Peer-to-Peer Overlay in Mobile Ad-hoc Networks

  • Marcel C. Castro
  • Andreas J. Kassler
  • Carla-Fabiana Chiasserini
  • Claudio Casetti
  • Ibrahim Korpeoglu

Abstract

Wireless multi-hop networks such as mobile ad-hoc (MANET) or wireless mesh networks (WMN) have attracted big research efforts during the last years as they have huge potential in several areas such as military communications, fast infrastructure replacement during emergency operations, extension of hotspots or as an alternative communication system. Due to various reasons, such as characteristics of wireless links, multi-hop forwarding operation, and mobility of nodes, performance of traditional peer-to-peer applications is rather low in such networks. In this book chapter, we provide a comprehensive and in-depth survey on recent research on various approaches to provide peer-to-peer services in wireless multi-hop networks. The causes and problems for low performance of traditional approaches are discussed. Various representative alternative approaches to couple interactions between the peer-to-peer overlay and the network layer are examined and compared. Some open questions are discussed to stimulate further research in this area.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

Acknowledgement

This work was supported by the European Commission in the framework of the FP7 Network of Excellence in Wireless COMmunications NEWCOM++ (contract n. 216715)

Reference

  1. 1.
    Androutsellis-Theotokis, S., Spinellis, D.: A survey of peer-to-peer content distribution technologies. ACM Computing Surveys 36(4), 335–371 (2004)CrossRefGoogle Scholar
  2. 2.
    Baumgart, I.: P2pns: A secure distributed name service for p2psip. In: Proc. of Mobile P2P (2008)Google Scholar
  3. 3.
    Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970). DOI 10.1145/362686.362692. URL http://portal.acm.org/citation.cfm?id=362692
  4. 4.
    Bouazizi, I.: Ara - the ant-colony based routing algorithm formanets. In: Proc. of ICPPW. IEEE Computer Society, Washington, DC, USA (2002). URL http://portal.acm.org/citation.cfm?id=848286
  5. 5.
    Burgess, J., Gallagher, B., Jensen, D., Levine, B.: MaxProp: Routing for vehicle-based disruption-tolerant networks. In: Proc. of INFOCOM. Vancouver, Canada (2006)Google Scholar
  6. 6.
    Burleigh, S., Hooke, A., Torgerson, L., Fall, K., Cerf, V., Durst,B., Scott, K., Weiss, H.: Delay-tolerant networking: an approach to interplanetary internet. IEEE Communications Magazine 41(6), 128–136 (2003). DOI http://dx.doi.org/10.1109/MCOM.2003.1204759. URL http://dx.doi.org/10.1109/MCOM.2003.1204759 Google Scholar
  7. 7.
    Burresi, S., Canali, C., Renda, M.E., Santi, P.: Meshchord: Alocation-aware, cross-layer specialization of chord for wireless mesh networks. In: Proc. of PerCom. Hong Kong (2008)Google Scholar
  8. 8.
    Caesar, M., Castro, M., Nightingale, E.B., OShea, G.: Virtual ring routing: Network routing inspired by dhts. In: Proc. of ACM SIGCOMM. Pisa, Italy (2006)Google Scholar
  9. 9.
    Calafate, C., Cano, J.C., Manzoni, P., Malumbres, M.: A qos architecture for manets supporting real-time peer-to-peer multimedia applications. In: ISM (2005)Google Scholar
  10. 10.
    Cao, J., Zhang, Y., Cao, G., Xie, L.: Data consistency for cooperative caching in mobile environments. IEEE Computer 37, 60–66 (2007)MATHGoogle Scholar
  11. 11.
    Castro, M., Jones, M.B., Kermarrec, A.M., Rowstron, A., Theimer, M.,Wang, H., Wolman, A.: An evaluation of scalable application level multicast built using peer-to-peer overlays. In: Proc. of INFOCOM (2003)Google Scholar
  12. 12.
    Castro, M.C., Villanueva, E., Ruiz, I., Sargento, S., Kassler, A.J.: Performance evaluation of structured p2p over wireless multi-hop networks. In: Proc. of MESH (2008)Google Scholar
  13. 13.
    Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, R., Scott,K., Fall, K., Weiss, H.: Delay-tolerant networking architecture. URL http://www.ietf.org/rfc/rfc4838.txt. IETF RFC 4838
  14. 14.
    Clausen, T., Jacquet, P., Laouiti, A., Muhlethaler, P., Qayyum, A.,Viennot, L.: Optimized link state routing protocol. In: Proc. of the IEEE INMIC. Pakistan, USA (2001)Google Scholar
  15. 15.
    Conti, M., Maselli, G., Turi, G., Giordano, S.: Cross-layering in mobile ad hoc network design. Computer 37(2), 48–51 (2004)CrossRefGoogle Scholar
  16. 16.
    Conti, M., Maselli, G., Turi, G., Giordano, S.: Cross layering in mobile ad hoc network design. In: IEEE Computer (2004)Google Scholar
  17. 17.
    Cramer, C., Fuhrmann, T.: Performance evaluation of chord in mobile ad hoc networks. In: Proc. of MobiShare (2006)Google Scholar
  18. 18.
    Delmastro, F.: From pastry to crossroad: Cross-layer ring overlay for ad hoc networks. In: Pervasive Computing and Communications Workshops, 2005. PerCom 2005 Workshops. Third IEEE International Conference on, pp. 60–64 (2005). URL http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1392801
  19. 19.
    Delmastro, F., Passarella, A., Conti, M.: P2p multicast for pervasive ad hoc networks. Pervasive and Mobile Computing 4(1), 62–91 (2007). DOI http://dx.doi.org/10.1016/j.pmcj.2007.03.001
  20. 20.
    Dhara, K.K., Krishnaswamy, V., Baset, S.: Dynamic peer-to-peer overlays for voice systems. In: Proc. of IEEE International Conference on Pervasive Computing and Communications Workshops (2006)Google Scholar
  21. 21.
    Ding, G., Bhargava, B.: Peer-to-peer file-sharing over mobile ad hoc networks. In: Proc. of PERCOMW (2004)Google Scholar
  22. 22.
    Eastlake, D.E., Jones, P.E.: Us secure hash algorithm 1 (sha1). URL http://www.ietf.org/rfc/rfc3174.txt. IETF RFC 3174
  23. 23.
    Fiore, M., Casetti, C., Chiasserini, C.F.: Efficient retrieval of user contents in manets. In: Proc. of INFOCOM. Anchorage, AK, USA (2007)Google Scholar
  24. 24.
    Fuhrmann, T., Di, P., Kutzner, K., Cramer, C.: Pushing chord into the underlay: Scalable routing for hybrid manets. Tech. rep., Universität Karlsruhe (TH) (2006)Google Scholar
  25. 25.
    Gerla, M., Lindemann, C., Rowstron, A.: P2p manet’s - new research issues. In: Perspectives Workshop: Peer-to-Peer Mobile Ad Hoc Networks - New Research Issues (2005)Google Scholar
  26. 26.
    Gruber, I., Schollmeier, R., Kellerer, W.: Performance evaluation of the mobile peer-to-peer protocol. In: Proc. of GP2PC (2004)Google Scholar
  27. 27.
    Guangtao, X., Li, M.L., Deng, Q.N., You, J.Y.: Stable group model in mobile peer-to-peer media streaming system. In: First IEEE International Conference on Mobile Ad Hoc and Sensor Systems (2004)Google Scholar
  28. 28.
    Hara, T.: Effective replica allocation in ad hoc networks for improving data accessibility. In: Proc. of INFOCOM, pp. 1568–1576 (2001)Google Scholar
  29. 29.
    Hara, T.: Replica allocation methods in ad hoc networks with data update. Mobile Networks and Applications 8(4) (2003)Google Scholar
  30. 30.
    Heckmann, O., Bock, A.: The edonkey2000 protocol. Tech. rep., Darmstadt University of Technology (2002)Google Scholar
  31. 31.
    Hoh, C., Hwang, R.: P2p file sharing system over manet based on swarm intelligence: A cross-layer design. In: Proc. of WCNC (2007)Google Scholar
  32. 32.
    Holland, G., Vaidya, N.H.: Analysis of tcp performance over mobile ad hoc networks. In: Proc. of MobiCom, pp. 219–230 (1999)Google Scholar
  33. 33.
    Hu, Y.C., Das, S.M., Pucha, H.: Peer-to-peer overlay abstractions in manets. In: J. Wu (ed.) Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks, pp. 858–871. CRC Press (2005)Google Scholar
  34. 34.
    Johnson, D.B.: Routing in ad hoc networks of mobile hosts. In: Proc. of the IEEE Workshop on Mobile Computing Systems and Applications, pp. 158–163. Santa Cruz, USA (1994)Google Scholar
  35. 35.
    Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, Korth (eds.) Mobile Computing, vol. 353. Kluwer Academic Publishers (1996). URL citeseer.ist.psu.edu/johnson96dynamic.htmlGoogle Scholar
  36. 36.
    Karakaya, M., Korpeoglu, I., Ulusoy, O.: Free riding in peer-to-peer networks. In: IEEE Internet Computing, to appear, 2009 (2009)Google Scholar
  37. 37.
    Karp, B.N., Kung, H.T.: Gpsr: Greedy perimeter stateless routing for wireless networks. In: Proc. of MobiCom, pp. 243–254 (2000)Google Scholar
  38. 38.
    Kellerer, W., Schollmeier, R.: Proactive search routing for mobile peer-to-peer networks: Zone-based p2p. In: Proc. of ASWN (2005)Google Scholar
  39. 39.
    Klemm, A., Lindemann, C., Waldhorst, O.P.: A special-purpose peer-to-peer file sharing system for mobile ad hoc networks. In: Proc. of IEEE VTC (2003)Google Scholar
  40. 40.
    Kranakis, E., Singh, H., Urrutia, J.: Compass routing on geometric networks. In: Proc. of CCCG, pp. 51–54. Vancouver, Canada (1999)Google Scholar
  41. 41.
    Liang, J., Kumar, R., Ross, K.: Understanding kazaa. URL http://citeseer.ist.psu.edu/liang04understanding.html (2004)
  42. 42.
    Lindgren, A., Doria, A., Schelen, O.: Probabilistic routing in intermittently connected networks. ACM Mobile Computing and Communications Review 7(3), 19–20 (2003). DOI http://dx.doi.org/10.1109/MCOM.2002.1018018
  43. 43.
    Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., Lim, S.: A survey and comparison of peer-to-peer overlay networks schemes. IEEE Communications Surveys and Tutorials 7(2), 72–93 (2004)Google Scholar
  44. 44.
    M. Mani W. Seah, N.C.: Super nodes positioning for p2p ip telephony over wireless ad hoc networks. In: MUM (2007)Google Scholar
  45. 45.
    M. Waldman A. D. Rubin, L.F.C.: Publius: a robust, tamper-evident, censorship-resistant web publishing system. In: Proc. of USENIX. ACM Press, Denver, Colorado, USA (2000)Google Scholar
  46. 46.
    Naumov, V., Baumann, R., Gross, T.: An evaluation of inter-vehicle ad hoc networks based on realistic vehicular traces. In: Proc. of ACM MobiHoc, pp. 1568–1576. Florence, Italy (2006)Google Scholar
  47. 47.
    Neumann, A., Aichele, C., Lindner, M., Wunderlich, S.: Better approach to mobile ad-hoc networking (b.a.t.m.a.n.). URL http://tools.ietf.org/html/draft-wunderlich-openmesh-manet-routing-00 (2008). Work in progress
  48. 48.
    Papadopouli, M., Schulzrinne, H.: A performance analysis of 7ds: a peer-to-peer data dissemination and prefetching tool for mobile users. In: Proc. of IEEE Advances in Wired and Wireless Communications (2001)Google Scholar
  49. 49.
    Perkins, C., Royer, E.: Ad hoc on-demand distance vector routing. In: Proc. of IEEE WMCSA (1999)Google Scholar
  50. 50.
    Perkins, C.E., Royer, E.M.: Ad hoc on-demand distance vector routing. In: Proc. of the IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100. New Orleans, USA (1999)Google Scholar
  51. 51.
    Plaxton, C., Rajaraman, R., Richa, A.: Accessing nearby copies of replicated objects in a distributed environment. In: Proc. of ACM SPAA (1997)Google Scholar
  52. 52.
    Pouwelse, J., Garbacki, P., Epema, D., Sips, H.: The bittorrent p2p file-sharing system: Measurements and analysis. Peer-to-Peer Systems IV pp. 205–216 (2005). URL http://dx.doi.org/10.1007/11558989_19
  53. 53.
    Pucha, H., Das, S.M., Hu, Y.C.: Ekta: An efficient dht substrate for distributed applications in mobile ad hoc networks. In: Proc. of the Sixth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004). English Lake District, UK (2004)Google Scholar
  54. 54.
    Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A scalable content-addressable network. In: Proc. of ACM SIGCOMM. San Diego, USA (2001)Google Scholar
  55. 55.
