Energy-Consumption in Mobile Peer-to-Peer Quantitative Results from File Sharing

Size: px
Start display at page:

Download "Energy-Consumption in Mobile Peer-to-Peer Quantitative Results from File Sharing"

Transcription

1 Energy-Consumption in Mobile Peer-to-Peer Quantitative Results from File Sharing Jukka K. Nurminen, Janne Nöyränen Nokia Research Center {jukka.k.nurminen, Abstract Battery consumption is an important but not very widely studied aspect of peer-to-peer applications. This paper describes a series of experiments which obtained detailed measurements of BitTorrent energy consumption on handheld devices. The measurements that were carried out with SymTorrent client on three different models of Nokia S60 mobile phones indicate that peer-to-peer content sharing on handhelds is practical from the energy consumption point of view. The results also show that acting as a true peer and uploading content for other users does not cause much extra energy consumption during active downloading. 1. Introduction One challenge of mobile peer-to-peer (P2P) applications is battery consumption. Contributing resources to the P2P network is little extra burden for a home PC which is plugged-in to electricity and broadband connection. However, for a mobile device the situation is different. Energy consumption is thus a potential inhibitor for the serious use of mobile P2P applications. The purpose of this paper is to provide quantitative results for this discussion. As observed by Feeney and Nilsson [1] bandwidth utilization is not synonymous with energy consumption. By measuring power consumption of handheld devices within an active P2P content sharing community we target a better understanding of the battery usage of P2P technology and of the possibilities of this technology on handheld devices. The number of papers that measure the energy consumption of applications on handheld devices is very limited. A possible reason is that exploration of new techniques and concepts are easier to perform in a simulated environment than with real devices. Simulations and theoretical analysis are typically adequate to show relative improvements brought by new algorithms or protocols. However, they fail to evaluate the practical application of these technologies. Real measurements are thus important to complement the theoretical and simulation studies available. The quantitative numbers characterizing the power consumption are important in assessing the feasibility of mobile P2P solutions on today s devices. In particular we focus on file sharing with the BitTorrent technology. Because BitTorrent is widely used it allows measurements of practical content sharing cases with real communities. With the new possibilities to consume and create multimedia in mobile devices BitTorrent is also an increasingly relevant application for mobile phones. In particular we would like to answer questions like 1. What is the power consumption behavior of a typical P2P download activity? 2. How does the power consumption of P2P downloading relate to other uses of the mobile device? 3. How does P2P downloading compare with direct HTTP downloading? How do the different access technologies influence the results? 4. What is the difference when a mobile phone is only a client of a P2P network versus the case when it acts as a true peer and also serves others? The rest of the paper is organized as follows. Section 2 reviews related energy consumption research. Section 3 presents our test setting in detail. Section 4 focuses on our results and on their interpretation. In section 5 we discuss the limitations and shortcomings of our experiments. Finally, section 6 summarizes our main findings. 2. Related Work There are a number of studies of BitTorrent performance [2]-[6]. They measure and model the performance of BitTorrent in the fixed Internet. Moving the scope from fixed Internet to handheld devices adds emphasis to the energy consumption. An /08/$25.00 IEEE 729

2 application that drains the battery of a mobile handset quickly is not likely to get wide acceptance. The common approach to analyze energy consumption of P2P applications is via simulations and theoretical calculations. Joseph et al. [7] propose an energy efficient caching scheme based on a region concept. Leung and Yu-Kwong [8] propose a new metric Energy based data availability and use it to design a P2P file sharing solution that is optimized for wireless environment. Ding and Bhargava [9] compare different P2P file sharing approaches over mobile ad hoc networks qualitatively. The number of measurement studies of P2P power consumption is very limited. Gurun et al. [10] claim to be the first paper to investigate P2P protocol behavior via power measurements. They performed energyconsumption measurements using a P2P chat application called Chimera on a PDA device. Our work complements their measurements in three aspects. First, by using a mainstream BitTorrent application we are able to analyze practical content sharing scenarios. Secondly, measuring the P2P performance on mobile phone creates results that are applicable to a wide range of devices and user. Thirdly, with a mobile phone we are not limited to access but are also able to measure the use on cellular wide-area network. Research on other handheld applications shows that significant gains in energy-efficiency can be achieved. For instance, Yan et al. [11] and Krashinsky and Balakrishnan [12] have investigated energy consumption in web browsing. By taking advantage of typical behavior patters they have developed energy efficient transport level protocols for handhelds. 3. Test Setting To perform the measurements we have used SymTorrent [13] which is an open source BitTorrent implementation for Symbian S60 platform. It is a complete BitTorrent client supporting both downloading and uploading of content. It thus allows a mobile phone to join the BitTorrent community as a full peer and work in a very similar way than a PC based client. To perform the actual measurements we have used a testing tool called Juice [14] which is a power profiling application for S60 devices. It allows measuring and collecting power consumption data during the use of a mobile phone without any external measurement equipment. For the network connectivity we have used two technologies: third generation cellular network () based on WCDMA technology and wireless LAN () based on the standards. The main body of the measurements was done with Nokia N80 mobile phone. Additionally, we used Nokia E61 and Nokia N95 models to analyze how different hardware affects the results. We used two different setups to connect to the real BitTorrent community: 1) Mobile phone connected via cellular network (Elisa network in Helsinki, Finland) to the Internet. 2) Mobile phone connected via to an ADSL router (D-LinkAir DI-514 Wireless Router b) which is connected via ADSL connection (8/1M Saunalahti) to the Internet. As test material we used the Simpson movie trailer distributed by Wuze ( NJTPLQ3YMZX3JKF.html [Accessed Jun 7, 2007]). The trailer is 9.73 MB in size. The high definition format of the trailer is beyond the capabilities of the player and display resolution of our test phone. However, we used it as a test material since it was freely available and very popular during our test period ( ). The fact that it was available in hundreds of peers made it difficult to use it for our upload tests. For those we used a larger file (37MB) that was not very widely available but under heavy demand. That attracted more peers to request the content from our device which allowed more realistic measurement of the effect of the upload traffic. 4. Measurements and Results W1,6 1,4 1,2 1,0 0,8 0,6 0,4 0,2 0,0 0:00 0:30 1:00 1:30 2:00 2:30 3:00 3:30 4:00 4:30 5:00 5:30 6:00 6:30 7:00 7:30 8:00 8:30 9:00 9:30 10:00 Figure 1. Power consumption during typical content download Figure 1 shows typical power consumption curves when the user downloads the movie trailer with and. In this measurement the uploading feature of SymTorrent has been disabled. The first part of the curve (0-1 min) shows the high level of activity to setup the data connection. The middle part of the curve t 730

3 (1-4:45 min) shows the rather stable phase where active downloading is ongoing with power consumption around 1.2 W. At this phase the downloading speed is limited by the data transmission capacity provided by the operator. In our case it was around 50 kb/s. At 4:45 min the download is completed and power consumption drops to 0.4 W. There are still some power peeks that most likely depend on some delayed communication with the peers. (With an improved end-game algorithm in SymTorrent it could be possible to remove these peaks.) With the shape of the curve is similar. However, the higher speed and lower power consumption create a major difference. The download time is half of the time needed for downloading. While the power consumption during the active download phase is rather close to case there is a major difference in the power consumption after the downloading has been completed. From 5 min onwards power is less than half of the power needed by the. 1.4 W 1.2 With SymTorrent uses slightly less power than a voice call. This means that SymTorrent downloads can last at least as long as voice calls when both are started with full battery. This is a useful measure since technical specifications of mobile phones typically list the talk times of their batteries. With the Nokia N80 phone that we used in our test this would mean around three hours of continuous downloading. Figure 2 also shows that playing video or audio content needs much less power than its downloading. The results also show that the power consumption of the direct HTTP download is at the same level with SymTorrent. It thus seems that the extra complexity of the BitTorrent protocol does not require much additional power. The likely explanation for this behavior is the fact that radio traffic is the dominating component of the power consumption, as also observed in [14]. The above results have focused on the case when SymTorrent is only downloading but not uploading at all. This is clearly an undesirable state since in order to work properly in the community the peers should also contribute their resources to help others. Some clients even enforce this tit-for-tat principle by applying choking measures (see e.g. [15]) towards those peers who are not cooperating ,2 W 1,0 Full peer 0.4 0, ,6 0 SymTorrent Voice call Http Viewing Listening MP3 Idle Figure 2 Comparison of SymTorrent power consumption with other activities Figure 2 can be used to compare P2P downloading with other typical activities on a mobile phone. It presents the average power computed over six measurements both for SymTorrent and for normal HTTP download. For voice call, viewing, listening, and idle cases the average is only over two measurements since the power consumption of these terminal applications is less dependent on changes in external circumstances. Viewing was measured with a video clip captured with a Nokia N93i handset with settings Handset normal MP4 15 frames per second. Listening was measured by playing MP3 audio (192 kbps) with built-in speakers of the phone. Volume setting was at 50%. Figure 2 can be used to draw several conclusions how content sharing activities would work in practice. 0,4 0,2 0,0 0:00 2:00 Client only 4:00 6:00 8:00 10:00 12:00 Figure 3 Power consumption in full peer and client only mode with Figure 3 allows us to compare the case when the mobile peer supports uploads to others ( full peer ) and the case where it is only working as a downloading client ( client only ). These measurements are for only. Supporting upload functionality with networks is complicated because of the NAT and firewall policies of the cellular operators. Obviously the power consumption is higher in the full peer mode since uploading content to others consumes power. However, the additional power needed to serve others is different in the active download phase and in the following passive phase. In 14:00 16:00 18:00 20:00 22:00 24:00 26:00 t 28:00 731

4 the active phase only around 0.2 W extra power is needed for full peer operation. After the download has been completed, working as a full peer requires 0.4 W additional power. The difference comes from the fact that if there is no traffic the radio can be powered down. The need to serve other peers does not allow this to happen. The conclusion from these measurements is thus that acting as a full peer is feasible as long as active downloading is ongoing. With around 25% extra power the phone is able to help others during the active phase while in the passive phase around 200% extra power is needed. To save power the peer should thus serve others only when it is performing a download operation. In order to analyze how sensitive the results are to different phone models we performed measurements with three different Nokia phone models: N80, E61 and N95. These devices represent different HW architectures and different release dates. We also measured direct HTTP download of the same file to compare how P2P technology compares to it. Table 1. Comparison of power consumption in different phone models and connections Connection Model Download time Active (W) Passive (W) Energy (J) N80 4'55" SymTorrent E61 7'20" N95 2'25" N80 2'10" SymTorrent E61 2'16" N95 1'30" HTTP N80 4'10" HTTP N80 0'48" The figures in Table 1 are averages of six download tests with each device model and connection. HTTP downloads were done from a test server where there were no other users. In that respect it fails to represent the practical case of popular content where multiple users are downloading the content simultaneously where the server capacity soon becomes a bottleneck. HTTP download is thus a baseline allowing us to estimate the additional effort needed by P2P to manage the connections to multiple peers. As Table 1 shows there are no major differences between different phone models in the passive state. During the active download N95 was using more power but the download speed was much faster (N95 supports the new HSDPA connectivity). Moreover the shapes of the power consumption curves are very similar indicating that the same findings apply to all three studied devices. The results show that there is 20% more energy consumption when the same file is downloaded with SymTorrent than with HTTP via connection. With the difference is bigger: 150% more energy is needed. We estimate that the difference is caused by three factors. First, reaching full download speed takes time for SymTorrent because it needs to find and negotiate with peers. Secondly, the peer serving speed is likely to be a bottleneck in SymTorrent while the radio connection to the mobile phone is the bottleneck for HTTP download. Thirdly, the performance of the SymTorrent application is not as efficient as the normal HTTP socket connection. In comparison with is over two times faster and around three times more energy-efficient. is thus the preferred choice if available. However, the strength of the solution is its wide coverage which allows downloads to proceed even if the user is genuinely on the move. Energy consumption in case is typically even more important because electricity is often available in places covered by like offices, cafes, or traffic hubs. 5. Discussion A limitation of our experiment, like any measurements with a living network, is that we are not able to control how the network and other peers are operating. While our study allows the analysis of practical possibilities for P2P in handheld devices it should be complemented with further laboratory studies where the behavior of other peers can be controlled. Our measurements are snapshots of the P2P network operation in a given time period with a given content. Multiple measurements allow us to count average results. However, different content with varying popularity and availability of peers is likely to change the absolute values but is not likely to change the power consumption characteristics. Our measurements were carried out with high quality radio connections: in both and measurements the phone was stationary and close to the base station. Movement and less reliable connections near the border of connectivity range would also change the results. Another potential source of measurement error is the maturity of the client software. Although SymTorrent is a complete BitTorrent client it does not support all features of the most sophisticated clients. Our results can also be used to point out some parts of SymTorrent that would benefit from further optimization. Terminating all operations to enter idle 732

