Peer-to-peer (P2P) paradigm is the trend toward present Internet communication. However, the massive traffic of P2P file sharing has a deep and negative impact on mobile computing. Frequent and repeated file transmissions for different peers congest the wireless network. Request bursts may consume a mobile device's computation power, energy, and other resources while certain of them may become ineffectual requests to waste the network bandwidth because of failing to find the wanted data in the target mobile device. In the paper, we propose the object proxy service (OPS) for P2P file sharing in mobile computing. The OPS can cache data and serve requests on behalf of mobile devices to conserve wireless network bandwidth and mobile devices' computation power, energy, and other resources. We implement the OPS on the Java applications' packet eavesdropper (JAPE) proposed previously. Besides, we develop a general P2P protocol to emulate the behaviors of current P2P file sharing and test it with the OPS. The experiments show that the OPS with linear scalability can serve requests on behalf of mobile devices to avoid the P2P traffic from being propagated over the wireless network. We are convinced that the OPS is suitable to work in a P2P community to conserve wireless network bandwidth and resources on mobile devices.
[1]
Oliver Spatscheck,et al.
Accurate, scalable in-network identification of p2p traffic using application signatures
,
2004,
WWW '04.
[2]
Mark Handley,et al.
A scalable content-addressable network
,
2001,
SIGCOMM '01.
[3]
Nathaniel Leibowitz,et al.
ARE FILE SWAPPING NETWORKS CACHEABLE? CHARACTERIZING P2P TRAFFIC
,
2002
.
[4]
Daniela Rosu,et al.
An evaluation of TCP splice benefits in web proxy servers
,
2002,
WWW.
[5]
Ce-Kuen Shieh,et al.
Java Application's Packet Eavesdropper for content delivery network
,
2005,
19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[6]
David R. Karger,et al.
Chord: a scalable peer-to-peer lookup protocol for internet applications
,
2003,
TNET.
[7]
C. Zheng,et al.
; 0 ;
,
1951
.
[8]
Michalis Faloutsos,et al.
Transport layer identification of P2P traffic
,
2004,
IMC '04.