Loading [a11y]/accessibility-menu.js
On-demand VM provisioning for cloudlet-based cyber-foraging in resource-constrained environments | IEEE Conference Publication | IEEE Xplore

On-demand VM provisioning for cloudlet-based cyber-foraging in resource-constrained environments


Abstract:

Mobile applications are increasingly used by first responders, medics, researchers and other people in the field support of their missions and tasks. These environments h...Show More

Abstract:

Mobile applications are increasingly used by first responders, medics, researchers and other people in the field support of their missions and tasks. These environments have very limited connectivity and computing resources. Cloudlet-based cyber-foraging is a method of opportunistically discovering nearby resource-rich nodes that can increase the computing power of mobile devices and enhance the mobile applications running on them. In this paper we present On-Demand VM Provisioning, a mechanism for provisioning cloudlets at runtime by leveraging the advantages of enterprise provisioning tools commonly used to maintain configurations in enterprise environments. We present details of a prototype for On-Demand VM Provisioning and the results of a quantitative and qualitative evaluation of the prototype compared to other cloudlet provisioning mechanisms. The evaluation shows that On-Demand VM Provisioning shows promise in terms of flexibility, energy consumption, maintainability and leverage of cloud computing best practices, but can be challenging in disconnected environments, especially for complex applications with many dependencies.
Date of Conference: 06-07 November 2014
Date Added to IEEE Xplore: 29 January 2015
Electronic ISBN:978-1-63190-024-2
Conference Location: Austin, TX, USA
References is not available for this document.

I. Introduction

Mobile applications are increasingly used by first responders and other field personnel in support of their missions and tasks. These environments are not only at the edge of the network infrastructure, but are also resource-constrained due to limited computing resources, intermittent network connectivity, and in some cases dynamic context and high levels of stress. Applications that are useful to field personnel include speech and image recognition, natural language processing, sensor data collection, and situational awareness. These are all computation-intensive tasks that take a heavy toll on the device's battery power and computing resources.

