Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2248371.2248394acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Serendipity: enabling remote computing among intermittently connected mobile devices

Published: 11 June 2012 Publication History

Abstract

Mobile devices are increasingly being relied on for services that go beyond simple connectivity and require more complex processing. Fortunately, a mobile device encounters, possibly intermittently, many entities capable of lending it computational resources. At one extreme is the traditional cloud-computing context where a mobile device is connected to remote cloud resources maintained by a service provider with which it has an established relationship. In this paper we consider the other extreme, where a mobile device's contacts are only with other mobile devices, where both the computation initiator and the remote computational resources are mobile, and where intermittent connectivity among these entities is the norm. We present the design and implementation of a system, Serendipity, that enables a mobile computation initiator to use remote computational resources available in other mobile systems in its environment to speedup computing and conserve energy. We propose a simple but powerful job structure that is suitable for such a system. Serendipity relies on the collaboration among mobile devices for task allocation and task progress monitoring functions. We develop algorithms that are designed to disseminate tasks among mobile devices by accounting for the specific properties of the available connectivity. We also undertake an extensive evaluation of our system, including experience with a prototype, that demonstrates Serendipity's performance.

References

[1]
Android open source project. http://source.android.com.
[2]
D. P. Anderson. BOINC: A system for public-resource computing and storage. In IEEE/ACM GRID, 2004.
[3]
D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D. Werthimer. SETI@home: an experiment in public-resource computing. Commun. ACM, 45:56--61, November 2002.
[4]
R. Balan, J. Flinn, M. Satyanarayanan, S. Sinnamohideen, and H.-I. Yang. The case for cyber foraging. In Proceedings of the 10th workshop on ACM SIGOPS European workshop, 2002.
[5]
R. K. Balan, D. Gergle, M. Satyanarayanan, and J. Herbsleb. Simplifying cyber foraging for mobile devices. In ACM MobiSys, 2007.
[6]
A. L. Beberg, D. L. Ensign, G. Jayachandran, S. Khaliq, and V. S. Pande. Folding@ home: Lessons from eight years of volunteer distributed computing. In IEEE IPDPS, 2009.
[7]
J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine. Maxprop: Routing for vehicle-based disruption-tolerant networks. In IEEE INFOCOM, 2006.
[8]
L. Buttyán and J.-P. Hubaux. Enforcing service availability in mobile ad-hoc wans. In ACM MobiHoc, 2000.
[9]
J.-H. Chang and L. Tassiulas. Energy conserving routing i wireless ad-hoc networks. In IEEE INFOCOM, 2000.
[10]
C. Chekuri, A. Goel, S. Khanna, and A. Kumar. Multi-processor scheduling to minimize flow time with ε resource augmentation. In ACM STOC, 2004.
[11]
B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. Clonecloud: elastic execution between mobile device and cloud. In ACM EuroSys, 2011.
[12]
E. Cuervo, A. Balasubramanian, D.-k. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl. Maui: making smartphones last longer with code offload. In ACM MobiSys, 2010.
[13]
J. Dean and S. Ghemawat. Mapreduce: simplified data processing on large clusters. Commun. ACM, 51:107--113, January 2008.
[14]
P. J. Denning. Hastily formed networks. Commun. ACM, 2006.
[15]
K. Fall, G. Iannaccone, J. Kannan, F. Silveira, and N. Taft. A disruption-tolerant architecture for secure and efficient disaster response communications. In ISCRAM, May 2010.
[16]
K. M. Hanna, B. N. Levine, and R. Manmatha. Mobile Distributed Information Retrieval For Highly Partitioned Networks. In IEEE ICNP, pages 38--47, Nov 2003.
[17]
E. HjelmÃÇes and B. K. Lowb. Face detection: A survey. Elsevier Computer Vision and Image Understanding, September 2001.
[18]
E. S. Hou, N. Ansari, and H. Ren. A genetic algorithm for multiprocessor scheduling. In IEEE IPDPS, 1994.
[19]
P. Hui, J. Scott, J. Crowcroft, and C. Diot. Haggle: a networking architecture designed around mobile users. In WONS, 2006.
[20]
S. Jain, K. Fall, and R. Patra. Routing in a delay tolerant network. In ACM SIGCOMM, 2004.
[21]
W. jen Hsu, a. K. P. Thrasyvoulos Spyropoulos, and A. Helmy. Modeling time-variant user mobility in wireless mobile networks. In IEEE INFOCOM, 2007.
[22]
J. G. Koomey, S. Berard, M. Sanchez, and H. Won. Assessing Trends in the Electrical Efficiency of Computation over Time. Technical report, http://www.intel.com/assets/pdf/general/computertrendsreleasecomplete-v31.pdf, 2009.
[23]
K.-F. Lee, H.-W. Hon, and R. Reddy. An overview of the SPHINX speech recognition system. IEEE Transaction on Acoustics, Speech and Signal Processing, 1990.
[24]
R. Lu, X. Lin, H. Zhu, X. Shen, and B. Preiss. Pi: A practical incentive protocol for delay tolerant networks. IEEE Transactions on Wireless Communications, April 2010.
[25]
E. Marinelli. Hyrax: Cloud computing on mobile devices using mapreduce. Master's thesis, Computer Science Dept., Carnegie Mellon University, September 2009.
[26]
P. Marshall. DARPA progress towards affordable, dense, and content focused tactical edge networks. In IEEE MILCOM, 2008.
[27]
A. S. Pentland, R. Fletcher, and A. Hasson. DakNet: Rethinking connectivity in developing nations. Computer, January 2004.
[28]
I. Rhee, M. Shin, S. Hong, K. Lee, and S. Chong. On the levy-walk nature of human mobility. In IEEE INFOCOM, 2008.
[29]
A. K. Saha and D. B. Johnson. Modeling mobility for vehicular ad-hoc networks. In ACM VANET, 2004.
[30]
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies. The case for VM-based cloudlets in mobile computing. IEEE Pervasive Computing, 2009.
[31]
D. Thain, T. Tannenbaum, and M. Livny. Distributed computing in practice: the condor experience. Concurr. Comput.: Pract. Exper., February 2005.
[32]
P. U. Tournoux, J. Leguay, F. Benbadis, V. Conan, M. D. de Amorim, and J. Whitbeck. The accordion phenomenon: Analysis, characterization, and impact on dtn routing. In Proc. IEEE INFOCOM, 2009.
[33]
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar. An integrated experimental environment for distributed systems and networks. In USENIX OSDI, 2002.
[34]
L. Zhang, B. Tiwana, Z. Qian, Z. Wang, R. P. Dick, Z. M. Mao, and L. Yang. Accurate online power estimation and automatic battery behavior based power model generation for smartphones. In IEEE/ACM/IFIP CODES/ISSS, 2010.
[35]
J. Zhou, E. Gilman, M. Ylianttila, and J. Riekki. Pervasive service computing: Visions and challenges. In IEEE CIT, 2010

