Improved Dominating Set Indices for Mobile Peer-to-Peer Networks

Size: px
Start display at page:

Download "Improved Dominating Set Indices for Mobile Peer-to-Peer Networks"

Transcription

1 Improved Dominating Set Indices for Mobile Peer-to-Peer Networks Shanping Li, Wei Shi, Xin Lin, and Channa Nizamuddin College of Computer Science Zhejiang University Hangzhou, P.R.China Abstract According to 2-hop neighborhood information, Dynamic Dominant Index Set (DDIS) [10] is constructed to cache metadata of shared resources in mobile Ad Hoc network (MANET). However, DDIS presents poor performance on system overhead and user satisfaction. To adapt network mobility, in DDIS have to periodically advertise their shared resources over the entire network, which consumes more bandwidth. In this paper, an Improved Dominating Set Indexing Mechanism (IDSIM) for mobile peer-to-peer networks is proposed. In IDSIM, partial dominating sets automatically adjust themselves to the change of network topology in a distributed fashion. Metadata of identical resources belonged to deferent is clustered in one dominating set. This potentially increases in amount of query results with short latency to achieve considerable high user satisfaction. Based on random walk [4], query message roams in the network to maximize the number of results. Experiments indicate that besides greatly reducing the system overhead, IDSIM simplifies search process and, at the same time, improves user satisfaction without sacrifice of user response time. 1. Introduction With the advance in wireless communication technologies, the popularity of wireless network-enabled devices increases rapidly in recent years. Mobile ad hoc network (MANET) helps such devices to communicate with each other in a noninfrastructural manner, which is more attractive to military operations, disaster relief efforts, and ubiquitous applications. P2P computing, characterized by its pure decentralized, self-organizing and scalable natures, matches with MANET greatly, then form a new research This paper is supported by National Natural Science Foundation of China (No ) area, MP2P. MP2P network refers to the mobile ad hoc network that employs P2P mechanism to address informationretrieving problems. Interesting application scenarios include exchanging traffic data between vehicles in a widerange MANET and MP3-players sharing MP3-format music directly. Devices equipped with wireless networking interface are typically resource-weak embedded systems. To be available longer, they have to minimize network traffic since they consume more power when connected to the network. The limitations of network bandwidth and computing power constrain these devices from handling large mount of access requests. The topology of MANET changes from time to time without a-priori knowledge of arriving or departing nodes. It is a mission impossible for the nodes to be aware of the topology change of entire network. The factors mentioned above challenge classic wired P2P file sharing mechanisms, which heavily depend on connectivity among and other network components. Structured P2P applications such as CHORD [11] apply dynamic hash table (DHT) to transfer shared resources to specific. However, such approaches could not work well in MP2P environment because of its requirement of a stable logical topology, which is quite difficult to implement in MANET due to the overhead to keep the consistency between geographical and logical topologies. Hybrid P2P applications like Napster [2] need a control center to publish the information about shared resources. This method, can nevertheless not be deployed on MP2P since there exists a single point whose failure will lead to a sudden stop of the search operation, hence will deduct the stability of applications. The unstructured mechanisms represented by Gnutella [1] are more suitable for addressing the issues arising in MP2P environment such as dynamic locating, realtime searching and so on because they provides a pure decentralized and up-to-date searching. Each query is blindly broadcast to directly connected, which continue the same process until the results are found. But this method requires a lot of network bandwidth when a query is launched

2 and hence is not proved to be very scalable [3]. Dynamic dominant index set (DDIS) [10] algorithm of file sharing, based on minimum connected dominating set (MCDS), is actually an index replication mechanism. MCDS is the minimum connected set of nodes such that each node in the network is either in the set or is a neighbor of a node in the set. Peers in DDIS advertise their resources periodically over the dominating set. Since in MANET lack of knowledge on global network, DDIS modifies dominating pruning (DP) algorithm [6], an efficient distributed approximation to MCDS, to build the index set for each peer. Taking the advantage of information redundancy, DDIS gains improvement on user response time, reliability, scalability etc. However, in DDIS the index sets differ from different points of view. That implies querying peer has to consult multiple index sets to gather certain number of results, which makes the searching process longer with higher user satisfactions. Under the assumptions that indexing cover the whole network, querying peer simply broadcasts in 2-hop neighborhood and will do nothing if inadequate results returned. This hampers them maximizing the returned results. In this paper, we propose the Improved Dominating Set Index Mechanism, which enhances the DDIS mechanism. In IDSIM, the metadata of identical resources is clustered in one index set. That is to say, ID- SIM is a resource oriented data dissemination mechanism. Each index set is partially recalculated to adapt the network changes. In addition, random walk is invited to implement the query process, which is proved to be an efficient searching mechanism in P2P networks [8]. The paper is organized as follows. In next section, the related work is discussed. In section 3, We describe IDSIM mechanism in detail. An example network of IDSIM is illustrated in section 4. Simulation results and analyzes are presented in section 5 to demonstrate the performance of our mechanism. Finally we conclude our study in section Related Work In [7] the author put forward a locating mechanism in MP2P network, named PDI. By caching all the replies the heard, PDI gains considerably good performance. But this approach bothers many participants and the have to consume lots of computing power to perform the required tasks. In [9], Papadopouli introduced a P2P architecture called 7DS, which enables resource sharing in a selforganizing, P2P fashion without the need of an infrastructure. But it emphasizes on the application layer rather than network routing protocols. Klemm ([5]) proposed ORION mechanism for searching and file transfer tailored to both the characteristics of MANET and the requirements of P2P file sharing. Figure 1. IDSI constructing process 3. The IDSI Mechanism In IDSIM, when a node receives an ADV packet from its neighbor, it will calculate the next dominating nodes according to its 2-hop neighborhood information. Here, the unit disk graph,g=(v,e), is introduced to represent a MP2P network, where V represents a set of mobile and E represents a set of edges. An edge (u, v) indicates that both u and v are within their transmitter ranges and, hence, the connections of are based on geographic distances of them. The circle around a peer u shows the transmission range of u. A peer can obtain his neighborhood information by periodically sending an update request. We use N(u) to represent the neighbor set of u. N(N(u)) represents the neighbor set of N(u). Note that 2-hop neighborhood information can be obtained by periodic Hello packet, which contains the sender s identification and the list of its neighbors. In this paper, we assume that u (sender) and v (receiver) are neighbors. 3.1 Constructing IDSI When a peer initiates an IDSI constructing process, it picks up the dominating in its neighborhood to form local dominating set and sends an ADV packet to these dominating nodes. The ADV packet contains the peer id, the metadata of its shared resource, the expiring time of shared resource, and the local dominating set of that packet. Then the receivers calculate their own local dominating sets and relay the packet. This process continues until the whole network is covered. The local dominating set of v in IDSI can be computed in following way, note that F (u) here denotes as u s local dominating set passed to v: 1. Let F (u, v) =[](empty set), Z = φ (empty set) and K = S i where S i = N(v i ) (U(u, v) N(N(v) F (u))), S i = N(v i P (u, v)) for v i B(u, v). 2. If there exists any peer w in P that v can notify only through v n, F (u, v) =F (u, v) v n, Z = Z S n, K = K S n, and S j = S j S n for all S j K. This

