Abstract
Mobile devices are pursuing the succession of desktop PCs these days. Cyber Foraging is the project that investigated overcoming scarce computing resources and reducing the power consumptions of mobile devices. In this paper, we propose a framework for remote execution of mobile devices in the way of delivering user data and invoking and manipulating the software of a surrogate with VNC-style interface. This resource furnishing system has the merits of remote application execution, and automatic file transfer. Remote execution is provided via VNC-style interface that is user-friendly. Performance evaluation shows the feasibility of the resource furnishing system, for both data transfers over wired and wireless network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Balan, B., Flinn, J., Satyanarayanan, M., Sinnamohideen, S., Yang, H.: The Case for Cyber Foraging. In: Proc. ACM SIGOPS European Workshop, ACM Press, New York (2002)
Richardson, T., Stanfford-Fraser, Q., Wood, K.R., Hopper, A.: Virtual Network Computing. IEEE Internet Computing 2(1), 33–38 (1998)
Balan, R.K., Satyanarayanan, M., Park, S.Y., Okoshi, T.: Tactics-Based Remote Execution for Mobile Computing. In: Proceedings of MobiSys 2003: The First International Conference on Mobile Systems, Applications, and Services, San Francisco, CA, USA (May 2003)
Kim, D., Ok, M., Park, M.-s.: An Intermediate Target for Quick-Relay of Remote Storage to Mobile Devices. In: Gervasi, O., Gavrilova, M., Kumar, V., Laganà , A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) Computational Science and Its Applications – ICCSA 2005. LNCS, vol. 3481, pp. 1035–1044. Springer, Heidelberg (2005)
Ok, M., Kim, D., Park, M.-s.: UbiqStor: Server and Proxy for Remote Storage of Mobile Devices. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D., Jeong, Y.-S., Xu, C.-Z. (eds.) Emerging Directions in Embedded and Ubiquitous Computing. LNCS, vol. 4097, pp. 22–31. Springer, Heidelberg (2006)
Clark, T.: IP SANs: A Guide to iSCSI, iFCP, and FCIP Protocols for Storage Area Networks. Addison-Wesley, Reading (2002)
Lu, Y., Du, D.H.C.: Performance study of iSCSI-based storage subsystems. IEEE Communication Magazine 41, 76–82 (2003)
Block Device Driver Architecture: http://msdn.microsoft.com/library/enus/wceddk40/html/_wceddk_system_architecture_for_block_devices.asp
Goyal, S., Carter, J.: A Lightweight Secure Cyber Forging Infrastructure for Resource-constrained Devices. In: The Sixth IEEE Workshop on Mobile Computing Systems and Applications, pp. 186–195 (2004)
Suu, Y.Y., Flinn, J.: Slingshot: Deploying Stateful Services in Wireless Hotspots. In: Annual Conference on Mobile Systems, Applications and Services, pp. 79–92 (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ok, M., Seo, JW., Park, Ms. (2007). A Distributed Resource Furnishing to Offload Resource-Constrained Devices in Cyber Foraging Toward Pervasive Computing. In: Enokido, T., Barolli, L., Takizawa, M. (eds) Network-Based Information Systems. NBiS 2007. Lecture Notes in Computer Science, vol 4658. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74573-0_43
Download citation
DOI: https://doi.org/10.1007/978-3-540-74573-0_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74572-3
Online ISBN: 978-3-540-74573-0
eBook Packages: Computer ScienceComputer Science (R0)