SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4



                     Optimized solutions for mobile Cloud Computing
                                   1
                                       Mr.J.Praveen Kumar,2 Rajesh Badam
                                                     1
                                                      Asst.Prof.CSE Dept.
                                                      2
                                                       Mtech.(CSE Dept.)
                                       Malla Reddy College of Engineering and Technology

Abstract: As mobile device popularity grows, end-user               of mobile users as a new technology to achieve rich
demands to run heavier applications are equally increasing.         experience of a variety of mobile services at low cost, and
Mobile cloud computing integrates the cloud computing               of researchers as a promising solution for green IT . This
into the mobile environment and overcomes obstacles                 section provides an overview of MCC including definition,
related to the performance environment          and security        architecture, and advantages of MCC.
discussed in mobile computing. This paper gives an idea of
MCC, which helps general readers have an overview of                MCC as a new paradigm for mobile applications whereby
the MCC including the architecture, applications and                the data processing and storage are moved from the mobile
solutions. The issues, existing solutions and approaches are        device to powerful and centralized computing platforms
presented. In addition, the future research directions of           located in clouds. These centralized applications are then
MCC are discussed                                                   accessed over the wireless connection based on a thin
                                                                    native client or web browser on the mobile devices.
Keywords- Mobile cloud computing, offloading,                       CC offers some advantages by allowing users to use
Mobile services.                                                    infrastructure, platforms and software .

Introduction                                                        Existing approaches/solutions:
Mobile devices are becoming an important part of human                Mobile phones preserve the advantages of weight,
life as the most effective and convenient communication                  size and device independence but will always impose
tools not bounded by time and place. The rapid progress of               basic limits on processing power, storage capacity,
mobile computing becomes a powerful trend in the                         battery lifetime and display size.
development of IT technology as well as commerce and                  Conventional desktop applications are redesigned to
industry fields.                                                         operate on mobile hardware platforms, thereby often
The mobile devices are facing many challenges in their                   losing functionality.
resources(e.g., battery life, storage, and bandwidth) and             Demanding applications typically require specific
communications (e.g., mobility and security) . The limited               hardware resources that are not available on mobile
resources significantly impede the improvement of service                devices.
qualities.                                                            To get the display users connect over a wired local
                                                                         area network to the central company server executing
“Mobile Cloud Computing at its simplest, refers to an                    typical office applications.
infrastructure where both the data storage and the data
                                                                    Proposed solutions for mobile challenges:
processing happen outside of the mobile device. Mobile
                                                                      The principle of mobile cloud computing physically
cloud applications move the computing power and data
                                                                         separates the user interface from the application
storage away from mobile phones and into the cloud,
                                                                         logic.
bringing applications and mobilecomputing to not just
smartphone users but a much broader range of mobile                   Here, a Viewer component is executed on the mobile
subscribers”.                                                            device, which is operating as a remote display for the
                                                                         applications running on distant servers in the cloud.
                                                                      Remote display framework is composed of three
                                                                         components: a server side component that intercepts
                                                                         encodes and transmits the application graphics to the
                                                                         client, a viewer component on the client and a remote
                                                                         display protocol that transfers display updates and
                                                                         user events between both endpoints.
The term “mobile cloud computing” was introduced not                  In a mobile cloud computing environment, the
long after the concept of “cloud computing” launched in                  remote display protocol deliver complex multimedia
mid-2007. It has been attracting the attentions of                       graphics over wireless links and render these graphics
entrepreneurs as a profitable business option that reduces               on a resource constrained mobile device. Offloading
the development and running cost of mobile applications,                 applications to the cloud is a straight forward way to

Issn 2250-3005(online)                                         August| 2012                               Page 1126
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4



