effsense: Energy-Efficient and Cost-Effective Data Uploading in Mobile Crowdsensing

Size: px
Start display at page:

Download "effsense: Energy-Efficient and Cost-Effective Data Uploading in Mobile Crowdsensing"

Transcription

1 effsense: Energy-Efficient and Cost-Effective Data Uploading in Mobile Crowdsensing Leye Wang, Daqing Zhang and Haoyi Xiong TELECOM SudParis, France PUCAA 2013

2 Outline Introduction Research Motivation User Needs and Objectives Some Observations Proposed Ideas Research Issues Main Contributions The Proposed effsense Framework Uploading Schemes in effsense System Evaluation Conclusions and Future Work 2

3 Research Motivation Mobile Crowdsensing can enable many applications, to encourage users to participate in Mobile Crowdsensing tasks, reducing cost incurred helps: Energy Consumption 3G Mobile Data Communication Cost 3 stages of a mobile crowdsensing task Task Assignment Sensing Data Uploading (our focus) 3

4 User Needs and Objectives User Types and Needs Data-plan users (DP) with unlimited data plan concerned about energy consumption Non-data-plan users (NDP) pay according to data size uploaded via 3G concerned about data cost Example: MIT Reality Mining ~30 users with data plan (data-plan users) ~70 users with no data plan (non-data-plan users) The data-plan/non-data-plan user ratio might change Objectives Data-plan users (DP) Reduce energy consumption Non-data-plan users (NDP) Reduce data cost 4

5 Some Observations Some Known techniques to Reduce Energy Consumption (for DP) Baseline: Initiate a 3G connection to upload data Uploading data via a Bluetooth gateway or WiFi consumes less energy Uploading data via 3G parallel with a phone call saves >75% energy J. Nurminen, Parallel connections and their effect on the battery consumption of a mobile phone, Some Known techniques to Eliminate Data Cost (for NDP) Uploading data via a Bluetooth gateway or WiFi Offloading data by Bluetooth to a DP user, who can later relay data to the server 5

6 Proposed Ideas for Energy/Data Cost Cut Leveraging Critical Events making a phone call encountering a Bluetooth gateway connecting to WiFi meeting another user Use Time to Trade-off Events - Delay-tolerant data uploading Traditionally, data is uploaded as soon as it is sensed. We allow delay between data sensing and uploading, so that critical events can happen and be leveraged to reduce energy and/or data cost. 6

7 A Running Example (How to Reduce Cost) Server S WiFi/LAN r i : sensing data of u i r i : sensing data of u i 3G (parallel with voice call) {r 2,r 1 } Bluetooth Gateway G 3 uploading paths: 1. u 3 G S 2. u 1 u 2 G S 3. u 2 u 1 S {r 1,r 2 } {r 3 } {r 1 } u 1 u 2 u 1 u 2 u 3 data-plan users {r 2 } non-data-plan users 7

8 Research Issues 1. Identify the critical events and predict the probability of future occurrence of these critical events. 2. Estimate data uploading energy consumption associated to each critical event. 3. Design a real-time algorithm distributed on each user s phone to decide whether to upload/offload data or keep data when a sequence of critical events occur. 8

9 Research Contributions Intend to achieve two objectives for two types of users for 1 st Time energy consumption (data-plan users) data cost (non-data-plan users) Propose a novel mechanism to address the problem delay-tolerant data uploading critical events Develop 4 different data uploading schemes Two for data-plan users Two for non-data-plan users Evaluate the proposed mechanism and schemes with two datasets MIT Reality Mining Nodobo 9

10 Outline Introduction Research Motivation User Needs and Objectives Some Observations Proposed Ideas Research Issues Main Contributions The Proposed effsense Framework Uploading Schemes in effsense System Evaluation Conclusions and Future Work 10

11 The Proposed effsense Framework Mobile Crowdsensing Framework Sensing Decision Making (offload or keep data) Data Uploading 11

12 The Proposed effsense Framework Key Concepts in effsense Framework Two types of crowdsensing users DP and NDP Critical Events Prediction for each user mobility prediction meet other user/ Bluetooth gateway/ WiFi AP call prediction Data Uploading Schemes Cold-Start works without user logs Prediction-Based - leverage user logs Force uploading at deadline At the end of the data uploading period (max delay), effsense checks data-plan users whether they have non-uploaded data: for those with data, effsense forces them to establish a 3G connection to upload data to the server. 12

13 Outline Introduction Research Motivation User Needs and Objectives Some Observations Proposed Ideas Research Issues Main Contributions The Proposed effsense Framework Uploading Schemes in effsense System Evaluation Conclusions and Future Work 13

14 Uploading Schemes in effsense When a critical event occurs, decide whether to offload/keep data For NDP SimpleGreedy (cold-start) AdvancedGreedy (prediction-based) For DP Greedy (cold-start) ExpectationBased (prediction-based) Assumption - Offload and Dismiss: Once a user offloads data to another user, won t be responsible for sending the data any more. Avoid redundant data offloading to reduce energy consumption 14

