throbber
Wireless Networks 6 (2000) 263–277
`
`263
`
`Application-driven power management for mobile communication
`
`Robin Kravets a and P. Krishnan b
`a Department of Computer Science, University of Illinois, Urbana-Champaign, Urbana, IL 61801, USA
`b Bell Labs, Lucent Technologies, 101 Crawfords Corner Rd., Holmdel, NJ 07733-3030, USA
`
`In mobile computing, power is a limited resource. Like other devices, communication devices need to be properly managed
`to conserve energy.
`In this paper, we present the design and implementation of an innovative transport level protocol capable of
`significantly reducing the power usage of the communication device. The protocol achieves power savings by selectively choosing
`short periods of time to suspend communications and shut down the communication device. It manages the important task of queuing
`data for future delivery during periods of communication suspension, and decides when to restart communication. We also address the
`tradeoff between reducing power consumption and reducing delay for incoming data. We present results from experiments using our
`implementation of the protocol. These experiments measure the energy consumption for three simulated communication patterns as well
`as three trace-based communication patterns and compare the effects of different suspension strategies. Our results show up to 83%
`savings in the energy consumed by the communication. For a high-end laptop, this can translate to 6–9% savings in the energy consumed
`by the entire mobile computer. This can represent savings of up to 40% for current hand-held PCs. The resulting delay introduced is
`small (0.4–3.1 s depending on the power management level).
`
`1. Introduction
`
`In today’s world of mobile communications, one of the
`most precious commodities is power. The mobile host can
`only operate as long as its battery maintains power. New
`machines are being made to use less power allowing for
`smaller batteries with smaller capacities. The trend in mo-
`bile computing is towards more communication-dependent
`activities, with mobile users switching from traditional
`wired Ethernet communication to wireless communication
`(using wireless Ethernet cards, for example). When in-
`serted, many wireless communication devices consume en-
`ergy continuously. Although dependent on the specific ma-
`chine and wireless device, this energy consumption can
`represent over 50% of total system power for current hand-
`held computers and up to 10% for high-end laptops. These
`trends make it imperative that we design power-efficient
`communication subsystems.
`Various techniques, both hardware and software, have
`been proposed to reduce a mobile host’s power consumption
`during operation. Most software-level techniques have con-
`centrated on non-communication components of the mobile
`host, such as displays, disks and CPUs. In particular, re-
`searchers have looked at methods to turn off the display af-
`ter some period of inactivity (as often implemented in BIOS
`or screen savers), to spin down the hard disk of the mobile
`host [12,16,22], and to slow down or stop the CPU depend-
`ing on work load [15,23,30]. The principle underlying the
`techniques for controlling these components is to estimate
`(or guess) when the device will not be used and suspend
`it for those intervals. Stemm et al. [29] have identified the
`problem of excess energy consumption by network inter-
`faces in hand held devices, and have provided trace-driven
`simulation results for simple software-level time-out strate-
`gies. The new IEEE 802.11 standard that is being adopted
`
`J.C. Baltzer AG, Science Publishers
`
`by some vendors adopts lower level solutions (at the MAC
`and PHY layer) to support idle-time power management.
`Hardware-level solutions for managing the communication
`device focus on modulating the power used by the mobile
`transmitter during active communication [24,26,28].
`Our research presented in this paper focuses on software-
`level techniques for managing the mobile host’s communi-
`cation device through suspension of the device during idle
`periods in the communication. We present a novel transport
`level protocol for managing the suspend/resume cycle of the
`mobile host’s communication device in an effort to reduce
`power consumption. The management of communication
`devices creates a new and interesting challenge not present
`when managing other devices’ power consumption. Sim-
`ilar to hard disks and CPUs, the communication devices
`continuously draw power unless they can be suspended.
`A suspended hard disk or CPU can be restarted by any
`user requiring that device. However, when a communica-
`tion device is suspended, the mobile host is effectively cut
`off from the rest of the network. A mobile host with a sus-
`pended communication device can only guess about when
`other hosts may have data destined for it. If the suspension
`of the mobile host’s communication does not match prevail-
`ing communication patterns, the isolation can cause buffers
`to overflow both in the mobile host and in other hosts try-
`ing to communicate with it. Additionally, other hosts may
`waste precious resources trying to communicate with the
`mobile host if they have no knowledge about whether or
`not the mobile host’s communication is suspended.
`Our goal is to provide mechanisms for managing and
`reducing the power consumption of the communication de-
`vice. We present a simple model for mobile communication
`that provides adaptable functionality at the transport layer
`for suspending and resuming communication. By exposing
`this functionality to the application, we enable application-
`
`Page 1 of 15
`
`GOOGLE EXHIBIT 1017
`
`(cid:211)
`

`

`264
`
`R. Kravets, P. Krishnan / Application-driven power management for mobile communication
`
`driven solutions to power management. Power savings are
`attained by suspending communications and the commu-
`nication device for short periods of time. During these
`suspensions, data transmissions are queued up in both the
`mobile host and any other host trying to communicate with
`the mobile host. The key to balancing power savings and
`data delay lies in identifying when to suspend and restart
`communications. By abstracting power management to a
`higher level, we can exploit application-specific informa-
`tion about how to balance power savings and data delay.
`Intuitively, power conservation is achieved by accumu-
`lating the power savings from many small idle periods.
`We, however, need to be careful to monitor any addi-
`tional energy consumption caused while executing the sus-
`pend/resume strategies. Additionally, we need to consider
`the effect on other hosts who are trying to communicate
`with the suspended mobile host. A base station using our
`protocol has enough knowledge about the state of the mo-
`bile host to know when it is suspended and can use this
`information to help employ scheduling techniques. We im-
`plemented our protocol and experimentally determined its
`effect on power consumption and the quality of communi-
`cation. Using three simulated users designed to capture typ-
`ical mobile communication patterns and three trace-based
`web users, we obtained 48–83% savings in the power con-
`sumed by the communication subsystem, while introducing
`a small additional response delay (0.4–3.1 s depending on
`the power management level) that is acceptable for many
`applications, like web browsing.
`In section 2, we present our basic mobile communication
`model, and the important issues in power management for
`communication. In section 3 we present our power man-
`agement protocol and discuss the effect of timing issues on
`the effectiveness of our protocol. Section 4 describes our
`experimental setup and the communication patterns used
`in our experiments. We then present measurements from
`the implementation of our power management protocol and
`discuss the results in the context of several real systems.
`In section 5, we discuss adaptive control strategies and we
`present our conclusions in section 6.
`
`2. Communication model and power management
`
`The introduction of wireless links into communication
`systems based on wired links has posed a number of prob-
`lems. These problems include different loss characteristics
`and different bandwidth capabilities on the wired and the
`wireless line, synchronization of disconnected operations,
`and issues involving packet forwarding. These problems
`pose significant challenges for end-to-end communication
`protocols. Two types of models have been studied [4]. The
`first model exploits the natural hop existing in the commu-
`nication route to a mobile host. Standard communication
`protocols are used by wired hosts to a base station and spe-
`cialized protocols are used for the final hop from the base
`station to the mobile hosts [3]. The second model utilizes
`
`and tunes existing end-to-end protocols, providing help and
`hints along the way [5].
`In this paper, we focus on the first model of communi-
`cation described above, which allows us to isolate the com-
`munication between the base station and the mobile host.
`With some extensions, the technique is also applicable to
`the second model. We target our approach at the transport
`layer, where we provide a set of mechanisms that allow
`communication to be suspended and resumed. We assume
`a model where the mobile host is communicating with the
`rest of the network through a base station. This base sta-
`tion may be a proxy, or it may be the connection point for
`end-to-end communication with other hosts. Often, deal-
`ing with mobility does not fit into the standard seven layer
`model. By exposing power management techniques to the
`application, we provide a system-level solution aimed at
`end-to-end communication. For our experiments in this
`paper, we concentrate on the communication between the
`mobile host and the base station, and for clarity assume
`that all communication to and from the mobile host is di-
`rected through one specific base station. This work can be
`extended to include changing base stations through tech-
`niques similar to those used in [3,5].
`Current wireless communication devices typically oper-
`ate in two modes: transmit mode and receive mode. The
`transmit mode is used during data transmission. The re-
`ceive mode is the default mode for both receiving data and
`listening for incoming data. Much of the time, the wireless
`communication device sits idle in receive mode, and, while
`the power required for reception is less than the power
`required for transmission, this power consumption is not
`negligible. A number of solutions aimed at power manage-
`ment at the MAC or PHY layer have been proposed. With
`the IEEE 802.11 standard, compliant cards can exchange
`information about outstanding data to decide on when to
`wake up suspended cards. There are ongoing efforts to
`provide IEEE 802.11 compliant support for power manage-
`ment by introducing new features into the next generation
`wireless communication cards [17]. A comparison of ad-
`ditional MAC layer protocol solutions can be found in [6].
`Such approaches that rely solely on techniques provided
`by the device cannot take application specific information
`into consideration when determining power management
`strategies.
`In comparison, our approach exposes power
`management efforts to the application, allowing for better
`informed decisions as how much and when to use power
`management techniques. Researchers have also considered
`hardware-level solutions to provide low power communi-
`cation capabilities [24,26,28]. Such solutions reduce the
`power cost of operating in either one of the modes, and are
`orthogonal to our approach which addresses the amount of
`time the device spends in each mode.
`Logical areas to look for software-level power conserva-
`tion in communication are two-fold. Since data transmis-
`sion is expensive, we can reduce the time spent in trans-
`mission. This can be achieved by data reduction techniques
`and intelligent data transfer protocols. The obvious tech-
`
`Page 2 of 15
`
`

`

`R. Kravets, P. Krishnan / Application-driven power management for mobile communication
`
`265
`
`nique of data compression reduces the amount of transmis-
`sion time, but requires additional CPU cycles for perform-
`ing compression. The connection between compression and
`communication rates is studied in [10]. Through simple ex-
`periments, we observed that, considering the current power
`requirements of CPUs versus wireless communication de-
`vices, the benefit in terms of power savings from reduced
`communication time often outweighs the increased energy
`consumption costs for compression. Intelligent data trans-
`fer protocols can be used to reduce the effect of noisy con-
`nections that cause power-expensive retransmission of lost
`messages. Our continuing research addresses the assess-
`ment of the effects of different techniques for data reduc-
`tion, including reduced reliability requirements, and their
`effect on both power reduction and communication quality.
`The second area, and the emphasis of this paper, is the
`cost of leaving the communication device sitting idle dur-
`ing periods of no communication activity. During such idle
`periods, the communication device draws power listening
`for incoming data. Our goal in this work is to reduce the
`amount of time the device sits idle drawing power by ju-
`diciously suspending it. Suspending a wireless communi-
`cation device is similar to slowing a CPU in that there are
`some small power costs associated with suspension and re-
`sumption. As mentioned in section 1, the difficult part here
`is to deal with when to suspend and resume the commu-
`nication device, how to deal with the mobile host being
`unreachable at times, and how to address the issue of not
`losing en-route data. Our protocol and its implementation
`presented here address these problems. Since the protocol
`itself generates additional communication during these idle
`periods, there needs to be a balance between when it is
`beneficial to use the power management techniques, and
`when we should leave the device on continuously.
`In contrast to the solutions proposed by the IEEE 802.11
`standard, we believe that power management should be
`controlled by the mobile host, potentially even the appli-
`cation. By providing power control at the transport layer
`(or above), we can provide power management interfaces
`to the application, allowing the application to better control
`the communication, enabling adaptive power management
`driven by the needs of the application. Specifically, com-
`munications using the IEEE 802.11 standard will always
`pay the overhead of delays imposed by using power man-
`agement, while our techniques allow the application to de-
`termine when such delays are too high, and so adapt power
`management levels. Stemm et al. [29] have also investi-
`gated methods for reducing power consumption of network
`interfaces, specifically targeting their research at hand-held
`devices. Their research suggests application-specific solu-
`tions to such problems. In contrast, our research provides a
`general solution capable of hosting various strategies, both
`static and adaptive. Our measurements are with a real im-
`plementation of a power management protocol in an exper-
`imental setup. We are, therefore, able to observe the effects
`of the queuing of data and the real effect of extra energy
`consumption by such a protocol. We measure the power
`
`consumption in the context of the entire system, consider-
`ing such costs as message processing and disk accesses, for
`various simulated workloads that we expect mobile users
`to perform.
`
`3. Communication-based power management
`
`leaves its wireless
`Currently, a typical mobile host
`Ethernet card in receive mode during the time it is not be-
`ing used, unless the user explicitly removes the card. The
`technique described in this section provides mechanisms to
`extend battery lifetime by suspending the wireless Ethernet
`card during idle periods in communication. At the heart of
`the technique lies a protocol where the mobile host acts as
`a master and tells the base station when data transmission
`can occur. When the mobile host wakes up, it sends a query
`to the base station to see if the base station has any data
`to send. This permits communication device suspension at
`the mobile host, and enables the implementation of com-
`munication scheduling techniques at the base station. The
`suspend/resume cycle results in bursts of communication
`that may be followed by periods of inactivity. Although
`producing such bursty communication may incur additional
`delay, bursty communication patterns lend themselves well
`to efficient scheduling techniques.
`With the suspension of a communication device, a mo-
`bile host will experience an additional delay in data trans-
`mission since data on both the sending and receiving sides
`may be held up during suspension. The mobile host can
`monitor its own outgoing communication patterns to insure
`that, despite these suspension times, communication contin-
`ues smoothly without buffer overflow. The base station, on
`the other hand, has no means to restart communication if it
`notices that it is running out of buffer space. It is up to the
`mobile host to understand the base station’s expected com-
`munication patterns so that the buffers at the base station
`do not overflow. In order to efficiently use our power man-
`agement techniques, our communication layer must monitor
`the communication patterns of the mobile host and match
`the suspend/resume cycle to these patterns.
`The protocol we describe in this section allows a mobile
`host to suspend a wireless communication device. Periodi-
`cally, or by request from the application, the protocol wakes
`up and reinitiates communication with the base station. In
`the rest of this section, we will describe our power man-
`agement protocol in detail and discuss the significance of
`some of the timing parameters. Appendix A describes in
`detail the commands used by the protocol and the possible
`states and state transitions for both the master and slave.
`
`3.1. Power management control protocol
`
`In this protocol, the mobile host is the master and the
`base station acts like a slave. The slave is only allowed to
`send data to the master during specific phases of the proto-
`col. During non-transmit phases, the slave queues up data
`
`Page 3 of 15
`
`