5 state after downloading has been completed in one such improvement. 6. Conclusions Power consumption measurements add a new dimension to the analysis of P2P content sharing. This series of measurements has shown that P2P content sharing on widely available handheld devices is feasible from the power consumption point of view. The results show that power consumption of BitTorrent is on the same level as voice calls. Battery consumption does not seem to be a problem when a moderate amount of video downloading followed by viewing is done on the move. The results further indicate that the mobile client is able to act as a true peer: only little extra power is needed to support uploading during an on-going download. However, after downloading is finished also uploading should be terminated to allow the radio to return to power saving state. The results give rise to a level of optimism. The performance of P2P content sharing is reasonable already today. Further development with special focus on energy-efficiency is likely to improve the situation further. Better implementations, protocol extensions focusing on energy consumption, new techniques for handling fairness and incentives in a handheld friendly way, and hardware improvements are some of the alternatives for further development. References [1] L. M. Feeney and M. Nilsson, Investigating the energy consumption of a wireless network interface in an ad hoc networking environment, in Proc. INFOCOM 2001, pp [2] D. Qiu and R. Srikant, Modeling and performance analysis of BitTorrent-like peer-to-peer networks, in Proc Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications, Portland, Oregon, USA, 2004 pp [3] L. Ziqian and C. Changjia, Modeling bittorrent-like peer-to-peer systems, IEEE Communications Letters, Vol.10, Iss.7, July 2006, pp [4] G. Lei, C. Songqing, X. Zhen, T. Enhua, D. Xiaoning, Z. Xiaodong, A performance study of BitTorrent-like peerto-peer systems, IEEE Journal on Selected Areas in Communications, Vol.25, Iss.1, Jan. 2007, pp [5] D. Erman, D. Ilie, and A. Popescu, BitTorrent Traffic Characteristics, in Proc. International Multi-Conference on Computing in the Global Information Technology, 2006, pp [6] M. Izal, G. Urvoy-Keller, E.W. Biersack, P.A. Felber, A. Al Hamra, and L. Garcés-Erice, Dissecting BitTorrent: Five Months in a Torrent's Lifetime, in Proc. 5th International Workshop on Passive and Active Network Measurement, 2004, pp [7] M. S. Joseph, M. Kumar, Huaping Shen, and S. Das, Energy efficient data retrieval and caching in mobile peerto-peer networks, in Proc. Third IEEE International Conference on Pervasive Computing and Communications Workshops, 2005, pp [8] A.K.-H. Leung and K. Yu-Kwong, On topology control of wireless peer-to-peer file sharing networks: energy efficiency, fairness and incentive, in Proc. 6th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, 2005, pp [9] G. Ding and B. Bharat, Peer-to-peer file-sharing over mobile ad hoc networks, in Proc. Second IEEE Annu. Conf. on Pervasive Computing and Communications Workshops, 2004, pp [10] S. Gurun, P. Nagpurkar, and B. Y. Zhao, Energy consumption and conservation in mobile peer-to-peer systems, in Proc. First International Workshop on Decentralized Resource Sharing in Mobile Computing and Networking, 2006, pp [11] H. Yan, D. K. Lowenthal, and K. Li, ACE: an active, client-directed method for reducing energy during web browsing, in Proc. International Workshop on Network and Operating Systems Support For Digital Audio and Video, 2005, pp [12] R. Krashinsky and H. Balakrishnan, Minimizing energy for wireless web access with bounded slowdown, in Proc. 8th Annual international Conference on Mobile Computing and Networking, 2002, pp [13] I. Kelényi, P. Ekler, and Z. Pszota, SymTorrent 1.27, Budapest University of Technology and Economics. Apr. 11, [Online]. Available: [14] G. Bosch Creus and M. Kuulusa, Optimizing Mobile Software with Built-in Power Profiling, in Mobile Phone Programming and its Application to Wireless Networking, F. Fitzek and F. Reichert, Eds. Springer, [15] B. Cohen, Incentives build robustness in BitTorrent, in Proc. First Workshop on the Economics of Peer-to-Peer Systems, Berkeley, CA,

