multi-objective optimization in cloud multi-media...

229
Application Partitioning and Offloading in Mobile Cloud Computing Asad Javied PhD of Electronics Engineering From the University of Surrey Centre for Vision Speech & Signal Processing Department of Electronic Engineering January 2017

Upload: hoangngoc

Post on 08-Mar-2018

214 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Application Partitioning and Offloading in Mobile Cloud

Computing

Asad Javied

PhD of Electronics Engineering

From the

University of Surrey

Centre for Vision Speech & Signal Processing

Department of Electronic Engineering

January 2017

Supervised by: Janko Calic, Adrian Hilton, Ahmet Kondoz

Asad Javied 2017

Page 2: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

ABSTRACT

With the emergence of high quality and rich multimedia content, the end user demands of

content processing and delivery are increasing rapidly. In view of increasing user demands

and quality of service (QoS), cloud computing offers a huge amount of online processing and

storage resources which can be exploited on demand. Moreover, the current high speed 4G

mobile network i.e. Long Term Evolution (LTE) enables leveraging of the cloud resources.

Mobile Cloud Computing (MCC) is an emerging paradigm comprising three heterogeneous

domains of mobile computing, cloud computing, and wireless networks. MCC aims to

enhance computational capabilities of resource-constrained mobile devices towards rich user

experience. Decreasing cloud cost and latency is attracting the research community to exploit

the cloud computing resource to offload and process multimedia content in the cloud. High

bandwidth and low latency of LTE makes it a suitable candidate for delivering of rich

multimedia cloud content back to the user. The convergence of cloud and LTE give rise to an

end-to-end communication framework which opens up the possibility for new applications

and services. In addition to cloud and network, end user and application constitute the other

entities of the end-to-end communication framework. End user quality of service and

particular application profile dictate about resource allocation in the cloud and the wireless

network. This research formulates different building blocks of the end-to-end

communications and introduces a new paradigm to exploit the network and cloud resources

for the end user. In this way, we employ a multi-objective optimization strategy to propose

and simulate an end-to-end communication framework which promises to optimize the

behavior of MCC based end-to-end communication to deliver appropriate quality of service

(QoS) with utilization of minimum cloud and network resources. Then we apply application

partitioning and offloading schemes to offload certain parts of an application to the cloud to

improve energy efficiency and response time. As deliverables of this research, behavior of

different entities (cloud, LTE based mobile network, user and application context) have been

modeled. In addition, a comprehensive application partitioning and offloading framework has

been proposed in order to minimize the cloud and network resources to achieve user required

QoS.

Keywords: Long Term Evolution (LTE), Cloud computing, Application partitioning and offloading,

Image Retrieval.

2

Page 3: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

3

Page 4: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

TABLE OF CONTENTS

Abstract..................................................................................................................................2

Table of Contents...................................................................................................................3

List of figures.........................................................................................................................8

ABBREVIATIONS & ACRONYMS..................................................................................11

1 Introduction....................................................................................................................12

1.1 Motivation...............................................................................................................12

1.2 Research Questions.................................................................................................15

1.3 Research Objectives................................................................................................16

1.4 Contributions..........................................................................................................17

1.5 Structure of the thesis.............................................................................................17

1.6 Publications.............................................................................................................17

2 State of the art.................................................................................................................19

2.1 Cloud Computing....................................................................................................19

2.1.1 Deployment models...........................................................................................19

2.1.2 Service models...................................................................................................20

2.1.3 Cloud Computing Features and Research Avenues...........................................21

2.1.4 Challenges of Mobile Cloud Computing:..........................................................22

2.1.5 Mobile Cloud Computing:.................................................................................23

2.1.6 Simulation Environments for Cloud Computing...............................................23

2.1.7 Cloud computing offloading..............................................................................24

2.1.8 Identified Research Gaps...................................................................................24

2.2 Mobile Communications Network..........................................................................24

2.2.1 Orthogonal Frequency Division Multiple Access (OFDM):.............................25

2.2.1.1 Motivation for OFDM:..............................................................................26

2.2.1.2 Intersymbol Interference (ISI)...................................................................26

2.2.1.3 Orthogonal Frequency Division Multiplexing (OFDM)............................27

2.2.1.4 OFDMA:....................................................................................................28

2.2.1.5 Multiple Input Multiple Output (MIMO)..................................................28

2.2.1.6 Maximum Ration Combining (MRC)........................................................29

2.2.1.7 Single Carrier Frequency Division multiple access (SC-FDMA).............29

2.2.2 LTE Network Architecture:...............................................................................30

2.2.3 Research in Mobile Network (LTE)..................................................................32

2.3 Applications Context..............................................................................................33

2.3.1 Application Offloading......................................................................................34

4

Page 5: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

2.3.2 Offloading leverage by Cloud Computing........................................................34

2.3.3 Offloading leverage by Cloudlet.......................................................................34

2.3.4 Research Gaps...................................................................................................35

2.3.5 Characterization of Mobile Environment..........................................................35

2.3.6 Mobile Battery...................................................................................................37

2.3.7 Mobile Platform.................................................................................................37

2.3.8 Taxonomy of Application Partitioning..............................................................38

2.3.8.1 Partitioning Granularity.............................................................................38

2.3.8.2 Application Partitioning Objective Functions:..........................................38

2.3.8.3 Partitioning Model:....................................................................................39

2.3.8.4 Programming Language Support (PLS):...................................................39

2.3.8.5 Allocation Decision:..................................................................................40

2.3.8.6 Analysis Technique:...................................................................................40

2.3.9 User Contextual Model......................................................................................42

2.4 Multi-objective Optimization (MOP).....................................................................42

2.4.1 Pareto Optimization Algorithms........................................................................44

2.4.1.1 NSGA-II Algorithm...................................................................................45

2.5 Pareto Multi-objective Optimization in Cloud and Network..................................45

2.6 Summary.................................................................................................................46

3 Multi-objective optimization in Cloud Mobile Environment.........................................47

3.1 End-to-End Communication Models......................................................................49

3.1.1 Application Profile............................................................................................49

3.2 Cloud Model...........................................................................................................50

3.2.1 Analytical Model of the Cloud Service:............................................................52

3.2.2 Mathematical model of the cloud:.....................................................................53

3.2.2.1 Public Cloud:.............................................................................................54

3.2.2.2 Private Cloud.............................................................................................58

3.3 Mathematical Model of Wireless Network.............................................................62

3.3.1 Vienna Link Level Simulator............................................................................62

3.3.2 LTE Transmitter:................................................................................................63

3.3.3 Channel:.............................................................................................................65

3.3.4 Receiver:............................................................................................................65

3.4 Mobile User Context and QoS................................................................................75

3.5 Mobile Hardware Model:........................................................................................77

3.6 Multi-objective Optimization Methodology...........................................................78

3.7 Dependency Functions............................................................................................78

5

Page 6: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

3.8 Results and Discussions..........................................................................................79

3.8.1 Effect of Channel on Throughput......................................................................79

3.8.2 Effect of Cloud Load on Network BLER..........................................................80

3.8.3 Effect of Population Size and Number of Generations.....................................81

3.9 Comprehensive CANU Model................................................................................82

3.10 Summary.................................................................................................................83

4 A Comprehensive application partitioning and offloading Framework.........................85

4.1 Application Attributes.............................................................................................86

4.1.1 Application Scalability and Flexibility..............................................................86

4.1.2 Feasibility of Application Offloading................................................................86

4.1.3 Classification of Application Tasks...................................................................86

4.1.4 Topologies of Applications................................................................................87

4.1.5 Representation of Application...........................................................................88

4.2 Application Offloading and Partitioning Framework.............................................89

4.2.1 Application Parameter Modeling.......................................................................89

4.2.2 Partitioning Benchmarks:..................................................................................91

4.3 Influence of CANU models on Partitioning:..........................................................91

4.3.1 User QoE (Quality of Experience)....................................................................92

4.3.2 Device information:...........................................................................................92

4.3.3 Wireless Network:.............................................................................................92

4.3.4 Mobile device model.........................................................................................92

4.3.5 Application........................................................................................................93

4.4 Partitioning Algorithm for offloading:....................................................................93

4.5 Image Retrieval Application:..................................................................................94

4.5.1 Algorithmic structure of Image Retrieval Application......................................95

4.5.1.1 Image Retrieval:.........................................................................................95

4.5.1.2 Feature Detection.......................................................................................96

4.5.1.3 Description.................................................................................................96

4.5.1.4 SIFT dimensionality reduction..................................................................97

4.5.1.5 Robust Visual Descriptor...........................................................................98

4.5.1.6 Power norm................................................................................................98

4.5.2 Quantitative Profiling of the Application:.........................................................99

4.5.2.1 Raw Objective Graph (ROG):...................................................................99

4.5.2.2 Normalised Objective Graph (NOG):........................................................99

4.6 Offloading performance objective parameters:....................................................102

4.6.1 Response time optimization:...........................................................................102

6

Page 7: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

4.6.2 Energy minimization:......................................................................................103

4.6.3 Joint objective function:..................................................................................104

4.7 Partitioning Algorithm Model:.............................................................................105

4.8 Evaluation of Offloading Performance:................................................................107

4.8.1 Effect of CQI on the Performance:..................................................................107

4.8.2 Effect of user battery on Performance:............................................................109

4.8.3 Effect of user preference parameter ℇ on Performance...................................110

4.8.4 Effect of cloud blocking probability on offloading cost..................................111

4.8.5 Effect of number of users in wireless network on response time....................112

4.9 Summary...............................................................................................................114

5 Improved Application Partitioning and Offloading......................................................115

5.1 Offloading Likelihood Index:...............................................................................115

5.2 Experiment with synthetic graphs on application topologies...............................116

5.2.1 Effect of weightage of edge:............................................................................116

5.2.2 Effect of number of vertices:...........................................................................118

5.2.3 Effect of branching:.........................................................................................119

5.3 Computational measures of objective graph:........................................................120

5.3.1 Shortest path measure ψ ( A):..........................................................................121

5.3.2 Betweenness centrality ∂( A)..........................................................................121

5.3.3 Clustering coefficients:....................................................................................123

5.3.4 Network heterogeneity....................................................................................123

5.3.5 Number of connected components..................................................................123

5.3.6 Max-flow coefficient:......................................................................................123

5.3.7 Topological order ∅ (C)..................................................................................124

5.3.8 Boye myrvold planaity test:.............................................................................124

5.3.9 Edmonds' maximum cardinality matching (Edmunds-Karp number):............124

5.3.10Number of Edges and Vertices:.......................................................................124

5.3.11Graph Diameter:..............................................................................................125

5.3.12Eccentricity:.....................................................................................................125

5.3.13Radiality:.........................................................................................................125

5.3.14Graph Density:.................................................................................................125

5.3.15Degree distribution:.........................................................................................125

5.3.16Stress distribution:...........................................................................................125

5.4 Applications for Performance Evaluation:...........................................................125

5.4.1 Image Visual Retrieval ( IVR Mobile)............................................................126

5.4.1.1 Keypoints detection.................................................................................1277

Page 8: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

5.4.1.2 Feature selection......................................................................................127

5.4.1.3 Local Descriptor Extraction.....................................................................127

5.4.1.4 Local Descriptor Compression................................................................127

5.4.1.5 Coordinate Coding...................................................................................127

5.4.1.6 Global descriptor aggregation..................................................................128

5.4.1.7 Binarise components................................................................................128

5.4.1.8 Cluster and Bit Selection.........................................................................128

5.4.1.9 Superior matching....................................................................................129

5.5 Error Response of Applications:...........................................................................132

5.5.1 Type of Errors..................................................................................................132

5.5.1.1 Burst Error...............................................................................................132

5.5.1.2 Random Error...........................................................................................132

5.5.2 Error Response of Applications.......................................................................132

5.5.2.1 IVR (float)................................................................................................132

5.5.2.2 IVR (binary).............................................................................................133

5.5.2.3 IVR (mobile)............................................................................................134

5.5.3 Conclusion:......................................................................................................135

5.6 Improved partitioning algorithm...........................................................................136

5.7 Performance Analysis...........................................................................................136

5.7.1 Effect of Cloud blocking probability...............................................................136

5.7.2 Effect of UE battery on offloading cost...........................................................137

5.7.3 Effect of number of wireless users on offloading cost....................................138

5.8 Summary...............................................................................................................139

6 Future work & Conclusion...........................................................................................140

6.1 Conclusion............................................................................................................140

6.2 Critical Review.....................................................................................................141

6.3 Future Work..........................................................................................................142

References..........................................................................................................................144

Appendices.........................................................................................................................153

8

Page 9: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

LIST OF FIGURES

Figure 1-1 Heterogeneity of UE devices, wireless access and applications [12]..................................13

Figure 2-1: Layers of Cloud services [25].............................................................................................21

Figure 2-2 Multipath Reflections in Wireless Communications...........................................................26

Figure 2-3: Effect of Intersymbol Interference......................................................................................27

Figure 2-4: Effect of Frequency Selective Fading in Mobile Communications....................................27

Figure 2-5 Longer Symbol Periods and Cyclic Prefix in OFDM..........................................................28

Figure 2-6 Multiple Input Multiple Output (MIMO).............................................................................28

Figure 2-7 Maximum Ratio Combining in Wireless Communications.................................................29

Figure 2-8 LTE Architecture [140]........................................................................................................30

Figure 2-9 QoS Management in LTE [140]...........................................................................................32

Figure 2-10 Taxonomy of Application Partitioning...............................................................................41

Figure 2-11: Classification of Optimization Algorithms.......................................................................43

Figure 2-12: a) MOP dominance b) Pareto front in MOP............................................................44

Figure 3-1: Contextual Model and their corresponding parameters.....................................................47

Figure 3-2: Cost-Benefit optimization model and Knee Point..............................................................48

Figure 3-3: Contextual Models in optimization domain........................................................................49

Figure 3-4: Effect of Cloud Input & Output packet sizes on cost...................................................52

Figure 3-5: Infinite source model of Public Cloud [95]........................................................................54

Figure 3-6 Markov Chain Model of Public Cloud.................................................................................55

Figure 3-7: Effect of Load on Blocking Probability for various VM’s.................................................56

Figure 3-8 Effect of Blocking Probability on Number of VM’s required for different Cloud Loads. . .57

Figure 3-9 Finite source model of Private Cloud..................................................................................59

Figure 3-10 Markov Chain Model of the Private Cloud........................................................................59

Figure 3-11 Effect of Load on Blocking Probability for various VM’s.................................................60

Figure 3-12 Effect of Blocking Probability on the Number of VM’s required for different Private

Cloud Loads...................................................................................................................................61

Figure 3-13 Structure of Link Level Vienna Simulator [97].................................................................62

Figure 3-14 Flow Diagram of LTE Transmitter [96].............................................................................64

Figure 3-15 Flow Diagram of LTE Receiver [98].................................................................................66

Figure 3-16 Effect of SNR on Block Error Rate (BLER) for multiple CQI values...............................68

Figure 3-17 Effect of SNR on Throughput for multiple CQI values.....................................................69

Figure 3-18 Effect of SNR and RB's/User on Throughput....................................................................70

Figure 3-19 Effect of SNR on Block Error Rate (BLER) for different Transmission Schemes (3 re-

transmissions)................................................................................................................................71

9

Page 10: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 3-20 Effect of SNR on Throughput for different Transmission Schemes (3 retransmissions)...72

Figure 3-21 Effect of SNR on Block Error Rate (BLER) for different Transmission Schemes (No

HARQ)...........................................................................................................................................73

Figure 3-22 Effect of SNR on Throughput for different Transmission Schemes (3 retransmissions)...74

Figure 3-23: Effect of Traffic Skewness (𝞪) and Traffic Size (𝞫) on user capacity.............................77

Figure 3-24 CANU (Cloud-Application-Network-User) Framework...................................................79

Figure 3-25: Effect of CQI on Throughput............................................................................................80

Figure 3-26 Effect of Cloud Load on Network BLER.......................................................................81

Figure 3-27 Effect of number of Generations on the performance.......................................................82

Figure 3-28 Effect of the Populations size on the performance............................................................82

Figure 4-1 Task Flow Graphs in different topologies............................................................................88

Figure 4-2 Flowchart of Application Partitioning Framework..............................................................90

Figure 4-3 Image Retrieval Application................................................................................................95

Figure 4-4 Detection of key points in DOG Space................................................................................96

Figure 4-5 Extraction of Keypoint Descriptors from Image Gradients.................................................96

Figure 4-6 Aggregation of Feature Vectors [104]..................................................................................98

Figure 4-7 Raw Objective Graph (ROG) of Image Retrieval Application..........................................100

Figure 4-8 Normalised Objective Graph (NOG) of Image Retrieval Application..............................101

Figure 4-9: Effect of CQI on offloading cost for different communication paradigms.......................108

Figure 4-10: Effect of UE Battery on offloading cost..........................................................................110

Figure 4-11: Effect of UE Battery on offloading cost..........................................................................111

Figure 4-12: Effect of Cloud blocking probability on offloading cost................................................112

Figure 4-13: Effect of number of wireless users on offloading cost....................................................113

Figure 5-1: Topology A1 (Influence of vertex weights on partition)..................................................117

Figure 5-2: Topology A2 (Influence of edge weights on partition)....................................................118

Figure 5-3: Topology A3 (Influence of number of nodes on partition)..............................................119

Figure 5-4: Topology A4 (Influence of branching of directed graph on partition)..............................120

Figure 5-5 Betweeness Centrality of graph.........................................................................................122

Figure 5-6 Algorithmic Structure of IVR Mobile Application [103]...................................................127

Figure 5-7: IVR (binary) Raw Objective Graph (ROG)......................................................................130

Figure 5-8: IVR (Mobile) Raw Objective Graph (ROG)...............................................................131

Figure 5-9: Error response of IVC (float)............................................................................................133

Figure 5-10: Error response of IVR (Binary)......................................................................................134

Figure 5-11: Error response of IVR (flexible).....................................................................................135

Figure 5-12: Effect of Cloud blocking probability on offloading cost................................................137

Figure 5-13: Effect of UE Battery on offloading cost.........................................................................138

Figure 5-14: Effect of Number of wireless users on offloading cost...................................................13910

Page 11: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

11

Page 12: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

ABBREVIATIONS & ACRONYMS

3GPP 3rd Generation Partnership Project4G 4th GenerationAUC Authentication CenterBLER Block Error RateE2E End-to-EndeNodeB Enhanced Node B (Mobile Base Station)EPC Evolved Packet CoreFTP File Transfer ProtocolGA Genetic AlgorithmGSM Global System for MobilesHSPA High-speed Packet AccessIaaS Infrastructure as a ServiceICIC Inter-Cell Interference CoordinationIMS IP Multimedia SubsystemISI Intersymbol InterferenceLTE Long Term EvolutionsMBMS Multimedia Broadcast Multicast ServiceMbps Megabits per secondMCC Mobile Cloud ComputingMCS Modulation & Coding SchemeMIMO Multiple Input Multiple OutputMISO Multiple Input Single OutputMME Mobility Management EntityMOGA Multi-objective Genetic AlgorithmMOP Multi-objective OptimizationNPGA Niched Pareto Genetic AlgorithmNSGA-II Non sorting genetic algorithm IIOFDM Orthogonal frequency-division multiplexingOLSM Open Loop Spatial MultiplexingPaaS Platform as a ServicePDN Packet Data NetworkQCI Quality of Service Class IndicatorQoE Quality of ExperienceQoS Quality of ServiceRB Resource BlockSaaS Software as a ServiceSAE System Architecture EvolvedSIMO Single Input Multiple OutputSNR Signal to Noise RationSPEA Strength Pareto Evolutionary AlgorithmTTI Transmission Time IntervalTxD Transmitter DiversityUE User EquipmentUMTS Universal Mobile Telecommunications SystemVEGA Vector Evaluated Genetic AlgorithmVoIP Voice over IP

12

Page 13: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

1 INTRODUCTION

In this chapter, we will formulate the research questions and corresponding research objec-

tives in view of the current demands of the end to end communications. In addition, we will

summarize our contributions of this research.

1.1 Motivation

Over the recent years, various innovative multimedia applications, services and devices

have emerged in the consumer market and have allowed people to explore and consume more

media contents while on the go [1]. We are experiencing a media revolution. With the emer-

gence of rich complex mobile applications, the processing and storage hardware demands of

the end user are increasing in comparison to the available mobile hardware resources. An ap-

proach to leverage this increase in the demand is by thin client approach [2], where the end

user mobile resources are assumed to be scarce and surrogate model [3] e.g. cloud computing

is used to leverage the imbalance of the resources. Cloud computing [4] has emerged as a

flourishing framework and the cloud computing platform have proved itself to become a

unique framework providing various services, high computational ability, huge storage and

bandwidth at competitive cost. In the near future, we foresee the need of many possible sce-

nario's involving resource (computational and storage) constrained mobile devices to access

and process highly intensive computational tasks like 3D rendering [5], video streaming [6]

and gaming [7]. Moore's law [8] predicts that the storage and processing abilities of the cloud

will continue to increase while corresponding costs will go down over the next few years.

This enables cloud computing to be favorable candidate to handle computational intensive

tasks for mobile devices.

Mobile Cloud Computing (MCC) [9] provides an efficient computational framework for

mobile terminals i.e. User Equipment (UE) to offload it's computationally intensive tasks to

remote server. Mobile-cloud interaction opens up the further avenues for research if coopera-

tive communication among the mobile nodes is also considered [10]. Cloud process the off-

loaded content and deliver it to the UE. Content offloading and delivery represents an end-to-

end communication (E2E) scenario in which mobile terminal interacts with the cloud through

the network. In this way, the offered end user QoS depends upon different parameters of

cloud (cost, latency) and network (throughput, bandwidth, channel errors, number of users)

[11]. Moreover, application profile (service requirements including jitter, time stamp and 13

Page 14: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

graphics) and user profile (cost profile, service perception) also contribute towards shaping

the end user QoS delivered.

As an institutive example, consider a lost child scenario. Consider a child is lost in a busy

crowd of parade. Tourists are asked to take and upload the pictures of unaccompanied child in

their closed vicinity. These pictures are accumulated in a center processing server where im-

age search is performed i.e. comparing child picture provided by the parent with all the im-

ages received. In this way, all the entities explained earlier i.e. cloud, network, user and appli-

cation profile will influence the complete scenario.

Figure 1-1 Heterogeneity of UE devices, wireless access and applications [12]

As shown in the Figure 1.1, the broad range of heterogeneous mobile devices access the

cloud service through a range of wireless as well as wired services. The disparity of user per-

ception of QoS with the range of devices mentioned is quite broad.

14

Page 15: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

The state of the art mobile network, 3rd Generation Partnership Project (3GPP)’s Release’8

Long Term Evolution (LTE) promises significant improvement over previous technologies

Global System for Mobiles (GSM) and High Speed Packet Access (HSPA) [13]. LTE prom-

ises high uplink and downlink data rates, very low latencies and backward compatibility with

previous telecommunication technologies. These features make it favorable candidate for

cloud computing resources.

Let us consider the resources allocated in cloud and network for processing and delivering

of content respectively. Law of diminishing returns dictates that in certain systems investment

of extra resources after a certain threshold does not translate into proportional returns. Dimin-

ishing returns phenomenon was observed clearly, when we simulated the behavior of cloud

computing and mobile network models. For example, when we simulate the LTE model in

view of given performance parameters (throughput, error), we observe that after a certain

limit extra investment into the network resources (SNR, bandwidth) does not translate into

proportional gains i.e. increase in throughput and reduction in errors. That means increase in

input side of system does not translate into proportional output, due to the saturation effect

dictated by law of diminishing returns. This leads us to translate cloud and network models

into a mathematical objective function with corresponding performance parameters. In this

way, each of the cloud, network, mobile and application are represented as by a contextual

model having multiple parameters. These multiple inter-dependent and conflicting parameters

give rise to an optimization methodology which enables us to maximize the user QoS with

minimum invested cloud and network resources. QoS of the end user depends upon various

parameters in the cloud and network. For example, user speed in the cellular network can

cause handovers which may affect the end user QoS delivered. Similarly QoS is also suscep-

tible to type of application. For duplex applications like VoiP, the interactivity is high so using

cloud services for such applications is less feasible in view of QoS requirements.

In the view of end user’s quality of service (QoS), multi-objective optimization has at-

tracted a lot of research in the past. Although a lot of optimization efforts have been made in

the literature, to optimize the behavior mobile network [14], cloud [15] and user context [16],

our work is another effort to optimize the overall end-to-end communications scenario con-

sidering detailed parameters of cloud, network, end user and application simultaneously.

In the multi-objective optimization approach explained above, we see that network and

cloud contextual models are beyond the control but because an application being scalable it

can be tuned according to the demands of the user. So we can partition a flexible application

15

Page 16: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

and use the extensive resources available at the cloud through the 4G network

The outcomes of this research are expected to benefit not only the mobile network opera-

tors in terms of ease and cost of network management, but also the content providers, cloud

service providers in terms of evolution of sustainable green services and the end-users in

form of enhanced quality of service (QoS). This research may also have a potential for future

commercialization.

1.2 Research Questions

In the outlined research, we propose an optimization effort to achieve the required QoS with

minimum amount of invested resources in cloud, network by exploiting the user contextual

behavior and corresponding application profile.

This research will focus on the following questions:

I. What is the appropriate architecture and corresponding modules required to describe

the end-to-end communication framework?

In view of the immersive multimedia applications involving huge computational com-

plexity, representation of E2E communication framework is a big challenge. The enti-

ties involved and their associated heterogeneity frames the end to end communication a

highly complex paradigm. This question involves the investigation of the corresponding

modules which can influence the end-to-end (E2E) communications and their corre-

sponding performance parameters. In this way, a holistic approach needs to be

adopted, to design and analyze the E2E communication framework considering all the

modules i.e. cloud, network, application and user context. Each module has correspond-

ing performance parameters which not only influence its own behavior but affect the

other modules also.

II. How the behavior of an application can influence an end-to-end multimedia communi-

cations? And how much efficiency gains we can achieve if we partition and offload an

application over cloud?

Behavior of an application running on the E2E communication framework depends

upon a set of parameters related to user QoS demands. This question allow us to formu-

late the criteria to characterize and simulate the behavior of the individual modules in-

volved in an end-to-end communication framework described in Question-I. Then based

16

Page 17: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

on the requirements, design and apply appropriate algorithm to optimize the behavior of

the modules. The challenge is to partition the application at that point which fulfil cer-

tain requirements simultaneously e.g. saving mobile battery, utilizing the wireless net-

work and cloud resources at minimum and after all satisfying the end user ultimately.

The corresponding framework should achieve best performance in terms of agility, min-

imum resource allocation, energy efficiency and maximum end-user QoS.

III. How we can judge the performance of an application partitioning in view of a diverse

scenario involving all the components of the end-to-end communication?

Applying and testing the designed partitioning and offloading methodology on the im-

age retrieval application. This involves designing an application partitioning and of-

floading framework which aim to fulfil certain objectives e.g. improving energy effi-

ciency and reducing execution time of an application in view of changing wireless net-

work and cloud resources. Testing the application partitioning and offloading frame-

work in a number of scenarios with diverse parameters of cloud, network and user

model to fully characterize and judge the performance objectives.

1.3 Research Objectives

In the previous section, we highlighted certain challenges related to the end to end communi-

cation framework. In light of the research questions mentioned in section 1.2, we aim to ad-

dress the following research objectives. These research objectives provides a baseline of our

research:

I. Investigate the behavior of cloud, network, application and user QoS aspects in terms of

corresponding input and output performance parameters.

II. In view of the outlined parameters, design and express corresponding models in terms

of mathematical objective functions.

III. Select the appropriate optimization methodology in view of the constraints imposed in I

and II. Apply the selected optimization methodology to the given end-to-end communi-

cation scenario for application partitioning and offloading, and estimate the potential

benefits in terms of resources saved.

IV. Investigate the effect of application offloading into cloud with current optimization sce-

nario, and how different topologies of the application can influence the application par-

titioning and offloading framework.

17

Page 18: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

V. Simulate the application partitioning and offloading framework in terms of objective

parameters.

1.4 Contributions

At the end of this research, we have done the following contributions towards current re-

search in respective avenues of the cloud and mobile network.

