Can cloudlet coordination support cloud computing infrastructure?
© The Author(s). 2018
Received: 30 June 2017
Accepted: 19 March 2018
Published: 2 April 2018
The popularity of mobile applications on smartphones requires mobile devices to perform high-performing processing tasks. The computational resources of these devices are limited due to memory, battery life, heat, and weight dissipation. To overcome the limitations of mobile devices, cloud computing is considered the best solution. The major issues faced by cloud computing are expensive roaming charges and growing demand for radio access. However, some major benefits associated with cloud computing are fast application processing, fast transfer of data, and substantial reduction in the use of mobile resources. This study evaluated the association between the distance of cloud servers and cloudlets with and without coordination and data latency. Fast communication in the cloudlet environment is facilitated by coordinated cloudlets, which have a positive influence on the infrastructure of cloud computing. The coordinated cloudlets can be efficiently accessed in different areas, such as vehicular networks, vehicular fog computing, and fog computing.
The use of mobile devices, including tablet PCs and smartphones, has become the most popular and effective tool for communication. By using different services of mobile applications, such as Google apps and iPhone apps, mobile users can accumulate a rich experience. The wireless networks run these applications on remote servers and devices. In the development of information technology toward the industrial and commerce fields, mobile computing has become a powerful trend. In today’s world, mobile devices face great challenges in terms of communication, including security, mobility, and resources. These limitations are likely to delay improvements in service qualities.
Network resources can be easily shared through cloud technology. Improvements in communication and network technologies are supported by different reliable and robust solutions. A large number of networked computers are utilized by cloud computing to provide better services to the users, such as access to databases, running software applications, and storing files. A single computer server can render these services to the users. However, it is not possible to identify a specific computer providing services to the users in cloud. The network of computers performs heavy lifting, such as file storage and running software in cloud computing. The user’s computer runs the interface software for interacting with the cloud, such as the email facility. A web browser is used by users to receive, read, write, send, or delete messages on email. However, the actual files and email software are present in the cloud instead of on the computers.
The exciting advantages of cloud computing has resulted in its adoption on mobile phones, termed mobile cloud computing. The reduction in running cost of mobile applications has attracted many entrepreneurs, who find it a profitable business. Mobile cloud computing is a new technology that aims to achieve a perfect experience for different mobile services at reduced cost. The introduction of mobile cloud computing depends on the integration of cloud computing in the environment of mobile devices, which are responsible for supporting cloud computing for users. Users can take maximum advantage of the new types of facilities and services brought by mobile cloud computing.
Mobile cloud computing refers to the infrastructure comprising data processing and data storage, which occur outside the mobile device . The computing power and data storage are moved away from the mobile phones in the cloud by mobile cloud applications, thus enabling mobile applications for users and mobile subscribers. Mobile cloud computing is considered a new approach to mobile applications that moves away the mobile device toward centralized and powerful computing platforms within the cloud. The centralized applications tend to access over wireless connections based on a web browser or thin native client in mobile devices.
A cloudlet, which is a cluster of computers that are designed to quickly provide mobile computing services to mobile devices, is a common aspect of mobile cloud computing. The results of the present study are significant because they indicate important improvement in cloudlet performance. Performance is enhanced when cloudlets coordinate with themselves compared with no coordination. Accordingly,
Clients connect to the remote server directly = The worst case.
Clients connect to the remote server through cloudlets = Better case.
Clients connect to the remote server through coordinated cloudlets = The best case.
Cloudlet infrastructure and its virtualization
The challenges for generating and receiving high-resolution images and high-definition videos caused by the interaction of multiple users are simplified by the use of cloudlet . The other benefits of cloudlets are reductions in the cost of equipment because a great number of expensive fat access points are not needed to ensure network coverage. Under such conditions, the wireless termination points are lightest as it decreases the access latency by the placement of network functions. Some applications that are flexible and possess simple network management are kept close to the users because the cloudlet is self-manageable. The network functions virtualization technology reduces OPEC and CAPEX by avoiding management complexities and expensive middleboxes. The introduction of targeted service is based on venue type and geography. However, remote provisions can be made without any requirement of visits in the software for installation of new hardware.
The limitation of coordination between cloudlets is illustrated by the lack of relevant studies, despite the extensive discussion of cloudlets and cloud computing. This study aims to disseminate and enlighten, thereby demystifying the complexities associated with cloudlets and cloud computing. The study also investigates the strengths and weaknesses of current methods and approaches applied to cloudlet coordination to improve and develop these different techniques. Cloudlets need to be managed to enhance security and improve their performance.
Coordinated cloudlets refer to small clouds that are connected to each other and close to the users who share resources among themselves. These cloudlets can run more than one virtual machine since the virtual machines are installed on these cloudlets (discoverable localized and stateless servers). The mobile devices offload their expensive computations onto the virtual machines. The cloud infrastructure is found in different locations, which may not be totally known by the users. For instance, Amazon’s infrastructure is present within 16 geographic regions across the world. The end-to-end part of the application involves many network segments when a user attempts to reach the site from a mobile device. In this approach, a direct connection is made through the high WAN latencies to allow users to carry on real-time applications. Fog computing refers to cloudlet-based mobile computing that is responsible for facilitating the operation of storage, computers, and network services between remote clouds and mobile devices. Fog computing leverages network components such as routers and switches in the network, whereas cloudlets use dedicated infrastructure. The main aim of this application is a reduction in access latency . Fog computing allows for quicker response rates as there is no network latency and the network traffic is greatly reduced. Thus, the relevant data can be relayed to the cloud. This type of computing also improves the security of the data that resides in the cloud. There are disadvantages of fog computing; for example, the whole system appears complex, analytics are performed locally, and some enterprises do not like the idea of their data being kept outside their premises.
The number of users using mobile phones to connect with the internet is rising continuously. In addition to the server hardware and static client, mobile hardware is recognized as a necessary resource. Compared to static servers and clients, there are many drawbacks associated with mobile devices. The computational resources of the mobile device are limited by memory, battery life, and weight and height dissipation.
the delay between the user device and the video server;
the round trip time between the user device and the gateway for both the proposed and reference architectures;
the delay between the wireless termination points and the gateway.
reduced equipment cost;
decreased access latency;
faster configuration of new services;
possibility of introducing new services.
The concept of cloudlet properties, such as size, lifetime and reachable time, was introduced by Li and Wang . Studies related to computing performance and cloudlet properties are helpful in exploring the domain of mobile cloudlets in mobile cloud computing. A number of resource-rich devices can act as an initiator to connect to the computing service, revealing a number of nodes in the network. There is a slight negative effect of intermittent connection on the efficiency of a mobile cloudlet. The lower and upper bounds have been derived through the computing capacity and computing speed of a mobile cloudlet. The decision by an uploading task to utilize a nearby mobile cloudlet and clouds depends on the usage of the bounds by an initiator. The feasibility and performance of mobile cloud computing is investigated on the basis of the design and implementation of mobile applications on the cloudlet system of mobile devices.
the data owner, who is the mobile device user and uploads the encrypted file on the cloud;
the data sharer who wishes to access the data uploaded on the cloud by the data owner.
the cache of frequently accessed files is maintained by each cloudlet;
the list of authorized sharers is maintained by the owner;
the cloud servers have abundant storage capacity and computation power;
generation of a new session key to upload each file.
it increases the wireless coverage to serve more mobile devices;
the building up of a shield and alert system for all mobile users is made possible through defense coordination between the mesh cloudlets;
caching and load balancing among the cloudlets in offloading tasks for the cloud.
These features show clear advantages of utilizing a composite mesh of 3 cloudlets. The performance of the composite intrusion detection system (IDS) was higher than the individual IDS performance when the false positive rate at the extreme right had a high value of 0.006. The potential effects of emerging solutions and technologies were evaluated by Manzalini et al. . In the areas of migration, dynamic allocation, and automated arrangement of entities of virtual machines, the study successfully identified some technical challenges across a wide span of areas of interconnected edge networks. Two multi-core servers were used to host and implement the infrastructure. The multi-core servers were equipped with Linux CentOS distribution running Virtual Box as the VM hypervisor. Two virtual single-core Linux boxes were used by the virtual machines, of which one acted as the video server, while the other act as the access connecting the server to the user. The two virtual machines were dimensioned with the minimum amount of memory (512 Mbytes for both) and disk space (7.2 GB for the video server, 1.3 GB for the access router) to maintain a small migration latency. The reduced migration latency was reflected in the efficient performance of VM functions.
The virtual machine teleporting the functions in Virtual Box was facilitated by the live migration of the whole network infrastructure. An ad hoc link between interfaces connected the two hosting servers emulating two remote data centers, which were not linked to communicate with the users. Future network infrastructures should employ a great number of resources that are controlled by user demand, changes in conditions, and business objectives. SDN and NFV are standard hardware advances and emerging paradigms that enable remarkable disruption at the edges of current networks.
