<<

Mobile Computing at the Edge

Grace A. Lewis Software Engineering Institute Carnegie Mellon University [email protected]

Software Technology Conference (STC 2015) October 14, 2015

© 2015 Carnegie Mellon University Trends

Smartphones, tablets, and now , have become for many the preferred way of interacting with the Internet, social media and the enterprise • Mobile devices are increasingly becoming the first go- to device for communications and content consumption [1] [5] [8] • Number of mobile devices will surpass desktops for the first time this year [9] • The time people spend using their is now exceeding the time spent looking at TV screens [3] • Not uncommon for there to be multiple mobile devices per user and household [7] • Wearable technology is showing a consistent increase in popularity [2]

Organizations are pushing out more and more content and functionality to mobile users

Mobile Computing at the Edge STC 2015 2 © 2015 Carnegie Mellon University Mobile Traffic Will Keep Increasing

By the end of 2015, LTE data use will rise by 59% and mobile video will account for 60% of data traffic [4] Source: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2014–2019 White Paper [15]

Wearables market will grow five-fold in the next five years from 109 million devices in 2014 to 578 million devices by 2019. This will result in an 18-fold increase in mobile data traffic [15]

Mobile Computing at the Edge STC 2015 3 © 2015 Carnegie Mellon University (IoT): More Than Just “Things”

4.9 billion connected things will be in use in 2015, up 30 percent from 2014, and will reach 25 billion by 2020 [12]

99 percent of physical objects will eventually become part of a network[13] Permission for diagram use by Carnegie Mellon University consistent with its status as a non-profit University for any purpose the institution sees fit by Matt Ceniceros, @mattceni, mattceni.com

Mobile Computing at the Edge STC 2015 4 © 2015 Carnegie Mellon University The 3Vs of Data: Volume, Velocity and Variety

New Vs: Veracity, Validity, Volatility, Visualization, Vulnerability and Value [14]

What to do with all the data? How does it change business processes and business models?

Permission for diagram use by Carnegie Mellon University consistent with its status as a non-profit University for any purpose the institution sees fit by Amy Allen, www.qmee.com

Mobile Computing at the Edge STC 2015 5 © 2015 Carnegie Mellon University Top Jobs in the Next 7 Years According to Gartner [25]

Integration Specialists

Digital Business Architects

Regulatory Analysts

Risk Professionals

Mobile Computing at the Edge STC 2015 6 © 2015 Carnegie Mellon University Smartphone Penetration

Source: KPCB. 2015 Internet Trends. http://www.kpcb.com/internet-trends [6]

Mobile Computing at the Edge STC 2015 7 © 2015 Carnegie Mellon University Low-Cost

By 2020, 75 Some low-cost percent of smartphones are smartphone expected to reach buyers will pay approximately $35 less than $100 unsubsidized by for a device [1] year-end 2014 [1]

As an example, ZTE manufactures several low-end smartphones under $50 and is quickly gaining market share globally [16]

Mobile Computing at the Edge STC 2015 8 © 2015 Carnegie Mellon University Therefore …

Not unreasonable for users to expect the performance and capabilities of mobile devices to be equal to and desktops However … • Mobile devices will always lag behind their PC counterparts due to size and battery limitations • Large and variable end-to-end latency between mobile device and cloud, and the possibility of disruptions, have a negative effect on user experience • Will only get worse with the amount of network traffic generated by IoT and growing market share of low-cost smartphones

Mobile Computing at the Edge STC 2015 9 © 2015 Carnegie Mellon University Edge Computing

Idea is to push applications, data and computing power to the logical extremes of a network — closer to where they are being used • As an example, Akamai has servers around the world to distribute web site content from locations close to the user

Cyber-foraging moves the edge even closer to the user

Mobile Computing at the Edge STC 2015 10 © 2015 Carnegie Mellon University Cyber-Foraging

Leverage of external resource-rich surrogates to augment the capabilities of resource-limited devices • Computation Offload – Offload of expensive computation in order to extend battery life and increase computational capability • Data Staging – Improve data transfers between mobile and the cloud by Nokia Siemens Networks temporarily staging data in transit on Liquid Applications intermediate surrogates Industry is starting to build on this concept to improve mobile user experience and decrease network traffic [10] [11] Cisco Systems Fog Computing

Mobile Computing at the Edge STC 2015 11 © 2015 Carnegie Mellon University Cyber-Foraging to Proximate and Remote Resources

If we assume that

tsurrogate is less than tcloud, proximate surrogates are a better option from an energy consumption and latency perspective

