A Low-Energy Fast Cyber Foraging Mechanism for Mobile Devices
The ever increasing demands for using resource-constrained mobile devices for running more resource intensive applications nowadays has initiated the development of cyber foraging solutions that offload parts or whole computational intensive tasks to more powerful surrogate stationary computers and run them on behalf of mobile devices as required. The choice of proper mix of mobile devices and surrogates has remained an unresolved challenge though. In this paper, we propose a new decision-making mechanism for cyber foraging systems to select the best locations to run an application, based on context metrics such as the specifications of surrogates, the specifications of mobile devices, application specification, and communication network specification. Experimental results show faster response time and lower energy consumption of benched applications compared to when applications run wholly on mobile devices and when applications are offloaded to surrogates blindly for execution.
💡 Research Summary
**
The paper addresses the growing need to run computationally intensive applications on resource‑constrained mobile devices by leveraging nearby idle stationary computers, termed surrogates, through a technique known as cyber foraging. While many prior works have explored offloading, they often lack a systematic method for deciding where a task should be executed. This study proposes a context‑aware decision‑making mechanism that selects the optimal execution location—either the mobile device itself or one of the available surrogates—based on a comprehensive set of metrics.
Four categories of context metrics are defined: (1) mobile device metrics (current CPU usage, processor speed, available memory, remaining battery energy); (2) surrogate metrics (current CPU usage, available memory); (3) network metrics (type, bandwidth, signal strength, transmission rate); and (4) application metrics (type—CPU‑intensive, memory‑intensive, or I/O‑intensive—and the sizes of code, input, and output data). These metrics are fed into a weighted cost function:
Cost = w1·Time + w2·Energy + w3·Memory + w4·Other
where the weighting factors (w1‑w4) are non‑negative and sum to one, allowing the system designer to prioritize different aspects such as latency, energy consumption, or memory usage.
The cost function explicitly separates energy consumption into four components: computation power (Power_comp), transmission power for sending data (Power_send), reception power (Power_receive), and standby power while waiting for remote execution (Power_standby). Time is calculated as the sum of local execution time (if the task runs on the mobile) or remote execution time plus data transmission and reception times (if offloaded). Memory cost reflects whether the required memory exceeds the available memory at a given node.
A solver algorithm implements the decision process. First, it eliminates any node (mobile or surrogate) that cannot satisfy the required memory or energy thresholds. Then, for each remaining candidate, it computes the total cost using the defined function. The node with the minimum cost is selected for execution. If no surrogate qualifies, the mobile device executes locally; if the mobile also fails the feasibility test, the task is aborted.
The experimental evaluation uses a single mobile device (Qualcomm MSM7225, 528 MHz CPU, 256 MB RAM, Windows Mobile 6.5) connected via 802.11b/g Wi‑Fi to a single surrogate (Intel Core 2 Duo, 2.5 GHz, 4 GB RAM, Windows 7). Context information is supplied in XML files. Two representative benchmarks—an image‑processing task and a speech‑recognition task—are executed under three scenarios: (a) pure local execution, (b) blind offloading (always to the surrogate), and (c) the proposed context‑aware decision mechanism. Results show that the proposed approach reduces execution time by roughly 30 % and energy consumption by about 40 % compared with both baseline scenarios. The system also correctly falls back to local execution when surrogate resources are insufficient, demonstrating adaptability.
Despite these promising results, the study has notable limitations. The evaluation involves only one mobile and one surrogate, leaving scalability to multi‑surrogate, multi‑user environments untested. The weighting factors are static; the paper does not discuss dynamic adaptation to changing user preferences, battery levels, or network conditions. Security considerations such as encryption of code and data during transmission are omitted, which would be essential for real‑world deployment. Finally, the model assumes relatively stable Wi‑Fi conditions; rapid fluctuations in wireless bandwidth could invalidate the cost estimates and lead to suboptimal decisions.
In summary, the authors contribute a clear, quantitative framework for cyber foraging decision making that integrates processing power, memory availability, network characteristics, and application demands into a single cost metric. Their prototype demonstrates measurable gains in latency and energy efficiency for mobile devices. Future work should extend the model to handle multiple concurrent tasks, dynamic weight adjustment, robust security mechanisms, and highly variable network environments to make the approach viable for large‑scale pervasive computing deployments.
Comments & Academic Discussion
Loading comments...
Leave a Comment