9 research outputs found

    On Power and Energy Consumption Modeling for Smart Mobile Devices

    Get PDF

    EXTRACTION AND PREDICTION OF SYSTEM PROPERTIES USING VARIABLE-N-GRAM MODELING AND COMPRESSIVE HASHING

    Get PDF
    In modern computer systems, memory accesses and power management are the two major performance limiting factors. Accesses to main memory are very slow when compared to operations within a processor chip. Hardware write buffers, caches, out-of-order execution, and prefetch logic, are commonly used to reduce the time spent waiting for main memory accesses. Compiler loop interchange and data layout transformations also can help. Unfortunately, large data structures often have access patterns for which none of the standard approaches are useful. Using smaller data structures can significantly improve performance by allowing the data to reside in higher levels of the memory hierarchy. This dissertation proposes using lossy data compression technology called โ€™Compressive Hashingโ€™ to create โ€œsurrogatesโ€, that can augment original large data structures to yield faster typical data access. One way to optimize system performance for power consumption is to provide a predictive control of system-level energy use. This dissertation creates a novel instruction-level cost model called the variable-n-gram model, which is closely related to N-Gram analysis commonly used in computational linguistics. This model does not require direct knowledge of complex architectural details, and is capable of determining performance relationships between instructions from an execution trace. Experimental measurements are used to derive a context-sensitive model for performance of each type of instruction in the context of an N-instruction sequence. Dynamic runtime power prediction mechanisms often suffer from high overhead costs. To reduce the overhead, this dissertation encodes the static instruction-level predictions into a data structure and uses compressive hashing to provide on-demand runtime access to those predictions. Genetic programming is used to evolve compressive hash functions and performance analysis of applications shows that, runtime access overhead can be reduced by a factor of ~3x-9x

    Improving Energy Efficiency and Security for Pervasive Computing Systems

    Get PDF
    Pervasive computing systems are comprised of various personal mobile devices connected by the wireless networks. Pervasive computing systems have gained soaring popularity because of the rapid proliferation of the personal mobile devices. The number of personal mobile devices increased steeply over years and will surpass world population by 2016.;However, the fast development of pervasive computing systems is facing two critical issues, energy efficiency and security assurance. Power consumption of personal mobile devices keeps increasing while the battery capacity has been hardly improved over years. at the same time, a lot of private information is stored on and transmitted from personal mobile devices, which are operating in very risky environment. as such, these devices became favorite targets of malicious attacks. Without proper solutions to address these two challenging problems, concerns will keep rising and slow down the advancement of pervasive computing systems.;We select smartphones as the representative devices in our energy study because they are popular in pervasive computing systems and their energy problem concerns users the most in comparison with other devices. We start with the analysis of the power usage pattern of internal system activities, and then identify energy bugs for improving energy efficiency. We also investigate into the external communication methods employed on smartphones, such as cellular networks and wireless LANs, to reduce energy overhead on transmissions.;As to security, we focus on implantable medical devices (IMDs) that are specialized for medical purposes. Malicious attacks on IMDs may lead to serious damages both in the cyber and physical worlds. Unlike smartphones, simply borrowing existing security solutions does not work on IMDs because of their limited resources and high requirement of accessibility. Thus, we introduce an external device to serve as the security proxy for IMDs and ensure that IMDs remain accessible to save patients\u27 lives in certain emergency situations when security credentials are not available

    A run-time, feedback-based energy estimation model for embedded devices

    No full text
    We present an adaptive, feedback-based, energy estimation model for battery-powered embedded devices such as sensor network gateways and hand-held computers. Our technique maps hardware and software counters to energy consumption values using a set of first order, linear regression equations. Our system is novel in that it combines online and offline techniques to enable runtime power prediction. Our system employs an offline instantiated model that it continuously updates using feedback from a readily available battery monitor within the device. We empirically evaluate our model and detail its robustness, accuracy, and computational cost. We also analyze the stability of the model in the presence of feedback errors. We demonstrate that our approach can achieve an error rate of 1 % (extant techniques: 2.6 % to 4%) for computationally bound tasks and 6.6 % (extant techniques: 11%) for communication bound tasks

    Energy Awareness for Multiple Network Interface-Activated Smartphone

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2017. 8. ์ตœ์„ฑํ˜„.์ตœ์‹  ์Šค๋งˆํŠธํฐ์€ LTE์™€ Wi-Fi์™€ ๊ฐ™์€ ๋„คํŠธ์›Œํฌ ์ธํ„ฐํŽ˜์ด์Šค ์—ฌ๋Ÿฌ ๊ฐœ๋ฅผ ๋™์‹œ์— ์‚ฌ์šฉํ•˜์—ฌ ์ „์†ก์œจ์„ ์ฆ๊ฐ€์‹œํ‚ค๊ฑฐ๋‚˜ ๋„คํŠธ์›Œํฌ ์ ‘์†์„ฑ์„ ํ–ฅ์ƒ์‹œํ‚ฌ ์ˆ˜ ์žˆ๋‹ค. ์ด๋Ÿฐ ๊ฒฝ์šฐ์—, ์Šค๋งˆํŠธํฐ์˜ ์—๋„ˆ์ง€ ์†Œ๋ชจ๋Š” LTE์™€ Wi-Fi๋ฅผ ๋™์‹œ์— ์‚ฌ์šฉํ•จ์— ๋”ฐ๋ผ ์ฆ๊ฐ€ํ•  ์ˆ˜ ์žˆ๋‹ค. ํŠนํžˆ, ์ œํ•œ๋œ ์šฉ๋Ÿ‰์„ ๊ฐ€์ง€๋Š” ๋ฐฐํ„ฐ๋ฆฌ๋กœ ๋™์ž‘์„ ํ•˜๋Š” ์Šค๋งˆํŠธํฐ์—์„œ ์—๋„ˆ์ง€ ์†Œ๋ชจ๋Š” ์ค‘์š”ํ•œ ์ด์Šˆ์ด๊ธฐ ๋•Œ๋ฌธ์—, ์—๋„ˆ์ง€ ์ฆ๊ฐ€์™€ ์„ฑ๋Šฅ ํ–ฅ์ƒ ์‚ฌ์ด์˜ trade-off๋ฅผ ๊ณ ๋ คํ•˜๋Š” ๊ฒƒ์ด ์š”๊ตฌ๋œ๋‹ค. ์—๋„ˆ์ง€ ์ธ์ง€ ๊ธฐ์ˆ ๊ณผ ํ•จ๊ป˜ ์Šค๋งˆํŠธํฐ์˜ LTE์™€ Wi-Fi ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ์ „๋žต์ ์œผ๋กœ ์ž˜ ์‚ฌ์šฉํ•จ์œผ๋กœ์จ, ๋ฐฐํ„ฐ๋ฆฌ ์—๋„ˆ์ง€ ์†Œ๋ชจ๋ฅผ ์ค„์ž„๊ณผ ๋™์‹œ์— ์Šค๋งˆํŠธํฐ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ์„ฑ๋Šฅ์„ ์ตœ์ ํ™” ํ•˜๋Š” ๊ฒƒ์ด ๊ฐ€๋Šฅํ•ด์ง„๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” LTE์™€ Wi-Fi ๋งํฌ๋ฅผ ๋™์‹œ์— ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์Šค๋งˆํŠธํฐ์—์„œ ์—๋„ˆ์ง€ ์ธ์ง€๋ฅผ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•˜๋Š” ๋‹ค์Œ ์„ธ ๊ฐ€์ง€ ์ „๋žต์„ ๊ณ ๋ คํ•˜์˜€๋‹ค. (i) LTE์™€ Wi-Fi๋ฅผ ๋™์‹œ์— ์‚ฌ์šฉํ•˜๋Š” ์Šค๋งˆํŠธํฐ์˜ ์ „๋ ฅ ์†Œ๋ชจ ๋ชจ๋ธ๋ง, (ii) ์Šค๋งˆํŠธํฐ์˜ ๋ฐฐํ„ฐ๋ฆฌ ์†Œ๋ชจ์œจ์˜ ์‹ค์‹œ๊ฐ„ ์˜ˆ์ธก ๊ธฐ๋ฒ•, (iii) dynamic adaptive streaming over HTTP (DASH) ๊ธฐ๋ฐ˜์˜ ๋น„๋””์˜ค ์ŠคํŠธ๋ฆฌ๋ฐ์˜ ์„ฑ๋Šฅ ์ตœ์ ํ™”. ๋จผ์ €, ๋™์‹œ์— ์—ฌ๋Ÿฌ ๋„คํŠธ์›Œํฌ๋ฅผ ํ™œ์„ฑํ™”ํ•˜์—ฌ ์‚ฌ์šฉํ•˜๋Š” ์Šค๋งˆํŠธํฐ์˜ ์ •๋ฐ€ํ•œ ์ „๋ ฅ ์†Œ๋ชจ ๋ชจ๋ธ๋ง์„ ์ œ์‹œํ•œ๋‹ค. ํŒจํ‚ท ์ฒ˜๋ฆฌ์— ์˜ํ•ด ์†Œ๋ชจ๋˜๋Š” ์ „๋ ฅ๊ณผ ๋„คํŠธ์›Œํฌ ์ธํ„ฐํŽ˜์ด์Šค์—์„œ ์†Œ๋ชจ๋˜๋Š” ์ „๋ ฅ์„ ๋ถ„ํ•ดํ•˜์—ฌ, ๋‹ค์ค‘ ๋„คํŠธ์›Œํฌ ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ํ™œ์„ฑํ™”์‹œํ‚ค๋Š” ๊ฒฝ์šฐ์˜ ์ •๋ฐ€ํ•œ ์ „๋ ฅ ์†Œ๋ชจ ๋ชจ๋ธ์„ ๊ตฌ์„ฑํ•œ๋‹ค. ๋‹ค์–‘ํ•œ ์‹œ๋‚˜๋ฆฌ์˜ค์—์„œ ์ธก์ •๋œ ์ „๋ ฅ๊ณผ ๋ชจ๋ธ์„ ํ†ตํ•ด ์˜ˆ์ธก๋œ ์ „๋ ฅ์„ ๋น„๊ตํ•˜๋ฉฐ ์ œ์•ˆํ•˜๋Š” ์ „๋ ฅ ์†Œ๋ชจ ๋ชจ๋ธ์˜ ์ •ํ™•์„ฑ์„ ํ‰๊ฐ€ํ•˜์˜€๋‹ค. ๊ธฐ์กด ์ „๋ ฅ ์†Œ๋ชจ ๋ชจ๋ธ์— ๋น„ํ•ด ๋‹จ์ผ ๋„คํŠธ์›Œํฌ ํ†ต์‹ ์˜ ๊ฒฝ์šฐ์—๋„ 7%-35% ๋งŒํผ ์ถ”์ • ์˜ค์ฐจ๋ฅผ ์ค„์˜€์œผ๋ฉฐ, ๋‹ค์ค‘ ๋„คํŠธ์›Œํฌ ํ†ต์‹ ์˜ ๊ฒฝ์šฐ ์ถ”์ • ์˜ค์ฐจ๋ฅผ 25% ์ค„์ž„์„ ๋ณด์˜€๋‹ค. ๋‘ ๋ฒˆ์งธ๋กœ, ์Šค๋งˆํŠธํฐ์˜ ์‹ค์‹œ๊ฐ„ ์—๋„ˆ์ง€ ์ธ์ง€๋ฅผ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•˜๊ธฐ ์œ„ํ•ด์„œ, ์Šค๋งˆํŠธํฐ์—์„œ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ๋Š” Li-ion ๋ฐฐํ„ฐ๋ฆฌ์˜ ํŠน์„ฑ์„ ๊ณ ๋ คํ•˜์—ฌ ๋ฐฐํ„ฐ๋ฆฌ ์†Œ๋ชจ์œจ์„ ์ถ”์ •ํ•˜๋Š” ๊ธฐ๋ฒ•์„ ๊ณ ์•ˆํ•œ๋‹ค. Li-ion ๋ฐฐํ„ฐ๋ฆฌ๋Š” ์˜จ๋„์™€ ๋…ธํ™” ์ƒํƒœ์— ๋”ฐ๋ผ์„œ ๊ฐ€์šฉ ์šฉ๋Ÿ‰๊ณผ ๋‚ด๋ถ€ ์ €ํ•ญ์ด ๋‹ฌ๋ผ์ง€๊ธฐ ๋•Œ๋ฌธ์—, ์˜จ๋„์™€ ๋…ธํ™” ์ƒํƒœ์— ๋”ฐ๋ผ์„œ ๋ฐฐํ„ฐ๋ฆฌ ์†Œ๋ชจ์œจ์ด ๋‹ฌ๋ผ์งˆ ์ˆ˜ ์žˆ๋‹ค. ๋ฐฐํ„ฐ๋ฆฌ ํŠน์„ฑ์„ ๋ชจ๋ธ๋งํ•˜๋Š” ๊ฒƒ์€ ์–ด๋ ค์šด ์ผ์ด๊ธฐ ๋•Œ๋ฌธ์—, effective resistance ๊ฐœ๋…์„ ๋„์ž…ํ•˜์—ฌ ์šฉ๋Ÿ‰๊ณผ ๋‚ด๋ถ€ ์ €ํ•ญ์„ ๋ชจ๋ฅด๊ณ ๋„ ๋ฐฐํ„ฐ๋ฆฌ ์†Œ๋ชจ์œจ์„ ์˜ˆ์ธกํ•  ์ˆ˜ ์žˆ๋Š” BattTracker๋ฅผ ๊ณ ์•ˆํ•œ๋‹ค. BattTracker๋Š” ์‹ค์‹œ๊ฐ„ ๋ฐฐํ„ฐ๋ฆฌ ์†Œ๋ชจ์œจ์„ ์ตœ๋Œ€ 0.5์ดˆ ๋งˆ๋‹ค ์ถ”์ •ํ•  ์ˆ˜ ์žˆ๋‹ค. ์‹ค์ œ ์Šค๋งˆํŠธํฐ์œผ๋กœ ๋‹ค์–‘ํ•œ ์‹คํ—˜์„ ํ†ตํ•˜์—ฌ BattTracker๊ฐ€ ๋ฐฐํ„ฐ๋ฆฌ ์†Œ๋ชจ ์˜ˆ์ธก์„ 5% ์˜ค์ฐจ์œจ ์ด๋‚ด๋กœ ์˜ˆ์ธกํ•จ์„ ๋ณด์˜€์œผ๋ฉฐ, ์ด๋ฅผ ํ™œ์šฉํ•˜๋ฉด ๋†’์€ ์‹œ๊ฐ„ ํ•ด์ƒ๋„๋กœ ์Šค๋งˆํŠธํฐ์˜ ์—๋„ˆ์ง€ ์ธ์ง€ ๋™์ž‘์ด ๊ฐ€๋Šฅํ•ด์ง„๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ, ์• ๋„ˆ์ง€ ์ธ์ง€ ๊ธฐ๋ฒ•๊ณผ LTE์™€ Wi-Fi ๋งํฌ๋ฅผ ๋™์‹œ์— ํ™œ์šฉํ•˜๋Š” ๊ฒƒ์„ dynamic adaptive streaming over HTTP (DASH) ๊ธฐ๋ฐ˜ ๋น„๋””์˜ค ์ŠคํŠธ๋ฆฌ๋ฐ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์— ์ ์šฉํ•œ๋‹ค. ์Šค๋งˆํŠธํฐ์—์„œ LTE์™€ Wi-Fi ๋งํฌ๋ฅผ ๋™์‹œ์— ํ™œ์šฉํ•˜๋Š” ๊ฒƒ์€ ๋‹ค์–‘ํ•œ ์ธก๋ฉด์—์„œ DASH ๊ธฐ๋ฐ˜์˜ ๋น„๋””์˜ค ์ŠคํŠธ๋ฆฌ๋ฐ์˜ ์„ฑ๋Šฅ์„ ํ–ฅ์ƒ์‹œํ‚ฌ ์ˆ˜ ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜, ๋ฐฐํ„ฐ๋ฆฌ ์—๋„ˆ์ง€์™€ LTE ๋ฐ์ดํ„ฐ ์‚ฌ์šฉ๋Ÿ‰์„ ์ ˆ์•ฝํ•˜๋ฉด์„œ ๋Š๊น€์—†๋Š” ๊ณ ํ™”์งˆ์˜ ๋น„๋””์˜ค๋ฅผ ์ŠคํŠธ๋ฆฌ๋ฐํ•˜๋Š” ๊ฒƒ์€ ๋„์ „์ ์ธ ์ผ์ด๋‹ค. ๋”ฐ๋ผ์„œ, DASH ๋น„๋””์˜ค๋ฅผ ์‹œ์ฒญํ•˜๋Š” ์‚ฌ์šฉ์ž์˜ Quality of Experience (QoE)๋ฅผ ํ–ฅ์ƒ์‹œํ‚ค๊ธฐ ์œ„ํ•˜์—ฌ LTE์™€ Wi-Fi๋ฅผ ๋™์‹œ์— ํ™œ์šฉํ•˜๋Š” DASH video chunk ์š”์ฒญ ๊ธฐ๋ฒ•์ธ REQUEST๋ฅผ ์ œ์•ˆํ•œ๋‹ค. REQUEST๋Š” ์ฃผ์–ด์ง„ ๋ฐฐํ„ฐ๋ฆฌ ์—๋„ˆ์ง€์™€ LTE ์‚ฌ์šฉ๋Ÿ‰ ์˜ˆ์‚ฐ ๋‚ด์—์„œ ์ตœ์ ์— ๊ฐ€๊นŒ์šด ํ’ˆ์งˆ์˜ ๋น„๋””์˜ค๋ฅผ ๋Š๊น€์—†์ด ์ŠคํŠธ๋ฆฌ๋ฐํ•ด ์ฃผ๋Š” ๊ฒƒ์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•œ๋‹ค. ๋‹ค์–‘ํ•œ ํ™˜๊ฒฝ์—์„œ์˜ ์‹œ๋ฎฌ๋ ˆ์ด์…˜๊ณผ ์‹ค ํ™˜๊ฒฝ์—์„œ์˜ ์ธก์ •์„ ํ†ตํ•˜์—ฌ, REQUEST๊ฐ€ ๊ธฐ์กด ๋น„๋””์˜ค ์ŠคํŠธ๋ฆฌ๋ฐ ๊ธฐ๋ฒ•์— ๋น„ํ•ด ํ‰๊ท  ๋น„๋””์˜ค ํ’ˆ์งˆ, ์žฌ๋ฒ„ํผ๋ง, ์ž์› ๋‚ญ๋น„๋Ÿ‰ ๊ด€์ ์—์„œ ์ƒ๋‹นํžˆ ์šฐ์ˆ˜ํ•จ์„ ๋ณด์ธ๋‹ค. ์š”์•ฝํ•˜์ž๋ฉด, ์šฐ๋ฆฌ๋Š” LTE์™€ Wi-Fi์˜ ๋™์‹œ ์‚ฌ์šฉํ•˜๋Š” ์Šค๋งˆํŠธํฐ์—์„œ์˜ ์ „๋ ฅ ๋ชจ๋ธ๋ง ๋ฐฉ๋ฒ•๋ก , ์‹ค์‹œ๊ฐ„ ๋ฐฐํ„ฐ๋ฆฌ ์†Œ๋ชจ์œจ ์ถ”์ • ๊ธฐ๋ฒ•, DASH ๊ธฐ๋ฐ˜ ๋น„๋””์˜ค ์ŠคํŠธ๋ฆฌ๋ฐ ์„ฑ๋Šฅ ์ตœ์ ํ™”๋ฅผ ์ œ์•ˆํ•œ๋‹ค. ์ด ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•ด์„œ, ์šฐ๋ฆฌ๋Š” ํ”„๋กœํ† ํƒ€์ž… ๊ตฌํ˜„๊ณผ ์‹คํ—˜ ์žฅ๋น„๋“ค์„ ํ†ตํ•œ ์‹ค์ธก ๊ธฐ๋ฐ˜์œผ๋กœ LTE์™€ Wi-Fi๋ฅผ ๋™์‹œ์— ํ™œ์šฉํ•˜๋Š” ์Šค๋งˆํŠธํฐ์„ ์œ„ํ•œ ์—๋„ˆ์ง€ ์ธ์ง€ ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. ์ œ์•ˆํ•˜๋Š” ๊ธฐ๋ฒ•๋“ค์˜ ์„ฑ๋Šฅ์€ ์ƒ์šฉ ์Šค๋งˆํŠธํฐ์— ๊ตฌํ˜„ํ•˜์—ฌ ์‹ค ํ™˜๊ฒฝ์—์„œ์˜ ์„ฑ๋Šฅ ํ‰๊ฐ€๋ฅผ ํ†ตํ•ด ๊ฒ€์ฆํ•˜์˜€๋‹ค.State-of-the-art smartphones can utilize multiple network interfaces simultaneously, e.g., LTE and Wi-Fi, to enhance throughput and network connectivity in various use cases. In this situation, energy consumption of smartphones can increase while using both LTE and Wi-Fi interfaces simultaneously. Since energy consumption is an important issue for smartphones powered by batteries with limited capacity, it is required to consider the trade-off between energy increase and performance enhancement. By judiciously utilizing both LTE and Wi-Fi interfaces of smartphones and energy awareness techniques, it is enabled to optimize the performance of smartphones applications while saving battery energy. In this dissertation, we consider the following three strategies to enable the energy awareness for smartphones which utilize both LTE and Wi-Fi links: (i) Power modeling for smartphone which utilizes both LTE and Wi-Fi links simultaneously, (ii) real-time battery drain rate estimation for smartphones, and (iii) optimizing the performance of dynamic adaptive streaming over HTTP (DASH)-based video streaming for smartphones. First, an accurate power modeling is presented for the smartphones, especially, those capable of activating/utilizing multiple networks simultaneously. By decomposing packet processing power and power consumed by network interfaces, we construct the accurate power model for multiple network interface-activated cases. The accuracy of our model is comparatively evaluated by comparing the estimated power with the measured power in various scenarios. We find that our model reduces estimation error by 7%โ€“35% even for single network transmissions, and by 25% for multiple network transmissions compared with existing power models. Second, in order to enable real-time energy awareness for smartphones, we develop a battery drain rate monitoring technique by considering characteristics of Li-ion batteries which are used by smartphones. With Li-ion battery, battery drain rate varies with temperature and battery aging, since they affect battery characteristics such as capacity and internal resistance. Since it is difficult to model the battery characteristics, we develop BattTracker, an algorithm to estimate battery drain rate without knowing the exact capacity and internal resistance by incorporating the concept of effective resistance. BattTracker tracks the instantaneous battery drain rate with up to 0.5 second time granularity. Extensive evaluation with smartphones demonstrates that BattTracker accurately estimates the battery drain rate with less than 5% estimation error, thus enabling energy-aware operation of smartphones with fine-grained time granularity. Finally, we adapt an energy awareness and utilize both LTE and Wi-Fi links for a Dynamic Adaptive Streaming over HTTP (DASH)-based video streaming application. Exploiting both LTE and Wi-Fi links simultaneously enhances the performance of DASH-based video streaming in various aspects. However, it is challenging to achieve seamless and high quality video while saving battery energy and LTE data usage to prolong the usage time of a smartphone. Thus, we propose REQUEST, a video chunk request policy for DASH in a smartphone, which can utilize both LTE andWi-Fi to enhance users Quality of Experience (QoE). REQUEST enables seamless DASH video streaming with near optimal video quality under given budgets of battery energy and LTE data usage. Through extensive simulation and measurement in a real environment, we demonstrate that REQUEST significantly outperforms other existing schemes in terms of average video bitrate, rebuffering, and resource waste. In summary, we propose a power modeling methodology, a real-time battery drain rate estimation method, and performance optimization of DASH-based video streaming for a smartphone which utilizes both LTE and Wi-Fi simultaneously. Through this research, we propose several energy-aware techniques for the smartphone, which especially utilizes both LTE and Wi-Fi, based on prototype implementation and the real measurement with experimental equipment. The performance of the proposed methods are validated by implementation on off-the-shelf smartphones and evaluations in real environments.1 Introduction 1 1.1 Motivation 1 1.2 Overview of Existing Approaches 3 1.2.1 Power modeling of smartphone 3 1.2.2 Battery drain rate estimation 4 1.2.3 Optimizing the performance of video streaming 5 1.3 Main Contributions 6 1.3.1 PIMM: Power Modeling of Multiple Network Interface-Activated Smartphone 6 1.3.2 BattTracker: Real-Time Battery Drain Rate Estimation 7 1.3.3 REQUEST: Performance Optimization of