The Great Expectations of Smartphone Traffic Scheduling

Size: px
Start display at page:

Download "The Great Expectations of Smartphone Traffic Scheduling"

Transcription

1 The Great Expectations of Smartphone Traffic Scheduling Vilen Looga, Zhonghong Ou, Yu Xiao, Antti Ylä-Jääski Department of Computer Science and Engineering Aalto University School of Science Espoo, Finland Abstract Utilizing network traffic scheduling to improve the energy efficiency of smartphones has been studied extensively in the past few years. These studies usually take certain approaches and make some assumptions concerning traffic predictability, regardless of whether these assumptions hold or whether the approaches have been studied before. In this paper, we conduct an analysis of existing work to find common approaches and assumptions among the proposed solutions. We find out the following: 1. A large part of the solutions target a specific (single) application or category of applications, and do not schedule the whole traffic transmitted on the smartphone. 2. A common assumption is that network traffic for smart phones is predictable. The focus of our work is to test these assumptions against real-world data and analyze whether the approaches presented in the literature are feasible. By leveraging two data sets from NetSense, we make several major contributions: 1. We demonstrate clearly, based on a large dataset, that background apps are the largest energy consumers for smart phones. 2. although some traffic traces exhibit long-term trends, in general traffic from a single app or a user is not predictable in the short-term. 3. achieving energy savings is difficult by scheduling traffic only from a specific app, since multi-app scenarios are so prevalent on today s smartphones. We also pinpoint future directions for traffic scheduling schemes. I. INTRODUCTION The battery life of smartphones has been a primary concern in the past several years. In a breakdown of energy consumption for smartphones, wireless communication components account for a prominent part of the overall energy [1]. Thus, improving the energy efficiency of data transmission for smartphones has attracted significant interest, both from industry and academia. One proposed approach is to use prediction coupled with scheduling to collect traffic into more coherent bursts [2] [5]. This reduces intra-burst intervals and allows the wireless network interface (WNI) to spend less time idling, thus decreasing energy waste [6]. Nevertheless, the underlying assumption is that smartphone traffic is predictable, which has not been verified with analysis of large-scale reallife smartphone traffic traces. Hence, to create effective traffic prediction/scheduling schemes it is necessary to understand the characteristics of network traffic in modern smartphones. In this work, we conduct a systematic analysis on smartphone traffic based on traces from the NetSense Project [7], [8]. Our analysis focuses on three aspects: which apps consume the most energy on wireless transmissions, predictability of the traffic, and feasibility of single-app traffic scheduling. For the analysis, we got access to two datasets from NetSense. The data consists of transmitted and received perapp traffic over Wi-Fi, with 60-second sampling interval. The first set (November 2012) consists of one week of data from 145 users, while the second set (November 2013) encompasses one month of data from 65 users. We extract traffic traces for single apps and single users from the dataset and use an Augmented Dickey-Fuller (ADF) test [9] to determine whether they exhibit long-term trends. Furthermore, we apply Autoregressive Integrated Moving Average (ARIMA) models to promising traffic traces to determine whether they are predictable on a short time-scale. Through extensive analysis, we make three major contributions as follows: 1. We demonstrate clearly, based on a large dataset, that background services, media apps and the Facebook app contribute the most to the volume of network traffic and the energy consumed by the WNI. 2. Some traffic traces have long-term trends, however on a short-term scale, traffic from a single app or a single user is not predictable. 3. focusing on single-app scheduling is not beneficial since the WNI is almost always used by multiple apps. The rest of the paper is organized in the following way. We study the representative traffic scheduling solutions in Section II. In Section III we briefly describe the NetSense datasets. In Section IV we investigate how the network traffic profile of the application affects its energy consumption. In Section V we analyze predictability of single app and single user traffic. We finish the paper with discussion in Section VI and conclusions in Section VII. II. TRAFFIC SCHEDULING APPROACHES Traffic scheduling on smartphones is an ongoing research topic. We analyze the existing solutions to try to find out common assumptions and approaches among them. A representative sample of existing solutions found during our literature survey is shown in Table I. In our survey, we found that more than half of the traffic scheduling schemes have the underlying assumption that app or device traffic is predictable. The motivation here is that if network traffic is predictable, then it can be scheduled into more coherent bursts, thus improving the energy efficiency of the radio interface. However, among the surveyed works we did not find a strong argument for the assumption of predictability, neither for single-app nor multi-app scenarios. Among the solutions that did not rely on traffic predictability, the prevalent

