ZUNINO SUAREZ Alejandro Octavio
Augmenting computing capabilities at the edge by jointly exploiting mobile devices: A survey
HIRSCH, MATÍAS; MATEOS, CRISTIAN; ZUNINO, ALEJANDRO
FUTURE GENERATION COMPUTER SYSTEMS
ELSEVIER SCIENCE BV
Año: 2018 vol. 88 p. 644 - 644
The ever-growing adoption of smart mobile devices is a worldwide phenomenon that positions smartphones and tablets as primary devices, i.e., that people mostly use. In addition to this, the computing capabilities of such devices, often under-utilized by their owners, are in continuous improvement. Today, smart mobile devices have multi-core CPUs, several gigabytes of RAM, and the ability to communicate through several wireless networking technologies. These facts caught the attention of researchers who propose to leverage smart mobile devices aggregated computing capabilities for running resource intensive software at the edge of the network. Such idea is conditioned by key features, named singularities in the context of this work, that makes smart mobile devices resource exploitation a difficult problem. These are the ability of devices to change location (user mobility), the shared condition -i.e., non-dedicated nature- of resources provided (lack of ownership) and the limited operation time given by the finite energy source (exhaustible resources). In this paper, we provide an in-depth analysis of proposals materializing this idea. We show that (a) existing approaches differ in the singularities combinations they target and the way they address each singularity through novel taxonomies, and (b) this fact makes them suitable for distinct goals and resource exploitation opportunities also schematized in this paper. The latter are represented by real life situations where resources provided by groups of smart mobile devices can be exploited, which in turn, are characterized by a social context and a networking support used to link and coordinate devices. The behavior of people in a given social context configure a special availability level of resources, while the networking support imposes restrictions on how data/computational tasks are distributed and results are collected. We conclude our analysis by discussing strong/weak points of the approaches and by identifying prospective future lines in the area.