Vous êtes sur la page 1sur 10

Journal of Recent Research in Engineering and Technology 3(2), 2016, pp29-38

Article ID J21604 ISSN (Online): 2349 –2252, ISSN (Print):2349 –2260


© Bonfay Publications, 2016

Research Article

Energy-Efficient Fault-Tolerant Data Storage and


Processing in Mobile Cloud
T.Aswini1, M.balamurugan2, Prabhu3
1PG Scholar, Department of computer Science and Engineering, kaveryEngineering college, India
2,3Assistant Professor, Department of computer Science and Engineering, kaveryEngineering college,
India
Received 4 January 2016; Accepted 21 February 2016

ABSTRACT

For mobile devices used in dynamic networks (that is, with frequent changes in topology due to
node failure / unavailability and mobility in a mobile cloud) largely ignored, however, remained
challenges in terms of reliability and efficiency. To the best of our knowledge, we can first have to
address these challenges in an integrated manner for both data storage and processing in mobile
cloud, an approach we call k-out-of-n-Computing. In our solution, mobile devices successfully
retrieve or process data in the most energy-efficient manner, as long as k n are accessible from
remote servers. Through a real implementation of the system, we demonstrate the feasibility of our
approach. the first frame fault tolerant and energy-efficient Remote Storage & processing under a
dynamic network topology, that is, to support mobile cloud. Our framework aims, for applications
that require an energy-efficient and reliable distributed data storage and processing in a dynamic
network. For example, military operations or civil protection. Three famous fault tolerance
strategies are initiated in the following formulas to estimate the probability of default of the fault-
tolerant modules. In this work, probability of default of a cloud component is described as the
probability that precipitates an invocation of this component. The cost of the failure probability is
in the range of [0.1]. In particular, we examine how data and processes with k-out such reliability
of-n to store the data stored in mobile cloud that: 1) minimizing the energy consumption for
distributed data collection; 2) minimizing the energy consumption of distributed data for
processing and 3) data processing and dynamic topology changes are taken into account
distributed. Scheduling techniques such as the decision set to be taken by scheduling manager, if
the assigned node cloud struck leaves two planning techniques. These techniques are: restoration
technique and fault tolerance technology.

Keywords: Mobile cloud, dynamic networks, k-out-of-n-Computing, energy-efficient Remote


Storage & processing, dynamic topology, fault tolerance technology.

29
T. Aswini et al, Journal of Recent Research in Engineering and Technology

reliability requirements. Mobile Cloud


1. INTRODUCTION Computing (MCC) is the combination of
cloud computing, mobile computing and
To support the first frame, fault-tolerant wireless networks extend computing
and energy-efficient remote storage and resources for mobile users to bring network
processing under a dynamic network operators, as well as cloud computing
topology, that is, mobile cloud. Our providers. The ultimate goal of the MCC is to
framework is aimed for applications make possible a variety of mobile devices
requiring energy efficient and reliable running rich mobile applications with a rich
distributed data storage and processing in a user experience. MCC provides business
dynamic network need. For example, opportunities for mobile operators and
military operations or civil protection. We cloud providers. More comprehensively,
integrate formed of only mobile devices, the MCC can be defined as "rich mobile
k-out-of-n reliability mechanism in computing technology, a variety of mobile
distributed computing in mobile cloud. k- devices unified elastic resources of various
out-of-n, a well-studied subject in reliability cloud and network technologies to unlimited
control [6], ensures that a system of n functionality, storage and mobility uses all
components properly, as long as k or more through the channel of Ethernet or Internet
components of work operates. Specifically, to serve at any time regardless of
we examine how to store the data and heterogeneous environments and to the pay-
methods, the data stored in mobile cloud as-you-use principle.MCC use approaches
with k out of n reliability, so that: 1) rake augmentation based platforms that can
minimizing the energy consumption for use mobile devices resource-constrained
distributed data collection; 2) The energy computing resources of various cloud-based
consumption for the processing of the resources. In MCC, there are four types of
distributed data is minimized; and 3) data cloud-based resources, namely 1) remote
processing and distributed into account motionless clouds 2) near immobile
dynamic topology changes. In our proposed computing entities, 3) near mobile
frame, a data object is encoded and divided computing devices and 4) hybrid
into n fragments, and then stored on (combination of three different model).
different nodes n. As long as k or more of the Giant clouds like Amazon EC2 are in the
n nodes are available, the data object can be distant immovable group during cloudlet or
successfully restored. Similarly, another surrogates are members near immobile
group assigned by n nodes tasks for computing units. smartphones, Tablets ,
processing the stored data and all tasks, handheld devices, and wearable computing
while k or more nodes finish the n devices are part of the third group of cloud-
processing the assigned tasks are completed. based resources..
The parameters k and n the degree of
reliability and different DK determine; NTH 2. RELATED WORK
pairs can be allocated to data storage and
data processing. System administrators The Case for VM-based Cloudlets in Mobile
choose these parameters based on their Computing