15 cold-start schemes for NDP/DP users SimpleGreedy ndp /Greedy dp Cold-start schemes make the decision directly according to the event type. without using user history logs NDP user: SimpleGreedy ndp DP user: Greedy dp upload data without incurring NDP users data cost Call Bluetooth Gateway upload data with less energy consumption than 3G Call Bluetooth Gateway Critical Event Connect WiFi Critical Event Connect WiFi meet DP user meet DP user meet NDP user meet NDP user 15

16 prediction-based scheme for NDP users AdvancedGreedy ndp Difference from SimpleGreedy ndp a NDP user might offload data to another NDP user encountered Call Bluetooth Gateway Critical Event Connect WiFi meet DP user the encountered user has higher probability to upload data without data cost meet NDP user Otherwise 16

17 prediction-based scheme for DP users ExpectationBased dp Calculate DP user s expected energy consumption under different conditions when encountering a critical event Call / Bluetooth Gateway / WiFi Upload data Keep Data Meet another DP user (suppose two users: u i and u j ) u i offloads data to u j u j offloads data to u i u i and u j both keep own data Decide according to the condition with smallest value Calculation is based on predict the future occurrence of critical events estimate the data transmission energy of critical events 17

18 Outline Introduction Research Motivation User Needs and Objectives Some Observations Proposed Ideas Research Issues Main Contributions The Proposed effsense Framework Uploading Schemes in effsense System Evaluation Conclusions and Future Work 18

19 Experiment Setup Two datasets MIT Reality Mining, Nodobo Max delay: 24 hours Start of the data uploading: 00:00:00 for each day Estimation of the energy consumption under critical events N. Balasubramanian, etc., Energy consumption in mobile phones: a measurement study and implications for network applications, 2009 Prediction Method count week-level frequency MIT #DP user #NDP user #BT gateway 2 0?WiFi traces no yes Nodobo e.g. 3 weeks out of 5-week logs, a user makes calls during Monday 8:00~12:00 predict that this user s call probability is 60% during next Monday 8:00~12:00 19

20 Questions NDP user (Data Cost) How many NDP users could successfully upload their sensed data to the server without data cost? DP user (Energy Consumption) How much energy do DP users save compared with traditional 3G data uploading? 20

21 NDP user (Data Cost) NDP users uploading data without data cost more than 45% (MIT) ; 54% (Nodobo) MIT (41 NDP users) Nodobo (16 NDP users) Working Days Holidays SimpleGreedy AdvancedGreedy All Days 18.8 (45%) 19.6 (48%) Working Days Holidays SimpleGreedy AdvancedGreedy All Days 8.64 (54%) 8.93 (56%) 21

22 DP user (Energy Consumption) Energy consumption of DP users 4 scheme pairs: 2 (NDP)*2 (DP) traditional: establish a new 3G connection to upload data Compared with traditional 3G Greedy dp reduces ~55% ExpectationBased dp reduces ~65%. 22

23 Conclusions and Future Work effsense is a novel data uploading framework for mobile crowdsensing reduce both energy consumption and data cost introduce delay-tolerant data uploading and critical events design cold-start/prediction-based uploading schemes for DP/NDP users evaluation more than 45% NDP users uploading data without data cost DP users reducing more than 55% energy compared with traditional 3G uploading Future Work Other critical events Precise energy consumption estimation mechanism Advanced mobility/call prediction method Incentives for DP users to relay data Real-life deployment 23

24

Center for Networked Computing

Center for Networked Computing Concept of mobile social networks (MSNs): People walk around with smartphones and communicate with each other via Bluetooth or Wi-Fi when they are within transmission range of each other. Characters: No

More information

Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications (IMC09)

Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications (IMC09) Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications (IMC09) Niranjan Balasubramanian Aruna Balasubramanian Arun Venkataramani University of Massachusetts

More information

icrowd: Near-Optimal Task Allocation for Piggyback Crowdsensing

icrowd: Near-Optimal Task Allocation for Piggyback Crowdsensing .9/TMC.5.4855, IEEE Transactions on Mobile Computing icrowd: Near-Optimal Task Allocation for Piggyback Crowdsensing Haoyi Xiong, Daqing Zhang, Guanling Chen, Leye Wang, Vincent Gauthier, Laura E. Barnes

More information

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Yunsheng Wang Kettering University Jie Wu Temple University Mingjun Xiao University of Science and Tech. of China Daqiang Zhang

More information

Task Allocation Schemes for Crowdsourcing in Opportunistic Mobile Social Networks

Task Allocation Schemes for Crowdsourcing in Opportunistic Mobile Social Networks Task Allocation Schemes for Crowdsourcing in Opportunistic Mobile Social Networks Xiao Chen 1, Bo Deng 1 Department of Computer Science, Texas State University, San Marcos, TX 7 Vandegrift High School,

More information

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks 1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms

More information

Near-Optimal Incentive Allocation for Piggyback Crowdsensing

Near-Optimal Incentive Allocation for Piggyback Crowdsensing Sustainable Incentive Mechanisms for Mobile Crowdsensing Near-Optimal Incentive Allocation for Piggyback Crowdsensing Haoyi Xiong, Daqing Zhang, Zhishan uo, uanling Chen, and Laura E. Barnes The authors

More information

Context-for-Wireless: Context-Sensitive Energy- Efficient Wireless Data Transfer

Context-for-Wireless: Context-Sensitive Energy- Efficient Wireless Data Transfer Context-for-Wireless: Context-Sensitive Energy- Efficient Wireless Data Transfer Ahmad Rahmati and Lin Zhong Rice Efficient Computing Group (recg.org) Dept. of Electrical & Computer Engineering Rice University

More information

Incentives for Opportunistic Networks

Incentives for Opportunistic Networks Incentives for Opportunistic Networks gjb4@st-andrews.ac.uk Tristan Henderson tnhh@st-andrews.ac.uk University of Opportunistic Networks Users carry wireless mobile devices Network leveraged from human

More information

Empirical Evaluation of Hybrid Opportunistic Networks

Empirical Evaluation of Hybrid Opportunistic Networks Empirical Evaluation of Hybrid Opportunistic Networks Pan Hui Joint work with Anders Lindgren and Jon Crowcroft (University of Cambridge) 1 Introduction Two trends observed Lots of work done on opportunistic

More information

Mobile and Ubiquitous Computing: Mobile Sensing

Mobile and Ubiquitous Computing: Mobile Sensing Mobile and Ubiquitous Computing: Mobile Sensing Master studies, Winter 2015/2016 Dr Veljko Pejović Veljko.Pejovic@fri.uni-lj.si Based on: Mobile and Ubiquitous Computing Mirco Musolesi, University of Birmingham,

More information

Center for Networked Computing

Center for Networked Computing Concept of Mobile Cloud Computing (MCC): - Offload the computation complexity task from mobile devices to the cloud - Combination of cloud computing, mobile computing, and wireless networks to bring rich

More information

Opportunistic CrowdSensing. Nic Lane Mobile and Sensing Systems Group (MASS) Microsoft Research Asia (MSRA)

Opportunistic CrowdSensing. Nic Lane Mobile and Sensing Systems Group (MASS) Microsoft Research Asia (MSRA) Opportunistic CrowdSensing Nic Lane Mobile and Sensing Systems Group (MASS) Microsoft Research Asia (MSRA) On-going Large-scale Opportunistic CrowdSensing Investigations in MASS Lowering Energy Consumed

More information

An Optimal Control Policy in a Mobile Cloud Computing System Based on Stochastic Data

An Optimal Control Policy in a Mobile Cloud Computing System Based on Stochastic Data An Optimal Control Policy in a Mobile Cloud Computing System Based on Stochastic Data Xue Lin, Yanzhi Wang, and Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles,

More information

Detecting Blackhole and Greyhole Attacks in Vehicular Delay Tolerant Networks

Detecting Blackhole and Greyhole Attacks in Vehicular Delay Tolerant Networks Platzhalter für Bild, Bild auf Titelfolie hinter das Logo einsetzen Detecting Blackhole and Greyhole Attacks in Vehicular Delay Tolerant Networks Yinghui Guo, Sebastian Schildt and Lars Wolf COMSNETS 2013,

More information

Sense-Aid: A framework for enabling network as a service for participatory sensing

Sense-Aid: A framework for enabling network as a service for participatory sensing Sense-Aid: A framework for enabling network as a service for participatory sensing Heng Zhang Purdue ECE, Saurabh Bagchi Purdue ECE, He Wang Purdue CS, Rajesh K. Panta AT&T Labs CS logo Supported by: Slide

More information

The Power of Prediction: Cloud Bandwidth and Cost Reduction

The Power of Prediction: Cloud Bandwidth and Cost Reduction The Power of Prediction: Cloud Bandwidth and Cost Reduction Eyal Zohar Israel Cidon Technion Osnat(Ossi) Mokryn Tel-Aviv College Traffic Redundancy Elimination (TRE) Traffic redundancy stems from downloading

More information

An E cient Content Delivery Infrastructure Leveraging the Public Transportation Network

An E cient Content Delivery Infrastructure Leveraging the Public Transportation Network An E cient Content Delivery Infrastructure Leveraging the Public Transportation Network Qiankun Su, Katia Ja rès-runser, Gentian Jakllari and Charly Poulliat IRIT, INP-ENSEEIHT, University of Toulouse

More information

On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks

On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University Outline Introduction

More information

Programming Project. Remember the Titans

Programming Project. Remember the Titans Programming Project Remember the Titans Due: Data and reports due 12/10 & 12/11 (code due 12/7) In the paper Measured Capacity of an Ethernet: Myths and Reality, David Boggs, Jeff Mogul and Chris Kent

More information

Incentive-Aware Routing in DTNs

Incentive-Aware Routing in DTNs Incentive-Aware Routing in DTNs Upendra Shevade Han Hee Song Lili Qiu Yin Zhang The University of Texas at Austin IEEE ICNP 2008 October 22, 2008 1 DTNs Disruption tolerant networks No contemporaneous

More information

COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks

COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks Long Vu, Quang Do, Klara Nahrstedt Department of Computer Science, University of Illinois

More information

> *** Strengths: What are the major reasons to accept the paper? [Be brief.]