3 step repeats until no peer in P that v can notify only through v n. 3. Find set S k with the maximum size in K. (In case of a tie, the one with the smallest identification k is selected.) 4. F (u) =F (u, v) v k, Z = Z S k, K = K S k, and S j = S j S k for all S j K. 5. If no new node is added to Z, exit; otherwise, goto step 3. Constructing process evaluates the number of in U(u, v) (see figure 1), so called evaluating, which can be covered by v i in decision of including/excluding v i in/from F (u, v). The evaluating can be denoted as P (u, v) = U(u, v) N(N(v) F (u)), where U(u, v) represents the uncovered that are 2 hops away from v. From the constructing process, we can easily figure out 1. Shared item 2. Initiator 3. Contributing 4. Previous dominating peer 5. Next dominating 6. Expiring time Figure 2. The cache table of each dominating that the dominating sets differ from different viewpoint although their coverage is the same. In fact, DDIS constructs dominating index set for each peer. However, in IDSIM the identical resources share the same indexing set. When a peer attempts to advertise its resource, it first performs the searching process, which is described in following section, to see if any participant has already shared the resource. It will initiate constructing process for that resource if no results returned. Then we call the peer the initiator of that resource. Otherwise, it will notify the shared resource s initiator of its sharing willing. It is the initiator s responsibility of updating the dominating index set to include source. As figure 2 shows, dominating for a specific resource maintain cache tables obtained mainly from ADV packets. Source constantly communicate with initiator and inform it of their availability. When the initiator fails or is turned off, its directly connected dominating will detect it and choose its substitute in source. Any static linear ordered attributes (e.g., the largest IP number) of these source can be the metrics of selection. The selected source peer will be notified and start constructing another dominating indices. The dominating indices built by previous initiator will be discarded with the vanish of that initiator when the valid cache tables expired. 3.2 Maintaining IDSI In DDIS, source peer periodically reconstructs its dominating set to adapt the network change. This method bothers too many, thus, burden the whole system s workload. When the network topology changes, IDSIM partially modifies dominating set. We summarize topological changes of MP2P networks into three types: peer s join, peer s departing, and peer s movement. The dominating set will remain unchanged if the newly joined peer is a direct neighbor of one dominating peer. Otherwise, the dominating nearby can detect instantly the participating according to its 2-hop neighborhood information. Then these dominating will start up adapting process to include the newly joined peer into the zone of IDSI s coverage. On the other hand, the departing of a dominating peer can also be detected by other dominating. Adapting process is performed by these to select the substitutes of the departing. We do not take into consider that the departing peer is not a dominating peer because it does not affect the functionality of dominating set indices. However, the peer s movement can be treated as the composition of peer s join and departing. Adapting process is in fact similar with constructing process described in previous subsection. Every dominating peer can start adapting process as soon as it detects any one of the three topological change patterns mentioned above. It will re-evaluate its evaluating and select dominating in its neighborhood. This step is iterated in the rest of the network. However, when dominating peer receives adapting requests, it will select its local dominating set if there is considerable change in its 2-hop neighborhood. Otherwise, the adapting process will cease at this peer. As we can see, the adapting work just involves small fraction of the whole network. Thus, the cost of IDSI maintenance would be low. 3.3 Searching in IDSI To maximize the returned results while cutting down the network traffic, we employ a restricted random walk to perform searching process. Like the algorithm in constructing process, querying peer selects key nodes in its neighbors and sends queries to them. Then these key nodes repeat the same process. Restricted random walk means queries are forwarded for limited number of hops. When the TTL of the query is decreased to 0, the searching process terminates.

4 4. A Case Study In this subsection, we will illustrate our IDSI mechanism with an example to show its advantages. Fig. 3 shows a sample network of 14. Assuming that peer 1 initiates a constructing process for resource R with peer 2 and peer 3 in its forward list, as well as the metadata of his shared resources and the packet s expiring time, let us have a look at what the forward list of peer 2 will be. According to the packet receiving from peer 1, peer 2 knows that peer 3 is also in the forward list. It will be aware that peer 8, who is 2 hops away from him, can be safely excluded from his evaluating set because he knows that peer 3 will tell peer 8 the information of that packet. And in IDSIM, by selecting the key neighbors first, peer 2 will select peer 4 and peer 6 in his forward list, while in DP algorithm an additional peer of 5 will also be selected because peer 5 is the neighbor of peer 2 with the maximum degree, say {10, 11, 12, 13} here, and will be included in peer 2 s forward list at first. Using ID- SIM algorithm, only 4 ({2, 3, 4, 6}) cover all 14 and construct the backbone of current network. The metadata of the resource shared by peer 1 is available on the four. If a peer, for example peer 11 here, wants to look up resource R, it will at first search its cached data. If this step failed, it will continue to consult the key which are 4 and 5 in its neighbors. Since peer 4 is in the dominating set indices of resource R, peer 11 will quickly get the result from it. And because of the mobility of MP2P network, the backbone of the network will change frequently. Peer 2,3,4 and 6 need to monitor join and departing of their neighbors to dynamically adapt to network changes. The expiring time in the advertising packet indicates the time until when the shared resources are still valid. After roaming out of the dominating set, the dominating will naturally delete the expired metadata they cached when no more refresh advertising packet comes. 5. Performance Results In this section, we present the simulation results of IDSI mechanism. In these simulations, we concentrate on system overhead and user response time with different user satisfactions compared with DDIS. 5.1 Simulation Environment We used an IEEE standard MAC layer and a standard physical layer deploying two-ray ground propagation as radio propagation model. The transmission range of each peer is about 115m with the transmission power of mW. N P eers roaming in an area of 1000m 1000m and N Docs shared files are involved in our simulations. The maximum speeds of all in different simula- Parameter Table 1. Default simulation parameters Value Transmission range 115m Number of Peers N P eers 60 Simulation time 1h Maximum speed S max 1.5m/sec Number of shared documents N Docs 18 Simulation area 1000m 1000m tions are chosen from [0,S max ]. Table 1 shows the default simulation parameters. Figure 3. A sample network of 14 peer with initiator of peer Simulation Results We count ADV packets that each peer generates or forwards and sum them up to evaluate the performance of ID- SIM and DDIS. System overhead. Figure 4 shows the system traffic load of IDSIM and DDIS mechanism with different number of participant. We can easily find out that DDIS consumes more bandwidth than IDSIM. In DDIS, each source peer maintains its own dominating indices. When the network changes, it has to rebuild a new dominating set, which burdens the workload of. With the number of increasing, IDSIM gains better performance because fewer are included to adapt network changes. Without loss of performance, IDSIM consumes about double bandwidth to DDIS. User response time. Figure 5 illustrates the response time of DDIS and IDSIM with different user satisfactions. In IDSIM, metadata of identical resources is clustered on just one dominating set, which simplifies the searching process. We can see that when user satisfactions changes, the response time of IDSIM changes little because they have lit-

