Mobile hosts participating in peer-to-peer data networks: challenges and solutions
- 198 Downloads
Peer-to-peer (P2P) data networks dominate Internet traffic, accounting for over 60% of the overall traffic in a recent study. In this work, we study the problems that arise when mobile hosts participate in P2P networks. We primarily focus on the performance issues as experienced by the mobile host, but also study the impact on other fixed peers. Using BitTorrent as a key example, we identify several unique problems that arise due to the design aspects of P2P networks being incompatible with typical characteristics of wireless and mobile environments. Using the insights gained through our study, we present a wireless P2P client application that is backward compatible with existing fixed-peer client applications, but when used on mobile hosts can provide significant performance improvements.
KeywordsMobility Wireless networks Peer-to-peer
We thank all anonymous reviewers for their valuable comments. This work was supported in part by the National Science Foundation under grant CNS-0519733.
- 1.Peer-to-peer. (2005). CacheLogic. http://www.cachelogic.com/home/pages/research/p2p2005.php.
- 2.Bittorrent. http://www.bittorrent.org/.
- 3.Mandriva distribution. http://www.mandriva.com/en/download.
- 4.Fedora distribution. http://fedoraproject.org/en/get-fedora.
- 5.Arch linux. http://www.archlinux.org/download/.
- 6.Henderson, T., Kotz, D., & Abyzov, I. (2004). The changing usage of a mature campus-wide wireless network. In MobiCom ’04: Proceedings of the 10th annual international conference on Mobile computing and networking. New York, NY, USA.Google Scholar
- 7.A new type of radio, Roadcasting. http://www.roadcasting.org/.
- 8.Melodeo’s mobile phone p2p to launch, Ringtonia. http://www.ringtonia.com/.
- 9.Edonkey. (2000). http://en.wikipedia.org/wiki/EDonkey2000.
- 10.Klingberg, T., & Manfredi, R. (2002). Gnutella 0.6, Gnutella Protocol Development. http://rfc-gnutella.sourceforge.net/src/rfc-0-6-draft.html.
- 11.Fasttrack. http://en.wikipedia.org/wiki/FastTrack.
- 12.Netfilter project. http://www.netfilter.org/.
- 13.Torrent server for the fedora project. http://torrent.fedoraproject.org/.
- 14.Perkins, C., & Mobile, I. P. (2002). IEEE Communications Magazine, 40(5), 66–82.Google Scholar
- 15.Hsieh, H. -Y., Kim, K. -H., & Sivakumar, R. (2003). On achieving weighted service differentiation: An end-to-end perspective. In IEEE IWQoS 03: Proceedings of the international workshop on quality of service. Monterey, CA, USA.Google Scholar
- 16.Winpkfilter. http://www.ntkernel.com/.
- 17.The network simulator. http://www.isi.edu/nsnam/ns.
- 18.Enhanced ctorrent, a lightweight c++ implementation. http://www.rahul.net/dholmes/ctorrent/.