Ceselli et al.  reported a cloudlet network design problem for mobile access networks. The study stated that virtual machines are allocated to the cloudlets and are linked with the mobile users. To assess the requirements for mobile cloud service function, the study compared bulk and live migration models. The study gave high preference to the bulk migrations for the stringent delay services as compared to the less stringent delay requirements. Moreover, these models revealed that an optimal network design included cloudlet placement and assignment of base stations to cloudlets. Although the main focus of the study was to obtain strategic insights for design policies, the model was successful in revealing an optimal routing of the traffic from and to the cloudlets. This model benefitted the mobile access metropolitan area networks by providing a comprehensive cloudlet network design framework. The scenario built over real cellular network datasets was compared in terms of migrated volume and number of enabled cloudlets for reference mobile cloud services among different traffic engineering and performance goals.
A large-scale Body Area Network (BAN) system was presented by Quwaider and Jararweh  in the context of cloudlet-based data collection. The model was designed to minimize the packet cost by selecting data collection over the cloud that utilized a cloudlet-based system. Selecting a dynamic neighbor cloudlet minimized the end-to-end packet delay. The implementation of CloudSim was extended as Teachcloud to obtain a better understanding of the cloudlet-based BAN model [14, 15]. A virtual machine ranging from one CPU to a set of CPUs was assigned as a significant part of the hardware resources supporting the multi-core technology.
The cloudlet system was equipped with sufficient memory capacity per physical server and comprised a moderate size of storage capacity reaching the Terabyte scale. The cloudlet facilitated different transceivers to support the main functionalities of the system. The transceivers were able to receive and send data packet to and from the users of the BAN. The two primary metrics, packet delay and packet transmission power, were used to evaluate the cloudlet-based BAN data collection. The delay expenditure and communication energy arising from the PDA device to the enterprise cloud were evaluated using these primary metrics. The study concluded that the increase in coverage area with Wi-Fi reduced the average power of the transmission packet and delay.
The impact of application location on the cloudlet user experience was investigated by Clinch et al. . The study stated that emulation of mobile devices with Mac Mini simplified automation and packet tracing. Mac Mini was used as the display machine with 2.26 GHz Intel Core 2 Duo, 4GB RAM, Mac OS X 10.5 and a wired LAN. The cloudlet virtual machine was connected to Chicken of the VNC, which is an open-source VNC client. Seven servers were deployed, of which 3 were physical cloudlet machines and 4 were cloud virtual machine instances. The network was connected from the host Ethernet to the VM, which ran on a Vino VNC server and Python 2.6. Each cloudlet used a Mac mini running OS X 10. with 2GB Ram and 1.83GHz Intel Core Duo together with a VirtualBox 3.0.12 of an Ubuntu 9.10 guest VM (allocated 1 CPU, 395 MB RAM, and 8GB disk). The instances ran vnc4server and Python 2.6. The cloud instances ran on the Amazon Elastic Compute Cloud (EC21) with 1 Compute Unit (32-bit Ubuntu 9.10 Server, 1.7GB RAM, 160GB storage).
A set of constraints intrinsic to mobile computing was explained in a study conducted by Satyanarayanan . The study examined the effects of constraints on distributed systems. A summary of the Coda and Odyssey systems was discussed, as well as the research opportunities in five crucial topics. These topics were applicable to mobile computing, semantic callbacks, caching metrics, validators, analysis of adaptation, resource revocation, and global estimation from local observations. Moreover, a community clinic solution integrated in the cloudlet group between the mobile users and the cloud was proposed by Zhang et al. . The high cost introduced by massive deployment of cloud data centers was reduced with the aid of this proposed system. It also reduced the consumption of battery by the mobile devices.
To simulate a real cloud environment and obtain accurate results, 7 virtual machines were deployed (1 cloud VM server, 3 VM cloudlets and 3 VM clients) over a public network among the USA, Italy, and Saudi Arabia. The remote cloud VM server was installed in Seattle in the USA with ip address (18.104.22.168). It had 2.67 GHz Intel Core i5, 1 GB RAM, and 20 GB disk and ran Windows Web Server 2008 and VMware Workstation 9.0. The 3 VM cloudlets were installed in Florence, Italy, with shared ip address (22.214.171.124). They had 1.70 GHz Intel Core i3-4005 U, 512 RAM and 10 GB disk and ran Windows Web Server 2008 and VMware Workstation 9.0.
