ABSTRACT
Given a sufficiently good network connection, even a handheld computer can run extremely resource-intensive applications by executing the demanding portions on a remote server. At first glance, the increasingly ubiquitous deployment of wireless hotspots seems to offer the connectivity needed for remote execution. However, we show that the backhaul connection from the hotspot to the Internet can be a prohibitive bottleneck for interactive applications. To eliminate this bottleneck, we propose a new architecture, called Slingshot, that replicates remote application state on surrogate computers co-located with wireless access points. The first-class replica of each application executes on a remote server owned by the handheld user; this offers a safe haven for application state in the event of surrogate failure. Slingshot deploys second-class replicas on nearby surrogates to improve application response time. A proxy on the handheld broadcasts each application request to all replicas and returns the first response it receives. We have modified a speech recognizer and a remote desktop to use Slingshot. Our results show that these applications execute 2.6 times faster with Slingshot than with remote execution.
- Balan, R., Flinn, J., Satyanarayanan, M., Sinnamohideen, S., and Yang, H.-I. The case for cyber foraging. In the 10th ACM SIGOPS European Workshop (Saint-Emilion, France, September 2002). Google ScholarDigital Library
- Balan, R. K., Satyanarayanan, M., Park, S., and Okoshi, T. Tactics-based remote execution for mobile computing. In Proceedings of the 1st Annual Conference on Mobile Computing Systems, Applications and Services (San Francisco, CA, May 2003), pp. 273--286. Google ScholarDigital Library
- Baratto, R. A., Potter, S., Su, G., and Nieh, J. MobiDesk: Mobile virtual desktop computing. In Proceedings of the 10th Annual Conference on Mobile Computing and Networking (Philadelphia, PA, Sept/Oct 2004), pp. 1--16. Google ScholarDigital Library
- Barham, P., Dragovic, B., Fraser, K., Hand, S., and Harris, T. Xen and the art of virtualization. In Proceedings of the 19th ACM Symp. on Operating Systems Principles (Bolton Landing, NY, October 2003), pp. 164--177. Google ScholarDigital Library
- Basney, J., and Livny, M. Improving goodput by co-scheduling CPU and network capacity. International Journal of High Performance Computing Applications 13, 3 (Fall 1999). Google ScholarDigital Library
- Bressoud, T. C., and Schneider, F. B. Hypervisor-based fault-tolerance. In Proceedings of the 15th ACM Symposium on Operating System Principles (SOSP) (Copper Mountain, CO, December 1995), pp. 1--11. Google ScholarDigital Library
- Brown, A. B., and Patterson, D. A. Rewind, repair, replay: Three R's to dependability. In the 10th ACM SIGOPS European Workshop (St. Emilion, France, September 2002). Google ScholarDigital Library
- Carson, M. Adaptation and Protocol Testing thorough Network Emulation. NIST, http://snad.ncsl.nist.gov/itg/nistnet/slides/index.him.Google Scholar
- Chen, P., and Noble, B. When Virtual is Better Than Real. In Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems (Schloss Elmau, Germany, May 2001). Google ScholarDigital Library
- Cox, L. P., Murray, C. D., and Noble, B. D. Pastiche: Making backup cheap and easy. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (December 2002), pp. 285--298. Google ScholarDigital Library
- Dunlap, G. W., King, S. T., Cinar, S., Basrai, M. A., and Chen, P. M. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (December 2002), pp. 211--224. Google ScholarDigital Library
- Flinn, J., Narayanan, D., and Satyanarayanan, M. Self-tuned remote execution for pervasive computing. In Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII) (Schloss Elmau, Germany, May 2001), pp. 61--66. Google ScholarDigital Library
- Flinn, J., Sinnamohideen, S., Tolia, N., and Satyanarayanan, M. Data staging for untrusted surrogates. In Proceedings of the 2nd USENIX Conference on File and Storage Technology (San Francisco, CA, March/April 2003), pp. 15--28. Google ScholarDigital Library
- Foster, I., Kesselman, C., Nick, J., and Tuecke, S. Grid services for distributed system integration. Computer 35, 6(2002). Google ScholarDigital Library
- Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., and Boneh, D. Terra: A virtual machine-based platform for trusted computing. In Procedings of the 19th ACM Symp. on Operating Systems Principles (Bolton Landing, NY, October 2003), pp. 193--206. Google ScholarDigital Library