> *** Strengths: What are the major reasons to accept the paper? [Be brief.] ======= Review 1 ======= This paper considers how the large amounts of user upload activity can be supported in mobile networks economically. Their proposal revolves around the concept of using delayed

More information

Data Offloading in Mobile Cloud Computing: A Markov Decision Process Approach

Data Offloading in Mobile Cloud Computing: A Markov Decision Process Approach Data Offloading in Mobile Cloud Computing: A Markov Decision Process Approach Dongqing Liu University of Montreal & University of Technology of Troyes dongqing.liu@utt.fr September 13, 2018 Dongqing Liu

More information

COLLEGE OF ARTS & SCIENCE, SULUR,COIMBATORE

COLLEGE OF ARTS & SCIENCE, SULUR,COIMBATORE EFFECTIVE SOCIAL ROUTING FRAMEWORK FOR MOBILE SOCIAL SENSING NETWORK USING MULTI HIERARCHICAL ROUTING 1. E.SATHISHKUMAR M.Sc(CS), 2. Mrs. M.SUGANYA M.Sc,Mphil. RATHNAVEL SUBRAMANIAM COLLEGE OF ARTS & SCIENCE,

More information

Cooperative Mobile Internet Access with Opportunistic Scheduling

Cooperative Mobile Internet Access with Opportunistic Scheduling Cooperative Mobile Internet Access with Opportunistic Scheduling Pouya Ostovari, Jie Wu, and Abdallah Khreishah Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu

More information

Opera 5. User manual. Version 1.15

Opera 5. User manual. Version 1.15 Opera 5 User manual Version 1.15 Opera 5 is a device containing audio recorder with an integrated WiFi interface that is used for recording and online listening with remote control and download recordings

More information

Today. Lecture 17: Reality Mining. Last time

Today. Lecture 17: Reality Mining. Last time Today We will introduce the idea of a relational database, discuss its underlying data model and present a slightly simplified view of how to access its information Lecture 17: As with all new technologies

More information

Energy-aware Fault-tolerant and Real-time Wireless Sensor Network for Control System

Energy-aware Fault-tolerant and Real-time Wireless Sensor Network for Control System Energy-aware Fault-tolerant and Real-time Wireless Sensor Network for Control System Thesis Proposal Wenchen Wang Computer Science, University of Pittsburgh Committee: Dr. Daniel Mosse, Computer Science,

More information

Network Services BT MPLS (Marketed as IP Connect Global)

Network Services BT MPLS (Marketed as IP Connect Global) Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects Service as detailed in

More information

Cloud Transcoder: Bridging the Format and Resolution Gap between Internet Videos and Mobile Devices

Cloud Transcoder: Bridging the Format and Resolution Gap between Internet Videos and Mobile Devices Cloud Transcoder: Bridging the Format and Resolution Gap between Internet Videos and Mobile Devices Zhenhua Li, Peking University Yan Huang, Gang Liu, Fuchen Wang, Tencent Research Zhi-Li Zhang, University

More information

Impact of Source Counter on Routing Performance in Resource Constrained DTNs

Impact of Source Counter on Routing Performance in Resource Constrained DTNs Impact of Source Counter on Routing Performance in Resource Constrained DTNs Xiaolan Zhang a,, Honggang Zhang b, Yu Gu c a Dept. of Computer and Information Sciences, Fordham University b Dept. of Mathematics

More information

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,

More information

Robust Regression. Robust Data Mining Techniques By Boonyakorn Jantaranuson

Robust Regression. Robust Data Mining Techniques By Boonyakorn Jantaranuson Robust Regression Robust Data Mining Techniques By Boonyakorn Jantaranuson Outline Introduction OLS and important terminology Least Median of Squares (LMedS) M-estimator Penalized least squares What is

More information

Personalized Diapause: Reducing Radio Energy Consumption of Smartphones by Network-Context Aware Dormancy Predictions

Personalized Diapause: Reducing Radio Energy Consumption of Smartphones by Network-Context Aware Dormancy Predictions Personalized Diapause: Reducing Radio Energy Consumption of Smartphones by Network-Context Aware Dormancy Predictions Yeseong Kim Jihong Kim Department of Computer Science and Engineering Seoul National

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

Participant selection for data collection through device-to-device communications in mobile sensing

Participant selection for data collection through device-to-device communications in mobile sensing DOI.7/s779-6-974- ORIGINAL ARTICLE Participant selection for data collection through device-to-device communications in mobile sensing Yu Wang,2 Hanshang Li 2 Ting Li 2 Received: September 26 / Accepted:

