Virtual Machine Selection Algorithm Based on User Requirements in Mobile Cloud Computing Environment
The article analyzes the advantages of mobile cloud technologies and problems emerging during the use of those. The network infrastructure created based on cloudlets at the second level of mobile cloud computing with hierarchical structure is analyzed. At the same time, the article explores the issues of satisfaction of demand of mobile equipment for computing and memory resources by using these technologies. The article presents one solution for the allocation of mobile user requests in virtual machines created in cloudlets located near base stations of wireless metropolitan area networks (WMAN) in a balanced way by considering the technical capacity of those. Alongside, the article considers the solution of user problem during designated time and the issue of determining virtual machines satisfying other requirements. For this purpose, different characteristics of the stated problem, virtual machines, as well as communication channels between a user and virtual machines are considered. By using possible values determining the importance of cloudlets, conditions for loading software applications of a user to a virtual machine are explored and an appropriate method is proposed.
T. D. Hoang, L. Chonho, N. Dusit, W. Ping, “A survey of mobile cloud computing: Architecture, applications, and approaches,” Wireless Communications and Mobile Computing, vol. 13, ? 18, 2013, pp. 1587–1611.
Q. Han, G. Abdullah, “Research on Mobile Cloud Computing: Review, Trend and Perspectives,” https://arxiv.org/ftp/arxiv/papers/1206/120.1118.pdf.
L. Tawalbeh, N. Alassaf, W. Bakheder, A. Tawalbeh, “Resilience Mobile Cloud Computing: Features, Applications and Challenges,” E-Learning: Fifth International Conference, Manama, 18-20 October 2015, pp. 280-284.
N. Fernando, S. W. Loke, W. Rahayu, “Mobile cloud computing: A survey,” Future Generation Computer Systems, vol. 29, ? 1, 2013, pp. 84-106.
R. G. Alakbarov, F. H. Pashayev, O. R. Alakbarov, ‘Optimal Deployment Model of Cloudlets in Mobile Cloud Computing,” Cloud Computing and Big Data Analysis: 2nd IEEE International Conference, Chengdu, 28-30 April, 2017, pp. 213-214.
T. Diaby, B.B Rad, “Cloud Computing: A review of the Concepts and Deployment Models,” International Journal of Information Technology and Computer Science, vol. 9, ? 6, 2017, pp. 50-58 DOI: 10.5815/ijitcs.2017.06.07.
S. A. Elmubarak, A. Yousif, M. B. Bashir, “Performance based Ranking Model for Cloud SaaS Services, International Journal of Information Technology and Computer Science, vol. 9, ? 1, 2017, pp. 65-71. DOI: 10.5815/ijitcs.2017.01.08.
Liu, R. Moulic, D. Shea, “Cloud Service Portal for Mobile Device Management,” E-Business Engineering: 7th International Conference, Shanghai, 20-22 November, 2010, pp. 474-483.
D. Kopec, M. H. Kabir, D. Reinharth, O. Rothschild, J. A. Castiglione, “Human Errors in Medical Practice: Systematic Classification and Reduction with Automated Information Systems,” Journal of Medical Systems, vol. 27, ? 4. 2013,pp. 297-313.
H. Gao, Y. Zhai, “System Design of Cloud Computing Based on Mobile Learning,” Knowledge Acquisition and Modeling: 3rd International Symposium, Wuhan, 20-21 October, 2010, pp. 293-242.
S. Debabrata, B. Rajesh, “A Mobile Cloud Computing Architecture with Easy Resource Sharing,” International Journal of Current Engineering and Technology, vol. 4, ? 3, 2014, pp. 1249-1254.
Y. Shim, “Effects of cloudlets on interactive applications in mobile cloud computing environments,” International Journal of Advanced Computer Technology, vol. 4, ? 1, 2014, pp. 54-62.
R. Alakbarov, F. Pashayev, M. Hashimov, “Development of the Method of Dynamic Distribution of Users’ Data in Storage Devices in Cloud Technology” Advances in Information Sciences and Service Sciences, vol. 8, ? 1, 2016, pp.16-21.
O. P Akomolafe, M. O. Abodunrin, “A Hybrid Cryptographic Model for Data Storage in Mobile Cloud Computing,” I. J. Computer Network and Information Security, ? 6, 2017, pp. 53-60.
R. G. Alakbarov, F. H. Pashayev, O. R. Alakbarov, ‘Forecasting Cloudlet Development on Mobile Computing Clouds,” I.J. Information Technology and Computer Science, ? 11, 2017, pp. 23-34.
M. Satyanarayanan, P. Bahl, R. Caceres, N. Davies, “The case for vm-based cloudlets in mobile computing,” Pervasive Computing, IEEE, vol. 8, ? 4, 2009, pp. 14-23.
M. Goyal, M. Singh, ‘Mobile Cloud Computing,” International Journal of Enhanced Research in Science Technology & Engineering, vol. 3, ? 4, 2014, pp. 517-521.
T. Verbelen, P. Simoens, F. D. Turck, B. Dhoedt, “Cloudlets: bringing the cloud to the mobile user,” Mobile cloud computing and services: third ACM workshop, Ambleside, 25-29 June 2012, pp. 29-36.
K. Ha, P. Pillai, W. Richter, Y. Abe, M. Satyanarayanan, “Just-in-time provisioning for cyber foraging,” Mobile systems, applications, and services: 11th annual international conference, Taipei, 25-28 June 2013, pp. 153-166.
P. Gupta, S. Gupta, “Mobile Cloud Computing: The Future of Cloud,” International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. 1, ? 3, 2012, pp. 134-144.
M. Jia, W. Liang, Z. Xu, M. Huang, “Cloudlet load balancing in wireless metropolitan area networks,” Computer Communications: The 35th Annual IEEE International Conference, San Francisco, 10-14 April 2016, pp. 730-738. DOI: 10.1109/INFOCOM.2016.7524411
L. Kumar, N. Malik, G. Agghi, A. Anand, “Mobile Cloud Computing,” International Journal of Research in Information Technology, vol. 2, ? 9, 2014, pp. 787-792.
A. Donald, S. Oli, L. Arockiam, “Mobile cloud security issues and challenges: A perspective,” International Journal of Engineering and Innovative Technology, vol. 3, ? 1, 2013, pp. 401-409.
M. Jia, J. Cao, W. Liang, “Optimal Cloudlet Placement and User to Cloudlet Allocation in Wireless Metropolitan Area Networks,” IEEE Transactions on Cloud Computing, vol. 5, ? 4, 2017, pp. 725-737.
C. S. Young, “Effects of cloudlets on interactive applications in mobile cloud computing environments,” International Journal of Advanced Computer Technology, vol. 4, ? 1, 2015, pp. 54-62.
Z. Xu, W. Liang, W. Xu, M. Jia, S. Guo, “Efficient Algorithms for Capacitated Cloudlet. Placements,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, ?10, 2016, pp. 2866-2880.
F. Liu, P. Shu, H. Jin, L. Ding, J. Yu, D. Niu, B. Li, “Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications,” IEEE Wireless Communications. vol. 20, ? 3, 2013, pp. 14-22.
A. A Mikryukov, R. I. Hantimirov R, “A problem of the initial detection of resources in cloud computing environments based on the method of the analysis of hierarchy,” Applied Informatics, ? 8, 2015, pp. 184-185.
M. Chathura, S. Magurawalage, K. Yang, L. Hu, J. Zhang, “Energy-efficient and network-aware offloading algorithm for mobile cloud computing,” Computer Networks, vol. 74, Parth B, 2014, pp. 22-33.
Y. Li, W. Wang, ‘The Unheralded Power of Cloudlet Computing in the Vicinity of Mobile Devices,” Wireless Networking Symposium: GLOBECOM conference, Atlanta, 9-13 December 2013, pp. 4959-4964.
R. Bleichut, “Theory and practice of error detecting codes,” Mir, 1986. - 576 pp.
V. Borodulin, “Compatarive features of computational algoritms CRC16 with a sequential and tabular method using the example of microcontroller AVR,” Modern Electronics, ? 2, 2008, pp. 74-76.
C. Partridge, J. Hughes, J. Stone, “Performance of Checksums and CRCs over Real Data,” Applications, Technologies, Architectures, and Protocols for Computer Communication: SIGCOMM ’95 Conference, Massachusetts, 28 August- 1 September 1995, pp. 68–76.
S. T. Andew, J. W. David, “Computer Networks (5-th Edition),” Prentice Hall, 2010, 960 p.
I. Gertsbakh, “Reliability Theory with Applications to Preventive Maintenance,” Springer, 2000, 222 p.
Copyright (c) 2018 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
This work is licensed under a Creative Commons Attribution 4.0 International License.
The author warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author(s).