• Tidak ada hasil yang ditemukan

Mobile Peer to Peer Computing for Next Generation Distributed Environments Advancing Conceptual and Algorithmic Applications pdf pdf

N/A
N/A
Protected

Academic year: 2019

Membagikan "Mobile Peer to Peer Computing for Next Generation Distributed Environments Advancing Conceptual and Algorithmic Applications pdf pdf"

Copied!
561
0
0

Teks penuh

(1)
(2)

Mobile Peer-to-Peer

Computing for Next

Generation Distributed

Environments:

Advancing Conceptual and

Algorithmic Applications

Boon-Chong Seet

Auckland University of Technology, New Zealand

Hershey • New York

(3)

Director of Editorial Content: Kristin Klinger Senior Managing Editor: Jamie Snavely Managing Editor: Jeff Ash Assistant Managing Editor: Carole Coulson Typesetter: Chris Hrobak Cover Design: Lisa Tosheff Printed at: Yurchak Printing Inc.

Published in the United States of America by

Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue,

Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: cust@igi-global.com

Web site: http://www.igi-global.com/reference

and in the United Kingdom by

Information Science Reference (an imprint of IGI Global) 3 Henrietta Street

Covent Garden London WC2E 8LU Tel: 44 20 7240 0856 Fax: 44 20 7379 0609

Web site: http://www.eurospanbookstore.com

Copyright © 2009 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.

Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark.

Library of Congress Cataloging-in-Publication Data

Mobile peer-to-peer computing for next generation distributed environments: advancing conceptual and algorithmic applications / Boon-Chong Seet, editor. p. cm.

Includes bibliographical references and index.

Summary: "This book is dedicated to the coverage of research issues, findings, and approaches to Mobile P2P computing from both conceptual and algorithmic perspectives"--Provided by publisher.

ISBN 978-1-60566-715-7 (hbk.) -- ISBN 978-1-60566-716-4 (ebook) 1. Peer-to-peer architecture (Computer networks) 2. Mobile communication systems. I. Seet, Boon-Chong,

TK5105.525.M63 2009 004.6'52--dc22

2009001030

British Cataloguing in Publication Data

A Cataloguing in Publication record for this book is available from the British Library.

(4)

Editorial Advisory Board

Ouri Wolfson, University of Illinois at Chicago, USA

Takahiro Hara, Osaka University, Japan

Jiannong Cao, Hong Kong Polytechnic University, Hong Kong

Hsiao-Hwa Chen, National Sun Yat-Sen University, Taiwan

Aaron Harwood, University of Melbourne, Australia

John F. Buford, Avaya Labs Research, USA

List of Reviewers

Chintada Suresh, Motorola Research Labs, Bangalore, India

Thadpong Pongthawornkamol, University of Illinois at Urbana-Champaign, USA

Kurt Tutschku, University of Vienna, Austria

Thomas Repantis, Akamai Technologies, USA

James Walkerdine, Lancaster University, UK

Wei Wu, National University of Singapore, Singapore

Spyridon Tompros, University of the Aegean, Greece

Dawoud Dawoud, University of KwaZulu-Natal, South Africa

Norihiro Ishikawa, Service and Solution Development Department, NTT Docomo Inc, Japan

Alf Inge Wang, Norwegian University of Science and Technology, Norway

Erkki Harjula, University of Oulu, Finland

Jie Feng, University of Nebraska-Lincoln, USA

Raphael Kummer, Distributed Computing Group, Université de Neuchâtel, Switzerland

Tobias Hossfeld, University of Würzburg, Germany

Fotis Loukos, Aristotle University of Thessaloniki, Greece

Antonio Tadeu Azevedo Gomes, National Laboratory for Scientific Computing (LNCC), Brazil Leonardo B. Oliveira, State University of Campinas (UNICAMP), Brazil

Franca Delmastro, Institute for Informatics and Telematics, National Research Council, Italy

Li Li, Communications Research Centre, Canada

(5)

Foreword ... xvi

Preface ...xviii

Acknowledgment ... xxiv

Section I

Information Retrieval and Dissemination

Chapter I

P2P Information Lookup, Collection, and Distribution in Mobile Ad-Hoc Networks ... 1

Raphaël Kummer, University of Neuchâtel, Switzerland Peter Kropf, University of Neuchâtel, Switzerland Pascal Felber, University of Neuchâtel, Switzerland

Chapter II

Data Dissemination and Query Routing in Mobile Peer-to-Peer Networks ... 26

Thomas Repantis, University of California, Riverside, USA Vana Kalogeraki, University of California, Riverside, USA

Section II

Overlay and Mobility Management

Chapter III

Overlay Construction in Mobile Peer-to-Peer Networks ... 51

Jie Feng, University of Nebraska-Lincoln, USA Lisong Xu, University of Nebraska-Lincoln, USA

(6)

Chapter IV

Mobility Support in a P2P System for Publish/Subscribe Applications ... 68

Thomas Kunz, System and Computer Engineering, Carleton University, Canada Abdulbaset Gaddah, System and Computer Engineering, Carleton University, Canada Li Li, Communications Research Centre, Canada

Chapter V

P2P over MANETs: Application and Network Layers’ Routing Assessment ... 94 Leonardo B. Oliveira, University of Campinas (UNICAMP), Brazil

Isabela G. Siqueira, Federal University of Minas Gerais (UFMG), Brazil Daniel F. Macedo, Université Pierre et Marie Curie-Paris VI, France José M. Nogueira, Federal University of Minas Gerais (UFMG), Brazil Antonio A. F. Loureiro, Federal University of Minas Gerais (UFMG), Brazil

Section III

Cooperative Mechanisms

Chapter VI

Enabling Cooperation in MANET-Based Peer-to-Peer Systems ... 118

Fotis Loukos, Aristotle University of Thessaloniki, Greece Helen Karatza, Aristotle University of Thessaloniki, Greece

Chapter VII

Cooperation Strategies for P2P Content Distribution in Cellular Mobile Networks:

Considering Selfishness and Heterogeneity ... 132

Tobias Hoßfeld, University of Würzburg, Germany Daniel Schlosser, University of Würzburg, Germany Kurt Tutschku, University of Vienna, Austria

Phuoc Tran-Gia, University of Würzburg, Germany

Chapter VIII

Cooperation Strategies for P2P Content Distribution in Cellular Mobile Networks:

Considering Mobility and Heterogeneity ... 152

Tobias Hoßfeld, University of Würzburg, Germany Michael Duelli, University of Würzburg, Germany Dirk Staehle, University of Würzburg, Germany Phuoc Tran-Gia, University of Würzburg, Germany

Chapter IX

Peer-Based Collaborative Caching and Prefetching in Mobile Broadcast ... 166

Wei Wu, Singapore-MIT Alliance, and School of Computing, National University of Singapore, Singapore

(7)

Section IV Resource Management

Chapter X

Wireless Peer-to-Peer Media Streaming: Incentives and Resource Management Issues ... 190

Mark Kai-Ho Yeung, The University of Hong Kong, Hong Kong Yu-Kwong Kwok, Colorado State University, USA

Chapter XI

Incentives for Resource Sharing in Ad Hoc Networks: Going Beyond Rationality ... 218

Panayotis Antoniadis, Université Pierre et Marie Curie, Paris 6, France

Section V Security

Chapter XII

Key Management for Dynamic Peer Groups in Mobile Ad Hoc Networks ... 241

Johann van der Merwe, University of KwaZulu-Natal, South Africa Dawoud Dawoud, University of KwaZulu-Natal, South Africa

Chapter XIII

A Tool Supported Methodology for Developing Secure Mobile P2P Systems ... 283

James Walkerdine, Lancaster University, UK Peter Phillips, Lancaster University, UK Simon Lock, Lancaster University, UK

Section VI Standards and Protocols

Chapter XIV

Integration and Interworking of Fixed and Mobile P2P Systems ... 302

Spyridon L. Tompros, University of the Aegean, Greece

Chapter XV

Peer-to-Peer SIP for Mobile Computing: Challenges and Solutions ... 326

Erkki Harjula, MediaTeam Oulu Group, University of Oulu, Finland Jani Hautakorpi, Ericsson Research Nomadiclab, Jorvas, Finland

Nicklas Beijar, Department of Communications and Networking, TKK, Helsinki University of Technology, Espoo, Finland

(8)

Section VII

Architectures and Platforms

Chapter XVI

Mobile P2P in Cellular Mobile Networks: Architecture and Performance ... 349

Kurt Tutschku, University of Vienna, Austria Andreas Berl, University of Passau, Germany Tobias Hossfeld, University of Würzburg, Germany Hermann de Meer, University of Passau, Germany

Chapter XVII

Peer-to-Peer Networking Platform and Its Applications for Mobile Phones ... 374

Norihiro Ishikawa, NTT DOCOMO, Japan Hiromitsu Sumino, NTT DOCOMO, Japan Takeshi Kato, NTT DOCOMO, Japan Johan Hjelm, Ericsson Research, Japan Shingo Murakami, Ericsson Research, Japan Kazuhiro Kitagawa, Keio University, Japan Nobuo Saito, Komazawa University, Japan

Chapter XVIII

Evaluation Platform for Large Scale P2P Mobile Ad-hoc Networks ... 397

Raphaël Kummer, University of Neuchâtel, Switzerland Peter Kropf, University of Neuchâtel, Switzerland

Jean-Frédéric Wagen, TIC Institute, University of Applied Sciences of Fribourg, Switzerland Timothée Maret, TIC Institute, University of Applied Sciences of Fribourg, Switzerland

Section VIII Applications and Services

Chapter XIX

Mobile Peer-to-Peer Collaborative Framework and Applications ... 415

Alf Inge Wang, Norwegian University of Science and Technology, Norway

Chapter XX

Service Discovery Approaches to Mobile Peer-to-Peer Computing ... 437 Antônio Tadeu A. Gomes, National Laboratory for Scientific Computing (LNCC), Brazil Artur Ziviani, National Laboratory for Scientific Computing (LNCC), Brazil

(9)

Chapter XXI

Context-Aware P2P Over Opportunistic Networks ... 460

Marco Conti, IIT Institute – CNR, Pisa, Italy Franca Delmastro, IIT Institute – CNR, Pisa, Italy Andrea Passarella, IIT Institute – CNR, Pisa, Italy

Compilation of References ... 481

About the Contributors ... 518

(10)

Foreword ... xvi

Preface ...xviii

Acknowledgment ... xxiv

Section I

Information Retrieval and Dissemination

This section includes two chapters that look at the issue of information retrieval and dissemination, each exploring a different approach to addressing the issue.

Chapter I

P2P Information Lookup, Collection, and Distribution in Mobile Ad-Hoc Networks ... 1

Raphaël Kummer, University of Neuchâtel, Switzerland Peter Kropf, University of Neuchâtel, Switzerland Pascal Felber, University of Neuchâtel, Switzerland

This chapter presents an enhanced Distributed Hash Table (DHT) to facilitate information retrieval (or lookup), and a new multicast tree construction algorithm built on top of the proposed DHT to

con-struct a multicast tree distribution infracon-structure for efficient information dissemination in mobile ad hoc

networks.

Chapter II

Data Dissemination and Query Routing in Mobile Peer-to-Peer Networks ... 26

Thomas Repantis, University of California, Riverside, USA Vana Kalogeraki, University of California, Riverside, USA

This chapter proposes to adaptively disseminate special information called content synopses and

presents a content-driven routing protocol that utilizes this information to efficiently guide the queries

for actual content or information retrieval.

(11)

Section II

Overlay and Mobility Management

This section includes three chapters covering overlay construction, mobility support in overlay networks in the context of publish/subscribe systems, and performance study of P2P overlay and MANET routing protocols.

Chapter III

Overlay Construction in Mobile Peer-to-Peer Networks ... 51

Jie Feng, University of Nebraska-Lincoln, USA Lisong Xu, University of Nebraska-Lincoln, USA

Byrav Ramamurthy, University of Nebraska-Lincoln, USA

This chapter reviews P2P overlay construction techniques for mobile networks, including tree- and

mesh-based mobile P2P streaming networks. The authors also discuss advanced design issues, such as session mobility, robustness to high churn, incentive mechanism and content integrity, with relation to managing mobility in P2P overlays.

Chapter IV

Mobility Support in a P2P System for Publish/Subscribe Applications ... 68

Thomas Kunz, System and Computer Engineering, Carleton University, Canada Abdulbaset Gaddah, System and Computer Engineering, Carleton University, Canada Li Li, Communications Research Centre, Canada

This chapter examines the issue of subscriber mobility in publish/subscribe systems and presents a new mobility support solution through proactive context distribution, which is shown to perform better in terms of message loss/duplication, processing overhead and handoff latency than the conventional reactive approach.

Chapter V

P2P over MANETs: Application and Network Layers’ Routing Assessment ... 94 Leonardo B. Oliveira, University of Campinas (UNICAMP), Brazil

Isabela G. Siqueira, Federal University of Minas Gerais (UFMG), Brazil Daniel F. Macedo, Université Pierre et Marie Curie-Paris VI, France José M. Nogueira, Federal University of Minas Gerais (UFMG), Brazil Antonio A. F. Loureiro, Federal University of Minas Gerais (UFMG), Brazil

(12)

Section III

Cooperative Mechanisms

This section includes four chapters devoted to discussing the different mechanisms and applications of peer-to-peer cooperation in mobile networks.

Chapter VI

Enabling Cooperation in MANET-Based Peer-to-Peer Systems ... 118

Fotis Loukos, Aristotle University of Thessaloniki, Greece Helen Karatza, Aristotle University of Thessaloniki, Greece

This chapter outlines the current methods for cooperation in standard and MANET-based P2P networks. The authors also describe a number of use cases to illustrate the potential of peer-to-peer cooperation technology for mobile networks, including for such applications as knowledge sharing and social networking.

Chapter VII

Cooperation Strategies for P2P Content Distribution in Cellular Mobile Networks:

Considering Selfishness and Heterogeneity ... 132

Tobias Hoßfeld, University of Würzburg, Germany Daniel Schlosser, University of Würzburg, Germany Kurt Tutschku, University of Vienna, Austria

Phuoc Tran-Gia, University of Würzburg, Germany

This chapter identifies selfish peers as a factor that degrades performance of P2P content distribution

systems in cellular mobile networks and studies several cooperation strategies, including a new strategy

CyPriM proposed by the authors to improve performance in the presence of selfish peers and heteroge

-neous peer resources.

Chapter VIII

Cooperation Strategies for P2P Content Distribution in Cellular Mobile Networks:

Considering Mobility and Heterogeneity ... 152

Tobias Hoßfeld, University of Würzburg, Germany Michael Duelli, University of Würzburg, Germany Dirk Staehle, University of Würzburg, Germany Phuoc Tran-Gia, University of Würzburg, Germany

This chapter extends the discussion in the preceding chapter to consider the impact of mobility and vertical handover in a B3G network. The authors evaluate solutions such as mobile IP in the context of P2P content distribution, and present new strategies to manage mobility and improve utilization of scarce resources in such heterogeneous networks.

Chapter IX

Peer-Based Collaborative Caching and Prefetching in Mobile Broadcast ... 166

Wei Wu, Singapore-MIT Alliance, and School of Computing, National University of Singapore, Singapore

(13)

This chapter reviews the problem of cooperative cache management in mobile environments that support data broadcast, and presents two peer-to-peer based schemes: CPIX and ACP for caching and pre-fetching information, respectively, to improve the data availability and access latency in mobile environments.

Section IV Resource Management

This section includes two chapters on methods to foster resource sharing among peers: one in the context of P2P media streaming in hybrid wireless networks; the other on general resource sharing in ad-hoc networks.

Chapter X

Wireless Peer-to-Peer Media Streaming: Incentives and Resource Management Issues ... 190

Mark Kai-Ho Yeung, The University of Hong Kong, Hong Kong Yu-Kwong Kwok, Colorado State University, USA

This chapter focuses on energy cost sharing in wireless P2P media streaming, and presents two energy

efficient protocols based on game-theoretic concepts to improve collaboration and streaming performance

of peers in hybrid wireless networks.

Chapter XI

Incentives for Resource Sharing in Ad Hoc Networks: Going Beyond Rationality ... 218

Panayotis Antoniadis, Université Pierre et Marie Curie, Paris 6, France

This chapter presents the case for social incentives to be used to foster resource sharing in ad hoc net-works, and proposes a new cross-layer concept that considers both social and economic solutions in application layer and network layer, respectively, in the design of incentive mechanisms.

Section V Security

This section includes two chapters that concern security: one relates to the design of group key management schemes for mobile ad hoc networks; the other looks at the development of secure mobile P2P applications.

Chapter XII

Key Management for Dynamic Peer Groups in Mobile Ad Hoc Networks ... 241

(14)

This chapter provides a comprehensive coverage of conventional group key management schemes for dynamic peer groups, and discusses their design challenges and potential for MANET through an analysis of their communication and computation costs.

Chapter XIII

A Tool Supported Methodology for Developing Secure Mobile P2P Systems ... 283

James Walkerdine, Lancaster University, UK Peter Phillips, Lancaster University, UK Simon Lock, Lancaster University, UK

This chapter presents a development tool that considers the user’s security, mobility, and P2P technology

requirements, and proposes a suitable system architecture and sub-system designs for developing secure

mobile P2P applications.

Section VI Standards and Protocols

This section includes two chapters that cover current standards and protocols of interest to the research and development of mobile P2P systems.

Chapter XIV

Integration and Interworking of Fixed and Mobile P2P Systems ... 302

Spyridon L. Tompros, University of the Aegean, Greece

This chapter discusses the relevance of ITU standard architecture for next generation networks, and

presents an overlay architecture for integrating P2P systems in interoperable fixed-mobile environments based

on the IP Multimedia Sub-system (IMS) technology.

Chapter XV

Peer-to-Peer SIP for Mobile Computing: Challenges and Solutions ... 326

Erkki Harjula, MediaTeam Oulu Group, University of Oulu, Finland Jani Hautakorpi, Ericsson Research Nomadiclab, Jorvas, Finland

Nicklas Beijar, Department of Communications and Networking, TKK, Helsinki University of Technology, Espoo, Finland

Mika Ylianttila, MediaTeam Oulu Group, University of Oulu, Finland

(15)

Section VII

Architectures and Platforms

This section includes three chapters on new architectures and platforms, including a new content-distribution architecture for cellular networks, a P2P networking platform for mobile phones, and a platform for emulation of P2P algorithms for MANET.

Chapter XVI

Mobile P2P in Cellular Mobile Networks: Architecture and Performance ... 349

Kurt Tutschku, University of Vienna, Austria Andreas Berl, University of Passau, Germany Tobias Hossfeld, University of Würzburg, Germany Hermann de Meer, University of Passau, Germany

This chapter first discusses the current incompatibilities between cellular mobile and P2P networks,

and then presents a new P2P architecture for cellular mobile networks using content-distribution as an example application. The authors also investigate extensively the proposed architecture using analytical and simulation-based evaluation.

Chapter XVII

Peer-to-Peer Networking Platform and Its Applications for Mobile Phones ... 374

Norihiro Ishikawa, NTT DOCOMO, Japan Hiromitsu Sumino, NTT DOCOMO, Japan Takeshi Kato, NTT DOCOMO, Japan Johan Hjelm, Ericsson Research, Japan Shingo Murakami, Ericsson Research, Japan Kazuhiro Kitagawa, Keio University, Japan Nobuo Saito, Komazawa University, Japan

This chapter describes the architecture and protocols of a new P2P networking platform for mobile phones, and discusses the experimentation of the platform using three classes of mobile phone ap-plications namely, multimedia content search, instant messaging over Bluetooth, and remote access to networked home appliances.

Chapter XVIII

Evaluation Platform for Large Scale P2P Mobile Ad-hoc Networks ... 397

Raphaël Kummer, University of Neuchâtel, Switzerland Peter Kropf, University of Neuchâtel, Switzerland

Jean-Frédéric Wagen, TIC Institute, University of Applied Sciences of Fribourg, Switzerland Timothée Maret, TIC Institute, University of Applied Sciences of Fribourg, Switzerland

(16)

Section VIII Applications and Services

This section includes three chapters that look at the development of collaborative applications, service discovery, and context-awareness in mobile P2P services.

Chapter XIX

Mobile Peer-to-Peer Collaborative Framework and Applications ... 415

Alf Inge Wang, Norwegian University of Science and Technology, Norway

This chapter describes the Peer2Me software framework for developing P2P applications that support collaboration on mobile phones with JavaME and Bluetooth. The authors also illustrate the potential use of the framework through a portfolio of developed applications that demonstrate a wide spectrum of collaborative functions.

Chapter XX

Service Discovery Approaches to Mobile Peer-to-Peer Computing ... 437 Antônio Tadeu A. Gomes, National Laboratory for Scientific Computing (LNCC), Brazil Artur Ziviani, National Laboratory for Scientific Computing (LNCC), Brazil

Luciana S. Lima, National Laboratory for Scientific Computing (LNCC), Brazil Markus Endler, Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Brazil

This chapter presents a comprehensive coverage and comparative analysis of the current service dis-covery approaches in P2P systems for a variety of mobile networks, including infrastructured wireless networks, single-hop and multi-hop ad hoc networks.

Chapter XXI

Context-Aware P2P Over Opportunistic Networks ... 460

Marco Conti, IIT Institute – CNR, Pisa, Italy Franca Delmastro, IIT Institute – CNR, Pisa, Italy Andrea Passarella, IIT Institute – CNR, Pisa, Italy

This chapter discusses the use of context to enhance distributed services in opportunistic networks, and

describes two context management architectures and their use in a context-aware opportunistic file

sharing application that considers not only the social context of user, but also the utility of data objects for the context the user is in.

Compilation of References ... 481

About the Contributors ... 518

(17)

xvi

Foreword

We are witnessing an explosive growth in the number of mobile computing devices, including smart phones, personal assistant devices, and sensors, and in wireless communication technologies and capa-bilities. Despite such growth, systems in which the devices collaborate directly to process information, namely mobile P2P systems, are in their infancy.

This does not mean that research on the subject has not been done, but that the problem is very

difficult. An example of an MP2P application that has been worked on for more than twenty years is routing, which is important in the digital battlefield, vehicular networks, and others. The problem is to

route messages between a sender and a receiver that are out of each other’s transmission range, using the mobile devices as intermediaries. Despite the extensive amount of work on this problem, it is not solved yet.

Furthermore, not all reasons for the slow start on mobile P2P systems are technological. For example, data broadcasting is a well understood mechanism that is technologically easy to implement and can facilitate mobile P2P systems development and deployment. Some of the chapters in this book discuss broadcasting. Yet it is not implemented by existing cellular service providers.

Nevertheless, technology is a major stumbling block. The technological challenges include resource constraints on the mobile device, security and privacy, variable and/or disconnected network topology,

and heterogeneity of devices. More specifically, it is hard to build systems when energy, memory, CPU

power, and bandwidth resources are constrained on each one of the devices participating in the P2P system. Furthermore, the wireless medium is easier to tap into, and the devices are harder to protect physically. Thus, serious security and privacy concerns arise. Additionally, many mobile P2P systems cannot rely on an infrastructure for wireless communication among the devices. For example, an infrastructure

of-ten does not exist in a battlefield. Thus, such systems depend on direct collaboration among the mobile devices via short-range wireless networks, which is difficult when mobility and failures continuously

change the set of neighbors with which a node can directly communicate.

This book addresses the technological challenges. It describes the problems, some existing solutions,

and proposes new ones. The first section deals with the problem of finding information in a network

lacking an infrastructure. Observe that this is different than the routing problem. It is harder in the sense that even the identity of the receiver, that is the location of information, is unknown; but easier in the sense that the information may be replicated and therefore routing to a single receiver is often not strictly

necessary. The proposed solutions combine query and information dissemination in an intelligent way. P2P methods have been quite successful in the fixed world, and the second section explores adaptation

(18)

xvii

deal with the resource constraints, and it discusses incentives and mechanisms for cooperation. Section V discusses the critical topic of security, and sections VI, VII, and VIII discuss strategies that facilitate the development of mobile P2P systems. These strategies include standards, software tools, platforms, programming paradigms, service provision and discovery, and protocols.

Overall, the book is an invaluable resource for both researchers and practitioners. It addresses the most important issues in mobile P2P systems, it is well organized, very readable, comprehensive, and presented at the right level of depth. It strikes a good balance between presentation of novel ideas, and survey of the state of the art.

Ouri Wolfson

University of Illinois, USA

Ouri Wolfson’s main research interests are in database systems, distributed systems, and mobile/pervasive computing. He received his PhD degree in Computer Science from Courant Institute of Mathematical Sciences, New York University. He is currently the Richard and Loan Hill professor of Computer Science at the University of Illinois at Chicago, where he directs

the Mobile Information Systems Research Center. He is also an affiliate professor in the Department of Computer Science at

(19)

xviii

Preface

Computing systems are playing an essential role as an indispensable nervous system of modern society.

The ubiquitous use of computing systems for the operation of our society, such as in our banking, public

transportation, and healthcare systems, and in our daily lives for meeting our personal learning, entertain-ment and productivity needs, has resulted in them being of fundaentertain-mental importance to keeping our modern

society alive and thriving. The subsequent trend of integrating computing systems with communication

networks such as the Internet further extended the reach of computing systems beyond geographical boundaries, ushering in an era of networked computing systems.

Computer-mediated communication for distant human-to-human interaction, that is computer tele-phony systems, has become a cost-effective alternative to traditional telephone networks (Yarberry, 2002).

Distant human-to-machine interaction has also benefited from the advent of networked computing, such

as by enabling remote access to computing resources such as shared printers and databases. More recently, machine-to-machine (M2M) interaction has been a subject of interest in networked computing where ma-chines leverage on their network (wired or wireless) connectivity to directly interact with each other and in some cases make their own decisions without human intervention (Lawton, 2004).

Networked computing systems have traditionally been based on the client-server model (Goodyear et al., 1999). In this architecture, the network consists of a server, typically a high-performance com-puter, and a group of clients. The server is the only provider of resources or services in the network,

while the clients only request for resources or the execution of services from the server. It is apparent

that each addition of a new client to the network is a new load added to the server. As the number of clients grows, the server capacity must increase to avoid becoming a bottleneck in the system. It is also apparent that in this model, the server represents a single point of failure in the network, and thus can be a major cause of downtime and a vulnerable target for security attacks.

In recent years, the development of networked computing has evolved from the centralized and hier-archical model of client-server computing to encompass a more decentralized and distributed model

of peer-to-peer (P2P) computing (Subramanian & Goodman, 2005). Using the widely-accepted definition

by Schollmeier (2001), P2P is a network where the participants share a part of their own resources, which can be hardware resources such as processing power, storage capacity, network link capacity, printers,

and so forth, or software resources such as media content, (e.g., pictures, videos and music files, and other

(20)

xix

Due to its promising potential to resolve the above issues of scalability and fault-tolerance in

client-server computing, this radical and contrasting approach to computing has gained significant attention

from both industry and academic research communities, and is suited for applications that have a mass of users in complex open distributed environments such as the Internet. Today, P2P technologies have

been widely embraced by Internet users, and are best exemplified by popular file sharing systems such as

eMule or BitTorrent, and Voice-over-P2P (VoP2P) applications such as Skype. Other emerging applications based on P2P that are gaining popularity include live or on-demand media (TV and video) streaming

ap-plications, for example, Joost, Zattoo, and PPLive (Krieger & Schwessinger, 2008; Mushtaq, & Ahmed,

2008; Akkanen, Karonen, & Porio, 2008), and large-scale distributed online storage systems such as Wuala (Caleido AG, 2008), which provides its users with free online storage service for private or shared data by exploiting the unused disk space of participating computers on the Internet.

In a parallel development with Internet P2P computing from late 1990s, the landscape of telecom-munications also experienced profound changes with the rapid proliferation of a plethora of wireless technologies ranging from technologies for wide area networks (e.g., UMTS, HSDPA, HSPA+), metro-politan area networks (e.g., Mobile WiMAX [802.16e], Mobile-Fi [802.20]), local area networks (e.g., 802.11a/g/n/p/s), personal area networks (e.g., Bluetooth, ZigBee, WiMedia), to more recently regional area networks based on emerging cognitive radios (802.22). Today, wireless-enabled laptops and PDAs, and cellular handsets with Internet access have become widely available and increasingly affordable. It

is also not uncommon to find multi-mode terminals where computing devices or handsets have multiple

modes of wireless connectivity such as 3G UMTS, WiFi (802.11) and Bluetooth. These technological advances are believed to have fueled the uptake of a mobile lifestyle where the daily lives of people are increasingly empowered by and dependent on wireless technologies. For instance, the increasing need of people to stay connected to the Internet at anytime from anywhere for work or for play. This brings forth a

prediction that a significant portion of future users of P2P systems will be mobile, which calls for a need

to investigate the suitability of developed P2P technologies for mobile and wireless networks, such as mobile cellular networks, infrastructured wireless local area networks (WLAN), and the infrastructure-less mobile ad hoc networks (MANET).

Early investigations along this direction (such as Klemm, Lindemann, & Waldhorst, 2004; Ding & Bhargava, 2004) for MANET, and (such as Eberspächer, Schollmeier, Zöls, Kunzmann, & Für, 2004)

for a heterogeneous mobile and fixed environment, have shown that contemporary P2P technologies performed neither well nor efficiently as they were designed for a relatively stable and resource-rich

environment where hosts are stationary, well-endowed (i.e., in terms of processing power, memory, and energy) and connected by high bandwidth links. Thus, research is needed to innovate new approaches

to P2P computing in a mobile environment. Specifically, the design of the mobile P2P systems should

address the new challenges of dynamic changes in connectivity and resource availability, the new con-straints in mobile devices as well as wireless capacity, and respond to these concon-straints and changes in an intelligent, timely, and adaptive manner. However, the research possibilities of Mobile P2P computing

are not limited to extending conventional P2P systems to perform effectively and efficiently under mobile conditions, but include, for instance, turning the new constraints into strengths by finding new usages of unique characteristics of mobile P2P, or creating new patterns of collaboration and sharing that can

potentially move mobile applications and services into a new dimension for next generation distributed environments.

This book is dedicated to the coverage of research issues, findings, and approaches to mobile P2P

(21)

xx

experts in the field, and guided by an Editorial Advisory Board of prominent international researchers, the overall aim of this book is to serve as a valuable resource that captures the present state of the field, and to

inspire ideas for future challenges through presenting the latest insights and thoughts of expert researchers on major topics of this emerging discipline.

The key contribution of this book is in providing a much needed body of knowledge on mobile P2P computing in a single reference source, which to the best of our knowledge, is still largely missing from currently available book titles. Through a careful selection of topics that address some of the most

important and essential issues in the field, including topics of both theoretical (e.g., models, algorithms, architectures) and practical interests (e.g., tools, platforms, applications), this book seeks to fill the gap

in available titles with its dedicated and comprehensive coverage on mobile P2P computing. Readers

would also benefit from the scholarly value of the book through its balanced and quality coverage of

theoretical ideas and practical research. This book therefore comes as a timely contribution to the growing

and flourishing research community in mobile P2P computing.

The book is intended to provide an up-to-date advanced reading of important topics for academic researchers, graduate students, and senior undergraduate students in computer science, electrical and electronic engineering, and telecommunications, to enhance their research or studies. It is also intended for industry professionals such as R&D engineers, application developers, and technology business

managers who wish to keep abreast of the recent developments in the field, and who are interested or

involved in the research, use, design, development, and deployment of mobile P2P technologies. This book is organized into eight sections comprising a total of 21 chapters. Each section addresses

a specific topic area or relates to works of a specific nature. Under each section, the chapters are gener

-ally self-contained, thus readers are not required to read in the order in which they are listed, but could

focus directly on those chapters that interest them. The following is a summary of contents covered in each section, including a brief description of each chapter listed under the section.

Section I: Information Retrieval and Dissemination

This section includes two chapters that look at the issue of information retrieval and dissemination, each exploring a different approach to addressing the issue.

Chapter I presents an enhanced Distributed Hash Table (DHT) to facilitate information retrieval (or lookup), and a new multicast tree construction algorithm built on top of the proposed DHT to

construct a multicast tree distribution infrastructure for efficient information dissemination in mobile

ad hoc networks.

Chapter II proposes to adaptively disseminate special information called content synopses and

presents a content-driven routing protocol that utilizes this information to efficiently guide the queries

for actual content or information retrieval.

Section II: Overlay and Mobility Management

This section includes three chapters covering overlay construction, mobility support in overlay net-works in the context of publish/subscribe systems, and performance study of P2P overlay and MANET

routing protocols. Specifically:

Chapter III reviews P2P overlay construction techniques for mobile networks, including tree- and

(22)

xxi

Chapter IV examines the issue of subscriber mobility in publish/subscribe systems and presents a new mobility support solution through proactive context distribution, which is shown to perform better in terms of message loss/duplication, processing overhead and handoff latency than the conventional reactive approach.

Chapter V investigates the performance of three MANET routing protocols: AODV, DSR, and DSDV under a Gnutella P2P network, and two P2P overlay protocols: Gnutella and Chord, over MANET with AODV as the underlying routing protocol through extensive computer simulations.

Section III: Cooperative Mechanisms

This section includes four chapters devoted to discussing the different mechanisms and applications of peer-to-peer cooperation in mobile networks.

Chapter VI outlines the current methods for cooperation in standard and MANET-based P2P networks. The authors also describe a number of use cases to illustrate the potential of peer-to-peer cooperation technol-ogy for mobile networks, including for such applications as knowledge sharing and social networking.

Chapter VII identifies selfish peers as a factor that degrades performance of P2P content distribution

systems in cellular mobile networks and studies several cooperation strategies, including a new strategy

CyPriM proposed by the authors to improve performance in the presence of selfish peers and heteroge

-neous peer resources.

Chapter VIII extends the discussion in the preceding chapter to consider the impact of mobility and vertical handover in a B3G network. The authors evaluate solutions such as mobile IP in the context of P2P content distribution, and present new strategies to manage mobility and improve utilization of scarce resources in such heterogeneous networks.

Chapter IX reviews the problem of cooperative cache management in mobile environments that support data broadcast, and presents two peer-to-peer based schemes: CPIX and ACP for caching and pre-fetching information, respectively, to improve the data availability and access latency in mobile environments.

Section IV: Resource Management

This section includes two chapters on methods to foster resource sharing among peers: one in the con-text of P2P media streaming in hybrid wireless networks; the other on general resource sharing in ad-hoc networks.

Chapter X focuses on energy cost sharing in wireless P2P media streaming, and presents two energy

efficient protocols based on game-theoretic concepts to improve collaboration and streaming performance

of peers in hybrid wireless networks.

Chapter XI present the case for social incentives to be used to foster resource sharing in ad hoc networks, and proposes a new cross-layer concept that considers both social and economic solutions in application layer and network layer, respectively, in the design of incentive mechanisms.

Section V: Security

This section includes two chapters that concern security: one relates to the design of group key man-agement schemes for mobile ad hoc networks; the other looks at the development of secure mobile P2P applications.

(23)

xxii

Chapter XIII presents a development tool that considers the user’s security, mobility, and P2P

tech-nology requirements, and proposes a suitable system architecture and sub-system designs for developing

secure mobile P2P applications.

Section VI: Standards and Protocols

This section includes two chapters that cover current standards and protocols of interest to the research

and development of mobile P2P systems. Specifically:

Chapter XIV discusses the relevance of ITU standard architecture for next generation networks, and

presents an overlay architecture for integrating P2P systems in interoperable fixed-mobile environments

based on the IP Multimedia Sub-system (IMS) technology.

Chapter XV reviews the current IETF standard for P2P-SIP (Session Initiation Protocol), which is designed to serve as a lightweight P2P based protocol for communication, session management, and service provisioning in infrastructured mobile networks such as wireless LAN and 3G cellular networks.

Section VII: Architectures and Platforms

This section includes three chapters on new architectures and platforms, including a new content-distri-bution architecture for cellular networks, a P2P networking platform for mobile phones, and a platform for emulation of P2P algorithms for MANET.

Chapter XVI first discusses the current incompatibilities between cellular mobile and P2P networks,

and then presents a new P2P architecture for cellular mobile networks using content-distribution as an example application. The authors also investigate extensively the proposed architecture using analytical and simulation-based evaluation.

Chapter XVII describes the architecture and protocols of a new P2P networking platform for mobile phones, and discusses the experimentation of the platform using three classes of mobile phone applications namely, multimedia content search, instant messaging over Bluetooth, and remote access to networked home appliances.

Chapter XVIII presents Freemote, a Java-based emulation platform that could integrate emulated and real nodes such as the Berkeley motes to enable large-scale emulation of P2P algorithms for MA-NET with a high level of realism.

Section VIII: Applications and Services

This section includes three chapters that look at the development of collaborative applications, service

dis-covery, and context-awareness in mobile P2P services. Specifically:

Chapter XIX describes the Peer2Me software framework for developing P2P applications that sup-port collaboration on mobile phones with JavaME and Bluetooth. The authors also illustrate the potential use of the framework through a portfolio of developed applications that demonstrate a wide spectrum of collaborative functions.

Chapter XX presents a comprehensive coverage and comparative analysis of the current service discovery approaches in P2P systems for a variety of mobile networks, including infrastructured wire-less networks, single-hop and multi-hop ad hoc networks.

Chapter XXI discusses the use of context to enhance distributed services in opportunistic networks,

and describes two context management architectures and their use in a context-aware opportunistic file

(24)

xxiii

REFERENCES

Akkanen, J., Karonen, O., & Porio, J. (2008). Peer-to-peer video streaming on mobile phones, In Pro-ceedings of the IEEE Consumer Communications and Networking Conference.

Caleido AG (2008). Wuala – The social online storage, Retrieved December 28, 2008, from http://

wuala.com/en/

Ding, G., & Bhargava, B. (2004). Peer-to-peer file-sharing over mobile ad hoc networks. In Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops. Eberspächer, J., Schollmeier, R., Zöls, S., Kunzmann, G., & Für, L. (2004). Structured P2P networks in

mobile and fixed environments, In Proceedings of the International Working Conference on Performance

Modeling and Evaluation of Heterogeneous Networks.

Goodyear, M. et al., (1999).Netcentric and client/server computing: A practical guide. USA: Auerbach Publications.

Klemm, A., Lindemann, C., & Waldhorst, O. P. (2004). Peer-to-peer computing in mobile ad hoc networks. In Proceedings of the 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

Krieger, U. R., & Schwessinger, R. (2008). Analysis and quality assessment of peer-to-peer IPTV systems. In Proceedings of the IEEE International Symposium on Consumer Electronics (ISCE).

Lawton, G. (2004). Machine-to-machine technology gears up for growth. Computer,37(9), 12-15. Mushtaq, M., & Ahmed, T. (2008). P2P-based mobile IPTV: Challenges and opportunities. In Proceed-ings of the IEEE/ACS International Conference on Computer Systems and Applications.

Schollmeier, R. (2001). A definition of peer-to-peer networking for the classification of peer-to-peer

architecture and applications. In Proceedings of the First International Conference on Peer-to-Peer Computing.

Subramanian, R., & Goodman, B. D. (Eds.). (2005). Peer-to-peer computing: The evolution of a disruptive technology. Hershey, PA: Idea Group Publishing.

(25)

xxiv

The editor would like to express his sincere appreciation and gratitude to all who have rendered sup-port in one way or another to this year-long book project, without which this book could not have been

satisfactorily completed. The editor would like to first thank members of the Editorial Advisory Board

for their support and help in this project, despite their demanding work schedules and commitments. The editor would also like to thank all who are involved in the review process of the book, which includes most of the chapter authors in this book who also served as referees for chapters written by other authors. Special thanks must also go to a number of individuals who volunteered their time to serve as external referees and offered some of the most comprehensive, critical, and constructive comments in their reviews. They are: Thadpong Pongthawornkamol of University of Illinois at Urbana-Champaign; Chintada Suresh of Motorola Research Labs; Dr. Aaron Harwood of University of Melbourne; and Dr. John Buford, a Research Scientist at Avaya Labs Research.

Grateful acknowledgement must also be given to the publishing team at IGI Global for its

contribu-tions throughout the whole process from setting up a website for my initial call for chapters to the final

publication of the book. In particular, the editor is most grateful to Julia Mosemann for her assistance

throughout the development process of the book and her consistently quick responses to my many questions and requests via e-mail.

I am also grateful to professor Wen-Jing Hsu, whose encouragement and kind words motivated me to initially accept the challenge of taking on this project. Last but not least, I would also like to thank my parents for their moral support and encouragement over the years, which have been instrumental in getting me to where I am today.

In closing, I sincerely wish to thank all of the authors for sharing their research insights, ideas, and experiences through their excellent chapter contributions to this book.

Boon-Chong Seet Editor, PhD

Auckland, New Zealand December 2008

(26)
(27)

Section I

(28)

1

Chapter I

P2P Information Lookup,

Collection, and Distribution in

Mobile Ad-Hoc Networks

Raphaël Kummer

University of Neuchâtel, Switzerland

Peter Kropf

University of Neuchâtel, Switzerland

Pascal Felber

University of Neuchâtel, Switzerland

Copyright © 2009, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.

ABSTRACT

(29)

2

P2P Information Lookup, Collection, and Distribution in Mobile Ad-Hoc Networks

INTRODUCTION

Wireless technologies have become ubiquitous,

providing improved connectivity in urban areas and also allowing outlying areas to connect to information networks. Now almost everyone makes use of wireless technologies to surf the web using portable phones or computers. The well-known applications they rely on are spread over wide areas and the number of service access points has increased exponentially.

In addition to phone calls and web surfing,

many other applications are available on wireless enabled devices. They may take the form of

ad-hoc networks requiring no specific infrastructures

such as access points, and where these devices produce a self-organized mesh network in which each node able to communicate directly with its closest physical neighbors.

Despite the various types of devices and communication standards on which they are based, networking infrastructures and devices are all subject to the same limitations. The main concerns are limited resources and energy, and also practicality, such as movement and deploy-ment almost anywhere. Most often the devices are small, simple and battery powered, and make use of limited resources (i.e., memory and CPU). Related to these, communications generate non-negligible costs leading to an overall reduction in network lifetimes. At this time, communication

between remote nodes requires multiple hops via

relay nodes, because nodes can only communi-cate directly with their physical neighbors (i.e., the nodes located in its communication range), although they may listen to all the messages transiting within its physical neighborhood.

As new devices with ad-hoc networking ca-pacities and enhanced resources become devel-oped their use is extended well beyond original functions related to wide-area monitoring. New developments now allow information lookup

and multicasting, requiring novel and efficient

solutions.

The focus in this chapter is lookup and

multi-casting mechanisms able to efficiently locate and

distribute information in mobile ad-hoc networks (MANETs). The basic concept applied to achieve these objectives involves peer-to-peer (P2P)

para-digms, which can be roughly classified as either

structured or unstructured.

Unstructured approaches such as Gnutella or KaZaA (Kirk, 2003; KaZaA, 2008) typically

have neither control over topology nor file place -ment, meaning they often rely on locating data by

simply flooding the network and thus overloading

it. Unstructured approaches such as these have not been adapted for MANETs because locating the desired content involves too many transmissions and too much energy. Moreover, scaling them can

prove difficult (Oliveira et al., 2005).

Structured solutions on the other hand consist of specialized placement algorithms designed to

assign the responsibility for each content unit (file) to a specific node and then efficiently locate the files using directed search protocols, requiring

only limited communication. They are mostly based on distributed hash tables (DHTs) that locate

each item and node by means of a unique key

identity, producing a logical space. The nodes are thus arranged according to their logical key and are only responsible for an item located at the small-est logical distance from them. Another feature is

provided so that a node responsible for a specific key can be located without flooding and without

producing false negatives (i.e., a search fails only

if no matching file exists in the system).

(30)

3 P2P Information Lookup, Collection, and Distribution in Mobile Ad-Hoc Networks

logical neighborhood through expensive multiple hop paths, thus making simple mapping from a DHT design to ad-hoc networks unrealistic.

Similarly, solutions based on flooding will not

attain acceptable performance levels when dis-tributing content to a subset of interested nodes. Indeed in the MANET approach, all nodes are forced to participate, even when not interested in the distributed content. This leads to ineffective solutions and poor performance, with the network

quickly becoming overloaded and consuming

a lot of energy and bandwidth. Flooding might also be used to build a shortest-path spanning

tree, except that while flooding is reduced, inef

-ficient use of already limited resources results, given that many nodes are not interested in the

content. Furthermore, some flooding is still re

-quired to build the tree, and no efficient solution

for locating the multicast group is available to the content provider. Scribe (Rowstron, Kermarrec, Castro, & Druschel, 2001) for example, superim-poses a structured overlay substrate on top of the physical network and is able to construct more

efficient multicast trees. Here multicast trees are rooted in “rendezvous” nodes managed by an underlying Pastry DHT. The nodes interested in joining a multicast group route a request via

Pastry towards the source and connect to the first

member reached on their way to the rendezvous point. While it is perhaps an effective strategy in wired networks, it cannot be easily transposed to mobile ad-hoc networks where communication is multi-hop and physical proximity is an essential consideration.

In this chapter, we thus present a DHT lookup

algorithm specifically designed for MANETs. It

combines a minimalist overlay structure with an

adaptive routing mechanism that is able to quickly

locate the content. As in well-known wired ap-proaches such as Chord or Pastry, the nodes are organized in a logical ring. Yet, no long-range links are created for the logical shortcuts, given

the prohibitive maintenance costs involved. Al-ternatively, the physical neighborhood of the

nodes traversed by requests provides low-cost shortcuts that are able to quickly converge at

their destination within the logical space. We also propose extensions that consider an extra level of visibility in the physical neighborhood (neighbors of neighbors) and memorizing

previ-ous requests to dynamically identify and exploit

possible shortcuts.

We then present an algorithm for building multicast trees in mobile ad-hoc networks using this specialized lightweight DHT overlay. A tree is created by the source (i.e. the multicast group),

which can be efficiently located by searching the DHT. Several techniques of connecting adjacent

nodes to a physically close member are proposed, along with extensions able to reduce the number of relay nodes involved in message distribution.

We conducted simulations on both lookup and multicast algorithms to evaluate their per-formance in various scenarios. We did not take

churns (nodes frequently joining and leaving the

system) into account because we were primarily

interested in evaluating their lookup efficiency

and the structural properties of the multicast trees produced. Our results indicate that the DHT algorithm performs very well in MANETs and that the multicast tree-building algorithm produces well-structured trees, comprising of only a limited number of relay nodes. Moreover, both algorithms scale well to large networks.

The remainder of this chapter is organized as follows. The Background section discusses

related approaches. The DistributedHashTable for Mobile Ad-hoc Networks section presents

the ad-hoc DHT algorithm in detail, including evaluation results. The Building Multicast Trees in Mobile Ad-hoc Networks section describes and

(31)

4

P2P Information Lookup, Collection, and Distribution in Mobile Ad-Hoc Networks

BACKGROUND

In this section, we provide an overview of various approaches related to the algorithms presented. We begin with the DHT paradigms and then explore the various methods of multicasting in mobile ad-hoc networks.

Existing Distributed Hash Tables

for MANETs

Peer-to-peer overlays have emerged from file

sharing applications placed on top of the Internet, leveraged by the IP protocol routing infrastruc-ture and its intrinsic peer-to-peer properties. In MANETs the situation is different since the path between nodes may traverse many relay nodes not being part of the overlay. Furthermore, two nodes are directly connected only if they are physical neighbors (i.e., within communication range of each other). As discussed in the introduction, the DHT paradigm, including its regular topology

(often a ring) and shortcuts (fingers) introduced

at the overlay layer make direct mapping to

ad-hoc networks particularly difficult. Found in

literature are various approaches to carrying out these mappings.

Although GRACE (Global Replication And Consistency) (Bosneag & Brockmeyer, 2005) was

not specifically designed with ad-hoc networks in

mind, it does enable mobile collaboration through combining DHT properties with layered architec-ture. GRACE also supports mobility in wide-area networks and different layers or consistency levels are interconnected through “consistency neighbors” logically located in close proximity

to each other. Requests are routed along these

neighbors and the system’s lookup algorithm is based on Pastry (Rowstron & Druschel, 2001). This approach still relies on the standard Internet infrastructure.

(Pucha et al., 2004b) implement Pastry on top of the routing protocol DSR (Dynamic Source Routing) used by MANETs (Johnson & Maltz,

1996). Three modifications are suggested and can

be compared to implementation on the Internet:

(1) the node joining procedure is modified by

expanding the ring search in order to locate dis-tinguished bootstrap nodes in charge of arrivals; (2) to reduce network load the Pastry ping metric is replaced by a distance metric; and (3) the DSR

protocol is modified to inquire about the proximity

used in the adapted Pastry routing.

Ekta (Pucha, Das, & Hu, 2004a) and MAD-Pastry (Zahn & Schiller, 2005) integrate the DHT paradigm with ad-hoc network routing. Both approaches introduce the functions needed at the network routing layer. The principal idea of Ekta is to move the DHT protocol from the overlay level to the MANET network layer, applying one-to-one mapping between IP addresses and logical (DHT) node IDs. MADPastry is then built on top of the AODV protocol (Ad-hoc On-demand Vector Routing) (Perkins & Belding-Royer, 1999). The purpose of this protocol is to avoid full broadcasts as much as possible, because in ad-hoc networks this becomes too costly when the entire network is targeted. MADPastry creates clusters composed of physically close nodes that also share a

com-mon overlay prefix. Given physical and logical

closeness of that the nodes in a cluster, routing is based on the logical overlay node IDs.

The disadvantage of all the aforementioned approaches is the size of their routing table and the complexity involved when setting up and managing connections with all the nodes con-tained in them.

(Cramer et al., 2005) suggest the chord-based Proximity Neighbor Selection strategy (PNS-CHORD), in which nodes are connected to their logical successors on the ring and through logical shortcuts to further nodes, the way Chord usu-ally does. These logical long-range neighbors are chosen according to their physical proximity in the ad-hoc network and are located either one or two steps away.

(32)

5 P2P Information Lookup, Collection, and Distribution in Mobile Ad-Hoc Networks

cal path pursued by a request traverses the same

node several times. This can only be prevented

when nodes keep track of the requests that pass them and that subsequently adjust their routing tables in the event that the same request passes

twice, but on different logical shortcuts.

Cell Hash Routing (CHR) (Araujo, Rodrigues, Kaiser, Liu, & Mitidieri, 2005) is a specialized ad-hoc form of DHT. To construct a DHT, CHR uses position information clusters instead of organizing individual nodes in the overlay. This approach groups nodes according to their physi-cal location, and the routing between clusters is done by position-based routing using the GPSR (Karp & Kung, 2000) routing algorithm. A major limitation of this approach is that nodes are ad-dressed in clusters and not individually.

Finally, (Caesar, Castro, Nightingale, O’Shea, & Rowstron, 2006) suggest Virtual Ring Routing

(VRR), a DHT solution for MANETs that is quite

similar to that presented in this chapter and which also targets combining ad-hoc routing and logical DHT-like addressing. However, their algorithm differs from ours in several ways. First, in their approach, they build and proactively maintain bidirectional routes between nodes, while we

always try to find the best route at each node and then send the request along the selected path,

making the most of local situations. Second, VRR also maintains existing routes in a proactive way. While our solution does not maintain existing routes, previous routing decisions are kept in a cache and can thus be reactivated when appro-priate. Finally in an effort to improve routing, VRR nodes make use of information about the physical paths traversing the nodes. Based on our experiments however any improvement achieved is only minimal. In fact, these cached entries are

only effective when a request’s path goes through

the node that recorded them. In the DHT shown, the nodes also capture communications from any nodes in the physical neighborhood. The

infor-mation acquired thus implicitly includes routing

decisions and therefore allows paths to avoid

tra-versing the same physical area twice. It should be noted that no communication overhead is needed to capture this information, given the nature of that wireless networks (i.e. radio transmissions) allow it to be captured for free.

Related MANET Multicasting

Solutions

Several P2P approaches to multicasting have been suggested for ad-hoc networks, with some using a logical overlay substrate for locating sources and

others relying on flooding. Here we only discuss a

selection of approaches available in the literature that closely resemble the presented algorithm (see (Chen & Wu, 2003) for a good survey).

In ad-hoc networks there are various logical structures used to facilitate appropriate tree con-struction. To build a multicast tree, MZR (Devara-palli & Sidhu, 2001) relies on the Zone Routing

Protocol (Haas, 1997). The nodes in ZRP define

the area around them and proactively maintain routes to all nodes within that zone. When the destination is outside the sender’s zone, a reac-tive route discovery protocol is used, and when a source has data to multicast, it advertises this to all the nodes in its zone, and then extends the tree to nodes located at the border of other zones. An interested node simply answers the source and then a branch is created when the message reaches a multicast group member. Although the zone

structure contains the flooding needed to build the tree, it still floods the entire network zone by zone. Not only does this results in significant

bandwidth and energy consumption, the protocol provides no generic lookup facilities as used in our algorithm by the DHT.

(33)

6

P2P Information Lookup, Collection, and Distribution in Mobile Ad-Hoc Networks

bandwidth. XScribe exploits the DHT’s routing ca-pacities to distribute multicast messages, wherein each source has to know all group members and then multicast messages directly to them using a unicast method. This approach thus does not scale well, nor does it make any attempt to optimize resource consumption (minimizing the number of relay nodes or the number of transmissions

required).

Georendezvous relies on CHR (Araujo et al., 2005), a specialized ad-hoc DHT that groups nodes in clusters according to their physical location.

The DHT is used to efficiently locate the cell

responsible for a group, and the cell’s nodes can manage group membership and forward the mul-ticast messages to all the members. Membership management is centralized in a cell containing multiple nodes, which are also responsible for distributing multicast messages. The disadvan-tage of this approach lies in its high bandwidth

and energy requirements, thus resulting in poor

scalability.

Other than flooding, many solutions have been proposed to efficiently look up a key (data)

in MANETs. No mention is made of transpos-ing existtranspos-ing direct search algorithms to ad-hoc networks, since when creating the logical overlay no attention was given to the physical proximity of nodes. Other approaches adapted for ad-hoc networks unfortunately involve large routing tables or pathological situations, wherein a

re-quest passes repeatedly through the same node

or network area.

As in the DHT algorithms, flooding is not a

suitable solution to distributing content to a set of multicast group members. A large number of nodes do in fact have to participate without being interested in the distributed content, a problem that also appears in certain approaches adapted for MANETs. Given that communication is fairly expensive, it is important that the number of relays be minimized. Other solutions also suffer from

centralized membership management, a technique

requiring extensive memory resources and also

leading to network congestion during multicast distribution.

The following section describes DHT and multicast tree-building algorithms that target

efficient information lookup and distribution in

MANETs.

DISTRIBUTED HASH TABLE FOR

MOBILE AD-HOC NETWORKS

In a DHT system, each node and key has a

spe-cific position within a logical identifier space,

thus creating a logical overlay superimposed on the physical network. The keys are mapped to nodes according to proximity metrics in the logical space, thus allowing any node to use this DHT substrate to determine the current live node responsible for a given key. Chord (Stoica et al., 2001) for example connects each node to its closest neighbors (successor and predecessor)

in the identifier space, thus organizing nodes into

a logical ring. This neighborhood always allows traversing the entire ring, albeit at a very high cost. These connections are necessary however

and sufficient to ensure the system’s safety and

reliability. Additionally, each node has a number

of long-range neighbors called fingers, used to maintain liveliness properties and efficient look -ups. They are located at exponentially increasing distances within the logical space, and with these

links, a node can quickly reach remote locations:

the expected path length of a lookup is expressed by O(logN) hops, where N is the number of nodes in the system.

Gambar

Figure 5. Average number of logical hops per decrease the total number of physical steps required
Table 4. Percentage of relay nodes involved in mul-ticast tree with direct request or DHT lookup
Figure 2(ii). Multi-level Bloom filter: The filter of each level is appended to that of the previous level
Figure 2. Basic architecture of Mobile P2P net-networks (Adapted from Gruber et al., 2004) works (Adapted from Gruber et al., 2004)
+7

Referensi

Dokumen terkait

Pada kenyataan yang sebenarnya, variabel pointer berisi alamat dari suatu obyek lain (yaitu obyek yang dikatakan ditunjuk oleh pointer).. Sebagai contoh, px adalah variabel pointer

Makalah disampaikan pada Pelatihan Terpadu Manajemen Perpustakaan Modern, September 1996 Universitas Kristen Petra.. Yogyakarta:

Pendidikan Jasmani dan Kesehatan .Jakarta : Departermen Pendidikan dan Kebudayaan Direktorat Jenderal Pendidikan Tinggi Proyek Pembinaan Tenaga Kependidikan.. Penerapan

yang didapatkan mempengaruhi seseorang untuk bersikap dan memiliki suatu niat dalam tanggap bencana, akan tetapi pada akhirnya belum tentu seseorang mau melakukan tindakan

Berdasarkan hasil kajian Badan Penelitian dan Pengembangan Pertanian, lahan di Indonesia yang berpotensi atau sesuai untuk pertanian seluas 94 juta ha, yaitu 25,4 juta ha untuk

Kegiatan ini bertujuan melakukan bimbingan teknis penulisan karya tulis dan publikasi ilmiah terhadap guru-guru yang tergabung dalam MGMP fisika SMA se Sumatera Barat..

Mendapatkan pengalaman dalam pembuatan aplikasi inventori dan hutang-piutang dengan fitur SMS Gateway serta melatihnya untuk dapat berfikir secara utuh dan menyeluruh

2) zona bebas di sekitar jaringan drainase dibebaskan dari kegiatan yang dapat mengganggu kelancaran penyaluran air. pemeliharan dan pengembangan jaringan drainase