<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Implementation and Evaluation of a Sleep-Proxy for Energy Savings in Networked Computers</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Enida</forename><surname>Sheme</surname></persName>
							<email>enida.sheme@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">Polytechnic University of Tirana</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Neki</forename><surname>Frasheri</surname></persName>
							<email>neki.frasheri@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">Polytechnic University of Tirana</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Marin</forename><surname>Aranitasi</surname></persName>
							<email>m_aranitasi@hotmail.com</email>
							<affiliation key="aff2">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">Polytechnic University of Tirana</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">Implementation and Evaluation of a Sleep-Proxy for Energy Savings in Networked Computers</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">F90FA3DA2E0DCB9ADE25EBBE61FC64F2</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T18:29+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Power consumption</term>
					<term>energy savings</term>
					<term>networked computers</term>
					<term>network traffic</term>
					<term>proxying Ethernet adapter</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In enterprise networks, idle desktop machines rarely sleep, because users and IT departments want them to be always accessible. While some solutions have been proposed, few of them have been implemented even more evaluated in real network environments. In this paper, we implement and evaluate a sleep proxy system, based on existing proposed architecture for this Proxy. This system is tested in 6 different PC machines of a real network. The results of the experiments show that machines can sleep almost 55% of the experimenting time (which is translated into energy savings) while maintaining their network accessibility to user satisfaction. However, there is a need of "cooperation" between IT procedures and sleep proxy system in order to gain better performance and thus less dissipated energy.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">INTRODUCTION</head><p>There has been a lot of researches lately regarding the wasted energy consumed especially by the IT environment, <ref type="bibr" target="#b11">[11]</ref>, <ref type="bibr" target="#b3">[3]</ref>, <ref type="bibr" target="#b6">[6]</ref>, <ref type="bibr" target="#b1">[1]</ref>. One of the most frequent cases is that of office machines left on despite of user activity on them.</p><p>The focus of this paper is exactly enterprise's PCs, the power management of which would save up significant energy.</p><p>The main reason PC users and IT administrators want to leave PCs on all the time is they want to access them whenever they want to, or whenever it is planned a broadcasting update or process. Among many ideas, lately the focus is back to Sleep Proxy concept, which was first introduced in 1998 <ref type="bibr" target="#b9">[9]</ref> and later researched. A Sleep Proxy allows a PC to pass into a Sleep state, meanwhile it preserves PC's network presence and awakens it if necessary. The architecture of this Sleep Proxy system is composed by a client which periodically updates the server with information it needs to represent this client while it is asleep, and the server (Sleep Proxy) that based on a designed policy on how to manage network traffic protocols, will eventually ignore some packets, answer to some requests, and awake the sleeping computer for other packets.</p><p>The aim of developing a Sleep Proxy system is to encourage users to enable power management features, assuring them that they can have access to their computers even when they are asleep. So, in our work we emphasize this by testing a real system in an office environment, showing and highlighting the differences between non-proxy system and proxy system network regarding their energy consumption.</p><p>In Section 2, we mention related articles, papers and publications regarding this area. In Section 3 we will give a preview of the design and implementation of Sleep Proxy server, how are all the components related to each other in Hardware and Software level. Section 4 describes the experimental environment, also the tests regarding the power consumption without and with Proxy server implemented in the experiment, in order to get an idea of energy savings this system can provide. The results of the experiments and their interpretation are given in section 5, where we emphasize the need of synchronization between IT staff and the Proxy system in order to get the best results. At last we come with our conclusions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">RELATED WORK</head><p>The Sleep Proxy idea was first introduced in 1998 by <ref type="bibr">Kenneth</ref> Christensen in an International Journal <ref type="bibr" target="#b9">[9]</ref>. Although there were some technologies such as "Wake on LAN" and "Advanced Configuration and Power Interface Specification" in 90's regarding saving energy issue, due to some of their disadvantages, there are no more researches in the area. Instead, attention was back to Sleep Proxy in 2004 by Bruce Nordman <ref type="bibr" target="#b8">[8]</ref>. An interesting paper comes in 2007 for an implemented Proxy specifically designed for Universal Plug and Play Protocol (UPnp) <ref type="bibr" target="#b12">[12]</ref>. Later in 2007, Bruce Nordman and Keneth Christensen came with another work where they propose solution <ref type="bibr" target="#b10">[10]</ref> for a Sleep Proxy which can manage protocols such as ARP, DHCP, ICMP. Another scheme similiar to Sleep Proxy comes in 2008 called Somniloquy <ref type="bibr" target="#b13">[13]</ref>. It offers a hardware implementation of Sleep Proxy in a so-called "gumstix", thought as a predecessor of future NIC. We can also mention <ref type="bibr" target="#b4">[4]</ref>: Sleep Proxy as a standard of European Computer Manufacturers Association in November 2009. Researches go on and another paper of 2010' <ref type="bibr">[7]</ref>, illustrates designing, implementing and testing of a Sleep Proxy in Microsoft Offices.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">DESIGN AND IMPLEMENTATION ISSUES</head><p>In this section we show some design and implementation issues based on previous known architecture of Sleep Proxy Server, expressed in papers such as <ref type="bibr" target="#b2">[2]</ref>, <ref type="bibr" target="#b8">[8]</ref> and <ref type="bibr" target="#b9">[9]</ref>. The Sleep Proxy system is based on a client/server architecture where every client can fall asleep, being represented on the network by the Sleep Proxy server. prevent any network traffic to wake the sleeping computer in vain by ignoring or answering to these kind of packets • wake up the sleeping computer by sending a WoL packet whenever there is a network traffic too important not to be answered by the client itself</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Client Server Communication Protocol</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Implementation Issues</head><p>Based on the survey of <ref type="bibr" target="#b11">[11]</ref> regarding network chattering, we decide to implement this reaction policy for the Proxy server:</p><p>• it will answer back to ARP requests, will send ARP probes broadcasts on the network when necessary • wake up sleeping computer by sending WoL packet in case of TCP requests toward that computer • ignore all the others Programming this system will need: • Java RMI for building the client / server applications (as a programming environment is chosen "Eclipse IDE for Java Developers", Version 3.5.2 "Helios Service Release"),</p><formula xml:id="formula_0">•</formula><p>Jpcap library (Java packet capturing) which serves for capturing, analyzing and processing network packets.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">EXPERIMENTS 4.1 Experiment Preview</head><p>The experiment environment is composed by 6 computers clients and one server. 6 computers have these parameters: In every client is installed Java JDK and executes the client.jar application, which is the client Proxy application. Meanwhile the server executes the Server Proxy application. The network topology is Bus.</p><p>There will be held these experiments to test the Sleep Proxy system. The first testing: we will measure the consumed energy and the network traffic (number of packets) passing to them during the time 16:00 to 8:00 of the next day, for three continuous days, providing so 3 samples for each computer, without "sleep proxy" implemented. The second testing, will include the 7-th computer, the server Sleep Proxy, and we will measure the same parameters for 16 hours, in three days. So we will have 3 other samples for each of 6 client computers. Based on the results of the experiments we will compare the energy consumed and network traffic, also the time of each computer passed on sleeping state with Sleep Proxy system implemented, which is automatically translated into energy savings.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Measuring Tools</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.1">Joulemeter</head><p>The power consumption is measured by a specific tool produced by Microsoft called Joulemeter. We will measure the power consumption for 16 hours, for 3 days.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.2">Wireshark</head><p>Wireshark is the program from which we will get information about the network traffic in the experimental client machine, in terms of number of packets, saved in generated .pcap files.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">RESULTS AND INTERPRETATION</head><p>The first testing results regarding the power consumption and total number of packets are shown in Table <ref type="table">1</ref> below.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1: 3-day Average Power Consumption and total nr. of packets without implemented proxy on the network</head><p>As we can see from the table, Computer C1 and C6 have higher power consumption and this happens because of the CRT screen that consumes more power. The same data of Table <ref type="table">1</ref> are shown in a graphical form in Figure <ref type="figure" target="#fig_0">1</ref>. The results about the second testing, when Sleep Proxy is implemented on the network, regarding power consumption and total number of packets are shown in Table <ref type="table">2</ref>, also in a graphical form in Figure <ref type="figure" target="#fig_1">2</ref>: During the 16 experimenting hours, using a Sleep Proxy server, it was provided a percentage of sleeping time in a range of 44% to 65%, with an average sleeping time of 8.71 hours, illustrated in Table <ref type="table">3</ref> and Figure <ref type="figure">3</ref>.   </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2: 3-day Average Power Consumption and total number of packets with implemented proxy on the network</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">CONCLUSIONS</head><p>The results of this paper highlights the importance of power management features application and encourage this by evaluating a Sleep Proxy system, making a comparison of energy consumed between two situations: without Sleep Proxy implemented, and with Sleep Proxy implemented on the network.