Hardware used in the experiment
Intel Core i5
Intel Core i3-4005 U
Intel Core i3-4005 U
Intel Core i3-4005 U
Intel Core 2 Duo
Intel Core i5-3317 U
Intel Core i3-4005 U
Table of experimental details
Client 1 ping Cloudlet 1
Min = 124 ms, Max = 127 ms, Average = 125 ms
Client 2 ping Cloudlet 2
Min = 110 ms, Max = 118 ms, Average = 113 ms
Client 3 ping Cloudlet 3
Min = 1 ms, Max = 12 ms, Average = 3 ms
Client 1 ping Remote Server
Min = 255 ms, Max = 265 ms, Average = 257 ms
Client 2 ping Remote Server
Min = 195 ms, Max = 201 ms, Average = 197 ms
Client 3 ping Remote Server
Min = 211 ms, Max = 212 ms, Average = 211 ms
Cloudlet 1 ping Remote Server
Min = 212 ms, Max = 214 ms, Average = 213 ms
Cloudlet 2 ping Remote Server
Min = 209 ms, Max = 216 ms, Average = 212 ms
Cloudlet 3 ping Remote Server
Min = 213 ms, Max = 225 ms, Average = 219 ms
Table of ips, ports and locations
Medina, Saudi Arabia
The initiation of the remote cloud server occurred at a specific machine and port, which led to the starting of the three cloudlets. Each cloudlet knew the address and port of the remote cloud server. The cloudlets knew the addresses and ports of the other cloudlets in coordination mode; by contrast, in non-coordination mode, the cloudlets did not know the addresses and ports of the other cloudlets. Thus, this work tested the speed in two scenarios. The first used direct connections between the cloudlets and remote cloud server. The second used cloudlet coordination before connecting to the remote cloud server.
The data will be duplicated but will be more secure as a backup after the addition of the VM remote server. However, if the remote server is removed, the scenarios cannot run because the data reside on it, resulting in loss of the data. By contrast, the addition of the VM cloudlet results in better performance due to cloudlet collaboration. The removal of VM cloudlets decreases performance due to the decreased collaboration between the cloudlets. The addition or the removal of the VM client has no effect on the system as the VM client allows a client to execute an operating system locally on their device, whereas the operation system is managed centrally. The client requests a word through the VM client, and then the connection server authenticates the client before connecting the client with the virtual network. Thus, the addition of the VM client does not affect the system as it needs the words to operate. However, if the VM client is removed, the client would not be able to request the words.
Summary of the Experimental Results
Time needed to receive data with a direct connection between the clients and remote cloud without cloudlets in between
Time needed to receive data in scenario 1 (cloudlets not coordinating with each other)
Time needed to receive data in scenario 2 (cloudlets coordinating with each other)
≈ − 15%
≈ − 40%
≈ − 20%
≈ − 50%
≈ − 45%
≈ − 51%
To summarize the experiment, two scenarios of cloudlet-base architecture were tested. In the first, the distance cloud is connected with the clients directly through a cloudlet. In the second, the users are connected with the distance cloud after connecting the other cloudlets for faster and better communication. Therefore, the cloud computing infrastructure environment is supported by cloudlet coordination, which enables fast and reliable connections. The set-up surveyed in the present study provides the best performance in cloudlet environments.
Conclusion and future work
This study proposed a coordination method based on a cloudlet-based architecture. The solution tested the speed of data in cloudlet environments with and without coordination. The coordination analysis showed that the data were transferred faster using the selected method than with the normal cloudlet architecture. Further studies are needed to examine the benefits of cloudlets in internet applications.
The author is very thankful to all associated personnel in any capacity that contributed to the purpose of this research.
Availability of data and materials
The datasets used and analyzed during the current study are available from the corresponding author upon reasonable request.
The author analyzed the association between the distance of cloud servers and cloudlets with and without coordination discovering the data latency. The author read and approved the final manuscript.