5 Network Traffic Load (KB/S) DDIS IDSIM Number of Peers Figure 4. Network traffic load of two mechanisms tle influence upon the searching process. But to DDIS, this is not the case. Querying peer has to consult more to achieve higher user satisfactions. The higher user satisfactions we set, the longer user response time DDIS delays. When user satisfaction reaches 20, DDIS spends about 3 to 4 times longer than IDSIM. Response Time (unit) IDSIM DDIS User satisfaction Figure 5. User response time of two mechanisms with different user satisfactions 6. Conclusions In this paper, we put forward the improvement of DDIS named improved dominating set indices for mobile peer-topeer networks. By advertising shared resources periodically on the backbone of MP2P network, DDIS achieves characteristics such as shorter response time, robustness, and scalability. But DDIS still has its shortcomings like heavy system overhead and weak user satisfaction. Our contributions can be concluded as: 1) proposing a clustering mechanism to gather the metadata of identical resources; 2) modifying DDIS by partially updating the dominating set in a distributed fashion; 3) inviting random walk to act as searching process; and 4) proving the effectiveness of IDSIM by conducting simulations. The IDSI mechanism is based directly on the network layer and keeps consistence with the geographical topology, which makes it more efficient and suitable for every applications in MP2P environment. Note that, the IDSI mechanism is not limited to solve locating problem in MP2P environment. More works need to be done to study the effectiveness of inviting MDCS concept into wired P2P and sensor networks. References [1] Gnutella website. [2] Napster website. [3] Why gnutella can t scale. jpr5/doc/gnutella.html. [4] C. Gkantsidis, M. Mihail, and A. Saberi. Random walks in peer-to-peer networks. Proceedings of Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, 1, March [5] A. Klemm, C. Lindemann, and O. Waldhorst. A specialpurpose peer-to-peer file sharing system for mobile ad hoc networks. Proceedings of Workshop on Mobile Ad Hoc Networking and Computing, pages 41 49, March [6] H. Lim and C. Kim. Flooding in wireless ad hoc networks. Computer Communications, 24(3-4): , [7] C. Lindemann and O. Waldhorst. A distributed search service for peer-to-peer file sharing in mobile applications. Proceedings of The 2nd International Conference on Peer-to- Peer Computing, September [8] Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker. Search and replication in unstructured peer-to-peer networks. Proceedings of the 16th annual ACM International Conference on supercomputing (ICS) 2002, [9] M. Papadopouli and H. A. Schulzrinne. Performance analysis of 7ds: a peer-to-peer data dissemination and prefetching tool for mobile users. IEEE Sarnoff Symposium Digest of Advances in wired and wireless communications, March [10] W. Shi and S. Li. Dynamic dominant index set for mobile peer-to-peer networks. Proceedings of International Conference on Computational Science 2005, May [11] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H.Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. Proceedings of ACM SIG- COMM 2001, August 2001.