Select All
1.
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, "The case for vm-based cloudlets in mobile computing," Pervasive Computing, IEEE, vol. 8, no. 4, pp. 14-23, Oct 2009
2.
J. Rahman, "Investigating configuration management tools usage in large infrastructure," Master's thesis, University of Oslo, Department of Informatics, 2012
3.
G. Vallee, T. Naughton, and S. L. Scott, "System management software for virtual environments," in Proceedings of the 4th International Conference on Computing Frontiers, ser. CF '07. New York, NY, USA: ACM, 2007, pp. 153-160. [Online]. Available: http://doi. acm. org/10. 1145/1242531. 1242555
4.
E. Cuervo, A. Balasubramanian, D.-k. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl, "Maui: Making smartphones last longer with code offload," in Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, ser. MobiSys '10. New York, NY, USA: ACM, 2010, pp. 49-62. [Online]. Available: http://doi. acm. org/10. 1145/1814433. 1814441
5.
B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, "Clonecloud: Elastic execution between mobile device and cloud," in Proceedings of the Sixth Conference on Computer Systems, ser. EuroSys '11. New York, NY, USA: ACM, 2011, pp. 301-314. [Online]. Available: http://doi. acm. org/10. 1145/1966445. 1966473
6.
A. Iyer and T. Roopa, "Extending android application programming framework for seamless cloud integration," in Mobile Services (MS), 2012 IEEE First International Conference on, June 2012, pp. 96-104
7.
C. Jarabek, D. Barrera, and J. Aycock, "Thinav: Truly lightweight mobile cloud-based anti-malware," in Proceedings of the 28th Annual Computer Security Applications Conference, ser. ACSAC '12. New York, NY, USA: ACM, 2012, pp. 209-218. [Online]. Available: http://doi. acm. org/10. 1145/2420950. 2420983
8.
S. Goyal, "A collective approach to harness idle resources of end nodes," Ph. D. dissertation, University of Utah, 2011
9.
M. R. Rahimi, N. Venkatasubramanian, S. Mehrotra, and A. V. Vasilakos, "Mapcloud: Mobile applications on an elastic and scalable 2-tier cloud architecture," in Proceedings of the 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing, ser. UCC '12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 83-90. [Online]. Available: http://dx. doi. org/10. 1109/UCC. 2012. 25
10.
S. Pandey, "Investigating community, reliability and usability of cfengine, chef and puppet," Master's thesis, University of Oslo, Department of Informatics, 2012
11.
E. Dolstra, M. Bravenboer, and E. Visser, "Service configuration management," in Proceedings of the 12th International Workshop on Software Configuration Management, ser. SCM '05. New York, NY, USA: ACM, 2005, pp. 83-98. [Online]. Available: http://doi. acm. org/10. 1145/1109128. 1109135
12.
C. Lueninghoener, "Getting started with configuration management,";login:, vol. 36, no. 2, pp. 12-17, Apr 2011
13.
M. Burgess, "On the theory of system administration," Science of Computer Programming, vol. 49, no. 1, pp. 1-46, 2003
14.
A. Sekiguchi, K. Shimada, Y. Wada, A. Ooba, R. Yoshimi, and A. Matsumoto, "Configuration management technology using tree structures of ict systems," in Proceedings of the 15th Communications and Networking Simulation Symposium, ser. CNS '12. San Diego, CA, USA: Society for Computer Simulation International, 2012, pp. 4:1-4:7 Available: http://dl. acm. org/citation. cfm?id=2331762. 2331766
15.
J. Palat, "Introducing vagrant," Linux J. , vol. 2012, no. 220, Aug. 2012. Available: http://dl. acm. org/citation. cfm?id=2371484. 2371486
16.
M. Bjorkqvist, L. Chen, and W. Binder, "Opportunistic service provisioning in the cloud," in 2012 IEEE 5th International Conference on Cloud Computing (CLOUD). Washington, DC, USA: IEEE Computer Society, 2012, pp. 237-244
17.
A. Quiroz, H. Kim, M. Parashar, N. Gnanasambandam, and N. Sharma, "Towards autonomic workload provisioning for enterprise grids and clouds," in Grid Computing, 2009 10th IEEE/ACM International Conference on. Washington, DC, USA: IEEE Computer Society, Oct 2009, pp. 50-57
18.
K. Wang, J. Rao, and C.-Z. Xu, "Rethink the virtual machine template," in Proceedings of the 7th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, ser. VEE '11. New York, NY, USA: ACM, 2011, pp. 39-50. [Online]. Available: http://doi. acm. org/10. 1145/1952682. 1952690
19.
S. Simanta, G. A. Lewis, E. Morris, K. Ha, and M. Satyanarayanan, "A reference architecture for mobile code offload in hostile environments," in Proceedings of the Joint Working IEEE/IFIP Conference Software Architecture (WICSA) and European Conference on Software Architecture (ECSA). Washington, DC, USA: IEEE Computer Society, 2012, pp. 282-286
20.
G. A. Lewis, S. Echeverŕa, S. Simanta, B. Bradshaw, and J. Root, "Cloudlet-based cyber-foraging for mobile systems in resourceconstrained edge environments," in Companion Proceedings of the 36th International Conference on Software Engineering, ser. ICSE Companion 2014. New York, NY, USA: ACM, 2014, pp. 412-415. Available: http://doi. acm. org/10. 1145/2591062. 2591119
21.
L. Bass, P. Clements, and R. Kazman, Software Architecture in Practice, 3rd ed. Addison-Wesley Professional, 2012
22.
J. Manweiler and R. Roy Choudhury, "Avoiding the rush hours: Wifi energy management via traffic isolation," in Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, ser. MobiSys '11. New York, NY, USA: ACM, 2011, pp. 253-266. [Online]. Available: http://doi. acm. org/10. 1145/1999995. 2000020
23.
P. Labs, "Puppet Open Source," http://puppetlabs. com/puppet/ puppet-open-source, [Online; retrieved 7-May-2014]
24.
F. Bellard, "QEMU: Open Source Processor Emulator," http://wiki. qemu. org/Main Page, [Online; retrieved 7-May-2014]
25.
QEMU, "QEMU: Open Source Processor Emulator-Documentation/ Networking," http://wiki. qemu. org/Documentation/Networking Online; retrieved 7-May-2014
26.
M. McLoughlin, "The QCOW2 Image Format," https://people. gnome. org/-markmc/qcow-image-format. html, 2008, [Online; retrieved 7-May-2014]
27.
libvirt Virtualization API, "Snapshot XML Format," http://libvirt. org/ formatsnapshot. html, [Online; retrieved 7-May-2014]
28.
U. Documentation, "Apt-Get," https://help. ubuntu. com/12. 04/ serverguide/apt-get. html, [Online; retrieved 7-May-2014]
29.
Microsoft, "Microsoft TechNet-Windows Installer Package," http: //technet. microsoft. com/en-us/library/cc978328. aspx, [Online; retrieved 7-May-2014]
30.
D. Halperin, B. Greenstein, A. Sheth, and D. Wetherall, "Demystifying 802. 11n power consumption," in Proceedings of the 2010 International Conference on Power Aware Computing and Systems, ser. HotPower'10. Berkeley, CA, USA: USENIX Association, 2010, pp. 1-. [Online]. Available: http://dl. acm. org/citation. cfm?id=1924920. 1924928

Contact IEEE to Subscribe

References

References is not available for this document.