Efficiency of Data Distribution in BitTorrent-Like Systems

Efficiency of Data Distribution in BitTorrent-Like Systems Efficiency of Data Distribution in BitTorrent-Like Systems Ho-Leung Chan 1,, Tak-Wah Lam 2, and Prudence W.H. Wong 3 1 Department of Computer Science, University of Pittsburgh hlchan@cs.pitt.edu 2 Department

More information

Using Home Routers as Proxies for Energy-Efficient BitTorrent Downloads to Mobile Phones

Using Home Routers as Proxies for Energy-Efficient BitTorrent Downloads to Mobile Phones CONSUMER COMMUNICATIONS AND NETWORKING Using Home Routers as Proxies for Energy-Efficient BitTorrent Downloads to Mobile Phones Imre Kelényi and Ákos Ludányi, Budapest University of Technology and Economics

More information

Building Motion and Noise Detector Networks from Mobile Phones

Building Motion and Noise Detector Networks from Mobile Phones Magyar Kutatók 9. Nemzetközi Szimpóziuma 9 th International Symposium of Hungarian Researchers on Computational Intelligence and Informatics Building Motion and Noise Detector Networks from Mobile Phones

More information

Mobile P2P Energy-efficiency issues on mobile phones

Mobile P2P Energy-efficiency issues on mobile phones Mobile P2P Energy-efficiency issues on mobile phones Dr. Zhonghong Ou Department of Computer Science and Engineering, Aalto University 1 Slides are partially from Prof. Jukka Nurmimen Slow growth in battery

More information

Bursty Content Sharing Mechanism for Energy-Limited Mobile Devices

Bursty Content Sharing Mechanism for Energy-Limited Mobile Devices Bursty Content Sharing Mechanism for Energy-Limited Mobile Devices Imre Kelényi Budapest University of Technology and Economics Budapest, Hungary imre.kelenyi@aut.bme.hu Jukka K. Nurminen Nokia Research

More information

Hybrid Peer-to-Peer Content Sharing in Mobile Networks

Hybrid Peer-to-Peer Content Sharing in Mobile Networks JOURNAL OF NETWORKS, VOL. 4, NO. 2, APRIL 2009 119 Hybrid Peer-to-Peer Content Sharing in Mobile Networks P Ekler Department of Automation and Applied Informatics, Budapest, Hungary Email: peter.ekler@aut.bme.hu

More information

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved. BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and

More information

AVALANCHE: A NETWORK CODING ANALYSIS

AVALANCHE: A NETWORK CODING ANALYSIS COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application

More information

Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent

Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent Guillaume Urvoy-Keller Institut Eurecom, France Email: urvoy@eurecom.fr Pietro Michiardi Institut Eurecom, France Email:

More information

Node selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth

Node selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth American Journal of Networks and Communications 2013; 2(2): 40-46 Published online June 10, 2013 (http://www.sciencepublishinggroup.com/j/ajnc) doi: 10.11648/j.ajnc.20130202.13 Node selection in Peer-to-Peer

More information

LTE : The Future of Mobile Broadband Technology

LTE : The Future of Mobile Broadband Technology LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms

More information

Dissecting BitTorrent: Five Months in a Torrent s Lifetime

Dissecting BitTorrent: Five Months in a Torrent s Lifetime Dissecting BitTorrent: Five Months in a Torrent s Lifetime M. Izal, G. Urvoy-Keller, E.W. Biersack, P.A. Felber, A. Al Hamra, and L. Garcés-Erice Institut Eurecom, 2229, route des Crêtes, 694 Sophia-Antipolis,

More information

Title: Using low-power dual-port for inter processor communication in next generation mobile handsets

Title: Using low-power dual-port for inter processor communication in next generation mobile handsets Title: Using low-power dual-port for inter processor communication in next generation mobile handsets Abstract: The convergence of mobile phones and other consumer-driven devices such as PDAs, MP3 players,

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

CTIS 487: Lecture Notes 1

CTIS 487: Lecture Notes 1 CTIS 487: Lecture Notes 1 Mobile phones got their name due to the fact that they allow users to make phone calls while being mobile. The communication architecture was dominated by base stations communicating

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

A Mobile Platform for Measurements in Dynamic Topology Wireless Networks

A Mobile Platform for Measurements in Dynamic Topology Wireless Networks A Mobile Platform for Measurements in Dynamic Topology Wireless Networks E. Scuderi, R.E. Parrinello, D. Izal, G.P. Perrucci, F.H.P. Fitzek, S. Palazzo, and A. Molinaro Abstract Due to the wide spread

More information

Bandwidth Trading in Unstructured P2P Content Distribution Networks

Bandwidth Trading in Unstructured P2P Content Distribution Networks Bandwidth Trading in Unstructured P2P Content Distribution Networks Kolja Eger and Ulrich Killat Department of Communication Networks Hamburg University of Technology (TUHH) {eger, killat}@tu-harburg.de

More information

A WAY TO ACCESS WIRELESS NETWORK

A WAY TO ACCESS WIRELESS NETWORK A WAY TO ACCESS WIRELESS NETWORK Shreya, Varun Gupta, Amrita Kumari, Shashank Sharma Electrical & Electronics Department, Dronacharya Group of Institutions, Greater Noida, (India) Computer and science

More information

Improving the Download Time of BitTorrent-like Systems

Improving the Download Time of BitTorrent-like Systems Improving the Download Time of BitTorrent-like Systems Chi-Jen Wu, Cheng-Ying Li, and Jan-Ming Ho Institute of Information Science Academia Sinica, Taiwan {cjwu, cyli, hoho}@iis.sinica.edu.tw Abstract

More information

Blue3 A Programmable Remote MP3 Sensor

Blue3 A Programmable Remote MP3 Sensor Blue3 A Programmable Remote MP3 Sensor Anonymous Anon Inc. Abstract. We present the concept and the prototypical implementation of Blue3, a programmable device that features a wireless communication interface,

More information

The Importance of History in a Media Delivery System

The Importance of History in a Media Delivery System The Importance of History in a Media Delivery System Richard J. Dunn, Steven D. Gribble, Henry M. Levy, John Zahorjan University of Washington E-mail: {rdunn,gribble,levy,zahorjan}@cs.washington.edu Abstract

More information

BitTorrent Based Solution for Efficient Content Sharing on Next Generation Networks

BitTorrent Based Solution for Efficient Content Sharing on Next Generation Networks 1 BitTorrent Based Solution for Efficient Content Sharing on Next Generation Networks P. Ekler, I. Dévai, B. Bakos, A. J. Kiss Abstract As the architecture of participation became the main design principle

More information

Ad Hoc Networks - Applications and System Design

Ad Hoc Networks - Applications and System Design Ad Hoc Networks - Applications and System Design Prof Sanjay Srivastava DA-IICT, Gandhinagar Modelling and Analysis Group of NeTworks (MAGNeT) Two day workshop on Ad Hoc Networks: Design, Applications,

More information

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status 1 Introduction Harri Holma and Antti Toskala 1.1 WCDMA technology and deployment status The first Third Generation Partnership Project (3GPP) Wideband Code Division Multiple Access (WCDMA) networks were

More information

On maximum throughput in BitTorrent

On maximum throughput in BitTorrent Gradus Vol 3, No 2 (2016) 67-72 ISSN 2064-8014 On maximum throughput in BitTorrent Elvira Dobjánné Antal 1, and Tamás Vinkó 2 1 Department of Natural Sciences and Engineering, Faculty of Mechanical Engineering

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet HTML tutorial today. Announcements CMPE 80N Spring 2003 Week 5 1 2 MAC Protocols MAC Protocols Round-robin. Scheduled-access. Contention-based. Contention-based

More information

ENSC 427: COMMUNICATION NETWORKS. Performance Evaluation of Voice Over IP on WiMAX and Wi-Fi Based Networks. Spring 2009 FINAL PROJECT

ENSC 427: COMMUNICATION NETWORKS. Performance Evaluation of Voice Over IP on WiMAX and Wi-Fi Based Networks. Spring 2009 FINAL PROJECT ENSC 427: COMMUNICATION NETWORKS Performance Evaluation of Voice Over IP on WiMAX and Wi-Fi Based Networks Spring 2009 FINAL PROJECT Group #1 Jeremy Yoo http://www.sfu.ca/~jty/ensc427/ jty@sfu.ca i Table

More information

UNCORRECTED PROOF AUTHOR'S PROOF. Keywords Energy-efficiency. Proxy. Peer-to-peer. BitTorrent. Broadband router. Mobile.

UNCORRECTED PROOF AUTHOR'S PROOF. Keywords Energy-efficiency. Proxy. Peer-to-peer. BitTorrent. Broadband router. Mobile. 1 3 2 DOI 10.1007/s12083-011-0107-5 4 Modeling resource constrained BitTorrent proxies for energy 5 efficient mobile content sharing 6 Imre Kelényi & Jukka K. Nurminen & Ákos Ludányi & 7 Tamás Lukovszki

More information

P2P Content Distribution

P2P Content Distribution , University of Hannover Wolf-Tilo Balke and Wolf Siberski 28.11.2007 *With slides from K. Wehrle (RWTH), A. Bharambe (CMU), P. Rodriguez, P. Chou (MSRC), Chiu (CUHK) Peer-to-Peer Systems and Applications,

More information

Technology Watch. Data Communications 2 nd Quarter, 2012

Technology Watch. Data Communications 2 nd Quarter, 2012 Technology Watch Data Communications 2 nd Quarter, 2012 Page 1 Commercial Version Technology Watch DCCC August 2012 Table of Contents 1.0 Introduction... 1 2.0 Internet Traffic Growth Analysis... 1 3.0

More information

P2P content distribution

P2P content distribution P2P content distribution T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials Steps of content sharing Share content Find content Transfer

More information

BiToS: Enhancing BitTorrent for Supporting Streaming Applications

BiToS: Enhancing BitTorrent for Supporting Streaming Applications BiToS: Enhancing BitTorrent for Supporting Streaming Applications Aggelos Vlavianos, Marios Iliofotou and Michalis Faloutsos Department of Computer Science and Engineering University of California Riverside

More information

DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS

DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS Research Article DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS S. Swarna Parvathi, Dr. K. S. Eswarakumar Address for Correspondence S. Swarna Parvathi, PhD Scholar Department

More information

A Handover Optimisation Scheme in Cellular Networks

A Handover Optimisation Scheme in Cellular Networks A Handover Optimisation Scheme in Cellular Networks A.Gueroui and S.Boumerdassi Laboratoire PRiSM, Université de Versailles 45, Avenue des Etats-Unis 78035 Versailles France Laboratoire CEDRIC, CNAM 292,

More information

ENSC 427: COMMUNICATION NETWORKS

ENSC 427: COMMUNICATION NETWORKS ENSC 427: COMMUNICATION NETWORKS Comparison of TCP with "utp" for BitTorrent transfers Spring 2009 FINAL PROJECT Adam Ciapponi Robert Hueber Robert Szolomicki aciappon@sfu.ca rhueber@sfu.ca rms6@sfu.ca

More information

Campus Network Best Practices: Core and Edge Networks

Campus Network Best Practices: Core and Edge Networks Campus Network Best Practices: Core and Edge Networks This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be freely copied, modified,

More information

Digital Entertainment. Networking Made Easy

Digital Entertainment. Networking Made Easy Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered

More information

Ad hoc networking using Wi-Fi during natural disasters: overview and improvements.

