Transparent Computing: A Promising Network Computing Paradigm

With the emergence of cloud computing, big data, and mobile networks, the computing paradigm and related technologies have experienced significant development over the past 10 years. Concomitantly, the prevalence of smartphones, wearable devices, and mobile applications has been constantly changing our daily lives. Terminals are evolving toward lightweight, intelligent, highly secure, and convenient devices. As an emerging computing paradigm, cloud computing focuses primarily on providing services through servers and networks but without addressing the inherent challenges and concerns of user terminals, such as energy efficiency, security, and cross-platform compatibility. Consequently, these challenges remain in the era of cloud computing and big data. In this article, the authors present a review to a promise computing paradigm: transparent computing. Similar to cloud computing, transparent computing stores software and user data at specific servers. More specifically, it extends the bus transmission in traditional computer architecture to the network. User interruptions at a terminal are redirected to a specific server through a network connection to request the corresponding instructions and data, which are subsequently executed at the terminal in a page-streaming pattern. By adopting this computing paradigm, user terminals are becoming more lightweight (nearly bare) with enhanced security (dumping after using), improved energy efficiency (no terminal storage), and cross-platform capability (low layer compatibility). This article presents a comprehensive survey and indicates future directions of transparent computing, from traditional terminals to mobile devices.

[1]  Chen Chengcai Design and implementation of a virtual machine-based transparent computing system , 2008 .

[2]  Yang Hua-jie RBIS: Security Enhancement for MRBP and MRBP2 Using Integrity Check , 2007 .

[3]  Jianer Chen,et al.  Security from the transparent computing aspect , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[4]  Yaoxue Zhang The Challenges and Opportunities in Transparent Computing , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[5]  Laurence T. Yang,et al.  Information security underlying transparent computing: Impacts, visions and challenges , 2010, Web Intell. Agent Syst..

[6]  Wei Liang,et al.  A Cross Platform Computing Method and Its Application for Mobile Device in Transparent Computing , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[7]  Yuezhi Zhou,et al.  Transparent Computing: A New Paradigm for Pervasive Computing , 2006, UIC.

[8]  Yaoxue Zhang,et al.  A remote resource management method for Transparent Computing , 2012, 2012 International Conference on Computer Science and Information Processing (CSIP).

[9]  Zhou Yuezhi Block-based data consistency method for transparent computing , 2009 .

[10]  Yaoxue Zhang,et al.  TransOS: a transparent computing-based operating system for the cloud , 2012, Int. J. Cloud Comput..

[11]  Chen Jianer,et al.  Analysis on the Scheduling Problem in Transparent Computing , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[12]  Yuezhi Zhou Transparent computing: From concept to implementation , 2012, 2012 International Symposium on Information Technologies in Medicine and Education.

[13]  Wang Yang,et al.  NFS Protocol Performance Analysis and Improvement for Mobile Transparent Computing , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[14]  Yan Wang,et al.  A Dynamic Rebuild Strategy of Multi-host System Volume on Transparence Computing Mode , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[15]  Zhang Yao-xue,et al.  Transparence Computing:Concept,Architecture and Example , 2004 .

[16]  Yaoxue Zhang,et al.  Aggressive Resource Provisioning for Ensuring QoS in Virtualized Environments , 2015, IEEE Transactions on Cloud Computing.

[17]  Yaoxue Zhang,et al.  4VP: A Novel Meta OS Approach for Streaming Programs in Ubiquitous Computing , 2007, 21st International Conference on Advanced Information Networking and Applications (AINA '07).

[18]  Zhou Yuezhi Simulation analysis and validation of cache performance in TransCom systems , 2009 .

[19]  Yaoxue Zhang,et al.  Building a Virtual Machine-Based Network Storage System for Transparent Computing , 2012, 2012 International Conference on Computer Science and Service System.

[20]  Richard Branch,et al.  Cloud Computing and Big Data: A Review of Current Service Models and Hardware Perspectives , 2014 .

[21]  Gary Anthes,et al.  HTML5 leads a web revolution , 2012, Commun. ACM.

[22]  Laurence T. Yang,et al.  Performance Modeling and Analysis of the Booting Process in a Transparent Computing Environment , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[23]  Naixue Xiong,et al.  A Bare-Metal and Asymmetric Partitioning Approach to Client Virtualization , 2014, IEEE Transactions on Services Computing.

[24]  Wei Li RTO algorithm for transparent computing systems , 2007 .

[25]  Xu Peng-zhi MRBP2: a Transparence Computing Based Remote Booting Protocol , 2006 .

[26]  Guo Guanfei A Dynamic Load Balancing Algorithm Based on Transparence Computing , 2006 .

[27]  Zhou Yuezhi A Multimedia I/O Access Control Policy for Transparent Computing , 2013 .

[28]  Min Wu,et al.  Shared Resource and Service Management for Mobile Transparent Computing , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[29]  Wang Yong,et al.  A Customizable Boot Protocol for Network Computing , 2003 .

[30]  Laurence T. Yang,et al.  Receiving Buffer Adaptation for High-Speed Data Transfer , 2013, IEEE Transactions on Computers.

[31]  David Borsook,et al.  The Challenges and Opportunities , 2010 .

[32]  Xu Guangbin,et al.  ENCBP—An Extended Multi-OSs Remote-Booting Method , 2009 .

[33]  Athanasios V. Vasilakos,et al.  Provably secure three-party authenticated key agreement protocol using smart cards , 2014, Comput. Networks.

[34]  Yaoxue Zhang,et al.  Transparent computing: Spatio-temporal extension on von Neumann architecture for cloud services , 2013 .

[35]  Xiaohong Jiang,et al.  On Delivery Delay-Constrained Throughput and End-to-End Delay in MANETs , 2014, 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS).

[36]  Zhou Yuezhi CSDT:Method for Data Transfer Between Client Devices of Transparent Computing Systems , 2008 .

[37]  Yaoxue Zhang,et al.  Performance Analysis of Virtual Disk System for Transparent Computing , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.

[38]  Yang Shanlin,et al.  IOMan: An I/O Management Method Supporting Multi-OS Remote Boot and Running , 2007 .

[39]  Gao Yuan NSAP—A network storage access protocol for transparent computing , 2009 .

[40]  Wang Yang,et al.  Wireless Multicast for Mobile Transparent Computing , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[41]  Laurence T. Yang,et al.  TransCom: A Virtual Disk-Based Cloud Computing Platform for Heterogeneous Services , 2014, IEEE Transactions on Network and Service Management.

[42]  Gao Yuan Lightweight Virtual Machine-based Transparent Computing System , 2010 .

[43]  Xiaohong Jiang,et al.  A Delay Constrained Two-Hop Relay Algorithm for Transparent Computing in MANETs , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[44]  Yaoxue Zhang,et al.  Leveraging the Tail Time for Saving Energy in Cellular Networks , 2014, IEEE Transactions on Mobile Computing.

[45]  Li Ken-li Transparent Computing System Based on Hierarchical Cache , 2011 .

[46]  Wu Ming Analysis and a case study of transparent computing implementation with UEFI , 2012, Int. J. Cloud Comput..