An Efficient Implementation of File Sharing Systems on the Basis of WiMAX and Wi-Fi Jingyuan Li, Liusheng Huang, Weijia Jia, Mingjun Xiao and Peng Du Joint.

Slides:



Advertisements
Similar presentations
February 20, Spatio-Temporal Bandwidth Reuse: A Centralized Scheduling Mechanism for Wireless Mesh Networks Mahbub Alam Prof. Choong Seon Hong.
Advertisements

A Construction of Locality-Aware Overlay Network: mOverlay and Its Performance Found in: IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO.
A Centralized Scheduling Algorithm based on Multi-path Routing in WiMax Mesh Network Yang Cao, Zhimin Liu and Yi Yang International Conference on Wireless.
1 Mobile IPv6-Based Ad Hoc Networks: Its Development and Application Advisor: Dr. Kai-Wei Ke Speaker: Wei-Ying Huang.
Jaringan Komputer Lanjut Packet Switching Network.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
A Survey on Wireless Mesh Networks Sih-Han Chen 陳思翰 Department of Computer Science and Information Engineering National Taipei University of Technology.
A serve flow management strategy for IEEE BWA system in TDD mode Hsin-Hsien Liu
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
Wimax Technology and its applications. Outline Introduction –Digital Divide –WiMax WiMax Mesh Networks –Terms of WMN Schdualing Operation Advantages of.
P2P Over MANET An Introduction to Mobile Resource Sharing.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Boyu Chen Yulin Xia Haoyu Xu Viterbi School of Engineering University of Southern California P2P file sharing system with a central server.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
By Omkar KiraniSridhara Chaitanya Sannapureddy Vivek Gupta 1.
Agent-based Device Management in RFID Middleware Author : Zehao Liu, Fagui Liu, Kai Lin Reporter :郭瓊雯.
Networking Components Presented by Jaisson Mailloux LTEC 4550 Network Systems Administration.
A Hierarchical Model for Bandwidth Management and Admission Control in Integrated IEEE & Wireless Networks Dusit Niyato and Ekram Hossain IEEE.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Access Control List ACL. Access Control List ACL.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
WiMAX: IEEE Wireless MANs. Sridhar IyerIIT Bombay2 Wireless networks  Wireless PANs (Bluetooth – IEEE ) –very low range –wireless connection.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Video Streaming over Cooperative Wireless Networks Mohamed Hefeeda (Joint.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
WiMAX: IEEE Wireless MANs Sridhar Iyer K R School of Information Technology IIT Bombay
Structuring P2P networks for efficient searching Rishi Kant and Abderrahim Laabid Abderrahim Laabid.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Intro to Network Design
Integration of WiMAX and WiFi Optimal Pricing for Bandwidth Sharing Dusit Niyato and Ekram Hossain, TRLabs and University of Manitoba IEEE Communications.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Multicast Mechanism in WiMax Mesh Network Jianfeng Chen, Wenhua Jiao, Pin Jiang, Qian Guo Asia-Pacific Conference on Communications, (APCC '06)
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
Cooperative Mobile Live Streaming Considering Neighbor Reception SPEAKER: BO-YU HUANG ADVISOR: DR. HO-TING WU 2015/10/15 1.
Application Level QoS in Multimedia Peer-to-Peer (P2P) Networks Alireza Goudarzi Nematiy and Makoto Takizawa¤ Tokyo Denki University
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Performance Evaluation of the IEEE MAC for QoS Claudio Cicconetti, Alessandro Erta, Luciano Lenzini, and Enzo Mingozzi IEEE Transactions On Mobile.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
IEEE Wireless LAN Standard
Computer Engineering and Networks, College of Engineering, Majmaah University INTRODUCTION TO COMPUTER NETWORKS Mohammed Saleem Bhat
整合 Wi-Fi 和 WiMAX 之無線網路管理系統 Wireless Network Management System for Wi-Fi and WiMAX Integrated Networks 報告人:李建毅 指導教授:周立德 教授 國立中央大學資工系.
System Architecture for C2C Communications Based on Mobile WiMAX Michiyo ASHIDA VTT Technical Research Centre of Finland
INTRODUCTION TO COMPUTER NETWORKS BY: SAIKUMAR III MSCS, Nalanda College.
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
CSIE & NC Chaoyang University of Technology Taichung, Taiwan, ROC
Authors: Jiang Xie, Ian F. Akyildiz
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Net 323: NETWORK Protocols
ECE 4450:427/527 - Computer Networks Spring 2017
ANEEL ABBASI MUHAMMAD ADNAN MOIZ SHAH MUHAMMAD KHAYAM GROUP MEMBERS.
Enhancements to Mesh Discovery
WiMAX: IEEE Wireless MANs
Network Architecture for Cyberspace
Ch 17 - Binding Protocol Addresses
Chapter 15 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Presentation transcript:

An Efficient Implementation of File Sharing Systems on the Basis of WiMAX and Wi-Fi Jingyuan Li, Liusheng Huang, Weijia Jia, Mingjun Xiao and Peng Du Joint Advanced Research Institute of City University of Hong Kong and University of Sci. Tech. China Suzhou, China 報告 : 羅世豪

Outline 一. Introduction  WiMAX Overview and Mesh Mode 三. Overview of Our File Sharing System  File Publication  File Lookup  File Transportation 七. Analysis  Simulations  Conclusion

Introduction (1/1)  Both P2P file sharing systems and the WMAN standard WiMAX have a brilliant future. Therefore, combining the two techniques surely will bring the benefits to the users of both sides.  The problem is: “do the facilities of WiMAX efficiently support the structures of file sharing systems?”.  The conflict of inefficiency in pure P2P file sharing systems, lack of air interfaces and energy resources are the most severe problems that fundamentally retard the growth of P2P file sharing systems on wireless networks.  In this paper, we propose a layered P2P file sharing structure on WiMAX and Wi-Fi network infrastructures.

WiMAX Overview and Mesh Mode (1/4)

WiMAX Overview and Mesh Mode (2/4)  In WiMAX MAC layer standard, there are two different network architectures:  The point-to-multipoint (PMP) mode  The mesh mode.  The main difference between the PMP and optional mesh mode is that,  In the PMP mode, traffic only occurs between the base stations (BS) and subscriber stations (SS)  In the mesh mode, traffic can be routed through other SSs and can occur directly between SSs.

WiMAX Overview and Mesh Mode (3/4) SS

WiMAX Overview and Mesh Mode (4/4)  The architecture is an ad-hoc like structure in which SSs act as the routers.  Traffic is routed through other SSs or occurs directly among the SSs. It should be noted that, there is no need for the SSs to connect directly to the BS.  We suppose that Wi-Fi technology is used to connect end hosts to the corresponding SS and the backhaul of the network is wired.

Overview of Our File Sharing System (1/2)

Overview of Our File Sharing System (2/2)  End devices under the same SS are connected with Wi-Fi technology.  Every two end hosts are one-hop connected and each end host in the same local area network is connected directly to the SS.  We propose a changed dynamic source routing (CDSR) lookup protocol on SSs mesh networks where the number of SSs under a BS is not large enough to efficiently construct a DHT based file sharing architecture.  By implementing CDSR on SSs mesh networks, our layered file sharing system can support keyword lookup within a SSs mesh network.  We also design DHT based file lookup architecture on BSs networks, because BSs networks are cable connected and able to tolerate the extra traffic loads.

File Publication (1/2)  When an end host s releases a file f to the file sharing system, it registers its information in two places:  The SS the end host is directed connected to.  A BS in the BS network.

File Publication (2/2)  Firstly, s releases the file name and a bunch of keywords to the SS to which it is registered.  Guarantee that our system support content lookup within the same range of a BS.  Secondly, s computes the hash value of the file name h(f) and registers the file to the corresponding BS in the BS network, where h(f)=h(BS i ).  BS i is the ID of the corresponding BS.  If such BS i does not exist, then the information is stored in the nearest next BS as that is implemented in the Chord system.  Registering f to the DHT based BS overlay network enables the end hosts from other BSs to share their resources together in a robust and efficient way.