30
Journal of Recent Research in Engineering and Technology T. Aswini et al,

The technical barriers to this mobile opportunity, it is to be used by the


transformation, and proposes a new system dazzling variety of Flash-current
architecture to overcome them. (Leong et al) applications in app stores from Apple,
propose that the architecture, a mobile user Google, Microsoft and others met. Now
uses virtual machine (VM) technology to mobile users look at songs of audio samples;
instantiate quickly customized service Play games; Capture, edit and upload video;
software on a nearby cloudlet and then uses analyze, index and aggregate their mobile
this service via a wireless LAN. The mobile photo collections; analyzing their finance;
device typically acts as a thin client in relation and manage their personal health and
to the Service. A cloud is a trusted, resource- wellness. Change also new rich media,
rich computer or group of computers that is mobile augmented reality and data analysis
well connected to the Internet and for use by applications, remember how mobile users
mobile devices in the vicinity. Our strategy of from experience and understand the world
temporarily adapted related infrastructure as around them. We combine partitioning,
a mobile device moves with its user through migration with merging, and on-demand
the physical world use is called cloudlet based instantiation of partitioning to address these
resource-rich mobile computing. (George et challenges. Our prototype delivers up to 20x
al) discuss that the Crisp interactive response speedup and 20x energy reduction for the
that is for seamless reproduction of the simple applications we tested, without
human perception of essential is, of cloudlet programmer involvement, demonstrating
easily achieved in this architecture because of feasibility for the approach, and opening up
the physical proximity and a hop network a path for a rich research agenda in hybrid
latency. With a cloud and there, which obtain mobile-cloud systems.
the peak bandwidth requirements of multiple
users in reactive production and media such Think Air: Dynamic resource allocation
as HD video and high resolution images and parallel execution in cloud for mobile
easier. (Cuervo et al., ) Fast adaptation of code offloading
infrastructure for various applications proves Think Air, a new mobile cloud computing
to be an important criterion for this framework that the best results from the two
architecture. We present the results of a worlds. Think to create air MAUI lack of
proof-of-concept prototypes that suggest that scalability addresses on the cloud virtual
this requirement can be in fact met by VM machines (VMs) a complete smart phone
technology. system, and removes the restrictions on
applications / on / ambient conditions, the
Clone Cloud: Elastic Execution between Clone Cloud induced by an online process
Mobile Device and Cloud level of loading Adoption. Moreover think Air
(1) to an efficient way provides on-demand
Connectivity provides instant access to the resource allocation, and (2) utilizes
available data processing, storage and parallelism of the dynamic creation, resume
communications on commercial clouds, near and destroy VMs in the cloud to perform
wireless hot spots with computing resources when needed. To the best of our knowledge,
or on the user's PC and plugged into laptop. thought Air is the first to address these two
This wealth of cloud resources and the aspects in the mobile cloud. Supporting on-

