Fast track article
Peer-to-peer overlay topology control for mobile ad hoc networks

https://doi.org/10.1016/j.pmcj.2011.04.003Get rights and content

Abstract

The enormous popularity of peer-to-peer (P2P) applications and the increased use of mobile devices make running P2P applications on mobile ad hoc networks (MANETs) natural. However, simply applying existing P2P overlay techniques, which are designed for wired networks, to MANETs is undesirable due to the differences between the two types of networks. In P2P systems, peers are often selfish rather than cooperative (which is expected of MANET nodes). In this paper, we study the construction of P2P overlays by selfish peers in the context of MANETs, and propose a computationally feasible game-theoretic heuristic algorithm. In our P2P-MANET creation game, peers seek to maintain as few neighbors as possible while minimizing their distances to all destinations, in an effort to reduce energy consumption and to improve response time. We find that Nash equilibria are difficult to find at best, and may not even exist in most cases. Our heuristic is fairly stable relative to the minimum cost algorithm, and when the degree–constraint is relaxed, it approximates the minimum cost. The lack of global knowledge of the overlay and underlying network at individual peers does not allow each peer to fully exploit such information for its own best interest, and actually may reduce the total cost network-wide.

Introduction

P2P applications are enormously popular on the Internet and their uses vary from file sharing to Voice-over-IP to gaming and more. Increasingly, users are moving from wired networks toward mobile networks. Mobile ad hoc networks (MANETs) are essential in some environments, such as in disaster recovery, or military battlefields, where the communications infrastructure has been damaged or is non-existent. In other environments, such as at a company meeting where the participants would like to share documents, such networks may prove more convenient than using a wireless LAN. Recently, the Wi–Fi Alliance has announced a new specification called “Wi–Fi Direct” that allows devices to connect to one another directly, without the use of a base station [1]. The code-name for the specification was “Wi–Fi peer-to-peer”. A natural evolution is for P2P applications to run on a cooperative MANET (we use the term P2P–MANET to refer to such networks).

Simply applying existing P2P overlay techniques to MANETs is undesirable due to the lack of infrastructure, node mobility, and energy issues. It is important that the overlay topology reflects the underlying network, both to reduce energy consumption and to improve response times. Nodes in MANETs are mobile, meaning that the underlying topology is constantly changing as users move about. Existing P2P topology control schemes, designed for wired networks, are able to accommodate a changing topology due to the expectation that peers will constantly be joining and quitting. However, nodes are assumed to be disconnected once they are unreachable in non-mobile networks. In MANETs, this assumption is incorrect since nodes may have simply moved to a different location. Mobile devices are powered by battery. The overlay control algorithm needs to be computationally simple and ensure that MANET nodes forward as less traffic as possible. On the one hand, it is preferable for peers to have a small degree on the overlay to reduce control traffic. On the other hand, it is preferable for the overlay to be well-connected so the traffic between two overlay peers traverses as few MANET nodes as possible. Because of the lack of infrastructure, a fully distributed overlay topology control algorithm is preferred.

Most P2P overlay topology control algorithms assume that peers are cooperative. Unfortunately, peers are selfish in many cases. They seek to minimize their own costs, in the case of MANETs, to minimize the number of links to other peers and the distance to all destinations. Several studies [2], [3], [4] investigate the impact of selfish peers on the topology in the context of non-mobile networks. However, they study the theoretical bounds or require peers to have global knowledge to construct the overlay. No practical overlay topology control algorithm, even for non-mobile networks, exists. As well, a study of the impact of selfish peers in the context MANETs is needed.

In this paper, we study the construction of the P2P overlay by selfish peers in the context of MANETs, and propose a fully decentralized, computationally feasible, heuristic algorithm based on game theory. In our P2P–MANET creation game, peers seek to maintain as few neighbors as possible while minimizing their distances to all destinations. We compare the topology of our heuristic to that of random local search algorithms. We find that Nash equilibria are difficult to find or may not even exist. Minimum cost topologies are typically highly connected and thus resilient, but are not in a Nash equilibrium state. Our heuristic is fairly stable relative to the minimum cost algorithm, and when the degree–constraint is relaxed, it approximates the minimum cost. The lack of global knowledge of the overlay and underlying network at individual peers does not allow each peer to fully exploit such information for its own best interest, and actually may reduce the total cost network-wide.

The remainder of the paper is organized as follows. Section 2 provides related work on P2P overlay topology control algorithms. Section 3 discusses the game-theoretic heuristic overlay topology control algorithms in detail. In Section 4 we compare the topologies formed by the heuristic and benchmark algorithms. Section 5 provides some conclusions.

Section snippets

Related work

P2P overlays may be separated into two classes: structured and unstructured [5]. Hora et al. [6] have found that in MANETs, unstructured protocols are more resilient than structured ones at the cost of higher energy and delay. Liu [7] showed that in an unstructured overlay, more than 70% of the links do not reflect the underlay topology due to the selection of random neighbors.

Fabrikant et al. [2] introduce a network creation game to model the construction of the Internet, which has inspired

P2P–MANET overlay topology control

Given a MANET and a subset of nodes that are participating in the P2P overlay, the problem of finding an optimal topology can be formulated in game-theoretic fashion using a network creation game. In this section, we first introduce the P2P–MANET creation game, then describe two random local search algorithms that will be used as the benchmark, and finally introduce the computational feasible heuristic.

Performance evaluation

We now evaluate the performance of our proposed heuristic overlay topology control algorithm, and compare its performance to that of the benchmark algorithms described in Section 3.2. The heuristic algorithm was implemented in the network simulator ns-2 2.33 [9]. The underlay topologies resulting from the simulation were then fed into the benchmark algorithms’ solver, which are written in the C++ programming language, to determine the minimum cost and Nash equilibria. We first discuss the

Conclusion

P2P networks are immensely popular and may be used for many applications. Combining MANETs and P2P networks so that a P2P overlay runs on a cooperative MANET is a natural evolution. In many cases, peers are selfish in that they try to reduce their energy consumption, while minimizing their distances to all destinations. This paper provides an examination of overlay construction for P2P–MANETs with selfish peers. We propose a computationally feasible heuristic algorithm for neighbor selection

Acknowledgments

We would like to thank the anonymous reviewers. Their comments significantly helped us to improve the quality of this paper. This work is supported by a grant from the Natural Sciences and Engineering Research Council of Canada (NSERC).

Afzal Mawji completed his Ph.D. at the Telecommunications Research Lab in the School of Computing at Queen’s University. He received his MASc and BASc from the University of Waterloo. His research interests lie in the areas of mobile computing, ad hoc and mesh networks, pervasive computing and peer-to-peer computing.

References (12)

  • D.N. da Hora et al.

    Enhancing peer-to-peer content discovery techniques over mobile ad hoc networks

    Computer Communications

    (2009)
  • Wi–Fi Alliance, Wi–Fi Alliance announces groundbreaking specification to support direct Wi–Fi connections between...
  • A. Fabrikant, A. Luthra, E. Maneva, C.H. Papadimitriou, S. Shenker, On a network creation game, in: ACM Symposium on...
  • T. Moscibroda, S. Schmid, R. Wattenhofer, On the topologies formed by selfish peers, in: 5th International Workshop on...
  • B.-G. Chun, R. Fonseca, I. Stoica, J. Kubiatowicz, Characterizing selfishly constructed overlay routing networks, in:...
  • S. Androutsellis-Theotokis et al.

    A survey of peer-to-peer content distribution technologies

    ACM Computing Surveys

    (2004)
There are more references available in the full text version of this article.

Cited by (15)

  • Tackling energy and battery issues in mobile P2P VoD systems

    2017, Computer Networks
    Citation Excerpt :

    Some works [8–10] focus on designing a more effective overlay network, where peers needs less energy to exchange data. These overlays often have localization criteria to reduce energy consumption [10]. Other works [11–13] focus on reducing the control message information that are exchanged among peers.

