A Brief History of Cloud Offload a Personal Journey from Odyssey Through Cyber Foraging to Cloudlets
Total Page:16
File Type:pdf, Size:1020Kb
[RETROSPECTIVE] Mahadev Satyanarayanan Carnegie Mellon University Editor: Carla Schlatter Ellis A BRIEF HISTORY OF CLOUD OFFLOAD A Personal Journey from Odyssey Through Cyber Foraging to Cloudlets very time you use a voice command also relevant to the concept of cloudlets [18] is identified as a key long-term constraint of on your smartphone, you are that has emerged as an important theme mobile computing. To quote verbatim from benefitting from a technique called in mobile-cloud convergence. Reflecting that piece entitled “Mobile Computing” [15]: Ecloud offload.Your speech is captured my participation in this evolution from its by a microphone, pre-processed, then sent origins, this article is a personal account of Mobile elements are resource-poor over a wireless network to a cloud service the key developments in this research area. relative to static elements. Regardless that converts speech to text. The result is It focuses on mobile computing, of future technological advances, a then forwarded to another cloud service or ignoring many other uses of remote mobile unit’s weight, power, size, and sent back to your mobile device, depending execution since the 1980s such as ergonomics will always render it less on the application. Speech recognition distributed processing, query processing, computationally capable than its static and many other resource-intensive mobile distributed object systems, and distributed counterpart. While mobile elements services require cloud offload. Otherwise, partitioning. will undoubtedly improve in absolute the service would be too slow and drain too ability, they will always be at a relative much of your battery. At the Dawn of Mobile Computing disadvantage. Research projects on cloud offload In 1993, the editor of the “Hot Topics” are hot today, with MAUI [4] in 2010, department of IEEE Computer invited me Later, in 1995, I made this same point Odessa [13] and CloneCloud [2] in 2011, to write a short thought piece on the brand in a keynote talk entitled “Fundamental and COMET [8] in 2012. These build on new topic of mobile computing that was Challenges of Mobile Computing,” to the a rich heritage of work dating back to just starting to emerge. To the best of my ACM Principles of Distributed Systems the mid-1990s on a theme that is broadly knowledge this is the first place where the Conference. An invited paper based on this characterized as cyber foraging. They are inherent resource poverty of mobile devices talk was published in the following year’s OCTOBER 2014 | Volume 18, Issue 4 GetMobile 19 [RETROSPECTIVE] conference proceedings [16] and has been FIGURE 1: Evolution of Hardware Performance widely cited since. In the 20+ years since that prediction Typical Server Typical Handheld was made, it has remained consistently or Wearable true. Figure 1 from Flinn [5] illustrates Year Processor Speed Device Speed the consistent large gap in the processing 1997 Pentium® II 266 MHz Palm Pilot 16 MHz power of typical server and mobile device 2002 Itanium® 1 GHz Blackberry 133 MHz hardware over a 16-year period. This 5810 stubborn gap reflects a fundamental reality of user preferences. The most sought- after 2007 Intel® 9.6 GHz Apple 412 MHz CoreTM 2 (4 cores) iPhone features of a mobile device are light weight, small size, and long battery life. By using 2011 Intel® 32 GHz Samsung 2.4 GHz remote execution on static infrastructure Xeon® X5 (2x6 cores) Galaxy S2 (2 cores) that does not suffer from these constraints, 2013 Intel® 64 GHz Samsung 6.4 GHz the mobile device can overcome its Xeon® E5 (2x12 cores) Galaxy S4 (4 cores) computational limitations. Google Glass 2.4 GHz OMAP 4430 (2 cores) A Decade of Exploration We began exploring remote execution for (Source: adapted from Flinn [5]) mobile computing in the context of the Odyssey system. As described in 1997 by Noble et al [12], the Janus speech recognition application was modified to operate in one of Vision and Challenges” [17] suggested envisioned in this article encompassed both three modes in Odyssey. One mode involved many research directions that have remote execution and the staging of data strictly local execution. The second mode since proved fruitful. Abstracting and nearby. The data staging concept was later involved strictly remote execution: the speech generalizing from the work on remote expanded by Flinn et al [7]. Today’s content signal captured on the mobile client was execution, it emphasized the enduring delivery networks (CDNs) can be viewed shipped to a remote server for recognition, problem of resource poverty of mobile as implementing a form of data staging. and the transcribed text was shipped back. devices and suggested that leveraging