Cited By

View all
  • (2024)Improved Algorithms for Co-Scheduling of Edge Analytics and Routes for UAV Fleet MissionsIEEE/ACM Transactions on Networking10.1109/TNET.2023.327781032:1(17-33)Online publication date: Feb-2024
  • (2024)The Application of Evolutionary, Swarm, and Iterative-Based Task-Offloading Optimization for Battery Life Extension in Wireless Sensor NetworksIEEE Sensors Journal10.1109/JSEN.2024.341955824:16(26682-26698)Online publication date: 15-Aug-2024
  • (2024)Feasibility and reliability of peercloud in vehicular networks: A comprehensive studyPervasive and Mobile Computing10.1016/j.pmcj.2024.101920100(101920)Online publication date: May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiHoc '12: Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
June 2012
280 pages
ISBN:9781450312813
DOI:10.1145/2248371
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 June 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. energy management
  2. mobile devices
  3. opportunistic networks
  4. remote computing
  5. task allocation

Qualifiers

  • Research-article

Conference

MobiHoc '12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 296 of 1,843 submissions, 16%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)49
  • Downloads (Last 6 weeks)3
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Improved Algorithms for Co-Scheduling of Edge Analytics and Routes for UAV Fleet MissionsIEEE/ACM Transactions on Networking10.1109/TNET.2023.327781032:1(17-33)Online publication date: Feb-2024
  • (2024)The Application of Evolutionary, Swarm, and Iterative-Based Task-Offloading Optimization for Battery Life Extension in Wireless Sensor NetworksIEEE Sensors Journal10.1109/JSEN.2024.341955824:16(26682-26698)Online publication date: 15-Aug-2024
  • (2024)Feasibility and reliability of peercloud in vehicular networks: A comprehensive studyPervasive and Mobile Computing10.1016/j.pmcj.2024.101920100(101920)Online publication date: May-2024
  • (2024)Research allocation in mobile volunteer computing system: Taxonomy, challenges and future workFuture Generation Computer Systems10.1016/j.future.2024.01.015154(251-265)Online publication date: May-2024
  • (2023)UNION: Fault-tolerant Cooperative Computing in Opportunistic Mobile Edge CloudACM Transactions on Internet Technology10.1145/361799423:4(1-27)Online publication date: 17-Nov-2023
  • (2023)Providing Realtime Support for Containerized Edge ServicesACM Transactions on Internet Technology10.1145/361712323:4(1-25)Online publication date: 17-Nov-2023
  • (2023)Offering Two-way Privacy for Evolved Purchase InquiriesACM Transactions on Internet Technology10.1145/359996823:4(1-32)Online publication date: 17-Nov-2023
  • (2023)Tolerance Analysis of Cyber-Manufacturing Systems to Cascading FailuresACM Transactions on Internet Technology10.1145/357984723:4(1-23)Online publication date: 17-Nov-2023
  • (2023)Real-Time In-Network Image Compression via Distributed Dictionary LearningIEEE Transactions on Mobile Computing10.1109/TMC.2021.307206622:1(472-486)Online publication date: 1-Jan-2023
  • (2023)Energy-Efficient Task Scheduling Based on Traffic Mapping in Heterogeneous Mobile-Edge Computing: A Green IoT PerspectiveIEEE Transactions on Green Communications and Networking10.1109/TGCN.2022.31863147:2(972-982)Online publication date: Jun-2023
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media