I. This research opens up the possibility of transforming the current domain of end-to-

end content delivery into mathematical formulation and then optimizing the formu-

lated multi-dimensional mathematical problem in view of multiple context models of

an end-to-end communication system. Then we proposed CANU model which takes

into account the comprehensive models of cloud, application, network and user and

simulate the implications of one model onto other.

II. We define and implement an application partitioning and offloading framework which

takes the parameters of the context models defined above and maximize certain objec-

tive functions e.g. energy efficiency and response time saving.

III. We further expand the application and offloading framework to the next level by tak-

ing offline parameters about the application contextual model and topological structure

of an application. Then we further improvise the partitioning and offloading frame-

work so that application response time and energy saving are further improved.

1.5 Structure of the thesis

In chapter 2, we discuss the literature review in detail. Since our system involve a lot of

entities so best effort has been made to cover all the significant entities and the corresponding

techniques used in this regard. A joint optimization problem involving Cloud, Application,

Network and mobile User has been discussed in chapter 3, in the form CANU model. In

chapter 4, we discuss the role of application in CANU model and discuss the partitioning and

offloading framework. Finally, in chapter 5 we improved the partitioning and offloading

framework further by including the structural information of an application by using graph

theory analytics.

1.6 Publications

Asad Javied, Janko Calic, Ahmet Kondoz “A Comprehensive Framework of Appli-

cation Partitioning and Offloading in Mobile Cloud Computing” Journal of Se-

lected Areas of Communication, to be submitted Volume 23, February 2017.

18

Page 19: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Asad Javied, Janko Calic “Multiobjective Optimization in Mobile Cloud Comput-

ing”, Poster Presentation in Research and Development Conference, University of

Surrey 2013

Asad Javied, Janko Calic, “A Comprehensive Application Partitioning and Of-

floading Framework” Poster Presentation in Research and Development Confer-

ence (RDP), University of Surrey 2014

19

Page 20: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

2 STATE OF THE ART

This chapter discusses the state of the art of different components of the system. End-to-

end multimedia communication architecture involves the cloud computing infrastructure, mo-

bile network, user and application profile. In this chapter, we will discuss the state of the art

relevant to each module. In addition, we will also discuss optimization methodologies. Then

in view of the state of the art, we will formulate baseline for our research direction.

2.1 Cloud Computing

"Cloud Computing provides an avenue to access on demand shared pool of computation

and storage that can be rapidly provisioned and released with minimal management effort or

service provider interaction [17]."There are certain characteristics of the cloud computing

services which differentiate it from the typical server-client model. The resources offered to

the customers appear to be unlimited and highly elastic and can be called quantitatively with

respect to the demands of the user. Due to the virtualisation of the underlying physical hard-

ware the services offered by the virtual resources are dynamically shuffled and pooled among

different consumers quite quickly. Cloud provides on-demand self-service with automatic de-

cision making ability to scale up or scale down the resources offered to different users ac-

cording to their requirements [18]. Cloud ensures broad network access by providing easy

accessibility via mobile phones, tablets, laptops and workstations. Resource usage can be

quantitatively measured in term of parameters as well as it can be monitored and controlled

from a remote location. In this way, it provides transparency for both the provider and the

consumer [19].

2.1.1 Deployment models

According to the demands of certain user groups, cloud services have been tailors to cer-

tain broad categories. Each category is recognised by the type of the users they are designed

for e.g. single user or a group of users. Private cloud serves only a single organization or

group of users exclusively. Community cloud is designed for the usage by a certain consumer

group from certain geographical location or having similar pattern of service usage. Public

cloud, as the name indicates, is open use by the general public usage by some service pro-

vider [20]. Hybrid cloud is the tailored composition of two or more distinct cloud infrastruc-

20

Page 21: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

tures (private, community or public).

2.1.2 Service models

According to the services provided by the cloud, researchers has devised certain service

models and named them accordingly. The layer at which cloud service is provided differs

mainly in line with the user ability to tune the service settings.

Software as a Service (SaaS): In this model, consumers get access to the resources of the

cloud via the application layer. The applications running on the provider’s cloud resourced

are accessed by the user through an easy to use interface. In this way, end user will not have

to worry about software licensing, installation and support of the hardware infrastructure, op-

erating systems and storage [21]. Moreover they can access the quality of the service accord-

ing to their demands and price paid. Customer has no control over the management and con-

trol over the cloud infrastructure and deployed applications. Emerging applications using the

SaaS are the Hotmail and Gmail as well as the Microsoft office versions in which the end

users enjoy the ability to manage (send, read) their e-mails or documents in the cloud [22].

Platform as a Service (PaaS): In this model, customers have marginal control over the

infrastructure and the services of the cloud. It is similar to SaaS except the ability of the cus-

tomers to use cloud as a platform to create, run and host applications within the charter of the

cloud service provider. Users still do not manage or control the underlying cloud infrastruc-

ture, operating systems and storage, but can manage and control the deployed applications

[23].

Infrastructure as a Service (IaaS): In this model, customers have full control over the

usage as well the accessibility of the cloud resources. They can use on demand the cloud

servers, network, storage and operating systems on the cloud infrastructure of the provider.

Users do not have any control over the cloud infrastructure but according to their require-

ments they can provision the operating systems, and acquire storage for their deployed ap-

plications. A best example of IaaS is the Amazon, which offers storage as well as the compu-

tational ability in the cloud to the end users based on their demands and accessibility require-

ments [24]. A hierarchy of the cloud services are shown in the Figure 2.1.

21

Page 22: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 2-2: Layers of Cloud services [25]

2.1.3 Cloud Computing Features and Research Avenues

Cloud computing architecture has been defined in terms of multiple layers. Moreover, the

services offered by cloud computing can be dimensioned in multiple domains. Cloud pro-

vides an opportunity so that a consumer can unilaterally provision computing capabilities,

such as server time and network storage, as needed automatically without requiring human

interaction with each service’s provider [26]. Resource pooling provides the ability for com-

puting resources to be pooled to serve multiple consumers using a multi-user model, with dif-

ferent physical and virtual resources dynamically assigned and reassigned according to the

consumer demand. There is a sense of location independence, such that the customer gener-

ally has no control or knowledge over the exact location of the provided resources but may be

able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Ex-

amples of resources include storage and processing [27], memory [28], network bandwidth

[29], and virtual machines [30]. Network Access Capabilities enable cloud services to be

available over the network and accessed through standard communication mechanisms that

promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and

PDAs)[2]. Moreover the resources and capabilities provided by cloud computing are highly

elastic and scalable. They are provisioned, in some cases automatically to quickly scale out,

and rapidly released to quickly scale in, as mentioned in [31]. To the consumer, the capabili-

ties available for provisioning often appears to be unlimited and can be purchased in any

quantity at any time. Cloud systems automatically control and optimize resource use by lever-

aging a metering capability at some level of abstraction appropriate to the type of service

(e.g., storage [32], processing [33], bandwidth [34], and active user accounts [35]). Therefore, 22

Page 23: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

resource usage can be monitored, controlled, and reported, providing transparency for both

the provider and consumer of the utilized service.

2.1.4 Challenges of Mobile Cloud Computing:

Although the ways to exploit the rich cloud computing services are enormously attractive, but

there are still a lot of limitations from research as well as implementation point of view. Cer-

tain significant challenges are mentioned below:

Device Battery Lifetime: Mobile device battery is one of the major limiting factors. Any

technique which does not guarantee reduction in the battery usage of the mobile phone is dis-

couraged in the research community. So the usage of cloud computing resources should ulti-

mately ensure to save the battery time of the mobile [36].

Wireless Bandwidth Availability: Despite the significant improvements in the wireless net-

works, it is still considered to be highly vulnerable in terms of bandwidth limitations and loss

of service. Transferring large amounts of data between the device and the cloud can be prob-

lematic. Moreover cost factor is also a key consideration while using cellular 3G/4G LTE net-

works [37].

Interaction Latency: Usability of the cloud resources is highly sensitive to the type of ap-

plication. Applications having very strict latency requirements may not always be feasible to

run on cloud always. Moreover applications involving real-time or near real-time require-

ments e.g. multimedia rendering or gaming applications need reserved resources in cloud as

well as in the wireless network. Latency issues results in poor QoE for the end user and less

likelihood of using cloud services [38].

User Mobility: Mobility of the user in cellular network incurs mobile handovers and reduc-

tion in data rate due to the Doppler shifts. Moreover shift in terrains also causes the loss of

service sometimes. This ultimately induces vulnerabilities in using mobile networks [39].

Handovers pose a lot of concerns about the QoS delivered to end user in E2E communication.

In our research, we have used LTE 4G communication model for wireless communications. It

ensures reliable connectivity at very high speeds but it introduces undesirable delays. A lot of

research has been done in the area of mobile mobility managements but handovers still re-

main a significant challenge in wireless communications [114].

Mobile Device Heterogeneity: Recent technological advancement in mobile device manu-

23

Page 24: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

facturing and user demands has resulted in the multitude of different mobile device types and

the platforms underlying. So providing the services in view of multiple heterogeneous

devices is troublesome [40].

Cloud Heterogeneity: Similar to the mobile device heterogeneity, the services, applications

as well as the infrastructure offered by the cloud service providers is highly variable.

Moreover the protocols connecting the mobile networks to the cloud services are non-exist-

ent, as cloud standards or interfaces are currently not standardized [32].

2.1.5 Mobile Cloud Computing:

Summarising the previous sections, the opportunities offered by cloud computing for mo-

bile devices are enormous. But the limitations are there in the network as on well as the

device side which hinders the true potential offered by the cloud computing. In order to cope

with the resource limitations offered by the network as well as the mobile devices, research

community has managed to combine the infinitely growing resources of cloud infrastructure

with mobile devices [41]. Researchers call this joint area of research as Mobile Cloud Com-

puting (MCC). Researchers and enterprise have joined their hand to build and provision a

joint mechanism in which cloud offer services and able to run applications specifically to mo-

bile devices (UE).

Mobile Cloud Computing has become quite attractive because it formulates the ways by

which applications will be considered, having huge computational complexity, to be executed

on a mobile device of limited hardware and software resources. So applications can be off-

loaded to the cloud. Cloud executes the application and sends the output to the mobile device

[42].

2.1.6 Simulation Environments for Cloud Computing

Few efforts have been made to simulate the cloud behaviour. Cloudsim [43] is one of the

sophisticated simulators for simulating general cloud computing infrastructure. Cloud Analyst

is another simulator [44] built on the Cloudsim and provides nice user interface for configur-

ing the cloud computing infrastructural components. We will be using Cloudsim and Cloud

Analyst for simulating the behaviour of Cloud. Few other simulators have been built upon the

Cloudsim: NetworkCloudSim [45] extends the Cloudsim with a scalable network and general-

ized application model, which helps to simulate scheduling and resource provisioning

policies in cloud datacenter. Similarly another cloud simulator [46] is focused towards simu-

24

Page 25: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

lating the storage aspects of the cloud.

2.1.7 Cloud computing offloading

Cloud offloading offers the opportunity for the mobile user to offload computational in-

tensive tasks onto cloud. But offloading to cloud is not always feasible in view of the energy

efficiency, network and cloud cost. For example, during offloading process mobile may start

consuming a lot of power to access the radio network. Let Pc , Ptr∧P i be the power consumed

by mobile for computation, transmitting and being idle respectively. S and M are the compu-

tational ability of cloud and mobile respectively. If B, C and D are channel bandwidth, com-

putation to be offloaded and offloaded data respectively, then according to [23], the energy

saved E by computational offloading is;

E=PcCM

−P iCS

−PtrDB (2.1)

PcCM denotes the energy expenditure if we execute a task in the mobile, while

PiCS

∧P trDB denote the total energy expenditure executing and transmission respectively if

we execute a task in the cloud. So E will be negative if it is feasible to execute in the mobile

and E will be positive if it is feasible to execute in the cloud.

The authors in [23] further suggest that cloud offloading is only energy efficient, if the off-

loaded data D is very small as compared to computational gain C offered by cloud. A dy-

namic cloud offloading algorithm has been discussed in [48], which partitions and offloads

the application dynamically such that mobile energy consumption is minimized.

2.1.8 Identified Research Gaps

As mentioned in the section 2.1.3, a lot of efforts jointly have been focused towards optim-

izing the behaviour of cloud computing resources and paving ways for providing excellent

QoS to the end user within limited available resources. In this way, although behaviour of

network has been taken into consideration in few researches but rapid variability of mobile

network, user preference oriented application scaling and optimizing the cloud computing

resource has not been investigated. In our outlined research, we will try to exploit those gaps,

in leveraging the cloud computing model for the application partitioning and offloading

framework.

25

Page 26: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

2.2 Mobile Communications Network

LTE (Long Term Evolution) is 4G mobile network standardization within the 3GPP (3rd

Generation Partnership Project). In comparison to the 3G network, LTE represents a major

advancement. LTE has been evolved to fulfil the demands of the end users for rich media

transport requirements as well as high-capacity voice support. LTE provides flexible band-

width and ensures high-speed data rate and ability to adapt itself for multimedia unicast and

broadcast applications [129].

Long Term Evolution (LTE) promises high data rates with very low latencies, particularly

for unsymmetrical data applications, where downlink data is much large than uplink data e.g.

video-streaming. LTE dynamic resource allocation makes it favourable for resource pooling

due to its bandwidth scaling (1.25, 2.5, 5.0, 10.0 and 20.0 MHz) feature. Moreover very low

control and user plane latencies (10ms, 50ms) and adequate performance at very high user

speed (120km/hr) helps to provide excellent user experience. For that, LTE system also takes

into account the channel variations [130]. When the radio channel varies significantly, that

change can be exploited to achieve large performance gains. The described features of LTE

makes it competitive candidate to leverage cloud based processing in mobile communication

perspective. LTE has an inherent mechanism which changes the Modulation and Coding

Schemes (MCS) in accordance with the Channel Quality Indicator (CQI). CQI is a 4 bit bin-

ary number which is reported by the end user in each Transmission Time Interval (TTI). It

indicates the state of channel i.e. 1111 and 0000 being the best and worst channels available

respectively. Similarly LTE has inherent QoS management mechanism which allocates the

priority in LTE scheduler according to the different traffic requirements. In this way, QoS

Class Identifier (QCI) is used. Logical and Physical channels are mapped together to provide

appropriate services required by a certain set of users.

The LTE physical layer (LTE-PHY) provides highly efficient way of transportation for

data as well as signalling information that is exchanged between mobile base station (eN-

odeB) and mobile user equipment (UE). In the core of LTE PHY implementation lies highly

efficient mobile technologies like Orthogonal Frequency Division Multiplexing (OFDM) and

Multiple Input Multiple Output (MIMO) data transmission. In this way, Orthogonal Fre-

quency Division Multiple Access (OFDMA) is used on the downlink (DL) and Single Carrier

– Frequency Division Multiple Access (SC-FDMA) on the uplink (UL). In the following sec-

tion 2.2.1 we explain OFMA in detail.

26

Page 27: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

2.2.1 Orthogonal Frequency Division Multiple Access (OFDM):

OFDM is a multi-carrier wireless communications system which aims to provide high speed

and connectivity by countering the problem of intersymbol interference (ISI) as faced in

single-carrier systems.

2.2.1.1 Motivation for OFDM:

As the information is transmitted over the wireless channel, the signal takes number of

paths while reaching the receiver. In this way, it gets distorted. Typically (but not always)

there is a line-of-sight path between the transmitter and receiver. In addition to the main path

i.e. line of sight (LOS), there are many alternative paths which are created as signal gets re-

flected from various surfaces e.g. buildings, vehicles and other obstructions, as shown in Fig-

ure 2.2.

Figure 2-3 Multipath Reflections in Wireless Communications

2.2.1.2 Intersymbol Interference (ISI)

As explained in the section 2.2.1.2, due to the reflections from different places, at the re-

ceiver we receive multiple time delayed copies of the transmitted signal. The time delay de-

pends upon the in the distance travelled by the signals corresponding to their paths. If we

consider a symbol of information we transmitted from the transmitter (Tx), the time delayed

copies of that symbol are received (Rx) at the receiver. These copies are infused into each

other and cause Inter Symbol Interference (ISI) [130]. This effect is depicted in Figure 2.3 in

which the line of sight symbol is infused with non-line of sight symbol. ISI limits the per-

27

Page 28: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

formance of wireless communications. If we see the effect of ISI in frequency domain, we

realise that due to ISI we receive a distorted signal at Rx as shown in figure 2.3. In order to

solve the problem of ISI, various ways are proposed. A typical way is to use an equaliser

which delays each copy of the transmitted signal by the same amount and then combines

them together. But the performance of the equaliser is limited by the time disparity among

received signals (delay spread).

Figure 2-4: Effect of Intersymbol Interference

At high speed of 100mbps, it becomes impossible for the equaliser to remove ISI.

Figure 2-5: Effect of Frequency Selective Fading in Mobile Communications

2.2.1.3 Orthogonal Frequency Division Multiplexing (OFDM)

OFDM is a multi-carrier system which removes the ISI from received signal in the fre-

quency domain. OFDM is designed in such a way that it divides the available bandwidth into

smaller chunks (sub-carriers) and then the data is transmitted in parallel streams. Each stream

is associated with a corresponding subcarrier which is then modulated using different modu-

lation schemes e.g. QPSK, QAM, 64QAM based on the signal strength. In OFDM, data is

transmitted in parallel rather than serially, OFDM symbols transmission efficiency is not lim-

ited by the shorter symbols delay requirements as seen in single carrier systems. If we com-

press some signal in time domain it expands in the frequency domain. In view of the same

principle, OFDM symbols are relatively longer than symbols in single carrier systems be-

cause they are compressed in frequency domain. In addition to parallelisation of the symbol

28

Page 29: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

stream, in OFDM a cyclic prefix (CP) is also attached to the OFDM symbols [131]. So in

summary, we convert the serial symbol stream of symbols to parallel. The overall structure of

the OFDM symbol is shown in the Figure 2.5. As we can see, in addition to the data part, CP

is also attached.

Figure 2-6 Longer Symbol Periods and Cyclic Prefix in OFDM

2.2.1.4 OFDMA:

When multiplexing is integrated in OFDM, the structure of OFDMA is formulated.

OFDMA serves the same function as any multiple access schemes by allowing the eNodeB to

communicate with multiple UE simultaneously by dividing the physical resources intelli-

gently. OFDMA is integrated into many sophisticated modern communications systems i.e.

WiMAX, IEEE 802.11 and LTE. At the transport layer, OFDMA provides a Carrier-Sense

Multiple Access (CSMA) to sense which multiple users are transmitting at the same time.

Due to the multiple access the OFDMA is more efficient in use of network resources [132].

2.2.1.5 Multiple Input Multiple Output (MIMO)

The efficiency of the OFDM is further increased using the MIMO. The efficiency of the

physical layer of LTE (LTE PHY) is further improved by inclusion of multiple transceivers

(XCVR) at both the eNodeB and User Equipment (UE). In this way, due to the diversity

offered at the transmitter as well as receiver, link robustness as well as data rates are en-

hanced [133]. Figure 2.6 shows a MIMO setup in which antenna diversity is provided at the

transmitter as well as at the receiver side by multiple transceivers (XCVR, XCVR-A and

XCVR-B).

29

Page 30: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 2-7 Multiple Input Multiple Output (MIMO)

2.2.1.6 Maximum Ration Combining (MRC)

There are various ways by which the streams of multiple antennas are combined together.

For example, in the case of the maximal ratio combining (MRC) the streams which have

more strength are combined. When signal strength is low, to cope with the challenges offered

by multipath effect, receiver can use the multipath effect in its own favour by intelligently

combining different streams. Multipaths are used to improve the radio link reliability and in-

creasing link robustness by reducing errors. MIMO, as discussed above, is used to increase

throughput and data rates. MRC in essence creates receiver diversity as compared to antenna

diversity in MIMO systems. Figure 2.7 shows maximum ratio combining (MRC) in which

best parts of the signal are combined while deep fades are rejected. MRC improves the signal

strength in the frequency domain [130].

30

Page 31: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 2-8 Maximum Ratio Combining in Wireless Communications

2.2.1.7 Single Carrier Frequency Division multiple access (SC-FDMA)

As explained in the earlier sections, OFDMA provides high data rates and system robustness;

it requires high changes of power at the UE. This causes high Peak Average to Power Ratio

(PAPR). If we compare UE and eNodeB, the power consumption becomes the main concern

for the UE terminals. OFDM is highly efficient in providing ISI free high data rate commu-

nication between UE and eNodeB, but due to the presence of large number of independently

modulated sub-carriers, the peak value of power can become very high as compared to the

average value of whole system. High PAPR can be a big concern of the UE. So for the LTE

uplink, OFDM has been tailored to reduce high PAPR issue in view of the UE requirements.

The modified version of OFMA is called the Single Carrier – Frequency Domain Multiple

Access (SC-FDMA). In SC-FDMA, the overall transmitter and receiver architecture is same

as OFDMA. Multipath protection offered by SC-FDMA is the same as OFDMA but by chan-

ging underlying waveform in SC-FDMA, lower PAPR is achieved. As a result, in uplink the

need for sophisticated UE transmitter is avoided [130].

2.2.2 LTE Network Architecture:

In contrast to the circuit-switched 2G and 3G systems (GSM, UMTS and CDMA2000),

Long Term Evolution (LTE) supports only packet-switched services. In LTE packet switched

services connects the user equipment (UE) and the packet data network (PDN). LTE provides

high QoS in terms of connectivity without any disruption to the end users’ applications during

mobility [140]. In comparison with the previous telecommunication system Universal Mobile

Telecommunications System (UMTS) radio access through the Evolved UTRAN (E-UT-

RAN), LTE uses System Architecture Evolution (SAE) as radio access, which includes the

Evolved Packet Core (EPC) network. Together LTE and SAE comprise the Evolved Packet

System (EPS). As shown in the Figure 2-8, a bearer is a virtual link connecting the UE with

the gateway in order to transfer the IP packet flow with a specific quality of service (QoS.

EPS uses the concept of EPS bearers to direct IP traffic from a gateway to the UE. In view of

the requirements posed by the applications, bearers are setup by E-UTRAN and EPC to-

gether. Figure 2-9 shows the protocol stack along with the corresponding interfaces in accord-

ance with the functions provided by the different protocol layers. In this way, the end-to-end

bearer paths along with QoS aspects are shown.

31

Page 32: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 2-9 LTE Architecture [140]

As discussed, the core network is called EPC in SAE controls connectivity of the UE with

network and manages the establishment of the bearers.

The main logical nodes of the EPC are:

• PDN Gateway (P-GW)

• Serving Gateway (S-GW)

• Mobility Management Entity (MME)

In addition to mentioned nodes, Home Subscriber Server (HSS) and the Policy Control and

Charging Rules Function (PCRF) are also part of EPC [140]. Control of multimedia applica-

tions services such as Voice over IP (VoIP) is provided by another entity called IP Multimedia

Subsystem (IMS), which is considered to be outside the EPS itself.

PCRF and HSS are described below:

Policy Control and Charging Rules Function (PCRF) controls the policy control decision-

making. Additionally Policy Control Enforcement Function (PCEF) manages the flow-based

charging functionalities of the network. The PCRF provides the QoS authorization (QoS class

identifier [QCI] and bit rates) that decides how a certain data flow will be treated in the PCEF

and ensures that this is in accordance with the user’s subscription profile. [140]Home Sub-

scriber Server (HSS) contains users’ SAE subscription data e.g. EPS-subscribed QoS profile.

It also controls the aspects of roaming and holds information about the PDNs to which the

user can connect. [140].

Attachment and registration data of users in also stored inside the HSS as dynamic inform-

ation which is constantly changing. Additionally an authentication center (AUC) is integrated

in the HSS which generates the vectors for authentication and security keys.

Packet Data Gateway (P-GW) is responsible for controlling the IP address allocations for

different users, as well as QoS enforcement and flow-based charging according to rules from

the PCRF. In this way, P-GW filters the traffic from users different QoS-based bearers with 32

Page 33: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

the help of Traffic Flow Templates (TFTs). Moreover for reservation base services requiring

guaranteed bit rate (GBR), P-GW enforces the QoS. P-GW also behaves as a pivot for inter-

working with non-3GPP technologies such as CDMA2000 and WiMAX networks [140].

Service Gateway (S-GW) is responsible for transferring the IP packets for moving users. It

serves as the local mobility anchor for the data bearers when the UE moves between eN-

odeBs. When a user is in the idle state its bearer information is also managed by S-GW. Addi-

tionally, other administrative functions are also performed in the S-GW. This includes the in-

formation related to charging when a mobile user moves in the visited network.

Figure 2-10 QoS Management in LTE [140]

S-GW also provides linking ability with the other 3GPP technologies (mobility anchor)

such as general packet radio service (GPRS) and UMTS. [115]

Mobility Management Entity (MME) is the control node that processes the signalling

between the UE and the core network (CN). Non Access Stratum (NAS) protocols provides

the linking ability of the UE to the CN. In this way, the main functions of the MME can be

classified broadly into following classes:

Bearer management – This includes the establishment, maintenance and release of the

bearers and is handled by the session management layer in the NAS protocol [140]. 33

Page 34: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Connection management – This includes the establishment of the connection and security

between the network and UE and is handled by the connection or mobility management layer

in the NAS protocol layer [140].

2.2.3 Research in Mobile Network (LTE)

From service delivery perspective, a lot of efforts has been made in LTE based systems for

the efficient service delivery (video [49], gaming [50]), throughput maximization, fairness of

resource distribution among the users [51], radio resource optimization and QoS enhance-

ments [52].

The Evolved Packet Core (EPC) of LTE, provides UEs with scalable wireless resources

and IP connectivity to the packet data network. In this way, EPS supports multiple data flows

with different QoS per UE for applications that need GBR (guaranteed bit rate). There are

many issues need to be addressed in mobile network from end-to-end QoS point of view, ac-

cording to different traffic types, at different levels (application level and connection level)

[53].

2.3 Applications Context

In view of the cloud resource exploitation and network leveraging opportunities, gaming

and video find a lot of attraction because both traffics require high degree of content pro-

cessing and delivery mechanisms. Online Cloud Gaming is an emerging avenue for cloud

computing research. The growth in terms of connectivity and capacity offered by networks

has been increasing over the last era, which can certainly pave way for the thin client systems

as discussed in [2]. In thin client systems, thin client (mobile device) is scare of computa-

tional and storage resources, so cloud computing resources are leveraged to perform high

computational intensive task. In this way, authors have discussed gaming applications in

which mobile device sends only user actions to the cloud server, which are processed and de-

livered through the network. Sujit Dey and his colleagues has done a lot of work in view of

QoE in gaming environments and they managed to publish a lot of literature [26][34][54] and

[55] focused on mobile gaming application in real time scenario. Cloud computing literature

also characterizes the network related issues e.g. latency, bitrate, packet losses and their im-

pact on user QoS. For example, in [26] and [55] authors worked out preliminary mathemat-

ical model relating packet delay, packet loss and QoE. Trade off exists between the commu-

nication overhead and the computational complexity. A methodology for applying the cloud

computing model in LTE based mobile networks has been mentioned in [56]. The authors

34

Page 35: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

discuss cloud platforms Openstack, Eucalytus and OpenNebula from the perspective of ser-

vice delivery in LTE network. A series of network implied issues e.g. jitter, latency, packet

loss and protocol issues on cloud computing has been discussed in [29]. As compared to gam-

ing, video communication is more mature and a lot of literature has been published. We have

already mentioned the relevant state of the art related to video delivery through LTE in sec-

tion 2.2.2.

2.3.1 Application Offloading

The emergence of cloud computing resources allows overcoming a number of resources

limiting problems faced in the mobile computing, since the cloud resources are characterized

by as enormous scale that can be accessed anytime and anywhere in the world. A large num-

ber of cloud service providers are appearing these days for data storage and processing, e.g.

Amazon EC2 [57], Apple iCloud [58], Microsoft Windows Azure [59], and Google App En-

gine [60]. Such systems use proprietary cloud platforms to provide different kinds of ser-

vices.

Extensive research has been made in the convergence of mobile networks and cloud com-

puting and still a lot of areas are being researched. Since both mobile networks and cloud

computing are quite dynamic in terms of their infrastructure as well as the services so the

challenges continue to emerge and propositions are made to cope up with the challenges [61].