- Goyal, S., and Carter, J. A lightweight secure cyber foraging infrastructure for resource-constrained devices. In Proceedings of the 6th IEEE Workshop on Mobile Computing Systems and Applications (Lake Windermere, England, December 2004). Google ScholarDigital Library
- Grimshaw, A. S., and Wulf, W. A. Legion: Flexible support for wide-area computing. In Proceedings of the 7th ACM SIGOPS European Workshop (1996). Google ScholarDigital Library
- Hunt, G. C., and Scott, M. L. The Coign automatic distributed partitioning system. In Proceedings of the 3rd Symposium on Operating System Design and Implemetation (OSDI) (New Orleans, LA, February 1999), pp. 187--200. Google ScholarDigital Library
- Kim, M., Cox, L. P., and Noble, B. D. Safety, visibility, and performance in a wide-area file system. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (January 2002). Google ScholarDigital Library
- Kozuch, M., and Satyanarayanan, M. Internet Suspend/Resume. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (Callicoon, NY, June 2002). Google ScholarDigital Library
- Li, J., Krohn, M., Mazires, D., and Shasha, D. Secure untrusted data repository (SUNDR). In Proc. of the 6th Symp. on Op. Syst. Des. and Imp. (San Francisco, CA, December 2004), pp. 121--136. Google ScholarDigital Library
- Microsoft Corporation. Universal Plug and Play Forum, June 1999. http://www.upnp.org.Google Scholar
- Osman, S., Subhraveti, D., Su, G., and Nieh, J. The design and implementation of Zap: A system for migrating computing environments. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (December 2002), pp. 361--376. Google ScholarDigital Library
- Rodrigues, R., Castro, M., and Liskov, B. BASE: Using abstraction to improve fault tolerance. In Proceedings of the 18th Symposium on Operating Systems Principles (SOSP) (Banff, Canada, October 2001), pp. 15--28. Google ScholarDigital Library
- Sapuntzakis, C. P., Chandra, R., Pfaff, B., Chow, J., Lam, M. S., and Rosenblum, M. Optimizing the migration of virtual computers. In Proceedings of the 5th Symposium on Operating System Design and Implementation (Boston, MA, December 2002), pp. 377--390. Google ScholarDigital Library
- Tolia, N., Harkes, J., Kozuch, M., and Satyanarayanan, M. Integrating portable and distributed storage. In Proceedings of the 3rd Annual USENIX Conference on File and Storage Technologies (San Francisco, CA, March/April 2004). Google ScholarDigital Library
- Tolia, N., Kozuch, M., Satyanarayanan, M., Karp, B., Bressoud, T., and Perrig, A. Opportunistic use of content addressable storage for distributed file systems. In Proceedings of the 2003 USENIX Annual Technical Conference (May 2003), pp. 127--140.Google Scholar
- Waldspurger, C. A. Memory resource management in VMware ESX server. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (Boston, MA, December 2002), pp. 181--194. Google ScholarDigital Library
- Whitaker, A., Shaw, M., and Gribble, S. D. Scale and performance in the Denali isolation kernel. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (Boston, MA, December 2002), pp. 195--209. Google ScholarDigital Library
Index Terms
- Slingshot: deploying stateful services in wireless hotspots
Recommendations
Resilient Baseband Processing in Virtualized RANs with Slingshot
ACM SIGCOMM '23: Proceedings of the ACM SIGCOMM 2023 ConferenceIn cellular networks, there is a growing adoption of virtualized radio access networks (vRANs), where operators are replacing the traditional specialized hardware for RAN processing with software running on commodity servers. Today's vRAN deployments ...
An in-depth analysis of the slingshot interconnect
SC '20: Proceedings of the International Conference for High Performance Computing, Networking, Storage and AnalysisThe interconnect is one of the most critical components in large scale computing systems, and its impact on the performance of applications is going to increase with the system size. In this paper, we will describe Slingshot, an interconnection network ...
Slingshot: A modular framework for designing data processing systems
BIG DATA '15: Proceedings of the 2015 IEEE International Conference on Big Data (Big Data)Traditional relational database engines have been losing ground to specialized data processing engines in virtually every market segment, from data warehousing, OLTP, and stream processing, to scientific applications. Although relational database ...
Comments