Mobile Computing at the Edge STC 2015 12 © 2015 Carnegie Mellon University Cyber-Foraging: The Present Forward-deployed surrogates located in single-hop proximity of mobile devices • Communication with the central core in many cases is only needed for provisioning Goal is to bring the cloud closer to the user

Mobile Computing at the Edge STC 2015 13 © 2015 Carnegie Mellon University Computation Offload (Short Operations)

Computation-intensive operations which if executed on a mobile device would take in the order of tens of seconds, but if offloaded could improve response time considerably Typically request-response, synchronous operations • Image, audio and video processing • Face detection and recognition PowerSense: Image Processing for Dengue Detection [17] • Speech recognition • Speech translation PowerSense • Antivirus/Anti- Features • Gaming (typically AI-based) • User-Guided Systems can make runtime decisions on Runtime whether or not to offload computation Partitioning PowerSense leverages • Resource- • Equivalent code on mobile device and Microfluidic paper-based surrogate analytical devices (μPADs) [17] Adapted Input

Mobile Computing at the Edge STC 2015 14 © 2015 Carnegie Mellon University Computation Offload (Long Operations)

Computation-intensive operations 3DMA Features [18] which if executed on a mobile device would take minutes to hours, but if • Offload requests are placed in a offloaded could improve response space, processed on the surrogate, and results placed in time considerably the same space. Typically asynchronous operations to • When a device becomes avoid blocking the application disconnected, it waits until a connection is restored, and then • Service-based applications reads all available messages • Workflow-based applications (results) from the space • Search-based applications Mobile device may lose contact with a surrogate before the operation finishes • Caching data until the mobile device is reconnected • Alternative communication mechanisms to reach the mobile device

Mobile Computing at the Edge STC 2015 15 © 2015 Carnegie Mellon University Low Coverage Environments

Resource-challenged environments: Less-privileged regions characterized by limited Internet access, limited electricity and network access, and potentially low levels of literacy can leverage surrogates to obtain information to support their communities Field operations: People that spend time away from their main offices or labs, such as researchers, medics, and sales personnel, can leverage portable surrogates to support their computation and data needs AgroTempus Features [18] • Surrogates in villages download and cache data from mobile hub • Surrogates upload field- collected data to the mobile hub which eventually syncs with the cloud AgroTempus: Agricultural Knowledge Exchange in Resource- Challenged Environments [19]

Mobile Computing at the Edge STC 2015 16 © 2015 Carnegie Mellon University Hostile Environments

Characterized by very dynamic environments in which disconnected operations (or occasionally- connected operations) between surrogates and the cloud, and between mobile devices and surrogates, are highly likely Tactical Cloudlet Packaged [19] Capabilities Central Core Data Features (Service (Enterprise Cloud) Sources VMs) • Pre-Provisioned Cloudlets with App Low-bandwidth, High-bandwidth, intermittent connection stable connection Store for opportunistic data for pre-provisioning synchronization • Standard Packaging of Service VMs

Deployment in • Optimal Cloudlet the field Selection

Tactical Cloudlet Tactical Cloudlet • Cloudlet Management Single-Hop Component Network Tactical Cloudlets [19] • Cloudlet Handoff/Migration Mobile Devices

Mobile Computing at the Edge STC 2015 17 © 2015 Carnegie Mellon University Data-Intensive Mobile Apps 1

Mobile device specifies Rely on large sets of data to interest in changes to specific provide their functionality — parts of web pages data typically resides in data Surrogate polls the web centers or in the enterprise servers involved, and if relevant changes have cloud occurred, it aggregates the • Mobile cloud applications updates as one batch that is sent to the mobile device • Online gaming Edge Proxy: Web Page [20] • Apps in data-rich domains Monitoring Design goals Edge Proxy Features [20] • Display of prioritized/relevant • In-Bound Pre-Processing: Mobile device is information only notified of changes • Query efficiency • Alternate Communications (SMS): if connection to mobile device is lost, the system uses SMS to notify changes — based on the summary the user can decide to visit or not the web page

Mobile Computing at the Edge STC 2015 18 © 2015 Carnegie Mellon University Data-Intensive Mobile Apps 2

Telemedik Features [21] • Context-sensitive priority-based text fragmentation algorithm to determine when and what information to display to the user • Dynamic generation of a hierarchical view of relevant information based on medical domain knowledge • Offload of image processing and manipulation

Telemedik: Mobile healthcare system [21] • Pre-Fetching: stage data on surrogate that is likely to be used by applications based on usage patterns or data alerts

Mobile Computing at the Edge STC 2015 19 © 2015 Carnegie Mellon University Sensing Applications

Perform context, environmental or urban sensing using on-board or GigaSight Features [22] connected sensors — send data to • Surrogate collects first-person surrogates as these become available video from many contributors • Context-aware applications • Surrogate provides video • Healthcare denaturing capability for privacy (user-specific lowering of fidelity) • Intelligent transport systems and video indexing • • Only video metadata is stored in • Environmental monitoring a searchable global catalog in the • Participatory sensing (Crowdsensing) cloud

GigaSight: Scalable Crowd-Sourcing of Video from Mobile Devices [22]

Mobile Computing at the Edge STC 2015 20 © 2015 Carnegie Mellon University What is Common in the Examples of Cyber- Foraging in the Present?

