine-grained access controls and analytics capabilities.
This document provides an overview of client/server based computing and thin client computing. It discusses:
- The basics of client/server architecture and how it works to distribute processing between clients and servers.
- The benefits of server-based computing such as easier management, security, and lower costs compared to traditional desktop computing.
- What thin client computing is and how it stores applications and data on central servers rather than individual client devices, reducing costs and management needs.
- The key components of thin client solutions including terminal servers, thin clients, and communication protocols.
- How thin clients operate by connecting to terminal servers and only receiving screen updates rather than processing information locally.
AN ARCHITECTURAL FRAMEWORK FOR DELIVERING SIP-AS MULTIMEDIA SERVICES BASED ON...ijngnjournal
This document proposes and evaluates a new scalable service-oriented architecture for delivering SIP application services based on JADE/OSGi technology. It introduces an architectural framework that uses a JADE multi-agent system implemented on an OSGi platform to provide SIP application services as a service (SIP-AS) over an IMS core network. As a proof of concept, a televoting service was developed and tested on this architecture. Results showed that the televoting service scales well, enabling elasticity and dynamic load balancing of the architecture.
1. The Transport layer controls reliability and flow control for data transfer between networked devices.
2. It provides different classes of connection-oriented and connectionless transport protocols like TCP and UDP.
3. TCP ensures reliable, ordered delivery of data packets while UDP provides best-effort delivery without verification.
This document provides an introduction to cloud computing. It discusses what cloud computing is, its components including client computers, data centers, and distributed servers. It describes different cloud deployment models including public, private, and hybrid clouds. It also discusses different cloud service models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). The document then covers advantages of cloud computing and provides a brief history of cloud computing from its origins in the 1960s to modern cloud technologies.
This document provides an overview of resource management and security in cloud computing. It discusses inter-cloud resource management, resource provisioning models including advance, dynamic and user self-provisioning, and the global exchange of cloud resources. It also covers why cloud security governance is needed, what cloud security governance entails, common challenges around lack of management buy-in, controls, roles and metrics. Finally, it discusses key objectives for an effective cloud security governance model and what virtualized security is compared to traditional physical security.
This document contains a summary of skills and experience for Prathap Reddy. It outlines over 18 years of experience in software development and management roles. Key skills include strategic planning, project management, software development using technologies like Java, J2EE, J2ME, and experience managing international projects. Educational background includes a post graduate diploma in management and bachelor's degree. The document lists work experience at various companies and roles, technical skills, publications, projects contributed to, and a personnel profile.
Layer between OS and distributed applications,Hides complexity and heterogeneity of distributed system ,Bridges gap between low-level OS communications and programming language abstractions,Provides common programming abstraction and infrastructure for distributed applications.
Architecture of message oriented middlewareSajan Sahu
The document discusses message oriented middleware (MOM) and compares implementations of MOM including JMS, MSMQ, and MQSeries. MOM facilitates asynchronous messaging between applications and components. JMS is part of Java and supports publish/subscribe and point-to-point messaging. MSMQ by Microsoft uses queues managed by queue managers. MQSeries by IBM refers to queues, queue managers, and channels as objects and shows how they interact in its architecture.
An introduction to IBM MessagSight, IBM's gateway to the Internet of Things and Mobile Messaging. As the Internet of Things and M2M become more pervasive are you ready to engage and get the benefits? Do you want to get the benefits of rapid, reliable messaging in the mobile world? This session will cover an introduction to MessageSight, latest updates and an introduction to MQTT.
Middleware and Middleware in distributed applicationRishikese MR
The seminar discuss about the common middleware concept and middleware in distributed applications .Also we discuss about 4 different types of middleware. MOM( Message oriented Middleware), ORB (object request broker), TP Monitors, Request procedure calls RPC.
The slide also gives the advantages and disadvantages of each.
Middleware is infrastructure that supports distributed component-based application development by enabling component communication and hiding distribution details. It provides mechanisms for network communication, coordination, reliability, scalability, and heterogeneity. Middleware categories include transactional, message-oriented, procedural, object-based, and component-based systems. Middleware elements are software components, containers, metadata, and integrated development environments. Distribution is hidden from application programmers via services for remote communication, directory services, security, transactions, and system management.
This document provides an overview of Service Oriented Architecture (SOA) and its enabling technologies. It discusses key SOA principles like loose coupling, standardized service contracts, and service reusability. The document also covers major SOA objectives, benefits, architecture layers, and the differences between SOA and web services. Web services are described as a standardized way for applications to communicate over the web using XML, SOAP, WSDL and other standards. The document contrasts SOA with public-subscribe and pull-based vs push-based messaging architectures.
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTIJNSA Journal
This document proposes a security framework for developing SOA (Service Oriented Architecture) applications on mobile devices. The framework aims to provide tools to securely develop and provide services in the mobile environment. It includes components for service description, communication interfaces, security features like cryptography and digital signatures. The framework also defines layers for networking, event handling, service provision, storage, security and management. It allows developers to easily create and securely provide services from mobile devices.
This document discusses a proposed middleware solution for providing location-based video on demand (VoD) services to heterogeneous portable devices. The solution involves developing a mobile agent system that uses proxies and quality adapters to dynamically deploy and transcode multimedia content based on a device's capabilities and location. It describes implementing a prototype movie information application using this middleware to allow portable devices to access location-dependent services like movie trailers. Key components of the middleware include shadow proxies that migrate with user profiles, a profile manager service, and a quality adapter that performs transcoding using Java Media Framework to fit the multimedia presentation to each device.
Cloud computing and Software defined networkingsaigandham1
This is my Graduate defense presentation. I have interest in various topics like cloud computing and software defined networking. This slides includes the research of various researchers on cloud computing and SDN, presented their work as my comprehensive exam.
DESIGN OF A WIRELESS COMMUNICATION SOFTWARE BETWEEN MULTIPLE CLIENTS AND A SI...edirin aphunu
Wireless communication cost reduction software provides a simple but sophisticated means of communications between individuals in an organization. Here we focus on both sides of the clients-server relationship using Java Programming Language. The client requests that some action be performed, and the server performs the action and responds to the clients. The clients will also be able to establish connection between themselves through the server itself. Java’s fundamental networking capabilities are declared by classes and interfaces of package java.net, through which Java offers stream-based communication that enable applications to view networking as streams of data.
The document provides information on client-server technology and architecture. It discusses:
1) Client-server computing partitions tasks between service providers (servers) and service requesters (clients), with clients initiating communication sessions with servers.
2) Common examples of client-server models include web browsing, email, and database access.
3) The OSI 7-layer model is described, with an overview of the functions of each layer from the physical layer to the session layer.
Project report on mesh hybrid topology network visionJignesh Ameta
This document provides a summary of mesh/hybrid network topologies. It discusses the key characteristics of mesh topologies, including that nodes are connected to multiple other nodes on the network. This creates redundant pathways between nodes and allows the network to dynamically route around failures. The document also notes that hybrid topologies combine elements of mesh and other topologies like bus or star, providing some of the redundancy of mesh with lower infrastructure costs. In summary, the document outlines mesh and hybrid network topologies and their advantages in providing multiple connections and redundancy between nodes.
Presentation from IBM InterConnect 2015:
Mobile devices are increasingly ubiquitous and are the preferred, or in some cases the only, way we wish to interact as a consumer or employee. We now live in a world where we are often connected to the Internet in an "always-on" culture where receiving information or events is both valuable and acceptable. IBM MessageSight helps connect mobile platforms and devices to existing systems of record to enhance the way we involve our customers for improved experience and hence better outcomes. In this session, we explore how to use MessageSight to integrate with systems of record exposed using both IBM Integration Bus and WebSphere Application Server to allow bi-directional, event-driven communication to the mobile application.
Narrative of digital signature technology and moving forwardConference Papers
1) The document discusses the development of a digital signature solution for web browsers over time, addressing changing technologies and standards.
2) Three key technology curves impacted the solution's design: the evolution of web extensions, compatibility across browsers, and digital certificate issuance standards.
3) The final solution released uses a client-server architecture with a web script to simplify digital signatures as a service, addressing challenges around cross-browser compatibility and changing extension technologies in browsers like Internet Explorer, Firefox and Chrome over the past 20 years.
The document provides an overview of cloud architecture, services, and storage. It defines cloud architecture as the components and relationships between databases, software, applications, and other resources leveraged to solve business problems. The main components are on-premise resources, cloud resources, software/services, and middleware. Three common cloud service models are also defined - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Amazon Simple Storage Service (S3) is discussed as a cloud storage service that stores unlimited data in buckets with fine-grained access controls and analytics capabilities.
This document provides an overview of client/server based computing and thin client computing. It discusses:
- The basics of client/server architecture and how it works to distribute processing between clients and servers.
- The benefits of server-based computing such as easier management, security, and lower costs compared to traditional desktop computing.
- What thin client computing is and how it stores applications and data on central servers rather than individual client devices, reducing costs and management needs.
- The key components of thin client solutions including terminal servers, thin clients, and communication protocols.
- How thin clients operate by connecting to terminal servers and only receiving screen updates rather than processing information locally.
AN ARCHITECTURAL FRAMEWORK FOR DELIVERING SIP-AS MULTIMEDIA SERVICES BASED ON...ijngnjournal
This document proposes and evaluates a new scalable service-oriented architecture for delivering SIP application services based on JADE/OSGi technology. It introduces an architectural framework that uses a JADE multi-agent system implemented on an OSGi platform to provide SIP application services as a service (SIP-AS) over an IMS core network. As a proof of concept, a televoting service was developed and tested on this architecture. Results showed that the televoting service scales well, enabling elasticity and dynamic load balancing of the architecture.
1. The Transport layer controls reliability and flow control for data transfer between networked devices.
2. It provides different classes of connection-oriented and connectionless transport protocols like TCP and UDP.
3. TCP ensures reliable, ordered delivery of data packets while UDP provides best-effort delivery without verification.
This document provides an introduction to cloud computing. It discusses what cloud computing is, its components including client computers, data centers, and distributed servers. It describes different cloud deployment models including public, private, and hybrid clouds. It also discusses different cloud service models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). The document then covers advantages of cloud computing and provides a brief history of cloud computing from its origins in the 1960s to modern cloud technologies.
This document provides an overview of resource management and security in cloud computing. It discusses inter-cloud resource management, resource provisioning models including advance, dynamic and user self-provisioning, and the global exchange of cloud resources. It also covers why cloud security governance is needed, what cloud security governance entails, common challenges around lack of management buy-in, controls, roles and metrics. Finally, it discusses key objectives for an effective cloud security governance model and what virtualized security is compared to traditional physical security.
This document contains a summary of skills and experience for Prathap Reddy. It outlines over 18 years of experience in software development and management roles. Key skills include strategic planning, project management, software development using technologies like Java, J2EE, J2ME, and experience managing international projects. Educational background includes a post graduate diploma in management and bachelor's degree. The document lists work experience at various companies and roles, technical skills, publications, projects contributed to, and a personnel profile.
Layer between OS and distributed applications,Hides complexity and heterogeneity of distributed system ,Bridges gap between low-level OS communications and programming language abstractions,Provides common programming abstraction and infrastructure for distributed applications.
Architecture of message oriented middlewareSajan Sahu
The document discusses message oriented middleware (MOM) and compares implementations of MOM including JMS, MSMQ, and MQSeries. MOM facilitates asynchronous messaging between applications and components. JMS is part of Java and supports publish/subscribe and point-to-point messaging. MSMQ by Microsoft uses queues managed by queue managers. MQSeries by IBM refers to queues, queue managers, and channels as objects and shows how they interact in its architecture.
An introduction to IBM MessagSight, IBM's gateway to the Internet of Things and Mobile Messaging. As the Internet of Things and M2M become more pervasive are you ready to engage and get the benefits? Do you want to get the benefits of rapid, reliable messaging in the mobile world? This session will cover an introduction to MessageSight, latest updates and an introduction to MQTT.
Middleware and Middleware in distributed applicationRishikese MR
The seminar discuss about the common middleware concept and middleware in distributed applications .Also we discuss about 4 different types of middleware. MOM( Message oriented Middleware), ORB (object request broker), TP Monitors, Request procedure calls RPC.
The slide also gives the advantages and disadvantages of each.
Middleware is infrastructure that supports distributed component-based application development by enabling component communication and hiding distribution details. It provides mechanisms for network communication, coordination, reliability, scalability, and heterogeneity. Middleware categories include transactional, message-oriented, procedural, object-based, and component-based systems. Middleware elements are software components, containers, metadata, and integrated development environments. Distribution is hidden from application programmers via services for remote communication, directory services, security, transactions, and system management.
- The document summarizes observations from Oracle Open World 2015 regarding Oracle's middleware products and cloud services.
- It notes that Oracle PaaS appears to be maturing quicker than other areas, and that Oracle is working to make hybrid cloud solutions seamless between Oracle cloud, other clouds, and on-premise.
- Key product announcements included updates to SOA, MFT, Java Cloud Service, and Coherence, as well as new capabilities for Integration Cloud Service and API management.
This document provides an overview of key topics in distributed software engineering. It discusses distributed systems issues, architectural patterns for distributed systems like client-server and peer-to-peer, and software as a service. Some important considerations for designing distributed systems include transparency, openness, scalability, security, and failure management. Middleware helps manage communication and interoperability between diverse components in a distributed system.
Middleware facilitates interactions between applications across different computing platforms by providing programming abstractions. Common types of middleware include RPC-based systems, transaction processing (TP) monitors, object brokers, and message-oriented middleware. RPC extends procedure calls to work remotely, while TP monitors add transaction management to distributed RPC calls. Object brokers like CORBA standardize object distribution, and message queues in message-oriented middleware enable asynchronous communication.
This document discusses distributed systems applications in real life, including three key areas: distributed rendering in computer graphics, peer-to-peer networks, and massively multiplayer online gaming. It describes how distributed rendering parallelizes graphics processing across multiple computers. Peer-to-peer networks are defined as decentralized networks where nodes act as both suppliers and consumers of resources. Examples of peer-to-peer applications include file sharing and content delivery networks. The document also outlines the challenges of designing multiplayer online games using a distributed architecture rather than a traditional client-server model.
This document is a presentation about distributed systems by Paulo Gandra de Sousa for their Master's degree program at DEI/ISEP. It introduces the topic of distributed systems, defining them and discussing their characterization including motivations, pros and cons, and issues. The presentation also acknowledges sources that parts of the content are drawn from.
The document defines middleware as software that allows processes running on different machines to interact. It discusses different types of middleware including transaction processing monitors, remote procedure calls, message oriented middleware, and object request brokers. Message oriented middleware is highlighted as a type that uses message passing to enable asynchronous and reliable communication between distributed applications.
Distributed systems allow independent computers to appear as a single coherent system by connecting them through a middleware layer. They provide advantages like increased reliability, scalability, and sharing of resources. Key goals of distributed systems include resource sharing, openness, transparency, and concurrency. Common types are distributed computing systems, distributed information systems, and distributed pervasive systems.
The document discusses the benefits of exercise for both physical and mental health. It notes that regular exercise can reduce the risk of diseases like heart disease and diabetes, improve mood, and reduce feelings of stress and anxiety. The document recommends that adults get at least 150 minutes of moderate exercise or 75 minutes of vigorous exercise per week to gain these benefits.
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
Digital Disruption is all around us. Mobile is overtaking desktop, Social Media is beating search, Messaging Application are challenging e-mails and everything around us is becoming connected. Mobile devices especially the smart phones are fueling the culture of “Anytime, Anywhere, And Anything’’. Smartphone is not only ubiquitous but also the primary computing device for many .These paradigm shifts are fueled by the explosive growth of smart phones which has touched a volume of 1.6 billion units globally. Smartphone growth has also triggered the explosive growth of mobile applications and cloud computing .Together, Mobile cloud computing is now a potential technology for mobile services .MCC overcomes obstacles related to battery life, storage capacity and low bandwidth. Current smart phones uses 2x2 MIMO which gives a speed 300Mbps, by using massive MIMO technology speed can be enhanced up to 1Gbps. This paper gives a BER (Bit Error Ratio) analysis to prove that by increasing number of transmitting and receiving antennas the performance can be enhanced.
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
The development of cloud computing and mobility,mobile cloud computing has emerged and
become a focus of research. By the means of on-demand self-service and extendibility, it can offer the
infrastructure, platform, and software services in a cloud to mobile users through the mobile network. Security
and privacy are the key issues for mobile cloud computing applications, and still face some enormous
challenges. In order to facilitate this emerging domain, we firstly in brief review the advantages and system
model of mobile cloud computing, and then pay attention to the security and privacy in the mobile cloud
computing. MCC provides a platform where mobile users make use of cloud services on mobile devices. The
use of MCC minimizes the performance, compatibility, and lack of resources issues in mobile computing
environment. By deeply analyzing the security and privacy issues from three aspects: mobile terminal, mobile
network and cloud, we give the current security and privacy approaches. The users of MCC are still below
expectations because of the associated risks in terms of security and privacy. These risks are playing important
role by preventing the organizations to adopt MCC environment. Significant amount of research is in progress in
order to reduce the security concerns but still a lot work has to be done to produce a security prone MCC
environment. This paper presents a comprehensive literature review of MCC and its security issues,challenges
and possible solutions for the security issues.
1. MOBILE CLOUD COMPUTING AS A FUTURE OF MOBILE MULTIMEDIA DATABASE.pdfKarla Long
Mobile cloud computing is proposed as a future solution for mobile multimedia databases. It would address current issues by moving data storage and processing to the cloud. This would reduce hardware requirements, improve scalability, and allow access anywhere through the cloud. However, challenges remain around network availability, environment factors like delays, and ensuring energy efficiency. The cloud model could provide multimedia content and applications to mobile users without large local infrastructure investments.
This document discusses mobile cloud computing (MCC), which combines mobile networks and cloud computing. MCC allows mobile users to utilize cloud computing services and resources through mobile devices without requiring powerful local hardware. The document outlines the key components of MCC architecture, including mobile users, mobile operators, internet service providers, and cloud service providers. It also discusses common MCC applications like cloud email, mobile commerce, cloud music, and mobile gaming. The document concludes with characteristics of MCC like flexibility, scalability, broad network access, location independence, and reliability.
The expansion of the Internet of Things IoT implies progressively dynamic client gadgets on the Internet. IoT devices can be ordinary articles from vehicles, advanced mobile phones to wearable sensors. Huge measures of information are produced by IoT devices through the assortment and transmission of information required for the yield of valuable results and in this way, an ef cient approach to work is significant. In the public eye today, mobile communication and mobile computing play a critical job in each part of our lives, both individual and open correspondence. By utilizing Cloud Computing with IoT, data computations are situated outside the devices henceforth diminishing the strain on the devices themselves. IoT devices are additionally frequently portable and with versatility comes the need to have wireless connections to the cloud. Therefore, Mobile Cloud Computing MCC gets appropriate. However, the development in mobile computing use can be improved by coordinating portable figuring into distributed computing. This will bring about developing another model called Mobile Cloud Computing MCC that has as of late pulled in a lot of consideration in the academic sector. This paper investigates its features, advantages, applications, and difficulties of Mobile Cloud Computing. Research endeavours towards the execution of Mobile Computing are additionally talked about giving an understanding of the fate of the innovation. Sujay Sudhakar Parkhe "Smart Computing: Mobile + Cloud" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30340.pdf Paper Url :https://www.ijtsrd.com/computer-science/other/30340/smart-computing-mobile--cloud/sujay-sudhakar-parkhe
Fog computing scheduling algorithm for smart city IJECEIAES
With the advent of the number of smart devices across the globe, increasing the number of users using the Internet. The main aim of the fog computing (FC) paradigm is to connect huge number of smart objects (billions of objects) that can make a bright future for smart cities. Due to the large deployments of smart devices, devices are expected to generate huge amounts of data and forward the data through the Internet. FC also refers to an edge computing framework that mitigates the issue by applying the process of knowledge discovery using a data analysis approach to the edges. Thus, the FC approaches can work together with the internet of things (IoT) world, which can build a sustainable infrastructure for smart cities. In this paper, we propose a scheduling algorithm namely the weighted round-robin (WRR) scheduling algorithm to execute the task from one fog node (FN) to another fog node to the cloud. Firstly, a fog simulator is used with the emergent concept of FC to design IoT infrastructure for smart cities. Then, spanning-tree routing (STP) protocol is used for data collection and routing. Further, 5G networks are proposed to establish fast transmission and communication between users. Finally, the performance of our proposed system is evaluated in terms of response time, latency, and amount of data used.
This document discusses fog computing as an extension of cloud computing that moves some computing and storage to the edge of the network. It begins with an abstract that outlines fog computing and its advantages over cloud, such as lower latency. The introduction discusses Cisco's vision for fog computing and bringing applications to billions of connected devices at the network edge. It then discusses how fog computing addresses the issues of slow response times and scalability that cloud computing faces for machine-to-machine communication. The document provides examples of how fog computing could be applied in smart traffic lights, wireless sensor networks, and the internet of things.
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHijitcs
In the past few years it was clear that mobile cloud computing was established via integrating both mobile computing and cloud computing to be add in both storage space and processing speed. Integrating
healthcare applications and services is one of the vast data approaches that can be adapted to mobile
cloud computing. This work proposes a framework of a global healthcare computing based combining both
mobile computing and cloud computing. This approach leads to integrate all of the required services and overcoming the barriers through facilitating both privacy and security.
