Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
VDR: Proactive element Conclusions VDR reaches 3.5% more nodes than VDR-R and 9% more nodes than our modified random walk routing strategy (RWR) VDR shows.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Wide-area cooperative storage with CFS
ICDE A Peer-to-peer Framework for Caching Range Queries Ozgur D. Sahin Abhishek Gupta Divyakant Agrawal Amr El Abbadi Department of Computer Science.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
1 Virtual Direction Routing for Overlay Networks Bow-Nan Cheng Murat Yuksel Shivkumar Kalyanaraman.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
CROSS-ROAD: CROSS-layer Ring Overlay for AD Hoc Networks Franca Delmastro IIT-CNR Pisa Cambridge, March 23 rd 2004.
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
MobileMAN Integration and Experimentation of Legacy Mobile Multihop Ad Hoc Networks Eleonora Borgia, Marco Conti, and Franca Delmastro Institute for Informatics.
Locating Mobile Agents in Distributed Computing Environment.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
1. Efficient Peer-to-Peer Lookup Based on a Distributed Trie 2. Complex Queries in DHT-based Peer-to-Peer Networks Lintao Liu 5/21/2002.
Peer to Peer Network Design Discovery and Routing algorithms
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
An Efficient Implementation of File Sharing Systems on the Basis of WiMAX and Wi-Fi Jingyuan Li, Liusheng Huang, Weijia Jia, Mingjun Xiao and Peng Du Joint.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Author:Zarei.M.;Faez.K. ;Nya.J.M.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
by Saltanat Mashirova & Afshin Mahini
A Scalable content-addressable network
Routing protocols in Mobile Ad Hoc Network
Presentation transcript:

Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing and Communications Workshops, Proceedings of the Second IEEE Annual Conference on March 2004 Page(s):104 – 108 報告 : 羅世豪

Outline 一. Introduction  Broadcast over broadcast 三. Broadcast  DHT over broadcast  DHT over DHT  DHT 七. Conclusion

Introduction (1/6)  Peer-to-peer (P2P) system aims to share information among a large number of users without assistance of explicit servers.  Searching (or application layer routing) algorithm is the central topic.  Napster : uses a central server to maintain index of all information so that every peer should contact the server to lookup the information.  Gnutella : every peer broadcasts its query to all its neighbors. Peers form an overlay topology which might be far different from the underlying physical network topology.  This kind of query ‘flood’ takes too much network bandwidth so that scalability issue arises.

Introduction (2/6)  Distributed Hash Table (DHT) : every file and peer is assigned a unique key by a hash function.  The keys, along with the network address of the peer storing the corresponding files, are evenly distributed among all participating peers.  Each peer maintains a routing table and queries are only directed to those peers in the routing table.

Introduction (3/6)  Mobile ad hoc network (MANET) : an infrastructure-less mobile wireless network  Two mobile nodes communicate with each other through intermediate nodes.  Since there is no explicit server, every mobile node should work autonomously.  Proactive (or table-driven) routing protocols : every mobile node tries to maintain a routing table involving the complete information of network topology.  Needs a lot of computation efforts and communication bandwidth to maintain the accurate routing tables.  Reactive (or on-demand) routing protocols : try to find a route to the destination only when it is necessary.  The route request is broadcasted throughout the whole network, and the route response is returned when a mobile node knows the route to the requested destination or itself is the destination.

Introduction (4/6)  Similar features for both P2P file-sharing networks and MANET 1.No peer acts explicitly as a central server, and every peer collaborate with other peers. 2.The major problem is how to find the requested data or route efficiently. 3.The topology is changing frequently because of peer on-off or mobility. 4.Flooding or broadcasting is employed to some extent in order to exchange data or routing information among different peers, which raises the scalability problem.

Introduction (5/6)  Differences between P2P and MANET. 1.MANET : Focuses on the network and lower layers. P2P : Refers to the application layer. 2.MANET : The peers are mobile and constrained by limited energy, bandwidth and computation power. P2P : Not a big concern. 3.For the execution of broadcast MANET : Physical broadcast. P2P : A single cast network which only generates virtual broadcast consisting of a number of single cast messages.

Introduction (6/6)  This paper proposes five routing approaches combining existing P2P searching protocols and MANET routing protocols. The performance of these approaches are evaluated and compared in terms of routing complexity, scalability, implementation complexity, maintenance complexity, energy efficiency, and so on.

Broadcast over broadcast(1/3)  Broadcast-based P2P file lookup protocol over MANET on-demand network routing protocols.  The file request message at application layer will be broadcasted to every virtual neighbor peer in the P2P overlay.  In order to get the source route to each virtual neighbor, the network routing request is also broadcasted at network layer.

Broadcast over broadcast(2/3) ■ : peer in P2P overlay ● : mobile peer in MANET : routing path at application layer : routing path at network layer : shortest path from source A to destination B

Broadcast over broadcast(3/3)  Easy to be implemented.  Scalability problem due to the double broadcasts.  Incur a lot of energy consumption because every peer should always be aware of requests from all the other peers.  The resultant path is not the shortest path between the source and destination.  The virtual neighbors in P2P overlay might be physically far away from each other.  Complexity : O(n 2 ).  Work temporarily for small MANET.

Broadcast(1/3)  Due to the fact that wireless networks usually employ broadcast to send data even for unicast packets.  The network routing protocols can be skipped when the application packets from the P2P searching protocol are required to be broadcasted.  The virtual neighbors in the P2P overlay can be directly mapped to the physical neighbors.

Broadcast(2/3)

Broadcast(3/3)  This approach removes the virtual overlay in conventional P2P file-sharing systems in order to facilitate direct interaction between applications and underlying wireless networks.  The advantages of this approach are  Simple to be implemented  Shortest path is obtained  Heavy burden on communication bandwidth and power supply for every mobile node due to broadcast.  Complexity : O(n).  This approach is more scalable than the first approach, but sill cannot work for large networks.

DHT over broadcast(1/3)  A DHT-based P2P protocol on top of MANET.  Every file name and peer ID is hashed to a key by standard hash algorithms.  Every peer maintain a routing table of size O(logn)  Each entry directs to an intermediate peer closer to the requested key.  The peer closest to the requested key knows the address of the actual peer storing the requested file.  Using network routing protocols which are usually based on broadcast in MANET to get to these intermediate peers

DHT over broadcast(2/3) ■ : peer in P2P overlay that is on the routing path by DHT-based protocol ● : mobile peer in MANET : routing path at application layer : routing path at network layer : shortest path from source A to destination B

DHT over broadcast(3/3)  The DHT-based protocols introduce complexity in implementation.  MANET peers frequently trigger some stabilization protocols for maintaining the correctness of each routing table due to mobility in underlying physical networks.  Neighbor table involving peers with the nearest keys may also be needed.  Every communication between two peers in P2P overlay involves broadcast-based network routing in MANET network layer in order to get the source route.  Complexity : O(nlogn)

DHT over DHT(1/3)  For the DHT-based network protocol in MANET, the network ID (such as IP address) of every mobile node is hashed to a key and is evenly distributed across the network.  For every entry in a peer A’s routing table, a peer B’s key and the route from A to B are stored.

DHT over DHT(2/3) ■ : peer in P2P overlay that is on the routing path by DHT-based protocol ● : mobile peer in MANET : actual network route in MANET : shortest path from source A to destination B

DHT over DHT(3/3)  Implementation complexity at both P2P overlay and network layer.  The significance of adopting DHT algorithms is the improvement of scalability.  Complexity : O((logn) 2 )  Mobile nodes using DHTbased routing protocols can go to the ‘sleep’ mode periodically so that this approach can be made more energy-efficient.  The mobility of peers requires frequent update of routing tables and neighbor tables at both P2P overlay and MANET network layer.

DHT(1/3)  A single cross-layer DHT routing protocol which can process both file requests and network route requests.  Both the file name and network ID are hashed to the same key space.  When a new file is added, its key is stored at the peer with the closest key value to this file’s key.  Each entry in the routing table contains a pair of key and route.  The routes can be initialized by broadcast.  The table will be periodically updated.

DHT(2/3) : mobile node in each lookup step : intermediate mobile node in every step

DHT(3/3)  By the lookup algorithm of DHT, a request for the route to a mobile node is guaranteed to reach the requested node in O(logn) steps, while a request for a particular file will be directed to the peer with the closest key to the key of this file in O(logn) steps.  The overall routing complexity is O(clogn) in terms of hops  c is a parameter representing the average number of hops in one lookup step.  This DHT approach removes the virtual P2P overlay so that the application-layer file search is integrated to the network-layer routing.

Conclusions (1/2) Broadcast over broadcast BroadcastDHT over broadcast DHT over DHT DHT RoutingO(n2)O(n)O(nlogn)O((logn) 2 )O(logn) ScalabilityBad GoodExcellent ImplementationLow MediumHighMedium MaintenanceLow MediumHighMedium Energy efficiency Low Medium The Shortest Path NoYesNo Cross-layerNoYesNo Yes

Conclusions (2/2)  The cross-layer design coordinates P2P protocols at application layer and routing protocols at network layer, which offers significant performance improvement in Broadcast and DHT approach.  The Broadcast approach can be easily implemented for MANETs of small size.  DHT approach is scalable to large networks. But its routing table and neighborhood table need to be carefully maintained. The proposed approaches apply to any DHT-based algorithms.