The author declares that he/she has no competing interest.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
- Kitanov S, Davcev D (2012) Mobile cloud computing environment as a support for mobile learning, vol 22. Cloud Computing, pp 99–105. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.685.7999&rep=rep1&type=pdf
- Jaiswal AS, Thakare VM, Sherekar SS. Performance based Analysis of Cloudlet Architectures in Mobile Cloud Computing. http://www.ijcaonline.org/proceedings/ncrtis2015/number1/20108-4002
- Satyanarayanan M (2010) Mobile computing: the next decade, in proceedings of the 1st ACM workshop on Mobile Cloud Computing & Services. Social Networks and Beyond (MCS). https://doi.org/10.1145/1810931.1810936
- Satyanarayanan M, Lewis G, Morris E, Simanta S, Boleng J, Ha K (2013) The role of cloudlets in hostile environments, vol 12. IEEE Pervasive Computing, pp 40–49. https://doi.org/10.1109/mprv.2013.77
- A. Bahtovski & M. Gusev (2013) Cloudlet challenges 24th DAAAM international symposium on intelligent manufacturing and AutomatiGoogle Scholar
- Jemaa FB, Pujolle G, Pariente M (2016) Cloudlet-and NFV-based carrier Wi-fi architecture for a wider range of services. Ann Telecommun 71:617–624. https://doi.org/10.1007/s12243-016-0504-0 View ArticleGoogle Scholar
- Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. Proceedings of the first edition of the MCC workshop on Mobile cloud computing, pp 13–16. Google Scholar
- Li Y, Wang W (2014) Can mobile cloudlets support mobile applications? Infocom, 2014 proceedings ieee, pp 1060–1068. https://doi.org/10.1109/INFOCOM.2014.6848036
- Jindal M, Dave M (2014) Data security protocol for cloudlet based architecture. Recent Advances and Innovations in Engineering (ICRAIE), pp 1–5. https://doi.org/10.1109/ICRAIE.2014.6909186
- Shi Y, Abhilash S, Hwang K (2015) Cloudlet mesh for securing mobile clouds from intrusions and network attacks. Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp 109–118. https://doi.org/10.1109/MobileCloud.2015.15
- Manzalini A, Minerva R, Callegati F, Cerroni W, Campi A (2013) Clouds of virtual machines in edge networks, vol 51. IEEE Communications Magazine, pp 63–70. https://doi.org/10.1109/mcom.2013.6553679
- Ceselli A, Premoli M, Secci S (2015) Cloudlet network design optimization. IFIP Networking Conference (IFIP Networking), pp 1–9Google Scholar
- Quwaider M, Jararweh Y (2013) Cloudlet-based for big data collection in body area networks. Internet Technology and Secured Transactions (ICITST), pp 137–141. https://doi.org/10.1109/icitst.2013.6750178
- Calheiros RN, Ranjan R, Beloglazov A, De Rose CA, Buyya R (2011) CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms, vol 41. Software: Practice and experience, pp 23–50. https://doi.org/10.1002/spe.995
- Jararweh Y, Alshara Z, Jarrah M, Kharbutli M, Alsaleh MN (2013) Teachcloud: a cloud computing educational toolkit. International Journal of Cloud Computing 1(2):237–257. https://doi.org/10.1504/ijcc.2013.055269 View ArticleGoogle Scholar
- Clinch S, Harkes J, Friday A, Davies N, Satyanarayanan M (2012) How close is close enough? Understanding the role of cloudlets in supporting display appropriation by mobile users. Pervasive Computing and Communications (PerCom), 2012 IEEE International Conference, pp 122–127. https://doi.org/10.1109/percom.2012.6199858
- Satyanarayanan M (1996) Fundamental challenges in mobile computing the 5th annual ACM symposium on principles of distributed computing, pp 1–7. https://doi.org/10.1145/248052.248053 Google Scholar
- Zhang J, Xiong T, Lou W (2014) Community clinic: economizing mobile cloud service cost via cloudlet group. Mobile Ad Hoc and Sensor Systems (MASS), pp 208–216. https://doi.org/10.1109/mass.2014.117
- Li Y, Wang W (2013) The unheralded power of cloudlet computing in the vicinity of mobile devices. Globecom Workshops (GC Wkshps), pp 4994–4999. https://doi.org/10.1109/glocomw.2013.6855742
- Verbelen T, Simoens P, De Turck F, Dhoedt B (2012) Cloudlets: bringing the cloud to the mobile user. Proceedings of the third ACM workshop on Mobile cloud computing and services, pp 29–36. https://doi.org/10.1145/2307849.2307858
- Soyata T, Muraleedharan R, Funai C, Kwon M, Heinzelman W (2012) Cloud-vision: real-time face recognition using a mobile-cloudlet-cloud acceleration architecture. Computers and Communications (ISCC). https://doi.org/10.1109/ISCC.2012.6249269