Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz

Similar documents
COMPUTATIONAL DYNAMICS

FUZZY LOGIC WITH ENGINEERING APPLICATIONS

Next Generation Networks Perspectives and Potentials. Dr Jingming Li Salina LiSalina Consulting, Switzerland Pascal Salina Swisscom SA, Switzerland

SDH/SONET Explained in Functional Models

Inside Symbian SQL. Lead Authors Ivan Litovski with Richard Maynard. Head of Technical Communications, Symbian Foundation Jo Stichbury

QoS OVER HETEROGENEOUS NETWORKS

SHORT MESSAGE SERVICE (SMS)

Speech in Mobile and Pervasive Environments

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

Cloud Phone Systems. Andrew Moore. Making Everything Easier! Nextiva Special Edition. Learn:

MOBILE PEER TO PEER (P2P)

GSM Architecture, Protocols and Services Third Edition

Real-Time Optimization by Extremum-Seeking Control

Cooperative Wireless Networking. Frank H.P. Fitzek Aalborg University

The Internet of Things

COSO Enterprise Risk Management

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak

DIGITAL VIDEO DISTRIBUTION IN BROADBAND, TELEVISION, MOBILE AND CONVERGED NETWORKS

Beginning Web Programming with HTML, XHTML, and CSS. Second Edition. Jon Duckett

Linux Command Line and Shell Scripting Bible

Editors. Mohamed Daoudi Anuj Srivastava Remco Veltkamp. 3D Face Modeling, Analysis and Recognition

Mastering UNIX Shell Scripting

Multimedia Messaging Service


TASK SCHEDULING FOR PARALLEL SYSTEMS

IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H

Relational Database Index Design and the Optimizers

Linux Command Line and Shell Scripting Bible. Third Edtion

GSM Architecture, Protocols and Services

Modern Experimental Design

Marcos Katz. Wireless Communications Research Seminar 2012

Implementing Security and Tokens: Current Standards, Tools, and Practices

INFORMATION RETRIEVAL: SEARCHING IN THE 21ST CENTURY

DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING

S60 Programming A Tutorial Guide

Study Guide. Robert Schmidt Dane Charlton

Beginning Transact-SQL with SQL Server 2000 and Paul Turley with Dan Wood

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

SIMPLY EXCEL by Paul McFedries. A John Wiley and Sons, Ltd, Publication

COMPONENT-ORIENTED PROGRAMMING

Algorithms and Parallel Computing

Network Performance Analysis

Join the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle

MODERN MULTITHREADING

Microprocessor Theory

Professional ASP.NET 2.0 Databases. Thiru Thangarathinam

Mesh Networking Principles

Linux. The book you need to succeed! Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and 13 Other Distributions Edition.

Stephen P. Radzevich. Geometry of Surfaces. A Practical Guide

Oracle PL/SQL. DUMmIES. by Michael Rosenblum and Dr. Paul Dorsey FOR

Understanding Weightless

MCITP Windows Server 2008 Server Administrator Study Guide

Networking. 11th Edition. by Doug Lowe

iwork DUMmIES 2ND EDITION FOR

Network Convergence. Services, Applications, Transport, and Operations Support. Hu Hanrahan. John Wiley & Sons, Ltd

Hands-On Oracle Application Express Security

MacBook Air PORTABLE GENIUS

Scheduling in Distributed Computing Systems Analysis, Design & Models

A Scalable Cooperative Wireless Grid Architecture and Associated Services for Future Communications

SRA A Strategic Research Agenda for Future Network Technologies

Practical Database Programming with Visual Basic.NET

Video Traces for Network Performance Evaluation


Information Retrieval: SciFinder

MOBILITY MODELS FOR NEXT WIRELESS NETWORKS GENERATION WILEY AD HOC, VEHICULAR AND MESH NETWORKS. Paolo Santi

Securing SCADA Systems. Ronald L. Krutz

HUAWEI H30-U10. Quick Start Guide

Self-Organization in Sensor and Actor Networks

Run the business. Not the risks.

The Networked SocIety

Multi-Core Programming

Unlocking the Power of OPNET Modeler

Advanced Wireless Networks

Intelligent Systems Reference Library

Multi-Objective Optimization using Evolutionary Algorithms

Yellow Intelligent User Guide A Guide To Downloading SDFI Secure Files

Limit of Liability/Disclaimer of Warranty:

COOPERATIVE TASK SCHEDULING

Copyrights and Privacy Statement


Factors Driving LTE Adoption. Anil Barot Director Broadband Strategy & Device Alliance Ecosystem April 1, 2009

Multi-Objective Optimization using Evolutionary Algorithms

Version 11

A Mobile Platform for Measurements in Dynamic Topology Wireless Networks

The SQL Guide to Pervasive PSQL. Rick F. van der Lans

The Internet of Things

SpringerBriefs in Computer Science

History of Mobile. MAS 490: Theory and Practice of Mobile Applications. Professor John F. Clark

Mobile Phone Security and Forensics

Keynote Speakers CyberC 2010

INCLUDING MEDICAL ADVICE DISCLAIMER

Differentiate Your Business with Oracle PartnerNetwork. Specialized. Recognized by Oracle. Preferred by Customers.

Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001

Guide to OSI and TCP/IP Models

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Open-Source Robotics and Process Control Cookbook

Critical Communications Service Layer

Research on Industrial Security Theory

Transcription:

MOBILE CLOUDS Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz

MOBILE CLOUDS

MOBILE CLOUDS EXPLOITING DISTRIBUTED RESOURCES IN WIRELESS, MOBILE AND SOCIAL NETWORKS Frank H.P. Fitzek Aalborg University, Denmark Marcos D. Katz University of Oulu, Finland

This edition first published 2014 C 2014 John Wiley & Sons, Ltd Registered office John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com. The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. It is sold on the understanding that the publisher is not engaged in rendering professional services and neither the publisher nor the author shall be liable for damages arising herefrom. If professional advice or other expert assistance is required, the services of a competent professional should be sought. Library of Congress Cataloging-in-Publication Data Fitzek, Frank H.P. Mobile clouds: exploiting distributed resources in wireless, mobile and social networks / Frank H.P. Fitzek, Marcos D. Katz. pages cm Includes bibliographical references and index. ISBN 978-0-470-97389-9 (hardback) 1. Cloud computing. 2. Mobile computing. I. Katz, Marcos D. II. Title. QA76.585.F58 2014 004.67 82 dc23 2013030750 A catalogue record for this book is available from the British Library. ISBN: 978-0-470-97389-9 Set in 10/13pt Times by Aptara Inc., New Delhi, India 1 2014

To Lilith and Samuel!

Contents Foreword Preface Acknowledgements Abbreviations xiii xv xxi xxiii Part One MOBILE CLOUDS: INTRODUCTION AND BACKGROUND 1 Motivation 3 1.1 Introduction 3 1.2 From Brick Phones to Smart Phones 5 1.3 Mobile Connectivity Evolution: From Single to Multiple Air Interface Devices 7 1.4 Network Evolution: The Need for Advanced Architectures 10 1.5 Conclusion 11 References 11 2 Mobile Clouds: An Introduction 13 2.1 Introduction 13 2.2 Mobile Cloud Definitions 15 2.2.1 Generic Mobile Cloud Definition 16 2.2.2 Mobile Cloud Definition Cooperative Cloud 17 2.2.3 Mobile Cloud Definition Resource Cloud 19 2.2.4 Mobile Cloud Definition Social Cloud 22 2.3 Cooperation and Cognition in Mobile Clouds 24 2.4 Mobile Cloud Classification and Associated Cooperation Approaches 27 2.5 Types of Cooperation and Incentives 29 2.5.1 Forced Cooperation/Self Cooperation 30 2.5.2 Altruistic Cooperation 31 2.5.3 Egoistic Cooperation 32

viii Contents 2.5.4 Social Cooperation 33 2.5.5 Embedded Technical Cooperation 33 2.6 Conclusion 33 References 35 3 Sharing Device Resources in Mobile Clouds 37 3.1 Introduction 37 3.2 Examples of Resource Sharing 39 3.3 Sharing Loudspeakers 40 3.4 Sharing Microphones 41 3.5 Sharing Image Sensors 42 3.6 Sharing Displays 44 3.7 Sharing General Purpose Sensors 46 3.8 Sharing Keyboards 46 3.9 Sharing Data Pipes 46 3.10 Sharing Mobile Apps 48 3.11 Sharing Mass Memory 48 3.12 Sharing Processing Units 49 3.13 Sharing Batteries 50 3.14 Conclusion 51 References 51 Part Two ENABLING TECHNOLOGIES FOR MOBILE CLOUDS 4 Wireless Communication Technologies 55 4.1 Introduction 55 4.2 Cellular Communications Systems 56 4.3 Short Range Technologies 58 4.3.1 Bluetooth 58 4.3.2 IEEE 802.11 60 4.4 Combined Air Interface 62 4.5 Building Mobile Clouds 64 4.6 Conclusion 65 References 66 5 Network Coding for Mobile Clouds 67 5.1 Introduction to Network Coding 67 5.2 Inter Flow Network Coding 68 5.3 Inter Flow Network Coding for User Cooperation in Mobile Clouds 73 5.3.1 Analog Network Coding 74

