A Distributed Resource Furnishing to Offload Resource-Constrained Devices in Cyber Foraging Toward Pervasive Computing

  • MinHwan Ok
  • Ja-Won Seo
  • Myong-soon Park
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4658)

Abstract

Mobile devices are pursuing the succession of desktop PCs these days. Cyber Foraging is the project that investigated overcoming scarce computing resources and reducing the power consumptions of mobile devices. In this paper, we propose a framework for remote execution of mobile devices in the way of delivering user data and invoking and manipulating the software of a surrogate with VNC-style interface. This resource furnishing system has the merits of remote application execution, and automatic file transfer. Remote execution is provided via VNC-style interface that is user-friendly. Performance evaluation shows the feasibility of the resource furnishing system, for both data transfers over wired and wireless network.

Keywords

Mobile Device Storage Server Remote Execution Virtual Network Computing Cyber Foraging 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Balan, B., Flinn, J., Satyanarayanan, M., Sinnamohideen, S., Yang, H.: The Case for Cyber Foraging. In: Proc. ACM SIGOPS European Workshop, ACM Press, New York (2002)Google Scholar
  2. 2.
    Richardson, T., Stanfford-Fraser, Q., Wood, K.R., Hopper, A.: Virtual Network Computing. IEEE Internet Computing 2(1), 33–38 (1998)CrossRefGoogle Scholar
  3. 3.
    Balan, R.K., Satyanarayanan, M., Park, S.Y., Okoshi, T.: Tactics-Based Remote Execution for Mobile Computing. In: Proceedings of MobiSys 2003: The First International Conference on Mobile Systems, Applications, and Services, San Francisco, CA, USA (May 2003)Google Scholar
  4. 4.
    Kim, D., Ok, M., Park, M.-s.: An Intermediate Target for Quick-Relay of Remote Storage to Mobile Devices. In: Gervasi, O., Gavrilova, M., Kumar, V., Laganà, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) Computational Science and Its Applications – ICCSA 2005. LNCS, vol. 3481, pp. 1035–1044. Springer, Heidelberg (2005)Google Scholar
  5. 5.
    Ok, M., Kim, D., Park, M.-s.: UbiqStor: Server and Proxy for Remote Storage of Mobile Devices. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D., Jeong, Y.-S., Xu, C.-Z. (eds.) Emerging Directions in Embedded and Ubiquitous Computing. LNCS, vol. 4097, pp. 22–31. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Clark, T.: IP SANs: A Guide to iSCSI, iFCP, and FCIP Protocols for Storage Area Networks. Addison-Wesley, Reading (2002)Google Scholar
  7. 7.
    Lu, Y., Du, D.H.C.: Performance study of iSCSI-based storage subsystems. IEEE Communication Magazine 41, 76–82 (2003)CrossRefGoogle Scholar
  8. 8.
  9. 9.
    Goyal, S., Carter, J.: A Lightweight Secure Cyber Forging Infrastructure for Resource-constrained Devices. In: The Sixth IEEE Workshop on Mobile Computing Systems and Applications, pp. 186–195 (2004)Google Scholar
  10. 10.
    Suu, Y.Y., Flinn, J.: Slingshot: Deploying Stateful Services in Wireless Hotspots. In: Annual Conference on Mobile Systems, Applications and Services, pp. 79–92 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • MinHwan Ok
    • 1
  • Ja-Won Seo
    • 1
  • Myong-soon Park
    • 1
  1. 1.Dept. of Computer Science and Engineering / Korea University, Seoul, 136-701Korea

Personalised recommendations