Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2248371.2248394acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Serendipity: enabling remote computing among intermittently connected mobile devices

Published: 11 June 2012 Publication History
  • Get Citation Alerts
  • Abstract

    Mobile devices are increasingly being relied on for services that go beyond simple connectivity and require more complex processing. Fortunately, a mobile device encounters, possibly intermittently, many entities capable of lending it computational resources. At one extreme is the traditional cloud-computing context where a mobile device is connected to remote cloud resources maintained by a service provider with which it has an established relationship. In this paper we consider the other extreme, where a mobile device's contacts are only with other mobile devices, where both the computation initiator and the remote computational resources are mobile, and where intermittent connectivity among these entities is the norm. We present the design and implementation of a system, Serendipity, that enables a mobile computation initiator to use remote computational resources available in other mobile systems in its environment to speedup computing and conserve energy. We propose a simple but powerful job structure that is suitable for such a system. Serendipity relies on the collaboration among mobile devices for task allocation and task progress monitoring functions. We develop algorithms that are designed to disseminate tasks among mobile devices by accounting for the specific properties of the available connectivity. We also undertake an extensive evaluation of our system, including experience with a prototype, that demonstrates Serendipity's performance.

    References

    [1]
    Android open source project. http://source.android.com.
    [2]
    D. P. Anderson. BOINC: A system for public-resource computing and storage. In IEEE/ACM GRID, 2004.
    [3]
    D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D. Werthimer. SETI@home: an experiment in public-resource computing. Commun. ACM, 45:56--61, November 2002.
    [4]
    R. Balan, J. Flinn, M. Satyanarayanan, S. Sinnamohideen, and H.-I. Yang. The case for cyber foraging. In Proceedings of the 10th workshop on ACM SIGOPS European workshop, 2002.
    [5]
    R. K. Balan, D. Gergle, M. Satyanarayanan, and J. Herbsleb. Simplifying cyber foraging for mobile devices. In ACM MobiSys, 2007.
    [6]
    A. L. Beberg, D. L. Ensign, G. Jayachandran, S. Khaliq, and V. S. Pande. Folding@ home: Lessons from eight years of volunteer distributed computing. In IEEE IPDPS, 2009.
    [7]
    J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine. Maxprop: Routing for vehicle-based disruption-tolerant networks. In IEEE INFOCOM, 2006.
    [8]
    L. Buttyán and J.-P. Hubaux. Enforcing service availability in mobile ad-hoc wans. In ACM MobiHoc, 2000.
    [9]
    J.-H. Chang and L. Tassiulas. Energy conserving routing i wireless ad-hoc networks. In IEEE INFOCOM, 2000.
    [10]
    C. Chekuri, A. Goel, S. Khanna, and A. Kumar. Multi-processor scheduling to minimize flow time with ε resource augmentation. In ACM STOC, 2004.
    [11]
    B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. Clonecloud: elastic execution between mobile device and cloud. In ACM EuroSys, 2011.
    [12]
    E. Cuervo, A. Balasubramanian, D.-k. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl. Maui: making smartphones last longer with code offload. In ACM MobiSys, 2010.
    [13]
    J. Dean and S. Ghemawat. Mapreduce: simplified data processing on large clusters. Commun. ACM, 51:107--113, January 2008.
    [14]
    P. J. Denning. Hastily formed networks. Commun. ACM, 2006.
    [15]
    K. Fall, G. Iannaccone, J. Kannan, F. Silveira, and N. Taft. A disruption-tolerant architecture for secure and efficient disaster response communications. In ISCRAM, May 2010.
    [16]
    K. M. Hanna, B. N. Levine, and R. Manmatha. Mobile Distributed Information Retrieval For Highly Partitioned Networks. In IEEE ICNP, pages 38--47, Nov 2003.
    [17]
    E. HjelmÃÇes and B. K. Lowb. Face detection: A survey. Elsevier Computer Vision and Image Understanding, September 2001.
    [18]
    E. S. Hou, N. Ansari, and H. Ren. A genetic algorithm for multiprocessor scheduling. In IEEE IPDPS, 1994.
    [19]
    P. Hui, J. Scott, J. Crowcroft, and C. Diot. Haggle: a networking architecture designed around mobile users. In WONS, 2006.
    [20]
    S. Jain, K. Fall, and R. Patra. Routing in a delay tolerant network. In ACM SIGCOMM, 2004.
    [21]
    W. jen Hsu, a. K. P. Thrasyvoulos Spyropoulos, and A. Helmy. Modeling time-variant user mobility in wireless mobile networks. In IEEE INFOCOM, 2007.
    [22]
    J. G. Koomey, S. Berard, M. Sanchez, and H. Won. Assessing Trends in the Electrical Efficiency of Computation over Time. Technical report, http://www.intel.com/assets/pdf/general/computertrendsreleasecomplete-v31.pdf, 2009.
    [23]
    K.-F. Lee, H.-W. Hon, and R. Reddy. An overview of the SPHINX speech recognition system. IEEE Transaction on Acoustics, Speech and Signal Processing, 1990.
    [24]
    R. Lu, X. Lin, H. Zhu, X. Shen, and B. Preiss. Pi: A practical incentive protocol for delay tolerant networks. IEEE Transactions on Wireless Communications, April 2010.
    [25]
    E. Marinelli. Hyrax: Cloud computing on mobile devices using mapreduce. Master's thesis, Computer Science Dept., Carnegie Mellon University, September 2009.
    [26]
    P. Marshall. DARPA progress towards affordable, dense, and content focused tactical edge networks. In IEEE MILCOM, 2008.
    [27]
    A. S. Pentland, R. Fletcher, and A. Hasson. DakNet: Rethinking connectivity in developing nations. Computer, January 2004.
    [28]
    I. Rhee, M. Shin, S. Hong, K. Lee, and S. Chong. On the levy-walk nature of human mobility. In IEEE INFOCOM, 2008.
    [29]
    A. K. Saha and D. B. Johnson. Modeling mobility for vehicular ad-hoc networks. In ACM VANET, 2004.
    [30]
    M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies. The case for VM-based cloudlets in mobile computing. IEEE Pervasive Computing, 2009.
    [31]
    D. Thain, T. Tannenbaum, and M. Livny. Distributed computing in practice: the condor experience. Concurr. Comput.: Pract. Exper., February 2005.
    [32]
    P. U. Tournoux, J. Leguay, F. Benbadis, V. Conan, M. D. de Amorim, and J. Whitbeck. The accordion phenomenon: Analysis, characterization, and impact on dtn routing. In Proc. IEEE INFOCOM, 2009.
    [33]
    B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar. An integrated experimental environment for distributed systems and networks. In USENIX OSDI, 2002.
    [34]
    L. Zhang, B. Tiwana, Z. Qian, Z. Wang, R. P. Dick, Z. M. Mao, and L. Yang. Accurate online power estimation and automatic battery behavior based power model generation for smartphones. In IEEE/ACM/IFIP CODES/ISSS, 2010.
    [35]
    J. Zhou, E. Gilman, M. Ylianttila, and J. Riekki. Pervasive service computing: Visions and challenges. In IEEE CIT, 2010

    Cited By

    View all
    • (2024)Improved Algorithms for Co-Scheduling of Edge Analytics and Routes for UAV Fleet MissionsIEEE/ACM Transactions on Networking10.1109/TNET.2023.327781032:1(17-33)Online publication date: Feb-2024
    • (2024)Feasibility and reliability of peercloud in vehicular networks: A comprehensive studyPervasive and Mobile Computing10.1016/j.pmcj.2024.101920100(101920)Online publication date: May-2024
    • (2024)Research allocation in mobile volunteer computing system: Taxonomy, challenges and future workFuture Generation Computer Systems10.1016/j.future.2024.01.015154(251-265)Online publication date: May-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiHoc '12: Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
    June 2012
    280 pages
    ISBN:9781450312813
    DOI:10.1145/2248371
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 June 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. energy management
    2. mobile devices
    3. opportunistic networks
    4. remote computing
    5. task allocation

    Qualifiers

    • Research-article

    Conference

    MobiHoc '12
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 296 of 1,843 submissions, 16%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)48
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Improved Algorithms for Co-Scheduling of Edge Analytics and Routes for UAV Fleet MissionsIEEE/ACM Transactions on Networking10.1109/TNET.2023.327781032:1(17-33)Online publication date: Feb-2024
    • (2024)Feasibility and reliability of peercloud in vehicular networks: A comprehensive studyPervasive and Mobile Computing10.1016/j.pmcj.2024.101920100(101920)Online publication date: May-2024
    • (2024)Research allocation in mobile volunteer computing system: Taxonomy, challenges and future workFuture Generation Computer Systems10.1016/j.future.2024.01.015154(251-265)Online publication date: May-2024
    • (2023)UNION: Fault-tolerant Cooperative Computing in Opportunistic Mobile Edge CloudACM Transactions on Internet Technology10.1145/361799423:4(1-27)Online publication date: 17-Nov-2023
    • (2023)Providing Realtime Support for Containerized Edge ServicesACM Transactions on Internet Technology10.1145/361712323:4(1-25)Online publication date: 17-Nov-2023
    • (2023)Offering Two-way Privacy for Evolved Purchase InquiriesACM Transactions on Internet Technology10.1145/359996823:4(1-32)Online publication date: 17-Nov-2023
    • (2023)Tolerance Analysis of Cyber-Manufacturing Systems to Cascading FailuresACM Transactions on Internet Technology10.1145/357984723:4(1-23)Online publication date: 17-Nov-2023
    • (2023)Real-Time In-Network Image Compression via Distributed Dictionary LearningIEEE Transactions on Mobile Computing10.1109/TMC.2021.307206622:1(472-486)Online publication date: 1-Jan-2023
    • (2023)Energy-Efficient Task Scheduling Based on Traffic Mapping in Heterogeneous Mobile-Edge Computing: A Green IoT PerspectiveIEEE Transactions on Green Communications and Networking10.1109/TGCN.2022.31863147:2(972-982)Online publication date: Jun-2023
    • (2023)Measuring the Edge: A Performance Evaluation of Edge Offloading2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)10.1109/PerComWorkshops56833.2023.10150261(212-218)Online publication date: 13-Mar-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media