Ad hoc networking using Wi-Fi during natural disasters: overview and improvements. Ad hoc networking using Wi-Fi during natural disasters: overview and improvements. Matthijs Gielen University of Twente P.O.Box 217, 7500AE Enschede The Netherlands m.w.gielen@student.utwente.nl ABSTRACT

More information

Large-Storage Mobile Phones: New Devices Offering a New Application Domain

Large-Storage Mobile Phones: New Devices Offering a New Application Domain Large-Storage Mobile Phones: New Devices Offering a New Application Domain Angus K. Y. Wong Computer Studies Program Macao Polytechnic Institute Av. de Luis Gonzaga Gomes, Macao SAR kywong@ipm.edu.mo Abstract

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network

More information

Peer-to-peer & Energy Consumption

Peer-to-peer & Energy Consumption Peer-to-peer & Energy Consumption T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen Principal Researcher, Nokia Research Center Adjunct Professor, Department of Computer Science

More information

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018 White Paper TELEGRID Technologies, Inc. WZRDnet A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments February 14, 2018 23 Vreeland Road Suite 290 Florham Park, NJ 07932 www.telegrid.com

More information

Enemy Territory Traffic Analysis

Enemy Territory Traffic Analysis Enemy Territory Traffic Analysis Julie-Anne Bussiere *, Sebastian Zander Centre for Advanced Internet Architectures. Technical Report 00203A Swinburne University of Technology Melbourne, Australia julie-anne.bussiere@laposte.net,

More information

A NEW ENERGY LEVEL EFFICIENCY ISSUES IN MANET

A NEW ENERGY LEVEL EFFICIENCY ISSUES IN MANET A NEW ENERGY LEVEL EFFICIENCY ISSUES IN MANET K. ARULANANDAM 1 and Dr. B. PARTHASARATHY 2 1 Research scholar, Vinayaka Mission University, Salem, Tamilnadu 2 Dean, Mailam Engineering College, Tindivanam.

More information

RealMedia Streaming Performance on an IEEE b Wireless LAN

RealMedia Streaming Performance on an IEEE b Wireless LAN RealMedia Streaming Performance on an IEEE 802.11b Wireless LAN T. Huang and C. Williamson Proceedings of IASTED Wireless and Optical Communications (WOC) Conference Banff, AB, Canada, July 2002 Presented

More information

P2P content distribution Jukka K. Nurminen

P2P content distribution Jukka K. Nurminen P2P content distribution Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials BitTorrent content downloading Efficient content distribution Bram Cohen, 2001 File divided into pieces Each recipient

More information

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs Yung-Chang Lin Cheng-Han Lin Wen-Shyang Hwang Ce-Kuen Shieh yaya80306@hotmail.com jhlin5@cc.kuas.edu.tw wshwang@cc.kuas.edu.tw

More information

Internetwork. recursive definition point-to-point and multi-access: internetwork. composition of one or more internetworks

Internetwork. recursive definition point-to-point and multi-access: internetwork. composition of one or more internetworks Internetwork A B E C D recursive definition point-to-point and multi-access: internetwork composition of one or more internetworks Additional complications to deal with: addressing necessary LAN addresses

More information

Peer-to-peer. T Applications and Services in Internet, Fall Jukka K. Nurminen. 1 V1-Filename.ppt / / Jukka K.

Peer-to-peer. T Applications and Services in Internet, Fall Jukka K. Nurminen. 1 V1-Filename.ppt / / Jukka K. Peer-to-peer T-110.7100 Applications and Services in Internet, Fall 2009 Jukka K. Nurminen 1 V1-Filename.ppt / 2008-10-22 / Jukka K. Nurminen Schedule Tue 15.9.2009 12-14 Tue 22.9.2009 12-14 Introduction

More information

Improving BitTorrent: A Simple Approach

Improving BitTorrent: A Simple Approach Improving BitTorrent: A Simple Approach Alix L.H. Chow Univ. of Southern California Leana Golubchik Univ. of Southern California Vishal Misra Columbia University Abstract Measurement studies have shown

More information

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid.

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid. A COMPLETE STUDY ON POWER AWARE ROUTING PROTOCOL FOR MOBILE ADHOC NETWORK A. Kumaravel 1, Dr. M.Chandrasekaran 2 1 (Electronics and Communication Engineering, Paavai Engineering College,India) 2 (Electronics

More information

BitTorrent and CoolStreaming

BitTorrent and CoolStreaming BitTorrent and CoolStreaming Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University Jukka K. Nurminen Aalto University P2P Networks BitTorrent

More information

Nomadic devices Benefits and market outlook

Nomadic devices Benefits and market outlook Nomadic devices Benefits and market outlook Johannes Dünnwald Nokia Automotive Ertico - Jan20th, 2005 First European Nomadic Devices Workshop 1 NOKIA 2004 Nokia Automotive Founded 1996 as Nokia Smart Traffic

More information

INTRODUCTION TO WIRELESS COMMUNICATION

INTRODUCTION TO WIRELESS COMMUNICATION OVERVIEW INTRODUCTION TO WIRELESS COMMUNICATION EVOLUTION FROM 1G TO 4G SYSTEM 5-G WIRELESS SYSTEM FUNCTIONAL ARCHITECTURE FOR 5G MOBILE NETWORKS THE 4A PARADIGM FEATURES OF 5G TECHNOLOGY 5G APPLICATION

More information

CONCLUSIONS AND SCOPE FOR FUTURE WORK

CONCLUSIONS AND SCOPE FOR FUTURE WORK Introduction CONCLUSIONS AND SCOPE FOR FUTURE WORK 7.1 Conclusions... 154 7.2 Scope for Future Work... 157 7 1 Chapter 7 150 Department of Computer Science Conclusion and scope for future work In this

More information

end systems, access networks, links circuit switching, packet switching, network structure

end systems, access networks, links circuit switching, packet switching, network structure Introduction Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and

More information

Measuring the power consumption of social media applications on a mobile device

Measuring the power consumption of social media applications on a mobile device Journal of Physics: Conference Series PAPER OPEN ACCESS Measuring the power consumption of social media applications on a mobile device To cite this article: A I M Dunia et al 2018 J. Phys.: Conf. Ser.

More information

BitTorrent Fairness Analysis

BitTorrent Fairness Analysis BitTorrent Fairness Analysis Team Asians Zhenkuang He Gopinath Vasalamarri Topic Summary Aim to test how the fairness affect the file transfer speed in a P2P environment (here using the BitTorrent Protocol)

More information

Cooperation in Open Distributed Systems. Stefan Schmid

Cooperation in Open Distributed Systems. Stefan Schmid Cooperation in Open Distributed Systems Stefan Schmid T-Labs, Berlin, July 2, 2009 Distributed Systems 2008/9 Wireless: Many mobile phones today have WLAN (and even Skype) P2P: Olympic games 2008 live-broadcast

More information

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011 Introduction ti Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

HSPA+ R8. February 2009

HSPA+ R8. February 2009 HSPA+ R8 February 2009 Disclaimer Nothing in this presentation is an offer to sell any of the parts referenced herein. This presentation may reference and/or show images of parts and/or devices utilizing

More information

Information Diffusion in edonkey Filesharing Networks

Information Diffusion in edonkey Filesharing Networks Information Diffusion in edonkey Filesharing Networks Tobias Hoßfeld, Kenji Leibnitz, Rastin Pries, Kurt Tutschku, Phuoc Tran-Gia, and Krzysztof Pawlikowski Deptartment of Distributed Systems, University

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

Chunk Scheduling Strategies In Peer to Peer System-A Review

Chunk Scheduling Strategies In Peer to Peer System-A Review Chunk Scheduling Strategies In Peer to Peer System-A Review Sanu C, Deepa S S Abstract Peer-to-peer ( P2P) s t r e a m i n g systems have become popular in recent years. Several peer- to-peer systems for

More information

CONTENTS. System Requirements FAQ Webcast Functionality Webcast Functionality FAQ Appendix Page 2

CONTENTS. System Requirements FAQ Webcast Functionality Webcast Functionality FAQ Appendix Page 2 VIOCAST FAQ CONTENTS System Requirements FAQ... 3 Webcast Functionality... 6 Webcast Functionality FAQ... 7 Appendix... 8 Page 2 SYSTEM REQUIREMENTS FAQ 1) What kind of Internet connection do I need to

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Peer-to-Peer Streaming Systems. Behzad Akbari

Peer-to-Peer Streaming Systems. Behzad Akbari Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues

More information

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

MANET With ADMEN SIMULATION

MANET With ADMEN SIMULATION Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook

More information

A Guide to Routers. Connectivity Type. ADSL (Telephone Type)

A Guide to Routers. Connectivity Type. ADSL (Telephone Type) A Guide to Routers Besides enabling wireless internet connections, routers also keep sensitive data private by safeguarding networks. Wireless routers are increasingly common, even in public spaces. This

More information

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Requirement Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network This set of labs works in conjunction with Professor Ray Panko s textbook, Business Data Networks and Telecommunications.

More information

Simulation Study of elearning Classroom using ipads Based on Wireless LAN with IEEE b

Simulation Study of elearning Classroom using ipads Based on Wireless LAN with IEEE b Simulation Study of elearning Classroom using ipads Based on Wireless LAN with IEEE 802.11b Matthew Young Kim and Victor Clincy Kennesaw State University Kennesaw, GA, USA Abstract - This paper presents

More information

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Position-Aware Active Learning Services Based on Connectionless Positioning in Indoor Environment

Position-Aware Active Learning Services Based on Connectionless Positioning in Indoor Environment Position-Aware Active Learning Services Based on Connectionless Positioning in Indoor Environment Li-Der CHOU, Ching-Chao LEE, Ming-Yu LEE, Chun-Yen CHANG Department of Computer Science and Information

More information

Mobile Peer-to-Peer Business Models T Network Services Business Models. Mikko Heikkinen

Mobile Peer-to-Peer Business Models T Network Services Business Models. Mikko Heikkinen Mobile Peer-to-Peer Business Models T-109.4300 Network Services Business Models Mikko Heikkinen 26.03.2009 Outline Definitions What is peer-to-peer? What is mobile peer-to-peer? Motivation STOF and MP2P

More information

5G Wireless Technology

5G Wireless Technology 5G Wireless Technology Contents Introduction to 5G Evolution from 1G to 5G Key concepts Architecture Hardware & Software of 5G Features Advantages Applications Conclusion Introduction to 5G What is 5G?

More information

Cooperative End-to-end content distribution. Márk Jelasity

Cooperative End-to-end content distribution. Márk Jelasity Cooperative End-to-end content distribution Márk Jelasity Content distribution So far we looked at search Content distribution is about allowing clients (peers) to actually get a file or other data after

More information

QoS Featured Wireless Virtualization based on Hardware

QoS Featured Wireless Virtualization based on Hardware QoS Featured Wireless Virtualization based on 802.11 Hardware Cong Wang and Michael Zink Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA 01003 {cwang, zink} @ecs.umass.edu

More information

Joint Optimization of Content Replication and Server Selection for Video-On-Demand

Joint Optimization of Content Replication and Server Selection for Video-On-Demand Joint Optimization of Content Replication and Server Selection for Video-On-Demand Huan Huang Pengye Xia S.-H. Gary Chan Department of Compute Science and Engineering The Hong Kong University of Science

More information

TFRC and RTT Thresholds Interdependence in a Selective Retransmission Scheme

TFRC and RTT Thresholds Interdependence in a Selective Retransmission Scheme TFRC and RTT s Interdependence in a Selective Retransmission Scheme Árpád Huszák, Sándor Imre Budapest University of Technology and Economics, Department of Telecommunications Budapest, Hungary Email:

More information

ESAR: An Energy Saving Ad Hoc Routing Algorithm for MANET

ESAR: An Energy Saving Ad Hoc Routing Algorithm for MANET : An Energy Saving Ad Hoc Routing Algorithm for MANET Utkarsh 1, Mukesh Mishra 2 and Suchismita Chinara 3 Department of Computer Science and Engineering, National Institute of Technology Rourkela, Rourkela,

More information

Q1. A company sets up a server-based network with ten terminals. Each terminal is a PC with its own secondary storage.

