DOC PREVIEW
Purdue CS 59000 - Lecture notes

This preview shows page 1-2-3-4-5-6 out of 19 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY?What cloud gives us, generallySlide 3What about cloud computing for mobile users? SpecificallyThe importance of battery lifetime of mobile phonesFour basic approaches to saving energy and extending battery lifetime in mobile devices:Can offloading these applications to the cloud save energy and extend battery lifetimes for mobile users?Slide 8Slide 9sample applications benefiting from offloadingSlide 11sample applications not benefiting from offloadingMaking computation offloading more attractiveWhen considering Privacy and securitySlide 15Slide 16Slide 17ConclusionSlide 19Karthik Kumar and Yung-Hsiang Lu, Purdue UniversityPresenter Yifei SunTake Amazon cloud for example.store personal data (Simple Storage Service (S3) ) perform computations on stored data(Elastic Compute Cloud (EC2). )If you want to set up a business.low initial capital investmentshorter start-up time for new serviceslower maintenance and operation costs higher utilization through virtualization easier disaster recoveryTwo main concerns:mobile computing are limited energywireless bandwidthVarious studies have identified longer batterylifetime as the most desired feature of suchsystems. longer battery life to be more important than all other features, including cameras or storage. short battery life to be the most disliked characteristic of Apple’s iPhone 3GSbattery life was the top concern of music phone users.Adopt a new generation of semiconductor technology. Avoid wasting energy. (when it is idle, sleep mode)Execute programs slowly. (When a processor’s clock speed doubles, the power consumption nearly octuples). Eliminate computation all together. (offloading these applications to the cloud).How to implement a quantitative study. The amount of energy saved is S : the speed of cloud to compute C instructionsM : the speed of mobile to compute C instructionsD : the data need to transmitB : the bandwidth of the wireless Internetthe energy cost per second when the mobile phone is doing computing the energy cost per second when the mobile phone is idle. the energy cost per second when the mobile is transmission the data.ipcptrpSuppose the server is F times faster—that is, S= F × M. We can rewrite the formula asEnergy is saved when this formula produces apositive number. The formula is positive if D/Bis sufficiently small compared with C/M and Fis sufficiently large.chess game.A chessboard has 8 × 8 = 64 positions. Eachplayer controls 16 pieces at the beginning ofthe game. Each piece may be in one of the 64possible locations and needs 6 bits torepresent the location. To represent a chessgame’s current state, it is sufficient to statethat 6 bits × 32 pieces = 192 bits = 24 bytes;this is smaller than the size of a typicalwireless packet.The amount of computation for chess is verylarge; Claude Shannon and Victor Allisestimated the complexity of chess to exceedthe number of atoms in the universe. Since theamount of computation C is extremely large,and D is very small, chess provides an examplewhere offloading is beneficial for most wirelessnetworks.regions like national parksthe basement of a buildinginterior of a tunnel,subway.In these cases,where the value of B in Equation can becomevery small or even zero, cloud computing doesnot save energy.There is a fundamental assumptionunder-lying this analysis with the client-servermodel: Because the server does not alreadycontain the data, all the data must be sent tothe service provider. However, cloud computing changes thatassumption: The cloud stores data and performscomputation on it. For example, services likeAmazon S3 can store data, and Amazon EC2 canbe used to perform computation on the datastored using S3.Another possible privacy and security solutionis to use a technique called steganography :Multimedia content like images and videoshave significant redundancy. This makes itpossible to hide data in multimedia usingsteganography.Steganographic techniques can be used totransform the data before storage so thatoperations can still be performed on the data.Performing encryption or steganographictechniques before sending data to the cloudrequires some additional processing on themobile system. So the formula become:cloud computing can potentially save energyfor mobile users.not all applications are energyefficient when migrated to the cloud. cloud computing services would besignificantly different from cloud services fordesktops because they must offer energysavings. The services should consider the energyoverhead for privacy, security, reliability,and data communication before


View Full Document

Purdue CS 59000 - Lecture notes

Documents in this Course
Lecture 4

Lecture 4

42 pages

Lecture 6

Lecture 6

38 pages

Load more
Download Lecture notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?