ChapterPDF Available

Peer-to-peer over mobile ad hoc networks (Chapter 11)

Authors:
Next Generation Mobile
Networks and Ubiquitous
Computing
Samuel Pierre
École Polytechnique de Montréal, Canada
Hershey • New York
InformatIon scIence reference
Director of Editorial Content: Kristin Klinger
Director of Book Publications: Julia Mosemann
Acquisitions Editor: Lindsay Johnston
Development Editor: Christine Bufton, Juli Mosemann
Publishing Assistant: Milan Vracarich
Typesetter: Travis Gundrum, Deanna Jo Zombro
Production Editor: Jamie Snavely
Cover Design: Lisa Tosheff
Published in the United States of America by
Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: cust@igi-global.com
Web site: http://www.igi-global.com
Copyright © 2011 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in
any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identication purposes only. Inclusion of the names of the products or com-
panies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark.
Library of Congress Cataloging-in-Publication Data
Next generation mobile networks and ubiquitous computing / Samuel Pierre, editor.
p. cm.
Includes bibliographical references and index. Summary: "This book provides a comprehensive and unied view of the latest
and most innovative research ndings on the many existing interactions between mobile networking, wireless communications,
and ubiquitous computing"- -Provided by publisher. ISBN 978-1-60566-250-3 (hardcover) -- ISBN 978-1-60566-251-0 (ebook)
1. Ad hoc networks (Computer networks) 2. Ubiquitous computing. I. Pierre, Samuel.
TK5105.77.N49 2010
621.382--dc22
2010010158
British Cataloguing in Publication Data
A Cataloguing in Publication record for this book is available from the British Library.
All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the
authors, but not necessarily of the publisher.
105
Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Chapter 11
Peer-to-Peer over Mobile
Ad-Hoc Networks
Nadia N Qadri
University of Essex, UK
Antonio Liotta
Eindhoven University of Technology, The Netherlands

The goal of mobile computing is to provide access
to information and resources at anytime, anywhere.
The traditional client-server architecture is insuf-
ficient to provide these needs, due to various issues
like scalability (as the number of nodes grows the
server can be overloaded) and link failure (which
may lead to server unreachable). To cope with
these issues there is a need for an architecture
which allows both decentralized and spontaneous
connectivity. Peer-to-Peer (P2P) systems offer the
means to realize decentralized networks, which
can be used to share resources over the internet.
On the other hand, a Mobile Ad-hoc Network
(MANETs) is a spontaneous network made of
mobile nodes connected wirelessly but without
relying on a specific infrastructure network. A
P2P network over an ad-hoc infrastructure is a
powerful combination that provides users with
means to access different kinds of information
anytime and anywhere. P2P systems and MANETs
have been developed by different communities in
order to address entirely different requirements.
Despite being fundamentally different, MANETs
and P2P networks share the common vision of

In this chapter we review various approaches for the convergence of Peer-to-Peer (P2P) and Mobile Ad
hoc Networks (MANETs), identifying strengths and weaknesses, and putting things in perspective. P2P
and MANETs are among the most active research topics in pervasive computing. The convergence of P2P
networks and MANETs would allow existing P2P applications such as P2P le sharing and P2P stream-
ing to benet from the ubiquitous connectivity of ad-hoc. A P2P network over an ad-hoc infrastructure is
a powerful combination that provides users with means to access different kinds of information anytime
and anywhere. Realizing such a system is, however, not straightforward.
DOI: 10.4018/978-1-60566-250-3.ch011
106
Peer-to-Peer over Mobile Ad-Hoc Networks
load distribution based on the user’s willingness
to share resources in a dynamic and decentral-
ized manner.
The P2P network concept has drawn increas-
ing attention, and has been widely deployed on
the Internet for various purposes, including dis-
tributed data storage, file sharing, collaborative
computing, and Internet telephony (Wu, 2006).
The P2P system is popular for being scalable,
fault-tolerant, and self-organized. Nowadays P2P
has turned out to be one the most active research
areas of distributed computing and networking.
P2P was originally used to describe the commu-
nication between two peers. Recently, it refers to
a system that enables two or more peers to share
resources (based on peer’s willingness) by using
some appropriate communication system, without
relying on central coordination. P2P applications
offer a way to take advantage of different computer
resources on the internet.
The term P2P became popular in 1999 with the
emergence of Napster (Napster, 1999). Napster
changed the way files were shared on the internet
because it let peers download digital materials
from each other, rather than from dedicated serv-
ers, increasing the system capacity and scalability.
Napster, though, was still a centralized P2P appli-
cation since it used a centralized indexing server.
By contrast, a second generation of P2P ap-
plications exemplified by Gnutella (Gnutella,
2000), Freenet (Clarke, 2000), KaZaA (KaZaA,
2002) and BitTorrent (BitTorrent, 2001) provided
a truly decentralized architecture.
On the other side, MANET technology also
draws great attention of worldwide researchers and
scientists. Since the first appearance of wireless ad-
hoc networks in the DARPA packet radio networks
in the 1970s (Jubin, 1987), it became an interesting
research object in the computer industry. In the
1990s, the concept of commercial ad-hoc networks
arrived with notebook computers and other viable
wireless communications equipment. At the same
time, the idea of a collection of mobile nodes
was proposed at several research conferences.
The IEEE 802.11 subcommittee (IETF-manet)
had adopted the term “ad-hoc networks” and
the research community had started to look into
the possibility of deploying ad-hoc networks in
other areas of application. During the last couple
of years tremendous improvements have been
made in the research of ad hoc networks. Due
to their ability to create and organize a network
without any central management, MANETs are
characterized as the art of networking without a
network (Jiang, 2004). A MANET is a special
kind of wireless ad-hoc network where there is
no fixed backbone infrastructure. Due to this, the
MANET can be flexible and rapidly deployed
(Goldsmith, 2002).
MANETs and P2P networks are decentralized,
autonomous and highly dynamic in a fairly similar
way. In both cases, network nodes contribute to
the overall system performance intermittently
and unpredictably. Both rely on mechanisms to
publish, share, index, cache, discover, and reor-
ganize resources dynamically. They both aim at
supporting efficient data distribution mechanisms
such as multicasting. The strong functional simi-
larities between MANETs and P2P networks, has
recently sparked a new research thread based on
a fundamental question: is it possible and benefi-
cial to envision a convergence between P2P and
MANETs? Such convergence would be appealing
as it would allow distributed applications to run
over spontaneous, infrastructure-less networks,
adding a new dimension to the current Internet.
In this chapter we review MANETs and P2P
systems from this new perspective. First we look at
each technology independently, considering their
commonalities and differences. Then we survey
existing literature on the topic of P2P over MA-
NETs. A critical discussion of the state-of-the-art
will lead us to the identification of the key areas
that require further research.
107
Peer-to-Peer over Mobile Ad-Hoc Networks


