Characterization of the impact of resource availability on opportunistic computing

With opportunistic computing, devices are no longer restricted to using their own services and resources, but can access services and resources made available by other devices. The performance of opportunistic computing is greatly affected by the resource topology in the network: what resources/services are available, as well as when and where they can be tapped. This paper presents a preliminary investigation of the impact of the resource availability on the performance of opportunistic computing. Specifically, we propose a metric called Expected Resource Availability, ERA, that attempts to capture the impact of the topology of services and resources. The ERA offers a proxy for the applicability of opportunistic computing schemes to a given network: if the ERA is low, any opportunistic scheme can be expected to fail due to a sheer lack of resources and/or connectivity among them. On the other hand, if the ERA is high, success can be expected. To gain perspective on the properties of the ERA, we tackle the problem of service allocation in opportunistic computing, which suffers to combinatorial explosion when looking for the optimal solution. We also present some preliminary simulation results that confirm the validity of the ERA as a metric to gauge whether opportunistic computing can be achieved in a given network.

[1]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[2]  Anna Förster,et al.  On context awareness and social distance in human mobility traces , 2012, MobiOpp '12.

[3]  Marco Conti,et al.  Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.

[4]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[5]  Matt Welsh,et al.  MoteLab: a wireless sensor network testbed , 2005, IPSN '05.

[6]  Mun Choon Chan,et al.  Indriya: A Low-Cost, 3D Wireless Sensor Network Testbed , 2011, TRIDENTCOM.

[7]  Daniele Puccinelli,et al.  The human element as the key enabler of pervasiveness , 2011, 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop.

[8]  Arun Venkataramani,et al.  Augmenting mobile 3G using WiFi , 2010, MobiSys '10.

[9]  Jukka K. Nurminen,et al.  Energy Efficiency of Mobile Clients in Cloud Computing , 2010, HotCloud.

[10]  Leonidas J. Guibas,et al.  The Impact of Network Topology on Collection Performance , 2011, EWSN.

[11]  Andreas Willig,et al.  TWIST: a scalable and reconfigurable testbed for wireless indoor experiments with sensor networks , 2006, REALMAN '06.

[12]  Simin Nadjm-Tehrani,et al.  Exploiting resource heterogeneity in delay-tolerant networks , 2013, Wirel. Commun. Mob. Comput..

[13]  Philip Levis,et al.  An empirical study of low-power wireless , 2010, TOSN.

[14]  Mohan Kumar,et al.  Opportunities in Opportunistic Computing , 2010, Computer.

[15]  Mohan Kumar,et al.  Modeling and simulation of service composition in opportunistic networks , 2011, MSWiM '11.

[16]  Daniele Puccinelli,et al.  On the Interplay of Low Power Wireless Connectivity and Energy Consumption , 2011 .

[17]  Mohan Kumar,et al.  Minimum-Delay Service Provisioning in Opportunistic Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.

[18]  Anees Shaikh,et al.  A First Look at Problems in the Cloud , 2010, HotCloud.