By Topic

Leveraging the Tail Time for Saving Energy in Cellular Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Di Zhang ; Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing, China ; Yaoxue Zhang ; Yuezhi Zhou ; Hao Liu

In cellular networks, inactivity timers are used to control the release of radio resources. However, during the timeout period of inactivity timers, known as the tail time, a large proportion of energy in user devices and a considerable amount of radio resources are wasted. In this paper, we propose TailTheft, a scheme that leverages the tail time for batching and prefetching to reduce energy consumption. For network requests from a number of applications that can be deferred or prefetched, TailTheft provides a customized application programming interface to distinguish requests and then schedules delay-tolerant and prefetchable requests in the tail time to save energy. TailTheft employs a virtual tail time mechanism to determine the amount of tail time that can be used and a dual queue scheduling algorithm to schedule transmissions. We implement TailTheft in the Network Simulator with a model for calculating energy consumption that is based on parameters measured from mobile phones. We evaluate TailTheft using real application traces, and the experimental results show that TailTheft can achieve significant savings on battery energy (up to 65%) and dedicated radio resources (up to 56%), compared to the default policy.

Published in:

Mobile Computing, IEEE Transactions on  (Volume:13 ,  Issue: 7 )