next up previous
Next: Application Classes Up: Analyzing Costs of Software Previous: Analyzing Costs of Software

Network Analysis

Because network communication is expected to be an integral component of C0PE, a natural standard for analysis is the network. If encryption can keep up with the network, use much less power, much less chip space and cost much less than the network interfaces, then encrypting everything will be feasible. A typical analysis would be of the form, ``Can all devices on a IrDA network sustain encryption at that bandwidth i.e at 115 Kbps ? or ``Can all devices on a Bluetooth network consume less power for encryption as compared to the power required for transmission ?

In a typical mobile environment like C0PE, wireless network standards such as IrDA, IEEE 802.11 and Bluetooth are likely to be employed. In this network analysis for encryption, we consider these standards and also the Ethernet.

Bandwidth.

As mentioned earlier, if the throughput of encryption is greater than the network bandwidth for all devices and environments, universal encryption may be possible subject to other conditions.

In this analysis, we executed an optimized Twofish implementation on the each of the following machines with the corresponding specifications:

1.
PalmPilot: A 3Com PalmPilot Professional running on the Motorola MC68328 DragonBall microprocessor clocked at 16MHz.
2.
Pentium-Pro: A Linux machine running on a PentiumPro clocked at 200MHZ
3.
Pentium III: A Linux machine running on a Pentium III clocked at 600MHz
4.
UltraSparc: A Sun workstation running on the UltraSparc IIi processor clocked at 300MHz
5.
Motorola 6805: A smartcard processor

We implemented Twofish for a PalmPilot and for the Motorola 6805, values were obtained from experiments done at Counterpane Labs.

The network bandwidths (maximum possible) of the standards considered:

1.
IrDA: 115 kbps
2.
Bluetooth: 1 Mbps
3.
IEEE 802.11: 2 Mbps
4.
Ethernet: 100 Mbps

The maximum possible encryption throughput values were obtained assuming full CPU/memory resource availability.

Latency.

Since latency overheads affect the feasibility of universal encryption, studies comparing latencies of encryption and network transmission were done on certain applications (refer Section 3.2.2).

Power Analysis.

As previously mentioned, power is an important factor affecting the use of encryption on small portable devices. We analyzed the power consumption of the Twofish algorithm on the following machines with the corresponding power ratings:


 
Figure: Power for Transmission
\begin{figure}
\centerline{\psfig{file=transmit_power.eps,width=5in,height=7.5cm}}\end{figure}

Using the results obtained in the analysis for network bandwidth, a maximum sustainable rate on a particular device, $R \ bits/sec$, was obtained. Let the power rating of the device be $P \ Joules/sec$. Then, the energy per bit consumed (assuming the CPU works uniformly throughout on encryption) is $E = P/R \ Joules/bit$. The network transmission energy per bit was obtained as follows: Let the power consumed for transmission on that medium be $P_N \ Joules/sec$, assuming transmission at the maximum possible bandwidth. Let the maximum bandwidth possible be $B_N \ bits/sec$. Then, the energy consumed per bit for network transmission is $E_N = P_N/B_N \ Joules/bit$.

If E is considerably lesser than EN, i.e if $E \ll E_N$ for all devices, then universal encryption is feasible on this count (consideration of power). This means that if $E \ll E_N$, encryption is a minimal overhead in terms of power when compared to network transmission.


next up previous
Next: Application Classes Up: Analyzing Costs of Software Previous: Analyzing Costs of Software
Ramadass Nagarajan
2000-05-11