More information

Toward Energy-efficient and Fault-tolerant Consistent Hashing based Data Store. Wei Xie TTU CS Department Seminar, 3/7/2017

Toward Energy-efficient and Fault-tolerant Consistent Hashing based Data Store. Wei Xie TTU CS Department Seminar, 3/7/2017 Toward Energy-efficient and Fault-tolerant Consistent Hashing based Data Store Wei Xie TTU CS Department Seminar, 3/7/2017 1 Outline General introduction Study 1: Elastic Consistent Hashing based Store

More information

Android project proposals

Android project proposals Android project proposals Luca Bedogni (lbedogni@cs.unibo.it) April 7, 2016 Introduction In this document, we describe four possible projects for the exam of the Laboratorio di applicazioni mobili course.

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Prototyping. SWE 432, Fall Web Application Development

Prototyping. SWE 432, Fall Web Application Development Prototyping SWE 432, Fall 2018 Web Application Development Conceptual design Goal: match users mental model Tool: Metaphor - analogies from existing system Offers expectations about what system does &

More information

A First Look at Traffic on Smartphones

A First Look at Traffic on Smartphones A First Look at Traffic on Smartphones by Falaki et al. Andrew Zafft CS Department Agenda Objective Study Structure Outcomes & Observations Future Work / Citations Conclusions 2 Objective Statistics Why

More information

5G From Fixed Wireless Today to Mobility & Transformative Improvements by 2019

5G From Fixed Wireless Today to Mobility & Transformative Improvements by 2019 5G From Fixed Wireless Today to Mobility & Transformative Improvements by 2019 5G is rapidly climbing the hype cycle. Qualcomm has even claimed it could be as transformative as electricity. Wireless network

More information

Paper Discussion: A Survey on Device-to-Device Communication in Cellular Networks

Paper Discussion: A Survey on Device-to-Device Communication in Cellular Networks Paper Discussion: A Survey on Device-to-Device Communication in Cellular Networks Asadi, Arash, Qing Wang, and Vincenzo Mancuso. "A survey on deviceto-device communication in cellular networks." Communications

More information

LAVEA: Latency-Aware Video Analytics on Edge Computing Platform

LAVEA: Latency-Aware Video Analytics on Edge Computing Platform LAVEA: Latency-Aware Video Analytics on Edge Computing Platform Shanhe Yi *, Zijiang Hao *, Qingyang Zhang, Quan Zhang, Weisong Shi, Qun Li * College of William and Mary * Wayne State University Anhui

More information

Hands-On Voice Over IP

Hands-On Voice Over IP Hands-On Course Description Networking is taking an evolutionary path that will allow voice and video - real time services - to successfully exist with data on the same network. This will allow new ways

More information

Enhancing Participant Selection through Caching in Mobile Crowd Sensing

Enhancing Participant Selection through Caching in Mobile Crowd Sensing Enhancing Participant Selection through Caching in Mobile Crowd Sensing Hanshang Li Ting Li Fan Li Weichao Wang Yu Wang Department of Computer Science, University of North Carolina at Charlotte, Charlotte,

More information

Energy-constrained Wi-Fi Offloading Method Using Prefetching

Energy-constrained Wi-Fi Offloading Method Using Prefetching Energy-constrained Wi-Fi Offloading Method Using Prefetching Yoshihisa Onoue, Morihiko Tamai, Keiichi Yasumoto Nara Institute of Science and Technology Ikoma, Nara 630-0192, Japan Email: see http://ubi-lab.naist.jp/index-e.html

More information

Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani

Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani (in collaboration with Ming Li, Devesh Agrawal, Deepak Ganesan, Aruna Balasubramanian, Brian Levine, Xiaozheng Tie at UMass

More information

Fast and Optimal Scheduling over Multiple Network Interfaces

Fast and Optimal Scheduling over Multiple Network Interfaces Fast and Optimal Scheduling over Multiple Network Interfaces Problem and Motivation Matei A. Zaharia (matei@matei.ca) Advised by Srinivasan Keshav (keshav@uwaterloo.ca) University of Waterloo Most of today's

More information

Doctoral Written Exam in Networking, Fall 2009

Doctoral Written Exam in Networking, Fall 2009 Doctoral Written Exam in Networking, Fall 2009 November 9, 2009 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, November

More information

Algorithms for Data Science

Algorithms for Data Science Algorithms for Data Science CSOR W4246 Eleni Drinea Computer Science Department Columbia University Thursday, October 1, 2015 Outline 1 Recap 2 Shortest paths in graphs with non-negative edge weights (Dijkstra

More information

Important Information About Your New Online Banking Services. Business Online Banking

Important Information About Your New Online Banking Services. Business Online Banking Important Information About Your New Online Banking Services Business Online Banking Welcome to Citizens Business Bank At Citizens Business Bank, we value your relationship and continually strive to be

