A Lightweight Model for Mobile Peer-to-Peer File Sharing Systems

Peer-to-peer file sharing applications such as BitTorrent, Gnutella, and eDonkey are becoming widely utilized using desktops and handheld mobile devices. In this paper, we propose a lightweight model for peer-to-peer file sharing systems using mobile devices. The proposed model splits the peer-to-peer mobile client into two main modules: a mobile module that runs on the mobile device and a gateway module that runs separately on a dedicated server. In order to reduce computational requirements and energy consumption, the gateway server handles the connections to distributed peers over the Internet and downloads the required chunks of a requested file. The mobile device then simply connects to the gateway server to check the status of the download process and to get the requested file as soon as the download is complete. Therefore, the gateway relieves the mobile device from searching and downloading the file chunks. We present the general design and prototype implementation of the proposed model.

[1]  David W. Binkley,et al.  Program slicing , 2008, 2008 Frontiers of Software Maintenance.

[2]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[3]  Anand Jeyaraj,et al.  A review of the predictors, linkages, and biases in IT innovation adoption research , 2006, J. Inf. Technol..

[4]  Frank Bellosa,et al.  Balancing power consumption in multiprocessor systems , 2006, EuroSys.

[5]  Keith Brian Gallagher,et al.  Using Program Slicing in Software Maintenance , 1991, IEEE Trans. Software Eng..

[6]  Charles Poirier,et al.  RFID Strategic Implementation and ROI: A Practical Roadmap to Success , 2006 .

[7]  Wolfgang Kellerer,et al.  Extension to Ubiquitous: Mobile Peer‐To‐Peer , 2008 .

[8]  Mariam Kamkar,et al.  An overview and comparative classification of program slicing techniques , 1995, J. Syst. Softw..

[9]  Linda Mary Wills,et al.  Automated program recognition by graph parsing , 1992 .

[10]  坂倉 省吾,et al.  Technology Review : 抄録雑誌の概要 , 1987 .

[11]  A.C.M. Fong,et al.  Using a tree algorithm to determine the average synchronisation delay of self-synchronising T-codes , 2002 .

[12]  L. G. Tornatzky,et al.  Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings , 1982, IEEE Transactions on Engineering Management.

[13]  Niraj K. Jha,et al.  Energy efficiency of handheld computer interfaces: limits, characterization and practice , 2005, MobiSys '05.

[14]  Brian Subirana,et al.  Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond , 2004 .

[15]  Santha Vaithilingam,et al.  Mapping global money laundering trends: Lessons from the pace setters , 2009 .

[16]  Varun Grover,et al.  Information technology innovations: general diffusion patterns and its relationships to innovation characteristics , 2002, IEEE Trans. Engineering Management.

[17]  John Heidemann,et al.  Estimating P2P Traffic Volume at USC , 2007 .

[18]  Mikio Hasegawa,et al.  Energy Consumption Measurement of Wireless Interfaces in Multi-Service User Terminals for Heterogeneous Wireless Networks , 2005, IEICE Trans. Commun..

[19]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[20]  Nicolas Edwin Gold,et al.  Hypothesis-based concept assignment to support software maintenance , 2001, Proceedings IEEE International Conference on Software Maintenance. ICSM 2001.

[21]  Gajaraj Dhanarajan Distance Education: Promise, performance and potential , 2001 .

[22]  Patricia Adams,et al.  Programming Languages: Principles and Practice , 1993 .

[23]  Ben Y. Zhao,et al.  Energy consumption and conservation in mobile peer-to-peer systems , 2006, MobiShare '06.

[24]  Paramvir Bahl,et al.  Wake on wireless: an event driven energy saving strategy for battery operated devices , 2002, MobiCom '02.

[25]  Tomas Olovsson,et al.  Trends and Differences in Connection-Behavior within Classes of Internet Backbone Traffic , 2008, PAM.

[26]  Krishna M. Sivalingam,et al.  Design and analysis of low‐power access protocols for wireless and mobile ATM networks , 2000, Wirel. Networks.

[27]  Izak Benbasat,et al.  Electronic Data Interchange and Small Organizations: Adoption and Impact of Technology , 1995, MIS Q..

[28]  Lawrence Loh,et al.  Diffusion of Information Technology Outsourcing: Influence Sources and the Kodak Effect , 1992, Inf. Syst. Res..

[29]  Ted J. Biggerstaff,et al.  The concept assignment problem in program understanding , 1993, [1993] Proceedings Working Conference on Reverse Engineering.

[30]  Suresh Singh,et al.  PAMAS—power aware multi-access protocol with signalling for ad hoc networks , 1998, CCRV.

[31]  Varun Grover,et al.  The Initiation, Adoption, and Implementation of Telecommunications Technologies in U.S. Organizations , 1993, J. Manag. Inf. Syst..

[32]  Johan A. Pouwelse,et al.  The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.

[33]  Frank Tip,et al.  A survey of program slicing techniques , 1994, J. Program. Lang..

