{"title":"A network-assisted system for energy efficiency in mobile devices","authors":"Joshua Hare, Dheeraj Agrawal, Arunesh Mishra, Suman Banerjee, Aditya Akella","doi":"10.1109/COMSNETS.2011.5716500","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716500","url":null,"abstract":"We present the design and implementation of Scepter, a system with explicit infrastructure support to reduce energy consumption and improve battery life of mobile devices. Scepter focuses on effective techniques that can reduce the total number of bits transmitted to communicate the same information from a mobile device to a base station. Scepter combines multiple techniques into a single unified architecture by utilizing a stateful proxy located within the infrastructure close to the wireless base station. Scepter intentionally introduces asymmetries in wireless communication tasks between a mobile device and the stateful proxy to provide greater energy advantages to the mobile device. In this work, we have implemented all capabilities of Scepter as various kernel- and user-level enhancements. Our detailed evaluation demonstrates the performance advantages of Scepter. In various experiments with different wireless conditions and traffic patterns, Scepter improves the energy consumption of these devices between 15% and 54%.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121877385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing power consumption of always-on applications based on timer alignment","authors":"V. Könönen, P. Pääkkönen","doi":"10.1109/COMSNETS.2011.5716468","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716468","url":null,"abstract":"In modern smartphones there exist several applications that periodically establish data connection and/or send data to the network. For example, a mobile email application periodically checks for incoming messages from the server. Packet transmission is usually triggered by expiration of a timer. Wireless radio access resources are activated during transmission, which increases energy consumption of the terminal, particularly when connected over 3G network. Fortunately, timing requirements are usually not strict and therefore application timers can be grouped together by using a timer alignment method. In this paper, we present two timer alignment methods for reduction of energy consumption. In the first both minimum and maximum thresholds of timers are available for alignment, and in the second only the maximum timer value is available. One of the methods was tested in the real environment by using Nokia N97 mobile phone in two different cellular networks. In addition, both methods were tested with a large number of randomly generated timers to find out certain statistical properties of their behavior. The tests presented very promising results, maximal power savings were ∼50%. However, the results depend on certain parameters of the cellular network.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132650519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Models of 802.11 multi-hop networks: Theoretical insights and experimental validation","authors":"A. Aziz, M. Durvy, Olivier Dousse, Patrick Thiran","doi":"10.1109/COMSNETS.2011.5716492","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716492","url":null,"abstract":"Wireless Multi-Hop CSMA/CA Networks are challenging to analyze. On the one hand, their dynamics are complex and rather subtle effects may severely affect their performance. Yet, understanding these effects is critical to operate upper layer protocols, such as TCP/IP. On the other hand, their models tend to be very complex in order to reproduce all the features of the protocol. As a result, they do not convey much insight into the essential features. We review two models of 802.11 protocols, which are simple enough to first explain why a trade-off needs to be found between fairness and spatial reuse (throughput) in saturated wireless networks (where all nodes have packets to transmit to their neighbors); and then to explain why non-saturated networks (where only some nodes, the sources, have packets to transmit to their destinations in a multi-hop fashion) that are more than 3 hops longs suffer from instability.We confront both models either to realistic simulations in ns-2 or to experiments with a testbed deployed at EPFL. We find that the predictions of both models help us understand the performance of the 802.11 protocol, and provide hints about the changes that need to be brought to the protocol.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132933068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modification of superframe structure of 802.15.4 MAC for body area networks","authors":"P. Ghare, A. Kothari, A. Keskar","doi":"10.1109/COMSNETS.2011.5716515","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716515","url":null,"abstract":"The increasing use of wireless networks and the constant minituarization of electrical devices has empowered the development of body area networks (BAN). The BAN for medical applications cover continuous waveform sampling of biomedical signals, monitoring of vital signal information. In order to fulfill the diverse medical applications, these networks have to follow stringent technical requirements in terms of reliability (QoS), low power, data rate and noninterference. To meet these requirements, researchers have set up a task group 802.15.6 which is particularly working for BAN. Out of the available communication standards, IEEE 802.15.4 seems to be the nearest suitable candidate for BAN. However the researchers have pointed out unsuitability of available 802.15.4 standard in terms of scalability and interference issues. This paper have verified the suitability of 802.15.4 standard particularly scalability of MAC for single BAN in terms of throughput, power consumption, and delay. Also the paper suggests modification in the MAC superframe structure of existing 802.15.4 and thereby addresses the scalability issue. With modified structure, there is an improvement in all the above mentioned parameters .","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115322233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An instantaneous call admission control using information dissemination for WiMAX mesh networks","authors":"R. Manickam, C. Murthy","doi":"10.1109/COMSNETS.2011.5716482","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716482","url":null,"abstract":"Although the IEEE 802.16 standard defines various QoS classes and their associated parameters, it does not define the scheduling, routing, and Call Admission Control (CAC) algorithms to be used in the network. It is left unstandardized for vendor differentiation. Currently, scalable distributed scheduling and routing algorithms are available for IEEE 802.16 mesh networks. But, the existing CAC algorithms are not entirely distributed and hence are not scalable. The algorithms not only create a bottleneck at the first hop nodes, but may also introduce an unbounded delay during the connection setup phase. In this paper, we propose an Instantaneous CAC algorithm which uses per-hop multi path routing for IEEE 802.16 mesh networks. Also, the proposed CAC algorithm eliminates the unbounded connection initiation delay and generates information for distributed routing tables. Finally, using extensive simulations, we compare the proposed protocol with Shortest Widest Efficient Bandwidth (SWEB) and Greedy Choice with Bandwidth Availability aware Defragmentation (GCAD). Simulations show that the proposed protocol eliminates the CAC delay and also improves the system throughput. The proposed protocol, reduces the number of packets (VBR and CBR) exceeding the delay requirements by about 15% and the connection delay by about 40%.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117168302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Chatterjee, S. Barat, Debojyoti Majumder, U. Bhattacharya
{"title":"New strategies for static routing and wavelength assignment in de Bruijn WDM networks","authors":"M. Chatterjee, S. Barat, Debojyoti Majumder, U. Bhattacharya","doi":"10.1109/COMSNETS.2011.5716426","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716426","url":null,"abstract":"Blocking probability has been one of the important parameters for performance analysis in the design of wavelength routed WDM networks. Existing research has proved that the way in which Routing and Wavelength Assignment (RWA) is carried out significantly affects wavelength conversion requirements, which directly affects the blocking performance. In this paper we propose two new static Wavelength Assignment (WA) strategies namely NRNWA (Nearest Request Next Wavelength Assignment) and LDWA (Link Dependent Wavelength Assignment) for WDM networks based on de Bruijn graphs. We compare these proposed strategies with our earlier static RDWA (Ring Dependent Wavelength Assignment) strategy and the well-known FFWA (First Fit Wavelength Assignment) strategy. For request routing, we consider our earlier CRR (Congestion Reduced Routing) and the well-known SRR (Shift Register Routing) algorithms. We combine the various routing and the WA strategies mentioned above in pairs to form eight static RWA strategies and compare the blocking performance of the eight strategies for different de Bruijn graphs. Performance comparison shows that the proposed strategies perform better than the earlier ones.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121705730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Dataware manifesto","authors":"Derek McAuley, R. Mortier, James Goulding","doi":"10.1109/COMSNETS.2011.5716491","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716491","url":null,"abstract":"In this paper we concern ourselves with Service-Oriented Architectures (SOA) in the “business to consumer” (B2C) arena. In particular we consider the services required to enable consumers to combine data they possess with data held about them by businesses and government. We introduce the concept of Dataware as the logical federation of data sources containing “my data” and discuss an SOA to deliver new and compelling services and applications able to reap the benefits of value-in-use for consumers.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"111 3S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125870154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Sterbenz, Egemen K. Çetinkaya, M. Hameed, A. Jabbar, Justin P. Rohrer
{"title":"Modelling and analysis of network resilience","authors":"J. Sterbenz, Egemen K. Çetinkaya, M. Hameed, A. Jabbar, Justin P. Rohrer","doi":"10.1109/COMSNETS.2011.5716502","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716502","url":null,"abstract":"As the Internet becomes increasingly important to all aspects of society, the consequences of disruption become increasingly severe. Thus it is critical to increase the resilience and survivability of the future network. We define resilience as the ability of the network to provide desired service even when challenged by attacks, large-scale disasters, and other failures. This paper describes a comprehensive methodology to evaluate network resilience using a combination of analytical and simulation techniques with the goal of improving the resilience and survivability of the Future Internet.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131132426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Huba, N. Martin, Yamin Al-Mousa, C. Orakwue, N. Shenoy
{"title":"A distributed scheduler for airborne backbone networks with directional antennas","authors":"W. Huba, N. Martin, Yamin Al-Mousa, C. Orakwue, N. Shenoy","doi":"10.1109/COMSNETS.2011.5716472","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716472","url":null,"abstract":"Airborne backbone networks are useful in tactical applications to interconnect sub-networks. A major challenge in such networks, normally comprising large numbers of highly mobile nodes, is the design of the medium access control (MAC) and routing protocols. We propose integration of MAC and routing functions, which use the attributes of a clustering scheme that addresses scalability. The reactive routing protocol to establish connectivity between two distant nodes uses the proactive routes within the cluster to address the high dynamics in airborne networks. We present the performance of the proposed solution in terms of success rate, overhead and latency in packet and file delivery.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130765855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Empirical study of clock skew behavior in modern mobile and hand-held devices","authors":"Swati Sharma, H. Saran, Sorav Bansal","doi":"10.1109/COMSNETS.2011.5716494","DOIUrl":"https://doi.org/10.1109/COMSNETS.2011.5716494","url":null,"abstract":"Host identification, today, can be done at many layers of the network protocol stack depending on the identifiable parameter used for classification. But, these generally include fields from TCP/IP/MAC packets; that can be spoofed or manipulated very easily to misguide the identification process or include intolerable error into. Identification on wireless networks can be done with better precision by using physical layer, machine-dependent characteristics. We provide an empirical study of another such parameter, the host's clock information, that may lead to accurate identification of a host, among other applications. It is resistant to the earlier mentioned methods of spoofing, as clock information is very specific to the oscillator that generates it. We provide a simplification into the measurement technique of an already investigated approach of remote identification, to achieve lower error rates. We also provide a detailed study of clock skew behavior on a LAN, consisting of wired, wireless nodes and modern mobile and hand-held devices. To our knowledge, this work is the first in the mobile and hand-held device domain to identify such devices definitively. Clock skew based host identification can be put to many applications, that may be specific to each Enterprise network. For instance, aiding the network administrator in monitoring the network, malicious activity flagging mechanism for IDS's/IPS's, isolating unknown or new machines, keeping count of the number of active machines at any time for the purpose of say IP address allocation, associating virtual machines to their corresponding physical machines and so on.","PeriodicalId":302678,"journal":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134182618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}