- The document discusses mobile cloud computing and outlines key concepts including cloud computing definitions, characteristics, service and deployment models, and applications of mobile cloud computing.
- It defines cloud computing as a model that enables ubiquitous access to shared pools of configurable computing resources via a network.
- Mobile cloud computing aims to extend cloud computing capabilities to mobile devices by offloading computing tasks from the devices to more powerful remote servers.
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
Achieving Scalability and speed with IBM Solutions - IaaS SoftlayerAna Alves Sequeira
En esta presentacion podreis ver varios ejemplo de empresas que se han movido al cloud con IBM Softlayer.
Los beneficios del mismo para mas escalabilidad y velocidad, con IBM IaaS - SoftLayer.
This PPT covers the following topics...
Definition’s
CC in a Nutshell
Roots of CC
Layers and Types of Clouds
Desired Features of Cloud
Cloud Infrastructure Management
Infrastructure as a Service Providers
Platform as a Service Providers
Challenge and Risks
Datacenter and cloud architectures continue to evolve to address the needs of large-scale multi-tenant data centers and clouds. These needs are centered around dimensions such as scalability in computing, storage, and bandwidth, scalability in network services, efficiency in resource utilization, agility in service creation, cost efficiency, service reliability, and security. Data centers are interconnected across the wide area network via routing and transport technologies to provide a pool of resources, known as the cloud. High-speed optical interfaces and dense wavelength-division multiplexing optical transport are used to provide for high-capacity transport intra- and inter-datacenter. This presentation will provide some brief descriptions on the working principles of Cloud & Data Center Networks.
Slides for a discussion about Cloud Computing organised by the Isle of Man Branch of the BCS in September 2012. These slides introduce Cloud Computing, delve into some detail on Mcirosoft Azue and Amazon Web Services and pose some questions as to suitability, consideration and risks to be discussed. This talk was presented by Arron Clague from Synapse Consulting and Owen Cutajar from Intelligence Ltd
Walk through this hands-on workshop to expand your AWS technical skills. Gain credibility for your experience working with AWS by building proficiency with services and solutions in the areas of AWS Architecture Fundamentals.
Achieving Scalability and speed with IBM Solutions - IaaS SoftlayerAna Alves Sequeira
En esta presentacion podreis ver varios ejemplo de empresas que se han movido al cloud con IBM Softlayer.
Los beneficios del mismo para mas escalabilidad y velocidad, con IBM IaaS - SoftLayer.
This PPT covers the following topics...
Definition’s
CC in a Nutshell
Roots of CC
Layers and Types of Clouds
Desired Features of Cloud
Cloud Infrastructure Management
Infrastructure as a Service Providers
Platform as a Service Providers
Challenge and Risks
Datacenter and cloud architectures continue to evolve to address the needs of large-scale multi-tenant data centers and clouds. These needs are centered around dimensions such as scalability in computing, storage, and bandwidth, scalability in network services, efficiency in resource utilization, agility in service creation, cost efficiency, service reliability, and security. Data centers are interconnected across the wide area network via routing and transport technologies to provide a pool of resources, known as the cloud. High-speed optical interfaces and dense wavelength-division multiplexing optical transport are used to provide for high-capacity transport intra- and inter-datacenter. This presentation will provide some brief descriptions on the working principles of Cloud & Data Center Networks.
Slides for a discussion about Cloud Computing organised by the Isle of Man Branch of the BCS in September 2012. These slides introduce Cloud Computing, delve into some detail on Mcirosoft Azue and Amazon Web Services and pose some questions as to suitability, consideration and risks to be discussed. This talk was presented by Arron Clague from Synapse Consulting and Owen Cutajar from Intelligence Ltd
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
19. • الحواف تسمى فإنها ، األخرى للعقد صادرة حافة من أكثر على تحتوي العقدة كانت إذا
المتزامنة
( Fork Concept أوAND- Parallel):
si sj sk
sl
متزامنة حواف متسلسلة حواف
p2
sm
• If a node has two outgoing edges with weight then it is called
conditional edges (or XOR-Parallel).
p1
si sj sk
sl
شرطية حواف متسلسلة حواف
p1+p2=1; 0<p1,p2<1 19
نمذجة
السحابية الحوسبة
:
وظيفي عرض
(
تابع
)
20. • The loop node is considered as:
• The loop in this graph could be avoided as:
While/Loop
sj
sj
• It could be easily converted to sequence edges with
the upper bound loop limit.