The work on fluid replication by Noble The third mode was hybrid: a preliminary nearby resources in a principled way might et al [11, 3] is related to the concept of phase of speech processing was done locally, be the best approach to addressing this cyber foraging for data, and the associated and the extracted information was shipped problem. I used the metaphor of foraging infrastructure concept of WayStations can to a remote server for the completion of the for food in the wild: be viewed as similar to surrogates. recognition process. An important attribute The period from 2001-2008 saw vigorous of this implementation was Odyssey’s ability Cyber foraging, construed as “living off research activity in this space. A detailed to dynamically select the optimal execution the land”, may be an effective way to account of these efforts is provided in the mode based on runtime factors such as deal with this problem. The idea is to excellent survey by Flinn [5]. current network bandwidth. Odyssey was dynamically augment the computing thus the technical forerunner of today’s resources of a wireless mobile The Cloud Appears mobile speech-to-text systems such as Siri, as computer by exploiting wired hardware A nagging question from the very well as the recent mechanisms for adaptive infrastructure. beginning that had never been satisfactorily cloud offload that were mentioned at the … answered was who would provide the beginning of the paper. When hardware in the wired infrastructure for cyber foraging? How Rudenko et al [14] were the first to infrastructure plays this role, we call it would trustworthy hardware for remote suggest that remote execution could a surrogate of the mobile computer it is execution be dispersed in the environment? extend battery life on mobile devices, and temporarily assisting. How would mobile devices discover them? to provide experimental evidence for this What business incentives would there be to claim. At about the same time, Flinn [6] Implicit in the foraging metaphor is the deploy and maintain such infrastructure? extended Odyssey to support energy- notion of “nearby” resources. It seemed The emergence of cloud computing aware adaptation and showed that remote obvious that low latency and high bandwidth circa 2008 suddenly clarified these issues. execution could indeed save energy in the to the remote execution site was essential. Independent of mobile computing Janus speech recognition application. However, the paper did not explicitly discuss considerations, companies like Amazon In 2001, I was invited to write an article proximity as an important criteria. This were making computing resources that for an IEEE Personal Communications turned out to have unexpected consequences could be used for transient purposes special issue on pervasive computing. This some years later, as described below. It is available on the Internet. There was now article, entitled “Pervasive Computing: important to note that cyber foraging as a business model and hence incentive for 20 GetMobile OCTOBER 2014 | Volume 18, Issue 4 [RETROSPECTIVE] deploying and maintaining hardware for remote execution. The emergence of Apple’s cloud-based Siri speech recognition service both validated the remote execution concept for mobile devices at commercial scale, and simultaneously offered a viable deployment model. “In the cloud,” was the obvious answer to the question, “Where should remote execution be performed?” In industry and in academia, the imminent convergence of mobile computing and cloud computing was heralded. Alas, that celebration was premature. The economics of cloud computing strongly favor the centralization of infrastructure into a few large data centers. It is through economies of scale in operations and system administration that cloud computing wins. Unfortunately, global consolidation implies large average separation between a mobile device and its cloud. End-to-end communication then involves many network hops and results in FIGURE 2. Two-Level Cloud-Cloudlet Architecture high latencies. From the beginning, I had implicitly assumed low latency and high bandwidth between mobile device and remote execution site. But by early 2008, I realized that my implicit assumption of the need for a two-level architecture for similar to replacing a networking element “nearby” in framing the cyber foraging mobile-cloud convergence. such as router. We described the cloudlet concept was a mistake. I should have made Figure 2 illustrates this architecture. concept in a paper that has proved to explicit the importance of proximity. The first level is today’s unmodified cloud highly influential, receiving more than 550 Discussions with a number of senior infrastructure. The second level consists citations in less than five years [18]. Cisco’s researchers in mobile computing at the of dispersed