Contents ix 5.3.2 Comparison of Analog and Digital Network Coding 75 5.3.3 Impact of the Medium Access Control Strategy 76 5.4 Intra Flow Network Coding 78 5.5 Intra Flow Network Coding for User Cooperation in Mobile Clouds 80 5.5.1 Exchange and Seeding Information for Mobile Clouds 80 5.5.2 Distributed Storage in Mobile Clouds 83 5.5.3 Security, Privacy and Data Integrity in Mobile Clouds 89 5.6 Conclusion 91 References 91 6 Mobile Cloud Formation and Maintenance 93 6.1 Introduction 93 6.2 Mobile Cloud Stages 94 6.3 Service Discovery for Mobile Clouds 100 6.4 Conclusion 104 References 104 Part Three SOCIAL ASPECTS OF MOBILE CLOUDS 7 Cooperative Principles by Nature 107 7.1 Introduction 107 7.2 Cheetahs and Hyenas 108 7.3 Orca Killer Whales 109 7.4 Vampire Bats 109 7.5 Monkeys 110 7.6 Prisoner s Dilemma 110 7.7 Conclusion 115 References 115 8 Social Mobile Clouds 117 8.1 Introduction 117 8.2 Different Forms of Cooperation 118 8.3 Social Networks and Mobile Clouds 121 8.3.1 Evolution Phase I: Agnostic Era 122 8.3.2 Evolution Phase II: Mobile Networks Supporting Social Networks 122 8.3.3 Evolution Phase III: Deep Integration: Interplay of Social and Mobile Networks 124 8.4 Cooperation in Relaying Networks: A Simple Example 128 8.5 Conclusion 129 References 130

x Contents Part Four GREEN ASPECTS OF MOBILE CLOUDS 9 Green Mobile Clouds: Making Mobile Devices More Energy Efficient 133 9.1 Introduction 133 9.2 Cooperative Download 138 9.2.1 Energy Consumption for the Sequential Local Exchange (SLE) 142 9.2.2 Energy Consumption for the Parallel Local Exchange (PLE) 144 9.3 Cooperative Streaming 150 9.4 Comparison of the Different Approaches 153 9.5 Conclusion and Outlook 154 9.6 Energy Gain for the Network Operator 156 9.7 Conclusion 157 References 157 Part Five APPLICATION OF MOBILE CLOUDS 10 Mobile Clouds Applications 161 10.1 Introduction 161 10.2 Forced Cooperation Overlay Network 162 10.2.1 Crowd sourced Information by the Network Operators 163 10.2.2 Crowd sourced Information by the Manufacturers 164 10.2.3 Crowd sourced Information by the Mobile Apps 164 10.3 Technology enabled Cooperation Overlay Network 165 10.4 Socially enabled Cooperation Overlay Network 166 10.5 Altruism Overlay Network 167 10.6 Forced Cooperation Direct Mobile Cloud 167 10.7 Technically enabled Cooperation Direct Mobile Cloud 169 10.7.1 CoopLoc 170 10.7.2 Cooperative Access 173 10.8 Socially enabled Cooperation Direct Mobile Cloud 173 10.8.1 Sharing Internet Connections 173 10.8.2 Sharing Applications 174 10.9 Altruism: Direct Mobile Cloud 174 10.10 Industrial Activities 175 10.11 Conclusion 176 References 176 Part Six MOBILE CLOUDS: PROSPECTS AND CONCLUSIONS 11 Visions and Prospects 181 11.1 Some Insights on the Future Developments of Mobile Clouds 181 11.2 Mobile Clouds and Related Technology Developments 184

Contents xi 11.2.1 Internet of Things 184 11.2.2 Machine to Machine Communications 185 11.2.3 Device to Device Technology 186 11.3 Promising Novel Applications of Mobile Clouds 187 11.4 Resource Sharing as one of the Pillars of Social Interaction: the Birth of Shareconomy 189 References 192 Index 193

Foreword The penetration of mobile technology into our society in recent years is remarkable. It has enabled enormous levels of always available connectivity to the world s population with untold benefits and capabilities. This book on Mobile Clouds lays it all out. It is written at an easily accessible level for engineers, researchers and students without the burden of heavy mathematics, but rather with a superb descriptive approach that encourages full understanding of the key issues, the basic solutions, the advantages of those solutions, the direction in which the field is moving, and a presentation of its impact. This is a highly readable, intuitively pleasing and most enjoyable presentation of the emerging world of Mobile Clouds. The trajectory of the development of Mobile Clouds has been one of wireless communications leading to mobile telephony, which has evolved into always available voice and data access. The tremendous success of these technologies is placing severe strains on the underlying resources needed to continue the growth and deployment of new users, new applications, and new services. In response, as this book explains, there is a growing need for sharing of resources while at the same time improving the efficiency of spectrum use and energy consumption. The seeds for these improvements came from two parallel developments in the early history of mobile access, both beginning in the early 1970 s. One development is that with which the public is so familiar, namely, the rise of mobile voice access which led to the centralized point to point architecture of the network operator directly communicating with the mobile device. This led to the recognition that improved spectrum and energy efficiency would result from the introduction of smaller and smaller cell sites. The other development, far less familiar to the public, is the study of the distributed architecture of multi hop mesh network communications in which each node became a part of what we now recognize as the Mobile Cloud. There is great promise now in the growth of a hybrid distributed/centralized architecture, which exploits the best of both architectures. In this architecture, the technology of network coding plays a valuable role and, true to their form, the authors provide a lucid and intuitive description in a full Chapter devoted to this important topic. Rounding out this work, the application of mobile clouds focuses on various forms of cooperation in social networks, such networks serving as an important driver of Mobile Cloud growth. As we move into the future, we are then introduced to the growth of traffic due