Username   Password       Forgot your password?  Forgot your username? 


Modeling Approach Combining Performance and Reliability for Mobile Cloud System

Volume 14, Number 8, August 2018, pp. 1877-1886
DOI: 10.23940/ijpe.18.08.p26.18771886

Han Xua, Haiqing Wangb, Liang Luoa, Xiwei Qiua, Sa Menga, and Xun Guoa

aUniversity of Electronic Science and Technology of China, Chengdu, 610000, China
bThe 28th Research Institute of China Electronics Technology Group Corporation, Nanjing, 210007, China

(Submitted on May 16, 2018; Revised on June 20, 2018; Accepted on July 21, 2018)


In recent years, cloud computing has been wildly used to improve the quality of mobile services in wireless networks. The ability of cloud computing gives the new mobile cloud system (MCS) the power to provide high-performance services. However, these services may be interrupted by random resource failures, such as network failures and virtual machine (VM) failures, which extremely affect the service performance in real-life scenarios. In this paper, we present a theoretical modeling approach to evaluate the service performance of the MCS, which takes into consideration the impact of reliability on service performance. The queue theory and the Markov chain are first used to model the performance and the reliability. In reliability modeling, the network failure and VM failure are considered. Then, a Bayesian method is applied to connect the performance and the reliability, and a correlation metric is proposed. Finally, numerical examples are illustrated.


References: 14

              1. X. Wang, K. Wang, S. Wu, S. Di, and K. Yang, “Dynamic Resource Scheduling in Cloud Radio Access Network with Mobile Cloud Computing,” in Proceedings of IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), pp. 1-6, 2016
              2. L. Tong, Y. Li, and W. Gao, “A Hierarchical Edge Cloud Architecture for Mobile Computing”, in Processings of IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, pp. 1-9, 2016
              3. Y. Cai, F. R. Yu, and S. Bu, “Cloud Radio Access Networks (C-RAN) in Mobile Cloud Computing Systems,” in Processings of IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 369-374, 2014
              4. A. U. R. Khan, M. Othman, S. A. Madani, and S. U. Khan, “A Survey of Mobile Cloud Computing Application Models,” IEEE Communications Surveys Tutorials, Vol. 16, pp. 393-413, 2014
              5. C. M. R. Institute, “C-RAN White Paper: The Road Towards Green RAN,” (
              6. X. Rao and V. Lau, “Model-based Evaluation: From Dependability to Security,” IEEE Transactions on Signal Processing, Vol. 63, pp. 1056-1065, 2015
              7. T. Q. S. Quek, M. Peng, O. Simeone, and W. Yu, “Cloud Radio Access Networks: Principles, Technologies, and Applications,” Cambridge University Press, 2017
              8. J. Padhye, V. Firoiu, D. F. Towsley, and J. F. Kurose, “Modeling TCP Reno Performance: A Simple Model and its Empirical Validation,” IEEE/ACM Transactions on Networking (ToN), Vol. 8, pp. 133-145, 2000
              9. D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman and D. Woods, “Cloud-trust-a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds,” IEEE Transactions on Cloud Computing, 2015
              10. M. Assaad and D. Zeghlache, “Comparison Between MIMO Techniques in UMTS-HSDPA System,” IEEE Eighth International Symposium on Spread Spectrum Techniques and Applications, pp. 874-878, 2004
              11. A. Pathak, Y. A. Wang, C. Huang, A. Greenberg, and Y. C. Hu, “Measuring and Evaluating TCP Splitting for Cloud Services,” PAM, pp. 41-50, 2010
              12. M. Xie, Y. S. Dai, and K. L. Poh, “Computing System Reliability: Models and Analysis,” Springer Science & Business Media, 2004
              13. K. S. Trivedi, “Probability & Statistics with Reliability, Queuing and Computer Science Applications,” John Wiley & Sons, 2008
              14. Y. S. Dai, Y. Pan, X. Zou, “A Hierarchical Modeling and Analysis for Grid Service Reliability,” IEEE Transactions on Computers, Vol. 56, pp. 681-691, 2007


                          Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

                          This site uses encryption for transmitting your passwords.