- 19.Fall, K. (1999). Network emulation in the vint/ns simulator. In ISCC ’99: Proceedings of the the fourth IEEE symposium on computers and communications. Washington, DC, USA.Google Scholar
- 20.Pahdye, J., & Floyd, S. (2001). On inferring tcp behavior. In SIGCOMM ’01: Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications. New York, NY, USA.Google Scholar
- 21.Srivatsa, M., Xiong, L., & Liu, L. (2005). Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks. In WWW ’05: Proceedings of the 14th international conference on World Wide Web. New York, NY, USA.Google Scholar
- 22.Dellarocas, C. (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In EC ’00: Proceedings of the 2nd ACM conference on electronic commerce. New York, NY, USA.Google Scholar
- 23.Lian, Q., Zhang, Z., Yang, M., Zhao, B. Y., Dai, Y., & Li, X. (2007). An empirical study of collusion behavior in the maze p2p file-sharing system. In IEEE ICDCS ’07: Proceedings of 27th IEEE international conference on distributed computing systems.Google Scholar
- 24.Zhang, Z., Chen, S., & Yoon, M. (2007). March: A distributed incentive scheme for peer-to-peer networks. In IEEE INFOCOM ’07: Proceedings of the 26th IEEE international conference on computer communications anchorage. Alaska, USA.Google Scholar
- 25.Wei, K., Chen, Y. -F., Smith, A. J., & Vo, B. (2006). Whopay: A scalable and anonymous payment system for peer-to-peer environments. In IEEE ICDCS ’06: Proceedings of 27th IEEE international conference on distributed computing systems.Google Scholar
- 26.Lu, L., Han, J., Hu, L., Huai, J., Liu, Y., & Ni, L. M. (2007). Pseudo trust: Zero-knowledge based authentication in anonymous peer-to-peer protocols. In IPDPS ’07: Proceedings of the 21th IEEE international parallel and distributed processing symposium.Google Scholar
- 27.Qiu, D., & Srikant, R. (2004). Modeling and performance analysis of bittorrent-like peer-to-peer networks. In SIGCOMM ’04: Proceedings of the 2004 conference on applications, technologies, architectures, and protocols for computer communications. New York, NY, USA.Google Scholar
- 28.Bharambe, A. R., Herley, C., & Padmanabhan, V. N. (2005). Some observations on bittorrent performance. SIGMETRICS Perform. Eval. Rev.Google Scholar
- 29.Legout, A., Liogkas, N., Kohler, E., & Zhang, L. (2007). Clustering and sharing incentives in bittorrent systems. In SIGMETRICS ’07: Proceedings of the 2007 ACM SIGMETRICS international conference on measurement and modeling of computer systems. New York, NY, USA.Google Scholar
- 30.Parvez, N., Williamson, C., Mahanti, A., & Carlsson, N. (2008). Analysis of bittorrent-like protocols for on-demand stored media streaming. SIGMETRICS Perform. Eval. Rev.Google Scholar
- 31.Conti, M., Gregori, E., & Turi, G. (2005). A cross-layer optimization of gnutella for mobile ad hoc networks. In MobiHoc ’05: Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing. New York, NY, USA.Google Scholar
- 32.Huang, C.-M., Hsu, T.-H., & Hsu, M.-F. (2005). A file discovery control scheme for p2p file sharing applications in wireless mobile environments. In ACSC ’05: Proceedings of the twenty-eighth Australasian conference on computer science (pp. 39–47).Google Scholar
- 33.Snoeren, A., & Balakrishnan, H. (2000). An end-to-end approach to host mobility. In Proceedings of ACM MOBICOM. Boston, MA, USA.Google Scholar
- 34.Zandy, V. C., & Miller, B. P. (2002). Reliable network connections. In MobiCom 02: Proceedings of the 8th annual international conference on mobile computing and networking. New York, NY, USA.Google Scholar
- 35.Dwyer, D. & Bharghavan, V. (1997). A mobility-aware file system for partially connected operation. SIGOPS Oper. Syst. Rev.Google Scholar
- 36.Krashinsky, R., & Balakrishnan, H. (2002). Minimizing energy for wireless web access with bounded slowdown. In MobiCom ’02. New York, NY, USA.Google Scholar
- 37.Anand, M., Nightingale, E. B., & Flinn, J. (2003). Self-tuning wireless network power management. In MobiCom ’03: Proceedings of the 9th annual international conference on mobile computing and networking. New York, NY, USA.Google Scholar
- 38.Zhu, H., & Cao, G. (2005). On supporting power-efficient streaming applications in wireless environments. IEEE Transactions on Mobile Computing.Google Scholar
- 39.Chandra, S., & Vahdat, A. (2002). Application-specific network management for energy-aware streaming of popular multimedia formats. In Proceedings of the general track: 2002 USENIX annual technical conference. Berkeley, CA, USA.Google Scholar
- 40.Yan, H., Krishnan, R., Watterson, S. A., & Lowenthal D. K. (2004). Client-centered energy savings for concurrent http connections. In NOSSDAV ’04: Proceedings of the 14th international workshop on network and operating systems support for digital audio and video. New York, NY, USA.Google Scholar
- 41.Korhonen, J., & Wang, Y. (2005). Power-efficient streaming for mobile terminals. In NOSSDAV ’05: Proceedings of the international workshop on network and operating systems support for digital audio and video. New York, NY, USA.Google Scholar