Cloud offloading is one of the emerging trends in distributed computing involving mobile

devices.

2.3.2 Offloading leverage by Cloud Computing

Traditionally mobile devices have always been limited in terms of their computational &

storage capacity as well as battery life. As a result, resources intensive multimedia and com-

putationally complicated signal processing tasks are unable to run on them [62]. So instead of

executing the applications on the mobile device, we can offload the resource intensive seg-

ments of the application to surrogate i.e. cloud computing server via wired or wireless chan-

nel. In this way, we exploit the abundant cloud resources in terms of storage and processing

of the data. This offloading scheme critically depends on a reliable end-to-end communica-

tion and on the consistent availability of the cloud [63]. Vulnerabilities associated with off-

loading to cloud computing servers include high network access latency and low network

bandwidth. Moreover, since wireless network is highly sensitive to datarate variability as well

35

Page 36: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

as packet losses so cloud computing services can be quite limited in this case.

2.3.3 Offloading leverage by Cloudlet

In this framework, rather than offloading to the remote cloud, we can leverage the re-

source deficiency of a mobile device via nearby resource-rich cloudlet via a WLAN hotspot.

In this way we manage to overcome the latency limitations as well to reduce the consumption

of the mobile battery. A cloudlet is imaged as a small scaled cloud having a cluster of com-

puters that is well-connected to the internet via wired or wireless means serving the mobile

devices in limited proximity. So the resource intensive application tasks are first offloaded to

the cloudlet, and then later cloud computing resources are exploited if need. In some applica-

tions like image retrieval we need huge database of images which can’t be stored inside the

mobile phone [64]. So in these kinds of applications we offload further to cloud computing

servers through a stable internet connection. In this way, we manage to overcome the high

latency problem faced in the former technique. From energy point of view, offloading to

cloudlet saves energy because of access to the short range wireless connection [65]. In case of

loss of the cloudlet service we can retrieve our offloaded tasks and manage to execute them

on alternative avenues.

2.3.4 Research Gaps

A number of approaches are encountered which promises to solve the problem of resource

limitation in mobile devices. A summary of the approaches and their corresponding solutions

proposed has been briefly summaried:

While the solutions discussed in the section 2.3.2 show quite improvements by shifting

burden from mobile phone onto the cloud, applications partitioning algorithms shows prom-

ising results by meeting certain objective set prior the offload. But the contextual models used

in the techniques mentioned are relatively quiet simplistic [66]. Moreover, most of the work

done in the field of application partitioning and offloading methods is from the perspective of

computer science. A lack of in depth understanding of mobile network is quite apparent in all

the technique mentioned. The behaviour of the network is not studied and modelled because

only simple parameters like bandwidth have been considered in the network contextual

model. Vulnerable network ultimately limits the opportunity to harness the true potential

offered by cloud computing for the mobile device [67].

36

Page 37: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

2.3.5 Characterization of Mobile Environment

We focus on today’s mobile environments in view of their performance limitations for

different kind of applications. To identify several opportunities to bridge those limitations, we

focus towards hardware abilities of mobile phones as well as the support provided by the mo-

bile platforms. We did a small survey of the available mobile phones with their corresponding

CPU speed, RAM available and supported networks. For any computing device, considera-

tions of size, battery life, heat dissipation and other form factor elements have implications on

hardware capabilities such as processor speed and memory size [68]. Unlike desktop ma-

chines, mobile devices aggressively lack performance in view of their smaller sizes, lower

costs and power efficiency [69]. Table 1 shows the CPU speed and available RAM per device

for different set of classes.

Table 1 Heterogeneity of Mobile Devices [70]

As evident from the Table 1, we observe that laptops and desktops have much faster CPU

abilities (about 1.5x and 2.3x). Similarly, laptops and desktops also outclass mobiles and tab-

lets in terms of RAM available for applications (about 3.5x and 9x). On the other hand, mo-

bile devices are all 3G, 4G and Wifi enabled. This trade-off between hardware limitations and

mobility constraints has an effect on the performance and functionality of the applications.

Therefore many desktop applications have lighter counterparts tailored for mobile devices.

We can conclude that, mobile hardware exhibits relatively low performance relative to

servers or desktop hardware. Moreover mobile technologies are evolving fast and we see dif-

ferent set of classes emerging within mobile devices in terms of CPU, memory and network-

ing facilities they offer. So we can say that, simultaneous availability of computation power,

memory and network resources will always be a compromise. This gives an insight to an op-

timization problem, which can be stated as following;

In view of the limited resources available on the mobile devices, the application parti-

37

Page 38: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

tioning and offloading solutions can efficiently enable resource-constrained mobile devices to

leverage the richer hardware resources of remote servers i.e. clouds [71]. Moreover, the

serving protocols within the cloud (hypervisitors) e.g. Xen, VMware and KVM [138] also

influence the response time of the cloud, which limits the effectiveness of the application par-

titioning and offloading. While offloading to the cloud the delay overhead introduced by the

hypervisitors need to considered.

2.3.6 Mobile Battery

In the mobile phone market, mobile battery still bears the biggest concern. Due to

emergence of rich multimedia and applications involving rich graphics, the burden on drain-

age of battery is increasing. Moreover, in comparison with the rate at which the hardware

components dissipate power is still much higher than the rate at which storage ability of the

mobile devices is growing [72]. As a result, battery capacity has become the most important

constraint while developing the computational intensive applications.

2.3.7 Mobile Platform

Android and iOS are the most popular mobile platforms in the mobile device market.

While discussing the mobile support for the mobile phones, we will focus on these two plat-

forms. The Android platform supports various devices with different hardware capabilities,

sizes and features. Android applications are usually developed using the Java programming

language, though C and C++ are also supported. Java applications on Android devices are

compiled to byte-code which is Android’s application-level, register-based variation of Java’s

VM. The Android source code and SDKs are publicly available [73].

In contrast, iOS is only available on a small number of devices, specifically the differ-

ent generations of iPhone smartphones and iPad tablets. The programming language of

choice for iOS development is Objective-C. This is a language that is based on the C syntax,

but with extensions for object-oriented concepts such as classes, inheritance, Smalltalk2-style

messaging and dynamic typing.

Code offloading approaches explicitly target applications written in managed pro-

gramming languages such as Java or C# on mobile platforms such as Android, which support

the programming language constructs and runtime facilities described above. Either all, or

just a subset, of these properties is essential for the operation of current offloading systems.

They allow for automatically transferring application state to a remote node, executing ap-

plication code remotely on demand and merging state changes on the mobile device to re-38

Page 39: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

sume with local execution. By relying on such properties, existing offloading approaches are

not applicable to applications written in unmanaged programming languages with rudiment-

ary runtime support, such as Objective-C applications on the iOS platform.

2.3.8 Taxonomy of Application Partitioning

A comprehensive taxonomy of application partitioning has been depicted in the figure

2.8. This includes the granularity of application to be partitioned, corresponding theme and

objective function of partitioning, represented model of the application, support of program-

ming language, partitioning allocation decision and analysis technique [72].

2.3.8.1 Partitioning Granularity

The partitioning granularity attribute of an APA indicates the granularity level for par-

titioning computational-intensive mobile application [74]. Current APAs implement the fol-

lowing granularity levels for application partitioning:

Module level partitioning: The complete model of the application consists of modules.

Modules of the application are partitioned and distributed among cloud and mobile.

Method/Objective/Thread level partitioning: Focus of the partitioning lies at the method/

object/thread level of the application respectively.

Class/Task level partitioning: Application is partitioned into classes for Offloading.

Task level partitioning: Application is partitioned according to Task.

Component level partitioning: Partitioning a group of classes which may or may not be

coupled for outsourcing to the remote server.

Bundle level partitioning: Groups of Java class of applications are partitioned.

Allocation-site level partitioning: Partitioning occurs on the level of allocation site where

all the objects at this particular site will be seen as a single unit.

Hybrid level partitioning: The results of partitioning consist of different granularity.

2.3.8.2 Application Partitioning Objective Functions:

Application partitioning is highly dictated by the underlying objective function fulfilling the

corresponding constraints implied by that objective function. Application can be partitioned

on basis of single objective function or a weighted combination of different objective func-

tions. Fusion rule and normalization of different set of objective functions is itself an optimiz-

ation problem. In this regard, several authors have used sum rule: weighted sum of all the ob-

jective functions [74].

39

Page 40: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

A description of relatively important objective functions is given below:

2.3.8.2.1 Performance improvement:

The application being partitioned must fulfil a task and the accuracy of that task in terms of

some objective parameter is one of the most important objective parameter. In our experi-

ment, we have used retrieval efficiency as measure to judge the performance of partitioning.

Performance measure can also include the algorithms efficiency in terms of latency, execu-

tion time and CPU workload.

2.3.8.2.2 Minimizing the network cost:

In case of offloading to the cloud, the access and usage of network is costly. So network cost

is minimized as one of the objective function. In our approach, we have enlisted all the relev-

ant parameter of LTE (4G) network. Then we have inter-related the parameter’s to derive a

comprehensive network cost objective function.

2.3.8.2.3 Reducing cloud cost:

Surrogate (cloud) resource comes with price. Cost of cloud is related to how many virtual

machines we exploit to execute our task remotely. So reducing the computation offload to

save cloud cost is one of the objective functions.

Saving energy: Prolonging battery life by offloading computation is one of the crucial factors

in application partitioning.

2.3.8.3 Partitioning Model:

Model represents the framework used to represent different components of the application

and different attributes. Graph based partitioning models abstracts the application in terms of

a graph. In this way, application methods and data exchange is represented by the vertices

and edges respectively. Some authors [67] have used Linear programming (LP) model in

terms of linear equations to represent application partitioning. Hybrid approaches include

merging graph and linear programming models for implementation of application partition-

ing. In our approach we have used graph based approach to represent the application, as ex-

plained in detail in chapter 4.

40

Page 41: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

2.3.8.4 Programming Language Support (PLS):

PLS discerns the types of programming languages supported by partitioning algorithm. As

evident by name: single programming language support restricts the application partitioning

to a certain environment while multiple programming languages supports widen the partition-

ing. Universal application support allows supports of majority of applications. In ours parti-

tioning framework, multi-language support of MATLAB and java has been ensured.

2.3.8.5 Allocation Decision:

The decision-making policy dictate the attribute related to decisions related to how compon-

ents of application will allocated in a local or a remote server. Allocation decision is de-

scribed broadly into three cases:

(a) Online, where the decision is made and continuously updated during runtime.

(b) Offline, where the decision is made before execution and remains fixed.

(c) Hybrid, as the name suggests, it is mixture of above two. The decision is done by a pro-

grammer-defined specifications or static analysis tool.

2.3.8.6 Analysis Technique:

The dependency relationships among multiple components of an application is dis-

cussed in terms of analysis technique. In most cases the structural relationship and connection

among the components (classes/methods/tasks) remain the same, static. In those cases profil-

ing of the application is performed at the start and remains the same during partition/offload-

ing stage. On the contrary, dynamic case is relatively difficult, as it involves the runtime pro-

filing because the relationship among the components keep on changing based on input data.

A comprehensive summary of the application attributes described above, is depicted

in the Figure 2.10.

41

Page 42: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 2-11 Taxonomy of Application Partitioning42

Page 43: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

2.3.9 User Contextual Model

User social & subscription profile, QoS perception, mobile hardware (resolution, battery

status) contribute towards the User Contextual model (UCM). UCM plays an important part

in allocating appropriate resources in different modules (network, cloud). The entities which

contribute towards battery consumption in mobile phones are explained in [75] and [76]. In

this way, a simplistic mobile hardware model has been derived in [75]. In view of cloud and

network resources, QoS management in view of user demands has been discussed in [77]. A

traffic prioritization methodology in LTE network has been discussed in [78]. In this way, a

heterogeneous traffic model has been used. At the network base station, one traffic is priorit-

ized to other, such that user QoS is preserved and network capacity is enhanced. In our exper-

iment, we will be using the same user QoS model while considering the user contextual QoS

model.

2.4 Multi-objective Optimization (MOP)

A comprehensive chart depicting multi objective algorithms has been shown in the Figure

2.11. Multi-objective optimization has been divided into two broad areas. Traditional calculus

based approaches addresses the problem by employing a single fitness function consisting of

a weighted sum of the multiple attributes, and optimizing over this. These weights were then

adjusted, and the problem re-optimized to generated more solutions that would eventually

enable a decision-maker to choose the most appropriate solution from a range of what are

known as non-dominated solutions, where no one solution is better than the others in all re-

spects. In heuristic based approaches, many algorithms have been developed broadly divided

into evolutionary algorithms (EA) [90], natural inspired algorithms [117] and logical search

algorithms [118]. Evolutionary algorithms generate a number of solution for the multi-object-

ive problem and aim to find the better solutions by refining the solutions set. EA’s are further

classified among Genetic Algorithms (GA’s) [119], Particle Swarm Optimisation [120] and

Differential Evolution (DE) [121]. Nature inspired algorithms works by taking different nat-

ural phenomena’s involving natural entities interacting together e.g. Ant Colony Optimization

[81] and Bee Algorithm [80]. Lastly logical search algorithms works by improving the solu-

tion refining process of finding the optimal solution e.g. Tabu search [118].

In addition to the mentioned approaches, a lot of optimization methodologies has been

43

Page 44: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

present in literature including Multiple Criteria Decision Making (MCDM) [79], Fuzzy Sys-

tems and Game theory [80] promising to optimize the behaviour of multiple entities in-

volving conflicting variables.

Figure 2-12: Classification of Optimization Algorithms

44

Optimization Approaches

Traditional (calculus)

Heuristic Methods

Evolutionary Algorithms

Genetic Algorithms

Particle Swarm Optimization

Differential Evolution

Other nature Inspired

Algorithms

Simulated Annealing

Ant Colony Optimization

Bee Algorithm

Bacterial Foraging

Optimization

Cuckoo Search

Logical Search Algorithms

Tabu Search

Extremal Optimization

Cross Entropy Method

Harmony Search

SNAP

Page 45: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

In view of the requirements and complexity constraints imposed by our end-to-end com-

munication framework, we selected pareto based genetic algorithm multi-objective optimiza-

tion methodology because of its ability to model the behaviour of end-to-end communication

modules involving multiple objective functions.

Multi-objective optimization aims to find a set of most feasible solutions (pareto front) in

view of multiple objective functions and constraints. Let consider that, we want to maximize

objectives (f 1- cheapness and f 2- efficiency) and we come across multiple solutions indicated

as black dots in the Figure 2.12 a. Solution A maximizesf 1amd f 2as compared to a set of

solutions shown in grey areas. So solution A is said to be dominating the solutions in grey

area. If we look carefully, we observe that solution A is still dominated by some other solu-

tions.

Figure 2-13: a) MOP dominance b) Pareto front in MOP

Aim of MOP is to find the solutions which are not dominated by any other solutions. Such

set of solutions are called pareto-front solutions. An important difference between single and

multi-objective optimization is that, multi objective optimization does not find a single solu-

tion but a set of most feasible solutions (pareto-front).

2.4.1 Pareto Optimization Algorithms

In literature, a lot of pareto based evolutionary algorithms are present namely Vector Eval-

uated Genetic Algorithm (VEGA) , Multi-objective Genetic Algorithm (MOGA) [83], Niched

Pareto Genetic Algorithm (NPGA) [84], Pareto Archived Evolution Strategy (PAES) [85],

Strength Pareto Evolutionary Algorithm (SPEA) [86], Nondominated Sorting Genetic Al-

gorithm (NSGA) [87] and NSGA-II [88]. A comprehensive survey of relative performance of

the mentioned algorithms has been provided in [89] and [90]. A complete chart of different

genetic algorithms has been provided in Appendix IV and V. NSGA-II provides empirically 45

Page 46: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

very near-optimal solutions with the moderate complexity cost. Moreover it is fast and scal-

able. In view of the complexity, convergence, scalability optimality performance metrics we

chose NSGA-II algorithm.

2.4.1.1 NSGA-II Algorithm

In view of relatively low complexity and corresponding less memory requirements, Non

Sorted Genetic Algorithm-II (NSGA-II) [88] is one of the finest evolutionary algorithm men-

tioned in the literature. Brief overview of NSGA-II algorithms is given below:

1. First of all, a fixed number of solutions are randomly chosen called the population size.

Each solution is decoded in terms of binary representation called chromosome.

2. Chromosomes are sorted and put into fronts based on Pareto Non dominated sets. Within

a Pareto front, the chromosomes are ranked based on the Euclidean distance between

solutions. Generally, solutions which are far away (not crowded) from other solutions are

given a higher preference during selection. This is done in order to make a diverse solu-

tion set and to avoid a crowded solution set (local minima or maxima).

3. The best N (population) chromosomes are picked from the current population and put

into a mating pool.

4. In the mating pool, tournament selection, crossover and mutation is done. Crossover

refers to breaking two chromosomes from a predefined point and joining them together to

create a new chromosome. While mutation refers to random single bit change in a chro-

mosome. In this way, new population is created in mating pool.

5. The mating pool and current population is combined. The resulting set is sorted, and the

best N chromosomes make it into the new population.

6. Go to step 2, unless maximum number of generations have been reached.

7. The solution set is the highest ranked Pareto non dominated set from the latest popula-

tion.

Population size and number of generations has a great influence on the efficiency of the

algorithm.

2.5 Pareto Multi-objective Optimization in Cloud and Network

In literature a lot of efforts are been found in the context of optimizing resources in the

network and cloud. Some author's has opted pareto optimization methods. In [91], authors

apply MOP on LTE based cellular multi-user scenario and maximize the user throughput by

marginalizing the Inter-cell interference cancellation coordination (ICIC). Similarly in [92], 46

Page 47: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

authors propose an adaptive algorithm to allocate resources in multi-user cellular scenario at

bit and subcarrier level, considering objective of rate maximization within the total power

constraint using NSGA-II algorithm. Similarly, authors in [93] attempt to improve the energy

efficiency of cellular system by dynamically switching the LTE base stations based on user

demands.

In cloud computing, pareto based multi-optimization has been used to dynamically distrib-

ute and schedule the cloud resources (CPU, RAM, Virtual Machines). In [94], authors man-

age to balance the load on cloud resources using a pareto optimization based scheduler. Also

they have applied ant colony optimization to improve the task scheduling of the cloud. In this

way, scheduler adapts its strategy according to the changing environment and types of tasks.

Multi-objective optimization is highly relevant to the mobile cloud context as the resource in

the mobile and cloud.

2.6 Summary

A lot of optimization efforts have been made in optimizing the individual behaviour of the

cloud, network, application and the user Models. Few efforts have been made to combine

cloud computing and LTE [56]. But these efforts are majorly focussed on protocol domain

and on the virtualization of mobile networks. No collective effort has been made to optimize

the collaborative behaviour of cloud, network, application and user contextual models.

In view of the research gaps mentioned, we will present a holistic framework of optimiz-

ing collective behaviour of cloud, network resources in view of application and user context.

In this way, in next chapter we will simulate the behaviour of cloud and network models in

terms of respective performance parameters. Then in view of application and user QoS, we

will apply multi-objective optimization algorithm to minimize the amount of resources alloc-

ated in cloud and network. At the end, based on simulation results, we present a more elabor-

ated multi-objective optimization model.

47

Page 48: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

3 MULTI-OBJECTIVE OPTIMIZATION IN CLOUD MO-

BILE ENVIRONMENT

An end to end communication framework comprises quite a number of entities as summa-

rized in the last chapter. In this chapter, we will describe each entity in terms of its perfor-

mance parameters and corresponding aggregate objective function. This approach generates

a lot of dependent and independent parameters. To account for all the entities and their corre-

sponding parameters, we have formulated a CANU (Cloud-Application-Network-User) archi-

tecture which joins all the entities. Then we will apply multiobjective optimization on the col-

lective framework involving all the models to optimize the behavior of each entity jointly. An

overview of optimization flow in view of different contextual parameters has been shown in

Figure 3.1. Based on the demands of the application, resources are reserved in the cloud.

Wireless network provides access mechanism for the user based on its QoS requirements.

Figure 3-14: Contextual Model and their corresponding parameters

Cost-benefit approach has been adopted to design the objective function of each entity in

the end to end communications. For example, SNR allocated to user is cost in network per-

spective, while throughput achieved is corresponding benefit. The relation between SNR-

throughput is not linear. Cost investment after a knee point (Q) does not translate into propor-

tional benefit. Figure 3.2 shows a scenario involving knee point. After Q, the cost investment

at the input resources does not translate into proportional benefits at the output. Aim of the

optimization is to find Q of all of the objective functions of each entity and use them to maxi-

mize/minimize the objective function.

48

Application profile

According to User Requirement Application profile is chosen

Resource Reservation in

Cloud

Cloud resouces: Blocking Probability, Load, Number of VM's

Mobile Network Resource Allocation

Network Resources: SNR, Bandwidth, throughput, BLER

User QoS

Measured QoS in view of changing the traffic intensity.

Page 49: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 3-15: Cost-Benefit optimization model and Knee Point

We have tried to exploit all those knee points in the end to end communication scenario. In

this way, we aim to design the objective functions such that we obtain maximum benefit from

the minimum cost investment. In other words, objective functions maximizes the

Benefit−Cost term denoted in the equation below. It finds those feasible solutions from the

complete solution set.

Objective function=max Benefit−Cost (3.1)

Maximizing a single objective function is simple, but scenarios where multiple objective

functions are involved and input/output parameters are conflicting in the objective functions,

then finding the optimum solution which satisfy all the objective functions is quite difficult.

This eventually promises to deliver required QoS with minimum system resource invest-

ments.

An overview of the end-to-end communication system has been depicted in Figure 3.3.

The Figure shows the interaction of mobile network and cloud computing infrastructure in 49

Page 50: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

view of user and application context. Corresponding parameters of each module has been de-

scribed. In section 3.1-5, we elaborate the behavior of each contextual model in view of the

mentioned parameters. Then in section 3.6, we define the outer blue boundary depicted in

Figure 3.3, i.e. multi-objective optimization. In the end, in view of the simulation results, we

formulate and propose a comprehensive single user optimization model in section 3.7.

Figure 3-16: Contextual Models in optimization domain

3.1 End-to-End Communication Models

In this section, we aim to formulate the cost-benefit model of each constituent entity

involved in end-to-end communication framework. We will start with theoretical aspects and

will extend the theoretical approach to fully working simulation model of each entity in the

mathematical form. In this way, we have used various regression schemes (linear, quadratic,

and exponential) to fit the curve in the simulation results of each model.

3.1.1 Application Profile

Application profile dictates the resource allocation in cloud, network and user hardware.

In end to end communication scenario, system parameters highly depend upon the application

model. LTE release 8 3gpp document [60] provides a generalized overview of applications. A

relative usage of five major traffics is given in appendix II. It is expected that, the given per-

centage of use will change considerably in next 5 years. Ericsson Mobility report [115] pro-50

Page 51: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

vides the recent percentage distribution of different services. From the trends, it is estimated

that, video traffic will increase upto 70% by 2020 [115]. As compared to Voip, Http and ftp

application, gaming and video streaming find enormous applications in cloud based content

delivery, as mentioned in section 2.3. So we have considered a traffic mix of both applica-

tions.

A comprehensive description of traffic models of both application in view of statistical

distribution of packet sizes and packet interarrival times, is available in appendix III. More-

over, in view of the specific profile (resolution, interactivity) of the application, the key pa-

rameters are varied to generate corresponding k profiles.

In our scenario, we have assumed a granular application having k profiles. Each profile

has its associated packet size ξ (k ) and packet interarrival rate ς (k ). [ξ (k ) ς(k )] is then used to

allocate corresponding resources in cloud and network.

3.2 Cloud Model

As explained in section 2.1.3, cloud provides huge amount of fault-tolerant, scalable and

reliable infrastructural resources for certain applications. The overall cloud architecture has

been divided among different layers having certain functionality. On physical layer, cloud

infrastructure is empowered by collection of datacenters, on which a huge number of appli-

cation and storage servers are installed. Individual servers are dynamically provisioned and

shared among multiple users by virtue of virtual layer. Virtual layer allows virtual machines

(VM’s) to share individual/multiple server(s) to execute applications based on user defined

QoS. On application layer, virtual machines are translated in terms of their ability to execute

cloudlets. A preliminary cloud model has been presented in [5], which accounts for different

parameters controlling the cloud cost. Cloud cost comprise of the execution cost of a particu-

lar task inside the cloud. Execution cost is the accumulated computational cost of the VM’s

used over a certain time interval. To simulate the cloud model, two approaches are adopted. A

java based simulator Cloudsim and an analytical approach Cloudsim results are used in few

scenarios, while most of the time we will use analytical model. There are a number of simula-

tion environments available but we have chosen Cloudsim because the input and output pa-

rameters of Cloudsim are quite relevant in our end to end communication scenario.

Firstly, we describe the Cloudsim approach. Cloudsim provide the user the ability to dy-

namically create and destroy the cloud essential components i.e. data centers, hosts, VM’s

and cloudlets. In this way, the effect of allocation of cloud resources (no. of VM’s, band-

width, storage and memory) can be measured in terms of the performance parameters (execu-51

Page 52: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

tion time, cloud cost). In our preliminary model, we have considered different application

profiles and their corresponding transcoding costs at the cloud. Cloudsim incorporates the

complexity of an application in terms of its computations requirement i.e. cloudlet length. On

the application layer of the cloud (SaaS), cloudlet length is translated in terms of bytes to be

executed (packet size). We simulated the effect of input and output packet sizes on the execu-

tion cost. From the input and output data results, we have done curve fitting to relate input

packet sizes x1 and output packet sizes x2 to the output parameter i.e. execution cost ω (, x2):

ω (x1 , x2)=( .1 x1+30 )(.1 x2+30)

where x1 , x2 and ω ( x1 , x2 ) represent input packet size, output packet size and execution cost

respectively. Above equations has been obtained by fitting curve in the simulated results.

These equations models a particular scenario in which the simulation was carried out. If a

generic scenario is considered then the constant 30 will be replaced by a generic constant i.e.

a. Graphically execution cost has been plotted in terms of input/output packet sizes in Figure

3.4. An increase in input/output packet sizes tend to increase the execution cost significantly.

Moreover in another experiment, we found out that the cost of execution of tasks in cloud,

depends upon cloudlet length and number of processing engines in the cloud.

π ( x3 , x4 )=(.005 x3−.21)(3.451 x4+.4615)

where x3 , x4 and π ( x3 , x4 ) represent cloudlet length, number of processing engines and

processing time respectively. Above equations has been obtained by fitting curve in the simu-

lated results. Processing time is translated into the latency constraints imposed by cloud.

52

Page 53: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

05

1015

2025

30

0510152025300

2

4

6

8

10

12

x 104

Output packet size (byte)Input Packet Size (byte)

Cos

t

Figure 3-17: Effect of Cloud Input & Output packet sizes on cost

Cloudsim approach provides simulated results comprising of cloud cost and execution

cost. Unfortunately, the results obtained in this way are subjected to the specific scenario in

which these results were obtained. In the following section 3.2.1, we aim to derive the gen-

eric model of the cloud using analytical approach.

3.2.1 Analytical Model of the Cloud Service:

Before formulating a quantitative model of the cloud for the sake of consistency we want

to introduce certain terminologies.

Virtual Machines (VMs): In order to quantify the extensive computational ability offered

by the cloud we can count virtual machines (VMs). These are emulated versions of the phys-

ical servers. Using VMs as resource unit of the cloud is just one of the possible choices. In

order to account for the computational ability offered by the cloud other units e.g. servers,

bytes or CPUs can be considered/employed [95]. But for the sake of consistency, we will use

VMs.

Customers (N): Number of customers accounts for the active users using the services of

the cloud services. In our thesis, we consider users who are accessing the services through

53

Page 54: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

wireless network.

Blocking (P¿¿b)¿: To account for the grade of service offered by the cloud, we use the

term blocking or blocking probability. As we discussed, cloud offers immense resources, in

certain scenarios requests are accepted, and joins the service queue of the cloud. As some ap-

plications are delay sensitive, so as a consequence the QoS requirements of those applications

tasks that are not finished within a certain time frame are regarded as missed tasks. In this

way the blocking probability not always means the blocking of a particular task, but also cer-

tain undesired scenarios which equates to blocking a particular customer using a certain kind

of cloud service.

