ABSTRACT
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional Networking, a simple but powerful mechanism for handling network diversity. Applications supply a declarative label for network transmissions, and the system matches transmissions to the most appropriate network. The system may also defer and re-order opportunistic transmissions subject to application-supplied mutual exclusion and ordering constraints. We have modified three applications to use Intentional Networking: BlueFS, a distributed file system for pervasive computing, Mozilla's Thunderbird e-mail client, and a vehicular participatory sensing application. We evaluated the performance of these applications using measurements obtained by driving a vehicle through WiFi and cellular 3G network coverage. Compared to an idealized solution that makes optimal use of all aggregated available networks but that lacks knowledge of application intent, Intentional Networking improves the latency of interactive messages from 48% to 13x, while adding no more than 7% throughput overhead.
- ]]Anand, M., Nightingale, E. B., and Flinn, J. Self-tuning wireless network power management. In Proceedings of the 9th Annual Conference on Mobile Computing and Networking (San Diego, CA, September 2003), pp. 176--189. Google ScholarDigital Library
- ]]Bahl, P., Adya, A., Padhye, J., and Wolman, A. Reconsidering wireless systems with multiple radios. Computer Communication Review 34, 5 (2004), 39--46. Google ScholarDigital Library
- ]]Balasubramanian, A., Mahajan, R., and Venkataramani, A. Augmenting mobile 3G using WiFi. In Proceedings of the 8th International Conference on Mobile Systems, Applications and Services (June 2010), pp. 123--136. Google ScholarDigital Library
- ]]Bay area wireless users group. http://www.bawug.org/.Google Scholar
- ]]Brunato, M., and Severina, D. WilmaGate: A new open access gateway for hotspot management. In Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH) (Köln, Germany, September 2005), pp. 56--64. Google ScholarDigital Library
- ]]Carter, C., Kravets, R., and Tourrilhes, J. Contact networking: a localized mobility system. In Proceedings of the 1st International Conference on Mobile Systems, Applications and Services (San Francisco, CA, May 2003), pp. 145--158. Google ScholarDigital Library
- ]]Chandra, R., and Bahl, P. MultiNet: Connecting to multiple IEEE 802.11 networks using a single wireless card. In Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (Hong Kong, March 2004), pp. 882--893.Google ScholarCross Ref
- ]]Chebrolu, K., Raman, B., and Rao, R. R. A network layer approach to enable TCP over multiple interfaces. Wireless Networks 11, 5 (September 2005), 637--650. Google ScholarDigital Library
- ]]Czerwinski, S., Zhao, B., Hodes, T., Joseph, A., and Katz, R. An architecture for a secure service discovery service. In Proceedings of the 5th International Conference on Mobile Computing and Networking (Seattle, WA, August 1999), pp. 24--35. Google ScholarDigital Library
- ]]Draves, R., Padhye, J., and Zill, B. Routing in multi-radio, multi-hop wireless mesh networks. In Proceedings of the 10th International Conference on Mobile Computing and Networking (Philadelphia, PA, September 2004), pp. 114--128. Google ScholarDigital Library
- ]]Efstathiou, E. C., and Polyzos, G. C. A peer-to-peer approach to wireless LAN roaming. In Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH) (San Diego, CA, September 2003), pp. 10--18. Google ScholarDigital Library
- ]]Eriksson, J., Balakrishnan, H., and Madden, S. Cabernet: Vehicular content delivery using WiFi. In Proceedings of the 14th International Conference on Mobile Computing and Networking (September 2008), pp. 199--210. Google ScholarDigital Library
- ]]Friday, A., Davies, N., Wallbank, N., Catterall, E., and Pink, S. Supporting service discovery, querying and interaction in ubiquitous computing environments. Wireless Networks 10, 6 (November 2004), 631--641. Google ScholarDigital Library
- ]]Howard, J. H., Kazar, M. L., Menees, S. G., Nichols, D. A., Satyanarayanan, M., Sidebotham, R. N., and West, M. J. Scale and performance in a distributed file system. ACM Transactions on Computer Systems 6, 1 (February 1988), 51--81. Google ScholarDigital Library