Q1. A company sets up a server-based network with ten terminals. Each terminal is a PC with its own secondary storage. Q1. A company sets up a server-based network with ten terminals. Each terminal is a PC with its own secondary storage. (a) The network was recently created from an existing set of stand-alone computers,

More information

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH, Abstract In the future of Mobile networks it is important to implement a Femtocell at homes and to improve the domestic network. Even

More information

Imagining Tomorrow's Wireless Landscape

Imagining Tomorrow's Wireless Landscape Imagining Tomorrow's Wireless Landscape Wireless Broadband Evolution Rasmus Hellberg, PhD Director, Technical Marketing Qualcomm Wireless Broadband Evolution 3G offers excellent mobile broadband today

More information

Wireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO

Wireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO Wireless Sensor Architecture 1 GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO FORM A MEANINGFUL NETWORK Mobile ad hoc networks Nodes talking to each other Nodes talking to some

More information

PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME

PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME 44 PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME Ibrahim Saidu a, *,Idawaty Ahmad a,b, Nor Asila Waty Abdul Hamid a,b and Mohammed waziri Yusuf b a Faculty of Computer Science

More information

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS Ge Ma and Dongyu Qiu Department of Electrical and Computer Engineering Concordia University, Montreal, QC, Canada tina0702@gmail.com,

More information

Graph Theoretic Models for Ad hoc Wireless Networks

Graph Theoretic Models for Ad hoc Wireless Networks Graph Theoretic Models for Ad hoc Wireless Networks Prof. Srikrishnan Divakaran DA-IICT 10/4/2009 DA-IICT 1 Talk Outline Overview of Ad hoc Networks Design Issues in Modeling Ad hoc Networks Graph Theoretic

More information

An Efficient Dynamic Bandwidth Allocation Algorithm for Quality of Service Networks

An Efficient Dynamic Bandwidth Allocation Algorithm for Quality of Service Networks An Efficient Dynamic Bandwidth Allocation Algorithm for Quality of Service Networks J. Elias 1, F. Martignon 2, and A. Capone 3 1 University of Paris 6, LIP6 Laboratory, 8 rue du Capitaine Scott, 75015,

More information

On Topology Control of Wireless Peer-to-Peer File Sharing Networks: Energy Efficiency, Fairness and Incentive

On Topology Control of Wireless Peer-to-Peer File Sharing Networks: Energy Efficiency, Fairness and Incentive Title On Topology Control of Wireless Peer-to-Peer File Sharing Networks: Energy Efficiency, Fairness and Incentive Author(s) Leung, AKH; Kwok, YK Citation The 6th IEEE International Symposium on a World

More information

Adaptive RTP Rate Control Method

Adaptive RTP Rate Control Method 2011 35th IEEE Annual Computer Software and Applications Conference Workshops Adaptive RTP Rate Control Method Uras Tos Department of Computer Engineering Izmir Institute of Technology Izmir, Turkey urastos@iyte.edu.tr

More information

IMPROVING MULTIPLE MOBILE APPLICATION INTERACTION WITH UNIFIED SESSION MANAGEMENT

IMPROVING MULTIPLE MOBILE APPLICATION INTERACTION WITH UNIFIED SESSION MANAGEMENT IMPROVING MULTIPLE MOBILE APPLICATION INTERACTION WITH UNIFIED SESSION MANAGEMENT Jussi Ala-Kurikka Juuso Ohtonen Erkki Harjula Mika Ylianttila University of Oulu University of Oulu University of Oulu

More information

Live Streaming with Content Centric Networking

Live Streaming with Content Centric Networking 2012 Third International Conference on Networking and Distributed Computing Live Streaming with Content Centric Networking Hongfeng Xu 2,3, Zhen Chen 1,3, Rui Chen 2,3, Junwei Cao 1,3 1 Research Institute

More information

Content Distribution and BitTorrent [Based on slides by Cosmin Arad]

Content Distribution and BitTorrent [Based on slides by Cosmin Arad] ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying

More information

IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS

IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS Dr.N.Kumareshan 1, Mr.N.Prakash 2 2 Assistant Professor (SG), 2 Assistant Professor 1,2 Department of ECE, 1 Sri Shakthi Institute

More information

Course 10: Interfaces Agenda

Course 10: Interfaces Agenda Course 10: Interfaces 1 Agenda Introduction V.24 interface (RS232) USB 2 Introduction 3 Definition(s) (from the web) A boundary across which two independent systems meet and act on or communicate with

More information

Application Layer: P2P File Distribution

Application Layer: P2P File Distribution Application Layer: P2P File Distribution EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 29-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP

More information

Fog Computing Based Radio Access Networks: Issues and Challenges

Fog Computing Based Radio Access Networks: Issues and Challenges Fog Computing Based Radio Access Networks: Issues and Challenges Mugen Peng and Zhongyuan Zhao ({pmg, zyzhao}@bupt.edu.cn) Beijing University of Posts & Telecommunications 2015.10.29 1 Outline Background

More information