`

`266
`
`R. Kravets, P. Krishnan / Application-driven power management for mobile communication
`
`Figure 1. Slave (base station) protocol state diagram.
`
`Figure 2. Master (mobile host) protocol state diagram.
`
`and waits for commands from the master. Idle periods for
`both the master and the slave can be detected through the
`use of idle timers or indicated to the protocol from the ap-
`plication. In the protocol state diagrams for the master and
`the slave (figures 1 and 2), IN: indicates an input event that
`can be either an incoming message or a timeout, Q: indi-
`cates the state of the queue, and OUT: indicates an outgoing
`response message.
`As shown in figure 1, the slave is initialized to be in
`the SLEEPING mode. It can only leave that mode upon a
`WAKE UP message from the master. If the slave has data
`to send, it will enter the SEND RECV mode. The slave will
`stay in this mode until it has detected that it has no more
`data to transmit, whereupon, it will send a DONE message
`to the master, enter the RECEIVING mode, and continue
`
`receiving until it receives a SLEEP message. If during this
`time the slave detects that there is new data to transmit,
`it will send a NEW DATA message to the master and enter
`the RECEIVING WAIT mode. The slave can only start
`to transmit when it receives a WAKE UP message from the
`master. If a SLEEP message is received first, the waiting
`data stays buffered and is not transmitted until the next
`resume cycle.
`Although the state diagram for the master (figure 2) is
`much more complex, we can see that the states may be
`partitioned into three sets. The first set (SLEEPING) con-
`cerns the master when it is sleeping. When the master is in
`the SLEEPING mode, it can be woken up by one of two
`triggers: a wakeup timer or new data to transmit.
`If the
`wakeup timer expires, the master sends a WAKE UP mes-
`
`Page 4 of 15
`
`

`

`R. Kravets, P. Krishnan / Application-driven power management for mobile communication
`
`267
`
`sage along with any new data to the slave. If there is new
`data to transmit to the slave before the wakeup timer ex-
`pires, the master has the option to wake up and transmit
`this new data, or continue sleeping and queue up the data
`until the timeout expires.
`The second set of states (SENDING WAIT, WAITING,
`and WAIT FOR OK) concerns the master when it is waiting
`for a response from the slave about whether or not the slave
`has data to send. In the SENDING WAIT mode, the master
`is transmitting data and in the WAITING mode it has no
`data to transmit. When the master receives a response from
`the slave in the form of a DATA or a NO DATA message,
`the master enters the appropriate state in the third set. Ad-
`ditionally, if while in the SENDING WAIT mode an idle
`timer expires indicating that the master has no more data to
`send, the master enters the WAITING mode and continues
`waiting for a response from the slave. In the WAIT FOR OK
`mode, the master has told the slave that it should sleep and
`is waiting for a SLEEP OK message.
`When the master is in one of the final set of states
`(SENDING, SEND/RECV, and RECEIVING), it is actively
`sending and/or receiving data. In the SENDING mode, the
`master may receive a NEW DATA message from the slave.
`The master responds with a WAKE UP message and enters
`the SENDING WAIT mode. When neither the master nor
`the slave have any more data to send, the master sends a
`SLEEP message and enters the WAIT FOR OK mode.
`Wireless connections are very susceptible to interference
`from both external devices and other wireless devices using
`the same settings or talking to the same base station. By
`using this protocol, we provide the base station with useful
`information about the communication patterns of the mo-
`bile host. Although not required by the protocol, the master
`can inform the slave of its sleep time, or the slave can sug-
`gest appropriate sleep times to the master. If the protocol
`is used such that only prespecified timeouts trigger restart-
`ing communication, the slave can design a communication
`scheduling algorithm based around the known sleep time of
`the master. Additionally, if the sleep times for the master
`are sufficiently long, the slave can save any data destined
`for the master to disk. This will free the buffer space being
`used by the data destined for the master so it can be used
`for other active communications.
`
`3.2. Timing considerations
`
`Timing is a key issue for both the performance of the
`mobile host as well as the amount of power that can be
`saved. If the wireless Ethernet card is suspended too often,
`the user will see lags in data transfer performance. On the
`other hand, if it is not suspended long enough, the gain in
`battery life time may be undetectable.
`In order to determine when the card should be sus-
`pended, the protocol needs to determine the communica-
`tion patterns for both sender and receiver. There are two
`ways by which idle periods in the communication can be
`detected. The first, and simplest, is when the application
`
`can actually inform the protocol that it does not have any
`data to send. This requires a more complex application that
`has information about its communication patterns. The sec-
`ond method is to use a timer set with a timeout period. If
`the timer expires and no communication has occurred since
`the last expiration, the protocol concludes that there is an
`idle period in the communication. The appropriate time-
`out period depends on the requirements of the application.
`Timeout periods that are too short may cause the proto-
`col to go to sleep prematurely, resulting in poor response
`time for applications dependent on communication. On the
`other hand, timeout periods that are too long may cause the
`protocol and the communication device to remain active
`for unnecessarily long periods of time, wasting precious
`energy.
`The other timing parameter is the sleep duration which
`defines how long the master should keep the communica-
`tion suspended. The appropriate sleep duration also de-
`pends on the requirements of the application. Longer sleep
`periods will cause longer lags in any interactive applica-
`tions. Shorter sleep periods will not extend battery life-
`time appreciatively. The application needs to determine the
`appropriate tradeoff for battery lifetime versus delay.
`In
`many instances, the expected time and data size for the
`response to a request initiated by the mobile host can be
`estimated. This includes, for example, applications like
`mail, web browsing, and file transfer. In this context, hints
`provided by the application could be very helpful. In our
`experiments reported in section 4, we examine the effects
`of fixed timeouts that require no application support and
`can be implemented within the transport layer. Adaptively
`varying the timeouts or using learning techniques are dis-
`cussed in section 5.
`A mobile host that is running multiple applications can-
`not base its power strategy on the expected communication
`patterns of a single application. In this situation, the power
`management protocol must take hints about sleep/wake up
`durations for all executing applications. By exposing power
`management to the application, and hence to the user, our
`power management protocol can be guided in the appropri-
`ate allocation of resources.
`A final consideration is the time required to wake up
`and shut down the specific wireless network card. Our
`protocol is designed to be independent of the specific card
`being used. Since our techniques address issues regarding
`the end-to-end transmission of data, we assume that this
`wakeup time is minimal in comparison to the total trans-
`fer time. Although this may not be true for all devices
`currently, the interface standards proposed in [1] suggest
`that future devices will provide relatively inexpensive tran-
`sitions between waking and sleeping states.
`
`4. Experiments
`
`The goal of our experiments is to show that, by using our
`power management techniques, we can save a significant
`
`Page 5 of 15
`
`

`

`268
`
`R. Kravets, P. Krishnan / Application-driven power management for mobile communication
`
`amount of the power consumed by the wireless Ethernet
`card. The tradeoff is an increased transmission delay ob-
`served by the receiver. First we will present our experimen-
`tal setup and the user communication patterns used in our
`experiments. We will then show the impact of the power
`management techniques in the context of these user com-
`munication patterns. Finally, we will discuss our results in
`the context of several real systems.
`
`4.1. Power measurement
`
`In order to understand how to accomplish such commu-
`nication-based power management, we first need to define
`what we mean by the amount of power consumed by data
`communication. Previous work in this area has defined this
`to be the amount of power consumed by the communication
`device itself. We believe this is too limited a view, since it
`does not take the impact of the system power consumption
`into consideration. Our model considers three aspects of
`power consumption that cover the whole system.
`Our measurement model is derived from the actual mea-
`surement of power consumed by the whole machine. By
`doing this, we limit ourselves from being able to single out
`the power consumption of individual devices, but instead,
`we are able to consider the power consumption of actions
`performed on the machine. Figures 3 and 4 show two
`sample power measurements for a mobile host. Figure 3
`represents no power management and figure 4 represents
`the effects of power management.
`If we consider the actions taken by the mobile host in
`figure 3, the first time period represents the power con-
`
`Figure 3. Example power consumption without power management.
`
`Figure 4. Example power consumption with power management.
`
`sumption of the idle machine over time. This is the base
`amount, indicated by the power level A, that will always be
`consumed even when the machine is idle. In the next time
`period, a wireless communication device is activated, and
`this area represents the power consumed by the idle ma-
`chine and the wireless communication device. The power
`consumed by the communication device is the section be-
`tween power levels A and B. Next, the mobile host is
`actively communicating. This area represents the power
`consumed by the wireless communication device for data
`transmission as well as any power consumed by the CPU
`during data and protocol processing for transmission and
`reception.
`In this paper, we aim our efforts at reducing the amount
`of power consumed when the communication is idle. From
`the power management techniques reflected in figure 4, we
`see that there is a fluctuation of the amount of power con-
`sumed during idle periods in the communication. The lower
`levels of power consumption represent the effort of our
`power management techniques. The spikes in the power
`consumption represents the overhead, both CPU power con-
`sumption and communication device power consumption,
`during our power management efforts. For all of the ex-
`periments described in the next section, we consider the
`power consumption above power level A to be attributed
`to communication.
`This view of power management allows the individ-
`ual devices to perform their own power management tech-
`niques. For example, our techniques do not tell the CPU
`when to suspend or sleep or tell the wireless communica-
`tion device how to manage power during active communi-
`cation. Instead, we are concerned with reducing the power
`attributed to ongoing communication. Therefore, we do not
`try to separate the power consumed by the CPU during pro-
`tocol and data processing and power management from the
`power consumed by the wireless communication device.
`
`4.2. Experimental setup
`
`In order to determine the impact of our power man-
`agement techniques, we measure the power consumption
`of a wireless Ethernet card under varying conditions.
`In
`our experiments, we use a 915 MHz Lucent WaveLAN
`PCMCIA wireless Ethernet card that can transmit data up
`to 150 KBps.
`It provides three power modes:
`transmit,
`receive and suspend, and does not perform power man-
`agement at the MAC layer. The system is configured as
`shown in figure 5, with a wireless Ethernet in a NEC Versa
`6320 laptop (the mobile host) communicating with a Gate-
`way Solo 2200 (the base station) using a second WaveLAN
`PCMCIA card, both machines running Linux. We plugged
`the laptop into a universal power supply (UPS) to filter out
`any fluctuations in the wall voltage. Our multimeter sam-
`ples the current 11–12 times a second. From these samples
`and the output voltage of the UPS, we can monitor the
`power being used by the computer.
`
`Page 6 of 15
`
`

`

`R. Kravets, P. Krishnan / Application-driven power management for mobile communication
`
`269
`
`Table 1
`Power requirements of the Lucent WaveLAN PCMCIA wireless Ethernet
`card.
`
`State
`
`Documented
`
`Measured
`
`WaveLAN – suspended
`WaveLAN – receive
`WaveLAN – transmit
`
`0 W
`1.48 W
`3.00 W
`
`0 W
`1.52 W
`3.10 W
`
`period of 30 min to provide sufficiently long samples. To
`ensure stability in our reported numbers, we repeated our
`experiments several times for each scenario. The results
`presented in this section were taken from specific sample
`runs. Each individual run was chosen from a set of quali-
`tatively similar runs of a particular experiment.
`According to manufacturer specifications [31], the power
`requirements of the WaveLAN card are those shown in ta-
`ble 1, column 2. Column 3 in table 1 shows the power
`requirements measured during our experiments without any
`power management. The measurements for receive mode
`were taken while the computer was idle, which implied no
`extra disk or CPU activity. As mentioned earlier, the power
`consumption for transmission includes any incidental CPU
`and hard disk power consumed to effect communication.
`It is interesting to note that the transmitter is rarely at full
`power for long periods of time. We observe that our mea-
`surements of the power required while the device is in either
`mode are very close to the documented specification.
`For an example of the different levels of power con-
`sumption, again consider figures 6 and 7, which show sam-
`ple traces for the power consumed over a period of time for
`the NEC Versa. From our measurements, we determined
`that the laptop consumes around 14 W when idle. With
`the WaveLAN card inserted, the laptop consumes 15.5 W
`when idle. From this information, we consider any power
`consumed over the 14 W idle power consumption to be
`contributed to the ongoing communication. Our goal is
`to conserve as much of the 1.5 W consumed by the idle
`communication device. Addition

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket