skip to main content
10.1145/1859995.1860005acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Intentional networking: opportunistic exploitation of mobile network diversity

Published:20 September 2010Publication History

ABSTRACT

Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional Networking, a simple but powerful mechanism for handling network diversity. Applications supply a declarative label for network transmissions, and the system matches transmissions to the most appropriate network. The system may also defer and re-order opportunistic transmissions subject to application-supplied mutual exclusion and ordering constraints. We have modified three applications to use Intentional Networking: BlueFS, a distributed file system for pervasive computing, Mozilla's Thunderbird e-mail client, and a vehicular participatory sensing application. We evaluated the performance of these applications using measurements obtained by driving a vehicle through WiFi and cellular 3G network coverage. Compared to an idealized solution that makes optimal use of all aggregated available networks but that lacks knowledge of application intent, Intentional Networking improves the latency of interactive messages from 48% to 13x, while adding no more than 7% throughput overhead.

References

  1. ]]Anand, M., Nightingale, E. B., and Flinn, J. Self-tuning wireless network power management. In Proceedings of the 9th Annual Conference on Mobile Computing and Networking (San Diego, CA, September 2003), pp. 176--189. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. ]]Bahl, P., Adya, A., Padhye, J., and Wolman, A. Reconsidering wireless systems with multiple radios. Computer Communication Review 34, 5 (2004), 39--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. ]]Balasubramanian, A., Mahajan, R., and Venkataramani, A. Augmenting mobile 3G using WiFi. In Proceedings of the 8th International Conference on Mobile Systems, Applications and Services (June 2010), pp. 123--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. ]]Bay area wireless users group. http://www.bawug.org/.Google ScholarGoogle Scholar
  5. ]]Brunato, M., and Severina, D. WilmaGate: A new open access gateway for hotspot management. In Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH) (Köln, Germany, September 2005), pp. 56--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. ]]Carter, C., Kravets, R., and Tourrilhes, J. Contact networking: a localized mobility system. In Proceedings of the 1st International Conference on Mobile Systems, Applications and Services (San Francisco, CA, May 2003), pp. 145--158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. ]]Chandra, R., and Bahl, P. MultiNet: Connecting to multiple IEEE 802.11 networks using a single wireless card. In Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (Hong Kong, March 2004), pp. 882--893.Google ScholarGoogle ScholarCross RefCross Ref
  8. ]]Chebrolu, K., Raman, B., and Rao, R. R. A network layer approach to enable TCP over multiple interfaces. Wireless Networks 11, 5 (September 2005), 637--650. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. ]]Czerwinski, S., Zhao, B., Hodes, T., Joseph, A., and Katz, R. An architecture for a secure service discovery service. In Proceedings of the 5th International Conference on Mobile Computing and Networking (Seattle, WA, August 1999), pp. 24--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. ]]Draves, R., Padhye, J., and Zill, B. Routing in multi-radio, multi-hop wireless mesh networks. In Proceedings of the 10th International Conference on Mobile Computing and Networking (Philadelphia, PA, September 2004), pp. 114--128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. ]]Efstathiou, E. C., and Polyzos, G. C. A peer-to-peer approach to wireless LAN roaming. In Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH) (San Diego, CA, September 2003), pp. 10--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. ]]Eriksson, J., Balakrishnan, H., and Madden, S. Cabernet: Vehicular content delivery using WiFi. In Proceedings of the 14th International Conference on Mobile Computing and Networking (September 2008), pp. 199--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. ]]Friday, A., Davies, N., Wallbank, N., Catterall, E., and Pink, S. Supporting service discovery, querying and interaction in ubiquitous computing environments. Wireless Networks 10, 6 (November 2004), 631--641. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. ]]Howard, J. H., Kazar, M. L., Menees, S. G., Nichols, D. A., Satyanarayanan, M., Sidebotham, R. N., and West, M. J. Scale and performance in a distributed file system. ACM Transactions on Computer Systems 6, 1 (February 1988), 51--81. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. ]]Hsieh, H. Y., and Sivakumar, R. A transport layer approach for achieving aggregate bandwidths on multi-homed mobile hosts. In Proceedings of the 8th International Conference on Mobile Computing and Networking (Atlanta, GA, September 2002), pp. 83--94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. ]]Iyer, S., and Druschel, P. Anticipatory scheduling: A disk scheduling framework to overcome deceptive idleness in synchronous I/O. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (Banff, Canada, October 2001), pp. 117--130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. ]]Johansson, P., Kapoor, R., Kazantzidis, M., and Gerla, M. Personal area networks: Bluetooth or IEEE 802.11? International Journal of Wireless Information Networks 9, 2 (April 2002), 89--103.Google ScholarGoogle ScholarCross RefCross Ref
  18. ]]Kandula, S., Lin, K. C.-J., Badirkhanli, T., and Katabi, D. FatVAP: Aggregating AP backhaul capacity to maximize throughput. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (San Francisco, CA, April 2008), pp. 89--103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. ]]Kim, M., and Noble, B. D. Mobile network estimation. In Proceedings of the 7th International Conference on Mobile Computing and Networking (July 2001), pp. 298--309. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. ]]Kistler, J. J., and Satyanarayanan, M. Disconnected operation in the Coda file system. ACM Transactions on Computer Systems 10, 1 (February 1992). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. ]]Linux Advanced Routing and Traffic Control. http://lartc.org/.Google ScholarGoogle Scholar
  22. ]]The Linux Foundation. netem. http://www.linuxfoundation.org/collaborate/workgroups/networking/netem.Google ScholarGoogle Scholar
