Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing

被引:145
作者
Zhang, Xinwen [1 ]
Kunjithapatham, Anugeetha [2 ]
Jeong, Sangoh [3 ]
Gibbs, Simon [2 ]
机构
[1] Huawei Res Ctr, Santa Clara, CA USA
[2] Samsung Informat Syst Amer, San Jose, CA USA
[3] LG Elect, Seoul, South Korea
关键词
elastic application; cloud computing; mobile device; weblet; dynamic execution configuration;
D O I
10.1007/s11036-011-0305-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new elastic application model that enables seamless and transparent use of cloud resources to augment the capability of resource-constrained mobile devices. The salient features of this model include the partition of a single application into multiple components called weblets, and a dynamic adaptation of weblet execution configuration. While a weblet can be platform independent (e.g., Java or .Net bytecode or Python script) or platform dependent (native code), its execution location is transparent-it can be run on a mobile device or migrated to the cloud, i.e., run on one or more nodes offered by an IaaS provider. Thus, an elastic application can augment the capabilities of a mobile device including computation power, storage, and network bandwidth, with the light of dynamic execution configuration according to device's status including CPU load, memory, battery level, network connection quality, and user preferences. This paper presents the motivation behind developing elastic applications and their architecture including typical elasticity patterns and cost models that are applied to determine the elasticity patterns. We implement a reference architecture and develop a set of elastic applications to validate the augmentation capabilities for smartphone devices. We demonstrate promising results of the proposed application model using data collected from one of our example elastic applications.
引用
收藏
页码:270 / 284
页数:15
相关论文
共 50 条
[31]   Mobile GPU Cloud Computing with real Time Application [J].
Ayad, Marwa ;
Taher, Mohamed ;
Salem, Ashraf .
2015 5TH INTERNATIONAL CONFERENCE ON ENERGY AWARE COMPUTING SYSTEMS & APPLICATIONS (ICEAC), 2015,
[32]   Study on the Application of Mobile Internet "Cloud Computing" Platform [J].
Gong, Songchun ;
Fu, Songyin ;
Chen, Zheng .
FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
[33]   Towards an Optimized Scheme for Mobile Subscribers Based on Cloud Computing [J].
Abdennadher, Fatma ;
Ben Jemaa, Maher .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 :751-760
[34]   Towards energy aware cloud computing application construction [J].
Armstrong, Django ;
Djemame, Karim ;
Kavanagh, Richard .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2017, 6
[35]   Towards energy aware cloud computing application construction [J].
Django Armstrong ;
Karim Djemame ;
Richard Kavanagh .
Journal of Cloud Computing, 6
[36]   Mobile Cloud Computing For Emergency Healthcare Model:Framework [J].
Nirabi, Ali ;
Hameed, Shihab A. .
PROCEEDINGS OF THE 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2018, :375-379
[37]   A Distributed Mobile Cloud Service Model for Intensive Computing [J].
Lv, X. F. .
INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENVIRONMENTAL ENGINEERING (CSEE 2015), 2015, :1430-1436
[38]   A Pricing Model for Sharing Cloudlets in Mobile Cloud Computing [J].
Tran Hoang Hai ;
Phuong Nguyen .
PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP), 2017, :149-153
[39]   A Survey of Mobile Cloud Computing [J].
Xiaopeng Fan Jiannong Cao and Haixia Mao Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Department of Computing Hong Kong Polytechnic University Department of Land Surveying and Geoinformatics Hong Kong Polytechnic University .
ZTE Communications, 2011, 9 (01) :4-8
[40]   GIS Application Model Based on Cloud Computing [J].
Zhou, Linli ;
Wang, Rujing ;
Cui, Chaoyuan ;
Xie, Chengjun .
NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 :130-136