P2P can be broadly defined as a self organizing,
decentralized distributed system that consists
of potentially un-trusted, unreliable nodes with
symmetric roles (Borg, 2003; Wu, 2006). P2P
systems are designed for the sharing of resources
such as CPU cycles, storage, files and data directly
without any centralized control or hierarchical
organization. P2P architectures are characterized
by their ability to adapt to failures, handling and
accommodating large number of nodes while
maintaining acceptable connectivity and per-
formance (A-Theotokis, 2004). P2P networks
are mainly based on application-level overlays
(P2P overlays) built over the physical network,
enabling a range of P2P applications such as P2P
file sharing and P2P streaming. They have their
own routing protocols that permit computing de-
vices to share information and resources directly,
without dedicated servers (A-Theotokis, 2004). In
P2P networks, each peer can act as server or as a
client. Each peer can connect to one or more peer
at any time to provide resource sharing.
The P2P paradigm has largely adopted a layered
approach. A P2P overlay network built on top of
the Internet provides a general purpose substrate
that provides many common properties desired by
distributed applications, such as self-organization,
decentralization, diversity and redundancy.
Such an overlay shields distributed application
designers from the complexities of organizing
and maintaining secure overlays, tolerating node
failures, load balancing, and locating application
objects (Wu, 2006).
P2P network architectures can be classified in
three main categories: centralized, decentralized
and hybrid (Franciscani, 2003; Minar, 2001; Wu,
2006). Table 1 shows some categories, derived
from (Minar, 2001), whereas Table 2 shows the ad-
vantages and disadvantages of the P2P categories
considering different properties. In a centralized
P2P network, the topology is based on a central
indexing server (or servers) that maintains a
directory of the resources available on the peers
and coordinates the interaction between peers.
However, after receiving the information from
the central server, peers communicate directly.
The advantage of server based P2P systems is that
they can be more easily managed and therefore
fewer security issues are likely to be involved.
However they are less fault-tolerant as some of
the information is only held by the central server.
If anything goes wrong with the server, the whole
system goes down. The extensibility and scalabil-
ity of these systems depends on the capacity of the
server which is usually limited by its processing
power capabilities.
In decentralized P2P networks, all peers act
as both server and client equally. The communi-
cation is made through multiple unicasts, where
peers forward messages on behalf of others peer.
The decentralized topology is further divided into
two categories i.e. Unstructured P2P overlays, is
Table 1. Classification of P2P Systems
Centralized Decentralized Hybrid
Unstructured Structured
Napster Freenet Chord KazaA
SETI@Home Gnutella CAN Morpheus
Bit Torrent Pastry Overnet/eDonkey2000
Tapastry
Kademlia
108
Peer-to-Peer over Mobile Ad-Hoc Networks
formed when the overlay links are established
arbitrarily by peers. Such networks can be easily
constructed as a new peer that wants to join the
network can copy existing links of another node
and then form its own links over time and struc-
tured P2P overlays, which is precisely controlled
and determined by some algorithm and were
developed to improve the search mechanism to
discover data. The advantage of decentralized
systems is that they can be more easily extended
and are more fault-tolerant than centralized P2P.
However, security is a big issue in these systems.
Decentralized Structured P2P system can be
managed more easily and are more scalable than
their unstructured counterpart. For instance, DHT
may be used to manage the P2P overlay (Dubnicki,
2004; Lua, 2005). In unstructured P2P systems
scalability is difficult to measure due to the lack
of deterministic overlay management mechanism.
Increasing number of nodes supports the resource
sharing system but also increases signaling
overheads as most of unstructured P2P protocols
periodically broadcast messages.
In hybrid (centralized + decentralized) P2P
networks, there are some super-nodes or super-
peers that play a more important role than others.
Peers forward their queries to super-peers which
communicate with each other in a decentralized
manner. Hybrid P2P systems have same advan-
tages as decentralized P2P systems but have
difficulty in managing the peers and in this case
the scalability depends on the actual number of
super peers and their capabilities.

A MANET can be defined as a self organizing and
autonomous system of mobile nodes that com-
municate over bandwidth-constrained wireless
links. Since the nodes are mobile, the network
topology may change rapidly and unpredictably
over time. The network is decentralized, where all
network activity including discovering the topol-
ogy, routing functionality and message delivering
is executed by the nodes themselves (Giordano,
2001; IETF-manet). MANETs represent an al-
ternative to the traditional infrastructure model
of mobile communication: they do not require a
fixed communication infrastructure, but instead
rely on wireless nodes to act as mobile routers.
As the network topology in such a network
may keep changing randomly, the routing proto-
cols used in traditional wired networks cannot be
directly applied in MANETs due to their highly
dynamic topology, absence of established infra-
structure for centralized administration (e.g base
station or access point), bandwidth constrained
wireless links, and resource (energy-constrained
nodes).
A variety of routing protocols for MANET
have been proposed in the literature (Royer, 1999).
These protocols can be classified into several
Table 2. Advantages and Disadvantages of P2P Systems based on different properties
Centralized Decentralized Hybrid
Unstructured Structured
Manageable Yes No Yes No
Coherent Yes No No partially
Extensible No Yes Yes Yes
Fault-Tolerant No Yes Yes Yes
Secure Yes No No No
Lawsuit-Proof No Yes Yes Yes
Scalable Depends on server May be Yes Depends on super peers
109
Peer-to-Peer over Mobile Ad-Hoc Networks
types based on different criteria. Ad hoc network
routing protocols can be classified into three ma-
jor categories based on the routing information
update mechanism.
1. Proactive routing protocols (table-driven)
2. Reactive routing protocols (on-demand)
3. Hybrid routing protocols (proactive +
reactive)
A detailed classification based on different
criteria can be found in (Murthy, 2004). A general
classification is shown in Figure 1.

Although conceptually and practically appealing,
deploying P2P over MANETs is not straightfor-
ward since many of the classic assumptions that
can be made for conventional P2P over wired
networks do not hold any longer. In fact, the ad-
hoc networks flexibility and convenience comes
with new issues (Goldsmith, 2002). MANETs
not only inherit the traditional problems of wire-
less networking such as bandwidth optimization,
power control, and transmission quality enhance-
ment (Giordano, 2001; IEEE-draft, 1999) but, due
to the lack of a fixed infrastructure suffer from
a number of complexities and design constraints
that are specific to ad-hoc networks (Chiasserini,
1999; Corson, 1999). Examples are: dynamically
changing network topology (Chlamtac, 1998),
energy constraints, signaling overheads, varia-
tion in link and node capabilities (Vaidya, 2004),
misbehaving nodes, and unreliable links.
A lot of research in the field of MANETs
addresses the crucial problem of packet routing
and service location issues - this is for example
reflected by the IETF MANET working group.
However, little effort has been made to inves-
tigate other services required by higher-layer
protocols and applications. There is a magnitude
of potentially useful applications for mobile ad-
hoc networks, but application development for
mobile ad-hoc networks is not easy. This issue is
exacerbated in the case of P2P applications, which
are highly distributed and generate traffic surges
from and to unpredictable locations.


Recently, the synergy between MANETs and
P2P networks was recognized (Borg, 2003; Ding,
2004; Franciscani, 2003; Hu, 2003; Klemm,
2003; L. B. Oliveira, 2005; Schollmeier, 2002).
By analyzing the synergy of MANET and P2P
networks, we summarize the similarities between
them as follows.
Dynamic network topology. Nodes in P2P
networks may randomly join and leave the
network without any signs, which causes
the network topology to change frequently
with time. It is the same with MANETs.
Furthermore, the mobility character of
mobile nodes in MANETs can make net-
Figure 1. Classification of MANET routing pro-
tocols
110
Peer-to-Peer over Mobile Ad-Hoc Networks
work topology changes to be even more
frequent.
Multi-hop connection. Nodes in both types
of networks connect with each other via
multi-hop routing. Hop-to-hop connec-
tions in P2P network are typically via TCP
links with physically unlimited range,
while hop-to-hop connections in MANETs
are via wireless links, which are limited by
the radio transmission range.
Decentralized control (infrastructure
less network). Both P2P networks and
MANETs have a decentralized structure.
And there is no central administration
point in the network
Node’s multi-identity. Nodes in P2P net-
works and MANETs act both as client and
a server, as well as implementing routing
functionality. Each node can route and
transfer messages independently and their
nodes have equivalent functionalities and
capabilities. They can also provide re-
source downloading and communicate
with each other directly.
Besides, unstructured P2P networks such as
Gnutella share additional similarities with MA-
NET, including (i) flooding-based routing proto-
cols and (ii) limited scalability due to bandwidth
consuming traffic from flooding.
Despite these similarities there are some ma-
jor differences between both the networks that
are described in Table 3. A detailed discussion
on similarities and differences can be found in
(Schollmeier, 2002).


The similarities and differences between P2P and
MANETs discussed in previous sub section lead
to interesting although challenging research issues
on P2P systems over MANETs. Such as,
Lack of Infrastructure. There are some P2P
protocols that rely on some infrastructure
components in their designs. For example,
CAN (Content Addressable Network)
assigns node identiers based on loca-
tions determined from static landmarks
(Ratnasamy, 2001). These protocols can-
not be adapted in ad hoc scenarios due to
lack of infrastructure.
Frequent topology changes. In MANETs
due to node mobility and limited trans-
mission range, network topology changes
rapidly and unpredictably, which is not the
case in internet. Therefore P2P Protocols
integrated in MANETs need to update their
overlay topology frequently which results
in more overhead to maintain the overlay.
Node Churn. The P2P protocol implement-
ed in MANETs could suffer from the fre-
quent node joining and leaving the network
due to mobility or limited transmission
range and may result in poor performance.
Bandwidth limitation. The limited band-
width in MANETs may limit the usabil-
ity of P2P applications which are usually
bandwidth-intensive.
Limited Battery Power. Many P2P appli-
cations on the internet are not designed to
use minimum message transmissions. In
MANETs it is necessary for nodes to re-
duce the number of message transmissions
while keeping the performance acceptable
to conserve battery power.
Scalability. In structured P2P routing pro-
tocols, nodes can scale up to millions.
MANETs are likely to be much smaller in
scale and have limited capacity than P2P
overlays in the internet. Therefore it is dif-
cult to say that such a large number of
nodes can ever effectively be organized
into one infrastructure-less network.
111
Peer-to-Peer over Mobile Ad-Hoc Networks
Addressing. No specic addressing archi-
tecture has been standardized for MANETs.
Due to node churn in MANETs, it is rea-
sonable to assume that nodes will have
changing IP addresses over the time. This
may be very challenging for structured P2P
protocols that store logical to physical ad-
dresses. In some cases node Identiers are
assigned as hashed IP addressed and there-
fore node identiers will be continuously
changing leading to inconsistency issues.
Flooding. In MANETs many routing pro-
tocols are based on a ooding approach.
In the case of Unstructured P2P protocols,
which also rely on information ooding,
performance degradation will result from
signaling overheads.
Both P2P and MANETs have recently become
popular research areas due to the wide deploy-
ment of P2P applications over the Internet and
rapid progress of wireless communication, but
little research has been done on the convergence
of these two overlay network technologies. Many
decentralized applications have been built upon
P2P overlays and these same ideas may be use-
ful in developing higher level services in an ad
hoc setting.
A number of publications have been devoted
to bringing P2P protocols into ad hoc networks.
Many of those publications are mainly concep-
tual, presenting architectural proposals but not
evaluating them (Conti, 2004; Datta, 2003; Ding,
2004; Eberspacher, 2004; Hu, 2003; Yan, 2004).
A first approach for implementing P2P file shar-
Table 3. Differences between P2P and MANETs
P2P MANET
Layer level Application layer overlay Network layer
Reason of creating a network To provides service over logical infrastructure To provides Connectivity over physical in-
frastructure
Purpose of communication b/w
nodes
Search data do not necessarily communicate Communicate with other users
Communication pattern Multiple unicast with virtual broadcasting Physical broadcasting
Nodes behavior Static Mobile
Communication link Direct Indirect
Relay nodes Not required Required intermediate nodes
Connection medium Fixed wired Wireless
Connection establishment Hop by Hop via TCP links, Whereas the single hop
path length is not physically limited
Hop by Hop via radio links, which are thus
limited by the radio transmission
Connection maintenance Comparatively Easy Difficult
Node location Anywhere on internet Limited area
Network Structure Logical structure apart from physical structure Logical structure corresponds to physical
Structure
Physical position of the node Difficult to find Can be roughly estimated
Routing Reactive only (reliable algorithms not implemented
yet) stops when TTL field is 0
Proactive, Reactive and Hybrid (reliable algo-
rithms exist), Stops when destination is found
Network Topology Changes less frequently Changes more frequently due to mobility
Network Size Large networks (millions of nodes) Usually small networks (few nodes)
Network connectivity Not effected by nodes joining or leaving Effected by nodes joining and leaving
Bandwidth Large bandwidth Small bandwidth
Available Resources Practical unlimited limited
112
Peer-to-Peer over Mobile Ad-Hoc Networks
ing for MANETs constitutes the protocol 7DS
(Papadopouli, 2001), which focus on single-hop
settings. 7DS uses local broadcast transmissions
for sharing Web documents among peers in order
to enable online web browsing without connecting
to the Internet.
PROEM (Kortuem, 2001) aspires to provide
a platform to develop P2P applications for MA-
NETs. Its messages are based on TCP, UDP or
HTTP and employ XML for the representation of
the messages. However it also does not provide
any mechanism to adapt its virtual to the physical
topology. Thus its feasibility in larger MANET
scenarios is doubtful.
Lawrence proposes an approach to use JADE-
LEAP in an ad hoc environment (Lawrence, 2002).
The author proposes the removal of some man-
datory components and adds a Discovery Agent
to support ad hoc networks. Unfortunately this
does not address the question of routing, which
is one of the most critical questions in a MANET
scenario. Later on, the concept of Passive Dis-
tributed Indexing (PDI) (Lindemann, 2002) and
Optimized Routing Independent Overlay Network
(ORION) were introduced (Klemm, 2003). Both
of them focused on building a file sharing sys-
tem on MANET, based on flooding mechanisms
to discover files on demand. A protocol named
MPP emphasized on communication between
application layer and network layer to deploy
P2P systems effectively in mobile environments
(Schollmeier, 2003). This protocol establishes an
intermediate layer which helps passing queries
from application layer to network layer. Although
this protocol is an important step towards an ef-
ficient P2P application on MANET, it still relies
on flooding the network with query lookup. The
use of flooding quickly becomes the performance
bottleneck as the size of MANET grows.
To deploy a P2P system on MANET, main-
taining the overlay connectivity is the most chal-
lenging issue due to node mobility. If we apply
existing Internet P2P solutions to MANET, the
static overlay structure will cause extremely high
connection overheads and inaccurate search for a
file because of node mobility. In addition, flat static
addressing mechanisms are assumed in MANET.
As a consequence, routing is done on demand by
flooding or, otherwise, routing tables have to be
maintained dynamically. Intuitively, routing or
searching a file by flooding yields extremely high
cost. Therefore, the flooding approach is only ap-
plicable to small-scale MANET. Scalability is a
critical challenge for deploying a P2P system to
large MANET with thousands of nodes(Cheng,
2005). In next section we will be discussing the
various design approaches for the convergence
of P2P and MANET.
Figure 2. Taxonomy of P2P over MANET design Approaches
113
Peer-to-Peer over Mobile Ad-Hoc Networks


P2P can be mapped on the top of MANET in
different ways. Various design approaches can be
adopted, based on the classification of decentral-
ized P2P overlays, as shown in Figure 2.
As discussed previously, P2P overlays are
classified into unstructured P2P and structured
P2P overlays. In addition, the nodes in MANETs
have to act as end hosts and routers and are need
to involve in supporting the P2P overlay. The P2P
overlay can be implemented either at the network
layer or at application layer. If a P2P protocol is
layered on top of existing MANETs routing pro-
tocol the corresponding design approach is termed
layered approach. Figure 3 shows a general sce-
nario of P2P application layered on the top of a
MANETs.
If a protocol is embedded with a MANETs
routing protocol at the network layer then this
approach is called integrated or cross-layer ap-
proach, which are used interchangeably. Figure
4 shows a simple example of P2P application
integrated with network layer of MANET.


In (L.B. Oliveira, 2003), the performance of ad
hoc routing protocol under an unstructured P2P
application in MANETs is observed. The authors
studied the performance of three existing MANETs
routing protocols, i.e. AODV (Perkins, 1999),
DSR (Johnson, 1996) and DSDV (Perkins, 1994),
when Gnutella-like (Gnutella, 2000) application
was layered on top. Their results show that each
protocol analyzed, performed well under some
conditions and according to some metrics but had
drawbacks in others; particularly the delivery rate
was quite good but with more number of hops
and latency. Furthermore, it was observed that
the performance of these protocols was different
from those observed in previous studies (Broch,
1998; Das, 2000) for ad hoc network. Later on,
different unstructured P2P protocols (Franciscani,
Figure 3. A P2P application Layered over
MANET(L. B. Oliveira, 2005)
Figure 4. A P2P application integrated with
MANET(L. B. Oliveira, 2005)
114
Peer-to-Peer over Mobile Ad-Hoc Networks
2005; Heer. T, 2006; Lau. G, 2005) were introduced
but their performance over MANET has not yet
been evaluated.
Optimized Routing Independent Overlay Net-
work (ORION) (Klemm et al., 2003) is also based
on the integrated approach. ORION proposes a
P2P file sharing system for MANET. The basis of
ORION is AODV (Perkins, 1999) and the Simple
Multicast and Broadcast protocol for MANET.
ORION combines application-layer query pro-
cessing with the network layer process of the
route discovery from AODV. The results show
that ORION significantly increases the search ac-
curacy as the number of nodes grows and reduces
overheads from searching. In layered approach
the search accuracy was always lower than that
of integrated approach due to more overheads at
large network size.
In (Conti, 2005) a cross-layer Gnutella-like
P2P application is proposed for MANET and its
performance over MANET is investigated. The
comparison with a similar layered design (L.B.
Oliveira, 2003) is made. Results show that a
straightforward implementation of the protocol is
not satisfactory under the point of view of signal-
ing overheads and average overlay connectivity.
A similar work is done in (Rajagopalan, 2006)
who propose a cross-layer decentralized BitTorrent
for MANET. A comparison is made with a modi-
fied version of BitTorrent (BitTorrent, 2001) over
MANET. The results observed were analogous to
those obtained in the cross-layered Gnutella study
mentioned above, which shows that the integrated
approach is more resistant to node mobility and
network partitions and performs better and more
consistently than the layered one.
In summary, the key factor responsible for the
worst performance of the layered design is not the
inefficiency of the search mechanism adapted by
unstructured P2P protocol but due to the overheads
generated in maintaining the overlay topology
whose neighbor connections are not adapted at
the dynamic physical topology.
The layered design not only the limited
scalability of unstructured systems but also the
limited scalability of flooding based ad hoc rout-
ing protocols as both system strongly rely on
information flooding. Additionally, this approach
does not take cross-layer optimization techniques
into consideration so both layers flood the net-
work without being aware of each other (Olaf,
2006). The results of the study indicate that the
integrated unstructured design has significantly
lower overhead compared to the layered design
while achieving better performance according to
application-specific metrics.

In (Cramer, 2006) a Structured P2P protocol,
chord (I.Stoica, 2001) is layered on the top of
three existing MANET routing protocols, AODV,
DSR, and OLSR (Clausen, 2003). In the majority
of all tested scenarios, which varied in network
size, node mobility and application load, it was
found that Chord’s ability to consistently resolve
lookups was significantly impaired. The results
show that chord is unable to perform well under
high mobility.
Similar results were observed in (Hu, 2003;
Pucha, 2004) when slightly modified version of
pastry (A.Rowstron, 2001) was layered on the
DSR ad-hoc routing Protocol. The results show
that it is difficult to take advantage of many
optimization techniques from the interactions
between DHT and ad hoc routing protocol with
layered approach. For example, it is difficult for
the routing structures of the DHT and the route
cache of DSR to coordinate with each other to
optimally discover and maintain source routes
(Pucha, 2004).
In (Delmastro, 2005) the performance of a
structured P2P system (Freepastry), running
on a real ad hoc network, is evaluated. The re-
sults observed were almost same as in (Cramer,
2006; Pucha, 2004). From the implementation
of FreePastry (Freepastry) it was observed that
115
Peer-to-Peer over Mobile Ad-Hoc Networks
carrying out the overlay management through a
high number of remote connections, introduces
a heavy overhead on the ad hoc networks, reduc-
ing the overall system performances. In order to
improve the system, each Pastry node should be-
come aware of the network topology, maintaining
locally a correspondence between physical and
logical address spaces.
Hu and others (Hu, 2003) proposed DPSR,
a network layer unicast routing protocol, which
uses a cross-layer approach for implementing the
structured P2P overlay Pastry as a network-layer
routing protocol, and integrates it with the MANET
routing protocol DSR. No performance evalua-
tion of DPSR is available though. Ekta, which
is based on DPSR, is a DHT for MANETs. Ekta
and DPSR share the essence of tightly integrating
Pastry and DSR at the network layer. However,
unlike DPSR, Ekta does not use DHT for unicast
routing. By the optimizing the cross-layer tech-
niques, integrating route cache of DSR and DHT
protocol into one structure can help to prevent
overheads and increase the overall efficiency of
the system in Mobile ad hoc environment. IP ad-
dresses are directly mapped to pastry node IDs,
enabling efficient routing to particular nodes.
Ekta uses eavesdropping to learn about paths to
close nodes. This knowledge is used to find close
nodes within certain ID spaces for proximity rout-
ing and thus optimize the performance of Pastry.
However this work does not address the issues
like network splits, mergers, and the existence of
multiple DHTs and mostly focuses on the methods
to improve the efficiency of the routing techniques.
The simulation scenario which was chosen makes
network splits impossible, and therefore does not
allow making statements about the performance
of Ekta in these extreme but common situations
(Heer, 2006).
CrossROAD (Delmastro, 2005) is also based
on Pastry. In CrossROAD, the performance of rout-
ing protocols and middleware platforms have been
evaluated in terms of overhead and reconfiguration
delays, in case of mobility scenarios and network
topology changes. In addition, a real prototype
of an optimized P2P system (CrossROAD) that
exploits the cross-layer interactions with a proac-
tive routing protocol (OLSR) has been presented.
However, the evaluation is made on a network of
only eight nodes, so it is still doubtful that this
will work on large MANETs.
In (Cramer, 2005b) the performance of Prox-
imity Neighbor Selection (PNS) for DHT (Dis-
tributed Hash Table) over MANET have been
evaluated. The authors used Chord as their DHT for
simulations. It was observed that the performance
of PNS is strongly dependent on network density,
degrading with increasing density. A different
strategy than PNS for adapting a virtual network
to its underlying network is proximity identifier
selection (PIS) (Gummadi, 2003) where a node’s
overlay address is chosen according to the node’s
current location (Du, 2004; Zahn, 2004).
Iterative Successor Pointer Rewiring Protocol
(ISPRP) (Cramer, 2005a, 2005c) is a P2P routing
protocol for MANET based on Chord. ISPRP is a
self-stabilizing protocol that creates the basic ring
structure of a Chord overlay for overlay-based
routing at the network layer of an ad-hoc network.
It does not employ flooding for discovering the
routes to the successor nodes. However, it does
not handle node mobility at present. Recently,
Zupeng Li and others in (Zupeng Li, 2006) have
proposed a new routing protocol named Peer Com-
puting based Dynamic Source Routing (PDSR)
for MANET which integrates P2P computing
with MANETs routing algorithms. PDSR adopts
a node naming mechanism similar to Chord. The
performance of PDSR over MANET is not yet
evaluated.
In summary, virtually in every scenario the
integrated architecture appear to perform better
than the layered one. The integration of the P2P
structured layer and ad hoc routing layers is crucial
to achieve efficiency, as it significantly reduces
the duplication of routing information and main-
tenance efforts. On the other hand, unstructured
P2P does not have precise control over the overlay
116
Peer-to-Peer over Mobile Ad-Hoc Networks
topology. As a result of lacking structure, the query
protocols in unstructured P2P networks in general
revert to flooding that limits scalability. A sum-
mary of the advantages and disadvantages of the
approaches discussed above is given in Table 4.

This chapter focuses on the interesting develop-
ments surrounding P2P protocols over MANETs.
It is observed that most work involves Gnutella
as an unstructured P2P overlay and CHORD and
Pastry as a structured P2P overlay, in both layered
and integrated approaches over MANETs. The per-
formance of these protocols were observed along
with few new P2P protocols for MANETs but it
would be interesting to see how other structured
P2Pand unstructured P2P protocols will perform
over MANETs. On the other hand if we look at
the literature we observe that only few of the
available MANET routing protocols have been
investigated in relation to P2P, including mainly
AODV, DSR, DSDV and OLSR. The feasibility
of other MANET routing protocols under P2P
applications is still not known. Along with that,
the protocols mentioned in previous sections are
only applicable in some specific scenarios or are
feasible under some metrics. It is unclear which
of the P2P overlay, structured or unstructured,
would be more efficient for supporting distributed
application over MANET. Which design approach
would support scalable unicast in MANETs?
Would it will be possible to apply to the case of
MANETs all the incentive-based and security
techniques which are used when P2P systems
run over internet?

In this chapter we reviewed the convergence
of P2P over MANETs. First we discussed each
technology separately, providing background as
to where and when they emerged. We also dis-
cussed the classification of P2P overlays based
different topologies along with examples. Then
we made the comparison between those topolo-
gies in respect of different properties, giving an
insight on which topology works well under
which scenarios. Furthermore we discussed the
similarities and dissimilarities between P2P and
MANET technologies from various perspectives.
It was interesting to see that although both work
under almost the same scenarios, but have many
differences as well. From this point it will be
easier to understand that in order to implement
P2P protocols over MANET we need to mitigate
those differences to get an optimal system for
MANET. Our review identifies areas that require
further investigation, indicating that a promising
way to tackle the problem is to build P2P-aware
MANETs, rather than attempting a layered ap-
proach.
Table 4. Summarized advantages and disadvantages of different architectures
Architectures
Unstructured Structured
Layered Integrated Layered Integrated
Manageable No No partial Yes
Scalable No Medium Limited Yes
Handle mobility No Yes At low mobility Yes
Overheads High Low Medium Low
Implementation Easy Partially difficult Partially difficult Difficult
117
Peer-to-Peer over Mobile Ad-Hoc Networks

A-Theotokis, S., & Spinellis, D. (2004). A Survey
of Peer-to-Peer Content Distribution Technolo-
gies. ACM Computing Surveys, 36(4), 335–371.
doi:10.1145/1041680.1041681
BitTorrent. (2001). BitTorrent webpage. Retrieved
from http://bitconjurer.org/BitTorrent
Borg, J. (2003). A comparative study of ad hoc
& peer to peer networks. Unpublished Master’s
thesis, University College London.
Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y. C.,
& Jetcheva, J. (1998). A performance comparison
of multi-hop wireless ad hoc network routing pro-
tocols. Paper presented at the 4th annual ACM/
IEEE international conference on Mobile comput-
ing and networking Dallas, Texas, United States.
Cheng, J., Wang, C.-Y., Hoh, C. C., & Hwan, R.-H.
(2005). A Scalable Location-Aware Peer-to-Peer
System for MANET. Paper presented at the Mobile
Technology, Applications and Systems, 2005 2nd
International Conference.
Chiasserini, C. F., & Rao, R. R. (1999). Pulsed
battery discharge in communication devices.
Paper presented at the 5th annual ACM/IEEE
international conference on Mobile computing
and networking.
Chlamtac, I., & Redi, J. (1998). Mobile Comput-
ing: Challenges and Opportunities. In Hemmend-
inger, A. R. D., & Reilly, E. (Eds.), Encyclopedia
of Computer Science (4th ed.). International
Thomson Publishing.
Clarke, I., Sandberg, O., Wiley, B., & Hong, T.
W. (2000). Freenet: A Distributed Anonymous
Information Storage and Retrieval System. Paper
presented at the ICSI Workshop on Design Issues
in Anonymity and Unobservability.
Clausen, T., & Jacquet, P. (2003). Optimized Link-
State Routing Protocol. IETF, RFC-3626, 2003.
Conti, M., Gregori, E., & Turi, G. (2004). Towards
Scalable P2P Computing for Mobile Ad Hoc
Networks. Paper presented at the Second IEEE
Annual Conference on Pervasive Computing and
Communications Workshops (PERCOMW ’04),
Orlando, FL, USA.
Conti, M., Gregori, E., & Turi, G. (2005). A Cross-
Layer Optimization of Gnutella for Mobile Ad hoc
Networks. Paper presented at the 6th ACM inter-
national symposium on Mobile ad hoc networking
and computing, Urbana-Champaign, IL, USA
Corson, M. S., Macker, J. P., & Cirnicione, G.
H. (1999). Internet-Based Mobile Ad Hoc Net-
working. IEEE Internet Computing, 3, 63–70.
doi:10.1109/4236.780962
Cramer, C., & Fuhrmann, T. (2005a). ISPRP: A
Message-Efficient Protocol for Initializing P2P
Networks. Paper presented at the 24th IEEE
International, Performance, Computing, and
Communications Conference (IPCCC), Phoenix,
AZ, USA.
Cramer, C., & Fuhrmann, T. (2005b). Proxim-
ity Neighbor Selection for a DHT in Wireless
Multi-Hop Networks. Paper presented at the Fifth
IEEE International Conference on Peer-to-Peer
Computing (P2P’05)
Cramer, C., & Fuhrmann, T. (2005c). Self-Sta-
bilizing Ring Networks on Connected Graphs.
University of Karlsruhe, Germanyo.
Cramer, C., & Fuhrmann, T. (2006). Performance
evaluation of chord in mobile ad hoc networks.
Paper presented at the 1st international workshop
on Decentralized resource sharing in mobile com-
puting and networking, Los Angeles, California.
Das, S. R., Perkins, C. E., & Royer, E. M. (2000).
Performance comparison of two on-demand
routing protocols for ad hoc networks. Paper
presented at IEEE INFOCOM, Nineteenth An-
nual Joint Conference of the IEEE Computer and
Communications Societies.
118
Peer-to-Peer over Mobile Ad-Hoc Networks
Datta, A. (2003). MobiGrid: Peer-to-Peer Over-
lay and Mobile Ad-Hoc Network Rendezvous - a
Data Management Perspective. Paper presented
at CAiSE 2003 Doctoral Symposium, Klagenfurt,
Austria.
Delmastro, F. (2005). From Pastry to CrossROAD:
CROSS-layer Ring Overlay for AD hoc networks.
Paper presented at the Workshop on Mobile Peer-
to-Peer Computing - MP2P ’05, Kauai, Hawaii.
Ding, G., & Bhargava, B. (2004). Peer-to-peer
File-sharing over Mobile Ad hoc Networks. Paper
presented at the Second IEEE Annual Conference
on Pervasive Computing and Communications
Workshops (PERCOMW ’04), Orlando, FL, USA.
Du, S., & Khan, A. PalChaudhuri, S., Post, A.,
Saha, A. K., Druschel, P., et al. (2004). Self-
Organizing Hierarchical Routing for Scalable
Ad Hoc Networking. Department of Computer
Science, Rice University, Houston, TX, USA.
Dubnicki, C., Ungureanu, C., & Kilian, W.
FPN: A Distributed Hash Table for Commercial
Applications Paper presented at the 13th IEEE
International Symposium on High Performance
Distributed Computing (HPDC-13 ‘04)
Eberspacher, J., Schollmeier, R., Zols, S., & Kun-
zmann, G. (2004). Structured P2P Networks in
Mobile and Fixed Environments. Paper presented
at the International Working Conference on Perfor-
mance Modeling and Evaluation of Heterogeneous
Networks (HET-NETs ’04), Ilkley, West Yorkshire.
Franciscani, F. P., Vasconcelos, M. A., Couto, R.
P., & Loureiro, A. A. F. (2003). Peer-to-Peer over
Ad-hoc Networks: (Re)Configuration Algorithms.
Paper presented at the International Parallel and
Distributed Processing Symposium (IPDPS’03)
Nice, France
Franciscani, F. P., Vasconcelos, M. A., Couto, R.
P., & Loureiro, A. A. F. (2005). (Re)configuration
algorithms for peer-to-peer over ad hoc networks.
Journal of Parallel and Distributed Computing,
65(2), 234–245. doi:10.1016/j.jpdc.2004.09.007
FreeNet. (2000). Freenet Homepage. Retrieved
from http://freenetproject.org/.
Freepastry. Freepastry Homepage. Retrieved from
http://freepastry.rice.edu/FreePastry/
Giordano, S. (2001). Mobile Ad-hoc Networks.
In Stojmenovic, I. (Ed.), Handbook of Wireless
Network and Mobile Computing. John Wiley &
Sons.
Gnutella. (2000). The Gnutella Protocol speci-
fication. Retrieved from http://dss.clip2.com/
GnutellaProtocol04.pdf.
Goldsmith, J., & Wicker, S. (2002). Design chal-
lenges for energy-constrained ad hoc wireless
networks. IEEE Wireless Communications Maga-
zine, 9, 8–27. doi:10.1109/MWC.2002.1028874
Gummadi, K., Gummadi, R., Gribble, S., Rat-
nasamy, S., Shenker, S., & Stoica, I. (2003). The
Impact of DHT Routing Geometry on Resilience
and Proximity. Paper presented at the ACM
SIGCOMM 2003 conference on Applications,
technologies, architectures, and protocols for
computer communications Karlsruhe, Germany.
Heer, T. S, G., S, R., & K, W. (2006). Adapting
distributed hash tables for mobile ad hoc networks.
Paper presented at the Pervasive Computing and
Communications Workshops (PerCom Work-
shops 2006), Fourth Annual IEEE International
Conference.
Heer. T, G. S., Rieche. S., & Wehrle. K. (2006).
Adapting distributed hash tables for mobile ad
hoc networks. Paper presented at the Pervasive
Computing and Communications Workshops
(PerCom Workshops 2006), Fourth Annual IEEE
International Conference.
Hu, Y. C., Das, S. M., & Pucha, H. (2003). Ex-
ploiting the Synergy between Peer-to- Peer and
Mobile Ad Hoc Networks. Paper presented at the
HotOS IX Workshop, Lihue, HI, USA.
119
Peer-to-Peer over Mobile Ad-Hoc Networks
IEEE-draft. (1999). IEEE p802.11/D10 o. IETF-
manet. IETF MANET working Group. Retrieved
from http://www.ietf.org/html.charters/manet-
charter.html
Jiang, S., Liu, Y., Jiang, Y., & Yin, Q. (2004).
Provisioning of adaptability to variable topologies
for routing schemes in MANETs. IEEE Journal
on Selected Areas in Communications, 22(7),
1347–1356. doi:10.1109/JSAC.2004.829352
Johnson, D. B., & Maltz, D. A. (1996). Dynamic
Source Routing (DSR) in AdHoc Wireless Net-
works. In Imielinski, K. (Ed.), Mobile Computing.
Kluwer Academic Publishers. doi:10.1007/978-
0-585-29603-6_5
Jubin, J., & Tornow, J. D. (1987). The DARPA
Packet Radio Network Protocols. Paper presented
at the Proc. of the IEEE.
KaZaA. (2002). KaZaA Homepage. Retrieved
from http://www.kazaa.com.
Klemm, A., Lindemann, C., & Waldhorst, O.
(2003). A special-purpose peer-to-peer file shar-
ing system for mobile ad hoc networks. Paper
presented at the IEEE Vehicular Technology
Conference (VTC 2003).
Kortuem, G., & Schneider, J. (2001). An Ap-
plication Platform for Mobile Ad-hoc Networks.
Paper presented at the Workshop on Application
Models and Programming Tools for Ubiquitous
Computing (UBICOMP 2001), Atlanta, Georgia.
Lau. G, J. M., & Ravindran. G. (2005). RAON:
A P2P Network for MANET. Paper presented at
the Wireless and Optical Communications Net-
works (WOCN 2005) Second IFIP International
Conference.
Lawrence, J. (2002). LEAP into Ad-Hoc Networks.
Paper presented at the Workshop on Ubiquitous
Agents on Embedded, Wearable, and Mobile
Devices, Bologna, Italy.
Lindemann, C., & Waldhorst, O. (2002). A Distrib-
uted Search Service for Peer -to-Peer File Sharing
in Mobile Applications. Paper presented at the
2nd IEEE Conference on Peer-to-Peer Computing
(P2P 2002), Linkoping, Sweden.
Lua, E. K., Crowcroft, J., Pias, M., Sharma, R.,
& Lim, S. (2005). A Survey and Comparison of
Peer-to-Peer Overlay Network Schemes. IEEE
Communications Surveys & Tutorials.
Minar, N. (2001). Distributed Systems Topologies.
Paper presented at the O’Reilly P2P and Web
Services Conference
Murthy, C. S. R., & Manoj, B. S. (2004). Ad Hoc
wireless Networks, Architecture and Protocols.
Prentice Hall.
Napster. (1999). Napster webpage. Retrieved from
http:// www.napster.com
Olaf, L., Stefan, G., & Klaus, W. (2006). Towards
Scalable Mobility in Distributed Hash Tables.
Paper presented at the Sixth IEEE International
Conference on Peer-to-Peer Computing.
Oliveira, L. B., Siqueira, I. G., & Loureiro, A. A.
(2003). Evaluation of ad-hoc routing protocols
under a peer-to- peer application. Paper presented
at IEEE Wireless Communications and Network-
ing (WCNC 2003)
Oliveira, L. B., Siqueira, I. G., & Loureiro, A.
A. F. (2005). On the performance of ad hoc rout-
ing protocols under a peer-to-peer Application.
Journal of Parallel and Distributed Computing,
65(11). doi:10.1016/j.jpdc.2005.05.023
Papadopouli, M., & Schulzrinne, H. (2001). Ef-
fects of Power Conservation, Wireless Coverage
and Cooperation on Data Dissemination among
Mobile Devices. Paper presented at the ACM
Symposium on Mobile Ad Hoc Networking and
Computing (MOBIHOC 2001), Long Beach, CA.
120
Peer-to-Peer over Mobile Ad-Hoc Networks
Perkins, C. E., & Bhagwat, P. (1994). Highly
dynamic destination-sequenced distance-vector
routing (DSDV) for mobile computers. Paper
presented at the ACM SIGCOMM’s conference
on Communications architectures, protocols and
applications London, UK.
Perkins, C. E., & Royer, E. M. (1999). Ad hoc
on-demand distance vector routing(AODV).
Paper presented at the 2nd IEEE Workshop on
Mobile Computing Systems and Applications,
New Orleans, LA.
Pucha, H., Das, S. M., & Hu, Y. C. (2004). Ekta:
An Efficient DHT Substrate for Distributed Ap-
plications in Mobile Ad Hoc Networks. Paper
presented at the 6th IEEE Workshop on Mobile
Computing Systems and Applications (WMCSA
2004), English Lake District, UK.
Rajagopalan, S. S., & Chien-Chung. (2006). A
Cross-layer Decentralized BitTorrent for Mobile
Ad hoc Networks. Paper presented at the Mobile
and Ubiquitous Systems - Workshops, 2006. 3rd
Annual International Conference.
Ratnasamy, P. Francis, M.Handley, R.Karp, &
S.Schenker. (2001). CAN: A scalable content-
addressable network. Paper presented at ACM
SIGCOMM.
Rowstron, A., & Druschel, P. (2001). Pastry: scal-
able, distributed object location and routing for
large-scale peer-to-peer systems. Paper presented
at Middleware, Heidelberg, Germany.
Royer, E. M., & Toh, C.-K. (1999). A Review of
Current Routing Protocols Ad Hoc Mobile Wire-
less Networks. IEEE Personal Communications,
6, 46–55. doi:10.1109/98.760423
Schollmeier, R., Gruber, I., & Finkenzeller, M.
(2002). Routing in Mobile Ad Hoc and Peer-to-
Peer Networks, A Comparison. Paper presented
at the Revised Papers from the NETWORKING
2002 Workshops on Web Engineering and Peer-
to-Peer Computing.
Schollmeier, R., Gruber, I., & Niethammer, F.
(2003). Protocol for peer-to-peer networking in
mobile environments. Paper presented at the IEEE
12th International Conference on Computer Com-
munications and Networks (ICCCN).
Stoica, I., Morris, R., Karger, D., Kaashoek, M.
F., & Balakrishnan, H. (2001). Chord: A Scalable
peer-to-peer lookup service for internet applica-
tions. Paper presented at the ACM SIGCOM,
California, USA.
Vaidya, N. H. (2004). Mobile Ad Hoc Networks:
Routing, MAC and Transport Issues. Paper pre-
sented at the INFOCOM 2004 (IEEE International
Conference on Computer Communication).
Wu, J. (Ed.). (2006). Handbook on Theoriti-
cal and Algorithmic Aspects of Sensor, Ad Hoc
Wireless, and Peer-to-Peer Networks. Auerbach
Publications.
Yan, L., Sere, K., & Zhou, X. (2004). Towards
an Integrated Architecture for Peer-to- Peer and
Ad Hoc Overlay Network Applications. Paper
presented at the 10th IEEE International Work-
shop on Future Trends of Distributed Computing
Systems (FTDCS ’04), Suzhou, China.
Zahn, T., Winter, R., & Schiller, J. (2004). Simple,
efficient peer-to-peer overlay clustering in mobile,
ad hoc networks. Paper presented at the 12th IEEE
International Conference on Networks (ICON
2004), Singapore.
Zupeng Li, X. Y. Peiyang Yao, & Jinnan Huang.
(2006). Implementation of P2P Computing in
Design of MANET Routing Protocol. Paper pre-
sented at the First International Multi-Symposiums
on Computer and Computational Sciences (IM-
SCCS’06), Washington, DC, USA
121
Peer-to-Peer over Mobile Ad-Hoc Networks

Hybrid Routing: This type of protocols com-
bines the advantages of proactive and of reactive
routing. The routing is initially established with
some proactively prospected routes and then
serves the demand from additionally activated
nodes through reactive flooding.
Mobile Ad Hoc Networks: is a kind of wire-
less ad-hoc network, and is a self-configuring
network of mobile routers (and associated hosts)
connected by wireless links.
Overlay Network: is a computer network
which is built virtually or logically on top of
another network.
Peer-to-Peer (P2P): can be broadly defined as
self organizing; decentralized distributed systems
that consist of potentially untrusted, unreliable
nodes with symmetric roles.
Proactive Routing: This type of protocols
maintains fresh lists of destinations and their
routes by periodically distributing routing tables
throughout the network.
Reactive Routing: This type of protocols finds
a route on demand by flooding the network with
Route Request packets.
Structured P2P Overlays: Structured P2P
network employ a globally consistent protocol to
ensure that any node can efficiently route a search
to some peer that has the desired file
Unstructured P2P Overlays: is formed when
the overlay links are established arbitrarily. Such
networks can be easily constructed as a new peer
that wants to join the network can copy existing
links of another node and then form its own links
over time.
ResearchGate has not been able to resolve any citations for this publication.
Article
Distributed computer architectures labeled "peer-to-peer" are designed for the sharing of computer resources (content, storage, CPU cycles) by direct exchange, rather than requiring the intermediation or support of a centralized server or authority. Peer-to-peer architectures are characterized by their ability to adapt to failures and accommodate transient populations of nodes while maintaining acceptable connectivity and performance.Content distribution is an important peer-to-peer application on the Internet that has received considerable research attention. Content distribution applications typically allow personal computers to function in a coordinated manner as a distributed storage medium by contributing, searching, and obtaining digital content.In this survey, we propose a framework for analyzing peer-to-peer content distribution technologies. Our approach focuses on nonfunctional characteristics such as security, scalability, performance, fairness, and resource management potential, and examines the way in which these characteristics are reflected in---and affected by---the architectural design decisions adopted by current peer-to-peer systems.We study current peer-to-peer systems and infrastructure technologies in terms of their distributed object location and routing mechanisms, their approach to content replication, caching and migration, their support for encryption, access control, authentication and identity, anonymity, deniability, accountability and reputation, and their use of resource trading and management schemes.
Article
This paper provides an overview of the work currently underway at Media Lab Europe to enable an existing, open-source, FIPA-compliant agent platform with the ability to operate in an ad-hoc environment. The motivations for using agents in ad-hoc networks and the requirements this places on an agent platform are discussed. A mechanism for discovering instances of an agent platform using current service discovery techniques is presented and we detail how an existing platform will be modified to support this. Finally, modifications to the existing FIPA standards are proposed to support ad-hoc environments.
Article
This document is intended to provide an overview of the effort to enable the Lightweight Extensible Agent Platform (LEAP) to operate in ad-hoc networks. I discuss the motivations behind this project, the usage scenarios and finally the required modifications to LEAP. With this document I wish to inform the members of the LEAP, JADE, and FIPA communities about my research plans and solicit any feedback they may wish to offer.
Chapter
An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination, due to the limited range of each mobile host’s wireless transmissions. This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing. The protocol adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently. Based on results from a packet-level simulation of mobile hosts operating in an ad hoc network, the protocol performs well over a variety of environmental conditions such as host density and movement rates. For all but the highest rates of host movement simulated, the overhead of the protocol is quite low, falling to just 1% of total data packets transmitted for moderate movement rates in a network of 24 mobile hosts. In all cases, the difference in length between the routes used and the optimal route lengths is negligible, and in most cases, route lengths are on average within a factor of 1.01 of optimal.
Conference Paper
In recent years, a number of P2P systems, for instance, Gnutella, KaZaA, Napster, and BitTorrent, have been proposed for the wired Internet. However, these protocols are not immediately applicable to the mobile ad hoc networks (MANETs) owing to the extreme conditions MANETs operate under. Of the above protocols, although BitTorrent has several features which make it an ideal candidate for adapting to MANETs, the current specification of BitTorrent has several drawbacks which make a straightforward implementation of BitTorrent for MANETs an undesirable solution. In this paper, we investigate a straightforward implementation of BitTorrent in MANETs, termed BTI, and compare its performance with a cross-layer adaptation of BitTorrent for MANETs, termed BTM. We resolve the issues of centralized control and single point of failure in BTI by proposing mechanisms to decentralize the BitTorrent model for MANETs and provide resource/data redundancy to improve the protocol performance. In addition, the cross-layer model of BTM is more suited for use in a MANET. Our performance comparison studies show that BTM is able to outperform BTI in terms of goodput, and the number of pieces delivered, in the context of amortizing the client download expenses over more connections (that is, BTM has a higher average peer degree)
Conference Paper
The study of peer-to-peer network and mobile ad hoc network (MANET) are currently two hotspots in distributed computing and mobile communication researching domain. By building up a P2P overlay network on top of MANET's physical infrastructure, we effectively integrated P2P network's advantage on sustaining highly dynamic network into the design of MANET routing protocol. By deploying passive MANET routing algorithms with innovative P2P routing mechanisms, we propose a new kind of MANET routing protocol named peer computing based dynamic source routing (PDSR). A detailed description of the P2P decentralized naming, route discovering, route querying and updating algorithm used in PDSR is presented in this paper. The simulation results indicate that PDSR has an improved routing performance in comparison with the popularly used DSR protocol
Article
Mobile ad hoc networks (MANETs) and peer-to-peer (P2P) applications are emerging technologies based on the same paradigm: the P2P paradigm. Motivated, respectively, by the necessity of executing applications in environments with no previous infra-structure and the demand for applications that share files or distribute processing through the Internet, MANETs and P2P applications have received some interest from research community. As a characteristic of the distributed model, which they follow, such technologies face a difficult task of routing requests in a decentralized environment. In this paper, we conducted a detailed study of a Gnutella-like application running over a MANET where three different protocols were considered. The results show that each protocol that were analyzed performed well in under some conditions and for some metrics, while had drawbacks in others.