More information

An Empirical Study of High Availability in Stream Processing Systems

An Empirical Study of High Availability in Stream Processing Systems An Empirical Study of High Availability in Stream Processing Systems Yu Gu, Zhe Zhang, Fan Ye, Hao Yang, Minkyong Kim, Hui Lei, Zhen Liu Stream Processing Model software operators (PEs) Ω Unexpected machine

More information

Mobile Offloading for Maximum Utility at Minimum Cost

Mobile Offloading for Maximum Utility at Minimum Cost ISSN 2278 0211 (Online) Mobile Offloading for Maximum Utility at Minimum Cost Anjana Antony M. Tech 4th Sem, Department of Computer Science & Engineering Dr. B. R. Prasad Babu Professor & HOD, Department

More information

IMPLEMENTING CISCO VOICE COMMUNICATIONS AND QOS

IMPLEMENTING CISCO VOICE COMMUNICATIONS AND QOS IMPLEMENTING CISCO VOICE COMMUNICATIONS AND QOS V8.0 (CVOICE) COURSE OVERVIEW: Implementing Cisco Voice Communications and QoS (CVOICE) teaches students about voice gateways, characteristics of VoIP call

More information

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

SMITE: A Stochastic Compressive Data Collection. Sensor Networks SMITE: A Stochastic Compressive Data Collection Protocol for Mobile Wireless Sensor Networks Longjiang Guo, Raheem Beyah, and Yingshu Li Department of Computer Science, Georgia State University, USA Data

More information

IEEE networking projects

IEEE networking projects IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified

More information

Opportunistic Routing Algorithms in Delay Tolerant Networks

Opportunistic Routing Algorithms in Delay Tolerant Networks Opportunistic Routing Algorithms in Delay Tolerant Networks Eyuphan Bulut Rensselaer Polytechnic Institute Department of Computer Science and Network Science and Technology (NeST) Center PhD Thesis Defense

More information

Mesh4G City Wireless

Mesh4G City Wireless City Wireless M e s h 4 G C i t y W i r e l e s s City Wireless Pollution Monitoring Bluetooth Journey Time Traffic Lights ANPR Parking WiFi CCTV Bus Stop VMS Installing wireless Traffic Lights or CCTV

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks

Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Harichandan Roy, Shuvo Kumar De, Md.Maniruzzaman, and Ashikur Rahman Department of Computer Science and Engineering Bangladesh University

More information

Neuro-Dynamic Programming An Overview

Neuro-Dynamic Programming An Overview 1 Neuro-Dynamic Programming An Overview Dimitri Bertsekas Dept. of Electrical Engineering and Computer Science M.I.T. May 2006 2 BELLMAN AND THE DUAL CURSES Dynamic Programming (DP) is very broadly applicable,

More information

Incentive Design Bidderand Market Evolution Bidder of Mobile

Incentive Design Bidderand Market Evolution Bidder of Mobile Allocation rule Allocation rule Incentive Design Bidderand Market Evolution Bidder of Mobile Disclore all private Signaling his private User-Provided information Networks information Mohammad Mahdi Khalili,

More information

Energy and Performance-Aware Task Scheduling in a Mobile Cloud Computing Environment

Energy and Performance-Aware Task Scheduling in a Mobile Cloud Computing Environment 2014 IEEE International Conference on Cloud Computing Energy and Performance-Aware Task Scheduling in a Mobile Cloud Computing Environment Xue Lin, Yanzhi Wang, Qing Xie, Massoud Pedram Department of Electrical

More information

Large-scale Measurements of Wireless Network Behavior

Large-scale Measurements of Wireless Network Behavior Large-scale Measurements of Wireless Network Behavior Sanjit Biswas (biswas@samsara.com), John Bicket (jbicket@samsara.com), Edmund L. Wong (elwong@meraki.com), Raluca Musaloiu-E (ralucam@meraki.com),

More information

Opportunistic Data Dissemination Using Real-World User Mobility Traces

Opportunistic Data Dissemination Using Real-World User Mobility Traces 22nd International Conference on Advanced Information Networking and Applications - Workshops Opportunistic Data Dissemination Using Real-World User Mobility Traces Andreas Heinemann Darmstadt University

More information

Mobile Middleware Course. Mobile Platforms and Middleware. Sasu Tarkoma

Mobile Middleware Course. Mobile Platforms and Middleware. Sasu Tarkoma Mobile Middleware Course Mobile Platforms and Middleware Sasu Tarkoma Role of Software and Algorithms Software has an increasingly important role in mobile devices Increase in device capabilities Interaction

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

An Energy-efficient Offloading Framework with Predictable Temporal Correctness

An Energy-efficient Offloading Framework with Predictable Temporal Correctness An Energy-efficient Offloading Framework with Predictable Temporal Correctness Zheng Dong Department of Computer Science University of Texas at Dallas zheng@utdallas.edu ABSTRACT Yu Gu Watson Health Cloud

More information

On the Minimum k-connectivity Repair in Wireless Sensor Networks

On the Minimum k-connectivity Repair in Wireless Sensor Networks On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu

More information

Coordinated carrier aggregation for campus of home base stations

Coordinated carrier aggregation for campus of home base stations 2015 IEEE 2015 International Symposium on Wireless Communication Systems (ISWCS), Brussels (Belgium), Aug. 2015 DOI: 10.1109/ISWCS.2015.7454390 Coordinated carrier aggregation for campus of home base stations

More information

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306

More information

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks X. Zhang, X. Dong Shanghai Jiaotong University J. Wu, X. Li Temple University, University of North Carolina N. Xiong Colorado

More information

Decommissioning Legacy Networks

Decommissioning Legacy Networks Decommissioning Legacy Networks How Vertix Consulting Helped a Top US Wireless Carrier Decommission Its CDMA Network in Mexico for Future LTE Deployments THE CHALLENGE A major carrier in Mexico was in

More information

China Telecom SDP Introduction

China Telecom SDP Introduction ITU Workshop on Service Delivery Platforms (SDP) for Telecommunication Ecosystems: from today s realities to requirements and challenges of the future ( ) China Telecom SDP Introduction XiaoSu Research

More information

An Adaptive Framework for Multistream Classification

An Adaptive Framework for Multistream Classification An Adaptive Framework for Multistream Classification Swarup Chandra, Ahsanul Haque, Latifur Khan and Charu Aggarwal* University of Texas at Dallas *IBM Research This material is based upon work supported

More information

Realising WACNet Through a Zigbee-based Architecture

Realising WACNet Through a Zigbee-based Architecture University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2007 Realising WACNet Through a Zigbee-based Architecture A. Desmet University

More information

Crowdsourcing mobile networks

Crowdsourcing mobile networks Crowdsourcing mobile networks Katia Jaffrès-Runser University of Toulouse, INPT-ENSEEIHT, IRIT lab, IRT Team Jiaotong University, Shanghai Fête Nationale / Bastille day, July 14, 2015 N7 Engineering school,

More information

Peter X. Gao, Andrew R. Curtis, Bernard Wong, S. Keshav. Cheriton School of Computer Science University of Waterloo

Peter X. Gao, Andrew R. Curtis, Bernard Wong, S. Keshav. Cheriton School of Computer Science University of Waterloo Peter X. Gao, Andrew R. Curtis, Bernard Wong, S. Keshav Cheriton School of Computer Science University of Waterloo August 15, 2012 1 = ~1M servers CO 2 of 280,000 cars 2 Datacenters and Request Routing

More information

Social-Tie-Based Information Dissemination in Mobile Opportunistic Social Networks

Social-Tie-Based Information Dissemination in Mobile Opportunistic Social Networks Social-Tie-Based Information Dissemination in Mobile Opportunistic Social Networks Yunsheng Wang and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 191 Abstract

More information

IBM FlashSystem 720 & FlashSystem 820 Remote Support Overview

IBM FlashSystem 720 & FlashSystem 820 Remote Support Overview IBM FlashSystem 720 & FlashSystem 820 Remote Support Overview Copyright IBM Corporation 2014 i Applicable Products Product: IBM FlashSystem 720 Product Version(s): 6.3.1-p10, 6.3.0 Product: IBM FlashSystem

More information

Enabling opportunistic resources sharing in mobile Operating Systems

Enabling opportunistic resources sharing in mobile Operating Systems ErdOS Enabling opportunistic resources sharing in mobile Operating Systems Narseo Vallina-Rodríguez Jon Crowcroft University of Cambridge http://www.cl.cam.ac.uk/~nv240/erdos.html http://nosql.mypopescu.com/post/1016320617

More information

Hosted Voice Product Training Premium Auto Attendant

Hosted Voice Product Training Premium Auto Attendant Hosted Voice Product Training Premium Auto Attendant 1 Agenda 1. What is an Auto Attendant? 2. Auto Attendant Flow Chart 3. Getting Started 4. Time & Day Routing 5. Premium Attendant Icons 6. Premium Offering

More information

Coalition Formation towards Energy-Efficient Collaborative Mobile Computing. Liyao Xiang, Baochun Li, Bo Li Aug. 3, 2015

Coalition Formation towards Energy-Efficient Collaborative Mobile Computing. Liyao Xiang, Baochun Li, Bo Li Aug. 3, 2015 Coalition Formation towards Energy-Efficient Collaborative Mobile Computing Liyao Xiang, Baochun Li, Bo Li Aug. 3, 2015 Collaborative Mobile Computing Mobile offloading: migrating the computation-intensive

More information

Adaptive Stream Mining: A Novel Dynamic Computing Paradigm for Knowledge Extraction

Adaptive Stream Mining: A Novel Dynamic Computing Paradigm for Knowledge Extraction Adaptive Stream Mining: A Novel Dynamic Computing Paradigm for Knowledge Extraction AFOSR DDDAS Program PI Meeting Presentation PIs: Shuvra S. Bhattacharyya, University of Maryland Mihaela van der Schaar,