While/Loop
sj sj sj sj
Loop Bound=4
sj si sj
sj si
Cloud Computing Modeling: Functional
View (cont.)
20
21. • Critical Service: The services in the plan with the
highest number of inputs and outputs edges.
21
Cloud Computing Modeling: Functional
View (cont.)
22. Cloud Computing Modeling: Qos View
• The cloud quality of service is defined as:
• Some important Single Cloud Qos are:
Sp o o l
Q o s : C p o o l (q1 , q 2 ,...,qn )
when a requestis sent and theresults are received of
s j on cloud ci .
Level
For services j wecould also define servicelevel or s j .
Priceof using services j on cloud ci .
Delay in secondsbetween the moment
qprice (ci , s j )
qduration (ci , s j )
22
23. (qprice ,qduration ,qreliability ,qCapacity , qavailability , qreputation )
Qos:Cpool
qreputation (ci ,s j )
qavailability (ci ,s j )
The probability that therequest
is correctlyansweredwhithin
specific time.
The maximum of clients that s j
on ci could recieve.
The probability that teservice
is accessiblewithin specific time.
SocialRank of theservice
like Amazon[0,5]
qCapacity (ci ,s j )
qreliability (ci ,s j )
S pool
Cloud Computing Modeling: Qos View (cont.)
23
24. Job Qos (end-to-end Qos)
• The Qos is also defined for work flow.
The avaeragereputation of all services
0 else1.
Sum of thepricesin executable job.
(wf )
24
(wf )
Qos
Qos
Qos (wf )
reputation
in executable job.
services zi 0 else1.
N
i 1
availability
services zi
reliability
Qos (wf )
price
Qos (wf )
duration
eqavailabiltiy (ci ,s j ) zi
for non - critical
The longest path in executable job.
N
eqreliabiliyt (ci ,s j ) zi
for non - critical
i 1
25. • The typical optimization problem that happens in
this area is to find appropriate cloud compositions
that satisfied the required constraints and maximize
or minimizes the utility function.
• The following is the general architecture for cloud
computing system.
Task Query+ Desired Qos
Task Query to Job (DAG)
Cloud Composition to Satisfy Qos Model
25
26. Subject to:
26
max )
)
i
wi 1
1
The selectionis over cloudsandservicespaces.
Qosreputation(wf )
5
Qosavailability(wf )
creliability
cavailability
creputation
Qosreliability(wf )
Qosduration(wf )
c price
cduration
Qos price (wf )
Qosreputation
( wf )
Qosreputation
( wf ) creputation
) w5 (
Qosavailabiltiy( wf )
Qosavailabiltiy( wf ) cavailabiltiy
w4 (
Qosreliabiliyt( wf )
Qosreliabiliyt( wf ) creliabiliyt
) w3 (
cduration
cduration Qosduration( wf )
) w2 (
cprice
cprice Qos
price( wf )
w1 (
one possible
optimization problem
when the target function
is linear.
28. “The most profound technologies are
those that disappear. They weave
themselves into the fabric of every
day life until they are
indistinguishable from it.”
28
“Mark Weiser”, Xerox Scientist
29. Motivation
29
• Pervasive computing names the third wave in
computing, just now beginning.
• First were mainframes, each shared by lots of people.
• Now we are in the personal computing era, person
and machine staring uneasily at each other across the
desktop.
• Next comes Pervasive computing, or the age of calm
technology, when technology recedes into the
background of our lives.
• Alan Kay of Apple calls this "Third Paradigm"
31. • Mobile Cloud computing technology promises the
realization of pervasive computing era.
• Many different application could be considered in this
area, such as M-Commerce, M-learning, M-
entertainment.
• In this work we consider the M-Multimedia
application in mobile computing environment.
• It is called multimedia streaming in mobile
computing area.
31
Motivation (cont.)
33. • In the next section we are trying to review some
important works done related to mobile cloud
computing.
• Based on the previous work we are going to propose
an architecture for mobile cloud computing for
multimedia streaming application.
33
Motivation (cont.)
35. Cloudlet
• It has been shown that one hop connection from
mobile device to internet is not efficient.
• Human are sensitive to the current delay in clouds.
• It seems that latency is unlikely to be improved.
• Considering different layer for software such as security
and firewall it is unlikely that latency improves
(although increase in bandwidth).
• This motivate us to use cloudlet between mobile
devices and cloud pools (Infrastructure).
• A cloudlet (I refer it as the micro edition of 35
36. Cloudlets are as the infrastructure for mobile cloud computing. From: [Satyanarayanan_2009]
36
The prototype based on this systems is implemented in
CMU and called Kimberley [Satyanarayanan_2009] .
Cloudlet (cont.)
37. MapGrid (Mobile Application on Grid)
37
• Base on the work [Huang_2002] , [Huang_2005] ,
[Huang_2007] which is middleware approach.
• It uses Grid as the cache proxy for mobile applications.
• Resources on grid (storage and computation) are
intermittently available.
• MapGrid uses the interval tree data structure for storing
the information about available resources on grid.
• Mobility pattern has been used to optimal data
replication policy in MapGrid.
• The proposed middleware does:
39. MapGrid Definitions and Notations
Availability( j,t)
Gf (R,t)
LFj (R,t) Dist( j, R)
j
• Request: R(VID, itinerary) where VID is the video
and itinerary is mobility information.
• Grid Loading Factor:
LFj (R,t) max{CPUa , MEMa , NBWa , DBWa}
whereXa is theratio of requestedresource
to available resourceon grid j. 0 LFj 1
If grid j is available at
• Grid Factor: time t equal 1 else 0.
Distance of grid J from
request R.
39
40. • Segment size: Sd the unit size of data.
• The MapGrid algorithm has the following tree steps:
• PartitionServicePeriod():
• partition the request according to the segment size or
other fast startup policies (to start the service as fast as
possible).
• VolunteerGridAllocation():
• Maps chunks to the specific grid according to LF and
proximity. The biggest Grid factor could be selected. The
start point could be used to initialized the algorithm.
• MobilityBasedRescheduling(): 40
MapGrid Definitions and Notations (cont.)
41. MapGrid Optimization
• With the knowledge of the mobility pattern, we could
optimize the first two function, service period and
grid resource allocation.
itinenary [(Time1,Cell1 ),..., (Timen ,Celln )]
• Service Period Optimization:
• Policy 1: MajoritySpreadOver attempts to minimize
number of Grid switches.
• Assign the chunks of data according to the duration that
mobile client spends in each cell.
• Weakness: Delay in startup.
• Policy 2: DistancePartition partition the service time
41
42. • Volunteer Service Optimization:
• With knowing the mobility pattern and the time
duration that mobile client spend in each cell our task
is to find grid resources to maximize the following
utility function. n
i i i
i 1
whereDi is theduration of time the
mobile client spendsin celli .(ai ,bi )
is cellcenterand (x,y)is thegrid location.
(x a )2
(y b )2
f (x, y) D
MapGrid Optimization (cont.)
42
43. Calling The Cloud
43
• It is based on the optimal task migration between
server and mobile client [Giurgiu_2009].
• They have used OSGi (Open Services Gateway
Initiative) and AlferedO platform (component based
architecture) for prototype implementation.
