The Community for Technology Leaders
RSS Icon
Issue No.01 - January (2008 vol.7)
pp: 66-80
Wireless Peer-to-Peer (P2P) file sharing is widely envisioned as one of the major applications of ad hoc networks in the near future. This trend is largely motivated by the recent advances in high-speed wireless communication technologies and high traffic demand for P2P file sharing applications. To achieve the ambitious goal of realizing a practical wireless P2P network, we need a scalable topology control protocol to solve the neighbor discovery problem and network organization problem. Indeed, we believe that the topology control mechanism should be application driven in that we should try to achieve an efficient connectivity among mobile devices in order to better serve the file sharing application. We propose a new protocol, which consists of two components, namely, Adjacency Set Construction (ASC) and Community-Based Asynchronous Wakeup (CAW). Our proposed protocol is shown to be able to enhance the fairness and provide an incentive mechanism in wireless P2P file sharing applications. It is also capable of increasing the energy efficiency.
Topology control, wireless networking, P2P systems, file sharing, energy efficiency, fairness, incentive, network protocols.
Andrew Ka-Ho Leung, Yu-Kwong Kwok, "On Localized Application-Driven Topology Control for Energy-Efficient Wireless Peer-to-Peer File Sharing", IEEE Transactions on Mobile Computing, vol.7, no. 1, pp. 66-80, January 2008, doi:10.1109/TMC.2007.1077
[1] K.G. Anagnostakis and M.B. Greenwald, “Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing,” Proc. 24th IEEE Int'l Conf. Distributed Computing Systems (ICDCS '04), pp. 524-533, Mar. 2004.
[2] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, “MACAW: A Media Access Protocol for Wireless LAN's,” ACM SIGCOMM Computer Comm. Rev., vol. 24, pp. 212-225, Oct. 1994.
[3] BitTorrent, http://bitconjurer.orgBitTorrent/, 2005.
[4] A. Cerpa and D. Estrin, “ASCENT: Adaptive Self-Configuring Sensor Networks Topologies,” IEEE Trans. Mobile Computing, vol. 3, pp. 272-285, July-Sept. 2004.
[5] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, “SPAN: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks,” ACM Wireless Networks J., vol. 8, pp. 481-494, Sept. 2002.
[6] Evolutionary Algorithms, 02.html , 2005.
[7] eDonkey2000, http:/, 2005.
[8] FastTrack, http://www.slyck.comft.php, 2005.
[9] L.M. Feeney and M. Nilsson, “Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment,” Proc. IEEE INFOCOM, vol. 3, pp.1548-1557, Apr. 2001.
[10] S. Ganeriwal and M.B. Srivastava, “Reputation-Based Framework for High Integrity Sensor Networks,” Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '04), pp. 66-77, Oct. 2004.
[11] Z. Ge, D.R. Figueiredo, J. Sharad, J. Kurose, and D. Towsley, “Modeling Peer-Peer File Sharing Systems,” Proc. IEEE INFOCOM, vol. 3, pp. 2188-2198, Mar.-Apr 2003.
[12] D. Hales, “From Selfish Nodes to Cooperative Networks—Emergent Link-Based Incentives in Peer-to-Peer Networks,” Proc. Fourth Int'l Conf. Peer-to-Peer Computing (P2P '04), pp. 151-158, Aug. 2004.
[13] HKCSL, , 2005.
[14] IEEE Standard 802.11b, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE, 1999.
[15] D. Karger and M. Ruhl, “Finding Nearest Neighbors in Growth-Restricted Metrics,” Proc. 34th ACM Symp. Theory of Computing (STOC '02), pp. 63-66, 2002.
[16] A.K.H. Leung and Y.K. Kwok, “On Topology Control of Wireless Peer-to-Peer File Sharing Networks: Energy Efficiency, Fairness and Incentive,” Proc. Sixth IEEE Int'l Symp. World of Wireless (WoWMoM '05), pp. 318-323, June 2005.
[17] A.K.H. Leung and Y.K. Kwok, “Community-Based Asynchronous Wakeup Protocol for Wireless Peer-to-Peer File Sharing Networks,” Proc. Second Ann. IEEE Int'l Conf. Mobile and Ubiquitous Systems (MobiQuitous '05), pp. 342-350, July 2005.
[18] A.K.H. Leung and Y.K. Kwok, “An Efficient and Practical Greedy Algorithm for Server-Peer Selection in Wireless Peer-to-Peer File Sharing Networks,” Proc. First Int'l Conf. Mobile Ad Hoc and Sensor Networks (MSN '05), pp. 1016-1025, Dec. 2005.
[19] Z. Li and M.H. Ammar, “A File-Centric Model for Peer-to-Peer File Sharing Systems,” Proc. 11th IEEE Int'l Conf. Network Protocols (ICNP '03), pp. 28-37, Nov. 2003.
[20] R.T.B. Ma, S.C.M. Lee, J.C.S. Lui, and D.K.Y. Yau, “A Game Theoretic Approach to Provide Incentive and Service Differentiation in P2P Networks,” Proc. ACM Int'l Conf. Measurement and Modeling of Computer Systems (SIGMETRICS '04), pp. 189-198, June 2004.
[21] J.G. Markoulidakis, G.L. Lyberopoulos, D.F. Tsirkas, and E.D. Sykas, “Mobility Modeling in Third-Generation Mobile Telecommunications Systems,” IEEE Personal Comm., vol. 4, no. 4, pp. 41-56, Aug. 1997.
[22] A. Muqattash and M.M. Krunz, “A Distributed Transmission Power Control Protocol for Mobile Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 3, pp. 113-128, Apr. 2004.
[23] Napster, http:/, 2004.
[24] V. Paruchuri, S. Basavaraju, A. Durresi, R. Kannan, and S.S. Iyengar, “Random Asynchronous Wakeup Protocol for Sensor Networks,” Proc. First IEEE Int'l Conf. Broadband Networks (BroadNets '04), pp. 710-717, Oct. 2004.
[25] R. Rajaraman, “Topology Control and Routing in Ad Hoc Networks: A Survey,” ACM SIGACT News 33, pp. 60-73, July 2002.
[26] T.S. Rappaport, Wireless Comm.: Principles and Practice. Prentice Hall, 1996.
[27] V. Rodoplu and T.H. Meng, “Minimum Energy Mobile Wireless Networks,” IEEE J. Selected Areas in Comm., vol. 17, pp. 1333-1344, Aug. 1999.
[28] A. Rowstron and P. Druschel, “Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems,” Proc. IFIP/ACM Int'l Conf. Distributed Systems Platforms (Middleware '01), pp. 329-350, Nov. 2001.
[29] G. Salton and M.J. McGill, Introduction to Modern Information Retrieval. McGraw-Hill, 1983.
[30] S. Singh and C.S. Raghavendra, “PAMAS—Power Aware Multi-Access Protocol with Signalling for Ad Hoc Networks,” ACM SIGCOMM Computer Comm. Rev., vol. 28, pp. 5-26, July 1998.
[31] S. Singh, M. Woo, and C.S. Raghavendra, “Power-Aware Routing in Mobile Ad Hoc Networks,” Proc. ACM MobiCom, pp. 181-190, Oct. 1998.
[32], http://www.slyck.comnews.php?story=574, 2005.
[33] I. Stoica, R. Morris, D. Liben-Nowell, D.R. Karger, M.F. Kaashoek, F. Dabek, and H. Balakrishnan, “Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications,” IEEE/ACM Trans. Networking, vol. 11, pp. 17-32, Feb. 2003.
[34] VirtualUMTS—Lucent Technologies, VUMTSVirtual%20UMTS.htm, 2005.
[35] W. Wang, X.Y. Li, and Y. Wang, “Truthful Multicast Routing in Selfish Wireless Networks,” Proc. ACM MobiCom, pp. 245-259, Sept. 2004.
[36] Washington Times Online, technology20040303-094741-3574r.htm , 2005.
[37] W. Ye, J. Heidemann, and D. Estrin, “An Energy-Efficient MAC Protocol for Wireless Sensor Networks,” Proc. IEEE INFOCOM, vol. 3, pp. 1567-1576, June 2002.
[38] M.K.H. Yeung and Y.K. Kwok, “A Game Theoretic Approach to Energy Efficient Cooperative Cache Maintenance in MANETs,” Proc. 16th Ann. IEEE Int'l Symp. Personal Indoor and Mobile Radio Comm. (PIMRC '05), Sept. 2005.
[39] R. Zheng, C. Hou, and S. Lui, “Asynchronous Wakeup for Ad Hoc Networks,” Proc. ACM MobiHoc, pp. 35-45, June 2003.
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool