Article

PIC-a Peer-to-Peer Protocol for Mobile Devices

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

In wireless and especially mobile communications the bandwidth and the amount of transferred data become key aspects. Due to the bandwidth limitations wireless devices may join P2P (Peer-to-Peer) content sharing networks only for a limited time period. Enhancements and possibly new protocols are necessary for wireless peer-to-peer applications. Introducing intelligent search/indexing techniques we can reduce the amount of traffic in the network and balance user load (with some additional cost of implementation complexity). The Parallel Index Cluster (PIC) approach is proposed as an efficient candidate, as a network traffic reduction is expected with at least one order of magnitude compared to basic and enhanced Gnutella networks [1]. In this article a new modeling of P2P systems, the SIL (Search Index Link) [2] method is described, and based on this a new P2P protocol is introduced, which is suitable for mobile devices. For this new protocol (PIC) different cluster topologies are analyzed. To produce minimal network traffic, simulation results and mathematical analysis are given to optimize the cluster sizes in the network.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

ResearchGate has not been able to resolve any citations for this publication.
Conference Paper
Full-text available
A very efficient peer-to-peer application layer architecture is analyzed as a potential candidate for wireless peer-to-peer applications. Its performance in terms of generated traffic and load balance are simulated for different network sizes. A number of candidate cluster topologies are proposed. Based on the simulation results, the optimal cluster topology and cluster size are identified. We conclude that cluster sizes that are the square root of the number of nodes generate uniform traffic. The cluster topology should be star, ring or a compromise between the two, 'planned N'. We show that, for these topologies, the traffic increases less than linearly with the number of nodes in the network, making it highly scalable. Our conclusions are valid for uniform query and update distributions. In addition to the approach from earlier work (Csucs, G. et al., 2002), maintenance aspects are also dealt with; we briefly describe the basic link management procedures that make such networks feasible, but we do not cover their performance analysis. Neither do we treat query topologies.
Article
From the Publisher:Upstart software projects Napster, Gnutella, and Freenet have dominated newspaper headlines, challenging traditional approaches to content distribution with their revolutionary use of peer-to-peer file-sharing technologies. Reporters try to sort out the ramifications of seemingly ungoverned peer-to-peer networks. Lawyers, business leaders, and social commentators debate the virtues and evils of these bold new distributed systems. But what's really behind such disruptive technologies -- the breakthrough innovations that have rocked the music and media worlds? And what lies ahead? In this book, key peer-to-peer pioneers take us beyond the headlines and hype and show how the technology is changing the way we communicate and exchange information. Those working to advance peer-to-peer as a technology, a business opportunity, and an investment offer their insights into how the technology has evolved and where it's going. They explore the problems they've faced, the solutions they've discovered, the lessons they've learned, and their goals for the future of computer networking. Until now, Internet communities have been limited by the flat interactive qualities of email and network newsgroups, where people can exchange recommendations and ideas but have great difficulty commenting on one another's postings, structuring information, performing searches, and creating summaries. Peer-to-peer challenges the traditional authority of the client/server model, allowing shared information to reside instead with producers and users. Peer-to-peer networks empower users to collaborate on producing and consuming information, adding to it, commenting on it, and building communities around it. This compilation represents the collected wisdom of today's peer-to-peer luminaries. It includes contributions from Gnutella's Gene Kan, Freenet's Brandon Wiley, Jabber's Jeremie Miller, and many others -- plus serious discussions of topics ranging from accountability and trust to security and performance. Fraught with questions and promise, peer-to-peer is sure to remain on the computer industry's center stage for years to come.