The same individual/organization owns the mobile device and the surrogate Advantage = Control • Deployment • Provisioning • Privacy • Security • … However … the future of cyber- foraging involves surrogates not necessarily owned by the mobile devices that use them

Mobile Computing at the Edge STC 2015 21 © 2015 Carnegie Mellon University Cyber-Foraging: The Future

Vision: Rich sensing and interaction capabilities of mobile devices seamlessly fused with compute- intensive and data-intensive processing on readily-available surrogates Challenges • Seamless mobility and execution • Disconnected operations • Multi-platform development and management • Trusted nodes • Software licensing and business models • Privacy

Mobile Computing at the Edge STC 2015 22 © 2015 Carnegie Mellon University Seamless Mobility and Execution

Mobile applications that leverage cyber-foraging need capabilities to • Discover surrogates • Automatically offload computation and data If a mobile device loses contact with a surrogate it will have to seamlessly fall back to local execution • Requires very careful design of state transfer and management between mobile devices and surrogates or even between multiple surrogates

Mobile Computing at the Edge STC 2015 23 © 2015 Carnegie Mellon University Disconnected Operations

Mobile devices are not always going to be connected to a surrogate Surrogate-ready mobile apps should make their best attempt to work completely disconnected from a surrogate and sync when one becomes available • Caching • Automatic data synchronization capabilities • Pre-fetching

Mobile Computing at the Edge STC 2015 24 © 2015 Carnegie Mellon University Multi-Platform Development and Management

Surrogates have to be pre-provisioned with applications and content that adapt to multiple mobile devices App and content developers have to consider • Multiple devices with different processing power and screen sizes • Different processing capabilities depending on input and output types and sizes

Mobile Computing at the Edge STC 2015 25 © 2015 Carnegie Mellon University Trusted Nodes

Mutual trust • A mobile device needs to know if it can trust a surrogate • A surrogate needs to know if it can trust a mobile device Distributed trust is a very difficult problem • Key and password management • Revocation

Mobile Computing at the Edge STC 2015 26 © 2015 Carnegie Mellon University Software Licensing and Business Models

Requires creating incentives for • Surrogate providers • Content providers • Network providers • Mobile device manufacturers • Mobile carriers • End users

Which brings us to the next issue: Privacy

Mobile Computing at the Edge STC 2015 27 © 2015 Carnegie Mellon University Privacy

Business model would enable the surrogate provider control of, and access to, data sent by content providers to the device and data generated by connected applications • Surrogate providers would have very valuable information about user interests and preferences How far and how much to share? • Example: User — home — neighborhood — … — cloud Challenge will be the balance between user privacy preferences and requirements set by surrogate providers to host content The Joneses (2009)

Mobile Computing at the Edge STC 2015 28 © 2015 Carnegie Mellon University This Future Is Not Too Far Away

Many of the 5-10 year out technologies on Gartner’s most recent Hype Cycle for Emerging Technologies require highly computation- intensive activities that people are going to want to have on their mobile devices

• Natural language question answering • Smart advisors • Connected home • Affective computing • People-literate technology Source: Gartner, Hype Cycle for Emerging Technologies, 2015 • Virtual personal assistants

Mobile Computing at the Edge STC 2015 29 © 2015 Carnegie Mellon University Summary

With increasing number of mobile devices and users, increased network traffic cause by IoT, and increasing complexity of user experience, cyber-foraging will become a standard feature of mobile applications Requires mobile applications and infrastructures to be architected and designed to adapt to a changing environment in which resources with greater computing power are discovered and used opportunistically While the benefits in terms of mobile user experience and new business opportunities are huge, it requires a different paradigm in mobile systems and software engineering

Mobile Computing at the Edge STC 2015 30 © 2015 Carnegie Mellon University Contact Information

Grace A. Lewis Advanced Mobile Systems (AMS) Initiative

Software Engineering Institute 4500 Fifth Avenue Pittsburgh, PA 15213-2612 USA

Phone: +1 412-268-5851 Email: [email protected] WWW: http://www.sei.cmu.edu/staff/glewis/

