A Reference Architecture for Mobile Code Offload in Hostile Environments

Handheld mobile technology can help disaster relief workers and soldiers in the field with tasks such as speech and image recognition, natural language processing, decision-making, and mission planning. However, these applications are computation-intensive, take a heavy toll on battery power, and often rely on good connectivity to networks, limiting their practical usefulness in a crisis. This paper presents a reference architecture for mobile devices that overcomes these limitations by exploiting cloudlets - VM-based code offload elements that are in single-hop proximity to mobile devices.

[1]  Hao Zhang,et al.  Deploying Mobile Computation in Cloud Service , 2009, CloudCom.

[2]  Eugene Marinelli,et al.  Hyrax: Cloud Computing on Mobile Devices using MapReduce , 2009 .

[3]  Andy Hopper,et al.  Virtual Network Computing , 1998, IEEE Internet Comput..

[4]  Xinwen Zhang,et al.  Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.

[5]  Mahmut T. Kandemir,et al.  Studying energy trade offs in offloading computation/compilation in Java-enabled mobile devices , 2004, IEEE Transactions on Parallel and Distributed Systems.

[6]  Mahadev Satyanarayanan,et al.  Fundamental challenges in mobile computing , 1996, PODC '96.

[7]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[8]  Myong-Soon Park,et al.  A Distributed Resource Furnishing to Offload Resource-Constrained Devices in Cyber Foraging Toward Pervasive Computing , 2007, NBiS.

[9]  Willy Zwaenepoel,et al.  Puppeteer: component-based adaptation for mobile computing (Poster Session) , 2000, OPSR.

[10]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[11]  Mahadev Satyanarayanan,et al.  Balancing performance, energy, and quality in pervasive computing , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[12]  Mads Darø Kristensen,et al.  Execution plans for cyber foraging , 2008, MobMid '08.

[13]  Byung-Gon Chun,et al.  CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.

[14]  Mahadev Satyanarayanan,et al.  The case for cyber foraging , 2002, EW 10.

[15]  Jason Maassen,et al.  eyeDentify: Multimedia Cyber Foraging from a Smartphone , 2009, 2009 11th IEEE International Symposium on Multimedia.

[16]  Mahadev Satyanarayanan,et al.  Self-tuned remote execution for pervasive computing , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[17]  Lee W. McKnight,et al.  Wireless Internet access: 3G vs. WiFi? , 2003 .

[18]  Paul Watson,et al.  Secure & Rapid Composition of Infrastructure Services in the Cloud , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).

[19]  Yung-Hsiang Lu,et al.  Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.

[20]  James D. Herbsleb,et al.  Simplifying cyber foraging for mobile devices , 2007, MobiSys '07.

[21]  Eyal de Lara,et al.  Puppeteer: component-based adaptation for mobile computing , 2000, OPSR.

[22]  Adam Wolbach Improving the Deployability of Diamond , 2008 .

[23]  Henri E. Bal,et al.  Ibis for mobility: solving challenges of mobile computing using grid techniques , 2009, HotMobile '09.

[24]  John Carter,et al.  A lightweight secure cyber foraging infrastructure for resource-constrained devices , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.

[25]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[26]  Jason H. Christensen,et al.  Using RESTful web-services and cloud computing to create next generation mobile applications , 2009, OOPSLA Companion.