Skip to main content
Log in

Mobile hosts participating in peer-to-peer data networks: challenges and solutions

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Peer-to-peer (P2P) data networks dominate Internet traffic, accounting for over 60% of the overall traffic in a recent study. In this work, we study the problems that arise when mobile hosts participate in P2P networks. We primarily focus on the performance issues as experienced by the mobile host, but also study the impact on other fixed peers. Using BitTorrent as a key example, we identify several unique problems that arise due to the design aspects of P2P networks being incompatible with typical characteristics of wireless and mobile environments. Using the insights gained through our study, we present a wireless P2P client application that is backward compatible with existing fixed-peer client applications, but when used on mobile hosts can provide significant performance improvements.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Notes

  1. Note that though we could perform experiments by relying on the “ture” shared-media of the WiFi networks, experimenting under more-controlled environments help filter out other irrelevant factors such as interferences from other WiFi networks.

  2. We assume here that mobile IP [14] is not used to handle mobility.

References

  1. Peer-to-peer. (2005). CacheLogic. http://www.cachelogic.com/home/pages/research/p2p2005.php.

  2. Bittorrent. http://www.bittorrent.org/.

  3. Mandriva distribution. http://www.mandriva.com/en/download.

  4. Fedora distribution. http://fedoraproject.org/en/get-fedora.

  5. Arch linux. http://www.archlinux.org/download/.

  6. Henderson, T., Kotz, D., & Abyzov, I. (2004). The changing usage of a mature campus-wide wireless network. In MobiCom ’04: Proceedings of the 10th annual international conference on Mobile computing and networking. New York, NY, USA.

  7. A new type of radio, Roadcasting. http://www.roadcasting.org/.

  8. Melodeo’s mobile phone p2p to launch, Ringtonia. http://www.ringtonia.com/.

  9. Edonkey. (2000). http://en.wikipedia.org/wiki/EDonkey2000.

  10. Klingberg, T., & Manfredi, R. (2002). Gnutella 0.6, Gnutella Protocol Development. http://rfc-gnutella.sourceforge.net/src/rfc-0-6-draft.html.

  11. Fasttrack. http://en.wikipedia.org/wiki/FastTrack.

  12. Netfilter project. http://www.netfilter.org/.

  13. Torrent server for the fedora project. http://torrent.fedoraproject.org/.

  14. Perkins, C., & Mobile, I. P. (2002). IEEE Communications Magazine, 40(5), 66–82.

    Google Scholar 

  15. Hsieh, H. -Y., Kim, K. -H., & Sivakumar, R. (2003). On achieving weighted service differentiation: An end-to-end perspective. In IEEE IWQoS 03: Proceedings of the international workshop on quality of service. Monterey, CA, USA.

  16. Winpkfilter. http://www.ntkernel.com/.

  17. The network simulator. http://www.isi.edu/nsnam/ns.

  18. Enhanced ctorrent, a lightweight c++ implementation. http://www.rahul.net/dholmes/ctorrent/.

  19. Fall, K. (1999). Network emulation in the vint/ns simulator. In ISCC ’99: Proceedings of the the fourth IEEE symposium on computers and communications. Washington, DC, USA.

  20. Pahdye, J., & Floyd, S. (2001). On inferring tcp behavior. In SIGCOMM ’01: Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications. New York, NY, USA.

  21. Srivatsa, M., Xiong, L., & Liu, L. (2005). Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks. In WWW ’05: Proceedings of the 14th international conference on World Wide Web. New York, NY, USA.

  22. Dellarocas, C. (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In EC ’00: Proceedings of the 2nd ACM conference on electronic commerce. New York, NY, USA.

  23. Lian, Q., Zhang, Z., Yang, M., Zhao, B. Y., Dai, Y., & Li, X. (2007). An empirical study of collusion behavior in the maze p2p file-sharing system. In IEEE ICDCS ’07: Proceedings of 27th IEEE international conference on distributed computing systems.

  24. Zhang, Z., Chen, S., & Yoon, M. (2007). March: A distributed incentive scheme for peer-to-peer networks. In IEEE INFOCOM ’07: Proceedings of the 26th IEEE international conference on computer communications anchorage. Alaska, USA.

  25. Wei, K., Chen, Y. -F., Smith, A. J., & Vo, B. (2006). Whopay: A scalable and anonymous payment system for peer-to-peer environments. In IEEE ICDCS ’06: Proceedings of 27th IEEE international conference on distributed computing systems.

  26. Lu, L., Han, J., Hu, L., Huai, J., Liu, Y., & Ni, L. M. (2007). Pseudo trust: Zero-knowledge based authentication in anonymous peer-to-peer protocols. In IPDPS ’07: Proceedings of the 21th IEEE international parallel and distributed processing symposium.

  27. Qiu, D., & Srikant, R. (2004). Modeling and performance analysis of bittorrent-like peer-to-peer networks. In SIGCOMM ’04: Proceedings of the 2004 conference on applications, technologies, architectures, and protocols for computer communications. New York, NY, USA.

  28. Bharambe, A. R., Herley, C., & Padmanabhan, V. N. (2005). Some observations on bittorrent performance. SIGMETRICS Perform. Eval. Rev.

  29. Legout, A., Liogkas, N., Kohler, E., & Zhang, L. (2007). Clustering and sharing incentives in bittorrent systems. In SIGMETRICS ’07: Proceedings of the 2007 ACM SIGMETRICS international conference on measurement and modeling of computer systems. New York, NY, USA.

  30. Parvez, N., Williamson, C., Mahanti, A., & Carlsson, N. (2008). Analysis of bittorrent-like protocols for on-demand stored media streaming. SIGMETRICS Perform. Eval. Rev.

  31. Conti, M., Gregori, E., & Turi, G. (2005). A cross-layer optimization of gnutella for mobile ad hoc networks. In MobiHoc ’05: Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing. New York, NY, USA.

  32. Huang, C.-M., Hsu, T.-H., & Hsu, M.-F. (2005). A file discovery control scheme for p2p file sharing applications in wireless mobile environments. In ACSC ’05: Proceedings of the twenty-eighth Australasian conference on computer science (pp. 39–47).

  33. Snoeren, A., & Balakrishnan, H. (2000). An end-to-end approach to host mobility. In Proceedings of ACM MOBICOM. Boston, MA, USA.

  34. Zandy, V. C., & Miller, B. P. (2002). Reliable network connections. In MobiCom 02: Proceedings of the 8th annual international conference on mobile computing and networking. New York, NY, USA.

  35. Dwyer, D. & Bharghavan, V. (1997). A mobility-aware file system for partially connected operation. SIGOPS Oper. Syst. Rev.

  36. Krashinsky, R., & Balakrishnan, H. (2002). Minimizing energy for wireless web access with bounded slowdown. In MobiCom ’02. New York, NY, USA.

  37. Anand, M., Nightingale, E. B., & Flinn, J. (2003). Self-tuning wireless network power management. In MobiCom ’03: Proceedings of the 9th annual international conference on mobile computing and networking. New York, NY, USA.

  38. Zhu, H., & Cao, G. (2005). On supporting power-efficient streaming applications in wireless environments. IEEE Transactions on Mobile Computing.

  39. Chandra, S., & Vahdat, A. (2002). Application-specific network management for energy-aware streaming of popular multimedia formats. In Proceedings of the general track: 2002 USENIX annual technical conference. Berkeley, CA, USA.

  40. Yan, H., Krishnan, R., Watterson, S. A., & Lowenthal D. K. (2004). Client-centered energy savings for concurrent http connections. In NOSSDAV ’04: Proceedings of the 14th international workshop on network and operating systems support for digital audio and video. New York, NY, USA.

  41. Korhonen, J., & Wang, Y. (2005). Power-efficient streaming for mobile terminals. In NOSSDAV ’05: Proceedings of the international workshop on network and operating systems support for digital audio and video. New York, NY, USA.

Download references

Acknowledgments

We thank all anonymous reviewers for their valuable comments. This work was supported in part by the National Science Foundation under grant CNS-0519733.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhenyun Zhuang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhuang, Z., Kakumanu, S., Jeong, Y. et al. Mobile hosts participating in peer-to-peer data networks: challenges and solutions. Wireless Netw 16, 2313–2333 (2010). https://doi.org/10.1007/s11276-010-0260-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-010-0260-4

Keywords

Navigation