Mobile Computing at the Edge STC 2015 31 © 2015 Carnegie Mellon University References

[1] Gartner. Gartner Says By 2018, More Than 50 Percent of Users Will Use a Tablet or Smartphone First for All Online Activities. http://www.gartner.com/newsroom/id/2939217 (2015) [2] mobiForge. Mobile Hardware Statistics 2015. https://mobiforge.com/research-analysis/mobile-hardware-statistics- 2015 (2015) [3] mobiForge. Mobile User Behavior Statistics 2015. https://mobiforge.com/research-analysis/mobile-user-behaviour- statistics-2015 (2015) [4] mobiForge. Mobile Network Statistics 2015. https://mobiforge.com/research-analysis/mobile-networks-statistics- 2015-0 (2015) [5] comScore. Number of Mobile-Only Internet Users Now Exceeds Desktop-Only in the U.S. http://www.comscore.com/Insights/Blog/Number-of-Mobile-Only-Internet-Users-Now-Exceeds-Desktop-Only-in-the- U.S (2015) [6] KPCB. Internet Trends 2015. (2015) [7] GfK. Tech Trends 2015. http://www.gfk.com/Documents/GfK-TechTrends-2015.pdf (2015) [8] CTIA. Quick Facts. http://www.ctia.org/your-wireless-life/how-wireless-works/wireless-quick-facts (2015) [9] Baseline. Nine Mobility Trends You Must in 2015. http://www.baselinemag.com/mobility/slideshows/nine- mobility-trends-you-must-watch-in-2015.html (2015) [10] Nokia. Liquid Applications. http://networks.nokia.com/fr/portfolio/liquid-net/intelligent-broadband-management/liquid- applications (2015) [11] Cisco. Fog Computing. https://techradar.cisco.com/trends/Fog-Computing (2015) [12] Gartner. Gartner Says 4.9 Billion Connected "Things" Will Be in Use in 2015. http://www.gartner.com/newsroom/id/2905717 (2015) [13] Baseline. Six Top Tech Trends to Watch in 2014. http://www.baselinemag.com/innovation/six-top-tech-trends-to- watch-in-2014-2.html/#sthash.dFWvTRaw.dpuf (2015) [14] Farroha, B.S.; Farroha, D.L., "A Framework for Managing Mission Needs, Compliance, and Trust in the DevOps Environment," in Military Communications Conference (MILCOM), 2014 IEEE , vol., no., pp.288-293, 6-8 Oct. 2014

Mobile Computing at the Edge STC 2015 32 © 2015 Carnegie Mellon University References

[15] Cisco. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2014–2019 White Paper. http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_c11- 520862.html (2015) [16] Bloomberg. The Cheap Phones Quietly Winning the U.S. http://www.bloomberg.com/news/articles/2015-09-03/zte- s-cheap-phones-quietly-winning-the-u-s- (2015) [17] Matthews, Jerrid, et al. "PowerSense: power aware dengue diagnosis on mobile phones." Proceedings of the First ACM Workshop on Mobile Systems, Applications, and Services for Healthcare. ACM, 2011. [18] Fjellheim, Tore, Stephen Milliner, and Marlon Dumas. "Middleware support for mobile applications." International Journal of Pervasive Computing and Communications 1.2 (2005): 75-88. [19] Brion, Reuel. Demonstrator for a Cyber-Foraging System to Support Agricultural Knowledge Exchange in Resource- challenged Environments. Masters Thesis. VU University Amsterdam. 2015. [20] Armstrong, Trevor, et al. "Efficient and transparent dynamic content updates for mobile clients." Proceedings of the 4th international conference on Mobile systems, applications and services. ACM, 2006. [21] Kundu, Suman, et al. "Algorithms and heuristics for efficient medical information display in PDA." Computers in Biology and Medicine 37.9 (2007): 1272-1282. [22] Simoens, Pieter, et al. "Scalable crowd-sourcing of video from mobile devices." Proceeding of the 11th annual international conference on Mobile systems, applications, and services. ACM, 2013. [23] Gartner. Gartner Says Digital Business Economy is Resulting in Every Business Unit Becoming a Technology Startup. http://www.gartner.com/newsroom/id/2865519 (2015)

Mobile Computing at the Edge STC 2015 33 © 2015 Carnegie Mellon University Copyright 2015 Carnegie Mellon University and IEEE

This material is based upon work funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center.

NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.

This material has been approved for public release and unlimited distribution.

This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at [email protected].

DM-0002864

Mobile Computing at the Edge STC 2015 34 © 2015 Carnegie Mellon University