Network Connectivity Proxy: An Optimal Strategy for Reducing Energy Waste in Network Edge Devices

Raffaele Bolla, Maurizio Giribaldi, Rafiullah Khan, Matteo Repetto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)
891 Downloads (Pure)

Abstract

A network connected host generates/responds to routine applications and protocols heart-beat messages and is considered as disconnected when it fails to do this. Past studies have revealed that about 60-70% people leave their computers powered up 24/7 in the offices and at homes just to maintain the network connectivity. Huge amount of energy savings are possible if these computers can sleep during idle periods but still maintaining their network presence. Thus, a Network Connectivity Proxy (NCP) can be designed which is a software entity running on a low power network hardware such as switch or router and maintains the network connectivity for high power devices during their sleep periods. This paper describes the design, implementation and evaluation of a cooperative NCP that maintains the basic network and application level presence for the sleeping hosts. It also addresses the generic architecture of our NCP and its client softwares.
Original languageEnglish
Title of host publicationProceedings of 2013 24th Tyrrhenian International Workshop on Digital Communications - Green ICT (TIWDC)
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
ISBN (Print)978-1-4799-0753-3
DOIs
Publication statusPublished - Sept 2013
Externally publishedYes
Event24th Tyrrhenian International Workshop on Digital Communications - Green ICT - Genoa, Italy
Duration: 23 Sept 201325 Sept 2013

Conference

Conference24th Tyrrhenian International Workshop on Digital Communications - Green ICT
Abbreviated titleTIWDC
Country/TerritoryItaly
CityGenoa
Period23/09/201325/09/2013

Fingerprint

Dive into the research topics of 'Network Connectivity Proxy: An Optimal Strategy for Reducing Energy Waste in Network Edge Devices'. Together they form a unique fingerprint.

Cite this