Ocelot: A wireless sensor network and computing engine with commodity palmtop computers

The embedded class processors found in commodity palmtop computers continue to become increasingly capable while retaining an energy-efficient footprint. Palmtop computers themselves, including smartphones and tablets, provide a small form factor system integrating wireless communication and non-volatile storage with these energy-efficient processors. In this paper, we present Ocelot, a grid-like computing environment that leverages palmtop computers in place of traditional workstation or server class machines to compute highly parallel light to medium-weight tasks in an energy efficient manner. Ocelot is motivated to be used in a wireless sensor network environment where palmtop computers with onboard or attached sensors form nodes to obtain and process sensor data. Using a centralized server/dashboard, data processing jobs and managed and distributed to these palmtop computers to compute the results in parallel. Our results demonstrate that these palmtop machines provide significant energy advantage-average of 67% in our case study-over energy-optimized desktop, high-performance workstation and server class machines.

[1]  Arun Venkataramani,et al.  Energy consumption in mobile phones: a measurement study and implications for network applications , 2009, IMC '09.

[2]  Ignacio Zabalza,et al.  Life cycle assessment in buildings: The ENSLIC simplified method and guidelines , 2011 .

[3]  Melissa M. Bilec,et al.  Life-Cycle Assessment Modeling of Construction Processes for Buildings , 2010 .

[4]  David P. Anderson,et al.  BOINC: a system for public-resource computing and storage , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.

[5]  Haifeng Xu,et al.  Enabling dynamic life cycle assessment of buildings with wireless sensor networks , 2011, Proceedings of the 2011 IEEE International Symposium on Sustainable Systems and Technology.

[6]  Dick H. J. Epema,et al.  The Design and Evaluation of a Self-Organizing Superpeer Network , 2010, IEEE Transactions on Computers.

[7]  Sahin Albayrak,et al.  An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.

[8]  David P. Anderson,et al.  SETI@home: an experiment in public-resource computing , 2002, CACM.

[9]  Biswanath Mukherjee,et al.  A survey on routing algorithms for wireless Ad-Hoc and mesh networks , 2012, Comput. Networks.

[10]  Dave Stainforth,et al.  Climateprediction.net: Design Principles for Publicresource Modeling Research , 2002, IASTED PDCS.

[11]  Azzedine Boukerche,et al.  Routing protocols in ad hoc networks: A survey , 2011, Comput. Networks.