skip to main content
10.1145/1067170.1067180acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
Article

Slingshot: deploying stateful services in wireless hotspots

Published:06 June 2005Publication History

ABSTRACT

Given a sufficiently good network connection, even a handheld computer can run extremely resource-intensive applications by executing the demanding portions on a remote server. At first glance, the increasingly ubiquitous deployment of wireless hotspots seems to offer the connectivity needed for remote execution. However, we show that the backhaul connection from the hotspot to the Internet can be a prohibitive bottleneck for interactive applications. To eliminate this bottleneck, we propose a new architecture, called Slingshot, that replicates remote application state on surrogate computers co-located with wireless access points. The first-class replica of each application executes on a remote server owned by the handheld user; this offers a safe haven for application state in the event of surrogate failure. Slingshot deploys second-class replicas on nearby surrogates to improve application response time. A proxy on the handheld broadcasts each application request to all replicas and returns the first response it receives. We have modified a speech recognizer and a remote desktop to use Slingshot. Our results show that these applications execute 2.6 times faster with Slingshot than with remote execution.

References

  1. Balan, R., Flinn, J., Satyanarayanan, M., Sinnamohideen, S., and Yang, H.-I. The case for cyber foraging. In the 10th ACM SIGOPS European Workshop (Saint-Emilion, France, September 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Balan, R. K., Satyanarayanan, M., Park, S., and Okoshi, T. Tactics-based remote execution for mobile computing. In Proceedings of the 1st Annual Conference on Mobile Computing Systems, Applications and Services (San Francisco, CA, May 2003), pp. 273--286. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Baratto, R. A., Potter, S., Su, G., and Nieh, J. MobiDesk: Mobile virtual desktop computing. In Proceedings of the 10th Annual Conference on Mobile Computing and Networking (Philadelphia, PA, Sept/Oct 2004), pp. 1--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Barham, P., Dragovic, B., Fraser, K., Hand, S., and Harris, T. Xen and the art of virtualization. In Proceedings of the 19th ACM Symp. on Operating Systems Principles (Bolton Landing, NY, October 2003), pp. 164--177. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Basney, J., and Livny, M. Improving goodput by co-scheduling CPU and network capacity. International Journal of High Performance Computing Applications 13, 3 (Fall 1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bressoud, T. C., and Schneider, F. B. Hypervisor-based fault-tolerance. In Proceedings of the 15th ACM Symposium on Operating System Principles (SOSP) (Copper Mountain, CO, December 1995), pp. 1--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Brown, A. B., and Patterson, D. A. Rewind, repair, replay: Three R's to dependability. In the 10th ACM SIGOPS European Workshop (St. Emilion, France, September 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Carson, M. Adaptation and Protocol Testing thorough Network Emulation. NIST, http://snad.ncsl.nist.gov/itg/nistnet/slides/index.him.Google ScholarGoogle Scholar
  9. Chen, P., and Noble, B. When Virtual is Better Than Real. In Proceedings of the 8th IEEE Workshop on Hot Topics in Operating Systems (Schloss Elmau, Germany, May 2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Cox, L. P., Murray, C. D., and Noble, B. D. Pastiche: Making backup cheap and easy. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (December 2002), pp. 285--298. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Dunlap, G. W., King, S. T., Cinar, S., Basrai, M. A., and Chen, P. M. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (December 2002), pp. 211--224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Flinn, J., Narayanan, D., and Satyanarayanan, M. Self-tuned remote execution for pervasive computing. In Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII) (Schloss Elmau, Germany, May 2001), pp. 61--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Flinn, J., Sinnamohideen, S., Tolia, N., and Satyanarayanan, M. Data staging for untrusted surrogates. In Proceedings of the 2nd USENIX Conference on File and Storage Technology (San Francisco, CA, March/April 2003), pp. 15--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Foster, I., Kesselman, C., Nick, J., and Tuecke, S. Grid services for distributed system integration. Computer 35, 6(2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., and Boneh, D. Terra: A virtual machine-based platform for trusted computing. In Procedings of the 19th ACM Symp. on Operating Systems Principles (Bolton Landing, NY, October 2003), pp. 193--206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Goyal, S., and Carter, J. A lightweight secure cyber foraging infrastructure for resource-constrained devices. In Proceedings of the 6th IEEE Workshop on Mobile Computing Systems and Applications (Lake Windermere, England, December 2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Grimshaw, A. S., and Wulf, W. A. Legion: Flexible support for wide-area computing. In Proceedings of the 7th ACM SIGOPS European Workshop (1996). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Hunt, G. C., and Scott, M. L. The Coign automatic distributed partitioning system. In Proceedings of the 3rd Symposium on Operating System Design and Implemetation (OSDI) (New Orleans, LA, February 1999), pp. 187--200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Kim, M., Cox, L. P., and Noble, B. D. Safety, visibility, and performance in a wide-area file system. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (January 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Kozuch, M., and Satyanarayanan, M. Internet Suspend/Resume. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (Callicoon, NY, June 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Li, J., Krohn, M., Mazires, D., and Shasha, D. Secure untrusted data repository (SUNDR). In Proc. of the 6th Symp. on Op. Syst. Des. and Imp. (San Francisco, CA, December 2004), pp. 121--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Microsoft Corporation. Universal Plug and Play Forum, June 1999. http://www.upnp.org.Google ScholarGoogle Scholar
  23. Osman, S., Subhraveti, D., Su, G., and Nieh, J. The design and implementation of Zap: A system for migrating computing environments. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (December 2002), pp. 361--376. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Rodrigues, R., Castro, M., and Liskov, B. BASE: Using abstraction to improve fault tolerance. In Proceedings of the 18th Symposium on Operating Systems Principles (SOSP) (Banff, Canada, October 2001), pp. 15--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Sapuntzakis, C. P., Chandra, R., Pfaff, B., Chow, J., Lam, M. S., and Rosenblum, M. Optimizing the migration of virtual computers. In Proceedings of the 5th Symposium on Operating System Design and Implementation (Boston, MA, December 2002), pp. 377--390. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Tolia, N., Harkes, J., Kozuch, M., and Satyanarayanan, M. Integrating portable and distributed storage. In Proceedings of the 3rd Annual USENIX Conference on File and Storage Technologies (San Francisco, CA, March/April 2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Tolia, N., Kozuch, M., Satyanarayanan, M., Karp, B., Bressoud, T., and Perrig, A. Opportunistic use of content addressable storage for distributed file systems. In Proceedings of the 2003 USENIX Annual Technical Conference (May 2003), pp. 127--140.Google ScholarGoogle Scholar
  28. Waldspurger, C. A. Memory resource management in VMware ESX server. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (Boston, MA, December 2002), pp. 181--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Whitaker, A., Shaw, M., and Gribble, S. D. Scale and performance in the Denali isolation kernel. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (Boston, MA, December 2002), pp. 195--209. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Slingshot: deploying stateful services in wireless hotspots

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  MobiSys '05: Proceedings of the 3rd international conference on Mobile systems, applications, and services
                  June 2005
                  278 pages
                  ISBN:1931971315
                  DOI:10.1145/1067170

                  Copyright © 2005 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 6 June 2005

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  Overall Acceptance Rate274of1,679submissions,16%

                  Upcoming Conference

                  MOBISYS '24

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader