Peer to Peer Applications in Ad hoc Networks Author: Jesús Hijas Networking Laboratory Helsinki University of Technology Supervisor:

Slides:



Advertisements
Similar presentations
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Advertisements

Vishal K. Singh, Henning Schulzrinne
TU/e Service Discovery Mechanisms: two case studies / IC2002 Service Discovery Mechanisms: Two case studies Control point Device UPnP Terminal Domain Host.
Roma 17/10/08 WORLD Project KO Meeting Laura Galluccio WORLD Project – KO Meeting University of Catania.
Slide 1/11 Jose Costa-Requena, Raimo Kantola, Nicklas Beijar / MobileMAN M1/ Eurecom MobileMAN Workshop 1 Eurecom Jose Costa-Requena,
Applicability of Instant Messaging in the Military Command and Control Systems Author: Juha Vermaja Superviser: Jorma Jormakka Instructor: Marko Luoma,
Design and Implementation of the OLSR Protocol in an Ad Hoc Framework Juan Gutiérrez Plaza Supervisor: Raimo Kantola Instructor: José Costa Requena Networking.
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Gnutella 2 GNUTELLA A Summary Of The Protocol and it’s Purpose By
1 Improving the Performance of Distributed Applications Using Active Networks Mohamed M. Hefeeda 4/28/1999.
Sang-Chun Han Hwangjun Song Jun Heo International Conference on Intelligent Hiding and Multimedia Signal Processing (IIH-MSP), Feb, /05 Feb 2009.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.
PERA PER sonal A ssistance Engin Deveci Computer Engineering Department Bogazici University Can Komar Computer Engineering Department.
A Distributed Search Service for Peer-to-Peer File Sharing in Mobile Application Presented by Tony Sung On Loy, MC Lab, CUHK IE 1 A Distributed Search.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
SIMPLEStone – A presence server performance benchmarking standard SIMPLEStone – A presence server performance benchmarking standard Presented by Vishal.
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
Agenda Introduction to 3GPP Introduction to SIP IP Multimedia Subsystem Service Routing in IMS Implementation Conclusions.
Presence Vishal Kumar Singh and Henning Schulzrinne Feb 10, 2006.
Submission October 2011 doc.:IEEE /1517r0 Santosh Abraham, Qualcomm Incorporated Efficient Device and Service Discovery for Peer-to-Peer (P2P)
Wireless Ad Hoc VoIP Thesis by: Patrick Stuedi & Gustavo Alonso Presentation by: Anil Kumar Marukala & Syed Khaja Najmuddin Ahmed.
Study of the Relationship between Peer to Peer Systems and IP Multicasting From IEEE Communication Magazine January 2003 學號 :M 姓名 : 邱 秀 純.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Description and Lookup of Media-Stream Adaptation Services Andreas Schorr, Franz Hauck Dept. of Distributed Systems, University of Ulm, Germany
Cs423-cotter1 P2P Discovering P2P (Miller) Internet.
Throughput: Internet scenario
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Introduction of P2P systems
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
X one. Mobile development platform We mobilize your process IP. ALARMS AUTOMOTION.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
03/09/2003Helsinki University of Technology1 Overview of Thesis Topic Presented By: Zhao Xuetao.
Implementing Universal Plug And Play In Smart Objects And Intelligent Appliances Bengt Christensson CTO Axis Communications.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
An Efficient Approach for Content Delivery in Overlay Networks Mohammad Malli Chadi Barakat, Walid Dabbous Planete Project To appear in proceedings of.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
A NAMED DATA NETWORKING FLEXIBLE FRAMEWORK FOR MANAGEMENT COMMUNICATION Authors: Daneil Corjuo and Rui L. Aguiar Ivan Vidal and Jamie Garcia-Reinoso Presented.
1/30 Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks Wireless and Sensor Network Seminar Dec 01, 2004.
Performance of HTTP Application in Mobile Ad Hoc Networks Asifuddin Mohammad.
MobileMAN Internal meetingHelsinki, June 8 th 2004 NETikos activity in MobileMAN project Veronica Vanni NETikos S.p.A.
Hybrid Cellular-Ad hoc Data Network Shuai Zhang, Ziwen Zhang, Jikai Yin.
Microelectronic Systems Institute Leandro Soares Indrusiak Manfred Glesner Ricardo Reis Lookup-based Remote Laboratory for FPGA Digital Design Prototyping.
INTERNET AND ADHOC SERVICE DISCOVERY BY: NEHA CHAUDHARY.
Intrusion Tolerant Software Architectures Bruno Dutertre, Valentin Crettaz, Victoria Stavridou System Design Laboratory, SRI International
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
WLAN In Disaster and Emergency Response (WIDER) MidTerm Presentation.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Improving SLP Efficiency and Extendability by Using Global Attributes and Preference Filters Weibin Zhao Henning Schulzrinne
Topic 6, Lesson 3: The Internet Computer Communications and Networking.
“Real” Internet delays and routes  What do “real” Internet delay & loss look like?  Traceroute program: provides delay measurement from source to router.
Skype.
WIDER 3 WiFi in Disaster and Emergency Response Anders Bäck Muhammad Ali Beyhan Kochali Xin Bai David Tlahuetl WiFi in Disaster and Emergency Response.
1 Implementation of IMS-based S-CSCF with Presence Service Jenq-Muh Hsu and Yi-Han Lin National Chung Cheng University Department of Computer Science &
Speaker Dr. Saloua CHETTIBI Lecturer at University of Jijel
An IP-based multimedia traffic generator
Mohammad Malli Chadi Barakat, Walid Dabbous Alcatel meeting
Peer-to-peer networking
MobileMAN Workshop 2 Cambridge 2 –
Chapter 2 Introduction Application Requirements VS. Transport Services
File Transfer Issues with TCP Acceleration with FileCatalyst
Beyond FTP & hard drives: Accelerating LAN file transfers
Presentation transcript:

