SlideShare a Scribd company logo
1 of 1
Download to read offline
• Binder
Binder is a remote procedure call mechanism
that allows a client process to remotely invoke
a function on a server process.
Pros:
– Binder requires only one data copy plus a
temporal memory mapping to transmit data
from one process to another.
Cons:
– Binder requires pre-defined interfaces
between the processes, which limits the
communication flexibility.
– Binder causes higher kernel overhead.
Performance Evaluation of Android IPC for
Continuous Sensing Applications
IPC Requirements of Continuous Sensing Applications
Center for Embedded Networked Sensing
Android IPC Mechanisms
• Continuous Sensing Applications
– A continuous sensing application is usually comprised of several
components, each of which runs in its own processes with separated
memory spaces.
– Only via inter-process-communication (IPC) mechanisms can
components interact with each other.
• IPC Requirements
– The IPC transactions of continuous sensing applications tend to occur
periodically and frequently.
– Some applications require large transfer sizes (e.g. acoustic sensing.)
– Low latency & low resource usages (i.e. memory, CPU) are required
to minimize the impact to user’s normal phone usage.
• Intent
Intent is a message forwarding system, where
a system service forwards a message to its
proper receivers based on intent-filtering
policies.
Pros:
– The intent-filtering policies enable more
flexible interaction between processors.
– Message broadcasting is supported.
Cons:
– Two-fold transmission is required, resulting
in longer transmission latency and higher
resource usage.
• Content Provider
Content provider is a data storehouse
mechanism that provides SQL-like APIs and
enables the data sharing among processes.
Pros:
– It adopts shared memory technique to
transmit query results and has the lowest
data transmission overhead.
Cons:
– Content provider only favors large transfer
size due to the high shared memory
allocation overhead.
Performance Evaluation
• Evaluation methodology: Two processes communicated every one second via different IPC mechanisms, while the packet sizes
ranged from 4B to 256KB to simulate different continuous sensing IPC needs. Each data point is an average of 100 transactions, and
the error bars represent 95% confidential intervals.
Continuous Sensing Application Examples
Memory Usage: Intent uses two times more
memory than other mechanisms due to its two-
fold transmission design.
Latency: Content provider performs the best
for larger packet sizes, but is outperformed
by Binder for smaller packet sizes.
CPU Usage: Content provider shows the
lowest CPU usage for larger packet sizes,
while Binder performs the best for the
smaller packet sizes.
Cheng-Kang Hsieh, Hossein Falaki, Nithya Ramanathan, Hongsuda Tangmunarunkit, Deborah Estrin
Center for Embedded Networked Sensing, UCLA

More Related Content

What's hot

Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network management
bhavikaorg
 
Distributed Middleware Reliability & Fault Tolerance Support in System S
Distributed Middleware Reliability & Fault Tolerance Support in System SDistributed Middleware Reliability & Fault Tolerance Support in System S
Distributed Middleware Reliability & Fault Tolerance Support in System S
Harini Sirisena
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
Tuhin_Das
 
Application of Parallel Processing
Application of Parallel ProcessingApplication of Parallel Processing
Application of Parallel Processing
are you
 

What's hot (18)

Fault tolerance in Information Centric Networks
Fault tolerance in Information Centric NetworksFault tolerance in Information Centric Networks
Fault tolerance in Information Centric Networks
 
Chapter04
Chapter04Chapter04
Chapter04
 
Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network management
 
Monitoring docker container and dockerized applications
Monitoring docker container and dockerized applicationsMonitoring docker container and dockerized applications
Monitoring docker container and dockerized applications
 
Final presentation es1
Final presentation es1Final presentation es1
Final presentation es1
 
Network Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsNetwork Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the Basics
 
4. system models
4. system models4. system models
4. system models
 
Design and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical SegmentationDesign and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical Segmentation
 
NP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMPNP - Unit 3 - Forwarding Datagram and ICMP
NP - Unit 3 - Forwarding Datagram and ICMP
 
Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring System
 
Distributed Middleware Reliability & Fault Tolerance Support in System S
Distributed Middleware Reliability & Fault Tolerance Support in System SDistributed Middleware Reliability & Fault Tolerance Support in System S
Distributed Middleware Reliability & Fault Tolerance Support in System S
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
Application of Parallel Processing
Application of Parallel ProcessingApplication of Parallel Processing
Application of Parallel Processing
 
ThomasDWilkerson_Resume
ThomasDWilkerson_ResumeThomasDWilkerson_Resume
ThomasDWilkerson_Resume
 
Distributed System
Distributed System Distributed System
Distributed System
 
Reduced network traffic
Reduced network trafficReduced network traffic
Reduced network traffic
 

Similar to Performance evaluation of Android IPC

Monitoring-Docker-Container-and-Dockerized-Applications
Monitoring-Docker-Container-and-Dockerized-ApplicationsMonitoring-Docker-Container-and-Dockerized-Applications
Monitoring-Docker-Container-and-Dockerized-Applications
Satya Sanjibani Routray
 

Similar to Performance evaluation of Android IPC (20)

VoD Solutions
VoD SolutionsVoD Solutions
VoD Solutions
 
ERTOS UNIT6.ppt
ERTOS UNIT6.pptERTOS UNIT6.ppt
ERTOS UNIT6.ppt
 
mobisys20-mpbond.pptx
mobisys20-mpbond.pptxmobisys20-mpbond.pptx
mobisys20-mpbond.pptx
 
mobisys20-mpbond.pptx
mobisys20-mpbond.pptxmobisys20-mpbond.pptx
mobisys20-mpbond.pptx
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSFAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
 
Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
IEEE 2014 JAVA NETWORKING PROJECTS On the excess bandwidth allocation in isp ...
IEEE 2014 JAVA NETWORKING PROJECTS On the excess bandwidth allocation in isp ...IEEE 2014 JAVA NETWORKING PROJECTS On the excess bandwidth allocation in isp ...
IEEE 2014 JAVA NETWORKING PROJECTS On the excess bandwidth allocation in isp ...
 
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
 
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
 
Types of computing
Types of computingTypes of computing
Types of computing
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
Memory and Performance Isolation for a Multi-tenant Function-based Data-plane
Memory and Performance Isolation for a Multi-tenant Function-based Data-planeMemory and Performance Isolation for a Multi-tenant Function-based Data-plane
Memory and Performance Isolation for a Multi-tenant Function-based Data-plane
 
01-MessagePassingFundamentals.ppt
01-MessagePassingFundamentals.ppt01-MessagePassingFundamentals.ppt
01-MessagePassingFundamentals.ppt
 
Network cost services
Network cost servicesNetwork cost services
Network cost services
 
network basics
network basicsnetwork basics
network basics
 
Monitoring-Docker-Container-and-Dockerized-Applications
Monitoring-Docker-Container-and-Dockerized-ApplicationsMonitoring-Docker-Container-and-Dockerized-Applications
Monitoring-Docker-Container-and-Dockerized-Applications
 
Monitoring docker-container-and-dockerized-applications
Monitoring docker-container-and-dockerized-applicationsMonitoring docker-container-and-dockerized-applications
Monitoring docker-container-and-dockerized-applications
 
Synapseindia revirews about networking
Synapseindia revirews about networkingSynapseindia revirews about networking
Synapseindia revirews about networking
 

More from 承剛 謝 (6)

Group link
Group linkGroup link
Group link
 
Collaborative Metric Learning (WWW'17)
Collaborative Metric Learning (WWW'17)Collaborative Metric Learning (WWW'17)
Collaborative Metric Learning (WWW'17)
 
Immersive Recommendation (NYC Media Lab)
Immersive Recommendation (NYC Media Lab)Immersive Recommendation (NYC Media Lab)
Immersive Recommendation (NYC Media Lab)
 
Immersive Recommendation
Immersive RecommendationImmersive Recommendation
Immersive Recommendation
 
Lifestreams Presentation (Sensys 14)
Lifestreams Presentation (Sensys 14)Lifestreams Presentation (Sensys 14)
Lifestreams Presentation (Sensys 14)
 
Experiment result 1.31
Experiment result 1.31Experiment result 1.31
Experiment result 1.31
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Performance evaluation of Android IPC

  • 1. • Binder Binder is a remote procedure call mechanism that allows a client process to remotely invoke a function on a server process. Pros: – Binder requires only one data copy plus a temporal memory mapping to transmit data from one process to another. Cons: – Binder requires pre-defined interfaces between the processes, which limits the communication flexibility. – Binder causes higher kernel overhead. Performance Evaluation of Android IPC for Continuous Sensing Applications IPC Requirements of Continuous Sensing Applications Center for Embedded Networked Sensing Android IPC Mechanisms • Continuous Sensing Applications – A continuous sensing application is usually comprised of several components, each of which runs in its own processes with separated memory spaces. – Only via inter-process-communication (IPC) mechanisms can components interact with each other. • IPC Requirements – The IPC transactions of continuous sensing applications tend to occur periodically and frequently. – Some applications require large transfer sizes (e.g. acoustic sensing.) – Low latency & low resource usages (i.e. memory, CPU) are required to minimize the impact to user’s normal phone usage. • Intent Intent is a message forwarding system, where a system service forwards a message to its proper receivers based on intent-filtering policies. Pros: – The intent-filtering policies enable more flexible interaction between processors. – Message broadcasting is supported. Cons: – Two-fold transmission is required, resulting in longer transmission latency and higher resource usage. • Content Provider Content provider is a data storehouse mechanism that provides SQL-like APIs and enables the data sharing among processes. Pros: – It adopts shared memory technique to transmit query results and has the lowest data transmission overhead. Cons: – Content provider only favors large transfer size due to the high shared memory allocation overhead. Performance Evaluation • Evaluation methodology: Two processes communicated every one second via different IPC mechanisms, while the packet sizes ranged from 4B to 256KB to simulate different continuous sensing IPC needs. Each data point is an average of 100 transactions, and the error bars represent 95% confidential intervals. Continuous Sensing Application Examples Memory Usage: Intent uses two times more memory than other mechanisms due to its two- fold transmission design. Latency: Content provider performs the best for larger packet sizes, but is outperformed by Binder for smaller packet sizes. CPU Usage: Content provider shows the lowest CPU usage for larger packet sizes, while Binder performs the best for the smaller packet sizes. Cheng-Kang Hsieh, Hossein Falaki, Nithya Ramanathan, Hongsuda Tangmunarunkit, Deborah Estrin Center for Embedded Networked Sensing, UCLA