Execution plans for cyber foraging

Cyber foraging helps small devices perform heavy tasks by opportunistically discovering and utilising available resources (such as computation, storage, bandwidth, etc.) held by larger, nearby peers. This offloading is done in an ad-hoc manner, as larger machines will not always be within reach. In order to facilitate cyber foraging, an application has to be split up into locally executable code (e.g., GUI-code) and remotely executable tasks. Most cyber foraging systems strive to keep these tasks as large as possible, so that the benefits of executing code on a faster machine outweighs the cost of remote execution. Working with large, atomic tasks has some limitations, e. g., with regards to mobility and efficient use of remote resources. In order to dynamically allocate available resources in a manner most suitable for a given job, a task can be broken down into sub-tasks and services, and arranged in an directed graph. Using this graph combined with information about available, nearby peers, a cyber foraging scheduler can distribute tasks across multiple peers, allowing the user to do more with less. This paper presents the Locusts cyber foraging framework, with special focus on the task description language and the associated scheduler.

[1]  Mads Darø Kristensen Scavenger - Mobile Remote Execution , 2008 .

[2]  Jason Flinn,et al.  Slingshot: deploying stateful services in wireless hotspots , 2005, MobiSys '05.

[3]  Mahadev Satyanarayanan,et al.  Tactics-based remote execution for mobile computing , 2003, MobiSys '03.

[4]  Mads Darø Kristensen Enabling Cyber Foraging for Mobile Devices , 2007 .

[5]  James D. Herbsleb,et al.  Simplifying cyber foraging for mobile devices , 2007, MobiSys '07.

[6]  Mahadev Satyanarayanan,et al.  Balancing performance, energy, and quality in pervasive computing , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[7]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[8]  M.D. Kristensen,et al.  Developing cyber foraging applications for portable devices , 2008, PORTABLE-POLYTRONIC 2008 - 2nd IEEE International Interdisciplinary Conference on Portable Information Devices and the 2008 7th IEEE Conference on Polymers and Adhesives in Microelectronics and Photonics.

[9]  David M. Chess,et al.  Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.

[10]  Carl Kesselman,et al.  Optimizing Grid-Based Workflow Execution , 2005, Journal of Grid Computing.