     save on energy consumption because the amount of                sleep mode. This sleep mode is interrupted at regular
     local processing is reduced.                                    intervals to transmit user events. Researchers have used
    Efficient compression techniques to reduce the                  cross-layer optimization to reduce WNIC energy
     amount of exchanged data are done using                         consumption By up to 52 percent.8
     compression techniques and versatile graphics
     encoding, downstream data peak reduction and                    Wireless Bandwidth Availability
     Optimization of upstream packetization overhead.                Compared to fixed access networks, modern broadband
                                                                     mobile and wireless technologies offer limited and variable
Mobile cloud computing architecture                                  bandwidth       availability.       Universal        Mobile
                                                                     Telecommunications System (UMTS) users typically
                                                                     receive up to 384 kilobits per second, while Krishna
                                                                     Balachandran and colleagues9 reported practical
                                                                     throughputs of 347 Kbps for Long Term Evolution (LTE)
                                                                     and up to 6.1 Mbps for WiMAX. Actual throughput
                                                                     depends on user mobility, interference, and fading effects.
                                                                     Versatile graphics encoding
                                                                     The choice of codec to compress the intercepted
                                                                     application graphics at the server is a tradeoff between
                                                                     visual quality, compression efficiency, and decoding
Cross-layer identification of WNIC sleep intervals                   complexity.
To develop strategies that optimize the energy balance,it is
important to study WNIC energy consumption, which is                 Conventional remote display architectures including RDP,
the product of the number of bytes exchanged over the                ICA, and VNC typically virtualize a layer of the graphic
wireless interface and the energy cost per byte. The                 rendering stack at the server and forward intercepted
average energy cost per byte is determined by the                    drawing primitives to the client, such as instructions to
distribution of time over the four possible WNIC states:             draw a rectangle, display a bitmap, or put some text on the
send, receive, idle, and sleep. Because a specific set of            screen.
WNIC components are activated in each state, power
consumption varies widely between the states.                        This approach is optimal for applications, such as typical
                                                                     office applications, that only update small regions of the
Although the send and receive modes consume the most                 display or have a slow refresh rate with respect to the
power, energy-saving approaches should focus on the large            network round-trip time. Bandwidth requirements to
idle times observed in remote display scenarios. These idle          remotely display this type of graphics do not exceed 200
times are a consequence of the limited frequency of user             Kbps and can be adequately served over wireless links.
interactions imposed by the network round-trip time. After
some interaction, users must wait until the results become           On the other hand, encoding multimedia graphics
visible on the screen before continuing their work.                  applications would require numerous drawing primitives
furthermore, interactive applications will only update their         because they update large parts of the screen at high
display when instructed by the user—for example, by                  refresh rates and they often contain fine-grained and
entering a URL or clicking on a hyperlink.                           complex color patterns. This kind of graphics can be more
     A proposed cross-layer power-saving approach                    efficiently encoded using a video codec, such as H.264 or
operates between the MAC layer and the remote display                MPEG-4. Using video codecs for remote display purposes
protocol layer (see Figure 2).8 Because the MAC layer                is referred to as interactive live streaming because the
operates on binary data and cannot discriminate between,             graphics are mainly the result of user interaction, in
for example, transmitted user input and Transmission                 contrast to regular video streaming, which requires only
Control Protocol (TCP) acknowledgments, it is unaware of             limited user interaction—for example, to start and stop the
the arrival of the next display update. The appropriate sleep        video. Even when only a single application is used, the
intervals must therefore be determined at the remote                 characteristics of the graphics on the user display might
display protocol layer, where the display update schedule            significantly differ when a user is accessing mobile cloud
is established—for example, via a push approach in which             computing services. For example, a user browsing a
the server sends display updates with fixed intervals or a           Wikipedia page might click on a link that opens a
pull approach in which the client sends an explicit request.         YouTube video in the same browser window. Remote
                                                                     display frameworks must therefore be able to switch
Correlating the transmission of user input to the network            seamlessly between multiple encoding modes based on an
round-trip time predicts the arrival of the next display             analysis of graphics at the server.
update. In between two display updates, the WNIC enters              Downstream data peak reduction

Issn 2250-3005(online)                                          August| 2012                                Page 1127
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4



