Advertisement

Wireless Personal Communications

, Volume 110, Issue 2, pp 1033–1055 | Cite as

A Fault-Tolerant Approach to Alleviate Failures in Offloading Systems

  • Chandreyee Chowdhury
  • Sarbani RoyEmail author
  • Arpita Ray
  • Sumanta Kumar Deb
Article
  • 20 Downloads

Abstract

Computation offloading effectively expands the usability of mobile terminals beyond their physical limits, and also greatly extends their battery charging intervals. Offloading or cyber foraging is a technique by which large and complex computational jobs are relocated from lightweight portable devices (such as smartphones) called offloadee to powerful servers (such as nearby laptops/desktops or cloud server over the Internet) called surrogates, and getting the output back at the offloadee. Many research works have been done so far on the architecture of offloading systems, but only few works can be found on fault detection and tolerance. So this paper concentrates on categorizing different failures that may affect the benefit of offloading computation and proposes a fault-tolerance approach to alleviate those faults. The checkpoint based fault-tolerance approach proposed in this paper is able to handle crash, omission and transient failures altogether. Fault prevention is obtained by utilizing historical data for choosing worthy surrogate from known neighborhood. This fault tolerance model is evaluated by applying a real application named \(\pi\)calculator and Scimark benchmark suite. The system is implemented and the proposed approach is found to be effective with respect to energy consumption and resource utilization even in case of crash and omission failure.

Keywords

Offloading Faults Fault-tolerance Redundancy Checkpoints Resource utilization Crash failure 

Notes

References

  1. 1.
    Ou, S., Wu, Y., Yang, K., & Zhou, B. (2008). Performance analysis of fault-tolerant offloading systems for pervasive services in mobile wireless environments. In IEEE international conference on communications, 2008. ICC’08 (pp. 1856–1860).Google Scholar
  2. 2.
    Satyanarayanan, M. (2001). Pervasive computing: Vision and challenges. IEEE Personal Communications, 8(4), 10–17.CrossRefGoogle Scholar
  3. 3.
    Cuervo, E., Balasubramanian, A., Cho, D. K., Wolman, A., Saroiu, S., Chandra, R., & Bahl, P. (2010). MAUI: Making smartphones last longer with code offload. In Proceedings of the 8th international conference on mobile systems, applications, and services (pp. 49–62). ACM.Google Scholar
  4. 4.
    Bhagat, N., & Bhushan, S. (2016). Energy efficient offloading for mobile cloud computing: A review. International Journal of Advanced Engineering Research and Applications., 2(2), 65–71.Google Scholar
  5. 5.
    Powell, M. L., & Miller, B. P. (1983). Process migration in demos/mp. Proceedings of the Ninth ACM Symposium on Operating Systems Principles SOSP ’83, 17(5), 110–119.CrossRefGoogle Scholar
  6. 6.
    Kumar, K., Liu, J., Lu, Y. H., & Bhargava, B. (2013). A survey of computation offloading for mobile systems. Mobile Networks and Applications, 18(1), 129–140.CrossRefGoogle Scholar
  7. 7.
    Kemp, R., Palmer, N., Kielmann, T., & Bal, H. (2012). Cuckoo: A computation offloading framework for smartphones. In M. Gris & G. Yang (Eds.), Mobile computing, applications, and services. MobiCASE 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 76). Springer.Google Scholar
  8. 8.
    Park, S., Chen, Q., Han, H., & Yeom, H. Y. (2014). Design and evaluation of mobile offloading system for web-centric devices. Journal of Network and Computer Applications, 40, 105–115.CrossRefGoogle Scholar
  9. 9.
    Yang, K., Ou, S., & Chen, H. H. (2008). On effective offloading services for resource-constrained mobile devices running heavier mobile internet applications. IEEE Communications Magazine, 46(1), 56–63.CrossRefGoogle Scholar
  10. 10.
    Chen, X., Chen, S., Zeng, X., Zheng, X., Zhang, Y., & Rong, C. (2017). Framework for context-aware computation offloading in mobile cloud computing. Journal of Cloud Computing: Advances, Systems and Applications. Hindawi, 6(1), 71:1–71:17.Google Scholar
  11. 11.
    Kwon, D., Yang, S., Paek, Y., & Ko, K. (2017). Optimization techniques to enable execution offloading for 3D video games. Journal of Multimedia Tools and Applications, 76(9), 11347–11360.CrossRefGoogle Scholar
  12. 12.
    Haghighi, V., & Moayedian, N. S. (2018). An offloading strategy in mobile cloud computing considering energy and delay constraints. Publihed in IEEE Access, 6, 11849–11861.CrossRefGoogle Scholar
  13. 13.
    Jin, X., Liu, Y., Fan, W., Wu, F., & Tang, B. (2017). Multisite computation offloading in dynamic mobile cloud environments. Journal of Science China Information Sciences, 60, 89301.CrossRefGoogle Scholar
  14. 14.
    Chen, G., Kang, B. T., Kandemir, M., Vijaykrishnan, N., Irwin, M. J., & Chandramouli, R. (2004). Studying energy tradeoffs in offloading computation/compilation in java-enabled mobile devices. IEEE Transactions on Parallel and Distributed Systems, 15(9), 795–809.CrossRefGoogle Scholar
  15. 15.
    Li, Z., Wang, C., & Xu, R. (2001). Computation offloading to save energy on handheld devices: A partition scheme. In Proceedings of the 2001 international conference on compilers, architecture, and synthesis for embedded systems (pp. 238–246). ACM.Google Scholar
  16. 16.
    Goyal, M., & Saini,P. (2016). A fault-tolerant energy-efficient computational offloading approach with minimal energy and response time in mobile cloud computing. In: Proceedings of 4th international conference on parallel, distributed and grid computing.Google Scholar
  17. 17.
    Xia, F., Ding, F., Li, J., Kong, X., Yang, L. T., & Ma, J. (2014). Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing. Journal of Information Systems Frontiers, 16(1), 95–111.CrossRefGoogle Scholar
  18. 18.
    Jun, Y., Lee, J., & Seo, E. (2017). Evaluation of remote-I/O support for a DSM-based computation offloading scheme. Journal of Computer Science and Technology, 32(5), 957–973.CrossRefGoogle Scholar
  19. 19.
    Wang, Q., & Wolter, K. (2014). Detection and analysis of performance deterioration in mobile offloading system. In 2014 IEEE international symposium on software reliability engineering workshops (ISSREW) (pp. 420–425). IEEE.Google Scholar
  20. 20.
    Meng, T., Wang, Q., & Wolter, K. (2015). Model-based quantitative security analysis of mobile offloading systems under timing attacks. In M. Gribaudo, D. Manini & A. Remke (Eds.), Analytical and stochastic modelling techniques and applications. ASMTA 2015. Lecture Notes in Computer Science (Vol. 9081, pp. 143–157). Springer.Google Scholar
  21. 21.
    Mondal, S., Chowdhury, C., Roy, S., Deb, S. K., & Neogy, S. (2016). Crash failure immune offloading framework. In IEEE international conference proceedings of advanced networks and telecommunications systems (ANTS) (pp. 1–6).Google Scholar
  22. 22.
    Brumley, D., & Boneh, D. (2005). Remote timing attacks are practical. Computer Networks, 48(5), 701–716.CrossRefGoogle Scholar
  23. 23.
    Abd, S. K., Al Haddad, S. K. R., Abdullah, A. B. H. J., & Yussof, S. (2017). Energy-aware fault tolerant task offloading of mobile cloud computing. In Proceedings of 5th IEEE international conference on mobile cloud computing, services, and engineering (pp. 161–164).Google Scholar
  24. 24.
    Kwon, Y., & Tilevich, E. (2012). Energy efficient and fault tolerant distributed mobile execution. In Proceedings of 32nd IEEE international conference on distributed computing systems (pp. 586–595).Google Scholar
  25. 25.
    Gordon, M. S., Jamshidi, D. A., Mahlke, S., Mao, Z. M., & Chen, X. (2012). Comet: Code offload by migrating execution transparently. In 10th USENIX symposium on operating systems design and implementation (OSDI 12) (pp. 93–106).Google Scholar
  26. 26.
    Huang, Y., Kintala, C., Kolettis, N., & Fulton, N. D. (1995). Software rejuvenation: Analysis, module and applications. In Twenty-fifth international symposium on fault-tolerant computing, 1995. FTCS-25. digest of papers (pp. 381–390).Google Scholar
  27. 27.
    Cotroneo, D., Natella, R., Pietrantuono, R., & Russo, S. (2011). Software aging and rejuvenation: Where we are and where we are going. In 2011 IEEE third international workshop on software aging and rejuvenation (WoSAR) (pp. 1–6).Google Scholar
  28. 28.
    Van Moorsel, A., & Wolter, K. (2006). Analysis of restart mechanisms in software systems. IEEE Transactions on Software Engineering, 32(8), 547–558.CrossRefGoogle Scholar
  29. 29.
    Ou, S., Yang, K., & Hu, L. (2007). Cross: A combined routing and surrogate selection algorithm forpervasive service offloading in mobile ad hoc environments. In Global telecommunications conference, 2007. GLOBECOM’07 (pp. 720–725). IEEE.Google Scholar
  30. 30.
    Rebeiro, C., Mukhopadhyay, D., & Bhattacharya, S. (2015). An introduction to timing attacks. In Timing channels in cryptography (pp. 1–11). Springer.Google Scholar
  31. 31.
    Liu, J., & Lu, Y. H. (2010). Energy savings in privacy-preserving computation offloading with protection by homomorphic encryption. In Proceedings of the 2010 international conference on power aware computing and systems, HotPower (Vol. 10, pp. 1–7).Google Scholar
  32. 32.
    Liu, J., Kumar, K., & Lu, Y. H. (2010). Tradeoff between energy savings and privacy protection in computation offloading. In Proceedings of the 16th ACM/IEEE international symposium on low power electronics and design (pp. 213–218). ACM.Google Scholar
  33. 33.
    Sheahan, R., Lipsky, L., Fiorini, P. M., & Asmussen, S. (2006). On the completion time distribution for tasks that must restart from the beginning if a failure occurs. ACM SIGMETRICS Performance Evaluation Review, 34(3), 24–26.CrossRefGoogle Scholar
  34. 34.

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Jadavpur UniversityKolkataIndia
  2. 2.IEMLABSKolkataIndia

Personalised recommendations