- ]]Hsieh, H. Y., and Sivakumar, R. A transport layer approach for achieving aggregate bandwidths on multi-homed mobile hosts. In Proceedings of the 8th International Conference on Mobile Computing and Networking (Atlanta, GA, September 2002), pp. 83--94. Google ScholarDigital Library
- ]]Iyer, S., and Druschel, P. Anticipatory scheduling: A disk scheduling framework to overcome deceptive idleness in synchronous I/O. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (Banff, Canada, October 2001), pp. 117--130. Google ScholarDigital Library
- ]]Johansson, P., Kapoor, R., Kazantzidis, M., and Gerla, M. Personal area networks: Bluetooth or IEEE 802.11? International Journal of Wireless Information Networks 9, 2 (April 2002), 89--103.Google ScholarCross Ref
- ]]Kandula, S., Lin, K. C.-J., Badirkhanli, T., and Katabi, D. FatVAP: Aggregating AP backhaul capacity to maximize throughput. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (San Francisco, CA, April 2008), pp. 89--103. Google ScholarDigital Library
- ]]Kim, M., and Noble, B. D. Mobile network estimation. In Proceedings of the 7th International Conference on Mobile Computing and Networking (July 2001), pp. 298--309. Google ScholarDigital Library
- ]]Kistler, J. J., and Satyanarayanan, M. Disconnected operation in the Coda file system. ACM Transactions on Computer Systems 10, 1 (February 1992). Google ScholarDigital Library
- ]]Linux Advanced Routing and Traffic Control. http://lartc.org/.Google Scholar
- ]]The Linux Foundation. netem. http://www.linuxfoundation.org/collaborate/workgroups/networking/netem.Google Scholar
- ]]Lu, S., Park, S., Hu, C., Ma, X., Jiang, W., Li, Z., Popa, R. A., and Zhou, Y. MUVI: Automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. In Proceedings of the 21st ACM Symposium on Operating Systems Principles (Stevenson, WA, October 2007). Google ScholarDigital Library
- ]]Magalhaes, L., and Kravets, R. Transport level mechanisms for bandwidth aggregation on mobile hosts. IEEE International Conference on Network Protocols (2001). Google ScholarDigital Library
- ]]Matsunaga, Y., Merino, A. S., Suzuki, T., and Katz, R. Secure authentication system for public WLAN roaming. In Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH) (San Diego, CA, 2003), pp. 113--121. Google ScholarDigital Library
- ]]Miu, A. K., and Bahl, P. Dynamic host configuration for managing mobility between public and private networks. In Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS) (San Francisco, CA, March 2001), pp. 147--158. Google ScholarDigital Library
- ]]Mozilla Thunderbird. http://www.mozillamessaging.com/en-US/thunderbird/.Google Scholar
- ]]Mummert, L., Ebling, M., and Satyanarayanan, M. Exploiting weak connectivity in mobile file access. In Proceedings of the 15th ACM Symposium on Operating Systems Principles (Copper Mountain, CO, Dec. 1995). Google ScholarDigital Library
- ]]Newsome, J., and Song, D. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In In Proceedings of the 12th Network and Distributed Systems Security Symposium (February 2005).Google Scholar
- ]]Nicholson, A. J., Chawathe, Y., Chen, M. Y., Noble, B. D., and Wetherall, D. Improved access point selection. In Proceedings of the 4th International Conference on Mobile Systems, Applications and Services (Uppsala, Sweden, 2006), pp. 233--245. Google ScholarDigital Library
- ]]Nicholson, A. J., Wolchok, S., and Noble, B. D. Juggler: Virtual networks for fun and profit. IEEE Transactions on Mobile Computing 9, 1 (January 2010), 31--43. Google ScholarDigital Library
- ]]Nightingale, E. B., and Flinn, J. Energy-efficiency and storage flexibility in the Blue File System. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (San Francisco, CA, December 2004), pp. 363--378. Google ScholarDigital Library
- ]]Nightingale, E. B., Veeraraghavan, K., Chen, P. M., and Flinn, J. Rethink the sync. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (Seattle, WA, October 2006), pp. 1--14. Google ScholarDigital Library
- ]]Noble, B. D., Satyanarayanan, M., Narayanan, D., Tilton, J. E., Flinn, J., and Walker, K. R. Agile application-aware adaptation for mobility. In Proceedings of the 16th ACM Symposium on Operating Systems Principles (Saint-Malo, France, October 1997), pp. 276--287. Google ScholarDigital Library
- ]]NYCWireless. http://nycwireless.net/.Google Scholar
- ]]Peek, D., and Flinn, J. EnsemBlue: Integrating distributed storage and consumer electronics. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (Seattle, WA, November 2006), pp. 219--232. Google ScholarDigital Library
- ]]Perkins, C. IP mobility support for IPv4. RFC 3344, August 2002. Google ScholarDigital Library
- ]]Popa, O. Multipath TCP on mobile phones. Master's thesis, Computer Laboratory, University of Cambridge, 2010.Google Scholar
- ]]Sakakibara, H., Saito, M., and Tokuda, H. Design and implementation of a socket-level bandwidth aggregation mechanism for wireless networks. In WICON '06: Proceedings of the 2nd Annual International Workshop on Wireless Internet (Boston, MA, 2006). Google ScholarDigital Library
- ]]Salem, N. B., Hubaux, J.-P., and Jakobsson, M. Reputation-Based Wi-Fi Deployment Protocols and Security Analysis. In Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH) (Philadelphia, PA, October 2004), pp. 29--40. Google ScholarDigital Library
- ]]Satyanarayanan, M. Pervasive Computing: Vision and Challenges. IEEE Personal Communications 8, 4 (August 2001), 10--17.Google Scholar
- ]]SeattleWireless. http://seattlewireless.net/.Google Scholar
- ]]Snoeren, A., Balakrishnan, H., and Kaashoek, F. Reconsidering Internet mobility. In Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS) (Schloss Elmau, Germany, May 2001), pp. 41--46. Google ScholarDigital Library
- ]]Stemm, M., and Katz, R. H. Vertical handoffs in wireless overlay networks. Mobile Networks and Applications 3, 4 (December 1998), 335--350. Google ScholarDigital Library
- ]]Stewart, R., Xie, Q., Morneault, K., Sharp, C., Schwarzbauer, H., Taylor, T., Rytina, I., Kalla, M., Zhang, L., and Paxzon, V. Stream control transmission protocol. Tech. rep., IETF, June 2000. Google ScholarDigital Library
- ]]Terry, D. B. Caching hints in distributed systems. IEEE Transactions on Software Engineering 13, 1 (January 1987), 48--54. Google ScholarDigital Library
- ]]Wallach, D. S., Balfanz, D., Dean, D., and Felten, E. W. Extensible security architectures for Java. In Proceedings of the 16th ACM Symposium on Operating Systems Principles (Saint-Malo, France, October 1997). Google ScholarDigital Library
- ]]Zaharia, M., and Keshav, S. Fast and optimal scheduling over multiple network interfaces. Tech. Rep. CS-2007-36, University of Waterloo, 2007.Google Scholar
- ]]Zhang, M., Lai, J., Krishnamurthy, A., Peterson, L., and Wang, R. A transport layer approach for improving end-to-end performance and robustness using redundant paths. In Proceedings of the USENIX Annual Technical Conference (Boston, MA, 2004). Google ScholarDigital Library
- ]]Zhao, X., Castelluccia, C., and Baker, M. Flexible network support for mobility. In Proceedings of the 4th International Conference on Mobile Computing and Networking (Dallas, TX, October 1998), pp. 145--156. Google ScholarDigital Library
Index Terms
- Intentional networking: opportunistic exploitation of mobile network diversity
Recommendations
SDN-Based Application-Aware Networking on the Example of YouTube Video Streaming
EWSDN '13: Proceedings of the 2013 Second European Workshop on Software Defined NetworksApplication-Aware Networking is a promising approach to provide good application quality to users in scenarios with limited network resources, like today's access networks. With SDN, a particularly interesting method to enable flowbased traffic ...
Building Application-Aware Network Environments using SDN for Optimizing Hadoop Applications
SIGCOMM '16: Proceedings of the 2016 ACM SIGCOMM ConferenceHadoop has become the de facto standard for Big Data analytics, especially for workloads that use the MapReduce (M/R) framework. However, the lack of network awareness of the default MapReduce resource manager in Hadoop can cause unbalanced job ...
Towards Deep Network & Application Integration: Possibilities, Challenges, and Research Directions
NAI '20: Proceedings of the Workshop on Network Application Integration/CoDesignThe collaboration between networks and applications provides opportunities to both applications to improve their performances and network service providers to increase business offering. Although many systems are proposed to support such collaborations, ...
Comments