This document summarizes a research paper on mobile cloud computing. It begins with definitions of mobile cloud computing, discussing how it combines mobile computing and cloud computing. It then describes the general architecture of mobile cloud computing and some of its key advantages, such as extending battery life, improving data storage and processing power, and improving reliability. Several applications of mobile cloud computing are discussed, including mobile commerce, mobile learning, and mobile healthcare. Potential limitations around cloud service costs, mobile network costs, availability, and security are also outlined. The document concludes by discussing future research directions, such as overcoming low bandwidth issues through 4G networks and femtocells.
This document discusses trends in fog computing. It explores how fog computing addresses limitations of cloud computing for IoT applications by processing data closer to the edge. Machine learning is being integrated into fog computing to help manage resources and address challenges. Deep learning integrated with fog computing can improve security by detecting cyberattacks. Fog computing provides benefits over cloud for applications like storage as a service and building smart cities due to lower latency and reduced network usage. The document examines various studies on fog computing architectures, applications, and emerging technologies.
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdfKarla Long
This document discusses mobile cloud computing (MCC), including its concept, applications, and challenges. MCC integrates cloud computing into mobile environments to overcome obstacles related to performance, environment, and security in mobile computing. It allows resources to be virtualized and assigned across distributed computers rather than local devices. Popular MCC applications include Gmail, Google Maps, and apps on Android platforms. While MCC provides benefits like reducing mobile device costs, challenges remain regarding performance, security, control, bandwidth costs, and reliability when data and computing occur externally in the cloud.
The role of ICTs for environmental observation. Collecting and helping to interpret and model the environment and more specifically the climate are key to climate action. Wireless sensor networks, the IoT, embedded microprocessors, remote sensing and earth observation systems, etc. are described. Today, they continue to be very important and their role and use os growing.
Slide presentations developed to demonstrate how Information and Communication Technologies (ICTs) be used to address climate change, and why ICTs are a crucial part of the solution – i.e. in promoting efficiency, Green Growth & sustainable development, in dealing with climate change and for climate and environmental action. These slide presentations were delivered in February 2011 in Seongnam, near Seoul in Korea.
These presentations were developed and delivered over 2.5 days on the occasion of a Regional Training of Trainers Workshop for upcoming Academy modules on ICT for Disaster Risk Management and Climate Change Abatement. These modules were developed as part of the Academy of ICT Essentials for Government leaders developed by the United Nations (UN) Asia Pacific Centre for ICT Training (APCICT), based in Songdo City, in the Republic of South Korea.
These presentations were developed in 2011, and are somewhat out of date, but most of the principles still apply. Module 10, which has been published, does not include much of the information outlined in these presentations, which are fairly technical. They were developed to address a significant gap in understanding of the technical basis of using ICTs for climate action and because there is a clear bias in development circles against the importance of dealing with climate change mitigation in developing countries. These presentations are an attempt to redress this lack and are published here with this purpose in mind.
The author, Richard Labelle, is presently working on updating these presentations to further highlight the importance of addressing climate change and the important role that technology including ICTs, play in this effort.
Abstract: Cloud computing is a latest trend and a hot topic in today global world. In which sources are provided to concern as local user on an on demand basically as usual it provides the path or means of internet. Mobile cloud computing is simply cloud computing throughout that at all smallest variety of devices could be involved as wireless equipment this paper concern multiple procedure and procedure for the mobile cloud computing . It developed every General mobile cloud computing solution and application specific solution. It also concern about the cloud computing in which mobile phones are used to browse the web, write e-mails, videos etc. Mobile phones are become the universal interface online services and cloud computing application general run local on mobile phones.
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...IRJET Journal
This document discusses mobile cloud computing (MCC), including its architecture, challenges, trends, and applications. MCC combines mobile computing, cloud computing, and mobile internet to allow rich applications and data storage/processing to occur in the cloud rather than on the mobile device. This helps overcome limitations of mobile devices like limited battery, storage, and bandwidth. The document outlines the background of cloud and mobile computing, MCC models and architecture, challenges like security and standard interfaces, benefits like extending battery life, and trends like increased business usage and focus on security. Popular applications of MCC include mobile commerce, gaming, and healthcare.
Secured Communication Model for Mobile Cloud Computingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
The document discusses the European Union's Digital Agenda and focuses on cloud computing and green ICT. It defines cloud computing, outlines the main challenges around interoperability, privacy, security and governance. It discusses the EU cloud strategy of developing the legal framework, research and standardization. Funding opportunities for cloud computing through the CIP Work Programme are also mentioned. The document argues that cloud computing can significantly reduce carbon emissions and help make ICT more environmentally friendly.
Fog computing is a distributed computing paradigm that processes data closer to IoT devices rather than sending all data to centralized cloud servers. This helps address issues like high latency, bandwidth constraints, and scalability challenges. Fog computing deploys compute and storage resources between end devices and cloud data centers. It can perform tasks like data aggregation, analytics, and decision making near devices to enable low-latency applications. Coordinating fog and cloud resources requires addressing challenges regarding resource management, load balancing, APIs, security, and fault tolerance.
Module 10 - Section 2: ICTs, the environment and climate change & Section 3: ...Richard Labelle
Innovation in ICTs can have a significant impact in mitigating the impact of climate change and have an important role to play in facilitating and managing adaptation to climate change.
Slide presentations developed to demonstrate how Information and Communication Technologies (ICTs) be used to address climate change, and why ICTs are a crucial part of the solution – i.e. in promoting efficiency, Green Growth & sustainable development, in dealing with climate change and for climate and environmental action. These slide presentations were delivered in February 2011 in Seongnam, near Seoul in Korea.
These presentations were developed and delivered over 2.5 days on the occasion of a Regional Training of Trainers Workshop for upcoming Academy modules on ICT for Disaster Risk Management and Climate Change Abatement. These modules were developed as part of the Academy of ICT Essentials for Government leaders developed by the United Nations (UN) Asia Pacific Centre for ICT Training (APCICT), based in Songdo City, in the Republic of South Korea.
These presentations were developed in 2011, and are somewhat out of date, but most of the principles still apply. Module 10, which has been published, does not include much of the information outlined in these presentations, which are fairly technical. They were developed to address a significant gap in understanding of the technical basis of using ICTs for climate action and because there is a clear bias in development circles against the importance of dealing with climate change mitigation in developing countries. These presentations are an attempt to redress this lack and are published here with this purpose in mind.
The author, Richard Labelle, is presently working on updating these presentations to further highlight the importance of addressing climate change and the important role that technology including ICTs, play in this effort.
Similar to Distributed systems and middleware (20)
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
4. Outline
Mobile Cloud Computing
Introduction
Mobile Devices
Mobile Networks
Distributed Application Processing
Data Center Network Architectures
Claudio Fiandrino | Mobile Cloud Computing - Introduction 2 of 37
5. Mobile Cloud Computing
Mobile Cloud Computing vs. Mobile Computing
In Mobile Cloud Computing the devices run cloud-based apps
In Mobile Computing the devices run native apps
In Mobile Cloud Computing users have to access remotely stored
applications and their associated data over the Internet
Claudio Fiandrino | Mobile Cloud Computing - Introduction 3 of 37
6. Mobile Cloud Computing
Mobile Cloud Computing vs. Mobile Computing
In Mobile Cloud Computing the devices run cloud-based apps
In Mobile Computing the devices run native apps
In Mobile Cloud Computing users have to access remotely stored
applications and their associated data over the Internet
Mobile Cloud Computing: Common Understanding
Access to cloud computing services through mobile devices
Claudio Fiandrino | Mobile Cloud Computing - Introduction 3 of 37
7. Mobile Cloud Computing: Definition
Definition
An integration of cloud computing technology with mobile devices to
make the mobile devices resource-full in terms of computational power,
memory, storage, energy, and context awareness.
[1] Khan, A.R.; Othman, M.; Madani, S.A.; Khan, S.U., “A Survey of Mobile Cloud Computing Application
Models," IEEE Communications Surveys & Tutorials, vol.16, no.1, pp.393,413, First Quarter 2014
doi: 10.1109/SURV.2013.062613.00160
Claudio Fiandrino | Mobile Cloud Computing - Introduction 4 of 37
8. Mobile Cloud Computing: Definition (II)
Definition (II)
Mobile cloud computing is a model for transparent elastic augmentation
of mobile device capabilities via ubiquitous wireless access to cloud
storage and computing resource, with context-aware dynamic adjusting
of offloading in respect to change in operating conditions, while
preserving available sensing and interactivity capabilities of mobile
devices.
[1] Dejan Kovachev, Yiwei Cao, Ralf Klamma: Mobile Cloud Computing: A Comparison of Application
Models. CoRR, abs/1107.4940, 2011.
(http://arxiv.org/abs/1107.4940v1)
Claudio Fiandrino | Mobile Cloud Computing - Introduction 5 of 37
11. Outline
Mobile Cloud Computing
Introduction
Mobile Devices
Mobile Networks
Distributed Application Processing
Data Center Network Architectures
Claudio Fiandrino | Mobile Cloud Computing - Mobile Devices 7 of 37
12. Type of Devices
Not only smartphones and tablets
Claudio Fiandrino | Mobile Cloud Computing - Mobile Devices 8 of 37
13. Issues of mobile devices
Resource scarceness
Battery constrained
Low connectivity
Claudio Fiandrino | Mobile Cloud Computing - Mobile Devices 9 of 37
14. Solution
Offloading to the Cloud
Computation
Data
Outcome: Application partitioning
Cope with mobile device issues
Gather more data
Use idle processing power
Claudio Fiandrino | Mobile Cloud Computing - Mobile Devices 10 of 37
15. Outline
Mobile Cloud Computing
Introduction
Mobile Devices
Mobile Networks
Distributed Application Processing
Data Center Network Architectures
Claudio Fiandrino | Mobile Cloud Computing - Mobile Networks 10 of 37
16. Technologies
Cellular (3G/4G)
WiFi
Bluetooth
Comparison
TECHNOLOGY MAX DATA RATE ENERGY RANGE SPECTRUM
Cellular Up to 300 Mb/s1 High More than 10 km (1 km)2 Licensed
WiFi (802.11n) Up to 100 Mb/s Medium Up to 250 m (120 m) Unlicensed
Bluetooth Up to 3 Mb/s Low Up to 100 m (20-30 m) Unlicensed
1. Considering 4x4 MIMO, 20 MHz channel
2. Macro cell radius and typical urban cell radius
Claudio Fiandrino | Mobile Cloud Computing - Mobile Networks 11 of 37
18. Health State of the Global Mobile Traffic
4.4 billion people will use mobile cloud applications by 2017
Mobile data traffic will reach 15 EB (1018
) per month in 2018
22 million wearable devices generated 1.7 PB (1015
) per month traffic
in 2013
Claudio Fiandrino | Mobile Cloud Computing - Mobile Networks 13 of 37
19. What about Energy?
The importance of the technologies
“Our calculations show that, in 2015, the wireless networks we use to
access cloud services will command around 90% of the energy needed
to power the entire wireless cloud services ecosystem. By comparison,
data centres will account for only 9% or less. Industry needs to focus on
the real issues with wireless network technologies if it wants to solve this
problem.”
CEET (Centre for Energy-Efficient Telecommunications), Massive energy cost hidden in wireless cloud
boom, 2013
(http://www.ceet.unimelb.edu.au/news/media/2013-04-09.html)
Claudio Fiandrino | Mobile Cloud Computing - Mobile Networks 14 of 37
20. What about Energy?
Cloud Wireless Access Burns More Energy Than Data Centres – Report
(http://www.techweekeurope.co.uk/workspace/cloud-wireless-energy-use-data-centre-113227)
Claudio Fiandrino | Mobile Cloud Computing - Mobile Networks 14 of 37
21. What about Energy? (II)
Interesting Statistics
One Google search is equivalent to about 0.2 grams of CO2
(http://googleblog.blogspot.com/2009/01/powering-google-search.html)
Raffi (Twitter API team) says: “One tweet consumes around 100 J”
http://goo.gl/uMnV0f
http://www.slideshare.net/raffikrikorian/energy-tweet
Claudio Fiandrino | Mobile Cloud Computing - Mobile Networks 15 of 37
22. Diagnosis
Networking can not be neglected
Communications may impact dramatically on performance
Carefully select proper technologies
Claudio Fiandrino | Mobile Cloud Computing - Mobile Networks 16 of 37
23. Outline
Mobile Cloud Computing
Introduction
Mobile Devices
Mobile Networks
Distributed Application Processing
Data Center Network Architectures
Claudio Fiandrino | Mobile Cloud Computing - Distributed Application Processing 16 of 37
25. High level list of applications
Commerce
Healthcare
Gaming
Searching (Keyword, Voice, Image, Location, Tag)
Claudio Fiandrino | Mobile Cloud Computing - Distributed Application Processing 18 of 37
26. Application Partitioning Classification
Static Partitioning
A set of task is always run remotely
Dynamic Partitioning
Tasks are run where it is most convenient
Claudio Fiandrino | Mobile Cloud Computing - Distributed Application Processing 19 of 37
29. A practical example: Face Recognition
Flow
Detection on picture
Determine match on database
Partitioning
1. Local detection/remote recognition
2. Remote detection/remote recognition
Beware: what is remote?
Claudio Fiandrino | Mobile Cloud Computing - Distributed Application Processing 21 of 37
30. List of Approaches
CloudLets
CloneCloud
MAUI
MobiCloud
Odessa
Cuckoo
Hyrax
µCloud
ThinkAir
eXCloud
[1] Khan, A.R.; Othman, M.; Madani, S.A.; Khan, S.U., “A Survey of Mobile Cloud Computing Application
Models," IEEE Communications Surveys & Tutorials, vol.16, no.1, pp.393,413, First Quarter 2014
doi: 10.1109/SURV.2013.062613.00160
[2] Shiraz, M.; Gani, A.; Khokhar, R.H.; Buyya, R., “A Review on Distributed Application Processing
Frameworks in Smart Mobile Devices for Mobile Cloud Computing,” IEEE Communications Surveys &
Tutorials, vol.15, no.3, pp.1294,1313, Third Quarter 2013
doi: 10.1109/SURV.2012.111412.00045
Claudio Fiandrino | Mobile Cloud Computing - Distributed Application Processing 22 of 37
31. Take-home messages
Mobile Cloud Computing
Augmenting devices capabilities
Heterogeneity (applications/technologies/user behaviour)
Application Partitioning
To keep in mind
Not simply “Access to cloud computing services through mobile devices.”
Claudio Fiandrino | Mobile Cloud Computing - Distributed Application Processing 23 of 37
32. Outline
Mobile Cloud Computing
Data Center Network Architectures
Definition and Classification
Architectures Analysis
Energy Consumption and Communication Latency Evaluation
Claudio Fiandrino | Data Center Network Architectures - Definition and Classification 23 of 37
33. Data Center Definitions
Data Center Infrastructure
The data center is home to the computational power, storage,
management and dissemination of data and information necessary to a
particular body of knowledge or pertaining to a particular business.
Data Center Network Architecture
The data center network architecture is the set of network nodes and
links that characterize the interconnectivity among the computing
servers and to the external world.
Claudio Fiandrino | Data Center Network Architectures - Definition and Classification 24 of 37
35. A brief list of Architectures
Fat-Tree
“Al-Fares”
Portland
Hedera
Clos (VL2)
Hypercube
BCube
DCell
DPillar
FiConn
FlatNet
Helios
C-Through
Petabit
GreenCloud (Not the Simulator)
[1] Ali Hammadi, Lotfi Mhamdi, A survey on architectures and energy efficiency in Data Center
Networks, Computer Communications, Volume 40, 1 March 2014, Pages 1-21, ISSN 0140-3664,
http://dx.doi.org/10.1016/j.comcom.2013.11.005.
(http://www.sciencedirect.com/science/article/pii/S0140366413002727)
[2] Bari, M.F.; Boutaba, R.; Esteves, R.; Granville, L.Z.; Podlesny, M.; Rabbani, M.G.; Qi Zhang; Zhani,
M.F., “Data Center Network Virtualization: A Survey," IEEE Communications Surveys & Tutorials, vol.15,
no.2, pp.909,928, Second Quarter 2013 doi: 10.1109/SURV.2012.090512.00043
Claudio Fiandrino | Data Center Network Architectures - Definition and Classification 26 of 37
36. Classifications
Electronic/Optical
Which technology is used in the forwarding?
Switch/Server Centric
Who performs the forwarding?
Ali Hammadi, Lotfi Mhamdi, A survey on architectures and energy efficiency in Data Center Net-
works, Computer Communications, Volume 40, 1 March 2014, Pages 1-21, ISSN 0140-3664,
http://dx.doi.org/10.1016/j.comcom.2013.11.005.
(http://www.sciencedirect.com/science/article/pii/S0140366413002727)
Claudio Fiandrino | Data Center Network Architectures - Definition and Classification 27 of 37
37. Electronic vs Optical
Fully electronic
Fully optical
Hybrid
Claudio Fiandrino | Data Center Network Architectures - Definition and Classification 28 of 37
38. Swich Centric vs Server Centric
Switch Centric: switches are the key components in forwarding
Switches are complex
Servers no forwarding functionalities
Bandwidth oversubscription
Server Centric: servers are the key components in forwarding
Switches are very simple
Servers with forwarding functionalities
No bandwidth oversubscription
Trade off
Servers devoted to computational purposes only
Exploiting full link capacity
Claudio Fiandrino | Data Center Network Architectures - Definition and Classification 29 of 37
39. Outline
Mobile Cloud Computing
Data Center Network Architectures
Definition and Classification
Architectures Analysis
Energy Consumption and Communication Latency Evaluation
Claudio Fiandrino | Data Center Network Architectures - Architectures Analysis 29 of 37
41. BCube
Main parameters:
n: number of ports per switch
k + 1: number of ports per server
Number of servers: nk+1
Number of switches: (k + 1) · nk
Example with n = 4 and k = 1
Internet
Computing Servers
Commodity Switches
Level 0
Commodity Switches
Level k + 1
Load Balancers
Gateway Router
Claudio Fiandrino | Data Center Network Architectures - Architectures Analysis 31 of 37
42. DCell
Main parameters:
n: number of servers per DCell0
k: number of DCell levels, server
degree of connectivity (k + 1)
Number of servers:
tj+1 = tj · (tj + 1), t0 = n
Number of switches (#DCell0):
gj = tj−1 + 1 or #servers/n
Example with n = 3 and k = 1
Internet
Computing Servers
Commodity Switches
Load Balancers
Gateway Router
Claudio Fiandrino | Data Center Network Architectures - Architectures Analysis 32 of 37
43. Outline
Mobile Cloud Computing
Data Center Network Architectures
Definition and Classification
Architectures Analysis
Energy Consumption and Communication Latency Evaluation
Claudio Fiandrino | Data Center Network Architectures - Energy Consumption and Communication Latency Evaluation 32 of 37
44. Evaluation Criteria: Computing Servers
Power consumption (DVFS)
P(l) = Pidle +
Ppeak − Pidle
2
· (1 + l − e−( l
τ ))
l server load
τ in the range [0.5, 0.8]
Key idea:
Load= 0
Servers
Access Layer
Aggregation Layer
Core Layer
→ →
Increasing Load
→ →
Load= 1
Idle link; Active link; Idle device; Active device;
Number of computing servers: 4096
Idle and peak power from Dell PowerEdge R720, Huawei Tecal
RH2288H V2 and IBM System x3500 M4
Claudio Fiandrino | Data Center Network Architectures - Energy Consumption and Communication Latency Evaluation 33 of 37
45. Evaluation Criteria: Network
Three-tier:
128 racks
16 aggregation switches
8 core switches
BCube:
n = 8, k = 3
2048 switches
DCell:
n = 8
2 < k < 3
Other parameters:
1 Gbits link (Three-Tier, BCube and
DCell)
10 Gbits link (Three-Tier)
Test packets of 40 B and 1500 B
Methodology
One way delay
Transmission and Propagation
Claudio Fiandrino | Data Center Network Architectures - Energy Consumption and Communication Latency Evaluation 34 of 37
46. Energy: Results
0 0.2 0.4 0.6 0.8 1
0
1
2
3
4
·105
Load (l)
PowerConsumption(W)
Dcell Three-tier BCube
Claudio Fiandrino | Data Center Network Architectures - Energy Consumption and Communication Latency Evaluation 35 of 37
47. Communication: Results
PERFORMANCE INDEX
ARCHITECTURES
Three-tier BCube DCell
Latency (40 B) 1.98 µs 3.93 µs 4.73 µs
Latency (1500 B) 28.34 µs 73.72 µs 93.92 µs
Hop distance 5.78 7.00 8.94
Server Degree Connectivity 1 4 2.79
Beware: we counted as 2 the number of links between any pair of servers within a DCell0 and in BCube.
Claudio Fiandrino | Data Center Network Architectures - Energy Consumption and Communication Latency Evaluation 36 of 37
48. Take-home messages
Data Center Network Architectures
Different Architectures have:
Different impact on energy costs
Different impact on communication processes
Claudio Fiandrino | Data Center Network Architectures - Energy Consumption and Communication Latency Evaluation 37 of 37