  23. ]]Lu, S., Park, S., Hu, C., Ma, X., Jiang, W., Li, Z., Popa, R. A., and Zhou, Y. MUVI: Automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. In Proceedings of the 21st ACM Symposium on Operating Systems Principles (Stevenson, WA, October 2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. ]]Magalhaes, L., and Kravets, R. Transport level mechanisms for bandwidth aggregation on mobile hosts. IEEE International Conference on Network Protocols (2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. ]]Matsunaga, Y., Merino, A. S., Suzuki, T., and Katz, R. Secure authentication system for public WLAN roaming. In Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH) (San Diego, CA, 2003), pp. 113--121. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. ]]Miu, A. K., and Bahl, P. Dynamic host configuration for managing mobility between public and private networks. In Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems (USITS) (San Francisco, CA, March 2001), pp. 147--158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. ]]Mozilla Thunderbird. http://www.mozillamessaging.com/en-US/thunderbird/.Google ScholarGoogle Scholar
  28. ]]Mummert, L., Ebling, M., and Satyanarayanan, M. Exploiting weak connectivity in mobile file access. In Proceedings of the 15th ACM Symposium on Operating Systems Principles (Copper Mountain, CO, Dec. 1995). Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. ]]Newsome, J., and Song, D. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In In Proceedings of the 12th Network and Distributed Systems Security Symposium (February 2005).Google ScholarGoogle Scholar
  30. ]]Nicholson, A. J., Chawathe, Y., Chen, M. Y., Noble, B. D., and Wetherall, D. Improved access point selection. In Proceedings of the 4th International Conference on Mobile Systems, Applications and Services (Uppsala, Sweden, 2006), pp. 233--245. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. ]]Nicholson, A. J., Wolchok, S., and Noble, B. D. Juggler: Virtual networks for fun and profit. IEEE Transactions on Mobile Computing 9, 1 (January 2010), 31--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. ]]Nightingale, E. B., and Flinn, J. Energy-efficiency and storage flexibility in the Blue File System. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (San Francisco, CA, December 2004), pp. 363--378. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. ]]Nightingale, E. B., Veeraraghavan, K., Chen, P. M., and Flinn, J. Rethink the sync. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (Seattle, WA, October 2006), pp. 1--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. ]]Noble, B. D., Satyanarayanan, M., Narayanan, D., Tilton, J. E., Flinn, J., and Walker, K. R. Agile application-aware adaptation for mobility. In Proceedings of the 16th ACM Symposium on Operating Systems Principles (Saint-Malo, France, October 1997), pp. 276--287. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. ]]NYCWireless. http://nycwireless.net/.Google ScholarGoogle Scholar
  36. ]]Peek, D., and Flinn, J. EnsemBlue: Integrating distributed storage and consumer electronics. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (Seattle, WA, November 2006), pp. 219--232. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. ]]Perkins, C. IP mobility support for IPv4. RFC 3344, August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. ]]Popa, O. Multipath TCP on mobile phones. Master's thesis, Computer Laboratory, University of Cambridge, 2010.Google ScholarGoogle Scholar
  39. ]]Sakakibara, H., Saito, M., and Tokuda, H. Design and implementation of a socket-level bandwidth aggregation mechanism for wireless networks. In WICON '06: Proceedings of the 2nd Annual International Workshop on Wireless Internet (Boston, MA, 2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. ]]Salem, N. B., Hubaux, J.-P., and Jakobsson, M. Reputation-Based Wi-Fi Deployment Protocols and Security Analysis. In Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH) (Philadelphia, PA, October 2004), pp. 29--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. ]]Satyanarayanan, M. Pervasive Computing: Vision and Challenges. IEEE Personal Communications 8, 4 (August 2001), 10--17.Google ScholarGoogle Scholar
  42. ]]SeattleWireless. http://seattlewireless.net/.Google ScholarGoogle Scholar
  43. ]]Snoeren, A., Balakrishnan, H., and Kaashoek, F. Reconsidering Internet mobility. In Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS) (Schloss Elmau, Germany, May 2001), pp. 41--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. ]]Stemm, M., and Katz, R. H. Vertical handoffs in wireless overlay networks. Mobile Networks and Applications 3, 4 (December 1998), 335--350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. ]]Stewart, R., Xie, Q., Morneault, K., Sharp, C., Schwarzbauer, H., Taylor, T., Rytina, I., Kalla, M., Zhang, L., and Paxzon, V. Stream control transmission protocol. Tech. rep., IETF, June 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. ]]Terry, D. B. Caching hints in distributed systems. IEEE Transactions on Software Engineering 13, 1 (January 1987), 48--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. ]]Wallach, D. S., Balfanz, D., Dean, D., and Felten, E. W. Extensible security architectures for Java. In Proceedings of the 16th ACM Symposium on Operating Systems Principles (Saint-Malo, France, October 1997). Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. ]]Zaharia, M., and Keshav, S. Fast and optimal scheduling over multiple network interfaces. Tech. Rep. CS-2007-36, University of Waterloo, 2007.Google ScholarGoogle Scholar
  49. ]]Zhang, M., Lai, J., Krishnamurthy, A., Peterson, L., and Wang, R. A transport layer approach for improving end-to-end performance and robustness using redundant paths. In Proceedings of the USENIX Annual Technical Conference (Boston, MA, 2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. ]]Zhao, X., Castelluccia, C., and Baker, M. Flexible network support for mobility. In Proceedings of the 4th International Conference on Mobile Computing and Networking (Dallas, TX, October 1998), pp. 145--156. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Intentional networking: opportunistic exploitation of mobile network diversity

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobiCom '10: Proceedings of the sixteenth annual international conference on Mobile computing and networking
        September 2010
        402 pages
        ISBN:9781450301817
        DOI:10.1145/1859995
        • General Chair:
        • Nitin Vaidya,
        • Program Chairs:
        • Suman Banerjee,
        • Dina Katabi

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 September 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate440of2,972submissions,15%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader