Using a Managed Peer-to-Peer Protocol to Deliver Files within an Organization

Similar documents
A Method of Identifying the P2P File Sharing

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ]

Research on Heterogeneous Communication Network for Power Distribution Automation

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks

Collaborative Multi-Source Scheme for Multimedia Content Distribution

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

Time Synchronization in Wireless Sensor Networks: CCTS

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

QoS-Enabled Video Streaming in Wireless Sensor Networks

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM

AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

Peer-to-Peer Streaming Systems. Behzad Akbari

Figure 1. Clustering in MANET.

Dynamic Broadcast Scheduling in DDBMS

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Preliminary Research on Distributed Cluster Monitoring of G/S Model

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

Routing protocols in WSN

Energy Efficient EE-DSR Protocol for MANET

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks

Cross-Layer QoS Support in the IEEE Mesh Network

High Efficient Broadcasting Protocols for Mobile ADHOC Network

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Available online at ScienceDirect. Procedia Computer Science 89 (2016 )

A Scheme of Multi-path Adaptive Load Balancing in MANETs

Review on an Underwater Acoustic Networks

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Efficient Message Caching Scheme for MANET

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Routing Protocols in MANET: Comparative Study

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Three-section Random Early Detection (TRED)

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Survey on Routing Issues and Associated Protocols for Best-effort Delivery in IP Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

WSN Routing Protocols

Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS

IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE FOR WIRELESS SENSOR NETWORK

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35

Mobile Ad-Hoc Network Data Communication in Large Geographic Areas

A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

A Dynamic TDMA Protocol Utilizing Channel Sense

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS

Priority based Packet Scheduling Approach for Wireless Sensor Networks

Peer Assisted Content Distribution over Router Assisted Overlay Multicast

Integrated Routing and Query Processing in Wireless Sensor Networks

Reversing Ticket Based Probing Routing Protocol for MANET

Dynamic Load-balanced Path Optimization in SDN-based Data Center Networks

AN EFFICIENT MULTILEVEL PRIORITY PACKET SCHEDULING FOR WIRELESS SENSOR NETWORK

Power Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT

Overlay Networks for Multimedia Contents Distribution

Data Communication and Parallel Computing on Twisted Hypercubes

A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Location-aware In-Network Monitoring in Wireless Sensor Networks

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

A Super-Peer Selection Strategy for Peer-to-Peer Systems

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

Addressing Asymmetric Link in Wireless Mesh Networks

Efficient Dynamic Multilevel Priority Task Scheduling For Wireless Sensor Networks

A Study on Issues Associated with Mobile Network

Dynamic Two-Threshold Flow Control Scheme for 3GPP LTE-A Relay Networks

An Adaptive and Optimal Distributed Clustering for Wireless Sensor

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

Chapter 7 CONCLUSION

The 2010 IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, April In Proceedings of WCNC, 2010, p.

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

A Secure Routing Protocol for Wireless Adhoc Network Creation

Transcription:

ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS 2007 227 Using a Managed Peer-to-Peer Protocol to Deliver s within an Organization Chih-Chin Liang a, Chia-Hung Wang b, Hsing Luh b and Ping-Yu Hsu a a Department of Management, National Central University,Taoyuan, Taiwan b Department of Mathematical Sciences, National Chengchi University, Taipei, Taiwan Abstract Content delivery for front-line staff is difficult to handle adequately in a large-scaled organization. Existing P2P methods have been utilized for delivering contents between peers passively. However, such P2P approaches have a problem about network congestion. That is, P2P approaches are easy to cause outbound traffic of a peer congested, because of large quantity of unmanaged passive connections for content delivery. This passive method causes a peer potentially retrieves no contents form a congested peer having the needed files because of long waiting time. Existing P2P method has a solution to manage the outbound traffic through limiting the number of connections for retrieving content from other peers. However, such solution is still inefficient. allowed connections are still easy to be exhausted because of requests for retrieving files from too many peers. congestion problem is still existed. Such congested network still stops a peer from retrieving needed contents. refore, the existing P2P approach is inefficient for a large-scaled organization because a congested network is forbidden in such company. This work proposes a hybrid protocol composed with passive and active mechanisms can help a starving peer to have the needed contents. That is, through this proposed protocol, an unmanaged passive connection can change to an active method by a peer having the needed contents to reduce the consumption of its outbound traffic. This work simulates the network behavior of this proposed mechanism. Through such protocol, no starving peers receiving no needed parts can be guaranteed because of the managed network behavior. Hence, utilizing this mechanism to deliver contents could be considered by an organization Keywords: P2P, telecommunication,.content delivery I. INTRODUCTION A. Pages - Printing Area Content distribution between staff members within a large-scaled company is difficult to implement because of the complex intranet environment [1]-[3], which consists of different network segments connected by various bandwidth [4]. However, the environment may cause critical contents being lost or postponed reaching destination during transmission while utilizing improper content delivery approach [5]-[10]. Existing peer-to-peer (P2P) application, such as BitTorrent (BT), is widely utilized to transmit contents between peers but no organizations apply it as the content delivery approach [6], [7]. application is unsuitable for an organization because it consumes large network bandwidth [11]. Basically, P2P is efficient because it divides a file into numerous parts in order to transmit such parts among peers. Each part of a file can be transmitted and shared between peers through a passive retrieving method. But this method occupies the outbound traffic of a peer and then sharing no contents between the peer with congested outbound traffic and other peers. Existing P2P method has a solution to manage the outbound traffic through limiting the connections for retrieving content from other peers. However, such