File Lookup (1/6)

File Lookup (2/6)  When an end host d requests a file f, it may require three performance steps to finally find the requested resource.  Firstly, d searches f on end hosts within the SS it is registered.  Because all of the end devices are one-hop connected, d instantly knows whether f exits or not.  If f does not exist within the local area network under the registering SS, then d searches the publication information within the range of the corresponding BS, i.e., the nearest SSs mesh network.  Here a changed dynamic source routing protocol (CDSR) is used to efficiently manipulate the routing problems in the SSs network

File Lookup (3/6)  If there is no f found in the local SSs mesh network, then the resource lookup procedure sends a request message to the DHT ring of the BSs network as Chord does, seeking fortune from hosts under other BSs.  By importing the above three layer lookup procedure, our layered P2P file sharing system guarantees the following two advantages.  The requesting end host gets the requested file as ‘near’ as possible. This saves a great amount of bandwidth for the underground wireless infrastructures.  Our system supports keywords lookup within the SSs mesh networks. On the basis of our simulations, this may be the major position that the requested file f is found.

File Lookup (4/6)

File Lookup (5/6)  CDSR is very similar to DSR algorithm in mobile ad-hoc networks except that most of the SSs are immobile as compared to the end devices in the ad-hoc networks.  The requesting end host d launches a request procedure in the SS to which it is registered in order to find f  The SS sends a request message containing the name of the file f and/or some keywords to all its neighbors in the SSs mesh network.  The neighbor SSs perform the same action until a SS finds the file f in its resource register table, or all the SSs under the range of the same BS receive the message and no match is found.  If f is found, then the source SS unicasts backwards to the requesting end host where the requesting end host saves the routing information in its routing table.

File Lookup (6/6)

File Transportation(1/1)  Resource transportation is almost the same as that of other cabled networks.

Analysis (1/4)  α end devices under each SS.  β SSs under each BS.  γ BSs of the whole system.  Let η be the probability of file f on each end host.  The probability P EH that a requesting end device obtains the requested file f under the same SS is shown in expression.  P EH = 1− (1−η ) α

Analysis (2/4)  Defining P SS as the probability of the requesting end host obtaining the requested file f under the same BS or in the nearest SSs mesh network (but not in its own Wi-Fi based local area network). P SS is shown in expression.  P SS = (1−η ) α ×[1− (1−η ) α (β −1) ]

Analysis (3/4)  P BS is the probability indicating that the nearest SSs mesh network does not have the file transmission request is shown in expression.  P BS = 1− (1−η ) αβ

Analysis(4/4)  As the popularity of resource goes higher, there is more opportunity that the requesting end host obtains the requested file within the range of the SS to which it is registered and the nearest SSs mesh network.  Enhances the performance of our layered P2P file sharing system,  Reducing both the number of lookup messages in file lookup procedure and the bandwidth requirement in WiMAX and Wi-Fi based wireless network architectures in file transportation procedure.

Simulations(1/6)  We simulated under an independent WiMAX wireless metropolitan area network with 100 BSs connected by cables.  Each BS controlled 25 SSs, all of which were interconnected to form a wireless SSs mesh network.  The network under each SS was set to be Wi-Fi based local area network.  End hosts under the same SS were one-hop connected and were directly connected to the SS they were registered to.  Four end hosts were registered to each SS.  The popularity of a file f was from 0.5% to 6%.

Simulations(2/6)

Simulations(3/6)  Fig. 9 describes the percentage of three types of positions of the requested file f:  Source end host which was under the same SS (Wi-Fi based local area network) with the destination end host.  Source end host which was under the same BS (SSs mesh network).  Source end host which was under other BS (BSs Chord ring).

Simulations(4/6)  When a file f is popular, a great number of end hosts cached it to their own memory.  Therefore the requesting end host is more likely to obtain f around its neighbors in our hierarchical system which saves a great amount of precious wireless bandwidth.  We also notice that even though a file is very unpopular (for example, only 0.5% end hosts have the file), there is still a great probability that the requesting end host gains the file within the SSs mesh network where it is located (45% in the above simulation result), as long as there are enough end hosts under the corresponding BS.

Simulations(5/6)  Fig. 10 presents the relationship between the number of lookup messages in the physical networks and the popularity of the requested file in our hierarchical system.

Simulations(6/6)  The number of lookup messages are greatly reduced as the file becomes more and more popular.  In original Chord system, the popularity of the requested file does not affect the complexity of the lookup procedure.  Our system successfully improves this inefficiency.

Conclusion(1/1)  We have proposed a layered P2P file sharing system on the important WiMAX and Wi-Fi wireless techniques.  By statistical analysis and practical simulations, we have shown that our layered P2P file sharing system can  Greatly reduces the number of lookup messages in physical networks.  Prevents over expenses of precious bandwidth in wireless metropolitan area networks.