  • A survey of P2P content sharing in MANETs

    2017, Computers and Electrical Engineering
    Citation Excerpt :

    The aim is to avoid congestion that subsequently reduces the amount of message drops and collisions at the MAC layer, which reduce contention that will also decreases the response time and improves the percentage of successful queries while reducing the energy consumed per node. Mawji et al. [12] proposes an efficient construction of the P2P overlay by selfish peers in the context of MANETs. The proposed approach is a fully decentralized, computationally feasible, heuristic algorithm based on game theory.

  • State-of-the-art survey on P2P overlay networks in pervasive computing environments

    2015, Journal of Network and Computer Applications
    Citation Excerpt :

    Such topology management algorithms are at the core of P2P overlays, as will be discussed in the following, whereas there have also been dedicated research efforts towards promoting overlay reconfiguration in a more generic manner. Adaptive P2P overlay topologies have been studied in Condie et al. (2004) to improve resource discovery, while an adaptive topology control algorithm designed specifically for P2P overlays running on top of mobile ad hoc networks has been proposed in Mawji et al. (2011) with the goal of reducing the stretch factor between the overlay and the underlay networks and eventually minimizing energy consumption. Similarly, the X-BOT protocol discussed in Leitao et al. (2012) retains desired features of existing unstructured P2P overlays such as node degree and connectivity, but adapts the topology in order to optimize the stretch factor in a completely decentralized manner and thus lead to more efficient overlay routing.

  • Energy-Efficient Peer-to-Peer Networking and Overlays

    2013, Handbook of Green Information and Communication Systems
  • Ego network models for Future Internet social networking environments

    2012, Computer Communications
    Citation Excerpt :

    Nowadays, content-centric services are mostly supported by Content Delivery Networks and P2P solutions [54]. Several solutions continue to be proposed for optimising systems based on these paradigms, in particular in the P2P area both for fixed and mobile networks [55–60]. SPNs could be used as a natural substrate for implementing trusted P2P-like content-centric solutions tailored to, for example, disseminating data to interested users in a scalable way.

View all citing articles on Scopus

Afzal Mawji completed his Ph.D. at the Telecommunications Research Lab in the School of Computing at Queen’s University. He received his MASc and BASc from the University of Waterloo. His research interests lie in the areas of mobile computing, ad hoc and mesh networks, pervasive computing and peer-to-peer computing.

Hossam Hassanein is with the School of Computing at Queen’s University working in the areas of broadband, wireless and variable topology networks architecture, protocols, control and performance evaluation. Dr. Hassanein obtained his Ph.D. in Computing Science from the University of Alberta in 1990. He is the founder and director of the Telecommunication Research (TR) Lab in the School of Computing at Queen’s. Dr. Hassanein has more than 350 publications in reputable journals, conferences and workshops in the areas of computer networks and performance evaluation. He has delivered several plenary talks and tutorials at key international venues, including Unconventional Computing 2007, IEEE ICC 2008, IEEE CCNC 2009, IEEE GCC 2009, IEEE GIIS 2009, ACM MSWIM 2009 and IEEE Globecom 2009. Dr. Hassanein has organized and served on the program committee of numerous international conferences and workshops. He also serves on the editorial board of a number of International Journals. He is a senior member of the IEEE, and is currently chair of the IEEE Communication Society Technical Committee on Ad hoc and Sensor Networks (TC AHSN). Dr. Hassanein is the recipient of Communications and Information Technology Ontario (CITO) Champions of Innovation Research award in 2003. He received several best paper awards, including at IEEE Wireless Communications and Network (2007), IEEE Global Communication Conference (2007), IEEE International Symposium on Computers and Communications (2009), IEEE Local Computer Networks Conference (2009) and ACM Wireless Communication and Mobile Computing (2010). Dr. Hassanein is an IEEE Communications Society Distinguished Lecturer.

Xiangyang Zhang received his B.E. degree and the M.E. degree in Electrical Engineering from Harbin Institute of Technology, Harbin, China in 1992 and 1995, respectively. He was with Huawei Technologies, from 1995 to 2007, where he was a senior engineer and research manager in the data communication division. He is now pursuing a Ph.D. degree at the School of Computing, Queen’s University, Canada. His research interests span the fields of video communication, peer-to-peer networks, Internet infrastructure, and telecom networks.

View full text