Dynamic priority boosting for opportunistic mobile computing

نویسنده

  • S. Liang
چکیده

Applications running on mobile terminals can benefit from exploiting transient connection opportunities: with an RTT of 2ms, even a 5s transient connection over a 50 Mbps 802.11a link represents 2500 RTTs and a chance to transfer up to 312.5 Mbytes. However, because of user mobility, such opportunistic time windows can be quite short. This paper investigates boosting CPU scheduling priorities of network-related processes on a mobile terminal to maximize benefit from communication opportunities. We explore the space of all possible boosting policies, propose two specific approaches, implement them in the Linux kernel, and study their performance. To our surprise, experimental results show that process reprioritization improves application performance only slightly, and only under heavy load. With today’s commodity hardware and commodity operating systems, both bulk transfer and interactive audio applications can be well-supported, under moderate loads, with no modifications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

—Recently there are emerging applications based on opportunistic mobile social networks, which are kinds of delay tolerant networks (DTNs) with social relations between the nodes. In such networking scenarios, messages are disseminated through intermittent connections in a store-carry-and-forward manner. A major advantage of the opportunistic mobile social networks includes enabling communicat...

متن کامل

Special Section on Challenged Networks

s p l t a It is our great pleasure to introduce this Special Section of the Journal, presenting advanced solutions for mobile challenged networks. The special section collects extended papers from the 9th ACMWorkshop on Challenged Networks, CHANTS 2014. After a decade of research into this area, the subject of challenged networks is both generating solutions for practical applications, still re...

متن کامل

An Enhanced MSS-based checkpointing Scheme for Mobile Computing Environment

Mobile computing systems are made up of different components among which Mobile Support Stations (MSSs) play a key role. This paper proposes an efficient MSS-based non-blocking coordinated checkpointing scheme for mobile computing environment. In the scheme suggested nearly all aspects of checkpointing and their related overheads are forwarded to the MSSs and as a result the workload of Mobile ...

متن کامل

CAMEO: A novel context-aware middleware for opportunistic mobile social networks

Mobile systems are characterized by several dynamic components like users’ mobility, devices’ interoperability and interactions among users and their devices. In this scenario context-awareness and the emerging concept of social-awareness become a fundamental requirement to develop optimized systems and applications. In this paper we focus on a novel category of pervasive and mobile systems des...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004