    Rhea, S., Geels, D., Roscoe, T., Kubiatowicz, J.: Handling churn in a DHT. In: Proc. of USENIX (2004). URL http://citeseer.ist.psu.edu/648942.html
  56. 56.
    Ripeanu, M.: Peer-to-peer architecture case study: Gnutella network. In: Proc. of Peer-to-Peer Computing, pp. 99–100 (2001). URL http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=990433
  57. 57.
    Roger Dingledine Michael J. Freedman, D.M.: The free haven project: Distributed anonymous storage service. In: Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, LNCS (2000)Google Scholar
  58. 58.
    Rowstron, A., Druschel, P.: Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In: Proc. of ACM/IFIP Middleware. Heidelberg, Germany (2001)Google Scholar
  59. 59.
    Schollmeier, R., Gruber, I., Finkenzeller, M.: Routing in mobile ad hoc and peer-to-peer networks: a comparison. In: Proc. of Workshop on Peer-to-Peer Computing. In Networking (2002)Google Scholar
  60. 60.
    Schollmeier, R., Gruber, I., Niethammer, F.: Protocol for peer-to-peer networking in mobile environments. In: Proc. of ICCCN (2003)Google Scholar
  61. 61.
    Sozer, H., Tekkalmaz, M., Korpeoglu, I.: A peer-to-peer file search and download protocol for wireless ad-hoc networks. to appear in Computer Communications (To Appear)Google Scholar
  62. 62.
    Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: Proc. of ACM SIGCOMM. San Diego, USA (2001)Google Scholar
  63. 63.
    Stojmenovic, I.: Position based routing in ad hoc networks. IEEE Communications Magazine 40(7), 128–134 (2002). DOI http://dx.doi.org/10.1109/MCOM.2002.1018018 Google Scholar
  64. 64.
    Tang, B., Gupta, H., Das, S.: Benefit-based data caching in ad hoc networks. IEEE Trans. on Mobile Computing 7(3), 62–91 (2008)CrossRefGoogle Scholar
  65. 65.
    Varshavsky, A., Reid, B., de Lara, E.: A cross-layer approach to service discovery and selection in manets. Proc. of IEEE Mobile Adhoc and Sensor Systems Conference (2005). URL http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1542832
  66. 66.
    Wiberg, B.: Porting aodv-uu implementation to ns2 and enabling tracebased simulation. Master’s thesis, Uppsala University (2002)Google Scholar
  67. 67.
    Winter, R., Zahn, T., Schiller, J.: Random landmarking in mobile, topology-aware peer-to-peer networks. In: Proc. of FTDCS (2004)Google Scholar
  68. 68.
    Wolfson, O., Xu, B., Yin, H., Cao, H.: Search-and-discover in mobile p2p network databases. In: Proc. of Int. Conf. on Distributed Computing Systems (2006)Google Scholar
  69. 69.
    Yin, L., Cao, G.: Supporting cooperative caching in ad hoc networks. IEEE Transactions on Mobile Computing 5(1) (2006)Google Scholar
  70. 70.
    Zahn, T.: Structured peer-to-peer services for mobile ad hoc networks. Phd thesis, Freien University Berlin (2006)Google Scholar
  71. 71.
    Zahn, T., Schiller, J.: Mapnas: A lightweight, locality-aware peer-to-peer based name service for manets. In: Proc. of LCN, pp. 499–500. IEEE Computer Society, Washington, DC, USA (2005). DOI http://dx.doi.org/10.1109/LCN.2005.87
  72. 72.
    Zahn, T., Schiller, J.: Dht-based unicast for mobile ad hoc networks. In: Proc. of PerCom (2006). URL http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1598963
  73. 73.
    Zhu, Y., Rexford, J., Bavier, A., Feamster, N.: Ufo: A resilient layered routing architecture. In: Technical Report TR-780-07, Princeton University (2007)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Marcel C. Castro
    • 1
  • Andreas J. Kassler
    • 1
  • Carla-Fabiana Chiasserini
    • 2
  • Claudio Casetti
    • 2
  • Ibrahim Korpeoglu
    • 3
  1. 1.Department of Computer ScienceKarlstads UniversityKarlstadSweden
  2. 2.Dipartimento di ElettronicaPolitecnico di TorinoTorinoItaly
  3. 3.Department of Computer EngineeringBilkent UniversityAnkaraTurkey

Personalised recommendations