<<

Mobile Computing: the Next Decade

Mahadev Satyanarayanan School of Carnegie Mellon University

1 Introduction sponsible adults in the group, they are fine with John walking over to see his friends. An hour later, John’s “Information at your fingertips anywhere, anytime” parents walk over to where they expect to find him. has been the driving vision of mobile computing for To their shock, they discover that the friends have not the past two decades. Through relentless pursuit of seen John at all. He has been missing for an entire this vision, spurring innovations in technol- hour now, and John’s parents are very concerned. ogy, energy-efficient portable hardware and adaptive Searching for a lost child in a Manhanttan crowd is software, we have now largely attained this goal. a daunting task. Ubiquitous email and Web access is a reality that is Fortunately, a police officer nearby is able to send experienced by millions of users worldwide through out an amber alert via text message to all smart- their BlackBerries, iPhones, Windows Mobile, and phone users within two miles. He requests them to other portable devices. Continuing on this road, mo- upload all photographs they may have taken in the bile Web-based services and location-aware adver- past hour to a secure web site that only the police can tising opportunities have begun to appear, triggering view. In a matter of minutes, the web site is populated large commercial investments. Mobile computing with many photographs. New photographs continue has arrived as a lucrative business proposition. to arrive as more people respond to the amber alert. What will inspire our research in mobile comput- ing over the next decade and beyond? We begin by With John’s parents helping him, the police officer considering two hypothetical mobile computing sce- searches these photographs with an application on narios from the future. We then extract the deep as- his . His search is for the red plaid shirt sumptions implicit in these scenarios, and use them that John was wearing. After a few pictures of Scot- to speculate on the future trajectory of mobile com- tish kilts in the parade, a picture appears that thrills puting. We conclude that there are really two fun- John’s parents. In a corner of that picture, barely damentally distinct strategies at play, and that the di- visible, is a small boy in a red shirt sitting on the alectic between these strategies will largely shape the steps of a building. The police officer recognizes the mobile computing landscape of the future. building as being just two blocks further down the parade route, and contacts one of his fellow officers 2 Scenario 1: Lost Child who is closer to that location. Within moments, the officer is with the boy. John is safe now, but he has a Five-year old John is having a wonderful time with lot of explaining to do ... his family at the Macy’s Thanksgiving Day parade in Manhattan. Mid-way through the parade, John sees a group of friends in the crowd nearby. He shows 3 Scenario 2: Disaster Relief his parents where his friends are, and tells them he The Big One, measuring 9.1 on the Richter scale, is going over to meet them. Since his parents see re- has just hit Northern California. The entire Bay Area is one seething mass of humanity in anguish. Many highways, power cables and communication lines are severely damaged. Disaster on such a scale has not been seen since World War II. With limited manpower, unreliable communication and marginal transportation, disaster relief personnel are stretched to the limit. Internet infrastructure, in-

1 cluding many key data centers, have been destroyed. mobile devices as rich sensors. While their comput- The Googleplex has been reduced to a smoking hulk. ing and communicaton roles continue to be impor- In spite of heroic efforts, disaster relief is painfully tant, it is their rich sensing role (image capture) that slow and hopelessly inadequate relative to the scale stands out most prominently in these scenarios. We of destruction. use the term “rich” to connote the depth and com- Sudden obsolescence of information regarding ter- plexity about the real world that is being captured. rain and buildings is a major contributor to slow re- This is in contrast to simple scalar data such as tem- sponse. Vital sources of knowledge such as maps, perature, time and location that are involved in typ- surveys, photographs, building floor plans, and so on ical sensor network applications. When cell phones are no longer valid. Major highways on a map are with integrated cameras first appeared, people won- no longer usable. Bridges, buildings, and landmarks dered if they represented a solution in search of a have collapsed. GoogleEarth and GoogleMaps are problem. Would mobile users take so many pho- now useless for this reqion. Even the physical topog- tographs that this capability was worth supporting? raphy of an affected area may be severely changed. Today, the value of this functionality is no longer Conducting search and rescue missions in the face of questioned. Tomorrow the roles will be reversed: obsolete information is difficult and dangerous. New people will wonder why any digital camera lacks the knowledge of terrain and buildings has to be recon- wireless capability to transmit its images. Video cap- structed from scratch at sufficient resolution to make ture, leading to even richer sensing and recording of important life and death decisions in search and res- the real world is also likely to gain traction. cue missions. A second emergent theme is that of near-real-time In desperation, the rescue effort turns to an emerg- data consistency. This is most apparent in the lost ing technology: camera-based GigaPan sensing. Us- child scenario, where the only useful images are very ing off-the-shelf consumer-grade cameras in smart- recent ones. Pictures taken before the child was lost phones, local citizens take hundreds of close-up im- are useless in this context. Recency of data is also ages of disaster scenes. Transmission of these im- important in the disaster relief scenario. A major ages sometimes occurs via spotty low-grade wireless earthquake is often followed by aftershocks for hours communication; more often, the images are physi- or possibly days. These aftershocks can add to the cally transported by citizens or rescue workers. The damage caused by the original quake, and in some captured images are then stitched together into a cases be the “tipping point” that triggers major struc- zoomable panorama using compute-intensive vision tural and topographical changes. Regions that have algorithms. To speed up the process, small GigaPan already been mapped after the original quake may robots that can systematically photograph a scene need to be remapped. The need for near-real-time with hundreds of close-up images are air-dropped data consistency forces rethinking of a long line of over the area for use by citizens. work in mobile computing that relates to the use of Slowly and painstakingly, detailed maps and to- prefetching and hoarding for failure resiliency. The pographical overlays are constructed bottom-up. As core concepts behind those techniques may still be they become available, rescue efforts for those ar- valuable, but major changes in their implementations eas are sped up and become more effective. Rescu- may have to be developed in order to apply them to ing trapped people is still dangerous, but at least the the new context. In the disaster relief scenario, for search teams are now armed with accurate informa- example, many old maps and photographs may still tion that gives them a fighting chance ... be valid if the buildings and terrain involved have only been minimally affected. However, discover- 4 Reflecting on these Scenarios ing whether it is acceptable to use hoarded informa- tion about them is a challenge. No central authority These scenarios embody a number of themes that (e.g. a ) can answer this question with confi- will be central to the evolution of mobile computing dence. Only an on-the-spot entity (e.g. a user with over the next decade. We explore these themes next. a ) can assess whether current reality Common to both scenarios is the prominent role of is close enough to old data for safe reuse. That de-

2 (a) Panorama (b) Full Zoom Figure 1: GigaPan Image of Hanuama Bay, Hawaii (May 19, 2008)

(a) Panorama (b) Full Zoom Figure 2: GigaPan Image of Downtown Port Au Prince, Haiti (January 29, 2010) termination may involve human judgement, possibly our definition of “mobile computing” to embrace de- assisted by software (e.g. a program that compares velopments that lie well outside our narrow histori- two images to estimate disruption). cal concerns. Examples include non-indexed image A third emergent theme is that of opportunism. search in the lost child scenario and GigaPan tech- This is most evident in the lost child scenario. The nology in the disaster relief scenario. These may feel users who contribute pictures were completely un- like science fiction, but they are reality today. aware of their potential use in searching for the lost child. They took the pictures for some other reason, For example, consider GigaPan technology. Fig- such as a funny float in the parade. But because of ure 1(a) shows a 5.6 gigapixel panorama that has the richness of the sensed data, there are potentially been stitched together from 378 individual images “uninteresting” aspects of the image (e.g. small child captured with a consumer-grade digital camera. The in the corner of the picture) that prove to be very im- software available for navigating such an image al- portant in hindsight — it is context that determines lows a user to probe the panorama at very high zoom importance. Although the theme of opportunism also levels, much like GoogleEarth. This image, and applies to simpler sensed data (e.g., anti-lock brak- many others, can be explored at the GigaPan web ing devices on cars transmit their GPS coordinates on site (http://www.gigapan.org) [5]. The level of de- each activation, enabling a dynamic picture of slick tail can be astonishing. For example, Figure 1(b) spots on roads to be obtained by maintenance crews), shows a legible warning sign at a lifeguard station. the richness of captured data greatly increases the In Figure 1(a), the entire lifeguard station is barely chances for opportunistic reuse. An airport video visible as a speck on the distant beach. Figure 2(a) image that was deemed uninteresting on 9/10/2001 is relevant to the disaster relief scenario. It shows a may prove to be of high interest two days later be- panorama stitched together from 225 individual im- cause it includes the face of a 9/11 hijacker. With ages of downtown Port Au Prince, Haiti that were such opportunism comes, of course, many deep and taken by a news reporter who was covering the earth- difficult questions pertaining to privacy. While these quake relief effort. These images were stitched to- questions already exist today with mining data from gether after the reporter’s return to the United States, surveillance cameras, they will grow in frequency since the stitching capability was not available at the and significance as mobile users increasingly con- disaster site. Figure 2(b) shows a zoomed-in view of tribute their rich sensed data. One can easily imag- damaged electrical infrastructure, including the ID ine a business model that provides small rewards for number of the tower that has been destroyed. Imag- contributors of such data, while reaping large profits ine how valuable this sensing and mapping capability by mining aggregated data for customers. would be if it were available at large scale at a disas- A final emergent theme is the need to broaden ter site, very soon after the disaster strikes.

3 Cloudlet Cloud State Only soft state Hard and soft state Management Self-managed; little to Professionally adminis- Olympus no professional atten- tered, 24x7 operator Mobile Eye Trek Wearable tion Computer Environment “Datacenter in a box” Machine room with power at business premises conditioning and cooling Distant cloud Android Low-latency Ownership Decentralized owner- Centralized ownership by Phone on Internet high-bandwidth ship by local business Amazon, Yahoo!, etc. wireless network Nokia N810 Network LAN la- Internet latency/bandwidth Tablet tency/bandwidth Coffee shop Handtalk Cloudlet Sharing Few users at a time 100s-1000s of users at a Wearable Glove time (a) Cloudlet Concept (b) Key Differences: Cloudlet vs. Cloud Figure 3: Extending the Classic 2-level Mobile Computing Architecture to 3 Levels

5 Transient Infrastructure setup. This simplicity of management corresponds to an appliance model of computing resources, and Since birth, mobile computing has implicitly as- makes it trivial to deploy. For safe deployment in sumed a 2-level hierarchy. Originally, the two lev- unmonitored areas, the cloudlet may be packaged in els were identified as “servers” and “clients.” More a tamper-resistant or tamper-evident enclosure with recent terminology uses “cloud” to connote the com- third-party remote monitoring of hardware integrity. putational and information resources represented by a collection of servers. Regardless of terminology, Figure 3(b) summarizes some of the key differ- however, the 2-level concept is woven quite deeply ences between cloudlets and clouds. Most impor- into our thinking about mobile computing. The up- tantly, a cloudlet only contains soft state such as per layer (“cloud” or “server”) is assumed to be well- cache copies of data or code that is available else- managed, trusted by the lower layer, and free from where. Loss or destruction of a cloudlet is hence not concerns that are specific to mobility such as battery catastrophic. This stateless model leads to an im- life and size/weight constraints. portant research challenge: how can a mobile device Future architectures for mobile computing are rapidly and safely customize a cloudlet for its spe- likely to extend this 2-level hierarchy to at least one cific use? A possible solution, based on dynamic vir- additional layer, possibly more. The case for an in- tual machine synthesis, is sketched in [3]. Other termediate layer called a cloudlet was articulated in approaches may also need to be explored. a recent paper [3]. In that work, the rationale offered Although originally motivated by considerations for the architectural extension is low latency network of network latency, cloudlets have much broader communication to computational resources in order relevance. In particular, they are relevant to both to enable a new genre of immersive mobile appli- the scenarios presented earlier. The GigaPan ap- cations. Cloudlets are viewed as decentralized and proach relies on compute-intensive vision algorithms widely-dispersed Internet infrastructure whose com- to stitch together a zoomable panorama from indi- pute cycles and storage resources can be leveraged vidual images. Under normal conditions, these algo- by nearby mobile . A natural implementa- rithms can be executed in the cloud. However, cloud tion is to extend Wi-Fi access points to include sub- computing may be compromised in the aftermath of stantial processing, memory and persistent storage a disaster. The physical infrastructure necessary for for use by associated mobile devices. good Internet connectivity may have been destroyed A cloudlet can be viewed as a “data center in a and it may be many days or weeks before these can box.” It is self-managing, requiring little more than be repaired. Limited Internet connectivity may be power, Internet connectivity, and access control for re-established soon after the catastrophic event, but