More information

Partners: Nokia, NSN, Aalto/ComNet, Aalto/CSE, UH, VTT Future Internet SHOK preconference Johanna Nieminen (Nokia)

Partners: Nokia, NSN, Aalto/ComNet, Aalto/CSE, UH, VTT Future Internet SHOK preconference Johanna Nieminen (Nokia) Partners: Nokia, NSN, Aalto/ComNet, Aalto/CSE, UH, VTT Future Internet SHOK preconference 30.5.2012 Johanna Nieminen (Nokia) Vision: Future Internet = a mission cri1cal backbone of global informa1on society

More information

Energy Efficient Social-Based Routing for Delay Tolerant Networks

Energy Efficient Social-Based Routing for Delay Tolerant Networks Energy Efficient Social-Based Routing for Delay Tolerant Networks Chenfei Tian,FanLi,, Libo Jiang,ZeyeWang, and Yu Wang 2, School of Computer Science, Beijing Institute of Technology, Beijing, 8, China

More information

- Mobile context-adaptive CAching for COntent-centric networking

- Mobile context-adaptive CAching for COntent-centric networking EU CHIST-ERA 2012 call C3N Context- and Content-adaptive Communication Networks - Mobile context-adaptive CAching for COntent-centric networking Katia Jaffrès-Runser University of Toulouse, INPT-ENSEEIHT,

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

6th International Workshop on OMNeT++

6th International Workshop on OMNeT++ 6th International Workshop on OMNeT++ An OMNeT++ Framework to Evaluate Video Transmission in Mobile Wireless Multimedia Sensor Networks Denis Rosário, Zhongliang Zhao, Claudio Silva, Eduardo Cerqueira,

More information

High and Medium Voltage Substation Design, Testing and Maintenance. KSA, Jeddah, Holiday Inn Jeddah Gateway Hotel.

High and Medium Voltage Substation Design, Testing and Maintenance. KSA, Jeddah, Holiday Inn Jeddah Gateway Hotel. Training Course : High and Medium Voltage Substation Design, Testing and Maintenance Training Course For One Week In KSA, Jeddah, Holiday Inn Jeddah Gateway Hotel Which Be Held As Under Details : Tel.

More information

Application Provisioning in Fog Computingenabled Internet-of-Things: A Network Perspective

Application Provisioning in Fog Computingenabled Internet-of-Things: A Network Perspective Application Provisioning in Fog Computingenabled Internet-of-Things: A Network Perspective Ruozhou Yu, Guoliang Xue, and Xiang Zhang Arizona State University Outlines Background and Motivation System Modeling

More information

Inter-Domain Routing: BGP

Inter-Domain Routing: BGP Inter-Domain Routing: BGP Brad Karp UCL Computer Science (drawn mostly from lecture notes by Hari Balakrishnan and Nick Feamster, MIT) CS 3035/GZ01 4 th December 2014 Outline Context: Inter-Domain Routing

More information

MOBILITY PREDICTION IN TELECOM CLOUD USING MOBILE CALLS

MOBILITY PREDICTION IN TELECOM CLOUD USING MOBILE CALLS MOBILE SOCIAL NETWORKS MOBILITY PREDICTION IN TELECOM CLOUD USING MOBILE CALLS DAQIANG ZHANG, TONGJI UNIVERSITY MIN CHEN, HUAZHONG UNIVERSITY OF SCIENCE AND TECHNOLOGY MOHSEN GUIZANI, QATAR UNIVERSITY

More information

Decommissioning Legacy Networks

Decommissioning Legacy Networks ERTIX Consulting Decommissioning Legacy Networks How Vertix Consulting Helped a Top US Wireless Carrier Decommission Its CDMA Network in Mexico for Future LTE Deployments ERTIX Consulting Decommissioning

More information

Optimizing Translation Information Management in NAND Flash Memory Storage Systems

Optimizing Translation Information Management in NAND Flash Memory Storage Systems Optimizing Translation Information Management in NAND Flash Memory Storage Systems Qi Zhang 1, Xuandong Li 1, Linzhang Wang 1, Tian Zhang 1 Yi Wang 2 and Zili Shao 2 1 State Key Laboratory for Novel Software

More information

MobiSensing: Exploiting Human Mobility for Multi-Application Mobile Data Sensing with Low User Intervention*

MobiSensing: Exploiting Human Mobility for Multi-Application Mobile Data Sensing with Low User Intervention* MobiSensing: Exploiting Human Mobility for Multi-Application Mobile Data Sensing with Low User Intervention* Kang Chen 1 and Haiying Shen 2 1 Dept. of ECE, Southern Illinois University, IL, USA 2 Dept.

More information

Simulation and Analysis of Opportunistic Routing Protocols

Simulation and Analysis of Opportunistic Routing Protocols Simulation and Analysis of Opportunistic Routing Protocols 1 The Purpose The purpose of this assignment is to gain familiarity with a network simulation tool and to get experience in basic data analysis.

More information