• The key Idea is to make an application graph and try
to make a cut (some tasks will be done on server side
and remaining will be done on mobile side) to meet
the required optimization issues.
• The following figure shows the main idea.
44. S1 S2 S3
S4
S5
S7
S6
S8
S1 S2 S3
S4
S5
S7
S6
S8
Mobile Cut
Mobile Cut
S3
S4
S5
S7
S6 S1 S2
S8
Original Plan
44
45. “You usually use your cell phone for
communication service. Why not
getting computation service?”
45
Reza, UCI Student
46. • Lesson that we have learned:
• For pervasive environment location-based services
considered as the important element in design.
• So we should consider the location of cloud as an important
optimization factor which is lead to cloudlet as mentioned
before.
• This suggests 3-tier architecture.
• Cloudlet has minimum capability, usually storage and limited
processing (for example Multimedia Streaming).
• The following figure shows this architecture.
46
47. Cloud Pool
(Amazon, Google, Microsoft,….)
Cloudlet or
Wireless Cloud
Cloudlet or
Wireless Cloud
Cloudlet or
Wireless Cloud
47
48. Location-Base Service Composition
• Based on different criteria we could optimize the
solution for different mobile and movment pattern.
S1|L0|T6 S2|L1|T7 S3|L2|T1
S4|L3|T5
S5|L4|T4
S7|L1|T2
S6|L0|T0
S8|L0|T3
• For mobile computing application we could define the
Time Location Workflow.
• It is the same as general work-flow with additional
information about the location of the service.
Time_LocationWorkflow
48
49. Mobile Cloud Computing Applications
(cont.)
• We are thinking about the middleware approach as the
solution for achieving Qos.
• Before going ahead let’s see what sort of atomic and
implementable elements and technology we have in
the cloud pool.
• Web Service:
Application Programming Interfaces (API) or web APIs that can
be accessed over a network and executed on a remote system
hosting the requested services. It has 3 important protocols:
1. WSDL (Web Service Description Language): XML-based interface
for definig Web Service functionality.
2. SOAP (Simple Object Access Protocol): Protocol for exchanging 49
50. • UDDI has tree parts:
• White Pages: Address, contact, and known identifiers;
• Yellow Pages: Industrial categorizations based on standard
taxonomies;
• Green Pages: Technical information about services exposed by
the business.
• Some people are thinking about the Blue Pages which
described the quality of services.
• IBM [IBM], also introduced WSLA (Web Service
Language Agreement) where obligation factors
related to Qos between service provider and client are 50
Mobile Cloud Computing Applications (cont.)
52. Mobile Client Middleware(Broker) Cloudlet and Cloud Pool
Cloud Service Registry and Discovery
Qos Monitoring , Service Discovery
Scheduler
Mobile
Client
Cloudlet
Pools
Mobile Profile Monitoring
Mobile Profile Analyzer
Qos Analyzer
Admission
Control Cloud
Pools
Qos
Monitoring
53. Middleware Blocks Functionalities
Admission Control Accepts or rejects mobile client requests according to the resources available
and mobile profile (it could be power- aware, resource –aware and…. Policies,
Maybe Game Theory could be used for optimal admission policy).
Mobile Profile Monitoring Monitors mobile profile.
Mobile Profile Analyzer Analyzes mobile profile specially power level, location
pattern,… for optimal scheduling.
Scheduler It schedules the accepted requests and design a plan according to the negotiations
done with Cloudlets (Schedule Queue).
Qos Monitoring, Service
Discovery (Cloud and Cloudlets)
It discovers cloudlets (maybe based on ontology and semantics) in the
area (like UDDI), its Qos during service from mobile client. It also
registers its services and middleware business on UDDI for accessing mobile
clients.
Qos Analyzer It is analyzing the Cloudlets services and make a list of suitable cloudlets
and policy of admission.
Mobile Client Block Functionalities
Qos Monitoring Reports the Middleware about the Qos of the cloudlets.
53
54. Sample Prototype
54
• Simple barcode reader service has been implemented.
• In this scenario the user takes a picture of the barcode
for getting some information about the object, for
example the cheapest price location.
• The picture is send to cloudlet for processing.
• The cloudlet extract the information and query
Amazon or other clouds for the price.
• The price will be return back to user.
• The next picture shows the scenario sequence
diagram [Rahimi_2008].
67. Conclusions and Research Direction
• We talked about the new era in Information
Technology which is know as cloud computing.
• Several different aspects of this area have been
reviewed and discussed.
• The deployment of cloud computing in mobile
environment were discussed.
• This middleware could be implemented as the Local
web services (as in barcode reader example).
• Good simulation environment should be considered in
this area (Currently I am working on OMNet++ to
develop for service composition in mobile 67
68. References
68
1. [Alonso_2004] G. Alonso, F. Casati, H. Kuno, V. Machiraju “Web Services,
Concepts, Architectures and Applications” , Springer 2004.
2. [Berkely_2009] “Above the Clouds: A Berkeley View of Cloud
Computing”, Tech. Report 2009.
3. [Chen_2003] H. Chen, T. Yu and K. Lin. “QCWS: An Implementation of
QoS-Capable Multimedia Web Services”, In Proc. of IEEE 5 th
Symposium on Multimedia Software Engineering (MSE03), Taiwan, Dec
2003
4. [Giurgiu_2009] Giurgiu, I., Riva, O., Juric, D., Krivulev, I., and Alonso, G ”
Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud
Applications” In Proceedings of the 10th ACM/IFIP/USENIX international
Conference on Middleware (Urbana, Illinois, November 30 - December 04,
2009).
5. [Huang_2007] Huang, Y. and Venkatasubramanian, N. “ Supporting
69. 6. [Huang_2005] Huang, Y., Mohapatra, S., and Venkatasubramanian, N
”An Energy-Efficient Middleware for Supporting Multimedia
69
Services in Mobile Grid Environments” In Proceedings of the
international Conference on information Technology: Coding and
Computing (Itcc'05) - Volume II - Volume 02 (April 04 - 06, 2005).
7. [Huang_2002] Y. Huang, N. Venkatasubramanian, "QoS-Based
Resource Discovery in Intermittently Available Environments,"
pp.50, 11th IEEE International Symposium on High Performance
Distributed Computing , 2002.
8. [IBM], "WSLA Web Service Level Agreement“
http://www.research.ibm.com/wsla/
9. [Ko_2008] Ko, J. M., Kim, C. O., and Kwon, “Quality-of-Service
Oriented Web Service Composition Algorithm and Planning
Architecture”. J. Syst. Softw (Nov. 2008).
10. [Mell_2009] P. Mell, T. Grance, "The NIST Definition of Cloud
Computing", Version .15, Oct 2009.
References (cont.)
70. 11. [Mabrouk_2009]N. Mabrouk, S. Beauche, E. Kuznetsova, N.
Georgantas, and Issarny “ QoS-Aware Service Composition in Dynamic
Service Oriented Environments ” In Proceedings of the 10th
ACM/IFIP/USENIX International Conference on Middleware (Middleware
'09).
12. [Rahimi_2008] M. R. Rahimi, J. Hengmeechai, N. Sarshar “Ubiquitous
Application of Mobile Phones for Getting Information from Barcode
Picture”, in the iCORE2008, Edmonton, Canada.
13. [Satyanarayanan_2001] Satyanarayanan, M. "Pervasive Computing:
Vision and Challenges“ IEEE Personal Communications, August 2001.
14. [Satyanarayanan_2009] Satyanarayanan, M., Bahl, P., Caceres, R., and
Davies, N. 2009. “The Case for VM-Based Cloudlets in Mobile
Computing” IEEE Pervasive Computing 8, 4 (Oct. 2009), p. 14-23.
15. [Zeng_2003] Zeng, L., Benatallah, B., Dumas, M., Kalagnanam, J., and 70
References (cont.)