Advertisement

Wireless Networks

, Volume 16, Issue 8, pp 2313–2333 | Cite as

Mobile hosts participating in peer-to-peer data networks: challenges and solutions

  • Zhenyun ZhuangEmail author
  • Sandeep Kakumanu
  • Yeonsik Jeong
  • Raghupathy Sivakumar
  • Aravind Velayutham
Article

Abstract

Peer-to-peer (P2P) data networks dominate Internet traffic, accounting for over 60% of the overall traffic in a recent study. In this work, we study the problems that arise when mobile hosts participate in P2P networks. We primarily focus on the performance issues as experienced by the mobile host, but also study the impact on other fixed peers. Using BitTorrent as a key example, we identify several unique problems that arise due to the design aspects of P2P networks being incompatible with typical characteristics of wireless and mobile environments. Using the insights gained through our study, we present a wireless P2P client application that is backward compatible with existing fixed-peer client applications, but when used on mobile hosts can provide significant performance improvements.

Keywords

Mobility Wireless networks Peer-to-peer 

Notes

Acknowledgments

We thank all anonymous reviewers for their valuable comments. This work was supported in part by the National Science Foundation under grant CNS-0519733.

References

  1. 1.
  2. 2.
  3. 3.
    Mandriva distribution. http://www.mandriva.com/en/download.
  4. 4.
  5. 5.
  6. 6.
    Henderson, T., Kotz, D., & Abyzov, I. (2004). The changing usage of a mature campus-wide wireless network. In MobiCom ’04: Proceedings of the 10th annual international conference on Mobile computing and networking. New York, NY, USA.Google Scholar
  7. 7.
    A new type of radio, Roadcasting. http://www.roadcasting.org/.
  8. 8.
    Melodeo’s mobile phone p2p to launch, Ringtonia. http://www.ringtonia.com/.
  9. 9.
  10. 10.
    Klingberg, T., & Manfredi, R. (2002). Gnutella 0.6, Gnutella Protocol Development. http://rfc-gnutella.sourceforge.net/src/rfc-0-6-draft.html.
  11. 11.
  12. 12.
    Netfilter project. http://www.netfilter.org/.
  13. 13.
    Torrent server for the fedora project. http://torrent.fedoraproject.org/.
  14. 14.
    Perkins, C., & Mobile, I. P. (2002). IEEE Communications Magazine, 40(5), 66–82.Google Scholar
  15. 15.
    Hsieh, H. -Y., Kim, K. -H., & Sivakumar, R. (2003). On achieving weighted service differentiation: An end-to-end perspective. In IEEE IWQoS 03: Proceedings of the international workshop on quality of service. Monterey, CA, USA.Google Scholar
  16. 16.
  17. 17.
    The network simulator. http://www.isi.edu/nsnam/ns.
  18. 18.
    Enhanced ctorrent, a lightweight c++ implementation. http://www.rahul.net/dholmes/ctorrent/.
  19. 19.
    Fall, K. (1999). Network emulation in the vint/ns simulator. In ISCC ’99: Proceedings of the the fourth IEEE symposium on computers and communications. Washington, DC, USA.Google Scholar
  20. 20.
    Pahdye, J., & Floyd, S. (2001). On inferring tcp behavior. In SIGCOMM ’01: Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications. New York, NY, USA.Google Scholar
  21. 21.
    Srivatsa, M., Xiong, L., & Liu, L. (2005). Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks. In WWW ’05: Proceedings of the 14th international conference on World Wide Web. New York, NY, USA.Google Scholar
  22. 22.
    Dellarocas, C. (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In EC ’00: Proceedings of the 2nd ACM conference on electronic commerce. New York, NY, USA.Google Scholar
  23. 23.
    Lian, Q., Zhang, Z., Yang, M., Zhao, B. Y., Dai, Y., & Li, X. (2007). An empirical study of collusion behavior in the maze p2p file-sharing system. In IEEE ICDCS ’07: Proceedings of 27th IEEE international conference on distributed computing systems.Google Scholar
  24. 24.
    Zhang, Z., Chen, S., & Yoon, M. (2007). March: A distributed incentive scheme for peer-to-peer networks. In IEEE INFOCOM ’07: Proceedings of the 26th IEEE international conference on computer communications anchorage. Alaska, USA.Google Scholar
  25. 25.
