Energy Performance and Accounting in Mobile Operating Systems

Size: px
Start display at page:

Download "Energy Performance and Accounting in Mobile Operating Systems"

Transcription

1 Computer Laboratory Energy Performance and Accounting in Mobile Operating Systems James Snee and Andrew Rice 1

2 Too many features not enough energy... 2

3 Where is the energy spent?? 3

4 Power (Watts) What is the phone doing? Seconds (s) 4

5 Even the idle state of the device is unpredictable Patterns exist Power (Watts) High variance in power consumption Seconds (s) 5

6 Frequency Density Changes in the OS can have profound effects Joules Andrew Rice, Simon Hay, Measuring mobile phone energy consumption for wireless networking, Pervasive and Mobile Computing, Volume 6, Issue 6, December 2010, Pages

7 Power (Watts) Android 1.1 checks that no one is using the same IP address Time (seconds) Andrew Rice, Simon Hay, Measuring mobile phone energy consumption for wireless networking, Pervasive and Mobile Computing, Volume 6, Issue 6, December 2010, Pages

8 Power (Watts) Android 2.1 doesn t bother checking... Time (seconds) Andrew Rice, Simon Hay, Measuring mobile phone energy consumption for wireless networking, Pervasive and Mobile Computing, Volume 6, Issue 6, December 2010, Pages

9 Consumption difference found by monitoring the network Some effects not visible outside the device 9

10 What s going on inside the device? We instrument Android s Linux Kernel Applications Middleware / Services Native interfaces Linux Kernel 10

11 We are able to make use of existing profiling tools KProbes DTrace Perf SystemTap FTrace Valgrind OProfile Linux Trace Toolkit 11

12 We are able to make use of existing profiling tools KProbes DTrace Perf SystemTap FTrace Valgrind OProfile Linux Trace Toolkit 12

13 Power (Watts) We logged every system call made during idle test using FTrace Seconds (s) 13

14 FTrace places instrumentation in every system function Adds a call to the mcount routine in the prelude of every function (mcount: arch/arm/kernel/entry-common.s) This routine stores tracing information into a small ring-buffer Requires a rooted device and a custom built kernel 14

15 Example FTrace (function tracer) trace output [Process Name] [CPU] [Time since boot]: [function] <- [parent] : fsnotify_parent <-vfs_write : fsnotify <-vfs_write : srcu_read_lock <-fsnotify : srcu_read_unlock <-fsnotify : sys_dup2 <-ret_fast_syscall : sys_dup3 <-sys_dup : expand_files <-sys_dup : filp_close <-sys_dup : locks_remove_posix <-filp_close : fput <-filp_close : fsnotify_parent <-fput : fsnotify <-fput : locks_remove_flock <-fput : module_put <-fput : put_pid <-fput : file_sb_list_del <-fput : files_lglock_local_unlock_cpu <-file_sb_list_del : drop_file_write_access <-fput : mnt_drop_write <-drop_file_write_access : call_rcu <-fput 15

16 Annotated the first 1ms of the idle trace Power (Watts) 1ms Seconds (s) 16

17 Too much noise in the data Power sampled at 10kHz 17

18 Instrument individual functions with SystemTap Applications Middleware / Services Native interfaces ST ST Linux Kernel ST ST FTrace 18

19 SystemTap instruments the Kernel without the need to recompile Tap Script Translate to C Insert and run Build Kernel Module Report back the internal state of functions Safer interface to kprobes, no more panics 19

20 consumed per kilobyte (J) Energy Energy consumed per kilobyte (J) WiFi + TCP energy consumption appears to follow a trend Message size (kb) Message Size (kb) Andrew Rice, Simon Hay, Measuring mobile phone energy consumption for wireless networking, Pervasive and Mobile Computing, Volume 6, Issue 6, December 2010, Pages

21 Energy consumed per kilobyte (J) We re using SystemTap to investigate these outliers Message Size (kb) What s going on inside TCP? Andrew Rice, Simon Hay, Measuring mobile phone energy consumption for wireless networking, Pervasive and Mobile Computing, Volume 6, Issue 6, December 2010, Pages

22 We are using SystemTap to instrument the Linux TCP implementation probe printf("tcp %ul %s>%s \n",gettimeofday_s(),thread_indent(1),probefunc()) } 22

23 Moving instrumentation into the OS is giving us a better picture of what s going on 23

24 Computer Laboratory Energy Performance and Accounting in Mobile Operating Systems James Snee and Andrew Rice Portions of this page are reproduced from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. 24

<Insert Picture Here> Tracing on Linux: the Old, the New, and the Ugly

<Insert Picture Here> Tracing on Linux: the Old, the New, and the Ugly Tracing on Linux: the Old, the New, and the Ugly Elena Zannoni (elena.zannoni@oracle.com) Linux Engineering, Oracle America October 27 2011 Categories of Tracing Tools Kernel Tracing

More information

Presentation of Diagnosing performance overheads in the Xen virtual machine environment

Presentation of Diagnosing performance overheads in the Xen virtual machine environment Presentation of Diagnosing performance overheads in the Xen virtual machine environment September 26, 2005 Framework Using to fix the Network Anomaly Xen Network Performance Test Using Outline 1 Introduction

More information

Linux Tools for Monitoring and Performance. Khalid Baheyeldin November 2009 KWLUG http://2bits.com

Linux Tools for Monitoring and Performance. Khalid Baheyeldin November 2009 KWLUG http://2bits.com Linux Tools for Monitoring and Performance Khalid Baheyeldin November 2009 KWLUG http://2bits.com Agenda Introduction Definitions Tools, with demos Focus on command line, servers, web Exclude GUI tools

More information

<Insert Picture Here> Tracing on Linux

<Insert Picture Here> Tracing on Linux Tracing on Linux Elena Zannoni (elena.zannoni@oracle.com) Linux Engineering, Oracle America November 6 2012 The Tree of Tracing SystemTap LTTng perf DTrace ftrace GDB TRACE_EVENT

More information

Efficient and Large-Scale Infrastructure Monitoring with Tracing

Efficient and Large-Scale Infrastructure Monitoring with Tracing CloudOpen Europe 2013 Efficient and Large-Scale Infrastructure Monitoring with Tracing Julien.desfossez@efcios.com 1 Content Overview of tracing and LTTng LTTng features for Cloud Providers LTTng as a

More information

<Insert Picture Here> Tracing on Linux Updates

<Insert Picture Here> Tracing on Linux Updates Tracing on Linux Updates Elena Zannoni (elena.zannoni@oracle.com) Linux Engineering, Oracle America May 30 2013 A Look at the Building Blocks Kprobes Tracepoints Uprobes 2 Kprobes:

More information

HONE: Correlating Host activities to Network communications to produce insight

HONE: Correlating Host activities to Network communications to produce insight HONE: Correlating Host activities to Network communications to produce insight GLENN A. FINK, PH.D. Senior Scientist, Secure Cyber Systems SEAN STORY, PMP Project Manager, Software Engineering & Architectures

More information

Android Development: a System Perspective. Javier Orensanz

Android Development: a System Perspective. Javier Orensanz Android Development: a System Perspective Javier Orensanz 1 ARM - Linux and Communities Linux kernel GNU Tools 2 Linaro Partner Initiative Mission: Make open source development easier by delivering a common

More information

Monitoring, Tracing, Debugging (Under Construction)

Monitoring, Tracing, Debugging (Under Construction) Monitoring, Tracing, Debugging (Under Construction) I was already tempted to drop this topic from my lecture on operating systems when I found Stephan Siemen's article "Top Speed" in Linux World 10/2003.

More information

AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring

AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring Chanmin Yoon*, Dongwon Kim, Wonwoo Jung, Chulkoo Kang, Hojung Cha Dept. of Computer Science Yonsei

More information

Visualizing gem5 via ARM DS-5 Streamline. Dam Sunwoo (dam.sunwoo@arm.com) ARM R&D December 2012

Visualizing gem5 via ARM DS-5 Streamline. Dam Sunwoo (dam.sunwoo@arm.com) ARM R&D December 2012 Visualizing gem5 via ARM DS-5 Streamline Dam Sunwoo (dam.sunwoo@arm.com) ARM R&D December 2012 1 The Challenge! System-level research and performance analysis becoming ever so complicated! More cores and

More information

Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER

Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER Introduction Many VMware customers have virtualized their ROBO (Remote Office Branch Office) offices in order to

More information

Red Hat Summit 2009 Bryan Che

Red Hat Summit 2009 Bryan Che 1 Red Hat Enterprise MRG Update Bryan Che Product Manager, Red Hat September 2, 2009 2 About Red Hat Enterprise MRG Integrated platform for high performance distributed computing High speed, interoperable,

More information

ANDROID DEVELOPER TOOLS TRAINING GTC 2014. Sébastien Dominé, NVIDIA

ANDROID DEVELOPER TOOLS TRAINING GTC 2014. Sébastien Dominé, NVIDIA ANDROID DEVELOPER TOOLS TRAINING GTC 2014 Sébastien Dominé, NVIDIA AGENDA NVIDIA Developer Tools Introduction Multi-core CPU tools Graphics Developer Tools Compute Developer Tools NVIDIA Developer Tools

More information

Agenda. Context. System Power Management Issues. Power Capping Overview. Power capping participants. Recommendations

Agenda. Context. System Power Management Issues. Power Capping Overview. Power capping participants. Recommendations Power Capping Linux Agenda Context System Power Management Issues Power Capping Overview Power capping participants Recommendations Introduction of Linux Power Capping Framework 2 Power Hungry World Worldwide,

More information

Frysk The Systems Monitoring and Debugging Tool. Andrew Cagney

Frysk The Systems Monitoring and Debugging Tool. Andrew Cagney Frysk The Systems Monitoring and Debugging Tool Andrew Cagney Agenda Two Use Cases Motivation Comparison with Existing Free Technologies The Frysk Architecture and GUI Command Line Utilities Current Status

More information

Realtime Linux Kernel Features

Realtime Linux Kernel Features Realtime Linux Kernel Features Tim Burke, Red Hat, Director Emerging Technologies Special guest appearance, Ted Tso of IBM Realtime what does it mean to you? Agenda What? Terminology, Target capabilities

More information

The red hat enterprise linux developer program

The red hat enterprise linux developer program Program Guide The red hat enterprise linux developer program access essential resources and an ecosystem of experts to develop great applications Key benefits Collaborate with a passionate developer community

More information

Performance Architect Remote Storage (Intern)

Performance Architect Remote Storage (Intern) Performance Architect Remote Storage (Intern) Samsung Semiconductor, Inc. is a world leader in Memory, System LSI and LCD technologies. We are currently looking for a Performance Architect (Intern) to

More information

Android Virtualization from Sierraware. Simply Secure

Android Virtualization from Sierraware. Simply Secure Android Virtualization from Sierraware Simply Secure Integration Challenges DRM Mandates TrustZone TEE Hypervisor provides the flexibility and security needed for BYOD Power management, responsibility

More information

Perf Tool: Performance Analysis Tool for Linux

Perf Tool: Performance Analysis Tool for Linux / Notes on Linux perf tool Intended audience: Those who would like to learn more about Linux perf performance analysis and profiling tool. Used: CPE 631 Advanced Computer Systems and Architectures CPE

More information

iva Cable & Antenna Analyzer

iva Cable & Antenna Analyzer iva Cable & Antenna Analyzer VSWR, Return Loss Measurement & Distance to Fault The iva Series Cable & Antenna Analyzer is an exciting new product from Kaelus that enables users to accurately measure VSWR/return

More information

Operating System Structures

Operating System Structures COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating

More information

AMD CodeXL 1.7 GA Release Notes

AMD CodeXL 1.7 GA Release Notes AMD CodeXL 1.7 GA Release Notes Thank you for using CodeXL. We appreciate any feedback you have! Please use the CodeXL Forum to provide your feedback. You can also check out the Getting Started guide on

More information

Compilers and Tools for Software Stack Optimisation

Compilers and Tools for Software Stack Optimisation Compilers and Tools for Software Stack Optimisation EJCP 2014 2014/06/20 christophe.guillon@st.com Outline Compilers for a Set-Top-Box Compilers Potential Auto Tuning Tools Dynamic Program instrumentation

More information

Multi-Operating Environment System

Multi-Operating Environment System Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.

More information

Virtualization. Michael Tsai 2015/06/08

Virtualization. Michael Tsai 2015/06/08 Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%

More information

Fall 2011 SYSTEM ARCHITECTURE DESIGN TEAM MEMBERS: PROJECT OWNERS: AMIR ROOZBEH(amirrsk@kth.se, 15 ECTS) EKAMBAR SELVAKUMAR(ekambar@kth.

Fall 2011 SYSTEM ARCHITECTURE DESIGN TEAM MEMBERS: PROJECT OWNERS: AMIR ROOZBEH(amirrsk@kth.se, 15 ECTS) EKAMBAR SELVAKUMAR(ekambar@kth. Fall 2011 SYSTEM ARCHITECTURE DESIGN TEAM MEMBERS: AMIR ROOZBEH(amirrsk@kth.se, 15 ECTS) EKAMBAR SELVAKUMAR(ekambar@kth.se, 30 ECTS) ERICSON FERDINAND PASARIBU(pasaribu@kth.se, 24 ECTS) JUNG CHANGSU(changsu@kth.se,

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

App: HomeBound 1.1 (https://play.google.com/store/apps/developer?id=zebu+games) Device: Samsung GT-S5302 Android 2.3.6

App: HomeBound 1.1 (https://play.google.com/store/apps/developer?id=zebu+games) Device: Samsung GT-S5302 Android 2.3.6 Contest 12 Task Pick any three mnemonics from http://www.qualityperspectives.ca/resources_mnemonics.html and find at least three bugs for each mnemonic. Feel free to use any application (website/desktop/mobile)

More information

Finding Performance and Power Issues on Android Systems. By Eric W Moore

Finding Performance and Power Issues on Android Systems. By Eric W Moore Finding Performance and Power Issues on Android Systems By Eric W Moore Agenda Performance & Power Tuning on Android & Features Needed/Wanted in a tool Some Performance Tools Getting a Device that Supports

More information

How To Monitor Bandwidth On A Computer Network

How To Monitor Bandwidth On A Computer Network Bandwidth Monitoring Tools Abhishek Sinha [I], Nishant Kumar [II] I Department of Computer Science and Engg.,SSIET, DeraBassi (Punjab), II Scientist, DESIDOC (DRDO) I sinha@live.in, II nishant@desidoc.drdo.in

More information

Software Tracing of Embedded Linux Systems using LTTng and Tracealyzer. Dr. Johan Kraft, Percepio AB

Software Tracing of Embedded Linux Systems using LTTng and Tracealyzer. Dr. Johan Kraft, Percepio AB Software Tracing of Embedded Linux Systems using LTTng and Tracealyzer Dr. Johan Kraft, Percepio AB Debugging embedded software can be a challenging, time-consuming and unpredictable factor in development

More information

Android Application Development

Android Application Development Android Application Development 3TECHSOFT INNOVATION*INTELLIGENCE*INFORMATION Effective from: JUNE 2013 Noida Office: A-385, Noida (UP)- 201301 Contact us: Email: hr@3techsoft.com Website: www.3techsoft.com

More information

BF2CC Daemon Linux Installation Guide

BF2CC Daemon Linux Installation Guide BF2CC Daemon Linux Installation Guide Battlefield 2 + BF2CC Installation Guide (Linux) 1 Table of contents 1. Introduction... 3 2. Opening ports in your firewall... 4 3. Creating a new user account...

More information

#311 Engineer. Year of birth 1967 Specialities: Embedded Systems, Linux

#311 Engineer. Year of birth 1967 Specialities: Embedded Systems, Linux #311 Engineer. Year of birth 1967 Specialities: Embedded Systems, Linux Work experience 2010 - Prevas Freelance Consultant 2007 2009 TietoEnator A/S Software Developer 2000 2007 Ericsson Telebit A/S Software

More information

Network Security. Network Packet Analysis

Network Security. Network Packet Analysis Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS kaw@cerias.purdue.edu 1 Network Packet Analysis Definition: Examining network packets to determine

More information

COLLABORATION AV SYSTEMS IN THE AGE OF BYOD

COLLABORATION AV SYSTEMS IN THE AGE OF BYOD COLLABORATION AV SYSTEMS IN THE AGE OF BYOD Matt Kopin Product Manager, Kramer Electronics USA OCTOBER 2014 KRAMER WHITE PAPER WWW.KRAMERUS.COM TABLE OF CONTENTS INTRODUCTION...1 IT S NICE TO SHARE, BUT...1

More information

Troubleshooting Oracle performance issues beyond the Oracle wait interface

Troubleshooting Oracle performance issues beyond the Oracle wait interface Troubleshooting Oracle performance issues beyond the Oracle wait interface Stefan Koehler 16.06.16 Page 1 About me Stefan Koehler Independent Oracle performance consultant and researcher 13+ years using

More information

Developing applications on Yocto. Lianhao Lu Intel Corporation Feb. 29th, 2012

Developing applications on Yocto. Lianhao Lu Intel Corporation Feb. 29th, 2012 Developing applications on Yocto Lianhao Lu Intel Corporation Feb. 29th, 2012 Agenda Embedded Linux Development The Yocto Project Offerings For Embedded Linux Development The Yocto Project Eclipse Plug-in

More information

OS Observability Tools

OS Observability Tools OS Observability Tools Classic tools and their limitations DTrace (Solaris) SystemTAP (Linux) Slide 1 Where we're going with this... Know about OS observation tools See some examples how to use existing

More information

Five standard procedures for building the android system. Figure1. Procedures for building android embedded systems

Five standard procedures for building the android system. Figure1. Procedures for building android embedded systems Standard Operating Procedures for Android Embedded Systems Anupama M. Kulkarni, Shang-Yang Chang, Ying-Dar Lin National Chiao Tung University, Hsinchu, Taiwan November 2012 Android is considered to be

More information

University of Huddhire - A Case Study in LHC and Windows HPC 2008 R2

University of Huddhire - A Case Study in LHC and Windows HPC 2008 R2 University of Huddersfield Repository Kureshi, Ibad, Holmes, Violeta and Liang, Shuo Hybrid HPC Establishing a Bi-Stable Dual Boot Cluster for Linux with OSCAR middleware and Windows HPC 2008 R2 Original

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

Intel Application Software Development Tool Suite 2.2 for Intel Atom processor. In-Depth

Intel Application Software Development Tool Suite 2.2 for Intel Atom processor. In-Depth Application Software Development Tool Suite 2.2 for Atom processor In-Depth Contents Application Software Development Tool Suite 2.2 for Atom processor............................... 3 Features and Benefits...................................

More information

Connecting your Aiki phone to a network

Connecting your Aiki phone to a network Connecting your Aiki phone to a network Connect to mobile networks Depending on your carrier and service plan, your phone may connect automatically to your carrier s fastest available data network. Or

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

ITG Software Engineering

ITG Software Engineering Basic Android Development Course ID: Page 1 Last Updated 12/15/2014 Basic Android Development ITG Software Engineering Course Overview: This 5 day course gives students the fundamental basics of Android

More information

Using Process Monitor

Using Process Monitor Using Process Monitor Process Monitor Tutorial This information was adapted from the help file for the program. Process Monitor is an advanced monitoring tool for Windows that shows real time file system,

More information

CSE 237A Final Project Final Report

CSE 237A Final Project Final Report CSE 237A Final Project Final Report Multi-way video conferencing system over 802.11 wireless network Motivation Yanhua Mao and Shan Yan The latest technology trends in personal mobile computing are towards

More information

Valgrind BoF Ideas, new features and directions

Valgrind BoF Ideas, new features and directions Valgrind BoF Ideas, new features and directions Everybody! Valgrind developers and users are encouraged to participate by joining the discussion. And of course by kindly (or bitterly:) complain about bugs

More information

WNMS Mobile Application

WNMS Mobile Application WNMS Mobile Application User s Guide Revision 1.0 18 October 2013 Copyright 2013 Deliberant www.deliberant.com Copyright 2013 Deliberant This user s guide and the software described in it are copyrighted

More information

An Analysis of the Transitions between Mobile Application Usages based on Markov Chains

An Analysis of the Transitions between Mobile Application Usages based on Markov Chains An Analysis of the Transitions between Mobile Application Usages based on Markov Chains Charles Gouin-Vallerand LICEF Research Center, Télé- Université du Québec 5800 St-Denis Boul. Montreal, QC H2S 3L5

More information

Stop the Guessing. Performance Methodologies for Production Systems. Brendan Gregg. Lead Performance Engineer, Joyent. Wednesday, June 19, 13

Stop the Guessing. Performance Methodologies for Production Systems. Brendan Gregg. Lead Performance Engineer, Joyent. Wednesday, June 19, 13 Stop the Guessing Performance Methodologies for Production Systems Brendan Gregg Lead Performance Engineer, Joyent Audience This is for developers, support, DBAs, sysadmins When perf isn t your day job,

More information

iva Cable & Antenna Analyzer

iva Cable & Antenna Analyzer iva Cable & Antenna Analyzer VSWR, Return Loss Measurement & Distance to Fault The iva Series Cable & Antenna Analyzer is an exciting new product from Kaelus that enables users to accurately measure VSWR/return

More information

Datacenter Operating Systems

Datacenter Operating Systems Datacenter Operating Systems CSE451 Simon Peter With thanks to Timothy Roscoe (ETH Zurich) Autumn 2015 This Lecture What s a datacenter Why datacenters Types of datacenters Hyperscale datacenters Major

More information

Android Development. Lecture AD 0 Android SDK & Development Environment. Università degli Studi di Parma. Mobile Application Development

Android Development. Lecture AD 0 Android SDK & Development Environment. Università degli Studi di Parma. Mobile Application Development Android Development Lecture AD 0 Android SDK & Development Environment 2013/2014 Parma Università degli Studi di Parma Lecture Summary Android Module Overview The Android Platform Android Environment Setup

More information

Android Application for Accessing KNX Devices via IP Connection

Android Application for Accessing KNX Devices via IP Connection Android Application for Accessing KNX Devices via IP Connection J. A. Nazabal, J. Gómez, F. Falcone, C. Fernández-Valdivielso, P. E. Branchi and I. R. Matías Electrical and Electronic Engineering Department,

More information

DS-5 ARM. Using the Debugger. Version 5.7. Copyright 2010, 2011 ARM. All rights reserved. ARM DUI 0446G (ID092311)

DS-5 ARM. Using the Debugger. Version 5.7. Copyright 2010, 2011 ARM. All rights reserved. ARM DUI 0446G (ID092311) ARM DS-5 Version 5.7 Using the Debugger Copyright 2010, 2011 ARM. All rights reserved. ARM DUI 0446G () ARM DS-5 Using the Debugger Copyright 2010, 2011 ARM. All rights reserved. Release Information The

More information

Android Fundamentals 1

Android Fundamentals 1 Android Fundamentals 1 What is Android? Android is a lightweight OS aimed at mobile devices. It is essentially a software stack built on top of the Linux kernel. Libraries have been provided to make tasks

More information

WIFI PineApple Mark V & Mobile Device Traffic

WIFI PineApple Mark V & Mobile Device Traffic 2/19/2015 WIFI PineApple Mark V & Mobile Device Traffic Over the years, as more people have migrated from computers to smart devices such as the iphones, ipads, tablets, Android devices and other mobile

More information

Connecting Your Device to a Wireless Network

Connecting Your Device to a Wireless Network Connecting Your Device to a Wireless Network This manual is designed to be a tutorial for our customers seeking to connect their electronic devices to their home Internet network. This manual will include

More information

Mobile Privacy: Tor On The iphone And Other Unusual Devices. Marco Bonetti - CutAway s.r.l.

Mobile Privacy: Tor On The iphone And Other Unusual Devices. Marco Bonetti - CutAway s.r.l. Mobile Privacy: Tor On The iphone And Other Unusual Devices Marco Bonetti - CutAway s.r.l. whoami Marco Bonetti Security Consultant @ CutAway s.r.l. mbonetti@cutaway.it http://www.cutaway.it/ Tor user

More information

NETWORK SECURITY WITH OPENSOURCE FIREWALL

NETWORK SECURITY WITH OPENSOURCE FIREWALL NETWORK SECURITY WITH OPENSOURCE FIREWALL Vivek Kathayat,Dr Laxmi Ahuja AIIT Amity University,Noida vivekkathayat@gmail.com lahuja@amity.edu ATTACKER SYSTEM: Backtrack 5r3( 192.168.75.10 ) HOST: Backtrack

More information

Load Balancing - Single Multipath Route HOWTO

Load Balancing - Single Multipath Route HOWTO Load Balancing - Single Multipath Route HOWTO Shakthi Kannan, shaks_wants_no_spam_at_shakthimaan_dot_com January 5, 2007 Revision: 1.2 Abstract This documentation provides the steps to setup load-balancing

More information

A Lightweight Dynamic Performance Monitoring Framework for Embedded Systems

A Lightweight Dynamic Performance Monitoring Framework for Embedded Systems A Lightweight Dynamic Performance Monitoring Framework for Embedded Systems Yao Guo, Ziwen Chen, Xiangqun Chen Key Laboratory of High-Confidence Software Technologies (Ministry of Education) Institute

More information

OS Thread Monitoring for DB2 Server

OS Thread Monitoring for DB2 Server 1 OS Thread Monitoring for DB2 Server Minneapolis March 1st, 2011 Mathias Hoffmann ITGAIN GmbH mathias.hoffmann@itgain.de 2 Mathias Hoffmann Background Senior DB2 Consultant Product Manager for SPEEDGAIN

More information

Understand and Build Android Programming Environment. Presented by: Che-Wei Chang

Understand and Build Android Programming Environment. Presented by: Che-Wei Chang Real Time System Project 1 Understand and Build Android Programming Environment Advisor: Prof. Tei-Wei i Kuo Presented by: Che-Wei Chang Outline Introduction to Android Framework What is Android Android

More information

Browser Testing Framework for LHG

Browser Testing Framework for LHG Browser Testing Framework for LHG Presented by Trevor Woerner, Will Chen Date February, 2015 Outline Overview of the test suite Test category Run the test On Linux On Android Verified platforms Test output

More information

FREE VOICE CALLING IN WIFI CAMPUS NETWORK USING ANDROID

FREE VOICE CALLING IN WIFI CAMPUS NETWORK USING ANDROID FREE VOICE CALLING IN WIFI CAMPUS NETWORK ABSTRACT: USING ANDROID The purpose of this research is to design and implement a telephony program that uses WIFI in p2p (Peer-to-Peer) or WLAN (Wireless Local

More information

Fig. 1 BAN Architecture III. ATMEL BOARD

Fig. 1 BAN Architecture III. ATMEL BOARD Volume 2, Issue 9, September 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

LogMeIn Rescue+Mobile for Android

LogMeIn Rescue+Mobile for Android LogMeIn Rescue+Mobile for Android Contents How to Connect to an Android Device...3 How to Start a Code Session on an Android Device...4 How to Chat with the Customer...5 How to Manage Files on a Customer's

More information

Kevin Cardwell. Toolkits: All-in-One Approach to Security

Kevin Cardwell. Toolkits: All-in-One Approach to Security Kevin Cardwell Kevin Cardwell spent 22 years in the U.S. Navy, starting off in Sound Navigation and Ranging (SONAR). He began programming in 1987. He was fortunate enough to get on the Testing Team and

More information

DS-5 ARM. Using the Debugger. Version 5.13. Copyright 2010-2012 ARM. All rights reserved. ARM DUI 0446M (ID120712)

DS-5 ARM. Using the Debugger. Version 5.13. Copyright 2010-2012 ARM. All rights reserved. ARM DUI 0446M (ID120712) ARM DS-5 Version 5.13 Using the Debugger Copyright 2010-2012 ARM. All rights reserved. ARM DUI 0446M () ARM DS-5 Using the Debugger Copyright 2010-2012 ARM. All rights reserved. Release Information The

More information

vyacht Wifi Router vyacht yacht automation About this manual

vyacht Wifi Router vyacht yacht automation About this manual vyacht Wifi Router The vyacht's Wifi Router brings instrument data to your ipad and on-board computer. The router comes in three different versions which all have galvanically isolated inputs: 2 x NMEA0183

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Performance Measurement of Wireless LAN Using Open Source

Performance Measurement of Wireless LAN Using Open Source Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance

More information

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE.

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE. BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE. Enhanced Security for Your Network and Business Intelligence. Work Hard. Rest Easy. Today, employees are always on, which for you means always vulnerable.

More information

Optimizing Background Email Sync on Smartphones

Optimizing Background Email Sync on Smartphones Optimizing Background Email Sync on Smartphones Fengyuan Xu 1,3, Yunxin Liu 1, Thomas Moscibroda 1, Ranveer Chandra 2, Long Jin 1,4, Yongguang Zhang 1, Qun Li 3 1 Microsoft Research Asia, Beijing, China

More information

Università Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012

Università Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012 Android Development Lecture 1 Android SDK & Development Environment Università Degli Studi di Parma Lecture Summary - 2 The Android Platform Android Environment Setup SDK Eclipse & ADT SDK Manager Android

More information

Make the green IP switch Low-energy semiconductor solutions for VoIP

Make the green IP switch Low-energy semiconductor solutions for VoIP Make the green IP switch Low-energy semiconductor solutions for VoIP 2011 Greener, better, easier With the promise of free calls, extra features and low infrastructure costs, Voice over Internet Protocol

More information

R&D Access Touch 3.1 User Manual Version 1.00 Public 1 (13) User Manual. Access Touch 3.1

R&D Access Touch 3.1 User Manual Version 1.00 Public 1 (13) User Manual. Access Touch 3.1 Public 1 (13) User Manual Access Touch 3.1 Version Date Author Description 1.00 30.09.2011 Pah First version Public 2 (13) 1. Purpose of this user manual... 3 2. Description of Access Touch 3.1... 3 3.

More information

CA Nimsoft Monitor. Probe Guide for CPU, Disk and Memory. cdm v4.7 series

CA Nimsoft Monitor. Probe Guide for CPU, Disk and Memory. cdm v4.7 series CA Nimsoft Monitor Probe Guide for CPU, Disk and Memory cdm v4.7 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and

More information

HP AppPulse Mobile. Whitepaper: Privacy, Security, and Overhead. Document Release Date: September 2014 (v1.0)

HP AppPulse Mobile. Whitepaper: Privacy, Security, and Overhead. Document Release Date: September 2014 (v1.0) HP AppPulse Mobile Whitepaper: Privacy, Security, and Overhead Document Release Date: September 2014 (v1.0) Introduction Introduction In mobile applications, user experience isn t everything; it s the

More information

A cloud-based architecture to crowdsource mobile app privacy leaks

A cloud-based architecture to crowdsource mobile app privacy leaks Department of Information & Communication Systems Engineering University of the Aegean Karlovasi, Samos, Greece A cloud-based architecture to crowdsource mobile app privacy leaks Dimitrios Papamartzivanos

More information

Android App for SAP Business One. Z3moB1le App Version 1.00 Pagina 1 di 12. www.z3engineering.it

Android App for SAP Business One. Z3moB1le App Version 1.00 Pagina 1 di 12. www.z3engineering.it Android App for SAP Business One Z3moB1le App Version 1.00 Pagina 1 di 12 Z3 Mobile for SAP Business One (Z3moB1le) Contents Overview... 3 Phone requirements... 3 Available modules... 4 Settings before

More information

Mobile Cloud Computing for Data-Intensive Applications

Mobile Cloud Computing for Data-Intensive Applications Mobile Cloud Computing for Data-Intensive Applications Senior Thesis Final Report Vincent Teo, vct@andrew.cmu.edu Advisor: Professor Priya Narasimhan, priya@cs.cmu.edu Abstract The computational and storage

More information

mbits Network Operations Centrec

mbits Network Operations Centrec mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,

More information

Version Date Author Description 1.00 19.07.2010 Jpo First version 1.01 21.12.2010 Jpo FET output descriptions made clearer 1.02 04.02.

Version Date Author Description 1.00 19.07.2010 Jpo First version 1.01 21.12.2010 Jpo FET output descriptions made clearer 1.02 04.02. +3 # Version Date Author Description 1.00 19.07.2010 Jpo First version 1.01 21.12.2010 Jpo FET output descriptions made clearer 1.02 04.02.2011 Jpo Reset button added 1. Purpose of this user manual...

More information

Extending Android's Platform Toolsuite

Extending Android's Platform Toolsuite Extending Android's Platform Toolsuite Embedded Linux Conference Europe 2015 Karim Yaghmour @karimyaghmour / +karimyaghmour karim.yaghmour@opersys.com These slides are made available to you under a Creative

More information

Frequently Asked Questions: Cisco Jabber 9.x for Android

Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail

More information

Introduction to Network Security Lab 2 - NMap

Introduction to Network Security Lab 2 - NMap Introduction to Network Security Lab 2 - NMap 1 Introduction: Nmap as an Offensive Network Security Tool Nmap, short for Network Mapper, is a very versatile security tool that should be included in every

More information

The Yocto Project Eclipse plug-in: An Effective IDE Environment for Embedded Application and System Developers

The Yocto Project Eclipse plug-in: An Effective IDE Environment for Embedded Application and System Developers It s not an embedded Linux distribution It creates a custom one for you. The Yocto Project Eclipse plug-in: An Effective IDE Environment for Embedded Application and System Developers Jessica Zhang Intel

More information

How To Test The Power Of Ancientisk On An Ipbx On A Quad Core Ios 2.2.2 (Powerbee) On A Pc Or Ipbax On A Microsoft Ipbox On A Mini Ipbq

How To Test The Power Of Ancientisk On An Ipbx On A Quad Core Ios 2.2.2 (Powerbee) On A Pc Or Ipbax On A Microsoft Ipbox On A Mini Ipbq Load test of IP PBX Asterisk installed on mid-size server E.Anvaer, V.Dudchenko, SoftBCom, Ltd. (www.softbcom.ru) 21.07.2014 Direct load test of IP PBX Asterisk on Intel Xeon E5506 Quad-Core CPU shows

More information

AC 2009-2275: RUNNING LINUX IN A WINDOWS COMPUTER LAB

AC 2009-2275: RUNNING LINUX IN A WINDOWS COMPUTER LAB AC 2009-2275: RUNNING LINUX IN A WINDOWS COMPUTER LAB Ed Crowley, University of Houston American Society for Engineering Education, 2009 Page 14.1039.1 Running Linux in a Windows Computer Lab Abstract

More information

Wireless 802.11g CF Card User Manual

Wireless 802.11g CF Card User Manual Wireless 802.11g CF Card User Manual Version 1.0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, whether electronic,

More information

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li 60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information