DASH Video Streaming 8 1.4 Organization of the Dissertation 8 2 PIMM: Packet Interval-Based Power Modeling of Multiple Network Interface-Activated Smartphones 10 2.1 Introduction 10 2.2 Background 12 2.2.1 Power saving operations of Wi-Fi and LTE 12 2.2.2 Related work 13 2.3 Power Consumption Modeling 14 2.3.1 Modeling Methodology 15 2.3.2 Packet interval-based power modeling 21 2.4 Practical issues 30 2.4.1 Impact of packet length 30 2.4.2 Impact of channel quality 33 2.5 Performance Evaluation 34 2.5.1 On-line power estimation 35 2.5.2 Single network data connections 37 2.5.3 Multiple network data connections 42 2.5.4 Model generation complexity 45 2.6 Summary 46 3 BattTracker: Enabling Energy Awareness for Smartphone Using Li-ion Battery Characteristics 47 3.1 Introduction 47 3.2 Background 50 3.2.1 Smartphones battery interface 50 3.2.2 State of Charge (SoC) and Open Circuit Voltage (Voc) 50 3.2.3 Batterys internal resistance 53 3.2.4 Related Work 53 3.3 Li-ion Battery Characteristics 54 3.3.1 Impact of temperature and aging on Li-ion battery 54 3.3.2 Measuring battery characteristics 54 3.3.3 Battery characteristics models 57 3.4 Effective Internal Resistance 58 3.4.1 Effective internal resistance (re) 58 3.4.2 Battery drain rate and lifetime derived from re 60 3.5 BattTracker Design 61 3.5.1 Rd estimator 62 3.5.2 Voc estimator 62 3.5.3 re estimator 64 3.6 Performance Evaluation 65 3.6.1 Comparison schemes and performance metrics 66 3.6.2 Convergence time of re 67 3.6.3 Power consumption overhead of BattTracker 67 3.6.4 Comparison with measurement using equipment 68 3.6.5 BattTracker with aged batteries 70 3.6.6 BattTracker with various video applications 70 3.6.7 BattTracker with varying temperature 73 3.7 Summary 74 4 REQUEST: Seamless Dynamic Adaptive Streaming over HTTP for Multi-Homed Smartphone under Resource Constraints 75 4.1 Introduction 75 4.2 Background and Related Work 77 4.2.1 Background 77 4.2.2 Related Work 79 4.3 Motivation 80 4.3.1 Wi-Fi Throughput Fluctuation 80 4.3.2 Optimizing Resource Utilization 82 4.4 Proposed Chunk Request Policy 83 4.5 Problem Formulation 86 4.6 REQUEST Algorithm 90 4.6.1 Request Interval Adaptation 91 4.6.2 Chunk Request Adaptation 94 4.7 Performance Evaluation 96 4.7.1 Prototype-Based Evaluation 98 4.7.2 Trace-Driven Simulation 102 4.8 Summary 104 5 Concluding Remarks 106 5.1 Research Contributions 106 5.2 Future Work 107 Abstract (In Korean) 117Docto

    Microarchitecture Choices and Tradeoffs for Maximizing Processing Efficiency.

    Full text link
    This thesis is concerned with hardware approaches for maximizing the number of independent instructions in the execution core and thereby maximizing the processing efficiency for a given amount of compute bandwidth. Compute bandwidth is the number of parallel execution units multiplied by the pipelining of those units in the processor. Keeping those computing elements busy is key to maximize processing efficiency and therefore power efficiency. While some applications have many independent instructions that can be issued in parallel without inefficiencies due to branch behavior, cache behavior, or instruction dependencies, most applications have limited parallelism and plenty of stalling conditions. This thesis presents two approaches to this problem, which in combination greatly increases the efficiency of the processor utilization of resources. The first approach addresses the problem of small basic blocks that arise when code has frequent branches. We introduce algorithms and mechanisms to predict multiple branches simultaneously and to fetch multiple non-continuous basic blocks every cycle along a predicted branch path. This makes what was previously an inherently serial process into a parallelized instruction fetch approach. For integer applications, the result is an increase in useful instruction fetch capacity of 40% when two basic blocks are fetched per cycle and 63% for three blocks per cycle. For floating point benchmarks, the associated improvement is 27% and 59%. The second approach addresses increasing the number of independent instructions to the execution core through simultaneous multi-threading (SMT). We compare to another multithreading approach, Switch-on-Event multithreading, and show that SMT is far superior. Intel Pentium 4 SMT microarchitecture algorithms are analyzed, and we look at the impact of SMT on power efficiency of the Pentium 4 Processor. A new metric, the SMT Energy Benefit is defined. Not only do we show that the SMT Energy Benefit for a given workload with SMT can be quite significant, we also generalize the results and build a model for what other future processorsโ€™ SMT Energy Benefit would be. We conclude that while SMT will continue to be an energy-efficient feature, as processors get more energy-efficient in general the relative SMT Energy Benefit may be reduced.Ph.D.Computer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/61740/1/dtmarr_1.pd