31
T. Aswini et al, Journal of Recent Research in Engineering and Technology

demand resource allocation is critical as capabilities beyond by using remote


mobile users require different computing processing and storage. Fortunately, often a
power dynamically adjust based on their mobile device applies, possibly
workloads and deadlines for tasks and intermittently, many units capable they
therefore the cloud provider needs and their compute resources lending. This
resources to allocate to meet customer environment provides a range of computing
expectations. Existing work does not provide contexts for remote computing in a mobile
any mechanism to support on-demand environment. An ultimately successful
resource allocation, which is an absolute system must have the flexibility to use a
necessity given the variety of applications blend of the options on this spectrum. On
that can be run on smart phones, in addition one side of the spectrum, the use of standard
to the high variance of CPU and memory cloud computing resources is to relieve the
resources these applications could demand. "heavy lifting" that are required in some
The problem of exploiting parallelism mobile applications to server or server
becomes important because mobile cluster specifically designated. A related
applications require increasing amounts of technique for remote processing of mobile
processing power, and parallelization reduces applications suggests offer instantiated
the execution time and energy consumption computing resources using cloud, the
of these applications with significant margins software in real-time virtual machine
when compared to non-parallel executions of technology using near.
the same.
Serendipity: Enabling Remote Computing DistressNet: A Wireless Ad Hoc and
among Intermittently Connected Mobile Sensor Network Architecture for
Devices Situation
Management in Disaster Response
Mobile applications have become an First, disasters are infrequent, and the
indispensable part of daily life. This was location, communications requirements, and
made possible by two directions. First truly sensing needs of the next disaster cannot be
portable mobile devices such as smart predicted. Existing WASN systems often fill
phones and tablet PCs, are increasingly niche needs, like specialized chemical
capable devices with processing and detection, that are ill suited for general
memory functions that make significant deployment. Other solutions, like building
improvements step with each generation. monitoring systems, require pre-disaster
While power in mobile devices continues installation and maintenance. To succeed,
tethered device is forced to be relative, allow WASNs supporting disaster response must
advances in battery and power management be extensible, flexible, adaptive, and
technology mobile devices to manage more designed to leverage and incorporate
durable calculations with less strain on the emerging technologies. A second challenge
available power. A second trend, which is involves scale and standardization. Small
directly relevant to our work, is the disasters, like a localized flood, normally
availability of improved connectivity options involve resources from a single jurisdiction
for mobile devices. These have enabled and are organized using simple adhoc
applications that make the individual device command and control (C2). Larger disasters,

32
Journal of Recent Research in Engineering and Technology T. Aswini et al,

like a hurricane, may incorporate thousands node 802.11b test show that ETX improved
of scores of jurisdictions. To manage performance significantly over the
complexity at this scale, responders often widespread minimum hop count metric. For
organize following Incident Command long distances, the increase in throughput is
System (ICS) guidelines [4]. To operate in often by a factor of two or more, suggesting
this difficult environment, WASNs must that ETX make useful are greater than
provide standard architectures and networks and paths longer. We also present a
composable, scalable networks structured to simple model for predicting how the package
conform to ICS standards. Lack of delivery ratio varies with packet size and
communications infrastructure is a third detailed measurements that characterize the
challenge faced in larger disasters. Entire test environment of the distribution of Link
regions suffer from degraded delivery conditions and route through.
communications, and remaining capacity is
exhausted by the demands of victims. Online Prediction of Battery Lifetime for
Disaster responders must arrive with their Embedded and Mobile Devices
own communications. WASNs designed for
disaster response must provide standalone, We investigate online statistical approach to
robust, and pervasive communications battery life prediction that connects observed
sufficient to support the geographic recently Dissipation \ history "with pre
coverage and mobility requirements of its calculated online benchmark measurements.
users. By dynamically integrating on-line
measurements, our approach is able to make
High-Throughput Routing for Multi-Hop predictions that take into account the
Wireless Networks "recovery effect" that the batteries experience
The expected transfer count (ETX) metric is different workloads when they are
nd a new route metric for fi high throughput discharged, and the charge cycle causes the
paths in multi-hop wireless networks. The battery power changes, batteries are
ETX of a path is the expected total number of recharged again and again. These systems try
packet transmissions (including repeats) to make accurate predictions derivative off-
required to successfully deliver a package in line available for use in design or analytical
this way. For practical networks, routes with contexts. Efficient analysis methods, such as,
the minimum ETX have the highest and consider the problems of online
throughput. The ETX metric contains the prediction, but do not include the statistical
effects of link loss ratios, asymmetry in the components needed to quickly analyze
loss ratios between the two directions of each dynamically changing workload and working
compound, and interference between the conditions.
successive links of a path. A busy network, the
ETX route metric is used to also maximize
3. PROPOSED WORK
total network throughput. We describe the
design and implementation of an ETX metric We propose the first frame fault tolerant
for DSDV and DSR routing protocols, as well and energy-efficient remote support Storage
as modifications to DSDV and DSR that it & processing under a dynamic network
works well with ETX. Measurements of a 29- topology, that is, mobile cloud. Our
framework aims, for applications that require

33
T. Aswini et al, Journal of Recent Research in Engineering and Technology

energy-efficient and reliable distributed data 5. METHOD


storage and processing in a dynamic network.
For example, military operations or civil 5.1 Recovery Technique
protection. Three famous fault tolerance
strategies are initiated in the following In this technique, the scheduling manager
formulas to estimate the probability of delivers the jobs to the appropriate node
default of the fault-tolerant modules. In this based on the order size and the node rate
work, probability of default of a cloud value. While the job is running, the node
component is described as the probability communicates with Tracker Scheduling
that precipitates an invocation of this Manager and periodically sends the job stat.
component. The cost of the failure probability The scheduling manager, the stat store
is [0.1] scheduling techniques such as the temporarily until the job is done. During job
decision set in the range of which should be execution, when communication is lost to the
taken by scheduling manager, if the assigned node Tracker (nodes from the cloud), the
node cloud struck leaves two planning scheduling manager the last job to start a new
techniques. These techniques are: recovery idle nodes and continues to run the job from
technique and fault tolerance technique. the last stat. Then the recovery technique is
shown in fig 2.

4. SYSTEM DESIGN

The following fig 1 shows that the


proposed system architecture for establishing
the energy efficient storage in the mobile
cloud
Scheduling
Technique

Fig 2: Recovery technique


Recovery Technique Fault - Tolerance
Technique
5.2 Fault-tolerance Technique

In this technique, the scheduling manager use


Recovery Block two nodes for each job. Each node runs a copy
of the same order. Using the scheduling
manager a periodic heartbeat calling the node
N Version Tracker to show that the node is alive. if a
Programming node is lost (nodes leaving the cloud), read
(NVP)
the Scheduling Manager the current job stat
Fig 1: Proposed system architecture from the active node and assign it to a new
idle nodes, the job execution to continue with
the active node. Then the fault tolerance
technique is shown in fig 3.

34
Journal of Recent Research in Engineering and Technology T. Aswini et al,

6. EXPERIMENTAL RESULTS

1
0.8

0.6

Probability
Fig 3: Fault-Tolerence technique 0.4

0.2
5.3 Recovery Block (RB).

Failure
Recovery block is a known mechanism in
0
software fault tolerance used. It called 0.20% 0.40% 0.60% 0.80% 1%

System
structuring redundant modules are available,
in which stand-in components to appeal to Fig 4: Component Failure
succession when the primary component is Probability
not happening. A recovery block fails just
when all redundant mechanism fails: Existing System
∏ 1)
Proposed System
The failure probability f a recovery block can
be considered where n is the number of Impact of component failure
redundant mechanism and fi is the probability
probability of failure of the sixth part.

5.4 N-version programming (NVP).

N-version programming, also known as multi-


version programming, which is a software
fault tolerance, where several functionally
equivalent programs are also named as
versions autonomously generated from the
same original specifications. While the NPV
technique to use cloud applications
implemented, it will be independent
functionally equivalent cloud component
decided by majority decision citing parallel Fig 5: Execution time for different
and the final result. components

35
T. Aswini et al, Journal of Recent Research in Engineering and Technology

suggest an efficient fault tolerance strategy


selection algorithm NVP strategies on the
importance of components based on the
boundary conditions, to provide. This survey
is to assist us a crystal clear idea about the
broad dimensions of the energy consumption
for the procurement and processing of
Fig 6: Comparison of performance before distributed data and the fault-tolerant under
and after scheduling Technique the dynamic network topology.

In existing methods for mobile 8. Future Work


devices used in dynamic networks, the In the future, to use the derived information
challenges in terms of reliability and and enhance the framework for an efficient
efficiency remain largely ignored. To the best and effective cloud services monitoring and
of our knowledge, we can first have to application design. The new system is useful
address these challenges in an integrated when the following enhancements are made
manner for both data storage and processing in future.
in mobile cloud, an approach we call k-out-of- • The application can be Web service
n-Computing. In our proposed method, we oriented, so that it will be further developed
first fault tolerant framework and energy- in any platform.
efficient remote support Storage & processing • The application, if developed as a web page,
under a dynamic network topology, that is, can be used from cloud.
mobile cloud. Our framework aims, for • The algorithm can be further improved, so
applications that require an energy-efficient that the cost of the path can be further
and reliable distributed data storage and reduced.
processing in a dynamic network. Scheduling • The energy update automatically re-
techniques such as the decision set to be configured the storage nodes.
taken by scheduling manager, if the assigned • Currently, the scheme has a somewhat less
node cloud struck leaves two planning memory overhead, while in the more complex
techniques. These techniques are: recovery applications; the program may use more
technique and fault tolerance technique can memory. The future study is in the field of
be used to tolerate the fault tolerance high-order memory savings.
strategy.
REFRENCES
7. CONCLUSION [1] M. Satyanarayanan, P. Bahl, R. Caceres,
and N. Davies, “The case for VM-based
In the mobile cloud paradigm, there is a need cloudlets in mobile computing,” IEEE
for effective scheduling technique strategy Pervasive Comput., vol. 8, no. 4, pp. 14–23,
that is necessary to achieve maximum profit Oct.-Dec. 2009.
for cloud service providers and maximize [2] B.-G. Chun, S. Ihm, P. Maniatis, M. Naik,
user satisfaction. This paper summarizes the and A. Patti, “CloneCloud: Elastic execution
architecture, planning techniques, find the between mobile device and cloud,” in Proc.
meaning components, we automatically 6th Conf. Comput. Syst., 2011, pp. 301–314.

36
Journal of Recent Research in Engineering and Technology T. Aswini et al,

[3] S. Kosta, A. Aucinas, P. Hui, R. Mortier, and [12] D. Leong, A. G. Dimakis, and T. Ho,
X. Zhang, “ThinkAir: Dynamic resource “Distributed storage allocation for high
allocation and parallel execution in the cloud reliability,” in Proc. IEEE Int. Conf. Commun.,
for mobile code offloading,” in Proc. IEEE 2010, pp. 1–6.
Conf. Comput. Commun., 2012, pp. 945–953. [13] M. Aguilera, R. Janakiraman, and L. Xu,
[4] C. Shi, V. Lakafosis, M. H. Ammar, and E. W. “Using erasure codes efficiently for storage in
Zegura, “Serendipity: Enabling remote a distributed system,” in Proc. Int. Conf.
computing among intermittently connected Dependable Syst. Netw., 2005, pp. 336–345.
mobile devices,” in Proc. 13th ACM Int. Symp. [14] M. Alicherry and T. Lakshman, “Network
Mobile Ad Hoc Netw. Comput., 2012, pp. 145– aware resource allocation in distributed
154. clouds,” in Proc. IEEE Conf. Comput.
[5] S. M. George, W. Zhou, H. Chenji, M. Won, Commun., 2012, pp. 963–971.
Y. Lee, A. Pazarloglou,R. Stoleru, and P. [15] A. Beloglazov, J. Abawajy, and R. Buyya,
Barooah, “DistressNet: A wireless Ad Hoc and “Energy-aware resource allocation heuristics
sensor network architecture for situation for efficient management of data centers for
management in disaster response,” IEEE cloud computing,” Future Generation Comput.
Commun. Mag., vol. 48, no. 3, pp. 128–136, Syst., vol. 28, no. 5, pp. 755–768, 2012.
Mar.2010. 16] C. Liu, X. Qin, S. Kulkarni, C. Wang, S. Li, A.
[6] D. W. Coit and J. Liu, “System reliability Manzanares, and S. Baskiyar, “Distributed
optimization with k-outof-n subsystems,” Int. energy-efficient scheduling for data-intensive
J. Rel., Quality Safety Eng., vol. 7, no. 2, pp. applications with deadline constraints on
129–142, 2000. data grids,” in Proc. IEEE Int. Perform.,
[7] D. S. J. D. Couto, “High-throughput routing Comput. Commun. Conf., 2008, pp. 26–33.
for multi-hop wireless networks,” Ph.D. [17] D. Shires, B. Henz, S. Park, and J. Clarke,
dissertation, Dept. Elect. Eng. Comput. Sci., “Cloudlet seeding: Spatial deployment for
MIT, Cambridge, MA, USA, 2004. high performance tactical clouds,” in Proc.
[8] Y. Wen, R. Wolski, and C. Krintz, “Online World Congr. Comput. Sci., Comput. Eng.,
prediction of battery lifetime for embedded Applied Comput., 2012, pp. 1–7.
and mobile devices,” in Proc. 3rd Int. Conf. [18] D. Neumann, C. Bodenstein, O. F. Rana,
Power-Aware Comput. Syst., 2005, pp. 57–72. and R. Krishnaswamy, “STACEE: Enhancing
[9] A. Leon-Garcia, Probability, Statistics, and storage clouds using edge devices,” in Proc.
Random Processes for Electrical Engineering. 1st ACM/IEEE Workshop Autonomic Comput.
Englewood Cliffs, NJ, USA: Prentice Hall, 2008. Economics, 2011, pp. 19–26.
[10] S. Huchton, G. Xie, and R. Beverly, [19] D. Huang, X. Zhang, M. Kang, and J. Luo,
“Building and evaluating a kresilient mobile “MobiCloud: Building secure cloud
distributed file system resistant to device framework for mobile computing and
compromise,” in Proc. Mil. Commun. Conf., communication,” in Proc. IEEE 5th Int. Symp.
2011, pp. 1315–1320. Serv. Oriented Syst. Eng., 2010, pp. 27–34.
[11] A. G. Dimakis, K. Ramchandran, Y. Wu, [20] P. Stuedi, I. Mohomed, and D. Terry,
and C. Su, “A survey on network codes for “WhereStore: Location based data storage for
distributed storage,” Proc. IEEE, vol. 99, no. 3, mobile devices interacting with the cloud,” in
pp. 476–489, Mar. 2011. Proc. 1st ACM Workshop Mobile Cloud

37
T. Aswini et al, Journal of Recent Research in Engineering and Technology

Comput. Serv.: Soc. Netw.Beyond, 2010, pp.


1:1–1:8.
[21] S. Sobti, N. Garg, F. Zheng, J. Lai, Y. Shao,
C. Zhang, E. Ziskind, A.Krishnamurthy, and R.
Y. Wang, “Segank: A distributed mobile
storage system,” in Proc. 3rd USENIX Conf.
File Storage Technol., 2004, pp. 239–252.
[22] C. Chen, M. Won, R. Stoleru, and G. Xie,
“Resource allocation for energy efficient k-
out-of-n system in mobile ad hoc networks,”
in Proc. 22nd Int. Conf. Comput.r Commun.
Netw., 2013, pp. 1–9.
[23] C. A. Chen, M. Won, R. Stoleru, and G. Xie,
“Energy-efficient fault-tolerant data storage
and processing in dynamic network,”in Proc.
14th ACM Int. Symp. Mobile Ad Hoc Netw.
Comput., 2013,pp. 281–286.
[24] E. Cuervo, A. Balasubramanian, D.-k. Cho,
A. Wolman, S. Saroiu, R. Chandra, and P. Bahl,
“MAUI: Making smartphones last longer with
code offload,” in Proc. 8th Int. Conf. Mobile
Syst., Appl., Serv., 2010, pp. 49–62.

38

Vous aimerez peut-être aussi