Peer to Peer Applications in Ad hoc Networks Author: Jesús Hijas Networking Laboratory Helsinki University of Technology Supervisor: Professor Raimo Kantola Instructor: LSc. José Costa- Requena HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Outline Problem overview –Ad Hoc Networks –Peer to Peer applications P2P architectures Study of the problem –Limitations when using P2P applications in Ad Hoc networks. Solution –P2P application proposal for Ad Hoc networks Verification –Tests and results Conclusions HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Problem The problem to be solved in this Thesis is how to discover and use Peer to Peer applications in Ad Hoc networks. We also study their performance and scalability problems when running in nodes that are part of an Ad Hoc network. HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Problem (II) Ad Hoc networks are wireless, self-organizing systems that provide functionality without infrastructure support. Peer to Peer (P2P) applications are those that do not rely on elements as servers or clients Inherent symbiosis: –P2P applications: distributed, running in the nodes of the network, not in central servers –Ad hoc networks: all nodes are peers (equals) that have to act both as clients and servers (P2P paradigm). HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Problem (III) P2P architectures: Centralized (e.g. Napster) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Problem (IV) P2P architectures: Distributed and unstructured (e.g. Gnutella) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Problem (V) P2P architectures: Distributed but structured (e.g. Kazaa) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Study of the problem Problem description: to achieve the goal of this Thesis, we need to study which problems appear when integrating P2P applications and Ad Hoc networks: –Service Discovery: P2P architecture is fully distributed, which means that applications are available in concrete nodes of the network and not centralized in servers. In Ad Hoc networks, one node does not know the others beforehand. Thus, applications have to be discovered before they can be used. –P2P architecture: should not rely on central nodes, since in Ad Hoc networks one node can be down at anytime. –P2P applications: may act both as client and server with high reliability. HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Solution We need to implement a Service Discovery mechanism so that peers can find each other and the services they provide. It will be implemented over UPnP. –Chosen among others such as JINI, Salutation, SLP, etc. P2P architecture must be distributed and unstructured. P2P application must include both client and server entities in a single piece of software that will run in every node in the Ad Hoc network. HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Solution (II) P2P application proposal for Ad Hoc networks: –P2P application: Presence Service. Chosen among others such as Instant Messaging, Voice over IP, file sharing, etc. due to its simplicity. Will run over SIP. –Service Discovery module: in charge of solving the problem of service discovery in Ad Hoc networks. Will run over UPnP. HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Solution (III) P2P application proposal for Ad Hoc networks: design of the system. HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas HTTP, TCP, IP, SSDP, UDP, XML…SIP

Solution (IV) Presence Service functionality: –Service that allows the user to know about the reachability, availability and willingness of communication of another user (i.e. his status). –Users subscribe to others’ presence information. –When the presence status of one user changes, it has to notify all the subscribers this user has. HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Solution (V) UPnP functionality: –We use UPnP discovery step, in which control points and devices multicast SSDP discovery messages (to address ). HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Verification Tests scope: estimate the performance of the P2P application developed in a real Ad Hoc Network. Test method: prepare test cases with different number of nodes in the network and measure the total traffic generated by the application in one node. Test conclusions: consider scalability problems based on the results obtained in the tests and the previous analytic study. HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Verification (II) The Ad Hoc network is formed by iPAQ PDAs with with one wireless adapter Linux OS Wireless link bandwidth: 2Mbps 1 iPAQ 3900 and 2 iPAQ 3800 HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Verification (III) Analytic study: –Excluding unavoidable traffic, such as IGMP, TCP or ARP, the total traffic of the application is: –SIP traffic, T SIP, is the number of SIP messages sent by one node. –UPnP traffic, T UPnP, varies with the expression: –With: CC = Value of control-cache header N = number of nodes in the network N tx = number of transmissions of one packet HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Verification (IV) Tests case 1: one node in the network –Scope: measure the UPnP traffic in one iPAQ when it does not interact with other devices and estimate the value of CC to complete the analytic formula. –Results: –CC: time between UPnP announcements (expiration time) Test case 1UPnPTotal Time between first and last packet (sec)6,7197,348 Packets2933 Avg. Traffic (Kbit/s) 910 HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Verification (V) Analytic study: –We will assume no UPnP retransmissions, i.e. –With these data the general analytic model for the traffic of the application is: –The capacity consumed by the application is: –Considering the average UPnP packet size measured in the test cases (309 bytes): HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Verification (VI) Test case 2: two nodes in the network. Scenario. HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Verification (VII) Test case 2: capture. HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Verification (VIII) Test case 2: Traffic. HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Verification (IX) Test case 2: Result analysis. –Initial IGMP and ARP traffic. –SIP traffic (red) is very low compared to UPnP traffic (green). –Data and comparison: –Analytic results for test case 2: HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas Test case 2SIPUPnPTotal Avg. Traffic (Kbit/s) 12224

Verification (X) Test case 3: three nodes in the network. Scenario. HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Verification (XI) Test case 3: Traffic. HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Verification (XII) Test case 3: Result analysis. –IGMP and ARP traffic peaks in the initialization. –UPnP traffic: predomines during all the test. –SIP traffic (red) is very low. –Total traffic increases softly compared to test case 1. –Data: –Analytic results for test case 3: HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas Test case 3SIPUPnPTotal Avg. Traffic (Kbit/s) 13536

Verification (XIII) Result analysis: HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Verification (XIV) Result analysis: –If we consider the total capacity of the channel provided by the wireless card in the iPAQ devices (2Mbit/s), we could accept that the Presence application would consume the 20% of this capacity. Therefore, the maximum acceptable capacity of the application in one device would be: –This maximum is reached with 37 nodes in the network. This number can be taken as the maximum acceptable number of nodes in the Ad Hoc network so that the application is efficient. HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Conclusions In this Thesis we have developed a Peer to Peer application that will run in an Ad Hoc network. Attending to the results got, we can conclude that Peer to Peer applications are suitable for Ad Hoc networks, providing a fully-distributed service and automatic service discovery in every node, without relying in central servers and with a reasonable scalability. Possible future work: –Reducing the UPnP traffic to improve the scalability of the application. –Integrating the Presence Service with any other P2P application such as VoIP or IM to allow users a wider way of communication. HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Questions? HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

Thank you HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas