2 research outputs found
Simulating a Mobile Peer-to-Peer Network
Vertaisverkkosovellukset (P2P-sovellukset) ovat saapuneet kannettaviin laitteisiin, kun laitteiden prosessoriteho, tallennuskapasiteetti sekä matkapuhelinverkkojen kaistanleveys on kasvanut. Perinteiset P2P-sovellukset ovat liian raskaita mobiilikäyttöön. Uusia, kevyempiä vertaisverkkoprotokollia tarvitaan mahdollistamaan P2P-sovellusten toiminta mobiiliympäristössä. P2P Session Initiation Protocol (P2PSIP) on kehitteillä oleva protokolla, jonka avulla SIP protokollan yhteydenmuodostus toteutetaan ilman palvelimia.
Tämän työn tavoitteena oli simuloinnin avulla tutkia Resource Location and Delivery (RELOAD) vertaisprotokollaa käyttävää P2PSIP päällysverkkoa. Tarkastelun kohteena olivat erityisesti kaistanleveyden tarve, hakujen kustannukset sekä hakujen onnistuminen. Myös solmujen päällysverkkoon liittymisestä ja päällysverkosta poistumisesta aiheutuvat vaikutukset tuloksiin olivat mielenkiinnon kohteina. Tämä työ vertailee kahden hajautetun tiivistetaulualgoritmin, Chordin ja Kademlian, suorituskykyä. Simulaatiot on suoritettu C++ ohjelmointikielellä toteutetulla OverSimpäällysverkkosimulaattorilla.
Tämä työ osoittaa, että 2G-matkapuhelinverkon kaistanleveys on riittävä P2PSIPpäällysverkon tarpeisiin. Kademliaa käytettäessä kaistanleveys on suurempi, mutta hakujen viive pienempi ja onnistumisprosentti suurempi kuin Chordia käytettäessä. Tulokset osoittavat, että tässä työssä käytetyillä parametreilla hakujen onnistumisprosentti on monille sovelluksille liian alhainen eikä mahdollista niille tyydyttävää palvelun laatua.Peer-to-peer (P2P) applications have become available for portable devices as the processing power and the storage capacity of the devices as well as the network bandwidth have increased. The traditional P2P applications have been considered too heavy for mobile usage. New, lightweight P2P protocols are needed for mobile P2P applications. P2P Session Initiation Protocol (P2PSIP) is a protocol under development that provides the session establishment functions of SIP in a serverless fashion.
The main objective of this thesis was to simulate a P2PSIP overlay network operating with Resource Location And Delivery (RELOAD) peer protocol and study its bandwidth consumption, lookup overhead and lookup success rate. The effect of churn, the process of nodes arriving to the overlay and leaving it, on these results was also one of our concerns. We study if this kind of network is applicable to be implemented on top of current mobile telephone networks. This study compares the performance of two distributed hash table (DHT) algorithms, Chord and Kademlia. The simulations were carried out with OverSim overlay network simulator implemented in the C++ programming language.
This study shows that P2PSIP network's bandwidth usage is low enough to operate on top of the 2G mobile telephone networks. Kademlia uses more bandwidth than Chord but it has a shorter lookup delay and a higher lookup success rate than Chord. The results show that with the parameter settings used in our study the lookup success rates are in general too low for many applications to give them a satisfying quality of service
Recommended from our members
Mitigating Network Service Disruptions in High-bandwidth, Intermittently Connected, and Peer-to-Peer Networks
Users demand high-bandwidth, ubiquitous and low-cost network services. This demand has pushed ISPs and application providers to offer more bandwidth, allow users to access the Internet almost everywhere, and provide cheap or free network services using peer-to-peer networks. These three trends underlie the growing success of today's Internet. However, (1) high-bandwidth can empower more effective denial-of-service attacks; (2) Internet access is widespread, but still not ubiquitous; and (3) peer-to-peer network services need to solve the service discovery problem. This thesis addresses these three challenges. First, we tackle denial-of-service attacks. The high bandwidth available in many parts of the Internet allows denial-of-service attacks to be effective, and the large scale of the Internet makes detecting and preventing these attacks difficult. Anonymity and openness of the Internet worsens this problem because anyone can send anything to anybody. To prevent these denial-of-service attacks, we propose Permission-Based-Sending (PBS), a signaling architecture for network traffic authorization. PBS uses the explicit permission to give legitimate users the authority to send packets. Signaling is used to configure this permission in the data path. This signaling approach enables easy installation for granting authorization to flows, and allows PBS to be deployed in existing networks. In addition, a monitoring mechanism provides a second line of defense against attacks. Next, we strive to make Internet access more ubiquitous. When public transportation stations have access points to provide Internet access to passengers, public transportation becomes a more attractive travel and commute option. However, the Internet connectivity is intermittent because passengers can access the Internet only when a bus or train is within the networking coverage of an AP at a stop. To efficiently handle this intermittent network for the public transit system, we develop Internet Cache on Wheels (ICOW), a system that provides a low-cost way for bus and train operators to offer access to Internet content. Each bus and train car is equipped with a smart cache that serves popular content to passengers. The cache updates its content based on passenger requests when it is within range of Internet access points placed at bus stops, train stations or depots. This aggregated Internet access is significantly more efficient than having passengers contact Internet access points individually and ensures continuous availability of content throughout the journey. Finally, we consider peer-to-peer services. Typical service discovery mechanisms in peer-to-peer networks cause significant overhead, consuming energy and bandwidth: (1) in highly mobile networks, service discovery consumes the energy of mobile devices to discover services that newly joined members provide; and (2) peer-to-peer network systems consumes bandwidth during service discovery. To resolve and analyze these service discovery problems, (1) we design an efficient service discovery mechanism that reduces energy consumption of mobile devices; and (2) we evaluate the bandwidth consumption caused by service discovery in real-world peer-to-peer networks