[34]  Daniel M. Dobkin,et al.  The RF in RFID: Passive UHF RFID in Practice , 2007 .

[35]  Barry W. Boehm,et al.  Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.

[36]  E. Burton Swanson,et al.  Characteristics of application software maintenance , 1978, CACM.

[37]  Vachara Peansupap,et al.  Factors Enabling Information and Communication Technology Diffusion and Actual Implementation in Construction Organisations , 2005, J. Inf. Technol. Constr..

[38]  Premkumar T. Devanbu,et al.  LaSSIE—a knowledge-based software information system , 1991, ICSE '90.

[39]  Norman Wilde,et al.  The role of concepts in program comprehension , 2002, Proceedings 10th International Workshop on Program Comprehension.

[40]  Keqiu Li,et al.  Energy Efficient Methods and Techniques for Mobile Computing , 2007, Third International Conference on Semantics, Knowledge and Grid (SKG 2007).

[41]  Amin Vahdat,et al.  ECOSystem: managing energy as a first class operating system resource , 2002, ASPLOS X.

[42]  Yasuhiro Takishima,et al.  Error states and synchronization recovery for variable length codes , 1994, IEEE Trans. Commun..

[43]  J. Flinn,et al.  Energy-aware adaptation for mobile applications , 1999, SOSP.

[44]  G. R. Higgie Database of best T-codes , 1996 .

[45]  Manish Bhuptani,et al.  RFID Field Guide: Deploying Radio Frequency Identification Systems , 2005 .

[46]  Mark Harman,et al.  Program comprehension assisted by slicing and transformation , 1995 .

[47]  M. Gibson,et al.  Beyond ANOVA: Basics of Applied Statistics. , 1986 .

[48]  Vassileios Karakostas,et al.  Intelligent search and acquisition of business knowledge from programs , 1992, J. Softw. Maintenance Res. Pract..

[49]  Suresh Singh,et al.  M-TCP: TCP for mobile cellular networks , 1997, CCRV.

[50]  Zhen Zhang,et al.  Synchronization recovery of variable-length codes , 2002, IEEE Trans. Inf. Theory.

[51]  Rayadurgam Srikant,et al.  Modeling and performance analysis of BitTorrent-like peer-to-peer networks , 2004, SIGCOMM 2004.

[52]  Oliver Spatscheck,et al.  Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.

[53]  Andrea De Lucia,et al.  Understanding function behaviors through program slicing , 1996, WPC '96. 4th Workshop on Program Comprehension.

[54]  Thomas M. Pigoski Practical Software Maintenance: Best Practices for Managing Your Software Investment , 1996 .

[55]  Matthias Schumann,et al.  RFID – Radio Frequency Identification , 2008, Informatik-Spektrum.

[56]  Beulah Rudner Construction of minimum-redundance codes with an optimum synchronizing property , 1971, IEEE Trans. Inf. Theory.

[57]  Donghun Yoon The trend and user behaviors of Japan's IC-Card system , 2009, 2009 International Waveform Diversity and Design Conference.

[58]  Frank Thornton How to Cheat at Deploying and Securing RFID , 2007 .

[59]  Mark R. Titchener The synchronization of variable-length codes , 1997, IEEE Trans. Inf. Theory.

[60]  Carey L. Williamson,et al.  Identifying and discriminating between web and peer-to-peer traffic in the network core , 2007, WWW '07.

[61]  E. Rogers New Product Adoption and Diffusion , 1976 .

[62]  Damith C. Ranasinghe,et al.  Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting , 2010 .

[63]  Rebecca Grant,et al.  Implementing Computer Technology in Educational Settings , 1991 .

[64]  Michalis Faloutsos,et al.  Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[65]  A. Simpson,et al.  Using CSP to model the synchronisation process of variable length codes , 2006 .

[66]  UKMalcolm. Munro Program Comprehension in a Reuse Reengineering Environment , 1995 .

[67]  Robin Kravets,et al.  Application‐driven power management for mobile communication , 2000, Wirel. Networks.

[68]  David Parry,et al.  Auto-Identification and Ubiquitous Computing Applications , 2009 .

[69]  Arun Rai,et al.  Propagating CASE usage for software development: An empirical investigation of key organizational correlates , 1994 .

[70]  Mikel Izal,et al.  Dissecting BitTorrent: Five Months in a Torrent's Lifetime , 2004, PAM.

[71]  C. A. R. Hoare,et al.  Communicating Sequential Processes (Reprint) , 1983, Commun. ACM.

[72]  Weisong Shi,et al.  Non-commercial Research and Educational Use including without Limitation Use in Instruction at Your Institution, Sending It to Specific Colleagues That You Know, and Providing a Copy to Your Institution's Administrator. All Other Uses, Reproduction and Distribution, including without Limitation Comm , 2022 .

[73]  Mark Weiser,et al.  Programmers use slices when debugging , 1982, CACM.

[74]  Randy Frank Understanding Smart Sensors , 1995 .

[75]  Mark Harman,et al.  A survey of empirical results on program slicing , 2004, Adv. Comput..