Results 1 - 10
of
26
Power Management Techniques for Mobile Communication
, 1998
"... In mobile computing, power is a limited resource. Like other devices, communication devices need to be properly managed to conserve energy. In this paper, we present the design and implementation of an innovative transport level protocol capable of significantly reduc- ing the power usage of the com ..."
Abstract
-
Cited by 156 (3 self)
- Add to MetaCart
In mobile computing, power is a limited resource. Like other devices, communication devices need to be properly managed to conserve energy. In this paper, we present the design and implementation of an innovative transport level protocol capable of significantly reduc- ing the power usage of the communication device. The protocol achieves power savings by selectively choosing short periods of time to suspend communications and shut down the communication device. It manages the important task of queuing data for future delivery during periods of communication suspension, and decides when to restart communication. We also address the tradeoff between reducing power consumption and reducing delay for incoming data.
Application-Driven Power Management for Mobile Communication
, 2000
"... this paper, we present the design and implementation of an innovative transport level protocol capable of significantly reducing the power usage of the communication device. The protocol achieves power savings by selectively choosing short periods of time to suspend communications and shut down th ..."
Abstract
-
Cited by 146 (4 self)
- Add to MetaCart
(Show Context)
this paper, we present the design and implementation of an innovative transport level protocol capable of significantly reducing the power usage of the communication device. The protocol achieves power savings by selectively choosing short periods of time to suspend communications and shut down the communication device. It manages the important task of queuing data for future delivery during periods of communication suspension, and decides when to restart communication. We also address the tradeoff between reducing power consumption and reducing delay for incoming data. We present results from experiments using our implementation of the protocol. These experiments measure the energy consumption for three simulated communication patterns as well as three trace-based communication patterns and compare the effects of different suspension strategies. Our results show up to 83% savings in the energy consumed by the communication. For a high-end laptop, this can translate to 6--9% sav
Constructing adaptive software in distributed systems
- in Proceedings of the 21st International Conference on Distributed Computing Systems
, 2001
"... Adaptive software that can react to changes in the execution environment or user requirements by switching algorithms at runtime is powerful yet difficult to implement, especially in distributed systems. This paper describes a software architecture for constructing such adaptive software and a grace ..."
Abstract
-
Cited by 67 (8 self)
- Add to MetaCart
(Show Context)
Adaptive software that can react to changes in the execution environment or user requirements by switching algorithms at runtime is powerful yet difficult to implement, especially in distributed systems. This paper describes a software architecture for constructing such adaptive software and a graceful adaptation protocol that allows adaptations to be made in a coordinated manner across hosts transparently to the application. A realization of the architecture based on Cactus, a system for constructing highly configurable distributed services and protocols, is also presented. The approach is illustrated by outlining examples of adaptive components from a group communication service.
Power Aware Communication for Mobile Computers
- IEEE International Workshop on Mobile Multimedia Communications
"... ..."
(Show Context)
Distributed stream management using utility-driven self-adaptive middleware
- In Proceedings of 2nd International Conference on Autonomic Computing (ICAC’05
, 2005
"... We consider pervasive computing applications that process and aggregate data-streams emanating from highly distributed data sources to produce a stream of updates that have an implicit business-value. Middleware that enables such aggregation of datastreams must support scalable and efficient selfman ..."
Abstract
-
Cited by 39 (8 self)
- Add to MetaCart
(Show Context)
We consider pervasive computing applications that process and aggregate data-streams emanating from highly distributed data sources to produce a stream of updates that have an implicit business-value. Middleware that enables such aggregation of datastreams must support scalable and efficient selfmanagement to deal with changes in the operating conditions and should have an embedded businesssense. In this paper, we present a novel self-adaptation algorithm that has been designed to scale efficiently for thousands of streams and aims to maximize the overall business utility attained from running middleware-based applications. The outcome is that the middleware not only deals with changing network conditions or resource requirements, but also responds appropriately to changes in business policies. An important feature of the algorithm is a hierarchical node-partitioning scheme that decentralizes reconfiguration and suitably localizes its impact. Extensive simulation experiments and benchmarks attained with actual enterprise operational data corroborate this paper's claims. 1.
Flexible Soft Real-Time Processing in Middleware
- REAL-TIME SYSTEMS
, 2001
"... As desktop computer computational power continues to increases dramatically, it is becoming commonplace to run a combination of deadline-sensitive applications. Despite the proliferation of computational power, the detailed nature of these applications causes new problems for the system resource all ..."
Abstract
-
Cited by 33 (5 self)
- Add to MetaCart
As desktop computer computational power continues to increases dramatically, it is becoming commonplace to run a combination of deadline-sensitive applications. Despite the proliferation of computational power, the detailed nature of these applications causes new problems for the system resource allocation mechanisms. First, these applications are designed to meet their deadlines as long as nearly all the system's resources are available to them; once the system approaches saturation, the collective applications will fail to meet their deadlines. To aggravate the situation, conventional best effort managers will allocate resources to the competing applications based on a static form of equitability rather than addressing the dynamic relative benefit provided by each application. Second, the applications differ from conventional real-time applications: though members of this new class of desktop applications are sensitive to deadlines, their constraints are non-critical. They are also t...
QoS Scalability for Streamed Media Delivery
"... Applications with real-rate progress requirements, such as mediastreaming systems, are difficult to deploy in shared heterogenous environments such as the Internet. On the Internet, mediastreaming systems must be capable of trading off resource requirements against the quality of the media streams t ..."
Abstract
-
Cited by 25 (9 self)
- Add to MetaCart
(Show Context)
Applications with real-rate progress requirements, such as mediastreaming systems, are difficult to deploy in shared heterogenous environments such as the Internet. On the Internet, mediastreaming systems must be capable of trading off resource requirements against the quality of the media streams they deliver, in order to match wide-ranging dynamic variations in bandwidth between servers and clients. Since quality requirements tend to be user- and task-specific, mechanisms for capturing quality of service requirements and mapping them to appropriate resource-level adaptation policies are required. In this paper, we describe a general approach for automatically mapping user-level quality of service specifications onto resource consumption scaling policies. Quality of service specifications are given through utility functions, and priority packet dropping for layered media streams is the resource scaling technique. The approach emphasizes simple mechanisms, yet facilitates fine-grained policy-driven adaptation over a wide-range of bandwidth levels. We demonstrate the approach in a streamingvideo player that supports user-tailorable quality adaptation policies both for matching its resource consumption requirements to the capabilities of heterogeneous clients, and for responding to dynamic variations in system and network load.
IQ-RUDP: Coordinating Application Adaptation with Network Transport
- In Proc. of High Performance Distributed Computing
, 2002
"... Our research addresses the efficient transfer of large data across wide-area networks, focusing on applications like remote visualization and real-time collaboration. To attain high performance in the real-time exchange of data across collaborating machines and end users, we are developing and evalu ..."
Abstract
-
Cited by 21 (13 self)
- Add to MetaCart
(Show Context)
Our research addresses the efficient transfer of large data across wide-area networks, focusing on applications like remote visualization and real-time collaboration. To attain high performance in the real-time exchange of data across collaborating machines and end users, we are developing and evaluating methods and techniques for coordinating application-level with network transport-level adaptations of data communication. Specifically, complementing previous work on TCP-friendly communication and on adaptive transport protocols, our approach is to strongly coordinate application-level with transport-level changes in communication behavior, so as to best meet application needs without violating fairness in network resource usage. The approach is evaluated with the IQ-ECho middleware, which implements the distribution of scientific data to remote collaborators. Using IQ-ECho, application-level adaptations like selective data down-sampling are triggered by transport-level information provided by the instrumented IQ-RUDP protocol underlying IQ-ECho's communications. The application- to network-layer exchange of information necessary for such coordinated adaptations is implemented with ECho attributes, which provide a lightweight way for an application to provide quality of service information and to describe its adaptation to the transport layer, and for IQ-RUDP to share network status information with an application. In addition to triggering application-level adaptations and reacting to certain changes in network state, IQ-RUDP also re-adapts its own communication behavior after an application adaptation has been performed, in part to remain fair to other network flows. Such transport-level reactions can be performed at higher rates and with smaller overheads than possi...
The Illinois GRACE Project: Global Resource Adaptation through CoopEration
, 2002
"... Mobile systems primarily processing multimedia data are expected to become a dominant computing platform for a variety of application domains. The design of such systems imposes several new challenges, as it must consider demanding, dynamic, and multidimensional resource requirements and constraints ..."
Abstract
-
Cited by 20 (2 self)
- Add to MetaCart
Mobile systems primarily processing multimedia data are expected to become a dominant computing platform for a variety of application domains. The design of such systems imposes several new challenges, as it must consider demanding, dynamic, and multidimensional resource requirements and constraints, with energy becoming a first-class resource. At the same time, the ability of multimedia applications to trade off output quality for system resources and the difference between their peak and average demands offers a huge opportunity for optimization.
Optimizing the energy consumed by secure wireless session – Wireless Transport Layer Security case study
- Mobile Networks and Applications
, 2002
"... Abstract. In this paper we identified the various sources of energy consumption during the setup, operation and tear down of a secure wireless session by considering the wireless transport layer security protocol. Our analysis showed that data transfers during a secure wireless transaction, number a ..."
Abstract
-
Cited by 11 (2 self)
- Add to MetaCart
(Show Context)
Abstract. In this paper we identified the various sources of energy consumption during the setup, operation and tear down of a secure wireless session by considering the wireless transport layer security protocol. Our analysis showed that data transfers during a secure wireless transaction, number and size of messages exchanged during secure session establishment and cryptographic computations used for data authentication and privacy during secure data transactions in that order are the main sources of energy consumption during a secure wireless session. We developed techniques based on information compression, session negotiation protocol optimization and hardware acceleration of crypto-mechanisms to reduce the energy consumed by a secure session. A mobile test bed was developed to verify our energy management schemes and to study the energy consumption versus security tradeoffs. Using our proposed schemes we were able to reduce the session establishment energy by more than 6.5 × and the secure data transaction energy by more than 1.5 × during data transmission and by more than 2.5 × during data reception.