3.2.2 Mathematical model of the cloud:

The fundamental question to be solved while finding the model of a cloud is:

To calculate the blocking probability of a new customer, if we know the current resource

(number of VM) and load (number of tasks in queue of the cloud)?

Alternately;

To calculate minimum amount of resources (VMs), if we know the load and the maximum

blocking probability offered by the cloud.

We assume public clouds follow the infinite source model while private cloud follows the

finite source model. In order to formulate the inter-relation between VMs, N and Load, we

start with queuing theory.

Kendall’s notation:

Kendall notation describes the queuing in the following notation:

A/ S /C / L/N

Where

A: the arrival process

S : the service time distribution

C : the amount of resource (virtual machines)

L : the capacity of the queue

N : the number of users whose job to be served

If we assume that the rate at which the customer’s task arrive and get serviced is exponen-

tially distributed [137] [139], we can formulate a relationship between blocking probability 54

Page 55: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

and the cloud load. As we know exponential distribution exhibits memoryless property, the

corresponding density functions is given by:

f (t)=P (X=k )=α e−αk , k>0 (3.2)

Corresponding Distribution Function:

F (t)=P( X ≤k )=1−e−αk , k ≥0 (3.3)

Since the exponential distribution exhibits the memoryless property.

P( X> x+k X>k)=P (X>x ) (3.4)

where the expected value and the variance of the exponential distribution are 1/α and 1/α 2.

Based on the memoryless property of the exponential distribution, we aim to find out the

mathematical equation of the blocking probability of the cloud (pubic, private) based on the

assumption that the customers’ requests arrive at exponentially distributed rate.

3.2.2.1 Public Cloud:

As discussed earlier, public cloud is projected as an infinite source model. In this model there

is no condition on the number of customers. Customers’ tasks/requests join the service queue

and get serviced according to the number of VM’s available. If all the VM’s are in use then

the tasks are delayed and sometimes blocked based on the time constraints of the service. At

last, the results of the processed tasks are returned back to customers. So public cloud is rep-

resented by M / M /∞ queuing system.

Figure 3-18: Infinite source model of Public Cloud [95]

55

Page 56: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

The same process can be formulated in the form of Markov chain as shown in the follow-

ing figure 3.6. Arrival and departure rates are described by λ and µ respectably. If arrival rate

λ is greater than departure rate µ then the length of the queue increases and vice versa.

Figure 3-19 Markov Chain Model of Public Cloud

As defined in the previous section, blocking probability is described as a qualitative meas-

ure about customer experience. In literature, research has been done in perspective of content

processing in cloud. [135] and [136] models is arrival of video packets follows the poisson

distribution. Moreover trace analysis experiments done on the google cloud shows that accu-

mulative arrival rate of jobs arriving in the cloud follows the poisson distribution [139]. If we

assume arrival process follows the Poisson distribution then the inter arrival times of the

tasks will be independent following exponential distribution. The probability distribution ob-

served by arriving customers will be equal to the equilibrium distribution of Marcov Chain

described above. So the blocking probability in this system is equal to the equilibrium prob-

ability that the system is in state C. Following equation has been derived by the analytical

approach, in view of equilibrium balance property of incoming arrivals and serviced requests.

Pb(C , ρ)=p (C ;C , ρ)= ρC /C !

∑i=0

C

ρi/ i ! (3.5)

the ratio λ /µ is called the load ρ of the system. It is a quantitative measure defining the

total amount of work that is arriving in the system per time unit i.e. λ (mean number of cus-

tomers that arrive per time unit). All arriving customers stay on average 1/µ time units in the

system. While deriving the blocking probability equations, we assume the buffer size of the

cloud remains same. Buffer size influences the number of tasks being rejected by the cloud

(blocking probability). In case of variable buffer size, blocking probability can be further im-

proved.

We simulated the above equation for different values of load, and see how blocking prob-

ability varies with respect to load for different VM’s.

56

Page 57: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

0 5 10 15 20 25 300

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Blo

ckin

g P

roba

bilit

y (%

)

Load

1 VM5 VMs10 VMs

Figure 3-20: Effect of Load on Blocking Probability for various VM’s

As shown in the Figure 3.7 that, the effect of load on the blocking probability (Pb) is quite

interesting. Pb is not linearly proportional to the load, but shows that there are knee point as

discussed at the start of the chapter 3. We can clearly see knee points in the figure 3.7 espe-

cially in the case of 1 VM (blue line, load=2.5). As the number of VM’s increase, the likeli-

hood of cloud to block customer tasks decreases i.e. blocking probability decrease for the

same amount of load.

We used regression equations to derive quantitative parametric model of the of the per-

formance metric of the cloud i.e. blocking probability.

Blocking Probability:

If x and y denotes the load and blocking probability respectively, then we can relate them

with each other via the equations below:

57

Page 58: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

VM = 1 : y=0.86 exp(.004383 x)−0.8517 exp(−0.7476 x ) (3.6)

VMs = 5 : y=2.424 exp−( .02126 x )−2.497 exp(−0.05639 x ) (3.7)

VMs = 10 : y=−.0002689 x2+.03473 x−0.08828 (3.8)

The above equations have been obtained by fitting curve into the simulation data repre-

sented in the Figure 3.7. As discussed earlier, the relation between load and blocking proba-

bility is not linear but exponential as expected.

Number of required VMs:

Answering the alternative question we formulated in the section 3.5, we start with block-

ing probability for C = 0, and keep on incrementing the number of VMs by 1 and see its ef-

fect on the new blocking probability.

1 2 3 4 5 6 7 8 9 10 1115

20

25

30

35

40

45

50

Blocking Probability (%)

Num

ber o

f VM

s

Load 30Load 20Load 10

Figure 3-21 Effect of Blocking Probability on Number of VM’s required for different Cloud Loads

As evident from the Figure 3.8, for the fixed load if the blocking probability start decreas-

ing (time constraints of the application are relaxed), the amount of resources need to be inves-58

Page 59: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

ted in the cloud start decreasing.

If x and y denotes the blocking probability and number of VMs respectively, then we can

relate them with each other via the linear regression equations below:

For load 30: y=−.54 x+46.58 (3.9)

For load 20: y=−.5x+34.64 (3.10)

For Load 10: y=−.29 x+20.65 (3.11)

We tried to formulate a parametric mathematical model of the public cloud in the form of

equations above. We related different parameters of cloud i.e. blocking probability, load and

number of VM’s to each other. We will use these equations later in multi-objective optimisa-

tion.

3.2.2.2 Private Cloud

As compared to the public cloud, in the formulation of the model of the private clouds, we

consider that the private cloud exhibits the finite resource model. Therefore the numbers of

customers availing the services of the private cloud are also finite. Customers’ tasks/requests

join the service queue and get serviced according to the number of VM’s available in the

same way as in public cloud. If all the VM’s are in use then tasks are delayed and sometimes

are blocked ultimately based on the timing requirements of the service. At last, the results of

the processed tasks are returned back to customers. Since private clouds have to serve a cer-

tain number of customers usually in closed vicinity, the service delivered by private cloud

also is changed.

59

Page 60: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 3-22 Finite source model of Private Cloud

In the public cloud, the arrival and departure of the customers can be formulated in the

form Markov Chain as shown in the Figure 3.10. Arrival and departure rates are described by

λ and µ respectably. If arrival rate λ is greater than departure rate µ then the length of the

queue increases and vice versa. If we compare with Figure 3.6, we see the since the number

of customers in private cloud are limited so arrival rate for each new customer also changes.

Each new customer experiences different grade of service depending on the number of cus-

tomers already present in the queue.

Figure 3-23 Markov Chain Model of the Private Cloud

Realizing that the blocking probability is the probability that an arriving customer ob-

serves C customers in the system, we can directly derive the blocking probability from the

distribution.

60

Page 61: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Pb(C , ρ)=p (n ; N ,C ,ρ)=(N

n ) ρn

∑i=0

C

(Ni ) ρ

i (3.12)

We simulated the above equation for different values of load, and see how blocking prob-

ability varies with respect to load for different VM’s and number of customers.

0 2 4 6 8 10 12 14 16 18 200

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Blo

ckin

g P

roba

bilit

y (%

)

Load

100 customers, 25 VMs200 customers, 25 VMs

Figure 3-24 Effect of Load on Blocking Probability for various VM’s

100 customer, VMs = 25 : −193.7exp−(.5779 x )+193.4exp(−0.5706) (3.13)

200 customer, VMs = 25 : −0.7936 exp−( .0087 x )−1.28 exp(−0.4876) (3.14)

The above equations have been obtained by fitting curve into the simulation data repre-

sented in the Figure 3.11.

Continuing the same approach as in the case of public cloud, we start with blocking proba-

bility for C = 0, and keep on incrementing the number of VMs by 1 and see its effect on cor-

responding on the new blocking probability.

61

Page 62: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

1 2 3 4 5 6 7 8 9 10 1110

20

30

40

50

60

70

80

90

Blocking Probability (%)

Num

ber o

f VM

s

200 customers, load = 0.5100 customers, load = 0.5200 customers, load = 0.1100 customers, load = 0.1

Figure 3-25 Effect of Blocking Probability on the Number of VM’s required for dif-ferent Private Cloud Loads

As evident from the Figure 3.12, for the fixed load if the blocking probability start decreasing

(time constraints of the application are relaxed), the amount of resources need to be invested in the

cloud start decreasing.

200 customer, load = 0.5 : −.63 x+85.36 (3.15)

100 customer, load = 0.5 : −.47 x+47.86 (3.16)

200 customer, load = 0.1 : −.46 x+32.15 (3.17)

100 customer, load = 0.1 : −.30 x+19.11 (3.18)

After formulating the analytical model of the cloud computing, we turn our focus towards

the wireless network.

If we summaries, public cloud is different from private cloud as it can accommodate infi-

nite number of customer task, while in private cloud the number of customers are limited so

their task are also finite. Due to that, in private cloud fixed resources are invested as com-

pared to public cloud. If we compare the markov chains of both public and private cloud, we

observe that arrival rates of public and private clouds are λ and N λ. That means private cloud

invests fixed amount of resources to N customers, so arrival of new customers affect the cus-62

Page 63: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

tomers already being serviced. Moreover, if we compare the blocking probability equations

of public and private cloud we observe the blocking probability of private cloud is limited by

N number of users as reflected in equations.

3.3 Mathematical Model of Wireless Network

Network is the most important component in our optimization pipeline. Mobile network,

try to marginalize the huge infrastructural (computational and storage) resources available in

the cloud due to its fading characteristics and bandwidth concerns. We simulate the behavior

of mobile network, using LTE Vienna link level [96] and system level simulators v1.7r1119

[97].

3.3.1 Vienna Link Level Simulator

The Vienna link level simulator consists of transmitter, channel model, and receiver as

shown in the figure 3.13.

Figure 3-26 Structure of Link Level Vienna Simulator [97]

As demonstrated by the Figure 3.13 that for simulation purpose transmitter (Tx) send data

and signaling to receiver (Rx). Signaling information is used to interpret the information of

data at Rx. Signaling information is highly sensitive, therefore it is protected against any vul-

nerabilities of the channel and is assumed to be free from any error. Receiver sent the feed-

back back to the transmitter. Feedback Channel Status Information (CSI) consists of the fol-

lowing:

Channel Quality Indicator (CQI): 4 bit binary number which describes the states of

wireless channel as observed by UE.

Precoding Matrix Indicator (PMI): Precoding matrix is used in closed loop systems and

63

Page 64: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

tells about the beamforming multi-stream antenna systems.

Rank Indicator (RI): describes number of independent paths that exist in a channel. More

the RI, better the quality of the wireless channel.

Based on the channel sensing information (CSI information) transmitter changes the cor-

responding Modulation and Coding Scheme (MCS). For example, if channel is quite bad,

then CQI will be quite low and transmitter will shift the MCS to lower MCS ensuring less

error rate at the cost of low datarate and throughput.

3.3.2 LTE Transmitter

The structure of the LTE transmitter is shown below. For the simulation purpose we use

random data bits.

Figure 3-27 Flow Diagram of LTE Transmitter [96]

Databits are grouped together and mapped to the corresponding symbols. The generated sym-64

Page 65: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

bols are then translated onto the OFDM constellation. We take IFF and insert the CP and

transmitted the formatted signal.

Other sophisticated transmission schemes are also employed:

Multiple Input Multiple Output (MIMO) : Multiple transceivers at the input as well as

output provides diversity in wireless communication. Ultimately, throughput is increased

while block error rate (BLER) is decreased for the same channel signal to noise ratio (SNR).

Transmit Diversity (TxD): TxD work by employing multiple transmitters/receivers

which transmit or receive identical signal at a particular time instant in order to overcome the

error rate.

Open Loop Spatial Multiplexing (OLSM): Spatial multiplexing (often abbreviated SM

or SMX) is a transmission technique in MIMO wireless communication to transmit independ-

ent and separately encoded data signals, so-called streams, from each of the multiple transmit

antennas. Therefore, the space dimension is reused, or multiplexed, more than one time [96].

Closed Loop Spatial Multiplexing (CLSM): The transmitter of eNodeB utilizes channel

information to enable simple spatial diversity or beam-forming techniques that increase the

system’s effective SNR and potentially simplify the receiver architecture [96].

3.3.3 Channel:

The channel (CHN) in the Figure 3.13 has been shown in the form of a line joining the

transmitter and receiver. The channel models the block and fast fading channels. The list of

fading channels is given below:

1) Additive White Gaussian Noise (AWGN): This is the easiest channel for a wireless

user to cope with. Due to the line of sight (LOS) path, AWGN provides least amount of vul-

nerability for a wireless user.

2) Flat Rayleigh fading: In flat fading channel the LOS path does not exist but a very

strong indirect path exists.

3) Pedestrian Vehicular: These are quite difficult channels for wireless users due to the

amount of vulnerability they exhibit. They have large Power Delay Profile because of which

the power received at the receiver has larger spread and causes difficulty while achieving

high transmission rates.

4) Winner Phase II+: This is the most sophisticated channel model. It is an evolution of

the 3GPP spatial channel model and introduces additional features such as support for arbi-

trary 3D antenna patterns.

So CHN provides quite comprehensive model of the fading which occurs in real time sce-65

Page 66: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

nario.

3.3.4 Receiver:

An implementation of the receiver model has been shown below. Exactly inverse opera-

tion is done on the receiver side as compared to the transmitter.

Figure 3-28 Flow Diagram of LTE Receiver [98]

As shown in the Figure 3.15, the receiver receives the resource blocks (RBs) from the chan-

nel. It disassembles the RBs in accordance with the signalling information. After that MIMO

Orthogonal Frequency Division Multiplexing (OFDM) detection is carried out. For signal

detection the following detection algorithms are used.

Zero-Forcing (ZF): ZF detector multiplies the received signal by the inverse of the fre-

quency response of the channel.

Linear Minimum Mean Squared Error (LMMSE): LMMSE minimises the mean

66

Page 67: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

square error between received signal and estimated signal.

Soft Sphere Decoder (SSD): SSD determines the received signal through an iterative

way.

The detected soft bits are decoded to obtain the data bits. Based on the detected data bits,

we can calculate certain objective performance measures e.g. coded/uncoded BER, BLER,

and throughput. Moreover, receiver also calculates the feedback for the transmitter for the

next transmission. CSI information, as explained earlier contains CQI, RI and PMI as de-

scribed in the section 3.3.1.

The parameters used for simulations are mentioned in appendix I. In mobile network,

channel information is regularly reported by the end user to the serving eNodeB through

short term and long term periodical CQI (channel quality information) reports. Long term

fading characteristics of network were measured by simulating the network behavior, and

then they were regressed in mathematical form to derive the mathematical model of network

for certain important parameters (SNR, BLER, Throughput and Bandwidth). Network model

can be characterized by two main performance parameters i.e. throughput and BLER (Block

Error Rate). User Throughput majorly depends upon SNR (fading characteristics of channel)

and Resource Blocks (RB's) allocated to a certain user.

67

Page 68: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Table 2 Effect of CQI on Modulation Scheme and Throughput [99]

Based on CSI feedback, transmitter scheduler allocates the Resource Blocks (RBs) and

sets the corresponding MCS. Each MCS (4, 16, or 64-QAM) has corresponding coding rate

as well as BLER (block error rate) and BER (bit error rate).

Table 2 describes the effect of CQI on block error rate. As the SNR of the wireless channel

improves, the CQI is increases and the error curve shifts to the right. With the increasing val-

ues of CQI, the modulations at the modulator as well as demodulator are changed. High order

modulations have bigger constellation size which ultimately ensures more bits to be transmit-

ted in single frame. This in turn increase the effective data rate of the channel as well as effi-

ciency. The relation between CQI values and code rate & efficiency has been mentioned com-

prehensively in table 2. Figure 3.16 and 3.17 shows graphically, how CQI affects the effi-

ciency of the wireless channel. Block error response of channel (BLER) improves as the SNR 68

Page 69: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

improves (Figure 3.17). Similarly, as CQI improves, LTE transmitter starts using high con-

stellations for transmissions, so the throughput also increases at the CQI increases (Figure

3.18).

-20 -10 0 10 20 3010

-3

10-2

10-1

100

BLER, 1.4MHz, SISO AWGN, 5000 subframes

BLE

R

SNR [dB]

CQI 1CQI 2CQI 3CQI 4CQI 5CQI 6CQI 7CQI 8CQI 9CQI 10CQI 11CQI 12CQI 13CQI 14CQI 15

Figure 3-29 Effect of SNR on Block Error Rate (BLER) for multiple CQI values

69

Page 70: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

-20 -10 0 10 20 300

1

2

3

4

5

6throughput, 1.4MHz, SISO AWGN, 5000 subframes

thro

ughp

ut [M

bps]

SNR [dB]

CQI 1CQI 2CQI 3CQI 4CQI 5CQI 6CQI 7CQI 8CQI 9CQI 10CQI 11CQI 12CQI 13CQI 14CQI 15

Figure 3-30 Effect of SNR on Throughput for multiple CQI values

If x5 , x6 represents the SNR and RB's allocated to user respectively, then throughput

ψ (x5 , x5) was regressed mathematically as;

ψ (x5 , x6) = (.006x52 + .1161x5+ .574)*(x6) (3.19)

A two dimentional throughput model is depicted in Figure 3.18. From the Figure, it is ob-

vious that throughput increases quadratically w.r.t. no. of RB's and linearly w.r.t. SNR.

70

Page 71: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

-10

-5

0

5

10

15

20

010

2030

4050

6070

8090

1000

10

20

30

40

50

60

70

80

90

100

SNRResource Blocks/User

Thro

ughp

ut (m

bps)

Figure 3-31 Effect of SNR and RB's/User on Throughput

Similarly, BLER χ (x¿¿7)¿ is another performance parameter of LTE. It is primarily de-

pendent upon the channel SNR x7 available to certain user. After simulation, we aggregate the

following relation between SNR x7 and BLER χ (x¿¿7)¿.

χ (x¿¿7)=¿¿ -.2481*exp(2.01*log(x7))

(3.20)

Later we will use ψ (x5 , x6) and χ (x¿¿7)¿ to represent LTE mobile network model.

We repeated the above experiment for different transmission modes discussed in the sec-

tion 3.3.2 with the two cases.

Case A (3 retransmissions):

In the first case, receiver is allowed to request 3 retransmissions from the transmitter in the

case of any information loss. As we can see for same SNR (CQI-7), the sophisticated modes

of transmission i.e. MIMO (TxD 4x2, TxD 2x1 and OLSM) provides better error response as

compared to SISO. Rate of BLER decrease is quite steep in the high transmit diversity (TxD

4x2) as compared to SISO.

71

Page 72: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

-10 -5 0 5 10 15 2010

-3

10-2

10-1

100

BLER, CQI 7, PedB, 5000 subframes, 3 retransmissions

BLE

R

SNR [dB]

SISOTxD 2x1TxD 4x2OLSP 4x2

Figure 3-32 Effect of SNR on Block Error Rate (BLER) for different Transmission Schemes (3 retransmissions)

Curve fitting is used to fit equations to the curves which are obtained after the simulations.

The following equations relate BLER with the SNR for various transmission techniques de-

scribed below.

SISO:

y=0.103 z3−.0133 z2−.568 z+.481 (3.21)

Where z=(x−7)/7.94

TxD 2x1:

y=0.00017 x3−.0017 x2−.067 x+.76 (3.22)

TxD 4x2:

y=0.000045 x3−.0004 x2−.082 x+ .46 (3.23)

OLSM:

y=0.00024 x3−.0041 x2−0.054 x+.88 (3.24)

72

Page 73: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

MIMO and OLSM also provides better throughput as compared to SISO. The reason is

BLER response allows transmitter to use higher modulation schemes which ultimately results

in higher throughput. Interestingly, we also see saturation in the throughput after certain

threshold.

-10 -5 0 5 10 15 200

0.5

1

1.5

2

2.5throughput, CQI 7, PedB, 5000 subframes, 3 retransmissions

thro

ughp

ut [M

bps]

SNR [dB]

SISOTxD 2x1TxD 4x2OLSP 4x2

Figure 3-33 Effect of SNR on Throughput for different Transmission Schemes (3 re-transmissions)

Curve fitting is used to fit equations to the curves which are obtained after the simulations.

The following equations relate throughput with the SNR for various transmission techniques

described below.

SISO:

y=−0.00028 x3+.0056 x2+.06 x+.11 (3.25)

TxD 2x1:

y=−0.00021 x3+.0022 x2+.086 x+0.3 (3.26)

73

Page 74: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

TxD 4x2:

y=0.000055 x3−.0048 x2+ .1 x+.66 (3.27)

OLSM:

y=−0.00058 x3+.01 x2−0.13 x+.28 (3.28)

Case 2 (No HARQ): In the second case, Automatic Repeat Request (ARQ) is used by the

receiver if it does not receive any data from transmitter in a certain time frame. Hybrid ARQ

combines the function of ARQ along with forward error correction at the receiver. As expec-

ted, case 2 shows worse error performance than case 1.

0 5 10 15 20 2510

-3

10-2

10-1

100

BLER, CQI 7, PedB, 5000 subframes, No HARQ

BLE

R

SNR [dB]

SISOTxD 2x1TxD 4x2OLSP 4x2

Figure 3-34 Effect of SNR on Block Error Rate (BLER) for different Transmission Schemes (No HARQ)

Curve fitting is used to fit equations to the curves which are obtained after the simulations.

The following equations relate BLER with the SNR for various transmission techniques de-

scribed below.

SISO:

74

Page 75: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

y=0.000038 x3+.00048 x2−.084 x+1.2 (3.29)

TxD 2x1:

y=0.00012 x3+.0078 x2−.17 x+1.2 (3.30)

TxD 4x2:

y=0.0002 x3−.011 x2−.18 x+ .87 (3.31)

OLSM:

y=0.000052 x3−.0025 x2−0.12 x+1.2 (3.32)

The throughput curves are shown in Figure 3.22. It is quite interesting to observe that,

throughput shows a saturation after a certain threshold SNR (knee point). This clearly indic-

ates that, investment of extra input resources i.e. SNR does not always translate into propor-

tional output gains i.e. throughput.

0 5 10 15 20 25 300

0.5

1

1.5

2

2.5throughput, CQI 7, PedB, 5000 subframes, No HARQ

thro

ughp

ut [M

bps]

SNR [dB]

SISOTxD 2x1TxD 4x2OLSP 4x2

Figure 3-35 Effect of SNR on Throughput for different Transmission Schemes (3 re-transmissions)

75

Page 76: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Curve fitting is used to fit equations to the curves which are obtained after the simulations.

The following equations relate throughput with the SNR for various transmission techniques

described below.

SISO:

y=−0.000052 x3−.00065 x2+.11 x−.21 (3.33)

TxD 2x1:

y=0.00015 x3−.01 x2+.22 x−.23 (3.34)

TxD 4x2:

y=0.00025 x3−.013 x2+ .22x+.16 (3.35)

OLSM:

y=0.000011x3−.006 x2+.28 x−.59 (3.36)

We simulated 3 scenarios in LTE (4G) wireless network. From the simulated results, we used

curve fitting to related input (SNR) and output (throughput, BLER) parameters through math-

ematical equations. Various pedestrian and vehicular simulation environments have been

used. But in all scenarios simulations single wireless cell has been used. If multicellular simu-

lation scenario is used then due to movements of user across different cells the wireless con-

nectivity is affected. In those case, an extra overhead of handover time need to be taken into

account. Moreover CQI fluctuations can also pose a lot of problems in augmenting the beha-

viour of the wireless channel. CQI fluctuation are usually so abrupt that future values of CQI

are very difficult to estimate. Since wireless network parameters are affected by CQI so a ro-

bust technique need to be devised which optimise the behaviour of end to end communication

scenario in view of fluctuating CQI. We will use these equations later while analysing the ef-

fect of wireless network on end to end communications framework.

3.4 Mobile User Context and QoS

User context represents user social and mobile hardware context. From a simplistic point

of view, user mobile hardware profile shapes the profile of the application. For example, Lap-

top user, PDA user and Smartphone user each represent certain display, battery, storage capa-

bilities and traffic intensity models corresponding to application profile [100]. In end to end 76

Page 77: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

communications, mobile user’s social context, its hardware profile (e.g. RAM, CPU, battery

status) and application profile shape the end user QoS. As described earlier in the section 3.3,

LTE has inherent QoS management in which QCI (QoS Class Identifier) is used to identify

and prioritize multiple traffic streams belonging to different applications. A two traffic model

scenario has been presented in [78]. In this way, gaming and video services has been consid-

ered. We apply the same model in our optimization model. The model takes into account the

traffic differentiation and service prioritization.

Let us consider a user i is using two services in the time interval T. The two services have

average packet transmission rates f 1 and f 2, while average packet sizes are s1 and s2 respec-

tively. If simax is effective bitrate corresponding to the SNR, then the maximum amount of data

that can be transmitted to ith user during time T is given byT+dmax

[ Nn ] . ∆

. s imax

where dmax is maximum scheduling delay and ∆ is TTI length. In this way, the user satis-

faction requirement is given by;

(s1 f 1+s2 f 2) .T .[ Nn ] . ∆

(T+dmax ) . s imax ≤ 1

1−ε

(3.37)

So the corresponding objective function is;

Z ( x8 , x9 )=( s1+x8 f 2) . T . [ N

n ] . ∆

(T+dmax ) . x9

, α=x8 , β=x9

(3.38)

where ¿s1

s2 , β=

s imax

s1. QoS model in terms of traffic skewness(α ) and traffic size(β) is plat-

ted in Figure 3.23. From the Figure, it can be observed that, if we prioritize one traffic over

the other (increase α ) and reduce individual packet sizes (decrease β), we can increase the

capacity Z (α , β ).

77

Page 78: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

0

5

10

0246810

0

100

200

300

400

500

600

700

800

Num

ber

of U

ser'

s Ser

ved

Figure 3-36: Effect of Traffic Skewness (𝞪) and Traffic Size (𝞫) on user capacity

3.5 Mobile Hardware Model:

Mobile Hardware model takes into account, the ability of mobile hardware for pro-

cessing, storage and delivery of mobile application data in case of offloading. Mobile

battery is most vulnerable component. Some work has already been done in view of

the mobile battery discharge rate (Li-ion battery) [101].

Let us consider an application consists of N tasks, the ith component has Ki states,

i = 1,2, … N , the ith component in the jth state consumes power pij for i = 1,2, … N ,

j = 1,2, … , K i. Let t ij denote the time that the ith component spends in the jth state

during the time interval of T. The energy consumption of the system during the inter-

val can be calculated as:

y (T )=∑i=0

N

∑j=0

Ki

pij t ij

(3.39)

When we divide the time interval T from both sides, we have;

y (T ) /T=∑i=0

N

∑j=0

Ki

p ij(t ¿¿ ij/T )¿

(3.40)

Where t ij/T represents the discharge rate of ith component in jth state. The dis-

charge rate is highly dependent upon the CPU consumption cycles. One objective of 78

Page 79: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

our work is to reduce the discharge rate of mobile battery by efficiently offloading the

CPU computational cycles to cloud. In this way, we monitor the battery current states

and estimate battery life via discharge rate.

