Unlike cloudlet-based cyber-foraging, most cyber-foraging solutions rely on conventional Internet for connectivity to the cloud or strategies that tightly couple mobile clients with servers at deployment time. But these solutions don't work well in resource-constrained environments because they depend on multi-hop networks to the cloud and static deployments.
Multiple cyber-foraging systems have been developed that differ in terms of the strategy that they use to leverage remote resources—where to offload, when to offload, and what to offload. However, a review of these existing systems and research has showed that
There is emphasis on the algorithms to support code offload and state synchronization with minimal focus on software architecture and quality attributes beyond energy efficiency and performance.
There is little guidance on how to support quality attributes such as survivability, resilience, trust and ease of deployment, critical in tactical environments.
Our research focuses on developing cyber-foraging architectures and implementations that address tactical system quality attributes and therefore support deployment of tactical cloudlets as part of mobile tactical systems.
Read about our research focus in cloudlet-based cyber-foraging.