Interactive applications only update their display when               next display updates in advance is unfeasible. Furthermore,
instructed by the user. These display updates usually                 the gains of this precomputing technique are highly
involve sending a large amount of data to the client in a             dependent on prediction accuracy. A better
short interval, which requires an instantaneous bandwidth             strategy might be to buffer some key display updates, for
much higher than the average bandwidth requirement.                   which the server only needs to provide a differential
Furthermore, this bursty traffic pattern is unfavorable in            update.
wireless network environments, as it might induce
                                                                      Scene object caching
additional collisions on the wireless channel.
                                                                      For more static applications, such as office applications,
Optimization of upstream Packetization overhead                       the potential next updates can be more accurately predicted
User events are the principal source of upstream remote               as, for example, a menu layout will rarely change.
display traffic from client to server. Individually, each user        Consequently, the number of corrective server updates will
event embodies only a small amount of information: a key              be more limited. A typical example would be the list of
or button ID, one bit to discriminate between the press and           recently opened files in a text editor’s File menu. Scene
release actions, and possibly the current pointer                     description languages such as MPEG-4 BiFS are
coordinates. Nevertheless, user events induce important               particularly suited to support this client-side handling of
upstream traffic because they are often generated shortly             user input.13 The client not only receives graphic updates,
after each other. Entering a single character results in two          but also is informed about the structure of the displayed
user events to indicate the press and release actions,                scene and its composing objects, as well as how the user
whereas moving the mouse results in a sequence of pointer             can manipulate these objects.
position updates.
                                                                      By physically separating the user interface from the
Usually, the system transmits user events as they occur to            application logic, mobile cloud computing allows access to
minimize interaction latency. Because data packets sent               even the most demanding applications from intrinsically
upstream often contain a single user event, headers added             resource-constrained mobile devices. Developers tailor
at the TCP, IP, and wireless link layer cause large                   contemporary remote display optimization techniques to
Packetization overhead. Table 3 quantifies the                        mobile devices’ short battery lifetime, the varying and
Packetization overhead of TCP/IP headers of three                     limited bandwidth availability on wireless links, and
commonly used remote display protocols—the VNC                        interaction latency. Although each of these solutions
Remote Framebuffer (RFB) Protocol, RDP, and ICA—                      adequately addresses specific mobile cloud computing
when sending a single keystroke to the server. Optional               challenges, an overall approach is currently lacking.
headers and the wireless link layer header further increase
                                                                      Because of user mobility, the wide diversity of
total overhead.
                                                                      applications, and the varying wireless channel status, the
Interaction Latency                                                   mobile cloud computing context is highly dynamic. Future
While technological advances are likely to overcome                   research should therefore focus on the design of a
bandwidth limitations, interaction latency—the delay users            comprehensive framework that integrates the existing
experience between generating some input and seeing the               solutions and activates the most appropriate one depending
result on their display—is an intrinsic challenge of mobile           on the current device, network, and cloud server status.
cloud computing because the device must communicate
                                                                      Conclusion
even the most trivial user operations to the server.
                                                                      Mobile cloud computing is one of mobile technology
Solutions to mitigate interaction latency try to either reduce
                                                                      trends in the future since it combines the advantages of
the number of hops on the end-to-end path by moving the
                                                                      both mobile computing and cloud computing, thereby
application closer to the client or provide better
                                                                      providing optimal services for mobile users. This article
synchronization mechanisms between client and server
                                                                      has provided an overview of mobile cloud computing in
Computing display updates in advance                                  which its definitions, architecture, and optimized solutions
Given the current application state, the application server           have been presented. The applications supported by mobile
can predict potential display updates and stream them in              cloud computing including mobile commerce, mobile
advance to the client. Contrary to video streaming, in                learning, and mobile healthcare have been discussed which
which the frame order is known in advance, in mobile                  clearly show the applicability of the mobile cloud
cloud computing, the next display update depends on user              computing to a wide range of mobile services. Then, the
input. For example, when a user opens an application                  issues and related approaches for mobile cloud computing
menu, the server can precompute all dialog windows that               have been discussed. Finally, the future research directions
can be opened by selecting one of the menu items.                     have been outlined.
Image buffering for virtual environment streaming
Due to limitations in mobile bandwidth and mobile device
memory resources, in most cases, streaming all possible               References
Issn 2250-3005(online)                                           August| 2012                                Page 1128
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4



[1.]    C. Albanesius, “Smartphone Shipments Surpass PC
        Shipments for First Time. What’s Next?” PC
        Magazine, 8 Feb. 2011; www.pcmag.com/article
        2/0,2817,2379665,00.asp.
[2.]    V.S. Pendyala and S.S.Y. Shim, “The Web as the
        Ubiquitous Computer,” Computer, Sept. 2009, pp.
        90-92.
[3.]    F. Lamberti and A. Sanna, “A Streaming-Based
        Solution for Remote Visualization of 3D Graphics
        on Mobile Devices,” IEEE Trans. Visualization
        and Computer Graphics, Mar./Apr. 2007, pp. 247-
        260.
[4.]    H. Kawashima et al., “Virtual PC-Type Thin Client
        System,” NEC Technical J., Sept. 2007, pp. 42-47.
[5.]    K. Pentikousis, “In Search of Energy-Efficient
        Mobile Networking,” IEEE Comm. Magazine, Jan.
        2010, pp. 95-103.
[6.]    K. Kumar and Y.-H. Lu, “Cloud Computing for
        Mobile Users: Can Offloading Computation Save
        Energy?” Computer, Apr. 2010, pp. 51-56.
[7.]    T. Kim et al., “An Energy-Aware Transmission
        Mechanism for WiFi-Based Mobile Devices
        Handling Upload TCP Traffic,” Int’l J. Comm.
        Systems, May 2009, pp. 625-640.
[8.]    P. Simoens et al., “Cross-Layer Optimization of
        Radio Sleep Intervals to Increase Thin Client
        Energy Efficiency,” IEEE Comm. Letters, Dec.
        2010, pp. 1095-1097.
[9.]    K. Balachandran et al., “Performance Assessment
        of Next-Generation Wireless Mobile Systems,”
        Bell Labs Technical J., Feb. 2009, pp. 35-58.
[10.]   http://onlinelibrary.wiley.com/doi/10.1002/wcm.12
        03/abstract,
[11.]   I. Nave et al., “Games@Large Graphics Streaming
        Architecture,” Proc. IEEE Int’l Symp. Consumer
        Electronics (ICSE 08), IEEE Press, 2008, pp. 205-
        208.
[12.]   K.-J. Tan et al., “A Remote Thin Client System for
        Real-Time Multimedia Streaming over VNC,”
        Proc. IEEE Int’l Conf. Multimedia and Expo
        (ICME 10), IEEE Press, 2010, pp. 992-997.

Author’s profile

              Rajesh Badam: Pursuing Mtech. (CSE
              Dept.) Malla Reddy College of
              Engineering and Technology,
              Hyderabad.

Mr. J.Praveen Kumar
             Asst.Prof. CSE Dept.
             Malla Reddy College of Engineering and
             Technology, Hyderabad.




Issn 2250-3005(online)                                       August| 2012                               Page 1129

Contenu connexe

Tendances

System Networks Drive the Next Generation of Automated, Dynamic Datacenters
System Networks Drive the Next Generation of Automated, Dynamic DatacentersSystem Networks Drive the Next Generation of Automated, Dynamic Datacenters
System Networks Drive the Next Generation of Automated, Dynamic Datacenters
IBM India Smarter Computing
 
The Connected Megacity
The Connected MegacityThe Connected Megacity
The Connected Megacity
Ericsson Labs
 
Efficient Local Resource management for Wireless Devices integration
Efficient Local Resource management for Wireless Devices integrationEfficient Local Resource management for Wireless Devices integration
Efficient Local Resource management for Wireless Devices integration
Editor Jacotech
 
Technology Challenges in the Networked Society
Technology Challenges in the Networked SocietyTechnology Challenges in the Networked Society
Technology Challenges in the Networked Society
Ericsson Labs
 
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsDepiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
IJASRD Journal
 

Tendances (19)

M2C2: A Mobility Management System For Mobile Cloud Computing
M2C2: A Mobility Management System For Mobile Cloud ComputingM2C2: A Mobility Management System For Mobile Cloud Computing
M2C2: A Mobility Management System For Mobile Cloud Computing
 
51 59
51 5951 59
51 59
 
IJET-V3I1P24
IJET-V3I1P24IJET-V3I1P24
IJET-V3I1P24
 
System Networks Drive the Next Generation of Automated, Dynamic Datacenters
System Networks Drive the Next Generation of Automated, Dynamic DatacentersSystem Networks Drive the Next Generation of Automated, Dynamic Datacenters
System Networks Drive the Next Generation of Automated, Dynamic Datacenters
 
99 103
99 10399 103
99 103
 
7 13
7 137 13
7 13
 
24 27
24 2724 27
24 27
 
The Connected Megacity
The Connected MegacityThe Connected Megacity
The Connected Megacity
 
Efficient Local Resource management for Wireless Devices integration
Efficient Local Resource management for Wireless Devices integrationEfficient Local Resource management for Wireless Devices integration
Efficient Local Resource management for Wireless Devices integration
 
Offloading in Mobile Cloud Computing
Offloading in Mobile Cloud ComputingOffloading in Mobile Cloud Computing
Offloading in Mobile Cloud Computing
 
CPScom2012_mwijnants
CPScom2012_mwijnantsCPScom2012_mwijnants
CPScom2012_mwijnants
 
1388829756 64344765
1388829756  643447651388829756  64344765
1388829756 64344765
 
395 401
395 401395 401
395 401
 
Technology Challenges in the Networked Society
Technology Challenges in the Networked SocietyTechnology Challenges in the Networked Society
Technology Challenges in the Networked Society
 
Mich Con Wireless Case Study
Mich Con Wireless Case StudyMich Con Wireless Case Study
Mich Con Wireless Case Study
 
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsDepiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
 
Ensuring Privacy & Transparency within Hybrid Clouds
Ensuring  Privacy & Transparency within Hybrid Clouds Ensuring  Privacy & Transparency within Hybrid Clouds
Ensuring Privacy & Transparency within Hybrid Clouds
 
Cloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionCloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-vision
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 

En vedette

Research Seminar Presentation - A framework for partitioning and execution of...
Research Seminar Presentation - A framework for partitioning and execution of...Research Seminar Presentation - A framework for partitioning and execution of...
Research Seminar Presentation - A framework for partitioning and execution of...
malinga2009
 
Mobile Computing - Research Survey May 05 2012
Mobile Computing - Research Survey May 05 2012Mobile Computing - Research Survey May 05 2012
Mobile Computing - Research Survey May 05 2012
Joseph Hennawy
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
Sukumar Nayak
 

En vedette (7)

Research Seminar Presentation - A framework for partitioning and execution of...
Research Seminar Presentation - A framework for partitioning and execution of...Research Seminar Presentation - A framework for partitioning and execution of...
Research Seminar Presentation - A framework for partitioning and execution of...
 
Distributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and SecurityDistributed Systems, Mobile Computing and Security
Distributed Systems, Mobile Computing and Security
 
Mobile Computing - Research Survey May 05 2012
Mobile Computing - Research Survey May 05 2012Mobile Computing - Research Survey May 05 2012
Mobile Computing - Research Survey May 05 2012
 
Data Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research OpportunitiesData Mining and Big Data Challenges and Research Opportunities
Data Mining and Big Data Challenges and Research Opportunities
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
The Journey of Mobile Computing
The Journey of Mobile ComputingThe Journey of Mobile Computing
The Journey of Mobile Computing
 

Similaire à IJCER (www.ijceronline.com) International Journal of computational Engineering research

Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
audeleypearl
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
 

Similaire à IJCER (www.ijceronline.com) International Journal of computational Engineering research (20)

Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
 
Nomadic Computing with Mobile Devices
Nomadic Computing with Mobile DevicesNomadic Computing with Mobile Devices
Nomadic Computing with Mobile Devices
 
MOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basicMOBILE CLOUD COMPUTING fundamental and basic
MOBILE CLOUD COMPUTING fundamental and basic
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
Gearing up of resource poor mobile devices using cloud
Gearing up of resource poor mobile devices using cloudGearing up of resource poor mobile devices using cloud
Gearing up of resource poor mobile devices using cloud
 
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyCloud-Based Impact for Mobile and Pervasive Environments: A Survey
Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
 
Cloud_Computing.pptx
Cloud_Computing.pptxCloud_Computing.pptx
Cloud_Computing.pptx
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
 
A survey of mobile cloud computing Architecture, applications, and approache...
A survey of mobile cloud computing  Architecture, applications, and approache...A survey of mobile cloud computing  Architecture, applications, and approache...
A survey of mobile cloud computing Architecture, applications, and approache...
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting
 
40120130405016
4012013040501640120130405016
40120130405016
 
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docxResearch on Mobile Cloud Computing Review,Trend and Perspec.docx
Research on Mobile Cloud Computing Review,Trend and Perspec.docx
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
 
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of  Wireless  Devices using the CloudA New Improved Storage Model of  Wireless  Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the Cloud
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
 
5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

IJCER (www.ijceronline.com) International Journal of computational Engineering research

  • 1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4 Optimized solutions for mobile Cloud Computing 1 Mr.J.Praveen Kumar,2 Rajesh Badam 1 Asst.Prof.CSE Dept. 2 Mtech.(CSE Dept.) Malla Reddy College of Engineering and Technology Abstract: As mobile device popularity grows, end-user of mobile users as a new technology to achieve rich demands to run heavier applications are equally increasing. experience of a variety of mobile services at low cost, and Mobile cloud computing integrates the cloud computing of researchers as a promising solution for green IT . This into the mobile environment and overcomes obstacles section provides an overview of MCC including definition, related to the performance environment and security architecture, and advantages of MCC. discussed in mobile computing. This paper gives an idea of MCC, which helps general readers have an overview of MCC as a new paradigm for mobile applications whereby the MCC including the architecture, applications and the data processing and storage are moved from the mobile solutions. The issues, existing solutions and approaches are device to powerful and centralized computing platforms presented. In addition, the future research directions of located in clouds. These centralized applications are then MCC are discussed accessed over the wireless connection based on a thin native client or web browser on the mobile devices. Keywords- Mobile cloud computing, offloading, CC offers some advantages by allowing users to use Mobile services. infrastructure, platforms and software . Introduction Existing approaches/solutions: Mobile devices are becoming an important part of human  Mobile phones preserve the advantages of weight, life as the most effective and convenient communication size and device independence but will always impose tools not bounded by time and place. The rapid progress of basic limits on processing power, storage capacity, mobile computing becomes a powerful trend in the battery lifetime and display size. development of IT technology as well as commerce and  Conventional desktop applications are redesigned to industry fields. operate on mobile hardware platforms, thereby often The mobile devices are facing many challenges in their losing functionality. resources(e.g., battery life, storage, and bandwidth) and  Demanding applications typically require specific communications (e.g., mobility and security) . The limited hardware resources that are not available on mobile resources significantly impede the improvement of service devices. qualities.  To get the display users connect over a wired local area network to the central company server executing “Mobile Cloud Computing at its simplest, refers to an typical office applications. infrastructure where both the data storage and the data Proposed solutions for mobile challenges: processing happen outside of the mobile device. Mobile  The principle of mobile cloud computing physically cloud applications move the computing power and data separates the user interface from the application storage away from mobile phones and into the cloud, logic. bringing applications and mobilecomputing to not just smartphone users but a much broader range of mobile  Here, a Viewer component is executed on the mobile subscribers”. device, which is operating as a remote display for the applications running on distant servers in the cloud.  Remote display framework is composed of three components: a server side component that intercepts encodes and transmits the application graphics to the client, a viewer component on the client and a remote display protocol that transfers display updates and user events between both endpoints. The term “mobile cloud computing” was introduced not  In a mobile cloud computing environment, the long after the concept of “cloud computing” launched in remote display protocol deliver complex multimedia mid-2007. It has been attracting the attentions of graphics over wireless links and render these graphics entrepreneurs as a profitable business option that reduces on a resource constrained mobile device. Offloading the development and running cost of mobile applications, applications to the cloud is a straight forward way to Issn 2250-3005(online) August| 2012 Page 1126
  • 2. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4 save on energy consumption because the amount of sleep mode. This sleep mode is interrupted at regular local processing is reduced. intervals to transmit user events. Researchers have used  Efficient compression techniques to reduce the cross-layer optimization to reduce WNIC energy amount of exchanged data are done using consumption By up to 52 percent.8 compression techniques and versatile graphics encoding, downstream data peak reduction and Wireless Bandwidth Availability Optimization of upstream packetization overhead. Compared to fixed access networks, modern broadband mobile and wireless technologies offer limited and variable Mobile cloud computing architecture bandwidth availability. Universal Mobile Telecommunications System (UMTS) users typically receive up to 384 kilobits per second, while Krishna Balachandran and colleagues9 reported practical throughputs of 347 Kbps for Long Term Evolution (LTE) and up to 6.1 Mbps for WiMAX. Actual throughput depends on user mobility, interference, and fading effects. Versatile graphics encoding The choice of codec to compress the intercepted application graphics at the server is a tradeoff between visual quality, compression efficiency, and decoding Cross-layer identification of WNIC sleep intervals complexity. To develop strategies that optimize the energy balance,it is important to study WNIC energy consumption, which is Conventional remote display architectures including RDP, the product of the number of bytes exchanged over the ICA, and VNC typically virtualize a layer of the graphic wireless interface and the energy cost per byte. The rendering stack at the server and forward intercepted average energy cost per byte is determined by the drawing primitives to the client, such as instructions to distribution of time over the four possible WNIC states: draw a rectangle, display a bitmap, or put some text on the send, receive, idle, and sleep. Because a specific set of screen. WNIC components are activated in each state, power consumption varies widely between the states. This approach is optimal for applications, such as typical office applications, that only update small regions of the Although the send and receive modes consume the most display or have a slow refresh rate with respect to the power, energy-saving approaches should focus on the large network round-trip time. Bandwidth requirements to idle times observed in remote display scenarios. These idle remotely display this type of graphics do not exceed 200 times are a consequence of the limited frequency of user Kbps and can be adequately served over wireless links. interactions imposed by the network round-trip time. After some interaction, users must wait until the results become On the other hand, encoding multimedia graphics visible on the screen before continuing their work. applications would require numerous drawing primitives furthermore, interactive applications will only update their because they update large parts of the screen at high display when instructed by the user—for example, by refresh rates and they often contain fine-grained and entering a URL or clicking on a hyperlink. complex color patterns. This kind of graphics can be more A proposed cross-layer power-saving approach efficiently encoded using a video codec, such as H.264 or operates between the MAC layer and the remote display MPEG-4. Using video codecs for remote display purposes protocol layer (see Figure 2).8 Because the MAC layer is referred to as interactive live streaming because the operates on binary data and cannot discriminate between, graphics are mainly the result of user interaction, in for example, transmitted user input and Transmission contrast to regular video streaming, which requires only Control Protocol (TCP) acknowledgments, it is unaware of limited user interaction—for example, to start and stop the the arrival of the next display update. The appropriate sleep video. Even when only a single application is used, the intervals must therefore be determined at the remote characteristics of the graphics on the user display might display protocol layer, where the display update schedule significantly differ when a user is accessing mobile cloud is established—for example, via a push approach in which computing services. For example, a user browsing a the server sends display updates with fixed intervals or a Wikipedia page might click on a link that opens a pull approach in which the client sends an explicit request. YouTube video in the same browser window. Remote display frameworks must therefore be able to switch Correlating the transmission of user input to the network seamlessly between multiple encoding modes based on an round-trip time predicts the arrival of the next display analysis of graphics at the server. update. In between two display updates, the WNIC enters Downstream data peak reduction Issn 2250-3005(online) August| 2012 Page 1127
  • 3. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4 Interactive applications only update their display when next display updates in advance is unfeasible. Furthermore, instructed by the user. These display updates usually the gains of this precomputing technique are highly involve sending a large amount of data to the client in a dependent on prediction accuracy. A better short interval, which requires an instantaneous bandwidth strategy might be to buffer some key display updates, for much higher than the average bandwidth requirement. which the server only needs to provide a differential Furthermore, this bursty traffic pattern is unfavorable in update. wireless network environments, as it might induce Scene object caching additional collisions on the wireless channel. For more static applications, such as office applications, Optimization of upstream Packetization overhead the potential next updates can be more accurately predicted User events are the principal source of upstream remote as, for example, a menu layout will rarely change. display traffic from client to server. Individually, each user Consequently, the number of corrective server updates will event embodies only a small amount of information: a key be more limited. A typical example would be the list of or button ID, one bit to discriminate between the press and recently opened files in a text editor’s File menu. Scene release actions, and possibly the current pointer description languages such as MPEG-4 BiFS are coordinates. Nevertheless, user events induce important particularly suited to support this client-side handling of upstream traffic because they are often generated shortly user input.13 The client not only receives graphic updates, after each other. Entering a single character results in two but also is informed about the structure of the displayed user events to indicate the press and release actions, scene and its composing objects, as well as how the user whereas moving the mouse results in a sequence of pointer can manipulate these objects. position updates. By physically separating the user interface from the Usually, the system transmits user events as they occur to application logic, mobile cloud computing allows access to minimize interaction latency. Because data packets sent even the most demanding applications from intrinsically upstream often contain a single user event, headers added resource-constrained mobile devices. Developers tailor at the TCP, IP, and wireless link layer cause large contemporary remote display optimization techniques to Packetization overhead. Table 3 quantifies the mobile devices’ short battery lifetime, the varying and Packetization overhead of TCP/IP headers of three limited bandwidth availability on wireless links, and commonly used remote display protocols—the VNC interaction latency. Although each of these solutions Remote Framebuffer (RFB) Protocol, RDP, and ICA— adequately addresses specific mobile cloud computing when sending a single keystroke to the server. Optional challenges, an overall approach is currently lacking. headers and the wireless link layer header further increase Because of user mobility, the wide diversity of total overhead. applications, and the varying wireless channel status, the Interaction Latency mobile cloud computing context is highly dynamic. Future While technological advances are likely to overcome research should therefore focus on the design of a bandwidth limitations, interaction latency—the delay users comprehensive framework that integrates the existing experience between generating some input and seeing the solutions and activates the most appropriate one depending result on their display—is an intrinsic challenge of mobile on the current device, network, and cloud server status. cloud computing because the device must communicate Conclusion even the most trivial user operations to the server. Mobile cloud computing is one of mobile technology Solutions to mitigate interaction latency try to either reduce trends in the future since it combines the advantages of the number of hops on the end-to-end path by moving the both mobile computing and cloud computing, thereby application closer to the client or provide better providing optimal services for mobile users. This article synchronization mechanisms between client and server has provided an overview of mobile cloud computing in Computing display updates in advance which its definitions, architecture, and optimized solutions Given the current application state, the application server have been presented. The applications supported by mobile can predict potential display updates and stream them in cloud computing including mobile commerce, mobile advance to the client. Contrary to video streaming, in learning, and mobile healthcare have been discussed which which the frame order is known in advance, in mobile clearly show the applicability of the mobile cloud cloud computing, the next display update depends on user computing to a wide range of mobile services. Then, the input. For example, when a user opens an application issues and related approaches for mobile cloud computing menu, the server can precompute all dialog windows that have been discussed. Finally, the future research directions can be opened by selecting one of the menu items. have been outlined. Image buffering for virtual environment streaming Due to limitations in mobile bandwidth and mobile device memory resources, in most cases, streaming all possible References Issn 2250-3005(online) August| 2012 Page 1128
  • 4. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4 [1.] C. Albanesius, “Smartphone Shipments Surpass PC Shipments for First Time. What’s Next?” PC Magazine, 8 Feb. 2011; www.pcmag.com/article 2/0,2817,2379665,00.asp. [2.] V.S. Pendyala and S.S.Y. Shim, “The Web as the Ubiquitous Computer,” Computer, Sept. 2009, pp. 90-92. [3.] F. Lamberti and A. Sanna, “A Streaming-Based Solution for Remote Visualization of 3D Graphics on Mobile Devices,” IEEE Trans. Visualization and Computer Graphics, Mar./Apr. 2007, pp. 247- 260. [4.] H. Kawashima et al., “Virtual PC-Type Thin Client System,” NEC Technical J., Sept. 2007, pp. 42-47. [5.] K. Pentikousis, “In Search of Energy-Efficient Mobile Networking,” IEEE Comm. Magazine, Jan. 2010, pp. 95-103. [6.] K. Kumar and Y.-H. Lu, “Cloud Computing for Mobile Users: Can Offloading Computation Save Energy?” Computer, Apr. 2010, pp. 51-56. [7.] T. Kim et al., “An Energy-Aware Transmission Mechanism for WiFi-Based Mobile Devices Handling Upload TCP Traffic,” Int’l J. Comm. Systems, May 2009, pp. 625-640. [8.] P. Simoens et al., “Cross-Layer Optimization of Radio Sleep Intervals to Increase Thin Client Energy Efficiency,” IEEE Comm. Letters, Dec. 2010, pp. 1095-1097. [9.] K. Balachandran et al., “Performance Assessment of Next-Generation Wireless Mobile Systems,” Bell Labs Technical J., Feb. 2009, pp. 35-58. [10.] http://onlinelibrary.wiley.com/doi/10.1002/wcm.12 03/abstract, [11.] I. Nave et al., “Games@Large Graphics Streaming Architecture,” Proc. IEEE Int’l Symp. Consumer Electronics (ICSE 08), IEEE Press, 2008, pp. 205- 208. [12.] K.-J. Tan et al., “A Remote Thin Client System for Real-Time Multimedia Streaming over VNC,” Proc. IEEE Int’l Conf. Multimedia and Expo (ICME 10), IEEE Press, 2010, pp. 992-997. Author’s profile Rajesh Badam: Pursuing Mtech. (CSE Dept.) Malla Reddy College of Engineering and Technology, Hyderabad. Mr. J.Praveen Kumar Asst.Prof. CSE Dept. Malla Reddy College of Engineering and Technology, Hyderabad. Issn 2250-3005(online) August| 2012 Page 1129