4 there will be very high demand on this scarce re- payment to the service provider. In private spaces source from diverse sources: families trying to des- (such as inside a customer’s premises), there may be perately learn and share information about the fate of organizational or access control reasons that prevent loved ones, citizen reporters and professional jour- Wi-Fi connectivity. or connectivity has wider nalists sharing videos, images, blogs, and tweets of coverage, but offers signifiantly poorer bandwidth. the disaster area with the outside world, and disaster Even these lower-bandwidth alternatives are some- relief agencies coordinating their efforts with their times unavailable within buildings. Finally, there are home bases. Under these conditions, cloudlets may situations where wireless transmissions are forbid- be needed to support . den: for example, during air travel. We envision opportunistic deployment of Second, mobile hardware is necessarily resource- cloudlets in disaster relief. In the immediate af- poor relative to static client and server hardware. termath of a disaster, before external IT supplies Considerations of weight, size, battery life, er- have arrived, any available hardware such as an gonomics, and heat dissipation exact a severe penalty undamaged desktop can be pressed into service as in processor speed, memory size, disk capacity, etc. a cloudlet. A cloudlet can even be built around a For a user, a mobile device can never be too small, high-end , with its few hours of battery life too light or have too long a battery life. While mo- being priceless prior to the arrival of emergency bile hardware continues to evolve and improve, com- electrical generators. As IT supplies arrive, tempo- putation on mobile devices will always be a com- rary cloudlets may be replaced by purpose-designed promise. An additional obstacle is the slow pace of equipment. improvement in battery technology, especially when Cloudlets also have relevance to the lost child compared to Moore’s Law. scenario. In that scenario, the near-real-time im- The first challenge (uncertain connectivity) leads age search will require extensive computation since to a “Swiss Army Knife” design philosophy: try pre-computed indexes are not available for the con- to cram as much functionality as possible into a tributed images. Cloud computing is the obvious an- compact design that is self-contained and as frugal swer for this, but exactly where in the cloud to com- as possible in resource usage. Unfortunately, this pute is an open question. The task involves submis- approach often compromises usability, just as the sion of images from a lot of people in the immedi- tools in a real Swiss Army Knife (such as knife, ate neighborhood of the lost child; the search results fork, can opener, and corkscrew) are poor substitutes will also be viewed there. This suggests use of local for full-sized implementations. Miniscule displays infrastructure (i.e., a cloudlet) rather than distant in- and keyboards are especially challenging for mobile frastructure. Once the search is completed (success- users, particularly in the context of a graying popu- fully or unsuccessfully) the contributed images can lation. Unfortunately, the incentives of today’s mar- be discarded. This fits well with the stateless model ketplace tend to reward itemizable functionality en- of cloudlets and their use as transient infrastructure. hancements rather than improvements to more dif- fuse attributes such as usability. 6 Competing Design Strategies The second challenge (resource poverty) com- bined with the limitations of the Swiss Army Knife So far, this paper has focused on how mobile com- approach will eventually lead to a very different de- puting today and tomorrow differs from the past. sign philosophy. Rather than relying exclusively on a Amidst all this change, however, certain fundamental self-contained mobile device, one can use that device challenges of mobility have remained invariant since to leverage other resources such as a distant cloud, a they were articulated over 15 years ago [2]. nearby cloudlet, or an interaction device such as a First, wireless connectivity is highly variable in large display. We refer to this as a “wallet” design performance and reliability. Many real-world fac- philosophy because it resembles the role of wallets tors hinder ubiquitous high-bandwidth wireless con- in everyday life. A typical wallet contains things like nectivity. For example, Wi-Fi connectivity in pub- cash, credit cards, and ID cards. None of these items lic spaces often requires a subscription or one-time are intrinsically valuable. Rather, their value lies in

5 their ability to elicit useful goods and services on de- References mand from the environment. [1] PARIKH, T. Using Mobile Phones for Secure, Using a large wall-mounted display to augment Distributed Document Processing in the Developing the small display of a mobile device is an intrigu- World. IEEE Pervasive Computing 4, 2 (April-June ing possibility. Transient use of displays in public 2005). spaces was prophesized almost two decades ago by [2] SATYANARAYANAN, M. Fundamental Challenges Weiser’s seminal paper on [4]. in Mobile Computing. In Proceedings of the ACM Today, there is a convergence of hardware and soft- Symposium on Principles of ware technologies that are relevant to this aspect of (1996). Weiser’s vision. In the near future, we envision a [3] SATYANARAYANAN,M.,BAHL, V., CACERES,R., typical mobile user walking up to a display and us- AND DAVIES, N. The Case for VM-based Cloudlets ing it for tasks that benefit from substantial screen in Mobile Computing. IEEE Pervasive Computing 8, real estate (including collaborative tasks and games). 4 (Oct-Dec 2009). Privacy-sensitive information can be presented to the [4] WEISER, M. The Computer for the 21st Century. user on the mobile device, augmenting the less sensi- Scientific American (September 1991). tive information that is presented on the large public [5] WIKIPEDIA. Gigapan. http://en.wikipedia. display. User interactions may also occur through the org/wiki/Gigapan (Online, accessed 2010-03-04). mobile device. The future evolution of mobile computing systems will largely be driven by the dialectic between re- source poverty and uncertain connectivity. Reconcil- ing their contradictory demands will itself be a chal- lenge. Only an adaptive system design that can dy- namically switch between a “wallet” mode of opera- tion and a “Swiss army knife” mode is likely to pro- duce satisfactory results. A counterpoint to the “resource-poor mobile device immersed in resource-rich surroundings” paradigm is the state of affairs in the developing world. There, the mobile device is often the most technologically advanced entity in its surroundings. This leads to unique opportunities for high impact, but also requires out-of-the box thinking. A good example is the CAM framework for secure docu- ment processing via mobile phones in the developing world [1]. The concept of embedding programs for processing paper documents directly on those doc- uments as 2D bar codes, and using to decode and process these programs, is an innovation directly inspired by the challenges of the develop- ing world. As the old saying goes, “Necessity is the mother of invention.” It has never been more true than in mobile computing!

6