A Simple Analysis of Service Oriented Architecture for Mobile Cloud Computing Y.Padma

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 1 - May 2014
A Simple Analysis of Service Oriented Architecture
for Mobile Cloud Computing
Y.Padma 1 , K.Pavan Kumar 2, A.Durgabhavani 3
1
Assistant Professor, Prasad V. Potluri Siddhartha Institute of Technology, Vijayawada, AP, India
2,3
Assistant Professor, Usharama College of Enggineering &Technology, Vijayawada, AP, India
Abstract— Cloud-based Mobile Augmentation (CMA) is thestate-of-the-art augmentation model that leverages proximate
and distant clouds to increase, enhance, and optimize computing
capabilities of mobile devices aiming at execution of RMAs,
which breeds Mobile Cloud Computing (MCC). This study
analyzes impacts of mobile-cloud distance and number of
intermediate hops as influential factors on CMA performance
which are not yet investigated. The results indicate the
correlation between distance and intermediate hops on overall
execution costs (time and energy) of RMAs. Exploitation of cloud
computing by mobile handhelds breeds a new research domain
called Mobile Cloud Computing (MCC), which is the state-ofthe-art computing paradigm comprised of three heterogeneous
domains of mobile computing, cloud computing, and networking.
Such non-uniformity stems several challenges such as portability,
interoperability, and fragmentation that are deemed to be
alleviated leveraging SOA as a promising design philosophy
embraced by mobile computing and cloud computing
communities to stimulate portable, complex application using
prefabricated building blocks called Services. Services are
prefabricated codes that are developed in languages like Java,
.Net, and PHP and are often publicized in a publicly accessible
repository to be discovered and invoked by clients to provide
specific functionality.
Keywords— cloud, Computing, mobile, devices, architecture,
service, analysis.
I. INTRODUCTION
Recent consumer electronic technologies have created
momentous ground for smart phones in various domains,
particularly healthcare and education. However, smart
phones' miniature nature imposes intrinsic limitations on
computational capabilities and battery lifetime that encumber
performing Resource-intensive Mobile Applications (RMAs).
The vision of augmenting computing capabilities of
mobile devices, especially smart phones with least cost is
likely transforming to reality leveraging cloud computing.
Cloud exploitation by mobile devices breeds a new research
domain called Mobile Cloud Computing (MCC). However,
issues like portability and interoperability should be
addressed for mobile augmentation which is a non-trivial task
using component based approaches. Service Oriented
Architecture (SOA) is a promising design philosophy
embraced by mobile computing and cloud computing
communities to stimulate portable, complex application using
prefabricated building blocks called Services.
ISSN: 2231-5381
Utilizing distant cloud resources to host and run
Services is hampered by long WAN latency. Exploiting mobile
devices in vicinity alleviates long WAN latency, while creates
new set of issues like Service publishing and discovery as well
as client server security, reliability, and Service availability.
In this paper, we propose a market-oriented architecture
based on SOA to stimulate publishing, discovering, and
hosting Services on nearby mobiles, which reduces long WAN
latency and creates a business opportunity that encourages
mobile owners to embrace Service hosting. Group of mobile
phones simulate a nearby cloud computing platform. We
create new role of Service host by enabling unskilled mobile
owners/users to host Services developed by skilled developers.
Evidently, Service availability, reliability, and Serviceoriented mobile application portability will increase towards
green ubiquitous computing in our mobile cloud
infrastructure.
The paid Service hosting and execution is deemed to
be embraced by mobile owners if issues such as Service
publishing and discovery as well as client-server security,
reliability, and Service availability are addressed. Services
can be hosted on a hosting toolkit like which is a lightweight
hosting toolkit for resource-poor mobile devices. In this paper,
we propose an approach to publish, discover, and host
Services on nearby mobiles, which not only alleviates
aforementioned issues, but also creates a business opportunity
that encourages mobile owners to embrace Service hosting
and execution. We create new role of Service host to enable
unskilled mobile client to host Services developed by skilled
developers. A proper billing system can divide the income
according to a negotiated agreement between engaging
parties. To the best of our knowledge, this is the first proposal
that aims to utilize nearby mobile devices under supervision of
a supervisory body to host and run services based on an
agreement.
II. PROPOSED ARCHITECTURE
Several sequential or parallel Services are bind together to
build a new complex functionality. SOA has been utilized in
computing domains such as grid computing or was
cornerstone for technologies such as cloud computing to
alleviate several fundamental challenges such as portability,
interoperability, and integration of applications and software
systems. This is due to the fact that Services are autonomous
and platform-neutral meaning that different Services running
on heterogeneous platforms can still collaborate toward
fulfilling a complex task. Service is providing higher-level
http://www.ijettjournal.org
Page 33
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 1 - May 2014
abstraction compared with components which makes them
suitable technology for large scale computing domains such as
MCC.
Time analysis:
The overall execution time in mobile-cloud applications is
the total values of mobile computation time, round-trip delay,
and cloud computation time represented in (1). The mobile
computation is the time to perform native computations. The
round-trip latency is the delay of sending request to the cloud
and receiving the response. The cloud computation delay is
the time that request is processed in server side and results are
produced. It is feasible to shrink the volume of native
computations and demand rich computing resources in the
cloud, but decreasing the round-trip delay sounds non-trivial
due to very large number of influential factors which are
briefly discusses as follows. The overall execution time is
represented by Ttotal as
T Total = T Mobile + T RT + T Cloud
III. MOBILE SERVICE HOST
The mobile host is a mobile device like smart phone or
Tablet which is able and desired to host the implemented
Service code and execute it for Service requester on demand.
The host activity is a trade-off between resource and money.
In order to host a Service, a mobile device must communicate
with the Service Governor to find the appropriate Services
according to its computing abilities and benefits. In this
architecture, Service hosting is a paid Service, hence, Service
governor should negotiate with developer (if wishes to
provide paid Services), requester, and host to agree on a
certain revenue percentage. In generic SOA, Service provider
implements or purchase Service implementation, supply its
description, and provide technical and business maintenance.
However, due to lack of mobile owners/users’ technical
competency, we argue that majority of technical and business
maintenance of the Services should be accomplished by the
Service provider. Every functional and non-functional failure
should be reported to the Service provider for escalation.
Where Tmobile is the time to perform native computation
that is negligible in this model, TRT is the round-trip delay,
and Tcloud is the computing latency of the cloud.
Computation latency depends on the computational
capabilities (CPU clock speed, RAM volume, I/O
performance, and environmental context like temperature) of
the computing server, whereas round-trip delay comprises of
four delays, including transmission, propagations, processing,
and queuing delay. Thus, roundtrip latency is:
TRT = 2 x ( T prog + T tran + T proc + T Q)
An alternative approach to utilize SOA in MCC is to
deploy Services on nearby mobile devices to be invoked with
reduced latency (utilizing alternative communication
technologies such as cellular networks and Wi-Fi can enhance
performance) without accessing the risky channel of Internet.
Nevertheless, there is no publicly acceptable incentive and
motivation neither for Service developer nor mobile hosts
(except volunteers who are willing to collaborate freely).
Developers are required to build publicly available, reusable
Services to be utilized by other programmers in creating
complex systems and applications, while mobile owners are
needed to lease their computational resources such as CPU,
memory, and most importantly battery to host and run the
Services. In order to encourage the public and realize the
vision of utilizing resources of nearby mobile devices (such as
smart phones and Tablets), we propose a market-oriented
architecture in which Service developers, brokers, and hosts
can earn for their public Services whereas Service consumers
should pay as they use (similar to the concept of Cloud
computing and utility).
ISSN: 2231-5381
Figure 1: Major Building Blocks of an Exemplary CMA
System.
TABLE 1: Initial Features of Mobile Empowerment
Approaches.
In this Section, we present a definition on mobile computing
augmentation based on the available definitions on the elevant
concepts, particularly remote execution and cyber foraging.
Additionally, the motivation for performing mobile
computation augmentation is described and taxonomy of
mobile Indeed, empowering computation capabilities of
http://www.ijettjournal.org
Page 34
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 1 - May 2014
mobile devices is not a new concept and there have been
different approaches to achieve this goal, including load
sharing, remote execution, cyber foraging, and computation
off loading that are described as follows. We have analyzed
them and summarized the analysis results in Table II. Results
in this Table are extracted from the early efforts in each
category, which are already deviated from their original
characteristics due to the research achievements.
Beside finacial benefits of hosting a Service, mobile device
will become voulnerable to attack and privacy violation. To
avoid such threats, certain mechanisms such as Sandboxing
and Service signing (signing Service code by the service
governor) can be deployed.
IV. MOBILE SERVICE LISTINGS
Service profiler monitors the overall functionality and
performance of various Services. Service provider is
responsible to maintain the Service in case of any
malfunction. However, to enhance the quality of the Services,
their overall functionality, availability, and vulnerability is 10
monitored by Service profiler to substitute low quality
services with more efficient ones if required.
Listing 1: Service requirement specification in a sample
SOAP message
<? xml v e r s i on =” 1 . 0 ” encoding =”UTF−8” ?>
...
<Hos tRequi rment s>
<P l a t f o rm>
<OS>Android</OS>
<MinVer s ion>3 . 2</ MinVer s ion>
</ P l a t f o rm>
<MinRequi r edRe sour c e s>
<CPU>512</CPU>
<Memory>2</Memory>
<S t o r a g e>5</ S t o r a g e>
<Energy>500</ Energy>
</ MinRequi r edRe sour c e s>
</ Hos tRequi rment s>
Figure 2: The Block Diagram of MOMCC
ISSN: 2231-5381
Figure 3: Layered Architecture of MOMCC
Mobile device is any non-stationary, battery-operating
computing entity able to interact with end-user and execute
transactions, store data, and communicate with the
environment using wireless technologies and varied sensors.
Smartphone, tablet, handheld/wearable computing devices,
and vehicle mount computers are mobile device instances.
Approaches that can augment mobile devices include
hardware and software. Hardware approach involves
manufacturing high-end physical components, particularly
CPU, memory, storage, and battery. Software approaches can
be —but are not limited to —computation offloading, remote
data storage, wireless communication, resource-aware
computing, fidelity adaptation, and remote service request
(e.g., context acquisition). Augmentation approaches can
increase computing capabilities of mobile devices and
conserve energy. They can be leveraged in three main
categories of applications, namely (i) computing-intensive
software such as speech recognition and natural language
processing, (ii) data-intensive programs such as enterprise
applications, and (iii) communication-intensive applications
such as online video streaming applications. The augmented
mobile device performs complex tasks that would not be done,
otherwise. Hence, the mobile application developers do not
take into account resource shortcomings of mobile devices in
developing mobile applications and users will not consider
their devices weaknesses in utilizing varied complex
applications.
Moreover, cloud infrastructures are available to end-users via
Virtual Machine (VM)9 to increase resource utilization ratio
and enhance overall security and privacy. Virtualization
technology aims to enable resource sharing in an isolated
environment called VM. It realizes execution of multiple
operating systems on a single machine and enables sharing of
large resources among multiple end-users. Users can only
access to infrastructures allocated to their VMs and cannot
access prohibited resources and contents. Table II summarizes
the comparison results of traditional and cloud-based
http://www.ijettjournal.org
Page 35
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 1 - May 2014
resources and advocates differentiations between the
conventional servers and clouds. High computing power,
elasticity, mobility support, low utilization overhead, and
security are some of the significant advantages of cloud
resources compare to the surrogates that advocate the latest
paradigm shift in mobile augmentation.
REFERENCES
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
TABLE II: Initial Features of Mobile Empowerment
Approaches.
V. CONCLUSION
The goal is to realize the vision of unrestricted
functionality, storage, and mobility regardless of underlying
constraints. Based on Service governor responsibilities we
argue that mobile network operators are likely the best
candidate to serve as the Service governor, because they are
centralized, well-established, and reputed organizations that
have been serving mobile users since long and could establish
high degree of trust with users. Successful mobile Service
hosting architecture can be utilized in various domains such as
supply chain management in which various organizations (e.g.
billing and transport) can collaborate to perform a business
activity. A Service hosted on a driver’s mobile can notify
customer orders and update delivery scheduling to the
recipient. In this paper, impacts of exploiting geographically
distributed cloud resources on performance of RMAs running
on resource-constraint smart phone are mathematically and
experimentally analyzed. Mathematical analysis of overall
execution time and energy consumption unveils that number
of intermediary hops and. data transmission volume have
significant impacts on RMA’s performance. Findings are
validated using series of experiments in real environment.
Benchmarking results advocate that exploiting distant cloud to
augment computational capabilities of resource-constraint
mobile devices is a time- and energy-intensive approach that
degrades the performance of augmented mobile applications
in MCC. Also, increase in distance, significantly degrades
predictability of RMAs time and energy.
ISSN: 2231-5381
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
M. Sharifi, S. Kafaie, and O. Kashefi, “A survey and taxonomy of
cyber foraging of mobile devices,” Communications Surveys &
Tutorials, IEEE, vol. PP, no. 99, pp. 1–12, 2011.
E. Marinelli, “Hyrax: cloud computing on mobile devices using
mapreduce,” Master Thesis, Computer Science Deptartment,
CMU, 2009.
G. Huerta-Canepa and D. Lee, “A virtual cloud computing
provider for mobile devices,” in Proc. MCS. ACM, 2010, pp. 6:1–
6:5.
Z. Sanaei, S. Abolfazli, A. Gani, and R. H. Khokhar, “Tripod of
requirements in horizontal heterogeneous mobile cloud
computing,” in Proc. CISCO, 2012.
T. Erl, Service-oriented architecture: concepts, technology, and
design. Prentice Hall PTR, 2005.
Gartner. (2012, Feb) Worldwide smartphone sales soared in fourth
quarter of 2011 with 47 percent growth. Gartner. [Online].
Available: http://www.gartner.com/it/page.jsp?id=1924314
M. Asif, S. Majumdar, and R. Dragnea, “Hosting web services on
resource constrained devices,” in Proc. ICWS, July 2007, pp. 583–
590.
M. Sharifi, S. Kafaie, and O. Kashefi, “A survey and taxonomy of
cyber foraging of mobile devices,” Communications Surveys &
Tutorials, IEEE, vol. PP, no. 99, pp. 1–12, 2011.
E. Marinelli, “Hyrax: cloud computing on mobile devices using
mapreduce,” Master Thesis, Computer Science Deptartment,
CMU, 2009.
G. Huerta-Canepa and D. Lee, “A virtual cloud computing
provider for mobile devices,” in Proc. MCS. ACM, 2010, pp. 6:1–
6:5.
M. Papazoglou and W. Van Den Heuvel, “Service oriented
architectures: approaches, technologies and research issues,” The
VLDB journal, vol. 16, no. 3, pp. 389–415, 2007.
M. Satyanarayanan, “Pervasive Computing: Vision and
Challenges,” IEEE Pers. Commun., vol. 8, no. August, pp. 10–17,
2001.
N. Tolia, D. G. Andersen, and M. Satyanarayanan, “Quantifying
interactive user experience on thin clients,” IEEE Comput., vol.
39, no.3, pp. 46–52, 2006.
J. H. Christensen, “Using RESTful web-services and cloud
computing to create next generation mobile applications,” in Proc.
ACM SIGPLAN Conference on Object-Oriented Programming
Systems, Languages & Applications, Orlando, Florida, 2009, pp.
627–634
L. Zhang, B. Tiwana, Z. Qian, Z. Wang, R. P. Dick, Z. M. Mao,
and L.Yang, “Accurate online power estimation and automatic
battery behavior based power model generation for smartphones,”
in Proc.ACM International Conference on Hardware/software
codesign and system synthesis, 2010, p. 105.
S. Abolfazli, Z. Sanaei, Gani Abdullah, F. Xia, and L. T. YANG,
“Rich Mobile Application: Genesis, Taxonomy, and Open Issues,”
J. Netw. Comput. Appl., in Press, 2013.
“BCC Research Global Markets for Smartphones and PDAs
(IFT068A)” May 2009, p. 7215, 2014.
S. Abolfazli, Z. Sanaei, and A. Gani, “Mobile Cloud Computing:
A Review on Smartphone Augmentation Approaches,” in Proc.
WSEAS International Conference on Computing, Information
Systems, and Communications, Singapore, Feb 2012.
S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, and B. Rajkumar,
“Cloudbased Augmentation for Mobile devices: Motivation,
Taxonomies, and Open Challenges,” IEEE Commun. Surv. Tut, in
Press, 2013.
Z. Sanaei, S. Abolfazli, A. Gani, and R. H. Khokhar, “Tripod of
Requirements in Horizontal Heterogeneous Mobile Cloud
Computing,” in Proc. WSEAS International Conference on
Computing, Information Systems, and Communications,
Singapore, Feb 2012.
Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya, “Heterogeneity in
Mobile Cloud Computing: Taxonomy and Open Challenges,”
IEEE Commun. Surv. Tut, In Press, 2013.
http://www.ijettjournal.org
Page 36
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 1 - May 2014
Author’s Profile
Y.Padma,
Assistant Professor,
PVPSIT
K.Pavan kumar,
Assistant Professor,
Usharama College Of
Engg. & Tech.
A.DurgaBhavani,
Assistant Professor,
Y.Padma is Assistant Professor
in department of Information
Technology, PVPSIT, Kanuru,
and Vijayawada, India. She
holds M.Tech and B.Tech in
2006 and 2002 respectively. She
has 11 years of teaching
experience.
Her
research
interests
are
Software
Architecture,
Agile
Technologies
and
Natural
Language Processing.
K.Pavan kumar received the
M Tech degree from ANU in
2010. Currently he is working
as Assistant Professor in
UsharamaCollegeofEngineeri
ng&Technology,Telaprolu,
Andhra Pradesh, India.He has
seven years of teaching
experience .His research
interests
are
networks,
Network
security
and
compiler design.
A.DurgaBhavani received the M
Tech degree from JNTUH in
2008. Currently she is working
as Assistant Professor in
Usharama
College
of
Engineering & Technology,
Telaprolu, Andhra Pradesh,
India. She has seven years of
teaching
experience.
Her
research interests are networks,
Network security and compiler
design.
Usharama College Of
Engg. & Tech.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 37
Download