2 approach was either to use some kind of traffic management protocol between endpoints or cues from the environment. Some works test their traffic scheduling schemes with simulated pseudo-random traffic, while others test on real hardware with real traffic [4], [10]. However, in the case of the latter, the traffic over the radio interface during the experiment is often limited only to the experimental apps, thus taking background apps out of the equation. Unfortunately, this means that such scheduling schemes are not tested in a scenario that is close to the real world. Among the surveyed solutions, the prevalent approach was single-app traffic scheduling, while solutions that addressed traffic scheduling for the whole device were fewer. For the single app we found solutions focusing on improving the energy efficiency of bulk streaming (multimedia, Youtube), while others addressed frequent, but short transmissions ( , background). We will not describe in detail the exact methods used by these solutions to do traffic scheduling, it should suffice to say that most of them try to delay packet transmissions and collect them into coherent bursts. On the other hand, multi-app (whole device) traffic scheduling solutions are usually more varied in their approaches, for example by taking cues from the environment, such as signal strength or user activity, to figure out the best time to transmit packets. Thus, based on our literature survey, we want to analyze the following: the assumption of smartphone traffic predictability; feasibility of single-app traffic scheduling; best targets for energy savings among smartphone apps. III. DATASET As mentioned above, we get access to two data sets provided by the NetSense Project, which consists of Wi-Fi network traffic (both transmitted and received) logs from Android smartphone users. For each user, the specific app that is using the WNI and the amount of data that is exchanged during a 60-second interval is logged. The data is provided in the format of (timestamp, user, app name, transmitting/receiving, bytes) and is collected in 60-second intervals. There are two separate datasets, one 5-day long from November 2012 and another 30-day long from November The first dataset has a total of 145 users, who used a total of 699 different apps, while the second one has 56 users and 293 unique apps. Although background services are few (<10) compared to the total amount of unique apps, they are top contributors to the overall traffic volume and transmission count (see Table II). This allows us to extract 6726 and single app traffic traces from the first and second dataset respectively. In total, these two datasets logged over 61 GB of transmitted traffic and over 235 GB of received traffic. IV. ENERGY CONSUMPTION OF SMARTPHONE APPS First we find applications that are the largest WNI consumers by volume. As expected, most of the traffic volume is either from Facebook, media applications (Pandora etc.) or background services (e.g., Location, Play Services, and Google Apps). The same holds true for frequency of bursts 1, where 1 A burst can be defined as a train of packets with a packet interval less than a threshold. Due to traffic data resolution, we set the threshold to 60 seconds. background services dominate (see Table II). We analyze whether frequent bursts have a stronger impact (compared to traffic volume) on energy consumption of apps. To estimate the energy consumption of the app network traffic we use energy models developed earlier [6] [16]. The energy model is configured to simulate the energy expenditure of the WNI according to the parameters of a modern Android smartphone. The amount of data transmitted every 60-seconds (the granularity of the traffic trace) is given as a single coherent burst to the energy model (e.g. no intra-burst intervals). The energy model then estimates how much energy it consumes to send a traffic burst over the WiFi interface. The estimation is based on the size of the burst and includes the tail energy, i.e when the WiFi interface stays in IDLE mode after sending traffic (this is a simplification of the model and for a more precise description see the referenced papers). It should be noted that due to the resolution of the traffic provided by the NetSense study, our energy estimation results are relatively conservative. The available data does not contain the exact traffic shape, but rather the aggregation of traffic in 60-second intervals. It means that we have to make an assumption that the traffic was sent in the most efficient way (a single burst) during those 60 seconds. Obviously, in realistic scenarios the traffic, although bursty, might still have large enough intra-burst intervals to cause the WiFi interface to stay in IDLE mode, thus wasting more energy than our estimate. Thus, the actual energy consumption of the applications transmitting frequently will not be lower than our estimate. A. Single app traffic First, we analyze the correlation between energy expenditure and volume or frequency of the app network traffic. For that, we separate the data into single app traffic traces and run each of them through the energy model. We then calculate the volume and frequency for each app trace and create correlation graphs with energy (see Fig. 1, where each point in the figure represents the result of an app trace, with a total 293 app traces). Transmitted and received bursts for the same app are counted as separate traffic traces. The reason for strong correlation between app frequency and energy expenditure is due to the way the latter is counted. The presumed bandwidth of the link is rather high in the case of WiFi and each burst from the app is relatively small. This means that each burst adds an equal amount of energy to the overall expenditure, thus creating a strong correlation between the number of bursts and energy spent. It should be noted that these calculations presume that each app bears the full cost of tail energy of the WNI. A slightly different picture emerges when we look at the correlation between traffic volume and spent energy. As can be seen from the graph, apps can have large variations in total traffic volume, while having similar energy expenditure. This points to the fact that traffic optimization into bursts can result in improvements in energy efficiency. However, since realistic scenarios of smartphones rarely presume only a single app using the WNI, we must look at traffic profile of all the apps that run on the same smartphone, e.g. the multi-app scenario. B. Single user traffic To look at aggregated traffic profile of every smartphone, we separate the data into traffic traces from each user. If

3 TABLE I. REPRESENTATIVE SAMPLE OF TRAFFIC SCHEDULING APPROACHES FOR SMARTPHONES. FOR EACH APPROACH, THE TABLE SHOWS WHETHER IT TARGETS A SINGLE OR MULTIPLE APP SCENARIOS, WHAT IS THE TARGET OF SCHEDULING AND WHETHER TRAFFIC PREDICTABILITY IS ASSUMED OR NOT. Name Single/Multi-app scenario Target Traffic predictability Testing environment Network traffic traces Xu 2013 [11] Single client YES Smartphone Fixed size packets Pyles 2011 [12] Single Voice data YES Smartphone Real Liu 2011 [13] Single P2P apps NO Desktop PC Real Li 2012 [14] Single Video streaming YES Smartphone Real Huang 2012 [15] Multi Background apps NO Simulated Real Dogar 2010 [4] Single Web, FTP NO Smartphone, laptop Pseudo-random Looga 2012 [2] Multi All traffic YES Simulated Real Ou 2014 [10] Multi All traffic YES Smartphone Real Wei 2006 [5] Single Media streaming YES Simulated Pseudo-random TABLE II. TOP 10 APPLICATIONS (OMITTED COM. AND ABBREVIATED GOOGLE. TO G. IN PROCESS NAMES FOR CLARITY). ANDROID SYSTEM PROCESS NAMES ARE IN ITALICS FONT. FREQUENCY OF BURSTS (inter-burst interval 60s) VOLUME (BYTES) Transmitted Received Transmitted Received Total transmitted Total received Total transmitted Total received g.process.gapps g.process.gapps facebook.katana facebook.katana g.process.location g.process.location pandora.android android.settings g.android.gms g.android.gms android.systemui android.systemui facebook.katana facebook.katana system system g.android.gsf.login g.android.gsf.login android.settings g.android.pr...media system system g.android.apps.plus android.browser sec.spp.push sec.spp.push g.process.gapps pandora.android android.settings android.settings g.android.gms co.vine.android android.systemui android.systemui g.process.location android.chrome facebook.orca facebook.orca facebook.orca g.process.gapps Fig. 1. Correlation between spent energy and volume or frequency of bursts for single app traffic traces. Transmitted and received bursts for the same app are counted in separate traffic traces.

4 Fig. 2. Correlation between spent energy and volume or frequency of bursts for single user aggregated traffic. Transmitted and received bursts for the same app are counted in separate traffic traces. multiple apps are using the WNI at the same time interval, we aggregate their traffic. Again, we run the traffic traces through the energy model and try to look at the correlation with frequency and volume. The results are demonstrated in Fig. 2, where each point represents the result of an user trace, with a total of 145 user traces. From the figure, we can see that there exists a strong correlation between energy spent and volume, especially as the traffic volume increases. There is also a correlation between frequency and energy spent, but with a larger variation than the former. C. Targets for energy saving Based on our analysis of the traffic data, where we found a strong correlation between volume and energy spent, we can conclude that a significant part of the WNI energy is spent using large volume/high frequency Android system services, media apps and the Facebook app. This finding correlates with earlier work, such as [15]. However, the previous work was based on a smaller dataset, with fewer users and total apps. Although our energy estimate is limited in precision due to the resolution of the data, it is still apparent, even by conservative estimates, that the services and apps mentioned previously are good targets to improve energy efficiency of smartphone network transmissions. Taking a look at the traffic scheduling schemes mentioned earlier (see Table I), it is apparent that multi-app scenario solutions are better suited for addressing the biggest energy consumers. On the other hand, single-app scheduling schemes tend to focus on apps that do not contribute significantly to the overall energy budget (e.g. ). Our analysis also shows that compared with how much background system services contribute to the overall energy consumption, there is an under-representation of scheduling schemes that address this issue. V. TRAFFIC PREDICTABILITY Having identified background services as a good target for improving the energy efficiency of the smartphone WNI, we now analyze whether it is possible to predict their traffic. We are interested in finding out whether it is possible to predict the time (when the traffic arrives) and the size of the packet bursts. We investigate traffic predictability both from the perspective of single apps and single users (multi-app) scenarios. We evaluate the predictability of traffic traces using the Augmented Dickey-Fuller (ADF) test. It tests the existence of a unit root in time series by comparing an ARIMA(p,1,0) process against a stationary ARIMA(p+1,0,0) alternative. A presence of a unit root indicates that there is no trend in the time series. When testing, we use the strictest recommended p-value of less than [17] to rule out the presence of a unit root. If the ADF test returns a p-value for a traffic trace higher than 0.001, we consider the trace unpredictable.

5 TABLE III. ADF TEST RESULTS FOR SINGLE APP TRAFFIC TRACES. WE TEST FOR PREDICTABILITY OF BURST INTERVALS (TIMING) AND THEIR SIZE. COLUMNS DENOTED BY * INDICATE DATA WITH REMOVED DATAPOINTS, WHERE THE BURST INTERVAL IS EXACTLY 60 SECONDS. Set Nov 12 Nov 13 Nov 12 (*) Nov 13 (*) Single app traffic samples Avg. nr. of bursts per sample Without unit root TABLE IV. ADF TEST RESULTS FOR SINGLE USER TRAFFIC TRACES. WE TEST FOR PREDICTABILITY OF BURST INTERVALS (TIMING) AND THEIR SIZE. COLUMNS DENOTED BY * INDICATE RESULTS WITH REMOVED DATAPOINTS, WHERE THE BURST INTERVAL IS EXACTLY 60 SECONDS. Set Nov 12 Nov 13 Nov 12 (*) Nov 13 (*) Single user traffic samples Avg. nr. of bursts per sample Without unit root, both % w/o unit root, both Avg. nr. of bursts per sample w/o unit root A. Data resolution effects on results When trying to analyze network traffic, the ideal is to have data with exact timestamps and sizes of packets. However, the best available dataset that we can use comes with its own limitations. The reason why NetSense traffic data was collected at only 60-second intervals, is that collecting data at higher resolution quickly drains the batteries of smartphones. Thus, before we start analyzing the results of our ADF tests, we discuss the potential effect of 60-second data resolution on our results. As it stands, if the test finds a unit root at 60-second resolution, then it means that even at the most precise resolution the unit root will still be present. However, if the test rules out the existence of a unit root at 60-second resolution, the unit root might still appear at higher resolutions. This means the following for our test results: If the test shows that a traffic trace is not predictable (e.g. ADF test p-value larger than 0.001) at 60-second resolution, then it cannot be predictable, even if we knew the exact packet arrival times and sizes. If the test shows that a traffic trace might be predictable at 60-second resolution (e.g. ADF test p- value smaller than 0.001), then it might become unpredictable at higher resolution. Thus, the test might show that the 60-second resolution traffic trace is predictable, whereas the actual traffic was unpredictable. Another important issue to consider is whether 60-second resolution introduces prediction bias to our results. Consider the case where most packet transmissions would occur with an interval of less than 60 seconds. This means that the traffic samples would contain a large number of datapoints with intervals of exactly 60 seconds. If there is more than half of such intervals per sample, it creates a bias in predictability test as there is a larger than random chance of exactly 60 second intervals between datapoints. Thus, we must account for resolution bias in our predictability tests. To do that, we exclude datapoints with exactly 60 second intervals from the traffic traces and analyze whether the predictability of traffic traces changes significantly in separate tests. B. Single app network traffic predictability Our first attempt to test the predictability of single app traffic, both Tx and Rx, reveals that 28% to 32% of samples exhibit a long-term trend in both timing and burst size (see Table III, samples without a unit root vs. total number of samples). However, after we take into account the potential resolution bias mentioned earlier, the number of traffic samples decreases significantly for both datasets to approximately half of the initial number, while the number of traffic traces without a unit root decreases to only approximately 16% of the modified sample set. The number of traffic traces that exhibit a long-term trend decreases even more significantly to only a fraction of the initial unmodified sample set. Out of the traffic samples that do show a long-term trend, our analysis found that they tend to be longer than the average sample length. Our attempts to predict traffic for a single app using the ARIMA model did not give any positive results. The ARIMA prediction always lags in its estimate for the next packet transmission. This is likely due to traffic traces having longterm trends, as discovered by the ADF test, but not being predictable on a short time scale. C. Single user network traffic predictability Testing single user traffic traces, both Tx and Rx, shows a high percentage of samples with long-term trends (see Table IV). Interestingly, when we take into account resolution bias, the number of samples exhibiting long-term trends does not decrease, except for significant decreases in average sample sizes. The cause is the much longer average size of user traffic traces compared with application traffic traces. As we noted before, samples without a unit root tend to be longer than average. Single user traffic traces are more likely to exhibit longterm trends, as verified by the ADF test. Nevertheless, the ARIMA model fitting does not produce any positive results regarding short-term traffic predictability. Our results show that short-term (1-5 future bursts) predictions based on burst samples had large forecast errors. For example, predicting the packet size of the next 5 bursts in a sample with a mean of bytes had a forecast error mean of bytes (see Fig. 3). Thus, we conclude, based on our analysis of NetSense data, that network traffic transmissions from a single user (single device) are not predictable in the short-term. D. Multi-app scenarios Existing traffic scheduling schemes often work with a single application, even though there might be multiple applications transmitting traffic at the same time. This means that the benefits of one scheduled application might be lost if other

6 Fig. 3. ARIMA model burst size forecast error distribution for a single user traffic trace (sample size 50, mean bytes, forecast for next 5). Forecast error mean bytes. applications transmit at the same time, thus waking up the WNI. We also analyze the traffic traces for single users and find that on average 5.07 applications use the WNI in one direction during a 60-second interval. Also, on average, only 33.37% of bursts contain traffic from a single application. Thus, we can conclude that most of the time multiple applications use a single WNI concurrently. VI. DISCUSSION Our analysis demonstrates that most of the energy on the WNI is used by Android background services, media apps and Facebook in particular. These apps and their traffic shape are an interesting target for improvements in energy efficiency. The traffic scheduling schemes that we surveyed tend to focus on bulk transfer apps, such as video streaming, while some addressed the frequent WNI wake-ups caused by background updates of apps. Although it might be tempting to try to predict and optimize the traffic shape of a single app, such an approach cannot yield good results in unpredictable multi-app scenarios. Among the traffic scheduling schemes, there are few that target all of the traffic transmitted on a device. On the other hand, most of the schemes target specific apps, which begs the question of how effectively they can perform in multi-app scenarios. One could suggest that several single-app scheduling schemes might be combined into a system-level solution to achieve energy savings in multi-app scenarios. However, we have not found examples of such work in the literature and we do not consider such a solution practical. Using several scheduling schemes on the same device would likely cause computational overhead that would negate potential savings. Our attempts at per app traffic prediction did not yield positive results. Our analysis mostly focused on shorter predictability intervals, thus leaving out seasonality in longer dayto-day intervals. Nevertheless, the ADF test functions well for finding potential long-term trends among app and user traffic. Although there exists a large body of work on network traffic prediction, there is still lack of work on real smartphone traffic data with the focus on analyzing its predictability in the short- and long-term. Therefore, future work on traffic scheduling schemes that relies on traffic being predictable, should carefully consider this assumption. It should be noted that even if traffic from a single app might be predictable, multi-app traffic from a single device is most likely not. In our opinion, this is the most important implication to consider when designing traffic scheduling schemes. We also noted that performance evaluations of traffic scheduling schemes are lacking at the moment. Networkingrelated research requires extensive performance evaluation from the perspective of the network stack, CPU, memory etc., while protocols should be additionally evaluated from the theoretical (algorithmic) point of view [18], [19]. From the surveyed literature, the proposed solutions were evaluated mostly from a few aspects, such as total energy savings, while at the same time comparison to existing solutions was lacking. One problematic aspect is that evaluation of each scheduling scheme is done with different network traffic datasets, which makes comparison between different solutions difficult. Future traffic scheduling work should include performance evaluation of various proposed solutions with the same experimentational data to ensure thorough comparison. VII. CONCLUSIONS Our goal was to analyze traffic scheduling schemes and find out what kind of common assumptions and approaches they share. We found that a number of scheduling schemes focus on improving the energy efficiency of a single specific app or app category. Also, significant number of scheduling schemes assumed that traffic can be predictable, making it more suitable for scheduling. To test these assumptions, we conducted an analysis of traffic data collected from a largescale real-world smartphone usage study. We analyzed the dataset provided by the NetSense study and found that background processes, media streaming apps and Facebook were frequently performing network transmissions and contributed most of the volume and energy spent on the WNI. Since these apps are a good target to improve energy efficiency through traffic scheduling and prediction, we analyzed whether their traffic profiles were predictable or not. We found that although 20-30% of traffic traces did not contain a unit root (thus having a long-time trend), they did not either show significant shortterm predictability upon further ARIMA tests. Furthermore, we found that compounded network traffic from a single user is unpredictable since applications with unpredictable traffic profiles dominate the overall traffic. We believe that our findings carry important implications for future work on traffic scheduling schemes. Namely, traffic scheduling schemes should focus on multi-app (whole device traffic) scenarios. Furthermore, if a traffic scheduling scheme assumes traffic predictability in short or long time-intervals, a strong argument should be presented why this assumption holds. ACKNOWLEDGMENTS We would like to thank the NetScale Lab from University of Notre Dame and personally Dr. Aaron Striegel for giving us early access to the NetSense Project data. This work was supported by the Academy of Finland, grants number and

7 REFERENCES [1] A. Carroll and G. Heiser, An analysis of power consumption in a smartphone, in Proceedings of the 2010 USENIX Conference on USENIX Annual Technical Conference, ser. USENIXATC 10. Berkeley, CA, USA: USENIX Association, 2010, pp [Online]. Available: [2] V. Looga, Y. Xiao, Z. Ou, and A. Ylä-Jääski, Exploiting traffic scheduling mechanisms to reduce transmission cost on mobile devices, in Wireless Communications and Networking Conference (WCNC), 2012 IEEE, April 2012, pp [3] S. V. Rajaraman, M. Siekkinen, V. Virkki, and J. Torsner, Bundling frames to save energy while streaming video from lte mobile device, in Proceedings of the Eighth ACM International Workshop on Mobility in the Evolving Internet Architecture, ser. MobiArch 13. New York, NY, USA: ACM, 2013, pp [Online]. Available: [4] F. R. Dogar, P. Steenkiste, and K. Papagiannaki, Catnap: Exploiting high bandwidth wireless interfaces to save energy for mobile devices, in Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, ser. MobiSys 10. New York, NY, USA: ACM, 2010, pp [Online]. Available: [5] Y. Wei, S. Bhandarkar, and S. Chandra, A client-side statistical prediction scheme for energy aware multimedia data streaming, Multimedia, IEEE Transactions on, vol. 8, no. 4, pp , Aug [6] Y. Xiao, Y. Cui, P. Savolainen, M. Siekkinen, A. Wang, L. Yang, A. Ylä-Jääski, and S. Tarkoma, Modeling energy consumption of data transmission over wi-fi, IEEE Transactions on Mobile Computing, vol. 99, no. PrePrints, p. 1, [7] S. Liu and A. Striegel, Casting doubts on the viability of wifi offloading, in Proceedings of the 2012 ACM SIGCOMM Workshop on Cellular Networks: Operations, Challenges, and Future Design, ser. CellNet 12. New York, NY, USA: ACM, 2012, pp [Online]. Available: [8] University of Notre Dame. (2013, Jul.) NetSense Project. [Online]. Available: [9] Y.-W. Cheung and K. S. Lai, Lag Order and Critical Values of the Augmented Dickey-Fuller Test, Journal of Business and Economic Statistics, vol. 13, no. 3, pp , [Online]. Available: [10] Z. Ou, J. Dong, S. Dong, J. Wu, A. Yla-Ylä-Jääski, H. Pan, R. Wang, and A. Min, Utilize signal traces from others? a crowdsourcing perspective of energy saving in cellular data communication, Mobile Computing, IEEE Transactions on, vol. PP, no. 99, pp. 1 1, [11] F. Xu, Y. Liu, T. Moscibroda, R. Chandra, L. Jin, Y. Zhang, and Q. Li, Optimizing background sync on smartphones, Proceeding of the 11th annual international conference on Mobile systems, applications, and services - MobiSys 13, p. 55, [Online]. Available: [12] A. J. Pyles, Z. Ren, G. Zhou, and X. Liu, Sifi: Exploiting voip silence for wifi energy savings insmart phones, in Proceedings of the 13th International Conference on Ubiquitous Computing, ser. UbiComp 11. New York, NY, USA: ACM, 2011, pp [Online]. Available: [13] Y. Liu, F. Li, L. Guo, Y. Guo, and S. Chen, Bluestreaming: Towards power-efficient internet p2p streaming to mobile devices, in Proceedings of the 19th ACM International Conference on Multimedia, ser. MM 11. New York, NY, USA: ACM, 2011, pp [Online]. Available: [14] X. Li, M. Dong, Z. Ma, and F. C. Fernandes, Greentube: Power optimization for mobile videostreaming via dynamic cache management, in Proceedings of the 20th ACM International Conference on Multimedia, ser. MM 12. New York, NY, USA: ACM, 2012, pp [Online]. Available: [15] J. Huang, F. Qian, Z. M. Mao, S. Sen, and O. Spatscheck, Screen-off traffic characterization and optimization in 3G/4G networks, Proceedings of the 2012 ACM conference on Internet measurement conference - IMC 12, p. 357, [Online]. Available: [16] Y. Xiao, P. Savolainen, A. Karppanen, M. Siekkinen, and A. Ylä- Jääski, Practical power modeling of data transmission over g for wireless applications, in Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking, ser. e-energy 10. New York, NY, USA: ACM, 2010, pp [Online]. Available: [17] V. E. Johnson, Revised standards for statistical evidence, Proceedings of the National Academy of Sciences, vol. 110, no. 48, pp , [Online]. Available: [18] Z. Ou, H. Zhuang, A. Lukyanenko, J. Nurminen, P. Hui, V. Mazalov, and A. Ylä-Jääski, Is the Same Instance Type Created Equal? Exploiting Heterogeneity of Public Clouds, Cloud Computing, IEEE Transactions on, vol. 1, no. 2, pp , July [19] Z. Ou, E. Harjula, T. Koskela, and M. Ylianttila, GTPP: General Truncated Pyramid Peer-to-Peer Architecture over Structured DHT Networks, Mobile Networks and Applications, vol. 15, no. 5, pp , [Online]. Available:

What is Eating Up Battery Life On My SmartPhone: A Case Study

What is Eating Up Battery Life On My SmartPhone: A Case Study What is Eating Up Battery Life On My SmartPhone: A Case Study Grace Metri *, Abhishek Agrawal *, Ramesh Peri *, and Weisong Shi Department of Computer Science, Wayne State University, Detroit, Michigan

More information

Network Performance Monitoring at Small Time Scales

Network Performance Monitoring at Small Time Scales Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA dina@sprintlabs.com Electrical and Computer Engineering Department University

More information

Towards End-User Driven Power Saving Control in Android devices

Towards End-User Driven Power Saving Control in Android devices Towards End-User Driven Power Saving Control in Android devices Vitor Bernardo 1, Bruno Correia 1, Marilia Curado 1, and Torsten Braun 2 1 Center for Informatics and Systems, University of Coimbra, Coimbra,

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

Performance Analysis and Comparison between Legacy-PSM and U-APSD

Performance Analysis and Comparison between Legacy-PSM and U-APSD Performance Analysis and Comparison between Legacy-PSM and U-APSD Adriano Vinhas, Vitor Bernardo, Marilia Curado, Torsten Braun Center for Informatics and Systems, University of Coimbra, Coimbra, Portugal

More information

Performance Analysis and Comparison between Legacy-PSM and U-APSD

Performance Analysis and Comparison between Legacy-PSM and U-APSD Performance Analysis and Comparison between Legacy-PSM and U-APSD Adriano Vinhas, Vitor Bernardo, Marilia Curado, Torsten Braun Center for Informatics and Systems, University of Coimbra, Coimbra, Portugal

More information

Multimedia Data Transmission over Wired/Wireless Networks

Multimedia Data Transmission over Wired/Wireless Networks Multimedia Data Transmission over Wired/Wireless Networks Bharat Bhargava Gang Ding, Xiaoxin Wu, Mohamed Hefeeda, Halima Ghafoor Purdue University Website: http://www.cs.purdue.edu/homes/bb E-mail: bb@cs.purdue.edu

More information

Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers

Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers 1 Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of

More information

Realizing the Full Potential of PSM using Proxying

Realizing the Full Potential of PSM using Proxying Realizing the Full Potential of PSM using Proxying Ning Ding, Abhinav Pathak, Dimitrios Koutsonikolas 2, Clay Shepard 3, Y. Charlie Hu, Lin Zhong 3 Purdue University, 2 University at Buffalo, SUNY, 3 Rice

More information

Optimizing Background Email Sync on Smartphones

Optimizing Background Email Sync on Smartphones Optimizing Background Email Sync on Smartphones Fengyuan Xu 1,3, Yunxin Liu 1, Thomas Moscibroda 1, Ranveer Chandra 2, Long Jin 1,4, Yongguang Zhang 1, Qun Li 3 1 Microsoft Research Asia, Beijing, China

More information

Energy Consumption in Android Phones when using Wireless Communication Technologies

Energy Consumption in Android Phones when using Wireless Communication Technologies Energy Consumption in Android Phones when using Wireless Communication Technologies Goran Kalic, Iva Bojic and Mario Kusek University of Zagreb Faculty of Electrical Engineering and Computing Unska 3,

More information

How To Balance Load In Rdi With Power Conservation In A Power Efficient System

How To Balance Load In Rdi With Power Conservation In A Power Efficient System EFFECTIVE LOAD BALANCING WITH POWER CONSERVATION IN RFID Vijayakumar.G.Dhas 1, Ramanathan Muthukaruppan 2, Konguvel Balakrishnan 2, Rajarajan Ganesan 2 1 Lecturer, Department of Information Technology,

More information

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover 1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate

More information

Evaluating Impact of Storage on Smartphone Energy Efficiency

Evaluating Impact of Storage on Smartphone Energy Efficiency Evaluating Impact of Storage on Smartphone Energy Efficiency David T. Nguyen College of William and Mary Williamsburg, VA 23185, USA dnguyen@cs.wm.edu Abstract We present an experimental study of how storage

More information

Energy Adaptive Mechanism for P2P File Sharing Protocols

Energy Adaptive Mechanism for P2P File Sharing Protocols Energy Adaptive Mechanism for P2P File Sharing Protocols Mayank Raj 1, Krishna Kant 2, and Sajal K. Das 1 1 Center for Research in Wireless Mobility and Networking (CReWMaN), Department of Computer Science

More information

Offloading file search operation for performance improvement of smart phones

Offloading file search operation for performance improvement of smart phones Offloading file search operation for performance improvement of smart phones Ashutosh Jain mcs112566@cse.iitd.ac.in Vigya Sharma mcs112564@cse.iitd.ac.in Shehbaz Jaffer mcs112578@cse.iitd.ac.in Kolin Paul

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

Aggregating Inter-App Traffic to Optimize Cellular Radio Energy Consumption on Smartphones

Aggregating Inter-App Traffic to Optimize Cellular Radio Energy Consumption on Smartphones Aggregating Inter-App Traffic to Optimize Cellular Radio Energy Consumption on Smartphones Swadhin Pradhan, Sourav Kumar Dandapat, Niloy Ganguly, Bivas Mitra and Pradipta De, CS Department, The University

More information

Screen-Off Traffic Characterization and Optimization in 3G/4G Networks

Screen-Off Traffic Characterization and Optimization in 3G/4G Networks Screen-Off Traffic Characterization and Optimization in 3G/4G Networks Z. Morley Mao University of Michigan Junxian Huang University of Michigan Subhabrata Sen AT&T Labs - Research Feng Qian University

More information

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic William Acosta and Surendar Chandra University of Notre Dame, Notre Dame IN, 46556, USA {wacosta,surendar}@cse.nd.edu Abstract.

More information

PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs

PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs Xiaodong Zhang Ohio State University in Collaborations with Enhua Tan, Ohio State Lei Guo, Yahoo! Songqing Chen, George

More information

How QoS differentiation enhances the OTT video streaming experience. Netflix over a QoS enabled

How QoS differentiation enhances the OTT video streaming experience. Netflix over a QoS enabled NSN White paper Netflix over a QoS enabled LTE network February 2013 How QoS differentiation enhances the OTT video streaming experience Netflix over a QoS enabled LTE network 2013 Nokia Solutions and

More information

ENSC 427- Communication Networks Spring 2015. Quality of service of the wireless networking standard over a Multi user environment.

ENSC 427- Communication Networks Spring 2015. Quality of service of the wireless networking standard over a Multi user environment. ENSC 427- Communication Networks Spring 2015 Quality of service of the wireless networking standard over a Multi user environment Group 9 Name: Saumya Sangal Email: ssangal@sfu.ca Name: Jasmine Liu Email:

More information

A Hybrid Load Balancing Policy underlying Cloud Computing Environment

A Hybrid Load Balancing Policy underlying Cloud Computing Environment A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349

More information

Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks

Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks ENSC 427: Communication Network Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks Simon Fraser University - Spring 2012 Claire Liu Alan Fang Linda Zhao Team 3 csl12 at sfu.ca

More information

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 1, Volume 2 (January 2015)

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 1, Volume 2 (January 2015) Survey on Massive Multimedia Content Delivery in Push- Based Wireless Converged Network Saranya B, II M.E. Department of Computer Science and Engineering, Balasubramaniam C, Asst.Professor(Sr.G), Department

More information

CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY

CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY SEIFEDINE KADRY, KHALED SMAILI Lebanese University-Faculty of Sciences Beirut-Lebanon E-mail: skadry@gmail.com ABSTRACT This paper presents

More information

What is going on in Mobile Broadband Networks?

What is going on in Mobile Broadband Networks? Nokia Networks What is going on in Mobile Broadband Networks? Smartphone Traffic Analysis and Solutions White Paper Nokia Networks white paper What is going on in Mobile Broadband Networks? Contents Executive

More information

IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD

IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD R.Dhanya 1, Mr. G.R.Anantha Raman 2 1. Department of Computer Science and Engineering, Adhiyamaan college of Engineering(Hosur).

More information

Chapter 19 Cloud Computing for Multimedia Services

Chapter 19 Cloud Computing for Multimedia Services Chapter 19 Cloud Computing for Multimedia Services 19.1 Cloud Computing Overview 19.2 Multimedia Cloud Computing 19.3 Cloud-Assisted Media Sharing 19.4 Computation Offloading for Multimedia Services 19.5

More information

An Untold Story of Middleboxes in Cellular Networks

An Untold Story of Middleboxes in Cellular Networks An Untold Story of Middleboxes in Cellular Networks Zhaoguang Wang 1 Zhiyun Qian 1, Qiang Xu 1, Z. Morley Mao 1, Ming Zhang 2 1 University of Michigan 2 Microsoft Research Background on cellular network

More information

Characterizing Task Usage Shapes in Google s Compute Clusters

Characterizing Task Usage Shapes in Google s Compute Clusters Characterizing Task Usage Shapes in Google s Compute Clusters Qi Zhang 1, Joseph L. Hellerstein 2, Raouf Boutaba 1 1 University of Waterloo, 2 Google Inc. Introduction Cloud computing is becoming a key

More information

Burst Testing. New mobility standards and cloud-computing network. This application note will describe how TCP creates bursty

Burst Testing. New mobility standards and cloud-computing network. This application note will describe how TCP creates bursty Burst Testing Emerging high-speed protocols in mobility and access networks, combined with qualityof-service demands from business customers for services such as cloud computing, place increased performance

More information

EUROPE ERICSSON MOBILITY REPORT APPENDIX JUNE

EUROPE ERICSSON MOBILITY REPORT APPENDIX JUNE EUROPE ERICSSON MOBILITY REPORT APPENDIX JUNE 2015 MARKET OVERVIEW Key figures: Europe 2014 2020 CAGR 2014 2020 Mobile subscriptions (million) 1,125 1,270 2% Smartphone subscriptions (million) 450 830

More information

Efficiently Running Continuous Monitoring Applications on Mobile Devices using Sensor Hubs

Efficiently Running Continuous Monitoring Applications on Mobile Devices using Sensor Hubs Efficiently Running Continuous Monitoring Applications on Mobile Devices using Hubs Aruna Balasubramanian, Anthony LaMarca*, and David Wetherall University of Washington, *Intel ABSTRACT Smartphone applications

More information

Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud

Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud Pramod Kumar H N Post-Graduate Student (CSE), P.E.S College of Engineering, Mandya, India Abstract: Now days, more

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Mobile Cloud Computing Challenges

Mobile Cloud Computing Challenges Mobile Cloud Computing Challenges by Kyung Mun - Tuesday, September 21, 2010 http://www2.alcatel-lucent.com/techzine/mobile-cloud-computing-challenges/ Application usage on mobile devices has exploded

More information

Big Data Storage Architecture Design in Cloud Computing

Big Data Storage Architecture Design in Cloud Computing Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Optimal Network Discovery Period for Energy- Efficient WLAN Offloading

Optimal Network Discovery Period for Energy- Efficient WLAN Offloading Optimal Network Discovery Period for Energy- Efficient WLAN Offloading Dionysia Triantafyllopoulou, Tao Guo, and Klaus Moessner Centre for Communication Systems Research University of Surrey Guildford,

More information

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,

More information

networks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER

networks Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery WHITE PAPER Live & On-Demand Video Delivery without Interruption Wireless optimization the unsolved mystery - Improving the way the world connects - WHITE PAPER Live On-Demand Video Streaming without Interruption

More information

Load Distribution in Large Scale Network Monitoring Infrastructures

Load Distribution in Large Scale Network Monitoring Infrastructures Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu

More information

Smart Wi-Fi A Smart Offload Solution for Smart Phones Kineto Wireless, Inc.

Smart Wi-Fi A Smart Offload Solution for Smart Phones Kineto Wireless, Inc. A Smart Offload Solution for Smart Phones January 2010 Kineto Wireless, Inc. 1601 McCarthy Blvd. Milpitas, CA 95035 Tel: +1 408 546 0660 2010 Kineto Wireless, Inc. All rights reserved. www.kineto.com The

More information

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu Dilip Kumar Krishnappa, Samamon Khemmarat, Lixin Gao, Michael Zink University of Massachusetts Amherst,

More information

Examining Self-Similarity Network Traffic intervals

Examining Self-Similarity Network Traffic intervals Examining Self-Similarity Network Traffic intervals Hengky Susanto Byung-Guk Kim Computer Science Department University of Massachusetts at Lowell {hsusanto, kim}@cs.uml.edu Abstract Many studies have

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

P2P VoIP for Today s Premium Voice Service 1

P2P VoIP for Today s Premium Voice Service 1 1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross ARath01@students.poly.edu, {YongLiu, Panwar, Ross}@poly.edu, Steve.Leiden@verizon.com

More information

Quality of Service Testing in the VoIP Environment

Quality of Service Testing in the VoIP Environment Whitepaper Quality of Service Testing in the VoIP Environment Carrying voice traffic over the Internet rather than the traditional public telephone network has revolutionized communications. Initially,

More information

Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems

Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems Howon Lee, Taesoo Kwon and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone

Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010 343 Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone Mohd Ismail Department

More information

Characterizing Instant Messaging Apps on Smartphones

Characterizing Instant Messaging Apps on Smartphones Characterizing Instant Messaging Apps on Smartphones Li Zhang, Chao Xu, Parth H. Pathak, and Prasant Mohapatra University of California, Davis CA 95616, USA, {jxzhang, chaoxu, phpathak, pmohapatra}@ucdavis.edu

More information

Voice Service Support over Cognitive Radio Networks

Voice Service Support over Cognitive Radio Networks Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,

More information

Performance Workload Design

Performance Workload Design Performance Workload Design The goal of this paper is to show the basic principles involved in designing a workload for performance and scalability testing. We will understand how to achieve these principles

More information

Energy aware RAID Configuration for Large Storage Systems

Energy aware RAID Configuration for Large Storage Systems Energy aware RAID Configuration for Large Storage Systems Norifumi Nishikawa norifumi@tkl.iis.u-tokyo.ac.jp Miyuki Nakano miyuki@tkl.iis.u-tokyo.ac.jp Masaru Kitsuregawa kitsure@tkl.iis.u-tokyo.ac.jp Abstract

More information

Dynamics of Prefix Usage at an Edge Router

Dynamics of Prefix Usage at an Edge Router Dynamics of Prefix Usage at an Edge Router Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos Computer Science Department, Colorado State University, USA {kaustubh, massey, christos@cs.colostate.edu}

More information

Mobile Cloud Computing for Data-Intensive Applications

Mobile Cloud Computing for Data-Intensive Applications Mobile Cloud Computing for Data-Intensive Applications Senior Thesis Final Report Vincent Teo, vct@andrew.cmu.edu Advisor: Professor Priya Narasimhan, priya@cs.cmu.edu Abstract The computational and storage

More information

Crowdsourcing mobile networks from experiment

Crowdsourcing mobile networks from experiment Crowdsourcing mobile networks from the experiment Katia Jaffrès-Runser University of Toulouse, INPT-ENSEEIHT, IRIT lab, IRT Team Ecole des sciences avancées de Luchon Networks and Data Mining, Session

More information

Managing Background Data Traffic in Mobile Devices

Managing Background Data Traffic in Mobile Devices Qualcomm Incorporated January 2012 QUALCOMM is a registered trademark of QUALCOMM Incorporated in the United States and may be registered in other countries. Other product and brand names may be trademarks

More information

ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT

ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT Dipika K. Nimbokar 1, Ranjit M. Shende 2 1 B.E.,IT,J.D.I.E.T.,Yavatmal,Maharashtra,India,dipika23nimbokar@gmail.com 2 Assistant Prof,

More information

Universities of Leeds, Sheffield and York http://eprints.whiterose.ac.uk/

Universities of Leeds, Sheffield and York http://eprints.whiterose.ac.uk/ promoting access to White Rose research papers Universities of Leeds, Sheffield and York http://eprints.whiterose.ac.uk/ This is the published version of a Proceedings Paper presented at the 213 IEEE International

More information

Admission Control for VoIP Traffic in IEEE 802.11 Networks

Admission Control for VoIP Traffic in IEEE 802.11 Networks Admission Control for VoIP Traffic in IEEE 802.11 Networks Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: sgarg@avaya.com Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: mkappes@avaya.com

More information

Measurement Analysis of Mobile Data Networks *

Measurement Analysis of Mobile Data Networks * Measurement Analysis of Mobile Data Networks * Young J. Won, Byung-Chul Park, Seong-Cheol Hong, Kwang Bon Jung, Hong-Taek Ju, and James W. Hong Dept. of Computer Science and Engineering, POSTECH, Korea

More information

Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices

Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices O.O. Abiona 1, A. I. Oluwaranti 2, T. Anjali 3, C. E. Onime 4, E.O. Popoola 5, G.A. Aderounmu 6, A. O Oluwatope

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE

INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE Ankur Saraf * Computer Science Engineering, MIST College, Indore, MP, India ankursaraf007@gmail.com

More information

Characterizing Task Usage Shapes in Google s Compute Clusters

Characterizing Task Usage Shapes in Google s Compute Clusters Characterizing Task Usage Shapes in Google s Compute Clusters Qi Zhang University of Waterloo qzhang@uwaterloo.ca Joseph L. Hellerstein Google Inc. jlh@google.com Raouf Boutaba University of Waterloo rboutaba@uwaterloo.ca

More information

3G smartphones. ericsson White paper Uen 284 23-3250 February 2015

3G smartphones. ericsson White paper Uen 284 23-3250 February 2015 ericsson White paper Uen 284 23-3250 February 2015 3G smartphones optimizing user experience and network efficiency Rapid global smartphone uptake is creating new mobile data traffic patterns. There is

More information

A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks

A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks Junli Yuan *, Sujoy Roy, Qibin Sun Institute for Infocomm Research (I 2 R), 21 Heng Mui Keng Terrace,

More information

LTE-Advanced Carrier Aggregation Optimization

LTE-Advanced Carrier Aggregation Optimization Nokia Networks LTE-Advanced Carrier Aggregation Optimization Nokia Networks white paper LTE-Advanced Carrier Aggregation Optimization Contents Introduction 3 Carrier Aggregation in live networks 4 Multi-band

More information

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,

More information

Empowering Developers to Estimate App Energy Consumption. Radhika Mittal, UC Berkeley Aman Kansal & Ranveer Chandra, Microsoft Research

Empowering Developers to Estimate App Energy Consumption. Radhika Mittal, UC Berkeley Aman Kansal & Ranveer Chandra, Microsoft Research Empowering Developers to Estimate App Energy Consumption Radhika Mittal, UC Berkeley Aman Kansal & Ranveer Chandra, Microsoft Research Phone s battery life is critical performance and user experience metric

More information

IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications

IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications Open System Laboratory of University of Illinois at Urbana Champaign presents: Outline: IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications A Fine-Grained Adaptive

More information

Mobile Multimedia Meet Cloud: Challenges and Future Directions

Mobile Multimedia Meet Cloud: Challenges and Future Directions Mobile Multimedia Meet Cloud: Challenges and Future Directions Chang Wen Chen State University of New York at Buffalo 1 Outline Mobile multimedia: Convergence and rapid growth Coming of a new era: Cloud

More information

International Journal of Applied Science and Technology Vol. 2 No. 3; March 2012. Green WSUS

International Journal of Applied Science and Technology Vol. 2 No. 3; March 2012. Green WSUS International Journal of Applied Science and Technology Vol. 2 No. 3; March 2012 Abstract 112 Green WSUS Seifedine Kadry, Chibli Joumaa American University of the Middle East Kuwait The new era of information

More information

Adaptive Coding and Energy Efficient Packet Rate Transmission over Wireless LAN Friendly VOIP

Adaptive Coding and Energy Efficient Packet Rate Transmission over Wireless LAN Friendly VOIP Adaptive Coding and Energy Efficient Packet Rate Transmission over Wireless LAN Friendly VOIP Shruti Chaurasia Department of computer science Amity University sector -125, Noida (U.P.) Kamal Kant Department

More information

Rapid Bottleneck Identification A Better Way to do Load Testing. An Oracle White Paper June 2009

Rapid Bottleneck Identification A Better Way to do Load Testing. An Oracle White Paper June 2009 Rapid Bottleneck Identification A Better Way to do Load Testing An Oracle White Paper June 2009 Rapid Bottleneck Identification A Better Way to do Load Testing. RBI combines a comprehensive understanding

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

How To Compare Available Bandwidth On A Network With A Powerline To A Network On A Testbed On A Computer Or Network On An Ipad Or Ipad On A 2Mbb (Or Ipad) On A 4Ghz Network On The

How To Compare Available Bandwidth On A Network With A Powerline To A Network On A Testbed On A Computer Or Network On An Ipad Or Ipad On A 2Mbb (Or Ipad) On A 4Ghz Network On The 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Path-F3: Improving Accuracy and Network Load in Available Estimation

More information

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi (faa6@sfu.ca) Ehsan Arman (eaa14@sfu.ca) http://www.sfu.ca/~faa6

More information

Performance evaluation of Web Information Retrieval Systems and its application to e-business

Performance evaluation of Web Information Retrieval Systems and its application to e-business Performance evaluation of Web Information Retrieval Systems and its application to e-business Fidel Cacheda, Angel Viña Departament of Information and Comunications Technologies Facultad de Informática,

More information

Optimized Offloading Services in Cloud Computing Infrastructure

Optimized Offloading Services in Cloud Computing Infrastructure Optimized Offloading Services in Cloud Computing Infrastructure 1 Dasari Anil Kumar, 2 J.Srinivas Rao 1 Dept. of CSE, Nova College of Engineerng & Technology,Vijayawada,AP,India. 2 Professor, Nova College

More information

Forecast of Mobile Broadband Bandwidth Requirements

Forecast of Mobile Broadband Bandwidth Requirements Forecast of Mobile Broadband Bandwidth Requirements s Executive Summary The consumption of video content is creating a shift from use in the home to mobile devices. This is driving exponential increases

More information

Smart Wi-Fi A Smart Offload Solution for Smartphones

Smart Wi-Fi A Smart Offload Solution for Smartphones Smart Wi-Fi A Smart Offload Solution for Smartphones Kineto Wireless, Inc. 1601 McCarthy Blvd. Milpitas, CA 95035 Tel: +1 408 546 0660 2011 Kineto Wireless, Inc. All rights reserved. www.kineto.com The

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418 An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com

More information

The Study of Implementation and Assessment of a Cloud Computer Room. Pai-shu Huang, Shih-hao Shen. WuFeng University, Taiwan

The Study of Implementation and Assessment of a Cloud Computer Room. Pai-shu Huang, Shih-hao Shen. WuFeng University, Taiwan The Study of Implementation and Assessment of a Cloud Computer Room Pai-shu Huang, Shih-hao Shen 0178 WuFeng University, Taiwan The Asian Conference on Technology in the Classroom 2012 2012 Abstract: The

More information

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea

More information

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Self-similarity and its evolution in Computer Network Measurements Prior models used Poisson-like models Origins

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

WebEx. Network Bandwidth White Paper. WebEx Communications Inc. - 1 -

WebEx. Network Bandwidth White Paper. WebEx Communications Inc. - 1 - WebEx Network Bandwidth White Paper WebEx Communications Inc. - 1 - Copyright WebEx Communications, Inc. reserves the right to make changes in the information contained in this publication without prior

More information

Shareability and Locality Aware Scheduling Algorithm in Hadoop for Mobile Cloud Computing

Shareability and Locality Aware Scheduling Algorithm in Hadoop for Mobile Cloud Computing Shareability and Locality Aware Scheduling Algorithm in Hadoop for Mobile Cloud Computing Hsin-Wen Wei 1,2, Che-Wei Hsu 2, Tin-Yu Wu 3, Wei-Tsong Lee 1 1 Department of Electrical Engineering, Tamkang University

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information