    Wei, K., Chen, Y. -F., Smith, A. J., & Vo, B. (2006). Whopay: A scalable and anonymous payment system for peer-to-peer environments. In IEEE ICDCS ’06: Proceedings of 27th IEEE international conference on distributed computing systems.Google Scholar
  26. 26.
    Lu, L., Han, J., Hu, L., Huai, J., Liu, Y., & Ni, L. M. (2007). Pseudo trust: Zero-knowledge based authentication in anonymous peer-to-peer protocols. In IPDPS ’07: Proceedings of the 21th IEEE international parallel and distributed processing symposium.Google Scholar
  27. 27.
    Qiu, D., & Srikant, R. (2004). Modeling and performance analysis of bittorrent-like peer-to-peer networks. In SIGCOMM ’04: Proceedings of the 2004 conference on applications, technologies, architectures, and protocols for computer communications. New York, NY, USA.Google Scholar
  28. 28.
    Bharambe, A. R., Herley, C., & Padmanabhan, V. N. (2005). Some observations on bittorrent performance. SIGMETRICS Perform. Eval. Rev.Google Scholar
  29. 29.
    Legout, A., Liogkas, N., Kohler, E., & Zhang, L. (2007). Clustering and sharing incentives in bittorrent systems. In SIGMETRICS ’07: Proceedings of the 2007 ACM SIGMETRICS international conference on measurement and modeling of computer systems. New York, NY, USA.Google Scholar
  30. 30.
    Parvez, N., Williamson, C., Mahanti, A., & Carlsson, N. (2008). Analysis of bittorrent-like protocols for on-demand stored media streaming. SIGMETRICS Perform. Eval. Rev.Google Scholar
  31. 31.
    Conti, M., Gregori, E., & Turi, G. (2005). A cross-layer optimization of gnutella for mobile ad hoc networks. In MobiHoc ’05: Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing. New York, NY, USA.Google Scholar
  32. 32.
    Huang, C.-M., Hsu, T.-H., & Hsu, M.-F. (2005). A file discovery control scheme for p2p file sharing applications in wireless mobile environments. In ACSC ’05: Proceedings of the twenty-eighth Australasian conference on computer science (pp. 39–47).Google Scholar
  33. 33.
    Snoeren, A., & Balakrishnan, H. (2000). An end-to-end approach to host mobility. In Proceedings of ACM MOBICOM. Boston, MA, USA.Google Scholar
  34. 34.
    Zandy, V. C., & Miller, B. P. (2002). Reliable network connections. In MobiCom 02: Proceedings of the 8th annual international conference on mobile computing and networking. New York, NY, USA.Google Scholar
  35. 35.
    Dwyer, D. & Bharghavan, V. (1997). A mobility-aware file system for partially connected operation. SIGOPS Oper. Syst. Rev.Google Scholar
  36. 36.
    Krashinsky, R., & Balakrishnan, H. (2002). Minimizing energy for wireless web access with bounded slowdown. In MobiCom ’02. New York, NY, USA.Google Scholar
  37. 37.
    Anand, M., Nightingale, E. B., & Flinn, J. (2003). Self-tuning wireless network power management. In MobiCom ’03: Proceedings of the 9th annual international conference on mobile computing and networking. New York, NY, USA.Google Scholar
  38. 38.
    Zhu, H., & Cao, G. (2005). On supporting power-efficient streaming applications in wireless environments. IEEE Transactions on Mobile Computing.Google Scholar
  39. 39.
    Chandra, S., & Vahdat, A. (2002). Application-specific network management for energy-aware streaming of popular multimedia formats. In Proceedings of the general track: 2002 USENIX annual technical conference. Berkeley, CA, USA.Google Scholar
  40. 40.
    Yan, H., Krishnan, R., Watterson, S. A., & Lowenthal D. K. (2004). Client-centered energy savings for concurrent http connections. In NOSSDAV ’04: Proceedings of the 14th international workshop on network and operating systems support for digital audio and video. New York, NY, USA.Google Scholar
  41. 41.
    Korhonen, J., & Wang, Y. (2005). Power-efficient streaming for mobile terminals. In NOSSDAV ’05: Proceedings of the international workshop on network and operating systems support for digital audio and video. New York, NY, USA.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Zhenyun Zhuang
    • 1
    Email author
  • Sandeep Kakumanu
    • 1
  • Yeonsik Jeong
    • 2
  • Raghupathy Sivakumar
    • 1
  • Aravind Velayutham
    • 3
  1. 1.Georgia Institute of TechnologyAtlantaUSA
  2. 2.SungKongHoe UniversitySeoulKorea
  3. 3.Asankya IncAtlantaUSA

Personalised recommendations