Fig 1 - uploaded by Marcello Caleffi
Content may be subject to copyright.
Traditional P2P overlay networks 

Traditional P2P overlay networks 

Source publication
Conference Paper
Full-text available
Mobile Ad hoc NETworks (MANET) and Peer-To-Peer (P2P) systems are emerging technologies sharing a common underlying decentralized networking paradigm. However, the related research activities have been mainly developed by different research communities, nullifying therefore the idea of an unitary approach able to assure effectiveness integrated sol...

Context in source publication

Context 1
... I NTRODUCTION Peer-To-Peer (P2P) and Mobile Ad hoc NETworks (MANETs) share the same key concepts of self-organization and distributing computing, and both aim to provide connectivity in a completely decentralized environment [1], [2]. Moreover, both lack central entities to which delegate the management and the coordination of the network and relay on a time-variant topology. In fact, in P2P networks the time- variability is due to joining/leaving peers, while in MANET ones it is due to both node mobility and propagation condition instability. Despite these similarities, the adoption of the P2P paradigm to disseminate and discover information in a MANET scenario rises to new and challenging problems [1], [3]. The main issue concerns the layer where they operate: P2Ps build and maintain overlay networks at the application-layer, assuming the presence of an underlying network routing which assures connectivity among nodes, while MANETs focus on providing a multi-hop wireless connectivity among nodes. This issue is a major problem in trying to couple a P2P overlay network over a MANET: in [4], [5] it has been proved that simply deploying P2P over MANETs may cause poor performances due to the lack of cooperation and communication between the two layers, causing so significant message overhead and redundancy. For these reasons, different cross-layer approaches have been presented and they can be classified according to the adopted solution for the resource discovery procedure. More specifically, in unstructured P2Ps, peers are unaware of the resources that neighboring peers in the overlay network maintain [6], [7]. So, they typically resolve search requests by means of flooding techniques and rely on resource replication to improve the lookup performance and reliability. Differently, in structured P2P networks peers have knowledge about the resources offered by overlay neighbors, usually by resorting to the Distributed Hash Table (DHT) paradigm and, therefore, the search requests are forwarded by means of unicast communications. Clearly, the scenarios where MANETS operate make unsuit- able both flooding and replication mechanisms, except for small networks and/or high joining/leaving peer rates. In the last years structured P2P networks have gained attention: EKTA [8] and DPSR [9] integrate a Pastry-like [10] structured P2P protocol with the DSR routing algorithm, while CROSS- Road [11] integrates a Pastry-like DHT over the OLSR routing algorithm, and VRR [12] proposes a routing algorithm which provides indirect routing by resorting to a Pastry-like structure too. All these techniques associate an identifier, namely a key, to each peer by means of an hash function and organize the keys in a ring structure. Since the identifiers are randomly assigned to peers, the P2P overlay topology is usually built independently from the physical one, and thus no relationship exists between overlay and physical proximity (Fig. 1). As shown in [13], [14], this implies that overlay hops can give rise to physical routes which are unnecessary long. Kademlia [15] shares several similarity with Indirect Tree-based Routing, in particular as regards to routing table maintenance. However the overlay and physical proximity are not fully related, since it resorts to a XOR-based distance, which cannot fully take into account the physical topology. MADPastry [16], [17] integrates the Pastry protocol with the AODV routing algorithm and tries to overcome this issue by resorting to clustering. However, the overlay and physical proximity are in someway related only for inter-cluster communications. In [18], it is proposed to associate location-dependent identifiers to nodes with a distribute procedure and to organize node in a tree-based overlay structure. In this paper, according to [18], we give a contribution toward the structured P2P approach presenting a DHT-based routing protocol, namely Indirect Tree-based Routing (ITR), which integrates both traditional direct routing and indirect key-based routing at the network layer. Indirect Tree-based Routing extends the Augmented Tree-based Routing (ATR) [19], a hierarchical multi-path routing protocol for scalable ad-hoc networks, by providing fully functional P2P services. Like [19], we resort to an augmented tree-based structure, in order to assure that the logical and the physical proximity agree, as shown in Fig. 2. For both direct and indirect routing, each node maintains a unique routing table which stores only physical 1-hop neighbors, i.e. only peers with which the node can communicate at the link layer. As result, each overlay hop consists of only one physical hop. To test the effectiveness of our proposal, numerical simulations on 802.11 technology have been carried out across a wide range of environments and workloads. It is worthwhile to underline that ITR can be accommodated with slight modifications to operate over any link layer technology and, moreover, it does not require any change in both transport and application layers. The outline of the paper is the following: Section II presents the design and implementation details of ITR, whereas Section III presents the performance evaluation. Finally, in the last section conclusion and open problems are drawn. II. I NDIRECT T REE - BASED R OUTING As mentioned before, Indirect Tree-based Routing extends the Augmented Tree-based Routing (ATR) by providing fully functional P2P services. Both assign location-dependent identifiers, namely strings of l bits, to peers by means of a distribute procedure and of locally broadcasted hello packets. The peer identifier space can be represented as a complete binary tree of l levels, that is a binary tree in which every vertex has zero or two children and all leaves are at the same level (Fig. 2-a). In the tree structure, each leaf is associated with a peer identifier, and a inner vertex of level k , namely a level-k subtree , represents a set of leaves (that is a set of peer identifiers) sharing a prefix of l − k bits. For example, with reference to Fig. 2-a, the vertex with the label 01X is a level- 1 subtree and represents the leaves 010 and 011 . Let us define as level-k sibling of a leaf as the level- k subtree which shares the same parent with the level- k subtree the leaf belongs to. Referring to the previous example, the vertex with the label 1XX is the level- 2 sibling of the address 000 . Indirect Tree-based Routing performs the whole routing resorting to an iterative procedure which explores the topological meaning of the node identifiers with a hierarchical form of multi-path proactive distance-vector routing. Like ATR, each node stores a routing table with l sections, one for each sibling, and the k -th section stores the physical 1-hop neighbor peers which can forward a packet towards peers whose location-dependent identifiers belong to the level- k sibling. With reference to the topology depicted in Fig. 3 where the location identifiers are 5 bit long, we suppose that the node with identifier 10000 has to communicate with the node with identifier 00000 . Since 00000 belongs to the level- 4 sibling of identifier 10000 , the source will forward a packet to the physical neighbor with identifier 01000 , according to its routing table shown in Fig. 4 (further details on the routing table maintenance could be found in [19]). From an operational point of view, Indirect Tree-based Routing performs like traditional P2P systems: namely, when a node stores a resource, it sends periodically a ...

Similar publications

Conference Paper
Full-text available
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P routing, has been proposed. The unique feature of such a proposal is the ability to build an overlay network in which both the logical and physical proximity agree, improving...
Article
Full-text available
Semantic mapping plays an important role in the mobile robotic area, helping robots to perform numerous complicated tasks in both industry and daily life. According to the semantic map, the robot can automatically operate some challenging tasks such as path-planning, place localization, and human-robot interaction. Also, the terminologies of a grou...
Conference Paper
Full-text available
Most network applications nowadays are related to the distribution of contents from a source to a number of users. Several developments such as CDN and P2P networking have been used to provide access to contents at the network edges. However, they have no ability to leverage caching at the network level and still rely on a host-based communication...
Article
Full-text available
The IEEE 802.11s standard specifies a mesh technology to be supported by IEEE 802.11 devices. Among the limitations caused by this heritage, we focus on the low scalability of the current IEEE 802.11s standard mechanisms. As a main contribution to the related research field, this article presents the DHT-based Cluster Routing Protocol (DCRP). DCRP...
Conference Paper
Full-text available
Chord is a protocol to distribute and retrieve information at large scale. It builds a large but rigid overlay network without taking into account the social nature and the underlying topology of large platforms, made of the interconnection of many independent smaller networks. Thus, new approaches are required to build overlay networks. In this pa...

Citations

... Observations on previous research related on P2P over MANET and other mobile device environment in [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25] make the authors realized that one of the major reason is it is difficult to implement a reliable, high performance, and an energy efficient P2P on MANET environment are simply because previous researcher kept using TCP/IP stack for their solutions. ...
... If the associated list of gateways already contains GW A , this entry need not be updated (Step [5a] in Figure 5). Otherwise, GW A will add its IP address to the existing entry and update the DHT (Step [1] in Figure 3). b) Returning a NULL value implies that no entry exists for B 2 in the DHT. ...
... P2P is an example of overlay networks that implements a network service that is not available in the physical network. In a simplest form, P2P network is connected between two or more PCs in a decentralized environment similar to Mobile Ad-Hoc Network (MANET) that consist of nodes communicate each other without any fixed infrastructure through the wireless devices [1]. P2P overlay networks are divided into two classes which is unstructured and structured [2]. ...
Article
Full-text available
This paper presents a routing performance analysis of structured P2P overlay network. Due to the rapid development and hectic life, sharing data wirelessly is essential. P2P allows participating peers move freely by joining and leaving the network at any convenience time. Therefore, it exists constraint when one measuring the network performance. Moreover, the design of structured overlay networks is fragmented and with various design. P2P networks need to have a reliable routing protocol. In order to analyse the routing performance, this work simulates three structured overlay protocols-Chord, Pastry and Kademlia using OMNeT++ with INET and OverSim module. The result shows that Pastry is the best among others with 100% routing efficiency. However, Kademlia leads with 12.76% and 18.78% better than Chord and Pastry in lookup hop count and lookup success latency respectively. Hence, Pastry and Kamelia architectures will have a better choice for implementing structured overlay P2P network.
... Observations on previous research related on P2P over MANET and other mobile device environment in [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25] make the authors realized that one of the major reason is it is difficult to implement a reliable, high performance, and an energy efficient P2P on MANET environment are simply because previous researcher kept using TCP/IP stack for their solutions. ...
... Considerable research has been devoted to P2P overlay protocols in the Internet [17] [27], with some related to P2P in mobile ad-hoc networks. However, many of the publications merely present architecture proposals and surveys [28] [29] [30]. The authors of [31] present an in-depth investigation of Chord over static and dynamic Wireless Sensor Networks (WSNs) but only consider a flat network architecture. ...
... The authors of [28] [29] investigated a P2P file-sharing over MANET and proposed five routing approaches of different complexity. One approach integrated the DHT at the network layer, as proposed in [30]. Another approach combined the DHT with flooding, similar to what we adopt in this paper. ...
... Considerable research has been devoted to P2P overlay protocols in the Internet [17], [26], with some related to P2P in mobile ad-hoc networks. However, many of the publications merely present architecture proposals and surveys [3], [4], [27]. The authors of [28] present an in-depth investigation of Chord over static and dynamic WSNs but only consider a flat network architecture. ...
... The authors of [3], [4] investigated a P2P file-sharing over MANET and proposed five routing approaches of different complexity. One approach integratiod the DHT at the network layer, as proposed in [27]. Another approach combined the DHT with flooding, similar to what we adopt in this paper. ...
... Virtual Ring Routing VRR [71], Scalable Source Routing SSR [72], DPSR [73], Ekta [46], MADPastry [74] and MA-Chord [75] belong to the Ring-Based MANET routing systems (Table 5). Tribe [76], DART [78], Automatic Incremental Routing ATR [79], Indirect Treebased Routing ITR [80], and KDSR [82] are Tree-Based MANET routing approaches (Table 6). DHT-based functionality using Hypercube [77], AIR [81] and 3D-RP [83] are approaches which adopt various structures such as hypercube, acyclic graph and 3D rectangular structure (Table 7). ...
... Indirect Tree-based routing ITR [80] extends Augmented Tree-based Routing ATR [79]. ITR presents the identifier space as a tree structure to assure agreement between logical and physical structure. ...
Article
There are many common characteristics between Peer-to-Peer (P2P) overlay networks and Mobile Ad-hoc Networks (MANET). Self-organization, decentralization, dynamicity and changing topology are the most shared features. Furthermore, when used together, the two approaches complement each other. P2P overlays provide data storage/retrieval functionality, and their routing information can complement that of MANET. MANET provides wireless connectivity between clients without depending on any pre-existing infrastructure. The aim of this paper is to survey current P2P over MANET systems. Specifically, this paper focuses on and investigates structured P2P over MANET. Overall, more than thirty distinct approaches have been classified into groups and introduced in tables providing a structured overview of the area. The survey addresses the identified approaches in terms of P2P systems, MANET underlay systems and the performance of the reviewed systems.
... Therefore, in this paper the performances of M-DART are discussed only in terms of such a metric. Finally, in References [28,29] the feasibility of multi-path dynamic addressing is evaluated with reference to mobile peer-topeer (P2P) systems, and some results are provided with reference to the P2P functionalities, neglecting the routing ones. ...
Article
The paper proposes a Distributed Hash Table (DHT)-based multi-path routing protocol for scalable ad hoc networks. Specifically, we propose a multipath-based improvement to a recently proposed DHT-based shortest-path routing protocol, namely the Dynamic Address RouTing (DART). The resulting protocol, referred to as multi-path DART (M-DART), guarantees multi-path forwarding without introducing any additional communication or coordination overhead with respect to DART. The performances of M-DART have been evaluated by means of numerical simulations across a wide range of environments and workloads. The results show that M-DART performs the best or at least comparable with respect to widely adopted routing protocols in all the considered scenarios. Moreover, unlike these protocols, it is able to assure satisfactory performances for large networks by reducing the packet loss by up to 75%. Copyright © 2010 John Wiley & Sons, Ltd.
... Furthermore, despite the apparent chaos of periodic random changes to the membership of the network, p2p networks provide provable guarantees about performance. However, the adoption of current p2p techniques necessitates the existence of a fixed network topology [16, 10]. With the term " fixed " , we refer to wired and wireless networks that have formulated their physical † The author is with National Technical University of Athens, Heroon Polytexneiou, 15773, Zografou, Greece. ...
Article
Full-text available
Next generation network characteristics increase the complexity in the design and provision of advanced services, making inappropriate the selection of traditional approaches. Future networks are becoming larger in scale, more dynamic and more heterogeneous. In order to cope with these requirements, services are expected to adapt to environmental conditions and require minimum human intervention. In this paper a new model for providing autonomous and decentralized services is proposed, especially focusing on mobile ad hoc networks (MANETs). Using a newly proposed four-layered approach, service development may be realized independently from the underlying physical network. In a reference implementation, it is demonstrated that it is possible to set up an overlay network that hides any network changes from the service layer. Multiple mechanisms have been adapted in order to efficiently --- in terms of message exchanges and convergence time --- operate over an ad hoc environment. Finally, it is demonstrated that a specific service could operate over a dynamic network with multiple failures.
... As pointed out in [6], DTNs and P2P systems share the same key concepts of self-organization and distributing computing, and both aim to work in a completely decentralized environment. Both lack central entities to which to delegate the management and the coordination of the network, and both rely on a time-variant topology. ...
... In these systems an inter-layer communication between the network and the application layers is introduced, thus allowing a weak interaction between the routing and the P2P functionalities. However, very recent solutions [34,6,35] which integrate the P2P services at the network layer have been proposed (Fig. 6.11), thus allowing a more strong interaction between the two layers. ...
... In the following, we describe four proposals: the Mobile AD-hoc Pastry (MADPastry) [46], the Indirect Tree-based Routing (ITR) [6], the Virtual Ring Routing (VRR) [34], and the Opportunistic DHT-based Routing (ODR) [35]. For each system, we underline the main features along with the main limitations. ...