</p><p>The system we implemented can provide significant energy savings, assuring computers's availability on the network and a high level of transparency for other computers of the network. Due to our experiments, we calculate that in our system of 6 computers, daily average energy consumption in a Sleep Proxy system is 0.92 kWh per each computer. Compared to the daily average energy consumption value without implemented Sleep Proxy, of 1.97 kW, the energy savings results up to 53%, so computers in a Sleep Proxy environment consume 53% less energy than the same computers in a Non-Sleep Proxy environment. These values belong to only one computer on the network, but as the size of the company grows the energy saving becomes more and more significant in an annual period, up to hundreds of MWh. The energy savings is achieved by longer sleeping time in the presence of a Sleep Proxy Server. In a non-Sleep Proxy environment, sleeping time is almost 0 hours. Meanwhile the results of the experiments with Sleep Proxy implemented, show that during 16 hours of experimental time, the 6 computers stayed in sleeping time from 44% to 65% of the time, translated in 7.2 to 10.4 sleeping hours, from a total of 16 hours. Knowing that Sleep proxy is a system which is closely related to other Software components, brings to the need for some Software policies that would help in a better performance of the Sleep Proxy system. We can mention here procedures and routines such as backup, patches, automatic updates, scheduled by the IT department. Of course, IT department policies and schedules regarding these fields play a non-trivial role in Sleep Proxy performance. Sleep Proxy is active during non-official time (16-8 of the next day) so it would be much helpful from the IT department to be synchronized with this system in order to get the best results from Sleep Proxy.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Graphical representation of 3-day Average Power Consumption and total number of packets without implemented proxy on the network.</figDesc><graphic coords="3,78.00,97.68,190.50,145.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Graphical representation of 3-day Average Power Consumption and total number of packets with implemented proxy on the network.</figDesc><graphic coords="3,69.78,510.00,189.90,163.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Table 3 :Figure 3 :</head><label>33</label><figDesc>Figure 3: Percentage of experiment hours in sleeping or awake with implemented proxy. Now using the formula Energy = Power * Time, we calculate each of 6 computers * 16 experimental hours = energy consumed (kWh) per each computer. It is computed that the daily average energy consumption per computer is 1.97 kWh. Translated in annual energy consumption, if 6 computers would be left on from Monday to Thursday afternoons, it is computed an average energy consumption of 376kWh per each computer, or about 376 MWh for 1000 computers of a big company in a year. Meanwhile using the Sleep Proxy system on the experimental network shows these calculated results: Energy consumed = 3W * sleeping hours + Power consum. * Awake hours It is computed that, using Sleep Proxy, the daily average energy consumption per computer is 0.92 kWh. In comparison to the value just given above, without Sleep Proxy of 1.97 kWh, we save energy up to 53%. So, computers with proxy consume 53% less power than without proxy. The annual calculation would be 176 MWh for 1000 computers in a year. The difference with and without proxy is approximately 208MWh, translated into 54.2% energy savings. The figures 4 and 5 show respectively the difference in a graphical form of Daily Average energy consumed and Daily Average number of packets in the NIC by the client with and without proxy.</figDesc><graphic coords="3,339.00,243.18,199.20,156.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Difference in daily average energy consumed by the client with and without proxy.</figDesc><graphic coords="4,55.50,64.38,216.00,124.56" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Difference in daily average number of packets in the client NIC with and without proxy.</figDesc><graphic coords="4,63.78,230.34,216.00,133.56" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>Based on the characteristics of what we want our Sleep Project to do, we specify below the client server communication. That means what will the server do and what will the client do in our system.</figDesc><table><row><cell cols="2">The client will eventually:</cell></row><row><cell>•</cell><cell>provide to the proxy server necessary information that</cell></row><row><cell></cell><cell>server will need in order to represent the sleeping computer</cell></row><row><cell></cell><cell>on the network. This will be done by periodically (every 10</cell></row><row><cell></cell><cell>seconds) sending an INFO message that contains these</cell></row><row><cell></cell><cell>data: PC_name, IP address, MAC address, Operating</cell></row><row><cell></cell><cell>System, state, local time</cell></row><row><cell>•</cell><cell>"request" to the proxy server to change his status to sleep</cell></row><row><cell></cell><cell>when it is going to sleep. This will happen automatically by</cell></row><row><cell></cell><cell>server when it doesn't get an INFO message after 20</cell></row><row><cell></cell><cell>seconds (twice the time of default time set for periodic</cell></row><row><cell></cell><cell>sending of INFO)</cell></row><row><cell>•</cell><cell>notify the server whenever the client is awaked by any</cell></row><row><cell></cell><cell>event. This will happen by automatically sending INFO</cell></row><row><cell>•</cell><cell>know and process any waking packet that comes from the</cell></row><row><cell></cell><cell>server (which means to support some kind of WoL</cell></row><row><cell></cell><cell>technology)</cell></row><row><cell>•</cell><cell>optionally can configure the default time for periodic</cell></row><row><cell></cell><cell>sending of INFO, IP address of server, communication port</cell></row><row><cell></cell><cell>with the server. The default values are set in the</cell></row><row><cell></cell><cell>programming code.</cell></row></table><note>The server will eventually: • be listening to INFO messages from the clients and store these data in a table • keep a list of tables to keep track and information about computers on the network • change status of a computer from Sleep to Awake in its list whenever that clients notifies it is awaked (it gets INFO messages) •</note></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">BCI'12, September 16-20, 2012, Novi Sad, Serbia. Copyright © 2012 by the paper's authors. Copying permitted only for private and academic purposes. This volume is published and copyrighted by its editors. Local Proceedings also appeared in ISBN 978-86-7031-200-5, Faculty of Sciences, University of Novi Sad.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title/>
		<author>
			<persName><surname>References</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">Allan</forename><surname>Chen</surname></persName>
		</author>
		<title level="m">Berkeley Lab Researcher Leads Development of a Standard to Reduce Energy Use of Computers Connected to the Internet</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Improving the Energy Efficiency of Ethernet-Connected: A Proposal for Proxying</title>
		<author>
			<persName><forename type="first">Bruce</forename><surname>Nordman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ken</forename><surname>Christensen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Version</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">0</biblScope>
			<date type="published" when="2007-09">September 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Managing energy Consumption Costs in desktop PCs and LAN switches with proxying, split TCP connections, and scaling of link speed</title>
		<author>
			<persName><forename type="first">Ken</forename><surname>Chamara Gunaratne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bruce</forename><surname>Christensen</surname></persName>
		</author>
		<author>
			<persName><surname>Nordman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT</title>
		<imprint>
			<date type="published" when="2005-10">October 2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<ptr target="www.ecma-international.org/publications/files/ECMA-ST/ECMA-393.pdf" />
		<title level="m">Final Draft, Proxzzzy for sleeping hosts</title>
				<imprint>
			<date type="published" when="2009">November2009</date>
		</imprint>
	</monogr>
	<note>ECMA Standards</note>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">EPA Announces New Computer Efficiency Requirements</title>
		<ptr target="http://yosemite.epa.gov/opa/admpress.nsf/4a3d7e51caf96c7a85257359003f533e/113b0c0647fee41585257210006474f1!OpenDocument" />
		<imprint>
			<date type="published" when="2006-10">October 2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Use Windows XP&apos;s power management features to lower energy bills</title>
		<author>
			<persName><forename type="first">Greg</forename><surname>Shultz</surname></persName>
		</author>
		<ptr target="http://articles.techrepublic.com/510010878111054827.html" />
		<imprint>
			<date type="published" when="2002-11">November 2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Sleepless in Seattle No Longer</title>
		<author>
			<persName><forename type="first">Joshua</forename><surname>Reich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michel</forename><surname>Goraczko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Aman</forename><surname>Kansal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jitendra</forename><surname>Padhye</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2010 USENIX Conference</title>
				<meeting>the 2010 USENIX Conference</meeting>
		<imprint>
			<date type="published" when="2010-06">June 2010</date>
		</imprint>
	</monogr>
	<note>Microsoft Research</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">The Next Frontier for Communications Networks: Power Management</title>
		<author>
			<persName><forename type="first">K</forename><surname>Christensen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Gunaratne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Nordman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>George</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Communications</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="issue">18</biblScope>
			<biblScope unit="page" from="1758" to="1770" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Franklin &apos;Bo&apos; Gulledge -&quot;Enabling Power Management for Network-attached Computers</title>
		<author>
			<persName><forename type="first">J</forename><surname>Kenneth</surname></persName>
		</author>
		<author>
			<persName><surname>Christensen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Network Management</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="120" to="130" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Allman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Christensen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Nordman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Paxson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Sixth Workshop on Hot Topics in Networks (HotNets-VI)</title>
				<imprint>
			<date type="published" when="2007-11">November 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems</title>
		<author>
			<persName><forename type="first">Sergiu</forename><surname>Nedevschi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jaideep</forename><surname>Chandrashekar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Junda</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bruce</forename><surname>Nordman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sylvia</forename><surname>Ratnasamy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nina</forename><surname>Taft</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">NSDI Conference</title>
				<imprint>
			<date type="published" when="2009-04">April 2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m">UPnP Low Power Architecture, Version 1.0, UPnP Forum</title>
				<imprint>
			<date type="published" when="2007-08-27">August 27, 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><forename type="first">Yuvraj</forename><surname>Agarwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Steve</forename><surname>Hodges</surname></persName>
		</author>
		<author>
			<persName><forename type="first">James</forename><surname>Scott</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ranveer</forename><surname>Chandra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Paramvir</forename><surname>Bahl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rajesh</forename><surname>Gupta</surname></persName>
		</author>
		<title level="m">Somniloquy: Maintaining Network Connectivity While Your Computer Sleeps</title>
				<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