    Stochastic Performance Throttling for Multicore Architectures under Spatial and Temporal Dependencies

    Get PDF

    ABSTRACT A Run-Time, Feedback-Based Energy Estimation Model For Embedded Devices

    No full text
    We present an adaptive, feedback-based, energy estimation model for battery-powered embedded devices such as sensor network gateways and hand-held computers. Our technique maps hardware and software counters to energy consumption values using a set of first order, linear regression equations. Our system is novel in that it combines online and offline techniques to enable runtime power prediction. Our system employs an offline instantiated model that it continuously updates using feedback from a readily available battery monitor within the device. We empirically evaluate our model and detail its robustness, accuracy, and computational cost. We also analyze the stability of the model in the presence of feedback errors. We demonstrate that our approach can achieve an error rate of 1 % (extant techniques: 2.6 % to 4%) for computationally bound tasks and 6.6 % (extant techniques: 11%) for communication bound tasks

    Verfahren und Protokolle fรผr energiebewusste, gemeinsame Ressourcenverwendung mit mobilen Gerรคten

    Get PDF
    Voraussetzung fรผr die gemeinsame Nutzung von Betriebsmitteln mobiler Gerรคte sind Verfahren, die es erlauben, den Energiebedarf fรผr die Bereitstellung von Ressourcen abzuschรคtzen, unter mehreren Ressourcenanbietern einen geeigneten auszuwรคhlen und diesen fรผr den erbrachten Energieaufwand zu entschรคdigen. Diese Arbeit stellt hierfรผr entwickelte Verfahren vor, die insbesondere das geringe Energiebudget mobiler Gerรคte berรผcksichtigen
    corecore