A CASE STUDY OF HOME SERVICE SHARING USING RELOAD

In present days, home devices with network capabilities are widely used and augmented for delivering several Home Services (HS) to more end users. This technology increases user experiences in sharing services by accessing services locally, remotely or visiting other user services. The interesting research problem is how to organize the service sharing reliably and effectively while the service cost and speed are still acceptable. We focus on Structured Peer to Peer (P2P) network architecture in comparison with other two types of P2P architecture, namely Centralized P2P and Pure P2P. The comparison is presented in terms of signaling overhead and service specifications. We have previously studied the Centralized P2P and Pure P2P network architecture for HS but never Structured P2P. The Structured P2P uses Distributed Hash Table (DHT) to quickly lookup and route shared services in an overlay network. In this paper, we propose to use RELOAD (REsource LOcation And Discovery Base Protocol) which provides an abstract storage in the P2P overlay, as network architecture for managing HS sharing in the decentralized way. Our evaluation results reveal that HS sharing using RELOAD offers several advantages and the architecture is suitable for our case study, the weather report service sharing.

[1]  Ibrahim Matta,et al.  BRITE: an approach to universal topology generation , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[2]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[3]  Mario Kolberg,et al.  Application Layer Multicast extensions to RELOAD , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[4]  Bruce Lowekamp,et al.  The design of a versatile, secure P2PSIP communications architecture for the public internet , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[5]  Béatrice Paillassa,et al.  Home Service Communities and Authentication , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[6]  Jouni Mäenpää,et al.  Performance of REsource LOcation and Discovery (RELOAD) on Mobile Phones , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[7]  M. Jovanovi MODELING PEER-TO-PEER NETWORK TOPOLOGIES THROUGH “ SMALL-WORLD ” MODELS AND POWER LAWS , 2001 .

[8]  Mihajlo A. Jovanović,et al.  Modeling Large-scale Peer-to-Peer Networks and a Case Study of Gnutella , 2001 .

[9]  Ce-Kuen Shieh,et al.  Increasing service availability for resource constrained nodes in peer-to-peer communication systems , 2010, 2010 International Computer Symposium (ICS2010).