Periodic Transfers in Mobile Applications: Network-wide Origin, Impact, and Optimization Feng Qian 1, Zhaoguang Wang 1, Yudong Gao 1, Junxian Huang 1 Alexandre.

Slides:



Advertisements
Similar presentations
S MARTPHONES IMPACT IN 3G AND F UTURE LTE N ETWORKS Student : Adnan Basir (84906S) Supervisor : Jyri Hämäläinen Instructor : Timo Halonen (Nokia Siemens.
Advertisements

Web Caching on Smartphones: Ideal vs. Reality Feng Qian 1, Kee Shen Quah 1, Junxian Huang 1, Jeffrey Erman 2 Alexandre Gerber 2, Z. Morley Mao 1, Subhabrata.
University of Michigan Electrical Engineering and Computer Science Anatomizing Application Performance Differences on Smartphones Junxian Huang, Qiang.
Efficient Constraint Monitoring Using Adaptive Thresholds Srinivas Kashyap, IBM T. J. Watson Research Center Jeyashankar Ramamirtham, Netcore Solutions.
3G v.s WIFI Radio Energy with YouTube downloads. Energy in Mobile Phone Data Transfers In 3G, there are three states –Idle –DCH (Dedicated Channel), do.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
1 Communication Networks Kolja Eger, Prof. Dr. U. Killat 1 From Packet-level to Flow-level Simulations of P2P Networks Kolja Eger, Ulrich Killat Hamburg.
Augmenting Mobile 3G Using WiFi Sam Baek Ran Li Modified from University of Massachusetts Microsoft Research.
Junxian Huang Feng Qian Alexandre Gerber Z. Morley Mao Subhabrata Sen Oliver Spatscheck University of Michigan AT&T Labs - Research Presented by Tianxiong.
Silberschatz, Galvin and Gagne  2002 Modified for CSCI 399, Royden, Operating System Concepts Operating Systems Lecture 19 Scheduling IV.
An Empirical Study of Real Audio Traffic A. Mena and J. Heidemann USC/Information Sciences Institute In Proceedings of IEEE Infocom Tel-Aviv, Israel March.
Congestion Control Tanenbaum 5.3, /12/2015Congestion Control (A Loss Based Technique: TCP)2 What? Why? Congestion occurs when –there is no reservation.
1 On Handling QoS Traffic in Wireless Sensor Networks 吳勇慶.
Ph.D. DefenceUniversity of Alberta1 Approximation Algorithms for Frequency Related Query Processing on Streaming Data Presented by Fan Deng Supervisor:
Traffic Characterization Dr. Abdulaziz Almulhem. Almulhem©20012 Agenda Traffic characterization Switching techniques Internetworking, again.
Computer Networks Transport Layer. Topics F Introduction  F Connection Issues F TCP.
5/12/05CS118/Spring051 A Day in the Life of an HTTP Query 1.HTTP Brower application Socket interface 3.TCP 4.IP 5.Ethernet 2.DNS query 6.IP router 7.Running.
Submission October 2011 doc.:IEEE /1517r0 Santosh Abraham, Qualcomm Incorporated Efficient Device and Service Discovery for Peer-to-Peer (P2P)
Cellular Networks Guest lecture by Li Erran Li, Bell Labs COS 461: Computer Networks 4/18/2012 W 10-10:50am in Architecture N101 1 Cellular Core Network.
Junxian Huang 1 Feng Qian 2 Yihua Guo 1 Yuanyuan Zhou 1 Qiang Xu 1 Z. Morley Mao 1 Subhabrata Sen 2 Oliver Spatscheck 2 1 University of Michigan 2 AT&T.
Timecard: Controlling User-Perceived Delays in Server-Based Mobile Applications Lenin Ravindranath, Jitu Padhye, Ratul Mahajan, Hari Balakrishnan.
Niranjan Balasubramanian Aruna Balasubramanian Arun Venkataramani University of Massachusetts Amherst Energy Consumption in Mobile Phones: A Measurement.
Can Internet Video-on-Demand Be Profitable? SIGCOMM 2007 Cheng Huang (Microsoft Research), Jin Li (Microsoft Research), Keith W. Ross (Polytechnic University)
Cellular Networks and Mobile Computing COMS , Spring 2013 Instructor: Li Erran Li
Efficient Scheduling of Heterogeneous Continuous Queries Mohamed A. Sharaf Panos K. Chrysanthis Alexandros Labrinidis Kirk Pruhs Advanced Data Management.
Characterizing and Modeling the Impact of Wireless Signal Strength on Smartphone Battery Drain Ning Ding Xiaomeng Chen Abhinav Pathak Y. Charlie Hu 1 Daniel.
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
ISO Layer Model Lecture 9 October 16, The Need for Protocols Multiple hardware platforms need to have the ability to communicate. Writing communications.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Detail: Reducing the Flow Completion Time Tail in Datacenter Networks SIGCOMM PIGGY.
Advanced Computer Networks1 Efficient Policies for Carrying Traffic Over Flow-Switched Networks Anja Feldmann, Jenifer Rexford, and Ramon Caceres Presenters:
Maintaining Performance while Saving Energy on Wireless LANs Ronny Krashinsky Term Project
Optimized M2M interworking with mobile networks Group Name: oneM2M REQ Source: Takanori Iwai, NEC, Meeting Date: Agenda.
1 A Comparative Study of Handheld and Non-Handheld Traffic in Campus Wi-Fi Networks Aaron Gember, Ashok Anand, and Aditya Akella University of Wisconsin—Madison.
Network: Location Management Y. Richard Yang 3/21/2011.
Budget-based Control for Interactive Services with Partial Execution 1 Yuxiong He, Zihao Ye, Qiang Fu, Sameh Elnikety Microsoft Research.
Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications REF:Balasubramanian, Niranjan, Aruna Balasubramanian,
Chapter 12 Transmission Control Protocol (TCP)
Cellular Networks and Mobile Computing COMS , Spring 2012 Instructor: Li Erran Li
Timecard: Controlling User-Perceived Delays in Server-Based Mobile Applications Lenin Ravindranath, Jitu Padhye, Ratul Mahajan, Hari Balakrishnan.
Sharing Social Content from Home: A Measurement-driven Feasibility Study Massimiliano Marcon Bimal Viswanath Meeyoung Cha Krishna Gummadi NOSSDAV 2011.
Performance Analysis of Real Traffic Carried with Encrypted Cover Flows Nabil Schear David M. Nicol University of Illinois at Urbana-Champaign Department.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Software Engineering Laboratory, Department of Computer Science, Graduate School of Information Science and Technology, Osaka University July 21, 2008WODA.
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
WB-RTO: A Window-Based Retransmission Timeout Ioannis Psaras Demokritos University of Thrace, Xanthi, Greece.
PROTEUS: Network Performance Forecast for Real- Time, Interactive Mobile Applications Qiang Xu* Sanjeev Mehrotra# Z. Morley Mao* Jin Li# *University of.
Profiling Resource Usage for Mobile Applications: a Cross-layer Approach Feng Qian 1, Zhaoguang Wang 1, Alexandre Gerber 2, Z. Morley Mao 1, Subhabrata.
Characterizing Radio Resource Allocation for 3G Networks Feng Qian* Zhaoguang Wang* Alexandre Gerber † Z. Morley Mao* Subhabrata Sen † Oliver Spatscheck.
Understanding the Impact of Network Dynamics on Mobile Video User Engagement M. Zubair Shafiq (Michigan State University) Jeffrey Erman (AT&T Labs - Research)
Emir Halepovic, Jeffrey Pang, Oliver Spatscheck AT&T Labs - Research
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. TOP: Tail Optimization Protocol.
Performance Limitations of ADSL Users: A Case Study Matti Siekkinen, University of Oslo Denis Collange, France Télécom R&D Guillaume Urvoy-Keller, Ernst.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Understanding Online Social Network Usage from a Network Perspective F. Schneider et al (T-Labs, AT&T) Internet Measurement Conference 2009 Networking.
1 Three ways to (ab)use Multipath Congestion Control Costin Raiciu University Politehnica of Bucharest.
Cellular Networks and Mobile Computing COMS , Fall 2012 Instructor: Li Erran Li
TCP - Part II.
Energy Consumption in Mobile Phones
Topics discussed in this section:
Reddy Mainampati Udit Parikh Alex Kardomateas
Outline Introduction Related Work
An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance Authors: Junxian Huang, Feng Qian, Yihua Guo, Yuanyuan Zhou,
ECF: an MPTCP Scheduler to Manage Heterogeneous Paths
08/03/14 Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications REF:Balasubramanian, Niranjan, Aruna Balasubramanian,
Characterizing Smartwatch Usage In The Wild
AT&T Developer Services Application Resource Optimizer (ARO)
Modeling and Evaluating Variable Bit rate Video Steaming for ax
Presentation transcript:

Periodic Transfers in Mobile Applications: Network-wide Origin, Impact, and Optimization Feng Qian 1, Zhaoguang Wang 1, Yudong Gao 1, Junxian Huang 1 Alexandre Gerber 2, Z. Morley Mao 1, Subhabrata Sen 2, Oliver Spatscheck 2 1 University of Michigan 2 AT&T Labs - Research April

Introduction Typical testing and optimization in cellular network Little focus has been put on their cross-layer interactions Many mobile applications are not cellular-friendly. The key coupling factor: the RRC State Machine – Determine the resource management policy – Similar RRC state machines exist in 2G, 3G, and 4G networks Page 2 RRC State Machine ?

Background: Radio Resource Management in Cellular Networks RRC (Radio Resource Control) state machine [3GPP TS ] – State promotions have promotion delay – State demotions incur tail times Tail Time Delay: 1.5s Delay: 2s RRC StateChannel Radio Power IDLENot allocated Almost zero CELL_FACH Shared, Low Speed Low CELL_DCH Dedicated, High Speed High UMTS RRC State Machine for a large US 3G carrier Page 3

Background: Radio Resource Management in Cellular Networks Promo Delay 2 Sec DCH Tail 5 sec FACH Tail 12 sec Tail Time Waiting inactivity timers to expire Page 4

Cellular Periodic Transfers What are periodic transfers? – A handset (mobile device) periodically exchanges some data with a remote server every t seconds. Why do they occur? – Keep-alive, periodic polling, periodic measurements… – Easy to program: java.util.Timer.scheduleAtFixedRate() Why are they bad in cellular networks? – They are small and short – Each transfer incurs a long tail We perform the first network-wide study of cellular periodic transfers to understand their Prevalence Resource impact Application semantics Potential for improving their inefficiency Page 5

Talk Outline: Cellular Periodic Transfers… Why are they bad in cellular networks? How prevalent are they? Why do they occur in mobile applications? What are their network-wide resource impact? How to make them more resource-efficient? Page 6

Talk Outline: Cellular Periodic Transfers… Why are they bad in cellular networks? How prevalent are they? Why do they occur in mobile applications? What are their network-wide resource impact? How to make them more resource-efficient? Page 7

Small Data Transfers: 3G vs. Wi-Fi Perform controlled experiments – Download a small HTTP object in 3G and WiFi – Using a power monitor to measure energy consumption Radio energy breakdown Promotion (~2 sec) Promotion (~2 sec) Data Transfer Data Transfer DCH Tail (5 sec) DCH Tail (5 sec) FACH Tail (12 sec) FACH Tail (12 sec) 3G: Data Transfer Data Transfer Wi-Fi Tail (250 ms) Wi-Fi Tail (250 ms) Wi-Fi: Page 8

Measurement Results Object A: 1 KB Object B: 9 KB Wi-Fi is 140x more efficient than 3G, because Wi-Fi has a much smaller RTT Wi-Fi radio power is only half of 3G radio power Wi-Fi has a much shorter tail time For transferring A (B) using 3G, 97.0% (94.3%) of radio energy belongs to the tail. Small traffic bursts are extremely resource-inefficient in cellular networks Root cause: promotion delay the tail time Transferring them periodically leads to even more serious resource inefficiencies Page 9

Talk Outline: Cellular Periodic Transfers… Why are they bad in cellular networks? How prevalent are they? Why do they occur in mobile applications? What are their network-wide resource impact? How to make them more resource-efficient? Page 10

Cellular Measurement Dataset Packet traces collected from a large U.S. cellular carrier Collected at the cellular core network without sampling 1.5 billion packets for 1.25 hours in December 2010 Recorded IP and TCP(UDP) headers and timestamps Extracted 2.8 million user sessions Page 11

The Periodicity Detection Algorithm Existing approaches: DFT and auto-correlation – Used to estimate RTT (the “clock” of TCP flows) – Not work well in our scenario: periodic transfers have much fewer samples than RTTs We proposed a simple heuristics-based approach – Input: a session; output: periodicities and periodic transfers – Key idea: exhaustively search for repetitions of data transfers spaced by a fixed time period Page 12 t seconds

Measurement Results Key algorithm parameter: – θ (minimal repetitions to be observed before declaring a periodicity) – We use θ = 4 (more details in paper) What is the distribution of periodicities? A particular value of one-minute dominates the periodicity. Likely to be set by developers in an ad-hoc manner. Page 13

Measurement Results (cont.) Prevalence of periodic transfers? – A long session: at least one minute – They occur in about 20% of long sessions Typical size and duration of a periodic transfer? They are Small: 25 th / 50 th / 75 th percentiles: 0.2 KB, 1.1 KB, 1.8KB 97% of periodic transfers < 10 KB They are short: 90% are less than 7 seconds Page 14 Cellular periodic transfers are: Prevalent: they occur in 20% of long sessions Small: median size is 1.1 KB Short: 90% are less than 7 seconds At least 70% of periodicities are one minute

Talk Outline: Cellular Periodic Transfers… Why are they bad in cellular networks? How prevalent are they? Why do they occur in mobile applications? What are their network-wide resource impact? How to make them more resource-efficient? Page 15

Understanding Origins of Cellular Periodic Transfers Leverage a database generated by the same carrier – Contains IP address  content provider mappings – Based on the data collected on the same day / same location as the packet trace was collected IPs of 46% of detected periodic transfers have meaningful content provider names in the database Page 16 IP  content provider database  lt.andomedia.com   …

Origins of Cellular Periodic Transfers Content Provider / Applications % Periodic transfers Remarks facebook.com48.4%Keep connection alive for pushing andomedia.com15.5%Pandora’s audience measurement medialytics.com4.9%User behavior monitoring DNS14.1%DNS lookups Advertisements3.3%Advertisement update gmail.com1.4%Checking s pinger.com1.4%Polling to fetch updates for SMS (Other)11.1%e.g., periodically check the weather (within 46% of all detected periodic transfer instances) Many periodic transfers are either unnecessary or overly aggressive Page 17

Case Studies Facebook – Periodic transfers (60s) used as keep-alive messages – Prevent a TCP connection from being closed by the NAT – For the four largest U.S. cellular carriers, the timeout of cellular NAT is at least 4.25 minutes [Wang et al, SIGCOMM 2011] Pandora (music streaming) – Periodic audience measurement uploaded to andomedia.com every one minute – Even when Pandora is running in the background Page 18

Talk Outline: Cellular Periodic Transfers… Why are they bad in cellular networks? How prevalent are they? Why do they occur in mobile applications? What are their network-wide resource impact? How to make them more resource-efficient? Page 19

Quantifying the Resource Impact of Periodic Transfers Use our trace-driven RRC state machine simulator with a handset radio power model [Qian etal, Mobisys 11] Three metrics of resource consumption – D: radio resource consumption Quantified by the CELL_DCH occupation time – S: signaling load, quantified by the total promotion delay – E: handset radio energy consumption Computed using a handset radio power model Page 20

Quantifying the Resource Impact of Periodic Transfers Compute the impact Quantify the impact at four study scopes – All sessions in the dataset – All sessions contain periodic transfers – All Facebook sessions – All Pandora sessions ΔE = (E R – E 0 ) / E 0 E 0 : Radio energy consumption in original sessions E R : Radio energy consumption in modified sessions with periodic transfers removed ΔE : Radio energy impact of periodic transfers (the value is negative) Page 21

The Resource Impact of Periodic Transfers Study Scope ΔV Traffic Volume ΔE Radio Energy ΔS Signaling Overhead ΔD Radio Energy All sessions0.4%-7.9%-8.9%-6.5% Periodic sessions0.7%-20.4%-25.3%-15.6% Facebook sessions1.7%-30.5%-30.4%-30.5% Pandora sessions0.5%-28.7%-35.0%-20.5% Huge disparity between traffic volume and resource consumption of periodic transfers All sessions: ΔE is 20 times of the ΔV Pandora: ΔE, ΔS, and ΔD are 40 to 70 times higher than ΔV Page 22 The state-of-art cellular periodic transfers are extremely resource inefficient The root cause: tail time and promotion overhead

Talk Outline: Cellular Periodic Transfers… Why are they bad in cellular networks? How prevalent are they? Why do they occur in mobile applications? What are their network-wide resource impact? How to make them more resource-efficient? Page 23

Optimizing Periodic Transfers Periodic transfers are delay-tolerant – Not initiated by user inputs – Applications usually have the flexibility over a time window in scheduling each transfer Can existing optimization approaches effectively reduce their resource impact? – Perform “what-if” analysis for existing opt. techniques – Resource reduction computed as – Focus on Pandora and Facebook sessions ΔE = (E after_opt – E before_opt ) / E before_opt Page 24

What-if Analysis: Increasing Periodicity Increasing the periodicity to 5 min: reduce the resource consumption by 22%~ 28% Tradeoff between resource saving and application semantics Study Scope ΔE Radio Energy ΔS Signaling Overhead Facebook-30.5%-30.4% Pandora-28.7%-35.0% Page 25

What-if Analysis: Fast Dormancy Fast dormancy [3GPP Release 7 R ] – Handset actively requests a state demotion after data transfer – Controlled by an independent fast dormancy timer Without FD With FD The Fast Dormancy Timer

What-if Analysis: Fast Dormancy Fast dormancy on only periodic transfers Fast dormancy on all transfers Blindly applying fast dormancy on all traffic is not recommended Doing that only at the end of periodic transfers is acceptable Tradeoff between resource saving and signaling overhead Page 27

Summary: Cellular Periodic Transfers… Why are they bad in cellular networks? – They are small and short – The tail effect How prevalent are they? – 20% of long sessions (> 1min) What are their key characteristics? – Small and short – 60 seconds dominates the periodicity Page 28

Summary: Cellular Periodic Transfers… Why do they occur in mobile applications? – Keep alive, measurement, polling, advertisement… – Many are too aggressive or even unnecessary What are their network-wide resource impact? – Up to 30% for popular apps – Resource impact is 20~70x of bandwidth usage impact How to make them more resource-efficient? – Existing techniques are effective, incurring various tradeoffs Page 29

Research Impact Our finding reached Pandora and Facebook The ARO (mobile Application Resource Optimizer) tool for profiling smartphone apps Page 30

Backup Slides

The Periodicity Detection Algorithm Existing approaches: DFT and auto-correlation – Used to estimate RTT (the “clock” of TCP flows) – Not work well in our scenario: periodic transfers have much fewer samples than RTTs We proposed a simple heuristics-based approach – Input: a user session – Output: periodicities and periodic transfers – Assume each periodicity is associated with the same server – Allow multiple periodicities appear in a session Page 32

The Periodicity Detection Algorithm For packets of each server IP address 1.Discretize timestamps using a slot length of ω 2.Search for periodicity of t min <= t <= t max slots (2 conditions) 3.Identify packets associated with each periodic transfer Evaluate by performing manual inspection Slot len ω sec A marked slot contains at least one packet of the target IP t: the detected periodicity Cond1: Observe at least θ marked slots spaced by a fixed number of t slots (e.g., θ = 3) Cond2: no marked slots between periodic seeds Periodic Seed 1 Periodic Seed 2 Periodic Seed 3 Page 33

Optimization Techniques Without FD With FD The Fast Dormancy Timer Page 34