Professional Documents
Culture Documents
Wireless Grids: Amin Ghadersohi
Wireless Grids: Amin Ghadersohi
Wireless Grids: Amin Ghadersohi
Amin Ghadersohi
Department of Computer Science and Engineering, SUNY-Buffalo,
NY.
4/4/2005
Introduction
What is the Grid?
What is Grid Computing?
Wireless Grids
Motives and Driving Forces
Infrastructure
Performance
Hybrid Grid – Project Proposal
Grid Examples
*I. Foster, “What is the Grid? A Three Point Checklist,” Argonne National Laboratory,
http://www- fp.mcs.anl.gov/~foster/Articles/WhatIsTheGrid.pdf,
Wireless Grids - Amin Ghadersohi 2002. 5
What is the Grid?
Ian Foster, Carl Kesselman, Jeffrey M. Nick, Steven Tuecke, "The Physiology of the Grid: An Open
Grid Services Architecture for Distributed Systems
Wireless Integration."
Grids - Amin Open Grid Service Infrastructure
Ghadersohi 9
WG, Global Grid Forum, June 2002.
Related Technologies
Cluster computing
Primarily concerned with a collection of homogeneous computational
resources.
Physically bound.
Could be a grid node.
CORBA
CORBA was a precursor to the Web (grid) services world we live in today.
Foundation for Java Remote Method Invocation (RMI)
DCE
DCE (Distributed Computing Environment) is not so much an architecture as
it is an environment.
Facilitate distributed computing.
P2P
E.g.: KaZaA
Lacks a central point of management.
anonymity and some protection from being traced.
Scalability
More tolerant of single-point failures than grids
grid-enabled UDC
systems
Utility computing
clusters Tru64, HP-UX, On-demand
Linux
Open VMS clusters,
Service-orientation
TruCluster, MC Virtualization
ServiceGuard
today shared, traded resources
(Based on a slide from HP) Wireless Grids - Amin Ghadersohi 11
Utility Computing
NETWORK
IMAGING COMPUTATIONAL
INSTRUMENTS RESOURCES
LARGE DATABASES
“ Grid Computing: Concepts, Applications, and Technologies” Ian Foster, May 2002
Wireless Grids - Amin Ghadersohi 13
The Global Community
Introduction
What is the Grid?
What is Grid Computing?
Wireless Grids
Motives and Driving Forces
Infrastructure
Performance
Hybrid Grid – Project Proposal
Grid Examples
Dynamic model
Dynamic
Mobility Internet
Internet
Connectivity
Nature
Stable users
Stable servers
LAN
LANGrid Intermittent
Heterogeneity Grid
Availability
Static model
Security
http://www.wirelessgrids.net
Wireless Grids - Amin Ghadersohi 17
Driving forces
Geographic
Wireless databases
Forest fire links
Firemen
Fire simulation
Weather forecast
Firemen
Computation center
T. Phan, L. Huang, C. Dulan, “Challenge: Integrating Mobile Wireless Devices Into the Computational Grid”,
Proceedings of the 8th annual international
Wirelessconference onGhadersohi
Grids - Amin Mobile computing and networking. September 2002,21
pp 271-278.
Grid Classification by Architecture
Classification by Architecture
Degree of heterogeneity of the actual devices
Level of control exercised by those who own and
administer the devices.
Local Cluster or Homogeneous Wireless
Grid
Wireless devices that share the same hardware
architecture and the same operating systems.
E.g.: Network of mobile handheld devices for
coordinating medical personnel in the hospital.
A. Agrawal, D. Norman, A. Gupta, “Wireless grids: approaches, architectures, and technical challenges”, MIT
Sloan Working Paper No. 4459-04; Eller College Working Paper No. 1016-05
Wireless Grids - Amin Ghadersohi 22
Grid Classification by Architecture
Wireless Intra-Grids
Encompasses wireless devices that belong to multiple
divisions or communities within an actual organization
(AO).
Divisions may be located in different geographies.
Divisions may be governed by a separate set of policies.
But there exists a level of trust and oversight so that “ground
truth” may be known with respect to identity and
characteristics.
E.g.: wireless grid that simultaneously supports the mobile
sales force of a company and the networks of wireless
sensors used by the manufacturing division for tracking
inventory
Inter-Grid
Encompasses multiple AOs and transcends greater
amounts of geographical, organizational, and other types of
differences, such as ones related to intellectual property
rights and national laws.
Resource management and policy integration (security,
authentication and data management tasks) attain greater
complexity due to the scalability requirements.
A (potentially) universally accepted method for the
composition of declarative policies must be proposed and
accepted.
Commonly accepted semantics for the expression of policy.
A. Agrawal, D. Norman, A. Gupta, “Wireless grids: approaches, architectures, and technical challenges”, MIT
Sloan Working Paper No. 4459-04; Eller College Working Paper No. 1016-05
Wireless Grids - Amin Ghadersohi 25
Grid Classification by Usage Pattern
Computational Grid
Virtual metacenter.
Large amount of computing and data resources.
Data Grid
Provide shared and secure access to distributed data.
Large scale data processing and management that require
the participation of world wide researchers.
Utility Grid
Human interface of computational Grid and Data Grid.
“Parasitic Computing,” A-L Barabasi, V. W. Freeh, H. Jeong, J. B. Brockman, Nature, Vol. 412, 30 August 2001.
Wireless Grids - Amin Ghadersohi 26
Wireless Grid Contributions
Computational Grid
Ability to borrow computational resources from
others.
Power limitations of mobile devices limits their
computational capabilities.
Cooperative or parasitic*.
E.g.: Wireless sensor network used to monitor
conditions for predicting natural calamities like
earthquakes or volcanoes.
“Parasitic Computing,” A-L Barabasi, V. W. Freeh, H. Jeong, J. B. Brockman, Nature, Vol. 412, 30 August 2001.
Wireless Grids - Amin Ghadersohi 27
Wireless Grid Contributions
Data Grid
Provide shared and secure access to distributed
data.
Integration and reconciliation of underlying data
semantics continues to challenge evolving technology.
Responses processed
Hospital issues query to
and reconciled
medical history databases
through its mobile network
Utility Grid
Also referred to as Access Grid
Ubiquitous access to specialized pieces of
software and hardware
Users can request resources when needed (on-
demand)
On-demand access to all kinds of resources
Only be charged for the amount being used.
Can subsume both Computational and Data grids
Instantaneous
decisions and
Traffic conditions
Transactions and routing
Commercial products
and services
Communications Bandwidth
Remote access, and high QoS.
Multiplicity of Applications
Ubiquitous access to a wide variety of
applications.
Overcome the need to install these applications on
separate mobile devices.
2 http://www.ietf.org/html.charters/manet-charter.html
Brokering.
Shahid H. Bokhari, "Partitioning problems in parallel, pipelined and distributed computing." IEEE
Transactions on Computers, 37(1):48-57,
Wireless1988.
Grids - Amin Ghadersohi 43
Saving energy.
“Energy crisis” of mobile devices
Performance also concerns energy
Energy consumption estimation
Simulation: SimplePower, Wattch
Empirical methods
Ways to save energy
Dynamic power management (DPM) policies: tradeoff
between energy and performance
Spin down disks
Turn off screen
Network interface hibernation
Processor voltage scaling
Comprehensive stochastic model
Computation offloading
-,0/0.0
Off/0.2 On,1/0.2
Service Provider On/0.0 Queue Off,1/1.0
Service Requestor 0.05
-,0/1.0 On,0/0.2
Off/0.8 on off Off/1.0 0 1 0.95 0.88
On,1/0.8 On,1/1.0 0 1
On/1.0 On/0.97
Off,1/0.0 Off,-/1.0
Off/0.0 on,0/0.8 0.12
On/0.03 On,1/0.0
Off,-/0.0
G. A. Paleologo, L. Benini, A. Bogliolo, G. De Micheli, "Policy Optimization for Dynamic Power
Management." Design Automation Conference,
Wireless Gridspp. 182-187,
- Amin June 1998.
Ghadersohi 45
Computation offloading
Scheduling in terms of energy:
Offloading can reduce computation, but communication also
consumes energy
Optimize energy consumption by offloading part of computation
Model a program
Task definition: each call site (statically); each invocation
(dynamically)
Cost graph
Relationship between tasks and data
Node weight indicating power consumption of computation and
communication
Edge weight indicating mean number of times for tasks accessing data
Aggregate the consumption from the cost graph and optimize
Zhiyuan Li, Cheng Wang, Rong Xu, "Computation offloading to save energy on handheld devices: a
partition scheme." In Proceedings ofWireless
the international
Grids - Aminconference
Ghadersohi on compilers, architecture, and 46
synthesis for embedded systems, Atlanta, Georgia, USA, 2001.
Disconnected Operation
Another fact affects performance: unpredictable
network link quality
Solution: adaptation
Disconnected operation in Coda file system
Definition
a mode of operation that enables a client to continue
accessing critical data during temporary failures of a shared
data repository.
Solution: proxy + cache
Hoarding
Venus: client-side proxy
Logical
Three working states Disconnection reconnection
Hoarding (Caching)
Emulation
Reintegration Emulation Reintegration
Physical
reconnection
James J. Kistler, M. Satyanarayanan, "Disconnected Operation in the Coda File System." ACM
Transactions on Computer Systems,Wireless
Feb. 1992,
GridsVol. 10,Ghadersohi
- Amin No. 1, pp. 3-25. 47
Application-aware adaptation
Application-aware adaptation model
Operating System notifies application of relevant changes.
Accurate and timely information.
Application decides how to adapt to the changes Odyssey
Design of Odyssey: proxy again warden
viceroy
Extension of NetBSD warden
Typed data
warden
Working model: Application
Application requests data within a range of availability
Odyssey returns data or notify change upcall
Application re-request data of different quality using syscall Odyssey
different range call
Implemented as VFS in NetBSD system interceptor
Kernel
Requests are intercepted as system call
Advantages: agility, smooth running, support of concurrency
Brian D. Noble, M. Satyanarayanan, Dushyanth Narayanan, James Eric Tilton, Jason Flinn, Kevin R.
Walker, "Agile Application-Aware Adaptation for Mobility."
Wireless Grids In Proceedings of the 16th ACM
- Amin Ghadersohi 48
Symposium on Operating System Principles, St. Malo, France, Oct 1997.
Mobile Security
Difficulties of security in wireless mobile
environment
Inherent vulnerability of wireless media
Performance impact!
Charon: indirect authentication using Kerberos
Extend Kerberos by inserting a remote proxy (again!!)
between client and other servers
Secure channel is built by first granting the proxy service to
client
Proxy interacts with other servers on client’s behalf
Client can be very small: only need DES encryption/decryption
No compromise of security:
The communication between client and proxy is encrypted
Proxy believes the identity of user
Proxy does not possess client’s session key and private key
Armando Fox, Steven D. Gribble, "Security on the move: indirect authentication using Kerberos." In
Proceedings of the second annual international
Wireless Gridsconference on Mobile computing and networking
- Amin Ghadersohi 49
(MobiCom'96), Rye, New York, United States, 1996.
Address mobility and location independent naming
Home Foreign
Home Foreign
Network Network
Network Network
IP Host
Home IP Care-of IP
Home IP
“Dynamic Source Routing in Ad Hoc Wireless Networks,” D. Johnson, and D. Maltz, Mobile
Computing, Vol353. Chp 5, pp. 153-181, 1996.
Wireless Grids - Amin Ghadersohi 54
Ad hoc routing
44AF
L1 L1
Plaxton-tree-like structure 6F43 1D76
Distributed tree structure where every node is the root of a tree
Simple mapping from object ID to root ID of the tree it belongs to
Nodes keep “nearest” neighbor pointers differing in 1 ID digit
Hashed ID for both node and document 4378
Routing table (O(logN)): digit similarity
Leaf set: numerically closest nodes 437A
Routing (O(logN) hops)
4361
First check leaf set
Then use routing table to forward message (1+ more digit)
Finally check ID with longest prefix and closest value 4A6D
Pros
Highly distributed (reliability) CE75 39AA 4378
4378
Scalability
Efficiency
A. Rowstron, P. Druschel, "Pastry: Scalable, distributed object location and routing for large-scale
peer-to-peer systems." IFIP/ACM International
Wireless GridsConference on Distributed Systems Platforms
- Amin Ghadersohi 57
(Middleware), Heidelberg, Germany, pages 329-350, November, 2001.
Discovery Semantics and Protocols
Introduction
What is the Grid?
What is Grid Computing?
Wireless Grids
Motives and Driving Forces
Infrastructure
Performance
Hybrid Grid – Project Proposal
Grid Examples
Addresses:
Scalability.
Integratability with current technology.
Stability
Decrease mobile’s computational overhead.
Hide heterogeneity.
Ease of scheduling.
Service discovery
Proxy agent
Can be any device on the grid. Including a mobile
device with appropriate middleware.
Ideally co-located with the wireless access point.
Amount of resources depend on the demand.
How many mobile devices does the proxy agent serve?
Mobile devices can be invisible to the rest of the
grid.
Proxy agent will represent them to the rest of the
grid.
Less responsibilities.
T. Phan, L. Huang, C. Dulan, “Challenge: Integrating Mobile Wireless Devices Into the Computational Grid”,
Proceedings of the 8th annual international
Wirelessconference onGhadersohi
Grids - Amin Mobile computing and networking. September 2002,63
pp 271-278.
Hybrid Grid
V. Kumar, A. Grama, A. Gupta, and G. Karypis. “Introduction to Parallel Computing,” The Benjamin
Cummings Publishing Company, 1994.
Wireless Grids - Amin Ghadersohi 65
Hybrid Grid
Advantages:
Clustering technique suited for managing loosely
assembled group of devices.
Similar technique used for routing in:
Bluetooth, Landmark routing, Mobile IP,ALICE, CORBA-
enabled applications.
KaZaA: peer nodes are clustered around so-called
supernodes
FastTrack
J. Haartsen. “BLUETOOTH - the Universal Radio Interface for Ad-Hoc Wireless Connectivity,” Ericsson Review, no. 3, 1998.
G. Pei, M. Gerla, and X. Hong. “LANMAR: Landmark Routing for Large Scale Wireless Ad Hoc Networks with Group Mobility,” In Proceedings of
IEEE/ACM MobiHOC, August 2000.
K. Truelove and A. Chasin. “Morpheus Out of the Underworld,” www.openp2p.com/pub/a/p2p/2001/07/02/morpheus.html
Advantages:
Proxy agent reduces communication between requestor
and each cluster node.
Takes burden off each mobile device.
Scalable, because proxy agents don’t have to be very
powerful and more of them can be installed as needed.
Cellular tower upgrade?
Mobile devices can autonomously decide and publish their
own resources through the proxy agent.
Because user may want to choose times when they want to
give processing time to the Grid.
Proxy can adjust total available resources based on its active
agent reliability.
Advantages:
Proxy agent can cache individual requests to particular
active agents.
Partially hiding connectivity deficiencies.
Results can be cached until the aggregate total is collected
if need be.
Hide heterogeneity of the mobile devices.
The proxy can make scheduling decision by accessing the
power consumption metrics of the Mobile device.
Simple service discovery
Only need to locate proxy.
DHCP, Jini, the Service Location Protocol, and expanding ring IP
multicast.