Dominating-Set-Index based Searching Algorithm in Mobile P2P Networks

Dominating-Set-Index based Searching Algorithm in Mobile P2P Networks Dominating-Set-Index based Searching Algorithm in Mobile P2P Networks Cheng Chang 1, Ye Wang 2, and Jie Sun 3 1 College of Computer Science, Zhejiang University, Hangzhou, China 2 School of Computer and

More information

Peer-to-Peer (P2P) Communication

Peer-to-Peer (P2P) Communication eer-to-eer (2) Communication 1 References Lv, Cao, Cohen, Li and Shenker, Search and Replication in Unstructured eer-to-eer Networks, In 16 th ACM Intl Conf on Supercomputing (ICS), 2002. S. Kang and M.

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

Performance of New Broadcast Forwarding Criteria in MANET

Performance of New Broadcast Forwarding Criteria in MANET Performance of New Broadcast Forwarding Criteria in MANET Lijuan Zhu 1, Bu-Sung Lee 1, Boon-Chong Seet 2, Kai-Juan Wong 3, Genping Liu 1, Shell-Ying Huang 1, and Keok-Kee Lee 1 1 Centre for Multimedia

More information

On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks

On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks Wei Lou and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL Abstract Unlike in a wired network,

More information

A local area network that employs either a full mesh topology or partial mesh topology

A local area network that employs either a full mesh topology or partial mesh topology and Ad Hoc Networks Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology each node is connected directly to each of the others Partial mesh

More information

Peer Clustering and Firework Query Model

Peer Clustering and Firework Query Model Peer Clustering and Firework Query Model Cheuk Hang Ng, Ka Cheung Sia Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR {chng,kcsia}@cse.cuhk.edu.hk

More information

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Adaptive Data Dissemination in Mobile ad-hoc Networks

Adaptive Data Dissemination in Mobile ad-hoc Networks Adaptive Data Dissemination in Mobile ad-hoc Networks Joos-Hendrik Böse, Frank Bregulla, Katharina Hahn, Manuel Scholz Freie Universität Berlin, Institute of Computer Science, Takustr. 9, 14195 Berlin

More information

CS5984 Mobile Computing

CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector

More information

Modeling and Analysis of Random Walk Search Algorithms in P2P Networks

Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik and Alhussein Abouzeid Electrical, Computer and Systems Engineering Department Rensselaer Polytechnic Institute Troy,

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks

Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks Som Chandra Neema Venkata Nishanth Lolla {sneema,vlolla}@cs.ucr.edu Computer Science Department University of California, Riverside Abstract

More information

Multi-Tier Mobile Ad Hoc Routing

Multi-Tier Mobile Ad Hoc Routing Multi-Tier Mobile Ad Hoc Routing Bo Ryu Tim Andersen Tamer Elbatt Network Analysis and Systems Dept. HRL Laboratories, LLC. Malibu, CA, USA. {ryu,cellotim,telbatt}@wins.hrl.com Abstract We present a new

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Multicast over Vehicle Ad Hoc Networks

Multicast over Vehicle Ad Hoc Networks 1 Multicast over Vehicle Ad Hoc Networks Alberto Gordillo Muñoz Abstract Vehicular networks may improve the safety and efficiency of road travel but there are many challenges that still need to be overcome.

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

An Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments

An Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments An Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments Sun-Kyum Kim, Kwang-Jo Lee, Sung-Bong Yang Departement of Computer Science Yonsei University Repubilc of Korea {skyum,

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET MPBCA: Mobility Prediction Based Clustering Algorithm for MANET Rani.V.G Associate Professor Research and Development Center Bharathiar University Coimbatore, India ranikhans@gmail.com Dr.M.Punithavalli

More information

Resilient GIA. Keywords-component; GIA; peer to peer; Resilient; Unstructured; Voting Algorithm

Resilient GIA. Keywords-component; GIA; peer to peer; Resilient; Unstructured; Voting Algorithm Rusheel Jain 1 Computer Science & Information Systems Department BITS Pilani, Hyderabad Campus Hyderabad, A.P. (INDIA) F2008901@bits-hyderabad.ac.in Chittaranjan Hota 2 Computer Science & Information Systems

More information

Load Sharing in Peer-to-Peer Networks using Dynamic Replication

Load Sharing in Peer-to-Peer Networks using Dynamic Replication Load Sharing in Peer-to-Peer Networks using Dynamic Replication S Rajasekhar, B Rong, K Y Lai, I Khalil and Z Tari School of Computer Science and Information Technology RMIT University, Melbourne 3, Australia

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Control Traffic Analysis of On-Demand Routing Protocol. in Mobile Ad-hoc Networks

Control Traffic Analysis of On-Demand Routing Protocol. in Mobile Ad-hoc Networks Second International Conference on Networking and Distributed Computing Control Traffic Analysis of On-Demand Routing Protocol in Mobile Ad-hoc Networks Zhilin Zhang School of Computer Science & Technology

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

A New Packet Forwarding Algorithm in Geographical Location Based Mobile Ad Hoc Routing Protocol

A New Packet Forwarding Algorithm in Geographical Location Based Mobile Ad Hoc Routing Protocol roceedings of the 5th WSEAS International Conference on Applied Computer Science, Hangzhou, China, April 16-18, 2006 (pp165-170) 1,2 A New acket Forwarding Algorithm in Geographical Location Based Mobile

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks Yamin Li and Shietung Peng Department of Computer Science Hosei University Tokyo 18-858 Japan {yamin, speng}@k.hosei.ac.jp

More information

Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs

Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs Priyadharshini.A #1 and Uvaraj Arutkumaran.S, *2 # ME, Information Technology, Sri Venkateswara

More information

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract

More information

FUtella Analysis and Implementation of a Content- Based Peer-to-Peer Network

FUtella Analysis and Implementation of a Content- Based Peer-to-Peer Network 8th Netties Conference Technische Universität Ilmenau September 30th to October 2nd 2002 T. Zahn / H. Ritter / J. Schiller / H. Schweppe FUtella Analysis and Implementation of a Content- Based Peer-to-Peer

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture 1 S. Das 2 A. Thakur 3 T. Bose and 4 N.Chaki 1 Department of Computer Sc. & Engg, University of Calcutta, India, soumava@acm.org

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Efficient Peer-to-Peer Information Sharing over Mobile Ad Hoc Networks

Efficient Peer-to-Peer Information Sharing over Mobile Ad Hoc Networks Efficient Peer-to-Peer Information Sharing over Mobile Ad Hoc Networks Mei Li Wang-Chien Lee Anand Sivasubramaniam Department of Computer Science and Engineering Pennsylvania State University University

More information

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Broadcast Updates with Local Look-up Search (BULLS): A New Peer-to-Peer Protocol

Broadcast Updates with Local Look-up Search (BULLS): A New Peer-to-Peer Protocol Broadcast Updates with Local Look-up Search (BULLS): A New Peer-to-Peer Protocol G. Perera and K. Christensen Department of Computer Science and Engineering University of South Florida Tampa, FL 33620

More information

An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols in MP2P Networks

An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols in MP2P Networks 2015 Fifth International Conference on Advanced Computing & Communication Technologies An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Masaru Yoshimachi and Yoshifumi Manabe movement of the devices. Thus the routing protocols for MANET need

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Evaluating Unstructured Peer-to-Peer Lookup Overlays

Evaluating Unstructured Peer-to-Peer Lookup Overlays Evaluating Unstructured Peer-to-Peer Lookup Overlays Idit Keidar EE Department, Technion Roie Melamed CS Department, Technion ABSTRACT Unstructured peer-to-peer lookup systems incur small constant overhead

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Improved Self-Pruning for Broadcasting in Ad Hoc Wireless Networks

Improved Self-Pruning for Broadcasting in Ad Hoc Wireless Networks Wireless Sensor Network, 2017, 9, 73-86 http://www.scirp.org/journal/wsn ISSN Online: 1945-3086 ISSN Print: 1945-3078 Improved Self-Pruning for Broadcasting in Ad Hoc Wireless Networks Raqeebir Rab 1,

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Paper by: Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Outline Brief Introduction on Wireless Sensor

More information

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks Wei Lou and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343

More information

A Comparative Analysis between Forwarding and Network Coding Techniques for Multihop Wireless Networks

A Comparative Analysis between Forwarding and Network Coding Techniques for Multihop Wireless Networks A Comparative Analysis between Forwarding and Network Coding Techniques for Multihop Wireless Networks Suranjit Paul spaul2@connect.carleton.ca Broadband Network Lab, Carleton University Acknowledgements

More information

Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network

Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network Wireless Sensor Network, 2010, 2, 710-717 doi:10.4236/wsn.2010.29086 Published Online September 2010 (http://www.scirp.org/journal/wsn) Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor

More information

Reliable Mobile Ad Hoc P2P Data Sharing

Reliable Mobile Ad Hoc P2P Data Sharing Reliable Mobile Ad Hoc P2P Data Sharing Mee Young Sung 1, Jong Hyuk Lee 1, Jong-Seung Park 1, Seung Sik Choi 1, and Sungtek Kahng 2 1 Department of Computer Science & Engineering, University of Incheon

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

They avoid the cost, installation, and maintenance of network infrastructure.

They avoid the cost, installation, and maintenance of network infrastructure. Ad Hoc Network Ammar Abu-Hudrouss Islamic University Gaza ١ Introduction An ad hoc wireless network is a collection of wireless mobile nodes that self-configure to form a network without the aid of any

More information

A New Mobile Peer-to-Peer Architecture

A New Mobile Peer-to-Peer Architecture Proceedings of the 5th WSAS International Conference on Applied Computer Science, Hangzhou, China, April 16-18, 2006 (pp1083-1088) A New Mobile Peer-to-Peer Architecture JIUJUN CHNG, YUHONG LI, LI JIAO

More information

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks Georgia State University ScholarWorks @ Georgia State University Computer Science Theses Department of Computer Science 12-4-2006 An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

More information

A Scheme of Multi-path Adaptive Load Balancing in MANETs

A Scheme of Multi-path Adaptive Load Balancing in MANETs 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

A Server-mediated Peer-to-peer System

A Server-mediated Peer-to-peer System A Server-mediated Peer-to-peer System Kwok, S. H. California State University, Long Beach Chan, K. Y. and Cheung, Y. M. Hong Kong University of Science and Technology A peer-to-peer (P2P) system is a popular

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems Update Propagation Through Replica Chain in Decentralized and Unstructured PP Systems Zhijun Wang, Sajal K. Das, Mohan Kumar and Huaping Shen Center for Research in Wireless Mobility and Networking (CReWMaN)

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department

More information

Sensor Network Protocols

Sensor Network Protocols EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted

More information

Abstract 1.1. OVERVIEW

Abstract 1.1. OVERVIEW Operation of Dynamic Source Routing in Wireless Mobile Ad Hoc Networks Kestina Rai 1, Rubinder Kaur 2, Kanchan Aggarwal CSE/IT Department, PTU Chandigarh Engineering College, Landran(Punjab) cupids2@rediffmail.com,rubykhokhar@gmail.com

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Sabina Serbu, Silvia Bianchi, Peter Kropf and Pascal Felber Computer Science Department, University of Neuchâtel

More information

WEB CACHE BASED DATA ACCESS IN WIRELESS ADHOC NETWORKS

WEB CACHE BASED DATA ACCESS IN WIRELESS ADHOC NETWORKS WEB CACHE BASED DATA ACCESS IN WIRELESS ADHOC NETWORKS A.PAVANI, Dr. R.V.KRISHNAIAH 1. II.M.TECH-CS, D R K I S T. 2. PRINCIPAL, D R K I S T. Keywords: Data Caching, MANET, Cooperative caching, cache consistency,

More information

Lecture (08, 09) Routing in Switched Networks

Lecture (08, 09) Routing in Switched Networks Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.

More information

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks

More information

P2P over MANETs: Application and Network Layers Routing Assessment

P2P over MANETs: Application and Network Layers Routing Assessment P2P over MANETs: Application and Network Layers Routing Assessment Leonardo B. Oliveira, UNICAMP, Brazil Isabela G. Siqueira, UFMG, Brazil Daniel F. Macedo, Paris6, France José M. Nogueira, UFMG, Brazil

More information

A Scalable Content- Addressable Network

A Scalable Content- Addressable Network A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics

More information

Location-aware In-Network Monitoring in Wireless Sensor Networks

Location-aware In-Network Monitoring in Wireless Sensor Networks Location-aware In-Network Monitoring in Wireless Sensor Networks Volker Turau and Christoph Weyer Department of Telematics, Technische Universität Hamburg-Harburg Schwarzenbergstraße 95, 21073 Hamburg,

More information