An Efficient and Practical Greedy Algorithm for Server-Peer Selection in Wireless Peer-to-Peer File Sharing Networks

Toward a new era of “Ubiquitous Networking” where people are interconnected in anywhere and at anytime via the wired and wireless Internet, we have witnessed an increasing level of impromptu interactions among human beings in recent years. One important aspect of these interactions is the Peer-to-Peer (P2P) Networking that is becoming a dominant traffic source in the wired Internet. In these Internet overlay networks, users are allowed to exchange information through instant messaging and file sharing. Unfortunately, most of the previous work proposed in the literature on P2P networking is designed for the traditional wired Internet, without much regard to important issues pertinent to wireless communications. In this paper, we attempt to provide some insight into P2P networking with respect to a wireless environment. We focus on P2P file sharing, already a hot application in the wired Internet, and will be equally important in the wireless counterpart. We propose a greedy server-peer selection algorithm to decide from which peer should a client download files so that the level of fairness of the whole network is increased and expected service life of the whole file sharing network is extended. We also propose a new performance metric called Energy-Based Data Availability, EBDA, which is an important performance metric for improving the effectiveness of a wireless P2P file sharing network.

[1]  Nj Piscataway,et al.  Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .

[2]  A. Nallanathan,et al.  Performance of physical (PHY) and medium access control (MAC) layers of IEEE 802.11b in the presence of Bluetooth piconets , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..

[3]  Ellen W. Zegura,et al.  The effect of peer selection and buffering strategies on the performance of peer-to-peer file sharing systems , 2002, Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.

[4]  Krishna M. Sivalingam,et al.  A comparison of MAC protocols for wireless local networks based on battery power consumption , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[5]  George L. Lyberopoulos,et al.  Mobility modeling in third-generation mobile telecommunications systems , 1997, IEEE Wirel. Commun..

[6]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[7]  Christos Gkantsidis,et al.  Random walks in peer-to-peer networks , 2004, IEEE INFOCOM 2004.

[8]  Guangwen Yang,et al.  Stationary and adaptive replication approach to data availability in structured peer-to-peer overlay networks , 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003..

[9]  Martin Nilsson,et al.  Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[10]  Mustafa Mat Deris,et al.  Improving data availability using hybrid replication technique in peer-to-peer environments , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[11]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[12]  Wendi B. Heinzelman,et al.  Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.

[13]  Mostafa H. Ammar,et al.  A file-centric model for peer-to-peer file sharing systems , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[14]  Guohong Cao,et al.  rDCF: A Relay-Enabled Medium Access Control Protocol for Wireless Ad Hoc Networks , 2005, IEEE Transactions on Mobile Computing.

[15]  Robert Morris,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.

[16]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[17]  Edith Cohen,et al.  Associative search in peer to peer networks: harnessing latent semantics , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[18]  Rayleigh The Problem of the Random Walk , 1905, Nature.

[19]  Peter Druschel,et al.  Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .

[20]  Ben Y. Zhao,et al.  Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.

[21]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[22]  David R. Karger,et al.  Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.

[23]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[24]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.