Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Normal view MARC view ISBD view

Cyber foraging : bridging mobile and cloud computing /

By: Flinn, Jason.
Material type: materialTypeLabelBookSeries: Synthesis digital library of engineering and computer science: ; Synthesis lectures on mobile and pervasive computing: # 10.Publisher: San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, c2012Description: 1 electronic text (ix, 93 p.) : ill., digital file.ISBN: 9781608458509 (electronic bk.).Subject(s): Mobile computing | Cloud computing | cyber foraging | mobile code offload | dynamic partitioning of computation | data stagingDDC classification: 004.165 Online resources: Abstract with links to resource Also available in print.
Contents:
1. Introduction -- 1.1 The motivation for cyber foraging -- 1.2 Potential benefits from using remote infrastructure -- 1.3 Potential costs of using remote infrastructure -- 1.4 Discussion -- 1.5 Lecture overview --
2. Partitioning -- 2.1 Partitioning goals -- 2.2 Choosing candidate partitions -- 2.3 Selecting a partition -- 2.4 Resource measurement and estimation -- 2.4.1 CPU -- 2.4.2 Network -- 2.4.3 Battery energy -- 2.4.4 File cache state -- 2.4.5 Memory -- 2.5 Dealing with errors during partitioning -- 2.6 Applications -- 2.7 Summary --
3. Management -- 3.1 Surrogate location -- 3.1.1 Surrogates near mobile computers -- 3.1.2 Surrogates in the cloud -- 3.1.3 Surrogate location for current cyber foraging systems -- 3.2 Isolation of remote operations -- 3.2.1 Design goals -- 3.2.2 Process-level isolation -- 3.2.3 Hardware virtualization -- 3.2.4 Application virtualization -- 3.3 Managing state -- 3.3.1 Application-specific state -- 3.3.2 Obtaining and caching application-specific state -- 3.4 Mechanics -- 3.5 Summary --
4. Security and privacy -- 4.1 Desired security and privacy properties -- 4.1.1 Properties for surrogate owners -- 4.1.2 Properties for mobile computer owners -- 4.2 Leveraging standard solutions -- 4.3 Trusted boot -- 4.3.1 Trusted boot for public kiosks -- 4.3.2 Application to cyber foraging and vulnerabilities -- 4.4 Verification via redundant execution -- 4.4.1 Verification in Slingshot -- 4.4.2 Enforcing determinism -- 4.5 Discussion --
5. Data staging -- 5.1 Motivation -- 5.2 Data staging for prefetching data -- 5.2.1 Infostations -- 5.2.2 Data staging -- 5.2.3 Sulula -- 5.3 Predicting the future -- 5.3.1 Mobility prediction -- 5.3.2 Data access prediction -- 5.3.3 Bandwidth prediction -- 5.4 Data staging for data sent to the cloud -- 5.5 Summary --
6. Challenges and opportunities -- 6.1 Trends that impact cyber foraging -- 6.2 Challenges -- 6.2.1 Finding the killer app -- 6.2.2 Defining the business case -- 6.2.3 Security and privacy -- 6.3 Opportunities for further research -- 6.3.1 Bringing benefit to more applications -- 6.3.2 Handling uncertainty and failure -- 6.3.3 Improving ease-of-management -- 6.4 Final thoughts --
Bibliography -- Author's Biography.
Abstract: This lecture provides an introduction to cyber foraging, a topic that lies at the intersection of mobile and cloud computing. Cyber foraging dynamically augments the computing resources of mobile computers by opportunistically exploiting fixed computing infrastructure in the surrounding environment. In a cyber foraging system, applications functionality is dynamically partitioned between the mobile computer and infrastructure servers that store data and execute computation on behalf of mobile users. The location of application functionality changes in response to user mobility, platform characteristics, and variation in resources such as network bandwidth and CPU load. Cyber foraging also introduces a new, surrogate computing tier that lies between mobile users and cloud data centers. Surrogates are wired, infrastructure servers that offer much greater computing resources than those offered by small, battery-powered mobile devices. Surrogates are geographically distributed to be as close as possible to mobile computers so that they can provide substantially better response time to network requests than that provided by servers in cloud data centers. For instance, surrogates may be co-located with wireless hotspots in coffee shops, airport lounges, and other public locations.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode Item holds
E books E books PK Kelkar Library, IIT Kanpur
Available EBKE437
Total holds: 0

Mode of access: World Wide Web.

System requirements: Adobe Acrobat Reader.

Part of: Synthesis digital library of engineering and computer science.

Series from website.

Includes bibliographical references (p. 83-91).

1. Introduction -- 1.1 The motivation for cyber foraging -- 1.2 Potential benefits from using remote infrastructure -- 1.3 Potential costs of using remote infrastructure -- 1.4 Discussion -- 1.5 Lecture overview --

2. Partitioning -- 2.1 Partitioning goals -- 2.2 Choosing candidate partitions -- 2.3 Selecting a partition -- 2.4 Resource measurement and estimation -- 2.4.1 CPU -- 2.4.2 Network -- 2.4.3 Battery energy -- 2.4.4 File cache state -- 2.4.5 Memory -- 2.5 Dealing with errors during partitioning -- 2.6 Applications -- 2.7 Summary --

3. Management -- 3.1 Surrogate location -- 3.1.1 Surrogates near mobile computers -- 3.1.2 Surrogates in the cloud -- 3.1.3 Surrogate location for current cyber foraging systems -- 3.2 Isolation of remote operations -- 3.2.1 Design goals -- 3.2.2 Process-level isolation -- 3.2.3 Hardware virtualization -- 3.2.4 Application virtualization -- 3.3 Managing state -- 3.3.1 Application-specific state -- 3.3.2 Obtaining and caching application-specific state -- 3.4 Mechanics -- 3.5 Summary --

4. Security and privacy -- 4.1 Desired security and privacy properties -- 4.1.1 Properties for surrogate owners -- 4.1.2 Properties for mobile computer owners -- 4.2 Leveraging standard solutions -- 4.3 Trusted boot -- 4.3.1 Trusted boot for public kiosks -- 4.3.2 Application to cyber foraging and vulnerabilities -- 4.4 Verification via redundant execution -- 4.4.1 Verification in Slingshot -- 4.4.2 Enforcing determinism -- 4.5 Discussion --

5. Data staging -- 5.1 Motivation -- 5.2 Data staging for prefetching data -- 5.2.1 Infostations -- 5.2.2 Data staging -- 5.2.3 Sulula -- 5.3 Predicting the future -- 5.3.1 Mobility prediction -- 5.3.2 Data access prediction -- 5.3.3 Bandwidth prediction -- 5.4 Data staging for data sent to the cloud -- 5.5 Summary --

6. Challenges and opportunities -- 6.1 Trends that impact cyber foraging -- 6.2 Challenges -- 6.2.1 Finding the killer app -- 6.2.2 Defining the business case -- 6.2.3 Security and privacy -- 6.3 Opportunities for further research -- 6.3.1 Bringing benefit to more applications -- 6.3.2 Handling uncertainty and failure -- 6.3.3 Improving ease-of-management -- 6.4 Final thoughts --

Bibliography -- Author's Biography.

Abstract freely available; full-text restricted to subscribers or individual document purchasers.

Compendex

INSPEC

Google scholar

Google book search

This lecture provides an introduction to cyber foraging, a topic that lies at the intersection of mobile and cloud computing. Cyber foraging dynamically augments the computing resources of mobile computers by opportunistically exploiting fixed computing infrastructure in the surrounding environment. In a cyber foraging system, applications functionality is dynamically partitioned between the mobile computer and infrastructure servers that store data and execute computation on behalf of mobile users. The location of application functionality changes in response to user mobility, platform characteristics, and variation in resources such as network bandwidth and CPU load. Cyber foraging also introduces a new, surrogate computing tier that lies between mobile users and cloud data centers. Surrogates are wired, infrastructure servers that offer much greater computing resources than those offered by small, battery-powered mobile devices. Surrogates are geographically distributed to be as close as possible to mobile computers so that they can provide substantially better response time to network requests than that provided by servers in cloud data centers. For instance, surrogates may be co-located with wireless hotspots in coffee shops, airport lounges, and other public locations.

Also available in print.

Title from PDF t.p. (viewed on October 18, 2012).

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha