Abstract
Peer-to-peer (P2P) data networks dominate Internet traffic, accounting for over 60% of the overall traffic in a recent study. In this work, we study the problems that arise when mobile hosts participate in P2P networks. We primarily focus on the performance issues as experienced by the mobile host, but also study the impact on other fixed peers. Using BitTorrent as a key example, we identify several unique problems that arise due to the design aspects of P2P networks being incompatible with typical characteristics of wireless and mobile environments. Using the insights gained through our study, we present a wireless P2P client application that is backward compatible with existing fixed-peer client applications, but when used on mobile hosts can provide significant performance improvements.
Similar content being viewed by others
Notes
Note that though we could perform experiments by relying on the “ture” shared-media of the WiFi networks, experimenting under more-controlled environments help filter out other irrelevant factors such as interferences from other WiFi networks.
We assume here that mobile IP [14] is not used to handle mobility.
References
Peer-to-peer. (2005). CacheLogic. http://www.cachelogic.com/home/pages/research/p2p2005.php.
Bittorrent. http://www.bittorrent.org/.
Mandriva distribution. http://www.mandriva.com/en/download.
Fedora distribution. http://fedoraproject.org/en/get-fedora.
Arch linux. http://www.archlinux.org/download/.
Henderson, T., Kotz, D., & Abyzov, I. (2004). The changing usage of a mature campus-wide wireless network. In MobiCom ’04: Proceedings of the 10th annual international conference on Mobile computing and networking. New York, NY, USA.
A new type of radio, Roadcasting. http://www.roadcasting.org/.
Melodeo’s mobile phone p2p to launch, Ringtonia. http://www.ringtonia.com/.
Edonkey. (2000). http://en.wikipedia.org/wiki/EDonkey2000.
Klingberg, T., & Manfredi, R. (2002). Gnutella 0.6, Gnutella Protocol Development. http://rfc-gnutella.sourceforge.net/src/rfc-0-6-draft.html.
Fasttrack. http://en.wikipedia.org/wiki/FastTrack.
Netfilter project. http://www.netfilter.org/.
Torrent server for the fedora project. http://torrent.fedoraproject.org/.
Perkins, C., & Mobile, I. P. (2002). IEEE Communications Magazine, 40(5), 66–82.
Hsieh, H. -Y., Kim, K. -H., & Sivakumar, R. (2003). On achieving weighted service differentiation: An end-to-end perspective. In IEEE IWQoS 03: Proceedings of the international workshop on quality of service. Monterey, CA, USA.
Winpkfilter. http://www.ntkernel.com/.
The network simulator. http://www.isi.edu/nsnam/ns.
Enhanced ctorrent, a lightweight c++ implementation. http://www.rahul.net/dholmes/ctorrent/.
Fall, K. (1999). Network emulation in the vint/ns simulator. In ISCC ’99: Proceedings of the the fourth IEEE symposium on computers and communications. Washington, DC, USA.
Pahdye, J., & Floyd, S. (2001). On inferring tcp behavior. In SIGCOMM ’01: Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications. New York, NY, USA.
Srivatsa, M., Xiong, L., & Liu, L. (2005). Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks. In WWW ’05: Proceedings of the 14th international conference on World Wide Web. New York, NY, USA.
Dellarocas, C. (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In EC ’00: Proceedings of the 2nd ACM conference on electronic commerce. New York, NY, USA.
Lian, Q., Zhang, Z., Yang, M., Zhao, B. Y., Dai, Y., & Li, X. (2007). An empirical study of collusion behavior in the maze p2p file-sharing system. In IEEE ICDCS ’07: Proceedings of 27th IEEE international conference on distributed computing systems.
Zhang, Z., Chen, S., & Yoon, M. (2007). March: A distributed incentive scheme for peer-to-peer networks. In IEEE INFOCOM ’07: Proceedings of the 26th IEEE international conference on computer communications anchorage. Alaska, USA.
Wei, K., Chen, Y. -F., Smith, A. J., & Vo, B. (2006). Whopay: A scalable and anonymous payment system for peer-to-peer environments. In IEEE ICDCS ’06: Proceedings of 27th IEEE international conference on distributed computing systems.
Lu, L., Han, J., Hu, L., Huai, J., Liu, Y., & Ni, L. M. (2007). Pseudo trust: Zero-knowledge based authentication in anonymous peer-to-peer protocols. In IPDPS ’07: Proceedings of the 21th IEEE international parallel and distributed processing symposium.
Qiu, D., & Srikant, R. (2004). Modeling and performance analysis of bittorrent-like peer-to-peer networks. In SIGCOMM ’04: Proceedings of the 2004 conference on applications, technologies, architectures, and protocols for computer communications. New York, NY, USA.
Bharambe, A. R., Herley, C., & Padmanabhan, V. N. (2005). Some observations on bittorrent performance. SIGMETRICS Perform. Eval. Rev.
Legout, A., Liogkas, N., Kohler, E., & Zhang, L. (2007). Clustering and sharing incentives in bittorrent systems. In SIGMETRICS ’07: Proceedings of the 2007 ACM SIGMETRICS international conference on measurement and modeling of computer systems. New York, NY, USA.
Parvez, N., Williamson, C., Mahanti, A., & Carlsson, N. (2008). Analysis of bittorrent-like protocols for on-demand stored media streaming. SIGMETRICS Perform. Eval. Rev.
Conti, M., Gregori, E., & Turi, G. (2005). A cross-layer optimization of gnutella for mobile ad hoc networks. In MobiHoc ’05: Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing. New York, NY, USA.
Huang, C.-M., Hsu, T.-H., & Hsu, M.-F. (2005). A file discovery control scheme for p2p file sharing applications in wireless mobile environments. In ACSC ’05: Proceedings of the twenty-eighth Australasian conference on computer science (pp. 39–47).
Snoeren, A., & Balakrishnan, H. (2000). An end-to-end approach to host mobility. In Proceedings of ACM MOBICOM. Boston, MA, USA.
Zandy, V. C., & Miller, B. P. (2002). Reliable network connections. In MobiCom 02: Proceedings of the 8th annual international conference on mobile computing and networking. New York, NY, USA.
Dwyer, D. & Bharghavan, V. (1997). A mobility-aware file system for partially connected operation. SIGOPS Oper. Syst. Rev.
Krashinsky, R., & Balakrishnan, H. (2002). Minimizing energy for wireless web access with bounded slowdown. In MobiCom ’02. New York, NY, USA.
Anand, M., Nightingale, E. B., & Flinn, J. (2003). Self-tuning wireless network power management. In MobiCom ’03: Proceedings of the 9th annual international conference on mobile computing and networking. New York, NY, USA.
Zhu, H., & Cao, G. (2005). On supporting power-efficient streaming applications in wireless environments. IEEE Transactions on Mobile Computing.
Chandra, S., & Vahdat, A. (2002). Application-specific network management for energy-aware streaming of popular multimedia formats. In Proceedings of the general track: 2002 USENIX annual technical conference. Berkeley, CA, USA.
Yan, H., Krishnan, R., Watterson, S. A., & Lowenthal D. K. (2004). Client-centered energy savings for concurrent http connections. In NOSSDAV ’04: Proceedings of the 14th international workshop on network and operating systems support for digital audio and video. New York, NY, USA.
Korhonen, J., & Wang, Y. (2005). Power-efficient streaming for mobile terminals. In NOSSDAV ’05: Proceedings of the international workshop on network and operating systems support for digital audio and video. New York, NY, USA.
Acknowledgments
We thank all anonymous reviewers for their valuable comments. This work was supported in part by the National Science Foundation under grant CNS-0519733.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhuang, Z., Kakumanu, S., Jeong, Y. et al. Mobile hosts participating in peer-to-peer data networks: challenges and solutions. Wireless Netw 16, 2313–2333 (2010). https://doi.org/10.1007/s11276-010-0260-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-010-0260-4