3.6 Multi-objective Optimization Methodology

In section 3.2-5, we described input/output relations of network, cloud, user and applica-

tion parameters. Equation 3.1 has been used to relate input investments and output gains into

objective functions. After obtaining all the objective functions, we aim to minimize them in

view of the contraints. This leads to a multi-objective optimization problem. In view of the

objective functions defined in sections 3.2-5, we formulate the optimization problem as;

minimize ¿¿

s . t . x1 , x2 , .., x9∊ X (3.41)

minimization constraints has been described in section 3.2,3.3 and 3.4.

Evolutionary algorithms have been proved to be very effective in solving multi-objective

optimization problems (MOP’s) with very less computational complexity [82]. Contrary to

single objective problem, a MOP does not have a single optimal solution, but a set of most

feasible solutions. An MOP is pareto optimal if there exists no other feasible solution which

would decrease some criterion without causing a simultaneous increase in at least one other

criterion.

In our simulation framework, we modeled the context of cloud, application, mobile and

network by the corresponding objective functions. Each objective function involves a set of

decision variables. Each objective function was normalized by its range so that no parameter

jeopardizes the overall objective function. MOP finally search out the pareto efficient solu-

tion. Mutation and crossover control the trend of optimization. User preferences and fitness

criteria dictate about choosing the better solution (empirically very near-optimal) among a set

of feasible options in a MOP. In our simulation, we designed user context such that end user

does not has any preferences related to the extra resource allocation in network or cloud. The

solution is chosen from the pareto front which minimize the cloud and network resources

without any preference.

3.7 Dependency Functions

Dependency functions define the effect of resource allocation in one contextual model on

the other i.e. how the four (4) individual models are linked to each other.

79

Page 80: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

I. How the application parameters i.e. packet size and packet inter-arrival time influence the

corresponding cloud resources (number of cloudlet's, VM's and datacenter).

II. How cloud data translate into the amount of network requirements (SNR, bandwidth,

BLER and throughput) keeping in view the variable channel conditions (variable CQI).

III. With the given mobile network, how QoS of the given user is achieved. In our prelimi-

nary simulations, we have used linear dependency functions.

The dependence functions provide a glue to join all the models described earlier as shown

in the Figure 3.24.

Figure 3-37 CANU (Cloud-Application-Network-User) Framework

3.8 Results and Discussions

In this section, we simulate the CANU framework described in the section 3.7.

3.8.1 Effect of Channel on Throughput

Channel Quality Indicator (CQI) depicts the wireless channel available to the user. We in-

creased the CQI from minimum (0000) to maximum (1111), allowed in network context to

allocate more radio resources. That results in increased throughput as depicted in the Figure

3.26.

80

Page 81: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

0 10 20 30 40 50 60 70 80 90 1000

10

20

30

40

50

60

70

80

90

100

Channel Quality Indicator (CQI)

Thr

ough

put (

mbp

s)

Figure 3-38: Effect of CQI on Throughput

The increase in the throughput is evident of the fact that, better wireless channel allows the

optimization engine to allocate more resource for the network. This results in increased SNR,

which ultimately lead to appreciable increase in the user throughput.

3.8.2 Effect of Cloud Load on Network BLER

As discussed in section 3.2.2.1, as the number of requests arriving in the public cloud in-

creases (cloud load) the blocking probability increases proportionally. In the end to end multi-

objective optimization scenario, this in turn shift more burden on the network. So the network

BLER start rising in view of increasing load on the cloud.

81

Page 82: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

0 10 20 30 40 50 60 70 80 900

5

10

15

20

25

30

35

40

Cloud Load (number of users)

Blo

ck E

rror

Rat

e (B

LER

%)

Figure 3-39 Effect of Cloud Load on Network BLER

As we see in the figure, as the cloud load increase we see the likelihood of block error rate

also increase. Though this is not true for all case, as multi-objective optimization methodol-

ogy consider a number of other factors in the optimization process.

3.8.3 Effect of Population Size and Number of Generations

Population size (N o) and number of generations (G) are the two parameters which controls

the performance of the genetic algorithm used for optimization. As the N o amdG tends to in-

crease, the pareto performance of algorithm also increases. However, this also contributes

towards increase in the agility response (time for optimization).

We had designed the objective functions such that the empirically very near-optimal solu-

tion minimizes all the objective functions simultaneously. As we have designed the objective

functions such that lower the sum of objective functions (objective sum), better is the solution.

In our experiment, we generated 100 best solutions (solution set) by varying populations and

number of generations. Then normal probability density function was fitted in each solutions

set. It is evident from Figure 3.28, as the number of generations and population size increases

the probability distribution of objective sum moves towards minimum showing performance

82

Page 83: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

improvement.

Figure 3-40 Effect of number of Generations on the performance

Figure 3-41 Effect of the Populations size on the performance

3.9 Comprehensive CANU Model

In 3.3.1 and 3.3.2, we have varied the effect of channel variations, population size and

83

Page 84: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

number of generations on the optimization performance. We propose to extend the same

theme to take into account many other parameters of the user, network, application, cloud

and optimization algorithm. Moreover we will also take into account learning and prediction

of parameters to further improve the performance. An overview of the proposed algorithm is

presented below:

Steps Description

Contextual

Information

Application

Profile

User profile (subscription and social profile, battery status, resolu-

tion, processing and storage)

Network (CQI, channel type ζ, Number of Users)

Cloud (Utilization status η, VM’s)

Application profile ẞ (Packet sizes, packet interarrival constraints)

Cloud Blocking Probability, VM’s Load, Number of Customers ~ ẞ

SNR ~ CQI, (Throughput response, BLER) ~ ζ

Optimization

Offline ap-

plication model-

ing

Determine the optimal amount of Network, Cloud and User re-

sources in view of the Application Profile.

According to rate of channel variation, cloud loading variation

neural network is used. Use of statistical information about User, Net-

work and Cloud to predict the variability in network, cloud and user

context.

3.10 Summary

In this chapter, we aim to investigate the behavior of cloud, network, application and user

QoS aspects in terms of corresponding input and output performance parameters. In section

3.1-4, we have formulated mathematical models of the mentioned entities of an end to end

communication framework. A comprehensive model of each entity is presented in the form of

mathematical equations which relate the input resources and output gains. A CANU (Cloud-

Application-Network-User) framework has been presented in this way which glues all the

entities. We have applied multi-objective optimization on our framework and tried to find out

the effects of certain parameters on the other. We also have analyzed and simulated the accu-

racy of multi-objective optimization algorithm in the section 3.8.2 and 3.8.3. We have ob-

84

Page 85: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

served the parameters of certain entities are beyond the control of user. For example, wireless

channel behavior and cloud blocking probability are beyond the control of user. This appeals

us to find certain ways to control application behavior according to changes in the cloud and

wireless network. In the next chapter we will focus on application and will explore the ways

by which an application can be tuned according to certain independent parameters of cloud

and wireless network.

85

Page 86: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

4 A COMPREHENSIVE APPLICATION PARTITIONING

AND OFFLOADING FRAMEWORK

With the advent of rich multi-media applications, mobile phones are becoming very pervas-

ive. However running of complex data intensive applications on mobile devices is still very

challenging due to limited resource constraints such as memory capacity, CPU speed, and

battery power. Recently, the advancements in computing and networking have enabled smart

phones to leverage the abilities of traditional desktop or laptop computers. Smart phone

without any doubt are on the way to become the personal computers in the near future.

Following the same trend, efforts are being made in both networking as well as computing

domains to resolve the resource limitations of the mobile phones. Several desktop applica-

tions are being designed for universal usage and availability on mobile devices. Freeview

television, augmented reality, Mobile 3D gaming and Mobile biometrics are clear examples

of future trends.

Application offloading is an emerging area focused towards leveraging the huge computa-

tion resources available in cloud to avail for the mobile. This research area is quite challen-

ging due to the heterogeneity of applications, mobile and cloud resources [25]. Offloading

becomes even more complex when vulnerable nature of wireless communication is taken into

account [102]. In our research, we formulated the offloading research problem in terms of

contextual modelling of cloud, mobile, application and wireless network in terms of their

parameters and then discuss the feasibility of application partitioning and offloading by rep-

resenting an application in the form of a graph.

Structure of the Chapter

In this chapter, we will focus on the application part of the multi-objective optimization.

Offloading an application is not always beneficial. It is therefore essential to devise algo-

rithms to judiciously determine the part of an application to be offloaded to the cloud server

and to run on the mobile device to achieve certain performance benchmarks e.g. low response

time and/or energy consumption, etc. We start with formulating the partitioning problem. Then

based on the devised problem application is partitioned and offloaded keeping in view certain para-

meters. Partitioning performance is finally measured with certain benchmarks discussed thoroughly in

this chapter.

86

Page 87: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

4.1 Application Attributes

This chapter will focus on Application and its computational description in terms of differ-

ent parameters to represent any application in terms of objective parameters and then based

on those parameters determining the feasibility of executing a part of application (A) in

cloud. Application offloading is used to migrate data and complexity intensive parts in an ap-

plication to a surrogate engine such as server or cloud provider.

4.1.1 Application Scalability and Flexibility

In the previous chapter, a broad optimization problem involving mobile network, cloud,

mobile phone and end user is devised, which intends to tune network and cloud resources

keeping in view the demands of end user. In this chapter, our formulated optimization

problem is narrowed down particularly to the application. In this way, we investigate and

focus on the influence of application in saving cloud and network resources according to

the demands of end user. A scalable and flexible application can be partitioned and mi-

grated to the cloud. So the resource intensive parts of the application are executed on the

cloud.

4.1.2 Feasibility of Application Offloading

As already discussed, offloading is not always feasible as offloading extra nodes to cloud

incurs extra cost in terms of response time and consumed energy without any added advan-

tage. To characterize the behavior of an application, various methods are present in the litera-

ture. Linear programming and graph theory based approaches are popular as these aim to

mimise closely the behavior of the application in terms of input and output data. We have

chosen graph modeling as it can easily integrate the objective functions derived in the previ-

ous chapter in the form of Graph edges and nodes.

4.1.3 Classification of Application Tasks

After profiler has completed the profiling of the application, we come across the following

two types.

Unoffloadable Tasks: Some tasks can’t be offloaded for remote execution because,

i) Exchanges a lot of data across each other and this causes a lot of burden for net-

work resources. So it is not feasible to dis-associate those tasks.

ii) Uses the local resources of mobile (e.g. user interface, camera, GPS or other sen-

sors) so often that they can’t be offloaded remotely.

87

Page 88: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

iii) Can’t be offloaded due to security issues.

Offloading Tasks: Offloading framework relies on the tasks which are flexible to be off-

loaded either locally or remotely. Many tasks fall into this category due to their ability to

work in the remote plane with input and output data exchanges. Here comes the compromise,

whether we want to value battery power of the mobile device over the cost incurred by net-

work and cloud usage.

In terms of formulated application graph theoretic problem mathematically, the unoffloadable

tasks are those nodes which does not take part in partitioning and offloading process.

4.1.4 Topologies of Applications

The way methods (nodes in graph) are connected to each other create varies topologies of

application structure. Based on that, application partitioning and offloading also varies. In the

Figure 4.1, we describe the following topologies for application.

Single node: In the topology, whole application is considered as a single node. This topol-

ogy is feasible for scenarios where the complete application is offloading to surrogate. In this

way, application is considered as a software as service and migrated to a remote server in-

volving the complete transfer of code along with program structure.

Linear Structure: This represents a steady state linear combination of tasks which are

associated with each other through input and output data relationship. Due to lower interde-

pendency of nodes with each other, this sequential structure proves to be quite feasible for

partitioning and offloading.

Loop-based Structure: This kind of application structure is similar to linear structure ex-

cept the last method provides a feedback to the first method.

Tree-based structure: As the name suggests, this kind of application structure contains a

lot of branching from each node, while ultimately results in a tree like structure. Likelihood

of partitioned for such kind of applications is quite low due to the complex topological order

of the graph. We will discuss topological order in more detail in the next chapter.

Mesh-based structure: In mesh-based topology, each node is connected to other through

an edge. This highly connected structure of application makes it difficult to be partitioned.

88

Page 89: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 4-42 Task Flow Graphs in different topologies

4.1.5 Representation of Application

Two types of costs are taken into account when representing an application with a

weighted graph:

Cost of the node: This represents the computational cost associated with each node which

indirectly expresses a block, class, method or task in an application. Offloading a block of an

application to the cloud results in the reduction of the corresponding cost. This is because of

the efficiency associated with the cloud servers in terms of energy consumption and execu-

tion time. We call it speed up factor. In literature, authors has taken the speed up factor as a

constant, but in our thesis we will use speedup factor to be variable depending upon the load,

number of VMs and blocking probability associated with the cloud.

Cost of the edge: Cost of the edge is modelled in accordance to the data exchanged be-

tween two nodes. In case of partitioning and offloading framework, exchange of data between

nodes may involve network too. In this case, the cost of the edge will be inversely propor-

tional to the bandwidth available at the instant while mobile network was accessed.

Graph theory is used to relate data dependencies within a computation. As described

above, graph is composed of vertices and edges. In our data computing approach, each vertex

of graph represents a method or task while each edge represents the relationship between two

edges.

It is better to mentioned here that, all tasks can’t be offloaded to the cloud due to their cer-

tain reasons. Such subset of unoffloadable tasks (nodes) is always reserved and partition algo-

rithm is not applied on such tasks.

89

Page 90: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

4.2 Application Offloading and Partitioning Framework

4.2.1 Application Parameter Modeling

Keeping in view of the above information about nodes, we aim to construct a weighted

graph. Each vertex v∈V has corresponding two cost weights: w local(v) & w cloud (v ). w local(v)

and w cloud (v ), represent the computational cost of executing the task v on the mobile device

(locally) and on the cloud (remotely) respectively. w cloud (v ), is scaled version of w local(v) by

computational superiority of cloud over mobile phone. In literature, a fixed scaling factor ( F)

has been used to depict a computational multiplying factor of the cloud. In our algorithm, F

is dependent on the blocking probability of the cloud (Pb). Pb itself depends upon the num-

ber of users using the cloud and the number of VM’s available at that instant.

Profiler Attribute indicates type of underlying details profiler gathers while constructing the

abstraction of the application. Hardware profiler gathers details about physical attributes like

CPU, RAM and battery consumption. Software profiler gathers applications information such

as computational cost of applications methods, data exchange and inter-dependency between

methods and code size. Network profiler gathers information about network parameters such

as bandwidth, throughput, network error etc. In our partition framework, we have used soft-

ware profile, which construct the interdependency graph of the application based on compu-

tational cost of methods and data exchange among them. As explained in section 3.5, we as-

sume the battery consumption is directly related to the computational cost implied by each

method of the application. Similarly in our simulations, the network information is taken by

changing the network parameters. So we are integrating network, hardware profiling abilities

in our software profiler.

Analysis Technique refers to the context of analysing the application partitioning statically or

dynamically. In static case, the parameters or the different objective parameters remains the

same, while the parameters are allowed to change in dynamic case. The fundamental chal-

lenge faced while analysing the options of code offload, is to compromise the tradeoffs

between energy, network ability, and computational fidelity. Interestingly, tradeoffs changes

constantly for different types of applications, the device’s specifications, available network

characteristics and user preferences as we have discussed in the chapter 3.

90

Page 91: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 4-43 Flowchart of Application Partitioning Framework

91

Page 92: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

If number of users using cloud services increase, blocking probability increases which

in turn decreases the speedup factor (F). Intuitively it becomes less desirable to offload to

cloud when many users are already using the cloud services.

Similarly, profiler provides weight of each vertex based on the computational cost (k)

of each vertex. In literature, a fixed metric (k) for vertex weight has been assigned. We in-

stead, use a variable value of vertex scaled by the channel bandwidth available at that in-

stant. As described in previous chapter, channel bandwidth depends upon various factors

i.e. CQI, channel type, number of user in wireless cell etc. In view of the partitioning cut,

vertices are assigned one of the weights depending on the partitioning result of the applica-

tion graph. The edge vector e (vi , v j) is calculated each time in view of different channel

conditions. e (vi , v j) denotes the communication cost amongst tasks. The weight of an edge

w (e ( v i , v j )) is denoted as:

w (e ( v i , v j ))=D ij

C ij (4.1)

Where w (e ( v i , v j )) represents the cost associated with the wireless network while transfer-

ring information Dij with corresponding communication cost C ij between mobile and the

cloud when the tasks vi and v j are executed locally and remotely. C ij closely depends on

certain network parameters e.g. CQI, number of UE in wireless cell, communication

framework (SISO, MIMO) and bandwidths (uplink bandwidth Buplink and downlink band-

width Buplink). In our case, we closely monitor CQI (channel quality indicator) to determine

the availability of instantaneous bandwidth using the feedback reports of the end user.

4.2.2 Partitioning Benchmarks:

Once we have quantified the weights of edges (w (e ( v i , v j ))) and vertices (

w local (v ) ,w cloud(v ) ), we formulate the partitioning and offloading problem in terms of cost

model in the section 4.4. Before that, we want to discuss, how all the entities of the CANU

model influence the partitioning and offloading algorithm in the section 4.3.

4.3 Influence of CANU models on Partitioning:

Finding the optimal partitioning solution is an optimization problem which leads to

make the best compromise between time/energy savings and transmission costs/delay. The

optimal partitioning decision depends on the following:

92

Page 93: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

4.3.1 User QoE (Quality of Experience)

QoE is highly influenced by a number of factors. It involves the set of applications used

by the user on mobile device, user sensitivity on response time and user device informa-

tion. In our partitioning problem formulation, we introduced a factor e to depict the user

preferences towards either response times or energy saving.

4.3.2 Device information:

Device information comprises of comprehensive information of the user equipment

(UE). It includes the computational power of the UE in terms of the certain objective fac-

tors: RAM, ROM (storage ability), battery depth (mAhs) and execution speed of the de-

vice. If the execution speed of the UE is quite slow and user and/or application require-

ments related to execution speed are highly sensitive, then that UE has higher capacity to

exploit resources in the cloud. Moreover, due to mobile limited battery concerns offloading

a task onto cloud may help to save some battery. For example, if the mobile battery is quite

low then mobile is likely to offload maximum processing over to the cloud assuming that

other parameters remain the same.

4.3.3 Wireless Network:

In addition to the Network bandwidth, there are certain other factors which affect data

exchange between mobile device and cloud. In our simulation, we use 4G LTE as our net-

work model. Network bandwidth is the most important parameter; it is influence by the

physical channel between mobile user and the base station, number of users in a mobile

cell and speed of user. As discussed in the chapter 3, if the SNR is high then CQI will dic -

tate higher MCS which will ultimately result in better throughput and less error rate in the

wireless channel. In short, cost associated with the wireless network will be low. Con-

versely, in the case of errors in the wireless network the opportunity cost to exploit cloud

resources will increase appreciably till a point where using cloud resources does not re-

main feasible anymore. For example, if wireless channel is in very good condition and mo-

bile battery is low, then likelihood of offloading increases assuming the cloud resources

and user preference parameters remains the same.

4.3.4 Mobile device model

Mobile device battery and processing ability has a lot of influence on the mobile phone

model. Since generation of user tasks are exponentially distributed, an exponential function

93

Page 94: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

has been used to give weightage to the usage of the battery. If battery goes below a certain

level, weighted functions shoots up exponentially to indicate immense cost associated with

the processing locally in mobile phone. Based on the other applications running inside mo-

bile phone, we calculate allocated weightage of processing ability dedicated to mobile

phone. In this way, if 10 applications are being run in the mobile, then weightage of the

RAM and storage figures tells about the weightage of processing ability. For example, if

devices does not have good resources e.g. RAM and storage then likelihood of processing

computation in the cloud increase regardless of the cloud and network resources.

4.3.5 Application

Some applications have program execution structure in such a way that makes it quite fea-

sible for partitioning and offloading to the cloud. This includes presence of heaver edges at

the end of the application and presence of thinnest edge at the start of the application. The

decision about where to partition & offload a partition is made based on the comprehensive

cost (computational and communication costs) prior to the execution of the application, as

mentioned in section 4.2.

4.4 Partitioning Algorithm for offloading:

In this section, we propose partitioning algorithm for arbitrary topology. Most of the

topologies we encounter in experimentation phases are linear. The partitioning framework

takes an input weighted graph. The weighted graph comprise of an application’s compre-

hensive formulation in terms of operations/calculations of each nodes and the communica-

tion between the nodes through each edge. Each node has two costs: first is the cost of per-

forming the operation locally (e.g. on the mobile phone) and second is the cost of perform-

ing it elsewhere (e.g. on the cloud). The weight of the edges is the communication cost to

the offloaded computation. It is assumed that the communication costs between operations

in the same location are negligible because two tasks/methods are colocated. The result

contains information about the cost and reports which operations should be performed lo-

cally and which should be offloaded.

The partitioning algorithm can be divided into two steps as follows:

1) Vertices Merging: An unoffloadable vertices are those vertices whose special fea-

tures make them unable to be migrated outside the mobile device. Thus we treat

94

Page 95: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

them differently while formulating our partitioning problem. We keep them in the

unoffloadable partition. In addition to this, we can force certain tasks to be exe-

cuted locally based on our own choices and preferences which are added to the un-

offloadable partition. Then all vertices that are executed locally are merged into one

big node that is selected as the source vertex. Since all these nodes are co-located

bearing no communication cost, the computation cost can be joined together as an

aggregated cost whose weight is the sum of the weights of all merged nodes. Let G

represent the original graph after all the unoffloadable vertices are merged.

2) Coarse Partitioning: The aim of this step is to coarsen G to the coarsest graph Gc.

In the processing of coarsening we start merging two adjacent nodes together and

thereby reducing the node count by one. In this way, the number of iterations of the

algorithms depends upon the number of vertices V. In each iteration i

for(i=1¿i=V−1), the cut value representing the partitioning cost in a graph

Gc=(V c , E c) is calculated. Gc+1is computed from Gc by merging “suitable nodes",

where Gc=G. The partitioning is performed in such a way that in the end we get

minimum cut among all the cuts which maximize our objective functions for both

local and cloud execution. We will describe the objective functions later in section

4.6.

4.5 Image Retrieval Application:

To test the validity of our partitioning and offloading framework, we needed an applica-

tion which case exploit huge potentials of the cloud with very limited data transfer through

wireless network. Image retrieval application proves to fulfil the requirements in this case.

Image matching task in image retrieval application requires a lot of computational effort

which can easily be accomplished via cloud resources and it generates very small data to

be transferred to the cloud.

Research in visual search applications has become one of the most popular directions in

the area of pattern analysis and machine learning. In visual search, the aim is to search im-

ages depicting instances of a user specified object from large collections, and finding the

similar images in a huge database of images. Due to the massive complexity of the data-

bases visual search applications are quite relevant for mobile cloud offloading in our de-

scribed application partitioning model.

Mobile Visual Search is an interesting example of visual search. Let’s consider a tourist

scenario where a user takes a picture of an object e.g. a landmark or a pet. The application 95

Page 96: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

then extracts relevant information, finds the particular location and sends the information

about the object to the user.

4.5.1 Algorithmic structure of Image Retrieval Application

Algorithmic flow of the Image visual retrieval has been shown in the Figure 4.3. Later we aim to

explain the function of each block along with its input and output data requirements.

Figure 4-44 Image Retrieval Application

4.5.1.1 Image Retrieval:

1. Mobile device camera captures an image.

2. Input image of size 1024 ×768 is received by the mobile device.

3. From each image we extract scale and rotation-invariant image features. The ex-

traction of local image features is typically carried out in two major stages

Feature keypoint detection (shown in the block 2).

Feature descriptor computation via SIFT extraction [103] (shown in the

block 3).

Shown in block 2 and 3 respectably with the corresponding names Feature detection and

SIFT extraction.

96

Page 97: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 4-45 Detection of key points in DOG Space

4.5.1.2 Feature Detection.

The feature detection step determines the number, the size and the location of the

patches that are extracted in an image. There are three main methods used for feature de-

tection in the literature: (1) sparse detection based on the interest points, (2) detection on a

dense grid and (3) random sampling of the patches. The interest points are detected by

searching the descriptive key-points that are invariant to certain image transformations in

all scales of an image. This is achieved by detecting extrema in a difference-of-Gaussian

(DoG) scale-space [124].

Figure 4-46 Extraction of Keypoint Descriptors from Image Gradients

4.5.1.3 Description

In this step, local features are extracted from patches or interest points that were detec-

ted in the previous step. Local features can be simple as the intensity or RGB values. How-

ever, more descriptive features that have some level of invariance against illumination

97

Page 98: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

change or geometric distortions are usually preferred. The description step is briefly re-

viewed as follows, with an emphasis on the SIFT features [125].

1) SIFT descriptor. The SIFT descriptor Lowe [122] builds a histogram of image gradi-

ents within each patch as illustrated on the Figure 4.5. It computes 8 orientation direc-

tions over a 4 × 4 grid which results in a 4 × 4 ×8=128 dimensional feature vector.

Through a Gaussian window function that gives more weight to the gradients computed

near the center of the patch, the SIFT descriptor offers robustness to some level of geo-

metric distortion and noise. Also, for robustness to illumination changes, the SIFT de-

scriptor is normalized to one.

4.5.1.4 SIFT dimensionality reduction

The dimensionality of the SIFT descriptors is reduced from 128 to 64 using Principal

Component Analysis. PCA, is a linear technique widely used for dimensionality reduction.

It aims to reduce the dimensionality of multivariate data while preserving as much of the

relevant information as possible [123].

1) Mean vector is subtracted from the descriptors.

2) A PCA transformation matrix is learned, which contains the eigenvectors corre-

sponding to the largest eigenvalues of the covariance matrix of local descriptors

[104].

PCA is essential for retrieval as it de-correlates the data, which is beneficial for image

representations. Additionally, dimensionality reduction removes the less energetic compon-

ents thereby improving the discriminatory power image descriptors [126].

98

Page 99: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 4-47 Aggregation of Feature Vectors [104]

4.5.1.5 Robust Visual Descriptor

In order to obtain a compact image representation, local descriptors are aggregated into

a global descriptor (RVD) suitable for large scale visual search [127].

In the RVD aggregation scheme each descriptor x t is defined by its position with respect

to the K-nearest cluster centers (typically K=3) in the high dimensional space. More pre-

cisely, K-means clustering is performed to learn a codebook of v1 , v2 , .., vn of n cluster

centers typically between 64 and 512 [104]. Each local descriptor x t is quantized to K near-

est cluster centers and the residual vectors x t−v j are computed and subsequently L1-nor-

malized. The residual vectors are aggregated to form cluster level representations and final

RVD is constructed by concatenation all cluster level signatures.

4.5.1.6 Power norm

Robust aggregation tries to average out the energy of the components of image [127].99

Page 100: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

4. Power norm and L2 norm normalize the image.

5. Dimensionality reduction is performed on the features which further reduce the im-

age feature parameters.

6. Lastly we do cluster based analysis of the image to find the likelihood of similarly

without groups of images whose features has already been extracted.

After the image retrieval application has been described, ways involving the profiling

of the application will be discussed.

4.5.2 Quantitative Profiling of the Application:

In this section, we convert flexible application into graph, by the procedure explained in

section 4.2. We calculate the computational complexity of nodes by measuring the time it

takes to execute that particular task associated with that node. Moreover the cost of the

edge represents communication cost between edges as explained in the Section 4.1.6.

4.5.2.1 Raw Objective Graph (ROG):

By following the procedure outlined in section 4.2.1, we represent the image retrieval

application by the raw objective graph as shown in the Figure 4.7.

4.5.2.2 Normalised Objective Graph (NOG):

Then we apply normalisation procedure to obtain the final data relationship graph i.e.

Normalised Objective Graph. While calculating the ROG, the profiler calculates the com-

plexity of the nodes based on the machine used for the extraction of the graph. So purpose

of the NOG is the remove any machine dependencies imposed on the graph. Normalised

Objective Graph is shown in the Figure 4.8.

100

Page 101: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 4-48 Raw Objective Graph (ROG) of Image Retrieval Application

101

Page 102: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 4-49 Normalised Objective Graph (NOG) of Image Retrieval Application

102

Page 103: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

The numeric values of edges and vertices shows the data and computational complexity of the cor-

responding method of the application. The edge values represents the data transferred (kilo-bytes)

between two blocks on an application. If the data transfer between two blocks is very high, then it

became difficult to execute them separately on mobile and cloud.

Similarly, the computational complexity of each block has been computer by the time it takes to

completely execute.

4.6 Offloading performance objective parameters:

Offloading performance in terms of objective parameters can be evaluated by seeking

how much response time and energy saving can be achieved by offloading part of applica-

tion. If G (E,V) account for the graph consisting of E edges and V vertices, then the total

computational cost of mobile-cloud scenario is given below.

C=∑v=0

V

α W vlocal+∑

v=0

V

(1−α ) W vcloud+¿∑

e=0

E

β W e¿

(4.2)

W vlocal , W v

cloud are weight of the vertices which are executed locally and remotely respec-

tively. Obviously due to high computational ability available at cloud, W vcloud is very low as

compared to W vlocal .Parameter α indicates, which partition certain nodes belongs to i.e. re-

mote or local. α is binary digit. It is equal to 1, for nodes which are executed locally and α

is equal to 0 for the nodes which are executed remotely. Similarly β differentiate the tran-

sition edge (between two partitions) from rest of the edges. β is equal to 1 for the transi-

tional cut edge and zero otherwise. Hence labels of edges and vertices gives us ability to

jointly calculate the cumulative costs of remote and local vertices.

For relative measurements of response time and energy, let consider the three (3) com-

ponents of the following equation. ∑v=0

V

α W vlocal represents the cumulative cost of local exe-

cution of all the local nodes V, while ∑v=0

V

(1−α )W vcloud represent the cumulative cost of ex-

culpation of all the remote nodes and ∑e=0

E

β W e is the total cost of communication between

remote and local vertices. Above equation represents generic cost, which we expand by

formulating according to our problem specifically in terms of energy and execution time

saving.

103

Page 104: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

4.6.1 Response time optimization:

Total response time is cumulative sum of execution sum of local and remote edges plus

transition time. Transition time is the time required to transfer the data between local and

remote parts.

µtotal=∑v=0

V

α µvlocal+∑

v=0

V

(1−α ) µvcloud+¿∑

e=0

E

β µe¿

(4.3)

While α serves the same objective i.e. to differentiate between remote and local ver-

tices, β is used to differentiate between non-transitional and transitional edges. There is

only one transitional edges which connect the local and remote graph together.

If µtotal and µlocal are the execution time with and without offloading respectively, then

we can calculate the percentage response saving as following by offloading.

µsaving=( µlocal−µtotal

µlocal) .100 %

(4.4)

4.6.2 Energy minimization:

Similarly following the same trend, the objective function of energy minimization is as

following;

λ total=∑v=0

V

α λvlocal+∑

v=0

V

(1−α ) λvcloud+¿∑

e=0

E

β λe¿

(4.5)

Where λvlocal , λv

cloud are energy expressions of the vertices which are executed locally and

remotely respectively. λe is the energy spent to send data between local and remote node at

the portioning edge.

Intuitively λ and µ are directly related to each other. More a node takes time to execute,

more energy it will consume. Infact λ is the scaled version of µ i.e.

λ=π µ (4.6)

where π is the power of the mobile device.

As explained for the execution time, we can calculate the energy saving with the same

approach as:

104

Page 105: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

λ saving=( λlocal−λ total

λlocal).100 %

(4.7)

where µtotal and µlocal are the energy expense of mobile device with and without offload-

ing respectively.

4.6.3 Joint objective function:

As explained in the previous section, µsaving and λsaving provides us objective measure of

the offloading performance with the objective functions. We can fuse these two parameters

using weighted sum measure Ω defined as following;

Ω=λ . (ℇ )+µ.(1−ℇ ) (4.8)

where ℇ is defined as user preference parameter. In addition to the weighted sum fusion

method, there are other alternatives e.g. product metric (λµ) or weighted product λℇ µ1−ℇ ,

but due to complexity and scalability concerns we have chosen the sum fusion rule in

which end user decides about saving energy or execution time without huge computational

cost. If ℇ=1 user is only sensitive to the energy minimization while for ℇ=0 user is only

sensitive to response time minimization. ℇ=0.5 accounts for the scenario in which equal

weightage is given to the energy as well as response minimization. Lastly the offloading

cost is defined as inverse of joint saving measure Ω.

∂ = 1/Ω (4.9)

Communication cost

No offloading: This is response time (T) and energy (E) measured when application is

not offloaded to the cloud. All the methods of the application execute inside the mobile and

there is no communication cost.

Full offloading: In this scenario, all computational tasks of the mobile are transferred to

the cloud and then all tasks are executed in the cloud. This makes mobile phone just a thin

client terminal which generates input data and then receives the results generated by cloud.

This scenario looks quite feasible but not optimum for the following conditions:

1) Occasionally some methods of the application are unoffloadable. This depends highly

upon the structure of the application.

2) Sometimes data generated by the first methods is so huge that, it becomes highly cost

ineffective to offload application from the start.

105

Page 106: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Partial offloading: In this scenario the application is partially offloaded to the cloud

and we assume that communication cost, mobile cost, and cloud cost are minimized.

In this ways, we define the offloading gain as;

Offloading gain = 1- partial offloading cost/full offloading cost

4.7 Partitioning Algorithm Model:

Algorithm consists of two key stages i.e. merging phase and partitioning phase. In the

merging phase, nodes are merged together if sum of their weights is same as their individ-

ual weights.

Merging Phase:

Input: G: the graph at state j with corresponding Edges E and Vertices V , i.e. G=(E , V )

w: the weight matrix of the corresponding edges and verticesa,b: vertices which will be combined togetherOutput: new graph G2(E2 , V 2) after merging nodes.

For all nodes vϵ V if v≠ a ,b // a certain vertex is selected w e (a∪b , v ) =w e (a ,v ) +w e (b , v ) // addition of weights of edges E ← E e (a∪b ) , v end if E2 ← E−e (a , v ) , e (b ,v ) // deleting edge from Eend ForV 2 ←V−v (a , b )Return G2(E2 , V 2)

Partitioning Phase:

Aim of the partitioning phases is to divide the graph into two partitions such that the

cost involving that partition is lower than without partition i.e.

w ( current partition )<w( previous partition). This is a recursive process which investigates

each edge involved in that graph.

Input: G: the graph at state j with corresponding Edges E and Vertices V , i.e.

G=(E , V , v)

where v is list of vertices which are unoffloadable

w: weight matrix of the corresponding edges and vertices

Output: two new graphs G1(E1 , V 1) and G2(E2 , V 2) after merging nodes.

106

Page 107: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

for i = 1: length (v)

(G , w )=Merge(G , w , v (1 ) , v (i))

// merge all the offloadable vertices

end

for V = 1:v

[ p (G−k , k ) , a ,b ]← partitionfuction(G, w)

// make partitions iteratively through partitionfunction

if w(p (G−k , k )¿<w( partition)

//check the feasibility of each partition by weights

partition← p (G−k , k )

end if

Merge (G ,w , a , b ) //merge last two vertices

end for

return partition

Partitioning function used in the above algorithm is as follows:

Aim of the partitioning function is to minimise ∆ v which involves local execution cost

w local(v), remote execution cost w cloud(v ) as well as communication cost w ( e ( K , v ) ). In this

way, each vertex is iteratively searched and ∆ v is recursively calculated in each iteration.

Input: G j: the graph at state j with corresponding Edges E j and Vertices V j , i.e. G j=(E j ,V j)

w: the weight matrix of the corresponding edges and vertices

Output: A partition at vertex a, dividing graph Gi into Gi−b and b at ith recursive step of partition.

k ← random starting vertex at start of cuttingK=k

while K ≠V i

for v∈V i do if v≠ K ∆ v=w (e ( K ,v ) )−[w cloud (v )−w local(v)]

// testing whether block v should be in cloud or in mobile phone

if max ¿ ∆ v107

Page 108: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

max ¿ ∆ v vmax=v// finding the v which maximises the offloading gain end if end ifend for

K=K∪ vmax

k=merge (G , w , k , vmax)

end while

So the algorithm partitions the application in two subsets, which are able to perform

their tasks with the help of data exchange through wireless channel.

4.8 Evaluation of Offloading Performance:

In this section, we evaluate our method of offloading and partitioning in view of various

scenarios. Using the profiler explained in previous section, we first of all construct a

weighted graph of the application to be evaluated. Then we apply our partitioning algo-

rithm, lastly we evaluate how much gain our partitioning algorithm provided as compared

to literature methods in terms of various parameters i.e. bandwidth saving, battery saving,

processing gain etc.

We explained the image retrieval application in previous section and their correspond-

ing inter-relation. We also explain the corresponding constructed weighted graphs of the

applications. Instead of static speedup factor used in the literature, we use dynamic

speedup factor through the cloud model developed in last chapter. Since cloud blocking

probability and the load changes according to number of users using the cloud, so we take

cloud speed up factor from the mathematical equations developed. Similarly, for network

instead of taking fixed bandwidth, we take snapshots of bandwidth in relation to the corre-

sponding CQI (channel quality indicator) at that time. In this way, we tend to sophisticate

our experiment to match with the real time scenarios as much as possible.

The partitioning algorithm in view of the measures described in section 4.3 is applied,

with various conditions of network, cloud, and user mobile device. Then the partitioning

performance in terms of response time and energy saving is measured and presented in the

next section.

108

Page 109: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

4.8.1 Effect of CQI on the Performance:

Channel Quality indicator (CQI) is reported by the user to the base station via feedback

loop. It indicates the quality of the channel between user and the base station. As the wire-

less channel deteriorate the CQI drops, the network shifts the modulation scheme from

64QAM to 16QAM and ultimately to QPSK. QPSK has better error performance but offers

lower data rate. So with decreasing CQI the data rate and throughput offered the wireless

channel drops. As a result, the feasibility of using cloud services drops. So keeping all the

other factors constant, we found that offloading performance deteriorate with decreasing

CQI.

0 5 10 150

10

20

30

40

50

60

70

80

Offl

oadi

ng C

ost

Channel Quality Indicator (CQI)

OLSPFull OffloadingSISOMIMO, TxD 2x1

Figure 4-50: Effect of CQI on offloading cost for different communication paradigms

The blue line indicates the partial offloading cost while the blue line indicates the full

offloading cost. Since the full offloading cost does not include the optimum partitioning cut

so the cost associated is quite high. As described in section 3.1, we can visualize the law of 109

Page 110: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

diminishing returns in the Figure 4.9. As the CQI is increased beyond a limit, the corre-

sponding gain in terms of reduction in the offloading cost start to marginalize. So we do

not obtain the proportional gain in relation with the increasing investments.

4.8.2 Effect of user battery on Performance:

Effect of user battery on offloading performance is quite complicated to understand.

Three phases are to be understood.

Mobile battery is above threshold ɣ:

In this range, using cloud resources does not seem quite attractive because mobile does

not has concern of running out of the battery. Battery provides enough leverage for local

computation.

Mobile battery is below the threshold Θ:

Access to the wireless network requires considerable amount of energy battery power,

so as the user battery drops below a certain level.

a) Feasibility to using network becomes low if the communication is quite high.

b) Feasibility of exploiting cloud resources through network becomes appreciable if

communication cost is low.

Mobile battery is between threshold ɣ and Θ:

If mobile battery in a certain range, exploitation of cloud resources though network

seem quite attractive.

110

Page 111: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

10 20 30 40 50 60 70 80 90 1000

2

4

6

8

10

12

Offl

oadi

ng C

ost

UE Battery (%)

Full offloading without OLICAPOF without OLI

Figure 4-51: Effect of UE Battery on offloading cost

4.8.3 Effect of user preference parameter ℇ on Performance

In this scenario, we repeated the previous experiment with different user preference parameter ℇ .

If we increase ℇ from 0.5 to 0.8, user gives more preference to the energy saving over re-

sponse time. As shown in the graphs, with ℇ = 0.8, the offloading cost changes according

to the phase of battery in which we are operating.

i) Mobile battery is below the threshold Θ: In this scenario, as mobile battery is below

a certain threshold so most of the processing is performed inside the cloud. Due to sensitiv-

ity of the user to battery ℇ = 0.8, the offloading cost is more than the scenario ℇ = 0.5.

ii) Mobile battery is above threshold ɣ: In this scenario, as battery battery is above a

certain threshold so device is insensitive to processing done in mobile or cloud. The of-

floading cost is lesser for ℇ = 0.8 as compared to ℇ = 0.5.

iii) Mobile battery is between threshold ɣ and Θ: This scenario shows the same result as

i) due to over sensitivity to mobile battery.

111

Page 112: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

10 20 30 40 50 60 70 80 90 1000

2

4

6

8

10

12

% Battery

Offl

oadi

ng C

ost

CAPOF, e = 0.5Full Offloading, e = 0.5CAPOF, e = .8Full Offloading, e = 0.8

Figure 4-52: Effect of UE Battery on offloading cost

4.8.4 Effect of cloud blocking probability on offloading cost

As the number of users increase, cloud start blocking requests from certain users, so ultimately

the cloud blocking probability increases. So as the cloud blocking probability increase, it certainly

takes more time for a certain task to get finished. Thus the cloud processing gain is affected.

In this experiment, we change the blocking probability defined in cloud model in section 3.2

and see the effect on the offloading cost. If we compare CAPOF with the full offloading case, we

observe that CAPOF considerably saves the offloading cost.

112

Page 113: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

10 20 30 40 50 60 70 80 900

5

10

15

20

25

30

Blocking Prabability

Offl

oadi

ng C

ost

Full offloading CAPOF

Figure 4-53: Effect of Cloud blocking probability on offloading cost

4.8.5 Effect of number of users in wireless network on response time

In LTE (4G) wireless network, wireless bandwidth is dependent on various factors in-

cluding number of users (N) in a cell sharing the wireless resource, quality of channel, type

of channel.

As wireless bandwidth depletes, response time i.e. difference between time to send

query to the cloud and receive response increases. We did the experiment for three scen-

arios:

No offloading: All tasks are done on the mobile itself. Nothing is offloaded, so intuit-

ively the response time is maximum.

Full offloading: All tasks are offloaded to cloud.

Partial offloading: Partitioning algorithm partitions are the applications as described in

previous sections, so few tasks are done on the mobile while other on the cloud. If we com-

pare CAPOF with the full offloading case, we observe that CAPOF considerably saves the offload-

113

Page 114: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

ing cost.

0 5 10 15 20 25 300

5

10

15

20

25

30

Offl

oadi

ng C

ost

Number of Wireless Users

Full offloadingCAPOF

Figure 4-54: Effect of number of wireless users on offloading cost

114

Page 115: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

4.9 Summary

In this chapter, we extend the CANU model presented in the Chapter 3 further by optimiz-

ing the behavior of an application. In this way, an application partitioning and offloading

framework has been formulated which takes the parameters of the cloud, wireless network

and user and then partition an application according to the changes in wireless network and

cloud. As a first step of the framework, a profiler has been designed which converts an ap-

plication into a directed graph. We apply a comprehensive application partitioning and of-

floading framework on the graph. Image retrieval has been chosen as a test application.

Overall aim is to optimize the energy consumed and response time. We join both energy

consumer and response time into a comprehensive cost function i.e. offloading cost. Then

the designed Application partitioning and offload framework has been tested in view of

different parameters of the wireless network, cloud and user. We observe appreciable de-

crease in offloading cost. We aim to improve the application partitioning and offloading

framework further by enabling it to adapt to any application. In next chapter, we will fur-

ther investigate ways to comprehend the ways to analyze the behavior of an application.

115

Page 116: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

5 IMPROVED APPLICATION PARTITIONING AND OFF-

LOADING

The advances in technologies of graph partitioning methods and availability of accurate

models of entities involved in mobile cloud computing enable us to further investigate and

improve the partitioning and offloading framework proposed in previous chapter. Summar-

ising the findings of the chapter 4, application partitioning and offloading framework pro-

posed for mobile cloud applications proves to be an effort to:

1) Extend the easier access of the cloud services to mobile devices

2) Enable the mobile devices to work collaboratively in view of the resources available

at the cloud

3) Ultimately leverage the tasks being executed at the mobile portable devices to the

cloud resources.

5.1 Offloading Likelihood Index:

In this chapter, we aim to refine the framework developed but taking into account vari-

ous factors which influence the likelihood of an application to be partitioned and offloaded.

In this way, we introduce a new term Offloading Likelihood Index (OLI). OLI aim to calcu-

late the likelihood of an application to be partitioned by using various graph theory meas-

ures we will introduce later. We will start by application. Due to multiple kinds of applica-

tions and their corresponding aspects, we take different synthetic applications in terms of a

graph and then then apply different graph techniques to get insight into their structure and

corresponding likelihood to be partitioned. Furthermore, we will also take into account the

behavioural attributes of application and how certain behavioural characteristics of an ap-

plication contribute to its likelihood to be partitioned. In the second section, we have done

some experiments related to error resilience of different set applications, we will accom-

modate those results to find out the effect of error resilience of an application influence its

likelihood to be portioned and offloaded.

In this way, we will apply different graph methods on different synthetic models of ap-

plications. Then based on the results we will extract valuable information to predict about

any application to can be partitioned or not.

116

Page 117: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

5.2 Experiment with synthetic graphs on application topologies

In this section we introduce different graph topologies for experimental purpose. Each set of topo-

logy aim at changing certain graph parameter e.g. edge/vertex weight, number of nodes while keep-

ing the other factors constant. Later we will apply graph theory measures on the described set of

topologies to calculate the effect of different graph parameters on the offloading decision.

5.2.1 Effect of weightage of edge:

With increasing complexity of edge. As we concluded from chapter 4 application parti-

tioning model that edge in the graph are sensitive to the network vulnerabilities. Location

of heavy edges at the start of application makes it difficult for the application to offload

earlier. As we keep on moving the lighter edges towards the end of the application the off-

loading index intuitively tend to decreases.

For the first experimental graphs, we took a graph 5.1 (i) with progressively increasing

weightage of edge and then we shuffle the lightest and heaviest edges to form the 4 set of

topologies shown in the figure 5.1.

In all the topologies the vertices remain the same, we have taken the value of 20 for all

the vertices.

117

Page 118: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 5-55: Topology A1 (Influence of vertex weights on partition)

118

Page 119: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 5-56: Topology A2 (Influence of edge weights on partition)

5.2.2 Effect of number of vertices:

In this experimental topology, we started with 3 numbers of edges and progressively

increase to 6 number of edges. This experimental topology will be used to judge how num-

bers of nodes effect the offloading likelihood index (OLI).

119

Page 120: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 5-57: Topology A3 (Influence of number of nodes on partition)

5.2.3 Effect of branching:

In this experimental topology, we introduced branching on certain edges. Then we move

the position of the branching along certain edges progressively. The weights of the edges as

well as nodes remains the same. This experimental topology will be used to judge how

branching effects the offloading likelihood index (OLI).

120

Page 121: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 5-58: Topology A4 (Influence of branching of directed graph on parti-tion)

5.3 Computational measures of objective graph:

In this section, we described certain quantitative measures of graph theory, which provides

valuable information about the structure of the graph. In this way, we aim to extract valu-

able information about our application graph. For experiment purpose, we have used four

(4) topologies described above. At the end, based on these objective measures we compute

a parameter called offloading likelihood index (OLI), which predicts likelihood of an ap-

121

Page 122: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

plication to be partitioned without any knowledge of resources in cloud and wireless net-

work. We will explain each computational measure and then will provide contribution of

each measure in the OLI.

5.3.1 Shortest path measure ψ ( A):

The shortest path measure provides valuable information about the structure the graph.

For any square matrix ψ ( A) provides the distance matrix A for all vertices where D(a,b)

indicates the shortest path distance between vertex a and vertex b. If a heavy node exists at

the start of a graph, it contributes to increase the distance measure of all the subsequent

nodes. In the section 5.1 we introduced 4 experimental topologies (A1, A2, A3 and A4).

For reference the shortest distance measure for first two topologies A1 and A2 is indicated

below:

ψ ( A 1) =

0 10 30 60 100 Inf 0 20 50 90 Inf Inf 0 30 70 Inf Inf Inf 0 40 Inf Inf Inf Inf 0

ψ ( A 2) =

0 20 50 90 100 Inf 0 30 70 80 Inf Inf 0 40 50 Inf Inf Inf 0 10 Inf Inf Inf Inf 0

It is quite evident that due to heavy node existing in A2 at the start increases the shortest

path measure of the entire subsequent nodes and makes them difficult to offload. We see a

correlation between shortest path measure and offloading likelihood index. As a numeric

measure we took the variance of first row of ψ ( A) to be used in derivation of offloading

index.

5.3.2 Betweenness centrality ∂( A)

Betweenness centrality is correlated to the centrality of a node in a graph. It measures to

which extent a node lie in paths between different nodes. If K number of shortest paths

passes through a node n from all the vertices, then the betweeness centrality of that node

122

Page 123: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

will be K. A node captures central position in a graph if it has high betweeness-centrality,

because it influences the flow of the graph. In our case, high betweeness centrality of a

node mean, it is less likely to be partitioned [105].

We measured the betweenness centrality measure for each of the synthetic graphs men-

tioned in section 5.1. For all the topologies we got the same betweenness centrality meas-

ure. When we did betweenness centrality test on branching topologies in fig. 5.3, we found

quite interesting results.

Branching node changes from earlier to later in 5.3 i) to iii) respectably. ∂(C ) for the

three topologies is:

∂ (C 1 )=[0 74 3 06 6 40]

∂ (C 2 )=[06 10 30 6 40]

∂ (C 3 )=[0 58 303 0 ]

As the branching start from earliest to latest nodes, the betweenness centrality ∂(C )

measure decreases for the middle nodes. The ∂ (C ) of the edge just before the branching

node become quite high. From application point of view the

Interestingly the measure shown increase with respect to the length of the graph.

Figure 5-59 Betweeness Centrality of graph

For example in the Figure 5-5, 2 very complicated regions has been separated through a

short path. If we try to reduce the graph, the divisive methods dictate to break through the

shortest path i.e. 7-8 and then merge the other nodes. While the agglomerative methods

dictate to merge the complex triangles first, then go for the shortest link.123

Page 124: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

High betweeness of a node is associated with its very high likelihood to provide a parti-

tioning edge. These nodes are also called the gatekeepers of sub-graphs because they carry

the most of the traffic in a graph.

5.3.3 Clustering coefficients:

Clustering coefficient provides a qualitative measure of likelihood of the nodes to

cluster together. Intuitively, the graphs having high clustering coefficient are less likely to

be partitioned, because of the huge interconnectivity of the nodes.

In an n node directed graph, en represents the number of connected pairs between all

neighbours of n while kn is the number of neighbours of n then the clustering co-efficient

Cn is given by:

Cn=en/(kn(kn−1)) (5.1)

Clustering coefficients are quite valuable in topologies in which triangles [106]. Exist-

ence of any cluster tends to decrease the offloading index.

5.3.4 Network heterogeneity

It reflects the tendency of a network to contain hub nodes. Presence of a hub node in a

graph decreases its likelihood to be offloaded, because of the communication overhead in-

volved by hub node [107].

5.3.5 Number of connected components

In undirected networks, two edges are connected to each other if there exists a vertex

between them. Within a network, all nodes that are pairwise connected form a connected

component. The number of connected components indicates the connectivity of a network

– a lower number of connected components suggest a stronger connectivity. Stronger con-

nectivity is inversely correlated with the offloading likelihood index.

5.3.6 Max-flow coefficient:

Max flow or min cut coefficient indicates the minimum value of edge in a graph. From

partitioning point of view this is quite importation. Many partitioning algorithms have been

designed with taking into account the max-flow coefficient [108].

The smaller the max-flow coefficient as compared to other nodes, it becomes quite easy

to offload. Partitioning index is highly correlated to the max-flow coefficient and the dif-

ference of max-flow coefficient and mean of edge vector values.

124

Page 125: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

For example the graphs depicted in i) and iv) of A1 topology (Figure 5.1) are more

likely to be partitioned due to the placement lighter vertices (low max-flow coefficient) at

the start of the graph. There are many variants to calculate the Max-flow coefficient e.g.

Push relabel, Edmunds Karp and Kolmogorov.

5.3.7 Topological order ∅ (C)

Topological order is a way to quantify the sorting position of a directed graph. For ex-

ample an edge ab is directed from vertex a to vertex b, then topological order of a comes

before the topological order of b. It is linear ordering of all the vertices of a graph. In our

application graph, topological order is vital information about the order in which tasks will

be executed. For instance, the vertices of the graph may represent tasks to be performed,

and the edges may represent constraints that one task must be performed before another; in

this application, a topological ordering is just a valid sequence for the tasks [109].

Topological order is influenced by branching in a graph. For instance in the Figure 5.3

due to branching the topological order of the nodes is changes as indicated below.

∂ (C 1 )=[126 789 34 5] (5.2)

∂ (C 2 )=[123 678 45 ] (5.3)

∂ (C 3 )=[1 236 74 5] (5.4)

5.3.8 Boye myrvold planaity test:

A planer graph passes the Boye Myrold planarity test, while a non-planer graph does

not. A planer graph does not contain any crossover. A planar graph is more likely to parti-

tion unlike an unplanar graph due to least interdependence between nodes.

5.3.9 Edmonds' maximum cardinality matching (Edmunds-Karp number):

There are multiple ways to determine minimum cut or maximum flow in a graph. Ed-

munds-Karp number is one of them. Min-cut in a graph is highly valuable information. If a

graph has minimum-cut at the start of the graph, then it’s likelihood of partition increases.

5.3.10 Number of Edges and Vertices:

Number of edges and number of vertices generally also play important part in deciding

whether a graph is more feasible for partitioning for not. Smaller the number of edges and

vertices, more it will be likely a graph to be partitioned.

125

Page 126: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

5.3.11 Graph Diameter:

Graph diameter represents the maximum distance between the two nodes. Offloading

likelihood index (OLI) is inversely correlated to the graph diameter.

5.3.12 Eccentricity:

The maximum distance between a vertex k and all other vertices are called the eccentri-

city [110]. Offloading likelihood index (OLI) is inversely correlated to the eccentricity.

5.3.13 Radiality:

Radiality is a qualitative measure of centrality of a node. For any node k, the Radiality

is the shortest path between k and all other nodes. The value of each path is subtracted by

‘graph diameter - 1’. Then for n node graph, the final figure is divided by ‘n-1’ [110]. Off-

loading likelihood index (OLI) is inversely correlated to the eccentricity.

5.3.14 Graph Density:

Account for the average number of neighbours normalised by the number of nodes. For

example, clique graph has density of 1. As the graph density increase, it become difficult

for a graph to be offloaded.

5.3.15 Degree distribution:

Degree of any node k represents the total number of edges connected to k. The degree

distribution of graph provides the number of nodes with their corresponding degree of the

graph.

5.3.16 Stress distribution:

A node has high stress, if it is cross by high number of shortest paths. Presence of high

stress nodes at the start of the graph increases its likelihood to be offloaded.

After we have summarised the qualitative measures of graph theory which predicts the

likelihood of a graph to be partitioned, we move our focus to the set of application need to

be evaluated.

5.4 Applications for Performance Evaluation:

In the chapter 4, we use Image retrieval application for performance evaluation. In this

126

Page 127: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

chapter, we will further extend this by taking other version of the image retrieval applica-

tion. In our system application partitioning framework, we have employed 3 versions of

visual search:

1_ Performance optimized visual search (IVR Float): As explained in the chapter 4, In

this kind of application, we assume the mobile has best resources available, wireless chan-

nel has high CQI (channel quality indicator), high RBs (resource blocks) i.e. available

bandwidth. Cloud is assumed to be always available.

2_ Bandwidth optimized visual search (IVR Binary): In this version of image retrieval,

we assume that the network is not in best state so that we compress the information ex-

tracted from an image retrieval application to minimize the network overhead. In this way,

few blocks of the image retrieval are modified so that the data is converted to binary in-

stead of floating point. This certainly reduces the overhead, computational complexity and

the speed of retrieval.

3_ Scalable bandwidth application (IVR Mobile): IVR mobile seeks a compromise

between IVR-float and IVR-binary based on channel bandwidth.

5.4.1 Image Visual Retrieval ( IVR Mobile)

IVR Mobile version converts floating point data from each data into binary version. In

this way, we are able to save a lot of computations at the cost of loss of accuracy. IVR Mo-

bile converts the floating point calculations of each block of IVR Float into binary so that

data transferred between block is reduced considerably. IVR Mobile and IVR Binary are

quite similar in certain aspects, apart from the fact that IVR Mobile provides a compromise

between the blocks of IVR binary and the IVR Float. Each block of the IVR mobile has

been explained shortly.

127

Page 128: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 5-60 Algorithmic Structure of IVR Mobile Application [103]

5.4.1.1 Keypoints detection

The keypoints are detected in an image based on the Laplacian-of-Gaussian scale-space.

5.4.1.2 Feature selection

The feature selection method selects the keypoints with high matching probabilities

based on several factors such as keypoints scale, coordinates, and orientation

5.4.1.3 Local Descriptor Extraction

Extraction of SIFT descriptor based on the spatial distribution of pixel intensity gradi-

ents in a scale and orientation normalized patch surrounding the keypoint.

5.4.1.4 Local Descriptor Compression

Compression of the SIFT descriptors using a specially designed transform which com-

putes the sums and differences of different SIFT gradient bins, and selects elements follow-

ing a specific pattern to preserve the discriminative power of SIFT [103].

5.4.1.5 Coordinate Coding

The keypoint coordinates are encoded using Location Histogram Coding (LHC) tech-

nique, where the coordinate information is converted into a histogram and a context adapt-

128

Page 129: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

ive arithmetic encoder is used to compress the histogram.

5.4.1.6 Global descriptor aggregation

Aggregating of local image descriptors into a compact and binary global signature

RVD. It is computed by aggregating, for each visual word, all residuals (vector differences

between descriptors and cluster centres) of descriptors assigned to the same visual word.

The RVD vectors are L2 normalized and subsequently, signed square rooting (SSR) nor-

malization was applied.

5.4.1.7 Binarise components

Having obtained a discriminative image signature using the aforementioned aggregation

approach, we can now binarise the image signature based on the sign of the global descrip-

tor coefficients. There are two significant benefits gained from the signed binarization.

First, the binary vector requires 4 times few bits compared to floating point vector. Second,

binary vectors can be efficiently compared in the compressed domain. The Hamming dis-

tance between two binary vectors can be computed very quickly using atomic XOR and

POPCNT instructions.

5.4.1.8 Cluster and Bit Selection

The cluster occupancy and rank are used to estimate reliability of each cluster level rep-

resentations, which is used to select a subset of clusters with high reliability from the im-

age-level RVD descriptor and additionally also used for rate control of the produced RVD

representation. A particular cluster is rejected if the number of local descriptors assigned to

that cluster is less than cluster selection threshold Cth. The threshold value Cth is selected

based on typical (median) cluster occupancy to achieve the required size of RVD descriptor

for each bitrate [103].

The RVD vector is binarised by applying the sign function which assigns the value 1 to

any non-negative values, and the value 0 to any negative values, respectively. To further

compress RVD a subset of bits from the aforementioned binary representation is selected

from each cluster, based on separability criteria. We select those bits which provide best

separability between hamming distances for matching and non-matching pairs (trained off-

line) of binary component-level RVD descriptors. Let P(X/M) and P(X/N) denote the con-

ditional probability that the XOR between two corresponding bits is 1 for matching and

non-matching image pairs respectively. We select bits that maximize the difference be-

129

Page 130: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

tween P(X/M) and P(X/N). The RVD descriptor size is 1 kilobyte which can be scaled

down to any required bitrate via cluster selection and bit selection mechanisms [103].

5.4.1.9 Superior matching

The similarity between two compressed RVD descriptors is computed using weighted

Hamming distance. We take advantage of differing statistics for matching and non-match-

ing image pairs to design a weighting function for the correlation scores. In this weighting

function, observations with large Hamming distances have weights close to 0 and are thus

severely discounted, because these large Hamming distances are likely to arise from non-

matching image pairs. Conversely, observations with small Hamming distances have

weights close to 1 and are thus strongly rewarded, because these small Hamming distances

are likely to arise from matching image pairs [103]. This weighting function is especially

beneficial for accurate image retrieval from a large database, where most of the observa-

tions encountered are caused by non-matching database images and should be discounted.

After the weighting function is applied, the weighted Hamming scores assigned to match-

ing database images stand out more prominently in a ranked list [128].

We constructed the raw objective graph of the IVR (binary) and IVR (mobile) with the pro-

cedure outline in the chapter 4, as shown in the figure 5.7 and 5.8 respectably.

130

Page 131: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 5-61: IVR (binary) Raw Objective Graph (ROG)

131

Page 132: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Figure 5-62: IVR (Mobile) Raw Objective Graph (ROG)

132

Page 133: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

5.5 Error Response of Applications:

In the section above, we elaborated three versions of image retrieval application. In or-

der to have better formulation of error response of application models.

5.5.1 Type of Errors

We subject all of the models to two types of errors. In this way, we measure MAP (mean

average performance) as a score. MAP is a qualitative measure to measure the accuracy of

the image retrieval.

5.5.1.1 Burst Error

In communications, due to the longer duration of the noise a contiguous sequence of

symbols is lost. The received data over a data transmission channel has errors in the first

and last symbols (signalling information). Due to loss of signalling information, it becomes

highly difficult to recover the valuable information from the packets affected by burst er-

ror. In case of burst error the lost information is assumed to be lost and pose difficulties to

be recovered.

5.5.1.2 Random Error

As opposite to the burst error, Random bit errors are complications that occur in the

transmission of data. In case of random error, random bit errors are introduced in the valu-

able information in the form of disorganized bits in the transmission.

5.5.2 Error Response of Applications

We subjected the above described errors to each of the version of image retrieval.

5.5.2.1 IVR (float)

Floating version of the IVR is the simplest version of the image retrieval application.

From the curves, we can observe that the consequences posed by burst error are more

severe since MAP is reduced considerably high as the burst error increases. MAP provides

a qualitative measure of the accuracy of the image retrieval application.

133

Page 134: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

0 10 20 30 40 50 6050

55

60

65

70

75

80

% Error

MA

P

Random ErrorBurst Error

Figure 5-63: Error response of IVC (float)

Curve fitting is used to fit equations to the curves which are obtained after the simula-

tions. The following equations relate % error with the MAP.

Random

MAPrandom( IRVF )=−0.2068 ε+53.7 (5.5)

Burst

MAPBurst( IRVF )=−0.3814 ε+53.66 (5.6)

5.5.2.2 IVR (binary)

As discussed earlier, in IVR (binary) few blocks of the image retrieval are modified so

that the data is converted to binary instead of floating point. This certainly reduces the

overhead, computational complexity and the speed of retrieval. We observe the similar

trend of MAP-vs-Error as in the case of IVR (binary). Burst error is more harmful than the

random error. IVR (binary) 0% error MAP is lower than IVR (float) as expect. Moreover,

rate of MAP degradation is higher IVR (binary) as compared to IVR (float).

134

Page 135: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

0 10 20 30 40 50 6035

40

45

50

55

60

% Error

MA

P

Random ErrorBurst Error

Figure 5-64: Error response of IVR (Binary)

Curve fitting is used to fit equations to the curves which are obtained after the simula-

tions. The following equations relate % error with the MAP.

Random

MAPrandom( IRVB )=−0.164 ε+58.8 (5.7)

Burst

MAPBurst( IRVB)=−0.335 ε+58.29 (5.8)

5.5.2.3 IVR (mobile)

IVR Mobile is a scalable bandwidth version of IVR binary. It seeks a flexible compromise

between IVR-float and IVR-binary based on channel bandwidth. If channel bandwidth is

high then more floating point operations are performed (less compression) which ensures

higher accuracy. Conversely, if channel bandwidth is low then more binary operations are

performed (more compression) at the cost of degraded accuracy.

135

Page 136: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

0 10 20 30 40 50 6030

35

40

45

50

55

MA

P

% Error

Random ErrorBurst Error

Figure 5-65: Error response of IVR (flexible)

Curve fitting is used to fit equations to the curves which are obtained after the simula-

tions. The following equations relate % error (ε) with the MAP.

Random

MAPrandom(IRVB )=−0.1818 ε+76.51 (5.9)

Burst

MAPBurst( IRVB)=−0.4007 ε+76.46 (5.10)

5.5.3 Conclusion:

We can conclude from the discussion in the section 5.5.2 that, the slope of degradation

of MAP with respect to % error is almost 2 times in case of BURST error as compared to

RAND error. This is because in burst error complete chunks of image feature vectors are

lost and we can’t retrieve them through any interpolation. While in case of RAND error,

only in between random values of the certain energies in feature vector are lost this can be

partially recovered.

Moreover IVRF shows the best performance for 0% error, but unfortunately as the noise

136

Page 137: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

in the channel increase the rate of degradation of MAP is high as compared to IVRB. This

is because while we binarize the image retrieval block, zero error performance of floating

point is good but it is more prone to errors in case of high channel error.

IVRM gives mixed response for 0% errors and high channel errors.

It gives the worst 0% error among the three variants while rate of degradation is highly

sensitive to the particular type of error system is subjected to.

5.6 Improved partitioning algorithm

After assessing all the above measures we can conclude that min-cut which is core of

my partitioning algorithms can’t be used solely to partitioning any application. But there

are many other parameter’s too which give us quite a good hint where to partition. All the

parameter’s which gives feasibility of partitioning about any application can be used to de-

rive a numeric measure i.e. application offloading likelihood index. We gave labels to each

of the measure and then employed neural networks to calculate the respective weight in

calculating the partitioning coefficient i.e. likelihood of a node to be involved in the parti-

tion.

In our improved version of the application partitioning algorithm, we incorporate the

partitioning index described in section 5.1 and error performance of applications men-

tioned in the section 5.5. Partitioning index provides valuable offline information about

likelihood of an application to be partitioned without knowledge of the states of wireless

network, cloud and UE. Similarly, the error performance provides a realistic insight into

the performance response of the application with respect to the variations in the channel.

So based on the error response formula’s derived in section 5.2 we can further improve our

partitioning algorithm described in the section 4.4.

5.7 Performance Analysis

In this section, we will see the effect of integrating Offloading Likelihood Index in our

Comprehensive Application Partitioning and Offloading Framework (CAPOF). Partition-

ing performance improvements can be seen when we incorporate OLI.

5.7.1 Effect of Cloud blocking probability

As the number of users increase, cloud start blocking requests from certain users, so ul-

timately the cloud blocking probability increases. So as the cloud blocking probability in-

crease, it certainly takes more time for a certain task to get finished. Thus the cloud pro-

137

Page 138: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

cessing gain is affected.

In this experiment, we repeated the same experiment as in 4.8.3 and observed that intro-

duction of OLI (offloading likelihood index) aims to reduce the total offloading cost in case

of full offloading as well as CAPOF (Application Partitioning and Offloading Frame-

work).

10 20 30 40 50 60 70 80 900

5

10

15

20

25

30

Blocking Prabability

Offl

oadi

ng C

ost

Full offloading without OLIFull offloading with OLICAPOF without OLICAPOF with OLI

Figure 5-66: Effect of Cloud blocking probability on offloading cost

5.7.2 Effect of UE battery on offloading cost

As discussed in section 4.8.2, the effect of user battery on offloading performance is

quite tricky to understand. The use of the battery is maximum when mobile phone exploits

the cloud resources through the network. This happens in a certain range when mobile bat-

tery is between threshold ɣ and Θ. We repeated the same experiment and observed that, use

of OLI (offloading likelihood index) reduces the total offloading cost in case of full of-

floading as well as CAPOF (Application Partitioning and Offloading Framework).

138

Page 139: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

10 20 30 40 50 60 70 80 90 1000

2

4

6

8

10

12

Offl

oadi

ng C

ost

UE Battery (%)

Full offloading without OLIFull offloading with OLICAPOF without OLICAPOF with OLI

Figure 5-67: Effect of UE Battery on offloading cost

5.7.3 Effect of number of wireless users on offloading cost

In LTE (4G) wireless network, wireless bandwidth is dependent on various factors including

number of users (N) in a cell sharing the wireless resource, quality of channel, type of channel.

As the number of users increase in the wireless cell the wireless bandwidth depletes. So the re-

sponse time i.e. difference between time to send query to the cloud and receive response increases

which increases the offloading cost. Introduction of OLI (offloading likelihood index) in the

algorithm reduces the total offloading cost in case of full offloading as well as CAPOF

(Application Partitioning and Offloading Framework).

139

Page 140: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

0 5 10 15 20 25 300

5

10

15

20

25

30

Offl

oadi

ng C

ost

Number of Wireless Users

Full offloadingCAPOFCAPOF with OLIFull offloading with OLI

Figure 5-68: Effect of Number of wireless users on offloading cost

5.8 Summary

In this chapter, the aim was to expand and improve the application and offloading frame-

work by taking offline parameters about the application contextual model and topological

structure of an application. Multiple topologies of applications graph have been analysed

with various values of edges and vertices. We application various graph theory metrics

which provides reasonable information about the likelihood any application to be parti-

tioned. In this way, we have defined offloading likelihood index which takes the structural

information into account and predicts how much likely an application to be partitioned

without knowledge of resources of wireless network and cloud. We also simulated the ef-

fect of different kind of errors on our image retrieval application. We integrate offloading

likelihood index and error response into the partitioning and offloading framework and fur-

ther improved. In the end, we have test improvised version of partitioning and offloading

framework in different scenarios involving various parameters of wireless network, cloud

and user.

140

Page 141: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

6 FUTURE WORK & CONCLUSION

6.1 Conclusion

As the mobile network and user demands are evolving, researchers have turned their

focus towards network edge i.e. investing more resources on the base stations. This pro-

vides a unique opportunity to exploit a lot of computational capacity at the base stations by

leveraging the cloud computing resources. In this thesis, we have outlined an effort to pro-

pose and simulate an end-to-end communication framework and then further expanded the

framework by focusing on application partitioning and offloading framework. A multi-ob-

jective optimization methodology has been applied on the given framework. The proposed

methodology aims to minimize the resources in network and cloud in view of application

and user context maintaining the appreciable user QoS.

In Chapter 3, we propose a novel end to end multimedia communications framework in

which mobile network, cloud, mobile user and application interact with each other and are

connected to each other through a block mechanism. Setup is named as CANU comprising

Cloud, Application, Network and User entities in an end to end communications. Mathe-

matical model of each entity presented in CANU has been developed, and integrated in a

proposed CANU framework. A multiobjective optimization algorithm NSGA-II has been

applied on the CANU framework to optimize the behavior of the different models.

A novel application partitioning framework which offloads the application blocks inside

the cloud has been proposed in Chapter 4. The designed Comprehensive Application Parti-

tioning and Offloading Framework (CAPOF) gathers the information about the cloud, net-

work and user model and constructs a graph of the application and applies a sophisticated

graph partitioning algorithm to optimally offload parts of the application to the cloud. By

leveraging the cloud resources, saving in terms of objective measures such as execution

time and energy is achieved. Although the proposed partitioning framework has been de-

signed for arbitrary topology of applications, it has been tested on an image retrieval ap-

plication where it was able to determine the portions of the application to run on a mobile

device and what to execute on a cloud server according to different cost models. The

framework provides a stable low time complexity and can significantly reduce execution

time and energy consumption of the application by optimally distributing tasks between the

mobile device and the cloud. In this way, we have tested our methodology in complex mo-

141

Page 142: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

bile network models MIMO and OLSM. CAPOF shows better performance than full off-

loading, in terms of 20-55% saving in offloading cost. Offloading cost is also sensitive to

the user preference parameter ¿). Offloading cost saving pattern change if we change ℇ ,

due to the preference of user to energy saving over response time and vice versa.

In Chapter 5, the application partitioning and offloading algorithm is further expanded,

by investigating the behavior of the application model. Synthetic graph topologies have

been generated and various graph theory measures are applied on the topologies to esti-

mate the complexity of a generic application graph. By doing this, we attempt to evaluate

how effectively and efficiently we can determine the likelihood of application offloading

solely through the graph structure. In this way, we aim to predict how various graph theory

measures influence the decision of offloading decision making process. Ultimately how

much performance and efficiency gain we can achieve by determining the offline offload-

ing likelihood index (OLI) for splitting a specific application into local and remote parts.

OLI improve the performance improvement achieved by CAPOF further by 5-10% due to

enhanced ability of CAPOF by which it can calculate the likelihood of an application to be

offloading without knowledge of cloud and network resources.

6.2 Critical Review

This section summarises the critical review and suggested improvements in our work.

I. The designed approach for optimization is centralized. It piles up complexity, if the

system scales up (no. of users or applications increases). As discussed, a possible alter-

native is a decentralized approach, which comprises an N-agent system, such that each

agent influence about the global optimal solution. However large communication over-

head is a problem in this approach.

II. Parameters for decision making such as bandwidth, security, response time and failure

rate are sometimes hard to measure or acquire in a timely manner in practical systems.

Therefore, the way to estimate and measure these parameters need to be further investi-

gated.

III. 4G LTE communication network as a network model is used, but due to cost concerns

there are other alternatives e.g. wifi and bluetooth which can provide good connectivity

and throughput in certain scenarios.

IV. In designed methodology, a simplistic user QoS model has been considered, in which

user has equal preferences in terms of choosing solutions concerning the resources in-

142

Page 143: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

vested in cloud and network. This does not take into account, if user has some inherent

preferences like high bandwidth demand in view of its subscriber context.

V. Effect of signaling channels overhead has not been considered. Similarly, the link be-

tween LTE evolved packet core (EPC) and the cloud is also assumed to be perfect.

VI. Round robin scheduler was assumed in the network context. Other scheduler e.g. pro-

portional fair, max SINR and best CQI has not been simulated.

VII. Effect of handovers has not been taken into account. User high mobility can cause ex-

cessive handovers, which might lead to missing QoS latency requirements.

6.3 Future Work

In view of the critical review, we outline the following directions of the future work.

I. Rate of change of channel conditions, type of channel (Gaussian, Rayleigh, Pedestrian,

Vehicular), cloud and network load strongly influence the optimal solution. In this

way, a comprehensive single user optimization model is proposed in the section 3.4,

which can be extended further to accommodate multi user scenario in future to extend

the current optimization framework.

II. In the similar way, the single user optimization framework can be extended to a multi-

user scenario by scaling up the network and cloud resources. In view of the increased

complexity of multi-user model dynamic programming and Collaborative game theory

[111] can be explored. In these de-centralized based approaches, optimization is done

in a distributed manner such that each agent gives feedback to reach a global optimum

solution.

III. Multimedia Broadcast Multicast Service (MBMS) service is used to exploit the joint

processing and joint transmission through the radio-network. It saves a lot of network/

cloud effort in delivering appropriate QoS to users consuming the same content.

MBMS scenario can be incorporated in our proposed end-to-end communication

framework.

IV. Application context can be elaborated with the cloud offloading mentioned in the sec-

tion 2.1.3. In this way, instantaneous conditions of the network and cloud decide about

the part of the application which needs to be partitioned, offloaded and executed in

cloud.

V. User context can be more elaborated with user contextual information. In MOP

methodology, instead of a single solution, a set of feasible solutions (pareto front) are

143

Page 144: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

obtained. In this way, a more sophisticated user (social and subscriber) contextual

model can help to choose a specific solution in multi-objective optimization.

VI. Energy and power efficiency has not been investigated while designing the contextual

models. For example, LTE consumes 26 times more power[112] as compared to its

legacy mobile systems (wifi, wimax). So network models for LTE alternatives need to

be investigated also. Similarly, Cloud model can also be more generalized, while tak-

ing into account the factor like energy efficiency. Authors in [113] has derived a pre-

liminary model for cloud energy usage.

VII. The current framework can be extended to 5G communication network by integrating

new entities like machine to machine communications (M2MC), internet of things and

cognitive radios.

VIII. Wifi model can be integrated in the current methodology in certain scenarios where the

mobile network is in relatively worse conditions and user profile poses cost concerns in

terms of network access and usage.

With advances in the wireless communications and cloud computing, new applications in-

volving immersive multimedia and rich graphics are emerging. Quality of experience of

the user is changing and research is going towards exploiting huge potentials in the cloud.

Our research is another step in that direction. We have made an effort that summarize mul-

tiple entities involved in an end to end communication system and then have proposed a

multiobjective optimization framework i.e. CANU which optimizes their behavior. Then

we focus our work towards application entity of the CANU framework and presented ap-

plication partitioning and offloading algorithm which aim to enhance user QoS by reduc-

ing the response time and energy consumed. The efforts made by us in this direction have

potential to extend further in certain directions.

144

Page 145: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

REFERENCES

[1] M. Tan, X. Su, and H. Wu, “Media Cloud : When Media Revolution Meets Rise of Cloud Comput-ing” in the proceedings of The 6th IEEE International Symposium on Service Oriented System Engi-neering (SOSE 2011) vol. 7, no. 2, pp. 169–193, 2013.

[2] M. Claypool, D. Finkel, A. Grant, and M. Solano, “Thin to Win ? Network Performance Analysis of the OnLive Thin Client Game System,” in 11th Annual Workshop on Network and Systems Support for Games (NetGames), 2012.

[3] M. Shiraz, A. Gani, R. H. Khokhar, and R. Buyya, “A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing” in IEEE Communications Sur-veys & Tutorials ( Volume: 15, Issue: 3, Third Quarter 2013 ) pp. 1–20, 2012.

[4] N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: A survey” in Future Genera-tion Computer System Journal, vol. 29, no. 1, pp. 84–106, Jan. 2013.

[5] M. D. Carroll and I. Had, “3D Rendering in the Cloud” in Bell Labs Technical Journal vol. 17, no. 2, pp. 55–66, 2012.

[6] G. Lawton, “Cloud Streaming Brings Video to Mobile Devices", in IEEE Computer Society, Issue No. 02 - Feb. (vol. 45), pp: 14-16, 2012.

[7] P. Ross, “Cloud Computing’s Killer App: Gaming,” in IEEE Spectrum, vol. 46, no. 3, pp. 14–14, Mar. 2009.

[8] B. G. E. Moore, “Cramming more components onto integrated circuits,” in proceedings of the IEEE, Electronics, volume 38, number 8, pp.114, April 19, 1965

[9] L. Guan, X. Ke, M. Song, and J. Song, “A Survey of Research on Mobile Cloud Computing,” in 10th IEEE/ACIS Internation Conference on Computer Infornation Science, pp. 387–392, May 2011.

[10] M. V. Pedersen and F. H. P. Fitzek, “Mobile Clouds: The New Content Distribution Platform” in the Proceedings of the IEEE, vol. 100, pp. 1400–1403, May 2012.

[11] R. Stankiewicz and a. Jajszczyk, “A survey of QoE assurance in converged networks” in the Journal of Computer Networks, vol. 55, no. 7, pp. 1459–1473, May 2011.

[12] S. E. Wilhite, “Cloud computing?” White paper published in HDA Now, p. 12, Jan. 2012.

[13] J. Zyren, “Overview of the 3GPP Long Term Evolution Physical Layer” While paper published by Freescale Semiconductor, Document Number: 3GPPEVOLUTIONWP, 2007.

[14] M. E. Aydin, R. Kwan, W. Ding, and J. Wu, “A Genetic Algorithm Approach for Multiuser Schedul-ing on the LTE Downlink,” in the Proceedings of the World Congress on Engineering IIWCE 2012, London, U.K. vol. II, pp. 1–6, July 4 - 6, 2012.

[15] K. Mukherjee and G. Sahoo, “Mathematical Model of Cloud Computing Framework Using Fuzzy Bee Colony Optimization Technique” in International Conference on Advance Computing, Control and Telecommunication Technology , pp. 664–668, Dec. 2009.

[16] J.-S. Wu, S.-F. Yang, C.-M. Hsu, J.-Y. Tu, and J.-R. Jiang, “User Satisfaction-Based Scheduling Al-gorithm for Uplink Transmission in Long Term Evolution System,” in the proceedings of IEEE 18th Int. Conf. on Parallel Distribed Systems, pp. 930–935, Dec. 2012.

145

Page 146: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

[17] S. Patidar, D. Rane, and P. Jain, “A Survey Paper on Cloud Computing,” in the proceedings of Sec-ond Int. Conf. on Adv. Computer Communication Technology, pp. 394–398, Jan. 2012.

[18] M. E. Alex and R. Kishore, “Forensic Model for Cloud Computing : An Overview” in the proceed-ings of International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 1291–1295, 2016.

[19] G. J. Mirobi and T. Nadu, “Service Level Agreement In Cloud Computing . An Overview” in Inter-national Journal of Grid Distribution Computing, Vol. 8, No.5, pp.7-32, 2015.

[20] S. Kandula, “Comparing Public-Cloud Providers” in the proceedings of IEEE Internet Computing, vol. 15, no. 2, pp. 50–53, Mar. 2011.

[21] L. Yang, J. Cao, and S. Member, “Multi-User Computation Partitioning for Latency Sensitive Mobile Cloud Applications” in the IEEE Transactions on Computers, VOL. 64, NO. 8, pp. 2253–2266, AU-GUST 2015.

[22] A. Singh, S. Sharma, S. Ravi Kumar, S. A. Yadav, “Overview of PaaS and SaaS and its Application in Cloud Computing,” in the proceedings of International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), pp. 172–176, 2016.

[23] L. Yang, J. Cao, S. Member, S. Tang, D. Han, and N. Suri, “Run Time Application Repartitioning in Dynamic Mobile Cloud Environments”, in IEEE Transactions on Cloud Computing , Volume: 4, Issue: 3, pp. 336–348, July-Sept. 1 2016.

[24] Q. Duan, Y. Yan, and A. V Vasilakos, “A Survey on Service-Oriented Network Virtualization To-ward Convergence of Networking and Cloud Computing” in IEEE Transactions on Network and Service Management, vol. 9, no. 4, pp. 373–392, 2012.

[25] H. Flores, S. N. Srirama, and C. Paniagua, “Towards mobile cloud applications: Offloading resource-intensive tasks to hybrid clouds” in International Journal on Pervasive Computing Communication, vol. 8, no. 4, pp. 344–367, 2012.

[26] Y. Liu, S. Wang, and S. Dey, “Modeling, characterizing, and enhancing user experience in Cloud Mobile Rendering” in International Conference on Computer Networking and Communication, pp. 739–745, Jan. 2012.

[27] J. Baliga, R. W. a Ayre, K. Hinton, and R. S. Tucker, “Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport” in the Proc. IEEE, vol. 99, no. 1, pp. 149–167, Jan. 2011.

[28] K. Kumar, “Cloud Computing for Mobile Users: Can Offloading Computation Save Energy?” in IEEE Computer Society magazine, vol. 43, no. 4, pp. 51–56, Apr. 2010.

[29] J. Weinman, “Network Implications of Cloud Computing” in Technical Symposium at ITU Telecom World (ITU WT), pp. 75–81, 2011.

[30] R. N. Calheiros, R. Ranjan, and R. Buyya, “Virtual Machine Provisioning Based on Analytical Per-formance and QoS in Cloud Computing Environments” International Conference on Parallel Pro-cessing, pp. 295–304, Sep. 2011.

[31] P. Bellavista, G. Carella, L. Foschini, T. Magedanz, F. Schreiner, and K. Campowsky, “QoS-aware elastic cloud brokering for IMS infrastructures” IEEE Symposium on Computers and Communica-tions (ISCC), pp. 157–160, Jul. 2012.

[32] J. Shuja, K. Bilal, S. A. Madani, M. Othman, R. Ranjan, P. Balaji, and S. U. Khan, “Survey of Tech-niques and Architectures for Designing Energy-Efficient Data Centers” in IEEE Systems Journal, vol. 10, no. 2, pp. 507–519, 2016.

146

Page 147: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

[33] B. Martini, “Manufacturing : Security , Privacy , and Forensic Concerns” Published By The IEEE Computer Society magazine, vol 3, pp.16 –22, 2016.

[34] S. Wang and S. Dey, “Adaptive Mobile Cloud Computing to Enable Rich Mobile Multimedia Appli-cations” in IEEE Transactions on Multimedia, vol. 15, no. 4, pp. 870–883, Jun. 2013.

[35] R. Jain and S. Paul, “Network Virtualization and Software Defined Networking for Cloud Comput-ing : A Survey” in IEEE Communications Magazine, Volume: 51, Issue: 11, pp. 24–31, 2013.

[36] H. Wang, F. Wang, J. Liu, S. Member, D. Wang, and J. Groen, “Enabling Customer-Provided Re-sources for Cloud Computing : Potentials , Challenges , and Implementation” in IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 7, pp. 1874–1886, 2015.

[37] F. Xia, S. Member, A. M. Ahmed, S. Member, L. T. Yang, and Z. Luo, “Community-Based Event Dissemination with Optimal Load Balancing”, IEEE Transactions on Computers, vol. 64, no. 7, pp. 1857–1869, 2015.

[38] M. Cloud, “Context-Aware Mobile Cloud Computing and Its Challenges” in IEEE Cloud Computing volume: 2, issue: 3, 2015.

[39] E. Z. Milian, M. M. Spinola, R. F. Gonçalves, A. L. Fleury, and A. D. De, “Assessing Challenges , Obstacles and Benefits of Adopting Cloud Computing : Study of an Academic Control System” in IEEE Latin America Transactions, vol. 13, no. 7, pp. 2301–2307, 2015.

[40] F. Polash, A. Abuhussein, and S. Shiva, “A Survey of Cloud Computing Taxonomies : Rationale and Overview” in 9th International Conference for Internet Technology and Secured Transactions (IC-ITST), no. 1, pp. 459–465, 2014.

[41] H. Atre, “A review of mobile cloud computing” in the proceedings of 6th International Conference - Cloud System & Big Data Engineering (Confluence), p199-202, 2016.

[42] J. Wang, J. Peng, and Y. Wei, “Adaptive Application Offloading Decision and Transmission Sched-uling for Mobile Cloud Computing” in the proceedings of IEEE International Conference on Com-munications (ICC), 22-27 May 2016.

[43] R. Buyya, R. Ranjan, and R. N. Calheiros, “Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities” in the proceedings of Interna-tional Conference on High Performance Computing and Simulation, pp. 1–11, Jun. 2009.

[44] B. Wickremasinghe, R. N. Calheiros, and R. Buyya, “CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications” in the proceedings of 24th IEEE Advanced Information Networking and Applications (AINA), pp. 446–452, 2010.

[45] S. K. Garg and R. Buyya, “NetworkCloudSim: Modelling Parallel Applications in Cloud Simula-tions,” in the proceedings of Fourth IEEE International Conference on Utility Cloud Computing, pp. 105–113, Dec. 2011.

[46] S. Long and Y. Zhao, “A Toolkit for Modeling and Simulating Cloud Data Storage: An Extension to CloudSim,” in the proceedings of International Conference on Control Engineering and Communi-cation Technology, pp. 597–600, Dec. 2012.

[47] K. Kumar, J. Liu, Y.-H. Lu, and B. Bhargava, “A Survey of Computation Offloading for Mobile Sys-tems” in the proceedings of Mobile Networks Applications, Apr 2012.

[48] D. Niyato, “A Dynamic Offloading Algorithm for Mobile Computing” in IEEE Transactions on Wireless Communication., vol. 11, no. 6, pp. 1991–1995, Jun. 2012.

147

Page 148: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

[49] P. Mcdonagh, C. Vallati, A. Pande, P. Mohapatra, P. Perry, and E. Mingozzi, “Quality-Oriented Scal-able Video Delivery using H . 264 SVC on an LTE Network” in the proceedings of IEEE Global Telecommunications Conference (GLOBECOM), 5-9 Dec. 2011.

[50] A. Pande, V. Ramamurthi, and P. Mohapatra, “Quality-oriented Video delivery over LTE using Adaptive Modulation and Coding”, in the proceedings of IEEE Global Telecommunications Confer-ence (GLOBECOM), 5-9 Dec. 2011.

[51] H. Wang, L. Ding, P. Wu, Z. Pan, N. Liu, X. You, “Dynamic Load Balancing in 3GPP LTE Multi-Cell Networks with Heterogenous Services”, in the proceedings of 5th International ICST Confer-ence on Communications and Networking in China, pp. 1 - 5, 2011.

[52] B. Bojovic, N. Baldo, and P. Dini, “A Cognitive scheme for Radio Admission Control in LTE sys-tems,” in the proceedings of 3rd International Workshop on Cognitive Information Processing (CIP), pp. 1–3, May 2012.

[53] B. Siva, K. Reddy “OFDMA downlink physical layer communication for IEEE 802.16-2009 stan-dard” in the proceedings of Annual IEEE India Conference (INDICON), 2015

[54] S. Wang and S. Dey, “Addressing Response Time and Video Quality in Remote Server Based Inter-net Mobile Gaming” in the proceedings of IEEE Wireless Communication and Networking Confer-ence, vol. 5, pp. 1–6, Apr. 2010.

[55] S. Wang, S Dey, “Cloud Mobile Gaming : Modeling and Measuring User Experience in Mobile Wireless Networks” in the proceedings of ACM SIGMOBILE Mobile Computing and Communica-tions, Volume 16 Issue 1, pp. 10-21, January 2012

[56] X. Sun, N. Ansari, “Energy-optimized bandwidth allocation strategy for mobile cloud computing in LTE networks” IEEE Wireless Communications and Networking Conference (WCNC), 9-12 March 2015.

[57] S. Ghorpade, N. Chavan, A. Gokhale, and D. Sapkal, “A Framework For Executing Android Appli-cations On The Cloud,” International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 230–235, 2013.

[58] A. Kundu, “Authentication of Data on Devices,” IEEE 28th International Conference on Data Engi-neering Workshops (ICDEW), pp. 236–242, Apr. 2012.

[59] S. Ĉ. Borislav, S. P. Jovanovi, and V. V Tim, “Cloud Computing in Amazon and Microsoft Azure platforms : performance and service comparison”, 22nd Telecommunications Forum Telfor (TELFOR), ,pp. 931–934, 2014.

[60] S. Nishida and Y. Shinkawa, “A Performance Prediction Model for Google App Engine,” 2015 10th Int. Conf. on P2P, Parallel, Grid, Cloud Internet Computing, pp. 134–140, Nov. 2015.

[61] M. Hussain and B. M. Almourad, “Trust in Mobile Cloud Computing with LTE-based Deployment,” 2014 IEEE 11th Intl Conf Ubiquitous Intell. Comput. 2014 IEEE 11th Intl Conf Auton. Trust. Com-put. 2014 IEEE 14th Intl Conf Scalable Comput. Commun. Its Assoc. Work., pp. 643–648, Dec. 2014.

[62] B. F. Xu, F. Liu, H. Jin, and A. V Vasilakos, “Managing Performance Overhead of Virtual Machines in Cloud Computing: A Survey, State of the Art, and Future Directions” in the proceedings of the IEEE ( Volume: 102, Issue: 1) 2014.

[63] R. Khan, M. Othman, S. A. Madani, and I. Member, “A Survey of Mobile Cloud Computing Appli-cation Models” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 393–413, 2014.

148

Page 149: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

[64] M. Guzek, P. Bouvry, E. Talbi, “A Survey of Evolutionary Computation for Resource Management of Processing in Cloud Computing” IEEE Computational Intelligence Magazine ( Volume: 10, Issue: 2), pp. 53–67, 2015.

[65] C. Colman-meixner, C. Develder, S. Member, M. Tornatore, and B. Mukherjee, “A Survey on Re-siliency Techniques in Cloud Computing Infrastructures and Applications,” IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 2244–2281, 2016.

[66] X. Huang, R. Yu, J. Kang, J. Ding, S. Maharjan, S. Gjessing, and Y. Zhang, “Dynamic Resource Pricing and Scalable Cooperation for Mobile Cloud Computing,” IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing 2015 IEEE, no. 3, pp. 786–792, Aug. 2015.

[67] S. Deng, L. Huang, H. Wu, and Z. Wu, “Constraints-Driven Service Composition in Mobile Cloud Computing,” IEEE Int. Conf. on Web Services, no. Mcc, pp. 228–235, Jun. 2016.

[68] J. Chen, W. Zhang, “The Right Way to Search Evolving Graphs” IEEE International Parallel and Distributed Processing Symposium Workshops, 23-27 May 2016

[69] M. Rawashdeh, A. Alnusair, N. Mustafa, and M. Migdadi, “Multimedia Mobile Cloud Computing: Application models for performance enhancement", IEEE International Conference on Multimedia & Expo Workshops (ICMEW), 2016

[70] H. Wu, "Analysis of Offloading Decision Making in Mobile Cloud Computing”, Ph.D. dissertation, Freie Universität Berlin, Berlin, Germany 2015.

[71] S. Deshmukh and R. Shah “Computation Offloading Frameworks in Mobile Cloud Computing : A Survey”, IEEE International Conference on Current Trends in Advanced Computing (ICCTAC), 2016.

[72] Q. Qi, J. Liao, J. Wang, and Q. Li, “Dynamic Resource Orchestration for Multi-task Application in Heterogeneous Mobile Cloud Computing,” IEEE Conference on Computer Communications Work-shops (INFOCOM WKSHPS), 2016.

[73] N. Chalaemwongwan and W. Kurutach “Mobile Cloud Computing : A Survey and Propose Solution Framework” 13th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2016.

[74] Y. Zhang, J. Yan, and X. Fu, “Reservation-based Resource Scheduling and Code Partition in Mobile Cloud Computing”, IEEE Conference on Computer Communications Workshops (INFOCOM WK-SHPS), 2016.

[75] K. Dvijotham and R. Sharma, “Battery life estimation in a real-time energy management system,” IEEE Power and Energy Society General Meeting (PES), 2013.

[76] G. P. Perrucci, F. H. P. Fitzek, and J. Widmer, “Survey on Energy Consumption Entities on the Smartphone Platform,” IEEE 73rd Vehicular Technology Conference (VTC Spring), pp. 1–6, May 2011.

[77] T. Hobfeld, R. Schatz, M. Varela and C. Timmerer, “Challenges of QoE management for cloud ap-plications,” IEEE Communications Magazine ( Volume: 50, Issue: 4), April 2012.

[78] I. Siomina and S. Wanstedt, “The impact of QoS support on the end user satisfaction in LTE net-works with mixed traffic,” 2008 IEEE 19th Int. Symp. on Personal Indoor Mobile Radio Communi-cations., pp. 1–5, Sep. 2008.

149

Page 150: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

[79] S. Asghar, “A survey on multi-criteria decision making approaches,” International Conference on Emerging Technologies, ICET, pp. 321–325, Oct. 2009.

[80] A. S. Hassan and M. A. M. Rafie, “A Survey of Game Theory Using Evolutionary Algorithms,” in International Symposium in Information Technology (ITSim), pp. 1319–1325, 2010.

[81] M. Dorigo, V. Maniezzo, A. Colorni, “Ant system: optimization by a colony of cooperating agents”, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 26, issue 1, Feb 1996

[82] P. Ngatchou, a. Zarei, and a. El-Sharkawi, “Pareto Multi Objective Optimization” in Proceedings of 13th International Conference on, Intelligent Systems Application to Power Systems. , pp. 84–91, 2005.

[83] T. Rjlurata and O. P. Gakuen-cho, “MOGA: Multi-Objective Genetic Algorithms”, IEEE Interna-tional Conference on Evolutionary Computation, pp. 289–294, 1995.

[84] J. Horn, N. Nafpliotis, D.E. Goldberg, “A Niched Pareto Genetic Algorithm for Multiob jective Optimization” in the Proceedings of the First IEEE Conference on Evolutionary Computation, IEEE World Congress on Computational Intelligence, pp. 82–87, June 1994.

[85] E.J. Hughes, “Evolutionary many-objective optimisation: many once or one many?”, in IEEE Con-gress on Evolutionary Computation, 2005.

[86] E. Zitzler, M. Laumanns, and L. Thiele, “SPEA2 : Improving the Strength Pareto Evolutionary Algo-rithm,” Eurogen. Vol. 3242. No. 103. 2001.

[87] A. Seshadri, “A fast elitist multiobjective genetic algorithm: nsga-ii,” pp. 1–4.

[88] K. Deb, A. Member, A. Pratap, S. Agarwal, and T. Meyarivan, “A Fast and Elitist Multiobjective Genetic Algorithm: NSGA-II” IEEE transactions on evolutionary computation, pp.182-197, vol. 6, 2002.

[89] A. Konak, D. W. Coit, and A. E. Smith, “Multi-objective optimization using genetic algorithms: A tutorial” in Reliability Engineering & System Safety, vol. 91, no. 9, pp. 992–1007, Sep. 2006.

[90] Coello, CA Coello. "Evolutionary multi-objective optimization: a historical view of the field." IEEE computational intelligence magazine, pp. 28–36, February 2006.

[91] A. Thompson, D. Corne, and C. Wang, “Optimization of LTE Scheduling Using Multi-Objective Evolutionary Algorithms” 2010 UK Workshop on Computational Intelligence (UKCI). IEEE, 2010.

[92] N. Sharma, A. Rao, A. Dewan, and M. Safdari, “Rate adaptive resource allocation for multiuser OFDM using NSGA - II” Wireless Communication and Sensor Networks, 2008. WCSN 2008. Fourth International Conference on. IEEE, 2008.

[93] K. Lin, “Improving Energy Efficiency of LTE Networks by Applying Genetic Algorithm (GA)” 2011 IEEE Ninth Int. Conf. Dependable, Auton. Secur. Comput., pp. 593–597, Dec. 2011.

[94] K. Li, G. Xu, G. Zhao, Y. Dong, and D. Wang, “Cloud Task Scheduling Based on Load Balancing Ant Colony Optimization,” Dependable, Autonomic and Secure Computing (DASC), pp. 3–9, Aug. 2011.

[95] L. M. Brandwacht, “Dimensioning the Cloud,” Diss. MSc thesis Leiden University, the Netherlands, 2013.

150

Page 151: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

[96] Ikuno, Josep Colom, Martin Wrulich, and Markus Rupp. "System level simulation of LTE networks." IEEE 71st. Conference on Vehicular Technology Conference (VTC 2010-Spring), 2010.

[97] C. Mehlführer, J. Colom Ikuno, M. Šimko, S. Schwarz, M. Wrulich, and M. Rupp, “The Vienna LTE simulators - Enabling reproducibility in wireless communications research,” EURASIP J. Adv. Signal Process., vol. 2011, no. 1, p. 29, 2011.

[98] Piro, Giuseppe, et al. "Simulating LTE cellular systems: an open-source framework." IEEE transac-tions on vehicular technology, pp. 498-513, 2011.

[99] Š. Michal, S. Schwarz, J. C. Ikuno, M. Taranetz, Q. Wang, M. Lerch, and M. Rupp, “LTE research using the Vienna LTE link and system level simulators,” Cooperative Radio Communiations for Smart Green Environment COST IC, 2012.

[100] Prasad, Ramjee. OFDM for wireless communications systems. Artech House, 2004.

[101] A. Aron, G. Gˆ, and C. Pop, “About the solution of a battery mathematical model,” BSG Proceedings on Geometry, Balkan Press, 1-10 pp. 1–10, 2011.

[102] B.-G. Chun and P. Maniatis, “Dynamically partitioning applications between weak devices and clouds” Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Net-works and Beyond. ACM, pp. 1–5, 2010.

[103] S. S. Husain and M. Bober, “Improving large-scale image retrieval through robust aggregation of local descriptors”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 88, 2016.

[104] Husain, Syed, and Miroslaw Bober. "Robust and scalable aggregation of local features for ultra large-scale retrieval." IEEE International Conference on Image Processing (ICIP). IEEE, pp. 2799–2803, 2014.

[105] N. Kourtellis and F. Bonchi, “Scalable Online Betweenness Centrality in Evolving Graphs,” IEEE Transactions on Knowledge and Data Engineering, pp. 1580–1581, 2016.

[106] N. Takahashi and A. E. Cases, “On Clustering Coefficients of Graphs with the Fixed Numbers of Vertices and Edges”, European Conference on Circuit Theory and Design, vol. 1, pp. 814–817, 2009.

[107] A. Proskurnikov and M. Cao, “A novel homogenous protocol for multi-agent clustering over directed graphs,” IEEE American Control Conference (ACC), pp. 1906–1911, 2016.

[108] C. Wang, “Pruning Network Coding Traffic By Network Coding — A New Max-Flow Algorithm” IEEE International Symposium on Information Theory, pp. 26–30, 2008.

[109] O. Lezoray, A. Elmoataz, V. T. Ta, B. Mar, and F.- Caen, “Learning graph neighborhood topological order for image and manifold morphological processing ”, IEEE International Conference on Com-puter and Information Technology, 2008.

[110] D. Ashlock, J. Schonfeld, L. Barlow, and C. Lee, “Test Problems and Representations for Graph Evolution” Foundations of Computational Intelligence (FOCI), 2014 IEEE Symposium on. IEEE, 2014.

[111] Z. Li, “LTE network planning based on game theory” IEEE International Conference on Computer Science and Service System (CSSS), pp. 3963–3966, Jun. 2011.

[112] A. Gerber, Z. M. Mao, and O. Spatscheck, “A Close Examination of Performance and Power Charac-teristics of 4G LTE Networks Categories and Subject Descriptors,” Proceedings of the 10th interna-tional conference on Mobile systems, applications, and services. ACM, pp. 225–238, 2012.

151

Page 152: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

[113] X. Fan, W.-D. Weber, and L. A. Barroso, “Power provisioning for a warehouse-sized computer” ACM SIGARCH Computer Architecture News. ACM, vol. 35, no. 2, pp. 13, Jun. 2007.

[114] Alradwan, Haysam, Adnan Motermawy, and Kinan Ghanem. "Reducing pingpong handover effect in LTE mobile networks using TRIAS." Journal for Research and Scientific Studies Engineering Sci-ences series, pp - 237-50, 2011.

[115] Cerwall, Patrik, et al. "Ericsson mobility report." Ericsson.[Online]. Available.: www. ericsson. com/r es/docs/2015/ericsson-mobility-report-june-2015. pdf [June 2015] Accessed: Dec 2016.

[116] Fei, Zesong, et al. "A survey of multi-objective optimization in wireless sensor networks: Metrics, al-gorithms and open problems." IEEE Communications Surveys & Tutorials, 2016.

[117] Abraham, Ajith, et al. "Nature inspired meta-heuristics for grid scheduling: single and multi-objective optimization approaches." Metaheuristics for Scheduling in Distributed Computing Environments. Springer Berlin Heidelberg, pp. 247-272, 2008.

[118] Jaeggi, D. M., et al. "The development of a multi-objective Tabu Search algorithm for continuous opti-misation problems." European Journal of Operational Research 185.3, pp - 1192-1212, 2008.

[119] Konak, Abdullah, David W. Coit, and Alice E. Smith. "Multi-objective optimization using genetic al-gorithms: A tutorial." Reliability Engineering & System Safety 91.9, pp 992-1007, 2006.

[120] Poli, Riccardo, James Kennedy, and Tim Blackwell. "Particle swarm optimization." Swarm intelli-gence 1.1, pp. 33-57, 2007.

[121] Qin, A. Kai, Vicky Ling Huang, and Ponnuthurai N. Suganthan. "Differential evolution algorithm with strategy adaptation for global numerical optimization." IEEE transactions on Evolutionary Computa-tion 13.2, pp. 398-417, 2009.

[122] D. G. Lowe, “Distinctive image features from scale-invariant keypoints” International Journal of Com-puter Vision, pp. 91–110, 2004.

[123] H. Bay, A. Ess, T. Tuytelaars, and L. Van Gool, “Speeded-up robust features (SURF),” Computer Vi-sion and Image Understanding, pp.346–359, 2008.

[124] Ke, Yan, and Rahul Sukthankar. "PCA-SIFT: A more distinctive representation for local image de-scriptors." Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. Vol. 2. IEEE, 2004.

[125] Lo, Tsz-Wai Rachel, and J. Paul Siebert. "Local feature extraction and matching on range images: 2.5 D SIFT." Computer Vision and Image Understanding 113.12, pp-1235-1250, 2009.

[126] Juan, Luo, and Oubong Gwun. "A comparison of sift, pca-sift and surf." International Journal of Image Processing (IJIP) 3.4, pp- 143-152, 2009.

[127] Datta, Ritendra, et al. "Image retrieval: Ideas, influences, and trends of the new age." ACM Computing Surveys (CSUR) 40.2, pp- 5-10, 2008.

[128] Sivic, Josef, and Andrew Zisserman. "Video Google: A text retrieval approach to object matching in videos." Computer Vision, 2003. Proceedings. Ninth IEEE International Conference on. IEEE, 2003.

[129] Alasti, Mehdi, et al. "Quality of service in WiMAX and LTE networks." IEEE Communications Maga-zine 48.5, pp-104-111, 2010.

152

Page 153: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

[130] Sesia, Stefania, Issam Toufik, and Matthew Baker. LTE-the UMTS long term evolution. John Wiley, 2015.

[131] Horváth, Géza. "End-to-end QoS management across LTE networks." IEEE 21st International Confer-ence on Software, Telecommunications and Computer Networks (SoftCOM), 2013.

[132] Li, Li, and Subin Shen. "End-to-End QoS performance management across LTE networks." IEEE 13th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2011.

[133] Liu, Tzu-Chin, et al. "QoS-aware resource management for multimedia traffic report systems over LTE-A." ELSEVIER Journal on Computer Networks, vol 94, pp. 375-389, 2016.

[134] Ameigeiras, Pablo, et al. "3GPP QoS-based scheduling framework for LTE." EURASIP Journal on Wireless Communications and Networking 2016.1, pp. 1-14, 2016.

[135] Nan, Xiaoming, Yifeng He, and Ling Guan. "Optimal allocation of virtual machines for cloud-based multimedia applications." 2012 IEEE 14th international workshop on Multimedia signal processing (MMSP), 2012.

[136] Nan, Xiaoming, Yifeng He, and Ling Guan. "Optimal resource allocation for multimedia application providers in multi-site cloud." 2013 IEEE International Symposium on Circuits and Systems (IS-CAS2013). IEEE, 2013.

[137] Nan, Xiaoming, Yifeng He, and Ling Guan. "Towards dynamic resource optimization for cloud-based free viewpoint video service." 2014 IEEE International Conference on Image Processing (ICIP). IEEE, 2014.

[138] Alhamazani, Khalid, et al. "Cross-Layer Multi-Cloud Real-Time Application QoS Monitoring and Benchmarking As-a-Service Framework.", IEEE Transactions on Cloud Computing, vol. , no. , pp. 1, 5555, 2015.

[139] Reiss, Charles, et al. "Heterogeneity and dynamicity of clouds at scale: Google trace analysis." Pro-ceedings of the Third ACM Symposium on Cloud Computing. ACM, 2012.

[140] Monfreid, C. "The LTE network architecture-a comprehensive tutorial." Alcatel-Lucent White Paper, 2009.

153

Page 154: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

APPENDICES

Appendix I: SYSTEM PARAMETERS OF LTE SIMULATION

Parameter Value

Transmission scheme Single Input Single Output (SISO)

Channel type Gaussian

SNR Range -20 to 10

Bandwidth 10 MHz

Simulated TBs 10 000

Channel knowledge Perfect

Apprendix II: MOBILE TRAFFIC STATISTICS

Application Traffic User Percent-age

2010

User Percentage

2015 [115]

FTP Best effort 10 % 3 %

Web Browsing Interactive 20 % 20 %

Video Streaming 20 % 45 %

VoIP Real-time 30 % 12 %

Gaming Interactive real-time

20 % 25 %

Appendix III (a) VIDEO STREAMING MODEL

Parameter Statistical Characterization

Inter-Arrival time

between the beginning

of each frame

Deterministic

100 ms (based on 10 frames per second)

Number of packets

(slices) in a frame

Deterministic, 8 packets per frame

Packet (slice) size Truncated Pareto Distribution

Mean=10 Bytes, Maximum =250 Bytes (Before Truncation)

154

Page 155: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

PDF: f x=

α kα

α+1, k≤x<m

, f x=( k

m )α

, x=m,

α=1 .2 , k=20 Bytes , m=??Inter-arrival time

between packets

(slices) in a frame

Truncated Pareto Distribution

Mean=m=6 ms, Maximum =12.5 ms (Before Truncation)

PDF: f x=

α kα

α+1, k≤x<m

, f x=( k

m )α

, x=m,

α=1 .2 , k=2. 5ms , m=??

(b) INTERACTIVE ONLINE GAMING MODEL

Parameter Statistical Characterization

Initial packet arrival Uniform Distribution

f x=1

b−a, a≤x≤b

, a=0 , b=40 ms

Packet arrival Deterministic, 40 ms

Packet size Largest Extreme Value Distribution (also known as Fisher-

Tippett distribution)

f x=1b

e−

x−ab e−e

− x−ab

,a=45 Bytes ,b=5 .7

Values for this distribution can be generated by the following

procedure:

x=a−b ln (− ln y ) , where y is drawn from a uniform distri-

bution in the range [ 0,1 ]

Because packet size has to be integer number of bytes, the

largest integer less than or equal to x is used as the actual

packet size

155

Page 156: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Appendix IV LIST OF MULTI-OBJECTIVE ALGORITHMS [116]

EMOCA evolutionary multi-objective crowding algorithm. FA firefly algorithm.FRMOO fuzzy random multi-objective optimization. GP goal programming.HBOA hierarchical Bayesian optimization algorithm. ICA imperialist competitive algorithm.MA memetic algorithm.MODA multi-objective deployment algorithm. MODE multi-objective differential evolution.MOEA multi-objective evolutionary algorithm.

MOEA/D multi-objective evolutionary algorithm based on decomposition.MOEA/DFD multi-objective evolutionary algorithm based on decompose tion with fuzzy

dominance.MOGA multi-objective genetic algorithm. MOGLS multi-objective genetic local search.MOICA multi-objective imperialist competitive algorithm. MOMGA multi-objective messy genetic algorithm. MOMGA-II multi-objective messy genetic algorithm-II.MOSS multi-objective scatter search.MOTS multi-objective tabu search. NPGA niched Pareto genetic algorithm.NSGA non-dominated sorting genetic algorithm. NSGA-II non-dominated sorting genetic algorithm-II. PAES Pareto archive evolution strategy.PESA Pareto envelope-based selection algorithm. PESA-II Pareto envelope-based selection algorithm-II. PSO particle swarm optimization.SDD subgradient dual decomposition.SIOA swarm intelligence based optimization algorithm. SPEA strength Pareto evolutionary algorithm.SPEA2 strength Pareto evolutionary algorithm-2.

156

Page 157: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

Appendix V A COMPREHENSIVE COMPARISON OF PERFORMANCE OF GENETIC ALGORITHMS [116]

Approach Complexity Conver-

gence

Scalability Optimality

linear weighted-sum method

moderate fast limited mathematically guaranteed op-

timalε-constraints method low fast limited mathematically guaranteed op-

timalGP moderate fast good mathematically guaranteed op-

timalMOGA moderate fast limited empirically very near-optimal

NSGA high slow limited empirically very near-optimal

NSGA-II moderate fast good empirically very near-optimal

NPGA low slow limited empirically very near-optimal

SPEA high fast good empirically very near-optimal

SPEA2 high fast good empirically very near-optimal

PAES moderate fast limited empirically very near-optimal

PESA moderate moderate moderate empirically very near-optimal

PESA-II low moderate good empirically very near-optimal

MOEA/D low fast good empirically very near-optimal

MOGLS moderate fast limited empirically very near-optimal

MOMGA high moderate moderate empirically very near-optimal

MOMGA-II low fast good empirically very near-optimal

MOTS moderate slow good near-optimal

MOSS moderate moderate limited near-optimal

MODE high moderate limited empirically very near-optimal

BOA high slow moderate near-optimal

HBOA low moderate limited near-optimal

PSO low slow limited empirically very near-optimal

ACO high moderate good empirically very near-optimal

ABC low fast good empirically very near-optimal

FL low fast limited empirically very near-optimal

157

Page 158: Multi-Objective Optimization in Cloud Multi-media …epubs.surrey.ac.uk/813374/1/Dr.Asad-Javied-PhD.docx · Web viewIn this way, end user will not have to worry about software licensing,

ANN low slow good empirically very near-optimal

AIS moderate moderate good near-optimal

MOICA moderate fast good near-optimal

Game Theory moderate low good empirically very near-optimal

MA moderate fast good near-optimal

CIVA low slow good near-optimal

RL low fast good empirically very near-optimal

158