228 ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS 2007 solution is still inadequate. allowed connections are easy to be exhausted because of requests for retrieving files from too many peers. Such congested network still stops a peer from retrieving needed contents [12]-[19]. In this work, a hybrid protocol named Managed Peer-to-Peer (MP2P), composed with passive and active mechanisms is proposed [20], [21], which can be utilized to transfer contents between peers with no network congestion. That is, through MP2P, a passive connection managed by a retriever peer can change to an active connection managed by a sender to reduce the consumption of the outbound traffic of the sender. This work also models network behavior of MP2P. Through MP2P, no starving peers having no needed parts can be guaranteed because of no network congestion. Hence, utilizing MP2P to deliver contents could be considered by an organization with sparse network resource. rest of this paper is organized as follows. In Section II the related works about content delivery are illustrated. In Section III, the MP2P mechanism is described. In Section IV, the simulation result is presented. In Section V, the experiment results are discussed. Finally, conclusions are drawn in Section VI. II. RELATED WORKS A. Active Content Delivery An active content delivery method indicates a sender actively sends items to receivers. That is a push-based method [6], [7]. To adopt such method to transmit content on the network, the consumption of outbound bandwidth of a sender is managed by itself. However, in such method, a sender manages no packets that have already been sent [6], [7]. Thus, an active content delivery method must be fault-tolerant that ensures a packet is transmitted [20], [21]. To improve the accuracy of delivered contents, two mechanisms are typically employed, namely: adding information to the contents being sent to verify their accuracy and status, and utilizing the signal, and an acknowledgement, to let senders and receivers decide the next action [20]. B. Passive Content Delivery passive content delivery method indicates that the receiver sends requests to a sender for retrieving an item, and then the needed item is retrieved by the receiver actively. That is a pull-based method [6], [7]. To adopt a passive method to transmit content on the network, the outbound bandwidth of a sender is managed by receivers. correctness of the retrieved content is verified by checking the file size after the process of file transmission is completed. receiver retrieves the content again whenever the file size is incorrect [20]. However, the passive content delivery approach has a defect that exhausting the outbound network bandwidth of a sender when numerous retrievers retrieve contents from it currently [6], [7]. C. P2P Content Delivery Method modern P2P method can speed up the transmission of a large file within peers because the file is divided into parts and each part could be transmitted independently. A file is retrieved successfully after all parts of the file are collected and merged. Such P2P content delivery method utilizes the passive approach to transfer contents through the Internet [12]-[19]. However, such P2P method has the original drawback caused by the passive method: the outbound network traffic of a sender is managed by receivers and potentially congested when quantities of receivers retrieve contents from the sender simultaneously [12]-[19]. Above P2P approach focuses on ensuring that one peer can receive a completed content. However, the content delivery within an organization must consume network resource as precisely as possible. Existing solution for limiting the network congestion is simply control the allowed connection number of the file provider. However, such solution is still inadequate. A congested network within limited connection number still stops a peer from retrieving needed contents. Hence, this work adopts an active method to solve such problem because the outbound traffic can be managed by the sender, but previous studies discuss few about changing such passive method to active method [12]-[19].

ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS 2007 229 III. THE MP2P MECHANISM This work proposes an adjusted P2P protocol named MP2P employing both passive and active methods to deliver contents effectively. In MP2P mechanism, each peer has to share the information includes file name, sender name, file status, retrieving part, completed parts, receiver name, transmission method, file size, and transmission status (Table 1). TABLE 1 SHARED FILE STATUS Shared file name Status owning parts of the shared file of the sender Sender peer providin g files Receiver peer receiving files Retrieving part retrieving part of the shared file Completed parts completed parts of the shared file owned by the receiver Transmission Method file transferring mechanism of MP2P which has following methods: the passive mechanism, and the active mechanism Size file size of each receive d part Transmission Status situation of transferring part currently. status includes: the file is ready for retrieving, prepare for sending file, ready for receiving, and successful transmission design of MP2P is described as follows. MP2P is launched whenever one file needs to be transmitted. For example, Peer A is sender, Peer B is receiver, and I is the file needs to be transmitted. Peer A shares information described in Table I to neighboring peers after Peer A divides the file I into parts. Peer A records peer A as sender name, the owning parts of I as file status, the name of I as file name, passive mechanism as transmission method, and the file is ready for retrieving as transmission status. Because Peer A is the starting node, the owning parts of I of Peer A are completed. After receiving above information from Peer A, each neighboring peer of Peer A records itself as the receiver name, and records a divided part of I as the retrieving part, then passes these modifications back to Peer A. In this case, the passive procedure for transferring I begins after Peer B records it as the receiver name, the part 1 of I as the retrieving part, and passes these modifications back to Peer A. passive procedure is as follows. Peer B retrieves part 1 of I from Peer A. Whenever part 1of I is transferred successfully by Peer B, the retrieving part is changed to part 2 of I and recording part 1 into completed parts by Peer B then passed these modifications to neighboring peers including peer A. retrieving procedure of part 2 of I from Peer A is started by Peer B after above modifications are transferred to Peer A completely. In case Peer A is unavailable to share 1, Peer B will retrieve part 2 of I from other peers having the part. transmission status will change to successful transmission whenever I is transferred completely. In MP2P protocol, the active procedure is used whenever the outbound bandwidth is consumed heavily. That is, too many connections established by receivers to use the outbound traffic. To utilize active procedure, the usage of the outbound bandwidth can be managed by the sender because the manage of file transmission is changed from receivers to the sender active procedure is described as follows. transmission method is changed from passive method to active one, whenever Peer C needs to connect to Peer A for retrieving part 3 of I, but too many connections established by receivers using the outbound bandwidth of Peer A to be available to transfer part 3 of I through passive method. transmission method is changed to active method by Peer A. Peer A is then sending this modification to Peer C. passive procedure of the part 3 of I between Peer A and Peer C stops. Peer C is then waiting for part 3 of I sent by Peer A. Peer A delivers the needed parts to Peer C when the network is available to transfer content. Peer A changes the transmission status to prepare for sending file to Peer C. Peer C sends ready for receiving to Peer A, when Peer C is available to receive the content. Peer A is then sending part 3 of I to Peer C. In addition, in the MP2P mechanism, if Peer A is malfunctioned, one of the neighboring peers of Peer A, excepts Peer C, sends the request part to Peer C actively. Whenever the size of the received part is the same as the file size, Peer C sends successful transmission to Peer A. push-base procedure is finished.

230 ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS 2007 III. SIMULATION RESULTS To understand the difference, this work simulates the bandwidth consumption of a sender adopting MP2P and P2P. MP2P simulation describes as follows. This work uses ProModel as the simulation tool (Fig.1). We assign 5 peers, AAA is the sender, BBB, CCC, DDD and EEE represent the receivers. This work assigns peer AAA has one outbound connection and observes the network consumption of the connection. All peers use the only one connection to transfer packets. peer AAA sends packets to EEE through passive protocol and sends packets to the rest of peers through active one. inter arrival time assumes following exponential distribution, one packet arrives at one time. Obviously, because this simulation assumes one peer has only one connection and time is limited, arrived packets might queue at AAA. A packet deliver to BBB, CCC, DDD, or EEE depend on the packet designated to deliver through active method or passive one. transmission rate is 9 KB/seconds, the distance of each peer is the same. In addition, the P2P simulation is similar as MP2P, but all receivers use passive method to transfer packets. Figure. 1. Simulation Environment Simulating 100 hours, to compare with the delivered packets and total issued packets, the result shows the packets can be delivered is 15.2% in MP2P and 5.4% in P2P. In addition, to compare with P2P and MP2P, the average delivered packets could be up 39.6% within a fixed time slot while adopting MP2P. IV. CONCLUSIONS This work proposes a managed peer-to-peer protocol (MP2P) to send packets instead of the passive P2P approach. To eliminate defects of the unmanaged bandwidth consumption caused by P2P method using passive protocol, the MP2P method using both passive and active protocols. Finally, the simulation result shows the MP2P has outstanding performance on packets delivery. To compare with the delivered packets and total issued packets, the result shows the packets can be delivered is 15.2% in MP2P and 5.4% in P2P. In addition, to adopting MP2P, the average delivered packets could be up 39.6%.

ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS 2007 231 REFERENCES [1] M. Agrawal, H.R. Rao, G. L. Sanders, Impact of Mobile Computing Terminals in Police Work, J. Organ. Comput. Electron. Commer, vol.13, pp. 73-89, 2003. [2] W. M. Wang, C. C. Liang, H. Z. Lu, W. S. Chow, K. Y. Chang, Research of Testing Process Case of TOPS-System Delivery Process, TL tech J, vol. 34, no. 1, pp. 7-34, 2004. [3] H. Z. Lu, C. C. Liang, C. C. Chuan, W. M. Wang, Discussion of TOPS/Order Software Deployment, news publish and operation mechanism, TL tech J, vol. 35, no.5, pp. 19-733, 2005. [4] C. C. Liang, C. R. Chuan, H. Z. Lu, W. M. Wang, A Software Deploy Model on TOPS/Order System and Its Practice, TL tech J, vol. 35, no.5-1, pp. 19-27, 2005. [5] J. Cao, X. Feng, J. Lu, H. C. B. Chan, S. K. Das, Reliable Message Delivery for Mobile Agents: Push or Pull?, IEEE Trans. Syst., Man, Cybern A, Syst., Humans, vol. 34, no. 5, pp. 577-587, 2004. [6] C. C. Liang, P. Y. Hsu, J. D. Leu, H. Luh, An effective approach for content delivery in an evolving intranet environment- a case study of the largest telecom company in Taiwan, Lect Notes Comput Sci, vol. 3806, pp. 740-749, 2005. [7] C. C. Liang, C. H. Wang, H. Luh, P. Y. Hsu, A Robust Web-based Approach for Broadcasting Downward Messages in a Large-Scaled Company, Lect Notes Comput Sci, vol. 4255, pp. 222-233, 2006. [8] S. Herrería-Alonso, A. Suárez-González, M. Fernández-Veiga, R. F. R. Rubio, C. López-García, Improving aggregate flow control in differentiated services networks, Comput Netw, vol. 44, no.4, pp. 499-512, 2004. [9] N. Saxena, C. M. Pinotti, S. K. Das, A Probabilistic Push-Pull Hybrid Scheduling Algorithm for Asymmetric Wireless Environment, in 2004 Proc. IEEE Conf. GLOBALCOM, pp. 5-9. [10] M. Bhide, P. Deolasee, A. Katkar, A. Panchbudhe, K. Ramamritham, P. Shenoy, Adaptive Push-Pull: Disseminating Dynamic Web Data, IEEE Trans Comput, vol. 51, no.6, pp. 652-668, 2002. [11] X. Liu, J. Lan, P. Shenoy, K. Ramaritham, Consistency maintenance in dynamic peer-to-peer overlay networks, Comput Netw, vol. 50, no. 6, 2006. [12] A. R. Bharambe, Some observations on BitTorrent performance, Perform Eval Review, vol. 33, no. 1, 2005. [13] K. Ragab, N. Kaji, Y. Horikoshi, H. Kuriyama, K. Mori, Autonomous decentralized community communication for information dissemination, IEEE Internet Comput, vol.1089-7801, pp. 29-36, 2004. [14] E. Turcan, N. Shahmehri, R. L. Graham, Intelligent software delivery using P2P, in 2002 Proc. IEEE Conf. P2P, pp. 1-8. [15] J. Lan, X. Liu, P. Shenoy, K. Ramamritham, Consistency Maintenance in peer-to-peer sharing network, in 2003 Proc. IEEE Conf. WIAPP, pp. 1-5. [16] A. Datta, M. Hauswirth, K. Aberer, Beyond web of trust : Enabling P2P E-commerce, in 2003 Proc. IEEE Conf. CEC. [17] X. Liu, J. Lan, P. Shenoy, K. Ramaritham, Consistency maintenance in dynamic peer-to-peer overlay network, Comput Netw, vol. 50, pp. 859-876, 2006. [18] X. Liu, Y. Liu, L. Xiao, Improving query response delivery quality in peer-to-peer systems, IEEE Trans Para Dist Syst, vol.17, no. 11, pp. 1335-1457. [19] A. Bar-Noy, A. Freund, J. Naor, On-line Load Balancing in a Hierarchical Server Topology, SIAM J. Comput., vol. 31, no. 2, pp. 527-549, 2001. [20] L. Guo, S. Chen, Z. Xiao, E. Tan, X. Ding, X. Zhang, A performance study of BitTorrent-like peer-to-peer systems, IEEE J Select Areas Commun, vol. 25, no. 1, pp. 155-169, 2007. [21] X. Défago, A. Schiper, P. Urbán, Total Order Broadcast and Multicast Algorithms; Taxonomy and Survey, ACM Comput Surv, vol. 36, pp. 372-421, 2004.