Opportunistic Computing A New Paradigm

Author: Mohan Hebbar
Vice President – Embedded Systems and Telecom at Symphony Service Corp.
Three billion – that is the estimated number of cell phones in the world by the end of 2010. That number excludes other types of access technologies and deployed sensors. The average performance of a cell phone processor is 100 MIPS and communication is at 200 kbps. However one calculates it, three billion cell phones pack in an enormous amount of computing power, memory space, and energy that can be shared in a collaborative way; in a manner that is representative of distributed computing, albeit in a different paradigm. Often referred to as opportunistic computing, this concept actually meshes well with the phenomenon of social networking that has taken the Internet world by storm.

Before we decipher opportunistic computing, let us start by looking at emerging technology applications. LAN, WAN, and CAN are acronyms that we use as part of our language. Add one more, BAN, for Body Area Network, is a network of inter-communicating sensors and mobile devices that are wearable or implanted in the human body in order to monitor vital parameters and transmit the information to a ‘home base station’ and in turn to a hospital. Is it not a set of applications that can heuristically, or through a defined method, assess the lifestyle of a human being? Imagine the volume and kinds of data that can be collected, thereby leading to various business applications including personal care, medical insurance, medical drug research, and so on? One could also include retail data that helps understand buying patterns, hence, consumer behavior and associated market research.

The world is brimming with cell phones, static and mobile sensors, and vehicles with sensing and computing resources. Along with device capabilities, the access technologies available are Wi-Fi, Bluetooth, Wi-MAX, cellular, RFID, and NFC. Stepping back, we can see the opportunity of ‘unlimited’ pair-wise contacts. Opportunistic computing exploits the communication between a pair of devices enabling possible sharing of content, resources, and services. If we take into account the numbers mentioned earlier on the performance of a cell phone processor (100 MIPS) and communication speed (200 kbps), then exploiting the opportunistic contacts can offer the potential to perform at approximately one quadrillion processing tasks and a data exchange in the order of petabytes per second; undoubtedly, a stupendous amount of power. While we have the network infrastructure and computing power, it is up to application scenarios we draw to exploit the existing and ever evolving infrastructure.

So, to reiterate, opportunistic computing is essentially a distributed computing paradigm of a wired network with challenges of intermittent connectivity and delay tolerance. In this paradigm, all pervasive and available communication opportunities are exploited to provide computing services to meet application needs by leveraging available computing resources that are available in the reachable environment.

Challenges of Opportunistic Computing
Getting a bit more specific, if two devices need to perform a collaborative task, they need to know each other’s resources and each other’s shareable services. This specificity at a high-level opens up yet another challenge of trusted collaboration unlike traditional security solutions that have a centralized authority to certify the trustworthiness. The approach will be different in the sense that it requires ‘on the fly’ authentication with ‘any devices’ that can come in the vicinity of another device making use of resources, though the complexity may be eased if it is within an enterprise network. Creating a distributed computing environment where devices could be ‘alien’, can come and go in the vicinity, poses an unstable network and has been a significant area of research.

Primary Challenges of Opportunistic Computing

They are of three types:

* Connectivity: Connectivity would be intermittent due to lack of prior knowledge, location, time, and bandwidth of any contacts. This situation is an area for exploration in terms of routing methods at higher layers, as well as a different way of design of middleware to hide the lower layer complexity.

* Delay Tolerance: While delay tolerance network is one of key focus in distributed computing, in opportunistic computing, a relook is necessary in terms of caching mechanisms and methods of remote service execution as in service discovery, execution, and management.
* Heterogeneity: There is a plethora of devices with many different kind of access methods at different radio frequencies and inter-operability will pose challenges for exploiting opportunistic computing applications.

Research Challenges
The paradigm we are envisioning leverages opportunistic computing infrastructure and exploits the social networking application era. We see that the business model is moving towards user centricity from network centricity. As said earlier, imagine the amount of computing power, memory, energy, and storage capacity at hand and leveraging it for social networking applications.

* Middleware: Middleware services need to manage data, services, resources, and more importantly trust, security, and privacy. Middleware will have to manage the concept of reputation of the device, akin to human behavior that looks for reputation before collaborating with another human. So, middleware will have to embed and maintain the users’ social behavior to increase the efficiency of security. General services as in information acquisition and dissemination, message handling, and resource management are an interesting challenge to overcome in a heterogeneous environment. Another area of research is to bring in fault tolerant concept in an intermittent connectivity situation.

* Information management: Given that a device can be both a producer and consumer at a fast pace when in contact, fundamental issues will be, what to store, where to store, and how to acquire relevant information with minimal delays and retry.

* Context awareness: Context is very relevant for searching the network, given that devices would be in transient community and an element of temporary trust establishment is required. Researchers do propose ‘social cache’ with a logical collective view of device in a given social group. An effective way of using social cache is an area of research that is actively pursued in the industry.

* Resource Management: Primarily three resources are being focused on to manage in opportunistic computing. 1) Available bandwidth and associated time window, 2) memory and buffer space within the device, and 3) energy management as to how to minimize the data transfer and utilize the local available memory.

* Economic Model: The question is why one would be good enough to share one’s available resources with others, when every resource is critical in a device. However, in a rational world of community, specifically in social networking, the expectation is that participants co-operate and this characteristic becomes important to evolve a viable economic model in the electronic social network.

* Applications: Many critical applications areas can benefit from opportunistic computing that can be a challenge to the traditional network or within the existing state-of-the-art network infrastructure.

* Crisis Management: Unplanned, disruptive events can be managed by opportunistic computing leveraging the available network infrastructure and crisis management applications deployed in all devices as a mandatory service.

* Intelligent Transport System: Vehicular ad-hoc networks can be exploited to increase traffic efficiency and safety through collaborative communication between devices in the near vicinity and transported to back-haul traffic management carriers. Other applications in association with location based systems and entertainment offerings can also prove viable businesses.

Opportunistic computing is bound to become a reality, given the current growth in the variety of devices and the rate at which they are getting deployed, be they cellular phones, end devices with short range communications, or M2M devices in a static or dynamic world of sensor network or ad-hoc network.

It cannot be denied that we would require more reliable, secure, and delay-tolerant computing infrastructure upon which the opportunistic computing paradigm can be implemented. The solution is not ready yet, but it will be. For opportunistic computing primarily exploits human social behavior to build an electronic social device network for a more effective pervasive computing.
Previous  article
Write your comment now

Email    Password: 
Don't have SiliconIndia account? Sign up    Forgot your password? Reset
Reader's comments(2)
1: From: Mrs. Mary David

This mail may be a surprise to you because you did not give me the permission to do so and neither do you know me but before I tell you about myself I want you to please forgive me for sending this mail without your permission. I am writing this letter in confidence believing that if it is the will of God for you to help me and my family, God almighty will bless and reward you abundantly. I need an honest and trust worthy person like you to entrust this huge transfer project unto.

My name is Mrs. Mary David, The Branch Manager of a Financial Institution. I am a Ghanaian married with 3 kids. I am writing to solicit your assistance in the transfer of US$7,500,000.00 Dollars. This fund is the excess of what my branch in which I am the manager made as profit last year (i.e. 2010 financial year). I have already submitted an annual report for that year to my head office in Accra-Ghana as I have watched with keen interest as they will never know of this excess. I have since, placed this amount of US$7,500,000.00 Dollars on an Escrow Coded account without a beneficiary (Anonymous) to avoid trace.

As an officer of the bank, I cannot be directly connected to this money thus I am impelled to request for your assistance to receive this money into your bank account on my behalf. I agree that 40% of this money will be for you as a foreign partner, in respect to the provision of a foreign account, and 60% would be for me. I do need to stress that there are practically no risk involved in this. It's going to be a bank-to-bank transfer. All I need from you is to stand as the original depositor of this fund so that the fund can be transferred to your account.

If you accept this offer, I will appreciate your timely response to me. This is why and only reason why I contacted you, I am willing to go into partnership investment with you owing to your wealth of experience, So please if you are interested to assist on this venture kindly contact me back for a brief discussion on how to proceed.

All correspondence must be via my private E-mail ( for obvious security reasons.

Best regards,
Mrs. Mary David.
Posted by: mary lovely david - Monday 26th, September 2011
2: Hi my dear,
My name is Mounace, i would like to establish a true relationship with you in one love. please send email to me at ( i will reply to you with my picture and tell you more about myself. thanks and remain blessed for me,
Your new friend Mounace
Posted by: mounace love love - Thursday 09th, June 2011
More articles
by Kaushal Mehta - Founder & CEO, Motif Inc..
The retail industry is witnessing an increased migration of customers from traditional brick and mortar retail to E-commerce (online retail)...more>>
by Samir Shah - CEO, Zephyr .
You probably do because you are on the phone with them! For all of you working in some technical management capacity here in Silicon Valley,...more>>
by Raj Karamchedu - Chief Operating Officer, Legend Silicon .
These days are a mixed bag for me. Of late I have been considering "doing something bigger and better," in my life, perhaps seriously though...more>>
by Madhavi Vuppalapati - CEO of Prithvi Information Solutions .
IT Services Rise of Tier II companies The Indian IT outsourcing industry is going through very exciting phase in its business life...more>>
by Bhaskar Bakthavatsalu- Country Manager, India and SAARC of Check Point Software Technologies.
Data loss occurs every day through corporate email. In fact, given the sheer number of emails an organization sends every day, data loss inc...more>>