1 / 30

Peer to Peer Applications in Ad hoc Networks

Author: Jesús Hijas jhijas@netlab.hut.fi Networking Laboratory Helsinki University of Technology. Supervisor: Professor Raimo Kantola Instructor: LSc. José Costa-Requena. Peer to Peer Applications in Ad hoc Networks. HELSINKI UNIVERSITY OF TECHNOLOGY

peggy
Télécharger la présentation

Peer to Peer Applications in Ad hoc Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Author: Jesús Hijas jhijas@netlab.hut.fi Networking Laboratory Helsinki University of Technology Supervisor: Professor Raimo Kantola Instructor: LSc. José Costa-Requena Peer to Peer Applications in Ad hoc Networks HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

  2. Outline HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Problem overview • Ad Hoc Networks • Peer to Peer applications • P2P architectures • Study of the problem • Limitations when using P2P applications in Ad Hoc networks. • Solution • P2P application proposal for Ad Hoc networks • Verification • Tests and results • Conclusions

  3. Problem HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • The problem to be solved in this Thesis is how to discover and use Peer to Peer applications in Ad Hoc networks. • We also study their performance and scalability problems when running in nodes that are part of an Ad Hoc network.

  4. Problem (II) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Ad Hoc networks are wireless, self-organizing systems that provide functionality without infrastructure support. • Peer to Peer (P2P) applications are those that do not rely on elements as servers or clients • Inherent symbiosis: • P2P applications: distributed, running in the nodes of the network, not in central servers • Ad hoc networks: all nodes are peers (equals) that have to act both as clients and servers (P2P paradigm).

  5. Problem (III) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • P2P architectures: Centralized (e.g. Napster)

  6. Problem (IV) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • P2P architectures: Distributed and unstructured (e.g. Gnutella)

  7. Problem (V) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • P2P architectures: Distributed but structured (e.g. Kazaa)

  8. Study of the problem HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Problem description: to achieve the goal of this Thesis, we need to study which problems appear when integrating P2P applications and Ad Hoc networks: • Service Discovery: P2P architecture is fully distributed, which means that applications are available in concrete nodes of the network and not centralized in servers. In Ad Hoc networks, one node does not know the others beforehand. Thus, applications have to be discovered before they can be used. • P2P architecture: should not rely on central nodes, since in Ad Hoc networks one node can be down at anytime. • P2P applications: may act both as client and server with high reliability.

  9. Solution HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • We need to implement a Service Discovery mechanism so that peers can find each other and the services they provide. It will be implemented over UPnP. • Chosen among others such as JINI, Salutation, SLP, etc. • P2P architecture must be distributed and unstructured. • P2P application must include both client and server entities in a single piece of software that will run in every node in the Ad Hoc network.

  10. Solution (II) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • P2P application proposal for Ad Hoc networks: • P2P application: Presence Service. • Chosen among others such as Instant Messaging, Voice over IP, file sharing, etc. due to its simplicity. • Will run over SIP. • Service Discovery module: in charge of solving the problem of service discovery in Ad Hoc networks. • Will run over UPnP.

  11. Solution (III) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • P2P application proposal for Ad Hoc networks: design of the system. SIP HTTP, TCP, IP, SSDP, UDP, XML…

  12. Solution (IV) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Presence Service functionality: • Service that allows the user to know about the reachability, availability and willingness of communication of another user (i.e. his status). • Users subscribe to others’ presence information. • When the presence status of one user changes, it has to notify all the subscribers this user has.

  13. Solution (V) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • UPnP functionality: • We use UPnP discovery step, in which control points and devices multicast SSDP discovery messages (to address 239.255.255.250).

  14. Verification HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Tests scope: estimate the performance of the P2P application developed in a real Ad Hoc Network. • Test method: prepare test cases with different number of nodes in the network and measure the total traffic generated by the application in one node. • Test conclusions: consider scalability problems based on the results obtained in the tests and the previous analytic study.

  15. Verification (II) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • The Ad Hoc network is formed by iPAQ PDAs with with one wireless adapter • Linux OS • Wireless link bandwidth: 2Mbps • 1 iPAQ 3900 and 2 iPAQ 3800

  16. Verification (III) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Analytic study: • Excluding unavoidable traffic, such as IGMP, TCP or ARP, the total traffic of the application is: • SIP traffic, TSIP, is the number of SIP messages sent by one node. • UPnP traffic, TUPnP, varies with the expression: • With: • CC = Value of control-cache header • N = number of nodes in the network • Ntx = number of transmissions of one packet

  17. Verification (IV) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Tests case 1: one node in the network • Scope: measure the UPnP traffic in one iPAQ when it does not interact with other devices and estimate the value of CC to complete the analytic formula. • Results: • CC: time between UPnP announcements (expiration time)

  18. Verification (V) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Analytic study: • We will assume no UPnP retransmissions, i.e. • With these data the general analytic model for the traffic of the application is: • The capacity consumed by the application is: • Considering the average UPnP packet size measured in the test cases (309 bytes):

  19. Verification (VI) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Test case 2: two nodes in the network. Scenario.

  20. Verification (VII) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Test case 2: capture.

  21. Verification (VIII) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Test case 2: Traffic.

  22. Verification (IX) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Test case 2: Result analysis. • Initial IGMP and ARP traffic. • SIP traffic (red) is very low compared to UPnP traffic (green). • Data and comparison: • Analytic results for test case 2:

  23. Verification (X) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Test case 3: three nodes in the network. Scenario.

  24. Verification (XI) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Test case 3: Traffic.

  25. Verification (XII) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Test case 3: Result analysis. • IGMP and ARP traffic peaks in the initialization. • UPnP traffic: predomines during all the test. • SIP traffic (red) is very low. • Total traffic increases softly compared to test case 1. • Data: • Analytic results for test case 3:

  26. Verification (XIII) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Result analysis:

  27. Verification (XIV) HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • Result analysis: • If we consider the total capacity of the channel provided by the wireless card in the iPAQ devices (2Mbit/s), we could accept that the Presence application would consume the 20% of this capacity. Therefore, the maximum acceptable capacity of the application in one device would be: • This maximum is reached with 37 nodes in the network. This number can be taken as the maximum acceptable number of nodes in the Ad Hoc network so that the application is efficient.

  28. Conclusions HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas • In this Thesis we have developed a Peer to Peer application that will run in an Ad Hoc network. • Attending to the results got, we can conclude that Peer to Peer applications are suitable for Ad Hoc networks, providing a fully-distributed service and automatic service discovery in every node, without relying in central servers and with a reasonable scalability. • Possible future work: • Reducing the UPnP traffic to improve the scalability of the application. • Integrating the Presence Service with any other P2P application such as VoIP or IM to allow users a wider way of communication.

  29. Questions? HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

  30. Thank you HELSINKI UNIVERSITY OF TECHNOLOGY Peer to Peer Applications in Ad Hoc Networks Jesús Hijas

More Related